• Save
Understanding victims of identity theft
Upcoming SlideShare
Loading in...5
×
 

Understanding victims of identity theft

on

  • 964 views

Dutch Identity theft support office. Findings based on more than two years\' experience of helping victims of identity theft. Engish language.

Dutch Identity theft support office. Findings based on more than two years\' experience of helping victims of identity theft. Engish language.

Statistics

Views

Total Views
964
Views on SlideShare
961
Embed Views
3

Actions

Likes
0
Downloads
0
Comments
0

1 Embed 3

http://www.linkedin.com 3

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

CC Attribution-NonCommercial-ShareAlike LicenseCC Attribution-NonCommercial-ShareAlike LicenseCC Attribution-NonCommercial-ShareAlike License

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Understanding victims of identity theft Presentation Transcript

  • 1. Identity theft Victims Support Office in the Netherlands In Dutch: Centraal Meld- en informatiepunt Identiteitsfraude en –fouten (CMI) Help! I’m a victim of identity theft! Michel Savelkoul Understanding victims of identity theft Sure. That’s what they all say.
  • 2. The crime and its enabler: identity theft & identity fraud Villain Victim of crime Crime: fraud, forgery, drugs farming, etc etc (to be found in penal law) Victim of IDtheft Identity fraud . ( committing fraud with other’s identifiction ) Identity theft . ( stealing/creating identifying data )
  • 3. So what is the victim’s problem?
    • The victim of identity theft/fraud:
    • is usually not involved in the crime
    • nor has the victim any knowledge
    • until he/she gets the blame
    • and is confronted with the consequences of the crime
  • 4. Identity theft victims are facing:
    • 1. Urgent problem
    • Collection agency at your door, getting arrested, summons, etc
    • Victim support: providing necessary steps, guidance.
    2. Unknown problem Unknown cause and/or perpetrator + will he/she strike again and how? Victim support: engaging the ECID, centre of expertise of Police and Military Police. Victim reports to police. Start of research. 3. Unknown consequences Accumulating errors in databases and supply chains Victim support: engaging supply chains to restore errors and prevent further problems for victim. (By far the most challenging aspect in victim support!) 4. Prevention How to protect from 1) further identity theft, and 2) further problems from the current theft? Victim support: providing necessary steps
  • 5. RDW (driving license & car registration) Prosecution Ministry Security & Justice Local Government’s association of Citizen Registration Ministry Interior (passports) … and any other useful agency not included in covenant. The identity theft support office Immigration office Justice MatchingAuthority Case Manager Central Government Contact point Military police Police Centre of Expertise
  • 6. Coverage of the ID theft support office
    • We get: 101 crime
    • One on one fraud. Part of large and organized crime or accidental/individual crime (opportunity in the wrong hands).
    • Victims are confronted with consequences.
    • We don’t get: distant cases of organized crime
    • Distant and massive fraud. (Organized illegal collection of data, forgering documents, laundrying money, international trafficing drugs or people, mass creditcard fraud, etc.)
    • Crime victims propably are not aware of .
    We know : modus operandi, vulnerable sectors, consequences We don’t know : size. IDfraud is not labeled as such. IDtheft sometimes is labeled (creditcards, number plates, documents).
  • 7. Challenges for public policy (1) Causes: bad awareness, even worse control Awareness: Research shows that people are ignorant about IDtheft. Simple prevention is not applied. Control: Vulnerable private sector industries have no incentives to prevent fraud with identifying data of docs. Is this a government matter? Is THIS a government matter? (Proving market failure etc)
  • 8. Challenges for public policy (2) Standard Procedures Consequences: too little correction mechanisms in organizations and supply chains “ We did nothing wrong. We followed the procedure!” “ We have no fraud problem. We have no record of fraud. We don’t register fraud.” “ The law does not allow us to correct errors. Yes, that’s inconvenient.” “ In this supply chain something clearly went wrong. But it wasn’t us.” Supply chains are designed exclusively for standardized mass cases. Individual errors often get the ‘Teflon treatment’.
  • 9. So…
    • People are ignorant.
    • Parts of the private sector openly accept copies, fake data, etc. or require no identifying data at all.
    • Government ID management policy is focusing on the public sector.
    • Impact on victims is high. Still, they remain unheard.
    • Consequences for victims are often unclear, both for the victim and the organizations involved.
    The victim support office helps solving individual cases. The growing number of cases feeds future policy measurements. So… To be continued.