147
BCCO PCT #4 PowerPoint BCCO PCT #4 PowerPoint AND IDENTITY CRIMES IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Embed Size (px)

Citation preview

Page 1: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

BCCO PCT #4 PowerPointBCCO PCT #4 PowerPoint

AND

IDENTITY CRIMESIDENTITY CRIMESTCOLE Course #3277

UNIT 1 - 5

Page 2: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

ADMINISTRATIVEADMINISTRATIVE

• Please complete the BCCO PCT #4 Registration form and turn it in now.

• Make sure you sign TCOLE Report of Training (PID#, Full Name and DOB).

• All cell phones off please – pay attention to course materials and show common respect & courtesy.

Page 3: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Your Instructor – Course Facilitator Your Instructor – Course Facilitator and Mentor Trainerand Mentor Trainer

04/19/23 3

Deputy Chief George D. Little

A.S. & B.S. Criminal Justice & SociologyB.S.CJ Wayland Baptist University, San Antonio

M.S. Criminology & Counter-Terrorism University of the State of New York(P)

2012 T.C.O.L.E. Professional Achievement AwardCertified Crime Prevention Specialist (C.C.P.S.)

TCOLE Basic Instructor Certificate 1984TCOLE Advanced Instructor 2012TCOLE Master Peace Officer 1991

MP Special Operations Operator Counter-Terrorism 1988Military Police Investigations (MPI) & Criminal Investigation Division

(CID) Special AgentGraduate Drug Enforcement Administration Academy 1977

43- years Law Enforcement Experience 43- years Law Enforcement Experience 39-Years Teaching & Instructor Experience39-Years Teaching & Instructor Experience

Page 4: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

COURSE/LESSON COURSE/LESSON OVERVIEWOVERVIEW

Educational requirements for Educational requirements for identity crimes training identity crimes training

established by legislative established by legislative mandate: SB473-(78Reg).mandate: SB473-(78Reg).

Page 5: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

UNIT ONEUNIT ONE

Page 6: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Learning ObjectivesLearning Objectives

Learning Objective 1.0Learning Objective 1.0: The Participant will be able to recognize the types of identity crimes.

Learning Objective 1.1Learning Objective 1.1: The Participant will be able to provide a definition of identity crime.

Learning Objective 1.2Learning Objective 1.2: The Participant will be able to identify types of crimes associated with identity crimes.

Page 7: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Learning Objective 1.3 Learning Objective 1.3 : The Participant will be able to list personal and financial identifiers.

Learning Objective 1.4 Learning Objective 1.4 : The Participant will be able to identify currents trends associated with identity crimes.

Learning ObjectivesLearning Objectives

Page 8: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

1.0 Defining Identity Crimes1.0 Defining Identity Crimes

Page 9: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

1.1 Participant will be able to 1.1 Participant will be able to recognize the types of identity recognize the types of identity

crimecrimeAccording to the Federal Trade Commission (FTC):

•31,000 persons were victims of identity crime in 2000.

•During the first seven months of 2003, 131,000 Americans were victimized

Page 10: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

• If trends continue, by the end of 2003, those victimized will have increased almost 700% in three years.

• Texas is fifthfifth in the nation in the number of instances of identity crime reported to the FTC.

Page 11: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

2013 Statistics2013 StatisticsTotal financial loss attributed to identity theft $24,700,000,000

Misuse of Existing Credit Card 64.1% 64.1%

Misuse of Existing Bank Account 35%35%

Misuse of Personal Information 14.2%14.2%

Page 12: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Identity Fraud & Incident Identity Fraud & Incident RateRate

2011 4.9%2010 4.35%2009 6%2008 5.44%2007 4.51%2006 4.71%2005 5.04%

Page 13: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

1.11.1The student will be able to The student will be able to provide a definition of provide a definition of

identity crimeidentity crime

A.A. IdentityIdentity crimecrime is the thefttheft or misuse of personal or financial identifiers in order to gain something of value and/or facilitate other criminal activity.

 

Page 14: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

B.B. Types of identity crimes include;

1. identity thefttheft,

2. creditcredit cardcard/access device fraud (“skimming”),

3. checkcheck fraud,

4. bankbank fraud,

5. false identificationidentification fraud, and

6. passportpassport/visa fraud.

1.11.1 The student will be able to provide The student will be able to provide a definition of identity crime – Cont’da definition of identity crime – Cont’d

Page 15: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

1.21.2The student will be able to The student will be able to identify types of crimes identify types of crimes associated with identity associated with identity

crimescrimesIn many instances an identity crime is used as a facilitatorfacilitator, through financing or anonymity, to commit other criminal activities such as mail theft, mail fraud, narcotics/drugs, organized crime, financial fraud (money laundering), mortgage fraud, weapons trafficking

Page 16: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

homicide, terrorism, wire fraud, or computer crime/Internet intrusions.

 

Identity crimes can begin with other seemingly unrelated crimescrimes such as robbery (e.g. purse snatching or mugging), computer intrusion, mail theft, theft of trash (“dumpster diving”), or theft of documents or information from businesses, medical facilities, hotels, etc.

Page 17: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

1.3 The student will be able to 1.3 The student will be able to list personal and financial list personal and financial

identifiersidentifiersPersonal identifiers includePersonal identifiers include:

1.1.namename, ,

2.2.date of date of birthbirth, ,

3.3.socialsocial securitysecurity number, number,

4.4.addressaddress, ,

Page 18: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Personal identifiers include – Cont’d:

5.5.phonephone number, number,

6.6.driver’sdriver’s licenselicense number, number,

7.7.passportpassport number, number,

8.8.mother’s mother’s maidenmaiden name, etc. name, etc.

1.3 The student will be able to 1.3 The student will be able to list personal and financial list personal and financial

identifiers – Cont’didentifiers – Cont’d

Page 19: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5
Page 20: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Financial identifiers includeFinancial identifiers include:

1.1.creditcredit cardcard numbers, numbers,

2.2.bankbank accountaccount numbers,numbers,

3.3.personal identification numbers personal identification numbers (“PINs”), (“PINs”),

4.4.insuranceinsurance account numbers, etc. account numbers, etc. 

1.3 The student will be able to 1.3 The student will be able to list personal and financial list personal and financial

identifiers – Cont’didentifiers – Cont’d

Page 21: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

1.1.4 The student will be able 1.1.4 The student will be able to identify currents trends to identify currents trends

associated with identity associated with identity crimescrimes

Some of the current trends associated with identity theft involve the usage of current technologiestechnologies. This provides a unique challenge for consumers and law enforcement by testing their ability to keep up with technological advances and changes.

Page 22: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Some of the more recent scams involve stealing information by;

1.listening in on conversations made on cellularcellular phonesphones,

2.surreptitiously reading other people’s faxesfaxes and e-mailse-mails,

1.1.4 The student will be able to 1.1.4 The student will be able to identify currents trends identify currents trends

associated with identity crimesassociated with identity crimes

Page 23: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5
Page 24: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Some of the more recent scams involve stealing information by;

3.3.hackinghacking into computers,

4.conducting telephonetelephone and e-mail scams, and

5.taking advantage of careless consumers’ online shoppingshopping and bankingbanking.

1.1.4 The student will be able to 1.1.4 The student will be able to identify currents trends associated identify currents trends associated

with identity crimes – Cont’dwith identity crimes – Cont’d

Page 25: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

HACKER

Page 26: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Currently, the Identity Theft Resource Center, www.idtheftcenter.org, is an excellent website for obtaining information on new trends, scams and consumer alerts on identity crimes.

1.1.4 The student will be able to 1.1.4 The student will be able to identify currents trends identify currents trends

associated with identity crimesassociated with identity crimes

Page 27: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Questions?

Page 28: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

2828

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 1.0:Define 1.0: Explain some current identity crime statistics

Page 29: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

2929

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 1.1:Define 1.1: Explain and define identity crimes

Page 30: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

3030

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 1.2:Define 1.2: Explain some types of crime identified with identity crimes.

Page 31: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

3131

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 1.3:Define 1.3: Explain some personal and financial identifiers associated with identity crime

Page 32: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

3232

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 1.4:Define 1.4: Explain current trends associated with identity crimes.

Page 33: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

TAKE A 10-MINUTE BREAK

Page 34: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

UNIT TWOHow identity crime occur How identity crime occur

Page 35: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Learning ObjectivesLearning Objectives

Learning Objective 2.0Learning Objective 2.0: The Participant will be able to recognize how identity crime occurs.

Learning Objective 2.1Learning Objective 2.1: The Participant will be able to identify how identity crime is commonly perpetrated.

Learning Objective 2.2Learning Objective 2.2: The Participant will be able to identify techniques used to procure false identification.

Page 36: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

2.1. How identity crime 2.1. How identity crime is commonly perpetratedis commonly perpetratedA.A. Identity crimes can occur if someone steals your wallet, purse, briefcase, etc., containing your

1.1.identificationidentification,

2.2.socialsocial securitysecurity card,

3.3.creditcredit cards,

4.4.bankcardsbankcards or checkbookcheckbook.

Page 37: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5
Page 38: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

B. B. Identity crimes can occur if someone steals your

1.1.mailmail, 2.especially your bank and credit card statementsstatements,

3.pre-approved credit credit offers,

4.new checkschecks, or

5.5.taxtax information.

2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d

Page 39: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5
Page 40: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

C. C. Identity thieves can complete a “changechange of addressaddress form” to divert your mail to another location.

D. D. Identity thieves may rummage through your trash or the trash of businesses to find personal data (also known as “dumpsterdumpster diving”).

2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d

Page 41: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

E. E. Identity thieves may fraudulently obtain your credit report by posing as a landlordlandlord, employeremployer, or someone else who may have a legitimate need for (and legal right to) the information.

F. F. Identity thieves can find personalpersonal information in your home.

2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d

Page 42: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

G. G. Identity thieves may obtain personal information that you share on the InternetInternet.

 

2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d

Page 43: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

H. H. Identity thieves can get information from the workplace, in a practice known as “businessbusiness recordrecord theft,” by stealing files out of offices where you are a customer, employee, patient or student, by bribing an employee who has access to your files, or by “hacking” into electronic files.

2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d

Page 44: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5
Page 45: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

I. I. Some identity thieves also engage in “shouldershoulder surfingsurfing”: looking over your shoulder or from a nearby location as you enter your Personal Identification Number (PIN) at an ATM machine.

2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d

Page 46: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5
Page 47: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

I. (Cont’d): I. (Cont’d): This practice has gone high-tech, with some thieves utilizing hidden “spyspy camerascameras” positioned near ATMs to observe or record people as they enter their PINs.

2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d

Page 48: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

J. J. Many criminals who want to obtain personal data from people online use a technique known as “spoofingspoofing”: the creation of e-mails and websites that appear to belong to legitimate businesses such as established retail companies, financial institutions, and online auctions sites.

2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d

Page 49: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5
Page 50: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

J. (Cont’d) J. (Cont’d) Consumers receive e-mails from thieves claiming to be legitimate businesses, and are directed to websiteswebsites that appear to be run by those businesses. The consumers are then directed to enter large amounts of personal data.

2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d

Page 51: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5
Page 52: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

J. (Cont’d): J. (Cont’d): The thieves sending the e-mails or running the websites

actually have actually have nono connection with connection with those businessesthose businesses, and their sole purpose is to obtain the consumers’ personal data so that they can engage in various fraud schemes.

2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d

Page 53: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

2.2 Techniques used to 2.2 Techniques used to procure false procure false identificationidentification

A wide variety of sources, including bookstoresbookstores and InternetInternet retailers, provide publications that give criminals step-by-step step-by-step instructions on techniques for instructions on techniques for producing false documentsproducing false documents.

Page 54: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5
Page 55: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Some of the resources that are available to criminals who want to create false documents.

Examples:

•www.paladin-press.com

•Gun shows

•The Modern Identity Changer by Sheldon Charrett, ISBN 0-87364-946-X #IDENTITY

2.2 Techniques used to procure 2.2 Techniques used to procure false identificationfalse identification

Page 56: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Questions?

Page 57: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

5757

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 2.0:Define 2.0: Explain how identity crimes occur

Page 58: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

5858

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 2.1:Define 2.1: Explain how identity crime is commonly perpetrated

Page 59: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

5959

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 2.2:Define 2.2: Explain Techniques used to procure false identification.

Page 60: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

TAKE A 10-MINUTE BREAK

Page 61: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

UNIT THREELAWS

Page 62: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Learning ObjectivesLearning Objectives

Learning Objective 3.0Learning Objective 3.0: The Participant will be able to recognize the legal aspects of identity crimes.

Learning Objective 3.1Learning Objective 3.1: The Participant will be able to identify the federal statutes dealing with identity crimes.

Learning Objective 3.2Learning Objective 3.2: The Participant will be able to identify the state statutes dealing with identity crimes.

Page 63: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Learning Objective 3.3 Learning Objective 3.3 : The Participant will be able to define the term “security alert,” according to the Business Code.

Learning Objective 3.4 Learning Objective 3.4 : The Participant will be able to define “security freeze,” according to the Business Code.  

Learning ObjectivesLearning Objectives

Page 64: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

3.0 3.0 Laws and Statutes Laws and Statutes Governing Identity Crimes Governing Identity Crimes

FEDERAL LAW STATE LAW

Page 65: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

3.1 Federal Statutes dealing 3.1 Federal Statutes dealing with Identity Crimewith Identity Crime

Federal lawFederal law: 18 U.S.C. § 1028 18 U.S.C. § 1028 – Identity Theft and Assumption Deterrence Act

Page 66: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

3.2 state statutes dealing 3.2 state statutes dealing with identity crimeswith identity crimes

State Law: PenalPenal CodeCode 32.5132.51 – Fraudulent Use or Possession of Fraudulent Use or Possession of Identifying Information Identifying Information (State Jail Felony)

Page 67: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Business and Commerce Business and Commerce Code, Chapter 20 Code, Chapter 20 - Regulation of Consumer Credit Reporting

3.2 state statutes dealing 3.2 state statutes dealing with identity crimeswith identity crimes

Page 68: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Code of Criminal Procedure, Code of Criminal Procedure, Article 55.02, Sec.2a Article 55.02, Sec.2a – Procedure for Expunction

Page 69: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

3.3 Define the term “security 3.3 Define the term “security alert,” according to the Tx-BC.alert,” according to the Tx-BC.

SecuritySecurity AlertAlert – means a notice placed on a consumer file that alerts a recipient of a consumer report involving that consumer file that the consumer’s identity may have been used without the consumer’s consent to fraudulently obtain goods or services in the consumer’s name.

Page 70: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

3.4 Define “security 3.4 Define “security freeze,” according to the freeze,” according to the

Business CodeBusiness Code

SecuritySecurity FreezeFreeze – means a notice placed on a consumer file that prohibits a consumer reporting agency from releasing a consumer report relating to the extension of credit involving that consumer file without the express authorization of the consumer.

Page 71: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Questions?

Page 72: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

7272

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 3.0:Define 3.0: Explain the legal aspects of identity crimes.

Page 73: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

7373

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 3.1:Define 3.1: Explain the federal statute dealing with identity crimes

Page 74: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

7474

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 3.2:Define 3.2: Explain Texas Laws and statutes dealing with identity crimes

Page 75: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

7575

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 3.3:Define 3.3: Explain and define the term security alert according to the Business Code.

Page 76: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

7676

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 3.4:Define 3.4: Explain and define the term security freeze according to the Business Code.

Page 77: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

TAKE A 10-MINUTE BREAK

Page 78: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

UNIT FOURIdentity Theft Crime Identity Theft Crime

Report Report

Page 79: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Learning ObjectivesLearning Objectives

Learning Objective 4.0Learning Objective 4.0: The Participant will be able to request information needed for an ID crime offense report.

Learning Objective 4.1Learning Objective 4.1: The Participant will be able to list information needed for an ID crime offense report.

Learning Objective 4.2Learning Objective 4.2: The Participant will be able to identify the governmental and business entities that are notified in identity crimes.

Page 80: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

4.0 Prosecuting Identity 4.0 Prosecuting Identity CrimesCrimes

Page 81: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

4.1 Request information 4.1 Request information needed for an ID crime needed for an ID crime

offense report.offense report.

How to request information needed for an ID crime offense report.

Page 82: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

4.1 List information needed 4.1 List information needed for an ID crime offense report.for an ID crime offense report.

Taking a writtenwritten reportreport is vital to the victim(s) because credit because credit bureaus require a police report bureaus require a police report in order to block fraudulent in order to block fraudulent information information and to begin repairing the victim’s credit reports.

Page 83: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

In addition, manymany financial financial institutions require a police institutions require a police report with an affidavit of fraudreport with an affidavit of fraud.

Refer to your “Identity Crime Incident Detail Form” (Appendix A).

4.1 List information needed 4.1 List information needed for an ID crime offense report for an ID crime offense report

– Cont’d.– Cont’d.

Page 84: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Have the (class participants as a crime victim) fill out an identity crime incident form crime incident form (Appendix A).

4.1 Practical Exercise 4.1 Practical Exercise

Page 85: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

This document provides the officer - investigator with detailed information to: Understand the type of incident that occurred,

Organize the investigativeinvestigative case,

Determine where evidenceevidence might be found,

4.1 List information needed for an ID 4.1 List information needed for an ID

crime offense reportcrime offense report..

Page 86: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

This document provides the officer/investigator with detailed information to – Cont’d:

Develop a theorytheory of how the identity theft occurred, and

Determine what financial financial institutions should be contacted in the course of the investigation.

4.1 List information needed for an ID 4.1 List information needed for an ID

crime offense reportcrime offense report..

Page 87: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Ask the victim to begin gathering documentation (bank and credit card bank and credit card statements, letters from creditors, statements, letters from creditors, merchant account statementsmerchant account statements, etc.)

4.1 List information needed for an ID 4.1 List information needed for an ID

crime offense reportcrime offense report..

Page 88: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Ask the victim to obtain credit reports from the three major Credit Bureaus

•EquifaxEquifax,

•ExperianExperian, and

•Trans UnionTrans Union and voluntarily give them to you.

4.1 List information needed for an ID 4.1 List information needed for an ID

crime offense reportcrime offense report..

Page 89: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

If not given voluntarilyvoluntarily by the victim, a subpoena is needed from the courts to obtain victim credit histories.

4.1 List information needed for an ID 4.1 List information needed for an ID

crime offense reportcrime offense report..

Page 90: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

4.2 Governmental and 4.2 Governmental and business entities that are business entities that are notified in identity crimes.notified in identity crimes.

A.A. FFederal BBureau of IInvestigation – Notify if an identity crime is used to commit a bank fraud, governmental fraud or in furtherance of an investmentinvestment scheme, insuranceinsurance fraud, etc. involving losses over one hundred thousand dollars ($100,000).

Page 91: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

B.B. U. S. SecretSecret ServiceService – Notify if there is any custody arrest of individuals associated with identity crime or identity takeovertakeover. This would involve the seizure or recovery of any amount of identity crime devices, equipment, or products such as skimmers (small electronic devices

4.2 Governmental and business 4.2 Governmental and business entities that are notified in entities that are notified in

identity crimes – Cont’didentity crimes – Cont’d

Page 92: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5
Page 93: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

B.B. U. S. Secret Service – Cont’d: that can gather information, such as your name, address, credit limit, and PIN from your credit card); counterfeit identification documents; counterfeit credit cards; or lists of personal identifiers (e.g., names, social security numbers, dates of birth, bank account numbers, and credit card numbers).

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 94: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

B.B. U. S. Secret Service – Cont’d: that can gather information, such as your name, address, credit limit, and PIN from your credit card); counterfeit identification documents; counterfeit credit cards; or lists of personal identifiers (e.g., names, social security numbers, dates of birth, bank account numbers, and credit card numbers).

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 95: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5
Page 96: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

C.C. U. S. Postal Service – Notify if an individual is taken into custody for committing a financial crime involving the U.S. mail. Postal inspectors will respond to violations relating to identity crime, forgery, credit cards and checks, mail theft, mail fraud, and Internet fraud (when the scheme involves use of the U.S. mail).

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 97: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

D. Social Security Administration – Notify if the misuse of a social security number involved social security program fraud, or if there is either a significant financial loss to an individual or institution, or a significant number of counterfeit social security cards are seized.

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 98: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

E.E. Federal Trade Commission – Have identity crime victims file a report with the Federal Trade Commission (Appendix B).

Encourage them to use the FTC website (www.consumer.gov/idtheft

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 99: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

E.E. Federal Trade Commission – Cont’d:Cont’d: At the website, victims can file an online complaint and obtain helpful information such as a victim’s guide (”When Bad Things Happen to Your Good Name”) and the FTC Sample Affidavit. The FTC also has a hotline: 1-877-IDTHEFT (1-877-438-4338).

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 100: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

F. F. Texas Department of Public Safety - This agency is responsible for the issuance of state driver’s licenses and identification cards. It is also responsible for the storage and expunction of criminal records. Contact the Texas Department of Public Safety at 512-424-2000512-424-2000 and online (www.txdps.state.tx.us/contact.htm).(www.txdps.state.tx.us/contact.htm).

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 101: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Other state and local agencies may provide additional assistance with investigating identity crimes.

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 102: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

G. Consumer Credit Reporting Agencies – Tell victims to have a “fraudfraud alertalert” placed on their credit reports. The fraud alert will show up on their credit report when companies make inquiries about their credit and may stop additional fraudstop additional fraud. The three major credit-reporting agencies are:

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 103: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

G. Consumer Credit Reporting Agencies – Cont’d:

EXPERIAN 1-888-397-3742

www.experian.com

TRANS UNION 1-800-680-7289

www.transunion.com

EQUIFAX 1-800-525-6285

www.equifax.com

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 104: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

H.H. Financial Institutions (e.g., banks, credit card companies, financial advisors) – Advise the victims to contact their financial institutions to report any suspicionssuspicions of identity crime.

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 105: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

H.H. – Cont’d:

The financial institution can check to see if there has been any unusual activity. Victims should establish passwordspasswords for their accounts.

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 106: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

I.I. UtilityUtility Companies (e.g., power, water, phone, and cable companies, etc.) – Victims may want to contact their utility companies to report instances of possible identity crime.

The utility companies can check for any unusual account activityunusual account activity.

4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d

Page 107: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Questions?

Page 108: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

108108

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 4.0:Define 4.0: Explain how to request information needed for an ID Crime Offense Report

Page 109: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

109109

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 4.1:Define 4.1: Explain (list) information needed for a Crime Offense Report.

Page 110: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

110110

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 4.2:Define 4.2: Explain what government and business entities that are required to be notified in Identity Crimes.

Page 111: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

TAKE A 10-MINUTE BREAK

Page 112: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

UNIT FIVEUNIT FIVE

Page 113: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Learning ObjectivesLearning Objectives

Learning Objective 5.0Learning Objective 5.0: The Participant will be able to recognize techniques for educating victims and the public on identity crime.

Learning Objective 5.1Learning Objective 5.1: The Participant will be able to identify techniques for educating victims and the public on identity crime.

Page 114: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Learning Objective 5.2Learning Objective 5.2: The Participant will be able to list guidelines for personal protection against identity crime.

Learning Objective 5.3 Learning Objective 5.3 : The Participant will be able to list the steps to take if identity crime occurs.

Learning ObjectivesLearning Objectives

Page 115: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

5.0 Identity Crimes 5.0 Identity Crimes PreventionPrevention

Techniques for Techniques for

educating educating victims and the victims and the

public on public on identity crime.identity crime.

Page 116: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

5.1 Techniques for 5.1 Techniques for educating victims and the educating victims and the public on identity crime. public on identity crime.

Law enforcement agencies should be proactiveproactive in their approach to educating the public about identity crime. Current techniques used to educate the public about other crimes can be used to facilitate information on identity crime.

Page 117: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Some of these techniques may include public service announcements (PSAs), communitycommunity policingpolicing involvement, etc. Law enforcement agencies can make use of the vast amount of information already available on the Internet to guide the public and victims of identity crime.

5.1 Techniques for educating victims 5.1 Techniques for educating victims and the public on identity crime. and the public on identity crime.

Page 118: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

5.2 Guidelines for Personal 5.2 Guidelines for Personal Protection against identify Protection against identify

crime crime

Emphasize the fact that the more a person becomes awareaware about his/her financial records the better prepared he/she will be if they become a victim of identity crime.

Page 119: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Inform the public that they should:

1. Not give out personal informationinformation over the phone or on the Internet - this includes their social security number, driver’s license number, date of birth, place of birth, home address, mother’s maiden name, and any passwords.

5.2 Guidelines for Personal Protection 5.2 Guidelines for Personal Protection against identify crime – Cont’d against identify crime – Cont’d

Page 120: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Inform the public that they should:

2.Limit the amount of personal information on their checkschecks - it is recommended that you do not put do not put your driver’s license, identification your driver’s license, identification card or social security number on card or social security number on your checksyour checks

5.2 Guidelines for Personal Protection 5.2 Guidelines for Personal Protection against identify crime – Cont’d against identify crime – Cont’d

Page 121: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Inform the public that they should:

3.Check creditcredit histories and bank records frequently and look for signs of inaccurate or suspicious activity

4.Keep detailed records of bankingbanking, check writing, credit card use, and ATM use

5.2 Guidelines for Personal Protection 5.2 Guidelines for Personal Protection against identify crime – Cont’d against identify crime – Cont’d

Page 122: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Inform the public that they should:

5.Destroy carboncarbon copiescopies of credit card receipts

6.Purchase a home shreddershredder or completely destroy any item that may have personal identifiers rather than discarding them in the trash

5.2 Guidelines for Personal Protection 5.2 Guidelines for Personal Protection against identify crime – Cont’d against identify crime – Cont’d

Page 123: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5
Page 124: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Note: Note: Some insurance companies offer optional coverage to their policyholders to assist them with certain expenses incurred if they become victims of identity crime.

5.2 Guidelines for Personal Protection 5.2 Guidelines for Personal Protection against identify crime – Cont’d against identify crime – Cont’d

Page 125: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5
Page 126: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Monitoring Scanning Responding Guarantee Tracking

Page 127: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

5.3 Steps to take if Identity 5.3 Steps to take if Identity Crime occursCrime occurs

Refer to participant handout “ID Theft Affidavit” (Appendix B). The forms provide victims with detailed instructions on completion and submission of the affidavit.

The affidavit should be sent to the companies or businesses where the fraud fraud was perpetrated.

Page 128: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

5.3 5-STEPS 5.3 5-STEPS

1. Notify the police – Make a reportreport. Get the names of the officers you contact and the police report number for your records.

Be specificspecific as to which kind of identity crime happened, such as bad checks, credit card abuse, or the misuse of your name, driver’s license, or identification card.

Page 129: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

2. Notify creditorscreditors and merchants – Cancel credit cards and Cancel credit cards and close your accountsclose your accounts. Contact the creditors and merchants that are affected.

Get the names of any employees employees you have contact withyou have contact with, and ask for a reference number on each item that you are disputing

5.3 5-STEPS - Cont’d 5.3 5-STEPS - Cont’d

Page 130: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

3. Notify your banks and financial institutions – Change affected Change affected bank accountsbank accounts. Advise the banks of the situation and find out what is required to clear anything that affects your banking services. This could relate to checks, ATM cards, debit cards, etc.

5.3 5-STEPS - Cont’d 5.3 5-STEPS - Cont’d

Page 131: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

4. Check your credit – Notify the major creditcredit reporting agencies as well as local credit reporting companies, and advise them of your situation. You may be able to request that a blockblock be put on any attempt to gain credit under your name and your date of birth without your confirmation.

5.3 5-STEPS - Cont’d 5.3 5-STEPS - Cont’d

Page 132: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

5. Check with the Social Security Administration – Make sure that earned income benefits earned income benefits are accurate.

5.3 5-STEPS - Cont’d 5.3 5-STEPS - Cont’d

Check to see if there is any Check to see if there is any action on your social security action on your social security number that should not be number that should not be therethere.

Page 133: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

5. Cont’d: Get as much information as you can, and follow through with what is requested of you.

5.3 5-STEPS - Cont’d 5.3 5-STEPS - Cont’d

Page 134: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Questions?

Page 135: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

135135

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 5.1:Define 5.1: Explain techniques for educating victims and public on identity crime.

Page 136: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

136136

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 5.2:Define 5.2: Explain some guidelines for personal protection against identity crime.

Page 137: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

137137

DEFINE & PROCESSDEFINE & PROCESS

Process:Process:

Define 5.3:Define 5.3: Explain the steps to take if identity crime occurs.

Page 138: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Questions?

Page 139: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

SOURCESSOURCES

All Course Sources and/or

Resources are listed in

your Participant Handout

IDENTITY CRIMES TCOLE Course # 3277TCOLE Course # 3277

Page 140: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

““Knowledge isKnowledge is““POWERPOWER” Stay ” Stay informed, stay informed, stay

SAFE, stay SAFE, stay Vigilant & stay Vigilant & stay

Alive” Alive”

Page 141: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

UPCOMING TRAININGUPCOMING TRAININGCurrent TRAINING Schedule of Courses offered by

Bexar County Constable’s Office Bexar County Constable’s Office PCT#4PCT#4

Racial Profiling Course – TCOLE Course #3256 (8-hrs) 8-hrs on Saturday October 4th, 2014 from 10:30 am to 7:30 pm.

Racial Profiling Course – TCOLE Course #3256 (8-hrs) on Friday October 10, 2014 from 8:00 am to 5:00 pm 141

Bexar County Constable’s Office PCT#4 Bexar County Constable’s Office PCT#4TRAINING SCHEDULE TRAINING SCHEDULE

2014 2014

Page 142: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

Current TRAINING Schedule of Courses offered by Bexar County Constable’s Office PCT#4Eye Witness Evidence Course – TCOLE Course # 3286 (4-hrs) Saturday October 11, 2014 from 10:30 am to 2:30 pm

Eye Witness Evidence Course – TCOLE Course # 3286 (4-hrs) Sunday October 12th, 2014 from 11:00 am to 3:00 pm.

Eye Witness Evidence Course – TCOLE Course # 3286 (4-hrs) Friday October 17th, 2014 from 1:00 pm to 5:00 pm.

Page 143: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

143

Advanced TCOLE Instructor Course – TCOLE #1017 (40hrs), Day One Saturday November 1st ,2014 from 11:00 am to 6:00 pm (Deputy Chief George D. Little and Deputy Constable Roland Berg)

Advanced TCOLE Instructor Course – TCOLE #1017, Day Day TwoTwo Sunday November 2nd ,2014 from 11:00 am to 6:00 pm (Deputy Chief George D. Little and Deputy Constable Roland Berg)

Advanced TCOLE Instructor Course – TCOLE #1017, Day Day ThreeThree Friday November 7th ,2014 from 9:00 am to 6:00 pm (Deputy Chief George D. Little and Deputy Constable Roland Berg ) Lesson Presentation preparation time. Instructors available

Advanced TCOLE Instructor Course – TCOLE #1017, Day Day FourFour Saturday November 8th,2014 from 11:00 am to 6:00 pm (Deputy Chief George D. Little and Deputy Constable Roland Berg)

Page 144: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

144

Advanced TCOLE Instructor Course – TCOLE #1017, Day Day FiveFive & Grad Sunday November 9th, 2014 from 11:00 am to 6:00 pm – Presentations, Final Test & Graduation (Deputy Chief G. D. Little and Dep. Constable R. Berg )

HIV-AIDS & Viral Hepatitis in Criminal Justice Profession Course – TCOLE # 3804 (8-hrs) 8-hrs on Saturday November 15th, 2014 from 10:00 am to 6:00 pm.

HIV-AIDS & Viral Hepatitis in Criminal Justice Profession Course – TCOLE # 3804 (8-hrs) 4-hrs on Thursday December 4th, 2014 from 1:00 am to 5:00 pm

HIV-AIDS & Viral Hepatitis in Criminal Justice Profession Course – TCOLE # 3804 (8-hrs) 4-hrs on Friday December5th, 2014 from 1:00 am to 5:00 pm

KNOWLEDGE IS POWERKNOWLEDGE IS POWER

Page 145: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

TAKE A 15-MINUTE BREAK

Page 146: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

• Please complete a course and instructor evaluation form.

• If you rate 2 or below you must justify on reverse side.

•Constructive Criticism Constructive Criticism helps all, being negative helps no one.

COURSE & INSTRUCTOR COURSE & INSTRUCTOR EVALUATION FormEVALUATION Form

Page 147: BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5

• Exam

• Graduation

THANK YOU &THANK YOU & STAY SAFE STAY SAFE