1 / 147

BCCO PCT #4 PowerPoint

IDENTITY CRIMES TCOLE Course #3277. AND. UNIT 1 - 5. BCCO PCT #4 PowerPoint. BCCO PCT #4 PowerPoint. ADMINISTRATIVE. Please complete the BCCO PCT #4 Registration form and turn it in now. Make sure you sign TCOLE Report of Training (PID#, Full Name and DOB).

mcgriffb
Download Presentation

BCCO PCT #4 PowerPoint

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IDENTITY CRIMES TCOLE Course #3277 AND UNIT 1 - 5 BCCO PCT #4 PowerPoint BCCO PCT #4 PowerPoint

  2. ADMINISTRATIVE • Please complete the BCCO PCT #4 Registration form and turn it in now. • Make sure you sign TCOLE Report of Training (PID#, Full Name and DOB). • All cell phones off please – pay attention to course materials and show common respect & courtesy.

  3. Your Instructor – Course Facilitator and Mentor Trainer Deputy Chief George D. Little A.S. & B.S. Criminal Justice & Sociology B.S.CJ Wayland Baptist University, San Antonio M.S. Criminology & Counter-Terrorism University of the State of New York(P) 2012 T.C.O.L.E. Professional Achievement Award Certified Crime Prevention Specialist (C.C.P.S.) TCOLE Basic Instructor Certificate 1984 TCOLE Advanced Instructor 2012 TCOLE Master Peace Officer 1991 MP Special Operations Operator Counter-Terrorism 1988 Military Police Investigations (MPI) & Criminal Investigation Division (CID) Special Agent Graduate Drug Enforcement Administration Academy 1977 43- years Law Enforcement Experience 39-Years Teaching & Instructor Experience

  4. COURSE/LESSON OVERVIEW Educational requirements for identity crimes training established by legislative mandate: SB473-(78Reg).

  5. UNIT ONE

  6. Learning Objectives Learning Objective 1.0: The Participant will be able to recognize the types of identity crimes. Learning Objective 1.1: The Participant will be able to provide a definition of identity crime. Learning Objective 1.2: The Participant will be able to identify types of crimes associated with identity crimes.

  7. Learning Objectives Learning Objective 1.3 : The Participant will be able to list personal and financial identifiers. Learning Objective 1.4 : The Participant will be able to identify currents trends associated with identity crimes.

  8. 1.0 Defining Identity Crimes

  9. 1.1 Participant will be able to recognize the types of identity crime According to the Federal Trade Commission (FTC): • 31,000 persons were victims of identity crime in 2000. • During the first seven months of 2003, 131,000 Americans were victimized

  10. If trends continue, by the end of 2003, those victimized will have increased almost 700% in three years. • Texas is fifth in the nation in the number of instances of identity crime reported to the FTC.

  11. 2013 Statistics Total financial loss attributed to identity theft $24,700,000,000 Misuse of Existing Credit Card 64.1% Misuse of Existing Bank Account 35% Misuse of Personal Information 14.2%

  12. Identity Fraud & Incident Rate 2011 4.9% 2010 4.35% 2009 6% 2008 5.44% 2007 4.51% 2006 4.71% 2005 5.04%

  13. 1.1 The student will be able to provide a definition of identity crime A.Identitycrime is the theft or misuse of personal or financial identifiers in order to gain something of value and/or facilitate other criminal activity.

  14. 1.1 The student will be able to provide a definition of identity crime – Cont’d B. Types of identity crimes include; 1. identity theft, 2. creditcard/access device fraud (“skimming”), 3. check fraud, 4. bank fraud, 5. false identification fraud, and 6. passport/visa fraud.

  15. 1.2 The student will be able to identify types of crimes associated with identity crimes In many instances an identity crime is used as a facilitator, through financing or anonymity, to commit other criminal activities such as mail theft, mail fraud, narcotics/drugs, organized crime, financial fraud (money laundering), mortgage fraud, weapons trafficking

  16. homicide, terrorism, wire fraud, or computer crime/Internet intrusions. Identity crimes can begin with other seemingly unrelated crimes such as robbery (e.g. purse snatching or mugging), computer intrusion, mail theft, theft of trash (“dumpster diving”), or theft of documents or information from businesses, medical facilities, hotels, etc.

  17. 1.3 The student will be able to list personal and financial identifiers Personal identifiers include: • name, • date of birth, • socialsecurity number, • address,

  18. 1.3 The student will be able to list personal and financial identifiers – Cont’d Personal identifiers include – Cont’d: • phone number, • driver’slicense number, • passport number, • mother’s maiden name, etc.

  19. 1.3 The student will be able to list personal and financial identifiers – Cont’d Financial identifiers include: • creditcardnumbers, • bankaccountnumbers, • personal identification numbers (“PINs”), • insurance account numbers, etc.

  20. 1.1.4 The student will be able to identify currents trends associated with identity crimes Some of the current trends associated with identity theft involve the usage of current technologies. This provides a unique challenge for consumers and law enforcement by testing their ability to keep up with technological advances and changes.

  21. 1.1.4 The student will be able to identify currents trends associated with identity crimes . Some of the more recent scams involve stealing information by; • listening in on conversations made on cellularphones, • surreptitiously reading other people’s faxes and e-mails,

  22. 1.1.4 The student will be able to identify currents trends associated with identity crimes – Cont’d Some of the more recent scams involve stealing information by; • hacking into computers, • conducting telephone and e-mail scams, and • taking advantage of careless consumers’ online shopping and banking.

  23. HACKER

  24. 1.1.4 The student will be able to identify currents trends associated with identity crimes Currently, the Identity Theft Resource Center, www.idtheftcenter.org, is an excellent website for obtaining information on new trends, scams and consumer alerts on identity crimes.

  25. Questions?

  26. DEFINE & PROCESS Define 1.0: Explain some current identity crime statistics Process: 28

  27. DEFINE & PROCESS Define 1.1: Explain and define identity crimes Process: 29

  28. DEFINE & PROCESS Define 1.2: Explain some types of crime identified with identity crimes. Process: 30

  29. DEFINE & PROCESS Define 1.3: Explain some personal and financial identifiers associated with identity crime Process: 31

  30. DEFINE & PROCESS Define 1.4: Explain current trends associated with identity crimes. Process: 32

  31. TAKE A 10-MINUTE BREAK

  32. UNIT TWO How identity crime occur

  33. Learning Objectives Learning Objective 2.0: The Participant will be able to recognize how identity crime occurs. Learning Objective 2.1: The Participant will be able to identify how identity crime is commonly perpetrated. Learning Objective 2.2: The Participant will be able to identify techniques used to procure false identification.

  34. 2.1.How identity crime is commonly perpetrated A. Identity crimes can occur if someone steals your wallet, purse, briefcase, etc., containing your • identification, • socialsecurity card, • creditcards, • bankcardsor checkbook.

  35. 2.1. How identity crime is commonly perpetrated – Cont’d B. Identity crimes can occur if someone steals your • mail, • especially your bank and credit card statements, • pre-approved credit offers, • new checks, or • tax information.

  36. 2.1. How identity crime is commonly perpetrated – Cont’d C. Identity thieves can complete a “change of address form” to divert your mail to another location. D. Identity thieves may rummage through your trash or the trash of businesses to find personal data (also known as “dumpster diving”).

  37. 2.1. How identity crime is commonly perpetrated – Cont’d E. Identity thieves may fraudulently obtain your credit report by posing as a landlord, employer, or someone else who may have a legitimate need for (and legal right to) the information. F. Identity thieves can find personal information in your home.

  38. 2.1. How identity crime is commonly perpetrated – Cont’d G. Identity thieves may obtain personal information that you share on the Internet.

  39. 2.1. How identity crime is commonly perpetrated – Cont’d H. Identity thieves can get information from the workplace, in a practice known as “businessrecord theft,” by stealing files out of offices where you are a customer, employee, patient or student, by bribing an employee who has access to your files, or by “hacking” into electronic files.

  40. 2.1. How identity crime is commonly perpetrated – Cont’d I. Some identity thieves also engage in “shouldersurfing”: looking over your shoulder or from a nearby location as you enter your Personal Identification Number (PIN) at an ATM machine.

  41. 2.1. How identity crime is commonly perpetrated – Cont’d I. (Cont’d): This practice has gone high-tech, with some thieves utilizing hidden “spycameras” positioned near ATMs to observe or record people as they enter their PINs.

  42. 2.1. How identity crime is commonly perpetrated – Cont’d J. Many criminals who want to obtain personal data from people online use a technique known as “spoofing”: the creation of e-mails and websites that appear to belong to legitimate businesses such as established retail companies, financial institutions, and online auctions sites.

  43. 2.1. How identity crime is commonly perpetrated – Cont’d J. (Cont’d) Consumers receive e-mails from thieves claiming to be legitimate businesses, and are directed to websites that appear to be run by those businesses. The consumers are then directed to enter large amounts of personal data.

More Related