BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
Prepared for: Presented by: Risky Business 2012 Conference Tony La Rosa, Manager Mid-Iowa Credit Counseling Park Fair Mall 100 E. Euclid Ave., Ste. 157.
Identity Theft “When Bad Things Happen To Your Good Name” Federal Trade Commission.
Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Identity Theft “When Bad Things Happen To Your Good Name” El Camino Community College Police Department Sgt. Kirk Johnston Josh Armstrong.
Kimberly Castner-Scott. What is Identity Theft I Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully.
1 Identity Theft and Phishing: What You Need to Know.
Identity Theft. MIS Training Institute, Inc.Section X - Slide 2CS1 053 ©Network Security Services, LLC Outline n Definitions n Methods used n Ways to.
TCLEOSE Course No th Legislature SB – 473; SECTION 8. Section , Occupations Code, is amended by adding Subsection (i) to read as follows:
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Presented By The Plano Police Department Crime Prevention Unit.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Identity Theft “When Bad Things Happen To Your Good Name” Federal Trade Commission.
ARREST, SEARCH & SEIZURE
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Intermediate USE of FORCE
Protect Yourself from Identity Theft
Intermediate USE of FORCE
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
Materials Developed By: CLARIFI CLARIFI ID Theft & Scams Don’t be a Victim.
October 27,  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
BCCO PCT #4 PowerPoint AND HIV/AIDS & Viral Hepatitis In the Criminal Justice Profession TCOLE Course # 3804 UNIT TWO Texas Commission On Law Enforcement.
WHEN BAD THINGS HAPPEN TO GOOD NAMES IDENTITY THIEVES FRADULENTLY USE YOUR PERSONAL INFORMATION TO.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Security Awareness Identity Theft October Security Awareness. Identity Theft Someone acquires enough information about you to pose as you and.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
BCCO PCT #4 PowerPoint Texas Commission On Law Enforcement ADVANCED INSTRUCTOR COURSE # 1017 Hosted by Constable Robert M. BLOUNT PCT #4.
Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime,
BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
BCCO PCT #4 PowerPoint AND Intermediate USE of FORCE TCOLE Course # 2107 UNIT FIVE.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BCCO PCT #4 PowerPoint AND HIV/AIDS & Viral Hepatitis In the Criminal Justice Profession TCOLE Course # 3804 UNIT TWO Texas Commission On Law Enforcement.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Presented By Plano Police Department Crime Prevention Unit.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
BCCO PCT #4 PowerPoint AND COURSE TITLE TCOLE Course # UNIT ONE.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Identity Theft Officer Bill Roscop Mount Prospect Police Department.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Identity Theft How bad people get good credit. Lindsey Bertugli.
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
IDENTITY THEFT.
Identity Theft It’s a crime!
CHILD SAFETY CHECK ALERT LIST
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

ADMINISTRATIVE Please complete the BCCO PCT #4 Registration form and turn it in now. Make sure you sign TCOLE Report of Training (PID#, Full Name and DOB). All cell phones off please – pay attention to course materials and show common respect & courtesy.

About Your Instructor Course Facilitator - Mentor George D. Little A.S. & B.S. Criminal Justice & Sociology B.S.CJ Wayland Baptist University, San Antonio M.S. Criminology & Counter-Terrorism University of the State of New York 2012 T.C.L.E.O.S.E. Professional Achievement Award Certified Crime Prevention Specialist (C.C.P.S.) TCLEOSE Basic Instructor Certificate 1984 TCLEOSE Master Peace Officer 1991 MP Special Operations Operator Counter-Terrorism 1988 Graduate Drug Enforcement Administration Academy years Law Enforcement Experience 40-Years Teaching & Instructor Experience

COURSE/LESSON OVERVIEW Educational requirements for identity crimes training established by legislative mandate: SB473-(78Reg).

UNIT ONE

Learning Objectives Learning Objective 1.0 Learning Objective 1.0 : The Participant will be able to recognize the types of identity crimes. Learning Objective 1.1 Learning Objective 1.1 : The Participant will be able to provide a definition of identity crime. Learning Objective 1.2 Learning Objective 1.2 : The Participant will be able to identify types of crimes associated with identity crimes.

Learning Objective 1.3 Learning Objective 1.3 : The Participant will be able to list personal and financial identifiers. Learning Objective 1.4 Learning Objective 1.4 : The Participant will be able to identify currents trends associated with identity crimes. Learning Objectives

1.0 Defining Identity Crimes

1.1 Participant will be able to recognize the types of identity crime According to the Federal Trade Commission (FTC): 31,000 persons were victims of identity crime in During the first seven months of 2003, 131,000 Americans were victimized

If trends continue, by the end of 2003, those victimized will have increased almost 700% in three years. Texas is __________ in the nation in the number of instances of identity crime reported to the FTC.

2013 Statistics Total financial loss attributed to identity theft $24,700,000, % Misuse of Existing Credit Card 64.1% 35% Misuse of Existing Bank Account 35% 14.2% Misuse of Personal Information 14.2%

Identity Fraud & Incident Rate % % 20096% % % % %

1.1The student will be able to provide a definition of identity crime A.theft A. _________ ______ is the theft or misuse of personal or financial identifiers in order to gain something of value and/or facilitate other criminal activity.

B. B. Types of identity crimes include; 1. identity __________, 2. _______ ______/access device fraud (“skimming”), 3. __________ fraud, 4. ________ fraud, 5. false _______________ fraud, and 6. ______________/visa fraud. 1.1The student will be able to provide a definition of identity crime – Cont’d

1.2The student will be able to identify types of crimes associated with identity crimes In many instances an identity crime is used as a _______________, through financing or anonymity, to commit other criminal activities such as mail theft, mail fraud, narcotics/drugs, organized crime, financial fraud (money laundering), mortgage fraud, weapons trafficking

homicide, terrorism, wire fraud, or computer crime/Internet intrusions. Identity crimes can begin with other seemingly unrelated _________ such as robbery (e.g. purse snatching or mugging), computer intrusion, mail theft, theft of trash (“dumpster diving”), or theft of documents or information from businesses, medical facilities, hotels, etc.

1.3 The student will be able to list personal and financial identifiers Personal identifiers include Personal identifiers include: 1.________, 2.date of __________, 3._________ ___________ number, 4.____________,

Personal identifiers include – Cont’d: 5.__________ number, 6.__________ __________ number, 7.____________ number, 8.mother’s maiden name, etc. 1.3 The student will be able to list personal and financial identifiers – Cont’d

Financial identifiers include Financial identifiers include: 1.__________ ________ numbers, 2.________ ____________ numbers, 3.personal identification numbers (“PINs”), 4.__________ account numbers, etc. 1.3 The student will be able to list personal and financial identifiers – Cont’d

1.1.4 The student will be able to identify currents trends associated with identity crimes Some of the current trends associated with identity theft involve the usage of current ___________. This provides a unique challenge for consumers and law enforcement by testing their ability to keep up with technological advances and changes.

Some of the more recent scams involve stealing information by; __________ 1.listening in on conversations made on __________ ____________, ________________ 2.surreptitiously reading other people’s ________ and ________, The student will be able to identify currents trends associated with identity crimes

Some of the more recent scams involve stealing information by; 3.______________ 3.______________ into computers, _________ 4.conducting _________ and scams, and __________ ______________ 5.taking advantage of careless consumers’ online __________ and ______________ The student will be able to identify currents trends associated with identity crimes – Cont’d

Currently, the Identity Theft Resource Center, is an excellent website for obtaining information on new trends, scams and consumer alerts on identity crimes The student will be able to identify currents trends associated with identity crimes

24 DEFINE & PROCESS Process: Define 1.0: Define 1.0: Explain some current identity crime statistics

25 DEFINE & PROCESS Process: Define 1.1: Define 1.1: Explain and define identity crimes

26 DEFINE & PROCESS Process: Define 1.2: Define 1.2: Explain some types of crime identified with identity crimes.

27 DEFINE & PROCESS Process: Define 1.3: Define 1.3: Explain some personal and financial identifiers associated with identity crime

28 DEFINE & PROCESS Process: Define 1.4: Define 1.4: Explain current trends associated with identity crimes.

UNIT TWO How identity crime occur

Learning Objectives Learning Objective 2.0 Learning Objective 2.0 : The Participant will be able to recognize how identity crime occurs. Learning Objective 2.1 Learning Objective 2.1 : The Participant will be able to identify how identity crime is commonly perpetrated. Learning Objective 2.2 Learning Objective 2.2 : The Participant will be able to identify techniques used to procure false identification.

2.1. How identity crime is commonly perpetrated A. A. Identity crimes can occur if someone steals your wallet, purse, briefcase, etc., containing your 1.__________________ 1.__________________, 2._________ __________ 2._________ __________ card, 3.__________ 3.__________ cards, 4.__________ _____________ 4.__________ or _____________.

B. B. Identity crimes can occur if someone steals your 1.________ 1.________, 2.especially your bank and credit card _________________, ___________ 3.pre-approved ___________ offers, ____________ 4.new ____________, or 5.________ 5.________ information How identity crime is commonly perpetrated – Cont’d

C. _____________________ C. Identity thieves can complete a “__________ of ___________ form” to divert your mail to another location. D. ______________ D. Identity thieves may rummage through your trash or the trash of businesses to find personal data (also known as “______________ diving”) How identity crime is commonly perpetrated – Cont’d

E. _________________ E. Identity thieves may fraudulently obtain your credit report by posing as a ________, _________, or someone else who may have a legitimate need for (and legal right to) the information. F. _____________ F. Identity thieves can find _____________ information in your home How identity crime is commonly perpetrated – Cont’d

G. ___________ G. Identity thieves may obtain personal information that you share on the ___________ How identity crime is commonly perpetrated – Cont’d

H. ______________ _________ H. Identity thieves can get information from the workplace, in a practice known as “______________ _________ theft,” by stealing files out of offices where you are a customer, employee, patient or student, by bribing an employee who has access to your files, or by “hacking” into electronic files How identity crime is commonly perpetrated – Cont’d

I. ___________________ I. Some identity thieves also engage in “__________ _________”: looking over your shoulder or from a nearby location as you enter your Personal Identification Number (PIN) at an ATM machine How identity crime is commonly perpetrated – Cont’d

I. (Cont’d): ______________ I. (Cont’d): This practice has gone high-tech, with some thieves utilizing hidden “____ __________” positioned near ATMs to observe or record people as they enter their PINs How identity crime is commonly perpetrated – Cont’d

J. __________ J. Many criminals who want to obtain personal data from people online use a technique known as “__________”: the creation of s and websites that appear to belong to legitimate businesses such as established retail companies, financial institutions, and online auctions sites How identity crime is commonly perpetrated – Cont’d

J. (Cont’d) ___________ J. (Cont’d) Consumers receive e- mails from thieves claiming to be legitimate businesses, and are directed to ___________ that appear to be run by those businesses. The consumers are then directed to enter large amounts of personal data How identity crime is commonly perpetrated – Cont’d

J. (Cont’d): actually have ____ connection with those businesses J. (Cont’d): The thieves sending the s or running the websites actually have ____ connection with those businesses, and their sole purpose is to obtain the consumers’ personal data so that they can engage in various fraud schemes How identity crime is commonly perpetrated – Cont’d

2.2 Techniques used to procure false identification _____________________ step-by-step instructions on techniques for producing false documents A wide variety of sources, including __________ and ___________ retailers, provide publications that give criminals step-by-step instructions on techniques for producing false documents.

Some of the resources that are available to criminals who want to create false documents. Examples: Gun shows The Modern Identity Changer by Sheldon Charrett, ISBN X #IDENTITY 2.2 Techniques used to procure false identification

44 DEFINE & PROCESS Process: Define 2.0: Define 2.0: Explain how identity crimes occur

45 DEFINE & PROCESS Process: Define 2.1: Define 2.1: Explain how identity crime is commonly perpetrated

46 DEFINE & PROCESS Process: Define 2.2: Define 2.2: Explain Techniques used to procure false identification.

UNIT THREE LAWS

Learning Objectives Learning Objective 3.0 Learning Objective 3.0 : The Participant will be able to recognize the legal aspects of identity crimes. Learning Objective 3.1 Learning Objective 3.1 : The Participant will be able to identify the federal statutes dealing with identity crimes. Learning Objective 3.2 Learning Objective 3.2 : The Participant will be able to identify the state statutes dealing with identity crimes.

Learning Objective 3.3 Learning Objective 3.3 : The Participant will be able to define the term “security alert,” according to the Business Code. Learning Objective 3.4 Learning Objective 3.4 : The Participant will be able to define “security freeze,” according to the Business Code. Learning Objectives

3.0 Laws and Statutes Governing Identity Crimes FEDERAL LAWSTATE LAW

3.1 Federal Statutes dealing with Identity Crime Federal law___ ______ § 1028 Federal law: ___ ______ § 1028 – Identity Theft and Assumption Deterrence Act

3.2 state statutes dealing with identity crimes _______ _____ ___.____ Fraudulent Use or Possession of Identifying Information State Law: _______ _____ ___.____ – Fraudulent Use or Possession of Identifying Information (State Jail Felony)

Business and Commerce Code, Chapter 20 Business and Commerce Code, Chapter 20 - Regulation of Consumer Credit Reporting 3.2 state statutes dealing with identity crimes Code of Criminal Procedure, Article 55.02, Sec.2a Code of Criminal Procedure, Article 55.02, Sec.2a – Procedure for Expunction

3.3 Define the term “security alert,” according to the Tx-BC. _________________ __________ _______ – means a notice placed on a consumer file that alerts a recipient of a consumer report involving that consumer file that the consumer’s identity may have been used without the consumer’s consent to fraudulently obtain goods or services in the consumer’s name.

3.4 Define “security freeze,” according to the Business Code ____________ ___________ ____________ ___________ – means a notice placed on a consumer file that prohibits a consumer reporting agency from releasing a consumer report relating to the extension of credit involving that consumer file without the express authorization of the consumer.

56 DEFINE & PROCESS Process: Define 3.0: Define 3.0: Explain the legal aspects of identity crimes.

57 DEFINE & PROCESS Process: Define 3.1: Define 3.1: Explain the federal statute dealing with identity crimes

58 DEFINE & PROCESS Process: Define 3.2: Define 3.2: Explain Texas Laws and statutes dealing with identity crimes

59 DEFINE & PROCESS Process: Define 3.3: Define 3.3: Explain and define the term security alert according to the Business Code.

60 DEFINE & PROCESS Process: Define 3.4: Define 3.4: Explain and define the term security freeze according to the Business Code.

UNIT FOUR Identity Theft Crime Report

Learning Objectives Learning Objective 4.0 Learning Objective 4.0 : The Participant will be able to request information needed for an ID crime offense report. Learning Objective 4.1 Learning Objective 4.1 : The Participant will be able to list information needed for an ID crime offense report. Learning Objective 4.2 Learning Objective 4.2 : The Participant will be able to identify the governmental and business entities that are notified in identity crimes.

4.0 Prosecuting Identity Crimes

4.1 Request information needed for an ID crime offense report. How to request information needed for an ID crime offense report.

4.1 List information needed for an ID crime offense report. _________ ________ because credit bureaus require a police report in order to block fraudulent information Taking a _________ ________ is vital to the victim(s) because credit bureaus require a police report in order to block fraudulent information and to begin repairing the victim’s credit reports.

many_____________ l institutions require a police report with an affidavit of fraud In addition, many _____________ l institutions require a police report with an affidavit of fraud. Refer to your “Identity Crime Incident Detail Form” (Appendix A). 4.1 List information needed for an ID crime offense report – Cont’d.

crime incident form Have the (class participants as a crime victim) fill out an identity crime incident form (Appendix A). 4.1 Practical Exercise

This document provides the officer - investigator with detailed information to:  Understand the type of incident that occurred, _____________  Organize the _____________ case, __________  Determine where __________ might be found, 4.1 List information needed for an ID crime offense report.

This document provides the officer/investigator with detailed information to – Cont’d: _________  Develop a _________ of how the identity theft occurred, and _____  Determine what _____institutions should be contacted in the course of the investigation. 4.1 List information needed for an ID crime offense report.

bank and credit card statements, letters from creditors, merchant account statements Ask the victim to begin gathering documentation (bank and credit card statements, letters from creditors, merchant account statements, etc.) 4.1 List information needed for an ID crime offense report.

Ask the victim to obtain credit reports from the three major Credit Bureaus EquifaxEquifax, ExperianExperian, and Trans UnionTrans Union and voluntarily give them to you. 4.1 List information needed for an ID crime offense report.

voluntarily If not given voluntarily by the victim, a subpoena is needed from the courts to obtain victim credit histories. 4.1 List information needed for an ID crime offense report.

4.2 Governmental and business entities that are notified in identity crimes. A.FBI ______________________ A.F ederal B ureau of I nvestigation – Notify if an identity crime is used to commit a bank fraud, governmental fraud or in furtherance of an ____________ scheme, __________ fraud, etc. involving losses over one hundred thousand dollars ($100,000).

B. _______________ ____________ B. U. S. _______ ________ – Notify if there is any custody arrest of individuals associated with identity crime or identity ____________. This would involve the seizure or recovery of any amount of identity crime devices, equipment, or products such as skimmers (small electronic devices 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

B. B. U. S. Secret Service – Cont’d: that can gather information, such as your name, address, credit limit, and PIN from your credit card); counterfeit identification documents; counterfeit credit cards; or lists of personal identifiers (e.g., names, social security numbers, dates of birth, bank account numbers, and credit card numbers). 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

B. B. U. S. Secret Service – Cont’d: that can gather information, such as your name, address, credit limit, and PIN from your credit card); counterfeit identification documents; counterfeit credit cards; or lists of personal identifiers (e.g., names, social security numbers, dates of birth, bank account numbers, and credit card numbers). 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

C. C. U. S. Postal Service – Notify if an individual is taken into custody for committing a financial crime involving the U.S. mail. Postal inspectors will respond to violations relating to identity crime, forgery, credit cards and checks, mail theft, mail fraud, and Internet fraud (when the scheme involves use of the U.S. mail). 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

D. Social Security Administration – Notify if the misuse of a social security number involved social security program fraud, or if there is either a significant financial loss to an individual or institution, or a significant number of counterfeit social security cards are seized. 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

E. E. Federal Trade Commission – Have identity crime victims file a report with the Federal Trade Commission (Appendix B). Encourage them to use the FTC website ( 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

E. Cont’d: E. Federal Trade Commission – Cont’d: At the website, victims can file an online complaint and obtain helpful information such as a victim’s guide (”When Bad Things Happen to Your Good Name”) and the FTC Sample Affidavit. The FTC also has a hotline: IDTHEFT ( ). 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

F ( F. Texas Department of Public Safety - This agency is responsible for the issuance of state driver’s licenses and identification cards. It is also responsible for the storage and expunction of criminal records. Contact the Texas Department of Public Safety at and online ( 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

Other state and local agencies may provide additional assistance with investigating identity crimes. 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

____________________ stop additional fraud G. Consumer Credit Reporting Agencies – Tell victims to have a “__________ __________” placed on their credit reports. The fraud alert will show up on their credit report when companies make inquiries about their credit and may stop additional fraud. The three major credit- reporting agencies are: 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

G. Consumer Credit Reporting Agencies – Cont’d: EXPERIAN TRANS UNION EQUIFAX Governmental and business entities that are notified in identity crimes – Cont’d

H. ______________ H. Financial Institutions (e.g., banks, credit card companies, financial advisors) – Advise the victims to contact their financial institutions to report any ______________ of identity crime. 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

H. H. – Cont’d: ______________ The financial institution can check to see if there has been any unusual activity. Victims should establish ______________ for their accounts. 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

I. _____________ I. _____________ Companies (e.g., power, water, phone, and cable companies, etc.) – Victims may want to contact their utility companies to report instances of possible identity crime. unusual account activity The utility companies can check for any unusual account activity. 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

88 DEFINE & PROCESS Process: Define 4.0: Define 4.0: Explain how to request information needed for an ID Crime Offense Report

89 DEFINE & PROCESS Process: Define 4.1: Define 4.1: Explain (list) information needed for a Crime Offense Report.

90 DEFINE & PROCESS Process: Define 4.2: Define 4.2: Explain what government and business entities that are required to be notified in Identity Crimes.

UNIT FIVE

Learning Objectives Learning Objective 5.0 Learning Objective 5.0 : The Participant will be able to recognize techniques for educating victims and the public on identity crime. Learning Objective 5.1 Learning Objective 5.1 : The Participant will be able to identify techniques for educating victims and the public on identity crime.

Learning Objective 5.2 Learning Objective 5.2 : The Participant will be able to list guidelines for personal protection against identity crime. Learning Objective 5.3 Learning Objective 5.3 : The Participant will be able to list the steps to take if identity crime occurs. Learning Objectives

5.0 Identity Crimes Prevention Techniques for educating victims and the public on identity crime.

5.1 Techniques for educating victims and the public on identity crime. ______________ Law enforcement agencies should be ______________ in their approach to educating the public about identity crime. Current techniques used to educate the public about other crimes can be used to facilitate information on identity crime.

_______________________ Some of these techniques may include public service announcements (PSAs), __________ _____________ involvement, etc. Law enforcement agencies can make use of the vast amount of information already available on the Internet to guide the public and victims of identity crime. 5.1 Techniques for educating victims and the public on identity crime.

5.2 Guidelines for Personal Protection against identify crime ___________ Emphasize the fact that the more a person becomes ___________ about his/her financial records the better prepared he/she will be if they become a victim of identity crime.

Inform the public that they should: _________ 1. Not give out personal _________ over the phone or on the Internet - this includes their social security number, driver’s license number, date of birth, place of birth, home address, mother’s maiden name, and any passwords. 5.2 Guidelines for Personal Protection against identify crime – Cont’d

Inform the public that they should: __________ do not put your driver’s license, identification card or social security number on your checks 2.Limit the amount of personal information on their __________ - it is recommended that you do not put your driver’s license, identification card or social security number on your checks 5.2 Guidelines for Personal Protection against identify crime – Cont’d

Inform the public that they should: __________ 3.Check __________ histories and bank records frequently and look for signs of inaccurate or suspicious activity ___________ 4.Keep detailed records of ___________, check writing, credit card use, and ATM use 5.2 Guidelines for Personal Protection against identify crime – Cont’d

Inform the public that they should: __________________ 5.Destroy _________ _________ of credit card receipts 6.Purchase a home ___________ or completely destroy any item that may have personal identifiers rather than discarding them in the trash 5.2 Guidelines for Personal Protection against identify crime – Cont’d

Note: Note: Some insurance companies offer optional coverage to their policyholders to assist them with certain expenses incurred if they become victims of identity crime. 5.2 Guidelines for Personal Protection against identify crime – Cont’d

5.3 Steps to take if Identity Crime occurs Refer to participant handout “ID Theft Affidavit” (Appendix B). The forms provide victims with detailed instructions on completion and submission of the affidavit. __________ The affidavit should be sent to the companies or businesses where the __________was perpetrated.

5.3 5-STEPS report 1.Notify the police – Make a report. Get the names of the officers you contact and the police report number for your records. specific Be specific as to which kind of identity crime happened, such as bad checks, credit card abuse, or the misuse of your name, driver’s license, or identification card.

__________ Cancel credit cards and close your accounts 2.Notify __________ and merchants – Cancel credit cards and close your accounts. Contact the creditors and merchants that are affected. employees you have contact with Get the names of any employees you have contact with, and ask for a reference number on each item that you are disputing STEPS - Cont’d

Change affected bank accounts 3.Notify your banks and financial institutions – Change affected bank accounts. Advise the banks of the situation and find out what is required to clear anything that affects your banking services. This could relate to checks, ATM cards, debit cards, etc STEPS - Cont’d

_________ _______ 4.Check your credit – Notify the major _________ reporting agencies as well as local credit reporting companies, and advise them of your situation. You may be able to request that a _______ be put on any attempt to gain credit under your name and your date of birth without your confirmation STEPS - Cont’d

earned income benefits 5.Check with the Social Security Administration – Make sure that earned income benefits are accurate STEPS - Cont’d Check to see if there is any action on your social security number that should not be there Check to see if there is any action on your social security number that should not be there.

5.Cont’d: Get as much information as you can, and follow through with what is requested of you STEPS - Cont’d

110 DEFINE & PROCESS Process: Define 5.1: Define 5.1: Explain techniques for educating victims and public on identity crime.

111 DEFINE & PROCESS Process: Define 5.2: Define 5.2: Explain some guidelines for personal protection against identity crime.

112 DEFINE & PROCESS Process: Define 5.3: Define 5.3: Explain the steps to take if identity crime occurs.

SOURCES All Course Sources and/or Resources are listed in your Participant Handout IDENTITY CRIMES TCOLE Course # 3277

“Knowledge is “POWER” Stay informed, stay SAFE, stay Vigilant & stay Alive”

UPCOMING TRAINING Current TRAINING Schedule of Courses offered by Bexar County Constable’s Office PCT#4 Racial Profiling Course – TCOLE Course #3256 (8-hrs) 8-hrs on Saturday October 4 th, 2014 from 10:30 am to 7:30 pm. Racial Profiling Course – TCOLE Course #3256 (8-hrs) on Friday October 10, 2014 from 8:00 am to 5:00 pm 115 Bexar County Constable’s Office PCT#4 TRAINING SCHEDULE 2014

Current TRAINING Schedule of Courses offered by Bexar County Constable’s Office PCT#4 Eye Witness Evidence Course – TCOLE Course # 3286 (4-hrs) Saturday October 11, 2014 from 10:30 am to 2:30 pm Eye Witness Evidence Course – TCOLE Course # 3286 (4-hrs) Sunday October 12 th, 2014 from 11:00 am to 3:00 pm. Eye Witness Evidence Course – TCOLE Course # 3286 (4-hrs) Friday October 17 th, 2014 from 1:00 pm to 5:00 pm.

117 Advanced TCOLE Instructor Course – TCOLE #1017 (40hrs), Day One Saturday November 1 st,2014 from 11:00 am to 6:00 pm (Deputy Chief George D. Little and Deputy Constable Roland Berg) Day Two Advanced TCOLE Instructor Course – TCOLE #1017, Day Two Sunday November 2 nd,2014 from 11:00 am to 6:00 pm (Deputy Chief George D. Little and Deputy Constable Roland Berg) Day Three Advanced TCOLE Instructor Course – TCOLE #1017, Day Three Friday November 7 th,2014 from 9:00 am to 6:00 pm (Deputy Chief George D. Little and Deputy Constable Roland Berg ) Lesson Presentation preparation time. Instructors available Day Four Advanced TCOLE Instructor Course – TCOLE #1017, Day Four Saturday November 8 th,2014 from 11:00 am to 6:00 pm (Deputy Chief George D. Little and Deputy Constable Roland Berg)

118 Day Five Advanced TCOLE Instructor Course – TCOLE #1017, Day Five & Grad Sunday November 9 th, 2014 from 11:00 am to 6:00 pm – Presentations, Final Test & Graduation (Deputy Chief G. D. Little and Dep. Constable R. Berg ) HIV-AIDS & Viral Hepatitis in Criminal Justice Profession Course – TCOLE # 3804 (8-hrs) 8-hrs on Saturday November 15 th, 2014 from 10:00 am to 6:00 pm. HIV-AIDS & Viral Hepatitis in Criminal Justice Profession Course – TCOLE # 3804 (8-hrs) 4-hrs on Thursday December 4th, 2014 from 1:00 am to 5:00 pm HIV-AIDS & Viral Hepatitis in Criminal Justice Profession Course – TCOLE # 3804 (8-hrs) 4-hrs on Friday December5th, 2014 from 1:00 am to 5:00 pm KNOWLEDGE IS POWER

Please complete a course and instructor evaluation form. If you rate 2 or below you must justify on reverse side. Constructive CriticismConstructive Criticism helps all, being negative helps no one. COURSE & INSTRUCTOR EVALUATION Form