SlideShare una empresa de Scribd logo
1 de 9
Tools for Assisting Victims: Consumer
Sentinel Network and the National
Crime Information Center
THIS DOCUMENT WAS PRODUCED BY IDAHO LEGAL AID SERVICES, INC. UNDER AWARD # 2010-VF-GX-K030,
AWARDED BY THE OFFICE FOR VICTIMS OF CRIME, OFFICE OF JUSTICE PROGRAMS, U.S. DEPARTMENT OF JUSTICE IN
CONJUNCTION WITH THE MARYLAND CRIME VICTIMS’ RESOURCE CENTER. THE OPINIONS, FINDINGS, AND
CONCLUSIONS OR RECOMMENDATIONS EXPRESSED IN THIS DOCUMENT ARE THOSE OF THE CONTRIBUTORS AND DO
NOT NECESSARILY REPRESENT THE OFFICIAL POSITION OR POLICIES OF THE U.S. DEPARTMENT OF JUSTICE OR
MARYLAND CRIME VICTIMS’ RESOURCE CENTER, INC.
 www.ftc.gov/sentinel
 Purpose: Share information amongst law
enforcement
 Law enforcement members can access
complaints provided to the FTC
 Access is free and available to any federal,
state, or local law enforcement agency.
 To access the Sentinel Network, the law
enforcement agency must become a member.
 Members can:
 Search millions of consumer complaints
 Report complaints so they can be shared with law
enforcement nationwide
 See trends in types of complaints filed, identify
crime trends
 Register.ConsumerSentinel.gov
 Idaho lacking participation by local law
enforcement agencies
 By enhancing investigations of identity theft crimes
 Law enforcement can:
 Get alerts about particular subjects or practices
 Find other law enforcement agencies investigating the same
targets
 Set up a search to run periodically
 Research cases
 Track targets
 Identify victims
 Law enforcement partners can use information in the
database to coordinate investigations.
 Greater likelihood of finding victims, prosecuting
cases, and obtaining restitution for victims
"The Consumer Sentinel Network is a treasure
trove of information for law enforcers. We plan
to contribute consumer complaints we receive
at the CFPB to the Network and urge other
state and local law enforcers to join the
Network, too.“ – Richard Cordray, Director of the
Consumer Financial Protection Bureau
http://www.youtube.com/watch?v=WcW0vngJ
ZEM
 An electronic clearinghouse of crime data
 Consists of 19 “files”
 Agencies enter records into NCIC that are
accessible nationwide.
 e.g., entering a vehicle into the file to see if it is a
stolen vehicle
 http://www.fbi.gov/about-us/cjis/ncic
 Can be extremely useful for victims of criminal
identity theft
 NCIC Identity Theft File “flags” stolen
identities
 Provides identifying information to recognize
imposters when they are encountered by law
enforcement.
 Contains records of both the ID theft victim
and any information known about the
perpetrator
 An NCIC Identity Theft File record is created
 It is available nationwide to police officers
 During a subsequent encounter with law
enforcement, a query into the NCIC system
automatically searches the Identity Theft File
 The officer will receive a response including the
victim profile and password.
 Can prevent arrests of criminal ID theft victims!
 Currently, the Identity Theft File consists of
approximately 2,600 records entered by 29 states.
Assist Victims Through Consumer Sentinel Network and NCIC

Más contenido relacionado

La actualidad más candente

Time to slow down? Measured respondes to the fake news crisis
Time to slow down? Measured respondes to the fake news crisisTime to slow down? Measured respondes to the fake news crisis
Time to slow down? Measured respondes to the fake news crisismrleiser
 
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...APNIC
 
Financial Services Insight NYSDFS Whistleblowing Guidance - Sia Partners
Financial Services Insight NYSDFS Whistleblowing Guidance - Sia PartnersFinancial Services Insight NYSDFS Whistleblowing Guidance - Sia Partners
Financial Services Insight NYSDFS Whistleblowing Guidance - Sia PartnersDaniel Connor
 
Privacy & The Smart Grid (Susanlyon Chtlj01292010)
Privacy & The Smart Grid (Susanlyon   Chtlj01292010)Privacy & The Smart Grid (Susanlyon   Chtlj01292010)
Privacy & The Smart Grid (Susanlyon Chtlj01292010)Susan Lyon-Hintze
 
LEO: Regional Information Sharing Systems (RISS) Program
LEO:  Regional Information Sharing Systems (RISS) ProgramLEO:  Regional Information Sharing Systems (RISS) Program
LEO: Regional Information Sharing Systems (RISS) ProgramDavid Sweigert
 
Medical Identity Theft Response Checklist for Consumers
Medical Identity Theft Response Checklist for ConsumersMedical Identity Theft Response Checklist for Consumers
Medical Identity Theft Response Checklist for Consumers- Mark - Fullbright
 
The long arm of the gdpr
The long arm of the gdprThe long arm of the gdpr
The long arm of the gdprMathew Chacko
 
Rvasec The Future of Govt Info Sharing
Rvasec The Future of Govt Info SharingRvasec The Future of Govt Info Sharing
Rvasec The Future of Govt Info Sharingcwysopal
 

La actualidad más candente (10)

Internet in Ukraine
Internet in UkraineInternet in Ukraine
Internet in Ukraine
 
Time to slow down? Measured respondes to the fake news crisis
Time to slow down? Measured respondes to the fake news crisisTime to slow down? Measured respondes to the fake news crisis
Time to slow down? Measured respondes to the fake news crisis
 
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
 
Financial Services Insight NYSDFS Whistleblowing Guidance - Sia Partners
Financial Services Insight NYSDFS Whistleblowing Guidance - Sia PartnersFinancial Services Insight NYSDFS Whistleblowing Guidance - Sia Partners
Financial Services Insight NYSDFS Whistleblowing Guidance - Sia Partners
 
Privacy & The Smart Grid (Susanlyon Chtlj01292010)
Privacy & The Smart Grid (Susanlyon   Chtlj01292010)Privacy & The Smart Grid (Susanlyon   Chtlj01292010)
Privacy & The Smart Grid (Susanlyon Chtlj01292010)
 
LEO: Regional Information Sharing Systems (RISS) Program
LEO:  Regional Information Sharing Systems (RISS) ProgramLEO:  Regional Information Sharing Systems (RISS) Program
LEO: Regional Information Sharing Systems (RISS) Program
 
Medical Identity Theft Response Checklist for Consumers
Medical Identity Theft Response Checklist for ConsumersMedical Identity Theft Response Checklist for Consumers
Medical Identity Theft Response Checklist for Consumers
 
The long arm of the gdpr
The long arm of the gdprThe long arm of the gdpr
The long arm of the gdpr
 
Rvasec The Future of Govt Info Sharing
Rvasec The Future of Govt Info SharingRvasec The Future of Govt Info Sharing
Rvasec The Future of Govt Info Sharing
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 

Similar a Assist Victims Through Consumer Sentinel Network and NCIC

Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxUnit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxouldparis
 
Taylor Amarel Upload - Liberty Global Asia Report
Taylor Amarel Upload - Liberty Global Asia ReportTaylor Amarel Upload - Liberty Global Asia Report
Taylor Amarel Upload - Liberty Global Asia ReportTaylor Scott Amarel
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 
Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Invest Northern Ireland
 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeLoeb Smith Attorneys
 
2018 ic3 report
2018 ic3 report2018 ic3 report
2018 ic3 reportmalvvv
 
NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementDavid Sweigert
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceFinancial Poise
 
National Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy AgendaNational Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy Agendanationalconsumersleague
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
Identity Theft
Identity TheftIdentity Theft
Identity Theftsarakr00
 
Please answer this short question asap. Thanks in advance. 1.What .pdf
Please answer this short question asap. Thanks in advance. 1.What .pdfPlease answer this short question asap. Thanks in advance. 1.What .pdf
Please answer this short question asap. Thanks in advance. 1.What .pdfagarshailenterprises
 
apidays New York 2023 - CATTS out of the bag, Jean-Paul LaClair, FDX
apidays New York 2023 - CATTS out of the bag, Jean-Paul LaClair, FDXapidays New York 2023 - CATTS out of the bag, Jean-Paul LaClair, FDX
apidays New York 2023 - CATTS out of the bag, Jean-Paul LaClair, FDXapidays
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...Patrick McCormick
 
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA PresentationCanadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA PresentationRandyMcCall
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting David Sweigert
 
Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014- Mark - Fullbright
 

Similar a Assist Victims Through Consumer Sentinel Network and NCIC (20)

Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docxUnit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
Unit 8 DB Identity Theft Article A Chief’s ViewIdentity Thef.docx
 
Taylor Amarel Upload - Liberty Global Asia Report
Taylor Amarel Upload - Liberty Global Asia ReportTaylor Amarel Upload - Liberty Global Asia Report
Taylor Amarel Upload - Liberty Global Asia Report
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017
 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
 
2018 ic3 report
2018 ic3 report2018 ic3 report
2018 ic3 report
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency Management
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
National Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy AgendaNational Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy Agenda
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Please answer this short question asap. Thanks in advance. 1.What .pdf
Please answer this short question asap. Thanks in advance. 1.What .pdfPlease answer this short question asap. Thanks in advance. 1.What .pdf
Please answer this short question asap. Thanks in advance. 1.What .pdf
 
apidays New York 2023 - CATTS out of the bag, Jean-Paul LaClair, FDX
apidays New York 2023 - CATTS out of the bag, Jean-Paul LaClair, FDXapidays New York 2023 - CATTS out of the bag, Jean-Paul LaClair, FDX
apidays New York 2023 - CATTS out of the bag, Jean-Paul LaClair, FDX
 
Employee law module
Employee law moduleEmployee law module
Employee law module
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA PresentationCanadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014Consumer Sentinel Network Report 2014
Consumer Sentinel Network Report 2014
 

Último

Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSDr. Oliver Massmann
 
Difference between LLP, Partnership, and Company
Difference between LLP, Partnership, and CompanyDifference between LLP, Partnership, and Company
Difference between LLP, Partnership, and Companyaneesashraf6
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书Fir sss
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
Group 2 Marlaw Definition of Bill of Lading .pptx
Group 2 Marlaw Definition of Bill of Lading .pptxGroup 2 Marlaw Definition of Bill of Lading .pptx
Group 2 Marlaw Definition of Bill of Lading .pptxjohnpazperpetua10
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791BlayneRush1
 

Último (20)

Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
 
Difference between LLP, Partnership, and Company
Difference between LLP, Partnership, and CompanyDifference between LLP, Partnership, and Company
Difference between LLP, Partnership, and Company
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
Group 2 Marlaw Definition of Bill of Lading .pptx
Group 2 Marlaw Definition of Bill of Lading .pptxGroup 2 Marlaw Definition of Bill of Lading .pptx
Group 2 Marlaw Definition of Bill of Lading .pptx
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
 

Assist Victims Through Consumer Sentinel Network and NCIC

  • 1. Tools for Assisting Victims: Consumer Sentinel Network and the National Crime Information Center THIS DOCUMENT WAS PRODUCED BY IDAHO LEGAL AID SERVICES, INC. UNDER AWARD # 2010-VF-GX-K030, AWARDED BY THE OFFICE FOR VICTIMS OF CRIME, OFFICE OF JUSTICE PROGRAMS, U.S. DEPARTMENT OF JUSTICE IN CONJUNCTION WITH THE MARYLAND CRIME VICTIMS’ RESOURCE CENTER. THE OPINIONS, FINDINGS, AND CONCLUSIONS OR RECOMMENDATIONS EXPRESSED IN THIS DOCUMENT ARE THOSE OF THE CONTRIBUTORS AND DO NOT NECESSARILY REPRESENT THE OFFICIAL POSITION OR POLICIES OF THE U.S. DEPARTMENT OF JUSTICE OR MARYLAND CRIME VICTIMS’ RESOURCE CENTER, INC.
  • 2.  www.ftc.gov/sentinel  Purpose: Share information amongst law enforcement  Law enforcement members can access complaints provided to the FTC  Access is free and available to any federal, state, or local law enforcement agency.
  • 3.  To access the Sentinel Network, the law enforcement agency must become a member.  Members can:  Search millions of consumer complaints  Report complaints so they can be shared with law enforcement nationwide  See trends in types of complaints filed, identify crime trends  Register.ConsumerSentinel.gov  Idaho lacking participation by local law enforcement agencies
  • 4.  By enhancing investigations of identity theft crimes  Law enforcement can:  Get alerts about particular subjects or practices  Find other law enforcement agencies investigating the same targets  Set up a search to run periodically  Research cases  Track targets  Identify victims  Law enforcement partners can use information in the database to coordinate investigations.  Greater likelihood of finding victims, prosecuting cases, and obtaining restitution for victims
  • 5. "The Consumer Sentinel Network is a treasure trove of information for law enforcers. We plan to contribute consumer complaints we receive at the CFPB to the Network and urge other state and local law enforcers to join the Network, too.“ – Richard Cordray, Director of the Consumer Financial Protection Bureau http://www.youtube.com/watch?v=WcW0vngJ ZEM
  • 6.  An electronic clearinghouse of crime data  Consists of 19 “files”  Agencies enter records into NCIC that are accessible nationwide.  e.g., entering a vehicle into the file to see if it is a stolen vehicle  http://www.fbi.gov/about-us/cjis/ncic
  • 7.  Can be extremely useful for victims of criminal identity theft  NCIC Identity Theft File “flags” stolen identities  Provides identifying information to recognize imposters when they are encountered by law enforcement.  Contains records of both the ID theft victim and any information known about the perpetrator
  • 8.  An NCIC Identity Theft File record is created  It is available nationwide to police officers  During a subsequent encounter with law enforcement, a query into the NCIC system automatically searches the Identity Theft File  The officer will receive a response including the victim profile and password.  Can prevent arrests of criminal ID theft victims!  Currently, the Identity Theft File consists of approximately 2,600 records entered by 29 states.

Notas del editor

  1. Consumer Sentinel Network is an online database of consumer complaints available to law enforcement. It includes complaints on Identity theft, do not call registry violations, telemarketing scams, sweepstakes and lotteries, work at home schemes, weight loss products, and debt collection, among others. Consumer Sentinel is based on the premise that sharing information can make law enforcement more effective. The network includes not only complaints provided to the Federal Trade Commission, but also complaints shared by data contributors such as the US Postal Inspection Service, Identity Theft Assistance Center, the Better Business Bureau, and several State Attorney general’s offices (including Idaho AG!)
  2. Becoming a member entails completing a registration form and signing a confidentiality and data security agreement with the FTC. After the organization has gained access, each individual user must also register and obtain a user id. Search complaints with a tool that works like an internet search engine Able to search within search results Able to save data into your own 100 megabyte online storage center Current members in our state: Idaho Dept of Finance, Idaho Office of the Attorney General, Idaho State Police, Investigations, Region 3, and Coeur d’Alene Police Dept. Note that only one local police department is participating! This is something the law enforcement subcommittee could work on – getting the word out to local law enforcement agencies about this tool and how it could help them serve victims of ID theft and other financial crimes.
  3. Law enforcement can get alerts about particular subjects or practices Can find other law enforcement agencies investigating the same targets Set up a search to run periodically
  4. > Seven property files that contain records of seven types of stolen property and 12 persons files, one of which is the “Identity Theft Files”
  5. The NCIC is vitally important in investigating identity theft in that it provides information to law enforcement officers on victims of identity theft and how to distinguish them from the perpetrators of the crime. The NCIC Identity Theft File became operational in April 2005 and is designed to aid both police officers and crime victims. The file contains records of identity theft victims with personal descriptive data and other relevant information. These records remain active in the NCIC system for a maximum of five years unless cancelled by the law enforcement agency that originally entered the file.
  6. When an NCIC Identity Theft File record is created, it is available nationwide to police officers, just as all other NCIC files are. During a subsequent encounter with law enforcement, such as a routine traffic stop, a query into the NCIC system automatically searches the Identity Theft File and, if it is a positive match, generates a response to the inquiring agency. The querying officer will receive a response including the victim profile and password, thereby providing the officer with information necessary to verify whether the person encountered is the actual victim or someone using a false identity. The officer should be aware that an individual should not be arrested or detained based solely on the information provided in the positive response to the initial query. When an NCIC Identity Theft File record is created, it is available nationwide to police officers, just as all other NCIC files are. During a subsequent encounter with law enforcement, such as a routine traffic stop, a query into the NCIC system automatically searches the Identity Theft File and, if it is a positive match, generates a response to the inquiring agency. The querying officer will receive a response including the victim profile and password, thereby providing the officer with information necessary to verify whether the person encountered is the actual victim or someone using a false identity. The officer should be aware that an individual should not be arrested or detained based solely on the information provided in the positive response to the initial query. However, as more departments and states routinely enter reports of identity theft, the tremendous potential of this file to assist in investigations and to protect victims will be realized.