Identity Theft What to Do If It Happens To

Total Page:16

File Type:pdf, Size:1020Kb

Identity Theft What to Do If It Happens To Identity Theft: What to Do if It Happens to You You apply for a credit card and get turned down because of a low credit score. Yet you know that you’ve always paid your accounts on time. A debt collector calls to demand payment on a six-month overdue account for a credit card you have never had. You receive a credit card in the mail that you’ve never applied for. What’s happening? You could be a victim of identity theft, where an imposter is using your personal information. The identity thief could use your personal information for any of the following: • They may call your credit card issuer to change the billing address on your credit card account. The imposter then runs up charges on your account. Because your bills are being sent to a different address, it may be some time before you realize there’s a problem. • They may open new credit card accounts in your name. When they use the credit cards and don’t pay the bills, the delinquent accounts are reported on your credit report. • They may establish phone or wireless service in your name. • They may open a bank account in your name and write bad checks on that account. • They may counterfeit checks or credit or debit cards, or authorize electronic transfers in your name and drain your bank account. • They may file for bankruptcy under your name to avoid paying debits they’ve incurred under you name or to avoid eviction. • They may buy a car by taking out an auto loan in your name. • They may get identification such as a driver’s license issued with their picture, in your name. • They may get a job or file fraudulent tax returns in your name. • They may give your name to the police during an arrest. If they don’t show up for their court date, a warrant for arrest is issued in your name. How did this happen? Identity Thieves get your personal information by a variety of ways: • They get information from businesses or other institutions by: - stealing records or information while they’re on the job - bribing an employee who has access to these records - hacking these records - conning information out of employees • They may steal your mail, including bank and credit card statements, credit card offers, new checks, and tax information. • They may rummage through your trash, the trash of businesses, or public trash dumps in a practice known as “dumpster diving.” • They may get your credit reports by abusing their employer’s authorized access to them, or by posing as a landlord, employer, or someone else who may have a legal right to access your report. • They may steal your credit or debit card numbers by capturing the information in a data storage device in a practice known as “skimming.” They may swipe your card for an actual purchase, or attach the device to an ATM machine where you may enter or swipe your card. • They may steal your wallet or purse. • They may steal personal information they find in your home. • They may steal personal information from you through email or phone by posing as legitimate companies and claiming that you have a problem with your account. This practice is known as “phishing” online, or “pretexting” by phone. This guide provides victims of identity theft with instructions on how to regain your financial health and who to contact for more help. You must act quickly and assertively to minimize the damage. 1. Notify credit bureaus. Immediately report the situation to the fraud units of the three credit reporting companies -- Experian (formerly TRW), Equifax, and TransUnion. When you notify one bureau that you are a victim of identity theft, it will notify the other two for you. Report that your identifying information is being used by another person to obtain credit fraudulently in your name. Ask that your file be flagged with a fraud alert and that creditors call you before extending credit. Consider using your cell phone number if you have a mobile telephone. Equifax: P.O. Box Experian: P.O. Box TransUnion: P.O. 740241, Atlanta, 9532 Allen, TX Box 6790, Fullerton, GA 30374-0241. 75013. CA 92834-6790. Report fraud: Call Report fraud: Call Report fraud: (800) (800) 525-6285 (888) EXPERIAN 680-7289 and write to and write to (888-397-3742) and address above. address above. write to address TDD: (877) 553-7803 TDD: (800) 255- above. E-mail (fraud victims 0056 TDD: Use relay to only): Web: fraud number [email protected] www.equifax.com above. Web: Web: www.transunion.com www.experian.com Under new provisions of the Fair Credit Reporting Act (FCRA, §605A) you can place an initial fraud alert for only 90 days. The credit bureaus will then mail you a notice of your rights as an identity theft victim. Once you receive it, write each of the three bureaus immediately to request two things: (1) a free copy of your credit report, and (2) an extension of the fraud alert to seven years. You may request that only the last four digits of your Social Security number (SSN) appear on the credit report. You must include an identity theft report (police report) with your letter in order to establish the seven-year alert. You may cancel fraud alerts at any time. In all communications with the credit bureaus, you will want to refer to the unique number assigned to your credit report and use certified, return receipt mail. Be sure to save all credit reports as part of your fraud documentation. Once you have received your three credit reports, examine each carefully. Report fraudulent accounts and erroneous information in writing to both the credit bureaus and the credit issuers following the instructions provided with the credit reports. The Federal Trade Commission’s identity theft guide provides a sample letter to send to the credit bureaus requesting that fraudulent accounts be blocked. http://www.ftc.gov/bcp/edu/pubs/consumer/idtheft/idt04.pdf Once you notify the credit bureaus about fraudulent accounts, the bureau is required to block that information from future reports. The bureau must also notify the credit grantor of the fraudulent account. (FCRA, §605B) Ask the credit bureaus for names and phone numbers of credit grantors with whom fraudulent accounts have been opened if this information is not included on the credit report. In addition, instruct the credit bureaus in writing to remove inquiries that have been generated due to the fraudulent access. You may also ask the credit bureaus to notify those who have received your credit report in the last six months in order to alert them to the disputed and erroneous information (two years for employers). 1a. Monitor your credit reports. Be aware that these measures may not entirely stop new fraudulent accounts from being opened by the imposter. Credit issuers do not always pay attention to fraud alerts, even though the law now requires it. Once you have received your first free copy of your credit report and have requested that the fraud alert be extended to seven years, follow up in a few months with a request for your second free copy, which federal law enables you to receive. In addition, every consumer, whether or not a victim of identity theft, can receive one free report every twelve months from each of the three national credit bureaus. (FCRA §612) For more on free credit reports, see www.ftc.gov/bcp/menus/consumer/credit/rights.shtm as well as www.annualcreditreport.com . Laws in several states give individuals additional opportunities to obtain free credit reports . Missouri State Statute allows for one free annual credit report from each of the three credit bureaus. See the Federal Trade Commission’s (FTC) list of states that offer a free credit report or a report at reduced rates, even if you are not a victim of identity theft. http://www.consumer.gov/idtheft/ 1b. Security freeze. A “security freeze” is stronger than a fraud alert because it prevents anyone from accessing your credit file for any reason until and unless you instruct the credit bureaus to unfreeze your report. A security freeze is authorized in Missouri under State Statute 407.1400 RSMo. The security freeze is also available in several other states, according to the National Conference of State Legislatures. www.ncsl.org/programs/banking/SecurityFreeze_2005.htm 2. Law enforcement. Report the crime to your local police or sheriff’s department. You might also need to report it to police department(s) where the crime occurred, if it’s somewhere other than where you live. Give them as much documented evidence as possible. Make sure the police report lists the fraud accounts. Get a copy of the report, which is called an “identity theft report” under the FCRA. Keep the phone number of your investigator handy and give it to creditors and others who require verification of your case. Credit card companies and banks may require you to show the report in order to verify the crime. 3. Federal Trade Commission. Report the crime to the Federal Trade Commission. Include your police report number. They share such information with investigators nationwide who are fighting identity theft. • Call the FTC’s Identity Theft Hotline: (877) IDTHEFT (877-438-4338) • Or use its online identity theft complaint form: www.ftc.gov/ftc/cmplanding.shtm • Or write: FTC Identity Theft Clearinghouse, 600 Pennsylvania Ave. N.W., Washington, DC 20580. 4. What to do with new credit accounts opened by the imposter. If your credit report shows that the imposter has opened new accounts in your name, contact those creditors immediately by phone and in writing.
Recommended publications
  • U.S. V. Connie Moorman Willis
    Case 5:17-mj-01008-PRL Document 1 Filed 02/07/17 Page 1 of 14 PageID 1 AO 91 (Rev. 11/11) Criminal Complaint UNITED STATES DISTRICT COURT for the Middle District of Florida United States of America ) v. ) ) CONNIE MOORMAN WILLIS Case No. ) 5: 17-mj-1008-PRL ) ) ) Defendant(s) I CRIMINAL COMPLAINT I i I, 1~he complainant in this case, state that the following is true to the best of my knowledge and belief. On or about the date(s) of Feb. 4, 2011 through Jan. 25, 2016 in the county of Marion in the I Middle District of Florida , the defendant(s) violated: ! j Code Section Offense Description 18 u.s.c. 1 sec. 656 Theft by a Bank Employee 18 U.S.C. Sec. 1341 Mail Fraud Tnis criminal complaint is based on these facts: I I See attached affidavit. I lifl Continued on the attached sheet. Charles Johnsten, U.S. Postal Inspector Printed name and title Sworn to before me and signed in my presence. Date: ~-1 - :lo Ir City and siate: Ocala, Florida Philip R. Lammens, U.S. Magistrate Judge Printed name and title I ! Case 5:17-mj-01008-PRL Document 1 Filed 02/07/17 Page 2 of 14 PageID 2 S'FATE OF FLORIDA CASE NO. 5:17-mj-1008-PRL I IOUNTY OF MARION AFFIDAVIT IN SUPPORT OF A CRIMINAL COMPLAINT I, Charles Johnsten, being duly sworn, state as follows: INTRODUCTION 1. I am a United States Postal Inspector and have been so employed since I obcember 2016.
    [Show full text]
  • United States District Court Northern District of Alabama Southern Division
    UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ALABAMA SOUTHERN DIVISION In re HEALTHSOUTH CORPORATION ) Master File No. CV-03-BE-1500-S SECURITIES LITIGATION ) ) This Document Relates To: All Actions ) ) In re HEALTHSOUTH CORPORATION ) Consolidated Case No. CV-03-BE-1501-S STOCKHOLDER LITIGATION ) ) CLASS ACTION This Document Relates To: All Actions ) ) In re HEALTHSOUTH CORPORATION ) Consolidated Case No. CV-03-BE-1502-S BONDHOLDER LITIGATION ) ) CLASS ACTION This Document Relates To: All Actions ) ) JOINT SECOND AMENDED CONSOLIDATED CLASS ACTION COMPLAINT FOR VIOLATIONS OF THE FEDERAL SECURITIES LAWS [FACTUAL BASIS] DEMAND FOR JURY TRIAL TABLE OF CONTENTS Page INTRODUCTION ...........................................................................................................................1 The Scheme..........................................................................................................................3 Ernst & Young’s Participation in the Fraudulent Scheme...................................................5 Underwriters’ Knowing Involvement..................................................................................8 Financial Fraud ..................................................................................................................14 Medicare Fraud ..................................................................................................................15 Passage of the Balanced Budget Act and Defendants’ Sale of Stock and Notes...............16 Defendants Reinflate the Price of
    [Show full text]
  • A National Strategy to Combat Identity Theft Describes the Needs Associated with Each Component, Recommends Action, and Describes Common Practices
    U.S. Department of Justice 10000100020300409020Office of Community Oriented Policing Services 01090090109000100020 A NATIONAL STRATEGY TO 30000111101001010100COMBAT IDENTIT Y THEFT 10101010101000101010 10100010101010100101 01001010100100101010 01001001010100100100 101010111101 01001101 01001010100101110000 01000101101010001010 COPS COMMUNITY ORIENTED POLICING SERVICES 10100010101001010101U.S. DEPARTMENT OF JUSTICE This project was supported by cooperative agreement #2003CKWX0343 by the Office of Community Oriented Policing Services, U.S. Department of Justice. The opinions contained herein are those of the author(s) and do not necessarily represent the official position of the U.S. Department of Justice. References to specific companies, products, or services should not be considered an endorsement of the product by the author(s) or the U.S. Department of Justice. Rather, the references are illustrations to supplement discussion of the issues. www.cops.usdoj.gov ISBN: 1-932582-64-9 May 2006 10000100020300409020 01090090109000100020 30000111101001010100 A NATIONAL STRATEGY TO 101010101010001010COMBAT IDENTIT Y THEFT 10 10100010101010100101 01001010100100101010 01001001010100100100 101010111101 01001101 01001010100101110000 01000101101010001010 10100010101001010101 10000100020300409020Foreword 01090090109000100020 The crime of identity theft is relatively new to American law enforcement and is rapidly increasing in frequency. In 2003, Chief Darrel Stephens, Charlotte-Mecklenburg (North Carolina) Police Department, surveyed members of the
    [Show full text]
  • Fraud, Forgery and Vigilance in Banking Sector
    THAVAN IJREB Vol-1, No-2 Jan-Mar 2012 ISSN: 2277-1476 Fraud, forgery and Vigilance in Banking Sector Alekhya Reddy Student, HNLU, Raipur, [email protected] Abstract- Banks are the engines that drive the 1969 and 6 more on 15 April 1980. The Indian operations in the financial sector, which is vital banking system is indeed unique and perhaps for the economy. With the nationalization of has no parallels in the banking history of any banks in 1969, they also have emerged as country in the world.1 engines for social change and have become indispensable in a modern society. Banks play a The Indian Banking system performs a crucial critical role in economic development of a role in economic development of India through nation. The increase in banking operations is saving-investment.2Banks are the engines that now accompanied by an increase in frauds in drive the operations in the financial sector, the banking sector. In this paper the first chapter which is vital for the economy. With the deals with an introduction to banking and nationalization of banks in 1969, they also have related frauds. The second chapter focuses on emerged as engines for social change. After Fraud and Forgery, subsequently the Next Independence, the banks have passed through Chapter deal with Fraud and Forgeries in three stages. They have moved from the Banking sector with relevant legal provisions. character based lending to ideology based The fourth chapter deals with measures for lending to today competitiveness based lending prevention and detection of such discrepancies, in the context of India's economic liberalization followed by the vigilance in banking sector and policies and the process of linking with the the fifth chapter deals with Legal regime global economy.
    [Show full text]
  • Prosecuting Criminal Immigration Offenses July 2017 Volume 65 Number 4 in This Issue
    Prosecuting Criminal Immigration Offenses July 2017 Volume 65 Number 4 In This Issue United States Department of Justice Introduction .......................................................................................................... 1 Executive Office for By Jeff Sessions, Attorney General of the United States United States Attorneys Washington, DC 20530 Prosecuting 8 U.S.C. § 1253(a): When Your Defendant Resists Monty Wilkinson Removal ................................................................................................................. 3 Director By Dominic Rossetti Contributors’ opinions and statements should not be considered an endorsement by EOUSA for any policy, program, or Using the Alien File in the Prosecution of Immigration Crimes ...................... 11 service. By Sebastian Kielmanovich The United States Attorneys’ Bulletin is published pursuant to 28 C.F.R. § 0.22(b). Prosecuting Illegal Reentry Cases Where Evidentiary Documents Are Missing or Incomplete: Everything You Never Wanted to Know The United States Attorneys’ Bulletin is About A-Files and Removal Documents and Were Not Afraid Not to Ask ..... 17 published bi-monthly by the Executive Office for United States By Louie Uhl Attorneys, Office of Legal Education, 1620 Pendleton Street, Prosecuting Human Rights Violators for Naturalization Fraud: Columbia, South Carolina 29201. HRSP Lessons Learned ........................................................................................ 29 Editor By Christina Giffin, Kathleen O'Connor, and Christian K. Tate Chambers Levesque Assistant Editors Becky Catoe-Aikey Brenda S. Mercer Who’s Afraid of Section 922(g)(5)?: Navigating the Criminal, Civil, and Regulatory Foundation of the Statute for a Successful Prosecution ................ 35 Law Clerks Sarah Tate Chambers By Michael A. Lee Emily Godwin Gurbani Saini Brandy Sanderlin ICE Detention and Pretrial Release: How the Federal Circuit Courts Construe the INA and BRA in Immigration Prosecutions................................ 43 Internet Address By Gregory R.
    [Show full text]
  • What Is Securities Fraud?
    BUELL IN PRINTER PROOF 11/11/2011 5:38:12 PM Duke Law Journal VOLUME 61 DECEMBER 2011 NUMBER 3 WHAT IS SECURITIES FRAUD? SAMUEL W. BUELL† ABSTRACT As Rule 10b-5 approaches the age of seventy, deep familiarity with this supremely potent and consequential provision of American administrative law has obscured its lack of clear conceptual content. The rule, as written, interpreted, and enforced, is missing a fully developed connection to—of all things—fraud. Fraud is difficult to define. Several approaches are plausible. But the law of securities fraud, and much of the commentary about that body of law, has neither attempted such a definition nor acknowledged its necessity to the coherence and effectiveness of the doctrine. Securities fraud’s lack of mooring in a fully developed concept of fraud produces at least three costs: public and private actions are not brought on behalf of clearly specified regulatory objectives; the line between civil and criminal liability has become unacceptably blurred; and the law has come to provide at best a weak means of resolving vital public questions about wrongdoing in financial markets. The agenda of this Article is threefold. First, this Article illuminates and clarifies the relationship between securities fraud and fraud and structures a discussion of legal reform that more explicitly connects Copyright © 2011 by Samuel W. Buell. † Professor of Law, Duke University School of Law. I am grateful for the helpful questions and comments of Tom Baker, Sara Sun Beale, Stuart Benjamin, Ben Depoorter, Lisa Kern Griffin, Kim Krawiec, Dan Markel, James Park, and participants in workshops at Duke University School of Law, Willamette University College of Law, Notre Dame Law School, and Florida State University College of Law.
    [Show full text]
  • Mail and Wire Fraud: an Abbreviated Overview of Federal Criminal Law
    Mail and Wire Fraud: An Abbreviated Overview of Federal Criminal Law Charles Doyle Senior Specialist in American Public Law Updated February 11, 2019 Congressional Research Service 7-.... www.crs.gov R41931 SUMMARY R41931 Mail and Wire Fraud: An Abbreviated February 11, 2019 Overview of Federal Criminal Law Charles Doyle The mail and wire fraud statutes are exceptionally broad. Their scope has occasionally given the Senior Specialist in courts pause. Nevertheless, prosecutions in their name have brought to an end schemes that have American Public Law bilked victims out of millions, and sometimes billions, of dollars. The statutes proscribe (1) [email protected] causing the use of the mail or wire communications, including email; (2) in conjunction with a scheme to intentionally defraud another of money or property; (3) by means of a material For a copy of the full report, deception. The offenses, along with attempts or conspiracies to commit them, carry a term of please call 7-.... or visit imprisonment of up to 30 years in some cases, followed by a term of supervised release. www.crs.gov. Offenders also face the prospect of fines, orders to make restitution, and forfeiture of their property. The mail and wire fraud statutes overlap with a surprising number of other federal criminal statutes. Conduct that supports a prosecution under the mail or wire fraud statutes will often support prosecution under one or more other criminal provision(s). These companion offenses include (1) those that use mail or wire fraud as an element of a separate offense, like racketeering or money laundering; (2) those that condemn fraud on some jurisdictional basis other than use of the mail or wire communications, like those that outlaw defrauding the federal government or federally insured banks; and (3) those that proscribe other deprivations of honest services (i.e., bribery and kickbacks), like the statutes that ban bribery of federal officials or in connection with federal programs.
    [Show full text]
  • FOR IMMEDIATE RELEASE May 9, 2019 for More Information, Contact
    FOR IMMEDIATE RELEASE May 9, 2019 For more information, contact: U.S. Department of Justice Office of Public Affairs 202-514-2007 U.S. Attorney’s Office Northern District of Florida 850-216-3845 [email protected] SUPERSEDING INDICTMENT ADDS DEVELOPER/ENTREPRENEUR TO RACKETEERING CONSPIRACY TALLAHASSEE, FLORIDA – A federal grand jury has returned a forty-seven count superseding indictment against suspended Tallahassee City Commissioner Scott Charles Maddox, 51, Tallahassee political consultant Janice Paige Carter-Smith, 54, and John Thomas Burnette, 42, all of Tallahassee, Florida. Assistant Attorney General Brian A. Benczkowski of the Justice Department’s Criminal Division, U.S. Attorney Lawrence Keefe of the Northern District of Florida, Special Agent in Charge Rachel Rojas of the FBI’s Jacksonville Field Office and Special Agent in Charge Mary Hammond of the IRS Criminal Investigation (CI) Tampa Field Office made the announcement. In December 2018, a federal grand jury charged Maddox and Carter-Smith in a forty-four count indictment for conspiring to operate a racketeering enterprise that engaged in acts of bank fraud, extortion, honest-services fraud and bribery. That indictment also charged Maddox and Carter-Smith with substantive counts of bank fraud, false statements to financial institutions, extortion, honest-services fraud, use of interstate facilities to facilitate bribery, false statements to federal officers, conspiracy to interfere with the lawful function of the IRS, and filing false tax returns. The superseding indictment adds Burnette as a defendant and charges him with participating in the racketeering conspiracy and extortion, honest services mail fraud, the use of facilities in interstate commerce to facilitate bribery, and making false statements to federal officers.
    [Show full text]
  • Employee Fraud Detection Under Real World Conditions
    Zurich Open Repository and Archive University of Zurich Main Library Strickhofstrasse 39 CH-8057 Zurich www.zora.uzh.ch Year: 2010 Employee fraud detection under real world conditions Luell, J Abstract: Employee fraud in financial institutions is a considerable monetary and reputational risk. Stud- ies state that this type of fraud is typically detected by a tip, in the worst case from affected customers, which is fatal in terms of reputation. Consequently, there is a high motivation to improve analytic de- tection. We analyze the problem of client advisor fraud in a major financial institution and find that it differs substantially from other types of fraud. However, internal fraud at the employee level receives little attention in research. In this thesis, we provide an overview of fraud detection research with the focus on implicit assumptions and applicability. We propose a decision framework to find adequate fraud detection approaches for real world problems based on a number of defined characteristics. By applying the decision framework to the problem setting we met at Alphafin the chosen approach is motivated. The proposed system consists of a detection component and a visualization component. A number of imple- mentations for the detection component with a focus on tempo-relational pattern matching is discussed. The visualization component, which was converted to productive software at Alphafin in the course of the collaboration, is introduced. On the basis of three case studies we demonstrate the potential of the proposed system and discuss findings and possible extensions for further refinements. Posted at the Zurich Open Repository and Archive, University of Zurich ZORA URL: https://doi.org/10.5167/uzh-44863 Dissertation Originally published at: Luell, J.
    [Show full text]
  • Comal County Sheriff's Office Financial Crimes Reporting Package
    Comal County Sheriff’s Office Financial Crimes Reporting Package Identity Theft, Forgery, and Credit Card/Debit Card Abuse are among the most difficult offenses facing citizens today. In our ongoing efforts to combat these problems the following information is being offered by the Comal County Sheriff’s Office, Financial Crimes Unit. Please refer to the “Frequently Asked Questions” section on the following pages to find answers to questions regarding these offenses. This section will also guide you to the specific forms that need to be completed for each specific offense. The forms are included in this packet. Please note that it is very important that all instructions are followed regarding these forms and that each form is completed thoroughly and accurately for the investigator(s) to perform an extensive, detailed, and well documented investigation. If you have questions that are not answered in the “Frequently Asked Questions” section, you can contact the Comal County Sheriff’s Office, Criminal Investigation Division-Financial Crimes Unit, Detective Richard K. Smith at 830-643-6685. Once you complete the forms, you can hand deliver, mail or fax to the following address or number: Comal County Sheriff’s Office Completed, notarized forms can ATTN: Financial Crimes Unit also be faxed to Criminal 3005 W. San Antonio Street Investigations at 830-608-8269, New Braunfels, Texas 78130 Attn: Financial Crimes Unit Please note the business hours are Monday-Friday 8:00am-5:00pm. Security video is used in the prosecution of most cases. Unfortunately some businesses do not keep video for extended periods of time. It is important that you make every effort to complete and return this Financial Fraud Package as soon as possible.
    [Show full text]
  • GAO-02-363 Identity Theft: Prevalence and Cost Appear to Be Growing
    United States General Accounting Office GAO Report to Congressional Requesters March 2002 IDENTITY THEFT Prevalence and Cost Appear to be Growing GAO-02-363 Contents Letter 1 Results 2 Concluding Observations 11 Agency Comments 13 Appendix I Objectives, Scope, and Methodology 15 Objectives 15 Scope and Methodology 15 Appendix II Prevalence of Identity Theft 20 National Consumer Reporting Agencies 21 FTC Maintains a National Database of Identity Theft Complaints 25 SSA/OIG Fraud Hotline Statistics 28 Department of Justice Law Enforcement Components 31 Department of the Treasury Law Enforcement Components 34 Postal Inspection Service 37 Appendix III Cost of Identity Theft to the Financial Services Industry 40 Direct Fraud Losses 40 Staffing and Cost of Fraud Departments 46 Consumer Confidence in Online or E-Commerce 50 Appendix IV Cost of Identity Theft to Victims 55 FTC Data on the Cost of Identity Theft to Victims 55 Summary of Our Contacts with Victims 57 Consumer Advocacy Report on the Cost of Identity Theft to Victims 60 Additional Observations 62 Appendix V Cost of Identity Theft to the Federal Criminal Justice System 64 Cost of Investigations 64 Cost of Prosecutions 66 Cost of Incarceration 66 Cost of Community Supervision 67 Page i GAO-02-363 Identity Theft Prevalence and Cost Appendix VI Contact Points for Reporting Identity Theft and Seeking Assistance 68 Appendix VII GAO Contacts and Staff Acknowledgments 70 GAO Contacts 70 Staff Acknowledgments 70 Tables Table1: Number of Files with Fraud Alerts Posted (Agency A), 1995 through 2000 23 Table 2: Number of Files with Fraud Alerts Posted (Agency B), July 1999 through June 2001 24 Table 3: Number of Identity Theft Complaints FTC Received (Nov.
    [Show full text]
  • (EOIR) Fraud and Abuse Prevention Program Newsletters, 2012-2017
    Description of document: Department of Justice (DOJ) Executive Office for Immigration Review (EOIR) Fraud and Abuse Prevention Program Newsletters, 2012-2017 Requested date: 2017 Released date: 28-July-2017 Posted date: 02-October-2017 Source of document: Office of the General Counsel Attn: FOIA Service Center Executive Office for Immigration Review 5107 Leesburg Pike, Suite 1903 Falls Church, VA 22041 Email: [email protected] The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. U.S. Department of Justice Executive Office for Immigration Review Office ofthe General Counsel 5107 Leesburg Pike, Suite 1903 Falls Church, Virginia 22041 July 28, 2017 RE: Freedom of Information Act Request - Fraud and Abuse Prevention Program Newsletters This letter is in response to your Freedom of Information Act (FOIA) request to the Executive Office for Immigration Review (EOIR), in which you seek copies of the Fraud and Abuse Prevention Program Newsletters.
    [Show full text]