Podcast
Questions and Answers
Which action constitutes identity theft?
Which action constitutes identity theft?
- Using a family member's streaming service account with permission.
- Using someone's personal information to open a new account without their permission. (correct)
- Finding a lost driver's license and attempting to return it to its owner.
- Borrowing a friend's credit card with their consent.
An identity thief might present your name and identity to law enforcement officers under which circumstance?
An identity thief might present your name and identity to law enforcement officers under which circumstance?
- When providing assistance to a person in need.
- When they are arrested. (correct)
- When attempting to report a crime.
- When seeking assistance as a victim of a different crime.
What is a potential consequence of identity theft?
What is a potential consequence of identity theft?
- Receiving unsolicited offers for high-end luxury goods.
- Being sued for debts that are not yours. (correct)
- An increase in credit score due to the thief's responsible financial actions.
- Automatic enrollment in identity theft protection services.
Which action characterizes identity crime?
Which action characterizes identity crime?
According to the information from the Insurance Information Institute (as of 2019), what is one of the top five types of identity theft?
According to the information from the Insurance Information Institute (as of 2019), what is one of the top five types of identity theft?
Besides credit card fraud, what does miscellaneous identity theft include?
Besides credit card fraud, what does miscellaneous identity theft include?
In the context of identity crimes, what role does anonymity often play for criminals?
In the context of identity crimes, what role does anonymity often play for criminals?
What seemingly unrelated crime can sometimes be a starting point for identity crimes?
What seemingly unrelated crime can sometimes be a starting point for identity crimes?
What special form of identity theft, is recognized?
What special form of identity theft, is recognized?
An officer stops a vehicle for a traffic violation and arrests the driver for outstanding warrants and finds Texas ID cards that don't belong to the driver. Based on the information, why would it be reasonable to believe the forms of identification may have been stolen or fraudulently produced?
An officer stops a vehicle for a traffic violation and arrests the driver for outstanding warrants and finds Texas ID cards that don't belong to the driver. Based on the information, why would it be reasonable to believe the forms of identification may have been stolen or fraudulently produced?
In the context of identity theft, what does "identifying information" encompass?
In the context of identity theft, what does "identifying information" encompass?
What is a telecommunication access device?
What is a telecommunication access device?
What is a key element that must be present in conjunction with a name for it to be considered identity theft?
What is a key element that must be present in conjunction with a name for it to be considered identity theft?
Why do current technologies pose a unique challenge for consumers and law enforcement in combating identity theft?
Why do current technologies pose a unique challenge for consumers and law enforcement in combating identity theft?
What is an example of a recent scam trend?
What is an example of a recent scam trend?
According to the provided information, which is a way identity theft can occur?
According to the provided information, which is a way identity theft can occur?
What method do identity thieves use to divert mail to another location?
What method do identity thieves use to divert mail to another location?
What is 'spoofing' in the context of online identity theft?
What is 'spoofing' in the context of online identity theft?
What concept should a student be able to explain regarding most cases of identity theft?
What concept should a student be able to explain regarding most cases of identity theft?
What is the focus of publications that provide criminals with step-by-step instructions?
What is the focus of publications that provide criminals with step-by-step instructions?
What is the impact of the 1998 Identity Theft and Assumption Deterrence Act?
What is the impact of the 1998 Identity Theft and Assumption Deterrence Act?
What did the 2004 Identity Theft Penalty Enhancement Act establish?
What did the 2004 Identity Theft Penalty Enhancement Act establish?
What did the 2008 Identity Theft Enforcement and Restitution Act clarify regarding restitution orders in identity theft cases?
What did the 2008 Identity Theft Enforcement and Restitution Act clarify regarding restitution orders in identity theft cases?
According to the Texas Penal Code §32.51, under what conditions does a person commit an offense related to fraudulent use of identifying information?
According to the Texas Penal Code §32.51, under what conditions does a person commit an offense related to fraudulent use of identifying information?
According to Texas Penal Code §32.51, what is the legal presumption regarding intent if someone possesses the identifying information of three or more other persons?
According to Texas Penal Code §32.51, what is the legal presumption regarding intent if someone possesses the identifying information of three or more other persons?
Under Texas Penal Code §32.51, what offense level applies if someone obtains, possesses, transfers, or uses less than five items of identifying information?
Under Texas Penal Code §32.51, what offense level applies if someone obtains, possesses, transfers, or uses less than five items of identifying information?
Under what condition is the offense level increased under Texas Penal Code §32.51?
Under what condition is the offense level increased under Texas Penal Code §32.51?
Texas Penal Code §31.20 addresses what type of crime?
Texas Penal Code §31.20 addresses what type of crime?
According to Texas Penal Code §32.315, what does "counterfeit credit card or debit card" mean?
According to Texas Penal Code §32.315, what does "counterfeit credit card or debit card" mean?
What is the penalty for negligently disposing of a skimmer installed on a motor fuel dispenser, according to Texas Business and Commerce Code, Sec. 607.103?
What is the penalty for negligently disposing of a skimmer installed on a motor fuel dispenser, according to Texas Business and Commerce Code, Sec. 607.103?
According to the Texas Business and Commerce Code, what does a security alert on a consumer file indicate?
According to the Texas Business and Commerce Code, what does a security alert on a consumer file indicate?
According to the provided text, how long must a security alert remain in effect on a consumer's file after the agency places it, per the Texas Business and Commerce Code?
According to the provided text, how long must a security alert remain in effect on a consumer's file after the agency places it, per the Texas Business and Commerce Code?
According to the Texas Business and Commerce Code, what does a security freeze do?
According to the Texas Business and Commerce Code, what does a security freeze do?
What must a consumer reporting agency do no later than the 10th business day after receiving a request for a security freeze?
What must a consumer reporting agency do no later than the 10th business day after receiving a request for a security freeze?
When taking a report on an identity theft what should you keep in mind regarding jurisdiction?
When taking a report on an identity theft what should you keep in mind regarding jurisdiction?
What U.S. agency should be notified if an individual is taken into custody for committing a financial crime involving the U.S. mail?
What U.S. agency should be notified if an individual is taken into custody for committing a financial crime involving the U.S. mail?
If someone is a victim of identity theft regarding a Social Security card, what U.S. Agency should be notified?
If someone is a victim of identity theft regarding a Social Security card, what U.S. Agency should be notified?
Flashcards
Identity theft
Identity theft
The theft of personal information to commit fraud, including name and Social Security number, to open new accounts, use existing accounts, or get medical services.
Identity Crime
Identity Crime
The theft or misuse of personal or financial identifiers to gain something of value and/or facilitate other criminal activity.
Identifying Information
Identifying Information
Information that alone, or with other information, identifies a person. Includes name, date of birth, biometric data, or account numbers.
Telecommunication Access Device
Telecommunication Access Device
Signup and view all the flashcards
Spoofing
Spoofing
Signup and view all the flashcards
Identity Theft and Assumption Deterrence Act
Identity Theft and Assumption Deterrence Act
Signup and view all the flashcards
Identity Theft Penalty Enhancement Act
Identity Theft Penalty Enhancement Act
Signup and view all the flashcards
Identity Theft Enforcement and Restitution Act
Identity Theft Enforcement and Restitution Act
Signup and view all the flashcards
Fraudulent Use or Possession of Identifying Information
Fraudulent Use or Possession of Identifying Information
Signup and view all the flashcards
Mail Theft
Mail Theft
Signup and view all the flashcards
Fraudulent Use or Possession of Credit Card or Debit Card Info
Fraudulent Use or Possession of Credit Card or Debit Card Info
Signup and view all the flashcards
Security Alert
Security Alert
Signup and view all the flashcards
Security Freeze
Security Freeze
Signup and view all the flashcards
Entities Notified in Identity Crimes
Entities Notified in Identity Crimes
Signup and view all the flashcards
Major Credit-Reporting Agencies
Major Credit-Reporting Agencies
Signup and view all the flashcards
Guidelines Protecting Personal Information
Guidelines Protecting Personal Information
Signup and view all the flashcards
Keeping Information Secure Online
Keeping Information Secure Online
Signup and view all the flashcards
Keep Devices Secure
Keep Devices Secure
Signup and view all the flashcards
Steps if Identity Crime Occurs
Steps if Identity Crime Occurs
Signup and view all the flashcards
Study Notes
- Identity crimes refer to the theft of personal information used to commit fraud.
- Stolen information includes names and Social Security numbers.
- Stolen information is used to open accounts, use existing accounts, or obtain medical services.
- Thieves may present another's identity to law enforcement, leading to consequences for the victim and their family.
- Consequences of Identity Theft includes damaged credit, lawsuits for others' debts, incorrect medical information, and potential arrest.
- Identity crime is the misuse of personal or financial identifiers to gain value or facilitate crime.
- Websites for identity theft data:
- Insurance Information Institute: Facts + Statistics: Identity theft and cybercrime
- Federal Trade Commission: Consumer Sentinel Network
- Identity theft happens when someone uses a Social Security number or other personal information to open new accounts, make purchases, or get a tax refund.
Top 5 Types of Identity Theft (2019)
- Credit card fraud involving new accounts
- Miscellaneous theft, including online shopping and payment account fraud, e-mail and social media fraud, and medical service, insurance, and securities account fraud
- Mobile telephone accounts
- Business and personal loans
- Auto loans or leases
- In 2019, Texas was 4th in the state rank with 73,553 identity theft reports.
- Identity crime is a facilitator for crimes like mail theft, narcotics, financial fraud, homicide, terrorism, wire fraud, or internet intrusions, beginning with robbery, theft, burglary, computer intrusion, or theft of trash/documents.
- Special forms of identity theft:
- Tax
- Child
- Medical
Identifying Information
- Information that identifies a person alone or with other information, including:
- Name
- Date of birth
- Unique biometric data (fingerprint, voice print, retina, or iris image)
- Unique electronic identification number, address, routing code, or financial institution account number
- Telecommunication identifying information or access device
- Social Security number or other government-issued identification number
- Telecommunication access device: card, plate, code, account number, PIN, electronic serial number, mobile identification number, or identifier used to obtain money, goods, services, or transfer funds.
- Using only an individual's name lacks enough identifiers. Another identifier such as date of birth and social security number in conjunction with the name is necessary to be a true identity theft.
- Current trends in identity theft involve current technologies, including listening in, reading emails, hacking, telephone/email scams, and taking advantage of careless online habits.
- The Identity Theft Resource Center offers information on new trends, scams, and consumer alerts.
- Identity crime can be perpetrated by:
- Stealing wallets/purses/briefcases containing personal identification.
- Stealing mail with bank/credit card statements, pre-approved credit offers, or new checks/tax info.
- Completing a "change of address" to divert mail.
- Rummaging in trash ("dumpster diving") to find data.
- Fraudulently obtaining credit reports as a landlord or employer.
- Finding personal information inside homes or shared on the internet.
Methods of Obtaining Information
- Stealing information from the workplace ("business record theft") via file theft, bribery, or hacking.
- "Shoulder surfing" to observe PIN entries at ATMs, using hidden cameras.
- "Spoofing" involves fake emails and websites impersonating legitimate businesses to obtain personal data for fraud.
- Publications that provide criminals step-by-step instructions on techniques for producing false documents.
- Resources for becoming aware of how criminals can create false documents.
- Federal statues include:
- The 1998 Identity Theft and Assumption Deterrence Act made it a federal crime to knowingly transfer or use identification without authority to commit unlawful activities that violates federal, state, or local law.
- The 2004 Identity Theft Penalty Enhancement Act established aggravated identity theft penalties for felony crimes that have been committed.
- The 2008 Identity Theft Enforcement and Restitution Act allowed courts to prosecute when the criminal and victim live in the same state involving victim’s time spent remediating.
Texas Penal Code §32.51 on Fraudulent Use or Possession of Identifying Information:
- Committing offense with intent to harm or defraud another.
- Obtaining, possessing, transferring, or using identifying information of another without consent.
- Obtaining, possessing, transferring, or using information of a deceased person without legal authorization.
- Obtaining, possessing, transferring, or using identifying information of a child under 18.
- Presumed intent to harm/defraud if possessing information of three or more others/deceased.
- Presumption doesn't apply to legitimate business/government activities.
- Penalties increase with the number of items involved.
- Penalites can be increased if the offense was committed against an elderly individual.
- Victim restitution may include lost income/expenses but not attorney's fees.
- Actor can be proscecuted under a different law if the offense also constitutes an offense under the different law.
- Two other statutes in the Texas Penal Code related to identity crimes are Mail Theft and Fraudulent Use or Possession of Credit Card or Debit Card Information.
- Theft of mail containing identifying information with intent to facilitate identity theft.
- Purpose of Fraudulent Use or Possession of Credit Card or Debit Card Information is to crack down on gas pump credit card skimmers.
- Texas Penal Code §31.20 on mail theft:
- "Mail" is letters, cards, packages delivered by a carrier and not yet received, or left for collection.
- Offense if intentionally appropriating from another's mailbox without consent to deprive the addressee of the mail.
- Penalties depend on count of addresses the mail was stolen, the more addresses mail was stolen from, the higher the penalty. Also if the appropriated mail contained a identifying information and of with the intent to use that information to facilitate an offense.
- Penalties increased if the victim knew the mail was being taken from a elderly or a disabled individual.
- Texas Penal Code §32.315 regards the Fraudulent Use or Possession of Credit Card or Debit Card Information.
- The code defines
- "counterfeit credit card or debit card"
- "credit card" and "debit card" (as assigned by Section 32.31)
- "digital imprint" on a card
- An offense is committed when there is a intent to harm by possessing a fake/ number and experation date without consent/data from a stolen card.
- Rebuttable presumption if someone possesses five or more items.
- Penalties increased with item numbers, it also is influenced by if the vicitim has to make restitution to the victim of the offense.
- Actor can be proscecuted under a different law if the offense also constitutes an offense under the different law.
- Texas Code of Criminal Procedure Art. 55.02, Sec. 2a outlines how criminals can expunge fraudulent information associated with their name.
- Texas Business and Commerce Code include Consumer Credit Reporting Agencies and Payment Card Skimmers on Motor Fuel Dispensers.
- Texas Code requires a “security alert" and “security freeze” can be added if the business and commerce code is followed.
- A written police report is vital for victims it is needed as evidence for credit bureus and financial instituiotuons.
- Officer’s can use form B when filling a report of this kind to ensure they get all appropriate information.
- Govermental and business entity examples to notifiy if a crime involves identity theft are, Fedral Bureu of Investigation, Secret Service, Postal Service, Social Security Administration, and the Fedral Trade Commison.
Credit Reporting Agencies
- Experian
- Trans Union
- Equifax
- Advise vicims to contact their financial instituiotuons to report any suspisions of identity crime.
- UTility companys should be checked for any unusual activtiy.
- Educating law enforcement agencies is a proactive approach to take.
- If a victum is asked to make a police report it should be complied with, these police reports are sometimes needed in order to resolve the offense.
- The more knowlage a person has about their fiancial records the better prepered they will be to protect themselves, don't give out information over the phone unless you initiated the call.
- Limit what you carry, only wear with what you need, and never carry a social security card.
- Limit the mount of personal information you have on checks.
- If you notice late billing cycles, contact the sender, compare recipts with account statments.
- Shred all recipts, credit offers, applications, insurance, or other financial documents.
- Secure Social Security card, and only give it out when nesscary.
Keeping Information Secure Online
- Create complex and long passwords, and create new passwords on a regular basis.
- Be aware of who you may be giving information to, do not provide it to people on the phone, or mail if you did'nt initiate the conversation.
- Use security software (anti-virus and anti-spyware) and a firewall.
- Report any suspicious activity.
- Encrypt data and keep browsers secure.
- Do not open files from unknown senders.
- If you spot identity crime you should notify Sheriff's offices/local police, contact local licenses/DMV, notify creditors/merchants where your card was used.
- Other things that can be done are:
- Notify your Bank.
- Automatic Teller Machine (ATM) Cards:
- Contact the Social Security Administration (SSA).
- Federal Trade Commission (FTC): The FTC is one place to report identity theft to the federal government.
- Notify the U.S. Passport Agency
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.