SlideShare a Scribd company logo
Identity TheftIdentity Theft
Presented by:Presented by:
InvestigatorInvestigator
Scott TolstadScott Tolstad
Escondido Police Dept.Escondido Police Dept.
Financial Crimes/Fraud UnitFinancial Crimes/Fraud Unit
(760) 839-4971(760) 839-4971
stolstad@escondido.orstolstad@escondido.or
gg
Identity Theft
 Who is targeted?
 How do they get your information?
 What happens after they get it?
 How can I protect myself?
Identity Theft/Penal Code
 PC 530.5(a)-Every person who willfully obtains
personal identifying information, as defined in
subdivision (b) of Section 530.55, of another person,
and uses that information for any unlawful
purpose, including to obtain, or attempt to obtain,
credit, goods, services, real property, or medical
information without the consent of that person, is
guilty of a public offense, and upon conviction
therefor, shall be punished by a fine, by
imprisonment in a county jail not to exceed one year,
or by both a fine and imprisonment, or by
imprisonment in the state prison.
What Is Personal Identifying
Information?
 Social Security Numbers
 Driver’s license numbers
 Address, phone numbers, date of birth
 Birth Certificate information
 Mother’s maiden name, other family information
 Financial account numbers
 Biometric information
 Medical information
Identity Theft: The Classic View
 Identity theft occurs when an imposter gains
access to personal identifying information
and uses it for financial gain
– New lines of credit, loans, and mortgages
– New accounts, checking/debit fraud
– Tenancy and utilities
– Medical billing and identity
Identity Theft: The Big Picture
 Identity theft also occurs when an imposter
gains access to personal identifying
information and uses it for:
– Jobs, employment, contracts
– Government accounting issues
– Government support services
– Avoidance of arrest and criminal records
– Medical services
Identity Theft
How Thieves Obtain Information
 Lost/Stolen wallets
 Mail theft
 Dumpsters
 Shoulder surfing
 Telephone solicitations
 “Phishing” and scams
 Lack of computer security / Internet
 Areas beyond control
 Data breach
Skimming
 Primarily aimed at your debit card
 Gasoline retailers
 Restaurants
 General retailers
 Now Taken over by organized crime
 Loaded onto gift/Green Dot Card
 Electronic pickpocketing
Hand Held Skimmer
Electronic Pickpocketing
Prevention/Tips
 Deposit outgoing mail at a Post Office or a
blue USPS collection box, or give it directly
to your letter carrier.
 Shred unwanted documents that contain
personal information.
 Review your credit report quarterly.
 NEVER give personal information over the
phone or the internet unless you initiated the
contact. Phone spoofing.
Prevention/Tips
 Report lost/stolen cards to issuer ASAP.
 DON’T carry your SSN card.
 Destroy credit card receipts ( some will have
your entire credit card number on it).
 Keep track of monthly financial statements.
 Contact the company if you don’t receive
your monthly statement.
PC 530.8/Victim Rights
 In a nutshell, you are entitled to a copy of the
application the suspect used. If the company
refuses to turn over information, they can be
civilly fined up to $100 a day for
noncompliance.
Penal Code/Who takes your case?
 PC 530.6(a)- A person who has learned or reasonably
suspects that his or her personal identifying information
has been unlawfully used by another, as described in
subdivision (a) of Section 530.5, may initiate a law
enforcement investigation by contacting the local law
enforcement agency that has jurisdiction over his or
her actual residence or place of business, which shall
take a police report of the matter, provide the complainant
with a copy of that report, and begin an investigation of
the facts. If the suspected crime was committed in a
different jurisdiction, the local law enforcement agency
may refer the matter to the law enforcement agency
where the suspected crime was committed.
Fraud Alert/Credit Freezes
 Experian-888 397-3742, www.experian.com
 Transunion-800 680-7289,
www.transunion.com
 Equifax-800 525-6285, www.equifax.com
 Numbers to use to place fraud alert-
2,2,3,2,1, hold, 2, enter info, 2 for phone
number or 1 not to enter phone number,
obtain confirmation number.
Work At Home Scam
 International company is looking for part time
at home employers within the whole territory
of the United States, Canada, Australia and
United Kingdom. You can get over 3000
USD monthly which highly depends on your
results.
 We are looking people at the age of 18 to 85
for rather easy operations on processing of
the incoming tasks and performance of
simple management assignments. You don't
Nigerian Scams
Mystery Shopper
Overpayment Scam
Romance Scam
Lottery Scam
Check Fraud
 Fictitious check– no such account exists -
wrong routing number, wrong bank, account
holder doesn’t exist
 Fraudulent Check – real account - account
number, account holder exists
 Reproduced check
 Stolen check – Actual check just stolen and
usually washed
Mortgage Scams
 FICO score sites
 Loan modification
 Foreclosure prevention
 Foreclosure prevention products
 Brokers
ATM Skimming Devices
ATM Card Skimmer
ATM Skimmer
Card Skimmer
Card Skimmer
Card Skimmer
Pinhole Camera
Camera in FasciaWhat do PIN capturing devices
look like?
How about now ?
Removal of fitted device from fascia- the additional part can now be
clearly seen.
Camera in Fascia
Pinhole Camera
Pinhole Camera
Keypad
Keypad

More Related Content

What's hot

Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent It
IdentityForce
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
paulgundersen9
 
Training for Child Court Appointed Advocates
Training for Child Court Appointed AdvocatesTraining for Child Court Appointed Advocates
Training for Child Court Appointed Advocates
- Mark - Fullbright
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
Lisa Sosebee
 
City of Salina Police Department-Citizen Complaint Process English
City of Salina Police Department-Citizen Complaint Process EnglishCity of Salina Police Department-Citizen Complaint Process English
City of Salina Police Department-Citizen Complaint Process English
City of Salina
 
Identity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for VictimsIdentity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for Victims
- Mark - Fullbright
 
How to Protect your SIN
How to Protect your SINHow to Protect your SIN
How to Protect your SIN
EmilyMoar
 
Identity theft
Identity theftIdentity theft
Identity theft
Kristina Flores
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
theresa34
 
Fraud Awareness NC
Fraud Awareness NCFraud Awareness NC
Fraud Awareness NC
EmilyMoar
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
milfamln
 
Five Tax Scams to Avoid
Five Tax Scams to AvoidFive Tax Scams to Avoid
Five Tax Scams to Avoid
Reliance Tax Group
 
25 Internet Crimes
25 Internet Crimes25 Internet Crimes
25 Internet Crimes
Daily 10 Minutes
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
Dolf Dunn
 
2021 Chapitre Istanbul Registration Form
2021 Chapitre Istanbul Registration Form2021 Chapitre Istanbul Registration Form
2021 Chapitre Istanbul Registration Form
Chaîne des Rôtisseurs Bailliage National du Vietnam
 
Avoid ID Theft
Avoid ID TheftAvoid ID Theft
Avoid ID Theft
ksiers1
 
Ftc Avoid Id Theft
Ftc Avoid Id TheftFtc Avoid Id Theft
Ftc Avoid Id Theft
Charles Seay
 
Avoiding ID Theft
Avoiding ID TheftAvoiding ID Theft
Avoiding ID Theft
American Debt Counseling Inc
 
SSG-MUSIC Eftps singers sensatin group irs payment
SSG-MUSIC Eftps  singers sensatin group irs paymentSSG-MUSIC Eftps  singers sensatin group irs payment
SSG-MUSIC Eftps singers sensatin group irs payment
SHAUN J FEDERICO
 
Frauds and Seniors
Frauds and SeniorsFrauds and Seniors
Frauds and Seniors
Resiliency for Life
 

What's hot (20)

Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent It
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Training for Child Court Appointed Advocates
Training for Child Court Appointed AdvocatesTraining for Child Court Appointed Advocates
Training for Child Court Appointed Advocates
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
 
City of Salina Police Department-Citizen Complaint Process English
City of Salina Police Department-Citizen Complaint Process EnglishCity of Salina Police Department-Citizen Complaint Process English
City of Salina Police Department-Citizen Complaint Process English
 
Identity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for VictimsIdentity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for Victims
 
How to Protect your SIN
How to Protect your SINHow to Protect your SIN
How to Protect your SIN
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
Fraud Awareness NC
Fraud Awareness NCFraud Awareness NC
Fraud Awareness NC
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Five Tax Scams to Avoid
Five Tax Scams to AvoidFive Tax Scams to Avoid
Five Tax Scams to Avoid
 
25 Internet Crimes
25 Internet Crimes25 Internet Crimes
25 Internet Crimes
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
 
2021 Chapitre Istanbul Registration Form
2021 Chapitre Istanbul Registration Form2021 Chapitre Istanbul Registration Form
2021 Chapitre Istanbul Registration Form
 
Avoid ID Theft
Avoid ID TheftAvoid ID Theft
Avoid ID Theft
 
Ftc Avoid Id Theft
Ftc Avoid Id TheftFtc Avoid Id Theft
Ftc Avoid Id Theft
 
Avoiding ID Theft
Avoiding ID TheftAvoiding ID Theft
Avoiding ID Theft
 
SSG-MUSIC Eftps singers sensatin group irs payment
SSG-MUSIC Eftps  singers sensatin group irs paymentSSG-MUSIC Eftps  singers sensatin group irs payment
SSG-MUSIC Eftps singers sensatin group irs payment
 
Frauds and Seniors
Frauds and SeniorsFrauds and Seniors
Frauds and Seniors
 

Similar to Identity Theft: Protecting Our Seniors

Identity Theft
Identity TheftIdentity Theft
Identity Theft
Lisa Sosebee
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
- Mark - Fullbright
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
Barry Caplin
 
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docx
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docxTorts, Crimes and BusinessChapter 7 & 8Intent vs.docx
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docx
edwardmarivel
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
quentinz52
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
quentinz52
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
Ron Drew
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation
nickski51
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
- Mark - Fullbright
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
- Mark - Fullbright
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
Alan Greggo
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
OremDPS
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
FinancialCenter
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
Randall Chesnutt
 
Identity Theft and Your SSN
Identity Theft and Your SSNIdentity Theft and Your SSN
Identity Theft and Your SSN
Greg Ewers
 
ID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good NameID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good Name
- Mark - Fullbright
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
Harold Stallard
 
ID Theft
ID TheftID Theft
ID Theft
Willhack
 

Similar to Identity Theft: Protecting Our Seniors (20)

Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docx
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docxTorts, Crimes and BusinessChapter 7 & 8Intent vs.docx
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docx
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Theft and Your SSN
Identity Theft and Your SSNIdentity Theft and Your SSN
Identity Theft and Your SSN
 
ID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good NameID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good Name
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
ID Theft
ID TheftID Theft
ID Theft
 

More from GlennerCenters

10 Signs It Might Be Alzheimer's
10 Signs It Might Be Alzheimer's10 Signs It Might Be Alzheimer's
10 Signs It Might Be Alzheimer's
GlennerCenters
 
What is Professional Fiduciary?
What is  Professional Fiduciary?What is  Professional Fiduciary?
What is Professional Fiduciary?
GlennerCenters
 
Mandatory Reporting of Elder Abuse
Mandatory Reporting of Elder AbuseMandatory Reporting of Elder Abuse
Mandatory Reporting of Elder Abuse
GlennerCenters
 
Geriatric Care Managers: How They Protect Vulnerable Seniors
Geriatric Care Managers: How They Protect Vulnerable SeniorsGeriatric Care Managers: How They Protect Vulnerable Seniors
Geriatric Care Managers: How They Protect Vulnerable Seniors
GlennerCenters
 
Elder Abuse: What You Need to Know
Elder Abuse: What You Need to KnowElder Abuse: What You Need to Know
Elder Abuse: What You Need to Know
GlennerCenters
 
Dental Neglect in Older Adults
Dental Neglect in Older AdultsDental Neglect in Older Adults
Dental Neglect in Older Adults
GlennerCenters
 
Demographics of Aging
Demographics of AgingDemographics of Aging
Demographics of Aging
GlennerCenters
 
Grief & loss
Grief & lossGrief & loss
Grief & loss
GlennerCenters
 
UCSD Alzheimer's Disease Presentation
UCSD Alzheimer's Disease PresentationUCSD Alzheimer's Disease Presentation
UCSD Alzheimer's Disease Presentation
GlennerCenters
 
Is It Normal or Is It Dementia?
Is It Normal or Is It Dementia?Is It Normal or Is It Dementia?
Is It Normal or Is It Dementia?
GlennerCenters
 

More from GlennerCenters (10)

10 Signs It Might Be Alzheimer's
10 Signs It Might Be Alzheimer's10 Signs It Might Be Alzheimer's
10 Signs It Might Be Alzheimer's
 
What is Professional Fiduciary?
What is  Professional Fiduciary?What is  Professional Fiduciary?
What is Professional Fiduciary?
 
Mandatory Reporting of Elder Abuse
Mandatory Reporting of Elder AbuseMandatory Reporting of Elder Abuse
Mandatory Reporting of Elder Abuse
 
Geriatric Care Managers: How They Protect Vulnerable Seniors
Geriatric Care Managers: How They Protect Vulnerable SeniorsGeriatric Care Managers: How They Protect Vulnerable Seniors
Geriatric Care Managers: How They Protect Vulnerable Seniors
 
Elder Abuse: What You Need to Know
Elder Abuse: What You Need to KnowElder Abuse: What You Need to Know
Elder Abuse: What You Need to Know
 
Dental Neglect in Older Adults
Dental Neglect in Older AdultsDental Neglect in Older Adults
Dental Neglect in Older Adults
 
Demographics of Aging
Demographics of AgingDemographics of Aging
Demographics of Aging
 
Grief & loss
Grief & lossGrief & loss
Grief & loss
 
UCSD Alzheimer's Disease Presentation
UCSD Alzheimer's Disease PresentationUCSD Alzheimer's Disease Presentation
UCSD Alzheimer's Disease Presentation
 
Is It Normal or Is It Dementia?
Is It Normal or Is It Dementia?Is It Normal or Is It Dementia?
Is It Normal or Is It Dementia?
 

Recently uploaded

Integrating Ayurveda into Parkinson’s Management: A Holistic Approach
Integrating Ayurveda into Parkinson’s Management: A Holistic ApproachIntegrating Ayurveda into Parkinson’s Management: A Holistic Approach
Integrating Ayurveda into Parkinson’s Management: A Holistic Approach
Ayurveda ForAll
 
Top Effective Soaps for Fungal Skin Infections in India
Top Effective Soaps for Fungal Skin Infections in IndiaTop Effective Soaps for Fungal Skin Infections in India
Top Effective Soaps for Fungal Skin Infections in India
SwisschemDerma
 
Muscles of Mastication by Dr. Rabia Inam Gandapore.pptx
Muscles of Mastication by Dr. Rabia Inam Gandapore.pptxMuscles of Mastication by Dr. Rabia Inam Gandapore.pptx
Muscles of Mastication by Dr. Rabia Inam Gandapore.pptx
Dr. Rabia Inam Gandapore
 
Adhd Medication Shortage Uk - trinexpharmacy.com
Adhd Medication Shortage Uk - trinexpharmacy.comAdhd Medication Shortage Uk - trinexpharmacy.com
Adhd Medication Shortage Uk - trinexpharmacy.com
reignlana06
 
Local Advanced Lung Cancer: Artificial Intelligence, Synergetics, Complex Sys...
Local Advanced Lung Cancer: Artificial Intelligence, Synergetics, Complex Sys...Local Advanced Lung Cancer: Artificial Intelligence, Synergetics, Complex Sys...
Local Advanced Lung Cancer: Artificial Intelligence, Synergetics, Complex Sys...
Oleg Kshivets
 
CHEMOTHERAPY_RDP_CHAPTER 4_ANTI VIRAL DRUGS.pdf
CHEMOTHERAPY_RDP_CHAPTER 4_ANTI VIRAL DRUGS.pdfCHEMOTHERAPY_RDP_CHAPTER 4_ANTI VIRAL DRUGS.pdf
CHEMOTHERAPY_RDP_CHAPTER 4_ANTI VIRAL DRUGS.pdf
rishi2789
 
OCT Training Course for clinical practice Part 1
OCT Training Course for clinical practice Part 1OCT Training Course for clinical practice Part 1
OCT Training Course for clinical practice Part 1
KafrELShiekh University
 
Basavarajeeyam - Ayurvedic heritage book of Andhra pradesh
Basavarajeeyam - Ayurvedic heritage book of Andhra pradeshBasavarajeeyam - Ayurvedic heritage book of Andhra pradesh
Basavarajeeyam - Ayurvedic heritage book of Andhra pradesh
Dr. Madduru Muni Haritha
 
The Electrocardiogram - Physiologic Principles
The Electrocardiogram - Physiologic PrinciplesThe Electrocardiogram - Physiologic Principles
The Electrocardiogram - Physiologic Principles
MedicoseAcademics
 
CHEMOTHERAPY_RDP_CHAPTER 3_ANTIFUNGAL AGENT.pdf
CHEMOTHERAPY_RDP_CHAPTER 3_ANTIFUNGAL AGENT.pdfCHEMOTHERAPY_RDP_CHAPTER 3_ANTIFUNGAL AGENT.pdf
CHEMOTHERAPY_RDP_CHAPTER 3_ANTIFUNGAL AGENT.pdf
rishi2789
 
A Classical Text Review on Basavarajeeyam
A Classical Text Review on BasavarajeeyamA Classical Text Review on Basavarajeeyam
A Classical Text Review on Basavarajeeyam
Dr. Jyothirmai Paindla
 
Promoting Wellbeing - Applied Social Psychology - Psychology SuperNotes
Promoting Wellbeing - Applied Social Psychology - Psychology SuperNotesPromoting Wellbeing - Applied Social Psychology - Psychology SuperNotes
Promoting Wellbeing - Applied Social Psychology - Psychology SuperNotes
PsychoTech Services
 
Phone Us ❤8107221448❤ #ℂall #gIRLS In Dehradun By Dehradun @ℂall @Girls Hotel...
Phone Us ❤8107221448❤ #ℂall #gIRLS In Dehradun By Dehradun @ℂall @Girls Hotel...Phone Us ❤8107221448❤ #ℂall #gIRLS In Dehradun By Dehradun @ℂall @Girls Hotel...
Phone Us ❤8107221448❤ #ℂall #gIRLS In Dehradun By Dehradun @ℂall @Girls Hotel...
chandankumarsmartiso
 
TEST BANK For Community Health Nursing A Canadian Perspective, 5th Edition by...
TEST BANK For Community Health Nursing A Canadian Perspective, 5th Edition by...TEST BANK For Community Health Nursing A Canadian Perspective, 5th Edition by...
TEST BANK For Community Health Nursing A Canadian Perspective, 5th Edition by...
Donc Test
 
REGULATION FOR COMBINATION PRODUCTS AND MEDICAL DEVICES.pptx
REGULATION FOR COMBINATION PRODUCTS AND MEDICAL DEVICES.pptxREGULATION FOR COMBINATION PRODUCTS AND MEDICAL DEVICES.pptx
REGULATION FOR COMBINATION PRODUCTS AND MEDICAL DEVICES.pptx
LaniyaNasrink
 
Efficacy of Avartana Sneha in Ayurveda
Efficacy of Avartana Sneha in AyurvedaEfficacy of Avartana Sneha in Ayurveda
Efficacy of Avartana Sneha in Ayurveda
Dr. Jyothirmai Paindla
 
Histololgy of Female Reproductive System.pptx
Histololgy of Female Reproductive System.pptxHistololgy of Female Reproductive System.pptx
Histololgy of Female Reproductive System.pptx
AyeshaZaid1
 
The Best Ayurvedic Antacid Tablets in India
The Best Ayurvedic Antacid Tablets in IndiaThe Best Ayurvedic Antacid Tablets in India
The Best Ayurvedic Antacid Tablets in India
Swastik Ayurveda
 
Does Over-Masturbation Contribute to Chronic Prostatitis.pptx
Does Over-Masturbation Contribute to Chronic Prostatitis.pptxDoes Over-Masturbation Contribute to Chronic Prostatitis.pptx
Does Over-Masturbation Contribute to Chronic Prostatitis.pptx
walterHu5
 
share - Lions, tigers, AI and health misinformation, oh my!.pptx
share - Lions, tigers, AI and health misinformation, oh my!.pptxshare - Lions, tigers, AI and health misinformation, oh my!.pptx
share - Lions, tigers, AI and health misinformation, oh my!.pptx
Tina Purnat
 

Recently uploaded (20)

Integrating Ayurveda into Parkinson’s Management: A Holistic Approach
Integrating Ayurveda into Parkinson’s Management: A Holistic ApproachIntegrating Ayurveda into Parkinson’s Management: A Holistic Approach
Integrating Ayurveda into Parkinson’s Management: A Holistic Approach
 
Top Effective Soaps for Fungal Skin Infections in India
Top Effective Soaps for Fungal Skin Infections in IndiaTop Effective Soaps for Fungal Skin Infections in India
Top Effective Soaps for Fungal Skin Infections in India
 
Muscles of Mastication by Dr. Rabia Inam Gandapore.pptx
Muscles of Mastication by Dr. Rabia Inam Gandapore.pptxMuscles of Mastication by Dr. Rabia Inam Gandapore.pptx
Muscles of Mastication by Dr. Rabia Inam Gandapore.pptx
 
Adhd Medication Shortage Uk - trinexpharmacy.com
Adhd Medication Shortage Uk - trinexpharmacy.comAdhd Medication Shortage Uk - trinexpharmacy.com
Adhd Medication Shortage Uk - trinexpharmacy.com
 
Local Advanced Lung Cancer: Artificial Intelligence, Synergetics, Complex Sys...
Local Advanced Lung Cancer: Artificial Intelligence, Synergetics, Complex Sys...Local Advanced Lung Cancer: Artificial Intelligence, Synergetics, Complex Sys...
Local Advanced Lung Cancer: Artificial Intelligence, Synergetics, Complex Sys...
 
CHEMOTHERAPY_RDP_CHAPTER 4_ANTI VIRAL DRUGS.pdf
CHEMOTHERAPY_RDP_CHAPTER 4_ANTI VIRAL DRUGS.pdfCHEMOTHERAPY_RDP_CHAPTER 4_ANTI VIRAL DRUGS.pdf
CHEMOTHERAPY_RDP_CHAPTER 4_ANTI VIRAL DRUGS.pdf
 
OCT Training Course for clinical practice Part 1
OCT Training Course for clinical practice Part 1OCT Training Course for clinical practice Part 1
OCT Training Course for clinical practice Part 1
 
Basavarajeeyam - Ayurvedic heritage book of Andhra pradesh
Basavarajeeyam - Ayurvedic heritage book of Andhra pradeshBasavarajeeyam - Ayurvedic heritage book of Andhra pradesh
Basavarajeeyam - Ayurvedic heritage book of Andhra pradesh
 
The Electrocardiogram - Physiologic Principles
The Electrocardiogram - Physiologic PrinciplesThe Electrocardiogram - Physiologic Principles
The Electrocardiogram - Physiologic Principles
 
CHEMOTHERAPY_RDP_CHAPTER 3_ANTIFUNGAL AGENT.pdf
CHEMOTHERAPY_RDP_CHAPTER 3_ANTIFUNGAL AGENT.pdfCHEMOTHERAPY_RDP_CHAPTER 3_ANTIFUNGAL AGENT.pdf
CHEMOTHERAPY_RDP_CHAPTER 3_ANTIFUNGAL AGENT.pdf
 
A Classical Text Review on Basavarajeeyam
A Classical Text Review on BasavarajeeyamA Classical Text Review on Basavarajeeyam
A Classical Text Review on Basavarajeeyam
 
Promoting Wellbeing - Applied Social Psychology - Psychology SuperNotes
Promoting Wellbeing - Applied Social Psychology - Psychology SuperNotesPromoting Wellbeing - Applied Social Psychology - Psychology SuperNotes
Promoting Wellbeing - Applied Social Psychology - Psychology SuperNotes
 
Phone Us ❤8107221448❤ #ℂall #gIRLS In Dehradun By Dehradun @ℂall @Girls Hotel...
Phone Us ❤8107221448❤ #ℂall #gIRLS In Dehradun By Dehradun @ℂall @Girls Hotel...Phone Us ❤8107221448❤ #ℂall #gIRLS In Dehradun By Dehradun @ℂall @Girls Hotel...
Phone Us ❤8107221448❤ #ℂall #gIRLS In Dehradun By Dehradun @ℂall @Girls Hotel...
 
TEST BANK For Community Health Nursing A Canadian Perspective, 5th Edition by...
TEST BANK For Community Health Nursing A Canadian Perspective, 5th Edition by...TEST BANK For Community Health Nursing A Canadian Perspective, 5th Edition by...
TEST BANK For Community Health Nursing A Canadian Perspective, 5th Edition by...
 
REGULATION FOR COMBINATION PRODUCTS AND MEDICAL DEVICES.pptx
REGULATION FOR COMBINATION PRODUCTS AND MEDICAL DEVICES.pptxREGULATION FOR COMBINATION PRODUCTS AND MEDICAL DEVICES.pptx
REGULATION FOR COMBINATION PRODUCTS AND MEDICAL DEVICES.pptx
 
Efficacy of Avartana Sneha in Ayurveda
Efficacy of Avartana Sneha in AyurvedaEfficacy of Avartana Sneha in Ayurveda
Efficacy of Avartana Sneha in Ayurveda
 
Histololgy of Female Reproductive System.pptx
Histololgy of Female Reproductive System.pptxHistololgy of Female Reproductive System.pptx
Histololgy of Female Reproductive System.pptx
 
The Best Ayurvedic Antacid Tablets in India
The Best Ayurvedic Antacid Tablets in IndiaThe Best Ayurvedic Antacid Tablets in India
The Best Ayurvedic Antacid Tablets in India
 
Does Over-Masturbation Contribute to Chronic Prostatitis.pptx
Does Over-Masturbation Contribute to Chronic Prostatitis.pptxDoes Over-Masturbation Contribute to Chronic Prostatitis.pptx
Does Over-Masturbation Contribute to Chronic Prostatitis.pptx
 
share - Lions, tigers, AI and health misinformation, oh my!.pptx
share - Lions, tigers, AI and health misinformation, oh my!.pptxshare - Lions, tigers, AI and health misinformation, oh my!.pptx
share - Lions, tigers, AI and health misinformation, oh my!.pptx
 

Identity Theft: Protecting Our Seniors

  • 1. Identity TheftIdentity Theft Presented by:Presented by: InvestigatorInvestigator Scott TolstadScott Tolstad Escondido Police Dept.Escondido Police Dept. Financial Crimes/Fraud UnitFinancial Crimes/Fraud Unit (760) 839-4971(760) 839-4971 stolstad@escondido.orstolstad@escondido.or gg
  • 2. Identity Theft  Who is targeted?  How do they get your information?  What happens after they get it?  How can I protect myself?
  • 3. Identity Theft/Penal Code  PC 530.5(a)-Every person who willfully obtains personal identifying information, as defined in subdivision (b) of Section 530.55, of another person, and uses that information for any unlawful purpose, including to obtain, or attempt to obtain, credit, goods, services, real property, or medical information without the consent of that person, is guilty of a public offense, and upon conviction therefor, shall be punished by a fine, by imprisonment in a county jail not to exceed one year, or by both a fine and imprisonment, or by imprisonment in the state prison.
  • 4. What Is Personal Identifying Information?  Social Security Numbers  Driver’s license numbers  Address, phone numbers, date of birth  Birth Certificate information  Mother’s maiden name, other family information  Financial account numbers  Biometric information  Medical information
  • 5. Identity Theft: The Classic View  Identity theft occurs when an imposter gains access to personal identifying information and uses it for financial gain – New lines of credit, loans, and mortgages – New accounts, checking/debit fraud – Tenancy and utilities – Medical billing and identity
  • 6. Identity Theft: The Big Picture  Identity theft also occurs when an imposter gains access to personal identifying information and uses it for: – Jobs, employment, contracts – Government accounting issues – Government support services – Avoidance of arrest and criminal records – Medical services
  • 8. How Thieves Obtain Information  Lost/Stolen wallets  Mail theft  Dumpsters  Shoulder surfing  Telephone solicitations  “Phishing” and scams  Lack of computer security / Internet  Areas beyond control  Data breach
  • 9. Skimming  Primarily aimed at your debit card  Gasoline retailers  Restaurants  General retailers  Now Taken over by organized crime  Loaded onto gift/Green Dot Card  Electronic pickpocketing
  • 12. Prevention/Tips  Deposit outgoing mail at a Post Office or a blue USPS collection box, or give it directly to your letter carrier.  Shred unwanted documents that contain personal information.  Review your credit report quarterly.  NEVER give personal information over the phone or the internet unless you initiated the contact. Phone spoofing.
  • 13. Prevention/Tips  Report lost/stolen cards to issuer ASAP.  DON’T carry your SSN card.  Destroy credit card receipts ( some will have your entire credit card number on it).  Keep track of monthly financial statements.  Contact the company if you don’t receive your monthly statement.
  • 14. PC 530.8/Victim Rights  In a nutshell, you are entitled to a copy of the application the suspect used. If the company refuses to turn over information, they can be civilly fined up to $100 a day for noncompliance.
  • 15. Penal Code/Who takes your case?  PC 530.6(a)- A person who has learned or reasonably suspects that his or her personal identifying information has been unlawfully used by another, as described in subdivision (a) of Section 530.5, may initiate a law enforcement investigation by contacting the local law enforcement agency that has jurisdiction over his or her actual residence or place of business, which shall take a police report of the matter, provide the complainant with a copy of that report, and begin an investigation of the facts. If the suspected crime was committed in a different jurisdiction, the local law enforcement agency may refer the matter to the law enforcement agency where the suspected crime was committed.
  • 16. Fraud Alert/Credit Freezes  Experian-888 397-3742, www.experian.com  Transunion-800 680-7289, www.transunion.com  Equifax-800 525-6285, www.equifax.com  Numbers to use to place fraud alert- 2,2,3,2,1, hold, 2, enter info, 2 for phone number or 1 not to enter phone number, obtain confirmation number.
  • 17. Work At Home Scam  International company is looking for part time at home employers within the whole territory of the United States, Canada, Australia and United Kingdom. You can get over 3000 USD monthly which highly depends on your results.  We are looking people at the age of 18 to 85 for rather easy operations on processing of the incoming tasks and performance of simple management assignments. You don't
  • 18. Nigerian Scams Mystery Shopper Overpayment Scam Romance Scam Lottery Scam
  • 19. Check Fraud  Fictitious check– no such account exists - wrong routing number, wrong bank, account holder doesn’t exist  Fraudulent Check – real account - account number, account holder exists  Reproduced check  Stolen check – Actual check just stolen and usually washed
  • 20. Mortgage Scams  FICO score sites  Loan modification  Foreclosure prevention  Foreclosure prevention products  Brokers
  • 28. Camera in FasciaWhat do PIN capturing devices look like? How about now ? Removal of fitted device from fascia- the additional part can now be clearly seen.