Police are not prepared for rising incidence of Identity Fraud By Chris DeVito.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

Let’s Get Financially Focused! Objectives Students will be able to: 1. Define credit. 2. Explain the negative impact that counterfeiting, forgery, fraud,
 In my opinion White- Collar Crime is worse well, not necessarily worse than street crime, but I believe white collar crime gets overlooked simply.
Prepared for: Presented by: Risky Business 2012 Conference Tony La Rosa, Manager Mid-Iowa Credit Counseling Park Fair Mall 100 E. Euclid Ave., Ste. 157.
By Derek Hahn Washington State Director of Finance and Ian Newby Lake Stevens Member In 3-D.
D ETER D ETECT D EFEND CiTiZEN. When Someone Uses Your Personally Identifying Information, Like Your Name, Social Security Number, Or Credit Card Number,
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
Robert Morgester Deputy Attorney General of California Deputy Attorney General of California.
1 Identity Theft Occurs “when the perpetrator wrongfully acquires and uses a consumer’s personal information, credit or account information.” –Used to.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft By:Annalee Vanfossen. What is Identity theft? Faking someone’s identity who is not yours Trying to achieve something while using fake identification.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
The U.S government should give harder sentences to identity theft convicted criminals. Rodolph Thermitus CIS 1055 Section 007.
1 Information and Systems Security/Compliance Security Day The Information and Systems Security/Compliance Program Dave Kovarik.
IDENTITY THEFT BY: Victoria Jeffcoat CSCI 101 Lecture Tuesday 2pm.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
A ID Theft & ACCOUNT FRAUD Welcome to MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP Prevention & Clean Up © 2011.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
Beware! Consumer Fraud Module 9.1.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
Discussion Topics What is Identity Theft? Ways to Commit Identity Theft How Identity Thieves uses Victim’s Information Guarding your personal Information.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Identity theft: Real or Virtual? By: Alex Metzler.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
IDENTITY THEFT. Identity Theft Defined When someone uses another person’s name, address, social security number, bank or credit card account number, or.
Identity Theft Andrew Schreiber Alex Demetriou Jessica Ferrell.
Be Cautious of Identity Theft By: Sydney Langley.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Identity Theft.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Identity Fraud By: Owen DeBalko. Explanation Identity fraud means the fraudulent use of an individual's identifying information to commit crimes, unlawfully.
FOUR TYPES OF IDENTITY THEFT. 1. FINANCIAL IDENTITY THEFT  Just using your stolen credit card details to buy things is the example we all know about.
Identity Theft Project Erin L. Caraway Jacob Locke.
Kelly Herd Rebecca Hofeling IDENTITY THEFT AND PROTECTION Communication 2500.
Identity Theft The Dangers Involved and How It Affects You!
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
Identity Theft Tiffany Setzer & Cassie Conkwright.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Vocabulary 2.02 – Understanding Threats to Financial Security LIFE Gwishiri.
Identity Theft How it happens and how to avoid it.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
A m e r i c a n A s s o c i a t i o n o f I n s u r a n c e S e r v i c e s 1745 S. Naperville Road, Wheaton, IL Phone: | Toll.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
Identity Theft Project By: Timmy Townsend And Eric Fields.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
 Did YOU Know?!?  Tennessee is bordered by 8 states: Alabama, Arkansas, Georgia, Kentucky, Mississippi, Missouri, North Carolina and Virginia - more.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Computer Crimes Justin A. Sarvey. Overview Define computer crime Define computer crime Examples of computer crime Examples of computer crime Statistics.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
Chapter 9 Objectives 1.Explain how to dispute errors on billing statements 2. Explain the purposes and types of bankruptcy and list strategies for avoiding.
Identity Theft It’s a crime!
Freedom Independence Transition
When you get caught for Identity Theft
Protecting Yourself from Fraud including Identity Theft
Protecting Your Identity
Protecting Yourself from Fraud including Identity Theft
Freedom Independence Transition
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Police are not prepared for rising incidence of Identity Fraud By Chris DeVito

Identity Fraud: The Crime As stated in The Police Chief magazine: Identity Fraud, also known as Identity Theft, is “the wrongful use of another person’s identifying information, such as credit card, social security, and driver’s license numbers, to commit financial or other crimes.”

Identity Fraud: The Numbers As pointed out by Steven M. Martinez, Deputy Assistant Director of the FBI, “ More than 10 million Americans were victimized by Identity Theft in the space of one year, with estimated losses exceeding 50 billion dollars.”

Identity Fraud: How It Starts They steal mail or wallets Trick victims into giving the information over the telephone or by .(phishing) Buy information off the internet Hacking a victims computer that lack adequate protection Dumpster-diving for unshredded papers

Identity Fraud: The Problem As stated by Mari J. Frank, “Since most states do not have identity theft statutes-law enforcement rarely will even take a police report. Identity Fraud victims are told that they are not considered a victim under the law because it is the credit grantor who suffers the monetary loss. The credit grantor rarely prosecutes these cases since they have already lost large sums of money and do not want to waste the time and funds to seek court redress since they know that most impostors are not apprehended.”

The Problem cont. To quote President George W. Bush, “ An identity theft- -thief can steal the victim's financial reputation. Running up bills on credit card accounts that the victim never knew existed, the criminal can quickly damage a person's lifelong efforts to build and maintain a good credit rating. Repairing the damage can take months or years.”

The Problem cont. Also stated by Mari J. Frank, “Even if the perpetrator is caught, violent crime takes precedent and it probably won’t be prosecuted. If there is a conviction, and a short suspended sentence with probation is ordered, the credit grantor knows that any restitution ordered will rarely be paid. For the credit grantor, the bottom line is cost effectiveness. The losses are written off and charged back to consumers in higher interest rates and additional fees.”

Identity Fraud: The Challenge Quoting The Police Chief, “Law officers reported that very few identity theft cases are solved. The reasons give were the anonymity of the crime, the jurisdictional challenges, and the companies’ lax security measures and lack of cooperation with law enforcement.”

Identity Fraud: My Analysis Identity Fraud is a crime that is on the rise. Law enforcement agencies are ill prepared to take on this wave. Talks with a few people involved in law enforcement identified another problem. There is not enough man power or emphasis placed on the severity of this crime. Often times, there is only one or two people assigned to deal with all the computer and identity theft crimes at Local and County Law Enforcement Agencies.

Identity Fraud: The Future In my paper, I hope to go into even more depth on the topics I covered in this presentation, and also give some insight on what is being done, and what else needs to happen, to combat Identity Fraud.

Works Cited Bush, G.W. (2004, July 15). President Bush signs Identity Theft Penalty Enhancement Act. Executive Office of the President, (n.p.). Retrieved February 3, 2005, from SIRS Government Reporter Dadisho, E. (2005, January). Identity Theft and the Police Response: The Problem. The Police Chief, 72(1), Frank, M.J. (n.d.) Prepared Statement of Mari J. Frank In Support of S 512. Retrieved February 23, 2005, from Martinez S.M. (2004, September 22). Identity Theft and Cyber Crime. Federal Bureau of Investigation, (n.p.). Retrieved February 3, 2005, from SIRS Government Reporter