Expecting the Unexpected: Important Identity Theft Factors for State and Local Law Enforcement Donald Rebovich, Ph.D. Executive Director Center for Identity.

Slides:



Advertisements
Similar presentations
Red Flag Rules: What they are? & What you need to do
Advertisements

Lecture 1: The Discovery of White Collar Crime
Springfield Technical Community College Security Awareness Training.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Copper Theft Update Mayor and Council May 22, 2012.
TCLEOSE Course No th Legislature SB – 473; SECTION 8. Section , Occupations Code, is amended by adding Subsection (i) to read as follows:
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
1 Offender-Focused Hot Spots Policing Port St. Lucie, FL Police Department This project was supported by Grant No DB-BX-0002 awarded by the Bureau.
OUTLINE Why are measures of crime important? Crime Rates v. Amounts
2009 Strategic Highway Safety Plan Peer Exchange – SCOHTS Annual Meeting Kenneth L. Morckel National Outreach Rep. - NHTSA.
Volunteers – Background Screening Past Behaviors is the BEST Indicator of Future Behaviors.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Chapter 2 Modern Private Security
 The median annual wage for police and detectives was $56,980 in May The median wage is the wage at which half the workers in an occupation earned.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Brought to you by: Myles Banks and-security-investigationshttp:// and-security-investigations/
Criminal Investigation Internal Revenue Service Internal Revenue Service Criminal Investigation (Accountants with Guns) Andrew T. Hromoko, Jr. Special.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
Deviance, Crime and Social Control
Lesson 11 – Property Crime and Fraud Robert Wonser Introduction to Criminology Crime and Delinquency 1.
Statistical Report Mid-Year Detective Kenneth Sidenblad Criminal Investigation Division Bee Cave Police Department.
Campus Safety The Sullivan University System There were no hate crimes reported that fit any reportable crime bias categories. In accordance with the Crime.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act is the landmark federal law, originally known as the Campus Security.
Responding to a Security Incident Maryland Security Day March 2, 2004 Joy Hughes, CIO
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 ©2014 NEFE High School Financial Planning Program® | Lesson 2-5: Identity.
Presented by: Jay Maxwell CIO, AAMVA The Driver’s License: Finally, National Standards Presented by: Jay Maxwell CIO, AAMVA.
Ideal Jobs FBI. Field Criminal Justice Criminal Justice is study of the law and is mostly of thinking of the Criminal mind. Jobs: Local law Enforcement:
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
SSA, Todd Petrie The AMLA Presentation: 3/18/2009.
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Prevention and Early Intervention Linking Long-Term Vision with Short-Term Costs J effrey P oirier, B.A. M ary M agee Q uinn, Ph.D. American Institutes.
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Security Challenges Facing Seaport Operations Day 1 - Module 3.
EL PASO COUNTY DEPARTMENT OF JUSTICE SERVICES Dr. Henry Sontheimer Department Director & Criminal Justice Planner.
Kellie E. Tomeo, Esq Rampart International, LLC. AdvantageChallenge Increase existing security personnel productivity Increase existing facility personnel.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
Learn how you can provide effective assistance to identity theft victims in your community.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 (C)2012 National Endowment for Financial Education | Lesson 2-5 Identity.
Source: John Jay College calculations of national arrest estimates using data from Crime in the United States, 1980 through Washington, DC: Federal.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Finance & Finance Law. What is finance? Finance describes the act of providing money, capital or other financial resources to assist in facilitating a.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Unit 4 Dr. Marie Mele. Topics to Discuss Ability of people to make rational choices How people weigh the risks and rewards of engaging in crime How the.
Fraudulent and Questioned Documents. Top 5 Countries Originating Fraud.
Oregon DMV Fraud Prevention Program Tom McClellan, DMV Administrator.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
Protecting Your Assets By Preventing Identity Theft
Building a Narcotics Case
Emerging Payments Market Developments: Trends and Risks James Van Dyke, President and Founder Presented at the Federal Reserve Bank of Atlanta, November.
Preventing Hate Crimes
Crimes against Property
AN OVERVIEW OF LAWS RELATED TO ECONOMIC OFFENCES
Colorado State University CSA Training
Red Flags Rule An Introduction County College of Morris
Protecting Yourself from Fraud including Identity Theft
Identity Theft Prevention Program Training
Colorado State University CSA Training
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Colorado State University CSA Training
OUTLINE Why are measures of crime important? Crime Rates v. Amounts
Identity Theft and Credit Safety
Presentation transcript:

Expecting the Unexpected: Important Identity Theft Factors for State and Local Law Enforcement Donald Rebovich, Ph.D. Executive Director Center for Identity Management and Information Protection, Utica College 2008 Economic Crime Institute Conference October 23, 2008

Center For Identity Management And Information Protection Research goals: Trends, causes, early detection, and prevention of identity fraud and theft Trends, causes, early detection, and prevention of identity fraud and theft Impact of policy decisions, legislation, and regulatory actions Impact of policy decisions, legislation, and regulatory actions Improved identity authentication systems Improved identity authentication systems

Center for Identity Management and Information Protection Recent Research Recent Research Bureau of Justice Assistance (BJA) – United States Secret Service Study Quantitative and qualitative analysis of a sample of closed Secret Service criminal cases ( ) to detect and synthesize patterns as they relate to identity fraud and theft. Results released in October, 2007

“Identity” – What is it? “Identity” – What is it? Do you “know” who your are?Do you “know” who your are? Do we “know” who you are?Do we “know” who you are? Do we sufficiently protect our identities?Do we sufficiently protect our identities? Have we become complacent about identity protection?Have we become complacent about identity protection? Do we play an indirect role in “enabling” identity thieves?Do we play an indirect role in “enabling” identity thieves?

I dentity Theft – Who Protects Us? I dentity Theft – Who Protects Us? What role does the federal government play?What role does the federal government play? What role does local/state enforcement play?What role does local/state enforcement play? Is local/state enforcement “sensitized” to identity theft enforcement?Is local/state enforcement “sensitized” to identity theft enforcement? How does enforcement respond to identity theft “red flags”How does enforcement respond to identity theft “red flags”

U.S. Bureau of Justice Assistance Study: Patterns and Trends of Identity Theft The following research material is derived from: “Identity Fraud Trends and Patterns: Building a Data-Based Foundation for Proactive Enforcement” by Gordon, Rebovich, Choo and Gordon. Economic Crime Institute Annual Conference, (October 22, 2007). “Identity Fraud Trends and Patterns: Building a Data-Based Foundation for Proactive Enforcement” by Gordon, Rebovich, Choo and Gordon. Economic Crime Institute Annual Conference, (October 22, 2007). Report available at

U.S. Bureau of Justice Assistance Study: Patterns and Trends of Identity Theft First empirical study of identity theft cases in U.S. 517 U.S. Secret Service cases from Offender, offense and case process variables Objective: Apply results to improve control efforts

U.S. Bureau of Justice Assistance Study: Patterns and Trends of Identity Theft Released in October, 2007 Some results: Most victims did not know the offenders 1/3 of cases started at offender’s job 42% involved organizational crime Median loss was $31,356

Local/State Police Referral Cases Close to half of the cases were referred from local and state law enforcement (246) Some results: Similar to “Non-local” cases in most areas More outside of Northeast Greater percentage of two-person offender “teams” Comparatively narrow range of losses

Local/State Police Referral Cases Some results: Greater overlap with forgery and drug crime Greater percentage of cases that originated with the investigation of cases outside of the economic crime arena

Average Loss Per Case The median dollar loss among the local/state cases was $30,726. Dollar loss varied with the number of defendants in the case Offenders Median Loss 1$22,344 2$34,474 3$18,000 4$50,000 5$77, $76,000

Who Are The Offenders?? They are “criminal opportunists” They search for the easiest route to profits They specialize their criminal services They “adapt” well to control efforts They have all the time in the world

The Offenders: Arrest History 30.7% -- no arrest history 30.7% -- no arrest history Of the arrests: Of the arrests: 26.6%: larceny or theft. 26.6%: larceny or theft. 36.7%: fraud, forgery, or ID theft 36.7%: fraud, forgery, or ID theft

Situational Patterns Of Identity Theft Routine Professional

Situational Crimes of Opportunity Patterns Of Identity Theft Routine Professional

The Role of “Insiders” Of the total 246 local/state cases, 65 involved offenders who accessed personal identifying information at their place of employment. Of the total 246 local/state cases, 65 involved offenders who accessed personal identifying information at their place of employment. The employees victimized: Retail – 27 Retail – 27 Private Company – 17 Private Company – 17 Bank/Credit Union – 7 Bank/Credit Union – 7 Government Agency - 3 Government Agency - 3 Education – 3 Education – 3 Insurance – 3 Insurance – 3 Unavailable – 5 Unavailable – 5

IDENTITY THEFT RING DEVELOPMENT

Information “Insider”

IDENTITY THEFT RING DEVELOPMENT Information “Insider” RECRUITMENTRECRUITMENT RECRUITMENTRECRUITMENT

IDENTITY THEFT RING DEVELOPMENT Information “Insider” RECRUITMENTRECRUITMENT RECRUITMENTRECRUITMENT

IDENTITY THEFT RING DEVELOPMENT Information “Insider” RECRUITMENTRECRUITMENT RECRUITMENTRECRUITMENT

IDENTITY THEFT RING DEVELOPMENT Information “Insider” Theft Ring Director RECRUTIMENTRECRUTIMENT RECRUTIMENTRECRUTIMENT Demonstration of Ease (“Teasers”) Criminal Mentoring

IDENTITY THEFT RING DEVELOPMENT Information “Insider” Theft Ring Director Testing the “System” RECRUITMENTRECRUITMENT RECRUITMENTRECRUITMENT Demonstration of Ease (“Teasers”) Criminal Mentoring

IDENTITY THEFT RING DEVELOPMENT Information “Insider” Theft Ring Director Testing the “System” “Reaping the Rewards” RECRUITMENTRECRUITMENT RECRUITMENTRECRUITMENT Demonstration of Ease (“Teasers”) Criminal Mentoring

Insider Fake DL ID Fraud Fake Driver’s License as “Catalyst”

Insider Fake DL ID Fraud Info. Broker DL Tech. DL Tech. Fake Driver’s License as “Catalyst”

Insider Fake DL ID Fraud Tech. Skills Runners ID Fraud Fake Driver’s License as “Catalyst”

CRIMINAL DEVELOPMENT STAGES

Citizen Fraud Report OFFICER RESPONSE STAGES

Citizen Fraud Report Victim Theft/ Victim Manipulation OFFICER RESPONSE STAGES

Citizen Fraud Report Victim Theft/ Victim Manipulation Identity Conversion OFFICER RESPONSE STAGES

Citizen Fraud Report Victim Theft/ Victim Manipulation Identity Conversion Identity Theft Recognition OFFICER RESPONSE STAGES

Citizen Fraud Report Non-Fraud Report Encounter Victim Theft/ Victim Manipulation Identity Conversion Identity Theft Recognition OFFICER RESPONSE STAGES

Citizen Fraud Report Non-Fraud Report Encounter Victim Theft/ Victim Manipulation Identity Conversion Identity Theft Recognition Response to Original Offense OFFICER RESPONSE STAGES

Citizen Fraud Report Non-Fraud Report Encounter Victim Theft/ Victim Manipulation Identity Conversion Identity Theft Recognition Response to Original Offense Exposure to Identity Theft “Red Flags” OFFICER RESPONSE STAGES

Citizen Fraud Report Non-Fraud Report Encounter Victim Theft/ Victim Manipulation Identity Conversion Identity Theft Recognition Response to Original Offense Exposure to Identity Theft “Red Flags” Officer Reaction to Case Factors OFFICER RESPONSE STAGES

Citizen Fraud Report Non-Fraud Report Encounter Victim Theft/ Victim Manipulation Identity Conversion Identity Theft Recognition Response to Original Offense Exposure to Identity Theft “Red Flags” Officer Reaction to Case Factors Inductive Assessment by Officer OFFICER RESPONSE STAGES

Citizen Fraud Report Non-Fraud Report Encounter Victim Theft/ Victim Manipulation Identity Conversion Identity Theft Recognition Response to Original Offense Exposure to Identity Theft “Red Flags” Officer Reaction to Case Factors Inductive Assessment by Officer ID Theft Recognition OFFICER RESPONSE STAGES

Laminating machines Bar Code Scanners Bar Code Rewriters Credit Card Embossing/Encoding Equipment Multiple Drivers Licenses Multiple Social Security Cards TOOLS OF THE TRADE

Multiple Vehicle Titles Blank Check Stock Drivers License Templates Check Producing Software Treasury Check Template Disks TOOLS OF THE TRADE

RECOGNIZING “RED FLAGS” Connecting the Dots Unusual behavior, circumstances, evidence Reports (Average Citizen, Service)

RECOGNIZING “RED FLAGS” Connecting the Dots Motor Vehicle Stops Narcotics Cases (e.g., trafficking, possession)

RECOGNIZING “RED FLAGS” Connecting the Dots Role of “chance” in routine calls/original offenses (e.g., disturbances, domestic violence, assault, burglary, loitering)

Questions In the present environment: How do we protect “Who We Are?” How do we prevent others from “Becoming Us?” How do we thwart the criminal relations and transactions leading to identity theft and identity fraud?

Identity Theft & Fraud Control Prevention Punishment/Deterrence

Identity Theft & Fraud Control Prevention Punishment/Deterrence Point of Theft Awareness Screening Monitoring

Identity Theft & Fraud Control Prevention Punishment/Deterrence Point of Conversion Document “Target Hardening” Point of Theft Awareness Screening Monitoring

Identity Theft & Fraud Control Prevention Punishment/Deterrence Point of Conversion Document “Target Hardening” Point of Theft Awareness Screening Monitoring Point of Fraud Awareness Verification

Identity Theft & Fraud Control Prevention Punishment/Deterrence Point of Conversion Document “Target Hardening” Point of Enforcement Coordination Awareness Point of Theft Awareness Screening Monitoring Point of Fraud Awareness Verification

Discussion