bcco pct #4 powerpoint and identity crimes tcole course #3277 participant handout unit 1 - 5

119
BCCO PCT #4 PowerPoint BCCO PCT #4 PowerPoint AND IDENTITY CRIMES IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Upload: amelia-osborne

Post on 03-Jan-2016

234 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

BCCO PCT #4 PowerPointBCCO PCT #4 PowerPoint

AND

IDENTITY CRIMESIDENTITY CRIMESTCOLE Course #3277

Participant Handout

UNIT 1 - 5

Page 2: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

ADMINISTRATIVEADMINISTRATIVE

• Please complete the BCCO PCT #4 Registration form and turn it in now.

• Make sure you sign TCOLE Report of Training (PID#, Full Name and DOB).

• All cell phones off please – pay attention to course materials and show common respect & courtesy.

Page 3: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

About Your InstructorAbout Your InstructorCourse Facilitator - Mentor Course Facilitator - Mentor

George D. Little

A.S. & B.S. Criminal Justice & SociologyB.S.CJ Wayland Baptist University, San Antonio

M.S. Criminology & Counter-Terrorism University of the State of New York

2012 T.C.L.E.O.S.E. Professional Achievement AwardCertified Crime Prevention Specialist (C.C.P.S.)

TCLEOSE Basic Instructor Certificate 1984TCLEOSE Master Peace Officer 1991

MP Special Operations Operator Counter-Terrorism 1988Graduate Drug Enforcement Administration Academy 1977

43- years Law Enforcement Experience 43- years Law Enforcement Experience 40-Years Teaching & Instructor Experience40-Years Teaching & Instructor Experience

Page 4: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

COURSE/LESSON COURSE/LESSON OVERVIEWOVERVIEW

Educational requirements for Educational requirements for identity crimes training identity crimes training

established by legislative established by legislative mandate: SB473-(78Reg).mandate: SB473-(78Reg).

Page 5: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

UNIT ONEUNIT ONE

Page 6: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Learning ObjectivesLearning Objectives

Learning Objective 1.0Learning Objective 1.0: The Participant will be able to recognize the types of identity crimes.

Learning Objective 1.1Learning Objective 1.1: The Participant will be able to provide a definition of identity crime.

Learning Objective 1.2Learning Objective 1.2: The Participant will be able to identify types of crimes associated with identity crimes.

Page 7: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Learning Objective 1.3 Learning Objective 1.3 : The Participant will be able to list personal and financial identifiers.

Learning Objective 1.4 Learning Objective 1.4 : The Participant will be able to identify currents trends associated with identity crimes.

Learning ObjectivesLearning Objectives

Page 8: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

1.0 Defining Identity Crimes1.0 Defining Identity Crimes

Page 9: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

1.1 Participant will be able to 1.1 Participant will be able to recognize the types of identity recognize the types of identity

crimecrimeAccording to the Federal Trade Commission (FTC):

•31,000 persons were victims of identity crime in 2000.

•During the first seven months of 2003, 131,000 Americans were victimized

Page 10: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

• If trends continue, by the end of 2003, those victimized will have increased almost 700% in three years.

• Texas is __________ in the nation in the number of instances of identity crime reported to the FTC.

Page 11: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

2013 Statistics2013 StatisticsTotal financial loss attributed to identity theft $24,700,000,000

Misuse of Existing Credit Card 64.1% 64.1%

Misuse of Existing Bank Account 35%35%

Misuse of Personal Information 14.2%14.2%

Page 12: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Identity Fraud & Incident Identity Fraud & Incident RateRate

2011 4.9%2010 4.35%2009 6%2008 5.44%2007 4.51%2006 4.71%2005 5.04%

Page 13: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

1.11.1The student will be able to The student will be able to provide a definition of provide a definition of

identity crimeidentity crime

A.A. _________ ______ is the thefttheft or misuse of personal or financial identifiers in order to gain something of value and/or facilitate other criminal activity.

 

Page 14: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

B.B. Types of identity crimes include;

1. identity __________,

2. _______ ______/access device fraud (“skimming”),

3. __________ fraud,

4. ________ fraud,

5. false _______________ fraud, and

6. ______________/visa fraud.

1.11.1 The student will be able to provide The student will be able to provide a definition of identity crime – Cont’da definition of identity crime – Cont’d

Page 15: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

1.21.2The student will be able to The student will be able to identify types of crimes identify types of crimes associated with identity associated with identity

crimescrimesIn many instances an identity crime is used as a _______________, through financing or anonymity, to commit other criminal activities such as mail theft, mail fraud, narcotics/drugs, organized crime, financial fraud (money laundering), mortgage fraud, weapons trafficking

Page 16: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

homicide, terrorism, wire fraud, or computer crime/Internet intrusions.

 

Identity crimes can begin with other seemingly unrelated _________ such as robbery (e.g. purse snatching or mugging), computer intrusion, mail theft, theft of trash (“dumpster diving”), or theft of documents or information from businesses, medical facilities, hotels, etc.

Page 17: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

1.3 The student will be able to 1.3 The student will be able to list personal and financial list personal and financial

identifiersidentifiersPersonal identifiers includePersonal identifiers include:

1.1.________________, ,

2.2.date of __________, date of __________,

3.3.__________________ ___________ number, ___________ number,

4.4.________________________, ,

Page 18: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Personal identifiers include – Cont’d:

5.5.____________________ number, number,

6.6.____________________ __________ number, __________ number,

7.7.________________________ number, number,

8.8.mother’s mother’s maidenmaiden name, etc. name, etc.

1.3 The student will be able to 1.3 The student will be able to list personal and financial list personal and financial

identifiers – Cont’didentifiers – Cont’d

Page 19: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Financial identifiers includeFinancial identifiers include:

1.1.____________________ ________________ numbers, numbers,

2.2.________________ ________________________ numbers,numbers,

3.3.personal identification numbers personal identification numbers (“PINs”), (“PINs”),

4.4.____________________ account numbers, etc. account numbers, etc. 

1.3 The student will be able to 1.3 The student will be able to list personal and financial list personal and financial

identifiers – Cont’didentifiers – Cont’d

Page 20: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

1.1.4 The student will be able 1.1.4 The student will be able to identify currents trends to identify currents trends

associated with identity associated with identity crimescrimes

Some of the current trends associated with identity theft involve the usage of current ___________. This provides a unique challenge for consumers and law enforcement by testing their ability to keep up with technological advances and changes.

Page 21: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Some of the more recent scams involve stealing information by;

1.listening in on conversations made on ____________________ ____________,

2.surreptitiously reading other people’s ________________ and ________________,

1.1.4 The student will be able to 1.1.4 The student will be able to identify currents trends identify currents trends

associated with identity crimesassociated with identity crimes

Page 22: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Some of the more recent scams involve stealing information by;

3.3.____________________________ into computers,

4.conducting __________________ and e-mail scams, and

5.taking advantage of careless consumers’ online ____________________ and ____________________________.

1.1.4 The student will be able to 1.1.4 The student will be able to identify currents trends associated identify currents trends associated

with identity crimes – Cont’dwith identity crimes – Cont’d

Page 23: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Currently, the Identity Theft Resource Center, www.idtheftcenter.org, is an excellent website for obtaining information on new trends, scams and consumer alerts on identity crimes.

1.1.4 The student will be able to 1.1.4 The student will be able to identify currents trends identify currents trends

associated with identity crimesassociated with identity crimes

Page 24: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

2424

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 1.0:Define 1.0: Explain some current identity crime statistics

Page 25: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

2525

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 1.1:Define 1.1: Explain and define identity crimes

Page 26: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

2626

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 1.2:Define 1.2: Explain some types of crime identified with identity crimes.

Page 27: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

2727

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 1.3:Define 1.3: Explain some personal and financial identifiers associated with identity crime

Page 28: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

2828

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 1.4:Define 1.4: Explain current trends associated with identity crimes.

Page 29: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

UNIT TWOHow identity crime occur How identity crime occur

Page 30: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Learning ObjectivesLearning Objectives

Learning Objective 2.0Learning Objective 2.0: The Participant will be able to recognize how identity crime occurs.

Learning Objective 2.1Learning Objective 2.1: The Participant will be able to identify how identity crime is commonly perpetrated.

Learning Objective 2.2Learning Objective 2.2: The Participant will be able to identify techniques used to procure false identification.

Page 31: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

2.1. How identity crime 2.1. How identity crime is commonly perpetratedis commonly perpetratedA.A. Identity crimes can occur if someone steals your wallet, purse, briefcase, etc., containing your

1.1.____________________________________,

2.2.__________________ ____________________ card,

3.3.____________________ cards,

4.4.____________________ or __________________________.

Page 32: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

B. B. Identity crimes can occur if someone steals your

1.1.________________,

2.especially your bank and credit card _________________,

3.pre-approved ______________________ offers,

4.new ________________________, or

5.5.________________ information.

2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d

Page 33: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

C. C. Identity thieves can complete a “____________________ of ______________________ form” to divert your mail to another location.

D. D. Identity thieves may rummage through your trash or the trash of businesses to find personal data (also known as “____________________________ diving”).

2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d

Page 34: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

E. E. Identity thieves may fraudulently obtain your credit report by posing as a ________________, __________________, or someone else who may have a legitimate need for (and legal right to) the information.

F. F. Identity thieves can find __________________________ information in your home.

2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d

Page 35: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

G. G. Identity thieves may obtain personal information that you share on the ______________________.

 

2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d

Page 36: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

H. H. Identity thieves can get information from the workplace, in a practice known as “____________________________ __________________ theft,” by stealing files out of offices where you are a customer, employee, patient or student, by bribing an employee who has access to your files, or by “hacking” into electronic files.

2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d

Page 37: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

I. I. Some identity thieves also engage in “____________________ __________________”: looking over your shoulder or from a nearby location as you enter your Personal Identification Number (PIN) at an ATM machine.

2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d

Page 38: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

I. (Cont’d): I. (Cont’d): This practice has gone high-tech, with some thieves utilizing hidden “________ ____________________” positioned near ATMs to observe or record people as they enter their PINs.

2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d

Page 39: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

J. J. Many criminals who want to obtain personal data from people online use a technique known as “____________________”: the creation of e-mails and websites that appear to belong to legitimate businesses such as established retail companies, financial institutions, and online auctions sites.

2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d

Page 40: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

J. (Cont’d) J. (Cont’d) Consumers receive e-mails from thieves claiming to be legitimate businesses, and are directed to ______________________ that appear to be run by those businesses. The consumers are then directed to enter large amounts of personal data.

2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d

Page 41: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

J. (Cont’d): J. (Cont’d): The thieves sending the e-mails or running the websites actually have actually have ________ connection with connection with those businessesthose businesses, and their sole purpose is to obtain the consumers’ personal data so that they can engage in various fraud schemes.

2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d

Page 42: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

2.2 Techniques used to 2.2 Techniques used to procure false procure false identificationidentification

A wide variety of sources, including ____________________ and ______________________ retailers, provide publications that give criminals step-by-step step-by-step instructions on techniques for instructions on techniques for producing false documentsproducing false documents.

Page 43: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Some of the resources that are available to criminals who want to create false documents.

Examples:

•www.paladin-press.com

•Gun shows

•The Modern Identity Changer by Sheldon Charrett, ISBN 0-87364-946-X #IDENTITY

2.2 Techniques used to procure 2.2 Techniques used to procure false identificationfalse identification

Page 44: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

4444

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 2.0:Define 2.0: Explain how identity crimes occur

Page 45: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

4545

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 2.1:Define 2.1: Explain how identity crime is commonly perpetrated

Page 46: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

4646

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 2.2:Define 2.2: Explain Techniques used to procure false identification.

Page 47: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

UNIT THREELAWS

Page 48: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Learning ObjectivesLearning Objectives

Learning Objective 3.0Learning Objective 3.0: The Participant will be able to recognize the legal aspects of identity crimes.

Learning Objective 3.1Learning Objective 3.1: The Participant will be able to identify the federal statutes dealing with identity crimes.

Learning Objective 3.2Learning Objective 3.2: The Participant will be able to identify the state statutes dealing with identity crimes.

Page 49: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Learning Objective 3.3 Learning Objective 3.3 : The Participant will be able to define the term “security alert,” according to the Business Code.

Learning Objective 3.4 Learning Objective 3.4 : The Participant will be able to define “security freeze,” according to the Business Code.  

Learning ObjectivesLearning Objectives

Page 50: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

3.0 3.0 Laws and Statutes Laws and Statutes Governing Identity Crimes Governing Identity Crimes

FEDERAL LAW STATE LAW

Page 51: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

3.1 Federal Statutes dealing 3.1 Federal Statutes dealing with Identity Crimewith Identity Crime

Federal lawFederal law: ______ ____________ § 1028 § 1028 – Identity Theft and Assumption Deterrence Act

Page 52: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

3.2 state statutes dealing 3.2 state statutes dealing with identity crimeswith identity crimes

State Law: ______________ __________ ___._______.____ – Fraudulent Use or Possession of Fraudulent Use or Possession of Identifying Information Identifying Information (State Jail Felony)

Page 53: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Business and Commerce Business and Commerce Code, Chapter 20 Code, Chapter 20 - Regulation of Consumer Credit Reporting

3.2 state statutes dealing 3.2 state statutes dealing with identity crimeswith identity crimes

Code of Criminal Procedure, Code of Criminal Procedure, Article 55.02, Sec.2a Article 55.02, Sec.2a – Procedure for Expunction

Page 54: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

3.3 Define the term “security 3.3 Define the term “security alert,” according to the Tx-BC.alert,” according to the Tx-BC.

____________________ ______________ – means a notice placed on a consumer file that alerts a recipient of a consumer report involving that consumer file that the consumer’s identity may have been used without the consumer’s consent to fraudulently obtain goods or services in the consumer’s name.

Page 55: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

3.4 Define “security 3.4 Define “security freeze,” according to the freeze,” according to the

Business CodeBusiness Code

________________________ ______________________ – means a notice placed on a consumer file that prohibits a consumer reporting agency from releasing a consumer report relating to the extension of credit involving that consumer file without the express authorization of the consumer.

Page 56: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

5656

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 3.0:Define 3.0: Explain the legal aspects of identity crimes.

Page 57: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

5757

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 3.1:Define 3.1: Explain the federal statute dealing with identity crimes

Page 58: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

5858

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 3.2:Define 3.2: Explain Texas Laws and statutes dealing with identity crimes

Page 59: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

5959

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 3.3:Define 3.3: Explain and define the term security alert according to the Business Code.

Page 60: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

6060

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 3.4:Define 3.4: Explain and define the term security freeze according to the Business Code.

Page 61: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

UNIT FOURIdentity Theft Crime Identity Theft Crime

Report Report

Page 62: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Learning ObjectivesLearning Objectives

Learning Objective 4.0Learning Objective 4.0: The Participant will be able to request information needed for an ID crime offense report.

Learning Objective 4.1Learning Objective 4.1: The Participant will be able to list information needed for an ID crime offense report.

Learning Objective 4.2Learning Objective 4.2: The Participant will be able to identify the governmental and business entities that are notified in identity crimes.

Page 63: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

4.0 Prosecuting Identity 4.0 Prosecuting Identity CrimesCrimes

Page 64: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

4.1 Request information 4.1 Request information needed for an ID crime needed for an ID crime

offense report.offense report.

How to request information needed for an ID crime offense report.

Page 65: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

4.1 List information needed 4.1 List information needed for an ID crime offense report.for an ID crime offense report.

Taking a __________________ ________________ is vital to the victim(s) because credit because credit bureaus require a police report bureaus require a police report in order to block fraudulent in order to block fraudulent information information and to begin repairing the victim’s credit reports.

Page 66: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

In addition, manymany __________________________l l institutions require a police institutions require a police report with an affidavit of fraudreport with an affidavit of fraud.

Refer to your “Identity Crime Incident Detail Form” (Appendix A).

4.1 List information needed 4.1 List information needed for an ID crime offense report for an ID crime offense report

– Cont’d.– Cont’d.

Page 67: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Have the (class participants as a crime victim) fill out an identity crime incident form crime incident form (Appendix A).

4.1 Practical Exercise 4.1 Practical Exercise

Page 68: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

This document provides the officer - investigator with detailed information to: Understand the type of incident that occurred,

Organize the __________________________ case,

Determine where ____________________ might be found,

4.1 List information needed for an ID 4.1 List information needed for an ID

crime offense reportcrime offense report..

Page 69: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

This document provides the officer/investigator with detailed information to – Cont’d:

Develop a __________________ of how the identity theft occurred, and

Determine what __________institutions should be contacted in the course of the investigation.

4.1 List information needed for an ID 4.1 List information needed for an ID

crime offense reportcrime offense report..

Page 70: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Ask the victim to begin gathering documentation (bank and credit card bank and credit card statements, letters from creditors, statements, letters from creditors, merchant account statementsmerchant account statements, etc.)

4.1 List information needed for an ID 4.1 List information needed for an ID

crime offense reportcrime offense report..

Page 71: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Ask the victim to obtain credit reports from the three major Credit Bureaus

•EquifaxEquifax,

•ExperianExperian, and

•Trans UnionTrans Union and voluntarily give them to you.

4.1 List information needed for an ID 4.1 List information needed for an ID

crime offense reportcrime offense report..

Page 72: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

If not given voluntarilyvoluntarily by the victim, a subpoena is needed from the courts to obtain victim credit histories.

4.1 List information needed for an ID 4.1 List information needed for an ID

crime offense reportcrime offense report..

Page 73: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

4.2 Governmental and 4.2 Governmental and business entities that are business entities that are notified in identity crimes.notified in identity crimes.

A.A. FFederal BBureau of IInvestigation – Notify if an identity crime is used to commit a bank fraud, governmental fraud or in furtherance of an ________________________ scheme, ____________________ fraud, etc. involving losses over one hundred thousand dollars ($100,000).

Page 74: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

B.B. U. S. ______________ ________________ – Notify if there is any custody arrest of individuals associated with identity crime or identity ________________________. This would involve the seizure or recovery of any amount of identity crime devices, equipment, or products such as skimmers (small electronic devices

4.2 Governmental and business 4.2 Governmental and business entities that are notified in entities that are notified in

identity crimes – Cont’didentity crimes – Cont’d

Page 75: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

B.B. U. S. Secret Service – Cont’d: that can gather information, such as your name, address, credit limit, and PIN from your credit card); counterfeit identification documents; counterfeit credit cards; or lists of personal identifiers (e.g., names, social security numbers, dates of birth, bank account numbers, and credit card numbers).

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 76: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

B.B. U. S. Secret Service – Cont’d: that can gather information, such as your name, address, credit limit, and PIN from your credit card); counterfeit identification documents; counterfeit credit cards; or lists of personal identifiers (e.g., names, social security numbers, dates of birth, bank account numbers, and credit card numbers).

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 77: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

C.C. U. S. Postal Service – Notify if an individual is taken into custody for committing a financial crime involving the U.S. mail. Postal inspectors will respond to violations relating to identity crime, forgery, credit cards and checks, mail theft, mail fraud, and Internet fraud (when the scheme involves use of the U.S. mail).

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 78: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

D. Social Security Administration – Notify if the misuse of a social security number involved social security program fraud, or if there is either a significant financial loss to an individual or institution, or a significant number of counterfeit social security cards are seized.

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 79: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

E.E. Federal Trade Commission – Have identity crime victims file a report with the Federal Trade Commission (Appendix B).

Encourage them to use the FTC website (www.consumer.gov/idtheft

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 80: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

E.E. Federal Trade Commission – Cont’d:Cont’d: At the website, victims can file an online complaint and obtain helpful information such as a victim’s guide (”When Bad Things Happen to Your Good Name”) and the FTC Sample Affidavit. The FTC also has a hotline: 1-877-IDTHEFT (1-877-438-4338).

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 81: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

F. F. Texas Department of Public Safety - This agency is responsible for the issuance of state driver’s licenses and identification cards. It is also responsible for the storage and expunction of criminal records. Contact the Texas Department of Public Safety at 512-424-2000512-424-2000 and online (www.txdps.state.tx.us/contact.htm).(www.txdps.state.tx.us/contact.htm).

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 82: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Other state and local agencies may provide additional assistance with investigating identity crimes.

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 83: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

G. Consumer Credit Reporting Agencies – Tell victims to have a “____________________ ____________________” placed on their credit reports. The fraud alert will show up on their credit report when companies make inquiries about their credit and may stop additional stop additional fraudfraud. The three major credit-reporting agencies are:

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 84: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

G. Consumer Credit Reporting Agencies – Cont’d:

EXPERIAN 1-888-397-3742

www.experian.com

TRANS UNION 1-800-680-7289

www.transunion.com

EQUIFAX 1-800-525-6285

www.equifax.com

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 85: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

H.H. Financial Institutions (e.g., banks, credit card companies, financial advisors) – Advise the victims to contact their financial institutions to report any ____________________________ of identity crime.

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 86: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

H.H. – Cont’d:

The financial institution can check to see if there has been any unusual activity. Victims should establish ____________________________ for their accounts.

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 87: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

I.I. __________________________ Companies (e.g., power, water, phone, and cable companies, etc.) – Victims may want to contact their utility companies to report instances of possible identity crime.

The utility companies can check for any unusual account activityunusual account activity.

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 88: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

8888

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 4.0:Define 4.0: Explain how to request information needed for an ID Crime Offense Report

Page 89: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

8989

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 4.1:Define 4.1: Explain (list) information needed for a Crime Offense Report.

Page 90: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

9090

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 4.2:Define 4.2: Explain what government and business entities that are required to be notified in Identity Crimes.

Page 91: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

UNIT FIVEUNIT FIVE

Page 92: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Learning ObjectivesLearning Objectives

Learning Objective 5.0Learning Objective 5.0: The Participant will be able to recognize techniques for educating victims and the public on identity crime.

Learning Objective 5.1Learning Objective 5.1: The Participant will be able to identify techniques for educating victims and the public on identity crime.

Page 93: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Learning Objective 5.2Learning Objective 5.2: The Participant will be able to list guidelines for personal protection against identity crime.

Learning Objective 5.3 Learning Objective 5.3 : The Participant will be able to list the steps to take if identity crime occurs.

Learning ObjectivesLearning Objectives

Page 94: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

5.0 Identity Crimes 5.0 Identity Crimes PreventionPrevention

Techniques for Techniques for

educating educating victims and the victims and the

public on public on identity crime.identity crime.

Page 95: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

5.1 Techniques for 5.1 Techniques for educating victims and the educating victims and the public on identity crime. public on identity crime.

Law enforcement agencies should be ____________________________ in their approach to educating the public about identity crime. Current techniques used to educate the public about other crimes can be used to facilitate information on identity crime.

Page 96: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Some of these techniques may include public service announcements (PSAs), ____________________ __________________________ involvement, etc. Law enforcement agencies can make use of the vast amount of information already available on the Internet to guide the public and victims of identity crime.

5.1 Techniques for educating victims 5.1 Techniques for educating victims and the public on identity crime. and the public on identity crime.

Page 97: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

5.2 Guidelines for Personal 5.2 Guidelines for Personal Protection against identify Protection against identify

crime crime

Emphasize the fact that the more a person becomes ______________________ about his/her financial records the better prepared he/she will be if they become a victim of identity crime.

Page 98: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Inform the public that they should:

1. Not give out personal __________________ over the phone or on the Internet - this includes their social security number, driver’s license number, date of birth, place of birth, home address, mother’s maiden name, and any passwords.

5.2 Guidelines for Personal Protection 5.2 Guidelines for Personal Protection against identify crime – Cont’d against identify crime – Cont’d

Page 99: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Inform the public that they should:

2.Limit the amount of personal information on their ____________________ - it is recommended that you do not put do not put your driver’s license, identification your driver’s license, identification card or social security number on card or social security number on your checksyour checks

5.2 Guidelines for Personal Protection 5.2 Guidelines for Personal Protection against identify crime – Cont’d against identify crime – Cont’d

Page 100: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Inform the public that they should:

3.Check ____________________ histories and bank records frequently and look for signs of inaccurate or suspicious activity

4.Keep detailed records of ______________________, check writing, credit card use, and ATM use

5.2 Guidelines for Personal Protection 5.2 Guidelines for Personal Protection against identify crime – Cont’d against identify crime – Cont’d

Page 101: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Inform the public that they should:

5.Destroy __________________ __________________ of credit card receipts

6.Purchase a home ___________ or completely destroy any item that may have personal identifiers rather than discarding them in the trash

5.2 Guidelines for Personal Protection 5.2 Guidelines for Personal Protection against identify crime – Cont’d against identify crime – Cont’d

Page 102: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Note: Note: Some insurance companies offer optional coverage to their policyholders to assist them with certain expenses incurred if they become victims of identity crime.

5.2 Guidelines for Personal Protection 5.2 Guidelines for Personal Protection against identify crime – Cont’d against identify crime – Cont’d

Page 103: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

5.3 Steps to take if Identity 5.3 Steps to take if Identity Crime occursCrime occurs

Refer to participant handout “ID Theft Affidavit” (Appendix B). The forms provide victims with detailed instructions on completion and submission of the affidavit.

The affidavit should be sent to the companies or businesses where the ____________________was perpetrated.

Page 104: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

5.3 5-STEPS 5.3 5-STEPS

1. Notify the police – Make a reportreport. Get the names of the officers you contact and the police report number for your records.

Be specificspecific as to which kind of identity crime happened, such as bad checks, credit card abuse, or the misuse of your name, driver’s license, or identification card.

Page 105: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

2. Notify ____________________ and merchants – Cancel credit cards and Cancel credit cards and close your accountsclose your accounts. Contact the creditors and merchants that are affected.

Get the names of any employees employees you have contact withyou have contact with, and ask for a reference number on each item that you are disputing

5.3 5-STEPS - Cont’d 5.3 5-STEPS - Cont’d

Page 106: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

3. Notify your banks and financial institutions – Change affected Change affected bank accountsbank accounts. Advise the banks of the situation and find out what is required to clear anything that affects your banking services. This could relate to checks, ATM cards, debit cards, etc.

5.3 5-STEPS - Cont’d 5.3 5-STEPS - Cont’d

Page 107: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

4. Check your credit – Notify the major __________________ reporting agencies as well as local credit reporting companies, and advise them of your situation. You may be able to request that a ______________ be put on any attempt to gain credit under your name and your date of birth without your confirmation.

5.3 5-STEPS - Cont’d 5.3 5-STEPS - Cont’d

Page 108: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

5. Check with the Social Security Administration – Make sure that earned income benefits earned income benefits are accurate.

5.3 5-STEPS - Cont’d 5.3 5-STEPS - Cont’d

Check to see if there is any Check to see if there is any action on your social security action on your social security number that should not be number that should not be therethere.

Page 109: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

5. Cont’d: Get as much information as you can, and follow through with what is requested of you.

5.3 5-STEPS - Cont’d 5.3 5-STEPS - Cont’d

Page 110: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

110110

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 5.1:Define 5.1: Explain techniques for educating victims and public on identity crime.

Page 111: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

111111

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 5.2:Define 5.2: Explain some guidelines for personal protection against identity crime.

Page 112: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

112112

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 5.3:Define 5.3: Explain the steps to take if identity crime occurs.

Page 113: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

SOURCESSOURCES

All Course Sources and/or

Resources are listed in

your Participant Handout

IDENTITY CRIMES TCOLE Course # 3277TCOLE Course # 3277

Page 114: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

““Knowledge isKnowledge is““POWERPOWER” Stay ” Stay informed, stay informed, stay

SAFE, stay SAFE, stay Vigilant & stay Vigilant & stay

Alive” Alive”

Page 115: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

UPCOMING TRAININGUPCOMING TRAININGCurrent TRAINING Schedule of Courses offered by

Bexar County Constable’s Office Bexar County Constable’s Office PCT#4PCT#4

Racial Profiling Course – TCOLE Course #3256 (8-hrs) 8-hrs on Saturday October 4th, 2014 from 10:30 am to 7:30 pm.

Racial Profiling Course – TCOLE Course #3256 (8-hrs) on Friday October 10, 2014 from 8:00 am to 5:00 pm 115

Bexar County Constable’s Office PCT#4 Bexar County Constable’s Office PCT#4TRAINING SCHEDULE TRAINING SCHEDULE

2014 2014

Page 116: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

Current TRAINING Schedule of Courses offered by Bexar County Constable’s Office PCT#4Eye Witness Evidence Course – TCOLE Course # 3286 (4-hrs) Saturday October 11, 2014 from 10:30 am to 2:30 pm

Eye Witness Evidence Course – TCOLE Course # 3286 (4-hrs) Sunday October 12th, 2014 from 11:00 am to 3:00 pm.

Eye Witness Evidence Course – TCOLE Course # 3286 (4-hrs) Friday October 17th, 2014 from 1:00 pm to 5:00 pm.

Page 117: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

117

Advanced TCOLE Instructor Course – TCOLE #1017 (40hrs), Day One Saturday November 1st ,2014 from 11:00 am to 6:00 pm (Deputy Chief George D. Little and Deputy Constable Roland Berg)

Advanced TCOLE Instructor Course – TCOLE #1017, Day Day TwoTwo Sunday November 2nd ,2014 from 11:00 am to 6:00 pm (Deputy Chief George D. Little and Deputy Constable Roland Berg)

Advanced TCOLE Instructor Course – TCOLE #1017, Day Day ThreeThree Friday November 7th ,2014 from 9:00 am to 6:00 pm (Deputy Chief George D. Little and Deputy Constable Roland Berg ) Lesson Presentation preparation time. Instructors available

Advanced TCOLE Instructor Course – TCOLE #1017, Day Day FourFour Saturday November 8th,2014 from 11:00 am to 6:00 pm (Deputy Chief George D. Little and Deputy Constable Roland Berg)

Page 118: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

118

Advanced TCOLE Instructor Course – TCOLE #1017, Day Day FiveFive & Grad Sunday November 9th, 2014 from 11:00 am to 6:00 pm – Presentations, Final Test & Graduation (Deputy Chief G. D. Little and Dep. Constable R. Berg )

HIV-AIDS & Viral Hepatitis in Criminal Justice Profession Course – TCOLE # 3804 (8-hrs) 8-hrs on Saturday November 15th, 2014 from 10:00 am to 6:00 pm.

HIV-AIDS & Viral Hepatitis in Criminal Justice Profession Course – TCOLE # 3804 (8-hrs) 4-hrs on Thursday December 4th, 2014 from 1:00 am to 5:00 pm

HIV-AIDS & Viral Hepatitis in Criminal Justice Profession Course – TCOLE # 3804 (8-hrs) 4-hrs on Friday December5th, 2014 from 1:00 am to 5:00 pm

KNOWLEDGE IS POWERKNOWLEDGE IS POWER

Page 119: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

• Please complete a course and instructor evaluation form.

• If you rate 2 or below you must justify on reverse side.

•Constructive Criticism Constructive Criticism helps all, being negative helps no one.

COURSE & INSTRUCTOR COURSE & INSTRUCTOR EVALUATION FormEVALUATION Form