identity theft. illegally obtaining personal information such as name, social security, drivers...

16
IDENTITY THEFT

Upload: randell-stewart

Post on 12-Jan-2016

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, email address, bank/credit

IDENTITY THEFT

IDENTITY THEFT

Page 2: IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, email address, bank/credit

Illegally obtaining personal information Illegally obtaining personal information

such as name, social security, drivers such as name, social security, drivers

license, or mothers maiden name, email license, or mothers maiden name, email

address, bank/credit account number in address, bank/credit account number in

order to engage in unlawful acts.order to engage in unlawful acts.

What is IDENTITY THEFT?What is IDENTITY THEFT?

Page 3: IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, email address, bank/credit

Florida Statute 817.568“Criminal Use of Personal Identification Information”

Florida Statute 817.568“Criminal Use of Personal Identification Information”

Went into effect July 1, 1999Went into effect July 1, 1999

Page 4: IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, email address, bank/credit

Three Major Forms of ID TheftThree Major Forms of ID Theft

• True Name Fraud – when a suspect uses a persons true name to open new accounts

• Account Takeover Fraud – they gain access to existing accounts

• Criminal Identity Theft – when a criminal provides victims information at arrest

Page 5: IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, email address, bank/credit

How Do Thieves Get My Information?How Do Thieves Get My Information?

They steal wallets and purses

They steal mail

They rummage through trash (“dumpster diving”)

They get your personnel records at work

They use personal information you reveal on the Internet

They complete a “change of address” card and divert your mail

They get your credit card information by posing as someone else

They find personal information in your home

They pay others to give them your personal information.

.

Page 6: IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, email address, bank/credit

Subject X hides behind a mask to protect his identity because of his work with law enforcement officials to

identify other identity theft cases. He faces 20 years for operating a credit card fraud

organization of 15 employees who stole $15-$20 million in houses, cars, computers, and jewelry.

Page 7: IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, email address, bank/credit

Skimming is a fraud committed when a customer’s credit card is used to pay for a legitimate transaction...

SkimmingSkimming

HOWEVER...HOWEVER...

...the card is diverted by an employee who swipes the cardthrough an illegally used device that stores the information from the card’s magnetic strip.

Page 8: IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, email address, bank/credit

What do Thieves Do with My Information?What do Thieves Do with My Information?

TheyThey establish phone or wireless serviceestablish phone or wireless service in your name.in your name.

They They open a bank accountopen a bank account in your name and write bad in your name and write bad checks on that account. checks on that account.

They They counterfeit checks or debit cardscounterfeit checks or debit cards, and drain your bank , and drain your bank account. account.

They They buy carsbuy cars by taking out auto loans in your name. by taking out auto loans in your name.

They They obtain fake drivers licenseobtain fake drivers license using your name or using your name or personal information (DOB/SS#, etc.)personal information (DOB/SS#, etc.)

They They obtain counterfeit documentsobtain counterfeit documents in your name (Birth in your name (Birth Certificates, Immigration Documents, etc.)Certificates, Immigration Documents, etc.)

Page 9: IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, email address, bank/credit

ASSOCIATED CRIMESASSOCIATED CRIMES

• Mail Theft

• Mail Fraud

• Narcotics/Drugs

• Organized Crime

• Financial Fraud/Money Laundering

• Mortgage Fraud

• Computer Crime/Network Intrusion

Page 10: IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, email address, bank/credit
Page 11: IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, email address, bank/credit
Page 12: IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, email address, bank/credit

What Additional Problems Do Victims Have?What Additional Problems Do Victims Have?

Credit card companies also cite Florida as a hotbed of

card counterfeiting and fraud, increasing exponentially

over the last three years.

Victims have to defend themselves as innocent victims to credit card companies and tracing companies.

Victims often face a non-responsive or inconsistent effort from law enforcement.

Page 13: IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, email address, bank/credit

Sentencing IssuesSentencing Issues

$5,000 or 10 or more victims

minimum mandatory of 3 years imprisonment

$50,000 or 20 or more victims

minimum mandatory of 5 years imprisonment

$100,000 or 30 or more victims

minimum mandatory of 10 years imprisonment

Crimes occurring after July 1, 2003Crimes occurring after July 1, 2003

Judge can still impose statutory maximum under the

Criminal Punishment Code

Page 14: IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, email address, bank/credit

How can I protect myself?How can I protect myself?

S. S. C.C. A.A. M.M.S. S. Be stingy about giving out your personal information to others unless you have a reason to trust them.S

C.C.

Check your financial information regularly, and look for what should be there and what shouldn't.C

A.A.

Ask periodically for a copy of your credit report. A

M.M.

Maintain careful records of your banking and financial accountsM

Page 15: IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, email address, bank/credit

Fair & Accurate Credit Act of 2003Fair & Accurate Credit Act of 2003

Consumer Advocate Act

• Consumer Reporting• Rights & privileges to

victims of ID theft• Assist in recuperating

losses and damaging

Rights & Privileges

• Single/one-call fraud alert on credit

• Right to one free credit report

• Ability to block information

Page 16: IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, email address, bank/credit

Identity Theft andAssumption Deterrence Act

18 U.S.C. 1028

Identity Theft andAssumption Deterrence Act

18 U.S.C. 1028

• Taking and using personal information to commit fraud

• Results in the loss of assets, creditworthiness and “good name”

• FTC - a central clearing house for identity theft complaints

The Act requires the FTC to log complaints, provide The Act requires the FTC to log complaints, provide victims with relevant information and refer them to victims with relevant information and refer them to

the appropriate entities (LE agencies)the appropriate entities (LE agencies)