Understanding Identity Theft

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which action constitutes identity theft?

  • Using a family member's streaming service account with permission.
  • Using someone's personal information to open a new account without their permission. (correct)
  • Finding a lost driver's license and attempting to return it to its owner.
  • Borrowing a friend's credit card with their consent.

An identity thief might present your name and identity to law enforcement officers under which circumstance?

  • When providing assistance to a person in need.
  • When they are arrested. (correct)
  • When attempting to report a crime.
  • When seeking assistance as a victim of a different crime.

What is a potential consequence of identity theft?

  • Receiving unsolicited offers for high-end luxury goods.
  • Being sued for debts that are not yours. (correct)
  • An increase in credit score due to the thief's responsible financial actions.
  • Automatic enrollment in identity theft protection services.

Which action characterizes identity crime?

<p>The theft or misuse of personal or financial identifiers to gain something of value. (B)</p> Signup and view all the answers

According to the information from the Insurance Information Institute (as of 2019), what is one of the top five types of identity theft?

<p>Credit card fraud-new accounts. (A)</p> Signup and view all the answers

Besides credit card fraud, what does miscellaneous identity theft include?

<p>Online shopping and payment account fraud. (D)</p> Signup and view all the answers

In the context of identity crimes, what role does anonymity often play for criminals?

<p>It serves as a facilitator, helping to finance or conceal illegal activities. (C)</p> Signup and view all the answers

What seemingly unrelated crime can sometimes be a starting point for identity crimes?

<p>Theft of trash (“dumpster diving”). (A)</p> Signup and view all the answers

What special form of identity theft, is recognized?

<p>Tax identity theft. (A)</p> Signup and view all the answers

An officer stops a vehicle for a traffic violation and arrests the driver for outstanding warrants and finds Texas ID cards that don't belong to the driver. Based on the information, why would it be reasonable to believe the forms of identification may have been stolen or fraudulently produced?

<p>The driver has no connection to the people named on the ID cards. (D)</p> Signup and view all the answers

In the context of identity theft, what does "identifying information" encompass?

<p>Information that identifies a person, including name, date of birth, biometric data, or financial account numbers. (B)</p> Signup and view all the answers

What is a telecommunication access device?

<p>A device or means of account access that can be used to obtain money, goods, services or other things of value. (A)</p> Signup and view all the answers

What is a key element that must be present in conjunction with a name for it to be considered identity theft?

<p>Another identifier, such as date of birth or social security number. (A)</p> Signup and view all the answers

Why do current technologies pose a unique challenge for consumers and law enforcement in combating identity theft?

<p>They test the ability to keep up with technological advances and changes. (C)</p> Signup and view all the answers

What is an example of a recent scam trend?

<p>Stealing information by listening in on conversations made on cellular phones. (D)</p> Signup and view all the answers

According to the provided information, which is a way identity theft can occur?

<p>Someone steals mail, especially bank and credit card statements. (B)</p> Signup and view all the answers

What method do identity thieves use to divert mail to another location?

<p>Change of address. (C)</p> Signup and view all the answers

What is 'spoofing' in the context of online identity theft?

<p>The creation of emails and websites that appear to belong to legitimate businesses. (A)</p> Signup and view all the answers

What concept should a student be able to explain regarding most cases of identity theft?

<p>Identity theft often occurs because of current technology. (A)</p> Signup and view all the answers

What is the focus of publications that provide criminals with step-by-step instructions?

<p>Techniques used to procure false identification. (C)</p> Signup and view all the answers

What is the impact of the 1998 Identity Theft and Assumption Deterrence Act?

<p>It made identity theft a federal crime. (D)</p> Signup and view all the answers

What did the 2004 Identity Theft Penalty Enhancement Act establish?

<p>It established penalties for 'aggravated' identity theft. (D)</p> Signup and view all the answers

What did the 2008 Identity Theft Enforcement and Restitution Act clarify regarding restitution orders in identity theft cases?

<p>They could include an amount equal to the value of the victim's time spent remediating the actual or intended harm. (B)</p> Signup and view all the answers

According to the Texas Penal Code §32.51, under what conditions does a person commit an offense related to fraudulent use of identifying information?

<p>When they obtain, possess, transfer, or use another person's identifying information with the intent to harm or defraud. (A)</p> Signup and view all the answers

According to Texas Penal Code §32.51, what is the legal presumption regarding intent if someone possesses the identifying information of three or more other persons?

<p>The actor is presumed to have the intent to harm or defraud another. (D)</p> Signup and view all the answers

Under Texas Penal Code §32.51, what offense level applies if someone obtains, possesses, transfers, or uses less than five items of identifying information?

<p>State jail felony. (A)</p> Signup and view all the answers

Under what condition is the offense level increased under Texas Penal Code §32.51?

<p>The offense was committed against an elderly individual. (B)</p> Signup and view all the answers

Texas Penal Code §31.20 addresses what type of crime?

<p>Mail theft. (A)</p> Signup and view all the answers

According to Texas Penal Code §32.315, what does "counterfeit credit card or debit card" mean?

<p>A credit card or debit card that purports on its face to have been issued by an issuer that did not issue the card. (D)</p> Signup and view all the answers

What is the penalty for negligently disposing of a skimmer installed on a motor fuel dispenser, according to Texas Business and Commerce Code, Sec. 607.103?

<p>Class B misdemeanor. (B)</p> Signup and view all the answers

According to the Texas Business and Commerce Code, what does a security alert on a consumer file indicate?

<p>That the consumer's identity may have been used without their consent to fraudulently obtain goods or services. (C)</p> Signup and view all the answers

According to the provided text, how long must a security alert remain in effect on a consumer's file after the agency places it, per the Texas Business and Commerce Code?

<p>45 days. (D)</p> Signup and view all the answers

According to the Texas Business and Commerce Code, what does a security freeze do?

<p>It prohibits a consumer reporting agency from releasing a consumer report relating to the extension of credit involving that consumer file without express authorization. (A)</p> Signup and view all the answers

What must a consumer reporting agency do no later than the 10th business day after receiving a request for a security freeze?

<p>Send a written confirmation of the security freeze and provide a unique PIN for future authorizations. (A)</p> Signup and view all the answers

When taking a report on an identity theft what should you keep in mind regarding jurisdiction?

<p>The offense report can be generated by the agency where the resident/victim resides. (C)</p> Signup and view all the answers

What U.S. agency should be notified if an individual is taken into custody for committing a financial crime involving the U.S. mail?

<p>U. S. Postal Service (USPS). (D)</p> Signup and view all the answers

If someone is a victim of identity theft regarding a Social Security card, what U.S. Agency should be notified?

<p>SSA. (C)</p> Signup and view all the answers

Flashcards

Identity theft

The theft of personal information to commit fraud, including name and Social Security number, to open new accounts, use existing accounts, or get medical services.

Identity Crime

The theft or misuse of personal or financial identifiers to gain something of value and/or facilitate other criminal activity.

Identifying Information

Information that alone, or with other information, identifies a person. Includes name, date of birth, biometric data, or account numbers.

Telecommunication Access Device

A card, code, or device used alone or with another device to access money, goods, or services.

Signup and view all the flashcards

Spoofing

Creating emails and websites that appear legitimate to steal personal data for fraudulent schemes.

Signup and view all the flashcards

Identity Theft and Assumption Deterrence Act

Federal law making it a crime to transfer or use someone's ID unlawfully.

Signup and view all the flashcards

Identity Theft Penalty Enhancement Act

Federal law that Establishes penalties for 'aggravated' identity theft.

Signup and view all the flashcards

Identity Theft Enforcement and Restitution Act

Federal Law amending Title 18 to clarify restitution orders for victims of identity theft.

Signup and view all the flashcards

Fraudulent Use or Possession of Identifying Information

Texas law that prohibits obtaining, possessing, transferring, or using someone's identifying information with intent to harm or defraud.

Signup and view all the flashcards

Mail Theft

Texas law that pertains to stealing mail

Signup and view all the flashcards

Fraudulent Use or Possession of Credit Card or Debit Card Info

Texas law prohibiting the fraudulent use or possession of credit or debit card information

Signup and view all the flashcards

Security Alert

A notice placed on a consumer file alerting report recipients that identity may have been used fraudulently.

Signup and view all the flashcards

Security Freeze

A notice placed on a consumer file to prohibit the release of a consumer report without express authorization.

Signup and view all the flashcards

Entities Notified in Identity Crimes

FBI, US Secret Service, US Postal Service, Social Security Administration, FTC, TxDPS

Signup and view all the flashcards

Major Credit-Reporting Agencies

Equifax, Experian, Trans Union

Signup and view all the flashcards

Guidelines Protecting Personal Information

Do not give info over the phone, limit what you carry, pay attention to billing cycles.

Signup and view all the flashcards

Keeping Information Secure Online

Complicated passwords, be alert for imposters, shred documents completely.

Signup and view all the flashcards

Keep Devices Secure

Unknown files or links can give access to spyware.

Signup and view all the flashcards

Steps if Identity Crime Occurs

Call police, a drivers license office, notify creditors, auto teller and other relevant institutions.

Signup and view all the flashcards

Study Notes

  • Identity crimes refer to the theft of personal information used to commit fraud.
  • Stolen information includes names and Social Security numbers.
  • Stolen information is used to open accounts, use existing accounts, or obtain medical services.
  • Thieves may present another's identity to law enforcement, leading to consequences for the victim and their family.
  • Consequences of Identity Theft includes damaged credit, lawsuits for others' debts, incorrect medical information, and potential arrest.
  • Identity crime is the misuse of personal or financial identifiers to gain value or facilitate crime.
  • Websites for identity theft data:
    • Insurance Information Institute: Facts + Statistics: Identity theft and cybercrime
    • Federal Trade Commission: Consumer Sentinel Network
  • Identity theft happens when someone uses a Social Security number or other personal information to open new accounts, make purchases, or get a tax refund.

Top 5 Types of Identity Theft (2019)

  • Credit card fraud involving new accounts
  • Miscellaneous theft, including online shopping and payment account fraud, e-mail and social media fraud, and medical service, insurance, and securities account fraud
  • Mobile telephone accounts
  • Business and personal loans
  • Auto loans or leases
  • In 2019, Texas was 4th in the state rank with 73,553 identity theft reports.
  • Identity crime is a facilitator for crimes like mail theft, narcotics, financial fraud, homicide, terrorism, wire fraud, or internet intrusions, beginning with robbery, theft, burglary, computer intrusion, or theft of trash/documents.
  • Special forms of identity theft:
    • Tax
    • Child
    • Medical

Identifying Information

  • Information that identifies a person alone or with other information, including:
    • Name
    • Date of birth
    • Unique biometric data (fingerprint, voice print, retina, or iris image)
    • Unique electronic identification number, address, routing code, or financial institution account number
    • Telecommunication identifying information or access device
    • Social Security number or other government-issued identification number
  • Telecommunication access device: card, plate, code, account number, PIN, electronic serial number, mobile identification number, or identifier used to obtain money, goods, services, or transfer funds.
  • Using only an individual's name lacks enough identifiers. Another identifier such as date of birth and social security number in conjunction with the name is necessary to be a true identity theft.
  • Current trends in identity theft involve current technologies, including listening in, reading emails, hacking, telephone/email scams, and taking advantage of careless online habits.
  • The Identity Theft Resource Center offers information on new trends, scams, and consumer alerts.
  • Identity crime can be perpetrated by:
    • Stealing wallets/purses/briefcases containing personal identification.
    • Stealing mail with bank/credit card statements, pre-approved credit offers, or new checks/tax info.
    • Completing a "change of address" to divert mail.
    • Rummaging in trash ("dumpster diving") to find data.
    • Fraudulently obtaining credit reports as a landlord or employer.
    • Finding personal information inside homes or shared on the internet.

Methods of Obtaining Information

  • Stealing information from the workplace ("business record theft") via file theft, bribery, or hacking.
  • "Shoulder surfing" to observe PIN entries at ATMs, using hidden cameras.
  • "Spoofing" involves fake emails and websites impersonating legitimate businesses to obtain personal data for fraud.
  • Publications that provide criminals step-by-step instructions on techniques for producing false documents.
  • Resources for becoming aware of how criminals can create false documents.
  • Federal statues include:
    • The 1998 Identity Theft and Assumption Deterrence Act made it a federal crime to knowingly transfer or use identification without authority to commit unlawful activities that violates federal, state, or local law.
    • The 2004 Identity Theft Penalty Enhancement Act established aggravated identity theft penalties for felony crimes that have been committed.
    • The 2008 Identity Theft Enforcement and Restitution Act allowed courts to prosecute when the criminal and victim live in the same state involving victim’s time spent remediating.

Texas Penal Code §32.51 on Fraudulent Use or Possession of Identifying Information:

  • Committing offense with intent to harm or defraud another.
  • Obtaining, possessing, transferring, or using identifying information of another without consent.
  • Obtaining, possessing, transferring, or using information of a deceased person without legal authorization.
  • Obtaining, possessing, transferring, or using identifying information of a child under 18.
  • Presumed intent to harm/defraud if possessing information of three or more others/deceased.
  • Presumption doesn't apply to legitimate business/government activities.
  • Penalties increase with the number of items involved.
  • Penalites can be increased if the offense was committed against an elderly individual.
  • Victim restitution may include lost income/expenses but not attorney's fees.
  • Actor can be proscecuted under a different law if the offense also constitutes an offense under the different law.
  • Two other statutes in the Texas Penal Code related to identity crimes are Mail Theft and Fraudulent Use or Possession of Credit Card or Debit Card Information.
  • Theft of mail containing identifying information with intent to facilitate identity theft.
  • Purpose of Fraudulent Use or Possession of Credit Card or Debit Card Information is to crack down on gas pump credit card skimmers.
  • Texas Penal Code §31.20 on mail theft:
    • "Mail" is letters, cards, packages delivered by a carrier and not yet received, or left for collection.
    • Offense if intentionally appropriating from another's mailbox without consent to deprive the addressee of the mail.
    • Penalties depend on count of addresses the mail was stolen, the more addresses mail was stolen from, the higher the penalty. Also if the appropriated mail contained a identifying information and of with the intent to use that information to facilitate an offense.
    • Penalties increased if the victim knew the mail was being taken from a elderly or a disabled individual.
  • Texas Penal Code §32.315 regards the Fraudulent Use or Possession of Credit Card or Debit Card Information.
  • The code defines - "counterfeit credit card or debit card" - "credit card" and "debit card" (as assigned by Section 32.31) - "digital imprint" on a card
    • An offense is committed when there is a intent to harm by possessing a fake/ number and experation date without consent/data from a stolen card.
    • Rebuttable presumption if someone possesses five or more items.
    • Penalties increased with item numbers, it also is influenced by if the vicitim has to make restitution to the victim of the offense.
    • Actor can be proscecuted under a different law if the offense also constitutes an offense under the different law.
  • Texas Code of Criminal Procedure Art. 55.02, Sec. 2a outlines how criminals can expunge fraudulent information associated with their name.
  • Texas Business and Commerce Code include Consumer Credit Reporting Agencies and Payment Card Skimmers on Motor Fuel Dispensers.
  • Texas Code requires a “security alert" and “security freeze” can be added if the business and commerce code is followed.
  • A written police report is vital for victims it is needed as evidence for credit bureus and financial instituiotuons.
  • Officer’s can use form B when filling a report of this kind to ensure they get all appropriate information.
  • Govermental and business entity examples to notifiy if a crime involves identity theft are, Fedral Bureu of Investigation, Secret Service, Postal Service, Social Security Administration, and the Fedral Trade Commison.

Credit Reporting Agencies

  • Experian
  • Trans Union
  • Equifax
  • Advise vicims to contact their financial instituiotuons to report any suspisions of identity crime.
  • UTility companys should be checked for any unusual activtiy.
  • Educating law enforcement agencies is a proactive approach to take.
  • If a victum is asked to make a police report it should be complied with, these police reports are sometimes needed in order to resolve the offense.
  • The more knowlage a person has about their fiancial records the better prepered they will be to protect themselves, don't give out information over the phone unless you initiated the call.
  • Limit what you carry, only wear with what you need, and never carry a social security card.
  • Limit the mount of personal information you have on checks.
  • If you notice late billing cycles, contact the sender, compare recipts with account statments.
  • Shred all recipts, credit offers, applications, insurance, or other financial documents.
  • Secure Social Security card, and only give it out when nesscary.

Keeping Information Secure Online

  • Create complex and long passwords, and create new passwords on a regular basis.
  • Be aware of who you may be giving information to, do not provide it to people on the phone, or mail if you did'nt initiate the conversation.
  • Use security software (anti-virus and anti-spyware) and a firewall.
  • Report any suspicious activity.
  • Encrypt data and keep browsers secure.
  • Do not open files from unknown senders.
  • If you spot identity crime you should notify Sheriff's offices/local police, contact local licenses/DMV, notify creditors/merchants where your card was used.
  • Other things that can be done are:
    • Notify your Bank.
    • Automatic Teller Machine (ATM) Cards:
    • Contact the Social Security Administration (SSA).
    • Federal Trade Commission (FTC): The FTC is one place to report identity theft to the federal government.
    • Notify the U.S. Passport Agency

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Identity Theft Quiz
5 questions

Identity Theft Quiz

IndividualizedLeaningTowerOfPisa avatar
IndividualizedLeaningTowerOfPisa
Credit Card Skimming and Fraud
14 questions
Understanding Identity Crimes
35 questions

Understanding Identity Crimes

QuaintWilliamsite2127 avatar
QuaintWilliamsite2127
Use Quizgecko on...
Browser
Browser