SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Identity TheftIdentity Theft
Presented by:Presented by:
InvestigatorInvestigator
Scott TolstadScott Tolstad
Escondido Police Dept.Escondido Police Dept.
Financial Crimes/Fraud UnitFinancial Crimes/Fraud Unit
(760) 839-4971(760) 839-4971
stolstad@escondido.orstolstad@escondido.or
gg
Identity Theft
 Who is targeted?
 How do they get your information?
 What happens after they get it?
 How can I protect myself?
Identity Theft/Penal Code
 PC 530.5(a)-Every person who willfully obtains
personal identifying information, as defined in
subdivision (b) of Section 530.55, of another person,
and uses that information for any unlawful
purpose, including to obtain, or attempt to obtain,
credit, goods, services, real property, or medical
information without the consent of that person, is
guilty of a public offense, and upon conviction
therefor, shall be punished by a fine, by
imprisonment in a county jail not to exceed one year,
or by both a fine and imprisonment, or by
imprisonment in the state prison.
What Is Personal Identifying
Information?
 Social Security Numbers
 Driver’s license numbers
 Address, phone numbers, date of birth
 Birth Certificate information
 Mother’s maiden name, other family information
 Financial account numbers
 Biometric information
 Medical information
Identity Theft: The Classic View
 Identity theft occurs when an imposter gains
access to personal identifying information
and uses it for financial gain
– New lines of credit, loans, and mortgages
– New accounts, checking/debit fraud
– Tenancy and utilities
– Medical billing and identity
Identity Theft: The Big Picture
 Identity theft also occurs when an imposter
gains access to personal identifying
information and uses it for:
– Jobs, employment, contracts
– Government accounting issues
– Government support services
– Avoidance of arrest and criminal records
– Medical services
Identity Theft
How Thieves Obtain Information
 Lost/Stolen wallets
 Mail theft
 Dumpsters
 Shoulder surfing
 Telephone solicitations
 “Phishing” and scams
 Lack of computer security / Internet
 Areas beyond control
 Data breach
Skimming
 Primarily aimed at your debit card
 Gasoline retailers
 Restaurants
 General retailers
 Now Taken over by organized crime
 Loaded onto gift/Green Dot Card
 Electronic pickpocketing
Hand Held Skimmer
Electronic Pickpocketing
Prevention/Tips
 Deposit outgoing mail at a Post Office or a
blue USPS collection box, or give it directly
to your letter carrier.
 Shred unwanted documents that contain
personal information.
 Review your credit report quarterly.
 NEVER give personal information over the
phone or the internet unless you initiated the
contact. Phone spoofing.
Prevention/Tips
 Report lost/stolen cards to issuer ASAP.
 DON’T carry your SSN card.
 Destroy credit card receipts ( some will have
your entire credit card number on it).
 Keep track of monthly financial statements.
 Contact the company if you don’t receive
your monthly statement.
PC 530.8/Victim Rights
 In a nutshell, you are entitled to a copy of the
application the suspect used. If the company
refuses to turn over information, they can be
civilly fined up to $100 a day for
noncompliance.
Penal Code/Who takes your case?
 PC 530.6(a)- A person who has learned or reasonably
suspects that his or her personal identifying information
has been unlawfully used by another, as described in
subdivision (a) of Section 530.5, may initiate a law
enforcement investigation by contacting the local law
enforcement agency that has jurisdiction over his or
her actual residence or place of business, which shall
take a police report of the matter, provide the complainant
with a copy of that report, and begin an investigation of
the facts. If the suspected crime was committed in a
different jurisdiction, the local law enforcement agency
may refer the matter to the law enforcement agency
where the suspected crime was committed.
Fraud Alert/Credit Freezes
 Experian-888 397-3742, www.experian.com
 Transunion-800 680-7289,
www.transunion.com
 Equifax-800 525-6285, www.equifax.com
 Numbers to use to place fraud alert-
2,2,3,2,1, hold, 2, enter info, 2 for phone
number or 1 not to enter phone number,
obtain confirmation number.
Work At Home Scam
 International company is looking for part time
at home employers within the whole territory
of the United States, Canada, Australia and
United Kingdom. You can get over 3000
USD monthly which highly depends on your
results.
 We are looking people at the age of 18 to 85
for rather easy operations on processing of
the incoming tasks and performance of
simple management assignments. You don't
Nigerian Scams
Mystery Shopper
Overpayment Scam
Romance Scam
Lottery Scam
Check Fraud
 Fictitious check– no such account exists -
wrong routing number, wrong bank, account
holder doesn’t exist
 Fraudulent Check – real account - account
number, account holder exists
 Reproduced check
 Stolen check – Actual check just stolen and
usually washed
Mortgage Scams
 FICO score sites
 Loan modification
 Foreclosure prevention
 Foreclosure prevention products
 Brokers
ATM Skimming Devices
ATM Card Skimmer
ATM Skimmer
Card Skimmer
Card Skimmer
Card Skimmer
Pinhole Camera
Camera in FasciaWhat do PIN capturing devices
look like?
How about now ?
Removal of fitted device from fascia- the additional part can now be
clearly seen.
Camera in Fascia
Pinhole Camera
Pinhole Camera
Keypad
Keypad

Weitere ähnliche Inhalte

Was ist angesagt?

Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentityForce
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationpaulgundersen9
 
Training for Child Court Appointed Advocates
Training for Child Court Appointed AdvocatesTraining for Child Court Appointed Advocates
Training for Child Court Appointed Advocates- Mark - Fullbright
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft TestLisa Sosebee
 
City of Salina Police Department-Citizen Complaint Process English
City of Salina Police Department-Citizen Complaint Process EnglishCity of Salina Police Department-Citizen Complaint Process English
City of Salina Police Department-Citizen Complaint Process EnglishCity of Salina
 
Identity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for VictimsIdentity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for Victims- Mark - Fullbright
 
How to Protect your SIN
How to Protect your SINHow to Protect your SIN
How to Protect your SINEmilyMoar
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautionstheresa34
 
Fraud Awareness NC
Fraud Awareness NCFraud Awareness NC
Fraud Awareness NCEmilyMoar
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Riskmilfamln
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftDolf Dunn
 
Avoid ID Theft
Avoid ID TheftAvoid ID Theft
Avoid ID Theftksiers1
 
Ftc Avoid Id Theft
Ftc Avoid Id TheftFtc Avoid Id Theft
Ftc Avoid Id TheftCharles Seay
 
SSG-MUSIC Eftps singers sensatin group irs payment
SSG-MUSIC Eftps  singers sensatin group irs paymentSSG-MUSIC Eftps  singers sensatin group irs payment
SSG-MUSIC Eftps singers sensatin group irs paymentSHAUN J FEDERICO
 

Was ist angesagt? (20)

Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent It
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Training for Child Court Appointed Advocates
Training for Child Court Appointed AdvocatesTraining for Child Court Appointed Advocates
Training for Child Court Appointed Advocates
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
 
City of Salina Police Department-Citizen Complaint Process English
City of Salina Police Department-Citizen Complaint Process EnglishCity of Salina Police Department-Citizen Complaint Process English
City of Salina Police Department-Citizen Complaint Process English
 
Identity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for VictimsIdentity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for Victims
 
How to Protect your SIN
How to Protect your SINHow to Protect your SIN
How to Protect your SIN
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
Fraud Awareness NC
Fraud Awareness NCFraud Awareness NC
Fraud Awareness NC
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Five Tax Scams to Avoid
Five Tax Scams to AvoidFive Tax Scams to Avoid
Five Tax Scams to Avoid
 
25 Internet Crimes
25 Internet Crimes25 Internet Crimes
25 Internet Crimes
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
 
2021 Chapitre Istanbul Registration Form
2021 Chapitre Istanbul Registration Form2021 Chapitre Istanbul Registration Form
2021 Chapitre Istanbul Registration Form
 
Avoid ID Theft
Avoid ID TheftAvoid ID Theft
Avoid ID Theft
 
Ftc Avoid Id Theft
Ftc Avoid Id TheftFtc Avoid Id Theft
Ftc Avoid Id Theft
 
Avoiding ID Theft
Avoiding ID TheftAvoiding ID Theft
Avoiding ID Theft
 
SSG-MUSIC Eftps singers sensatin group irs payment
SSG-MUSIC Eftps  singers sensatin group irs paymentSSG-MUSIC Eftps  singers sensatin group irs payment
SSG-MUSIC Eftps singers sensatin group irs payment
 
Frauds and Seniors
Frauds and SeniorsFrauds and Seniors
Frauds and Seniors
 

Ähnlich wie Identity Theft: Protecting Our Seniors

Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docx
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docxTorts, Crimes and BusinessChapter 7 & 8Intent vs.docx
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docxedwardmarivel
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautionsquentinz52
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautionsquentinz52
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRon Drew
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation nickski51
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft- Mark - Fullbright
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionAlan Greggo
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft PreventionOremDPS
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
Identity Theft and Your SSN
Identity Theft and Your SSNIdentity Theft and Your SSN
Identity Theft and Your SSNGreg Ewers
 
ID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good NameID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good Name- Mark - Fullbright
 

Ähnlich wie Identity Theft: Protecting Our Seniors (20)

Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docx
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docxTorts, Crimes and BusinessChapter 7 & 8Intent vs.docx
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docx
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Theft and Your SSN
Identity Theft and Your SSNIdentity Theft and Your SSN
Identity Theft and Your SSN
 
ID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good NameID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good Name
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
ID Theft
ID TheftID Theft
ID Theft
 

Mehr von GlennerCenters

10 Signs It Might Be Alzheimer's
10 Signs It Might Be Alzheimer's10 Signs It Might Be Alzheimer's
10 Signs It Might Be Alzheimer'sGlennerCenters
 
What is Professional Fiduciary?
What is  Professional Fiduciary?What is  Professional Fiduciary?
What is Professional Fiduciary?GlennerCenters
 
Mandatory Reporting of Elder Abuse
Mandatory Reporting of Elder AbuseMandatory Reporting of Elder Abuse
Mandatory Reporting of Elder AbuseGlennerCenters
 
Geriatric Care Managers: How They Protect Vulnerable Seniors
Geriatric Care Managers: How They Protect Vulnerable SeniorsGeriatric Care Managers: How They Protect Vulnerable Seniors
Geriatric Care Managers: How They Protect Vulnerable SeniorsGlennerCenters
 
Elder Abuse: What You Need to Know
Elder Abuse: What You Need to KnowElder Abuse: What You Need to Know
Elder Abuse: What You Need to KnowGlennerCenters
 
Dental Neglect in Older Adults
Dental Neglect in Older AdultsDental Neglect in Older Adults
Dental Neglect in Older AdultsGlennerCenters
 
UCSD Alzheimer's Disease Presentation
UCSD Alzheimer's Disease PresentationUCSD Alzheimer's Disease Presentation
UCSD Alzheimer's Disease PresentationGlennerCenters
 
Is It Normal or Is It Dementia?
Is It Normal or Is It Dementia?Is It Normal or Is It Dementia?
Is It Normal or Is It Dementia?GlennerCenters
 

Mehr von GlennerCenters (10)

10 Signs It Might Be Alzheimer's
10 Signs It Might Be Alzheimer's10 Signs It Might Be Alzheimer's
10 Signs It Might Be Alzheimer's
 
What is Professional Fiduciary?
What is  Professional Fiduciary?What is  Professional Fiduciary?
What is Professional Fiduciary?
 
Mandatory Reporting of Elder Abuse
Mandatory Reporting of Elder AbuseMandatory Reporting of Elder Abuse
Mandatory Reporting of Elder Abuse
 
Geriatric Care Managers: How They Protect Vulnerable Seniors
Geriatric Care Managers: How They Protect Vulnerable SeniorsGeriatric Care Managers: How They Protect Vulnerable Seniors
Geriatric Care Managers: How They Protect Vulnerable Seniors
 
Elder Abuse: What You Need to Know
Elder Abuse: What You Need to KnowElder Abuse: What You Need to Know
Elder Abuse: What You Need to Know
 
Dental Neglect in Older Adults
Dental Neglect in Older AdultsDental Neglect in Older Adults
Dental Neglect in Older Adults
 
Demographics of Aging
Demographics of AgingDemographics of Aging
Demographics of Aging
 
Grief & loss
Grief & lossGrief & loss
Grief & loss
 
UCSD Alzheimer's Disease Presentation
UCSD Alzheimer's Disease PresentationUCSD Alzheimer's Disease Presentation
UCSD Alzheimer's Disease Presentation
 
Is It Normal or Is It Dementia?
Is It Normal or Is It Dementia?Is It Normal or Is It Dementia?
Is It Normal or Is It Dementia?
 

Kürzlich hochgeladen

Informed Consent Empowering Healthcare Decision-Making.pptx
Informed Consent Empowering Healthcare Decision-Making.pptxInformed Consent Empowering Healthcare Decision-Making.pptx
Informed Consent Empowering Healthcare Decision-Making.pptxSasikiranMarri
 
LUNG TUMORS AND ITS CLASSIFICATIONS.pdf
LUNG TUMORS AND ITS  CLASSIFICATIONS.pdfLUNG TUMORS AND ITS  CLASSIFICATIONS.pdf
LUNG TUMORS AND ITS CLASSIFICATIONS.pdfDolisha Warbi
 
Radiation Dosimetry Parameters and Isodose Curves.pptx
Radiation Dosimetry Parameters and Isodose Curves.pptxRadiation Dosimetry Parameters and Isodose Curves.pptx
Radiation Dosimetry Parameters and Isodose Curves.pptxDr. Dheeraj Kumar
 
Case Report Peripartum Cardiomyopathy.pptx
Case Report Peripartum Cardiomyopathy.pptxCase Report Peripartum Cardiomyopathy.pptx
Case Report Peripartum Cardiomyopathy.pptxNiranjan Chavan
 
SGK HÓA SINH NĂNG LƯỢNG SINH HỌC 2006.pdf
SGK HÓA SINH NĂNG LƯỢNG SINH HỌC 2006.pdfSGK HÓA SINH NĂNG LƯỢNG SINH HỌC 2006.pdf
SGK HÓA SINH NĂNG LƯỢNG SINH HỌC 2006.pdfHongBiThi1
 
Statistical modeling in pharmaceutical research and development.
Statistical modeling in pharmaceutical research and development.Statistical modeling in pharmaceutical research and development.
Statistical modeling in pharmaceutical research and development.ANJALI
 
SYNDESMOTIC INJURY- ANATOMICAL REPAIR.pptx
SYNDESMOTIC INJURY- ANATOMICAL REPAIR.pptxSYNDESMOTIC INJURY- ANATOMICAL REPAIR.pptx
SYNDESMOTIC INJURY- ANATOMICAL REPAIR.pptxdrashraf369
 
Biomechanics- Shoulder Joint!!!!!!!!!!!!
Biomechanics- Shoulder Joint!!!!!!!!!!!!Biomechanics- Shoulder Joint!!!!!!!!!!!!
Biomechanics- Shoulder Joint!!!!!!!!!!!!ibtesaam huma
 
systemic bacteriology (7)............pptx
systemic bacteriology (7)............pptxsystemic bacteriology (7)............pptx
systemic bacteriology (7)............pptxEyobAlemu11
 
SWD (Short wave diathermy)- Physiotherapy.ppt
SWD (Short wave diathermy)- Physiotherapy.pptSWD (Short wave diathermy)- Physiotherapy.ppt
SWD (Short wave diathermy)- Physiotherapy.pptMumux Mirani
 
Tans femoral Amputee : Prosthetics Knee Joints.pptx
Tans femoral Amputee : Prosthetics Knee Joints.pptxTans femoral Amputee : Prosthetics Knee Joints.pptx
Tans femoral Amputee : Prosthetics Knee Joints.pptxKezaiah S
 
April 2024 ONCOLOGY CARTOON by DR KANHU CHARAN PATRO
April 2024 ONCOLOGY CARTOON by  DR KANHU CHARAN PATROApril 2024 ONCOLOGY CARTOON by  DR KANHU CHARAN PATRO
April 2024 ONCOLOGY CARTOON by DR KANHU CHARAN PATROKanhu Charan
 
METHODS OF ACQUIRING KNOWLEDGE IN NURSING.pptx by navdeep kaur
METHODS OF ACQUIRING KNOWLEDGE IN NURSING.pptx by navdeep kaurMETHODS OF ACQUIRING KNOWLEDGE IN NURSING.pptx by navdeep kaur
METHODS OF ACQUIRING KNOWLEDGE IN NURSING.pptx by navdeep kaurNavdeep Kaur
 
PERFECT BUT PAINFUL TKR -ROLE OF SYNOVECTOMY.pptx
PERFECT BUT PAINFUL TKR -ROLE OF SYNOVECTOMY.pptxPERFECT BUT PAINFUL TKR -ROLE OF SYNOVECTOMY.pptx
PERFECT BUT PAINFUL TKR -ROLE OF SYNOVECTOMY.pptxdrashraf369
 
PNEUMOTHORAX AND ITS MANAGEMENTS.pdf
PNEUMOTHORAX   AND  ITS  MANAGEMENTS.pdfPNEUMOTHORAX   AND  ITS  MANAGEMENTS.pdf
PNEUMOTHORAX AND ITS MANAGEMENTS.pdfDolisha Warbi
 
Wessex Health Partners Wessex Integrated Care, Population Health, Research & ...
Wessex Health Partners Wessex Integrated Care, Population Health, Research & ...Wessex Health Partners Wessex Integrated Care, Population Health, Research & ...
Wessex Health Partners Wessex Integrated Care, Population Health, Research & ...Wessex Health Partners
 
epilepsy and status epilepticus for undergraduate.pptx
epilepsy and status epilepticus  for undergraduate.pptxepilepsy and status epilepticus  for undergraduate.pptx
epilepsy and status epilepticus for undergraduate.pptxMohamed Rizk Khodair
 
Hematology and Immunology - Leukocytes Functions
Hematology and Immunology - Leukocytes FunctionsHematology and Immunology - Leukocytes Functions
Hematology and Immunology - Leukocytes FunctionsMedicoseAcademics
 
Nutrition of OCD for my Nutritional Neuroscience Class
Nutrition of OCD for my Nutritional Neuroscience ClassNutrition of OCD for my Nutritional Neuroscience Class
Nutrition of OCD for my Nutritional Neuroscience Classmanuelazg2001
 
Big Data Analysis Suggests COVID Vaccination Increases Excess Mortality Of ...
Big Data Analysis Suggests COVID  Vaccination Increases Excess Mortality Of  ...Big Data Analysis Suggests COVID  Vaccination Increases Excess Mortality Of  ...
Big Data Analysis Suggests COVID Vaccination Increases Excess Mortality Of ...sdateam0
 

Kürzlich hochgeladen (20)

Informed Consent Empowering Healthcare Decision-Making.pptx
Informed Consent Empowering Healthcare Decision-Making.pptxInformed Consent Empowering Healthcare Decision-Making.pptx
Informed Consent Empowering Healthcare Decision-Making.pptx
 
LUNG TUMORS AND ITS CLASSIFICATIONS.pdf
LUNG TUMORS AND ITS  CLASSIFICATIONS.pdfLUNG TUMORS AND ITS  CLASSIFICATIONS.pdf
LUNG TUMORS AND ITS CLASSIFICATIONS.pdf
 
Radiation Dosimetry Parameters and Isodose Curves.pptx
Radiation Dosimetry Parameters and Isodose Curves.pptxRadiation Dosimetry Parameters and Isodose Curves.pptx
Radiation Dosimetry Parameters and Isodose Curves.pptx
 
Case Report Peripartum Cardiomyopathy.pptx
Case Report Peripartum Cardiomyopathy.pptxCase Report Peripartum Cardiomyopathy.pptx
Case Report Peripartum Cardiomyopathy.pptx
 
SGK HÓA SINH NĂNG LƯỢNG SINH HỌC 2006.pdf
SGK HÓA SINH NĂNG LƯỢNG SINH HỌC 2006.pdfSGK HÓA SINH NĂNG LƯỢNG SINH HỌC 2006.pdf
SGK HÓA SINH NĂNG LƯỢNG SINH HỌC 2006.pdf
 
Statistical modeling in pharmaceutical research and development.
Statistical modeling in pharmaceutical research and development.Statistical modeling in pharmaceutical research and development.
Statistical modeling in pharmaceutical research and development.
 
SYNDESMOTIC INJURY- ANATOMICAL REPAIR.pptx
SYNDESMOTIC INJURY- ANATOMICAL REPAIR.pptxSYNDESMOTIC INJURY- ANATOMICAL REPAIR.pptx
SYNDESMOTIC INJURY- ANATOMICAL REPAIR.pptx
 
Biomechanics- Shoulder Joint!!!!!!!!!!!!
Biomechanics- Shoulder Joint!!!!!!!!!!!!Biomechanics- Shoulder Joint!!!!!!!!!!!!
Biomechanics- Shoulder Joint!!!!!!!!!!!!
 
systemic bacteriology (7)............pptx
systemic bacteriology (7)............pptxsystemic bacteriology (7)............pptx
systemic bacteriology (7)............pptx
 
SWD (Short wave diathermy)- Physiotherapy.ppt
SWD (Short wave diathermy)- Physiotherapy.pptSWD (Short wave diathermy)- Physiotherapy.ppt
SWD (Short wave diathermy)- Physiotherapy.ppt
 
Tans femoral Amputee : Prosthetics Knee Joints.pptx
Tans femoral Amputee : Prosthetics Knee Joints.pptxTans femoral Amputee : Prosthetics Knee Joints.pptx
Tans femoral Amputee : Prosthetics Knee Joints.pptx
 
April 2024 ONCOLOGY CARTOON by DR KANHU CHARAN PATRO
April 2024 ONCOLOGY CARTOON by  DR KANHU CHARAN PATROApril 2024 ONCOLOGY CARTOON by  DR KANHU CHARAN PATRO
April 2024 ONCOLOGY CARTOON by DR KANHU CHARAN PATRO
 
METHODS OF ACQUIRING KNOWLEDGE IN NURSING.pptx by navdeep kaur
METHODS OF ACQUIRING KNOWLEDGE IN NURSING.pptx by navdeep kaurMETHODS OF ACQUIRING KNOWLEDGE IN NURSING.pptx by navdeep kaur
METHODS OF ACQUIRING KNOWLEDGE IN NURSING.pptx by navdeep kaur
 
PERFECT BUT PAINFUL TKR -ROLE OF SYNOVECTOMY.pptx
PERFECT BUT PAINFUL TKR -ROLE OF SYNOVECTOMY.pptxPERFECT BUT PAINFUL TKR -ROLE OF SYNOVECTOMY.pptx
PERFECT BUT PAINFUL TKR -ROLE OF SYNOVECTOMY.pptx
 
PNEUMOTHORAX AND ITS MANAGEMENTS.pdf
PNEUMOTHORAX   AND  ITS  MANAGEMENTS.pdfPNEUMOTHORAX   AND  ITS  MANAGEMENTS.pdf
PNEUMOTHORAX AND ITS MANAGEMENTS.pdf
 
Wessex Health Partners Wessex Integrated Care, Population Health, Research & ...
Wessex Health Partners Wessex Integrated Care, Population Health, Research & ...Wessex Health Partners Wessex Integrated Care, Population Health, Research & ...
Wessex Health Partners Wessex Integrated Care, Population Health, Research & ...
 
epilepsy and status epilepticus for undergraduate.pptx
epilepsy and status epilepticus  for undergraduate.pptxepilepsy and status epilepticus  for undergraduate.pptx
epilepsy and status epilepticus for undergraduate.pptx
 
Hematology and Immunology - Leukocytes Functions
Hematology and Immunology - Leukocytes FunctionsHematology and Immunology - Leukocytes Functions
Hematology and Immunology - Leukocytes Functions
 
Nutrition of OCD for my Nutritional Neuroscience Class
Nutrition of OCD for my Nutritional Neuroscience ClassNutrition of OCD for my Nutritional Neuroscience Class
Nutrition of OCD for my Nutritional Neuroscience Class
 
Big Data Analysis Suggests COVID Vaccination Increases Excess Mortality Of ...
Big Data Analysis Suggests COVID  Vaccination Increases Excess Mortality Of  ...Big Data Analysis Suggests COVID  Vaccination Increases Excess Mortality Of  ...
Big Data Analysis Suggests COVID Vaccination Increases Excess Mortality Of ...
 

Identity Theft: Protecting Our Seniors

  • 1. Identity TheftIdentity Theft Presented by:Presented by: InvestigatorInvestigator Scott TolstadScott Tolstad Escondido Police Dept.Escondido Police Dept. Financial Crimes/Fraud UnitFinancial Crimes/Fraud Unit (760) 839-4971(760) 839-4971 stolstad@escondido.orstolstad@escondido.or gg
  • 2. Identity Theft  Who is targeted?  How do they get your information?  What happens after they get it?  How can I protect myself?
  • 3. Identity Theft/Penal Code  PC 530.5(a)-Every person who willfully obtains personal identifying information, as defined in subdivision (b) of Section 530.55, of another person, and uses that information for any unlawful purpose, including to obtain, or attempt to obtain, credit, goods, services, real property, or medical information without the consent of that person, is guilty of a public offense, and upon conviction therefor, shall be punished by a fine, by imprisonment in a county jail not to exceed one year, or by both a fine and imprisonment, or by imprisonment in the state prison.
  • 4. What Is Personal Identifying Information?  Social Security Numbers  Driver’s license numbers  Address, phone numbers, date of birth  Birth Certificate information  Mother’s maiden name, other family information  Financial account numbers  Biometric information  Medical information
  • 5. Identity Theft: The Classic View  Identity theft occurs when an imposter gains access to personal identifying information and uses it for financial gain – New lines of credit, loans, and mortgages – New accounts, checking/debit fraud – Tenancy and utilities – Medical billing and identity
  • 6. Identity Theft: The Big Picture  Identity theft also occurs when an imposter gains access to personal identifying information and uses it for: – Jobs, employment, contracts – Government accounting issues – Government support services – Avoidance of arrest and criminal records – Medical services
  • 8. How Thieves Obtain Information  Lost/Stolen wallets  Mail theft  Dumpsters  Shoulder surfing  Telephone solicitations  “Phishing” and scams  Lack of computer security / Internet  Areas beyond control  Data breach
  • 9. Skimming  Primarily aimed at your debit card  Gasoline retailers  Restaurants  General retailers  Now Taken over by organized crime  Loaded onto gift/Green Dot Card  Electronic pickpocketing
  • 12. Prevention/Tips  Deposit outgoing mail at a Post Office or a blue USPS collection box, or give it directly to your letter carrier.  Shred unwanted documents that contain personal information.  Review your credit report quarterly.  NEVER give personal information over the phone or the internet unless you initiated the contact. Phone spoofing.
  • 13. Prevention/Tips  Report lost/stolen cards to issuer ASAP.  DON’T carry your SSN card.  Destroy credit card receipts ( some will have your entire credit card number on it).  Keep track of monthly financial statements.  Contact the company if you don’t receive your monthly statement.
  • 14. PC 530.8/Victim Rights  In a nutshell, you are entitled to a copy of the application the suspect used. If the company refuses to turn over information, they can be civilly fined up to $100 a day for noncompliance.
  • 15. Penal Code/Who takes your case?  PC 530.6(a)- A person who has learned or reasonably suspects that his or her personal identifying information has been unlawfully used by another, as described in subdivision (a) of Section 530.5, may initiate a law enforcement investigation by contacting the local law enforcement agency that has jurisdiction over his or her actual residence or place of business, which shall take a police report of the matter, provide the complainant with a copy of that report, and begin an investigation of the facts. If the suspected crime was committed in a different jurisdiction, the local law enforcement agency may refer the matter to the law enforcement agency where the suspected crime was committed.
  • 16. Fraud Alert/Credit Freezes  Experian-888 397-3742, www.experian.com  Transunion-800 680-7289, www.transunion.com  Equifax-800 525-6285, www.equifax.com  Numbers to use to place fraud alert- 2,2,3,2,1, hold, 2, enter info, 2 for phone number or 1 not to enter phone number, obtain confirmation number.
  • 17. Work At Home Scam  International company is looking for part time at home employers within the whole territory of the United States, Canada, Australia and United Kingdom. You can get over 3000 USD monthly which highly depends on your results.  We are looking people at the age of 18 to 85 for rather easy operations on processing of the incoming tasks and performance of simple management assignments. You don't
  • 18. Nigerian Scams Mystery Shopper Overpayment Scam Romance Scam Lottery Scam
  • 19. Check Fraud  Fictitious check– no such account exists - wrong routing number, wrong bank, account holder doesn’t exist  Fraudulent Check – real account - account number, account holder exists  Reproduced check  Stolen check – Actual check just stolen and usually washed
  • 20. Mortgage Scams  FICO score sites  Loan modification  Foreclosure prevention  Foreclosure prevention products  Brokers
  • 28. Camera in FasciaWhat do PIN capturing devices look like? How about now ? Removal of fitted device from fascia- the additional part can now be clearly seen.