The document discusses identity theft, specifically as it relates to members of the military. It provides statistics on identity theft complaints within the military, noting that the majority come from the Army and Navy. It also shares that the most common types of identity theft reported by the military involve government documents/benefits fraud and credit card fraud. The document then gives an overview of steps someone can take if they believe they are a victim of identity theft, such as placing fraud alerts on credit reports and disputing unauthorized charges or accounts.
This workshop covers identity theft prevention. It defines identity theft and fraud, explains how personal information is commonly stolen through dumpster diving, mail theft, car break-ins, or financial institution fraud. Participants learn to protect themselves by shredding documents, monitoring records, and being wary of sharing information over the phone. Case studies demonstrate mistakes like improper document disposal, carrying all account numbers, and lending cards/PINs. Participants discuss prevention steps and what to do if identity theft occurs, such as checking credit reports for unusual activity.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only.
17 U.S. Code § 107 - Limitations on exclusive rights: Fair use
Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
The document discusses the issue of identity theft, providing statistics on its prevalence, how identity thieves operate, and tips to minimize risk. It notes that 1 in 5 families have been victims of identity theft, with millions of victims annually and billions lost each year. Common ways identity thieves steal information include retrieving discarded documents, stealing mail, and shouldering surfing. The document advises carrying only necessary identification, shredding documents, being wary of phone calls requesting information, and monitoring accounts regularly. It also outlines steps to take if one becomes a victim of identity theft.
Dr. Barbara O'Neill and Carol Kando-Pineda, of the Federal Trade Commission, will present this 90-minute webinar on behalf of the Military Families Learning Network. This 90-minute webinar will include two sections: a general overview of identity theft and discussion about military-specific scams. Topics covered during the first section, presented by Dr. O’Neill, include a definition of identity theft, signs of identity theft, an identity theft risk assessment quiz, types of identity theft, how identity theft occurs, ways to reduce identity theft risk, phishing scams, proactive and reactive identity theft actions, and identity theft resources. Ms. Kando-Pineda plans to discuss getting help for identity theft victims, including the steps they need to take immediately, walking through the new features for consumers on Identitytheft.gov and how they help victims develop a recovery plan, get a heads-up on the latest “imposter” scams, and an update on the Military Consumer campaign and new resources on the way for the military community.
Company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Identity theft occurs when someone uses someone else's personal information like name, Social Security number, or credit card number without permission to commit fraud. The FTC estimates 9 million Americans have their identities stolen each year. Identity thieves may open credit cards and accounts or commit other crimes using the victim's identity. Identity theft has serious consequences like damage to credit and legal problems.
The document discusses credit card fraud and provides tips to help consumers protect themselves. It covers types of fraud like unauthorized charges, counterfeit cards, identity theft, dumpster diving, skimming, and phishing. It recommends securing credit cards and account information, monitoring statements for unauthorized activity, and promptly reporting any fraud. Steps are outlined for disputing charges and information is provided about resources for consumer assistance.
This workshop covers identity theft prevention. It defines identity theft and fraud, explains how personal information is commonly stolen through dumpster diving, mail theft, car break-ins, or financial institution fraud. Participants learn to protect themselves by shredding documents, monitoring records, and being wary of sharing information over the phone. Case studies demonstrate mistakes like improper document disposal, carrying all account numbers, and lending cards/PINs. Participants discuss prevention steps and what to do if identity theft occurs, such as checking credit reports for unusual activity.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only.
17 U.S. Code § 107 - Limitations on exclusive rights: Fair use
Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
The document discusses the issue of identity theft, providing statistics on its prevalence, how identity thieves operate, and tips to minimize risk. It notes that 1 in 5 families have been victims of identity theft, with millions of victims annually and billions lost each year. Common ways identity thieves steal information include retrieving discarded documents, stealing mail, and shouldering surfing. The document advises carrying only necessary identification, shredding documents, being wary of phone calls requesting information, and monitoring accounts regularly. It also outlines steps to take if one becomes a victim of identity theft.
Dr. Barbara O'Neill and Carol Kando-Pineda, of the Federal Trade Commission, will present this 90-minute webinar on behalf of the Military Families Learning Network. This 90-minute webinar will include two sections: a general overview of identity theft and discussion about military-specific scams. Topics covered during the first section, presented by Dr. O’Neill, include a definition of identity theft, signs of identity theft, an identity theft risk assessment quiz, types of identity theft, how identity theft occurs, ways to reduce identity theft risk, phishing scams, proactive and reactive identity theft actions, and identity theft resources. Ms. Kando-Pineda plans to discuss getting help for identity theft victims, including the steps they need to take immediately, walking through the new features for consumers on Identitytheft.gov and how they help victims develop a recovery plan, get a heads-up on the latest “imposter” scams, and an update on the Military Consumer campaign and new resources on the way for the military community.
Company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Identity theft occurs when someone uses someone else's personal information like name, Social Security number, or credit card number without permission to commit fraud. The FTC estimates 9 million Americans have their identities stolen each year. Identity thieves may open credit cards and accounts or commit other crimes using the victim's identity. Identity theft has serious consequences like damage to credit and legal problems.
The document discusses credit card fraud and provides tips to help consumers protect themselves. It covers types of fraud like unauthorized charges, counterfeit cards, identity theft, dumpster diving, skimming, and phishing. It recommends securing credit cards and account information, monitoring statements for unauthorized activity, and promptly reporting any fraud. Steps are outlined for disputing charges and information is provided about resources for consumer assistance.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
The document discusses identity theft and provides tips to prevent it. It describes how identity thieves obtain personal information to fraudulently use victims' credit cards, bank accounts, loans, and more. It advises people to be cautious sharing information, check financial records regularly, request credit reports periodically, and maintain financial records. Victims are generally only liable for $50 if reported within two days, and the document provides reassurance and steps for addressing identity theft.
The document summarizes identity theft, including what it is, common types, costs to victims and businesses, industry responses, laws, and services that can help prevent and resolve identity theft issues. It discusses identity theft involving drivers licenses, social security numbers, medical records, finances, and criminal records. It outlines costs to victims in time and money spent resolving identity issues and costs to businesses in fines and lawsuits. Laws discussed include FACTA, HIPAA, and the Gramm-Leach-Bliley Act. Services mentioned include monitoring, resolution, restoration, and a comprehensive identity theft protection plan.
Common identity theft scams include lottery scams, bogus charity scams, and phishing scams. Hackers can also steal personal information through pharming and by obtaining dumpster-dived documents, stolen mail, or public records. Stolen identities may be used to open new accounts, make purchases, or commit crimes. It is important to protect personal information by shredding documents, using secure websites, and reviewing credit reports regularly. If identity theft occurs, actions should be taken such as filing a police report and placing fraud alerts on credit reports.
This document provides an overview of identity theft, including statistics on its prevalence and impact on victims. It discusses common types of identity theft like credit card fraud and fraudulent documents. Methods used by identity thieves are outlined, along with tips for prevention. Investigation techniques for identifying thieves are also summarized, such as examining documents, following electronic trails, and using forensic analysis of computers.
Identity Theft: Protecting & Restoring Your Good NameSpringboard
The document discusses identity theft, including how it occurs, prevention tips, and steps to take if you become a victim. It summarizes Springboard's services for credit counseling and financial education. Identity theft has been rising, with over 11 million Americans affected in 2009. The document provides tips to prevent identity theft and outlines actions victims should take, such as placing fraud alerts and filing reports.
6
If you know who stole your identity, you should still follow the same steps as if you did not know the identity thief:
1. File a report with your local police department and get a copy of the police report.
2. Contact the Federal Trade Commission to report the identity theft.
3. Place a fraud alert on your credit reports and get copies of your credit reports to review for any suspicious activity.
4. Contact any creditors or companies where new accounts or charges may have been made in your name to report the fraudulent activity and close or dispute accounts.
In addition to these steps, you should also consider taking legal action against the identity thief such as filing a
Municipal Court Clerk Conference: Handling PaymentsKaren Blake
This document provides guidance for front line municipal clerks on handling cash payments, detecting counterfeit bills, processing various payment types like checks and credit cards, following proper deposit procedures, and implementing internal controls. Key duties of clerks include maintaining accurate financial records, depositing funds intact in designated accounts, and reporting any suspected fraud. Clerks must also know how to identify counterfeit cash and what steps to take if received. Payment plans are an authorized option for paying fines.
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
The document provides information on various fraud and identity theft topics, including how to protect yourself from common scams. It discusses signs of identity theft, how criminals obtain personal information, and what to do if you are a victim. Tips are given on safeguarding information online and over the phone, checking credit reports, and reporting identity theft. Resources for more information from organizations like the FTC are also listed.
Identity theft involves someone using personal information like a name, Social Security number, or bank account information without permission to commit fraud or theft. Common types of identity theft include credit card fraud, phone or utility fraud, bank fraud, and employment-related fraud. Victims often don't discover the theft for over a year. To reduce risk, people should shred financial documents before throwing them out, be cautious about sharing personal information, and monitor bank statements and credit reports for suspicious activity. If identity theft is suspected, victims should file a police report and contact credit bureaus and the Federal Trade Commission for assistance.
This document contains an identity theft victim's complaint and affidavit. It collects personal information about the victim such as name, address, phone numbers, and social security number. It documents the fraudulent accounts and activities resulting from the identity theft, including the date opened or misused, amount obtained, and account details. The victim can choose to file a law enforcement report and obtain a case number, or sign the affidavit to prove to companies that they are not responsible for the fraud without filing a report. The victim certifies the information is true and understands making false statements could result in legal penalties.
The document discusses the lottery scam, also known as the Jamaican lottery scam or 876 area code scam. It begins with victims receiving unsolicited notifications that they have won a large prize or lottery. Scammers then demand money for fees like taxes or shipping before the victim can receive their winnings. The scammers prefer payment through money transfer services like Western Union or Green Dot cards. Victims never receive any winnings and are often targeted by additional scams after being initially victimized. The lottery scam is estimated to generate $300 million annually and is linked to hundreds of murders in Jamaica where many of the scams originate from.
Identity fraud is the fastest growing crime globally, though studies in the US have shown it decreasing since 2003. About 9.3 million Americans, or 4.25% of adults, fall victim to identity fraud annually. In the UK in 2005, one in four people had their identity stolen or knew someone who had.
The most effective precautions include freezing your credit, monitoring credit reports annually for inaccuracies, minimizing mailed financial documents, checking accounts weekly online or at ATMs, being vigilant using ATMs and entering personal information, shredding documents with private details, ignoring requests for information from unknown callers, only shopping at reputable online stores, limiting publicly shared personal information, and refusing to do business with unauthorized
1) Identity theft is on the rise as criminals steal personal information like SINs, credit cards, and health records to impersonate victims.
2) To reduce risk, monitor credit reports annually and statements regularly for fraudulent activity. Dispute any incorrect information with credit bureaus.
3) Safeguard personal information by shredding documents, creating strong passwords, limiting what you carry, and being wary of phone/email scams. Act quickly if identity theft is suspected.
This document contains an identity theft affidavit and complaint form completed by Adalberto Cervantes Rodriguez. It includes his personal information, details about fraudulent accounts and inquiries he believes were opened using his identity, and sections to file a police report or have his affidavit witnessed. The form provides a way for identity theft victims to document the crime and disputes with creditors for the purpose of removing fraudulent information from their credit reports.
Scott Tolstad of the Escondido Police Department explains different ways senior citizens are scammed out of their money, particularly by thieves who steal identities. It's a valuable lesson for all of us, regardless of age, to know. Scott spoke during the June 7, 2013 Glenner Symposium on Elder Abuse.
This document summarizes 5 common scams taxpayers should be aware of. It describes phishing scams where taxpayers are tricked into providing personal information via electronic communication. It warns of return preparer fraud where preparers inflate fees or steal refunds. It mentions that hiding income offshore is increasingly difficult due to FATCA. It notes widespread telephone scams where impersonators threaten taxpayers demanding payment. Finally, it cautions against frivolous tax arguments promoted to avoid paying taxes owed.
A slide show that I compiled for my post master's certificate program, through Northcentral University, in Business Administration, with a specialization on Advanced Accounting. This is assignment 5 Consumer Fraud Prevention.
This document provides information on how to protect yourself from identity theft. It discusses how identity theft occurs through stealing personal information from wallets, mail, trash, or online. It outlines steps to take if you become a victim, such as filing a police report and fraud alert. The document stresses the importance of being vigilant with personal information and reviewing credit reports regularly to catch suspicious activity early. Identity theft is a serious crime that can have long lasting impacts, so protecting personal data and responding quickly to suspected theft is key to minimizing harm.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
This document discusses identity theft, including:
1) A brief history of data breaches at Equifax, highlighting failures to install security patches that led to the theft of personal information of over 145 million consumers.
2) The challenges identity theft victims face in recovering, including stressful processes to stop damage, report crimes, and repair credit, which can cause emotional distress.
3) Tips for businesses to protect customer information, know applicable laws regarding data breaches and identity theft, and respond appropriately to security incidents by notifying affected individuals and credit bureaus.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
The document discusses identity theft and provides tips to prevent it. It describes how identity thieves obtain personal information to fraudulently use victims' credit cards, bank accounts, loans, and more. It advises people to be cautious sharing information, check financial records regularly, request credit reports periodically, and maintain financial records. Victims are generally only liable for $50 if reported within two days, and the document provides reassurance and steps for addressing identity theft.
The document summarizes identity theft, including what it is, common types, costs to victims and businesses, industry responses, laws, and services that can help prevent and resolve identity theft issues. It discusses identity theft involving drivers licenses, social security numbers, medical records, finances, and criminal records. It outlines costs to victims in time and money spent resolving identity issues and costs to businesses in fines and lawsuits. Laws discussed include FACTA, HIPAA, and the Gramm-Leach-Bliley Act. Services mentioned include monitoring, resolution, restoration, and a comprehensive identity theft protection plan.
Common identity theft scams include lottery scams, bogus charity scams, and phishing scams. Hackers can also steal personal information through pharming and by obtaining dumpster-dived documents, stolen mail, or public records. Stolen identities may be used to open new accounts, make purchases, or commit crimes. It is important to protect personal information by shredding documents, using secure websites, and reviewing credit reports regularly. If identity theft occurs, actions should be taken such as filing a police report and placing fraud alerts on credit reports.
This document provides an overview of identity theft, including statistics on its prevalence and impact on victims. It discusses common types of identity theft like credit card fraud and fraudulent documents. Methods used by identity thieves are outlined, along with tips for prevention. Investigation techniques for identifying thieves are also summarized, such as examining documents, following electronic trails, and using forensic analysis of computers.
Identity Theft: Protecting & Restoring Your Good NameSpringboard
The document discusses identity theft, including how it occurs, prevention tips, and steps to take if you become a victim. It summarizes Springboard's services for credit counseling and financial education. Identity theft has been rising, with over 11 million Americans affected in 2009. The document provides tips to prevent identity theft and outlines actions victims should take, such as placing fraud alerts and filing reports.
6
If you know who stole your identity, you should still follow the same steps as if you did not know the identity thief:
1. File a report with your local police department and get a copy of the police report.
2. Contact the Federal Trade Commission to report the identity theft.
3. Place a fraud alert on your credit reports and get copies of your credit reports to review for any suspicious activity.
4. Contact any creditors or companies where new accounts or charges may have been made in your name to report the fraudulent activity and close or dispute accounts.
In addition to these steps, you should also consider taking legal action against the identity thief such as filing a
Municipal Court Clerk Conference: Handling PaymentsKaren Blake
This document provides guidance for front line municipal clerks on handling cash payments, detecting counterfeit bills, processing various payment types like checks and credit cards, following proper deposit procedures, and implementing internal controls. Key duties of clerks include maintaining accurate financial records, depositing funds intact in designated accounts, and reporting any suspected fraud. Clerks must also know how to identify counterfeit cash and what steps to take if received. Payment plans are an authorized option for paying fines.
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
The document provides information on various fraud and identity theft topics, including how to protect yourself from common scams. It discusses signs of identity theft, how criminals obtain personal information, and what to do if you are a victim. Tips are given on safeguarding information online and over the phone, checking credit reports, and reporting identity theft. Resources for more information from organizations like the FTC are also listed.
Identity theft involves someone using personal information like a name, Social Security number, or bank account information without permission to commit fraud or theft. Common types of identity theft include credit card fraud, phone or utility fraud, bank fraud, and employment-related fraud. Victims often don't discover the theft for over a year. To reduce risk, people should shred financial documents before throwing them out, be cautious about sharing personal information, and monitor bank statements and credit reports for suspicious activity. If identity theft is suspected, victims should file a police report and contact credit bureaus and the Federal Trade Commission for assistance.
This document contains an identity theft victim's complaint and affidavit. It collects personal information about the victim such as name, address, phone numbers, and social security number. It documents the fraudulent accounts and activities resulting from the identity theft, including the date opened or misused, amount obtained, and account details. The victim can choose to file a law enforcement report and obtain a case number, or sign the affidavit to prove to companies that they are not responsible for the fraud without filing a report. The victim certifies the information is true and understands making false statements could result in legal penalties.
The document discusses the lottery scam, also known as the Jamaican lottery scam or 876 area code scam. It begins with victims receiving unsolicited notifications that they have won a large prize or lottery. Scammers then demand money for fees like taxes or shipping before the victim can receive their winnings. The scammers prefer payment through money transfer services like Western Union or Green Dot cards. Victims never receive any winnings and are often targeted by additional scams after being initially victimized. The lottery scam is estimated to generate $300 million annually and is linked to hundreds of murders in Jamaica where many of the scams originate from.
Identity fraud is the fastest growing crime globally, though studies in the US have shown it decreasing since 2003. About 9.3 million Americans, or 4.25% of adults, fall victim to identity fraud annually. In the UK in 2005, one in four people had their identity stolen or knew someone who had.
The most effective precautions include freezing your credit, monitoring credit reports annually for inaccuracies, minimizing mailed financial documents, checking accounts weekly online or at ATMs, being vigilant using ATMs and entering personal information, shredding documents with private details, ignoring requests for information from unknown callers, only shopping at reputable online stores, limiting publicly shared personal information, and refusing to do business with unauthorized
1) Identity theft is on the rise as criminals steal personal information like SINs, credit cards, and health records to impersonate victims.
2) To reduce risk, monitor credit reports annually and statements regularly for fraudulent activity. Dispute any incorrect information with credit bureaus.
3) Safeguard personal information by shredding documents, creating strong passwords, limiting what you carry, and being wary of phone/email scams. Act quickly if identity theft is suspected.
This document contains an identity theft affidavit and complaint form completed by Adalberto Cervantes Rodriguez. It includes his personal information, details about fraudulent accounts and inquiries he believes were opened using his identity, and sections to file a police report or have his affidavit witnessed. The form provides a way for identity theft victims to document the crime and disputes with creditors for the purpose of removing fraudulent information from their credit reports.
Scott Tolstad of the Escondido Police Department explains different ways senior citizens are scammed out of their money, particularly by thieves who steal identities. It's a valuable lesson for all of us, regardless of age, to know. Scott spoke during the June 7, 2013 Glenner Symposium on Elder Abuse.
This document summarizes 5 common scams taxpayers should be aware of. It describes phishing scams where taxpayers are tricked into providing personal information via electronic communication. It warns of return preparer fraud where preparers inflate fees or steal refunds. It mentions that hiding income offshore is increasingly difficult due to FATCA. It notes widespread telephone scams where impersonators threaten taxpayers demanding payment. Finally, it cautions against frivolous tax arguments promoted to avoid paying taxes owed.
A slide show that I compiled for my post master's certificate program, through Northcentral University, in Business Administration, with a specialization on Advanced Accounting. This is assignment 5 Consumer Fraud Prevention.
This document provides information on how to protect yourself from identity theft. It discusses how identity theft occurs through stealing personal information from wallets, mail, trash, or online. It outlines steps to take if you become a victim, such as filing a police report and fraud alert. The document stresses the importance of being vigilant with personal information and reviewing credit reports regularly to catch suspicious activity early. Identity theft is a serious crime that can have long lasting impacts, so protecting personal data and responding quickly to suspected theft is key to minimizing harm.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
This document discusses identity theft, including:
1) A brief history of data breaches at Equifax, highlighting failures to install security patches that led to the theft of personal information of over 145 million consumers.
2) The challenges identity theft victims face in recovering, including stressful processes to stop damage, report crimes, and repair credit, which can cause emotional distress.
3) Tips for businesses to protect customer information, know applicable laws regarding data breaches and identity theft, and respond appropriately to security incidents by notifying affected individuals and credit bureaus.
Compiled and designed by Mark Fullbright , Certified Identity Theft Risk Management Specialist™ (CITRMS) as a free service for consumers to protect themselves and reduce their exposure to identity theft.
Stay Safe, Stay Secure
*Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only.
1CYBER CRIMEChapter 5Objectives· Understand the differen.docxjesusamckone
This document discusses identity theft and fraud, outlining five types and both physical and virtual methods used by criminals. It notes that identity theft was the number one consumer complaint to the FTC in 2004, costing individuals $5 billion and businesses $47 billion annually. The document also outlines a four phase process criminals use to steal identities and then commit additional crimes.
1CYBER CRIMEChapter 5Objectives· Understand the differen.docxherminaprocter
1
CYBER CRIME
Chapter 5
Objectives
· Understand the difference between identity theft and identity fraud
· Explore the five types of identity theft/fraud
· Discuss the virtual and Internet methods in which computer criminals steal identities
· Develop a knowledge of the crimes committed due to identity theft
Details
I. Identity Theft: Illegal use or transfer of an individual’s personal identification
information.
Identity Fraud: Illegal activities based on the fraudulent use of identifying information of a real or fictitious person.
· Creation of fictitious identity by using a “breeder” document(fictitious or stolen identifiers)
· Used by criminals to create additional lines of credit and separate bank accounts
· Used by terrorists to conceal their own identity, hide from authorities or gain access to sensitive information
Types of Identity Theft/Fraud
· Assumption of Identity: individual assumes the identity of their victim, including all aspects of the victim’s lives
· Rarest form of identity theft/fraud
· Theft for Employment or Border Entry: Fraudulent use of stolen or fictitious personal information to obtain employment or gain entry into US
· Alien Registration Cards
· Nonimmigrant Visas
· Passports and Citizenship Documents
· Border Crossing Cards
· Virtual Identity Theft/Fraud: Use of personal, professional, or other dimensions of identity toward creating a fraudulent virtual personality
· On-line dating
· Role playing
· Accessing deviant sites or locations containing questionable content
· Extra Marital Affairs
· Use for harassment or stalking
· Criminals may use to deceive others to reveal personal information or solicit a criminal act
· Credit Identity Theft/Fraud: Use of stolen personal and financial information to facilitate the creation of fraudulent accounts. It requires the affirmative act of securing additional credit.
· Criminals use to create additional sources of revenue through the establishment of multiple accounts
· FTC (2011) reported 60% of all identity theft victims stated their personal information was used to open new accounts, transfer funds, or commit tax/wage related fraud
II. Scope and Victimology
· Developing crime statistics for Identity Theft/Fraud has been difficult
· Lack of reporting by the public
· Lack of reporting by police to federal agencies
· Jurisdictional discrepancies in crime measurement
· Selective enforcement based on community standards and department resources
· First comprehensive study conducted by Government Accounting Office (2002)
· Identity Theft was dramatically increasing
· Calls to the Identity Theft Clearinghouse increased over 500% in two years
· Losses incurred by MasterCard and Visa increased by 43%
· No significant loss of consumer confidence as online shopping increased
· Number-one consumer complaint to the Federal Trade Commission (FTC)
· FTC Study (2004): 15 million Americans victimized in 2003.
· Total annual cost to individu.
ID Theft: What You Need to Know - Juliana HarrisIT-oLogy
The South Carolina Department of Consumer Affairs (SCDCA) has 6 divisions that work to resolve consumer complaints, regulate industries, educate the public, and combat identity theft. The SCDCA receives hundreds of consumer complaints each month and resolves about 85% satisfactorily. It also oversees regulatory programs, represents consumers in legal cases, conducts investigations, and disseminates consumer information through various channels including social media. Identity theft remains a major problem, but the SCDCA provides resources to help citizens monitor their credit, place freezes and fraud alerts on reports, and take other protective measures.
This document discusses protecting personal identity in the age of increased information tracking. It outlines the risks of identity theft, how thieves steal identities, and statistics on identity theft victims. Key points include that identity theft costs the US economy an estimated $100 billion annually, 47% of victims in 2015 experienced tax or wage-related identity theft, and children and the elderly are particularly vulnerable targets. The document provides tips on reducing identity theft risks and resolving identity theft issues.
The document outlines several rights and protections for victims of identity theft under federal law. These include the right to create an identity theft report, place fraud alerts on credit reports, dispute fraudulent information on reports, limit financial liability for debts incurred fraudulently, be protected and notified regarding legal proceedings against the identity thief, and receive assistance from the Federal Trade Commission and law enforcement.
The document discusses the growing problem of identity theft in the United States. It defines identity theft and outlines some key statistics, such as over 340 million Americans having their identities stolen since 2005. It also discusses the different types of identity theft, including how thieves can steal identities to gain employment, file taxes, obtain loans and credit cards, or even be arrested for someone else's crimes. Lastly, it provides tips on how to deter, detect, and defend against identity theft by monitoring accounts and reports for fraudulent activity.
How Credit Card Fraud Happens and How You Can Protect YourselfDigital EYE Media
Often a simple transaction is responsible for a crime that can potentially turn a credit card holder’s life completely upside down. Learn how to protect yourself from identity theft.
The document summarizes 5 common credit myths and provides facts to debunk them. Specifically, it discusses that (1) there are many versions of credit scores, (2) keeping balances below 50% is best for scores, (3) closing cards may hurt scores, (4) paying collections has little impact, and (5) many credit reports have errors. It then provides additional details on collections, inaccurate vs correct reporting, common debt collection violations, and offers a "pay for deletion" credit repair service.
During this workshop, Mr. Taylor will be discussing
how this growing crime is affecting individuals, families and small businesses.
Never before has there been a greater need for understanding identity theft and its impact.
In the workshop you will:
• Learn what ID Theft is and how to minimize the devastating effects
• Be introduced to the major types of identity theft
• Learn how to better protect personal and small business information
• Learn about restoration services and credit monitoring plans
An identity thief may have accessed and used a victim's personal or financial information without permission. The guide outlines immediate steps the victim should take, such as placing a fraud alert on their credit report and ordering copies of their credit reports from the three major credit bureaus. It also provides guidance on next steps like reviewing credit reports for errors, disputing inaccuracies directly with the credit bureaus and affected businesses, and filing an identity theft report with the FTC and local law enforcement. Long-term steps include considering a credit freeze and extended fraud alert to further protect the victim's identity and credit standing. The guide offers worksheets, sample letters, and contact information to help victims methodically recover from identity theft.
During this workshop, Mr. Taylor will be discussing
how this growing crime is affecting individuals, families and small businesses.
Never before has there been a greater need for understanding identity theft and its impact.
In the workshop you will:
• Learn what ID Theft is and how to minimize the devastating effects
• Be introduced to the major types of identity theft
• Learn how to better protect personal and small business information
• Learn about restoration services and credit monitoring plans
Similar to West Point ID Theft and FCRA Presentation updated (20)
1. The United States Military
Academy at West Point:
Identity Theft and the Fair Credit
Reporting Act
March 9, 2016
Adam G. Singer
Law Office of Adam G. Singer, PLLC
NYC: 60 E. 42nd Street, Suite 4600, New York, NY 10165
Rockland: 254 S. Main Street, Suite 516, New City, NY 10956
Westchester: 445 Hamilton Avenue, Suite 1102, White Plains, NY 10601
T: 212.842.2428
F: 212.658.9682
E: asinger2@alumni.law.upenn.edu
L: www.linkedin.com/in/adamgsinger
5. Identity Theft and Military
• In 2014 the Consumer Sentinel Network received 87,400
complaints across all military branches, 48% being from the
U.S. Army and 21% from the U.S. Navy: Source: FTC 2015
• Military Retirees/Veterans filed the most complaints to the
FTC, followed by Active Duty Service Members and
Dependent Spouses of Services Members: Source: FTC
2015
• 27 % of complaints among Military members pertained to
Identity Theft while 26 % related to Impostor Scams Source:
FTC 2015
5
6. Identity Theft and Military
• Enlisted Military consumers account for 23% of Identity
Theft complaints Source: FTC 2015
• Officer Military consumers account for 27 % of Identity
Theft complaints Source: FTC 2015
• The most common types of Identity Thefts reported include
Government Documents/Benefits Fraud 44.7% and Credit
Card Fraud 16.7% Source: FTC 2015
• Debt resulting from Identity Theft contributed towards 41%
of Debt Collection Complaints Source: CFPB Report 2015
6
7. Identity Theft and New York
• Identity Theft Complaints Count from
New York Victims = 15,959 Source: FTC
2015
• NY state is ranked 17th nationally in
terms of Identity Theft complaints
Source: FTC 2014
• Identity Theft Types Reported include
Government Documents/Benefits Fraud
31% and Credit Card Fraud 24% Source:
FTC 2015
7
8. Identity Theft and Credit Reports
• 1.4 % of victims discovered Identity Theft through
credit report/credit monitoring service
• Source: Bureau of Justice Statistics, National Crime Victimization Survey, Identity
Theft Supplement, 2014
• Of the 8% of identity theft victims who contacted
a credit bureau, 68 % placed a fraud alert on their
credit report, while 18% provided a police report
to the credit bureau
• Source: Bureau of Justice Statistics, National Crime Victimization Survey, Identity
Theft Supplement, 2014
8
9. More Information About
Statistics on ID Theft
• Substantially more detail is available at the
original FTC and CFBP sources:
• https://www.ftc.gov/enforcement/consumer-
sentinel-network/reports
• http://files.consumerfinance.gov/f/201403_cf
pb_snapshot-report_complaints-received-
servicemembers.pdf
9
11. A. How ID Theft happens
Identity thieves commit their crime in several
ways:
• Steal credit card payments and other outgoing
mail from private, curbside mailboxes.
• Dig through garbage cans or communal
dumpsters in search of cancelled checks,
credit card and bank statements, and
preapproved credit card offers.
11
12. How ID Theft happens (cont’d)
• Hack into computers that contain personal
records and steal the data.
• File a change of address form in the victim’s
name to divert mail and gather personal and
financial data.
• Source: National Crime Prevention Council
12
13. B. Obtaining ID Theft Documents
1. Pursuant to FCRA 609e:
• Victim is entitled to copies of transaction
records related to theft of identity, such as
applications for credit; and
• Victim can also authorize law enforcement to
receive records directly, without need for
subpoena.
• however no private cause of action for
damages if violated
13
14. Obtaining ID Theft Documents
(cont’d)
2. Also, standard civil subpoena should work
14
15. C. Preventing ID Theft
• Extensive information in written materials and
online about prevention
• Note: if a client has reason to suspect ID theft,
visit this FTC site for detailed information
tailored to the source of the theft (bank
account, credit card, driver's license, etc.):
– https://www.identitytheft.gov/Info-Lost-or-Stolen
15
16. Preventing ID Theft (cont’d)
• highlight on Active Duty Alerts for Military
Personnel
– if deployed, place active duty alert on your credit
report
– will minimize the risk of identity theft
– last for one year if the point is longer than one year,
renew the alert
– only need to contact one credit reporting agency
which will then notify the other two national credit
reporting agencies
– removal from prescreened credit card offers for two
years
16
18. A. Red Flags for ID Theft
• Collection letters / calls
• Filing of lawsuit against client
• Notice of a judgment even where client never
received notice of a lawsuit
• A notice from the IRS someone used the client's
Social Security number
• Mail, e-mail, or calls about your accounts or jobs
in your minor child's name
• Businesses reject your checks
• Unexpectedly turned down for a loan or a job
18
19. B. Special Note About Credit Reports
• First, determine if it is it ID theft?
– Not all unknown debts on a credit report indicate ID
theft.
– Start by examining the credit report
• Well, what else could it be when unknown debts
appear on a credit report?
– vs. mixed file?
• Are there addresses not associated with this
person?
– If yes, it may be a mixed file
19
20. C. What if a Family Member is the
ID Thief? A Word of Caution
• Recognize that proceeding further presents a
reasonable possibility of prosecution
• Be sure client wants to proceed knowing this
• If family member is estranged or very bad
blood, it can be a good case so long as client is
committed to seeing the process through
20
22. A. Triage -- First Things First
1. Call creditors to close accounts
2. Fraud alert
– Contact one credit bureau who then will forward
the information to the other two national bureaus
– Provide proof of identity
– Fraud alert remains for 90 days and permits one
free copy of your credit report from each of the
three national bureaus
22
23. Triage (cont’d)
3. Credit Report Freeze
• Prevents potential creditors from accessing your credit
report
• Thus reduces the likelihood that an identity theft can
open new accounts under that name
• In some states it is free; in others there is a small fee
• Does not affect your credit score
• May temporarily lift the freeze to apply for specific credit
• Also may permanently thaw the freeze at any time
23
25. Triage: Police Report
• Police Report -- first and most important step
NY Executive Law § 646(2)
Identity theft victims may file a complaint:
• “In the county in which any part of the offense took place”;
• “In the county in which the person who suffered financial
loss resided”; or
• “In the county where the person whose personal
identifying information was used … resided.”
• Also says the police: – “shall take a police report of the
matter and provide the complainant with a copy of such
report free of charge.” Unfortunately, the police often
apply other standards.
25
26. Triage: Police Report (cont’d)
At the precinct:
• Write down the names and titles of all the officers you speak with.
• Later write down brief notes about the interaction. In case you have
difficulty getting the police report, these notes will help with filing a
complaint and documenting the issue.
If unsuccessful:
• Ask to see the officer’s supervisor. • Try the same precinct at a different
time of day. • Try a different precinct and ask them to write up the report
• and transfer it to the appropriate precinct for filing.
• •Try going to the state police. • Ask to file a Miscellaneous Incident Report
instead of a police report. A police report number is not generated for this
type of report as it is merely a record of non-criminal events (Last resort).
• Source: CLARO Clinic
26
27. Triage: ID Theft Affidavit
ID complaint /affidavit
form
• Available at:
https://www.consumer.ft
c.gov/articles/pdf-0094-
identity- theft-
affidavit.pdf
27
28. Triage: Review Credit Reports
Obtain and review
credit reports
– Free at
annualcreditreport.com
28
29. V. After Triage, Is it Time to Prosecute and Sue?
Criminal and Civil Liability for ID Theft
29
31. 1. Criminal Liability
165.15 Theft of services:
A person is guilty of theft of services when:
He obtains or attempts to obtain a service, or induces or attempts to induce
the supplier of a rendered service to agree to payment therefore on a credit
basis, by the use of a credit card or debit card which he knows to be stolen.
A MISD
165.17 Unlawful use of credit card, debit card or public benefit card:
A person is guilty of unlawful use of credit card, debit card or public benefit
card when in the course of obtaining or attempting to obtain property or a
service, he uses or displays a credit card, debit card or public benefit card
which he knows to be revoked or cancelled.
A MISD
31
32. Other Criminal Offenses
190.77
• Offenses involving theft of identity;
definitions.
190.78
• Identity theft in the third degree.
• A MISD
190.79
• Identity theft in the second degree.
• E FELONY
190.80
• Identity theft in the first degree.
• D FELONY
190.80-a
• Aggravated identity theft.
• D FELONY
190.81
• Unlawful possession of personal
identification information in the third
degree.
• A MISD
190.82
Unlawful possession of personal
identification information in the second
degree.
E FELONY
190.83
Unlawful possession of personal
identification information in the first degree.
D FELONY
190.84
Defenses.
190.85
Unlawful possession of a skimmer device in
the second degree.
A MISD
190.86
Unlawful possession of a skimmer device in
the first degree.
E FELONY
32
33. 2. Civil Liability -- State Law
Liability Re: Identity Theft
1. NYS Fair Credit Reporting Act (“NY FCRA”)
2. N.Y. Gen. Bus. L. § 380 et seq. (includes NYS
Security Freeze Law)
3. NYS Executive Law § 646(2) -- police reports
4. New York General Business Law § 899-aa:
Notification; person without valid
authorization has acquired private
information: Third party obligation to notify
consumers about data breaches
33
34. Civil Liability -- State Law Liability
Re: Identity Theft (cont’d)
• Negligence
– Like most negligence claims, to hold a bank or
financial institution liable, a consumer must prove:
1) The bank or credit agency committed some act that
enabled or helped the identity theft to occur;
2) That the bank or credit agency owed a duty to the
consumer whose identity was stolen;
3) That the bank or credit agency breached that duty;
and
4) That the breach was the actual and proximate cause
of the consumer's injury.
34
35. B. Civil Liability -- Federal Statutes Re: Credit Billing
and Credit Reporting (Source, inter alia, CLARO)
EFTA
• The Electronic Fund Transfer Act (EFTA), and
Regulation E, issued by the Board of
Governors of the Federal Reserve, provide
consumer protections for transactions
involving ATM or debit cards and limit liability
for unauthorized purchases or withdrawals
using ATM or debit cards. 15 U.S.C. § 1693 et
seq., 12 C.F.R. § 205.
35
36. Civil Liability -- Federal Statutes Re: Credit Billing and
Credit Reporting (Source, inter alia, CLARO)
• The EFTA sets forth three tiers of liability for unauthorized ATM or debit card uses:
• If the victim reports an ATM or debit card as lost or stolen within two business
days after she realizes the card is missing, she will not be responsible for more
than $50 total for unauthorized use. 12 C.F.R. § 205.6(b)(1).
• If the victim fails to report the lost or stolen card within two business days after
realizing the card is missing or stolen, but does report its loss within 60 days after
her statement is mailed to her, she could lose as much as $500 based on
unauthorized transfers. 12 C.F.R. § 205.6(b)(2).
• If the victim fails to report an unauthorized transfer within 60 days after her
statement is mailed, she risks unlimited loss and could lose all the money in her
account and the unused portion of her maximum line of credit established for
overdrafts. 12 C.F.R. § 205.6(b)(3).
36
37. Civil Liability -- Federal Statutes Re: Credit Billing and
Credit Reporting (Source, inter alia, CLARO)
CORRECTING ERRORS WITH ATM & DEBIT CARDS
In the event of an error in the victim’s account because of a fraudulent
transaction or the unauthorized use of an ATM or debit card, she should:
• promptly call the financial institution and point out the error, no later
than 60 days after the statement containing the error was sent
• follow-up in writing, by certified letter, return receipt requested, to
prove the institution received notice of the error
• After receiving notification of the problem, the financial institution has 10
days to investigate, must inform the victim of the results within three
business days after completing the investigation, and must correct
inaccurate information. 12 C.F.R. § 205.11(c).
37
38. Civil Liability -- Federal Statutes Re: Credit Billing and
Credit Reporting (Source, inter alia, CLARO)
FCBA: Fair Credit Billing Act (FCBA), 15 U.S.C. §§
1606-1666a
• Identity thieves often make unauthorized charges
on consumers’ credit card accounts.
• This may happen either when they steal the
actual credit card or obtain the credit card
number through other means.
• Victims of identity theft then would have errors
on their credit card statements caused by these
unauthorized charges.
38
39. Civil Liability -- Federal Statutes Re: Credit Billing and
Credit Reporting (Source, inter alia, CLARO)
• The Fair Credit Billing Act, 15 U.S.C. § 1601,
(FCBA) establishes procedures for resolving
billing errors on consumer credit card
accounts, including fraudulent charges on
accounts that have been caused by identity
theft. FCBA §§ 161-162, 15 U.S.C. §§ 1666-
1666a.
39
40. Civil Liability -- Federal Statutes Re: Credit Billing and
Credit Reporting (Source, inter alia, CLARO)
• Note: The FCBA applies only to “open ended”
credit accounts, such as credit cards and
revolving charge accounts (e.g. department
store accounts).
• It does not cover installment contracts, such
as loans or extensions of credit that
consumers repay on a fixed schedule.
40
42. Players in the
Consumer Reporting Game
Creditor #1
Pot. Creditor #2
Consumer CRA
Potential creditor requests report from CRA
42
43. Powerful Rights: Private Causes of
Action Pursuant to FCRA
dfadfad
Choose Wisely:
The FCRA Dispute Triangle
(a.k.a. The Rabbit Hole)
Furnisher (Creditor)
Consumer CRA
Valid Dispute: Consumer Disputes Directly with CRA and
CRA Transmits Creditor’s Response to Consumer
43
44. Dispute Letter
See handout
• Redacted ID Theft Dispute Letter
• Note:
–The substance of the letter
–Supporting documents
–If the credit report errors are not
fixed, who does the client sue and
why?
44
45. Credit Report Fallout -- After the
Urgent Issues . . .
Dispute Letter -- what to include pursuant to
§1681c-2(a)
• Appropriate proof of the identity of the consumer
• A copy of that identity theft report (police report
+ affidavit)
• Identification of such information by the
consumer
• Statement by the consumer that information is
not information relating to any transaction by the
consumer
45
46. I also include several handwriting samples
I, ID THEFT VICTIM, have presented my driver's license in person to the Notary Public
listed below and now affix my signature before the same Notary Public:
______________________________
ID THEFT VICTIM
Sworn to before me this _____ day
of ____________________, 2016
_______________________________
(Notary Public)
46
47. FCRA Referral to Private Attorney
State law issues
• Motion to vacate default judgments obtained by
creditors
• Debt defense in suits brought by creditors
• Affirmative claims against ID thief
• Affirmative claims against entity that failed to protect
confidential info
47
48. FCRA Referral to Private Attorney
Causes of action against bureaus and creditors
• 1681e(b) -- depending upon strength of ID theft
• 1681c-2(a) -- if did not block info within 4 days of
receipt of police report
• Reinvestigation claims -- 1681i and 1681s-2(b)
• If you disputed it and included relevant info, then have
a good case against CRA
• Through discovery, you will learn what they did and did
not do against furnishers,
• FDCPA claims
• Also possibly conversion law claim
48
49. Defenses
• Possible defenses
– They did a reasonable investigation
– There was not really ID theft
• Thus, best to understand well the actual theft
• Who did it is important, but the where it happened is
possibly more important
• Spending spree within a short period of time / location?
• Perhaps can get surveillance videos, etc.
• Perhaps can show that this many transactions could not
have happened by one person (moving company case)
49
50. Remember
1. Prevent
2. Investigate
3. Contact Law Enforcement
4. Act Quickly
5. Contact a Private Attorney if Not Resolved
Adam G. Singer
Law Office of Adam G. Singer, PLLC
NYC: 60 E. 42nd Street, Suite 4600, New York, NY 10165
Rockland: 254 S. Main Street, Suite 516, New City, NY 10956
Westchester: 445 Hamilton Avenue, Suite 1102, White Plains, NY 10601
T: 212.842.2428
F: 212.658.9682
E: asinger2@alumni.law.upenn.edu
L: www.linkedin.com/in/adamgsinger
50