Synthetic Identity Fraud. Kathy Druckenmiller, CFCI, CCCI, CIRM, ACT Specialist May 2017
|
|
- Russell Davis
- 5 years ago
- Views:
Transcription
1 Synthetic Identity Fraud Kathy Druckenmiller, CFCI, CCCI, CIRM, ACT Specialist May 2017
2 Synthetic Identity/Ghosting
3 Identity Theft vs Identity Fraud Identity Theft Legitimate Identity is stolen Identity Fraud Fictitious Identity is created
4 Identity Theft Controls
5 Synthetic Identity/Identity Theft Synthetic identity theft now accounts for nearly 85% of the more than 16 million ID thefts in the U.S. each year finds the Federal Trade Commission Federal Trade Commission, "The Changing Face of Identity Theft"
6 Definition syn thet ic b : devised, arranged, or fabricated for special situations to imitate or replace usual realities 6
7 Credit Fraud Synthetic Identities Uses Establish valid residency (Immigrants) Health Insurance Fraud Credit Repair Organized Crime (Terrorism?) 7
8 How does it happen? Create a synthetic identity using combination of real and fabricated information Purchase a Credit Privacy Number (CPN) and assign it to a fictitious identity Create a credit file and link a synthetic identity to a legitimate account holders account as an authorized user. 8
9 Lifecycle of Synthetic ID for Fraud Obtain CPN or SSN Payment Default Establish Identity Obtain Credit Pollination
10 CPN Advertised by Credit Repair sites as: Credit Privacy Number Credit Profile Number Nine digit identification number that can be used instead of a Social Security Number in SOME INSTANCES. 10
11 CPN Advertisements CPN Number this ad? Trusted top quality CPN provider No risk! Money back guarantee. Secondary Credit Number this ad? Secondary Credit Number, SCN, SCN number, New credit file $25000 CPN Loan Funding this ad? Loan Ready CPN Numbers FBI approved You Can Use CPN in Lieu of Your SSN 11
12 Websites
13 Websites
14 Legal?
15 SECTION 7 Privacy Act of 1974 (a) (1) It shall be unlawful for any Federal, state, or local government agency to deny to any individual any right, benefit, or privilege provided by law because of such individual's refusal to disclose his social security account number. (b) Any Federal, State, or local government agency which requests an individual to disclose his social security account number shall inform that individual whether that disclosure is mandatory or voluntary, by what statutory or other authority such number is solicited, and what uses will be made of it.
16 Websites
17 CPNs? What is sold as a CPN in usually a valid Social Security Number. 17
18 CPNs Where do they really come from? Elderly Homeless Incarcerated 18
19 Synthetic Identity Minors with no established credit 19
20 Social Security Numbers How do they get the Social Security Numbers?
21 Data Breaches 106 Million records 21
22 Creating the Synthetic Identity Synthetic Identity Creation Create an identity to pair with the CPN and submit application to Credit Bureau 22
23 Creating the Synthetic Identity Synthetic Identity Creation Header information; Report for: John Q. Public, Since 08/01/2014, Social Security Number: , DOB 02/15/1952 John is 63 years old and only established a credit bureau in
24 Websites
25 Tradelines Also referred to as a Pollinator Account
26 Tradelines 26
27 Tradelines Combo Packages 27
28 Timeline for Credit Reporting 28
29 Pollination Creating the pollination of the identity/credit file Header information; Report for: John Q. Public, Since 08/01/2014, Social Security Number: , DOB 02/15/1952 John is 63 years old and only established a credit bureau in
30 Pollination Synthetic Identity Creation Oldest trade line; 30
31 Websites
32 Completed Creation Synthetic Identity Creation Oldest trade line; Check recent trade lines; 32
33 Challenges for Banks Why add Authorized users? 33
34 Challenges for Banks The Equal Credit Opportunity Act Compliance with Regulation B The Federal Reserve s Regulation B, which implements the 1974 Equal Credit Opportunity Act, requires that information on spousal authorized user accounts be reported to the credit bureaus and considered when lenders evaluate credit history. 34
35 Challenges for Law Enforcement Who are the victims? No person with this combination of identifiers exists 35
36 Who are the Victims? Most often Children 36
37 Victims 37
38 Who are the Victims? 38
39 Law Enforcement 39
40 Mitigation Synthetic Identity Training and Awareness Employees Law Enforcement Freeze all Minor s credit files until 18 years old Review policy of authorized users on credit accounts 40
41 Questions
Basil Doyle, Sr. Manager Corporate Investigations Department. Synthetic Credit Identities
Basil Doyle, Sr. Manager Corporate Investigations Department Synthetic Credit Identities May 26, 2016 Are Your UBO s Synthetic? The Problem 4 2015 TransUnion LLC All Rights Reserved The Federal Trade Commission
More informationSynthetic Identities. Are you chasing invisible footprints? 2018 Fair Isaac Corporation. All rights reserved.
Synthetic Identities Are you chasing invisible footprints? 2018 Fair Isaac Corporation. All rights reserved. Synthetic Identities A combination of fictitious and potentially stolen personally identifiable
More informationNational DMV Fraud Trends. - Fighting the Fraud that s Fighting the DMV s
National DMV Fraud Trends - Fighting the Fraud that s Fighting the DMV s Use of stolen blank title stock Identity & Vehicle fraud trends Synthetic identity fraud Title fraud and use of and disposal of
More informationThe Stark Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age
The Stark Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age Scoping Out Synthetic ID Fraud In the 18 years since synthetic identity fraud emerged as a significant
More informationSubject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New
Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New Accounts), G-38 (E-Commerce), G-40 (Issuance of Visa Cards),
More informationWhat is Credit Monitoring?
5LINX SafeScore Overview Fraud Facts What is Credit Monitoring How is Credit Monitoring different from Identity Monitoring Why choose Credit Monitoring Credit Monitoring package details Compensation How
More informationWhen Your Child s Identity Is Stolen
When Your Child s Identity Is Stolen What is child identity theft? CONSUMER INFORMATION SHEET 3B 2/16/08 Adults are not the only targets of identity theft. In fact, children under the age of 18 can also
More informationWorking Together to Prevent Identity Theft
Consumer Measures Committee Comité des mesures en matière de consommation Working Together to Prevent Identity Theft Consultation Workbook Request for Comments The Consumer Measures Committee (CMC) is
More informationRussell P. Butler
Russell P. Butler rbutler@mdcrimevictims.org 301-952-0063 Russell P. Butler National Identity Theft Victim Assistance Network/ Maryland Crime Victims Resource Center, Inc. rbutler@mdcrimevictims.org; 301-952-0063
More informationIdentity Theft: Shifting Focus from Criminals and Consumers to Businesses
Identity Theft: Shifting Focus from Criminals and Consumers to Businesses Chris Jay Hoofnagle Director, Information Privacy Programs For The John Jay College of Criminal Justice October 20, 2009 1 Thesis:
More informationIRS Criminal Investigation
IRS Criminal Investigation Kurt Bertram Special Agent Public Information Officer November 5, 2015 IRS Criminal Investigation Mission Criminal Investigation serves the American public by investigating potential
More informationFINANCIAL CRIMES INVESTIGATIONS
FINANCIAL CRIMES INVESTIGATIONS today s presenters... Brian Sallee Cuyahoga County Sheriff s Department Major Crimes Task Force Larry Henderhan FDA Special Agent Major Crimes Task Force Counterfeit Investigations
More informationIdentity theft detection, prevention and mitigation policy. (a) : policies and procedure for student records;
3359-11-10.8 Identity theft detection, prevention and mitigation policy. (A) Introduction. (1) The university of Akron is committed to the detection, prevention and mitigation of identity theft associated
More informationIdentity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office
Identity Theft: Prevention & Recovery Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office What is identity theft? Stealing personal information and using without permission
More informationClarion University Identity Theft Prevention Program
Clarion University Identity Theft Prevention Program A) Purpose The purpose of the Identity Theft Prevention Program (Program) is to detect, prevent and mitigate identity theft in connection with any covered
More informationCoreLogic Credco First American Way Poway, CA (800)
Red Flag Regulation WHAT IT IS The Red Flag Regulation implements Sections 114 and 315 of the FACT Act. It finalizes three distinct requirements two of which are relevant to automotive, RV and marine dealers,
More informationLexisNexis Developing an Effective Red Flags Rule Program
LexisNexis Developing an Effective Red Flags Rule Program Program Checklist R O I : R E T U R N O N I N F O R M AT I O N S O LU T I O N S Customer Development Authentication & Screening Fraud Prevention
More informationEdward J. Finn 1275 Drummers Lane, Suite 302 Office: Wayne, PA Fax:
Edward J. Finn 1275 Drummers Lane, Suite 302 Office: 267-930-4776 Wayne, PA 19087 Fax: 267-930-4771 Email: efinn@mullen.law VIA U.S. MAIL AND EMAIL Office of the Attorney General 1125 Washington Street
More informationIdentity Theft Prevention: The FTC s Red Flags Rules and Health Care Providers HCCA Physician Practice Compliance Conference October 13, 2009
Identity Theft Prevention: The FTC s Red Flags Rules and Health Care Providers HCCA Physician Practice Compliance Conference October 13, 2009 Rebekah A. Z. Monson Pepper Hamilton LLP 215.981.4031 monsonr@pepperlaw.com
More informationLifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET
LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET 1-877-511-7906 LifeLock.com/Business FACT SHEET LifeLock Benefit Elite LifeLock
More informationTHE CHILDREN'S MERCY HOSPITAL ADMINISTRATIVE POLICY
THE CHILDREN'S MERCY HOSPITAL ADMINISTRATIVE POLICY TITLE: Identity Theft Prevention Program EFFECTIVE: 11/08 REVISION DATE: REVIEWED WITH NO CHANGES: 12/13 RETIRED: PURPOSE: The Identity Theft Prevention
More informationORGANIZATIONAL MANUAL
I. PURPOSE ORGANIZATIONAL MANUAL IDENTITY THEFT PROTECTION A. To establish an Identity Theft Prevention Program designed to detect, prevent and mitigate Identity Theft in connection with the opening of
More informationWhat to expect as a LifeLock member LEARN HOW TO GET THE MOST FROM YOUR MEMBERSHIP
LIFELOCK MEMBER EXPECTATIONS GUIDE 800-607-91744 LifeLock.com What to expect as a LifeLock member LEARN HOW TO GET THE MOST FROM YOUR MEMBERSHIP THE LIFELOCK MEMBER COMMUNICATION EXPERIENCE Signing up
More informationThe Smartest Employee Benefit Is Identity Theft Management
The Smartest Employee Benefit Is Identity Theft Management HELP PROTECT YOUR EMPLOYEES. Proposal For: Date: Presented By: Provide peace of mind. Raise your benefits to a new level. Every employee has a
More informationUSA+ is committed to the promotion of Equal Access to Health Care for all Americans.
MyDoc 24/7 USA+ is committed to the promotion of Equal Access to Health Care for all Americans. Real Benefits, Real Value, PLUS We Really Care! About USA+ MyDoc 24/7 (USA+) is a non-profit membership association
More informationMedical Identity Theft Prevention Policy
SUBJECT: NUMBER: EFFECTIVE DATE: SUPERSEDES SPP: APPROVED BY: DISTRIBUTION: Medical Identity Theft Prevention Policy (signature) DATED: I. STATEMENT OF PURPOSE: To define medical identity theft and outline
More informationIDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008
IDENTITY THEFT RED FLAG POLICY/GUIDELINES JULY 2008 Introduction: Under the Fair and Accurate Credit Transactions Act (FACT Act), financial institutions (and creditors) that offer or maintain covered accounts
More informationUniversity of Cincinnati FACTA Red Flag Identity Theft Prevention Program
FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious
More information97 % of consumers surveyed expect their FI to help protect their financial assets from fraud. 2
Deluxe Provent: Protecting against expanded threats. Providing for expanded opportunities. Introduction Identity thieves are smarter and more organized than ever before, claiming over 12.6 million victims
More informationTABLE OF CONTENTS LEGAL CPN 2010 TELL ALL CREDIT SECRETS INTRODUCTION... 2
TABLE OF CONTENTS LEGAL CPN 2010 TELL ALL CREDIT SECRETS INTRODUCTION... 2 CHAPTER 1 Understanding Your Credit... 7 The five types of information found on your credit report How your credit report is calculated
More informationStatement of Robert Ryan, Senior Director of Government Relations TransUnion, LLC. Before the. Subcommittee on Crime, Terrorism and Homeland Security
Statement of Robert Ryan, Senior Director of Government Relations TransUnion, LLC Before the Subcommittee on Crime, Terrorism and Homeland Security Of the Judiciary Committee HR 1731: The Identity Theft
More informationFirst Name: KATHRYN Date of Birth (DOB): Middle Name: ALICE Social Security Number (SSN): ***-**-2664 Last Name: BRANNAN
Company Name: INDIANA UNIVERSITY - PURDUE UNIVERSITY INDIANAPOLIS - UNDERGRADUATE NURSING Order Date: 11/30/2016 Company ID: IU34 Order ID: 9016-1130-2353-3200 ARU67D 12-05-2016 First Name: KATHRYN Date
More informationGAO SOCIAL SECURITY. Use of the Social Security Number Is Widespread. Testimony
GAO United States General Accounting Office Testimony Before the Subcommittee on Social Security, Committee on Ways and Means, House of Representatives For Release on Delivery Expected at 10:00 a.m. Tuesday,
More informationIdentity Theft Prevention Program
Identity Theft Prevention Program In December 2008 the VSC Board of Trustees recognized that some activities of the VSC are subject to the provisions of the Fair and Accurate Credit Transactions Act (FACT
More informationCustomer Identification Programs for Banks, Savings Associations and Credit Unions
Customer Identification Programs for Banks, Savings Associations and Credit Unions The National Consumer Law Center1 ("NCLC") submits the following comments on behalf of its low income clients regarding
More informationMedical Identity Theft
South Dakota State University From the SelectedWorks of Axton Betz-Hamilton 2012 Medical Identity Theft Whitney Walters, Eastern Illinois University Axton Betz, Eastern Illinois University Available at:
More informationROCHESTER INSTITUTE OF TECHNOLOGY
ROCHESTER INSTITUTE OF TECHNOLOGY Identity Theft Protection Table of Contents Introduction...2 Important Note About Passwords...2 General Information...2 Who is Covered and When...2 You Need to Enroll...3
More informationNews Release IR IRS Releases the "Dirty Dozen" Tax Scams for 2014; Identity Theft, Phone Scams Lead List
Page 1 TEXT: News Release IR 2014-16 IRS Releases the "Dirty Dozen" Tax Scams for 2014; Identity Theft, Phone Scams Lead List IR 2014-16; 2014 IRB LEXIS 130 February 19, 2014 WASHINGTON - The Internal
More informationDescription of Benefits for Family-IDprotect. Complete Management of Your Identity Recovery Case
IMPORTANT: This complimentary membership in Family-IDprotect is provided to you by one of our participating Merchants, Lenders and Associations. Coverage is provided at no cost to you in consideration
More informationInternal Revenue Service Criminal Investigation
Tax Refund Fraud and Identity Theft IRS - Criminal Investigation John Collins Acting Special Agent In Charge Boston Field Office Internal Revenue Service Criminal Investigation Criminal Investigation serves
More informationMoney Mule Awareness
U.S. Department of Justice Federal Bureau of Investigation Money laundering, Forfeiture and Bank Fraud Unit Money Mule Awareness To report fraudulent activity, contact your nearest FBI field office. What
More informationHacking Healthcare: Attacks on the Highest Value Asset
Hacking Healthcare: Attacks on the Highest Value Asset Paul Dant Chief Strategy Officer Independent Security Evaluators The Key Takeaway Who am I? Paul Dant Chief Strategist @ ISE 9: First digital product
More informationRed Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010
Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010 Princeton University employees are responsible for detecting Red Flags consistent with
More informationACA Reporting Checklist for Self-Insured Employer Plan Sponsors
ACA Reporting Checklist for Self-Insured Employer Plan Sponsors IRC Section 6055 EMPLOYER TASK CHECKLIST WHAT NEEDS TO BE DONE Define employer s status as a controlled group or member of a controlled group
More information11/14/ FNBT FACT ACT
1 FNBT FACT ACT This class addresses the Fair Credit Reporting Act which governs the collection and use of information considered in connection with granting credit, providing insurance or offering employment.
More informationCredit Matters Credit Concept Workshop Presentation Script (Part II of II)
Credit Matters Credit Concept Workshop Presentation Script (Part II of II) (HAND OUT QUIZ PRIOR TO PRESENTATION) Opening Slide: WELCOME BACK TO THE SECOND PRESENTATION OF THE CREDIT CONCEPTS WORKSHOP SERIES.
More informationPalomar Community College District Procedure AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS
1 STUDENT SERVICES 2 3 AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 References: Fair
More informationNEUROLOGICAL INSTITUTE OF MICHIGAN PATIENT INFORMATION FORM
NEUROLOGICAL INSTITUTE OF MICHIGAN PATIENT INFORMATION FORM PATIENT NAME: HOME ADDRESS: BIRTH : SSN#: CELL: HOME TELEPHONE: EMPLOYER: WORK: EMERGENCY CONTACT: REFERRING DOCTOR: PRIMARY CARE MD: PHONE:
More informationIDENTITY THEFT RED FLAGS AND RESPONSES
IDENTITY THEFT RED FLAGS AND RESPONSES Based on Supplement A to Appendix J Sources of Red Flags Financial institutions and creditors should incorporate relevant red flags from sources such as: Incidents
More informationThe Cost of Identity Theft to Business What Business Owners Must Know Now
The Cost of Identity Theft to Business What Business Owners Must Know Now An Introduction to the Fair and Accurate Credit Reporting Act (FACTA): What Business Owners Must Know Now It often seems that there
More informationIdentity Theft Prevention Program. Approved by the Board of Trustees on February 20, 2009
Identity Theft Prevention Program Approved by the Board of Trustees on February 20, 2009 I. Purpose & Scope This Program was developed pursuant to the Federal Trade Commission s ( FTC ) Red Flag Rules
More information16 CFR Duties regarding the detection, prevention, and mitigation of identity theft.
16 CFR 681.2 681.2 Duties regarding the detection, prevention, and mitigation of identity theft. (a) Scope. This section applies to financial institutions and creditors that are subject to administrative
More informationContents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You.
Identity theft has been the most frequent consumer complaint received by the Federal Trade Commission for the past 13 years. 1 There are a number of ways to steal personal information ranging from stealing
More informationPOLICY: Identity Theft Red Flag Prevention
POLICY SUBJECT: POLICY: Identity Theft Red Flag Prevention It shall be the policy of the Cooperative to take all reasonable steps to identify, detect, and prevent the theft of its members personal information
More informationASSEMBLY FINANCIAL INSTITUTIONS AND INSURANCE COMMITTEE STATEMENT TO. ASSEMBLY, No with committee amendments STATE OF NEW JERSEY
ASSEMBLY FINANCIAL INSTITUTIONS AND INSURANCE COMMITTEE STATEMENT TO ASSEMBLY, No. 944 with committee amendments STATE OF NEW JERSEY DATED: JUNE 18, 2012 The Assembly Financial Institutions and Insurance
More informationIdentity Protection Services
Identity Protection Services Overview Why are identity protection services being provided? We believe your personal information should stay that way personal. That s why we re taking industry- leading
More informationTITLE II ADMINISTRATIVE REGULATIONS IDENTITY THEFT PREVENTION PROGRAM
TITLE II ADMINISTRATIVE REGULATIONS CHAPTER 30 IDENTITY THEFT PREVENTION PROGRAM 30.01 Program The Town of Flower Mound, Texas, as a utility provider ( Utility ), has developed an Identity Theft Prevention
More informationProtecting New Yorkers from Identity Theft. Senator David Carlucci
Protecting New Yorkers from Identity Theft Senator David Carlucci Identity Theft According to USA Today, identity theft incidence rates rose 16% between 2015 and 2016, alone. 15.4 million Americans were
More informationDrexel and FMFCU. Presented By
Drexel and FMFCU www.fmfcu.org/drexel Identity Theft & Fraud Identity Theft & Fraud Don t Be The Next Victim! Identity Theft & Fraud What is Identity Theft? Leading Generation Targeted Federal Trade Commission
More informationIdentity Theft Protection Plans
Identity Theft Protection Plans V E R I F Y P R O T E C T R E C O V E R IN 2017, DATA BREACHES REACHED ECONOMIC PROPORTIONS A victim may need to spend time at work trying to recover their good name and
More informationMiddlebury Institute of International Studies Identity Theft Prevention Program
Middlebury Institute of International Studies Identity Theft Prevention Program I. PROGRAM ADOPTION Middlebury Institute of International Studies, hereafter referred to as the Institute, has developed
More informationFinancial Literacy Course. East High School Module 9
Financial Literacy Course East High School Module 9 What will you learn about? Identity Theft and Consumer Fraud Protecting Against and Identity Theft and Consumer Fraud Fair Debt Collection Practices
More informationFrequently Asked Questions
Frequently Asked Questions How do you protect my identity? We use our proprietary software to proactively monitor various sources. Through PrivacyArmor, you will also have the power to create thresholds
More informationSecure Opening Plus Requirements for the Identity Theft Red Flag Program
Secure Opening Plus Requirements for the Identity Theft Red Flag Program Secure Opening Plus is a solution that assists financial institutions in obtaining identifying information and opening accounts
More informationACH Tax Refunds: Exceptions, Posting, & Liabilities. Presented by Laura Nelson, AAP, NCP Auditor/Education Specialist
ACH Tax Refunds: Exceptions, Posting, & Liabilities Presented by Laura Nelson, AAP, NCP Auditor/Education Specialist Audio Handouts Questions Dealing with ACH Tax Refunds: Exceptions, Posting & Liabilities
More informationc» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki:
Identity Theft Podcast [Music plays] Nikki: You re listening to Identity theft protection. Hi. I m Nikki, your host for today s podcast. Identity theft occurs when someone uses your name, social security
More informationWEST VIRGINIA UNIVERSITY BOARD OF GOVERNORS POLICY 54. Rule on Identity Theft Detection and Prevention Program
WEST VIRGINIA UNIVERSITY BOARD OF GOVERNORS POLICY 54 Rule on Identity Theft Detection and Prevention Program Section 1. General 1.1 Purpose: The purpose of this policy is to establish an Identity Theft
More informationIdentity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE. Allegheny County District Attorney Investigations Unit
Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit Identity theft and identity fraud are terms used to refer to all types
More informationIdentity Theft: World s Fastest Growing Crime!!
Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit 1 Identity theft and identity fraud are terms used to refer to all
More informationFighting back against synthetic identity fraud
Fighting back against synthetic identity fraud Digging deep into the data trails people leave behind can help banks detect whether their customers are real or not and stem losses from this fast-growing
More informationWHITE PAPER Fraud methods for identifying synthetic identities in credit applications and portfolios
WHITE PAPER Fraud methods for identifying synthetic identities in credit applications and portfolios Identifying trends and solutions to confirm proof of life based on alternative data. AUGUST 2017 Table
More informationFrequently Asked Questions
Frequently Asked Questions How do you monitor my identity? We use our exclusive software to proactively monitor various sources for suspicious activity. With PrivacyArmor : You will be able to set thresholds
More informationWHEN BAD THINGS HAPPEN TO YOUR GOOD NAME
WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME Corporal Mark Kincaid Hampton Police Division Community Relations Unit What is Identity Theft? Someone uses your name or personal information to: Open credit card
More informationADMINISTRATIVE PROCEDURE 5800 DESERT COMMUNITY COLLEGE DISTRICT
ADMINISTRATIVE PROCEDURE 5800 DESERT COMMUNITY COLLEGE DISTRICT PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS The purpose of this Identity Theft Prevention Program (ITPP) is to control
More informationServicing Agent Oversight and Surveillance Program Best Practices
Servicing Agent Oversight and Surveillance Program Best Practices Freddie Mac Single-Family Seller/Servicer Guide ( Guide ) Section 8102.1 requires Servicers to establish an oversight and surveillance
More informationRed Flags Rule Identity Theft Training Program
Red Flags Rule Identity Theft Training Program October 2017 Purpose of Training The purpose of the UA Little Rock Identity Theft Prevention Program is to reduce the exposure of financial and personal loss
More informationIdentity thieves use a variety of ways to gain access to your personal information:
How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into
More informationTHE COOPER UNION FOR THE ADVANCEMENT OF SCIENCE AND ART. February 24, 2010
I. Introduction THE COOPER UNION FOR THE ADVANCEMENT OF SCIENCE AND ART RED FLAGS IDENTITY THEFT PREVENTION PROGRAM A. Purpose February 24, 2010 The Cooper Union for the Advancement of Science and Art
More informationNEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)
NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) Section 1. NSHE... 2 Section 2. UNR... 4 Section 3. WNC... 8 Chapter 13,
More informationMiddlebury College Identity Theft Prevention Program
Middlebury College Identity Theft Prevention Program I. PROGRAM ADOPTION Middlebury College has developed this Identity Theft Prevention Program ("Program") pursuant to the Federal Trade Commission's Red
More informationFay Servicing, LLC 901 S. 2 nd St., Suite 201 Springfield, IL 62704
RE: Identity Theft Claim You recently notified Fay Servicing, LLC that you are the victim of identity theft with respect to the above referenced loan (also referred to in this notice as the debt or account
More informationLOAN OFFICER NAME: OFFICE PHONE: CELL PHONE: FAX: ADDRESS: AFFILIATE NAME: COMPANY NAME: BROKER NAME: BROKER PHONE: BROKER
Loan Application Complete the entire application. Failure to complete can cause delays in funding 701 E. Front Ave., Floor, Coeur d'alene, ID 83814 LOAN OFFICER NAME: OFFICE PHONE: CELL PHONE: FAX: EMAIL
More informationIRS Criminal Investigation SPECIAL AGENT FELICIA MCCAIN PUBLIC INFORMATION OFFICER (619)
IRS Criminal Investigation SPECIAL AGENT FELICIA MCCAIN PUBLIC INFORMATION OFFICER (619) 770-9317 FELICIA.MCCAIN@CI.IRS.GOV Areas of Emphasis for CI Abusive Return Preparers International Fraud Refund
More informationIdentity Theft Information for Tax Professionals. August 2017
Identity Theft Information for Tax Professionals August 2017 2017 Filing Season! Processed 135.6 million tax returns! Issued 97 million refunds! Dispersed $270 billion in refunds! Average refund: $2,700!
More informationTestimony. Submitted for the Record. American Bankers Association. Financial Institutions and Consumer Credit Subcommittee
Testimony Submitted for the Record from the American Bankers Association for the Financial Institutions and Consumer Credit Subcommittee of the Committee on Financial Services United States House of Representatives
More informationChapter Five: Student Services and Operations AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS
AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS I. Purpose of the Identity Theft Prevention Program The purpose of this Identity Theft Prevention Program (ITPP) is to control reasonably
More informationSian M. Schafle 1275 Drummers Lane, Suite 302 Office: Wayne, PA Fax:
Sian M. Schafle 1275 Drummers Lane, Suite 302 Office: 267-930-4799 Wayne, PA 19087 Fax: 267-930-4771 Email: sschafle@mullen.law INTENDED FOR ADDRESSEE(S) ONLY VIA E-MAIL Office of the Attorney General
More informationIDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018
IDENTITY THEFT Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 What is Identity Theft? Identity (ID) theft is a crime where a thief steals your personal information,
More informationWASHTENAW COMMUNITY COLLEGE IDENTITY THEFT DETECTION, PREVENTION, AND MITIGATION PROGRAM
WASHTENAW COMMUNITY COLLEGE IDENTITY THEFT DETECTION, PREVENTION, AND MITIGATION PROGRAM PURPOSE AND SCOPE The Identity Theft Prevention Program was developed pursuant to the Federal Trade Commission s
More informationif applicable if applicable if applicable
For official use only: Customer Name Customer No. Department of the Treasury Bureau of the Fiscal Service (Revised March 2014) CLAIM FOR LOST, STOLEN, OR DESTROYED UNITED STATES SAVINGS BONDS OMB No. 1535-0013
More informationOCTOBER 2017 EQUIFAX CYBERSECURITY INCIDENT
OCTOBER 2017 Equifax has reported a cybersecurity incident potentially impacting 143 million consumers a number equal to more than 50 percent of the U.S. adult population. Consumer information accessed
More informationPolicy Statement. Definitions -Covered Account -Identifying Information -Identity Theft -Red Flag
Page 1 Austin Peay State University Identity Theft Prevention POLICIES Issued: March 25, 2017 Responsible Official: Vice President for Finance and Administration Responsible Office: Information Technology
More informationALABAMA BILL OF RIGHTS
ALABAMA BILL OF RIGHTS Alabama Consumers Have the Right to Obtain a Security Freeze. You have a right to place a security freeze on your credit report, which will prohibit a consumer reporting agency from
More informationGuidelines to RULE MB-001 Mortgage Brokers Licensing and Ongoing Obligations
Guidelines to RULE MB-001 Mortgage Brokers Licensing and Ongoing Obligations Table of Contents PART 1: Preliminary Matters... 3 Lender... 3 Requirement to be licensed... 3 Exemptions... 4 Simple referrals...
More informationEXECUTIVE SUMMARY. A systematic approach for combating enrollment fraud
EXECUTIVE SUMMARY A systematic approach for combating enrollment fraud OCTOBER 2017 Enrollment fraud is a serious and growing problem The proliferation of identity fraud and new ways of enrolling in health
More informationIllinois Eastern Community Colleges. Frontier Community College Lincoln Trail College Olney Central College Wabash Valley College
Illinois Eastern Community Colleges Frontier Community College Lincoln Trail College Olney Central College Wabash Valley College Identity Theft Prevention Program Approved by the Cabinet: February 4, 2015
More informationLOAN OFFICER NAME: OFFICE PHONE: CELL PHONE: FAX: ADDRESS: AFFILIATE NAME: COMPANY NAME: BROKER NAME: BROKER PHONE: BROKER
Loan Application Complete the entire application. Failure to complete can cause delays in funding 701 E. Front Ave., Floor, Coeur d'alene, ID 83814 LOAN OFFICER NAME: OFFICE PHONE: CELL PHONE: FAX: EMAIL
More informationCONSUMER REACTIONS TO DATA BREACHES
1 CONSUMER REACTIONS TO DATA BREACHES Claire Greene Eric Johnson Slava Mikhed NACHA Payments 2017 April 24, 2017 2 DID THE TARGET BREACH CHANGE CONSUMER ASSESSMENTS OF PAYMENT CARD SECURITY? Claire Greene
More information10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office
Identity Theft Consumer Protection Section Ohio Attorney General s Office 1 What is Consumer Protection? Ensures a safe marketplace for consumers. Enforce laws related to: Home improvement work Seeing
More informationADAM H. PUTNAM COMMISSIONER
FLORIDA DEPARTMENT OF AGRICULTURE AND CONSUMER SERVICES ADAM H. PUTNAM COMMISSIONER SOLICITATION OF CONTRIBUTIONS REGISTRATION APPLICATION Chapter 496, Florida Statutes 5J7.004 Florida Department of Agriculture
More information