Upload
slingr
View
335
Download
0
Tags:
Embed Size (px)
DESCRIPTION
Identity Theft Investigator Training
Citation preview
Identity Theft Awareness & Investigation
This presentation was provided to you by:
Jason Scribner InvestigatorTraining.com
Overview
Statistics Definition Prevention Street Patrol Methods & Examples Investigations
Identity Theft Victims
Spend 175 hours fixing their identity. They spend $800 in expenses. ~FTC 53 Billion Loss Last Year 1 in 5 Americans are Victims. There are 14,000 Fraudulent Telemarketing
Calls a Day. Over 400,000 dead people opened bank
accounts in 2008 - AARP
What is identity theft?
Wrongfully obtaining and using another person’s personal data in some way that involves fraud or deception, typically for economic gain.
Identity Crimes
Identity Theft Fraudulent Documents Credit Card Fraud Check Fraud
Associated Crimes
Mail Theft Mail Fraud Robbery Murder Narcotics Burglary Auto Theft Larceny Money Laundering Terrorism
How does identity theft occur?
Personal information is obtained.
Name Address Social Security Number Credit Card Number Checks
We are all potential victims of identity theft.
Identity Thieves Target
Elderly Armed Forces People with Money Children
Identity Theft Victims
Oprah Ross Perrot Tiger Woods Martha Stewart Steven Speilberg
YOU!
Prevention Tips
Shred credit card offers. Don’t put drivers license
number or social security number on checks.
Shred Fraud Alerts Insurance Check all 3 credit union
credit reports.
Prevention Tips
Don’t use your mothers maiden name, use a real password.
It is safer to use your credit card not your check card, the later is taken out sooner. Credit cards can be disputed later
Use your cell phone number. Victims Packet
Victims Packet
Packet On Line Resources Report collection agencies to the FTC
and/or
to the States Department of Licensing Division
Changing your identity does not require plastic surgery.
Who are identity thieves?
Friends Relatives Co-workers Strangers
It’s not like it impacts our national security, or does it? Muhammad Atta was a
terrorist who helped hijack American Airlines Flight 11, then flew it into the north tower of the World Trade Center on September 11 in the first of four deadly attacks against America.
Prior to the attacks Atta was seen in a bar in Hollywood, Florida, with Mawan Al-Shehri, who had come from Hamburg with him. The men were drinking and boasting about being pilots for American Airlines. They were using fraudulent identities and stolen credit cards. ~CNN.com Sept. 26,2001
The worst act of terrorism against our nation was a result of identity theft and fraud. Our lives changed forever.
Street Patrol
Arrests made by street cops.
Timothy McVeigh Eric Rudolf David Berkowitz
Street Patrol Tactics Identity (Laundry) Lists Shoulder Surfing Over Hearers Dumpster Divers Skimmers Car Boosters Mail Thieves Department of Motor Vehicles Banks Analyze Crime Statistics Problem Oriented Policing ATM’s Level 3 Sex Offenders Be a Hunter
Document Examination
Look over, ask them, trick and verify. DOB? How old are you? Zodiac Sign? Have you had an ID in another state? What year did you graduate high school? Did you get this issued to you at the DMV next to
Sears in Burnsville? Where did you stop before you came here?
Document Examination
Get other documents.
Credit Cards Library Card Receipts
Rule of Thumb:
Where the victim lives is where the report gets taken
How Loss Prevention can help.
Burn Video for Detectives Make still photo’s of video Complete a thorough investigation and write
a good report to include: Events in chronological order. Clerk’s name and schedule. Copy of checks and journal roll. Info and pictures of merchandise taken for
potential Search Warrant. Witness information
Methods and Examples
Check Washing
“Check washing” is a process when ink is chemically removed from a stolen check. The check is then re-written to a different merchant or company for a higher amount and cashed.
* Don’t use a ball point pen.
Security Feature on Back of Check
The bank teller/ merchant should examine the signature line to determine if it appears solid. Indicating possible fraud. Look for the MP indicates.
Touch prints can be used but there can be problems.
Check 21
Super Glue
Identifiers become distorted due to weave of paper.
Flagging
Postal Boxes Reach Through at Post
Office
Checks
Suspects can get:
Your account number and the address to your account.
Check Fraud“Catch Me If You Can”
Forgery Counterfeiting Alterations (Acetone,
Break Fluid) Paper Hanging (Closed
Accounts) Check Kiting (open
accounts@ different banks-delay)
Checks
Don’t use your home phone #. Do use your cell phone #.
Don’t use your drivers license #.
Don’t use your social security #.
Checksoft Software
Cell Phone Frauds
Cloning SIM Chips
Skimmer Attached to ATM
Camera Pointed Toward ATM
ATM Scam “Sleve”(Lebanese Loop) At first glance it would apear as though this
individual is simply performing a simple ATM transaction.
What he is in fact doing is rigging the machine so as to capture the card of the next person who uses the ATM.
The Pickup
Satisfied that the coast is clear the fraudster returns to retrieve the card that has been captured by his trap. He not only has the customers card he also has the P.I.N.
Skimmers
Telephone Scams
Prize Offers Travel Packages Investments Charities You Owe Money Your Relative is in Jail
Identity Theft Devices
Skimmer (Download Software) Embosser (Puts #’s on Card) Three Track Reader (Reads CC#) Tipper (Puts Color on Card) Encoder (Puts Input on Mag Stripe) Laminator
Garbage Pull
Schools Banks Hospitals Government Mortgage Companies
Sign Up Roster Scam
Sign Up Ask for Social Security
Number
Business Opportunity Scams
Items sold on e-bay. Opportunist collects checks and sends via Western Union to London.
Make $$$ Stuffing Envelopes Scam
Change of Address Scam
Fake Identification
Job Interview Scam
Fraudulently Obtained Identification
Computer Programs
Sequencing Credit Card Numbers Credit Master Credit Wizard Credit Probe
• Key Loggers
War Driving + +
Phishing
Never reply to these e-mails. Never click on any of the links. Always look for https:// which verifes that the
website is ‘secure.’ Look for a padlock icon. Use a personal firewall on your computer.
Phishing
Credit Repair Scams
419/ Letter/ E-mail
Identity Theft Help Scam
9/11 Connection
Obits are commonly used.
Victims websites are used.
Investigations
Investigations
ID The Imposter Witness Images Facial Reconition Line Ups Composites Forensics Linkage Address Leads (Ordered or Delivered To)
Investigations
Links to the Imposter FACES 360 Report Product DNA Finger Prints Airline Baggage Stubs Hotel Keys
Investigations
USPS does deal with the credit card companies. They have a list of credit cards that are stolen prior to working.
Network with USPS, UPS, and Fed Ex.
Luring the Imposter
Phone call or page to elicit callback. Fear of getting caught Blackmail Greed
Sweepstakes from purchase. Can’t pass up an easy scam. Credit card offer in the victims name. An offer via e-mail.
Phone Investigations
Trap & Trace
Phone Dump
Functions (*57)
Triangulations
Snagging the Phishers
Electronic Trail
Subpona IP address logs Trap & trace e-mail accounts Court order for opened e-mail messages
Money Trail
Find orders in opened e-mail messages. Check for complaints. Interview victims about unauthorized charges. Ask merchants about patterns and pending
orders. Monitor controlled delivery.
Electronic Trail: Dial Up
Subpeona #1 to E-Mail Provider
= IP Address Subpeona #2 to Dial Up ISP
= Subscriber Information Subpeona #3 to Phone Company
= Phone Records
Locate E-Mails & Websites
WHOIS.com E-mail Header
Locate & Use Computer Evidence
Subpeonas Seizing Computers
Use a computer forensics person. Is perp working on something. (Minimized,
Photograph) Copy the hard drive (if technician) Pull the plug on the back of the computer.
Exceptional Circumstances Destruction of Evidence
A keystroke takes less than a second Type of People
Russian Organized Crime Terrorists
When evil minded people plot
Good minded people must prepare
~Dr. Martin Luther King