Presentation is loading. Please wait.

Presentation is loading. Please wait.

Identity Crimes. Postal Inspectors Postal Inspectors protect the Postal Service, its employees and its customers from criminal attack, and protect the.

Similar presentations


Presentation on theme: "Identity Crimes. Postal Inspectors Postal Inspectors protect the Postal Service, its employees and its customers from criminal attack, and protect the."— Presentation transcript:

1 Identity Crimes

2 Postal Inspectors Postal Inspectors protect the Postal Service, its employees and its customers from criminal attack, and protect the nation’s mail system from criminal misuse.

3 Identity Crimes  9 to 10 million victims each year  $50 billion annual hit to the economy  No one is immune  Number of victims leveling off

4 Identity Theft & Identity Fraud  Identity theft involves acquiring key pieces of your identifying information without the victim’s knowledge.  Identity fraud occurs when thieves use the victims’ personal identifying information to order merchandise, obtain credit, or otherwise falsely represent themselves without the victim’s express consent.

5 Identity Crimes Are Attractive  Information is plentiful  Credit is in abundance  Absence of face-to- face contact with victims  Ability to vanish into cyberspace  Crooks are resourceful and patient

6 Technology and Identity Theft More than 80% of ID crimes today are attributed to electronic sources and the creation of fake identities through technology. Bank Technology News, March 2005 Although the Internet may facilitate certain types of identity theft, there is no hard evidence that consumers face a higher risk of identity theft by conducting business online. Besty Broder, Federal Trade Commission, August 2005

7 Internet Usage And ID Theft

8 Your Identity at Greatest Risk Source: FTC 2003 Identity Theft Study

9 How Identities are Stolen High Tech Methods  Phishing  Spyware and Key Logging  Skimming  Trojan Horses, Viruses and Worms  Hacking  Spamming Low Tech Methods   Automobile dealers, retailers, restaurants   Personnel Files   Dumpster Diving   Lost/Stolen Wallets and Checkbooks   Healthcare Records   Mail Theft

10 Most Common Low Tech Schemes  Dishonest employee with access uses or sells personal information  Unknown caller posing as a bank employee trying to verify a SSN and mother’s maiden name  Fraudster requests a victim’s credit report  Fraudster changes the address on your account to their address through the financial institution  Thief who steals your information during a burglary

11 Keys to Your Identity  Name  Address  Date of Birth  Driver’s License  Social Security Number  Mother’s Maiden Name  Account Numbers

12 Using Social Security Numbers  Why do you need it?  How will you use it?  How do you protect it from being stolen?  What will happen if I refuse to give it? Your employer, medical and financial institutions, as well as other businesses may ask for your Social Security Number. If someone asks, be prepared to ask them:

13 Counterfeit Documents  Drivers Licenses  Social Security cards  Credit reports  Birth certificates  Bank Statements  Student IDs  Company IDs Using personal information, the stolen identity is created and can be supported by counterfeit documents such as:

14 Counterfeiting Tools   Computer, monitor and keyboard   Color ink jet or color laser printer   Flatbed scanner   Commercially available software (VersaCheck, Adobe Photoshop, etc)   High quality paper and/or check stock

15 Types of Identity Crimes  Fraudulent Applications  Account Takeover  Merchant Fraud  Credit Card Fraud  Check Fraud

16 Attacking the Identity Crime Problem

17 General Prevention  Shred pre-approved credit applications, bills, & other financial information before discarding.  Empty your wallet of extra credit cards.  Memorize or secure your passwords and SSN. Don’t carry them around.  Never leave receipts behind at ATMs, merchants, banks, or gasoline pumps.  Check your credit report once a year for accuracy and fraud abuse.  Don’t use a date of birth as your password.  Never give personal information to a stranger.  Match receipts against financial statements.

18 Online Prevention  Don’t reveal personal information inadvertently  Don’t reveal personal details to strangers  Beware sites that offer some sort of reward or prize for your contact info  Become familiar with home computer security, including software solutions

19 Safeguarding Your Mail  Deposit mail at your local Post Office, in a collection box, or hand it to your letter carrier  Retrieve mail as soon as possible after delivery  Place your mail on hold with the Post Office if you are planning a trip  Report suspicious activity concerning mail to your local Postal Inspector

20 Safeguarding Your Mailroom  Three P’s of Mail Center Security  PERSONNEL  PLACE  PROCEDURES

21 Three P’s of Mail Center Security  PERSONNEL  Pre-employment screenings  Criminal records checks  Drug screenings  Credit history inquiries  Verify former employers  In-depth interviews

22 Three P’s of Mail Center Security  PLACE  Deter theft/reduce theft opportunities in the mailroom  Separate employee mail pick up area from the rest of the mail center  Access control  Enhance supervisor visibility  Reduce places of concealment  Use of video surveillance

23 Three P’s of Mail Center Security  PROCEDURES  Internal controls  Accountability for Registered Mail  Restrict access to postage stamps/meters  Use advance deposit accounts for BRM/postage due mail

24 Three P’s of Mail Center Security  PROCEDURES – Outgoing Mail  Securely deposit outgoing mail  Periodically cross check outgoing mail against customer order lists  Review mailing records of commercial mail preparation service

25 Three P’s of Mail Center Security  PROCEDURES – Incoming Mail  Assign authorized personnel to pick up mail  Update authorized list with Post Office as personnel change  Establish a process for misdelivered mail  Limit employees’ incoming personal mail  Post mail theft warning labels

26 Safeguarding Your Mailroom  Other considerations  Keep employee and customer records secure  Limit access of delivery drivers, maintenance, construction personnel, etc.  For high-value shipments, vary the times and direction of travel to the Post Office

27 Safeguarding Your Mailroom  If you suspect mail theft, contact: US Postal Inspection Service (410)

28  Identity Theft and Assumption Deterrence Act  Identity Theft Penalty Enhancement Act  Fair Credit Reporting Act (FCRA)  The Fact Act (FACTA)  Graham-Leach-Bliley Law Legislation

29 Will You Know if You are a Victim?   Statements or credit cards arrive for accounts for which you haven’t applied   Bills and other mail fail to arrive or are late   Credit is denied, or you are offered less favorable credit terms, like a high interest rate, for no apparent reason   Debt collectors contact you about merchandise or services you didn’t buy

30 Action Steps for Identity Theft Victims  File a report with your local police or the police in the community where the identity theft took place.  File a report with the Federal Trade Commission.  Report lost or stolen credit cards to the issuer immediately.  Consider changing account numbers, passwords, and PIN numbers immediately.  Advise the credit bureaus of your situation and consider placing a fraud alert on your account.  Request a copy of your credit report.  Alert your banks to flag your accounts and contact you to confirm any unusual activity.  Maintain a record of names and phone numbers of the people with whom you discussed your case, and all supporting documents.

31 Contacting the Credit Bureaus  Equifax Credit Bureau, Fraud  Experian Information Solutions  Trans Union Credit Bureau, Fraud

32 Report Identity Theft Cases The Federal Trade Commission Victims should be encouraged to report their complaints to: (877) – ID THEFT (877) – Or

33 Identity Theft Internet Resources  United States Postal Inspection Service  Federal Trade Commission’s ID Theft Center  Looks too Good to be True  Consumer Privacy Guide  Identity Theft: Prevention & Survival  Privacy Rights Clearinghouse

34 Identity Theft: Safeguarding Your Identity Publication 280  Prevention Tips  Recovery Steps Identity Crisis: Protect Your Identity  DVD Format  Spanish Subtitle  Free of Charge

35 Contact Information Frank J. Schissler US Postal Inspector PO Box 1856 Baltimore, MD


Download ppt "Identity Crimes. Postal Inspectors Postal Inspectors protect the Postal Service, its employees and its customers from criminal attack, and protect the."

Similar presentations


Ads by Google