“CYBERTRACKING – the new era of “SKIPTRACING” Ron L. Brown, IFCCE, MCE, CARS, CCCO CSI GROUP – OKLAHOMA CITY, OK.

Slides:



Advertisements
Similar presentations
Internet Safety Rockingham County Public Schools
Advertisements

Paper-based Reference Books Newspapers Periodicals Directories Maps etc Information that is stored by traditional means.
Communication is the way information is sent and received Business success depends on clear and effective communications within and between organisations.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
GT Printing and Electronics “Think outside the big box!” Your on-line printing and electronics super store!
LEARN COLLECT EXCEL Contacting the Debtor Gary M. Sabean.
Copyright © 2005 EFT Network, Inc. All Rights Reserved. Automated Recurring Payments Flexible Payment Solution.
1 Pre-Certification Pesticide Applicator Licensing Ruth Marston MN Dept. of Agriculture Spring 2007.
© 2014 ACA International. All Rights Reserved. Obtaining Optimum Compliance Performance Foundational Training on ACA’s Professional Practices Management.
Atlanta Region 5/4/2015All rights reserved1 IT Regulatory Update and Review Aasys User’s Group Conference December 8, 2009 Richard Snitzer Examination.
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up © 2009.
CONDO MANAGER The Leader in Association Accounting and Management Software Mailing Address: P.O. Box Charlotte, North Carolina Web Site
How to register a tournament online Step by step process.
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
1 From Filing Cabinet to Desktop and Network: Records Management in N.C. State Government Ed Southern Government Records Branch N.C. Office of Archives.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Chapter 5 Application Software.
NACM Gateway Credit Conference and Expo September 18, 2007.
1 Locate What Can You Do When You Have To Dig Deeper ERICSA 2011 Atlantic City, New Jersey.
How To Run a Small Side Business. Class Topics Introductions Introductions Background Background Prospects Prospects The Excellerator DJ Service The Excellerator.
An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Technology Solutions for New Jersey’s Government 1 VITAL Communications, Inc. Computer Services & Communication for New Jersey Government 900 South Broad.
Jeopardy! Credit Protection Laws Secured or Unsecured Credit Bureaus Selecting a card VocabularyMixed
PRESENTED BY GERMAINE CAREY-PALMER DILLARD UNIVERSITY.
ESCCO Data Security Training David Dixon September 2014.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
1 1 Fees, Billing, Collections, and Credit Lesson 1: Fees, Billing, Collections, and Credit.
Marketing Systems Group Southern California MRA Education Seminar Presentation September 17, 2005 Privacy and Current Issues.
Services Offered by LIRB. Outline For PLRB/LIRB Presentation I. What Services Does LIRB Provide? A. Coverage Analysis and Form Review B. Education & Training.
Important points and activities.  The objective is to secure life, property, information in the event of a disaster and to facilitate business continuity.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Overview of Internet Direct Marketing Chapter 15.
RECYCLE Recycle Compliance Tracking System PVK Corporation.
Merlin Information Services Collections Suite Angela Healy Major Accounts Manager Direct: Toll Free: ext.1573.
E-Drop box is an Electronic Cheque Drop Box that can be install at Branch premises or any other location to collect cheques from the customers with complete.
Patient Portal Friday, September 16, 2011 Larry Bradley Director, Patient Financial Services.
Social Impacts of IT. IT allows others to access information about you through social networking sites. Potential employers can check through Facebook.
Excel Electronic Membership Directions, Examples and Operational Hints. Created by: Jim Armbruster.
© Paradigm Publishing Inc. 5-1 Chapter 5 Application Software.
1 / 61 Using the Customer Support Web Site © 2006, Universal Tax Systems, Inc. All Rights Reserved. Customer Support Site Objectives –In this chapter you.
Telephone Checks Innovative, Flexible, and Convenient Payment Solution.
10 Insider Secrets on How to find the BEST Credit Repair Company DELETE ( )
ONE® Pages Training Presentation North York General Hospital.
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
Living Online Module Lesson 27 — Evaluating Online Information
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Teens lesson fourteen consumer privacy presentation slides 03/08.
© 2015 albert-learning.com Internet 101. © 2015 albert-learning.com Internet 101 Vocabulary  Browser - a program used to view the Internet.  Click -
 Computer News  Identity Guard  One meeting a month (2 nd Wednesday)  Website &  
Protecting Yourself from Fraud including Identity Theft Advanced Level.
1 Do More With Less: Techniques for Effective and Efficient Skip Tracing Presenters: Erin Collins, LexisNexis
Using the Web as an Investigation Tool Maureen Cahill University of Georgia Law Library
Question: Where can I find a free reverse phone lookup? Answer: It's hard to find free reverse phone lookup nowadays but you can find some good sites that.
INTERNET SAFETY, NETIQUETTE, AND COPYRIGHT LAWS By Alex Pagliaro.
Spending Plans Advanced Level G1 © Take Charge Today – August 2013 – Spending Plans – Slide 2 Funded by a grant from Take Charge America, Inc.
CHRIS LEEDOM. Why Use Textmaxx Pro? Optimized for Auto Dealership Environment – Convenient and Easy – drives customer experience – Open rates.
THE LOST ART & SCIENCE OF TRADITIONAL SKIPTRACING TECHNIQUES
How to Protect Yourself from ID Theft and Social Engineering
CYBERTRACKING and the LOST ART & SCIENCE OF TRADITIONAL SKIPTRACING
The CFPB’s Legal Minefield for CREDIT UNIONS
Top Shelf Property Management
Computers and Data Collection
Presented by Harry A. Strausser III Collections Industry Consultant
ONE® Pages Training Presentation
Traditional Skiptracing Techniques
Privacy and Information
Chapter 10: Privacy, Security, and Ethics
Unit# 5: Internet and Worldwide Web
Presentation transcript:

“CYBERTRACKING – the new era of “SKIPTRACING” Ron L. Brown, IFCCE, MCE, CARS, CCCO CSI GROUP – OKLAHOMA CITY, OK

ANYTHING, ANYTIME, ANYPLACE Why We Hunt #1 Tool of a Cybertracker 21 st Century Tracing Computers Communications Directories Sources of Data Speed of Data Security of Data Sources The Three Basic Needs Free Links Data brokers Additional Data Sites

“MAN HUNTING” “There is no hunting like the hunting of a man…and those who have hunted men and liked it have never cared for hunting anything else thereafter.” -Ernest Hemingway

WHY ??? In today’s collection and recovery tracing environment we cannot effectively locate consumers and collateral with out a thorough knowledge of the available technology,tools and trends. This ever changing technology includes but is not limited to knowledge of computers, communication equipment, sources of data and the laws which protect electronic data.

#1 TOOL OF A CYBERTRACKER The Human Mind Ability to “REASON” Ability to understand “WHY” Ability to “COUNTERMOVE” Ability to “USE ALL ABILITIES”

SECURITY OF DATA FDCPA FCRA / FACTA GLBA RED FLAG RULES TCPA TRPPA HIPAA HITECH

21st Century Tracing Computers Communications Directories Sources of Data Speed of Data Security Issues

COMPUTERS Links Databases Batch versus Advanced Searches Instant Messaging Public Records Maps

COMMUNICATIONS Landlines Answering Machines Cell Phones FAX Machines Berries

DIRECTORIES On The “NET” Traditional Hard Copies Out of the Box

SOURCES OF DATA PROPRIETORY DATA PROTECTED DATA Credit Applications Sub-Prime Data Lists Warranty Data Credit Bureaus Public Records

SPEED OF DATA Delayed Data Feed Real Time Data Feed Updates and Deletes

SOURCES Free Databases Telephone Directories Public Records Windows Pay Databases "Information Brokers” Public Records

THE “THREE” How do we utilize advanced technology to find what we all must have to survive… Shelter Food Transportation

THE “3” BASIC NEEDS Shelter Property Records, Tax Records, Utility Records, New Move Ins, Credit Bureaus, Insurance Records Food Utility Records, Welfare Records Transportation Warranty Records, Registration Records, Accident Records, Insurance Records

FREE LINKS TO SOURCES

US and International Intelligence and Military Databases 80+ US Data Sites Courts-FBI-US Marshal-FINCEN- Customs All Branches of the US Military Services All US Regulatory Agencies National Archives and Records Interpol

Reverse Look-ups Phone Directories State Records Federal records Mail Drops Businesses News Search Death Records Skip Trace Sites Bank Records Aviation Records Vessel Records

DATA BROKERS How current is the data Where did the data come from Was it legally obtained How often is the data updated What is the support system How easy is the data interpreted

AXCIOM INSIGHT COLLECT Current data Flat rate per user Sub prime sources Excellent search engine

LEXIS-NEXIS ACCURINT Current data Annual Fee + Pay Search Data must be analyzed Extensive supply of data Contact: Michael Burke

MASTERFILES Current data Very effective search engine Batch File Processing Contact: Alex Price

Other Sites of Value FASTDATA Facebook MySpace Twitter Linkaden Plaxo

Additional Data Sites

#1 TOOL OF A CYBERTRACKER The Human Mind Ability to “REASON” Ability to understand “WHY” Ability to “COUNTERMOVE” Ability to “USE ALL ABILITIES”

GOOD LUCK & GOOD HUNTING