Identity Theft Flashcards

1
Q

What is Identify Theft?

A

False ID used to perpetrate identity theft, gain access, obtain goods or services illegally while remaining anonymous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary reason criminals perpetrate identity theft?

A

For the sake of remaining anonymous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the main statute that deals with identification documents and false identification?

A

18 USC 1028

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the statute that deals with Aggravated Identity Theft?

A

18 USC 1028(A)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the significance of Aggravated Identity Theft?

A

If ID theft is involved in another case, we can charge with this (ie. ID theft used in conjunction with Access Device Fraud, Forgery, etc…); this is not a stand alone charge

Two Year Mandatory, Consecutive Sentence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is a Credit Card number a “means of identification”?

A

NO, because it does NOT identify a person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are “Breeder Documents”?

A

Documents that you can use over and over to breed new accounts (ex. SS card, date of birth, birth certificates, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What’s the difference between Counterfeit and fictitious instrument?

A

CFT = a genuine document that you alter

Fictitious = you make it up to imitate a genuine document/instrument

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Where can bad guys get your information in order to steal your identity?

A
The internet
Phishing/Pharming 
Collusive and Unsuspecting Merchants 
Mailbox
Trash Cans 
Social Engineering/Pretexting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is Identity Theft Typically a stand alone crime?

A
NO, it is usually associated with: 
Access Device Fraud 
Computer Fraud 
Bank Fraud 
Wire Fraud 
Mail Fraud 
Money Laundering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What types of materials are normally associated with the Manufacturing of false identifications?

A

Printing Equipment
Overlays
Cardstocks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the initial steps you should take when starting an identity theft investigation?

A
  • Obtain financial Info from the victim (credit reports)
  • Obtain chronological log of all victims actions since
    discovering theft/compromise
  • FOLLOW THE $$$$$, where is fraudulent activity
    occurring
  • Subpoena info from accounts that are linked to ID theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the role of the Federal Trade Commission (FTC) in identity theft?

A

Established and maintain a centralized database of victim complaints, suspect info, referrals to appropriate LE

Analyze Criminal Trends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the SSF 4010?

A

Release and Authorization to Obtain Financial and Credit info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What advice should you give ID theft victims?

A
  1. Close the compromised acct
  2. Notify credit bureaus/fraud alert
  3. Obtain Credit Reports
  4. Contact law enforcement to file a report
  5. Notify the US post office
  6. FTC
  7. Social Security Administration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly