Identity TheftIdentity TheftPresented by:Presented by:InvestigatorInvestigatorScott TolstadScott TolstadEscondido Police D...
Identity Theft Who is targeted? How do they get your information? What happens after they get it? How can I protect my...
Identity Theft/Penal Code PC 530.5(a)-Every person who willfully obtainspersonal identifying information, as defined insu...
What Is Personal IdentifyingInformation? Social Security Numbers Driver’s license numbers Address, phone numbers, date ...
Identity Theft: The Classic View Identity theft occurs when an imposter gainsaccess to personal identifying informationan...
Identity Theft: The Big Picture Identity theft also occurs when an impostergains access to personal identifyinginformatio...
Identity Theft
How Thieves Obtain Information Lost/Stolen wallets Mail theft Dumpsters Shoulder surfing Telephone solicitations “Ph...
Skimming Primarily aimed at your debit card Gasoline retailers Restaurants General retailers Now Taken over by organi...
Hand Held Skimmer
Electronic Pickpocketing
Prevention/Tips Deposit outgoing mail at a Post Office or ablue USPS collection box, or give it directlyto your letter ca...
Prevention/Tips Report lost/stolen cards to issuer ASAP. DON’T carry your SSN card. Destroy credit card receipts ( some...
PC 530.8/Victim Rights In a nutshell, you are entitled to a copy of theapplication the suspect used. If the companyrefuse...
Penal Code/Who takes your case? PC 530.6(a)- A person who has learned or reasonablysuspects that his or her personal iden...
Fraud Alert/Credit Freezes Experian-888 397-3742, www.experian.com Transunion-800 680-7289,www.transunion.com Equifax-8...
Work At Home Scam International company is looking for part timeat home employers within the whole territoryof the United...
Nigerian ScamsMystery ShopperOverpayment ScamRomance ScamLottery Scam
Check Fraud Fictitious check– no such account exists -wrong routing number, wrong bank, accountholder doesn’t exist Frau...
Mortgage Scams FICO score sites Loan modification Foreclosure prevention Foreclosure prevention products Brokers
ATM Skimming Devices
ATM Card Skimmer
ATM Skimmer
Card Skimmer
Card Skimmer
Card Skimmer
Pinhole Camera
Camera in FasciaWhat do PIN capturing deviceslook like?How about now ?Removal of fitted device from fascia- the additional...
Camera in Fascia
Pinhole Camera
Pinhole Camera
Keypad
Keypad
Upcoming SlideShare
Loading in …5
×

Identity Theft: Protecting Our Seniors

1,377 views
1,241 views

Published on

Scott Tolstad of the Escondido Police Department explains different ways senior citizens are scammed out of their money, particularly by thieves who steal identities. It's a valuable lesson for all of us, regardless of age, to know. Scott spoke during the June 7, 2013 Glenner Symposium on Elder Abuse.

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,377
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Identity Theft: Protecting Our Seniors

  1. 1. Identity TheftIdentity TheftPresented by:Presented by:InvestigatorInvestigatorScott TolstadScott TolstadEscondido Police Dept.Escondido Police Dept.Financial Crimes/Fraud UnitFinancial Crimes/Fraud Unit(760) 839-4971(760) 839-4971stolstad@escondido.orstolstad@escondido.orgg
  2. 2. Identity Theft Who is targeted? How do they get your information? What happens after they get it? How can I protect myself?
  3. 3. Identity Theft/Penal Code PC 530.5(a)-Every person who willfully obtainspersonal identifying information, as defined insubdivision (b) of Section 530.55, of another person,and uses that information for any unlawfulpurpose, including to obtain, or attempt to obtain,credit, goods, services, real property, or medicalinformation without the consent of that person, isguilty of a public offense, and upon convictiontherefor, shall be punished by a fine, byimprisonment in a county jail not to exceed one year,or by both a fine and imprisonment, or byimprisonment in the state prison.
  4. 4. What Is Personal IdentifyingInformation? Social Security Numbers Driver’s license numbers Address, phone numbers, date of birth Birth Certificate information Mother’s maiden name, other family information Financial account numbers Biometric information Medical information
  5. 5. Identity Theft: The Classic View Identity theft occurs when an imposter gainsaccess to personal identifying informationand uses it for financial gain– New lines of credit, loans, and mortgages– New accounts, checking/debit fraud– Tenancy and utilities– Medical billing and identity
  6. 6. Identity Theft: The Big Picture Identity theft also occurs when an impostergains access to personal identifyinginformation and uses it for:– Jobs, employment, contracts– Government accounting issues– Government support services– Avoidance of arrest and criminal records– Medical services
  7. 7. Identity Theft
  8. 8. How Thieves Obtain Information Lost/Stolen wallets Mail theft Dumpsters Shoulder surfing Telephone solicitations “Phishing” and scams Lack of computer security / Internet Areas beyond control Data breach
  9. 9. Skimming Primarily aimed at your debit card Gasoline retailers Restaurants General retailers Now Taken over by organized crime Loaded onto gift/Green Dot Card Electronic pickpocketing
  10. 10. Hand Held Skimmer
  11. 11. Electronic Pickpocketing
  12. 12. Prevention/Tips Deposit outgoing mail at a Post Office or ablue USPS collection box, or give it directlyto your letter carrier. Shred unwanted documents that containpersonal information. Review your credit report quarterly. NEVER give personal information over thephone or the internet unless you initiated thecontact. Phone spoofing.
  13. 13. Prevention/Tips Report lost/stolen cards to issuer ASAP. DON’T carry your SSN card. Destroy credit card receipts ( some will haveyour entire credit card number on it). Keep track of monthly financial statements. Contact the company if you don’t receiveyour monthly statement.
  14. 14. PC 530.8/Victim Rights In a nutshell, you are entitled to a copy of theapplication the suspect used. If the companyrefuses to turn over information, they can becivilly fined up to $100 a day fornoncompliance.
  15. 15. Penal Code/Who takes your case? PC 530.6(a)- A person who has learned or reasonablysuspects that his or her personal identifying informationhas been unlawfully used by another, as described insubdivision (a) of Section 530.5, may initiate a lawenforcement investigation by contacting the local lawenforcement agency that has jurisdiction over his orher actual residence or place of business, which shalltake a police report of the matter, provide the complainantwith a copy of that report, and begin an investigation ofthe facts. If the suspected crime was committed in adifferent jurisdiction, the local law enforcement agencymay refer the matter to the law enforcement agencywhere the suspected crime was committed.
  16. 16. Fraud Alert/Credit Freezes Experian-888 397-3742, www.experian.com Transunion-800 680-7289,www.transunion.com Equifax-800 525-6285, www.equifax.com Numbers to use to place fraud alert-2,2,3,2,1, hold, 2, enter info, 2 for phonenumber or 1 not to enter phone number,obtain confirmation number.
  17. 17. Work At Home Scam International company is looking for part timeat home employers within the whole territoryof the United States, Canada, Australia andUnited Kingdom. You can get over 3000USD monthly which highly depends on yourresults. We are looking people at the age of 18 to 85for rather easy operations on processing ofthe incoming tasks and performance ofsimple management assignments. You dont
  18. 18. Nigerian ScamsMystery ShopperOverpayment ScamRomance ScamLottery Scam
  19. 19. Check Fraud Fictitious check– no such account exists -wrong routing number, wrong bank, accountholder doesn’t exist Fraudulent Check – real account - accountnumber, account holder exists Reproduced check Stolen check – Actual check just stolen andusually washed
  20. 20. Mortgage Scams FICO score sites Loan modification Foreclosure prevention Foreclosure prevention products Brokers
  21. 21. ATM Skimming Devices
  22. 22. ATM Card Skimmer
  23. 23. ATM Skimmer
  24. 24. Card Skimmer
  25. 25. Card Skimmer
  26. 26. Card Skimmer
  27. 27. Pinhole Camera
  28. 28. Camera in FasciaWhat do PIN capturing deviceslook like?How about now ?Removal of fitted device from fascia- the additional part can now beclearly seen.
  29. 29. Camera in Fascia
  30. 30. Pinhole Camera
  31. 31. Pinhole Camera
  32. 32. Keypad
  33. 33. Keypad

×