Presentation on theme: "Identity Crimes. Postal Inspectors Postal Inspectors protect the Postal Service, its employees and its customers from criminal attack, and protect the."— Presentation transcript:
Postal Inspectors Postal Inspectors protect the Postal Service, its employees and its customers from criminal attack, and protect the nation’s mail system from criminal misuse.
Identity Crimes 9 to 10 million victims each year $50 billion annual hit to the economy No one is immune Number of victims leveling off
Identity Theft & Identity Fraud Identity theft involves acquiring key pieces of your identifying information without the victim’s knowledge. Identity fraud occurs when thieves use the victims’ personal identifying information to order merchandise, obtain credit, or otherwise falsely represent themselves without the victim’s express consent.
Identity Crimes Are Attractive Information is plentiful Credit is in abundance Absence of face-to- face contact with victims Ability to vanish into cyberspace Crooks are resourceful and patient
Technology and Identity Theft More than 80% of ID crimes today are attributed to electronic sources and the creation of fake identities through technology. Bank Technology News, March 2005 Although the Internet may facilitate certain types of identity theft, there is no hard evidence that consumers face a higher risk of identity theft by conducting business online. Besty Broder, Federal Trade Commission, August 2005
Internet Usage And ID Theft
Your Identity at Greatest Risk Source: FTC 2003 Identity Theft Study
How Identities are Stolen High Tech Methods Phishing Spyware and Key Logging Skimming Trojan Horses, Viruses and Worms Hacking Spamming Low Tech Methods Automobile dealers, retailers, restaurants Personnel Files Dumpster Diving Lost/Stolen Wallets and Checkbooks Healthcare Records Mail Theft
Most Common Low Tech Schemes Dishonest employee with access uses or sells personal information Unknown caller posing as a bank employee trying to verify a SSN and mother’s maiden name Fraudster requests a victim’s credit report Fraudster changes the address on your account to their address through the financial institution Thief who steals your information during a burglary
Keys to Your Identity Name Address Date of Birth Driver’s License Social Security Number Mother’s Maiden Name Account Numbers
Using Social Security Numbers Why do you need it? How will you use it? How do you protect it from being stolen? What will happen if I refuse to give it? Your employer, medical and financial institutions, as well as other businesses may ask for your Social Security Number. If someone asks, be prepared to ask them:
Counterfeit Documents Drivers Licenses Social Security cards Credit reports Birth certificates Bank Statements Student IDs Company IDs Using personal information, the stolen identity is created and can be supported by counterfeit documents such as:
Counterfeiting Tools Computer, monitor and keyboard Color ink jet or color laser printer Flatbed scanner Commercially available software (VersaCheck, Adobe Photoshop, etc) High quality paper and/or check stock
General Prevention Shred pre-approved credit applications, bills, & other financial information before discarding. Empty your wallet of extra credit cards. Memorize or secure your passwords and SSN. Don’t carry them around. Never leave receipts behind at ATMs, merchants, banks, or gasoline pumps. Check your credit report once a year for accuracy and fraud abuse. Don’t use a date of birth as your password. Never give personal information to a stranger. Match receipts against financial statements.
Online Prevention Don’t reveal personal information inadvertently Don’t reveal personal details to strangers Beware sites that offer some sort of reward or prize for your contact info Become familiar with home computer security, including software solutions
Safeguarding Your Mail Deposit mail at your local Post Office, in a collection box, or hand it to your letter carrier Retrieve mail as soon as possible after delivery Place your mail on hold with the Post Office if you are planning a trip Report suspicious activity concerning mail to your local Postal Inspector
Safeguarding Your Mailroom Three P’s of Mail Center Security PERSONNEL PLACE PROCEDURES
Three P’s of Mail Center Security PERSONNEL Pre-employment screenings Criminal records checks Drug screenings Credit history inquiries Verify former employers In-depth interviews
Three P’s of Mail Center Security PLACE Deter theft/reduce theft opportunities in the mailroom Separate employee mail pick up area from the rest of the mail center Access control Enhance supervisor visibility Reduce places of concealment Use of video surveillance
Three P’s of Mail Center Security PROCEDURES Internal controls Accountability for Registered Mail Restrict access to postage stamps/meters Use advance deposit accounts for BRM/postage due mail
Three P’s of Mail Center Security PROCEDURES – Outgoing Mail Securely deposit outgoing mail Periodically cross check outgoing mail against customer order lists Review mailing records of commercial mail preparation service
Three P’s of Mail Center Security PROCEDURES – Incoming Mail Assign authorized personnel to pick up mail Update authorized list with Post Office as personnel change Establish a process for misdelivered mail Limit employees’ incoming personal mail Post mail theft warning labels
Safeguarding Your Mailroom Other considerations Keep employee and customer records secure Limit access of delivery drivers, maintenance, construction personnel, etc. For high-value shipments, vary the times and direction of travel to the Post Office
Safeguarding Your Mailroom If you suspect mail theft, contact: US Postal Inspection Service (410)
Identity Theft and Assumption Deterrence Act Identity Theft Penalty Enhancement Act Fair Credit Reporting Act (FCRA) The Fact Act (FACTA) Graham-Leach-Bliley Law Legislation
Will You Know if You are a Victim? Statements or credit cards arrive for accounts for which you haven’t applied Bills and other mail fail to arrive or are late Credit is denied, or you are offered less favorable credit terms, like a high interest rate, for no apparent reason Debt collectors contact you about merchandise or services you didn’t buy
Action Steps for Identity Theft Victims File a report with your local police or the police in the community where the identity theft took place. File a report with the Federal Trade Commission. Report lost or stolen credit cards to the issuer immediately. Consider changing account numbers, passwords, and PIN numbers immediately. Advise the credit bureaus of your situation and consider placing a fraud alert on your account. Request a copy of your credit report. Alert your banks to flag your accounts and contact you to confirm any unusual activity. Maintain a record of names and phone numbers of the people with whom you discussed your case, and all supporting documents.
Contacting the Credit Bureaus Equifax Credit Bureau, Fraud Experian Information Solutions Trans Union Credit Bureau, Fraud
Report Identity Theft Cases The Federal Trade Commission Victims should be encouraged to report their complaints to: (877) – ID THEFT (877) – Or
Identity Theft Internet Resources United States Postal Inspection Service Federal Trade Commission’s ID Theft Center Looks too Good to be True Consumer Privacy Guide Identity Theft: Prevention & Survival Privacy Rights Clearinghouse
Identity Theft: Safeguarding Your Identity Publication 280 Prevention Tips Recovery Steps Identity Crisis: Protect Your Identity DVD Format Spanish Subtitle Free of Charge
Contact Information Frank J. Schissler US Postal Inspector PO Box 1856 Baltimore, MD