SEMINAR 5. Reducing ID and Other Document Fraud Harms with Science: Turning the Tide

Why this Seminar?

“Who should attend?
This two day seminar is for executives, risk managers, subject matter experts, loss reduction and policy specialists concerned, intentional and committing to a trans-government/business effort to identify and address the threats posed by false personation, identity theft, synthetic identity fraud and other fraud facilitated by wide variety of documents. Participants are introduced to behavioral and crime prevention sciences, which open up new possibilities for turning the tide on this increasingly pervasive problem.

Background
Few people talked about ID and other document fraud before the mid 1990’s. What changed?
The San Diego not-for-profit Identity Theft Resource Center (ITRC) compiles a list of security breaches potentially compromising citizen’s personal identifiers. Between 2005 and the end of 2015, the ITRC records 5,810 breaches placing 847,807,830 records of personal identifiers at risk. This actively -unlawfully acquiring personal identifiers – is proportional to the demand from others to pay for this information in the underground market, the certainty of being detected and the swiftness with which action is taken.
Other crime harms are less in the public consciousness. These harms include financial services frauds (i.e. mortgages, business loans), medical services fraud, stock market manipulation and facilitating international crimes such as money laundering, trafficking in narcotics and human smuggling.
No one agency has a handle on the financial and human costs and no single organization, government, or sector operating independently is likely to stem the tide.

At the Core of the Problem
Doing business in urban centers, interstate, and internationally with people government and business do not personally know, and little about
Large databases of personal identifiers. Security doesn’t fail often, but when it does, it’s catastrophic
Extraordinarily accessible and affordable document reproduction technology for forging ID and other documents not easily detected
On-line “novelty ID” difficult to detect faced-paced processing environments
Lacklustre performance in creating a feeling of vigilance at the point of attack
Skills to detect deception and lying at the point-of-contact

Seminar Format
The seminar combines future search and action planning technologies to identify participant concerns pre-seminar, to bring common concerns to the table for discussion, and to explore a new generation of counter-measures based in behavioral and crime prevention science.

The seminar includes:

Phase 1: Overview

Introduction to affect (psych): How automatic/experiential emotions influence perception, judgment and decision making
Introduction to heuristics bias: the impact of mental shortcuts in assessing risk with deliberate/effortful decision making
Environmental scan of ID, synthetic identity and other document fraud
A deep drill into how three categories of identification are defined, what each category of identification tells a handler, what they don’t tell the handler, and how the features of these three categories intersect powerfully
Discussion on what other types of attestation documents include, what the documents actually tell your organization, and the residual risks

Phase 2: The Story of Early Detection – A Focus on the Person

Architectural design and personal deportment to send a message of vigilance
Information gathering and reliability assessment of the declarations and statements made by people
Seamless escalation of front-line concerns to inquires officers and investigators trained in ethical interviewing practice

Phase 3: Crime Prevention Science

An introduction to 2nd Generation Crime Prevention through Environmental Design: Introducing behavioural science and social cohesion strategies to the design of built space
Lessons learned from Jane Jacob’s “eyes on the street”
Lessons learned from hot spot, crime pattern and aberrant behavior analysis
Taking a problem-solving approach mitigating reducing systemic threats
How to get it accountability through measurement done