Results 1 to 3 of 3
Thread: Identify Theft
Thread Information
Users Browsing this Thread
There are currently 1 users browsing this thread. (0 members and 1 guests)
-
12-22-2006, 09:57 PM #1
Identify Theft
I was driving from Ontario to Temecula this afternoon and was listening
to KFI. The guest on the program was a woman who lives in California,
whose identify was stolen. Her SS number was used by 80 plus people
and she received a tax bill. She wasn't working since she had taken time
off working to be with her new born. Apparently, this woman, tried
contacting both the Social Security folks as well as the IRS and received
absolutely no help. This woman, whose grandmother speaks Spanish, then
proceeded to talk with ALL of the 80 plus folks who used her SS number.
She has 270 plus w2's. She tried to get a new SS number and "they" told
her the only way she could do this was to go into the witness protection
program--change her name, and lose all of her own paid in SS $. She decided not to do this. She even found a police person, in Texas, I believe
to try to press charges against one of the folks--and even met with
the thief's employer. The prosecutor elected not to try the case. It wasn't until she started making a media event of this, that she finally received
a visit from a SS person and will now receive a new SS number (which
will be "tied" to her old SS number, for live.
If anyone sees a write up of the above, please post it here.
I made this trip from Temecula to Ontario last year and it took 45 min.
Today it took an hour and a half. (Must be the 80,000 folks that moved
into Riverside county in the last year--according to the papers.) I suspect these are mostly illegals since another article said more Caucasians are moving out of CA than moving in. I can only say, that
by looking at the drivers on the 15 freeway, my informal profiling is
that about 50% plus of the drivers were hispanic.
So, since I was stuck in traffic, I got to thinking. Why couldn't this
woman, file a charge, in small claims court, against each employer
listed on the W2's that she has--claiming time/material and damages
for their hiring their illegal who used her SS number. It seems like if
more victims of identity theft did this, in court, against employers, that
more employers might start obeying the law. In the meantime,
it seems, she could make herself over $100k per year--with a few expenses--like plane tickets to the appropriate court. Could a lawyer
please advise?
-
12-22-2006, 10:10 PM #2
Why do our state governments do nothing about improper use of personal information to obtain employment? This is so bizarre; I always thought that a typical state had ways of investigating these abuses, but now it seems that our states are too "lazy" or too choked with political correctness to do their jobs. Here is an example of what I am talking about. Below, I have googled the following phrase which makes you believe that the state governments should be engaged in alot of activity in this area (but in reality just sit on their asses doing nothing?)
google: state of michigan labor board and fraudulent use of SS# in obtaining employment
ILW.COM - immigration news: Workplace Identity Fraud and Identity ...National Labor Relations Board held that the National Labor Relations ... The use of a fraudulent social security numbers results in confusion for the SSA ...
www.ilw.com/lawyers/articles/2004,0304-nachman.shtm - 53k - Cached - Similar pages
[PDF] State labor legislation enacted in 2003File Format: PDF/Adobe Acrobat - View as HTML
State labor departments. In Michigan, the name of the Depart- ... obtain employment; and publishing any. false, fraudulent, or misleading information ...
www.bls.gov/opub/mlr/2004/01/art1full.pdf - Similar pages
[PDF] State labor legislation enacted in 2004File Format: PDF/Adobe Acrobat - View as HTML
Michigan. Child labor. The State Youth Employment ... individual or entity as a result of the board’s. obtaining the information. Such information ...
www.bls.gov/opub/mlr/2005/01/art1full.pdf - Similar pages
[PDF] Semiannual Report to the CongressFile Format: PDF/Adobe Acrobat - View as HTML
state affected by the disaster could obtain employment in another state while ... The defendants submitted more than 1400 fraudulent labor ...
www.oig.dol.gov/public/semiannuals/55.pdf - Similar pages
DOJ Seal U.S. Department of Justice Office of Community Oriented ...The Michigan State Police’s reporting protocol has the following steps: . Obtain ... File a fraudulent tax return • Obtain medical care • Obtain employment ...
www.cops.usdoj.gov/txt/e03062303.txt - 138k - Cached - Similar pages
Labor and the LawAdvance Employment Services, Inc. v. State of Michigan, Case No.244608 (Mi. ... is for the fraudulent purposes of escaping liability for the seller's debts. ...
www.lera.uiuc.edu/Pubs/newsletters/LELN ... 004-04.htm - 32k - Cached - Similar pages
[PDF] GAO-05-1016T Social Security Numbers: Federal and State Laws ...File Format: PDF/Adobe Acrobat - View as HTML
The Social Security Act of 1935 created the Social Security Board, ... prohibits the use of the full SSN, the Michigan statute prohibits the use of ...
www.gao.gov/new.items/d051016t.pdf - Similar pages
Illegal Immigration Enforcement and Social Security Protection Act ...The use of the SSN as the means of tracking every employment encounter will ... us against people who might come up with fraudulent Social Security cards? ...
commdocs.house.gov/committees/judiciary/hju21141.000/hju21141_0.HTM - 133k - Cached - Similar pages
[PDF] AGENDA FOR SOCIAL SECURITY:File Format: PDF/Adobe Acrobat - View as HTML
include the use of stolen and counterfeit SSNs to. obtain employment ... including State Disability Determination agencies in Lansing and Detroit, Michigan ...
www.ssab.gov/Publications/Miscellaneous/Overview1.pdf - Similar pages
[PDF] U.S. Attorneys' Bulletin Vol 53 No 01, Social Security FraudFile Format: PDF/Adobe Acrobat - View as HTML
instructed the Social Security Board to cooperate. with federal uses of the SSN by issuing and ... the victim to marry twice and obtain employment, ...
0225.0145.01.040/usao/eousa/foia_reading_room/usab5301.pdf - Similar pages
-
12-22-2006, 10:23 PM #3
http://0225.0145.01.040/usao/eousa/foia ... ab5301.pdf
Social Security Fraud
Prosecuting Social Security Number Misuse: Attacking Identity Theft at its
Source
By John K. Webb
JANUARY 2005 UNITED STATES ATTORNEYS ' BULLETIN 1
Prosecuting Social Security Number
Misuse: Attacking Identity Theft at its
Source
John K. Webb
Special Assistant United States Attorney
Central District of California
I. Introduction
Protection of the Social Security Number
(SSN) is inherent to maintaining personal privacy
and in assuring that no one "filches" your good
name. In fact, failure to carefully guard the SSN
could make one "poor indeed." As any victim of
identity theft will tell you, not much has changed
since the days of Shakespeare when it comes to
"filching," and thieves continue to roam the streets
looking for victims to rob of their good name.
Indeed, today's robbers have incorporated the use
of cyberspace into their bag of dirty tricks, and the
theft and misuse of the SSN is the most common
tool that identity thieves employ. The misuse of
the SSN poses a risk to public safety and a threat
to the personal privacy and financial security of
every American.
The SSN has been with us since 1936 and was
first intended for use solely by the federal
government as a means of tracking earnings to
determine the amount of Social Security taxes to
credit to each worker's account. Use of the SSN
for purposes unrelated to the administration of the
Social Security system is a relatively recent
phenomenon. Over the years, the SSN has been
used by government agencies and the private
sector for other purposes, often over the objection
of independent experts and the general public.
See, e.g., ALAN WESTIN & MICHAEL BAKER,
DATABANKS IN A FREE SOCIETY , 39 9 (Times
Boo ks 197 2) ("adopting the Social Security
number officially as a national identifier or letting
its use spread unchecked cannot help but
contribute to public distrust of government").
A. SSN misuse, identity theft, and the risk
to personal and financial privacy
Today, the SSN is a fundamental element of
almost every identity theft case, and Congress has
long recognized that disclosure of the SSN is a
threat to individual privacy. See Privacy Act, Pub.
L. No. 93-579, 88 Stat. 1896 (1974). With the
enactment of the Privacy Act in 1974, Congress
explicitly recognized the particular risk to privacy
brought about by the threat of the misuse and
unnecessary disclosure of the SSN and enacted
express restrictions on the use of the SSN. Id. The
extent of the threat to individual privacy is readily
apparent when considering that the SSN is used as
an identification code that brings individuals into
contact for everyday communication with
databases containing a wide range of financial,
medical, educational, and credit information.
Once obtained by an identity thief, the SSN opens
practically every door related to a person's identity
and personal history and completely compromises
an individual's personal privacy. The development
and expansion of the Internet has contributed
significantly to the danger of identity theft that is
inherent to disclosure of the SSN. As the Supreme
Court noted, the Privacy Act "was passed in 1974
largely out of concern over 'the impact of
computer data banks on individual privacy.'" See
United States Department of Justice v. Reporters
Committee for Freedom of the Press, 489 U.S.
749, 765 (1989). Today, even with the explosion
of identity theft, the demand continues for
disclosure of an individual's SSN for purposes
unrelated to its intended use. The result is the
frequent and indiscriminate use and disclosure of
the SSN as part of identity theft crimes.
2 UNITED STATES ATTORNEYS' BULLETIN JANUARY 2005
B. History of the SSN and restrictions on
its use
On August 14, 1935, Congress enacted
legislation creating the Social Security
Administration (SSA). See Social Security Act
(the Social Security Act of 1935), Pub. L. No.
74-271, 49 Stat. 620 (1935). The purpose of the
Social Security Act (the Act) was the creation and
implementation of a social insurance program
designed to pay benefits to retired workers to
ensure a continuing portion of income after
retirement. Id. The amount of these social benefits
was based, in part, on the amount of the workers'
earnings, and SSA needed a system to keep track
of earnings by individual workers and for
employers to report these earnings. Included in the
Act was authorization for SSA to establish a
record-keeping system to help manage the Social
Security program. While it did not expressly
mention the use of the SSN, the Act authorized
the creation of some type of record keeping
scheme. Thus, on or about November 24, 1936,
the first applications for Social Security account
numbers (Form SS-5) were distributed by the Post
Office to persons who were working or expected
to work in jobs covered by Social Security old-age
insurance. See "Special C ollections-Chronology"
(Social Security Online), available at http://www.
ssa.gov/history/1930.html. Through a process
known as enumeration, unique numbers were
created by SSA for every person, and used by
SSA and the Internal Revenue Service (IRS) as a
work and retirement benefit record for the Social
Security program. Id. In accordance with the
establishment of the SSN as a record keeping tool,
the IRS issued a regulation in 1936 that required
the issuance of an account number to each
employee covered by the Social Security program.
See Treasury Decision 4704 (1936). Between
November 1936 and June 1937, SSA processed
approximately thirty million SS-5 Forms.
Available at http://www.ssa.gov/history/ssn/
firstcard.html.
The process of issuing Social Security
Numbers continues today, with SSA issuing them
to all U.S. citizens and most noncitizens who are
lawfully admitted to the United States and who
have permission to work. Available at http://www.
ssa.gov/ssnumber. Lawfully admitted noncitizens
may also qualify for an SSN for nonwork
purposes when a federal, state, or local law
requires that an SSN be obtained in order to
receive a particular welfare benefit or service.
SSA collects and verifies information from such
applicants regarding their age, identity,
citizenship, and immigration status. Most of SSA's
enumeration workload involves U.S. citizens who
generally receive an SSN via SSA's birth
registration process handled by hospitals.
However, individuals seeking SSN's can also
apply in person at any SSA field office location,
through the mail, or via the Internet. See
http://www.ssa.gov/ssnumber. Most U.S. born
individuals receive an SSN through a process SSA
refers to as Enumeration-at-Birth (EAB). Under
EAB parents can apply for an SSN for their
newborn child at the hospital as part of the birth
registration process. Under this process, hospitals
send birth registration information to a state or
local bureau of vital statistics where it is entered
into a database. The appropriate bureau of vital
statistics forwards SSA the required information,
usually by electronic means. SSA accepts the data
captured during the birth registration process as
evidence of age, identity, and citizenship, and
assigns the child an SSN without further parental
involvement. Once SSA receives the required
information, it performs edits, assigns the SSN,
and issues the card. See Social Security Numbers:
Insuring the Integrity of the SSN GAO REP.
03-941T (2003), available at http://www.gao.
gov/new.items/d03941t.pdf.
Widespread SSN use in government began
with a 1943 Executive Order issued by President
Franklin D. Roosevelt. See Exec. Order No.
9,397, 3 C.F.R. 283-284 (1943-194.
Specifically, the order required all federal
components to use the SSN exclusively whenever
the component needed to set up a new
identification system for individuals, and
instructed the Social Security Board to cooperate
with federal uses of the SSN by issuing and
verifying numbers for other federal agencies. Id.
Since 1943, the number of federal agencies and
others relying on the SSN as a primary identifier
has escalated dramatically, in part, because a
number of federal laws have been passed that
have authorized or required use of the SSN for
specific activities. See Social Security Numbers:
Government Benefits from SSN Use but Could
Provide Better Safeguards GAO REP. 02-352
(2002), available at http://www.gao.gov/new.
items/d02352.pdf. In many instances, use of an
SSN is required by law to determine the eligibility
of an individual for receipt of federally funded
program services or benefits, such as SSA Title II
benefits (Retirement, Disability, or Survivor's) or
JANUARY 2005 UNITED STATES ATTORNEYS ' BULLETIN 3
Supplemental Security Income (SSI) benefits
payments. Use of the SSN also serves as a unique
identifier for such government-related activities as
paying taxes or reporting wages and earnings. The
government was first permitted to use the SSN for
tax reporting purposes in 1961, when Congress
authorized the IRS to use the SSN as taxpayer
identification numbers. See Pub. L. No. 87-397,
75 Stat. 828 (1961).
Since issuance of the first SSN in 1936, the
private sector, for all practical purposes, has taken
control of the SSN. Individuals must now provide
it when applying for credit, when seeking medical
or other insurance coverage, for leasing an
apartment, seeking cell phone service, ordering
merchandise, or applying for a job. In addition,
many federal, state, and local government
agencies also use the SSN as a means of
identification when they administer their
programs to deliver services or benefits to the
public. In some instances, government agencies
serve as the repository for records or documents
that are routinely made available to the public for
inspection. These public records may include
SSNs. See Social Security: Government and
Commercial Use of the Social Security Number is
Widespread GAO REP. 99-28 (1999), available at
http://www.gao.gov/archive/1999/he99028.pdf.
This growth in use and availability of the SSN is
important because SSNs are often the identifier of
choice among identity thieves. No single federal
law regulates overall use and disclosure of SSNs
by federal agencies, but several federal laws limit
the use and disclosure of the SSN in certain
circumstances. See 42 U.S.C. § 408(a)(7)(B); see
also 18 U.S.C. § 1028(a)(7) and 18 U.S.C.
§ 1028A. State laws may also vary in terms of the
restrictions imposed on SSN use and disclosure.
Moreover, some records that contain SSNs are
considered part of the public record and, as such,
are routinely made available to the public for
review. See Social Security Numbers: Government
Benefits from SSN Use, but Could Provide Better
Safeguards GAO REP. 02-352 (2002), available at
http://www.gao.gov/new.items/d02352.pdf.
It goes without saying that the SSN is a key
piece of identification in building credit bureau
databases, extracting or retrieving data from
consumers' credit histories, and preventing fraud.
See Prepared statement of the FTC, Identity Theft:
the FTC's Response: Hearing Before the
Subcommittee on Technology, Terrorism and
Government Information, Senate Judiciary
Committee, 107th Cong. (M ar. 20, 2002),
available at http://www.consumer.gov/idtheft_
old/reports.htm. Businesses routinely report
consumers' financial transactions, such as charges,
loans, and credit repayments to credit bureaus.
Although credit bureaus use other identifiers, such
as names and addresses, to build and maintain
individuals' credit histories, the SSN is the most
important identifier for ensuring that correct
information is associated with the right individual,
because the SSN does not change as would a
name or address. The SSN, along with names and
birth certificates, are three personal identifiers
most often sought by identity thieves. See Identity
Theft: Prevalence and Cost Appear to be Growing
GAO REP. 02-363 (2002), available at http://
www.consumer.gov/idtheft/reports/gao-d02363.p
df.
Identity theft occurs when an individual steals
another individual's personal identifying
information and uses it fraudulently. It is a crime
that can affect all Americans. SSNs and other
personal information, for example, are used to
fraudulently obtain credit cards, open utility
accounts, access existing financial accounts,
commit bank fraud, file false tax returns, and
falsely obtain employment and government
benefits. The SSN plays an important role in
identity theft because it is used as breeder
information to create additional false
identification documents, such as drivers' licenses,
Social Security cards, I-9 and W-4 forms, and
green cards. Most often, identity thieves use SSNs
belonging to real people, rather than making one
up. However, identity thieves sometimes merely
make up a number that happens to correspond to
an SSN already assigned to an individual by the
Commissioner of Social Security. Most often,
identity thieves gain access to the personal
information of a victim by:
• taking advantage of an existing relationship
with the victim;
• stealing information from purses, wallets, or
the mail;
• purchasing personal information from a
coworker of the victim; and
• identifying personal information obtained
legally through Internet sites maintained by
both the public and private sectors (including
data from records routinely made available to
the public through the court system).
EXCLUSIVE: Republicans Rip Biden Admin For Providing...
05-03-2024, 02:37 PM in illegal immigration News Stories & Reports