Compromised Identity Claim

Slides:



Advertisements
Similar presentations
Completing a new DBS Form: Guidance notes for Safeguarding Officers June 2013.
Advertisements

Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
© 2008 Brigham Young University–Idaho. Teacher Certification for the State of Idaho 1.Why should I certify in the State of Idaho? Reciprocal agreements.
South Carolina College of Pharmacy Board Application Process USC Campus.
COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
Post Completion OPT Manisha Pai.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft By: Nakeisha Barnett Thursday 2-3:15 3/4/06.
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up © 2009.
IDENTITY THEFT Protecting your credit. Identity Theft Do you : Receive several offers of pre-approved credit every week? Not shred them before putting.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Georgia Department of Labor IDENTITY THEFT Presenter: Racquel Robinson.
ICHAT is the only public resource for non-fingerprint-based Michigan criminal history background checks.
Welcome to the ICHAT The Michigan State Police Internet
What Happens Next? Financial Aid 101 Mila Tappan, FAME Outreach Representative October 10, 2008.
Customer Service Module Course Contents Table of Contents Enter A Request Search A Request Create Invoice (Funeral home request) Search Invoice Manage.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
HOW TO REGISTER A TEAM Version 1.04 Rev Season 1v1.04 Rev ASA’s Online Registration.
Part One: APPLICATION FOR EMPLOYMENT- CLASSIFIED SERVICES How to Complete and Submit a Torrance Unified School District Application Form.
Part One: APPLICATION FOR EMPLOYMENT- CLASSIFIED SERVICES Click here to start the presentation.
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
Deferred Action for Childhood Arrivals Penn for Immigrant Rights.
Call HHS Employee Service Center for Assistance
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
FBI Fingerprint Criminal History Check Guide
Employee Law Module What you need to do to protect credit history and the documents that you will need for employment. The information in this module comes.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
WHEN BAD THINGS HAPPEN TO GOOD NAMES IDENTITY THIEVES FRADULENTLY USE YOUR PERSONAL INFORMATION TO.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
4-H Leader Training 4-H On-Line Orientation. The Basics of 4-H Online 4-H Online is located at: There are help sheets for members,
How to Register a League Version 1.02 Rev RegisterASA.com 2012 Season 1v1.02 Rev
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Access Online Cardholder Transaction Approval Training 1 Client Logo.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
HPHConnect New User Registration Tutorial A Guide for Harvard Pilgrim Providers August 2005.
Post Completion OPT ITU Admissions. Topics Covered  What is OPT  Who is Eligible  How to Apply  When to Apply  Forms  Mailing your Application 
HEALTHY YOUTH SURVEY 2016 SURVEY COORDINATOR TRAINING.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
CLEARING YOUR CRIMINAL RECORD. FIRST THINGS FIRST  GET A COPY OF YOUR CRIMINAL RECORD TO MAKE SURE EVERYTHING IS ACCURATE.  YOU SHOULD CHECK THAT CHARGES.
1 Identity Theft Prevention and the Red Flag Rules.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
How to CORRECTLY Complete a TEASE Access Request Form.
THIS TRAINING IS REQUIRED IN ORDER TO OBTAIN SECURITY TO INITIATE HIRING PACKETS FOR NEW EMPLOYEES. Hire Xpress User’s Training NAU’s Automated Hiring.
By Amanda Cowan.  When another person steals your information and uses it to commit fraud or other crimes  The information stolen can be:  Credit Card.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
I-9 Instructions and FAQs
IDENTITY Theft Financial Literacy Identity Theft.
When you get caught for Identity Theft
Protecting Your Identity:
Presented (insert date) By (insert organization’s name)
Presented (insert date) By (insert organization’s name)
Presented (insert date) By (insert organization’s name)
Record Review and Challenge
The WSP Notice of Arrest
What is BankMobile? A process to select how to receive student refunds and student payroll payments It is fast, secure, and convenient. Go to:
Healthy Youth Survey 2018 Survey Coordinator Training
Healthy Youth Survey 2018 Survey Coordinator Training
Protecting Your Credit Identity
Vendor Management: New Vendor Request Processing
Healthy Youth Survey 2018 Survey Coordinator Training
Background checks are required by state and federal law prior to CA/DCYF staff authorizing an individual (other than a parent) to have unsupervised access.
Background checks are required by state and federal law prior to DCYF staff authorizing an individual (other than a parent) to have unsupervised access.
Presentation transcript:

Compromised Identity Claim The Washington State Patrol’s solution for victims of identity theft

Criminal records division criminal history support unit Jamie Arras Jenny Nashleanas

The Federal Trade Commission, for the 15th consecutive year, has listed identity theft as the #1 complaint. An identity is stolen every 2 seconds in the Us

In 2014, there were 332,646 complaints of identity theft nationwide. IN 2014, WASHINGTON STATE RANKED 2ND IN THE NATION FOR MOST IDENTITY THEFT COMPLAINTS.

Why the need for a cic? Someone giving false information upon arrest. Many people are victimized by “friends” or relatives. Alias names remain on the “bad guy’s” record, thereby linking the “good guy” to their criminal history information. Common names -sometimes there just are two Bob Johnson’s. WASIS will give results for similar names and/or dates of birth.

evolution of the cic Started in 1972 with the Personal Identification letter. In 2011 introduced the CIC card. Since the CIC program was initiated in March 2011, 458 identity cards and letters have been issued.

Previous Personal ID – the old way Letter only! The original Personal ID letter notified the individual: Of their newly established or verified SID number It explained to anyone reading it that the SID was established (or verified) at the request of the subject either: because the subject may be a victim of ID theft OR because the subject chose to secure easy ID in case of death, injury, amnesia, etc. It advised that future background checks should be verified with a thumbprint or fingerprints. When did this start and when did we switch to the new CIC card? Started w/new card in 2011

Current Cic program What you get now . . . Card Letter Personal ID will now show up on a background check

COMPROMISED IDENTITY CLAIM – THE card Thumbprint Photo SID Front Name DOB Explanation of CIC card Back Card is covered in tamper evident film (with WSP logo), laminated and returned to the claimant

Compromised Identity Claim – the Letter The CIC letter returned to the claimant with the card gives more detailed information than the previous letter. It provides the SID number – briefly explaining the significance of a SID number. Specifically addresses the other individuals on the candidate list and states the claimant’s fingerprints do not match. Mentions identity theft as one of the reasons for a CIC card and provides the Criminal History Support Unit’s phone number for questions.

The Personal ID and CIC are voluntary – a person may request to have the personal identification information removed from the WSP records at any time. If a claimant already has a Personal ID on file and would like to upgrade to a CIC, they may do so at no extra charge. If the CIC card is lost or stolen, the claimant must go through the entire process again, including paying the $26.00 fee.

The CIC works only for criminal records, it doesn’t help: Victims of financial fraud – stolen credit cards/checks Victims of insurance fraud or medical identity theft Those trying to clean up their driving records Those who don’t have someone with a similar name or who are using their name/DOB

Who the cic card will help: Those with common names or are victims of identity theft AND get run frequently through the WATCH system. - Volunteers for the school district or other organizations - Jobs that require yearly background checks - Those seeking employment. Many jobs require a background check to be hired - Those trying to rent an apartment or house - Those that work in health care or other services that have background checks run through DSHS - Those looking to adopt or be foster parents

mr. wheeler’s story

How the cic card helped mr. wheeler “ I was very grateful and told her how thankful I was and I appreciated everything she did. It was a blessing.” Mr. Wheeler Source: FOX Q13 news article – September 19th, 2010

WATCH 101 – THE 4 Possible WATCH returns WHEELER W/ NO CIC CARD WHEELER W/ A CIC CARD COMMON NAMES

What happens when you run someone who has had their identity stolen? It depends . . . If one person has an established SID and the other does not – the person running the check will only get the results for the established SID. Real Mr. Wheeler Not in system – no results can be returned Fake Mr. Wheeler WA99999999

Exact Match Available – only one name in the system WHEELER W/ NO CIC CARD Results if victim does NOT have CIC card

Candidate list - Exact Match available WA99999999 *“WHEELER”, BAD GUY * means search was matched on an alias name Clicking on SID will give you the RAP sheet for that person

Imposters real name ************************************************************************MASTER INFORMATION ************************************************************************ NAME: BADGUY, IMA REALLY DOB: 1/30/1962 SID NUMBER: WA99999999 FBI NUMBER: 123456AB7 DOC NUMBER:   ************************************************************************PERSONAL INFORMATION ************************************************************************SEX RACE HEIGHT WEIGHT EYES HAIR PLACE OF BIRTHCITIZENSHIP M U 602 230 BRO BRO WA US OTHER NAMES USED OTHER DATES OF SOC SEC MISC NUMBER BEAR, TED E BIRTH USED NUMBER WHEELER, MR 1/23/1945 555-22-4444 DNA TAKEN: Y DNA TYPED: Y WATCH REPORT FOR WA99999999

Both subjects have state ids Fake Mr. Wheeler WA99999999 Real Mr. Wheeler WA22222222

Possible duplicate match multiple names in the system WHEELER W/ NO CIC CARD WHEELER W/ A CIC CARD Results when victim DOES have CIC card

Duplicate match report WHEELER, MR DOB 1/23/45 SEX M RAC U

If your applicant has a Compromised Identity Claim (CIC) on file with the Washington State Patrol . . . Fax or e-mail: 1) a copy of their CIC identification card 2) with this Web Search Transcript to receive the RAPSheet associated with the SID number on the CIC card.

THUMBPRINT COMPARISON PROCESS WATCH SEARCH PRINTS MATCH AN EXISTING SID & CONVICTION RAP IS RETURNED TO REQUESTOR TECH PERFORMS THUMBPINT COMPARISON DUPLICATE MATCH PRINTS DON’T MATCH A CONVICTION RECORD & “NO RECORD” IS RETURNED TO REQUESTOR SUBMIT THUMBPRINT

EXAMPLE OF RAP SHEET WHERE PERSON HAS CIC WATCH would send this back after receiving the copy of the CIC card and duplicate match report. *********************************************MASTER INFORMATION ********************************************* NAME: WHEELER, THE REAL MR DOB: 1/23/1945 SID NUMBER:WA22222222 FBI NUMBER: DOC NUMBER:  ********************************************* PAGE 1

APPLICANT INFORMATION **************************************************** APPLICANT INFORMATION TYPE: PERSONAL IDENTIFICATION DATE: 01/21/2015 FINGERPRINT REASON: PERSONAL IDENTIFICATION – HC NAME USED: WHEELER, THE REAL MR CONTRIBUTING AGENCY: WAWSP0000 WA STATE PATROL  *************************************************** PAGE 2

Candidate list If the person uses (or has) a name that is just similar, but not an exact match to another person – the person running the check will get a “Candidate List” and will be able to see multiple SIDs. Common names are susceptible to candidate lists. WA12345678 12/3/45 WA23456789 1/23/45

Compromised Identity Claim Packet Includes: Instructions for Claimant and LE Compromised Identity Claim Form Personal Id Fingerprint Card CIC FAQ’s Brochure What is a State ID (SID) number? What can I do before a background check is run?

Compromised Identity Claim Form

Law Enforcement’s Role What to do when a victim walks into your office with a CIC packet LE instructions are clearly labeled at the bottom of the instructions sheet: Verify persons identity (w/ photo ID) Fingerprint person – full set on card and thumbprint in space provided on form Sign the fingerprint card Fill out all shaded areas of the CIC form Have claimant sign and date card and form Make sure all necessary forms, fees, photo, etc. are in envelope and mail to address given. CIC applications are rejected if not received from a law enforcement agency!!

It’s easy – but be thorough Follow the instructions: Fill in the shaded areas. Make sure all required fields are filled out (marked with an *) by LE and claimant Reasons for rejection: No fee No photo All areas not filled out Not mailed by LE agency CALL US WITH ANY QUESTIONS 360-534-2000 opt. 5 Or email crimhis@wsp.wa.gov

Mail packet to wsp Law Enforcement Agency Identification & Criminal History Section Washington State Patrol ATTN: Criminal History Support Unit Olympia, WA 98504-2633 PO Box 42633

Comes with letter stating who the claimant is and who they are NOT. the cic card and letter Wallet sized laminated card with claimants name, DOB, thumbprint and SID. Comes with letter stating who the claimant is and who they are NOT.

Random bits If the person’s maiden name or a different alias name are what is compromised – claimant will need to write a note on a separate piece of paper listing alternative alias names. Those names will be added to the letter (not the card). Warrants - FBI’s NCIC Identity Theft Victim File – report that local law enforcement takes and then adds to the Identity Theft Victim File

For questions contact the Criminal History Support Unit Phone: 360-534-2000 opt. 5 Email: crimhis@wsp.wa.gov

Questions?

 

No record found