1 / 119

BCCO PCT #4 PowerPoint

IDENTITY CRIMES TCOLE Course #3277 Participant Handout. AND. UNIT 1 - 5. BCCO PCT #4 PowerPoint. BCCO PCT #4 PowerPoint. ADMINISTRATIVE. Please complete the BCCO PCT #4 Registration form and turn it in now. Make sure you sign TCOLE Report of Training (PID#, Full Name and DOB).

vaden
Download Presentation

BCCO PCT #4 PowerPoint

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IDENTITY CRIMES TCOLE Course #3277 Participant Handout AND UNIT 1 - 5 BCCO PCT #4 PowerPoint BCCO PCT #4 PowerPoint

  2. ADMINISTRATIVE • Please complete the BCCO PCT #4 Registration form and turn it in now. • Make sure you sign TCOLE Report of Training (PID#, Full Name and DOB). • All cell phones off please – pay attention to course materials and show common respect & courtesy.

  3. About Your InstructorCourse Facilitator - Mentor George D. Little A.S. & B.S. Criminal Justice & Sociology B.S.CJ Wayland Baptist University, San Antonio M.S. Criminology & Counter-Terrorism University of the State of New York 2012 T.C.L.E.O.S.E. Professional Achievement Award Certified Crime Prevention Specialist (C.C.P.S.) TCLEOSE Basic Instructor Certificate 1984 TCLEOSE Master Peace Officer 1991 MP Special Operations Operator Counter-Terrorism 1988 Graduate Drug Enforcement Administration Academy 1977 43- years Law Enforcement Experience 40-Years Teaching & Instructor Experience

  4. COURSE/LESSON OVERVIEW Educational requirements for identity crimes training established by legislative mandate: SB473-(78Reg).

  5. UNIT ONE

  6. Learning Objectives Learning Objective 1.0: The Participant will be able to recognize the types of identity crimes. Learning Objective 1.1: The Participant will be able to provide a definition of identity crime. Learning Objective 1.2: The Participant will be able to identify types of crimes associated with identity crimes.

  7. Learning Objectives Learning Objective 1.3 : The Participant will be able to list personal and financial identifiers. Learning Objective 1.4 : The Participant will be able to identify currents trends associated with identity crimes.

  8. 1.0 Defining Identity Crimes

  9. 1.1 Participant will be able to recognize the types of identity crime According to the Federal Trade Commission (FTC): • 31,000 persons were victims of identity crime in 2000. • During the first seven months of 2003, 131,000 Americans were victimized

  10. If trends continue, by the end of 2003, those victimized will have increased almost 700% in three years. • Texas is __________ in the nation in the number of instances of identity crime reported to the FTC.

  11. 2013 Statistics Total financial loss attributed to identity theft $24,700,000,000 Misuse of Existing Credit Card 64.1% Misuse of Existing Bank Account 35% Misuse of Personal Information 14.2%

  12. Identity Fraud & Incident Rate 2011 4.9% 2010 4.35% 2009 6% 2008 5.44% 2007 4.51% 2006 4.71% 2005 5.04%

  13. 1.1 The student will be able to provide a definition of identity crime A._________ ______ is the theft or misuse of personal or financial identifiers in order to gain something of value and/or facilitate other criminal activity.

  14. 1.1 The student will be able to provide a definition of identity crime – Cont’d B. Types of identity crimes include; 1. identity __________, 2. _______ ______/access device fraud (“skimming”), 3. __________ fraud, 4. ________ fraud, 5. false _______________ fraud, and 6. ______________/visa fraud.

  15. 1.2 The student will be able to identify types of crimes associated with identity crimes In many instances an identity crime is used as a _______________, through financing or anonymity, to commit other criminal activities such as mail theft, mail fraud, narcotics/drugs, organized crime, financial fraud (money laundering), mortgage fraud, weapons trafficking

  16. homicide, terrorism, wire fraud, or computer crime/Internet intrusions. Identity crimes can begin with other seemingly unrelated _________ such as robbery (e.g. purse snatching or mugging), computer intrusion, mail theft, theft of trash (“dumpster diving”), or theft of documents or information from businesses, medical facilities, hotels, etc.

  17. 1.3 The student will be able to list personal and financial identifiers Personal identifiers include: • ________, • date of __________, • _________ ___________ number, • ____________,

  18. 1.3 The student will be able to list personal and financial identifiers – Cont’d Personal identifiers include – Cont’d: • __________ number, • __________ __________ number, • ____________ number, • mother’s maiden name, etc.

  19. 1.3 The student will be able to list personal and financial identifiers – Cont’d Financial identifiers include: • __________________numbers, • ____________________numbers, • personal identification numbers (“PINs”), • __________ account numbers, etc.

  20. 1.1.4 The student will be able to identify currents trends associated with identity crimes Some of the current trends associated with identity theft involve the usage of current ___________. This provides a unique challenge for consumers and law enforcement by testing their ability to keep up with technological advances and changes.

  21. 1.1.4 The student will be able to identify currents trends associated with identity crimes . Some of the more recent scams involve stealing information by; • listening in on conversations made on ______________________, • surreptitiously reading other people’s ________ and ________,

  22. 1.1.4 The student will be able to identify currents trends associated with identity crimes – Cont’d Some of the more recent scams involve stealing information by; • ______________ into computers, • conducting _________ and e-mail scams, and • taking advantage of careless consumers’ online __________ and ______________.

  23. 1.1.4 The student will be able to identify currents trends associated with identity crimes Currently, the Identity Theft Resource Center, www.idtheftcenter.org, is an excellent website for obtaining information on new trends, scams and consumer alerts on identity crimes.

  24. DEFINE & PROCESS Define 1.0: Explain some current identity crime statistics Process: 24

  25. DEFINE & PROCESS Define 1.1: Explain and define identity crimes Process: 25

  26. DEFINE & PROCESS Define 1.2: Explain some types of crime identified with identity crimes. Process: 26

  27. DEFINE & PROCESS Define 1.3: Explain some personal and financial identifiers associated with identity crime Process: 27

  28. DEFINE & PROCESS Define 1.4: Explain current trends associated with identity crimes. Process: 28

  29. UNIT TWO How identity crime occur

  30. Learning Objectives Learning Objective 2.0: The Participant will be able to recognize how identity crime occurs. Learning Objective 2.1: The Participant will be able to identify how identity crime is commonly perpetrated. Learning Objective 2.2: The Participant will be able to identify techniques used to procure false identification.

  31. 2.1.How identity crime is commonly perpetrated A. Identity crimes can occur if someone steals your wallet, purse, briefcase, etc., containing your • __________________, • ___________________card, • __________cards, • __________or _____________.

  32. 2.1. How identity crime is commonly perpetrated – Cont’d B. Identity crimes can occur if someone steals your • ________, • especially your bank and credit card _________________, • pre-approved ___________offers, • new ____________, or • ________ information.

  33. 2.1. How identity crime is commonly perpetrated – Cont’d C. Identity thieves can complete a “__________ of ___________ form” to divert your mail to another location. D. Identity thieves may rummage through your trash or the trash of businesses to find personal data (also known as “______________ diving”).

  34. 2.1. How identity crime is commonly perpetrated – Cont’d E. Identity thieves may fraudulently obtain your credit report by posing as a ________, _________, or someone else who may have a legitimate need for (and legal right to) the information. F. Identity thieves can find _____________ information in your home.

  35. 2.1. How identity crime is commonly perpetrated – Cont’d G. Identity thieves may obtain personal information that you share on the ___________.

  36. 2.1. How identity crime is commonly perpetrated – Cont’d H. Identity thieves can get information from the workplace, in a practice known as “_______________________ theft,” by stealing files out of offices where you are a customer, employee, patient or student, by bribing an employee who has access to your files, or by “hacking” into electronic files.

  37. 2.1. How identity crime is commonly perpetrated – Cont’d I. Some identity thieves also engage in “___________________”: looking over your shoulder or from a nearby location as you enter your Personal Identification Number (PIN) at an ATM machine.

  38. 2.1. How identity crime is commonly perpetrated – Cont’d I. (Cont’d): This practice has gone high-tech, with some thieves utilizing hidden “______________” positioned near ATMs to observe or record people as they enter their PINs.

  39. 2.1. How identity crime is commonly perpetrated – Cont’d J. Many criminals who want to obtain personal data from people online use a technique known as “__________”: the creation of e-mails and websites that appear to belong to legitimate businesses such as established retail companies, financial institutions, and online auctions sites.

  40. 2.1. How identity crime is commonly perpetrated – Cont’d J. (Cont’d) Consumers receive e-mails from thieves claiming to be legitimate businesses, and are directed to ___________ that appear to be run by those businesses. The consumers are then directed to enter large amounts of personal data.

  41. 2.1. How identity crime is commonly perpetrated – Cont’d J. (Cont’d): The thieves sending the e-mails or running the websites actually have ____ connection with those businesses, and their sole purpose is to obtain the consumers’ personal data so that they can engage in various fraud schemes.

  42. 2.2 Techniques used to procure false identification A wide variety of sources, including __________and ___________retailers, provide publications that give criminals step-by-step instructions on techniques for producing false documents.

  43. 2.2 Techniques used to procure false identification Some of the resources that are available to criminals who want to create false documents. Examples: • www.paladin-press.com • Gun shows • The Modern Identity Changer by Sheldon Charrett, ISBN 0-87364-946-X #IDENTITY

  44. DEFINE & PROCESS Define 2.0: Explain how identity crimes occur Process: 44

  45. DEFINE & PROCESS Define 2.1: Explain how identity crime is commonly perpetrated Process: 45

  46. DEFINE & PROCESS Define 2.2: Explain Techniques used to procure false identification. Process: 46

  47. UNIT THREELAWS

  48. Learning Objectives Learning Objective 3.0: The Participant will be able to recognize the legal aspects of identity crimes. Learning Objective 3.1: The Participant will be able to identify the federal statutes dealing with identity crimes. Learning Objective 3.2: The Participant will be able to identify the state statutes dealing with identity crimes.

  49. Learning Objectives Learning Objective 3.3 : The Participant will be able to define the term “security alert,” according to the Business Code. Learning Objective 3.4 : The Participant will be able to define “security freeze,” according to the Business Code.

  50. 3.0 Laws and Statutes Governing Identity Crimes FEDERAL LAW STATE LAW

More Related