What tools can i use to investigate and build a case

Assignment Help Other Subject
Reference no: EM131593987

After having reviewed many traditional forms of white collar crime during the course, we end the course with a look towards the future. Although identity theft has been a popular topic in recent years, it exponential growth warrants our study of it here. Thus, I have selected two readings recently published, one from Police Chief magazine (the official publication of the International Association of Chiefs of Police) and the second from the FBI Law Enforcement Bulletin (the official publication of the FBI). I did this to provide each of you with an example of what current police practitioners and decision makers are getting sent to their desks so that you have a feel for what is currently happening in law enforcement.

As current of future law enforcement practitioners, what are your responses to these two articles? What is you view of the future of this issue? What can the police do to combat it? What about individual responsibility to protect oneself from becoming a victim?

A Chief's View:Identity Theft:Resources for Police

By Stephen White, Chief of Police, Doylestown Township, Pennsylvania, and Monique Einhorn, Attorney, Identity Theft Program, Federal Trade Commission, Washington, D.C.

Identity theft seems to be on everyone's radar screen. A 2003 study by the Federal Trade Commission found that identity theft affects almost 10 million consumers a year. Most states have enacted their own identity theft laws to assist law enforcement fight this crime. 

When Congress criminalized identity theft in October 1998, it directed the Federal Trade Commission (FTC) to establish a national program that included a centralized complaint and education service for victims of identity theft. Today, the FTC's Identity Theft Program attacks the crime on three fronts: it coordinates victim assistance and education efforts; it assists law enforcement by providing investigative resources and facilitating information sharing; and it promotes prevention efforts and best practices through industry outreach. These resources can make it easier for police to work with victims and investigate the crime. (continued on page 38)

What's New

The Fair and Accurate Credit Transactions Act (FACT Act), a new federal law, provides identity theft victims with important new rights and remedies. Although the identity theft provisions are mostly directed at victims' recovery, they affect how police officers deal with this pernicious crime. The law makes police reports more important than ever as a tool to help victims recover. That is because the new rights and remedies-such as blocking fraudulent trade lines on credit reports and obtaining the suspect's credit application-are available only to victims who present a police report to help prove that they are victims of fraud.

One provision of the FACT Act that simplifies the investigation of identity crime relates to the documents used to open fraudulent accounts. For example, if a company extends credit to a suspect using the victim's personal information, the victim now can obtain the identity theft related transaction records at no charge from that company-but only if the victim provides a copy of a police report and other required documentation. Law enforcement also benefit because investigators can get these documents without a subpoena if a victim authorizes, in writing, that the business send a copy of the records directly to the officer.

Police reports are the first step in helping identity theft victims clear their names and recover from identity theft. Here's what happens after a victim obtains a police report:

Credit bureaus must block the reporting of inaccurate information identified by the victim as resulting from identity theft.

Businesses where fraudulent accounts were opened must give victims (and police, at the victim's written request) copies of applications and business records relating to transactions that the victim identifies as resulting from identity theft. This means that law enforcement agencies can obtain these documents without a subpoena.

Certain information on a credit report that a victim claims is inaccurate because of identity theft can no longer be reported by a business to a credit reporting company.

The big three nationwide credit reporting companies (Experian, Equifax, and TransUnion) must place an extended fraud alert in the victim's credit file for seven years. It entitles the victim to free credit reports.

FTC Resources for Helping Victims

Because prevention is always the first line of defense, the FTC has created a virtual library of information about identity theft for the general public, as well as for law enforcement. These materials are available to police departments as they coordinate community outreach efforts. Local law enforcement outreach efforts to address identity theft can lead to real results. Law enforcement officers can take the following steps:

Direct victims to the FTC's ID theft Web site at www.consumer.gov/idtheft, where they can learn how to minimize the effects of the fraud, and find the ID theft affidavit.

Advise consumers to read ID Theft: What's It All About? and Take Charge: Fighting Back against Identity Theft. They can use the affidavit when disputing fraudulent accounts with the nationwide credit reporting companies or a business that extended credit to a suspect using the victim's name. Many companies and all three credit reporting companies accept the affidavit.

Order publications and the affidavit from [email protected]. The publications also are available on CD-ROM; agencies can print them with their own logo.

Download the materials on the FTC's Web site in English or Spanish.

Encourage victims to file identity theft complaints with the FTC online at (www.consumer.gov/idtheft). Victims who don't have Internet access can call the FTC's toll-free ID theft hotline at 877-ID THEFT (TTY: 866-653-4261). It's open Monday to Friday, 9:00 a.m. to 8:00 p.m., Eastern Time.

Partnerships Are Practical

Since 1999 the FTC has developed and managed the nation's central repository of victim complaint data on identity theft. The Identity Theft Data Clearinghouse is part of the FTC's Consumer Sentinel system. It contains more than 700,000 identity theft complaints. In addition to the victim-reported complaints, the clearinghouse contains complaint data entered by police officers and representatives of state and federal agencies. Because it is the central source for identity theft complaints, the clearinghouse can facilitate cross-jurisdictional investigations and enable law enforcers across the country to spot trends and share critical information. For example, users can tag complaints with an alert to flag a particular suspect or address. If other clearinghouse users retrieve that complaint, they will know that a fellow officer may have more information about the tagged item and they will have that officer's contact information. The clearinghouse also allows users to review a group of complaints and spot trends or patterns that would not be apparent from one individual complaint.

The clearinghouse database has a custom search feature. For example, police working a case may have a cluster of suspect addresses. The FTC's identity theft investigator can search the clearinghouse to find additional information associated with those addresses. Or, in the course of an investigation, officers may discover a cache of social security numbers in a suspect's possession. The FTC can search the clearinghouse to see if it contains victim complaints associated with these numbers. If so, the FTC may be able to provide law enforcers with additional information. For help with a hot search, send an e-mail message.

The FTC also has worked with the International Association of Chiefs of Police and other law enforcement organizations to offer regional one-day seminars across the nation to give law enforcement managers information and tools to help generate successful identity theft investigations. These workshops bring together police officers, prosecutors, representatives of state departments of motor vehicles, and industry fraud investigators to answer common questions: What information do I need to obtain from the victim? Whom should I contact for specific information? What tools can I use to investigate and build a case? What's the best way to package a case for prosecution? More than 1,800 law enforcement officers have attended these seminars to date. This year, training will be offered in Atlanta, Georgia; Santa Fe, New Mexico; and Columbus, Ohio.

Reference no: EM131593987

Questions Cloud

Determine the set of vectors s forms a subspace : In Exercises, determine if the set of vectors S forms a subspace of the given vector space. Give reasons why S either is or is not a subspace.
Data on output and total variable costs : Question: You have collected the following data on output and total variable costs:
Explain the role that supply management plays : Explain the role that supply management plays in achieving sustainability goals in an organization - how they contribute to the success of an organization.
What should be your rate of return according to the capm : what should be your rate of return according to the CAPM?
What tools can i use to investigate and build a case : What tools can I use to investigate and build a case. What's the best way to package a case for prosecution
What role did the vision statement play in the success : Which of the two unsuccessful merger/acquisitions you reviewed held the most risk of not working from the onset? Why? Give examples.
Impact of technological change on growth : 1. What is the impact of technological change on growth? What is meant by disembodied technological change?
What is the value of an orion bond : What is the value of an Orion bond that has a 6 percent coupon, pays interest semiannually, and has 11 years to maturity, if the required rate of return is 5 %.
Define s is the set of all polynomials of degree two : In Exercises, determine if the given set S is a subspace of the space C[0, 1] of all real valued functions that are continuous on the interval 0 = x = 1.

Reviews

Write a Review

Other Subject Questions & Answers

  Brief discussion of the students future profession and how

in addition to the powerpoint presentation students must write a two-page reflection paper. the reflection should

  Produces a particular product in an assembly line operation

The Dynaco Manufacturing Company produces a particular product in an assembly line operation. One of the machines on the line is a drill press that has a single assembly line feeding into it. A partially completed unit arrives at the press to be work..

  What is contingency fund

Budget changes are going to occur on every project, no matter how good your estimates. To cover these unexpected costs, you will build a contingency fund into every project budget. What is contingency fund?

  What do you think about security at schools

What do you think about security at schools? Pick one - elementary, junior high, high school, university - and discuss your recommendations on what security measures should be implemented.

  Communications to stakeholders are necessary

Communications to stakeholders are necessary for which of the following reasons? Answer to help them make good decisions to keep them at arms length so progress can continue to shift the burden of risk from the project team to the stakeholders to pro..

  Describe the nature and history of american criminal law

Describe the nature and history of American criminal law.Explain the role of individuals and federal, state, and local government agencies in crime fighting and prosecution of criminal offenses.Analyze the essential legal elements of criminal condu..

  What is so special about the nile

What is so special about the Nile? How would you explain the amazing success and stability of Nile civilizations? What similarities and differences do you see between the societies of the Nile and the societies of Mesopotamia we studied in Chapter 2?..

  Describe the theory and your rationale for selecting theory

Identify a theory that can be used to support your proposed solution.Write a summary (250-500 words) in which you:Describe the theory and your rationale for selecting the theory.Discuss how the theory works to support your proposed solution.Explain h..

  Relationship between client and human services worker

Summarize the idea behind a reciprocal relationship between client and human services worker and why this is important in the interview process

  The main purpose of this assignment is to broaden your

the purpose of this assignment is to broaden your understanding of how visuals and graphics can enhance textual

  Describes an s stakeholder management devices

Organizations can also use a strategy particularly for the management of internal stakeholders of which Morris (1997) describes an s Stakeholder Management Devices. These are in effect mechanisms through management can respond to the concerns of..

  Between 20th century culture and the art of the 20th century

What relationships are evident between 20th century culture and the art of the 20th century? which 20th century artist do you think best represented social and cultural trends of that time period in his or her work?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd