Defending America Against Identity Crime

Identity crimes are among those new, emerging types of crimes that are just beginning to show their impact on communities.

Identity Crime Toolkit for Police Executives Identity crimes are among the fastest growing and most serious crimes affecting our citizens today. This toolkit will help law enforcement agencies make systemic changes, and ultimately, reduce victimizations by identity crimes.

Table of Contents

I. Introduction ...... 2 II. Executive Briefing ...... 2 International Association of Bank of America Chiefs of Police III. Leadership and Management ...... 4 Bank of America is one of the world's largest financial A. Assessment of Current Status ...... 4 Founded in 1893, the International institutions, serving individual consumers, small and middle Association of Chiefs of Police is the market businesses and large corporations with a full range of B. Tools for Improving Effectiveness ...... 6 world’s oldest and largest associa- banking, investing, asset management and other financial C. Further Information ...... 7 tion of law enforcement executives and risk-management products and services. The company IV. Officer Training ...... 8 with more than 19,000 members in provides unmatched convenience in the United States, 93 countries. For more information, serving more than 54 million consumer and small business A. Assessment of Current Status ...... 9 visit www.theiacp.org. relationships with more than 5,700 retail banking offices, B. Tools for Improving Effectiveness ...... 10 nearly 17,000 ATMs and award-winning online banking with more than 19.8 million active users. Bank of America is the C. Further Information ...... 11 No. 1 overall Small Business Administration (SBA) lender in V. Agency Partnerships...... 12 the United States and the No. 1 SBA lender to minority- A. Assessment of Current Status ...... 12 owned small businesses. The company serves clients in 175 countries and has relationships with 98 percent of the U.S. B. Tools for Improving Effectiveness ...... 13 Fortune 500 companies and 79 percent of the Global Fortune C. Further Information ...... 14 500. Bank of America Corporation stock (NYSE: BAC) is listed on the New York Stock Exchange. For more information, visit VI. Community Outreach ...... 15 www.bankofamerica.com. A. Assessment of Current Status ...... 15 B. Tools for Improving Effectiveness ...... 16 C. Further Information ...... 18 VII. Attachments...... 19 A. Sample Job Description for an Identity Crime Specialist ...... 19 B. Guidelines for Taking a Police Report on Identity Crime...... 20 C. Guidelines for Helping Residents Affected by Identity Crimes ...... 22 D. Guidelines for Investigating Identity Crimes...... 23 E. Checklist for Investigating Identity Crimes ...... 24 F. Typical Schemes ...... 26 G. Community Outreach Flyer...... 28

No. 1 Defending America Against Identity Crime No. 2 guidance topreventbeingvictimizedandstepstakewhensuspectingorexperiencingidentitycrime. Through jointefforts,thepartnershiphopestoraisecitizenawarenessofidentitycrimes,including enforcement understandandrespondtoidentitycrime. announced athree-yearpartnershiptocreatenationalstrategyaimedathelpingconsumersandlaw On October17,2006,theInternational Association ofChiefsPolice (IACP)andBankof America (BAC) I. Introduction and policeoutreachcanreduce overallvictimization.Butalloftheseimportantoutcomes relyonpolice inrespondingtothem. the victim Police mustbepartnersinpreventingthesecrimes,and be readytotakethereportandhelp nies. This issimplynot possible. have noroleinidentitycrime,orthatvictimsshouldstart theirrestorationwithbanksorcreditcompa in lawenforcementattitudesaboutthesekindsofcrimes. Today, manypoliceofficersbelievethatthey names andcreditrequiresthatpolicedepartmentsacross thecountryactivelyworktocreateachange The factthatvictimsneedtofilealocalpolicereport triggerthestepsnecessarytorestoretheir of filingapolicereport. to restoringhis/herlifepre-crimestatusbeginsat localpolicedepartment,withthesimpleact going tobearrestedbythelocallawenforcementagency. Butthevictimsarelocal. For police,thesecrimesarecomplex.Oftentheperpetratorsliveinanotherjurisdiction,andnot communities. crimes areamongthosenew, emergingtypesofcrimesthatarejustbeginningtoshowtheirimpacton change bringsnewformsofpublicsafetyrisksandchallenges.Formanypolicedepartments,identity It isnotnewsthatthedigitalagehasbroughtgreatchangetoeveryaspectofourlives. As always, II. ExecutiveBriefing available on created thistoolkitforpoliceexecutives. This resourcecanbeusedinconjunctionwiththose Recognizing thespecialchallengesthistypeofcrimeposesforlocallawenforcement,IACP has officials understandandrespondtoidentitycrime. and lawenforcementhavecometogethertocreateaWeb sitetohelpconsumersandlawenforcement consumers andlawenforcementaboutidentitycrime.Itmarksthefirsttimethatbankingindustry As thefirstjointproject,partnershiplauncheda Web site, and abroadonwaystopreventrespondidentitycrime. The primarygoalofthepartnershipistoeducatebothpublicandlawenforcementofficialsinU.S. investigations. The strategywillalsobolsterlawenforcement’s expertiseinrespondingtoidentitycrimeandconducting www.idsafety.org FACTA requiresvictims ofidentitycrime tohaveapolicereport toprovethey aretrulyvictims. mation sharing,and newconsumerrightstodisclosureare includedinF (FCRA, 15U.S.C.1681 etseq.),intendedprimarilytohelp consumersfightidentitycrime. 1 1 The Fair and Accurate Credit Transaction Act of2003(FACTA) tothefederal FairCreditReporting added newsections Act

toensurethatpoliceleadershipisablemeetthesechallengesheadon. Police investigatorsalsoplayakey role inidentifyingperpetrators, www.idsafety.org ACTA. (Pub.L.108-159, 111Stat.1952). , aimedateducatingboth The victim’s avenue Accuracy, privacy, limitsoninfor

-

- be countedasanopen casefile: Arkansas, Delaware,Georgia,Maryland, NewHampshire,JerseyandNorth Carolina. identity crimevictims. Ofthese22states,sevenalsohave languagethatexplicitlystates suchreportsarenotrequiredto 2 Currently 22 states, plus the District of Columbia, have laws mandating law enforcement agencies totakepolicereportsfrom Currently22states, plustheDistrictofColumbia,have lawsmandatinglawenforcement identity crimes. culture toexpandtheroleoflocallawenforcementin preventing, investigating,andrespondingto The purposeofthistoolkitistohelppoliceleaderstake thefirststepsinleadingachangepolice this issuetopreventandinvestigatethesecrimes. statistics jurisdiction andalsothatidentitycrimesdonotcountagainst ajurisdiction’ arena foravarietyofreasons,includingthatthearrestmay wellhappenoutsidethepolicedepartment’s Clearance rates,normallyacentralconcernofpoliceininvestigating crimes,arelessimportantinthis pation, victimswillbefrustratedintheirattemptstorestore theirgoodcreditandnames. to theirpre-crimestatus.Police haveacentralroleinhelpingtodothis,andwithoutpolicepartici when focusingonidentitycrime. The goalininvestigatingidentitycrimesmustincluderestoringvictims It isnoteworthythatmostdepartmentswillneedtoembraceadifferentwayofthinkingaboutcrime These changesmightinclude: ultimately, reducevictimizationsbyidentitycrimes. reducing victimization. This toolkitwillhelplawenforcementagenciesmakesuchsystemicchanges,and will improveidentification,apprehension,andsuccessfulprosecutionofidentitycriminalsisessentialto in manyplacesbeforetheyareevennoticed,letaloneapprehended.Makingsystemicchangesthat today. The impactofthesecrimescanbedevastating,andtheperpetrators mayvictimizemanypeople In fact,identitycrimesareamongthefastestgrowing,andmostserious,affectingourcitizens executive ofyouragency, toleadthatchangeinperceptionsamongofficers. rant theattentionoflocallawenforcementagency. This toolkitisintendedtohelpyou,asthechief leadership todemonstratelineofficersthatthesecrimesreallydomatteratthelocallevel,andwar • • • • supporting yourstateassociationsinlobbyingforlegislativeactiononthesecrimes. helping yourlegislatureunderstandhowtoimprovestatelawsprotectvictimsbetterand/or signs ofbecomingavictimidentitycrime.Publiceducationmight,insomecases,include and response. prosecutors’ offices,thebusinesscommunity, andthepubliconprevention,investigation, investigate acrimeeffectively. spot othercriminalswhomayhavelinkstoidentitycrimes;howhelpvictims;and victimizations inallofourcommunities. importance ofpreventingandrespondingtoidentitycrime,policechiefscansignificantlyreduce crime-fighters andpotentialvictims.Byprovidinglocallevelleadershipthatdemonstratesthe Educating thePublic Creating Agency Partnerships Training Officers Assuming Leadership. 2 . Forthesereasons,itiscriticallyimportantthatcultural shiftsoccurindepartmentsaround onthepervasivenatureofidentitycrimes;stateandfederallaws;howto abouthowtoavoidbecomingavictimandrespondatthefirst Police chiefsareuniquelypositionedtoinfluencethebehaviorofboth toenablecollaborationwithotherlawenforcementagencies, s UnifiedCrime Reports (UCR) - -

No. 3 Identity Crime Toolkit for Police Executives Police for Toolkit Crime Identity Defending America Against Identity Crime No. 4 Each sectionprovidesabriefintroductiontotheconceptscovered,andthenfollowswithshortself- Community Outreach: Agency Partnerships: Officer Training: Leadership andManagement: intofoursections: The toolkitisdivided just beginningtoidentifyhowtheycandoso.Someofthe challengestoovercomeincludethese: Identity crimesareextremelychallengingforpolicetopreventandinvestigate. A. ments’ capacitytoaddressidentitycrime. The purposeofthispartthetoolkitistohelppoliceexecutivesexamineandstrengthentheirdepart plans, andtheirgoodnames. motor vehiclecrimescombined The problemisthatidentitycrimesaffectmorepeopleeachyearintheUnitedStatesthanburglaryand public outcries. in effect,forcingdepartmentstochannellimitedresourcesthosecrimesdrawingthemostfervent rarely produceboldheadlineswhichannouncetherisingrateoflocalvictimizationinidentitycrime, the victimresidesthere.Inaddition,identitycrimeisnotasvisiblestreetcrime,andlocalmedia For onething,thecrimeoftenbeginselsewhere–linktolocalpolicedepartmentissimplythat Police chiefsareinatoughpositionwhenitcomestoaddressingidentitycrimestheirjurisdictions. III. LeadershipandManagement topics whichmaybeofparticularinterest. your agency’s workinthisarea,and finally, asectionwithfurtherinformationforadditionalresearchon improvement. Followingtheassessmenttool,youwillfindadditionalresourcesortoolstohelpimprove assessment tooltohelpyoudetermineyourownagency’s strengthsandpotentialchallengesorareasfor • • • • Assessment ofCurrentStatus bank whoprovidedthecredit, andmerchantswhosoldgoodsorservicestotheidentity criminal. There aremultiplevictims,including thepersonwhoseidentitywasstolen,credit agencyor The crimeisanonymous—therearenowitnessesand scene. such aspurchaseswithstolencreditcards. the locationofbankorcreditagenciesaffected,and the locationofanysecondarycrimes, Identity crimesaremulti-jurisdictional,withlocationsincluding thevictim’ Police arenotawareoftheimportancetakingareportfrom victim. Perpetrators ofidentitycrimeoften have multiplevictimsinmanylocations. tohelpidentifywhattrainingyourofficersneedandwheregetit toidentifythekeypartnersandhowconnectwiththem (FTC) haveskyrocketed inthepastfewyears(see Table 1). identity crimeduring thatyear. Although many identitycrimesgounreported,complaints totheFederal Trade Commission 3 A 2003Federal Trade in the UnitedStateswerevictimsof Commissionsurvey estimatedthatalmost10million people to helpyouworkwithcommunitiesreducevictimizations tohelppoliceexecutivesbecomeleadersofaculturalshiftinpolicing 3 . Plus,thevictimscanlosealifetime’s worthofsavings,theirretirement s placeofresidence, Mostdepartmentsare

-

www.popcenter.org/Problems/PDFs/Identity%20Theft.pdf U.S. DepartmentofJustice, Office ofCommunityOrientedPolicingServices. “Identity Theft”Problem-OrientedGuidesforPolice,Problem-Specific GuidesSeriesNo.25. To conductanin-depthassessment,see“Understanding Your LocalProblem,”fromGraemeR. Newman, investigate andrespondtoidentitycrime? Do wehaveawaytomeasureourprogressinlearning Do wehaveastrategyforpreventingidentitycrime? Are weengagedinanyjointtaskforcesrelatedtoidentity crimes? investigating identitycrimes? Do weutilizenationalresources/informationsharingresourcesin stand theirnextstepsafterreportingacaseofidentitycrime? Do weprovidesufficientinformationtovictimshelpthemunder- are consistentwithouroverallpolicyonthistopic? Are ourofficerscodingreportsofidentitycrimeinwayswhich identity crimesfromallvictims? Are ourofficersawareoftheimportancetakingreports they takereportsonthesecrimes? victimizations andtheimportancetotopmanagementthat Are ourofficersawareofthegrowingriskidentitycrime investigation andresponsetoidentitycrime? Do weprovideofficerswithtrainingontheprevention, for preventing,investigating,andrespondingtoidentitycrimes? Do weknowwhichofficer(s)inthisdepartmentareresponsible Departmental Capacityto Address IdentityCrime:Questions Use the Assessment Tool belowtoidentifyyourcurrentstrengthsandareasforimprovement. How wellisyourdepartmentequippedtoprevent,investigate,andrespondidentitycrimes? • • and havenotmadeapriorityoutofhelpinglawenforcementduringcriminalinvestigations. Police officerslackexperienceinrecoveringandanalyzingfinancialelectronicdocuments. Businesses oftenhavelaxsecuritymeasuresregardinguseofconfidentialcustomerinformation,

Yes pp.21-28 Somewhat No Not Sure

No. 5 Identity Crime Toolkit for Police Executives Police for Toolkit Crime Identity Defending America Against Identity Crime No. 6 common forsomeofficerswithinpolicedepartmentstoberesistantadoptingnewpracticesinthisarea. victimizations intheircommunitiesbyworkingtowardimprovedresponsetoidentitycrime,itisstill Despite thegrowingevidencethatpolicedepartmentscansuccessfullyincreasearrestratesandreduce the areaofidentitycrime. crimes, itbecomespossibletoexpandthecapacityoflocallawenforcementreducevictimizationin When policeexecutivesareeducatedontheextent,methodologies,andcriminalsinvolvedwithidentity B. can sendthemessage. Given thesehurdles,howcanyouletyourofficersknowthatthisisatoppriority?Herearesomeways to investigate. than violentcrime,isfarlesslikelytobereportedpolicebyvictims,andextremelydifficultfor ing andrespondingtothesecrimes. As noted,thisisadifficultundertakingasthecrimemuchlessvisible and helpalloftheofficerswithindepartmentcometoadeeperunderstandingtheirroleinprevent To successfullyaddressidentitycrime,policeleadershavetoprioritizethesecrimeswithinthedepartment In addition,communitymembers,businessleaders,andlegislatorsmaynotbedoingtheirpart. Tools Effectiveness forImproving • Develop Practices, Policies, andProcedures • • • Allocate resources guidelines ontakingthereportandwhatitshouldinclude. incident (forexample,apurse-snatching)happenedelsewhere. See alerts. The reportshould befiledinhis/herhomejurisdiction,evenwhentheprecipitating to disputefraudulenttransactions,correctcompromisedrecords andaccounts,placefraud any identitycrimeinvestigation.Victims ofidentitycrimearerequired tofilepolicereports description foranIdentityCrimeSpecialist. important andworthyofaninvestmenttimeeffort.See the department’s responsetoidentity crime,youwillbeclearlystatingthatthisproblemis crime. your officersandcommunitymembersinprevention,investigation,responsetoidentity support forpreventionandresponsetoidentitycrimes. regularly toidentifynewsourcesoffundingfromtheDepartmentJustice,manywhichprovide Make sure that officers are taking reports from victims. Make surethatofficersaretakingreportsfrom Allocate responsibility. training. Provide grant for Apply funds SeeSectionIII(Officer Training) ofthisworkbookfor some ideasonhowtotrain to strengthen your department’s your strengthen to Check response. Bydesignatingparticularindividualstohaveresponsibilityforimproving A policereportisthebaselinefor Attachment A Attachment B www.ojp.usdoj.gov/funding forasamplejob for IACP -

CASE STUDY: Beaverton, Oregon

The City of Beaverton, with 2.1M residents, is the fourth largest city in the Portland metropolitan area. To combat identity crime, the Beaver ton Police Department (PD) began a multi-pronged approach in 2003 that has resulted in more than $700,000 in loss prevention, 494 arrests and the recovery of more than $33,000. Chief of Police David Bishop comment ed that “word on the street showed that Beaverton was no longer an easy target. Many criminals chose to go elsewhere to set up their schemes.” What did Beaverton do to achieve these results? A few things that are replicable in other jurisdictions:

Got help. Beaverton applied for and was award ed a federal grant ($250,000) to infuse energy into the project.

Figured out who would do the work. The Beaverton PD created the Special Enforcement Unit (SEU), with one ser geant and two officers, to investigate street level identity crime and fraud crimes with a monetary value under $5,000. SEU officers also provide C. Further Information • • tion affectingyourjurisdiction. definition forUCRpurposes. Visit utilize thebroadfederallegislativedefinitionofidentitycrime,untilUCRdevelopsaformal Visit jurisdictional lines,andidentifyclustersofvictims.Registration isrequiredbutfree. dealing withfraud,calledConsumerSentinel. This helpsinvestigatorstrackpatterns,workacross provides lawenforcementagencieswithsecureonlineaccesstoadatabaseofconsumercomplaints Track inyourjurisdiction. therate ofidentitycrimevictimizations Expand theinvestigativetoolsavailabletoyourofficers. www.ftc.gov/sentinel/cs_signup.pdf

-

-

community education and collaborate with interagency fraud and narcotics task forces. Identity fraud cases with a monetary value greater than $5,000 - are investigated through an inter- agency task force described below.

Trained all officers. Patrol officers received identity crime and fraud training to help shape their - responses to victims across the board, learning to ask questions and offer ad vice which can prevent identity crime following other forms of crime, etc.

Worked with businesses. Through presentations to the business community and proactive outreach to high-risk businesses such as large retailers, SEU asked businesses to improve security measures in order to reduce identity crime and fraud, and to report all fraudulent transactions.

For additional details, see The Police Chief May 2007 article by Beaverton Chief of Police David Bishop. www.idsafety.org tosignup. andclickonyourstatetoreadlegisl- The Federal Trade Commission(FTC)

- 2. 1. CASESTUDY: Beaverton,OR Ifpossibleunderstatelaw, entire textofthelaw. 031224fcra.pdf Visit The FACT Act [FACTA] www.ftc.gov/os/statutes/ , toseethe

No. 7 Identity Crime Toolkit for Police Executives Police for Toolkit Crime Identity Defending America Against Identity Crime No. 8 Officer traininginidentitycrimeisdifficulttoprovidebecauseofthecomplexityandvariety and theinvestigationsofcrimes. training, astechnologicaladvancescomequicklyandoftenoffernewavenuesforboththecommission knowledge neededtokeepaheadofthechangesincrimetrends.Identityposesnewchallenges Police officersreceivealotoftraining–fromthe AcademytoIn-Services;therearealwaysnewskillsand IV. department’s firstresponders,tohaveatleastabasicunderstandingofidentitycrimesfor tworeasons: tory responsibilitytheyhaveforidentitycrimes.However, itisimportantforallpatrolofficers,asthe The appropriateleveloftrainingforyourofficerswillvarydependingonhowmuchdirectinvestiga to othercrimes. identity crimes,andalsobecauseofthecompetingdemandsforpoliceofficers’ Officer Training B) A) history isthemostvaluablecommoditythattheyhavelostinthiscrime. name andcredit.Itisnotablethatformanyvictims,especiallyseniors,theirhardearnedcredit investigation anddamagecontrolforvictims’ property, andhis/herabilitytorestoregood victims, particularlybecausethepolicereportprovidesnecessarygroundworkforfuture Ensuring thatpatrolofficersareawareoftheimportancelocallawenforcement’ a crime. to seeyourstate’s identitycrimelaws),simplypossessinganotherperson’s identityinformationis activity suchasdumpsterdiving.Insomestates(check Understanding identitycrimewillhelpthemunderstandthepotentialsignificanceofstreet-level www.idsafety.org

Identity Crime timeandattention andclickonyourstate s responseto

-

A. meeting training needsfortheirofficersintacticstoprevent,investigate,andrespondidentity crime. helpinidentifyingand The purposeofthispartthetoolkitistohelppoliceexecutivesbyproviding 5. 4. 3. 2. 1. Assessment ofCurrentStatus • • • • • • • • • • • • Do ourinvestigatorsknowhowto: Do allofourofficers(patrolandcommanders)knowthefollowing? Do wehaveroutinein-servicetrainingsonnewandemergingtechnologiesusedinidentitycrimes? Do ourofficersknowthestateandlocallawspertainingtoidentitycrime? Does ourpoliceacademycurriculumincludetrainingonidentitycrime? Use nationaldatabases? Present materialeffectivelytoprosecutors? Use informantsinthesekindsofcases? Interrogate identitycrimesuspects? Find additionalvictims? Analyze financialdocuments? Collect electronicevidence? The toolscommonlyusedbyidentitycrimeperpetrators,suchaslaminatingmachines, The potentialrelationshipbetweenidentitycrimesandothercriminalactivity? Protocols andproceduresfortakingreportsofidentitycrimes? To alwaystakepolicereportsfromvictimsofidentitycrimes? The serious,pervasivenatureofidentitycrimesandtheimpactoncommunity color copiersandblankchecks? methods ofcrimeandtypesperpetrators? Yes Yes Yes Yes Yes No No No No No (circleone) Not Sure Not Sure Not Sure Not Sure Not Sure ,

No. 9 Identity Crime Toolkit for Police Executives Police for Toolkit Crime Identity Defending America Against Identity Crime No. 10 with briefingsonhowtoa)helpvictimswhoreportcrimeswhichareconnectedidentitycrimeand/or If institutinganewtrainingprogramisnotpracticalimmediately these basedonyourassessmentabove. useful. There aremanygoodtrainingresourcesavailableforlow-orno-cost.Considerusingadapting The assessmentonthepreviouspageisintendedtohelpidentifyareaswherefurthertrainingwillbe B. issues forallofficerswithaminimuminvestmentoftraining time A roll-callvideoproducedbytheSecretServiceisavailabletoprovideanintroduction toidentitycrime Roll-Call Training www.idsafety.org In addition,manystateshavedevelopedofficertraining modules relatedtothisissue.Checkthemapat Project formoreinformation. The IACP candesignand deliver acustomizedprogramforyourdepartment.ContacttheIACP IDSafety training: Identity crimeunitsforpoliceacademycurriculumorin-service Training materialsavailableonline: distributed withinyourdepartment. See report thattheyhavebeenavictimofidentitycrimeandb)initiateinvestigationsoncrime. Attachments CandD Tools Effectiveness forImproving • • • • • • officers ininvestigativetechniquesforelectroniccrimes Request afreecopyofForwardEdgeII,aninteractivesoftwaretrainingprogramthattrains evidence The SecretServicealsopublished A Pocket GuideforFirstResponders forseizingelectronic The SecretServiceandIACP jointlypublishedBestPractices forSeizingElectronic Evidence Visit theFTC’s lawenforcementsitetoseetheresourcesavailable tolawenforcementofficers to identitycrimes Visit thePresident’s IdentityCrime Task Forcesitetolearnaboutthefederalagenciesresponses Visit www.idsafety.org 7 fortrainingcenterlocationsandtypesofavailable. . 4 forone-pagebriefingsheetswhichcanbemodified,copied,posted,and . forarchivedWebinars addressingdifferentaspectsoftheissues. 8 6 4 www.forwardedge2.com/ www.secretservice.gov/electronic_evidence.shtml www.idtheft.gov/index.html , 9 www.forwardedge2.usss.gov/ , 5

www.ftc.gov/bcp/edu/microsites/idtheft/law-enforcement/index.html 8 . , itmaybehelpfultoprovideofficers 9 . , 7

www.forwardedge2.com/pdf/bestpractices.pdf 6

. 5 . , , in-person trialappearances. trial andhowtosubstitutewitnessaffidavitsfor cate businessrecordsforpreliminaryhearingsand including suchtechnicalissuesashowtoauthenti standing ofwhatisneededtoprosecuteacase, state toensurethatofficershaveagoodunder draws onworkwithprosecutorsthroughoutthe departments throughoutthestate. This training four-hour trainingprogramforpoliceandsheriff’s Michigan Sheriff’s Association, hasdevelopeda Michigan Association ofChiefsPolice andthe The MichiganStatePolice, incooperationwiththe State ofMichigan Training 717.346.4086 tion, contactCharlesCrow, Directorof Training at copy ofthetrainingguideorforfurtherinforma tory in-servicetrainingprogramfor2007.Fora “Identity Crimes,”whichispartofthemanda tion and Training Commissionhasacourseentitled, The Pennsylvania MunicipalPolice Officers’ Educa Commonwealth ofPennsylvania Training April 2005. Stephen WhiteandMoniqueEinhorn,vol.72,no3, View: Identity Theft: Resources forPolice,” by See thearticleinPolice ChiefMagazine,“A Chief’s participants havebenefitedfromthesetrainings. industry fraudinvestigators.Morethan1,800 tives ofstatedepartmentmotorvehicles,and together policeofficers,prosecutors,representa seminars forlawenforcementmanagers,bringing The FTCandIACP C. Further Information haveheldregionalone-day -

- - - - - National WhiteCollarCrimeCenter(NW3C) puter forensics. year oninvestigatingelectroniccrimesandcom local policeofficers,prosecutors,andjudgeseach by theU.S.SecretService,willtrain900stateand uled toopeninJanuary2008. The Institute,run The NationalComputerForensic Institute of $2,500. locales, suchaslocalpolicedepartments,atacost exports itstwo-daytrainingsessionatalternate analyzing digitalevidence. The Training Center enforcement personnelinassessing,acquiringand Digital EvidenceProgram (FRDE),whichtrainslaw a varietyofcourses,includingFirstResponder to run bytheDepartmentofHomelandSecurity, offers The Federal LawEnforcement Training Center needs fortraining. online courses,tosuityourparticulardepartment’s tions. There arearangeofotheroptions,including of thesecrimestofacilitatesuccessfulprosecu course alsoteachesbestpracticesininvestigation public-private andinteragencypartnerships. The ficking andorganizationcrime,thevalueof identity crimesandterrorism,drugarmstraf identity crimeindicators,therelationshipbetween three-day coursethatteachesstudentstorecognize prosecutors. Identity Theft Investigations(IDTI)isa free trainingforlawenforcementpersonneland issched offers - - , -

-

No. 11 Identity Crime Toolkit for Police Executives Police for Toolkit Crime Identity Defending America Against Identity Crime No. 12 parties totheinvestigation.Furthermore,becauseofpotentialconnectionsidentitycrimesfederal In additiontothevictimhimselforherself,creditcompaniesandotherfinancialinstitutionsmaybekey be usedinmanyotherstatesandevenacrossinternationalborders. Generally, thecriminalactivityisnotlimitedtoonelocaljurisdiction—acreditcardstoleninCaliforniamay By theirnature,identitycrimeinvestigationsrequirepartnershipsandcooperationamongmultipleagencies. V. Agency Partnerships local financialinstitutions? Make anefforttogetknow managersandexecutivesatyour Belong totheLawEnforcementRetail Network? run bytheFTC? Input informationonidentitycrimesintotheConsumerSentinel database with theFTCcomplaintdatabase? Have standardreportingprotocolsforidentitycrimesthat areconsistent prosecutors onataskforce? Include local,state,andfederallawenforcementofficers and Participate inamulti-jurisdictionaltaskforceonidentitycrime? Does youragencydothefollowing: A. that canhelptoprevent,investigate,andrespondthegrowingproblemofidentitycrime. The purposeofthispartthetoolkitistohelplocallawenforcementcreateandsustainpartnerships attorneys, federalagenciesthatmayhavejurisdictionoverpartsofanidentitycrimeinvestigationinclude: In additiontotheusualcoordinationnecessarywithstateandmunicipalpolicedepartmentsdistrict potential jurisdictionoveraspectsofthesecrimes. concerns suchasmailfraud,interstatecommerceandnationalsecurity, anarrayoffederalagencieshave and respondtoidentitycrimeinyourjurisdiction? How wellisyouragencyconnectingtopartnerswhocanhelpyouprevent,investigate Assessment ofCurrentStatus • • • • • • • • The ImmigrationandCustomsEnforcement Agency The FederalBureauofInvestigation The Federal Trade Commission The SocialSecurity Administration The InternalRevenue Service The UnitedStatesDepartmentofJusticeComputerCrimesandIntellectualP The UnitedStatesSecretServiceCriminalInvestigationsDivision The UnitedStatesPostal Service Take thisshortquiztofind out:

roperty Section Yes No by StephenWhiteand MoniqueEinhorn, 11 10 Informationonthe Identity Theft Data Clearinghousecomesfrom“A Chief’s View: Identity Theft: Resources forPolice,” “Identity Theft,” Problem-Oriented Policing Series,p.31 20 ofthisdocumentforreportingprotocol. Taking aPolice Report onIdentityCrime”page credit cardcompanies,etc.See“Guidelinesfor order toreportthecrimebanks,debtcollectors, gets acopyofthereportthathe/sheneedsin victim bebriefandthattheimmediately It isimportantthatthefirstreporttakenfroma are consistentwiththeFTCcomplaintdatabase: 2. Developingstandardreportingprotocolsthat www.ectaskforce.org/regional_locations.htm To findataskforceoperatinginyourarea,visit investigation efforts. tigating entity, unlesslocalagenciescanpooltheir leaves mostidentitycrimecaseswithoutaninves and amulti-statefraudringisinvolved.” cases unlessthereisafinanciallossover$200,000 vestigating identitycrime,butit“doesnotaccept The SecretServicehasprimaryresponsibilityforin that keeppublicrecords. partments andlocalstategovernmentagencies that theyinclude,ataminimum,motorvehiclede possible, suchtaskforcesbeatthestatelevel,and Department ofJusticepublicationssuggestthat,if and expertise,avoidduplicateefforts.U.S. Task forcesallowagenciestoshareresources task forcesonidentitycrime: 1. Joiningorestablishingmulti-jurisdictional and respondtoidentitycrime. prove youragency’s abilitytoprevent, investigate partnerships withtheinstitutionsthatcanhelpim here aresomeideasforexpandingyouragency’s If youanswerednotoanyofthequestionsabove, B. Tools Effectiveness forImproving The PoliceChief , vol.72,no.3, April 2005. 10 This .

- - - - tions andinrestoringvictimstopre-crimestatus. enforcement playsinpreventingfuturevictimiza preciate theoutreach;theyknowvitalrolelaw about workingmorecloselytogether. They willap representatives justtobegintheconversation Club, orschedulingameetingwiththeindustry hosting anetworkingbreakfast,joiningtheRotary gating, andrespondingtoidentitycrimes.Consider and canbearealresourceinpreventing,investi also havetheirowntaskforcesandinvestigators credit institutionsinthelocalarea. These entities linking withthebanking,financialservices,and Police departmentsneedtobeproactiveabout tions (andtheirleadership)inyourarea: 5. Gettingtoknowthemajorfinancialinstitu www.ectasakforce.org/regional.locations.htm Leaders Association (RILA). To join,visit Retail Federation(NRF)andtheRetail Industry National the with FBI inconjunction Justice andthe LERPnet wasdevelopedbytheDepartmentof and helpstopcrimebycriminalorganizations. experts andlawenforcementtoshareinformation (LERPnet) isusedbylosspreventionindustry The LawEnforcementRetail Partnership Network 4. JoiningtheLawEnforcementRetailNetwork: dictional trendsandsharinginformation. intended toaidinvestigatorsinspottingcross-juris and statefederalagencies. This resourceis tity crimecomplaintsfromvictims,policeofficers, system includesmorethan700,000recordsofiden house aspartofitsConsumerSentinelsystem. This The FTCmanagestheIdentity Theft DataClearing investigators. the dataaboutcrimesforbenefitof law enforcementprofessionalswhoareinputting the problems,butalsoincreasedsavvyamong Sentinel growseachyear–showingthegrowthof The numberofcomplaintsenteredintoConsumer (Consumer Sentinel): 3. InputtinginformationintotheFTCdatabase

11

-

------

No. 13 Identity Crime Toolkit for Police Executives Police for Toolkit Crime Identity Defending America Against Identity Crime No. 14 Some examplesofsuccessfultaskforcesincludethese: public records. include, ataminimum,motorvehicledepartmentsandlocalstategovernmentagenciesthatkeep ment ofJusticepublicationssuggestthat,ifpossible,suchtaskforcesbeatthestatelevel,andthatthey Task forcesallowagenciestoshareresourcesandexpertise,avoidduplicateefforts C. operations, anditisnolonger operational. This taskforceputitselfout of businessbytrainingthemembershiptodothisworkas partofroutine before thecriminalwascapturedthrougheffortsofthis taskforce.” Florida warrant),beenheldinjailformorethanoneweek, andhadseveralciviljudgmentsagainsthim at leastthreetimesusingthevictim’s name. The victimhadbeenwronglyarrestedinCalifornia(ona had purchasedandsoldhomes,openedbankutilityaccounts, obtainedcreditandhadbeenarrested his walletonvacationinDaytonaBeach,and2001,when the investigationwasinitiated,thisoffender had usedtheidentityofaCaliforniavictimformorethan 12years.Between1987,whenthevictimlost ment, theOfficeofStatewide Prosecution, andtheSSA/OIGledtocaptureofoneFloridasuspectwho of onecasebytheHernandoCounty(Florida)Sheriff’s Office, theFloridaDepartmentofLawEnforce tigation ofidentitycrime-relatedcasesforlawenforcement audiencesacrossthestate. The investigation federal agencies,whoinvestigatecasesofidentitycrimeandconducteducationalseminarsontheinves consists offivefull-timespecialagents(as2001),andotherregionalpersonnelfrombothlocal target theperpetratorsofidentitycrime.OperationLEGIT (LawEnforcementGettingIdentity Thieves) Prosecution andtheFloridaDepartmentofLawEnforcement(FDLE)createdastatewidetaskforceto the U.S.DepartmentofJustice,July2005.“In2001,Florida Excerpt fromIdentity Theft LiteratureReview, GraemeR.NewmanandMeganM.McNally, publishedby Florida Statewide Task Force: rticle_id=1188&issue_id=52007 Department, Whittier, California A Metropolitan Approach toIdentity Theft ByRobert F. Berardi,Sergeant,Los Angeles CountySheriff’s Sacramento Valley Hi-Tech Crimes Task Force: Check outthe Task Forces’ Web siteat E-Mail: [email protected] Phone: 703.842.4050Fax:703.549.5202 Jim RybickiPublicInformationOfficer For moreinformation,contact: terms uponconviction. The taskforceincludes15federal,stateandlocallawenforcementagencies. of 51defendantsinNovember2006. There were45indictments,someonchargeswithmandatoryprison The workoftheMetro-RichmondIdentity Theft Task Force,establishedin2004,resultedtheindictment Metro-Richmond Identity Theft Task Force: Further Information published bytheU.S. DepartmentofJustice,July2005. 12 Seethediscussion oftaskforcesinGraemeR.Newmand andMeganM.McNally’ . www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display&a www.richmondidtheft.com/ Attorney General’s OfficeofStatewide . 12 . U.S.Depart s Identity TheftLiterature Review -

- - , artman2/publish/v_fact_sheets/Fact_Sheet_112_Identity_Theft_victim_-_Investigator_Communications.shtml 15 14 13 SeetheIdentity Theft Resource Centerfor summariesofvictimperceptionsin thisarea: NewmanandMcNally, p.31. NewmanandMcNally, Did youknow…? A. can preventidentitycrimesinyourjurisdictionandtoprovidetoolsforthatoutreacheducation. The purposeofthispartthetoolkitistohelpidentifyareaswherecommunityoutreachandeducation practices thatwilllowertheirriskofidentitycrimes. data-collection andmanagement.Police canalsohelpbusinessesbyassistingtheminadoptingbusiness the financeandcreditindustries,canhelppolicetocapitalizeontheirexpertiseincustomertransaction tity crimes.Outreachtoindustriesandlocalbusinessesaffectedbyidentitycrimes,suchasretailers In additiontoresidents,thebusinesscommunityisavaluableresourceandallyinfightagainstiden defense againstfurtherlossesaswelltheirfirststeptorecovery much moredifficult,anditisimportantthatcommunityresidentsrealizefilingareporttheirbest police (source:Identity Theft LiteratureReview). This makesthejobofpreventingfuturevictimization tity crimein2005(BetterBusinessBureau,2006).However, barelyone-thirdofthesevictimscontacted community residentsdoso. Approximately ninemillionpeopleintheUnitedStateswerevictimsofiden Finally, itiscrucialthatresidentsknowtofileapolicereportwhentheyhavebeenvictimized;yetfew ings, andhostingidentitycrimepreventioneventscanalsobuildcommunityawareness. prevention. Developingbrochuresonidentitycrimeprevention,givingpresentationsatcommunitymeet Security Administration, andotherrelevantfederalagenciescanhelpresidentsbecomebetterpartnersin ment. Posting preventiontipsandvictimactionstepsonyourWeb site,alongwithlinkstotheFTC,Social do intheeventtheybecomeavictim–startingwithreportingcrimetotheirlocalpolicedepart Community residentsneedtolearnbothhowprotectthemselvesfromidentitycrimes,andwhat positioned tohelppreventidentitycrimebytakinganactiveroleinbuildingcommunityawareness. law enforcementtakestheleadoneducatingcitizensinthisarea,andyet,localiswell less vulnerabletocrime,andbetteratpreventingit.Inthecaseofidentityitisrarethatlocal One ofthechallengesfacinglocallawenforcementishelpingcommunityresidentsandbusinessesbecome VI. CommunityOutreach • • • Assessment ofCurrentStatus Identity TheftLiterature Review “do notcare”aboutthiscrime? That theIdentity Theft Resource Centerreportsthatvictimsperceive police That MasterCard That oldervictimsarelesslikelytoreportidentitycrime than youngervictims? ® andVisa , p.16. ® hadestimatedlossesin2000of$114million? 15 www.idtheftmostwanted.org/ . 14

13

- - - -

No. 15 Identity Crime Toolkit for Police Executives Police for Toolkit Crime Identity Defending America Against Identity Crime No. 16 Check allthatapply: What hasyourdepartmentdonetohelppreventresidentsandbusinessesfrombecomingvictims? 2. 1. Do notworry–ifyouhavedonetheoutreachabove,herearesometoolstogetstarted: B. Consulted withbusinessesonthelocationofvideosurveillancecameras Provided informationforareabusinessesonsafebusinesspractices Hosted, sponsored,orpromotedaShred-a-Thon Developed printmaterialstoexplainidentitycrimescitizens information andconsidercontactingyourlocalchapterfor helpinorganizinganevent. for theirmembersandasapublicservice.Visit NAPO’s Web siteat they havevolunteeredinsomecommunitiestoorganizethese eventsasapromotionalopportunity National Association ofProfessional Organizers. This grouphaschaptersalloverthecountryand publicize preventiontips.Oneresourceforyourcommunity inputtingonashred-a-thonisthe Many communitieshostshred-a-thons;afunwaytoraise awareness aboutidentitycrimeand Shred-a-Thons meetings. Visit You mayalsowanttouseafreeandexcellentPowerPoint presentationatcommunitycrimewatch modified, putontoyourdepartment’s letterhead,anddistributedatcommunityevents. See distribution atcommunitymeetingsandevents. Visit Develop materialstoexplainidentitycrimescitizens Tools Effectiveness forImproving Notified victimsofcrimethattheyarealsoatriskidentity Provided mediainformationontheimpactofidentitycrimeatlocallevel Worked withlocalmediatohelpexpandcoverageofidentitycrimes Developed specialoutreachstrategiesfortargethighriskgroups,likeseniors report incaseofidentitycrime Created aWeb site(orpartsofaWeb site)withlocalinformationonhowtofilea Offered presentationstobusinessgroupsonhowdecreaselossesduefraud Attachment G www.idsafety.org www.mc.vanderbilt.edu/medschool/finaid/docs/Grand_Theft_Identity.pdf foraflyer, adaptedfrom theLos AngelesSheriff’s Department,thatcanbe to requestcopiesoftheIdentityCrimePrevention Kit –availablefor www.napo.net formore . 19 18 17 16 www.seniorjournal.com/NEWS/Money/Valentine/6-10-05-GreatIdeasForSenior.htm www.ou.edu/oupd/inetmenu.htm www.tempe.gov/cpu/IdentityTheft.htm www.michigan.gov/msp/ 8. 7. 6. 5. 4. 3. prevention foridentitycrime. but worksjustaswellaguideforsmallpolicedepartments seekingtopromote An excellent,easy-to-useguidetogettingmediacoverage foryourcausecanbefoundat Work withlocalmediatohelpexpandcoverage ofidentitycrimes emailing togroupswhoworkwiththeelderly. The SeniorJournalhasagreatarticleaimedathelpingseniors protectthemselves;itisworth Develop specialoutreachstrategies fortargethighriskgroups,suchasseniors • • • from, identitycrime.Visit theseexamplesforinspiration: There aremanyexcellentwebresourcesforvictimsandbusinessestohelpguardagainst,orrecover identity crime Create aWeb site(orparts ofaWeb site)withlocalinformationonhowtofileareportincaseof a downloadableinformationsheetonhowbusinessescanprotectconfidentialdata. Visit thispage, and theirdata. of identitycrimesinyourcommunity, andalsooffertipsonhowbusinessescanprotectthemselves abouttheprevalence At ChamberofCommercemeetingsorsimilargroupsbusinesses,youcantalk Offer presentationstobusinessgroupsonhowdecreaselossesduefr need forinvestigations. expanding your outreach to businessesbyoffering to helpposition cameras to capture theimagesyou Your officersmayalreadydothiswithbanks andotherbusinessesconcernedwithcrime.Consider surveillancecamerasConsult withbusinessesonthelocationofvideo Chamber ofCommerce. consider sendingthelink, becoming compromised.Print thisWeb pageandgiveittothebusinessesinyourcommunity, or The FTChasaconciseprimerforbusinessesonhowtopreventtheircustomers’ informationfrom informationforareabusinessesonsafebusinesspracticesProvide www.causecommunications.com/diy/getnewscoverage.html The UniversityofOklahoma The Cityof Tempe, Arizona The MichiganStatePolice http://i.i.com.com/cnwk.1d/i/bnet/BNET_10_Ways_To_Protect_Your_Data1.pdf www.ftc.gov/bcp/edu/pubs/business/idtheft/bus59.shtm 16

17 18

19 . Itisdirectedatnonprofits aud toyourlocal , for

No. 17 Identity Crime Toolkit for Police Executives Police for Toolkit Crime Identity Defending America Against Identity Crime No. 18 in investigations,andpunishcriminals. seriousness ofthesecrimesandlawsthatareneededtopreventidentitycrimes,protectvictims,assist As youtaketimetoeducateyourcommunity, youmayalsowanttoeducatepublicofficialsaboutthe 1. C. 2. Group’s (USPIRG)Web siteat Learn moreaboutadvocacyforimprovedlegislationonidentitycrimeattheU.S.PublicInterestR tive capacitytohelpvictimsberestoredtheirpre-crimestatus. role inhelpingtocreatelegislativemomentumprotectpeoplefromidentitycrimeandbuildlegisla vice ofpoliceofficialswhennewlegislationisunderconsideration.P area. Legislatorsrelyuponpoliceforinformationaboutemergingcrimeproblems,andalsotakethead important thatpoliceexecutivestakealeadershiproleineducatinglegislatorsandpolicymakersthis of howeachstate’s lawscomparetothemosteffectivelegislativeefforts. As communityleaders,it is Visit Legislative Changes Further Information Examples ofSuccessfulInitiatives www.idsafety.org

WinCo Foods

WinCo Foods is an Oregon grocery retailer that had become a suscep tible fraud target because it lacked fraud prevention training and the accompanying systems and processes. The Beaverton Police Department established a partnership with WinCo Foods and provided important staff training tools. As a result, WinCo Foods adjusted its customer transac tion process and now requires photo identification from customers paying by check. The company also altered the position of surveillance cameras to obtain better footage of individuals who cash checks. This repositioning helped identify the suspect when a crime occurred. Crime reporting also increased.

From The Police Chief, vol. 74, no. 5, May 2007. Copyright held by the Interna tional Association of Chiefs of Police, 515 North Washington Street, Alexandria, VA 22314 USA. toseeacompendiumofup-to-datestatelawsandmatrixthatoffersananalysis www.uspirg.org/financial-privacy-security/identity-theft-protection

-

-

Using Volunteers for Community Outreach

- Charlotte-Mecklenburg Police Depart ment created a victim alert program to prevent theft victims from also becoming victims of identity crime. Citizen volunteers receive training on identity crime and how personal information is compromised. They are taught to pull crime reports on the types of thefts (stolen wallets, thefts from autos, etc.) that are a precursor to identity crimes. Volunteers contact the theft victims and advise them of the actions they should take to avoid becoming victims of identity crime, such as canceling lost or stolen credit cards and activating a fraud alert with the three credit reporting agencies. (Contact: Charlotte-Mecklenburg Police Department, Fraud Unit, 704.336.2311). olice officialshaveaunique,critical

-

. esearch - - (list appropriatesupervising officer here) and willreportto: (list particulardutieshere) The IdentityCrimeSpecialistwill Proven abilitytoplanandexecutetacticaloperations,including: Experience services (includingshopping,banking,financialtransactions,etc.)workandinteract Understanding orabilitytolearnthewaysthatcreditcompanies,bureaus,banks,andonline Understand thedifferencebetweenidentitycrimesandotherformsoffraud Familiarity withtheelementsofidentitycrimeandrelatedcrimes Understanding ofcourtroomprocedures Understanding ofdepartmentpolicies Understanding ofthesearchwarrantwritingandservingprocesses Ability torecognizeevidence A workingknowledgeofourlocal,state,andfederallaws Familiarity withlawenforcementresourcesinternallyandexternallytosupportinvestigations Knowledge new approaches;abilitytousecomputers,databases,andconductresearch. and businesses;beacreative,innovativeworker, andbeaself-starter–abletoenvisionimplement Excellent communicationsskills,particularlyforworkingwithotherlawenforcementagencies Skills skills, knowledgeandexperience: externally withvictims,thebusinesscommunity, andpolicymakers.He/Shemusthavethefollowing The IdentityCrimeSpecialistwillbeworkingcloselywithinthedepartmentwithinvestigatorsand to identitycrimes;agrowingprobleminourjurisdictionandacrossthecountry. The XYZPolice Departmentseekssupportforitsworkinpreventing,investigatingandresponding A. VII. • • • • • • • • • Sample JobDescriptionforanIdentityCrimeSpecialist Attachments

Working withmultipleagenciesatalllevelsofgovernment Debriefing personnel Coordinating postinvestigativeactivities Planning forcontingencies Executing theplan Briefing theoperationsplan Coordinating resourcesforsearchwarrantoperations Coordinating activitiesassociatedwithcontrolleddeliveriesorsurveillances Developing atacticalplan

No. 19 Identity Crime Toolkit for Police Executives Police for Toolkit Crime Identity Defending America Against Identity Crime No. 20 credit bureaus,anddebtcollectors. The initialinvestigativereportshouldonly includeabriefbutthor An identitycrimevictimmustprovideacopyofthepolicereporttobanks,creditors,otherbusinesses, start themonthelongroadtorecoverytheirpre-crimestatus. purposes ofthistoolkitistoencouragelawenforcementtakethereportfortheirresidentshelp Victims arerequiredtofileapolicereportstarttheirrecoveryfromidentitycrime.Oneoftheprimary B. credit bureau,collectionagency, creditcardcompany, orchargeaccount thatwascompromised. to copythepolicereportandattachitaofthisID Theft Affidavit andfileacopy ofbothwitheach The affidavitisNOT for thepolicedepartmentorotherlawenforcementagency. Thevictimshouldbetold or directthemto and creditbureaus.Provide thevictimwithacopyofID Theft Affidavit andtheform’s instructions, The FTChaspreparedan“ID Theft Affidavit” thatisacceptedbymanybanks,creditors,other businesses, charge accounts. The victimshouldreviewtheircreditreportsandcloseany unauthorizedorcompromisedcredit bureaus. They canbeobtainedatnocost: toobtainacopyoftheircreditreport Police victims shouldadvise the suspectaspossibleanddocumentwhytheybelievethis. If thevictimsuspectswhomayhavecommittedoffense,obtainasmuchidentifyinginformationon provided tothevictim. ough summaryofthecomplaintinformationsothatacopyinitialreportcanbeeasilyandpromptly Guidelines for Taking aPolice ReportonIdentityCrime Credit Report Free Annual Trans Union Experian Equifax

www.consumer.gov/idtheft/

www.annualcreditreport.com 800.680.7289 P.O. Box6790,Fullerton,CA 92634 Fraud Victim Assistance Division www.transunion.com 888.EXPERIAN (397.3742) P.O. Box9530, Allen TX 75013 www.experian.com 800.525.6285 P.O. Box740241, Atlanta, GA 30374-0241 www.equifax.com foracopytheycanprintthemself. fromoneofthethreecredit

-

Take path the status! on back to their to pre-crime put victims thereport Remember: www.idsafety.org outline ofthingstodoassistintherecoveryfromidentity crime.Inaddition,heorshecanvisit Identity Theft.” Heor shemayobtainacopyat You shouldalsoencouragethevictimtoobtainFTC’s guidebook,“Take Charge:FightingBack Against this crime. to contacttheirlocalNetworkofVictim Assistance (NOVA) forassistanceinhandlingtheirrecoveryfrom Because victimsmaybeoverwhelmedbythepossiblylongandtediousprocess,youshouldencouragethem can registeritspoliceofficerswiththeFTCat database forpossibletips,otheragencyinvolvement,andrecommendedactions. Police shouldcomparenewinformationwiththeotherreportedincidentsinFTC’s ConsumerSentinel instructed toaccessthisFTCconsumercomplaintformonlineat tion ofidentitycrime-relatedcrimes.Fortheircomplainttobepartthisdatabase,victimsshould database toassistlawenforcement.Known astheConsumerSentinel,itisalawenforcementonlycollec In additiontoprovidingawealthofinformationonhowcopewithidentitycrime,theFTCmaintains automatically notifiedtodothesame. from beingopened. As soonasoneofthecreditbureausplacesafraudalert,othertwoare bureaus willputafraudalertonthevictim’s creditreporttopreventanyfurtherfraudulentaccounts The victimmustcontactoneofthethreecreditbureaustoreportcrime.Whencontacted, affidavit, suchastheFTCID Theft Affidavit. identity forproofof Police thatthecreditorisentitledtoaskvictim shouldalsoinstructthevictim Documentation isessentialtoasuccessfulrecoveryandeventualprosecution. a journaltodocumentwhotheycontactedforeverystepoftheway Since thisentirerecoveryprocesscanbelonganddrawnout,officersshould and askifthecreditorhasaspecificaddressforvictimtomakethisrequest. to thecreditor. The victimshouldbeinstructedtocontactthecreditor’s frauddepartmentbytelephone The victimmaygivelawenforcementpermissiontoobtaintheserecordsbyprovidingwritten receiving thevictim’s request. a copyofthefraudulentcreditapplicationorotherbusinesstransaction,freecharge,within30days The creditorisalsorequiredbylaw(FairCreditReporting Act, Section609(e)),toprovidethevictimwith , suchasagovernment-issuedIDcard,andrequestcopyofthepolicereportcompleted tofindtheBankof America/IACP IDCrime Recovery Kit. www.ftc.gov/sentinel/ www.consumer.gov/idtheft/ www.consumer.gov/idtheft/ . andwhatactionstheyhavetaken. . Itisapoint–by-point advise the victim toprepare thevictim advise Your policedepartment . -

No. 21 Identity Crime Toolkit for Police Executives Police for Toolkit Crime Identity Defending America Against Identity Crime No. 22 The initialinvestigativereportshouldonlyinclude tors, otherbusinesses,andthecreditbureaus. police reportpriortocontactingbanks,credi The victimofidentitycrimeisrequiredtofilea 1. C. completed affidavit,liketheFTCID Theft Affidavit. card, acopyofthepolicereport,and identity, whichwouldbeagovernmentissuedID creditor isentitledtoaskthevictimforproofof It isimportantforthevictimtoknowthat or chargeaccountthatwascompromised. bureau, collectionagency, creditcardcompany, Affidavit andfileacopyof report andattachittoacopyoftheID Theft The victimshouldbetoldtophotocopythepolice victim to businesses, andthecreditbureaus.Direct that isacceptedbymanybanks,creditors,other Commission haspreparedan“ID Theft Affidavit” credit cardsorchargeaccounts. The Federal Trade any new, unauthorizedaccounts whethertheyare The victimmustimmediatelycloseanddispute 3. 2. recovery tohisorherpre-crimestatus. the continuingidentitycrimesandstartlong an affidavit,tostarttheprocesspromptlystop needs acopyofthereport,coupledwith copy oftheinitialreporttovictim. The victim the departmentcaneasilyandpromptlyprovidea a briefsummaryofthecomplaintinformationso Take thereport compromised accounts cancelanyfraudulent or Help thevictim Kit. anIdentityCrimeRestoration Give thevictim Guidelines forHelpingResidents Affected byIdentityCrimes Visit www.consumer.gov/idtheft/ www.idsafety.org both foracopy. witheachcredit foracopy. -

step guidetorecovery. www.consumer.gov/idetheft/ affected byidentitycrime.Directvictimsto The FTCalsooffersaguidebookforthose in therecoveryprocess: The NetworkofVictim Assistance (NOVA) canassist 6. linspectors/fraud/MailFraudComplaint.htm Postal InspectionServiceat mail, recommendheorshealsocontacttheU.S. for lawenforcement.Ifthecrimeinvolvesregular his orhercomplaintwillbepartofthedatabase complaint format should beinstructedtoaccessthisFTCconsumer tion ofidentitycrime-relatedcrimes. The victim Consumer Sentinel,alawenforcementonlycollec a databasetoassistlawenforcementcalledthe how tocopewithidentitycrime,theFTCmaintains In additiontoprovidingawealthofinformationon 5. Equifax, Transunion andExperian. visit crime fromcontinuing.Forinstructionsandhelp, accounts frombeingopenedandstoptheidentity credit reporttopreventanyfurtherfraudulent the creditbureausputafraudalertonvictim’s bureaus toreporttheproblem.Whencontacted, The victimmustcontactoneofthethreecredit 4. with recovery toresourcesavailablehelp Alert thevictim fileacomplaintwiththeFTC Help thevictim their creditreport getafraud alertplacedon Help thevictim www.annualcreditreport.com www.consumer.gov/idtheft/ http://trynova.org/ www.usps.com/posta forthisstep-by- , sponsoredby

. .

so - - F. improve theoddsofconductingasuccessfulinvestigationandalsoinidentifyingadditionalvictims. Once avictimhasreportedsuspectedidentitycrime,therearefewstepsthatofficerscantaketo D. (from LA Sheriff’s Department) Typical Fraud Schemes 4. 3. 2. 1. Guidelines forInvestigatingIdentityCrimes FinCEN (FinancialCrimesEnforcementNetwork) Links amongdatabases agencies andinvestigators. Use E-Information,anintranetsiteoperatedbytheSecretService.Freeforlawenforcement Bank andCreditCardInformation United StatesPostal InspectionService Information onlatestscams,andhowtoworkwiththeUSPSprevent/respondcrimes 1.877.IDTHEFT (1.877.438.4338) Federal Trade Commission(FTC) Explanation oftheConsumerSentinelDatabaseandhowtouseit IACP/Bank of America – local lawsinthisarea. Visit username andpassword,toenableuseofthedatabaseforinvestigatingthiscrime. Commission, calledConsumerSentinel.Visit thissite Our departmenthasregisteredforaccesstoadatabaseownedandoperatedbytheFederal Trade Checklist Use additionalinvestigativetoolsasnecessary. Know ourlocallaws Compare theincidentwithConsumerSentineldatabase. www.usps.com/postalinspectors/ www.consumer.gov/idtheft ofIdentityCrime–helpinunderstandingthescopeandnature ofthesecrimes Overview www.idsafety.org (seepage24-25) andclickonyourstatethemaptogetup-to-dateinformation www.idsafety.org/ www.ftc.gov/sentinel/ togetyourown

No. 23 Identity Crime Toolkit for Police Executives Police for Toolkit Crime Identity Defending America Against Identity Crime No. 24 operations andsuccessfulresolutionoftheincident. pliance withanagency’s standardoperatingprocedures,byagents/investigators,canresultinefficient have establishedeffectivepoliciesandproceduresforthehandlingofidentitycrimeinvestigations.Com investigating casesofidentitycrime.Lawenforcementadministratorsshouldensurethattheiragencies The purposeofthischecklististoprovidelawenforcementofficersandagencieswithagenericguidefor E. investigations. considerations, andactivitiesthatcanassisttheminperformingcompetent,productivesuccessful tity crimeinvestigation.Itismeanttoprovidetheagent/investigatorwithabasicframeworkofactions, This checklistisnotintendedtobefollowedstep-by-stepbyagents/investigatorsineveryreportediden a a a a a a a a a a a a a Checklist forInvestigatingIdentityCrimes

Ensure that the date of the incident falls within the statue oflimitationsforprosecution. incident fallswithinthestatue dateofthe Ensure thatthe If a socialsecuritynumberwasusedbythesubject(s),contactSocialSecurity If a Administration’s thevictimpotentiallongandshort-termconsequencesofbeingaan Explain to fromthevictim(s)under“FairCreditReportingObtain authorization Act” toobtaintransaction victim(s) gatheralldocuments(bankandcreditcardstatements,lettersfromcreditors Have the victim(s)tofollowuponallrequeststheyreceivefromcreditors. Direct the tomaintainacentralfileofallpaperwork, documents,policereportsandcorre- Direct victim(s) whencontactingtheircreditorsorothers regardingthecrimetomaintaina Direct victim(s) victimofanyVictimAdvise the Advocacy Program thatmayexistwithintheircity, countyorstate. Refervictim(s) tootherWeb the sitesorcontactnumbersthatcanassisttheminrestoringtheir victim(s)oftheidentityandcontactinformation forthecaseagent/investigator.Notify the agrees toinvestigatethecrime,assignacaseagent/investigatorandanalyst. If agency amounts oftheftorvictims,agencymakesadetermination toinvestigatethecrime. Based on used andcompareittotheinformationthatwasprovided bythesubject(s). Office ofInspectorGeneralandobtaintheaccuratebiographical informationfortheSSNthatwas identity crime. records fromtheircreditorswithoutsubpoena. or collectionagencies,etc.)thatwouldassistintheinvestigation. spondence pertainingtothecrime. contents oftheirdiscussions. written logofallphoneconversationswithdates,times,personwhomtheyspokewith,andthe identity andcredit.

- -

a a a a a a a a a a a a a a a a a Conduct a legalsearchofthesuspect’sConduct a homeandseizeallrelevantdocumentsevidence. Periodically briefyoursupervisorsandinvestigativestaffonthestatus oftheinvestigation. Periodically meetwithprosecutorandotherinvestigatorstoreviewcaseinvestigation spreadsheetsforthepurposeofbuildingaccount/victim databasesandmaintaina Utilize SecretServiceE-InformationNetworkat: Contact the cardsecuritydepartments. Contact credit informationfromPostalObtain available Inspectors’ reference postofficeboxes,associated contactmerchantsecuritydepartmentsandsolicittheirassistance. If applicable, orotherfinancialinstitutionswhereillegaltransactionsoccurredandattemptto Contact banks isidentified,usetraditionalinvestigative techniques(i.e.,trackingdevices,mail Once asuspect identifysourceofcompromisesuchasaccountant,lawyer, to Attempt dentist,school, oragent/investigatorreviewallvictimdocumentationinanefforttoestablish Have ananalyst allrelevantrecords(bank,computer/Internetaccountinformation,creditcard Subpoena withotherlawenforcementagenciestoascertainiftheyhavesimilarreported Communicate Review documentsprovidedbythevictim(s)(i.e., all ATM receipts,bankstatements, recently identifyotherassociatedvictimsthrough the useofFraud-Net,andConsumerSentinel to Attempt victim(s)toestablishspendingpatternsandattemptidentifyothervictims. Interview discuss futureinvestigativestepstoincludetheuseofagrand jury. leads database. applications, andforwardinginstructions. fiers toincludemailingaddress. obtain videorecordingsorsurveillancesofthetransactions,andallpersonalvictimidenti- covers, surveillances,trashpulls,telephonetollrecords,andforensicanalysis)toobtainevidence. employer, insurancecarrier, oranyoneelsewhomayhaveaccesstothevictim’s identifiers. themes wherefraudulentinformationwasused. victim’s spendingpatternsandattempttoidentifypossiblesuspect(s)byestablishingcommon information, andvictim(s)creditinformation). crimes, victims,orpossiblesuspects. opened storeorbankaccounts,creditreportsandcardinformation). at www.ftc.gov/sentinel ,

and shareintelligencewithotherlawenforcementagencies. www.einformation.usss.gov .

No. 25 Identity Crime Toolkit for Police Executives Police for Toolkit Crime Identity F. Typical Fraud Schemes Endless Chain Fortune-Telling / Psychic Fraud Distraction / Impostor Burglary Also know as a pyramid or . This is You may be approached at stores, hotels, restau- A suspect comes to your house claiming to be from Pigeon Drop or any scheme whereby a participant pays a valuable rants, etc., or when you go to a physic reader. The a city or county agency such as water or power. In this type of scam, the suspects work in pairs. consideration for the chance to receive compen- psychic convinces you that you have an evil curse He/she needs to come into your house to check for One befriends an unsuspecting citizen, the sation for introduction of one or more additional or evil spirits that must be “cleansed.” Cleansing is problems. Once inside the suspect distracts you and “pigeon,” claiming to have either a large sum persons into the scheme. In reality, the only people an ongoing process that requires you to pay thou- steals cash and other valuables. of money he/she just found or the winning lotto who get the money are those who are at the top, sands of dollars in cash, jewelry, vehicles, etc. ticket. He/she cannot go to a bank because he/she usually the organizers or suspects. Those towards Canadian Sweepstakes is an immigrant or another plausible sounding the bottom get nothing. Lost Pet or Lost Property Scam You receive a call from someone who says you have reason. As the first suspect is talking with the You place an ad in a local paper about a lost pet or won a Canadian sweepstakes, but you must pay Ca- victim, the second suspect approaches and gets Planned Insolvency (Bust Out) lost property. You then receive a call from a long nadian taxes before your winnings can be claimed. involved. One of the suspects will go to phone and A business fraud where the suspects request credit, haul truck driver who says he found your lost item You are told to send a cashier’s check or wire call a lawyer. The suspect returns and says they via a fraudulent credit application, for small but he is now hundreds of miles away. He will re- money via Western Union to them in Canada. It is a can keep the money and split it three ways but quantities of goods or services. They initially pay as turn your property (or advise of the location of your scam, your winnings never arrive. Also be advised, to get their share, all have to put up some “good agreed. The credit line and order is subsequently pet) after you send a “reward” by Western Union. it is illegal for U.S. citizens to enter foreign lotter-

faith” money. The second suspect shows he/she has increased with the suspects receiving 30 to 45 days ies (US Code Title 18, Part 1, Chapter 95). Identity Crime Toolkit for Police Executives his/her money with a roll of what appears to be to pay. After receiving a large order, the suspects Lost / Stolen Purse cash. Everyone agrees to get the money then meet and their business disappear. Sometimes, the A “police officer” calls you to advise he/she found Purchase of Lottery Tickets at a designated place to divide the proceeds. The suspects will pay with a bad check in order to gain your purse (often before you realize it is missing You receive mail or calls from a company represen- victim contributes his/her “good faith” money, as more time to make their escape. or have reported the crime). The “officer” needs tative who will purchase lottery tickets for you in well as the second suspect, by putting the money your personal information for his/her report. You, another state (usually Florida) and send you copies into a bag. You are then given the bag to hold while Theft by False Pretenses believing a police report is being taken, provide of your tickets. He or she keep the originals so they the two suspects go to collect the money. Covertly, A form of theft whereby the possession and title your personal information to the suspect and do can collect for you if you win. You may even be a switch has been made and you are left holding a to money or other valuable property is voluntarily not report the crime or cancel your accounts. The conned into writing them monthly checks or allow- bag containing only shredded paper. transferred from the victim to the suspect who suspect then uses your personal information and ing them to debit your checking account so they has made a misrepresentation (a lie). The suspect credit cards to run up very large bills. can purchase lottery tickets for you on a weekly Charity Switch never had any intention of holding up his or her end basis. You have been scammed. The only one col- Very similar to the pigeon drop, but with a slight of the bargain. Before you realize their dishonesty Mail Theft lecting anything is them. variation: You are approached by one suspect who they are long gone with your money. Both incoming and outgoing mail can be stolen claims to have recently come to America with a from your mailbox. Your checks can be “washed” to large amount of cash to be delivered to a church, Bank Examiner remove payee and amount information and altered This is a term used when the identity criminals but no one is at the church. The suspect tells you The suspect approaches you or may call you on the so the suspect can cash them for more money. send out a very official looking e-mail to try and Defending America Against Identity Crime America Defending he must leave the country soon and asks you and phone claiming to be a police officer who is investi- The criminals can obtain your name and credit get you to provide them with your personal infor- another person (a second suspect) to deliver the gating bank employees for embezzlement. You are card numbers from your outgoing bills and use this mation. They will try to fool you into thinking your money later. You are asked to put up “good faith” asked to go to your bank and withdrawal cash so information to charge new purchases. Credit card bank has sent the e-mail by placing the banks logo money to show you are honest. The suspects switch the officer can watch the bank employees. You are applications can be stolen and altered. The suspect in the message. The e-mail will ask you to “verify” the money and disappear. told to give the money to a “detective” who will then applies for a new credit card in your name and your personal information, i.e. your social secu- return the money to the bank for you. The suspect goes shopping. rity number or account number. Once the identity Advance Fee Scams disappears with your money. criminals have this information they may use it In these types of , you are contacted, usually Home Repair to apply for new credit in your name, or make a by telephone, and told you have won a grand prize Sweetheart Swindle These suspects go door-to-door offering you a great withdrawal from your account. Your bank already which is a very large sum of money. To collect the This scam often involves an elderly man who is deal on yard work, roof repair, chimney sweeping, has this information and will never ask you to verify winnings, you must pay the taxes/fees up front befriended by a young woman. She convinces him house painting, etc. They may have “extra” sup- this information via e-mail. Be very aware of this for the money to be sent to you. The money you she truly cares about him and implies a romantic plies left over from their last job so they say they type of scheme. Do not ever respond to this type of send is usually to a location out of state or another interest. She tells him she needs money for rent, can save you money. Usually their products and e-mail, and it is not necessary to report this alone country such as Canada of Africa. After a short food, furniture, her business, or she needs surgery. labor are inferior. At the completion of the work, as a crime. If you have sustained a loss immediately period you are contacted again and told there She may swindle him out of his life savings, often they claim to have used more supplies or there was contact your local police or sheriff’s station to were problems with the winnings and you must causing him to file bankruptcy. This is a very com- more work than anticipated so they demand more report the crime. send additional money to collect your prize. The mon fraud among Gypsy women. money from you. They can be very intimidating. prize never comes, and you realize you have been scammed.

No. 26 No. 27 Defending America Against Identity Crime No. 28 assumes youridentityandgoesonaspendingspree,commitscrimeinname,ordoesanyof Identity crimeiswhenasuspectgainsaccesstoyourpersonalinformationand/oraccountnumbersthen IDENTITY CRIMEPREVENTIONKIT. This crimewillimpactoneoutofeveryfourpeople. IDENTITY CRIMEisthefastestgrowingcrimeinUnitedStateswithoverninemillionvictimsannually. G. Any oftheseindicatorscouldmeanthatyouhavebecomeavictimidentitycrime: it istoolate.Itcantakealongtimetoreversethedamagethesecriminalsdoyourcreditrating. there arewaystoreduceyourchancesofbecomingavictim.Mostvictimsdonotdiscoverthecrimeuntil or overtheInternet? Although itisimpossibletoguaranteethatidentitycrimewillnothappenyou, the courseofabusyday, howoftenmightyoushareinformationaboutyourselfinperson,onthephone, You donothavetobeavictimofidentitycrimeforpersonalinformationfallintothewronghands.In Discovering youhavebecomeavictim lose theircarsorhomes. unjustly harassedbydebtcollectors,deniedcreditoremploymentopportunities,andinsomecaseseven must devotetheirtime-uptohundredsofhoursinsomecasesdoingso.Inthemeantime,victimsare Once victimized,peopleendupspendingmoneyout-of-pockettocleartheirrecords,buttheyalso been destroyed. bill, collectionnoticeorattempttomakealargepurchase,suchascar, andthenrealizetheircredithas started touseyouridentitydohis/hercrimes.Oftenvictimsdiscoverthecrimeaftertheyreceivea It isanunusualcrimeinthatyouoftendonotrealizeareavictimuntillongaftertheperpetratorhas number ofthingswhileposingas Community OutreachFlyer • • • Mail fromunknownlendersaskingforadditionalinformation Phone callsfromcreditorsaboutdelinquentpaymentsyoudonotrecognize Mysterious billsforaccountsyouarenotawareof you . Visit www.idsafety.org todaytogetyourFREE

IMMEDIATELY toreportthecrime. Then, If youbelievearethevictimofafraudoranidentitycrimecontactyourlocalpolicedepartment What todoifyoubelieveareavictim • • • • • • • • • • You mayalsofileacomplaintonlineat from yourcreditfile. to yourcreditorsthatyouhavebeendiligentineffortsclearupthefraudulentactivity one ofthefirstthingsdetectiveinvestigatingyourcasewillrequestfromyou.Italsoproves while attemptingtoclearupyourcreditfile. Keep thischartinasafeplace. Thisinformationis complaint. The FTCisthenationalrepositoryfortrackingidentitycrime. immediately. the charge. records, andsignatures. documentation relatedtotheaccount,suchasacopyofcontract,statementsortransaction your file. Note: Somecreditorsmayhavetheirownaffidavitforyoutocomplete. enforcement’s actions,documentation checklist,andfraudulentaccountstatement(s). If yoususpectsoc Keep areco As avi If youbelie Send adi Cont Send Complete anaffidavitwithinformationregardingyouasthevictim, Contact thethreemajorcreditbureausandrequestafraudalertbeplacedinyourfile. Notify yourfinancialinstitutionsandaskiftheyhaveanidentitycrimeassistanceprogram. act thefraudunitofcompanythatopenedfraudulentaccount.Request copiesof ablockinglettertothecreditbureausaskingthemblockfraudulentactivityfrom ctim, itishighlyrecommendedthatyoucontacttheFTCtoreportfraudandfilea spute lettertothecompanythatissuedyourmisusedaccountaskingthemremove ve anylegitimateaccountshavebeencompromised,contactthefinancialinstitution rd ofthecreditbureaus,banks,andlawenforcementagenciesyouhavecontacted ial securitynumbermisusecalltheSocialSecurityFraudLineat800.269.0271. www.socialsecurity.gov/oig . how thefraudoccurred,law

No. 29 Identity Crime Toolkit for Police Executives Police for Toolkit Crime Identity Defending America Against Identity Crime No. 30 Avoiding identitycrimeisnotsimplebutthereareseveralcommonsensethingsconsumerscando: Tips onhowtoavoidbecomingavictim

• • • • • • • • • or toanyoneyoudonotknow. Donotbeafraidtoaskwhyyourpersonalinformationisneeded Do notgiveyoursocialsecurityoraccountnumberoverthephonetoanyonewhohascalledyou, accessible placeslikegloveboxesordayplanners. Keep personalinformationinasafeplaceandavoidstoringimportantdocumentseasily not theimpostor. of identitytoverifythattheapplicantis given phone number or ask for additional proof intended topromptthecreditissuercalla An initialfraudalertlastsfor90daysandis check inresponsetoanapplicationfornewcreditthatyouridentityhasbeencompromised. crime victimcanplaceonhisorhercreditfile,whichalertsissuerswhoaredoinga Check intoputtingafraudale information inasecuremailbox. Retrieve papermailfromyourmailboxpromptlyanddepositoutgoingcontainingsensitive in yourwalletorpurse. Refrain fromcarryingunnecessaryinformationsuchasPINs,passwords,orsocialsecuritynumbers monthly. If youdonothaveaccesstoonlineaccounts,reviewyourpaperbankandcreditcardstatements Monitor youraccountbalancesandactivityelectronically(atleastonceperweek). pay billsonlinefromfinancialinstitutionsecure Web sites. Cancel yourpaperbillsandstatementswhereverpossibleinsteadcheck documents thatcontainyoursocialsecuritynumberinthetrashcan. Shred alldocumentsthatcontainpersonalinformationbeforetossingthemout.Neversimplytoss and howitwillbeused. rt onyourcreditfile. A fraudalert isamessagethatanidentity

NOTES:

No. 31 Identity Crime Toolkit for Police Executives Police for Toolkit Crime Identity Defending America Against Identity Crime No. 32 NOTES: The International Association ofChiefsPolice 515 N.Washington Street, Alexandria, VA 22314 Telephone: 1.800.843.4227www.theiacp.org Protecting theReal You andOnly You. No. 2 Defending America Against Identity Crime

Identity crimes are among those new, emerging types of crimes that are just beginning to show their impact on communities.

Identity Crime Toolkit for Police Executives