Assess How To Investigate Identity Theft

Improved Essays
2. Assess how you would investigate identity theft. Unit 3. Having personal information on one’s identity stolen for fraudulent purposes, known as identity theft, is one of the fastest growing crimes in the United States. The criminals that conduct this type of crime are also the most difficult to apprehend and incarcerate because they usually never make personal contact with the victims. Everyday activities such as selling an old computer, filling the car up with gas, going out to eat, or simply taking out one’s trash can result in identity theft. For that reason, identity theft is easier to prevent than prosecute. The objectives of a criminal investigation on identity theft are gathering evidence, affecting an arrest of the criminal, collecting and presenting …show more content…
• Address (home and work) of the victim.
• Account numbers involved in the theft and names of primary and secondary account holders.
• When and how the identity theft was discovered, and under what circumstances the victim became aware of the identity theft.
• Exact location (addresses, business, persons involved) where the fraudulent use of identity occurred.
• Names of financial institutions the victim notified of the identity theft, along with the names, addresses, and phone numbers of customer service representative or investigators who accepted the report, the dates and times of the reports, a brief summary of the conversation, and copies of any email messages or faxes sent to or received from the financial institutions.
• Photocopies of any letters, account statements, and any other documents associated with the case.
• A chronological log of the theft and the victim’s actions since the discovery of the theft, to include information about the discovery, possible locations of the theft, and names or descriptions of persons around when the theft might have occurred (Dashido,

Related Documents

  • Improved Essays

    After crime reports are submitted by law enforcement officers, information regarding stolen vehicles, stolen firearms, missing and wanted persons, and stolen articles, such as laptops, televisions, and lawn equipment. The owner of the stolen items are required to provide the owner with the serial number, otherwise there is nothing that can be done to recover the stolen item. The only exception is jewelry, which must have some type of photo identification. Any information about the stolen item, such as serial numbers, colors, and estimated values, are entered into the database system. In addition, this information is hand written on index cards and placed in a designated filing cabinet.…

    • 1146 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    She also stated that the number to the P.O. box would be 384, which she remembered easily as it was her locker number in school. Please see the attached correspondence in Exhibit C. A subpoena was requested and granted for access to the bank account records from SunTrust. The results are seen in Exhibit D. The sum of the deposits on each date are $148.23.…

    • 1242 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Case Study: J. GORDON

    • 624 Words
    • 3 Pages

    On October 17, 2015, at approximately 200hours, I contacted with a subject/s reference to a burglary call. The subject/s later identify his self as John GORDON. J. GORDON said that he came out from work and found out that his house were broken into and ransacked. J. GORDON notice and told me that just some personal property were missing from his residence. J. GORDON TV and his wife’s diamond ring that where located on the bedroom dresser.…

    • 624 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The first year to have statistical data on identity theft was 2005 which showed that 6.4 million residents were victims of identity theft to some extent (Bureau of Justice Statistics (BJS) Data Collection,…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    FBI Uniform Crime Report

    • 293 Words
    • 2 Pages

    What kinds of data about white collar and occupational crime are available in the FBI’s Uniform Crime Report? White collar and occupational crime are “criminal offense committed through opportunities created in a legal business or occupation” (Cole, Smith, and Dejong, 2015, p. 2). The two most common forms are theft and fraud. Examples of white collar and occupational crimes include securities fraud, embezzlement, corporate fraud and money laundering (Barnett, n.d., p2).…

    • 293 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Identity Theft Schemes and Methods There are many different types of schemes and methods that identity…

    • 834 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    On March 18, 2017, at approximately (HOURS) I responded to 740 W Osceola Pkwy; Crosslands; Burlington in reference to a retail theft. Upon my arrival, I made contact with Charlie Camacho (complainant/ Loss Prevention) who advised me of the following via verbal and a sworn written statement: Charlie advised me at approximately 1400 hours, he was notified by a LP Greet of a retail theft that occurred on March 12, 2017 at approximately 1347 hours. Upon reviewing the video surveillance footage, Charlie observed two Hispanic males arriving on property in a Toyota Corolla. Both Hispanic males entered the Burlington and walked directly to the men’s shoe department.…

    • 330 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Crime Victim Assistance

    • 620 Words
    • 3 Pages

    The victim assistance programs aim at providing a crime victim with information and resources to assist in breaking through barriers. The crime victim assistance constitute of financial assistance whereby the crime victim can file a claim for expenses incurred and that are related to crime. Financial resources include the emergency funds that are made available for covering all emergency expenses that are related to crime. Crime victim assistance also constitutes of crime victim notification system whereby the crime victim is notified of the rights he or she is entitled to. These rights include the rights to participation, protection, and compensation among others.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    What is a social engineering attack? What is a phishing attack? How do you avoid being a victim? Social engineering attack is when a person uses their social skills to obtain information about the organization or computer system. A phishing attack use email/websites to get personal information to gain access to the organization.…

    • 287 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Identity Theft Essay

    • 1148 Words
    • 5 Pages

    What is identity theft? Under the Identity Theft and Assumption Deterrence Act (ITADA), identity theft is defined as the knowing transfer, possession, or usage of any name or number that identifies another person, with the intent of committing or aiding or abetting a crime. This kind of crime can generate substantial losses to consumers which include the opportunity costs of time spent disputing fraudulent claims, closing existing accounts, and opening new accounts. Still, these may be only part of the costs incurred by the victim (Barker et al.…

    • 1148 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Effects Of Identity Theft

    • 379 Words
    • 2 Pages

    To continue, another area of concern is your credit. Once you are an identity theft victim, you will have to worry about your credit report. If the thief is able to run up a significant credit card debt in your name and you don’t notice till years later it could demolish your credit score. We covered a story that showed this where a mother stole her daughters’ identity and left her finances and credit in crumbles. Most often than not the credit card bills will go unpaid and it will only lower your credit rating.…

    • 379 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Motor Vehicle Theft Crime

    • 1442 Words
    • 6 Pages

    Between 1993 to 2015, there has been a steady decline in property crime rates from a reported rate of 351.8 per 1,000 households to 110.7 per 1,000 households. (Truman & Morgan, 2016). This significant decline may have to deal with the implementation of different programs in an effort to stop property crime. Even though property crime rate is dropping, it is still costly to society as a whole, especially motor vehicle theft. Studying and understanding motor vehicle theft is essential in reducing the crime rate and calculating costs of the crime on society.…

    • 1442 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The impacts of the crime as discussed gives rise to financial losses, emotional distress as well as inconveniences that may be long term. Cases of identity theft are also complex and numerous. Technological advances pave the way for easier identity theft (Giles 2010). Online business, therefore, is the most affected aspect by identity theft. Perpetrators assume identities of business undertakings, corning unsuspecting consumer large amounts of cash.…

    • 1498 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Bicycle Theft Report

    • 727 Words
    • 3 Pages

    I will collect various forms of data, while mostly from university database, which could provide the true data of theft case on campus. The reason why I do not choose the official database is that bicycle thefts is not the same as other property crime. In the official database, bicycle theft is under the category of “other theft” (Loder & Bayly, 1986). It is hard for us to gain the accurate data of the crime. Besides this, few victim would report bike theft to the police because they think that the police would not find it and bike is not as expensive as a vehicle.…

    • 727 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Identity theft, therefore, encompasses several activities that include the collection of personal information, the creation of identity documents, and the process of fraudulent use of another person’s information for personal gain. Primarily, identity theft occurs when personal information of someone else is misappropriated and used to gain some advantage, mainly for financial gain through deception and fraud. The process involves the thief stealing personal information relating to the identity of an individual for such information as address, date of birth, name, social security number, driver, license number, health card number, mother’s maiden name, and then acting as the victim by effectively taking over his or her…

    • 1844 Words
    • 8 Pages
    Superior Essays