1 / 51

Expecting the Unexpected: Important Identity Theft Factors for State and Local Law Enforcement

Expecting the Unexpected: Important Identity Theft Factors for State and Local Law Enforcement. Donald Rebovich, Ph.D. Executive Director Center for Identity Management and Information Protection, Utica College 2008 Economic Crime Institute Conference October 23, 2008.

Télécharger la présentation

Expecting the Unexpected: Important Identity Theft Factors for State and Local Law Enforcement

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Expecting the Unexpected:Important Identity Theft Factors for State and Local Law Enforcement Donald Rebovich, Ph.D. Executive Director Center for Identity Management and Information Protection, Utica College 2008 Economic Crime Institute Conference October 23, 2008

  2. Center For Identity Management And Information Protection Research goals: Trends, causes, early detection, and prevention of identity fraud and theft Impact of policy decisions, legislation, and regulatory actions Improved identity authentication systems

  3. Center for Identity Management and Information Protection Recent Research Bureau of Justice Assistance (BJA) – United States Secret Service Study Quantitative and qualitative analysis of a sample of closed Secret Service criminal cases (2000-2006) to detect and synthesize patterns as they relate to identity fraud and theft. Results released in October, 2007

  4. “Identity” – What is it? • Do you “know” who your are? • Do we “know” who you are? • Do we sufficiently protect our identities? • Have we become complacent about identity protection? • Do we play an indirect role in “enabling” identity thieves?

  5. Identity Theft – Who Protects Us? • What role does the federal government play? • What role does local/state enforcement play? • Is local/state enforcement “sensitized” to identity theft enforcement? • How does enforcement respond to identity theft “red flags”

  6. U.S. Bureau of Justice Assistance Study:Patterns and Trends of Identity Theft The following research material is derived from: “Identity Fraud Trends and Patterns: Building a Data-Based Foundation for Proactive Enforcement” by Gordon, Rebovich, Choo and Gordon. Economic Crime Institute Annual Conference, (October 22, 2007). Report available at www.cimip.org

  7. U.S. Bureau of Justice Assistance Study:Patterns and Trends of Identity Theft First empirical study of identity theft cases in U.S. 517 U.S. Secret Service cases from 2000-2006 Offender, offense and case process variables Objective: Apply results to improve control efforts

  8. U.S. Bureau of Justice Assistance Study:Patterns and Trends of Identity Theft Released in October, 2007 Some results: Most victims did not know the offenders 1/3 of cases started at offender’s job 42% involved organizational crime Median loss was $31,356

  9. Local/State Police Referral Cases Close to half of the cases were referred from local and state law enforcement (246) Some results: Similar to “Non-local” cases in most areas More outside of Northeast Greater percentage of two-person offender “teams” Comparatively narrow range of losses

  10. Local/State Police Referral Cases Some results: Greater overlap with forgery and drug crime Greater percentage of cases that originated with the investigation of cases outside of the economic crime arena

  11. Average Loss Per Case The median dollar loss among the local/state cases was $30,726. Dollar loss varied with the number of defendants in the case

  12. Who Are The Offenders?? They are “criminal opportunists” They search for the easiest route to profits They specialize their criminal services They “adapt” well to control efforts They have all the time in the world

  13. The Offenders: Arrest History 30.7% -- no arrest history Of the arrests: 26.6%: larceny or theft. 36.7%: fraud, forgery, or ID theft

  14. Patterns Of Identity Theft Situational Routine Professional

  15. Patterns Of Identity Theft Situational Crimes of Opportunity Routine Professional

  16. The Role of “Insiders” Of the total 246 local/state cases, 65 involved offenders who accessed personal identifying information at their place of employment. The employees victimized: Retail – 27 Private Company – 17 Bank/Credit Union – 7 Government Agency - 3 Education – 3 Insurance – 3 Unavailable – 5

  17. IDENTITY THEFT RING DEVELOPMENT

  18. IDENTITY THEFT RING DEVELOPMENT Information “Insider”

  19. IDENTITY THEFT RING DEVELOPMENT Information “Insider” RECRUITMENT

  20. IDENTITY THEFT RING DEVELOPMENT Information “Insider” RECRUITMENT

  21. IDENTITY THEFT RING DEVELOPMENT Information “Insider” RECRUITMENT

  22. IDENTITY THEFT RING DEVELOPMENT Information “Insider” RECRUTIMENT Theft Ring Director Demonstration of Ease (“Teasers”) Criminal Mentoring

  23. IDENTITY THEFT RING DEVELOPMENT Information “Insider” RECRUITMENT Theft Ring Director Demonstration of Ease (“Teasers”) Criminal Mentoring Testing the “System”

  24. IDENTITY THEFT RING DEVELOPMENT Information “Insider” RECRUITMENT Theft Ring Director Demonstration of Ease (“Teasers”) Criminal Mentoring Testing the “System” “Reaping the Rewards”

  25. Fake Driver’s License as “Catalyst” Insider Fake DL ID Fraud

  26. Fake Driver’s License as “Catalyst” Insider Fake DL ID Fraud Info. Broker DL Tech. DL Tech.

  27. Fake Driver’s License as “Catalyst” Insider Fake DL ID Fraud Tech. Skills ID Fraud Runners

  28. CRIMINAL DEVELOPMENT STAGES

  29. OFFICER RESPONSE STAGES Citizen Fraud Report

  30. OFFICER RESPONSE STAGES Citizen Fraud Report Victim Theft/ Victim Manipulation

  31. OFFICER RESPONSE STAGES Citizen Fraud Report Victim Theft/ Victim Manipulation Identity Conversion

  32. OFFICER RESPONSE STAGES Citizen Fraud Report Victim Theft/ Victim Manipulation Identity Conversion Identity Theft Recognition

  33. OFFICER RESPONSE STAGES Citizen Fraud Report Victim Theft/ Victim Manipulation Identity Conversion Identity Theft Recognition Non-Fraud Report Encounter

  34. OFFICER RESPONSE STAGES Citizen Fraud Report Victim Theft/ Victim Manipulation Identity Conversion Identity Theft Recognition Non-Fraud Report Encounter Response to Original Offense

  35. OFFICER RESPONSE STAGES Citizen Fraud Report Victim Theft/ Victim Manipulation Identity Conversion Identity Theft Recognition Non-Fraud Report Encounter Response to Original Offense Exposure to Identity Theft “Red Flags”

  36. OFFICER RESPONSE STAGES Citizen Fraud Report Victim Theft/ Victim Manipulation Identity Conversion Identity Theft Recognition Non-Fraud Report Encounter Response to Original Offense Exposure to Identity Theft “Red Flags” Officer Reaction to Case Factors

  37. OFFICER RESPONSE STAGES Citizen Fraud Report Victim Theft/ Victim Manipulation Identity Conversion Identity Theft Recognition Non-Fraud Report Encounter Response to Original Offense Exposure to Identity Theft “Red Flags” Officer Reaction to Case Factors Inductive Assessment by Officer

  38. OFFICER RESPONSE STAGES Citizen Fraud Report Victim Theft/ Victim Manipulation Identity Conversion Identity Theft Recognition Non-Fraud Report Encounter Response to Original Offense Exposure to Identity Theft “Red Flags” Officer Reaction to Case Factors ID Theft Recognition Inductive Assessment by Officer

  39. TOOLS OF THE TRADE Laminating machines Bar Code Scanners Bar Code Rewriters Credit Card Embossing/Encoding Equipment Multiple Drivers Licenses Multiple Social Security Cards

  40. TOOLS OF THE TRADE Multiple Vehicle Titles Blank Check Stock Drivers License Templates Check Producing Software Treasury Check Template Disks

  41. RECOGNIZING “RED FLAGS” Connecting the Dots Unusual behavior, circumstances, evidence Reports (Average Citizen, Service)

  42. RECOGNIZING “RED FLAGS” Connecting the Dots Motor Vehicle Stops Narcotics Cases (e.g., trafficking, possession)

  43. RECOGNIZING “RED FLAGS” Connecting the Dots Role of “chance” in routine calls/original offenses (e.g., disturbances, domestic violence, assault, burglary, loitering)

  44. Questions In the present environment: How do we protect “Who We Are?” How do we prevent others from “Becoming Us?” How do we thwart the criminal relations and transactions leading to identity theft and identity fraud?

  45. Prevention Identity Theft & Fraud Control Punishment/Deterrence

  46. Prevention Point of Theft Awareness Screening Monitoring Identity Theft & Fraud Control Punishment/Deterrence

  47. Prevention Point of Theft Awareness Screening Monitoring Point of Conversion Document “Target Hardening” Identity Theft & Fraud Control Punishment/Deterrence

  48. Prevention Point of Theft Awareness Screening Monitoring Point of Conversion Document “Target Hardening” Identity Theft & Fraud Control Point of Fraud Awareness Verification Punishment/Deterrence

  49. Prevention Point of Theft Awareness Screening Monitoring Point of Conversion Document “Target Hardening” Identity Theft & Fraud Control Point of Enforcement Coordination Awareness Point of Fraud Awareness Verification Punishment/Deterrence

More Related