ID Theft: When Bad Things Happen to Your Good Name : Hearing Before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, Second Session, on Examining the Effectiveness and Funding for the Identity Theft and Assumption Deterrence Act (P.L. 105-318), March 7, 2000, Volume 4 |
Other editions - View all
Common terms and phrases
account numbers addition assistance Assumption Deterrence Act automated bank Chairman combat identity theft complaints consumer education counterfeit credit bureaus credit card account credit card fraud Credit Reporting Act credit reporting agencies creditors criminal database efforts Experian Fair Credit Reporting false identification Federal law Federal Trade Commission Ford Expedition fraudulent FTC's iden identify identity fraud Identity Theft Act Identity Theft Data Identity Theft Hotline identity theft victims individual Internet investigation JODIE BERNSTEIN JON KYL KeyBank law enforcement agencies law enforcement partners Lincoln Navigator loan ment merchants Mitchell obtain Office personal information phone calls phone numbers police report problem prosecution received referral Senator Grassley Senator KYL Social Security Administration social security number Special Agent SSN misuse stolen subcommittee sumer Thank Theft and Assumption Theft Data Clearinghouse thief tion tity theft toll-free number Trans Union U.S. Secret Service verification victims of identity
Popular passages
Page 21 - Director of the Bureau of Consumer Protection of the Federal Trade Commission.
Page 34 - ... any name or number that may be used, alone or in conjunction with any other information, to identify a specific individual...
Page 34 - Knowingly transfers or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of federal law, or that constitutes a felony under any applicable state or local law.
Page 27 - ... particular case the financial institution, in an effort to operate in a consumer friendly manner issued credit over the Internet in less than a minute. Approval for credit was granted after conducting a credit check for the applicant who provided a "true name' and matching "true Social Security number".
Page 27 - The Secret Service works in concert with the state, county, and local police departments to ensure our resources are being targeted to those criminal areas that are of a high concern to the local citizenry. Further, we work very closely with both Federal and local prosecutors to ensure that our investigations are relevant, topical and prosecutable under existing guidelines. No area today is more relevant or topical than that of identity theft. It has been our experience that the criminal groups involved...
Page 36 - ... the Board of Governors of the Federal Reserve System, the Federal Deposit Insurance Corporation, the National Credit Union Administration, the Office of the Comptroller of the Currency, and the Office of Thrift Supervision and to make recommendations to promote uniformity in the supervision of financial institutions.
Page 27 - In the past, fraud schemes required false identification documents, and necessitated a "face to face" exchange of information and identity verification. Now with just a laptop and modem, criminals are capable of perpetrating a variety of financial crimes without identity documents through the use of stolen personal information. The Secret Service has investigated several cases where cyber criminals have hacked into Internet merchant sites and stolen the personal information and credit card account...
Page 27 - These account numbers are then used with supporting personal information to order merchandise to be mailed throughout the world. Most account holders are not aware that their credit card account has been compromised until they receive their billing statement. Time and time again, criminals have demonstrated the ability to obtain information from businesses conducting commerce on the Internet. This information has been used to facilitate account takeover schemes and other similar frauds. It has become...
Page 23 - As we enter the next century, the strength of the financial industry has never been greater. A strong economy, burgeoning use of the Internet and advanced technology, coupled with increased spending has led to fierce competition within the financial sector. Although this provides benefits to the consumer through readily available credit, and consumer oriented financial services, it also creates a rich environment for today's sophisticated criminals, many of whom are organized and operate across international...
Page 33 - Act ("FTCA"), which prohibits unfair methods of competition and unfair or deceptive acts or practices in or affecting commerce.