SlideShare une entreprise Scribd logo
1  sur  9
Tools for Assisting Victims: Consumer
Sentinel Network and the National
Crime Information Center
THIS DOCUMENT WAS PRODUCED BY IDAHO LEGAL AID SERVICES, INC. UNDER AWARD # 2010-VF-GX-K030,
AWARDED BY THE OFFICE FOR VICTIMS OF CRIME, OFFICE OF JUSTICE PROGRAMS, U.S. DEPARTMENT OF JUSTICE IN
CONJUNCTION WITH THE MARYLAND CRIME VICTIMS’ RESOURCE CENTER. THE OPINIONS, FINDINGS, AND
CONCLUSIONS OR RECOMMENDATIONS EXPRESSED IN THIS DOCUMENT ARE THOSE OF THE CONTRIBUTORS AND DO
NOT NECESSARILY REPRESENT THE OFFICIAL POSITION OR POLICIES OF THE U.S. DEPARTMENT OF JUSTICE OR
MARYLAND CRIME VICTIMS’ RESOURCE CENTER, INC.
 www.ftc.gov/sentinel
 Purpose: Share information amongst law
enforcement
 Law enforcement members can access
complaints provided to the FTC
 Access is free and available to any federal,
state, or local law enforcement agency.
 To access the Sentinel Network, the law
enforcement agency must become a member.
 Members can:
 Search millions of consumer complaints
 Report complaints so they can be shared with law
enforcement nationwide
 See trends in types of complaints filed, identify
crime trends
 Register.ConsumerSentinel.gov
 Idaho lacking participation by local law
enforcement agencies
 By enhancing investigations of identity theft crimes
 Law enforcement can:
 Get alerts about particular subjects or practices
 Find other law enforcement agencies investigating the same
targets
 Set up a search to run periodically
 Research cases
 Track targets
 Identify victims
 Law enforcement partners can use information in the
database to coordinate investigations.
 Greater likelihood of finding victims, prosecuting
cases, and obtaining restitution for victims
"The Consumer Sentinel Network is a treasure
trove of information for law enforcers. We plan
to contribute consumer complaints we receive
at the CFPB to the Network and urge other
state and local law enforcers to join the
Network, too.“ – Richard Cordray, Director of the
Consumer Financial Protection Bureau
http://www.youtube.com/watch?v=WcW0vngJ
ZEM
 An electronic clearinghouse of crime data
 Consists of 19 “files”
 Agencies enter records into NCIC that are
accessible nationwide.
 e.g., entering a vehicle into the file to see if it is a
stolen vehicle
 http://www.fbi.gov/about-us/cjis/ncic
 Can be extremely useful for victims of criminal
identity theft
 NCIC Identity Theft File “flags” stolen
identities
 Provides identifying information to recognize
imposters when they are encountered by law
enforcement.
 Contains records of both the ID theft victim
and any information known about the
perpetrator
 An NCIC Identity Theft File record is created
 It is available nationwide to police officers
 During a subsequent encounter with law
enforcement, a query into the NCIC system
automatically searches the Identity Theft File
 The officer will receive a response including the
victim profile and password.
 Can prevent arrests of criminal ID theft victims!
 Currently, the Identity Theft File consists of
approximately 2,600 records entered by 29 states.
Assist Victims Through Consumer Sentinel Network and NCIC

Contenu connexe

Tendances

Time to slow down? Measured respondes to the fake news crisis
Time to slow down? Measured respondes to the fake news crisisTime to slow down? Measured respondes to the fake news crisis
Time to slow down? Measured respondes to the fake news crisismrleiser
 
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...APNIC
 
Financial Services Insight NYSDFS Whistleblowing Guidance - Sia Partners
Financial Services Insight NYSDFS Whistleblowing Guidance - Sia PartnersFinancial Services Insight NYSDFS Whistleblowing Guidance - Sia Partners
Financial Services Insight NYSDFS Whistleblowing Guidance - Sia PartnersDaniel Connor
 
Privacy & The Smart Grid (Susanlyon Chtlj01292010)
Privacy & The Smart Grid (Susanlyon   Chtlj01292010)Privacy & The Smart Grid (Susanlyon   Chtlj01292010)
Privacy & The Smart Grid (Susanlyon Chtlj01292010)Susan Lyon-Hintze
 
LEO: Regional Information Sharing Systems (RISS) Program
LEO:  Regional Information Sharing Systems (RISS) ProgramLEO:  Regional Information Sharing Systems (RISS) Program
LEO: Regional Information Sharing Systems (RISS) ProgramDavid Sweigert
 
Medical Identity Theft Response Checklist for Consumers
Medical Identity Theft Response Checklist for ConsumersMedical Identity Theft Response Checklist for Consumers
Medical Identity Theft Response Checklist for Consumers- Mark - Fullbright
 
The long arm of the gdpr
The long arm of the gdprThe long arm of the gdpr
The long arm of the gdprMathew Chacko
 
Rvasec The Future of Govt Info Sharing
Rvasec The Future of Govt Info SharingRvasec The Future of Govt Info Sharing
Rvasec The Future of Govt Info Sharingcwysopal
 

Tendances (10)

Internet in Ukraine
Internet in UkraineInternet in Ukraine
Internet in Ukraine
 
Time to slow down? Measured respondes to the fake news crisis
Time to slow down? Measured respondes to the fake news crisisTime to slow down? Measured respondes to the fake news crisis
Time to slow down? Measured respondes to the fake news crisis
 
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
 
Financial Services Insight NYSDFS Whistleblowing Guidance - Sia Partners
Financial Services Insight NYSDFS Whistleblowing Guidance - Sia PartnersFinancial Services Insight NYSDFS Whistleblowing Guidance - Sia Partners
Financial Services Insight NYSDFS Whistleblowing Guidance - Sia Partners
 
Privacy & The Smart Grid (Susanlyon Chtlj01292010)
Privacy & The Smart Grid (Susanlyon   Chtlj01292010)Privacy & The Smart Grid (Susanlyon   Chtlj01292010)
Privacy & The Smart Grid (Susanlyon Chtlj01292010)
 
LEO: Regional Information Sharing Systems (RISS) Program
LEO:  Regional Information Sharing Systems (RISS) ProgramLEO:  Regional Information Sharing Systems (RISS) Program
LEO: Regional Information Sharing Systems (RISS) Program
 
Medical Identity Theft Response Checklist for Consumers
Medical Identity Theft Response Checklist for ConsumersMedical Identity Theft Response Checklist for Consumers
Medical Identity Theft Response Checklist for Consumers
 
The long arm of the gdpr
The long arm of the gdprThe long arm of the gdpr
The long arm of the gdpr
 
Rvasec The Future of Govt Info Sharing
Rvasec The Future of Govt Info SharingRvasec The Future of Govt Info Sharing
Rvasec The Future of Govt Info Sharing
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 

Similaire à Assist Victims Through Consumer Sentinel Network and NCIC

Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxUnit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxouldparis
 
Taylor Amarel Upload - Liberty Global Asia Report
Taylor Amarel Upload - Liberty Global Asia ReportTaylor Amarel Upload - Liberty Global Asia Report
Taylor Amarel Upload - Liberty Global Asia ReportTaylor Scott Amarel
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 
Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Invest Northern Ireland
 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeLoeb Smith Attorneys
 
2018 ic3 report
2018 ic3 report2018 ic3 report
2018 ic3 reportmalvvv
 
NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementDavid Sweigert
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceFinancial Poise
 
National Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy AgendaNational Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy Agendanationalconsumersleague
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
Identity Theft
Identity TheftIdentity Theft
Identity Theftsarakr00
 
Please answer this short question asap. Thanks in advance. 1.What .pdf
Please answer this short question asap. Thanks in advance. 1.What .pdfPlease answer this short question asap. Thanks in advance. 1.What .pdf
Please answer this short question asap. Thanks in advance. 1.What .pdfagarshailenterprises
 
apidays New York 2023 - CATTS out of the bag, Jean-Paul LaClair, FDX
apidays New York 2023 - CATTS out of the bag, Jean-Paul LaClair, FDXapidays New York 2023 - CATTS out of the bag, Jean-Paul LaClair, FDX
apidays New York 2023 - CATTS out of the bag, Jean-Paul LaClair, FDXapidays
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...Patrick McCormick
 
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA PresentationCanadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA PresentationRandyMcCall
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting David Sweigert
 
Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014- Mark - Fullbright
 

Similaire à Assist Victims Through Consumer Sentinel Network and NCIC (20)

Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxUnit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
 
Taylor Amarel Upload - Liberty Global Asia Report
Taylor Amarel Upload - Liberty Global Asia ReportTaylor Amarel Upload - Liberty Global Asia Report
Taylor Amarel Upload - Liberty Global Asia Report
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017
 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
 
2018 ic3 report
2018 ic3 report2018 ic3 report
2018 ic3 report
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency Management
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
National Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy AgendaNational Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy Agenda
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Please answer this short question asap. Thanks in advance. 1.What .pdf
Please answer this short question asap. Thanks in advance. 1.What .pdfPlease answer this short question asap. Thanks in advance. 1.What .pdf
Please answer this short question asap. Thanks in advance. 1.What .pdf
 
apidays New York 2023 - CATTS out of the bag, Jean-Paul LaClair, FDX
apidays New York 2023 - CATTS out of the bag, Jean-Paul LaClair, FDXapidays New York 2023 - CATTS out of the bag, Jean-Paul LaClair, FDX
apidays New York 2023 - CATTS out of the bag, Jean-Paul LaClair, FDX
 
Employee law module
Employee law moduleEmployee law module
Employee law module
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA PresentationCanadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014
 

Dernier

BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdflaysamaeguardiano
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书SS A
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
如何办理(Michigan文凭证书)密歇根大学毕业证学位证书
 如何办理(Michigan文凭证书)密歇根大学毕业证学位证书 如何办理(Michigan文凭证书)密歇根大学毕业证学位证书
如何办理(Michigan文凭证书)密歇根大学毕业证学位证书Sir Lt
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceanilsa9823
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General ProcedureBridgeWest.eu
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...James Watkins, III JD CFP®
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaLegal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaFinlaw Consultancy Pvt Ltd
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 

Dernier (20)

BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
如何办理(Michigan文凭证书)密歇根大学毕业证学位证书
 如何办理(Michigan文凭证书)密歇根大学毕业证学位证书 如何办理(Michigan文凭证书)密歇根大学毕业证学位证书
如何办理(Michigan文凭证书)密歇根大学毕业证学位证书
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General Procedure
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in IndiaLegal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
Legal Risks and Compliance Considerations for Cryptocurrency Exchanges in India
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 

Assist Victims Through Consumer Sentinel Network and NCIC

  • 1. Tools for Assisting Victims: Consumer Sentinel Network and the National Crime Information Center THIS DOCUMENT WAS PRODUCED BY IDAHO LEGAL AID SERVICES, INC. UNDER AWARD # 2010-VF-GX-K030, AWARDED BY THE OFFICE FOR VICTIMS OF CRIME, OFFICE OF JUSTICE PROGRAMS, U.S. DEPARTMENT OF JUSTICE IN CONJUNCTION WITH THE MARYLAND CRIME VICTIMS’ RESOURCE CENTER. THE OPINIONS, FINDINGS, AND CONCLUSIONS OR RECOMMENDATIONS EXPRESSED IN THIS DOCUMENT ARE THOSE OF THE CONTRIBUTORS AND DO NOT NECESSARILY REPRESENT THE OFFICIAL POSITION OR POLICIES OF THE U.S. DEPARTMENT OF JUSTICE OR MARYLAND CRIME VICTIMS’ RESOURCE CENTER, INC.
  • 2.  www.ftc.gov/sentinel  Purpose: Share information amongst law enforcement  Law enforcement members can access complaints provided to the FTC  Access is free and available to any federal, state, or local law enforcement agency.
  • 3.  To access the Sentinel Network, the law enforcement agency must become a member.  Members can:  Search millions of consumer complaints  Report complaints so they can be shared with law enforcement nationwide  See trends in types of complaints filed, identify crime trends  Register.ConsumerSentinel.gov  Idaho lacking participation by local law enforcement agencies
  • 4.  By enhancing investigations of identity theft crimes  Law enforcement can:  Get alerts about particular subjects or practices  Find other law enforcement agencies investigating the same targets  Set up a search to run periodically  Research cases  Track targets  Identify victims  Law enforcement partners can use information in the database to coordinate investigations.  Greater likelihood of finding victims, prosecuting cases, and obtaining restitution for victims
  • 5. "The Consumer Sentinel Network is a treasure trove of information for law enforcers. We plan to contribute consumer complaints we receive at the CFPB to the Network and urge other state and local law enforcers to join the Network, too.“ – Richard Cordray, Director of the Consumer Financial Protection Bureau http://www.youtube.com/watch?v=WcW0vngJ ZEM
  • 6.  An electronic clearinghouse of crime data  Consists of 19 “files”  Agencies enter records into NCIC that are accessible nationwide.  e.g., entering a vehicle into the file to see if it is a stolen vehicle  http://www.fbi.gov/about-us/cjis/ncic
  • 7.  Can be extremely useful for victims of criminal identity theft  NCIC Identity Theft File “flags” stolen identities  Provides identifying information to recognize imposters when they are encountered by law enforcement.  Contains records of both the ID theft victim and any information known about the perpetrator
  • 8.  An NCIC Identity Theft File record is created  It is available nationwide to police officers  During a subsequent encounter with law enforcement, a query into the NCIC system automatically searches the Identity Theft File  The officer will receive a response including the victim profile and password.  Can prevent arrests of criminal ID theft victims!  Currently, the Identity Theft File consists of approximately 2,600 records entered by 29 states.

Notes de l'éditeur

  1. Consumer Sentinel Network is an online database of consumer complaints available to law enforcement. It includes complaints on Identity theft, do not call registry violations, telemarketing scams, sweepstakes and lotteries, work at home schemes, weight loss products, and debt collection, among others. Consumer Sentinel is based on the premise that sharing information can make law enforcement more effective. The network includes not only complaints provided to the Federal Trade Commission, but also complaints shared by data contributors such as the US Postal Inspection Service, Identity Theft Assistance Center, the Better Business Bureau, and several State Attorney general’s offices (including Idaho AG!)
  2. Becoming a member entails completing a registration form and signing a confidentiality and data security agreement with the FTC. After the organization has gained access, each individual user must also register and obtain a user id. Search complaints with a tool that works like an internet search engine Able to search within search results Able to save data into your own 100 megabyte online storage center Current members in our state: Idaho Dept of Finance, Idaho Office of the Attorney General, Idaho State Police, Investigations, Region 3, and Coeur d’Alene Police Dept. Note that only one local police department is participating! This is something the law enforcement subcommittee could work on – getting the word out to local law enforcement agencies about this tool and how it could help them serve victims of ID theft and other financial crimes.
  3. Law enforcement can get alerts about particular subjects or practices Can find other law enforcement agencies investigating the same targets Set up a search to run periodically
  4. > Seven property files that contain records of seven types of stolen property and 12 persons files, one of which is the “Identity Theft Files”
  5. The NCIC is vitally important in investigating identity theft in that it provides information to law enforcement officers on victims of identity theft and how to distinguish them from the perpetrators of the crime. The NCIC Identity Theft File became operational in April 2005 and is designed to aid both police officers and crime victims. The file contains records of identity theft victims with personal descriptive data and other relevant information. These records remain active in the NCIC system for a maximum of five years unless cancelled by the law enforcement agency that originally entered the file.
  6. When an NCIC Identity Theft File record is created, it is available nationwide to police officers, just as all other NCIC files are. During a subsequent encounter with law enforcement, such as a routine traffic stop, a query into the NCIC system automatically searches the Identity Theft File and, if it is a positive match, generates a response to the inquiring agency. The querying officer will receive a response including the victim profile and password, thereby providing the officer with information necessary to verify whether the person encountered is the actual victim or someone using a false identity. The officer should be aware that an individual should not be arrested or detained based solely on the information provided in the positive response to the initial query. When an NCIC Identity Theft File record is created, it is available nationwide to police officers, just as all other NCIC files are. During a subsequent encounter with law enforcement, such as a routine traffic stop, a query into the NCIC system automatically searches the Identity Theft File and, if it is a positive match, generates a response to the inquiring agency. The querying officer will receive a response including the victim profile and password, thereby providing the officer with information necessary to verify whether the person encountered is the actual victim or someone using a false identity. The officer should be aware that an individual should not be arrested or detained based solely on the information provided in the positive response to the initial query. However, as more departments and states routinely enter reports of identity theft, the tremendous potential of this file to assist in investigations and to protect victims will be realized.