Download - Identity Theft Investigator Training
![Page 1: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/1.jpg)
Identity Theft Awareness & Investigation
![Page 2: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/2.jpg)
This presentation was provided to you by:
Jason Scribner InvestigatorTraining.com
![Page 3: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/3.jpg)
Overview
Statistics Definition Prevention Street Patrol Methods & Examples Investigations
![Page 4: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/4.jpg)
Identity Theft Victims
Spend 175 hours fixing their identity. They spend $800 in expenses. ~FTC 53 Billion Loss Last Year 1 in 5 Americans are Victims. There are 14,000 Fraudulent Telemarketing
Calls a Day. Over 400,000 dead people opened bank
accounts in 2008 - AARP
![Page 5: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/5.jpg)
What is identity theft?
Wrongfully obtaining and using another person’s personal data in some way that involves fraud or deception, typically for economic gain.
![Page 6: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/6.jpg)
Identity Crimes
Identity Theft Fraudulent Documents Credit Card Fraud Check Fraud
![Page 7: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/7.jpg)
Associated Crimes
Mail Theft Mail Fraud Robbery Murder Narcotics Burglary Auto Theft Larceny Money Laundering Terrorism
![Page 8: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/8.jpg)
How does identity theft occur?
Personal information is obtained.
Name Address Social Security Number Credit Card Number Checks
![Page 9: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/9.jpg)
We are all potential victims of identity theft.
![Page 10: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/10.jpg)
Identity Thieves Target
Elderly Armed Forces People with Money Children
![Page 11: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/11.jpg)
Identity Theft Victims
Oprah Ross Perrot Tiger Woods Martha Stewart Steven Speilberg
YOU!
![Page 12: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/12.jpg)
Prevention Tips
Shred credit card offers. Don’t put drivers license
number or social security number on checks.
Shred Fraud Alerts Insurance Check all 3 credit union
credit reports.
![Page 13: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/13.jpg)
Prevention Tips
Don’t use your mothers maiden name, use a real password.
It is safer to use your credit card not your check card, the later is taken out sooner. Credit cards can be disputed later
Use your cell phone number. Victims Packet
![Page 14: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/14.jpg)
Victims Packet
Packet On Line Resources Report collection agencies to the FTC
and/or
to the States Department of Licensing Division
![Page 15: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/15.jpg)
Changing your identity does not require plastic surgery.
![Page 16: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/16.jpg)
Who are identity thieves?
Friends Relatives Co-workers Strangers
![Page 17: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/17.jpg)
It’s not like it impacts our national security, or does it? Muhammad Atta was a
terrorist who helped hijack American Airlines Flight 11, then flew it into the north tower of the World Trade Center on September 11 in the first of four deadly attacks against America.
![Page 18: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/18.jpg)
Prior to the attacks Atta was seen in a bar in Hollywood, Florida, with Mawan Al-Shehri, who had come from Hamburg with him. The men were drinking and boasting about being pilots for American Airlines. They were using fraudulent identities and stolen credit cards. ~CNN.com Sept. 26,2001
![Page 19: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/19.jpg)
The worst act of terrorism against our nation was a result of identity theft and fraud. Our lives changed forever.
![Page 20: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/20.jpg)
Street Patrol
![Page 21: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/21.jpg)
Arrests made by street cops.
Timothy McVeigh Eric Rudolf David Berkowitz
![Page 22: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/22.jpg)
Street Patrol Tactics Identity (Laundry) Lists Shoulder Surfing Over Hearers Dumpster Divers Skimmers Car Boosters Mail Thieves Department of Motor Vehicles Banks Analyze Crime Statistics Problem Oriented Policing ATM’s Level 3 Sex Offenders Be a Hunter
![Page 23: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/23.jpg)
Document Examination
Look over, ask them, trick and verify. DOB? How old are you? Zodiac Sign? Have you had an ID in another state? What year did you graduate high school? Did you get this issued to you at the DMV next to
Sears in Burnsville? Where did you stop before you came here?
![Page 24: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/24.jpg)
Document Examination
Get other documents.
Credit Cards Library Card Receipts
![Page 25: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/25.jpg)
Rule of Thumb:
Where the victim lives is where the report gets taken
![Page 26: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/26.jpg)
How Loss Prevention can help.
Burn Video for Detectives Make still photo’s of video Complete a thorough investigation and write
a good report to include: Events in chronological order. Clerk’s name and schedule. Copy of checks and journal roll. Info and pictures of merchandise taken for
potential Search Warrant. Witness information
![Page 27: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/27.jpg)
Methods and Examples
![Page 28: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/28.jpg)
Check Washing
“Check washing” is a process when ink is chemically removed from a stolen check. The check is then re-written to a different merchant or company for a higher amount and cashed.
* Don’t use a ball point pen.
![Page 29: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/29.jpg)
Security Feature on Back of Check
The bank teller/ merchant should examine the signature line to determine if it appears solid. Indicating possible fraud. Look for the MP indicates.
![Page 30: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/30.jpg)
Touch prints can be used but there can be problems.
Check 21
Super Glue
Identifiers become distorted due to weave of paper.
![Page 31: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/31.jpg)
Flagging
Postal Boxes Reach Through at Post
Office
![Page 32: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/32.jpg)
Checks
Suspects can get:
Your account number and the address to your account.
![Page 33: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/33.jpg)
Check Fraud“Catch Me If You Can”
Forgery Counterfeiting Alterations (Acetone,
Break Fluid) Paper Hanging (Closed
Accounts) Check Kiting (open
accounts@ different banks-delay)
![Page 34: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/34.jpg)
Checks
Don’t use your home phone #. Do use your cell phone #.
Don’t use your drivers license #.
Don’t use your social security #.
![Page 35: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/35.jpg)
Checksoft Software
![Page 36: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/36.jpg)
Cell Phone Frauds
Cloning SIM Chips
![Page 37: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/37.jpg)
Skimmer Attached to ATM
![Page 38: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/38.jpg)
Camera Pointed Toward ATM
![Page 39: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/39.jpg)
ATM Scam “Sleve”(Lebanese Loop) At first glance it would apear as though this
individual is simply performing a simple ATM transaction.
What he is in fact doing is rigging the machine so as to capture the card of the next person who uses the ATM.
![Page 40: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/40.jpg)
The Pickup
Satisfied that the coast is clear the fraudster returns to retrieve the card that has been captured by his trap. He not only has the customers card he also has the P.I.N.
![Page 41: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/41.jpg)
Skimmers
![Page 42: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/42.jpg)
Telephone Scams
Prize Offers Travel Packages Investments Charities You Owe Money Your Relative is in Jail
![Page 43: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/43.jpg)
Identity Theft Devices
Skimmer (Download Software) Embosser (Puts #’s on Card) Three Track Reader (Reads CC#) Tipper (Puts Color on Card) Encoder (Puts Input on Mag Stripe) Laminator
![Page 44: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/44.jpg)
Garbage Pull
Schools Banks Hospitals Government Mortgage Companies
![Page 45: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/45.jpg)
Sign Up Roster Scam
Sign Up Ask for Social Security
Number
![Page 46: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/46.jpg)
Business Opportunity Scams
Items sold on e-bay. Opportunist collects checks and sends via Western Union to London.
Make $$$ Stuffing Envelopes Scam
![Page 47: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/47.jpg)
Change of Address Scam
![Page 48: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/48.jpg)
Fake Identification
![Page 49: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/49.jpg)
Job Interview Scam
![Page 50: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/50.jpg)
Fraudulently Obtained Identification
![Page 51: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/51.jpg)
Computer Programs
Sequencing Credit Card Numbers Credit Master Credit Wizard Credit Probe
• Key Loggers
![Page 52: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/52.jpg)
War Driving + +
![Page 53: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/53.jpg)
Phishing
Never reply to these e-mails. Never click on any of the links. Always look for https:// which verifes that the
website is ‘secure.’ Look for a padlock icon. Use a personal firewall on your computer.
![Page 54: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/54.jpg)
Phishing
![Page 55: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/55.jpg)
Credit Repair Scams
![Page 56: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/56.jpg)
419/ Letter/ E-mail
![Page 57: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/57.jpg)
Identity Theft Help Scam
![Page 58: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/58.jpg)
9/11 Connection
Obits are commonly used.
Victims websites are used.
![Page 59: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/59.jpg)
Investigations
![Page 60: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/60.jpg)
Investigations
ID The Imposter Witness Images Facial Reconition Line Ups Composites Forensics Linkage Address Leads (Ordered or Delivered To)
![Page 61: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/61.jpg)
Investigations
Links to the Imposter FACES 360 Report Product DNA Finger Prints Airline Baggage Stubs Hotel Keys
![Page 62: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/62.jpg)
Investigations
USPS does deal with the credit card companies. They have a list of credit cards that are stolen prior to working.
Network with USPS, UPS, and Fed Ex.
![Page 63: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/63.jpg)
Luring the Imposter
Phone call or page to elicit callback. Fear of getting caught Blackmail Greed
Sweepstakes from purchase. Can’t pass up an easy scam. Credit card offer in the victims name. An offer via e-mail.
![Page 64: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/64.jpg)
Phone Investigations
Trap & Trace
Phone Dump
Functions (*57)
Triangulations
![Page 65: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/65.jpg)
Snagging the Phishers
Electronic Trail
Subpona IP address logs Trap & trace e-mail accounts Court order for opened e-mail messages
![Page 66: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/66.jpg)
Money Trail
Find orders in opened e-mail messages. Check for complaints. Interview victims about unauthorized charges. Ask merchants about patterns and pending
orders. Monitor controlled delivery.
![Page 67: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/67.jpg)
Electronic Trail: Dial Up
Subpeona #1 to E-Mail Provider
= IP Address Subpeona #2 to Dial Up ISP
= Subscriber Information Subpeona #3 to Phone Company
= Phone Records
![Page 68: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/68.jpg)
Locate E-Mails & Websites
WHOIS.com E-mail Header
![Page 69: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/69.jpg)
Locate & Use Computer Evidence
Subpeonas Seizing Computers
Use a computer forensics person. Is perp working on something. (Minimized,
Photograph) Copy the hard drive (if technician) Pull the plug on the back of the computer.
![Page 70: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/70.jpg)
Exceptional Circumstances Destruction of Evidence
A keystroke takes less than a second Type of People
Russian Organized Crime Terrorists
![Page 71: Identity Theft Investigator Training](https://reader033.vdocuments.site/reader033/viewer/2022060116/5583f4d6d8b42aa82c8b45e7/html5/thumbnails/71.jpg)
When evil minded people plot
Good minded people must prepare
~Dr. Martin Luther King