1 / 34

Identity Crimes

Identity Crimes. Postal Inspectors. Postal Inspectors protect the Postal Service, its employees and its customers from criminal attack, and protect the nation’s mail system from criminal misuse. Identity Crimes. 9 to 10 million victims each year $50 billion annual hit to the economy

harvey
Download Presentation

Identity Crimes

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Identity Crimes

  2. Postal Inspectors Postal Inspectors protect the Postal Service, its employees and its customers from criminal attack, and protect the nation’s mail system from criminal misuse.

  3. Identity Crimes • 9 to 10 million victims each year • $50 billion annual hit to the economy • No one is immune • Number of victims leveling off

  4. Identity Theft & Identity Fraud • Identity theft involves acquiring key pieces of your identifying information without the victim’s knowledge. • Identity fraud occurs when thieves use the victims’ personal identifying information to order merchandise, obtain credit, or otherwise falsely represent themselves without the victim’s express consent.

  5. Identity Crimes Are Attractive • Information is plentiful • Credit is in abundance • Absence of face-to-face contact with victims • Ability to vanish into cyberspace • Crooks are resourceful and patient

  6. Internet Usage And ID Theft

  7. Your Identity at Greatest Risk Source: FTC 2003 Identity Theft Study

  8. High Tech Methods Phishing Spyware and Key Logging Skimming Trojan Horses, Viruses and Worms Hacking Spamming Low Tech Methods Automobile dealers, retailers, restaurants Personnel Files Dumpster Diving Lost/Stolen Wallets and Checkbooks Healthcare Records Mail Theft How Identities are Stolen

  9. Most Common Low Tech Schemes • Dishonest employee with access uses or sells personal information • Unknown caller posing as a bank employee trying to verify a SSN and mother’s maiden name • Fraudster requests a victim’s credit report • Fraudster changes the address on your account to their address through the financial institution • Thief who steals your information during a burglary

  10. Keys to Your Identity • Name • Address • Date of Birth • Driver’s License • Social Security Number • Mother’s Maiden Name • Account Numbers

  11. Why do you need it? How will you use it? How do you protect it from being stolen? What will happen if I refuse to give it? Using Social Security Numbers Your employer, medical and financial institutions, as well as other businesses may ask for your Social Security Number. If someone asks, be prepared to ask them:

  12. Drivers Licenses Social Security cards Credit reports Birth certificates Bank Statements Student IDs Company IDs Counterfeit Documents Using personal information, the stolen identity is created and can be supported by counterfeit documents such as:

  13. Counterfeiting Tools • Computer, monitor and keyboard • Color ink jet or color laser printer • Flatbed scanner • Commercially available software (VersaCheck, Adobe Photoshop, etc) • High quality paper and/or check stock

  14. Types of Identity Crimes • Fraudulent Applications • Account Takeover • Merchant Fraud • Credit Card Fraud • Check Fraud

  15. Attacking the Identity Crime Problem

  16. General Prevention • Shred pre-approved credit applications, bills, & other financial information before discarding. • Empty your wallet of extra credit cards. • Memorize or secure your passwords and SSN. Don’t carry them around. • Never leave receipts behind at ATMs, merchants, banks, or gasoline pumps. • Check your credit report once a year for accuracy and fraud abuse. • Don’t use a date of birth as your password. • Never give personal information to a stranger. • Match receipts against financial statements.

  17. Online Prevention • Don’t reveal personal information inadvertently • Don’t reveal personal details to strangers • Beware sites that offer some sort of reward or prize for your contact info • Become familiar with home computer security, including software solutions

  18. Safeguarding Your Mail • Deposit mail at your local Post Office, in a collection box, or hand it to your letter carrier • Retrieve mail as soon as possible after delivery • Place your mail on hold with the Post Office if you are planning a trip • Report suspicious activity concerning mail to your local Postal Inspector

  19. Safeguarding Your Mailroom • Three P’s of Mail Center Security • PERSONNEL • PLACE • PROCEDURES

  20. Three P’s of Mail Center Security • PERSONNEL • Pre-employment screenings • Criminal records checks • Drug screenings • Credit history inquiries • Verify former employers • In-depth interviews

  21. Three P’s of Mail Center Security • PLACE • Deter theft/reduce theft opportunities in the mailroom • Separate employee mail pick up area from the rest of the mail center • Access control • Enhance supervisor visibility • Reduce places of concealment • Use of video surveillance

  22. Three P’s of Mail Center Security • PROCEDURES • Internal controls • Accountability for Registered Mail • Restrict access to postage stamps/meters • Use advance deposit accounts for BRM/postage due mail

  23. Three P’s of Mail Center Security • PROCEDURES – Outgoing Mail • Securely deposit outgoing mail • Periodically cross check outgoing mail against customer order lists • Review mailing records of commercial mail preparation service

  24. Three P’s of Mail Center Security • PROCEDURES – Incoming Mail • Assign authorized personnel to pick up mail • Update authorized list with Post Office as personnel change • Establish a process for misdelivered mail • Limit employees’ incoming personal mail • Post mail theft warning labels

  25. Safeguarding Your Mailroom • Other considerations • Keep employee and customer records secure • Limit access of delivery drivers, maintenance, construction personnel, etc. • For high-value shipments, vary the times and direction of travel to the Post Office

  26. Safeguarding Your Mailroom • If you suspect mail theft, contact: US Postal Inspection Service (410) 715-7700

  27. Legislation • Identity Theft and Assumption Deterrence Act • Identity Theft Penalty Enhancement Act • Fair Credit Reporting Act (FCRA) • The Fact Act (FACTA) • Graham-Leach-Bliley Law

  28. Will You Know if You are a Victim? • Statements or credit cards arrive for accounts for which you haven’t applied • Bills and other mail fail to arrive or are late • Credit is denied, or you are offered less favorable credit terms, like a high interest rate, for no apparent reason • Debt collectors contact you about merchandise or services you didn’t buy

  29. Action Steps for Identity Theft Victims • File a report with your local police or the police in the community where the identity theft took place. • File a report with the Federal Trade Commission. • Report lost or stolen credit cards to the issuer immediately. • Consider changing account numbers, passwords, and PIN numbers immediately. • Advise the credit bureaus of your situation and consider placing a fraud alert on your account. • Request a copy of your credit report. • Alert your banks to flag your accounts and contact you to confirm any unusual activity. • Maintain a record of names and phone numbers of the people with whom you discussed your case, and all supporting documents.

  30. Contacting the Credit Bureaus • Equifax Credit Bureau, Fraud 800.525.6285 • Experian Information Solutions 888.397.3742 • Trans Union Credit Bureau, Fraud 800.680.7289

  31. Report Identity Theft Cases The Federal Trade Commission Victims should be encouraged to report their complaints to: (877) – ID THEFT (877) – 438- 4338 Or www.consumer.gov/idtheft

  32. Identity Theft Internet Resources • United States Postal Inspection Service http://usps.com/postalinspectors • Federal Trade Commission’s ID Theft Center http://www.consumer.gov/idtheft • Looks too Good to be True http://www.lookstoogoodtobetrue.com • Consumer Privacy Guide http://www.consumerprivacyguide.org • Identity Theft: Prevention & Survival http://www.identitytheft.org • Privacy Rights Clearinghouse http://www.privacyrights.org/identity.htm

  33. www.usps.com/postalinspectors • Identity Theft: Safeguarding Your Identity • Publication 280 • Prevention Tips • Recovery Steps Identity Crisis: • Protect Your Identity • DVD Format • Spanish Subtitle • Free of Charge

  34. Contact Information Frank J. Schissler US Postal Inspector 410-347-4710 fjschissler@uspis.gov PO Box 1856 Baltimore, MD 21203 www.usps.com/postalinspectors

More Related