Identity Theft Investigator Training

Post on 19-Jun-2015

335 views 0 download

Tags:

description

Identity Theft Investigator Training

Transcript of Identity Theft Investigator Training

Identity Theft Awareness & Investigation

This presentation was provided to you by:

Jason Scribner InvestigatorTraining.com

Overview

Statistics Definition Prevention Street Patrol Methods & Examples Investigations

Identity Theft Victims

Spend 175 hours fixing their identity. They spend $800 in expenses. ~FTC 53 Billion Loss Last Year 1 in 5 Americans are Victims. There are 14,000 Fraudulent Telemarketing

Calls a Day. Over 400,000 dead people opened bank

accounts in 2008 - AARP

What is identity theft?

Wrongfully obtaining and using another person’s personal data in some way that involves fraud or deception, typically for economic gain.

Identity Crimes

Identity Theft Fraudulent Documents Credit Card Fraud Check Fraud

Associated Crimes

Mail Theft Mail Fraud Robbery Murder Narcotics Burglary Auto Theft Larceny Money Laundering Terrorism

How does identity theft occur?

Personal information is obtained.

Name Address Social Security Number Credit Card Number Checks

We are all potential victims of identity theft.

Identity Thieves Target

Elderly Armed Forces People with Money Children

Identity Theft Victims

Oprah Ross Perrot Tiger Woods Martha Stewart Steven Speilberg

YOU!

Prevention Tips

Shred credit card offers. Don’t put drivers license

number or social security number on checks.

Shred Fraud Alerts Insurance Check all 3 credit union

credit reports.

Prevention Tips

Don’t use your mothers maiden name, use a real password.

It is safer to use your credit card not your check card, the later is taken out sooner. Credit cards can be disputed later

Use your cell phone number. Victims Packet

Victims Packet

Packet On Line Resources Report collection agencies to the FTC

and/or

to the States Department of Licensing Division

Changing your identity does not require plastic surgery.

Who are identity thieves?

Friends Relatives Co-workers Strangers

It’s not like it impacts our national security, or does it? Muhammad Atta was a

terrorist who helped hijack American Airlines Flight 11, then flew it into the north tower of the World Trade Center on September 11 in the first of four deadly attacks against America.

Prior to the attacks Atta was seen in a bar in Hollywood, Florida, with Mawan Al-Shehri, who had come from Hamburg with him. The men were drinking and boasting about being pilots for American Airlines. They were using fraudulent identities and stolen credit cards. ~CNN.com Sept. 26,2001

The worst act of terrorism against our nation was a result of identity theft and fraud. Our lives changed forever.

Street Patrol

Arrests made by street cops.

Timothy McVeigh Eric Rudolf David Berkowitz

Street Patrol Tactics Identity (Laundry) Lists Shoulder Surfing Over Hearers Dumpster Divers Skimmers Car Boosters Mail Thieves Department of Motor Vehicles Banks Analyze Crime Statistics Problem Oriented Policing ATM’s Level 3 Sex Offenders Be a Hunter

Document Examination

Look over, ask them, trick and verify. DOB? How old are you? Zodiac Sign? Have you had an ID in another state? What year did you graduate high school? Did you get this issued to you at the DMV next to

Sears in Burnsville? Where did you stop before you came here?

Document Examination

Get other documents.

Credit Cards Library Card Receipts

Rule of Thumb:

Where the victim lives is where the report gets taken

How Loss Prevention can help.

Burn Video for Detectives Make still photo’s of video Complete a thorough investigation and write

a good report to include: Events in chronological order. Clerk’s name and schedule. Copy of checks and journal roll. Info and pictures of merchandise taken for

potential Search Warrant. Witness information

Methods and Examples

Check Washing

“Check washing” is a process when ink is chemically removed from a stolen check. The check is then re-written to a different merchant or company for a higher amount and cashed.

* Don’t use a ball point pen.

Security Feature on Back of Check

The bank teller/ merchant should examine the signature line to determine if it appears solid. Indicating possible fraud. Look for the MP indicates.

Touch prints can be used but there can be problems.

Check 21

Super Glue

Identifiers become distorted due to weave of paper.

Flagging

Postal Boxes Reach Through at Post

Office

Checks

Suspects can get:

Your account number and the address to your account.

Check Fraud“Catch Me If You Can”

Forgery Counterfeiting Alterations (Acetone,

Break Fluid) Paper Hanging (Closed

Accounts) Check Kiting (open

accounts@ different banks-delay)

Checks

Don’t use your home phone #. Do use your cell phone #.

Don’t use your drivers license #.

Don’t use your social security #.

Checksoft Software

Cell Phone Frauds

Cloning SIM Chips

Skimmer Attached to ATM

Camera Pointed Toward ATM

ATM Scam “Sleve”(Lebanese Loop) At first glance it would apear as though this

individual is simply performing a simple ATM transaction.

What he is in fact doing is rigging the machine so as to capture the card of the next person who uses the ATM.

The Pickup

Satisfied that the coast is clear the fraudster returns to retrieve the card that has been captured by his trap. He not only has the customers card he also has the P.I.N.

Skimmers

Telephone Scams

Prize Offers Travel Packages Investments Charities You Owe Money Your Relative is in Jail

Identity Theft Devices

Skimmer (Download Software) Embosser (Puts #’s on Card) Three Track Reader (Reads CC#) Tipper (Puts Color on Card) Encoder (Puts Input on Mag Stripe) Laminator

Garbage Pull

Schools Banks Hospitals Government Mortgage Companies

Sign Up Roster Scam

Sign Up Ask for Social Security

Number

Business Opportunity Scams

Items sold on e-bay. Opportunist collects checks and sends via Western Union to London.

Make $$$ Stuffing Envelopes Scam

Change of Address Scam

Fake Identification

Job Interview Scam

Fraudulently Obtained Identification

Computer Programs

Sequencing Credit Card Numbers Credit Master Credit Wizard Credit Probe

• Key Loggers

War Driving + +

Phishing

Never reply to these e-mails. Never click on any of the links. Always look for https:// which verifes that the

website is ‘secure.’ Look for a padlock icon. Use a personal firewall on your computer.

Phishing

Credit Repair Scams

419/ Letter/ E-mail

Identity Theft Help Scam

9/11 Connection

Obits are commonly used.

Victims websites are used.

Investigations

Investigations

ID The Imposter Witness Images Facial Reconition Line Ups Composites Forensics Linkage Address Leads (Ordered or Delivered To)

Investigations

Links to the Imposter FACES 360 Report Product DNA Finger Prints Airline Baggage Stubs Hotel Keys

Investigations

USPS does deal with the credit card companies. They have a list of credit cards that are stolen prior to working.

Network with USPS, UPS, and Fed Ex.

Luring the Imposter

Phone call or page to elicit callback. Fear of getting caught Blackmail Greed

Sweepstakes from purchase. Can’t pass up an easy scam. Credit card offer in the victims name. An offer via e-mail.

Phone Investigations

Trap & Trace

Phone Dump

Functions (*57)

Triangulations

Snagging the Phishers

Electronic Trail

Subpona IP address logs Trap & trace e-mail accounts Court order for opened e-mail messages

Money Trail

Find orders in opened e-mail messages. Check for complaints. Interview victims about unauthorized charges. Ask merchants about patterns and pending

orders. Monitor controlled delivery.

Electronic Trail: Dial Up

Subpeona #1 to E-Mail Provider

= IP Address Subpeona #2 to Dial Up ISP

= Subscriber Information Subpeona #3 to Phone Company

= Phone Records

Locate E-Mails & Websites

WHOIS.com E-mail Header

Locate & Use Computer Evidence

Subpeonas Seizing Computers

Use a computer forensics person. Is perp working on something. (Minimized,

Photograph) Copy the hard drive (if technician) Pull the plug on the back of the computer.

Exceptional Circumstances Destruction of Evidence

A keystroke takes less than a second Type of People

Russian Organized Crime Terrorists

When evil minded people plot

Good minded people must prepare

~Dr. Martin Luther King