Identity Crimes BPOC TCOLE

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The 1998 Identity Theft and Assumption Deterrence Act.

"knowingly transfer or use, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity

Credit Card or Debit Card Abuse

-With intent to obtain a benefit fraudulently, he presents or uses a credit card or debit card with knowledge that: A) The card, whether or not expired, has not been issued to him and is not used with the effective consent of the cardholder B) The card has expired or has been revoked or cancelled with intent to obtain a benefit, he uses a fictitious credit card or debit card or the pretended number or description of a fictitious card, that he knows has been obtained in violation of this section. -He steals a credit card or debit card or, with knowledge that it has been stolen. -He buys a credit card or debit card from a person who he knows is not the issuer, not being the issuer he sells a credit card or debit card. -Two or more incomplete credit cards or debit cards that have not been issued to him -State Jail Felony; OR -FELONY 3 if elderly victim

The FBI only investigates losses over _________

100,000 dollars

What is a security alert?

A notice placed on a conniver file that lets a recipient know their identity may have been used without their consent

Fraudulent Use or Possession of Identifying Information

A person commits an offense if the person, with intent to harm or defraud another, obtains, possesses, transfers, uses: identifying information without other person's consent information concerning a deceased natural person that would be identifying information of that person if they were alive. Presumed intent to harm if possessing ID of three or more other persons, information concerning three or more, and information concerning three or more persons or deceased persons State Jail Felony: number of items is less than five third degree: five or more but less than ten second: 10 or more but less than 50 first: number of items obtained, possessed, is more than 50 court may order offender to compensate the victim for lost income

Fraudulent Use or Possession of Credit Card or Debit Card Information.

A person commits an offense if the person, with the intent to harm or defraud another, obtains, possesses, transfers, or uses: a counterfeit credit card or debit card; the number and expiration date of a credit card or debit card without the consent of the account holder; or the data stored on the digital imprint An offense under this section is: a state jail felony if the number of items obtained, possessed, transferred, or used is less than five; a felony of the third degree if the number of items obtained, possessed, transferred, or used is five or more but less than 10; a felony of the second degree if the number of items obtained, possessed, transferred, or used is 10 or more but less than 50; or a felony of the first degree if the number of items obtained, possessed, transferred, or used is 50 or more.

Financial Institutions (e.g., banks, credit card companies, and financial advisors).

Advise victims to contact their financial institutions to report any suspicions of identity crime. The financial institution can check to see if there has been any unusual activity. Victims should establish strong passwords for their accounts.

What are some sources that can give criminals step-by-step instructions on techniques for producing false documents?

Bookstores, internet retailers, publications

This happens when identity thieves get information from the workplace

Business record theft

Difference Credit Card Abuse and Fraudulent

Credit Card Abuse means using the actual card Fraudulent is using an expired card or using info to make a new one.

Some of the current trends associated with identity theft involve the usage of _________ _____________.

Current technologies

What governmental and business entities are notified in the event of identity crimes?

FBI, US secret service, postal service, social security administration, federal trade commission, TXDPS, consumer credit reporting agencies, financial institutions and utility companies.

Identify the governmental and business entities that are notified in identity crimes.

Federal Bureau of Investigation (FBI). Notify if an identity crime is used to commit a bank fraud, governmental fraud or in furtherance of an investment scheme, insurance fraud, etc. involving losses over $100,000. U. S. Secret Service (USSS). Notify if there is any custody arrest of individuals associated with identity crime or identity takeover. This would involve the seizure or recovery of any amount of identity crime devices/equipment/products such as skimmers (small electronic devices that can gather information, such as your name, address, credit limit, and PIN from your credit card); counterfeit identification documents; counterfeit credit cards; or lists of personal identifiers (e.g., names, Social Security numbers, dates of birth, bank account numbers, and credit card numbers). U. S. Postal Service (USPS). Notify if an individual is taken into custody for committing a financial crime involving the U.S. mail. Postal inspectors will respond to violations relating to identity crime, forgery, credit cards and checks, mail theft, mail fraud, and internet fraud (when the scheme involves use of the U.S. mail). Social Security Administration (SSA). Notify if the misuse of a Social Security number involved Social Security program fraud, or if there is either a significant financial loss to an individual or institution, or a significant number of counterfeit Social Security cards are seized. Federal Trade Commission (FTC). Have identity crime victims file a report with the Federal Trade Commission. The FTC has overhauled the process for helping victims of identity theft. Individuals can report identity theft and get a recovery plan. This plan includes the forms, affidavits, and letters needed to help guide individuals through the recovery process. Texas Department of Public Safety (TxDPS). This agency is responsible for the issuance of State driver's licenses and identification cards. It is also responsible for the storage and expunction of criminal records. Contact the Texas Department of Public Safety at (512) 424-2000 and online as www.txdps.state.tx.us/contact.htm.

When someone poses as your landlord to receive credit information what are they doing?

Fraudulently obtaining your credit report

What is shoulder surfing?

Looking over someone's shoulder to retrieve any personal information

What are some type of crimes associated with identity crimes?

Mail theft, mail fraud, organized crime, drugs, homicide, terrorism, Robbery

What is included with personal identifiers?

Name, DOB, SSN, address, phone #, DL #, passport #, mothers maiden name

Requesting a Security Freeze

On written request sent by certified mail that includes proper identification provided by a consumer, a consumer reporting agency shall place a security freeze on a consumer's consumer file not later than the fifth business day after the date the agency receives the request. A consumer reporting agency shall, not later than the 10th business day after the date the agency receives the request for a security freeze: send a written confirmation of the security freeze to the consumer; and provide the consumer with a unique personal identification number or password to be used by the consumer to authorize a removal or temporary lifting of the security freeze under Section 20.037.

What are some things included in financial identifiers?

PIN #'s, credit card numbers

Mail theft

Person commits an offense if he appropriates mail from another person's mailbox or premises without consent of the addressee with the intent to deprive the addressee of the mail. Class A misdemeanor if the mail is appropriated from fewer than 10 addressees; State jail felony if the mail is appropriated from at least 10 but fewer than 30 addressees; or a felony of the third degree if the mail is appropriated from 30 or more addressees.

Requesting a Security Alert

Place a security alert on the consumer's consumer file not later than 24 hours after the date the agency receives the request. The security alert must remain in effect for not less than 45 days after the date the agency places the security alert on the file.

What are some examples of seemingly unrelated crimes that can lead to identity crimes?

Purse snatching or mugging, dumpster diving

Identify the current trends associated with identity crimes.

Some of the current trends associated with identity theft involve the use of current technologies. This provides a unique challenge for consumers and law enforcement by testing their ability to keep up with technological advances and changes. Some of the more recent scams involve stealing information by listening in on conversations made on cellular phones, surreptitiously reading other people's emails, hacking into computers, conducting telephone and email scams, and taking advantage of careless consumers' online shopping and banking.

Many criminals who want to obtain personal date from people online use what technique?

Spoofing

According to the FTC, special forms of identity theft also include:

Tax identity theft Child identity theft Medical identity theft

Consumer Credit Reporting Agencies.

Tell victims to have a "fraud alert" placed on their credit reports. The fraud alert will show up on their credit report when companies make inquiries about their credit and may stop additional fraud.

4TH

Texas ranks _____ in the nation in the number of instances of identity crimes reported to the FTC.

The 2004 Identity Theft Penalty Enhancement Act.

The act established penalties for "aggravated" identity theft

Define identity crime:

The theft or misuse of personal or financial identifiers in order to gain something of value and/or facilitate other criminal activity.

Identity Theft

Theft of personal info to commit fraud. The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.

Law enforcement agencies should be proactive in their approach to educating the public about identity crimes.

True

List information needed for an identity crime offense report.

Type of incident that occurred Organized Crime Determine where evidence may be found Develop theory how this occurred Determine what financial institutions should be contacted Bank/Card Statements, letters from creditors, account statements Credit reports

What are some common things someone could steal that would lead to an identity crime?

Wallet, purse, briefcase, mail, tax information

Describe the meaning of the terms identifying information and telecommunication access device.

name and date of birth unique biometric data, including the person's fingerprint, voice print, or retina or iris image unique electronic identification number, address, routing code, or financial institution account number telecommunication identifying information or access device; and social security number or other government-issued identification number.

What are the list of steps to take if in the event an identity crime occurs?

notify the police notify creditors and merchants notify your banks and financial institutions check your credit check with the social security administration

The 2008 Identity Theft Enforcement and Restitution Act.

o make it clear that restitution orders for identity theft cases may include an amount equal to the value of the victim's time spent remediating the actual or intended harm

What are the types of identity crimes?

theft, credit card/access device fraud, check fraud, bank fraud, false ID fraud, and passport/visa fraud


संबंधित स्टडी सेट्स

Elements and symbols (1-36) + Ag, Sn, Au, Hg, Pb

View Set

APMH test prep (Collegeboard questions)

View Set

Math Final Definitions CH 1 - 12

View Set

6th Chapter 16 Geography and Early Settlement of China

View Set

TEXES 293 Science of Teaching Reading

View Set

555 Cardiovascular Practice Tests

View Set

Chapter 13: Achieving Energy Sustainability

View Set

Job interview questions and ideal answers

View Set

COST ACCOUNTING EXAM 4 (Ch 9 & 11)

View Set