Deprecated: str_replace(): Passing null to parameter #3 ($subject) of type array|string is deprecated in /home/csosamed/public_html/podcast/transcripts/wp-content/themes/genesis/lib/functions/image.php on line 116

Internet Safety-Internet Keep Safe Coalition-DC Public Safety Radio

Welcome to “DC Public Safety” – Radio and television shows, blog and transcripts on crime, criminal offenders and the criminal justice system.

The portal site for “DC Public Safety” is http://media.csosa.gov.

Radio Program available at http://media.csosa.gov/podcast/audio/2012/11/jobs-in-corrections-discover-corrections-website-dc-public-safety-radio/

[Audio Begins]

Len Sipes: From the nation’s capital, this is DC Public Safety. I’m your host, Leonard Sipes, for the first show of 2013, and we have at our microphones, back at our microphones, she was once with us a long time ago, Marsali Hancock. She is the CEO and President of the Internet Keep Safe Coalition, the website ikeepsafe.org – ikeepsafe.org. I invited Marsali back to our microphones to discuss internet safety, and it’s an issue of extreme importance to just about everybody within the criminal justice system and everybody out there listening to my voice. Marsali, welcome back to DC Public Safety.

Marsali Hancock: Thank you. I’m thrilled to be here.

Len Sipes: You know, I can’t imagine a topic with more universal connection to those of us within the criminal justice system and everybody else who happens to be listening to this program. You and I, before we hit the record button, we were talking about a good friend of mine and she was cyber-bullied. She received threatening messages via Facebook, and this was not an easy event for her. This was not something that she sloughed off. I won’t tell you all the different things that she did and the reactions but she took this very personally, very emotionally, I mean to the point, well, you know, somebody knocking on the door and I’m not there, I mean, it was a very frightening event. So cyber crime, cyber bullying, cyber safety just has an impact, an emotional impact, a strong emotional impact, and it’s probably affecting millions of Americans.

Marsali Hancock: Well, you pull up a very interesting point that there are strong emotions with technical devices, and it’s because people emotionally connect with them. So when you look at the types of communications people send, either through Facebook or text messaging or the photos they sent back and forth or the videos, this is how people emotionally connect and when something goes wrong, that sense of unrest and insecurity is really heightened. So lots of people in the world are trying to navigate, how do I have a good, healthy relationship with my technology, and when something goes wrong, it’s very hard to know how do I navigate it, where do I go, how do I prevent it, and what’s my plan when something does happen.

Len Sipes: Let’s talk about this for a second because I’m not quite sure if people have an understanding of this. They use their smartphones, they Facebook, they Twitter all with their smartphones, they go home to their computer, they do LinkedIn, they do a variety of social media sites, but they see it as having this huge impact on their world. The digital space means something profound to the people involved in it, correct? There’s more to this than meets the eye. It’s just not use of Facebook. It is now pretty much a lifestyle. It is now pretty much something that permeates our day-to-day existence.

Marsali Hancock: Well it absolutely does, and when you look at how often people check their phones, when you look at a mobile device, people feel it’s an extension of themselves so emotionally they’re problem-solving often through that medium, so when things go wrong, it feels very – that you’re space is invaded. It’s a very unnerving experience. Often people forget that the digital world is always public, it can never be private, so what we do online absolutely impacts our future academic and employment opportunities. It impacts our relationships, our future relationships, and you can never fully pull off what has been sent digitally, and anything that can be sent can be tracked and stored and resent by anyone.

Len Sipes: Is there any such thing as Internet privacy?

Marsali Hancock: No. No. You can try to reduce the amount of exposure, you can be very careful by what you post, but you can never plan on anything being fully private, ever. It’s just not to be expected. Sometimes in this space when you work with parents, they’ll feel like, “I want my child to know I trust them, and I want to give my child privacy. I don’t want to look into their private communications,” and that parent is completely mistaken about the reality of technology. The reality is if it’s done through digital technology, it is not private, there is no assumption of privacy, and anything sent can be capture and resent by anyone else.

Len Sipes: But you go on the Facebook and the settings are immensely confusing, and the pundits have complained about the fact that they’re immensely confusing. I’m not quite sure that there’s anybody out there, whether it’s a parent or a child or a professional, that has a full understanding of the fact that what you post on Facebook, you may have it geared for friends only but it’s still searchable and it still is pulled up into feeds of other people within your timeline. There’s nothing private about your use of Facebook.

Marsali Hancock: You can reduce what others see but you cannot ensure that anyone who can see it does not also publish it. You can go to ikeepsafe.org and we do have a guide for parents on Facebook so there are some ways that you can minimize your risks by being able to identify those 9% of fake sites, you know, sites that are just set up by someone to be impersonating or to inflict harm, that’s out there which ends up being 80 million some odds sites that are fake, but learning how to navigate privacy setting is a convenience, it’s not a guarantee. It’s not encrypted. Sometimes people will feel like, “Well, the same type of protection I have from my bank is what I have with privacy settings,” and that is not the case. Encryption is a totally different procedure, technical feature, than privacy settings which are just literally a convenience.

Len Sipes: You put on a variety of training programs for the Department of Justice, and I met you through U.S. Department of Justice contacts. Why you? Why did Justice put their faith and trust in I Keep Safe?

Marsali Hancock: Well first, I Keep Safe is a nonprofit. We’re a 500c3 but we align ourselves easily with industry to help industry make better choices but then also for industry to be able to communicate how can you best use that site. So we’ve done many projects with law enforcement agencies across the country and even outside of the country, so in Pennsylvania the Attorney General, in Michigan the Attorney General, in multiple states. We’ll help to customize and localize what are the key topics that are important to that law enforcement organization, and then what’s the capacity within that state to deliver, and how can we help reach consumers with the things they need to know about how to stay safe online.

Len Sipes: How the criminal justice system can do a better job of Internet safety, again, I have been involved in the digital world from the very beginning of the digital world. I mean, I put up my radio shows on the Internet decades ago. I put my radios up and responded to different people via email, and yet as we proved this morning, I have this first radio show of the year, and I struggled to put all this equipment together. I think I’m intimidated by the digital world. I think all of us are intimidated by the digital world. We within the criminal justice system, I’m not quite sure we fully get it. I’m not quite sure we fully know what to do in terms of advising parents and advising children, in terms of keeping themselves safe. So what do we need to do within the criminal justice system to do a better job?

Marsali Hancock: Well first of all, you’re right, everyone’s dealing with this through their own lens and there’s big challenges, and some of the biggest challenges are the technology changes and the application changes on how we gather information, how we handle an investigation, what’s the communication channels and those lines. So for the criminal justice system, there’s a continual learning curve, and the capacity for professional development needs to be increased. What helps us when we get down to the victim side, all right, what’s hard sometimes for particularly law officers who have not had training in actual digital devices and how they navigate that investigation, there’s an enormous amount of support law enforcement can offer that no one else can. If you’re in a school or a family setting and you’ve got something on Facebook or YouTube or on SnapChat that’s making you really nervous, law enforcement has the capacity to connect with industry much faster than anyone else. There are ways to report abuse and there are things that consumers can do but it’s really law enforcement that has the shortest path to getting to someone on that platform who can be helpful with content.

Len Sipes: On this program however we’ve discussed either from the law enforcement or the correctional side the shortcomings, the budget cuts, the fact that there are a lot of agencies out there that are doing much more with much less over the course of the last five years or so with the budget cuts. Do we really have that capacity at local law enforcement? If you go to them and say, “I’m being cyber bullied,” they really do know what to do?

Marsali Hancock: You know, to be honest, not very many do. I recommend that when a family’s in that situation, if they talk to the Internet Crimes Against Children’s Taskforce, they’re going to find someone that’s at the A-game around digital evidence.

Len Sipes: Right, and how do they contact the Internet Crimes Taskforce?

Marsali Hancock: You can just do a search online to find out your exact state, so every state – its –.

Len Sipes: Every state in the United States has an Internet Crimes Taskforce, and you need to go and use the search engine of preference – see, I didn’t say Google – use the search engine of preference and find the Internet Crimes Against Children’s Taskforce. What about if you’re being bullied as an adult?

Marsali Hancock: Same thing, so they’ll be able to point you, and when you look at the landscape of law enforcement officers, everybody has their niche and their specialty, and some people are really up-to-speed on gang recruitment or some on child victimization, but you need to have someone who can help you know what’s the landscape of opportunities I have to find out who’s behind the types of communication and what do I do to support them. Can I just connect them with the victim’s rights? Has anything actually criminally happened, or, you know, where do I cross that threshold? And from that piece, it takes somebody who knows the ropes about digital evidence, and unfortunately there’s not that many yet but because the digital road grows so fast – every day, 900,000 new Android phones are activated.

Len Sipes: Every day?

Marsali Hancock: Every day.

Len Sipes: Isn’t that amazing? – 900,000 Android phones throughout the world, and they’re all little computers.

Marsali Hancock: Right, and with full-functioning computers with various levels of apps that have the capacity to take a wide range of personal data and spread it to a wide range of countries and developers.

Len Sipes: Yep. They’re more powerful than my desktop five years ago.

Marsali Hancock: Ah, yes.

Len Sipes: Some are more powerful than my desktop three years ago.

Marsali Hancock: Well, and it’s not just the capacity of the device, it’s the types of behavior you use with that device.

Len Sipes: Right.

Marsali Hancock: So what you used to do on your laptop was pretty limited but when you talk about mobile applications, and the global positioning, and your online banking, and your social networking with your closest friends, and your work friends through LinkedIn, I mean, there’s an enormous amount of activity that we never did on a desktop that we do every day with our mobile devices.

Len Sipes: Now I hear from the pundits that all the emphasis within the last ten years has been in terms of cyber attacks – cyber attacks on your own computers, cyber attacks on corporate computers. It is not shifting over to cyber attacks on cell phones.

Marsali Hancock: Mobile devices, so not just cell phones, that’s also your tablets.

Len Sipes: Mobile devices, I’m sorry, mobile devices, your tablets, yes.

Marsali Hancock: It’s anything that connects to something of value, so when you’re looking at the potential for victimization, your value can be your unused credit. So for children, their unused credit is used by criminals and it’s not until you apply for a student loan that parents really recognize so learning what is it of value on my device that helps me to better prepare. So unused credit is a value, so everything around identify theft and protection, you need to have some confidence and competence.

Len Sipes: And all of this you can find on ikeepsafe.org, correct?

Marsali Hancock: Yes, absolutely.

Len Sipes: Okay, and guidance for parents, guidance for children, guidance for law enforcement – its all there. You can start off with that.

Marsali Hancock: Yes, so prevention and then post-incidence response, how do I better manage?

Len Sipes: Okay. Now also the FBI has a huge cyber-crime unit. I’ve advised people in the past to simply Google – oh, I’m sorry – use the search engine of your choice and to look for FBI/cyber crime or FBI/computer crime, and you will come up with the proper unit within the FBI who will provide guidance in terms of cyber crime as well.

Marsali Hancock: Yes, it’s a great resource and like every government agency, everyone’s pressed for resources and time. If you’re the victim, you want to find someone who can help you with your next step and find out what are your rights as a victim and what’s something that’s rational that you can do to prevent it next time.

Len Sipes: What do we say to parents and law enforcement? There has got to be some balance here because their children are going to be on the internet, they are going to be on the internet, and we hear these endless horror stories, and it’s sort of remote and sort of academic until it happens to you as it happened to be me in terms of a woman who’s very close to me, the fact that she was cyber-bullied, and it becomes personal at a certain point. It’s not academic. It’s not remote. What do we say to people in terms of putting all of this in balance and keeping it in perspective because our kids, our 9-year-olds are going to be using the internet, our 14-year-olds are going to be using the internet. Yes, there are literally billions of people throughout the world trolling for them, either to defraud them or to engage them in nefarious acts or even sexual acts. They are out there but we’ve got to put into perspective, do we not?

Marsali Hancock: Oh, absolutely, and when you look at most communication by youth, it’s not problematic, but there is always going to be that’s a challenge, and Danah Boyd in her research calls it “digital drama” because it doesn’t necessarily fit into a criminal act or into necessarily bullying or cyber-bullying where some details about it’s repeated, it’s from a position of power. Digital drama is when somebody’s really upset because of something that s happened online.

Len Sipes: Right.

Marsali Hancock: So you absolutely have to address it. If we pull kids off – so let’s take the Draconian approach. I’m going to keep my child safe by not letting them have a Facebook page or a mobile device, then the expectation is at 18 when they go off to college, they’re going to have to figure it out on their own plus, how about this one? – Often websites are set up or social networking sites are set up for someone who doesn’t have one so let’s look at a couple of different areas, so let’s just take reputation and maybe cyber-bullying. If I don’t allow my child to have a Facebook page, then someone else could create one for them and post all sorts of horrendous things on it, and it takes quite a while – you can get it down but it takes some time. Also about the online reputation, so if I have nothing on the web, then if we’re done with this show, you write, “Oh, that Marsali Hancock, she was just such a bore,” then that’s the 100% of what’s on the web if you’re the only one who’s posted. So really when you look at the web as a potential positive and reducing negative, it means you actually get involved, you get engaged, you create your own online reputation that’s an asset rather than a liability proactively, and we have to look at the digital world as a place where we want our children to succeed. They can’t succeed if they are not prepared and practiced.

Len Sipes: Okay, well let’s go back to the criminal justice system and let’s align some things up. Well, we’re already halfway through the program. Let me reintroduce you. Ladies and gentlemen, our guest today is Marsali Hancock. She is with the Internet Keep Safe Coalition. She is CEO and President – ikeepsafe.org – ikeepsafe.org. Marsali, for the criminal justice system, they need training, they need background, but there is in every state in the United States an Internet Safety Taskforce. So if you searched Maryland or Iowa or Montana Internet —

Marsali Hancock: It’s actually Internet Crimes Against Children.

Len Sipes: Internet Crimes Against Children, but they will also help you with other internet-related areas, correct?

Marsali Hancock: Yes. They can help point you in the right direction so it’s a real voice, they have a real number, and they will be somebody who can point you in the right direction.

Len Sipes: Okay, so there’s a local contact for people and there’s a national contact for people through the FBI, their Internet Crimes Taskforce; but local law enforcement needs training, do they not?

Marsali Hancock: They do need training, and it’s very helpful when they recognize they can literally be the golden ticket for their schools. So when you are looking at a principal who’s dealing with let’s take a situation of sexting. It’s very helpful for that principal to have a network of law enforcement, attorneys/psychologists, people who are up-to-speed in how to manage a digital experience like this where you minimize the risk to the victims and you minimize the risk to the perpetrator and you reduce the risk to the bystanders too who are just caught up in the experience.

Len Sipes: Okay. So the bottom line is that there are places for local law enforcement to go, and they can go to your website, ikeepsafe.org, and begin the process of finding out what resources are available to them.

Marsali Hancock: Yes. And for children, you can also report it to the National Center for Missing and Exploited Children. They are the center, if you are seeing online exploitation; they are set up and ready to gather up that information. If you are a victim or you are a parent at home and you’ve got something that’s concerning you, you’re not sure it crosses that threshold; it’s very nice to call an Internet Crimes Against Children Taskforce officer.

Len Sipes: Okay. For parents, it is a matter of what? It is a matter of, again, going to your website and websites like yours to learn how to deal with their children and what access to give, what age to give it, and how to guide your children in terms of keeping them safe?

Marsali Hancock: Well, ikeepsafe.org will help parents get the picture, so what are the big key issues? What are the areas where, if I don’t help prepare my child, there could be a very big pitfall?

Len Sipes: Right.

Marsali Hancock: So where’s the big gaps, and then how do I talk to my child in a way that I’m just not talking about all the pitfalls because kids glaze over, just like when you talk about awesome cars, the car-owner doesn’t want to hear about how they can be killed in their car. They want to talk about their awesome car. Kids want to talk about their awesome technology.

Len Sipes: That’s a good analogy. That’s a good analogy.

Marsali Hancock: So looking at how can we help them better balance the ethical, be careful with their privacy, manage their online reputation, have healthy relationships, and understand the importance of online security. You cannot miss one of those topics.

Len Sipes: Young people do not separate themselves from their digital identity so they see Facebook, they see Twitter, they see the other social sites as being integral to who they are. They don’t see themselves as being different from their digital presence, correct? – And that applies to not just kids, that applies to just about everybody today, correct?

Marsali Hancock: Well, it does, but to youth, because they have grown up with this ubiquitous access often, they connect emotionally with and through their digital device, and they define their relationships on web platforms, and that’s different than those of us who have a few grey hairs.

Len Sipes: So if they’re bullied or if they’re attacked via the Internet, they take it as seriously as if it happened on the street.

Marsali Hancock: It’s actually in many ways, emotionally, it can be more serious because if I viewed bullying in the old days on my bus, I’m going to get off that bus and I’m going to go home, and I’m not continually seeing that bullying on the bus. If it’s online it goes on and on, and what to use to just involve maybe 5 students or 100 students or 200 students now can be 100,000 or 2 million or 5 million students, and in that process as people are viewing digitally the bullying experience, they are either becoming desensitized or they have a sense of ethics that help them to know, “I need to flag and tag this. Whatever platform this is on, I can send an anonymous tag so that this type of behavior is better monitored by the platform.”

Len Sipes: Bullying, cyber-bullying, the topic, the individual topic that we’ve touched upon throughout the program, again, law enforcement, if I’m John Doe police officer and I get a call to go to a house and to deal with an issue of cyber-bullying, I’m going to be stumped.

Marsali Hancock: Well, you don’t have to be stumped, first of all. First know that at search.org, which is set up for law enforcement, there is a research and it’ll be on our website. We have a blog that when we post about this show, we’ll link to it. It gives you the law enforcement entry point, so it’ll give you either a phone number or it’ll give you an email that’s fast-tracked through the company. So here’s an example: in Maryland we were at a school and they were having an issue with cyber-bullying. Some of it was anonymous, some of it involved a few students at the school, but they were assuming it involved quite a few more because of the anonymous posts. So the school resource officer was able to connect with the law enforcement community, get a warrant. They were able to identify the IP addresses of all of the individuals involved so they could go back to the principal and say, “Well, okay, here’s what we have. Here’s the evidence. These are the students’ homes that we know the digital communication was sent from these households.” Now you can’t ensure, we never know for sure who’s actually on the other end of the digital communication. It could be a mother, it could be a friend at that home, but it narrows this huge, giant universe of the web down to, okay, here’s these 12 homes that were involved in actually sending content.

Len Sipes: You really don’t live anonymously. Now there are all sorts of fraudulent sites out there and we haven’t even discussed cyber fraud. My heavens.

Marsali Hancock: Another day.

Len Sipes: Another day, another time, because they originate in Russia and send their messages through —

Marsali Hancock: China.

Len Sipes: — China, and they end up through Burma, and then they end up on your computer, so it’s very hard to track them down but the local cyber-bullying is something that can be traced back to various IP addressed, various computers and various addresses.

Marsali Hancock: It’s difficult to be totally anonymous. To be completely honest, it can happen, but it takes someone very skilled.

Len Sipes: And I think that’s pretty reassuring for a lot of people listening to the program, and I think it’s hopeful to the criminal justice personnel that they can do something about it. So again, they have to work through their task forces, and again, if they have any questions, they can go through the website ikeepsafe.org. Suicide – one of the things I do want to get into is the emotional trauma – it’s just not emotional trauma for a 12-year-old, a 13-year-old to be bullied in a massive setting and that spreads through the school and literally hundreds, if not more, students have access to these messages. So that’s got to be profoundly difficult to deal with, and that’s one of the things we have to – parents need to sit down with their kids, and we in government need to be prepared for the emotionally trauma of what happens when you are bullied and the possibility that suicide could be a result.

Marsali Hancock: Well, Len, you bring up the point about suicide, and what kids are posting online can be incredibly traumatic. I think one of the areas – there are not that many cases that show bullying and online bullying lead to suicide but there are many cases of students who are considering suicide who post about it online, so for the criminal justice community to recognize that we’ve never had the capacity that we have now for intervention and early intervention, so here’s a couple of examples. This one doesn’t involve suicide but my second one will. We were at a school in North Carolina. One of the teachers had picked up a cell phone because they were texting in class. When she picked it up, it was actually an image of his private parts, so now that image is a sexting image of a child so it is child pornography. She wasn’t sure where she takes that and how she manages that. At the same school, another phone she picks it up, and it’s a gang paraphernalia on a 12-year-old with handguns, so she’s going, “Oh, no. Now what do I do? What do I have to do? What’s legal? What’s ethical?” She took it to the law enforcement officer there connected with the school, they pulled the child out. They found a stash of weapons near the school, but the best thing – and here’s my point – is now this 12-year-old is in a gang intervention program before he’s in the criminal justice post-crime.

Len Sipes: Why is it that so many people create that presence on the digital world? The mass shootings – not to deviate into that – but they oftentimes leave digital trails. They oftentimes basically tell people in subtle ways that this is what they’re going to do. I’m not quite sure if everybody recognizes that. How do you recognize a child in trouble? How do you recognize an individual in trouble through their digital presence?

Marsali Hancock: Well in the UK, there was a young woman who had posted she was going to commit suicide. She had over a thousand friends on her Facebook where she had posted it – no one did a thing. So they found her the next day, passed away.

Len Sipes: What are you supposed to do?

Marsali Hancock: You’re supposed to notify, so if you know that person for real, then you call the police. My nephew had a very painful situation where he was instant messaging on the platform MySpace, and as he was instant-messaging with her, he realized she was creating her goodbye communication. There were three people that she was instant-messaging with, saying her goodbyes, it was her birthday, she was in high school. He only knew her from high school so he only knew her as a school friend. He did not know her parents’ name or landline, and in today’s world, you don’t call landlines. So if I ground my child from their cell phone, nobody calls a landline and goes through mom. They don’t have that communication. So he didn’t know how to find that information, he wanted to call 911, so he starts doing reverse searches, he’s working, working. By the time he figures it out, law enforcement goes, she’s in a coma, and it’s a week before she passes away. But in his mind he will always wonder, “How do I report potential suicide when I don’t know what we used to know which was people’s parents’ names and their home address?” – Because digital friends don’t always know where you live. So part of the criminal justice charge in this generation is to help people learn how to report and respond when they see something. Now not ever case is tragic. There was another one last year where there was someone, a teen, a youth in the UK who had reported that she was going to commit suicide, and her friends did report to law enforcement, they reported to the State Department that sent a message to the UK that found the child and there was intervention just in time.

Len Sipes: Parents need to have age-appropriate conversations with their kids about digital safety and about the digital world because it’s obvious that kids do not separate the real world from the digital world, and I’m beginning to believe that’s applying to more and more adults.

Marsali Hancock: Well, see, we call it the real world and the online world but youth, there is no difference because which they do online is just like hanging out at their friend’s house. What they used to do at the corner store now is done in a group digital experience, either creating or they’re sharing instant messages or it’s on the texting, so there is no on-and-off line for kids. There’s just life.

Len Sipes: But you agree with me that the first line of defense is that parent having that age-appropriate with their child throughout the process and recognizing this, that maybe the digital world did not exist for them just a couple of years ago but it does exist for their 9-year-old, it does exist for their 12-year-old, it does exist for their 17-year-old, and regardless as to how much they protest it, they have to be involved in the child’s digital world.

Marsali Hancock: It starts when they’re 2 and they’re on an iPad. It starts when they’re 3 and they’re 4. Some interesting statistics from Rochester Institute of Technology – by second grade, kids start to harass each other online so that cyber-bullying message needs to happen before second grade. By fourth grade, they’re downloading illegal music and game files. By seventh grade, they are hacking into and out of servers where they don’t belong. So the time to prepare a child to be responsible and ethical and resilient online is as they experience technology. It will never happen by accident that we will have ethical and responsible children in the digital space. Adults must help them through how they navigate it. They don’t have a frontal lobe. They need us.

Len Sipes: Prevention is key from the standpoint of parents’ involvement with children and getting criminal justice personnel trained so they know what to do in terms of providing preventive messages and knowing what to do in terms of an adequate response.

Marsali Hancock: Well, and one thing that everyone can take from the show today, one of the most hurtful thing is when someone says to a parent, “Well, kids will be kids.” What they need from the criminal justice system and from other adults is, “We are here for you. We recognize it was traumatic. We’re going to help you navigate this” rather than “Oh, it didn’t cross criminal barriers. You’re out on your own.”

Len Sipes: You know, that’s just it. I think people need to understand that it is a complex world and they need to know they’re not on their own. There are places that they can go, like your organization, ikeepsafe.org, the FBI, the local taskforces. That’s the bottom line in terms of the messages for today.

Marsali Hancock: And the National Center for Missing and Exploited Children.

Len Sipes: And we’ll put those in the share notes. Ladies and gentlemen, this is DC Public Safety. We really appreciate your listening to today’s program on internet safety. Marsali Hancock, she is the CEO and president of the I Keep Safe organization, ikeepsafe.org. We really appreciate the calls, the letters, the emails, and we hope that you will have a wonderful listening experience in 2013. Please keep the comments coming in, and have yourselves a very, very pleasant day.

[Audio Ends]

Share

Deprecated: str_replace(): Passing null to parameter #3 ($subject) of type array|string is deprecated in /home/csosamed/public_html/podcast/transcripts/wp-content/themes/genesis/lib/functions/image.php on line 116

Identity Theft-NOVA-DC Public Safety

Welcome to “DC Public Safety” – Radio and television shows, blog and transcripts on crime, criminal offenders and the criminal justice system. We currently average 90,000 page views a month.

The portal site for “DC Public Safety” is http://media.csosa.gov.

Radio Program available at http://media.csosa.gov/podcast/audio/2012/03/identity-theft-nova-dc-public-safety/

[Audio Begins]

Len Sipes:  From the nation’s capital, this is DC Public Safety.  I’m your host, Leonard Sipes. Today’s program is about identity theft, and back at our microphones, Will Marling, the Executive Director of the National Organization for Victim Assistance, www.trynova.org.  Will’s been at our microphones before, and it’s always a pleasure to have him back. With Will today is Denise Richardson.  She is a consumer advocate, ID theft and education specialist, and, again, that’s going to be the meaning of the show. To Will and to Denise, welcome to DC Public Safety.

Will Marling:  Hey, thanks, Len.

Denise Richardson:  Yes, thank you for having us.

Len Sipes:  Now, Denise bear with me for a second.  Will and I were talking before the show about a couple things.  Number one, Victim’s Rights Week is coming up in April, and I certainly do want to mention that.  Also, Will, the National Organization for Victim’s Assistant that has been around since 1975.  You now have been given the task of certifying all victims’ advocates within the Department of Defense, correct?

Will Marling:  That’s right.  Yeah, just a recent decision by the Department of Defense is for us to become the secretariat to certify their victim advocate.  So we’re extremely honored, I have to say.

Len Sipes:  That is wonderful.  That is wonderful and that’s a huge undertaking.

Will Marling:  Well, it is.  It’s an important one.  It’s a demonstration of the military’s commitment to victim assistance, and it’s also their recognition of I think the important work that this organization has done historically as well as today.

Len Sipes:  Now you guys have been certifying victim’s rights specialist for quite some time.

Will Marling:  We have.  The National Organization for Victim Assistance is the secretariat for the National Advocate Credentialing Program.  It started in 2003.  So that’s a – it’s similar – it’s credentialing certification.  It’s all kind of — they look very similar but we provide a credential.  We’re the secretariat for that National Allied Professional Credential, and of course we’re honored to be part of that as well.

Len Sipes:  Oh, I think it’s wonderful. I think it’s an immense undertaking.  But I can’t say that this is immense and it’s not that I’m not excited about that but the Federal Constitutional Victim’s Rights Amendment is back on the radar screen, and I find that to be wonderful.  I mean one of the things that the public needs to know is that there are a lot of State Constitutional Amendments for victim’s rights.  36?  Correct?

Will Marling:  33 I think technically.

Len Sipes:  33.

Will Marling:  Three fifths of our nation’s states, that’s right, have it in their constitution.

Len Sipes:  Now, but we tried a federal constitutional amendment, victims’ rights amendment before but it lost just by a couple votes, right?

Will Marling:  Well, yeah, the attempt was to start with the Senate, and it was just two votes shy of cloister in the Senate, and of course that stopped it.  But we think the momentum, the timing, there’s so many things that have come together today, right now, for a victims’ rights amendment, you know, a 28th amendment to the United States Constitution to affirm victim’s rights.  And we’re — to be honest, we think it serves the nation to do this.

Len Sipes:  Well, it’s something certainly the hope for it is certainly something to pray for because you know the fact of victims within the criminal justice system – you know, I’ve been around in the system for 42 years.  We haven’t done the best of jobs in terms of taking care of victims.

Will Marling: Well, yeah, that’s right. I mean, I many times say the system is designed to get the results that it gets.  People just don’t realize that many times it works the way it’s actually designed.  So when you think about redesigning it, that’s one dimension.  Sometimes it truly doesn’t function meaningfully.  And at the end of the day, who’s the biggest stakeholder in this?  It really is the victims.  There are others impacted including communities.  But certainly the victims need to have that voice, and we believe a constitutional amendment in the United States Constitution would provide that social grounding as well as the legal framework for affirming socially the needs of crime victims and the consistent service that they deserve at every level.

Len Sipes:  You know I’ve talked to a variety of people who have been in the criminal justice system who victim’s advocacy was something that they were partial to.  They certainly were not against it.  But it was not first on their radar screen until they or a family member became a victim of crime.  When they walked through the experience directly as a victim or being very close to somebody who was a victim of crime, their attitudes changed remarkably.

Will Marling:  Absolutely.  I mean, it’s the doctor becoming the patient.

Len Sipes:  Yes, that’s exactly right.  That’s exactly right.  All right, but the program today is about undoubtedly theft. It’s one of the things that always is on my mind.  It is always on the mind of people throughout the country.  And I do want to reintroduce Denise Richardson.  She’s a long time consumer advocate and author of “Give Me Back My Credit!”  The victim of identity theft herself, Richardson set out to research the effects of this kind of theft and became a certified identity theft management specialist and trained and certified by the National Institute of Fraud and Risk Management.  Denise, this concept of identity theft, who within this country does identity theft not touch?  You can talk about burglary.  You can talk about sexual assault.  You can talk about violence.  You can talk about theft.  And that affects individual pieces of the population.  Identity theft, that issue belongs to everybody in the country.

Denise Richardson:  It belongs to everyone in our country, and it effects everyone in the world, because, unfortunately, as victims of this crime in this country, a lot of it can come from outside the country, and it makes it really tough on law enforcement to be able to even have the resources or ability to hold them accountable, to stop it.  So it allows the crime to just explode and grow in all sorts of ways.  From across the country, in the country and it hits everyone.  And one thing I’d like to say is congrats, Will, on all of your efforts because NOVA is one of the organizations that stepped out to realize that identity theft is a traumatic event.  And it can leave scars, whether they’re visible scars or not, and those scars can serve as a reminder of the pain that can last a lifetime.  If somebody has your social security number and is able to commit crimes and do other things in your name, it can literally take a lifetime to get through.  So for NOVA to come out and say, yes, this is a traumatic – can be a traumatic crime and there are victims, I just applaud your efforts in doing this.

Len Sipes:  www.givemebackmycredit.com is the Website for Denise Richardson.  Denise, now, the people listening to this, they are members of the criminal justice system, members of the public.  What’s the one thing that we need to know straight from the very beginning of the program?  What do we need to understand about identity theft that we don’t understand about it now?

Denise Richardson:  One of the frustrating points that I see over and over when I hear from other victims of this crime is that they didn’t know.  They didn’t know it could be this bad.  They didn’t know this could happen to them.  They didn’t know – they had credit monitoring.  So they thought just by monitoring their credit reports they would have known.  But you wouldn’t know if someone’s hijacked your tax return, if somebody is committing violent crimes in your name.  You wouldn’t know this.  So, to me, the number one thing is more education on today’s identity theft trends and the types of risks and impact it can have, because often I see it downplayed in the media that, oh, if a stats gone down, if there’s a statistic that’s gone down in one area, you would never – if you look at it this way, you would never say to yourself, “Crime’s gone down in our neighborhood, so I think I’ll leave my doors unlocked now.”  And that’s the type of message I think continues to come across because that’s what I hear from the consumers who turn victims and say, “Why didn’t I know about this? I always heard it wasn’t a big thing and the credit card companies would just take care of it for you.”  But there’s the problem.  Not all the crimes that are committed today are credit related.  Yet people are still equating the crime with just America’s credit card and the banks will take care of it for you, so I would say education.

Len Sipes:  When we’re talking about identity theft across the board, we’re not just talking about our credit cards.  We’re not just talking about our social security number.  We’re talking about every little piece of paper that is attached to us.  And I had somebody the other day, a pretty prominent person, came to me and said, “Oh, my God, my name and my – where I live and everything else is available on a Website.  How could that possibly be?”  And I said, “Well, they pull from public records.  Have you bought a house?”  He says yes.  Well, all that information in terms of who you are and where you live is a matter of public information.  That’s startling to a lot of people.  But so there’s – number one there’s a lot of publicly available information on you out there.  We participate in Facebook.  We participate in Google Plus.  We set up a Google profile.  There are public records that apply to us.  So from the very beginning people need to understand that a lot of information is publicly available about you off the internet, and thieves can go from there and get the rest of it, correct?

Denise Richardson:  Absolutely.  And these identity thieves have gotten sophisticated, and if you remember, that’s their job, to sit on Facebook or Twitter or wherever they can get a wide range of information, hack into large databases, whatever it is.  And they can take small bits of information that you have on your profile and put it together with other information that’s public, say, your property records or whatever.  So they use that information.  They sell it to other scammers who use it and then pretend to strike up a conversation with you or know you or connect with you, whatever it may be.  A small little bit of information can turn into the key that unlocks the door to every other bit of information, and you wouldn’t even know it.

Len Sipes:  Okay, now that we sufficiently scared the dickens out of everybody listening to the program, because I think identity theft is huge.  I think it is beyond measurement.  Will, do we have a sense as to how many Americans are impacted by identity theft on a yearly basis?

Will Marling:  Well, we do.  I mean the Consumer Sentinel Network, which is the Federal Trade Commission’s report; they indicate that for 2011 there were 1.8 million complaints.  Now what’s important to recognize—

Len Sipes:  But not everybody complains.

Will Marling:  Well that’s what’s important to recognize.  I mean in terms of uniform crime reporting, identity theft is one of those crimes that doesn’t actually get reported.  You can sort of speculate and extrapolate.  We know it’s a lot worse than that.  I mean, come on, partly because you are obligated as a victim to report.  Secondly, sometimes law enforcement actually won’t take a report, and even if they do, they might not know what to do with it.  But the challenge becomes just even collecting that information. So we always encourage people, tell the FTC, file a police report if you can because at the very least we need to know what’s going on.  What’s important to know is that, with the latest report, credit card fraud is only 14 percent of what’s going on here.  Government documents benefits fraud is 27 percent.  So when people say, “Oh, identity theft is just about credit card, and I had that happen, and the bank said they’d take care of it.”  Well that’s another issue.  The banks not necessarily going to report for you that there was another identity theft even though that’s what occurred.

Len Sipes:  What do you mean by government documents?

Will Marling:  Government documents, anything pertaining to a government document, for instance, getting a driver’s license in the name of somebody or getting government services in the name of somebody, filing a tax return in the name of somebody to get a $2,000 refund.

Len Sipes:  Do they really do that?  They’ll file tax returns?

Will Marling:  Oh, absolutely.  I mean it’s a great business.  It’s a massive business.  You know we don’t know exactly.  It could be $20 billion worth of business but it’s hard to quantify completely, but absolutely.  If they get your name, social security number — you can go online right now and find people’s PDF’s of their tax returns.  And so commonly in training I ask people you know, “Raise you hands, how many of you have a PDF of your tax return that says “Tax Return 2010″?” And people raise their hand.  Well if you have access to somebody’s computer and you just do a basic search and say “tax return”, and it comes back, I have your tax return plus all your kids, their social security numbers, your spouse.  See, I have all of that right there.  And what’s a simple way to default that?  Well rename that PDF file.  It could be one, call it “Grape Juice Recipe” or actually take it off your computer.  Put it on a jump drive separate but file it up somewhere.  That’s the easiest way to thwart that potential compromise.

Len Sipes:  You now I keep – the amazing thing about when we have these conversations about identity theft I say to myself, I’ve been in this system for 42 years.  I have four college degrees, university degrees, and you constantly come up with stuff that I never would have thought of in terms of discussing this topic, because our taxes are filed on our computer, and we’ve done exactly what you’ve said.  Never crossed my mind to do this.  Never crossed my mind to name it grape juice recipe.

Will Marling:  Well you’re a smart guy, right?  It’s just an awareness issue.

Len Sipes:  It is.

Will Marling:  I mean that’s what this will confirm.

Len Sipes:  That’s what Denise just said.  So, Denise, what are the prevention tips we need to get out?  Is it okay to go to them that quickly?

Denise Richardson:  Well I would just to expand on what Will was saying, to give you an example of how you say you hadn’t heard of this or changing your name.  People do not know that their kids who are on Facebook and Twitter and they have their own iPhones and everything, these iPhones are nothing more than a little computer.

Len Sipes:  Oh, absolutely.

Denise Richardson:  They need to be protected as well.  And if your kids are using your home computer and they’re sharing music, your files could be open for sharing everything.  And that is a lot of how – you know you could be on a network in your neighborhood coffee shop and if your files are set to open and to share, anyone can get your information.  And as far as the income tax fraud, filing fraudulent tax returns, I live in South Florida, and the FDC report that just came out named South Florida as the number one metro area for this type of crime and Florid itself as the number one, again, several years.  And it stills strikes me that we – and the FDC came out and said two weeks after tax season opened identity theft crimes jumped 50 percent.  And the next day – I mean this was on our front page of the paper every day for a week.  In between that time I would read an article online by somebody out there saying, “Do we really have to worry about identity theft?  Is it just fear mongering?”  And in the meantime I’ve got all these emails from consumers saying, “What do I do?  I can’t get my tax return.  I plan to pay my property taxes with it.”  And so I’m seeing one thing that’s reality in my life every day but then when I read this kind of information I think it is harmful.  So I just think we need to send a better message that I think people can learn how to protect themselves better.  There’s no way to prevent it, but you can do things and talk to your kids or your neighbors, seniors—

Len Sipes: Okay, I have to break because we’re way past the half way mark and I have to reintroduce both of you, and then we’ll get back to the conversation.  Our guests today, ladies and gentlemen, Will Marling, the Executive Director of the National Organization for Victim Assistance, been around since 1975, www.trynova.org.  Our other guest is Denise Richardson.  She is a consumer advocate and a ID theft and education specialist.  Her Website is www.givemebackmycredit.com.  Okay, so we’re way into the second half.  Either one of you.  So again, what we’ve done is scared me, scared all of our listeners.  I need to focus on what we can do.  Is there one place that we can go to get information about this?  Is there a one-stop service?  Where do people go to get the information they need?

Will Marling:  Well, yeah, let me jump in here.  There isn’t one place to go.   Of course, the internet offers us access to a lot of different resources quickly, but we try to principalize this so that people build an awareness, because however you instruct people about vulnerabilities, there will always be another tool that’s used by perpetrators, a new technology or whatever.  So we talk about raise the fruit.  Have you ever heard the phrase “go for the low hanging fruit.”?

Len Sipes:  Sure.

Will Marling:  We always talk about raise your fruit because make it even that much more difficult.  Can that stop it all?  No.  But why hand them your tax return on a PDF?  Why keep all your sensitive documents on your computer when you don’t access them regularly and you can put them on a jump drive and lock them up in a box?

Len Sipes:  Well, but there has to be a mantra in terms of all of us simply need to be aware that if our kids are file sharing on computers and the bad guys have access to our computers, there’s got to be a sense that every person that is not known to you, every email, every phone call, every snail mail communication where that person is not known to you, you immediately be suspicious of it.  I mean there’s got to be a grounding that we can start people off with.

Denise Richardson:  I agree.  And I think it is being informed and being alert, being aware that you shouldn’t’ ever give your information to anyone who is soliciting it.  And you shouldn’t blindly trust anyone who calls your house.  You shouldn’t trust your caller id anymore.  You know and I say these things and people will say it’s fear mongering, but there’s where the issue lies.  IT’s just simple education and trying to learn what you can do.  I don’t expect a consumer out there to know fishing, smishing, vishing, skimming, spoofing, cook jacking, tab napping, all the names that people who work in it every day understand, but I’m all for – what my passion is about is just raising awareness to what you can do, what should you do.  You should know about the latest scams.  You should know that you shouldn’t put too much information on your profile.  You should stop and think before you publish anything.  Ask yourself, “If I hit this publish button and it was going to be on the front page of the newspaper tomorrow, would I do the same thing?”  And you might stop and think about it.  You know we tend to hide behind the screen of the computer thinking everything is, oh, just our friends see it.  But that’s not the case.

Len Sipes:  You mean, just my friends read my Google Plus profile?

Denise Richardson:  Well, some people feel that just your friends are getting into your space, into your – you got your settings set one way.  But the settings can be changed.  They can be hacked.  People can use the information you put in your profile.  For example, you love lacrosse.  You do this.  You do that.  And they can pretend to have those same exact interests and send you a note and say, “Hey, what school did you go to?  This is what I did.”  And your guard is down.  We tend to trust, and criminals know that, so they take advantage of that trust.

Len Sipes:  Hey, you and I are both friends with Will Marling, so obviously I’ve got to be legitimate if you and I share a friendship with Will Marling.

Denise Richardson: I would say so, exactly.

Will Marling:  Sure.

Denise Richardson:  And that’s what they think because, oh, she was sent – I can not tell you how many times I get a call from even a friend who knows that I work in this industry.  Just a couple weeks ago somebody called and said, “I think I got myself in a world of trouble.”  I said, “What did you do?”  And he said, “I went to Yahoo! And it said that they were protecting me because I didn’t have – I had to re-put in my information, so I did, and then it asked for my social and I—”  And I said, “Please tell me that you didn’t give them all that.”  He did.  So he spent hours changing his PayPal account, this account, that account because then I found out in asking him a few questions, he has the same password.  So if a criminal gets a hold of – hacks into one of your passwords, and they’re easy to guess because we have – we use combinations that they figured out through our public information.  Just imagine if they hack that one password how much havoc they can create in five minutes time.  Check to see if you have a PayPal account, if you have an Amazon account, anything.

Len Sipes:  You’ve just made thousands of people very uncomfortable because the research says that’s exactly what we do.

Denise Richardson:  And I hope I made them uncomfortable.  That’s the point.  I want them to go out and say, “Oh, my gosh, I need to change my passwords.  I need to strengthen them.”  I did a speaking engagement at one point and I asked the people in the audience how many people use the name of their car or where they graduated or what year they graduated in their pass code.  And over 75 percent of the people raised their hand.  And I then explained why that wasn’t a good idea, and someone said to me, “Oh, my gosh, I do that with all of my passwords.  I’ll use my spouses name, my spouse’s birthday, my child’s name, my dogs name because it’s so easy to remember.”  Criminals are smart, and they know that.  So never – unfortunately you’ve got to come up with ways to have stronger, longer, unpenetratable passwords.

Len Sipes:  All right, but the one thing – to me this is the best suggestion of them all and that is is that anytime you get a communication from anybody that is part of your financial world, so you get an email from your bank saying your account’s been compromised.  You get a call, an email from your credit card company saying that your account has been compromised.  Immediately contact them independently on your own through a number and through a source that you know to be legitimate and then ask that person a question.  So never proceed with that initial contact.  Always go to the source.  I’ve always found that to be the most powerful of them all.  Am I right or wrong?

Denise Richardson:  You’re absolutely right.  You have to do that because a lot of these scams now will appear to come from Go Daddy or Amazon or your bank or even the U.S. Government.  And they’ll provide you with here’s the fraud department number to call.  We suspect something and people will panic and call that number.  What they don’t realize is they’re calling right into the thief.  So always – so never use a phone number, and your bank is not going to email you about something like that.

Len Sipes:  Yeah, but people don’t know.  I mean—

Denise Richardson:  Right.

Len Sipes:  –we got a phone call the other day about our credit card being misused.  And the point is that my wife had a conversation with the credit card company regarding that, and it was very legit and very straightforward, but my wife shouldn’t have done that.  My wife should have hung up and called the credit card company back.

Denise Richardson:  Well because sometimes what happens when they call you, they have quite a bit of information on you already, and that tends to make consumers think, oh, yes, that’s my bank because how would they know that?  But if it really is, your bank is going to understand if you say, “You know what, I’m concerned about identity theft.  So let me hang up and call you through the number that I have for you.  Do you have a particular extension?”  Something like that.  Or if it’s legit your bank should be able to tell you your password on that account, tell you everything you want to know, not the other way around where you have to confirm it with them.  I recently had the same thing happen to me with my bank calling about another credit card fraud.  But today the criminals are getting even more savvy with telephone calls, using the phone to hook you into falling for anyone of their many scams.  So if someone calls you, never give out information.

Len Sipes:  If you post on Facebook that you’re going to Florida and then the scammer calls you up and say you know there’s –evidently you’re in Florida and you have problems with your credit card, you immediately assume that this is legitimate.

Denise Richardson:  Exactly and I always tell people, oh my gosh, stop telling people where you are every minute of the day because people have been being robbed because they watch this.  If they have enough information and they know where you live and here’s a picture of me, I’m sitting a thousand miles away on a sunny beach.  We’re all here on vacation.  There was just a story in the news not too long ago where the teenage daughter didn’t know that she was giving out any information like that that she shouldn’t and said “Oh, we’re at the airport.  She text right at the airport, “We’re getting on the plane.”  Well her friend posted it and a friend of that friend, they tracked it back to because they did catch the people, robbed their house while they were gone.

Len Sipes:  Denise we have one minute left.  What point do we need to make that we haven’t made in one minute?

Denise Richardson:  That there are available – there’s information out there, and the best way that you can avoid becoming a crime victim is to be informed, look out for the risks and know the impact and have a plan of action.

Len Sipes:  Yeah, but there’s so much to know.

Denise Richardson:  There is.  I mean you can’t possibly learn it in one moment. You can go to the FTC.gov site.  They have a lot of information.  Will’s site, I’m sure, does.  My site at – on my site I have areas, categories for the current scams.  I try to keep that up-to-date, the types of risk, what to do if you’re a victim.  So there’s definitely information out there.  And here’s something.  If you’re ever in doubt, you get an email that you think might be a scam, type it in your browser.  Chances are people have already written about it and learned about it.

Len Sipes:  Well that’s a wonderful idea.  All right.  Our guests today and in terms of summarizing and it’s a lot to summarize, Will Marling, Executive Director, National Organization for Victim Assistance, www.trynova.org.  Also with our theft identity – identity theft expert, Denise Richardson.  She’s a consumer advocate and an ID theft and education specialist.  Her Website is www.givemebackmycredit.com.  It seems as if the Federal Trade Commission just Google or your favorite search engine, Federal Trade Commission and look for consumer fraud or identity theft, and there’s information there.  What I heard today was about file sharing in terms of especially in terms of your kids and downloading music or file sharing, relabeling your computer files to be sure that if you’re hacked that the person won’t go and find your important documents.  Be careful with social media in terms of what public information you make public, change your passwords, go to the source if you get a call from somebody or contact from somebody. Don’t continue with that.  Just hang up and go to that source independently so you know that it is legitimate.  Ladies and gentlemen, this is DC Public Safety.  Have yourselves a very pleasant day.

[Audio Ends]

Share

Deprecated: str_replace(): Passing null to parameter #3 ($subject) of type array|string is deprecated in /home/csosamed/public_html/podcast/transcripts/wp-content/themes/genesis/lib/functions/image.php on line 116

Scam Victims United-NOVA-DC Public Safety

Welcome to DC Public Safety – radio and television shows on crime, criminal offenders and the criminal justice system.

See http://media.csosa.gov for our television shows, blog and transcripts.

This radio program is available at http://media.csosa.gov/podcast/audio/2010/03/scam-victims-united-nova-dc-public-safety/

We welcome your comments or suggestions at leonard.sipes@csosa.gov or at Twitter at http://twitter.com/lensipes.

– Audio begins –

Len Sipes: From our microphones in downtown Washington, D.C., this is D.C. Public Safety. I’m your host, Leonard Sipes. Back with the National Organization for Victim Assistance with Dr. Will Marling, the Executive Director of NOVA, and Shawn Mosch. She is a victim of fraud, but she turned that victimization into positive action. She is now with Scam Victims United at www.scamvictimsunited.org, but before talking to will and talking to Shawn, I want to thank everybody, once again, for listening, watching, and reading the materials that we have at our website at media.csosa.gov, D.C. Public Safety radio, television, transcripts, and blog. We are up to 200,000 requests on a monthly basis for everything that we do, and we are extraordinarily appreciative of everything that you’re providing us with, even the comments as to how many times I screw up, or ideas for new programs and directions in terms of where we should go, and meaningful conversations in terms of the comments log. You can log into the website, again, media.csosa.gov, or you can email me directly at Leonard L-E-O-N-A-R-D.sipes S-I-P not T, P-E-S@csosa.gov or you can follow us via Twitter. That’s Twitter.com/lensipes,L-E-N-S-I-P-E-S, no break in those words. Back to your program. Dr. Will Marling, the Executive Director of NOVA, and Shawn Mosch, the person basically in charge of Scam Victims United, and to Will and to Shawn, welcome to D.C. Public Safety.

Will Marling: Thanks, Leonard.

Len Sipes: Will, I’m going to start off with you. How does the National Organization for Victim Assistance get involved with this issue of fraud. It’s pretty apparent to me – first of all, ladies and gentlemen, National Organization for Victim Assistance has been around for decades. At the very beginning of my stint in Washington, D.C., thirty years ago, there was the National Organization for Victim Assistance. When I worked as a senior crime prevention specialist for the Department of Justice’s clearing house, they also gave me the victim’s beat, which I knew nothing at all about, and the folks at NOVA were wonderful in terms of instructing me, and now we have Dr. Will Marling, who is now in charge of NOVA. How did we get into the scam and fraud issue?

Will Marling: Well, I tell you, we have a victim assistance line, Leonard, and you know, our expertise is primarily in violent criminal victimization and identity theft, but we get a lot of calls on this line. And of course, when people are looking for assistance, they see victim assistance, and we get, sometimes, a wide range of victim calls, but fraud victims, is there any angle, opportunity, remediation? What do they do? And while that’s not our area of expertise, we felt it important to start looking for at least some resources. We want to be able to at least hand them something, and that’s when we had the opportunity to connect with Shawn Mosch and Scam Victims United. And she’s a great resource, and the website’s fantastic. It’s a really useful tool.

Len Sipes: Is there any difference between identity theft and scams and frauds. It’s all pretty much the same thing, correct?

Will Marling: Well, no, no. I mean, you know, it all depends on the nature of the victimization, of course. Identity theft, you can have your identity stolen and never even know about it. The average identity discovered, the average identity theft discovery is twelve months, maybe, with a victim. With a scam situation, you’re engaging in something, and you believe that it’s an ethical, reputable approach, and then you discover that it’s not. There’s deception and this kind of thing, so there are different dynamics to it, and Shawn’s situation is even more irritating. She can tell you about that, but especially when people think they’re getting something, but they’re not, actually, that’s fraud.

Len Sipes: Absolutely. Now, I think I’m a perfect example of where I did not know. I mean, I’ve been in the business for forty years and I’m having a hard time distinguishing between identity theft and fraud. So, you know, there’s probably lots of people out there who may see – maybe they’re as dumb as I am and they see these issues as being one and the same. I mean, in essence, we’re concerned with burglary, we’re concerned with theft, we’re concerned with robbery, but much more money leaves our pockets through ID theft or through fraud and scams than through garden variety street crime, correct?

Will Marling: Well, you know, statistically, some of that’s hard to track. You know, we have uniform criminal reporting and a lot of that is related to the violent criminal side of things, which is horrific. But from the financial side, the emotional impact could be significant as well. When people take your earnings and something you’ve been saving for, or sometimes people end up losing quite a bit, and end up having to try to recover that, but at the heart of it, it’s an attack on us, personally, and it really steals something from us emotionally, many times, traumatically, and that’s why we still emphasize that. We recognize that certain outcomes from physical violence are different, and we as an organization are still committed to supporting violent criminal victimization folks who have that need, but we definitely see the growing, increasing demand on supporting fraud victims, because it’s there. And in the economic situation we’re in, these perpetrators are looking for every angle to still line their pockets with more money.

Len Sipes: And we’re going to do our very best today to stop them. Shawn Mosch, a victim of fraud. Tell us a little bit about that story and what brought you to create scamvictimsunited.org or scamvictimsunited.com.

Shawn Mosch: Well, back in 2002, my husband and I were selling a 1951 Buick Special that he had owned since he was in college, and we didn’t have a place to store it anymore, so we were selling it, and put an ad online, got some people that were interested. There was one person that sent us a cashier’s check to pay for the car and also to pay for shipping the car from us to them.

Len Sipes: Right.

Shawn Mosch: And we brought the cashier’s check to the bank, and because we didn’t know this person at all, we said to the bank, “We’re selling a car and we want to make sure that this check is good. You know, I don’t want to ship the car off or start using the money from this check and find out later it’s bad, and then we’re left in the hole.” And they said, “Oh, no, it’s a cashier’s check. Those are verified, it’s good in twenty-four hours. No problem.” And I said, “Wait, verified as good in twenty-four hours? That seems a little fast.” And they said, “Yeah, because cashier’s checks process faster.”

Len Sipes: Right.

Shawn Mosch: Twenty-four hours. That’s all you need to wait.

Len Sipes: I thought a cashier’s check was as good as cash. I’m sorry, go ahead.

Shawn Mosch: That’s the other thing that, you know, “Oh, they’re as good as cash,” so they assured me it had been verified, it was good, it was clear. The funds were available. And I said, “Okay,” so we went forward with the transaction. So part of that money was for shipping the car, and that we did to the person that was going to take care of that transportation, and then the other part was for the sale of the car, which we kept. So one week to the day later, the bank called us and said the check was counterfeit. And I said, “Well, what does that mean for me, because you already told me it was good and it was clear. You can’t un-ring that bell.” And they said, “That means you owe us the money.” I said, “What do you mean, I owe you the money? You told me it was good. I wasn’t going to touch the money – ”

Len Sipes: Until you told me it was good.

Shawn Mosch: Until I knew it was good and it was clear and it was verified. “You told me it was. What did I do wrong?” And actually, once I got talking with our legal department, my husband even asked them, and this was now days after we had found out it was counterfeit, and he said, “How long does it really take for a cashier’s check to clear?” And they put him on hold and then came back to the phone and told him, “Twenty-four hours, sir.” And we said, “Well, wait a minute. If that was accurate, we wouldn’t be having this conversation.”

Len Sipes: It is, it is –

Shawn Mosch: Like it’s the real time, and they were never able to give us that information. So basically, I was upset. I started talking about this to anyone and everyone that would listen, started a message board, and through the message board, we found other people that this was happening to. So at first, I thought it was just my bank’s policy was messed up. So then, as I started to look at it, I found, ‘No, it’s the banking system.’ The banking system will tell people the check is good, it’s clear, and make the funds available in twenty-four hours before the check has been honored by the issuing bank. So now you can use and spend that money and then it could be 7-10 business days later that it comes back as counterfeit, and then you are liable for all that money.

Len Sipes: And how did you, how did all this make you and your husband feel?

Shawn Mosch: Oh, we were very upset.

Len Sipes: Yeah.

Shawn Mosch: So, we started talking to the media, and once it started to get in the media, we got even more people that were telling us, “Oh, it happened to me. Oh, same thing,” so then we started the website, Scam Victims United, and that was in early 2003. In the first two years of our website being operational, we helped stop over $2,000,000 from going into scams.

Len Sipes: That’s amazing. Now, okay, so you hold the key, then, for the rest of us, to tell the rest of us what not to do.

Shawn Mosch: That’s ironic that you used that phrase, because I did a presentation called ‘Education is the key.’

Len Sipes: Right.

Shawn Mosch: So we can all hold the key. Education about scams and frauds is the key.

Len Sipes: But every day, we are confronted with these scams, and I remember being on my computer and being three-quarters of the way through this statement from my bank and it just struck me – again, I’ve been a senior crime prevention specialist for the federal government. I’ve been involved in the crime prevention arena for a decade. I’ve been in the criminal justice system for forty years, and I was within a keystroke of sending fraudulent information through a phishing scheme. Any one of us could fall for this. I was on Gmail the other night and, you know, the scams that run on Gmail seem to be every single day. This is amazing. I mean, we are under attack.

Shawn Mosch: Every time we think we got the word out about this scam, they’re going to invent another one.

Len Sipes: And they look so legitimate.

Shawn Mosch: Oh, yeah, so many of them, they use the logos and all the right letterhead, and you get the check – the bank managers can’t even tell, by looking at the check, if it’s good or not.

Len Sipes: That’s amazing.

Shawn Mosch: But this is why I always tell people that if you are sent a cashier’s check or money order – because they’re also counterfeiting money orders and traveler’s checks – if you’re sent any one of those for payment for anything – something you’re selling online, a donation to a charity, payment for a room you’re renting, if you are sent cashier’s checks, money orders, traveler’s checks, and then told you need to wire any money to anyone, it’s a scam. They will go as far as doing on Craigslist – they’ll go out there and find somebody who’s renting a room. They’ll say, “Yep, I want to rent your room, send you a cashier’s check for the first month’s rent and deposit.” Then, once they know you’ve deposited the cashier’s check, they’ll say, “Oh my gosh, something happened. I’m not going to be able to move in with you. I’m so sorry. I have to back out of our contract. Can you just wire me back the money?”

Len Sipes: Wow, that’s amazing.

Shawn Mosch: This is the thing that I get all the time. So many people would say, “Well, I wouldn’t be dumb enough to wire money to somebody I don’t know.” But in that situation I just described, if you were renting out a room in your home to someone, and then they emailed you and said, “My mother passed away. I have to stay where I’m living to help out the rest of my family and I have to back out of our contract and not move into your room. I know I already sent you a thousand dollars. Keep a hundred for your trouble and inconvenience. Wire me back the rest.” Most people go, “Oh my god, I’m so sorry. Yes, of course, I’m going to send you your $900.”

Len Sipes: Right. Okay, well, what are the three major things, as consumers, as regular, everyday people, that we can use to prevent this sort of thing from happening to us?

Shawn Mosch: Like I said, if you’re sent any sort of check, cashier’s check, money order and asked to wire any portion of it to anyone for any reason – I don’t care if their grandma died and their house fell down on top of them and they need the money – don’t.

Len Sipes: It’s a fraud.

Shawn Mosch: That’s the first thing. I mean, absolutely 100%, every single time I have ever talked with a person and that is their situation, it is a scam.

Len Sipes: Okay, give me another.

Shawn Mosch: Again, like you were talking about with the phishing scams, never ever click on a link in an email. If you get an email from your bank that says that there’s a problem with your account, call the customer service number to your bank and talk to a real human being.

Len Sipes: And don’t call the customer service number listed on that email. Right.

Shawn Mosch: Yeah, you can’t call the phone number listed in the email, because that might be redirected to the scammer, who is going to tell you, “Oh, yes, we need your information.” You know your bank. You bank with it every day. Pick up the phone and call their local number. Same with credit cards, where they say there’s a problem with your credit card. Flip over your credit card; look at the back. There is a customer service phone number. Call that number and say, “Hi, I got an email saying there’s a problem with my account.” If there really is a problem with your account, their help center will be able to pull it up and there will be a big flag on your account that says, ‘Yep, here’s the problem we need to fix.’

Len Sipes: But even –

Shawn Mosch: Don’t click the links on the emails.

Len Sipes: The example that I gave a little while ago with Gmail – I mean, all they’re asking for is account information, and I’m saying to myself, “Well, they’re not asking for my social security number. They’re not asking for my date of birth. They’re not asking for my home address. They simply want the account information. How could that possibly help them?” And then I said to myself, “Oh, silly, everything in there – something in there – whatever it is that you used to sign up for it provides them with access to practically everything else that you’re doing. Don’t do it.” And I emailed it to Gmail and they emailed back saying, “Yes, it’s fraudulent. Don’t worry about it.” But what that does is there are so many of these frauds going on, it almost makes you wary of any official correspondence coming to you via the Internet.

Shawn Mosch: It does, and I noticed that with myself, that every email I read, I kind of look at it and go, “Well, is this person really up and up?” And I do my research now. Google is a wonderful resource. If you are in doubt at all, copy and paste the person’s email address into a Google search, and if they have done this scam to somebody else, there is probably a post somewhere. We have had so many people come to our website because they did just that. They either Googled the name of the scammer, their email address, the companies they said they were working for, or their phone number, and it brought them right to our website, because so many people have posted, “Here’s the name and information about our scammer on our message board, so then we’re helping others to prevent the scams, because they did the Google search and found the information.”

Len Sipes: We’re more than halfway through the program. I want to reintroduce our guests. Dr. Will Marling is the Executive Director of the National Organization for Victim Assistance, long, venerable, and honored within the criminal justice system for the work that they do. You can reach the National Organization for Victim Assistance, www.trynova.org. www.trynova.org. Our other guest today is Shawn Mosch. She is a victim, but more important that she took her victimization and turned it into something wonderfully positive. She is the person who organized Scam Victims United and it’s www.scamvictimsunited.org or www.scamvictimsunited.com. All right, so basically, any time you get a cashier’s check, any check, and you’re asked to wire the money back, that’s an obvious fraud. You know, never click any attachment or an email asking for any personal information. Go back to your bank, go back to your credit card company, go back to Google and just be suspicious of just about virtually any email requests that you get. But I bet you people are scammed all the time by regular U.S. mail.

Shawn Mosch: They are. The ones we see the most are the Internet ones, because most of the scammers are in another country and the problem is, you report the crime to your local police, and they can’t do anything jurisdiction-wise because they’re in another country.

Len Sipes: Because they’re in Russia.

Shawn Mosch: Now if Nigeria, the United Kingdom, usually. Sometimes Canada. But Nigeria is probably – if I had to put a top three, it would be Nigeria, U.K., and then Canada.

Len Sipes: Mm, that’s amazing. So I was overly stereotypical, because I heard so much about servers in Russia, even if they’re in other countries, being used for scams, but England and Canada and Nigeria, those are the three. All English commonwealth countries.

Shawn Mosch: Exactly.

Len Sipes: Interesting, interesting.

Shawn Mosch: Yeah, with Canada, the big one was the Canadian lottery, that they would get a letter saying that they had won the Canadian lottery and then you have to contact this person. Now you might get that first letter of contact via snail mail, but after that, things like the cashier’s check are usually sent overnight, like FedEx, the reason being the scammers know if they mail that counterfeit cashier’s check in the U.S. mail, that’s mail fraud.

Len Sipes: Yeah, and there’s a whole organization to –

Shawn Mosch: They use a delivery system, then it’s not.

Len Sipes: Okay, understood. I mean I get the British lottery scam every single night in my Gmail. When I open up my Gmail, the British lottery scam is there every single night.

Shawn Mosch: Oh, I get it too. I get it sent to admin at scamvictimsunited.com.

Len Sipes: [Laughs] Well, again, what is the larger perspective in all of this, Will Marling, Executive Director of NOVA. What is the larger perspective? Have we covered it in terms of our introduction? I would imagine – my guess is that this is happening a hundred times more than burglary, even though we don’t have hard data on it. My guess is that this is happening far more than street variety crime, and that this is a real issue, not only for this country, but for organizations like yours.

Will Marling: Well, sure. I mean, it’s hard to quantify, certainly, because these spamming situation, they can send out a hundred million emails and even a very tiny percentage of response is still a meaningful response for them, because it’s just the law of large numbers. Our main concern is educating people, like Shawn does so well, because really, at the end of the day, a lot of it truly is common sense, and that isn’t to minimize people or to criticize people who have fallen for this, because to be honest, we’ve had people perpetrate on our organization for things. And sometimes, you know, you want to step forward and, with an open hand, meet people and assume the best, but then you discover later on – but with a lot of these things, it plays on certain intrigue that we all have. The opportunity may be to get something for nothing, like some of these phishing opportunities, but as much as that, many times it’s just stopping and thinking. You know, does the bank need to ask you for all your personal information? Shouldn’t they have it already? I mean, why would they need to verify all that?

Len Sipes: But it’s impossible, though, Will. I mean, don’t you think, in the situation with Shawn, somebody handed her a cashier’s check. If somebody handed me a cashier’s check and if my bank said, “You know what? You’re good to go,” I would pretty much bet the farm that I’m okay.

Will Marling: Well, sure. And that’s because you have a good relationship, at least at the time, with the bank, and you’re trusting them. But again, you know, we’re talking cashier’s checks, and so it’s an awareness issue. It’s a consumer consideration to say exactly what’s going on here, and to be honest, it’s going to continue, I presume, at that level, until the banks become more committed to educating consumers themselves, and their clients, their customers, as to what truly can happen. I can’t see any reason for the bank to say, “No, we need to hold onto this. There could be a concern. We see a profile, we see a pattern, and here are the steps we recommend you take. Let’s work together on this.” But the bank just needs to recover their money.

Shawn Mosch: Banks don’t have any incentive – the bank doesn’t lose any money. It’s the customer that has to pay back, so if the bank was liable, you know there would be changes, that they would be making sure that the check is legitimate before a penny went out. And I have stressed to people that all it would have taken was for the bank to say, “The funds are available, but the check might not clear for 7-10 business days.”

Len Sipes: Right, so let’s not touch the money until –

Shawn Mosch: Probably 96% of the scam victims. Excuse me?

Len Sipes: I said, so the bank would say, “Let’s not touch that money until it does clear.”

Will Marling: Right.

Shawn Mosch: Right, but on a banker’s stand, because I’ve talked to the bankers on this issue, they say that for every cashier’s check that comes in, you have to hold it for 7-10 days, we’re going to get pissed off customers coming in and going, “Well, it’s my money. I want my money now.” You know, “My brother-in-law wrote me that cashier’s check, so I know it’s good.”

Len Sipes: Well, let him sign a release, then.

Shawn Mosch: In that case, have a form that they sign that says, “I’m releasing the bank of any liability. I understand that it might still come back on me.” At least tell people that it could take 7-10 business days, versus saying “Twenty-four hours. Good as gold.”

Will Marling: Right. I mean, all you need to do is hold onto the money. My thing is, okay, clear as the bank hands you the money – well, hold onto the thousand dollars for two weeks, because you can turn it back into the bank, right?

Shawn Mosch: Exactly.

Will Marling: But people don’t think about that. Naturally, we’re trying to conduct our business, and if the people you trust, which is your bank, like Shawn’s saying, since she was fifteen – you know, the bank says, “Hey, you’re okay.” Well, you know, it’s like somebody in the business saying, “It’s okay.” And that’s what needs to change.

Len Sipes: It’s sort of like the automobile industry years ago, where in the crime prevention field, we knew that by computer chips and keys, would virtually eliminate, to a large degree – now they can come along and tow the car away – but if you would have a computer chip in a key, that would eliminate probably 70% of automobile thefts. They’ve done that, and automobile thefts have plummeted. It’s the same way with the banks. They’ve got to step up and take responsibility, it sounds like.

Will Marling: That’s what it sounds like to us, too.

Shawn Mosch: Exactly.

Len Sipes: Okay. Shawn, we only have a couple minutes left. This program has flown by like wildfire. Give me a couple more tips in terms of what people need to do.

Shawn Mosch: Again, Google is your friend. Google everything and anything. Go to places like our website. We have a message board where we update information on scams. You can do a search there. We’re also on Twitter and Facebook, where you can follow our blog, where we’ll let you know about the latest and greatest and newest twists in scams.

Len Sipes: I’m going to do that.

Shawn Mosch: Also checking out the Internet Crime Complaint Center. When we were talking about statistics and how much money is lost to scams, the Internet Crime Complaint Center keeps track of that kind of information.

Len Sipes: Is that the FBI center?

Shawn Mosch: They always say – excuse me?

Len Sipes: Is that the FBI center? The Internet crime center that you just mentioned?

Shawn Mosch: They are a coalition between the FBI, the national white-collar crime center, and a couple other organizations.

Len Sipes: Okay. What’s their website? Do you know offhand?

Shawn Mosch: Um, the ic3.org, I believe?

Len Sipes: Pardon?

Shawn Mosch: It’s Internet Crime Complaint Center is probably the best place to go.

Len Sipes: That’s why – just Google that and people can get to it. All right, do you have another one?

Shawn Mosch: Exactly. Well, I was just going to say that even their statistics, though – and they will tell you this, too – are low, because they know that not everybody reports scams and frauds. Because most people will say, “Oh, I’m embarrassed that happened to me, that I fell for it.”

Len Sipes: I was mortified when it almost happened to me. Go ahead, please.

Shawn Mosch: If somebody robs you on the street corner, you would report it.

Len Sipes: Right.

Shawn Mosch: People who are victims of Internet scams and frauds need to report that, too, so that we have accurate information of how much is being lost so that we can encourage our lawmakers to change things to protect the customers, because if we would have kept all that money in the U.S., the economy would be doing a little bit better right now.

Len Sipes: Oh, absolutely. And you’re right, looking at it from an economic point of view, you’re a thousand percent correct. I wonder how many millions or billions are leaving the country every year due to fraud. We have a minute and a half left.

Shawn Mosch: If just our website can stop $2,000,000 in two years.

Len Sipes: Wow. Okay, and I’ll give out the website at the end of the program. Will, do you have any closing remarks?

Will Marling: Yeah, just to clarify, it’s ic3.gov. Ida Charles three dot gov is the Internet Crime Complaint Center.

Len Sipes: Right. Ic3.

Will Marling: Yeah, that’s the one we give out, and snopes.com is also another site that collects scams, aberrant emails – it’s snopes.com.

Len Sipes: Okay.

Will Marling: And I think we’re becoming more educated – there’s no question. But you feel for folks who just don’t realize what’s down the pike. Wailing is another issue for even executives, where people get information on the inside a little bit, enough to go through, say, an administrative assistance and forward on, and so the executive thinks that it’s legit because the administrative assistant forwarded it on. It all looks legitimate. So even within a company, you just have to be careful with your email. You have to know exactly who you’re talking to and what they’re talking about.

Len Sipes: Well, we’re out time and I do want to summarize; what I’ve heard today is that if you’re sent a cashier’s check and your asked to wire money back for whatever reason, don’t. It’s a fraud. Never click on an email where they’re asking for personal information. Contact the bank, contact the credit card company. Every email request, be extraordinarily suspicious as to what it is that they’re asking for. Google is a friend, one of the things I heard from Shawn. Google that information to see if there’s anything that pops up on the Internet in terms of fraud information. You’ve got the Internet Crime Complaint Center, i3g.gov, and we’ll mention snopes.com S-N-O-P-E-S.com. And I do want to emphasize, again, Shawn’s website: www.scamvictimsunited.org or www.scamvictimsunited.com. And once again, for Dr. Will Marling, the Executive Director of NOVA, it’s www.trynova.org. Ladies and gentlemen, thank you again. 200,000 requests. We couldn’t be successful unless we had your input, your suggestions, and criticisms, and feel free to point out all the times I screw up. I am enjoying those. And again, for those of you who ask us questions that are outside the scope of the radio show, that’s fine with us. We’ll find help for you, so feel free to get back in touch with us if you like. Again, it’s leonard.sipes@csosa.gov. Again, that’s for the Court Services and Offenders Supervision Agency in downtown Washington, D.C., or follow us via Twitter at Twitter.com/lensipes. I want everybody to have themselves a very, very pleasant day.

– Audio ends –

Share

Deprecated: str_replace(): Passing null to parameter #3 ($subject) of type array|string is deprecated in /home/csosamed/public_html/podcast/transcripts/wp-content/themes/genesis/lib/functions/image.php on line 116

Offenders on the Internet and Social Media Sites – DC Public Safety – “230,000 Requests a Month

Welcome to DC Public Safety – radio and television shows on crime, criminal offenders and the criminal justice system.

See http://media.csosa.gov for our television shows, blog and transcripts.

This radio program is available at http://media.csosa.gov/podcast/audio/2009/11/offenders-on-the-internet-and-social-media-sites-dc-public-safety-230000-reque/

We welcome your comments or suggestions at leonard.sipes@csosa.gov or at Twitter at http://twitter.com/lensipes.

– Audio begins –

Len Sipes: From our microphones in downtown Washington, D.C., this is Public Safety. I’m your host, Leonard Sipes. We have Shannon Blalock today. She is a parole and probation officer with the Kentucky Department of Corrections in Parole and Probation. She is a parole and probation officer. She is with parole and probation intelligence and she is also dealing with fugitive apprehension. What we’re talking about today, ladies and gentlemen, is going to be criminal offenders using social networking sites; Facebook, MySpace, Digg, ten tons of others. Also, the issues of using hand-held computers, commonly known as cell phones, by individuals who are under the supervision of parole and probation agencies throughout the country. But, first, our usual commercial. We are truly grateful and, what I mean by truly grateful, we really are. We’re up to 230,000 requests a month for D.C. Public safety radio, television, blog, and transcripts. We are just as impressed as impressed could be in terms of the numbers and in terms of your interaction with us. We really appreciate it. What you can do is go to media M-E-D-I-A.csosa C-S-O-S-A.gov and leave a comment. That’s what most people do or they get in touch with me directly by email, which is Leonard L-E-O-N-A-R-D.sipes S-I-P-E-S, that’s P as in pumpernickel, P-E-S@csosa.gov or follow me directly at Twitter. That’s twitter.com/len L-E-N sipes (without any breaks). Back to Shannon Blalock. Shannon, you’ve been with the State of Kentucky for, what about four years now?

Shannon Blalock: That’s right.

Len Sipes: And you have a very interesting background. Part of your job as a parole and probation officer is to do the usual things that so many parole and probation officers do throughout the country, but somehow, someway you started stumbling onto this concept of social media sites in terms of fugitive apprehension. Correct?

Shannon Blalock: Yes, that’s right. I was supervising a caseload, a regular caseload, and one of my offenders absconded supervision on me and, at that time, our network servers blocked the use of MySpace and Facebook and other social networking sites the way many government agencies do and so when I was home one evening I decided to look him up on MySpace and sure enough he was there, but the profile was set to private. So, I looked for his wife’s profile, found her and found that she had posted a landline phone number on one of her friend’s comment sections.

Len Sipes: Oh, that’s interesting.

Shannon Blalock: Yes. So, I was able to trace down to Florida and get him picked up.

Len Sipes: That’s just amazing. So, you sat at your desk and apprehended a fugitive.

Shannon Blalock: That’s right.

Len Sipes: Now, think about that. In all of my law enforcement experience when we were trying to apprehend fugitives or when we were trying to apprehend wanted for warrants, every night, if you were working the night shift, the duty sergeant would give you about 12 warrant and he said, if nothing goes on tonight, go out and see if you can serve these warrants. And so you go and knock on their doors at 1:00 in the morning and, out of the 12 warrants, oh, maybe once or twice a month you actually came into contact with somebody and arrested them on the warrant. And you sat at home and were able to arrest an individual sitting at home using your computer.

Shannon Blalock: Right. With, of course, the gracious assistance from different agencies and in particular the one down there in Florida.

Len Sipes: Of course.

Shannon Blalock: Yes. Able to work up usable information in really just a matter of a couple of minutes and a couple of mouse clicks and did a wanted fugitive off the streets.

Len Sipes: It is this larger issue, though, because every time we take a step in terms of social networking sites, every time we take that step it opens up endless, endless doors in terms of what social networking means. In essence, what we’re talking about is criminal offenders and people have this assumption that criminal offenders are not “sophisticated enough” to go onto Facebook and to conduct criminal activities or to go on to Facebook, MySpace, or the hundreds of other social media sites and try, sex offenders in this case, and try to entice that young girl to meet him.

Shannon Blalock: Absolutely.

Len Sipes: But they do, they do it every single day.

Shannon Blalock: Right. And it doesn’t really take that savvy a person to click onto the Web and to click onto a couple of sites and to create a profile and start meeting people.

Len Sipes: So, both of us agree that if we can do it, anybody can do it.

Shannon Blalock: Absolutely. And that’s one way that we’re not all that different from our offenders. I mean, if we’re on social networking sites, meeting and chatting with friends and meeting new friends and things like that, then chances are excellent that our offenders are doing the very same thing.

Len Sipes: Well, there is a problem throughout the country in terms of cell phones in prisons. And, when I say cell phones, again, it’s a wake up call. Somebody once said to me that the cell phone that I now carry, which is a SmartPhone BlackBerry, that that BlackBerry that I carry now is as powerful as my desktop computer was five years ago.

Shannon Blalock: That’s absolutely true and I never thought I’d see the day when I’d be speeding down the interstate and looking up information on tourist attractions. Yeah. It’s amazing.

Len Sipes: Well, but the point is that if they have them inside of prisons and we’re not just talking about a couple in the prison systems throughout the country, they’re reporting hundreds and hundreds in every prison system. So, if we’re talking about offenders inside there, it’s as if they have access to a laptop computer. It’s as if they have access to the Internet. They do have access to the Internet and they do have, as your child is searching social media sites.

Shannon Blalock: Right. And what we see a lot of times with our criminal offenders is that they’re incredibly charismatic and they can engage people very well in person and online and a lot of times can get them to do, get folks on the outside to do their bidding, legal or illegal activities.

Len Sipes: Isn’t that amazing?

Shannon Blalock: It really is.

Len Sipes: And the charismatic, many of the offenders that we supervise, they’ve lost their calling. I mean, assume many of these individuals should have gone into sales.

Shannon Blalock: Yes. [Laughs] I couldn’t agree more.

Len Sipes: A long time ago. It’s, like, this individual, I mean, if you’re going to hustle that hard in terms of selling drugs. If you’re going to hustle that hard in terms of conducting business over the Internet, why didn’t you just go into sales?

Shannon Blalock: Absolutely. I actually told one of my offenders that one time. If he was that successful in recruiting and developing new business, then perhaps he should go into sales.

Len Sipes: I mean, they missed their calling quite some time ago, but every time we discuss this we open the door to other areas. So, we have offenders in the prison systems having access to hand-held computers, what I call cell phones. We’re talking about the average offender out there floating through life and they’re interacting on MySpace and they’re interacting on Facebook and there are hundreds of additional social media sites that they’re interacting on. Gangs constantly have their own web sites. We’re not talking about social media sites. We’re talking about web sites that they have created or had others create with them where they display acts, illegal acts.

Shannon Blalock: Absolutely. Well, I mean, gangs, criminal activity, other people involved in the criminal enterprise, aside from it being illegal, it’s just like a legitimate business. I would look for them to recruit business using Twitter or having a Facebook page or having their own presence on the Web. They really market themselves the way that traditional businesses are doing it.

Len Sipes: I market this entity, D.C. Public Safety, on Twitter all the time and I found that Twitter is probably one of the most powerful modalities of getting the word out. Well, you go through Twitter and you search on specific key words, such as law enforcement, corrections, parole and probation, but you also search for the term, crime, and there’s been more than a couple, what I consider to be fairly nefarious web sites, and Twitter sites. So, obviously these guys are on there. The final thing I wanted to get into as an illustration as to how difficult this issue is. I saw a report on CNN yesterday as I was sitting at my desk, yes, CNN runs all day in my office. This is according to CNN. 20 million computers have been compromised by child sex offenders. Now, where they get this figure, I have no idea, how valid it is, how real it is. I wouldn’t have any idea. But what they’re saying is sex offenders are taking over your computers and using your computer to receive information, to receive obviously horrendously illegal, not just illegal, horrendously illegal photographs of children engaging in sex acts, but they’re using your computer as the interface. So, when the police knock on your door and tell you that they have a warrant for your arrest to search your computer in terms of child porn and you’re there struggling with what to say because you know it’s absurd, it may be that it’s this interface. So, sex offenders, they’re sophisticated enough to take over somebody else’s computer and to use that computer as an interface to get what it is that they need. So, the point is that they’re out there.

Shannon Blalock: Absolutely. And what I have found is that you don’t really have to have all that significant a technical knowledge. To be able to do anything like that, all you have to do is be motivated to seek out the information, usually available on the Web, that will tell you exactly step by step how to get these things done.

Len Sipes: Well, I just copied down something called, search engine optimization, which is basically web site marketing and sent it out to a bunch of my folks, which gives a step by step breakdown as to how to increase your presence on the Internet. So, if I can have instant access to that information and it was clear enough to me, then it would be clear enough to the outside. I do. I mean, I’m an ex-cop with a couple college degrees. I’m not a technical person as problems with the radio program prove and so if I can do this stuff, anybody can do this stuff.

Shannon Blalock: That’s exactly true. I mean, I have no formal education or training in computers or anything specific like this, but you become motivated to search for offenders or to do a certain activity online and the more you search out information, the more information you gain which leads you to more information and somehow you get it done.

Len Sipes: We’re going to give Shannon’s email address and I’ll talk about a manual that Shannon did, but I’m warning users right now that Shannon and I talked about this before we went on the program. We’re going to give her email address, but she developed a manual which is sitting in front of me and Shannon is also coming to my agency, the Court Services and Offender Supervision Agency, here in downtown Washington, D.C. We are a federal parole and probation entity. Shannon’s going to come up and do some training for us and she wrote this manual. Not everybody’s going to be able to get hold of this manual. You’re going to have to send a letter on letterhead and we’re going to have to be sure you’re who you say you are before the manual goes out, but what Shannon did was to create a manual developing an investigative presence on the Internet and talking about Internet strategies and we’re not going to give out any secrets in terms of this conversation. But the point is that my guess is that folks in law enforcement, folks in parole and probations, corrections are going to need to learn how to do this, how to develop investigative identities on the Internet, how to pass yourself off as somebody else, and how to, the fact that there are different web sites that you can use to search for information on just anybody.

Shannon Blalock: Yeah, that’s true. I mean, the amount of information that folks are willing to share on the Internet are absolutely staggering and is beneficial, not only for those of us in probation and parole, but also the law enforcement community using it as an investigative tool. It’s absolutely incredible what you can find online that people willingly put there for themselves.

Len Sipes: Including the offender population.

Shannon Blalock: Absolutely.

Len Sipes: Now, again, I don’t want to take this too far. Look, there are people out there who are under supervision or using the Internet every day and they’re using it properly. It’s not nefarious. I do not want to suggest that every person who has a criminal background and every person on parole and probation supervision is doing the wrong thing in terms of computers, but there are plenty who are.

Shannon Blalock: Of course. Sure there are. I had an offender one time who was placed on probation and the first thing I did was to go look at his MySpace page and he’d written a blog about how badly he’d messed up and was asking his friends on his MySpace page to please assist him in doing the right thing. And so that kind of gave me an additional insight into the mind of the offender that I’m meant to supervise and then, of course, you have other offenders that you go and check their Facebook page and they’ve posted pictures of themselves doing kickstands and other things that are clearly against the rules of probation and parole.

Len Sipes: One of the things that I’ve tried to get across to my daughters is that whatever you put on, I mean, sooner or later you’re going to apply for jobs with the government or with fairly responsible entities. You sitting there smoking, I’m not suggesting they do this, I’m using this for illustrative purposes. You sitting there smoking a joint with a bottle of Jack Daniels with your friends all there is not going to be looked upon very kindly five years from now when you go for that government job or when you go for any job for that matter. So, what you post on the Internet stays there forever; it does not disappear.

Shannon Blalock: That’s right. And you would not believe the amount of folks who have even applied for internships with our offices that have been turned down simply because they show themselves engaging in illegal activities on their Facebook page.

Len Sipes: Uh-huh. And so people have this natural inclination to brag about who they are and what they are and, if your bragging rights includes criminal activity; I mean, gangs will create web sites or have web sites created for them, I mean, I’ve even created a web site, it’s not that difficult. Gangs will post pictures of them with loot taken from a robbery. And now if that’s not incredibly stupid, I don’t know what is, but they don’t seem to understand what a lot of people don’t seem to understand is that whatever you put on the Internet stays there forever.

Shannon Blalock: Well, I think people operate under the assumption a lot of times that the information they put on there, it’s only going to be seen by folks who know them, but in reality, it’s out there and it’s available for public consumption by anyone.

Len Sipes: Which is one of the reasons why children, and when I say children, it could be anybody under the age of 18, that’s one of the reasons why they believe that that communication with this anonymous person through a chat room becomes a private matter.

Shannon Blalock: Yes, they do and they develop this false sense of security that they may know who this person is even though they’ve never met them, they have no idea who this person might be in real life, they develop this intimacy with somebody they’re chatting with and operate under the false assumption that they can trust them.

Len Sipes: I’m going to reintroduce Shannon. Shannon Blalock; she is a parole and probation officer with the Kentucky Department of Corrections, Division of Parole and Probation. She is a parole and probation officer. She works in parole and probation intelligence and she works in fugitive apprehension. Now, I’m going to give Shannon’s email address in terms of the manual that Shannon developed but, once again, you’re going to have to, once that contact has been established, you’re going to have to get something to her on letterhead and a superior where Shannon and staff can get back in touch with that individual before Shannon will be sending out a copy of the manual. It’s shannon.blalock@ky.gov. Let me see if I can stumble through this once again. It’s shannon.blalock@ky.gov. Did I get it correct?

Shannon Blalock: That’s correct. Yes, that’s it.

Len Sipes: Okay. Cool. And so the manual that you put together in essence reminds all of us to create investigative identities; in other words, so we can operate on the Internet and we can cloak ourselves so it doesn’t say Kentucky Department of Corrections.

Shannon Blalock: Right. There are instances where you can get some very useful information by going onto the Web as your agency. For instance, Kentucky, our Division of Parole and Probation, we have a page on MySpace that’s dedicated to our probation and parole fugitives and we received an incredible amount of tips and helpful information from folks, members of the community, who go onto our MySpace site, see the folks on there, and then give us usable information because they don’t want absconded or fugitives in their community anymore than we do.

Len Sipes: Of course. And parents want their kids captured without violence and without them, the police would come to their house at 2:00 in the morning.

Shannon Blalock: Sure. Absolutely. And I’ve always told folks that it definitely behooves them to turn themselves in so that they don’t put themselves or their family in danger and, of course, they don’t pick up additional charges. But in terms of looking around for violators of conditions of supervision, violators of the law and fugitives, chances are you really are not going to have very much luck going on as Len Sipes, former cop. I mean, so you might want to on there under an assumed identity.

Len Sipes: Uh-huh. And basically the manual provides suggestions in terms of how to go about that and there are various sites on the Web; now, I didn’t know this. And, again, I’m not a technical person, Lord knows, I’m not a technical person. Ask my wife; I’m not a technical person. If you search Google, it is referred to as the surface Web, but there are web sites there that search the deep Web and the surface Web is 20 percent of what’s there on the Internet. So, when you search Google, you’re only searching for 20 percent of what’s on the Internet. There are ways of searching the deep Web and there are web sites out there that are construed to find individuals that are available to the public and cost no money.

Shannon Blalock: That’s correct. I’ve had the pleasure of going to speak to several agencies and one of them was with the HIDTA, the high intensity drug trafficking areas, and they had not every heard of social network search engines where you can search for people specifically on a number of social networks instead of going to each individual site and typing in a search and so it’s very time efficient to be able to use a social networking site, social networking social engine, to look for the target of your investigation.

Len Sipes: So, a search is basically across the Web.

Shannon Blalock: Absolutely. Yeah. And not only will it search, I’ve got a variety of different search engines in the manual and not only does it search social networking sites, but like you said, it will search into the deep Web to see if maybe your offender has left footprints somewhere that you didn’t know about and then can follow up from there.

Len Sipes: There comes a point where it is, one time as a police officer, as a parole and probation agent, as a correctional officer, you developed your reputation in terms of your shoe leather; how much time you spent in the community with your ear to the ground talking to a wide variety of people. Now, I’m not going to suggest that sitting there and searching social media sites is more important than getting out into the community and talking to employers, talking to the girlfriend, talking to the mother, talking to the brother, talking to the person who lives with that individual because they are an incredible source of information regarding that offender. A lot of times you can take action to circumvent something happening. But it seems to me that equally important now is this presence on the Internet and the ability and the knowledge of searching Internet sites, Web sites, social media sites to figure out what your person is doing.

Shannon Blalock: Absolutely. Whenever I do this discussion with groups I talk about the concept of virtual home visit and what I talk about in there is, of course, it will never take the place of in-person home visits, but what you’re doing is looking at the person’s virtual home. Folks who create social network accounts decorate it any way they want to with music and pictures. They invite the friends that they want in there. They display the art and other things that are of interest to them in there. And so whenever you go to do a physical home visit for an offender, you’re getting the very best version of that offender, how they think you want them to act. But a lot of times when you visit their virtual home, you see the offender in the light that they really are or the way that they want to be seen by friends, so it just gives you an additional insight to your offender so that you can effectively supervise the ones that are on supervision and, of course, a way to apprehend the folks who’ve absconded.

Len Sipes: Now, there are people out there who are simply saying, okay, fine, Leonard, Shannon, this is all well and interesting, but if I’m not incredibly or completely stupid, I’m simply going to use another name.

Shannon Blalock: Right. Yeah, a lot of times they will do that, but we can gain information from previous investigations, look on friends of friends lists, and just look for photographs that look familiar. I know a lot of folks who don’t sign up for social network sites under their actual name. They sign up under their same name, like Happy, or Bull, or

Len Sipes: Cool Breeze. How many guys that I know back in the ’70s, it was all Cool Breeze, the ’70s and ’80s. Yeah.

Shannon Blalock: Cool Breeze? Yeah, the interesting thing about all these social networking sites is that you can search not only by first and last name, but you can search by screen name or email address. You can even browse by location and so, if you know that your offender is 32 years old, 6’1″, and is a white guy who smokes, then you can narrow down the search pretty close on places like MySpace.

Len Sipes: And my guess is that within the alias file that we all keep within various parole and probation law enforcement agencies, my guess is that people are creatures of habit; they’re going to go back and use one of the previous aliases that they’ve given themselves throughout the years.

Shannon Blalock: Absolutely. Yeah.

Len Sipes: So, if somebody, if Cool Breeze is out there and I know there are 10,000 Cool Breezes, but at least were back in the ’70s and ’80s, I mean, ordinarily you can take a look at a person’s rap sheet, you can take a look at a person’s parole and probation record and there are maybe five, six, or seven different aliases in their and those aliases can lead you to that individual.

Shannon Blalock: Yeah. And not only that, but I’ve found that a lot of times our offenders will tattoo their various aliases or nicknames onto their body somewhere, so just take a look at prison records or previous investigation reports and see what names they’ve got tattooed on their body.

Len Sipes: Now, all of that bring ups this question, I suppose: At what point do we simply say, well, wait a minute, we can’t do both. The average parole and probation agent in this country carries very large caseloads. Now, here it’s because we’re a federal agency, we’re, thank the Lord, that we have the money to keep caseloads, all of our caseloads are 15 to 1 less. They are specialize caseloads, can go as low as 20 to 1. Now, but still, even if you’ve got a great caseload or even if you have 150 offenders, taking on the Internet presence, doing that is complicated enough and time-consuming enough to the point where one almost has got to take prominence over the other.

Shannon Blalock: Yeah. And in Kentucky, what we have done, is I supervised a caseload for about three years and then after a meeting of statewide probation and parole supervisors and wardens, whenever I demonstrated what all could be accomplished on the Web, they created a specialized position for me to be able to do this for probation and parole under the Department of Corrections. And so this is what I do full-time, but other than that while I was supervising a caseload, I would pick it up here and there whenever I had a little bit of slack. But, of course, I was already pretty computer literate and savvy with social networking sites. What I would encourage folks to do is just sit down and play with it. It’s going to come quicker to you than you think if you’re not familiar with it already.

Len Sipes: Well, if it’s government, and again I feel bad in saying this because we provide a ton of training here, almost too much training it seems, but a lot of government agencies simply are not as fortunate as we are and they don’t have the money and I would imagine the overwhelming amount of people who are going to be learning this, it’s going to be through their own volition, through their own efforts.

Shannon Blalock: Yeah, that’s true. And then, of course, you also run into the roadblock of several government agencies.

Len Sipes: They won’t let you have access to social media sites. That’s right.

Shannon Blalock: Yeah, they’re not recognizing the value in that and particularly for folks who are supervising a specialized caseload of sex offenders. It’s absolutely amazing the amount of information that even our sex offenders will put on adult-type dating sites. I was looking at one one day and one of them used a booking photo from jail as his profile photo on an adult dating site.

Len Sipes: Okay. Well, that’s incredibly stupid, but

Shannon Blalock: Yes. [Laughs] But they will do that.

Len Sipes: Well, and the other part of it and the larger discussion of what I call hand-held computers, what other people call their iPhones or their BlackBerry’s or the Droid. It’s just a little too much to comprehend when it’s not your mom’s computer, it’s not the computer in your house, it’s not the computer in the library, it’s the fact that everybody out there is walking around with a computer strapped to themselves and so the sex offender says, well, George, let me borrow your hand-held computer so I can go onto one of the social media sites and see if I can track myself down a vulnerable young person. But how do you handle? That’s impossible. For most of us it’s just an explosion of opportunities which means an explosion of responsibilities that my guess is, my guess, the guess of most criminologists’ collective guess, is that we’re not prepared for that.

Shannon Blalock: No, we really are not. In terms of the training that often agencies receive is outdated or maybe just they’re just a step behind what offenders are able to accomplish, especially with gaining access to the Internet on their cell phones. I know in Kentucky we don’t allow our offenders to have cell phone plans that do put them on the Internet. Of course, there’s no way of guaranteeing that they’re not going over to a neighbor’s computer or anywhere else or borrowing a phone from somebody on the street and trying to acquire new victims that way.

Len Sipes: Yeah. Because I can see them doing that with sex offenders, but if you did that with regular people on supervision, they’re going to complain immediately is what you’re doing is blocking them from legitimate job opportunities.

Shannon Blalock: That’s true. Yeah.

Len Sipes: And so it becomes a very sticky, wicked that we all collectively in parole and probation throughout the country and, for that matter, throughout the world, are going to have to examining and stumbling with, but Shannon Blalock is coming to our agency, the Court Services and Offender Supervision Agency, and you’re going to provide our folks with all of the training that you have so we can pretty much take it from there and to guide us and I’m really looking forward to you coming up, Shannon.

Shannon Blalock: I am as well. Thank you.

Len Sipes: Our guest today has been Shannon Blalock. She is a parole and probation officer with the Kentucky Department of Corrections, Division of Parole and Probation, parole and probation officer, parole and probation intelligence and fugitive apprehension and now a self-taught Internet expert. Her email address is shannon.blalock@ky.gov. But after that initial introduction by email, you’re going to have to send a letter, a regular snail mail letter, on letterhead with the contact of your supervisor so we can do the proper checks and, if so, if you can prove who you are, Shannon will include a copy of her manual. Ladies and gentlemen, this is D.C. Public Safety. Once again, we are extremely of all of your letters, comments, phone calls, email comments, and we’re up to, thanks to you, 230,000 requests on a monthly basis for the television, radio, blog and transcript portion at media.csosa.gov. We really appreciate you being with us today and please have yourself a pleasant day.

– Audio ends –

Meta terms: victims, crime victims, victim’s rights, violence, violence reduction, violence prevention, crime, criminals, criminal justice, prison, incarceration, parole, probation, corrections

Share

Deprecated: str_replace(): Passing null to parameter #3 ($subject) of type array|string is deprecated in /home/csosamed/public_html/podcast/transcripts/wp-content/themes/genesis/lib/functions/image.php on line 116

10 Million Identity Thefts a Year-NOVA-DC Public Safety-162,000 Requests a Month

Welcome to DC Public Safety-radio and television shows on crime, criminal offenders and the criminal justice system.

See http://media.csosa.gov for our television shows, blog and transcripts.

This radio program is available at http://media.csosa.gov/podcast/audio/2009/07/10-million-identity-thefts-a-year-nova-dc-public-safety-162000-requests-a-month/

We welcome your comments or suggestions at leonard.sipes@csosa.gov or at Twitter at http://twitter.com/lensipes.

– Audio begins –

Len Sipes: From our microphones in downtown Washington, D.C., this is D.C. Public Safety. I’m your host, Leonard Sipes. Today’s program will deal with identity theft. It is something that seems to be sweeping the country. Every time you turn around, there are additional articles that say that identity theft is growing throughout the country. Back at our microphones, Will Marling, Executive Director of the National Organization for Victim Assistance. Their website address www.trynova.org, and also, on our microphones today is Robert Wayne Ivey. Robert is resident agent in charge of the Florida Department of Law Enforcement. He works out of the Brevard Country Field Office. He is an expert in the investigation of ID theft crimes. Wayne has also been the victim of ID theft and hence has a unique perspective on this kind of victimization. So, we should have a good half hour talking about identification theft.

Ladies and gentlemen, the usual commercial, we want to thank all of you for all of your cards, letters, phone calls and how you get my number, I don’t know, but I don’t give it out, but you seem to be doing an effective enough job getting in touch with me via email. We are now up to 162,000 requests for July of 2009 and July is not over. It’s a record month for us, and we really appreciate the fact that you’re listening and the fact that you’re watching and the fact that you’re reading the blog or the articles on our site. If you need to get in touch with me, it’s leonard.sipes@csosa.gov, or simply comment in the comment box on the D.C. Public Safety Media site. To Will Marling and to Wayne, welcome to D.C. Public Safety.

Will Marling: Thank you Leonard. Good to be with you.

Wayne Ivey: Thank you Leonard, it’s nice to be with you today.

Len Sipes: Well, gentleman, every time I turn around, I am looking at an article that tells me that identity theft is increasing by leaps and bounds. It is the fastest growing crime in America. But I note that there is no central source for identity theft. If you take a look at the uniformed crime reports, the two big national sources of crime information, The Uniform Crime reports and the FBI, and if you take a look at the National Crime Survey, identity theft is not a category that we measure. So, we’ll start off with Will Marling, the Executive Director of the National Organization for Victim Assistance. Will, how do we know that this is growing?

Will Marling: The FTC (Federal Trade Commission) that has been tasked with some of the issues related to tracking this particular crime; and the evidence so far indicates that we’re looking at least 10 million victims a year. We’ve got an idea that that’s probably fairly low because of the nature of the ability to report, awareness issues, people even understanding certain aspects of the crime. So I’m pretty convinced that right there, we’ve got solid ground to recognize that this is a huge problem and it is growing.

Len Sipes: 10 million victims a year.

Will Marling: That’s right.

Len Sipes: Who puts out that figure?

Will Marling: The Federal Trade Commission is tasked with this particular issue. There was a Presidential Commission that was established not too many years ago and so the Federal Trade Commission tracks this and you report. If you’re a victim of identity theft, you’re asked to report that to the Federal Trade Commission. They don’t have an enforcement issue, as such, but they do have a statistical reporting and tracking. The Federal Trade Commission offers information about identity theft and protection and, of course, dealing with the victimization.

Len Sipes: Will Marling, again, being the Executive Director with the National Organization for Victim Assistance, ladies and gentleman, if you’re not aware of NOVA, they’ve been around for about 30 years or so, been advocating for victims’ rights that entire time and, Will, ordinarily, the issue is burglary, robbery, rape, a lot of violent crimes. NOVA has been traditionally active, and we did a radio show, ladies and gentlemen, with Will Marling about two months ago. And we’re doing a series of six radio programs with the National Organization for Victim Assistance. How did NOVA get involved in identity theft?

Will Marling: Well, we were getting some calls on our toll free line (1-800-TRY-NOVA). It’s a victim assistance line and, of course, we do get a lot of violent crime victims that need assistance and support and referrals; but we were getting these identity theft victims and so we started asking some questions about what was going on there, what’s available to them, realized there wasn’t very much. And so we ended up starting to build our own database in terms of our own thinking about this, understanding, getting some training, and we ended up partnering with a company called Life Lock, to understand this issue from both the protection side and also the victim assistance side. And that really propelled us in a very short order and just in even in the past year or so or less, really, to looking at confronting this issue and putting resources toward helping people victimized by identity theft.

Len Sipes: Robert Wayne Ivey, again, is resident agent in charge of the Florida Department of Law Enforcement working at Brevard County. You were the victim of an ID theft, correct Wayne?

Wayne Ivey: That’s exactly right, Leonard. I ran the state-wide Identity Theft Task Force for our agency for a number of years and actually ended up becoming a victim, myself, which when I’m speaking to different groups, civic groups and everything, I always point out to them, I theoretically know what steps to put in place to protect against becoming a victim, and it still happened to me. So, it just goes to demonstrate that anyone can become a victim of this crime that no one is completely insulated from it.

Len Sipes: Can you give me a little detail about what happened without getting too personal?

Wayne Ivey: I can give you all the exact detail on it. I stopped to buy a golf bag. I’m a horrible golfer, I thought if I had nicer looking golf bag, it might help my golf game, which it didn’t. I just want to point that out but,

Len Sipes: I use that same philosophy, by the way, with tennis.

Wayne Ivey: I used my ATM MasterCard to make the purchase on a Friday and on Monday my bank account was wiped out. It was gone and they had taken all the money out. When I ended up solving it, it was the 19-year-old kid that waited on me at the gold shop and he’d done about $25,000 in credit card fraud with other people’s information and using their identities and victimizing them.

Len Sipes: How do you prevent that sort of thing from happening, Wayne? I mean, we all turn our credit card information directly over the telephone to people almost everyday. How do you prevent that sort of thing from happening?

Wayne Ivey: Well there’s some things, as I said, there is no way to absolutely guarantee you’re not going to become the victim of this type of crime. There are certain measures that you can take that are proactive. For example, fraud alerts and doing different things; shredding your documents, not putting your mail in the outgoing mail carrier, or the mailbox and that list goes on and on. So there are certain things you can do that are proactive. But some things you have to be reactive in. What’s real important in identity theft investigations is,I think the last time I looked; the national average was 12.7 months, the average for someone to realize they’ve been the victim of identity theft. That’s an enormous amount of time to be victimized and not know it.

Len Sipes: Why so long, Wayne?

Wayne Ivey: A lot of it is, we’re not reactive. We’re not doing the things that we can do. We’re not looking at our credit reports. We’re not monitoring our online transactions. We’re not taking advantage of real time credit histories, and staying up on top of our checking accounts and those things. So, it has a tendency to lengthen the time that we’re unrecognized as victims. And if we become reactive and recognize its happened right away, it gives law enforcement a better chance to make an arrest or actually identify the perpetrator. And it also limits the extent of damage that can be done to you as a victim.

Len Sipes: Wayne, I’m going to be asking you this at the end of the show but I want to get in to some of it right now. You’ve just ran through a lot of very important things. You’re supposed to take a good look at your accounts. When your credit accounts come in, you’re supposed to immediately recognize that somebody buying those new golf clubs, by the way, in Nebraska can’t possibly be you.

Wayne Ivey: Exactly. So many people don’t recognize that. Maybe that’s because the volume of expenditures on their credit card invoice is typical. They do a lot of expenditures so they don’t take the time to look at it and see that something’s happened. Other examples may be it’s a dormant credit card that they never look at the bill on because they don’t ever use it, and somebody else is actually using it and taking advantage of that. So there’s many different purposes why someone may not recognize it has happened. Other people, and we’ve become a technology society, if you will, and other people have gone away from getting an actual hard copy or a paper copy of their bill delivered to them and they’ve gone to getting it online. What they see is they see their bill, they don’t review their statements and everything else, and so they’re just paying that bill. Again, there’s a number of reasons. When we talk about identity theft and credit card fraud all put together, it’s amazing the advances that have happened. The technology and the availability of our information are just unintentionally driving this crime to epidemic proportions.

Len Sipes: You’ve mentioned two other things; you mentioned shredding your documents before throwing them out in the trash and you’ve mentioned, in terms of what? Getting an application for a credit card and you just toss it in the trash?

Wayne Ivey: We see people that actually have shredders in their house. As one person said, they have a shredder that would shred the carpet in the house but they never use it to shred documents. Sometimes we think we’re outsmarting the thief by ripping it up in little pieces. They’ll get it out of your garbage. They’ll do dumpster diving and piece it back together like a puzzle. Credit applications, we get them, we throw them in the garbage. They’re taking advantage of it. Sometimes, we don’t even get them. They’re mailed to us and the thieves are stealing it out of our mailbox before we ever get our hands on it.

Len Sipes: At the end of the program, think about this, I’m going to be asking you for the top five things that people can do. One of the things that people ask me in terms of the show is at the beginning of the show, is summarize what we’re going to cover for the entire show. There is no pre-planning for these radio shows that we do or the television shows that we do, by the way. We just crank up the recorder and crank up the television cameras and let it fly and so there is no way that I can summarize it at the beginning. A lot of people are asking me to do that but we will summarize what the principal issues are at the end.

Where do we go? What does the average person get to do? What are the best steps the person can take to prevent identity theft? It just strikes me that with all of the credit card information that I give out to strangers on 1-800 lines, I think, when I’m dealing with Amazon and I’m dealing with an affiliate, I’m assuming that Amazon has done something to make sure that the folks and their affiliates take care of my personal information.

Wayne Ivey: One thing that everyone has to keep in mind, because we are constantly asked, is it okay to do transactions online? Is it okay to do things over the computer? The answer to that is, regardless of if you walk into a building to pay your bill, or into a building to do a transaction, regardless of what you’re doing, somewhere a human being is processing your information and, if that human being is a responsible individual, an integral individual that is going to protect your information, then it doesn’t matter if its online or not. Conversely, if they’re a person that’s going to be wiling to turn around and use your information, or sell it to someone that’s going to use it illegitimately, then you’re in trouble. Again, it’s the same, whether they get your information because they’re receiving it on the other end of a computer transaction or if they get it because you’ve walked in the door and handed it to them. You’re still equally as vulnerable.

Len Sipes: What do we do? What do we as citizens do? Because all the things that you just described in terms of not taking a good look at your statements, and I do rip up the credit card applications before putting them on the trashcan. If they were so desperate to go in my trashcan and piece it back together then God bless them, because I do a good job of ripping those things up. But really, life is busy and you have kids and you have a wife and you have a job and have responsibilities and its run, run, run. I can see, you’re telling me that 12 months, the average time out there is 12 months between the identity theft and by the time the person notices it. I can understand why that happens and how it happens and why it happens.

Wayne Ivey: I think one thing that is just amazing is, we hear and it’s factually based, identity theft is the fastest growing crime in the country. What we need everyone to do; consumers, and everyone to do is to realize that identity theft is not a new crime. I know Will can touch on this as well as I can because we talked about it before; but when you look at identity theft, you can trace identity theft activity back to the Book of Genesis with the story of Esau and Jacob where one brother uses the other brother’s name to get the first born rights. You can find it in the play Othello where Iago talks about, “He who filches my good name, robs me of my riches and indeed makes me poor.” It’s been around forever. What is happening is, it has evolved and technology and the availability of our information has helped it to evolve. Will, will tell you the same thing. We see victims from every walk of life, every economic, social level that become victims of identity theft. It’s really a difficult crime to investigate because generally it’s multi-jurisdictional and it’s a difficult crime to prevent because our information is exposed at so many different levels.

Len Sipes: I was responding on my internet account where, I won’t give the name of the organization, and I belong to this particular entity and the entity was telling me they needed updated information. And it was so real. They were asking me for my social security number, my credit card number because they already had my credit card number. This is an organization I already gave this information to but when it got down to the social security number, I said, “Why are they asking me for my social security number?” And then it struck me, this is a fraud. Now here I am 40 years in the criminal justice system, four college degrees, you would think that I would be smart enough to recognize that, and I was just one little millisecond from pressing the button and hitting send. So it fools us all and from what I understand, from just reading stuff about identity thefts that ,in many cases, these are so sophisticated that the average person doesn’t recognize that it’s a fraud regardless as to how savvy they are. Correct?

Wayne Ivey: Absolutely, and Will, I don’t know if you want to respond to that, but absolutely, the levels of sophistication have just climbed and climbed. We’ve gone from a crime that was typically committed in person to a crime that is now committed at global levels. Someone in another country is targeting you and with the same type of scams that you’re just talking about, where something pops up on your computer and it appears legitimate. It will have the company logo, an icon of whatever company they’re impersonating and, when it pops up on that screen, your first inclination is to fill it out because it may say that your credit card is going to be shut down. It may say that your bank account is at risk and you’re first thought is to comply with it so that you can get deeper into it and figure exactly what’s going on.

Len Sipes: Okay, stay with me on this particular issue. I have to reintroduce both of you because we’re halfway through the program. Will Marling, the Executive Director of the National Organization for Victim Assistance, www.trynova.org, 1-800-TRY-NOVA. We’re talking about 10 million victims of identity theft a year, the estimate is. We’re also talking to Robert Wayne Ivey, resident agent in charge of the Florida Department of Law Enforcement.

So the bottom line to me is this is that if this is happening and it strikes me also that the counterfeiters have completely given up on counterfeiting and now going into identity theft, because some of these things that pop up in your internet screen are so vivid that this is not something that law enforcement is going to be able to solve because a lot of these solicitations, as you’ve just said, Wayne, are coming from overseas. And in fact, one of the breakaway Soviet Republics, it originates there, it goes through a computer in Greece, it goes through a computer in the United States and it comes to you. So this strikes me as not a law enforcement initiative, this strikes me as an education initiative that, unless we as citizens, take the proper precautions, there is very little that law enforcement can do to intervene. Am I right or wrong?

Will Marling: There is a number of prongs. This is huge monster, naturally, and with many monsters, you need more than one weapon. And so we looked at it from a law enforcement standpoint and certainly, there are folks doing this locally. Now globally, yeah, the challenge is trying to tract somebody down in another country is difficult, but from the standpoint of what we do here, even, there are some legislative commitments that I think need to be made regarding data breach, a national data breach standard that is being worked on, I know. As well as the awareness piece. And this is why, Leonard, it’s so good to discuss this issue because, as Wayne describes, it can happen to anybody. I want to mention two things, one is that it could truly happen to anybody because anybody’s information makes it possible to be abused, to be misused. The fact is you might say, “Well I have bad credit. Nobody cares about mine.” They don’t care about your credit, they care about the fact that you have a social security number and that social security number can be exploited in many ways.

Wayne Ivey: That’s exactly right.

Will Marling: That’s just to recognize anybody is possible. My kids, I have my kids on a service. I pay a small amount each month for a monitoring service for my children because even as young as they are, they don’t have a work record, but if somebody gets a hold of their social security number, they could actually use it. If I understand correctly from law enforcement, the average social security number that’s abused is abused about 30 times. And many times, it’s people who don’t have social security numbers who are using it for illegal work purposes and this kind of thing. The other piece I want to mention from a victim assistance standpoint is simply that the emotional impact of this is significant. For your law enforcement listeners, all I can say is, try to be sympathetic. You look at it as a property crime, but it’s so much more than that. It’s an identity crime. It’s a slam against who you are. Your personal integrity is in view, it’s challenged. And emotionally, you feel like somebody has gotten into your very,they’ve gotten into your drawers and they’re pulling out your intimate garments. I mean that’s the reality. That’s how people emotionally feel about it.

So, we’re trying to help people recognize, especially those who work with these kinds of victims, that the emotional impact many times looks and feels, in many ways, like violent crime victimization. The outcomes are different in some ways but emotionally, impact is very deep.

Len Sipes: The vast majority of property crimes are not reported to law enforcement, we know that from the National Crime Survey. My guess is that the vast majority of these crimes are not reported to law enforcement. If I’m called in to an identity theft crime, and I’m pretty smart guy, and I’m pretty technologically savvy in terms of the average person, I wouldn’t know the first thing to do about investigating this sort of a crime. Wayne?

Wayne Ivey: Before I respond to that one, I just want to follow up on something Will said. From the law enforcement perspective, we have really started to trend that way, but we’ve got to do a better job at helping our victims of this because as Will said, their lives are turned upside down. It’s no longer that this crime just attacks your credit, as it certainly does, but this crime is a attacking your credit, your good name, your abilities to get top secret security clearances, your abilities to get mortgages on a home, on and on. Even to get employment, which we all know is tough in today’s time, you finally get in for that job and then you find out that you’re not getting the job because you’ve got an arrest record or you’ve got a bad credit history, any number of things that can knock you out, even down to a bad driving history that will disqualify people. It is attacking us at all different realms.

And law enforcement, historically, has given victims the runaround. Well it didn’t happen in my area, even though you live in my area, you have to call where it happened at and so forth. I’ll tell you that’s really frustrating for the victim. I hear it every day from them when they’re calling and saying, “I’m getting the runaround. I’m frustrated.” And I’ve actually had one victim that was unfortunately, in her life, she was the victim of a violent crime, and then was later the victim of identity theft. She actually has shared with me that, given the two, the violent crime happened, occurred and was over with and she was able to come to grips with it. The identity theft keeps haunting her over and over again.

Len Sipes: And just goes on and on and on and on. And I know from my days as a law enforcement officer, as to how violated the people feel that somebody just was in their garage stealing items out of their garage. It’s a great sense of fear and a great sense of apprehension. I would imagine that it has to be ten times that in terms of somebody coming in and stealing your identity.

Will Marling: There’s no face to that person either. At least, you figure somebody had to breach your own home barrier someway, they broke the lock. But here, you’ve got somebody out there who is after you and you don’t have a clue, probably, who they are and how they got to you.

Len Sipes: Or what continent that they’re on.

Will Marling: Yeah, exactly.

Len Sipes: This may end up being two shows, gentleman, because I think we’re just scratching the tip of the iceberg with this. Where do people go for information? Will, on your website, do you have information on identity theft?

Will Marling: Ironically, because we’re so new into this, we want build a good resource there. So we actually don’t have a lot.

Len Sipes: Okay, so you’re in the process of building it. Where do people go?

Will Marling: The one thing I do want to tell you, at the same time, we were asking people, specifically victims to call us because we are able to offer free resources and free professional remediation resources to help them deal with it.

Len Sipes: 1-800-TRY-NOVA.

Will Marling: That’s right. So we actually have things we can do for them and with them and not just referral. We have a process for assigning them a code so that they get into free services regarding identity theft remediation. So that’s the main thing and that’s the starting point, I’ll stop there for now.

Len Sipes: At 24 minutes and 31 seconds now, I’ve just decided we need to make this two shows. So we need to bring Wayne back on our air. We don’t have enough time to really give this its full due because the more I’m hearing about this, I guess the more frightened I’m becoming in terms of where do people go to get information on identity theft and what should people do? Wayne, is it a matter of simply not responding to anything on the internet, that no bank, no financial institution is going to send you something via the internet that asks you for personal information?

Wayne Ivey: It’s exactly right because here’s the reality of it, whether it’s your bank or your credit card company, which is generally the two types of phishing schemes we see. And of course that phishing with a “˜P’ – P-H-I-S-H-I-N-G, not like fishing in the lake, but the reality of it is the two concepts are very similar because what happens is the criminals send out on your computer the phishing blast. And they know that there is plenty of fish in that lake that they’re phishing in. And some of them are going to bite. Just like on a regular fishing expedition that’s what we do. We throw our hook in the water and we hope that we get a bite from the many fish that are in the water. The reality of it is, when you get that popup on your computer and it says, “Please enter your account number and your security code so that we can discuss with you a possible compromise,” or whatever the particular scheme is. Ask yourself this, “Why would that bank or credit card company have to ask you for information that you know they already have?” They already have your credit account number or your bank number and they certainly already have your security code. Why would they need to ask you for that?

Len Sipes: Okay, so better yet, do not respond to anything on the internet, period, that ask you for any personal information, stop.

Wayne Ivey: Exactly, and if you think that there is something to the thing that has popped up, contact your bank or your credit card company, whichever the scheme is going, at a number you know to be from them, not the number that’s provided in that popup or on that computer message, at a number you know you’ve contacted them at before. And I can guarantee that you’re going to find out that you’re about to fall victim to a scam.

Len Sipes: That’s a beautiful point because they do, in some cases, will provide an 800 number and a human being will pick up that phone.

Wayne Ivey: That’s right.

Len Sipes: And that guy that picks up that phone, that woman, could be part of the fraud. So you better contact your bank directly.

Wayne Ivey: Contact your bank or your credit card company at numbers that you already know, or through avenues that you’ve already known, or go in there in person if that permits. The same thing applies with the phishing scams that come on the telephone. You’ll answer your phone and you get a recording, perhaps, or sometimes it’s a human that says, “Your card has possibly been compromised. Please enter your credit card number so that we can discuss with you what’s occurred.” Why would they need you to do that? They’re the one that motivated the call to you. Why don’t they discuss with you and ask you for some security questions? The answer is, they don’t have the answers to those questions and they’re asking you to give it to them.

Len Sipes: Do people do this through the mail?

Wayne Ivey: We see it through the mail. Some of the newer ones are even on Craigslist. We’re seeing things that have been compromised on Craigslist. Maybe its an apartments that’s for rent and somebody has copied that and pasted into their own Craigslist article and now they’re offering this apartment for rent and when you send them the retainer fee or the down payment on it, they cash it, they tell you that you can move in and you show up and so do 20 other people that are moving in to the same place.

Len Sipes: I saw that on the FBI scam alert just two days ago. That is amazing to me. Wayne, I hope to get you back. I really do, because we just have about a minute and a half left of the program and I’ve got to do the usual commercials. So I’d love to have you back. A half an hour simply just does not do this issue justice. So let’s do this soon. Will, let’s not do the usual rotation of two months apiece for your shows. Let’s do this as soon as we possibly can as a follow up. I think this is something that is extraordinarily important to bring to the public’s attention and to our friends in law enforcement. Ladies and gentlemen this is D.C. Pubic Safety our guest today have been Will Marling, the Executive Director of the National Organization for Victim Assistance, www.trynova.org, 1-800-TRY-NOVA. 10 million victims a year of identity theft. Also with us is Robert Wayne Ivey, he’s the resident agent in charge of the Florida Department of Law Enforcement. Again, ladies and gentlemen, this is D.C. Public Safety, we are just going like gangbusters 162,000 requests for the month of July 2009 and July is not even over. We have a record month. We appreciate all the contacts, all of the information you’re giving us. You can reach me directly at lenoard.sopes@csosa.gov, or to follow me on Twitter which is Twitter/LenSipes and to other friends, and I really appreciate it, Will, its funny, if you do a program on the victims’ issues so many people do end up listening to it, and we’ve gotten a call from a variety of people, emails, and letters that they also want to do a show on victimization. We’re going to finish out our series with the National Organization for Victim Assistance. Our listeners tell us that they want a variety of programs. So we try not to do too much of one particular topic. We’ll finish out our series with the National Organization for Victim Assistance and then we will invite you to be on the radio show. With that in mind, ladies and gentlemen, please have yourselves a very, very pleasant day.

– Audio ends –

Meta terms: victims, crime victims, victim’s rights, violence, violence reduction, violence prevention, crime, criminals, criminal justice, prison, incarceration, parole, probation, corrections

Share