Identity Theft Investigator Training

71
Identity Theft Awareness & Investigation

description

Identity Theft Investigator Training

Transcript of Identity Theft Investigator Training

Page 1: Identity Theft Investigator Training

Identity Theft Awareness & Investigation

Page 2: Identity Theft Investigator Training

This presentation was provided to you by:

Jason Scribner InvestigatorTraining.com

Page 3: Identity Theft Investigator Training

Overview

Statistics Definition Prevention Street Patrol Methods & Examples Investigations

Page 4: Identity Theft Investigator Training

Identity Theft Victims

Spend 175 hours fixing their identity. They spend $800 in expenses. ~FTC 53 Billion Loss Last Year 1 in 5 Americans are Victims. There are 14,000 Fraudulent Telemarketing

Calls a Day. Over 400,000 dead people opened bank

accounts in 2008 - AARP

Page 5: Identity Theft Investigator Training

What is identity theft?

Wrongfully obtaining and using another person’s personal data in some way that involves fraud or deception, typically for economic gain.

Page 6: Identity Theft Investigator Training

Identity Crimes

Identity Theft Fraudulent Documents Credit Card Fraud Check Fraud

Page 7: Identity Theft Investigator Training

Associated Crimes

Mail Theft Mail Fraud Robbery Murder Narcotics Burglary Auto Theft Larceny Money Laundering Terrorism

Page 8: Identity Theft Investigator Training

How does identity theft occur?

Personal information is obtained.

Name Address Social Security Number Credit Card Number Checks

Page 9: Identity Theft Investigator Training

We are all potential victims of identity theft.

Page 10: Identity Theft Investigator Training

Identity Thieves Target

Elderly Armed Forces People with Money Children

Page 11: Identity Theft Investigator Training

Identity Theft Victims

Oprah Ross Perrot Tiger Woods Martha Stewart Steven Speilberg

YOU!

Page 12: Identity Theft Investigator Training

Prevention Tips

Shred credit card offers. Don’t put drivers license

number or social security number on checks.

Shred Fraud Alerts Insurance Check all 3 credit union

credit reports.

Page 13: Identity Theft Investigator Training

Prevention Tips

Don’t use your mothers maiden name, use a real password.

It is safer to use your credit card not your check card, the later is taken out sooner. Credit cards can be disputed later

Use your cell phone number. Victims Packet

Page 14: Identity Theft Investigator Training

Victims Packet

Packet On Line Resources Report collection agencies to the FTC

and/or

to the States Department of Licensing Division

Page 15: Identity Theft Investigator Training

Changing your identity does not require plastic surgery.

Page 16: Identity Theft Investigator Training

Who are identity thieves?

Friends Relatives Co-workers Strangers

Page 17: Identity Theft Investigator Training

It’s not like it impacts our national security, or does it? Muhammad Atta was a

terrorist who helped hijack American Airlines Flight 11, then flew it into the north tower of the World Trade Center on September 11 in the first of four deadly attacks against America.

Page 18: Identity Theft Investigator Training

Prior to the attacks Atta was seen in a bar in Hollywood, Florida, with Mawan Al-Shehri, who had come from Hamburg with him. The men were drinking and boasting about being pilots for American Airlines. They were using fraudulent identities and stolen credit cards. ~CNN.com Sept. 26,2001

Page 19: Identity Theft Investigator Training

The worst act of terrorism against our nation was a result of identity theft and fraud. Our lives changed forever.

Page 20: Identity Theft Investigator Training

Street Patrol

Page 21: Identity Theft Investigator Training

Arrests made by street cops.

Timothy McVeigh Eric Rudolf David Berkowitz

Page 22: Identity Theft Investigator Training

Street Patrol Tactics Identity (Laundry) Lists Shoulder Surfing Over Hearers Dumpster Divers Skimmers Car Boosters Mail Thieves Department of Motor Vehicles Banks Analyze Crime Statistics Problem Oriented Policing ATM’s Level 3 Sex Offenders Be a Hunter

Page 23: Identity Theft Investigator Training

Document Examination

Look over, ask them, trick and verify. DOB? How old are you? Zodiac Sign? Have you had an ID in another state? What year did you graduate high school? Did you get this issued to you at the DMV next to

Sears in Burnsville? Where did you stop before you came here?

Page 24: Identity Theft Investigator Training

Document Examination

Get other documents.

Credit Cards Library Card Receipts

Page 25: Identity Theft Investigator Training

Rule of Thumb:

Where the victim lives is where the report gets taken

Page 26: Identity Theft Investigator Training

How Loss Prevention can help.

Burn Video for Detectives Make still photo’s of video Complete a thorough investigation and write

a good report to include: Events in chronological order. Clerk’s name and schedule. Copy of checks and journal roll. Info and pictures of merchandise taken for

potential Search Warrant. Witness information

Page 27: Identity Theft Investigator Training

Methods and Examples

Page 28: Identity Theft Investigator Training

Check Washing

“Check washing” is a process when ink is chemically removed from a stolen check. The check is then re-written to a different merchant or company for a higher amount and cashed.

* Don’t use a ball point pen.

Page 29: Identity Theft Investigator Training

Security Feature on Back of Check

The bank teller/ merchant should examine the signature line to determine if it appears solid. Indicating possible fraud. Look for the MP indicates.

Page 30: Identity Theft Investigator Training

Touch prints can be used but there can be problems.

Check 21

Super Glue

Identifiers become distorted due to weave of paper.

Page 31: Identity Theft Investigator Training

Flagging

Postal Boxes Reach Through at Post

Office

Page 32: Identity Theft Investigator Training

Checks

Suspects can get:

Your account number and the address to your account.

Page 33: Identity Theft Investigator Training

Check Fraud“Catch Me If You Can”

Forgery Counterfeiting Alterations (Acetone,

Break Fluid) Paper Hanging (Closed

Accounts) Check Kiting (open

accounts@ different banks-delay)

Page 34: Identity Theft Investigator Training

Checks

Don’t use your home phone #. Do use your cell phone #.

Don’t use your drivers license #.

Don’t use your social security #.

Page 35: Identity Theft Investigator Training

Checksoft Software

Page 36: Identity Theft Investigator Training

Cell Phone Frauds

Cloning SIM Chips

Page 37: Identity Theft Investigator Training

Skimmer Attached to ATM

Page 38: Identity Theft Investigator Training

Camera Pointed Toward ATM

Page 39: Identity Theft Investigator Training

ATM Scam “Sleve”(Lebanese Loop) At first glance it would apear as though this

individual is simply performing a simple ATM transaction.

What he is in fact doing is rigging the machine so as to capture the card of the next person who uses the ATM.

Page 40: Identity Theft Investigator Training

The Pickup

Satisfied that the coast is clear the fraudster returns to retrieve the card that has been captured by his trap. He not only has the customers card he also has the P.I.N.

Page 41: Identity Theft Investigator Training

Skimmers

Page 42: Identity Theft Investigator Training

Telephone Scams

Prize Offers Travel Packages Investments Charities You Owe Money Your Relative is in Jail

Page 43: Identity Theft Investigator Training

Identity Theft Devices

Skimmer (Download Software) Embosser (Puts #’s on Card) Three Track Reader (Reads CC#) Tipper (Puts Color on Card) Encoder (Puts Input on Mag Stripe) Laminator

Page 44: Identity Theft Investigator Training

Garbage Pull

Schools Banks Hospitals Government Mortgage Companies

Page 45: Identity Theft Investigator Training

Sign Up Roster Scam

Sign Up Ask for Social Security

Number

Page 46: Identity Theft Investigator Training

Business Opportunity Scams

Items sold on e-bay. Opportunist collects checks and sends via Western Union to London.

Make $$$ Stuffing Envelopes Scam

Page 47: Identity Theft Investigator Training

Change of Address Scam

Page 48: Identity Theft Investigator Training

Fake Identification

Page 49: Identity Theft Investigator Training

Job Interview Scam

Page 50: Identity Theft Investigator Training

Fraudulently Obtained Identification

Page 51: Identity Theft Investigator Training

Computer Programs

Sequencing Credit Card Numbers Credit Master Credit Wizard Credit Probe

• Key Loggers

Page 52: Identity Theft Investigator Training

War Driving + +

Page 53: Identity Theft Investigator Training

Phishing

Never reply to these e-mails. Never click on any of the links. Always look for https:// which verifes that the

website is ‘secure.’ Look for a padlock icon. Use a personal firewall on your computer.

Page 54: Identity Theft Investigator Training

Phishing

Page 55: Identity Theft Investigator Training

Credit Repair Scams

Page 56: Identity Theft Investigator Training

419/ Letter/ E-mail

Page 57: Identity Theft Investigator Training

Identity Theft Help Scam

Page 58: Identity Theft Investigator Training

9/11 Connection

Obits are commonly used.

Victims websites are used.

Page 59: Identity Theft Investigator Training

Investigations

Page 60: Identity Theft Investigator Training

Investigations

ID The Imposter Witness Images Facial Reconition Line Ups Composites Forensics Linkage Address Leads (Ordered or Delivered To)

Page 61: Identity Theft Investigator Training

Investigations

Links to the Imposter FACES 360 Report Product DNA Finger Prints Airline Baggage Stubs Hotel Keys

Page 62: Identity Theft Investigator Training

Investigations

USPS does deal with the credit card companies. They have a list of credit cards that are stolen prior to working.

Network with USPS, UPS, and Fed Ex.

Page 63: Identity Theft Investigator Training

Luring the Imposter

Phone call or page to elicit callback. Fear of getting caught Blackmail Greed

Sweepstakes from purchase. Can’t pass up an easy scam. Credit card offer in the victims name. An offer via e-mail.

Page 64: Identity Theft Investigator Training

Phone Investigations

Trap & Trace

Phone Dump

Functions (*57)

Triangulations

Page 65: Identity Theft Investigator Training

Snagging the Phishers

Electronic Trail

Subpona IP address logs Trap & trace e-mail accounts Court order for opened e-mail messages

Page 66: Identity Theft Investigator Training

Money Trail

Find orders in opened e-mail messages. Check for complaints. Interview victims about unauthorized charges. Ask merchants about patterns and pending

orders. Monitor controlled delivery.

Page 67: Identity Theft Investigator Training

Electronic Trail: Dial Up

Subpeona #1 to E-Mail Provider

= IP Address Subpeona #2 to Dial Up ISP

= Subscriber Information Subpeona #3 to Phone Company

= Phone Records

Page 68: Identity Theft Investigator Training

Locate E-Mails & Websites

WHOIS.com E-mail Header

Page 69: Identity Theft Investigator Training

Locate & Use Computer Evidence

Subpeonas Seizing Computers

Use a computer forensics person. Is perp working on something. (Minimized,

Photograph) Copy the hard drive (if technician) Pull the plug on the back of the computer.

Page 70: Identity Theft Investigator Training

Exceptional Circumstances Destruction of Evidence

A keystroke takes less than a second Type of People

Russian Organized Crime Terrorists

Page 71: Identity Theft Investigator Training

When evil minded people plot

Good minded people must prepare

~Dr. Martin Luther King