[Senate Hearing 106-1025]
[From the U.S. Government Publishing Office]



                                                       S. Hrg. 106-1025

                             IDENTITY THEFT

=======================================================================

                                HEARING

                               before the

                 SUBCOMMITTEE ON TECHNOLOGY, TERRORISM,
                       AND GOVERNMENT INFORMATION

                                 of the

                       COMMITTEE ON THE JUDICIARY
                          UNITED STATES SENATE

                       ONE HUNDRED SIXTH CONGRESS

                             SECOND SESSION

                               __________

                            AUGUST 30, 2000

                               __________

                              MONTEREY, CA

                               __________

                          Serial No. J-106-103

                               __________

         Printed for the use of the Committee on the Judiciary

                               __________

                    U.S. GOVERNMENT PRINTING OFFICE
73-465                     WASHINGTON : 2001


                       COMMITTEE ON THE JUDICIARY

                     ORRIN G. HATCH, Utah, Chairman
STROM THURMOND, South Carolina       PATRICK J. LEAHY, Vermont
CHARLES E. GRASSLEY, Iowa            EDWARD M. KENNEDY, Massachusetts
ARLEN SPECTER, Pennsylvania          JOSEPH R. BIDEN, Jr., Delaware
JON KYL, Arizona                     HERBERT KOHL, Wisconsin
MIKE DeWINE, Ohio                    DIANNE FEINSTEIN, California
JOHN ASHCROFT, Missouri              RUSSELL D. FEINGOLD, Wisconsin
SPENCER ABRAHAM, Michigan            ROBERT G. TORRICELLI, New Jersey
JEFF SESSIONS, Alabama               CHARLES E. SCHUMER, New York
BOB SMITH, New Hampshire
             Manus Cooney, Chief Counsel and Staff Director
                 Bruce A. Cohen, Minority Chief Counsel
                                 ------                                

   Subcommittee on Technology, Terrorism, and Government Information

                       JON KYL, Arizona, Chairman
ORRIN G. HATCH, Utah                 DIANNE FEINSTEIN, California
CHARLES E. GRASSLEY, Iowa            JOSEPH R. BIDEN, Jr., Delaware
MIKE DeWINE, Ohio                    HERBERT KOHL, Wisconsin
                     Stephen Higgins, Chief Counsel
        Neil Quinter, Minority Chief Counsel and Staff Director


                            C O N T E N T S

                              ----------                              

                     STATEMENT OF COMMITTEE MEMBER

                                                                   Page

Feinstein, Hon. Dianne, a U.S. Senator from the State of 
  California.....................................................     1

                               WITNESSES

Ahern, Michael E., Deputy Chief Inspector, Field Operations West, 
  U.S. Postal Inspection Service, prepared statement.............    58
Baca, Leroy D., Los Angeles County Sheriff, prepared statement 
  and attachments................................................     4
Frank, Mari, identity theft victim, prepared statement and 
  attachments....................................................    29
Kassin, Selene, identity theft victim, prepared statement........    26
Klurfeld, Jeffrey A., Director of Western Regional Office, 
  Federal Trade Commission, prepared statement and attachments...    43
Vezeris, Jane, Deputy Inspector General, Social Security 
  Administration, prepared statement.............................    55

 
                             IDENTITY THEFT

                              ----------                              


                       WEDNESDAY, AUGUST 30, 2000

                           U.S. Senate,    
     Subcommittee on Technology, Terrorism,
                        and Government Information,
                                Committee on the Judiciary,
                                                 Monterey Park, CA.
    The subcommittee met, pursuant to notice, at 9:06 a.m., at 
the Sherman Block Sheriff's Headquarters Bureau, 4700 Ramona 
Boulevard, Monterey Park, CA, the Hon. Dianne Feinstein 
presiding.

OPENING STATEMENT OF HON. DIANNE FEINSTEIN, A U.S. SENATOR FROM 
                    THE STATE OF CALIFORNIA

    Senator Feinstein. I'd like to welcome all of you here, 
this morning, to the field hearing of the Senate Judiciary 
Subcommittee on Technology, Terrorism and Government 
Information. I'm the ranking member of that committee.
    The topic of this hearing is local and Federal response to 
identity theft.
    In particular, I want to thank Sheriff Baca for joining me 
in hosting this hearing at the Los Angeles County Sheriff 
Headquarters, and Sheriff Baca will begin our testimony in just 
a moment, with an announcement that he has to make.
    I'd also like to thank the impressive roster of witnesses, 
Jeffrey Klurfeld, who's director of the Western Regional Office 
of the FTC, Jane Vezeris, the Deputy Inspector General of the 
Social Security Administration, Michael Ahern, the Deputy Chief 
Inspector of Western Field Operations of the U.S. Postal 
Inspection Services, and also, two identity theft victims, 
Selene Kassin, and Mari Frank.
    Identity theft is perhaps the signature crime of this new 
economy. Modern technology has made vast amounts of personal 
information obtainable at the click of a keyboard, or at the 
acquisition of a public document, leaving our personal 
information vulnerable to interception and misuse.
    Now, what is identity theft? Identity theft occurs when one 
person assumes another's identity, and fraudulently uses their 
personal financial data, to acquire credit or products, again 
fraudulently, and to hide from their own true identity.
    The documents can be a Social Security number, a birth 
date, a driver's license number, or other identifying 
information that enables them to obtain your credit cards, and 
then go out and use those credit cards.
    Identity thieves can get personal information in a myriad 
of ways, stealing wallets and purses, containing identification 
cards, using personal information found on the Internet, 
stealing mail (including pre-approved credit offers and credit 
statements), fraudulently obtaining credit reports, or getting 
personal records at work.
    An identity is stolen today every 60 seconds. As many as 
seven hundred thousand incidents of identity theft will occur 
this year.
    The heaviest area in the United States for identity theft 
is right here, Los Angeles, and that's why we're holding this 
hearing here today, and to bring this information back to the 
Judiciary Committee.
    The hearing is being recorded, and all of this will be 
included in the official transcripts of the hearings on this 
subject.
    From 1997 to 1999, there was a 380-percent increase in the 
reporting of Social Security number misuse.
    In a survey of a thousand Americans, by Impulse Research of 
Los Angeles, 42 percent of the respondents reported a member of 
their household had their personal identity or credit card 
information stolen.
    Identity theft causes up to $3 billion in losses annually, 
from credit card fraud, alone.
    We're going to hear from two victims today, who will 
describe the havoc to their lives caused by identity theft.
    Now, identity theft, unlike other crimes, is an ongoing 
crime that can last for years.
    The typical victim learns about the identity theft 14 
months after it's occurred, sustains $18,000 in fraudulent 
charges, and spends a 175 hours over 2 years, restoring their 
clean credit and good name.
    I'd like to tell you just about the one case of one person 
who is not testifying here today, but I happened to have met 
her before.
    She was a victim of identity theft. Her name is Lynn 
Klinenberg. Her late husband, James Klinenberg, Dr. James 
Klinenberg was the chief of medicine and vice-president of 
professional services at Cedars-Sinai in Los Angeles.
    If you're here, Lynn, would you stand, so people might be 
able to see you? Thank you, very much.
    Her husband's Social Security number and mother's maiden 
name were obtained through a death certificate. Her husband 
died suddenly in December. His obituary was in the Los Angeles 
Times, as well as other places.
    The thief went and got the death certificate, which looks 
like this, which is a public record. On that death certificate, 
was her husband's Social Security number and her mother's 
maiden name.
    Mrs. Klinenberg didn't fill out that death certificate, 
others did. But this information was then used to access Mrs. 
Klinenberg's bank account, and receive credit cards in her late 
husband's name.
    Shortly after her husband's death, these criminals 
attempted to wire transfer thousands of dollars from her 
family's bank account to banks in New York and Pittsburgh.
    Her husband's name appeared on a credit card in Denmark and 
was used to order $25,000 in diamonds and Rolex watches, 
fraudulently.
    Now, that's one example. Another example that wewill hear 
about, are people using this information to go out and stalk a victim 
by locating their home address and finding out where they are.
    I have also found that the Social Security number has 
become a prime source for obtaining information, to go ahead 
with a crime of identity theft.
    So, our goal today to see how the Federal Government might 
be able to help, to put the clamps on identity theft, to make 
it harder to traffic in personally identifiable information, 
how law enforcement can increase the prosecution and 
investigation of identity theft, and how individuals can take 
preventive steps to protect themselves from identity thieves.
    First, we can cut down on the widespread trafficking, and 
use of Social Security numbers, and I have a bill to do just 
that.
    Social Security numbers have become the prime tool, used by 
identity thieves, to capture victims' personal information, and 
to set up fraudulent credit card accounts.
    Today, on the Internet, an identity thief can buy another 
person's social security number for as little as twenty-five 
dollars ($25), no questions asked. This is simply wrong.
    I have introduced the Social Security Number Protection 
Act, which is endorsed by the Clinton-Gore administration.
    This bill would prohibit the sale of a person's Social 
Security number, without their consent, except for a narrow 
number of circumstances, such as law enforcement, national 
security, or public health purposes.
    I've also introduced the Identity Theft Prevention Act. 
This bill, which is endorsed by the Federal Trade Commission 
and my Senate colleagues, John Kyl and Charles Grassley, offer 
a number of concrete practical measures, to cut down criminal 
access to personal information, and assist victims.
    For example, identity thieves often intercept bank 
statement or credit card statements, and then redirect the 
account to another address.
    This bill would require credit issuers to notify the 
original card holders of their original address of any address 
change request.
    Therefore, cardholders would know right away, any time a 
thief is trying to shift the address of their account.
    In addition, the bill would develop standardized forms for 
victims to report identity theft to bank credit bureaus and 
retail stores.
    Right now, identity theft victims typically have to fill 
out a new fraud report for each store with a fraudulent charge.
    Creating a standardized form could save many victims 
literally hundreds of hours of time of filling out what are 
redundant reports.
    Sheriff Baca will head off the hearing today, with 
testimony about a new project, an innovative and ground-
breaking Los Angeles County Identity Theft Strike Force.
    I will leave it to him to describe the program, but I think 
he has developed a model that's worth emulating around the 
country, and when Congress convenes, I'm giving serious 
consideration to introducing legislation, authorizing $15 
million to create identity theft strike force pilot projects, 
around the country.
    So, I look forward to this hearing today, and I'd like to 
introduce the first panel.
    Let me begin with Sheriff Baca. He is the thirtieth Sheriff 
of Los Angeles County.
    He commands the largest Sheriff's Department in the world, 
supervising more than thirteen thousand sworn civilian 
personnel.
    He's had an extraordinarily successful career in the Los 
Angeles Sheriff's Department, where he started as a Deputy 
Sheriff Trainee in 1965, rising to Captain in 1981 and Chief in 
1992. He was sworn in as Sheriff in 1998.
    His record is one of effective innovation. As a Chief of 
the Court Services Division, he directed the strategy that led 
to the merger of the Sheriff's Department and the Marshal's 
Department.
    The merger saved the taxpayers of Los Angeles $14 million a 
year.
    With the Sheriff Department's identity theft team, Sheriff 
Baca is again showing leadership. I look forward to his 
testimony in this area.
    And the remaining two speakers of the first panel are 
identity theft victims, Mari Frank and Selene Kassin.
    Let me just quickly tell you a little bit about them. 
Selene will describe in her testimony her personal encounter 
with identity theft.
    She had her identity stolen by a thief who had just her 
Social Security number, who used her identity to obtain 
numerous credit cards.
    Selene only found someone was living as her from a letter 
from a credit card company, asking if she tried to open up a 
new account.
    And the second person is Mari Frank. Mari is an Orange 
County attorney, who has been a victim of identity theft on two 
separate occasions.
    Since her first traumatic encounter in 1996, she's devoted 
much of her time and energy, teaching others how to protect 
themselves.
    She is a co-author of the ``Identity Theft Survival Kit,'' 
and is an Orange County, California Sheriff Reserve, for the 
High Tech Crime Unit.
    So, let's begin right now with the first panel, and I'd 
like to present Sheriff Baca of Los Angeles County.

PANEL CONSISTING OF LEROY D. BACA, LOS ANGELES COUNTY SHERIFF, 
LOS ANGELES, CA, MARI FRANK, IDENTITY THEFT VICTIM; AND SELENE 
                 KASSIN, IDENTITY THEFT VICTIM

                   STATEMENT OF LEROY D. BACA

    Sheriff Baca. Thank you very much Senator, and good 
morning. Welcome to the Los Angeles County Sheriff's Department 
Headquarters Unit, Sherman Block Administration Building.
    I would like to open my remarks by piggybacking on the 
things that you've described earlier, Senator, and I appreciate 
the thoroughness under which you have approached this problem.
    Prior to your testimony here, in opening up for our 
testimony, the Los Angeles County Sheriff's Department was well 
aware that there was an identity theft problem that needed to 
be addressed in a more concerted fashion.
    So, in order to do this, approximately a year and a half 
ago, we researched this issue in depth, and implemented the 
best ideas from victim advocates, the public and private 
sector.
    We trained our department as to the needs of the victims, 
and established a cutting-edge reporting procedure, that would 
centralize the tracking.
    As you identified earlier, there's apparently a reporting 
deficiency, in terms of how we can get victims who are multiple 
targets from various suspects.
    How can we get them to report things in a fashion that 
doesn't cause the victim any more agony than they already have 
by virtue of being a victim?
    So, what we did, is we put together a guide for law 
enforcement officers to follow, when they're dealing with 
victims of this type of crime.
    Furthermore, we put together a----
    Senator Feinstein. I'd like to ask that that be made part 
of the record.
    Sheriff Baca. Yes, and I will present you with a complete 
packet, that will include this information.
    Senator Feinstein. Thank you.
    Sheriff Baca. Second, the idea of how the department would 
respond to an identity theft report, what are the actual things 
that we will do, in order to ensure that the victim's 
circumstances are fully investigated?
    We developed an informational brochure for victims of 
identity theft, as well.
    Now, in producing this information, the logical outgrowth 
is that the public now is more informed, as to what they can 
do, and what will law enforcement do for them.
    Consequently, we have seen a dramatic increase in this type 
of offense being reported to us.
    For example, we have encountered, when we started this 
program, two hundred and seventy-three victims.
    This was in 1999, and we started the program around July. 
So, at about a 6-month period of time.
    Just opening up the first 4 months of this year, the year 
2000, we have already 645 cases reported to us, which is a net 
increase of approximately 136 percent.
    Recognizing these numbers and these statistics are, are the 
early reporting of what our experiences have been, it still 
clearly indicates that this is a problem that will only grow.
    The encouraging part of what is going on with your inquiry 
to local law enforcement about the problem, is that the State 
of California recognizes that there is a need for more things 
to be done, as well.
    For example, when we talked about training and public 
awareness, and then of course prevention, it's key to identify 
a central tracking mechanism and that, therein the Los Angeles 
County Sheriff's Department created the unit that is 
responsible for identity theft investigations.
    There, there, there, it's a team approach. There are four 
investigators and a supervising lieutenant, that are 
responsible for this highly specialized task force.
    Undoubtedly, procedures had to be established, and I have 
copies of that data for you.
    Not only do we have to have internal departmental 
procedures, but the State of California's peace officer and 
standards and training offices now have a 40-hour course to 
train law enforcement officers on how to do these type of 
investigations.
    The Sheriff's Department was privileged to participate in 
the, President Clinton's National Summit on Identity Theft, in 
Washington, DC, and at this point, the Federal Trade Commission 
has been working closely with the Los Angeles County Sheriff's 
Department, in a regional identity theft effort.
    Cases that are reported to us, undoubtedly can affect the 
Federal Trade Commission, as well.
    We have a new office facility in the city of Bellflower, 
that is capable of receiving additional investigative resources 
from the Federal Government.
    Moreover Senator, excuse me, moreover Assembly Member and 
Speaker, Robert Hertzberg, has authored an Assembly Bill 1949, 
to fund a multiple agency task force team in the State of 
California.
    I support wholeheartedly your bill, Senate Bill 2328, which 
is the Identity Theft Prevention Act, as well as your Senate 
Bill 2699, the Social Security Number Protection Act.
    Your effort in ensuring that these privileged and 
confidential pieces of information are not available in such a 
open fashion, as through the Internet, is a step in the right 
direction, to guarantee that victims can be protected properly, 
sought out victims, that is by very, very highly skilled 
offenders who will prey on information, and then from the 
information, prey on the victims themselves.
    I think that what I believe is necessary for us to go 
forward in Southern California is that we need to combine more 
Federal, State and local resources together.
    You will hear testimony from representatives of other 
agencies.
    As I close, I would like to recommend to you that a full-
time investigator from the following federal agencies be 
assigned to the Sheriff's Department Task Force: a member of 
the U.S. Postal Inspection Service; a member of the U.S. Secret 
Service; a member of the Office of Inspector General for Social 
Security and a member of the U.S. Treasury Department, Office 
of Tax Enforcement.
    I will also be recommending to the Governor and State 
officials that the California Department of Health Services, 
Offices of Vital Records, be assigned to this task force, and a 
member of the California Department of Justice.
    Thank you, very much.
    [The prepared statement and attachments of Mr. Baca 
follow:]

[GRAPHIC] [TIFF OMITTED] T3465A.001

[GRAPHIC] [TIFF OMITTED] T3465A.002

[GRAPHIC] [TIFF OMITTED] T3465A.003

[GRAPHIC] [TIFF OMITTED] T3465A.004

[GRAPHIC] [TIFF OMITTED] T3465A.005

[GRAPHIC] [TIFF OMITTED] T3465A.006

[GRAPHIC] [TIFF OMITTED] T3465A.007

[GRAPHIC] [TIFF OMITTED] T3465A.008

[GRAPHIC] [TIFF OMITTED] T3465A.009

[GRAPHIC] [TIFF OMITTED] T3465A.010

[GRAPHIC] [TIFF OMITTED] T3465A.011

[GRAPHIC] [TIFF OMITTED] T3465A.012

[GRAPHIC] [TIFF OMITTED] T3465A.013

[GRAPHIC] [TIFF OMITTED] T3465A.014

[GRAPHIC] [TIFF OMITTED] T3465A.015

[GRAPHIC] [TIFF OMITTED] T3465A.016

[GRAPHIC] [TIFF OMITTED] T3465A.017

[GRAPHIC] [TIFF OMITTED] T3465A.018

[GRAPHIC] [TIFF OMITTED] T3465A.019

    Senator Feinstein. Thanks, very much, Sheriff. I'll hold my 
questions, and give an opportunity for the two victims to 
testify.
    Let's begin with Selene, would you----
    Ms. Kassin. OK, sure, thanks.
    Senator Feinstein [continuing]. Begin your testimony, 
please?

                   STATEMENT OF SELENE KASSIN

    Ms. Kassin. Thank you, Senator.
    I produced a documentary called ``Stolen Identity, Crime of 
the Millennium,'' which was inspired by my own experience of 
having my identity stolen.
    The person who stole my identity did not know me. They did 
not know my age or my mother's maiden name. They did not know 
my driver's license number. They did not even know what I 
looked like.
    In fact, she changed all these statistics to match her own. 
All this person knew that stole my identity was my Social 
Security number.
    Having my identity stolen and recovering my identity was 
traumatic, scary and surreal.
    I felt I was victimized once by a perpetrator, and again by 
the system.
    I found out someone was living as me, from a letter from a 
credit card company, asking if I tried to open up a new 
account.
    When I called the credit bureaus, I found a new address, 
phone number, driver's license number and numerous new credit 
cards.
    I called and I went to several police stations, and I was 
refused help.
    The police told me they would take a courtesy report, but 
not to expect an investigation, and the burden of proof was on 
me.
    I called the police to see if they could tell me whom the 
phone line belonged to, that was listed on my credit report. 
They said they couldn't. I found out it belonged to me.
    So, I called the phone company to have them disconnect the 
phone line. They said they would have to notify the other 
Selene in writing first.
    The other Selene, the person who stole my identity, called 
them and was more convincing than I was, in proving my own 
identity.
    They believed her and didn't believe me, and subsequently 
closed the fraud file.
    I called the credit, I'm sorry, I called the credit card 
companies and I begged them to send me the documents that were 
forged in my name, and they did send them, but they sent them 
to her.
    As quickly as I would close the accounts, she would open 
new ones. I called the credit bureaus to ask why they opened 
new accounts when I had it flagged. They had no answer.
    My story is not typical, because I was fortunate enough to 
finally receive help from police.
    After several months of persistence, I was able to get 
enough evidence by myself that Detective Edholm of the Beverly 
Hills Police Department arrested her.
    She had a prior criminal record. I was told she would not 
be released on bail, but she was. I was notified several weeks 
later, that someone tried to take out a loan, in my name.
    The identity thief was sentenced to 18 months. She served 9 
months, and is now out on parole. The parole officer warned me 
that she could do it, all over again.
    The shocking thing about being a victim of stolen identity 
is you're often met with disbelief. People think stealing your 
identity cannot be that easy, that the police could not refuse 
to help you, and that if your identity was stolen, there has to 
be a remedy, to not only get it back, but also to prevent it 
from happening again.
    Because many of these aspects are not easy to digest as 
true, I was inspired to produce a documentary to give a voice 
to the victims that were often silenced by the current laws.
    The documentary ``Stolen Identity, Crime of the 
Millennium'' provides candid testimony from the victims 
themselves, that this crime exists and to what extent.
    It's currently being distributed by Aames Multimedia, 
Chatsworth to schools, universities, and law enforcement 
agencies, nationwide.
    While producing the documentary, I was astonished to learn 
that identities were being stolen, not only to obtain cash and 
credit cards, but to commit serious crimes in the name of an 
unsuspecting victim.
    I want to share some of their devastating stories, as 
they've tried to recover their identity and clear their names.
    One victim best described his battle in just a few words. 
It's war, and I'm the enemy.
    It's hard to believe that the crime of stolen identity 
exists, because it's nearly invisible to its victims.
    You don't see it happening to you, you wake up one day and 
all of the sudden you could be facing jail time.
    Rochelle, the school teacher, finds out she's been denied 
car insurance. When she calls to find out why, she finds out 
she has three driver's licenses that had been, that have been 
made out in her name. She also finds out she has an arrest 
warrant out for her.
    When she inquires with the DMV, they're suspicious, but 
they're suspicious of her. When she goes to the police, they 
refuse to help her.
    So, she goes to court with documents proving her identity, 
but the judge doesn't believe her.
    The story is typical. The first response that most victims 
face, when confronting the law is, you're guilty, and the 
burden of proof is on the victim.
    Victims generally have the responsibility of retrieving 
their identity, on their own, even if law enforcement is 
contacted.
    The victims also have to endure an emotionally-draining, 
costly, and time-consuming experience, of clearing their own 
name.
    I met Linda, a college student over many months, as she 
tried to prove her identity.
    She found, found out her identity was stolen, when the 
police showed up at her door with a bench warrant. She was 
charged with being under the influence of PCP.
    She had to live with the terror of going to jail, as she 
endured months of court appearances. She tried to prove her 
innocence, with her fingerprints. She had to have her 
fingerprints done 5 times, and they still did not prove her 
innocence.
    Finally, months later, in yet another court proceeding, she 
is told to undress, so that she could be examined for a 
distinguished tattoo, in the end, which would clear her name.
    She now carries the wrong person's certificate for the rest 
of her life, and she has to worry about a police officer 
knocking on her door, for something she didn't do, because the 
identity thief and her now share the same name.
    Stolen identity is an epidemic that attacks silently and 
indiscriminately. It's just a matter of time before you, or 
someone you know, will have their identity stolen.
    The crime of stolen identity is in dire need of a solution, 
and I support both of your bills, and I think it's a very 
important step.
    Senator Feinstein. Thanks, very much, Selene.
    Ms. Kassin. Sure.
    [The prepared statement of Selene Kassin follows:]

                  Prepared Statement of Selene Kassin

    I produced a documentary called Stolen Identity: Crime of the 
Millennium inspired by my own experience of having my identity stolen. 
The person who stole my identity did not know me. They did not know my 
age or mother's maiden name. They did not know my driver's license 
number. They did not even know what I looked like. (In fact she changed 
all these statistics to match her own.) All this person knew that stole 
my identity was my social security number. Having my identity stolen 
and recovering my identity was traumatic, scary and surreal. I felt I 
was victimized once by the perpetrator and again by the system.
    I found out Someone was living as me from a letter from a credit 
card company asking if I tried to open up a new account. When I called 
the credit bureaus, I found a new address, phone number, driver's 
license number and numerous new credit cards. I called and went to 
several police stations and I was refused help. The police told me they 
would take a courtesy report--but not to expect any investigation--and 
the burden of proof was on me.
    I called the police to see if they could tell me whom the phone 
line belonged to that was listed on my credit report. They said they 
couldn't. I found out it belonged to me. So, I called the phone company 
to have them disconnect the phone line. They said they would have to 
notify the other ``Selene'' in writing first. The ``other selene'' the 
person who stole my identity called them and was more convincing than I 
was in proving my own identity.
    They believed her and didn't believe me. And Subsequently closed 
the fraud file. I called the credit card companies and begged them to 
send me the documents that were forged in my name. . . . And they did 
send them. But they sent them to her. As quickly as I would close the 
accounts she would open new ones. I called the credit bureaus to ask 
why they opened new accounts when I had it flagged. They had no answer.
    My story is not typical, because I was fortunate enough to finally 
receive help from the police. After several months of persistence, I 
was able to get enough evidence by myself that Detective Edholm of the 
Beverly Hills Police Dept. arrested her. She had a prior criminal 
record. I was told she would not be released on bail. But, She was. I 
was notified several weeks later that someone tried to take out a loan 
in my name. The identity thief was sentenced to 18 months. She served 9 
months and is now out on parole. The parole officer warned me that she 
could do it all over again.
    The shocking thing about being a victim of stolen identity is you 
are often met with disbelief. People think stealing your identity 
cannot be that easy. That the police could not refuse to help you. And 
that if your identity was stolen, there has to be a remedy to not only 
get it back but also prevent if from ever happening again.
    Because many aspects of the crime are not easy to digest as true, I 
was inspired to produce a documentary to give a voice to the victims 
that were often silenced by the current laws. The documentary: Stolen 
Identity: Crime of the Millennium provides candid testimony from the 
victims themselves that this crime exists and to what extent. It is 
currently being distributed by Aims Multi-Media in Chatsworth to 
schools, universities and law enforcement agencies nation-wide.
    While producing the documentary, I was astonished to learn that 
identities were being stolen to not only obtain cash and credit cards, 
but to commit serious crimes in the name of an unsuspecting victim.
    I want to share some of their devastating stories as they tried to 
recover their identity and clear their names. One victim best described 
his battle in just a few words. ``It is war, and I am the enemy.''
    It is hard to believe the crime of stolen identity exists because 
it is nearly invisible to its victims. You don't see it happening to 
you. You wake up one day and all of a sudden you could be facing jail 
time.
    Rochelle, a schoolteacher finds out she has been denied car 
insurance. When she calls to find out why--she finds out her driver's 
license has been revoked for a year. She owes an outstanding fine and 
there is a warrant out for her arrest. She also finds out there are 
three driver's licenses being used with her name and someone else's 
picture on it. When she inquires with the DMV, they are suspicious . . 
. of her. When she goes to the police--they refuse to help her. So she 
goes to court with documents proving her identity. But the judge 
doesn't believe her.
    This story is typical. The first response that most victims face 
when confronting the law is ``you're guilty.'' And the burden of proof 
is on the victim. Victims generally have the responsibility of 
retrieving their identity on their own, even if law enforcement is 
contacted. The victims also have to endure an emotionally draining, 
costly and time-consuming experience of clearing their own name.
    I met Linda, a college student over many months as she tried to 
prove her identity. She found out her identity was stolen when the 
police showed up at her door with a bench warrant. She was charged with 
being under the influence of PCP. She had to live with the terror of 
going to jail as she endured months of court appearances. She tried to 
prove her innocence with her fingerprints. She had to have her 
fingerprints done five times. And they still did not prove her 
innocence. Finally, months later in yet another court proceeding. She 
is told to undress so that she could be examined for a distinguished 
tattoo that in the end would clear her name. She now has to carry a 
wrong person's certificate for the rest of her life. And she still has 
to worry about a police officer knocking on her door for something she 
didn't do because the identity thief and her now share the same name.
    Stolen identity is an epidemic that attacks silently and 
indiscriminately. It is just a matter of time before you or someone you 
know will have their identity stolen. The crime of stolen identity is 
in dire needs of a solution. This hearing is an important step in 
resolving this problem.

    Senator Feinstein. Appreciate the testimony.
    Mari Frank.

                    STATEMENT OF MARI FRANK

    Ms. Frank. Senator Feinstein, I thank you so much for 
allowing me to come and address you today.
    In May 1998, I appeared before this distinguished 
committee, when you were considering the Identity Theft and 
Assumption Deterrence Act of 1998.
    I especially applaud you and Senator Kyl, for the work that 
you did in having that law passed and signed by the President, 
in 1998.
    At that, when I was a victim, there was only one State in 
the country that had an identity theft statute, and that was 
Arizona.
    And now, because of the, the new identity theft Federal 
bill that makes identity theft a crime, we have almost forty 
States that have identity theft statutes, and I, I really 
applaud you, for taking the lead on that.
    When that bill was passed, it also established a central 
clearinghouse for the identity theft complaints within the 
Federal Trade Commission, and it was a very, very good positive 
step.
    However, that, that bill only dealt with victims after they 
had been victimized. The two bills that you have are clearly 
for prevention, which is what we need right now.
    I want to tell you a little bit about my story, and I'm 
also gonna go, after I tell my two stories, which I was just a 
victim again, last month, I will also tell you then some of the 
important aspects of your bill, and how they will affect 
victims in the future.
    I'm an attorney, and the author of the ``Identity Theft 
Survival Kit.'' I'm also the co-author of ``Privacy Piracy,'' 
which I just gave to you. As you remember, I gave you the, the 
kit when I was in Washington.
    I'm also an Orange County Sheriff Reserve, and I sit on the 
High Tech Crime Task Force, with several of the Los Angeles 
Sheriff's Department's people.
    And I want to applaud you for Joe Dulla, and all the people 
that you have, who have done so much, to really foster help for 
victims.
    My expertise in identity theft was acquired by necessity. 
In restoring my own life, I was compelled to assist in the 
passage of State and Federal legislation, and create materials 
to help other victims.
    Because the epidemic was growing so rapidly, those of us 
who had some understanding of the crime and its causes have 
been called upon to speak to the media, assist governmental 
agencies, and provide education to law enforcement and the 
financial industry.
    I was greatly honored to speak at the White House on, in 
May 1999, to discuss consumer privacy and identity theft.
    In August 1996, I received a call from a bank that I'd 
never heard of, asking me why I had not paid my $11,000 bill.
    At first, I wanted to get off the phone and tell them they 
were crazy, but the woman then told me my, asked me if that was 
my Social Security number and if it was my proper birth date.
    When my heart jumped into my throat, I answered, where did 
you send the bills? Where did you send the credit card?
    And I was told that, after much arguing with the person, 
exactly where the bills were, the bills and the statements were 
sent, and it was sent to Ventura, CA, which is about 3\1/2\ 
hours away from my home.
    I told her that it was fraud. She told me at that time, 
that she would erase it from fraud. However, it was then sent 
to collections, by the way.
    I found out that my imposter had used my credit to obtain 
new credit cards, credit lines, services and cash advances, all 
over $50,000.
    She also got a red convertible Mustang in my name. She had 
driven almost 3 hours to get my business cards, and parade as 
an attorney, up in Ventura, CA.
    She had rented a car and had totaled it, and I was being 
sued by Thrifty Rental Car Agency.
    My impersonator was assuming my entire identity, not only 
my personal identity, but my professional identity, as well, 
and I was afraid I was going to be disbarred from the State of 
California.
    It took me over 500 hours, and more than 10 frustrating 
months, to regain my credit. I have over five boxes of, 
overstuffed banker's boxes, filled with correspondence from 
credit reporting agencies, credit card agencies, the IRS, the 
Social Security Administration, the Postal authorities, the 
State Bar of California, on and on, and on.
    In 1996, according to State and Federal law, I wasn't 
considered the victim, until I found a peace officer who, 
himself, had been a peace officer for over 20 years, and he was 
a victim of identity theft.
    He sent a Lieutenant out to the home and this woman, indeed 
had said that she knew me, although she did not, and she said 
that I used to live with her, and she was getting mail to me 
there, and she always sent it back.
    We found out that this woman was on probation for 
shoplifting, she was arrested, let out on bail, and continued 
to accept fraudulent cards, and pre-approved offers.
    And I just want to show everybody, what exactly happened 
here, because it will show how the financial industry 
facilitated this crime.
    I've got handouts for you, and if you'll look, this is a 
copy of the original application that, by the way, it took me 
pulling teeth to get from the Bank of New York, Delaware.
    If you'll look where it says, ``Tracy Lloyd.'' Tracy Lloyd 
is my imposter who was convicted. She put, as you notice here, 
she'd crossed out one line through her name, put my name, and 
she did put my Social Security number, although I did erase it 
for you, while here today.
    Senator Feinstein. Good.
    Ms. Frank. Unfortunately, you see how old I am, because 
that was my proper birth date, and she had the spelling of my 
address of my office spelled wrong. She said, she had other 
things on here that were wrong, but notice she had her proper 
address.
    Now, she has a much nicer handwriting than I do, she sent 
this card in, and she sent this application in, which you 
notice was not even a pre-approved offer, and she got a $10,000 
credit card. She used this to get other credit cards.
    Now, the important thing to note is that when she got this 
credit card, you have to question, who was processing this 
credit card with the credit card company?
    Why did they not question the fact that she just crossed 
off a name? When they pulled my credit report, to see if they 
were going to issue a credit line of $10,000, they would have 
looked at my creditreport, and if they were cautious, they 
would have compared and seen that there was a different address on 
there.
    That should have been some kind of clue. They did nothing 
about that. Instead, Senator Feinstein, they sent her a credit 
card.
    Immediately after that, when that credit card was sent in, 
and I don't know if all of you notice, but when your credit 
card, a new credit card is sent in to the credit reporting 
agencies, then what they do, is they consider themselves 
reporting agencies, and what they do, is they just change the 
address to the new address on the new card.
    So, if you'll turn the paper over, you will then see what 
happened. Once, she got that first card, it started the whole 
craziness, and what she did, what happened then was the credit 
reporting agencies, which I don't know if all of you know this, 
but they sell your name and your financial information and your 
profile on promotion. At that time, I didn't know that.
    So, because I had pristine credit, and a new credit card 
was just issued, they sold my name on promotion to many, many 
different credit card companies.
    This is an example of a pre-approved offer. If you look at 
this, now she says she's making $300,000 a year. I wish.
    By the time she did this, she was not only doing this to 
me, but to other people, and she probably was making $300,000 a 
year.
    Notice she says she's an attorney with Steve Kuhn and 
Associates. That's not true. I have my own law office. So, that 
was a mistake.
    She has an address now. Now, she's being sent Mari Frank in 
Ventura, CA, when in fact, Mari Frank lives in Laguna Niguel, 
CA.
    So now, the pre-approved offer is going to her. Not only 
was there this pre-approved offer, but there were dozens and 
dozens like candy, coming to her door.
    Also, if you'll notice, she wants to use this as a credit 
line. She got a $15,000 credit line from this.
    If you notice, on the bottom, she says she wants to use it 
right away to pay off her Capital One account.
    So, what she did was, for a period of 10 months, she was 
using credit line to pay off different credit cards.
    So, because she didn't have any of my own credit cards, I 
had no idea this was going on. I'm getting my different credit 
card bills every month, and there's no fraud. So, there was no 
way for me to know.
    So, this is an example of the kinds of things you're 
addressing in your bill, about address changes, and the less 
than cautious approach. So----
    Senator Feinstein. Mari, I'm going to, I neglected to tell 
everyone, if they could really confine their initial remarks to 
5 minutes.
    Because, before the Sheriff has to leave----
    Ms. Frank. OK.
    Senator Feinstein [continuing]. I'd really like some of the 
Federal officials to be able to testify as well.
    Ms. Frank. OK.
    Senator Feinstein. And I need to ask him some questions.
    Ms. Frank. Okay, I just want to briefly tell my second 
identity theft victimization, that happened last month.
    Senator Feinstein. OK.
    Ms. Frank. I came back from a trip to New York, I had my 
AmEx card in my wallet, and I had $9,000 worth of fraudulent 
charges.
    I was a victim of skimming. For those, if you don't know 
what skimming is, skimming is when someone takes a credit card, 
and slides it through a little skimmer, they may have it in 
their pocket, when you go to a restaurant, and they download 
that information, and have a new card.
    And, in fact, the person who charged $9,000 at two 
different dealerships, had a name of Michael Brown, supposedly.
    So, I was the victim again. It took me, again, hours to 
clean up, and the credit reporting agencies were very difficult 
to work with, and Experian, for example, didn't even have a 
human answering the phone, and didn't get me my credit report 
for 20 days.
    So, I have all of this in my testimony, and I can answer 
questions, and I also reflect on here, all of the things that 
you're doing, I am showing why it's so important.
    So, I just want to tell you, I honor you, and thank you for 
both of the bills, and I support them strongly.
    [The prepared statement of Mari Frank follows:]

                  Prepared Statement of Mari J. Frank

    Senator Feinstein and honorable members of this committee, thank 
you for the opportunity to address you today. In May of 1998, I 
appeared before this distinguished committee when you considered the 
Identity theft and Assumption Deterrence Act of 1998. I especially 
applaud Senator Kyl and Senator Feinstein for their leadership and 
efforts in the passage of that law. By making Identity theft a federal 
crime, it helped to educate states to also make Identity theft a crime. 
We now have almost 40 states that have enacted statutes--only Arizona 
had a statute when I became a victim. The federal legislation also 
established a central clearinghouse for identity theft complaints 
within the Federal Trade Commission. There is now a toll free number 
for consumers to call (1-877-IDTHEFT) and a web site of information at 
www.consumer.gov/idtheft. I am grateful that congress focussed on law 
enforcement's role and allocated more resources, and I am pleased that 
the Federal Trade Commission is providing education to victims after 
they find out about their evil twin, but that Act did nothing to 
prevent the crime from occuring.
    When I testified on that bill, I brought to your attention how the 
credit reporting agencies and the credit grantors were facilitating the 
crime of identity theft. I demonstrated how certain practices in the 
financial industry made the social security number easily accessible to 
fraudsters (it is the key to identity theft), and continued with 
procedures that failed to verify identity and address changes. Thank 
you for listening to those concerns and addressing those issues in 
Senate Bill S. 2328, The Identity Theft Protection Act of 2000, and in 
Senate Bill S. 2699 The Social Security Number Protection Act of 2000. 
In my testimony today, I will tell you about real life examples that 
clarify the need for these bills that you are now considering.
    My written testimony will give you a brief overview of my own 
identity theft nightmares; provide you with insights that I have gained 
after hearing from thousands of victims; indicate why the bills we are 
considering today are so critical; share a few helpful tips for 
consumers to protect themselves, and provide some measures to take if 
one's identity is stolen.
    I am an attorney, the author of the Identity Theft Survival Kit 
(Porpoise Press, 1998), Privacy Piracy (Office Depot 1999--co-authored 
with Beth Givens, the Director of the Privacy Rights Clearinghouse), 
and an Orange County, California Sheriff Reserve for the High Tech 
Crime Unit. My expertise in Identity Theft was acquired by necessity.
    In restoring my own life, I was compelled to assist in the passage 
of state and federal legislation, and create materials to help other 
victims. Because this epidemic grew so rapidly, those of us who have an 
understanding of the crime and its causes have been called upon to 
speak to the media, assist governmental agencies, and provide education 
to the financial industry and law enforcement. I was greatly honored to 
address members of congress and the financial industry on May 4, 1999, 
when I spoke at the White House on Consumer Privacy. I shared my story 
and offered solutions.
    In August 1996, I received a call from a bank that I had never 
heard of asking me to pay an $11,000 bill to them. I was about to hang 
up, when the woman asked if she had my correct social security number, 
birth and other identifying information. Upon hearing her tell me my 
personal and financial information, my heart leaped into my throat. I 
asked where the company had sent the credit card and billing 
statements.
    She gave me an address four hours from my home in a city I had 
never been. I found out that my impostor had used my credit to obtain 
all new credit cards, credit lines, services, and cash advances of over 
$50,000. She also had purchased a red convertible mustang using my 
name, had rented a car and totaled it and I was being sued by the 
rental car agency. My impersonator was also assuming my professional 
identify by using my name on business cards indicating that she was a 
licensed California attorney.
    It took me over 500 hours and more than 10 frustrating months to 
regain my credit--I have 5 overstuffed bankers boxes filled with 
correspondence with credit reporting agencies, credit card companies, 
the IRS, the Social Security Administration, the Postal Inspector, the 
State Bar of California, and on and on. In 1996, according to state law 
and federal law I was not considered the victim. Until I found a peace 
officer that was victim himself, I could not get a police report. Even 
though there are almost 40 states with Identity Theft statues, over 
half of the victims who contact my office cannot get law enforcement to 
issue a report.
    Many law enforcement agencies are concerned that if a report is 
issued, a full investigation will be needed, and there are just not 
enough resources to investigate all the identity theft. Unfortunately, 
without a police report--it is impossible to clean up the mess.
    Although prior to my stolen identity, I had pristine credit, after 
my evil twin abused my financial profile, I was considered a low life 
that didn't want to pay my bills. I was hounded by creditors and 
collection agencies and ignored by the Credit Reporting agencies. 
Victims call me every day telling me the same story.
    I found out that my ``identity clone''--who I never knew, had been 
working as a contract secretary in several law offices. She was able to 
access a copy of my credit report as well as those of other victims. 
Many law offices as well as car dealerships, realtors, banks, etc. have 
on line or fax subscriptions to order credit reports from the credit 
reporting agencies and resellers. So my impostor accessed the system, 
obtained my entire personal and financial profile, including my social 
security number, and took over my identity. Because I was tenacious, 
and the law enforcement agency in the city where she resided had 
empathy, she was arrested. Soon after she was released on bail, she 
continued to defraud others and me.
    She stalked my family by phone; dumpster dived my garbage, stole my 
mail, and still drove around in the red convertible mustang purchased 
with my credit. A year later she was sentenced to a two month work 
furlough program and probation (still driving that car). A few months 
later she was apprehended committing identity theft again in a 
different state. Unfortunately, although the police took the case 
seriously, the district attorney and judge saw this as economic crime--
the stepchild of the criminal justice system. Very few of identity 
theft cases are investigated--thus few impostors are prosecuted unless 
there is a great loss or a crime ring is involved.
    Although I was victimized, I chose not to succumb to victim-hood. I 
created the kit that I wish I would have had--The Identity Theft 
Survival Kit with pre-written legal letters on diskette and step by 
step instructions.
    I developed a web site with over 70 pages of free information to 
help other victims. Because of this outreach to victims, I receive at 
least 100 e-mails and calls a month from victims and frightened 
consumers across the country. They are still experiencing the same 
problems with financial industry as I did.
    Before I go into those problems and how the two bills presented 
help focus on those concerns, it is important to know that no one is 
immune from this crime and that it can happen more than once to the 
same person. I receive calls from lawyers, doctors, homemakers, retired 
persons, teachers, students, judges, and even widows who tell me that 
their loved one who has died is a victim after death.
    In early July, 2000 (last month) I gave a presentation on Identity 
Theft for Chase Manhattan Bank in New York City. I explained to them 
how a customer can become a victim of identity theft from ``skimming'' 
when, for example, a waiter takes credit card at the end of the meal, 
slides the card through a small 3'' by 5'' skimmer in his pocket, then 
processes the card at the register and returns the card to the 
cardholder smiling and gratefully accepting his tip. That evening, the 
fraudster downloads the information that he obtained from the back of 
the customer's card and sends it to make a new card with the duplicated 
metal strip of the customer's card on the fraudulent card.
    When I returned to California after the program, I opened my 
American Express bill to find over $9,000 of fraudulent charges with my 
credit card still in my wallet.
    Cleaning this mess only took me 7 hours. Amex promptly opened an 
investigation, but told me that they would not notify me of the 
results. They gave me the telephone numbers of the two car dealerships 
(where most of the fraud occurred) located in a California city that I 
had not visited. Upon calling the dealerships, I learned that the man 
who used my ``card'' was named Michael Brown and he lived at an address 
near the dealerships several hours from my residence.
    So here I was victimized again. I called the fraud department of 
the three credit reporting agencies. After at least twenty minutes of 
pushing buttons and waiting, I finally was able to reach a human at 
Equifax and TransUnion. They told me to write to them concerning the 
fraud enclosing copies of my license and a utility statement. Within a 
week I received my credit reports--the fraud departments of those 
agencies provided no further referrals, assistance or suggestions. I 
fortunately knew what steps to take; however, most victims haven't a 
clue of what to do!
    When I called Experian, even after pushing every button on my 
phone, I could not reach a live person. I was told by recorded message 
that I was to send a letter referring to my fraud and I would receive a 
report within 10 days. After 20 days I received a form letter--just 
last week, stating that I needed to send $8.00--when in fact a credit 
report is free for victims of fraud. I had sent my mortgage statement, 
a copy of my driver's license and a utility bill. After a call to the 
number of the form letter, I waited 30 minutes until I relieved a live, 
but rude person who told me that I needed to send a recent phone bill 
to get my report and place a fraud alert on my file for more than 90 
days--up to seven years. After demanding to speak to a supervisor, I 
was allowed to fax the phone bill, and he agreed to send my credit 
report by overnight mail once he found out I was to testify at this 
hearing. Most victims are overwhelmed when they call the credit 
bureaus. They don't know what to ask and receive virtually no 
assistance or reassurance from the credit reporting agencies. Although 
the Credit Bureaus claim that they have improved their assistance, my 
experience just this month, and the e-mails and phone calls I receive, 
tell me otherwise.
    When I became a victim the first time, it was a total identity take 
over, obviously much worse then this recent skimming incident. My evil 
twin took advantage of a very easy system, which is illustrated by the 
attachments to this written testimony. My convicted impostor, Tracey 
Lloyd had received a promotional offer sent to her residence by The 
Bank of New York, Delaware. This started the ``identity cloning'' 
process. You can see from this document, that she crossed one line 
through her name, inserted mine, wrote in my social security number 
(which I have erased for obvious reasons) and added some other 
identifying information, much of which was not correct, and within two 
weeks she received a credit card at her address with my name with a 
credit limit of $10,000.
    Whose fault was it that Tracey Lloyd was able to commit fraud? Why 
didn't the bank's personnel question the fact that the name associated 
with the address was crossed out and changed to an entirely different 
name on the application? Clearly the bank pulled my credit profile 
before issuing a card with such a $10,000 credit limit. Why did the 
bank issue the credit card to an address that was different from the 
address on the my credit report? Why didn't the bank question the fact 
that the name of the law office and the address on the application did 
not match the information on my credit report? If the bank had taken 
just a moment to verify and match, they would not have issued the card 
without further investigation. Because of their faulty procedures, I 
experienced identity theft hell!
    Once the credit reporting agencies get news of a new credit card 
and a new address, they report the new address as the ``current 
address'' even though it may be a fraud address. In my case--and this 
still happens to thousands of victims each day--the new address was 
reported to the three agencies. This activity of a new card prompted 
the agencies to sell my name with the new address on promotion (I have 
since removed my name from the promotional lists by calling 1-888-5-
OPTOUT). Then as you can see in exhibit two attached, my impostor 
received dozens of pre-approval offers (like candy to her door!) This 
offer from Security Pacific enabled her to get checks with a $15,000 
credit line. The more credit cards she received, the more credible she 
was, and the more she could apply for. With my business cards and a 
false driver's license with her picture, she was transformed into a 
credit worthy professional with instant credit, while my reputation was 
being destroyed without my knowledge. She had been impersonating me for 
11 months before I received that fateful call demanding money. Most 
victims don't find out about the identity fraud until they are denied 
credit or employment or a service. Other times they learn about the 
fraud when they receive a call from a bank or collection agency. 
Because of the insidious nature of this crime and the less than careful 
procedures of the credit grantors and credit reporting agencies, there 
is little a savvy consumer can do to avoid if an impostor wants to 
strike. For that reason, the Identity Theft Protection Act of 2000--S. 
2328 provides some important safeguards.

                            ADDRESS CHANGES

    In almost every case in which there is an identity takeover (not 
skimming or the use of a stolen valid credit card), there is always a 
change of address by the impostor, Holding creditors and credit 
reporting agencies accountable for verifying address changes is 
necessary to prevent fraud. The Act requires verification of address 
for:
    1. Impostors who try to change the addresses for valid cards held 
by the victim or for potential impostors who try addressing their names 
as additional cardholders at a different address.
    2. Potential new accounts by persons who apply for cards at a 
different address than the address listed for the consumer on his 
credit report.

                              FRAUD ALERTS

    A fraud alert provides notice to creditors that the consumer must 
be called before credit is issued. It is a protection from 
impersonators opening new accounts without thee victim's knowledge. In 
many cases, even with a fraud alert, credit is issued--especially 
instant credit where a creditor only receives a credit score and does 
not see the alert. Also, hundreds of victims have told me that 
apartments, cell phones, and mortgages were issued in their names after 
a fraud alert is on file with the credit reporting agencies.
    Credit reporting agencies will place a fraud alert on for 7 years. 
I believe it should be kept on permanently if the victim so wishes; 
however that is not permitted by the Credit Reporting Agencies.
    S. 2325 by Senators Feinstein, Kyle and Grassley allows a consumer 
to place a fraud alert on a file, and requires that this alert be 
provided to all users who access the credit report. More importantly it 
provides penalties for creditors who extend credit without contacting 
the consumer to verify if credit was requested. If an impostor obtains 
credit after a fraud alert is on the file there would be sanctions 
allowable

      DUTY TO INVESTIGATE AND THE ISSUANCE OF FREE CREDIT REPORTS

    Identity theft victims and non-victims who are harmed by merged and 
mixed files (one consumer's bad credit appears on that of another with 
a similar name), there are disastrous results and ruined reputations. 
The best way to ascertain stolen identity (or other errors reducing a 
consumer's credit reputation) is to see one's credit report. Several 
states have already enacted laws to provide one free credit per year to 
consumers. All consumers should be able to review their credit reports 
at no cost once a year to reduce the cost of fraud.

     SELLING PERSONAL INFORMATION INCLUDING SOCIAL SECURITY NUMBERS

    Presently Credit Reporting Agencies are selling the credit header 
information to information brokers. The information includes personal 
identifying information such as the social security number. This number 
is the only identifier an impostor needs to steal your identity. We 
know of consumers who became victims when only their social security 
number was used--not even their correct name. Consumers right now do 
not have the right to opt-out of this information being sold. They only 
have the right to limit their financial profile form being sold without 
their permission. With no control over the sale of that personal 
information, on-line brokers are selling the social security number for 
as little as $20. This is a small investment for criminals who intend 
to use the information to defraud someone of thousands of dollars.

               INDIVIDUAL REFERENCE SERVICE--DISCLOSURES

    We are seeing a dramatic rise in cases of criminal identity theft. 
This occurs when an impersonator is arrested or convicted of a crime in 
the name of a victim. A victim of criminal identity theft often doesn't 
even friend out about the fraud until he is arrested or denied some 
benefit. We have helped victims who were denied employment due to 
criminal records that did not belong to them. Victims have been 
terminated from their jobs, lost custody of their children, been 
deported, lost their professional license, etc. Even when we finally 
ascertain the records and provide fingerprints and mug shots to clean 
up the criminal records, the information brokers have sold that 
information dozens of times to entities--so the information continues 
to proliferate. Presently, many of these victims cannot find out what 
information was sold, to whom it was sold, who to correct it and how to 
stop it from being sold erroneously again by others. This type of 
identify theft can last a lifetime and destroy a person's reputation 
forever.
    S. 2328 addresses the need to hold the Individual Reference 
Services accountable. This bill would ensure that consumers could 
access the information compiled by the various information brokers to 
see if the information is correct. I suggest that the bill be amended 
to clarify the correction procedure and provide penalties for failure 
to correct in a timely manner. Presently I am helping a victim who has 
cleared his criminal records, yet the Individual Reference Service 
company claims it cannot provide a list of who purchased and received 
the erroneous information so that we can correct the file. This victim 
was unable to get employment until his story was told on Dateline NBC 
this past April, 2000.

                           SUMMARY OF PROBLEM

    We are living in an easy credit society (11 billion pre-approved 
offers were sent out in 1999), where information is readily transferred 
in a nano-second on the Internet and that information is worth more 
than currency. In a matter of a few minutes, an impostor can purchase 
your social security number and apply for numerous credit cards on-line 
without your knowledge. The impersonator can get medical care, become a 
legal citizen, take over your professional status, steal money from 
your accounts, buy life insurance in your name, purchase a home and 
even be arrested with your identity. Anything you can do, your 
impersonator can do. We have even had victims tell us that ex-spouses 
have had friends assume their identity just to ruin their reputation.
    So on a local and federal level; we need to work collaboratively. A 
victim in California may have an impostor in New York City who then 
sells the data to another criminal in Miami. The impostor could be part 
of a fraud ring using the mails, selling social security numbers, 
stealing identities in the workplace through the human resource 
departments or payroll departments. The crime is complex after it 
occurs. However if all businesses were more conscientious concerning 
the proper handling of our personal information, and were held 
accountable to safeguard that data with monetary sanctions, perhaps the 
situation would change. If the financial and governmental entities were 
required to verify and authenticate identities (before issuing credit 
or providing services, or booking criminals) our identity theft problem 
would be greatly reduced.

                          PROTECTING YOURSELF

    No one can assure you that you won't become a victim since your 
information and the issuing of credit is beyond your control, however 
you can minimize your risk by:
    1. Ordering your three credit reports from Equifax, TransUnion, and 
Experian twice a year to look for fraud accounts and inquiries, and 
mixed files with errors. Immediately correct anything suspicious and 
place a fraud alert on your file.
    2. Shredding or disposing of all of your confidential information 
offline and online. Also shred confidential information in your 
computer and by using shredding software.
    3. Don't give out personal information over the Internet or by 
filling out warranty information. Your personal information is the key, 
especially your social security number. Don't give out your social 
security number unless it is for some tax purpose. Ask for an 
alternative number. Presently companies can ask for your social 
security number, but you don't have to give it--they may deny you 
service.
    For more free information go to www.identitytheft.org; 
www.privacyrightrs.org; and www.consumer.gov/idtheft.

            DEALING WITH IDENTITY THEFT IF IT HAPPENS TO YOU

    If you become a victim, go to the above web sites for specific 
guidelines, but here are the top three things to do:
    1. Immediately contact the fraud department of the three credit 
reporting agencies to place a fraud alert and obtain your full reports 
at no charge. Carefully read these reports and identify false names, 
fraud addresses, fraud inquiries, and fraudulent account. (See the free 
form letter at www.identitytheft.org)
    2. Once you receive your credit reports, make a police report 
listing all the fraud found on the credit reports and send a copy of 
the police report with a cover letter to each of the credit reporting 
agencies requesting that all the fraud accounts listed on the police 
report be removed within thirty days.
    3. Write to all the fraudulent credit grantors (get the addresses 
from the Credit Reporting Agencies), your own credit grantors and banks 
to inform them of the fraud and get new passwords (never use your 
mother's maiden name), write the IRS, the Social Security 
Administration, the Postal Inspector, etc. (see the list of letters to 
write at www.identitytheft.org--The Identity Theft Survival Kit has all 
the letters on diskette and includes step by step instructions for who 
to call, what to say, and how to get what you need to regain your life.
    Thank you all for the opportunity to testify about the multifaceted 
issues of identity theft. California is leading the states in number of 
identity theft reports and has also taken a lead in dealing with 
proposing solutions. As a former victim and an advocate, I am grateful 
for your legislative proposals and will be happy to provide you further 
information and assistance.

[GRAPHIC] [TIFF OMITTED] T3465A.020

[GRAPHIC] [TIFF OMITTED] T3465A.021

    Senator Feinstein. Thank you, thank you. Well, thank both 
of you, very much.
    The testimony is very compelling, and I think everybody can 
see how it can happen to them.
    As a matter of fact, you'd be interested to know, Mari, 
that my chief of staff in Washington was the victim one 
weekend. So it, it is happening.
    Sheriff, let me, quickly ask you some questions, because I 
know you're busy, and I thank you very much for this, and being 
here.
    This is the first strike force in the Nation, as far as I 
know. How many people are dedicated to it? How does it work? 
How much time does an investigation take?
    Sheriff Baca. Let me introduce you to Lieutenant Jordan, if 
I may, Senator. He's the lead of that task force.
    And would you please, as quickly as you can----
    Senator Feinstein. Lieutenant, welcome.
    Lieutenant Jordan. Good morning, Senator.
    Sheriff Baca [continuing]. Answer her question.
    Lieutenant Jordan. There's four deputies assigned to the 
task force. There's a Lieutenant, me, and the way it works, is 
we work together with other law enforcement agencies.
    We work together with the Highway Patrol, we work together 
with the Los Angeles Police Department.
    Senator Feinstein. And, now obviously, you cover the 
County, not the City.
    But if, if someone has an identity theft, and they live in 
the county, they would then report it to the Sheriff's 
Department? And report it to your task force?
    Lieutenant Jordan. Yes. Sheriff Baca made a decision, about 
a year and a half ago, to assist the victim, so that they could 
report their theft of identity to the local sheriff's 
department substation.
    Whether the crime occurred in Connecticut, they could go to 
a sheriff's station, say, in the city of Temple, report the 
crime and begin the process of recovering their identity.
    Senator Feinstein. Now I, I guess people from the city of 
L.A., still would go to the police department to report the 
crime, right?
    Lieutenant Jordan. Yes, based on, based on what the Sheriff 
did, then Gil Garcetti, the District Attorney, made a policy 
decision that the Los Angeles Police Department, and the Los 
Angeles County Sheriff's Department, would take those first 
reports.
    Senator Feinstein. Ah-hah. So, can someone from L.A. City 
go into a sheriff's department, and report it?
    Sheriff Baca. Yes, we can cover each other's jurisdictions, 
to start the process.
    So, a city resident can come to a sheriff's station and 
start a process, or a county resident go to a police station 
and start the process.
    Ideally, it would be that if you reside in the City of Los 
Angeles, you can go to a police station. If you reside in 
sheriff's territory, you go to a sheriff's station.
    But we are combining our effort, through this task force 
endeavor, and we believe that more can be done, if the staffs 
of both these departments were combined under one roof.
    And of course, we're at the early stages of this task force 
effort, and that's why I'm recommending to you that we further 
increase the staffing, by bringing in these Federal agencies, 
as well.
    This is not unprecedented. We do this with Asian crimes 
that we investigate, we do this with narcotics cases that we 
investigate, and there are even other specialty offenses, that 
occur in the jewelry business, that require us to have this 
collaboration between Federal, State and local municipal law 
enforcement.
    And how long does it take for one of these cases to be 
investigated, by the way? The Senator asked that question.
    Lieutenant Jordan. They can take as little as 60 hours, and 
as much as a 1,000 hours.
    Primarily, because that they cross jurisdictional lines, 
they cross county lines, State lines and Federal lines. We've 
even investigated cases that are crossing international 
borders.
    Once you get into it, you see that it's like a spider web. 
It just keeps growing and growing.
    Senator Feinstein. Right, right. Now, and that's the 
interstate aspect of this. I think makes your request a 
legitimate request, Sheriff.
    And we have Social Security here, and we have Postal 
Services here, and perhaps they can comment in their testimony, 
on this request.
    Does LAPD assign officers to the strike force? Or are the 
four, you have four Sheriff's deputies.
    Sheriff Baca. Sheriff's deputies. Currently, they're 
working independent of our team.
    However, there is communication back and forth between the 
two offices. So, in effect, although we're not housed together, 
we are operating in a collaborative effort.
    Senator Feinstein. How many cases do you have at present, 
under investigation?
    Lieutenant Jordan. Currently, we have, as of today, 
approximately eighteen hundred and fifty cases, so far reported 
this year, to the L.A. County Sheriff's Department, alone.
    Senator Feinstein. How many, or I don't know if you have 
this broken down, but how many of them would you say are fraud, 
in terms of money, and how many of them are aimed at things 
like stalking and violence?
    Lieutenant Jordan. The majority of the ones that we 
receive, Senator, are the frauds, for money.
    Senator Feinstein. My finding is also that fraud represents 
the majority of cases right now. That's not to say that stolen 
personal information can't be used for a violent crime, but 
generally it's in this area of money fraud.
    Lieutenant Jordan. Exactly.
    Senator Feinstein. Right, OK.
    Lieutenant Jordan. Also, to piggyback, Senator, on one of 
the questions you asked earlier, one of the things that we're 
going to propose to the International Associationof Chiefs of 
Police meeting at San Diego, later this year, is that all the chiefs of 
police, across the Nation, develop the same policy that Sheriff Baca 
started and that Gil Garcetti furthered, and that is to have the 
individual citizen that lives in that jurisdiction, be able to walk 
into that local police station or sheriff's station and initiate that 
first report.
    Senator Feinstein. Right. Because, it's very difficult. 
All, all of the testimony that I've received, it's very 
difficult for people to get law enforcement to take them 
seriously.
    And then second, it's difficult for people to really regain 
their identity. The Senate Judiciary Committee that received 
testimony in Washington from a young woman in San Diego County, 
who had her identity stolen. A year after she reported the 
theft, she went to Mexico on a vacation, and Customs wouldn't 
let her back into the United States.
    And she was alone and she had to prove that she wasn't who 
Customs said she was, because the person committing this 
identity theft had a criminal record, and therefore, she was 
accused of having that criminal record.
    So, a critical step in how government can, from a law 
enforcement point of view, really restore somebody's legitimate 
identity, across all of the lines that it has to be restored. 
Identity theft is not only local.
    A victim has problems with events, like coming back into 
the country, if one's name happens to get on a list, because 
they think you're someone else.
    Sheriff Baca. Well, exactly, and the testimony from the two 
victims that we heard addresses that point more succinctly, and 
that is they're like a football, where they're being moved one 
part of the field to the next part of the field.
    And at some point, somebody has to say, we'll start it 
right here, and we were not gonna pass this off to another 
agency, because the victim, in terms of the dollar amount lost 
was in a bank out of State.
    And that's the problem here. It's an international, 
national scope of the problem itself.
    Senator Feinstein. Sheriff, I hope you can say a little 
bit, for this testimony.
    So, I'm going to not ask Selene and Mari questions right 
now, but move along, because I think it's important that this 
record be intact.
    And let me just now welcome the second panel of witnesses. 
Jerry Klurfeld represents the Federal Trade Commission (FTC).
    He's an independent law--well FTC is an independent law 
enforcement agency, charged by Congress with protecting 
American consumers from unfair methods of competition, and 
unfair and deceptive acts and practices in the marketplace.
    Pursuant to the Identity Theft Assumption and Deterrence 
Act, the FTC is today the Federal Government's central 
repository, for identity theft complaints, and is charged with 
providing victim assistance.
    Mr. Klurfeld is Regional Director of the Western Region of 
the FTC. He was appointed to this position, which embraces 
California, Arizona and Nevada, Hawaii, Colorado and Utah, in 
1990.
    Mr. Klurfeld, we'd like to hear from you, if you would.

 PANEL CONSISTING OF JEFFREY A. KLURFELD, DIRECTOR OF WESTERN 
REGIONAL OFFICE, FEDERAL TRADE COMMISSION, JANE VEZERIS, DEPUTY 
INSPECTOR GENERAL, SOCIAL SECURITY ADMINISTRATION; AND MICHAEL 
 E. AHERN, DEPUTY CHIEF INSPECTOR, FIELD OPERATIONS WEST, U.S. 
                   POSTAL INSPECTION SERVICE

                STATEMENT OF JEFFREY A. KLURFELD

    Mr. Klurfeld. Thank you, Senator.
    I appreciate the opportunity to present the Federal Trade 
Commission's views on the important issue of identity theft, 
and describe to you the commission's efforts to help victims, 
alert industry and equip law enforcement, to deal with this 
heart-rending crime.
    Senator, we applaud your efforts to combat this serious 
problem that injures so many consumers, and we also endorse 
your determined legislative efforts to protect the public 
against this pernicious problem.
    As you aptly noted, this type of fraud, like so many types 
of fraud, is really opportunistic.
    In my remarks today, I will discuss the growing phenomenon 
of identity theft, briefly, and the measures the commission has 
taken, to meet the goals of the Identity Theft Act.
    The fear of identity theft has gripped the public as few 
commission, consumer issues have. This is in part because it 
seems to be widespread, and in part, because the consequences 
can be so devastating.
    Consumers feel particularly vulnerable, knowing that no 
matter how careful they are, they may nonetheless become 
identity theft victims.
    The Identity Theft Act addressed these concerns in several 
concrete ways. As, Senator you noted, it directed the Federal 
Trade Commission to establish the Federal Government's central 
repository for identity theft complaints, and to provide victim 
assistance and consumer education.
    The identity theft clearinghouse, our toll-free hotline 
phone counselors and our consumer education campaign have 
helped the FTC begin to address the serious problems associated 
with identity theft.
    As the commission staff has strived to meet the 
responsibilities of this act, we have learned much about the 
crime, its victims and its perpetrators.
    Let me now address what our clearinghouse tells us about 
identity theft in California.
    The Identity Theft Act recognized the importance of 
creating a single repository for identity theft complaints.
    Accordingly, we established this clearinghouse to collect 
and consolidate these complaints. We are already seeing the 
fruits of this effort.
    The data from these complaints are illuminating. The basic 
complaint data showed that the most common forms of identity 
theft reported by California consumers, during the first 9 
months of operation were credit card fraud, approximately 50 
percent of consumers reported this type of fraud, and this is 
where an account is opened in their name, or there is a 
takeover of their existing credit card account.
    Communication services and 28 percent reported this where 
the identity thief opened up telephone, cellular or other 
utility services in their name.
    Bank fraud, approximately 17 percent reported that a 
checking or savings account had been opened in their name.
    Fraudulent loans, representing about 10 percent, the 
victims and government documents or benefits, approximately 8 
percent reported that the identity theft had obtained 
government documents, or benefits, such as a driver's license, 
or file documents, such as a tax return in their name.
    Not surprisingly, the States with the largest populations 
account for the largest numbers of complainantsand suspects, 
and Senator as you noted correctly, California is the State with the 
highest number of complainants.
    About 60 percent of California victims calling us identify 
their age, and I can report that data to you later, if you 
wish.
    Commission staff is also assessing the data on the monetary 
impact of this theft.
    Some complainants provided estimates of the dollar amounts 
obtained by the thief, because they have received the resulting 
bills, or had been notified of the resulting bad debts.
    California consumers reported a total monetary loss of 
approximately $18 million, and the range of dollar amounts 
reported by these consumers in California varies widely.
    For example, 12 percent of complainants reported theft, 
totaling between $5,000 and $10,000, 16 percent of complainants 
reported theft of over $10,000.
    The data also reveal information about the perpetrators. 
Almost 60 percent of the complainants provided some identifying 
information about the identity thief, such as a name, address 
or even a phone number.
    Los Angeles was the most common location for suspects, 
reported by California consumers.
    It was reported more than 3 times more often than the next 
most common location, which is Oakland.
    Consumers also report the harm to their reputation or daily 
life.
    The most common, non-monetary harm reported by consumers is 
damage to their credit report through derogatory, inaccurate 
information.
    Forty-nine percent of California consumers reported that 
they were harmed in this matter. This negative credit 
information leads to the other problems, most commonly reported 
by victims, including loan denials, bounced checks, rejection 
of credit cards.
    Identity theft victims also report repeated contacts by 
debt collectors for the bad debt incurred by the identity 
thief.
    Many consumers reported that they have to spend significant 
amounts of time resolving the problems caused by identity 
theft.
    The commission has made great strides in assisting 
consumers and law enforcement to combat identity theft, but 
recognizes that much remains to be done.
    Earlier this year, the Identity Theft Prevention Act of 
2000 was introduced in the Senate, and this would effectively 
address many areas of identity theft vulnerability, and protect 
many consumers from becoming victims of this very serious 
crime.
    The Federal Trade Commission strongly supports this 
legislation, and we'd like to thank you for the opportunity to 
participate in this important hearing. Thank you.
    [The prepared statement of Jeffrey A. Klurfeld follows:]

               Prepared Statement of Jeffrey A. Klurfeld

    Senator Feinstein, I am Jeffrey Klurfeld, Director of the Weston 
Regional Office of the Federal Trade Commission (``FTC'' or 
``Commission'').\1\ I appreciate the opportunity to present the 
Commission's views on the important issue of identity theft and 
describe to you the Commission's efforts to help victims, alert 
industry, and equip law enforcement to deal with this harrowing crime. 
In my remarks today, I will discuss the growing phenomenon of identity 
theft, the measures the Commission has taken to meet the goals of the 
Identity Theft and Assumption Deterrence Act (``the Identity Theft 
Act''),\2\ and what we see as the major challenge for the coming year 
in combating identity theft.
---------------------------------------------------------------------------
    \1\ The views expressed in this statement represent the views of 
the Commission. My oral presentation and responses to questions are my 
own and do not necessarily represent the views of the Commission or any 
Commissioner.
    \2\ Pub. L. No. 105-318, 112 Stat. 3007 (1998) (codified at 18 
U.S.C. Sec. 1028).
---------------------------------------------------------------------------
    The fear of identity theft has gripped the public as few consumer 
issues have. This is in part because it seems to be widespread and in 
part because the consequences can be devastating. Consumers feel 
particularly vulnerable knowing that no matter how careful they are, 
they may nonetheless become identity theft victims.\3\
---------------------------------------------------------------------------
    \3\ Data from the Identity Theft Clearinghouse, our central 
repository of identity theft complaints, bear out these fears. See 
discussion at pp.7-10.
---------------------------------------------------------------------------
    The Identity Theft Act addressed these concerns in several concrete 
ways. It directed the Commission to establish the federal government's 
central repository for identity theft complaint, and to provide victim 
assistance and consumer education. As the Commission staff have strived 
to meet the responsibilities of the Identity Theft Act, we have learned 
much about the crime, its victims and its perpetrators.

             I. MEETING THE GOALS OF THE IDENTITY THEFT ACT

    In earlier testimony before this Committee, the Commission describe 
the ways in which we have carried out our responsibilities under the 
1998 Identity Theft Act.\4\ We have continued to build on these 
achievements.
---------------------------------------------------------------------------
    \4\ The Commission testified before this subcommittee on March 7, 
2000. We also testified before this subcommittee in May 1998 in support 
of the Act. Following the passage of the Act the Commission testified 
again, in April 1999, before the House Subcommittee on 
Telecommunications, Trade and Consumer Protection and the Subcommittee 
on Finance and Hazardous Materials of the Commerce Committee. That 
testimony focused on identity theft in the financial services industry.
---------------------------------------------------------------------------
A. Centralized Complaint Handling--877 ID THEFT
    The Commission established its toll-free telephone number, 1-877-ID 
THEFT (438-4338) to help consumers avoid or resolve identity theft 
problem. In addition to advising consumers, counselors enter consumer 
complaint information into the centralized Identity Theft Data 
Clearinghouse used to aid law enforcement and prevent identity theft.
    The identity Theft hotline has been in operation since November 1, 
1999. Calls answered have more than tripled in the last six months.\5\ 
About two thirds of the calls are from victims, with the remaining 
calls coming from consumers who are looking for information on ways to 
minimize their risk of identity fraud.
---------------------------------------------------------------------------
    \5\ The hotline received an averaged of more than 1000 calls per 
week in the month of July.
---------------------------------------------------------------------------
    The telephone counselors provide victims of identity theft with 
specific information about how to try to prevent additional harm to 
their finances and credit histories. Callers are advised to contact 
each of the three national consumer reporting agencies to obtain copies 
of their credit.reports and request that a fraud alert be placed on 
their credit reports.\6\ Fraud alerts request that the consumer be 
contacted when new credit is applied for in that consumer's name.\7\ 
The phone counselors also explain how to review carefully the 
information on credit reports to detect any additional evidence of 
identity theft. The counselors also inform callers of their rights 
under the Fair Credit Reporting Act,\8\ and provide them with the 
procedures for correcting their credit reports. The counselors advise 
consumers to contact each of the creditors or service providers where 
the identity thief has established or accessed an account, and to 
follow up in writing by certified mail, return receipt requested. 
Consumers are also advised on how to take advantage of their rights 
under the Fair Credit Billing Act,\9\ and the Truth in Lending Act,\10\ 
which, among other things, limits their responsibility for unauthorized 
charges to fifty dollars in most instances. Consumers who have been 
contacted by a debt collector concerning debts incurred by the identity 
thief are advised of their rights under the Fair Debt Collection 
Practices Act,\11\ which limits debt collectors' practices in the 
collection of debts.
---------------------------------------------------------------------------
    \6\ The three national consumer reporting agencies are Equifax 
Credit Information Services, Inc., Experian Information Solutions, 
Inc., and Trans Union, LLC.
    \7\ In addition to fraudulently acquiring accounts or loans, the 
identity thieves also may register a change of address in the victim's 
name, routing bills and other correspondence to a different address. In 
that way, it may take months for the victim to realize that their 
identity has been hijacked.
    \8\ 15 U.S.C. Sec. Sec. 1681 et seq.
    \9\ 15 U.S.C. Sec. 1666. The Fair Credit Billing Act generally 
applies to ``open end'' credit accounts, such as credit cards, 
revolving charge accounts, and overdraft checking accounts. It does not 
cover installment contracts, such as loans or extensions of credit that 
are repaid on a fixed schedule.
    \10\ 15 U.S.C. Sec. 1601 et seq.
    \11\ 15 U.S.C. Sec. Sec. 1692 et seq.
---------------------------------------------------------------------------
    In addition, the FTC phone counselors advise consumers to notify 
their local police departments, both because local law enforcement may 
be in the best position to catch and bring the perpetrator to justice 
and because a police report is among the best means of demonstrating to 
would-be creditors and debt collectors that a consumer is a genuine 
victim of identity theft. More than half the states have enacted their 
own identity theft laws, and our counselors, in appropriate 
circumstances, will refer consumers to other state and local 
authorities for potential criminal investigation or prosecution.

B. Outreach and Consumer Education
    The FTC also reaches consumers through the Internet. The FTC's 
identity theft website--www.consumer.gov/idtheft--gives tips on how 
consumers can guard against identity theft, warns consumers about the 
latest identity theft schemes and trends, and provides access to 
consumer education materials on identity theft. This website has 
received more than 139,000 hits from November, 1999 through July, 2000. 
The site also links to a secure complaint form on which identity theft 
victims can enter the details of their complaints online, allowing 
consumers to contact the Commission at all times. After review by FTC 
staff, these complaints are entered into the Clearinghouse. To date we 
have received more than 1900 complaints through this electronic form. 
Further, the Federal Trade Commission has distributed nearly 100,000 
copies of the comprehensive consumer guide: ID Theft: When Bad 
ThingsHappen to Your Good Name. Developed in consultation with more 
than a dozen federal agencies,\12\ this booklet provides consumers with 
practical tips on how best to protect their personal information from 
identity thieves, summarizes the various federal statutes that protect 
consumer victims of identity theft, and details the victim assistance 
mechanisms available.\13\
---------------------------------------------------------------------------
    \12\ These include: Department of Justice; Federal Bureau of 
Investigation; Federal Communications Commission; Federal Deposit 
Insurance Corporation; Federal Reserve Board; Internal Revenue Service; 
National Credit Union Administration; Office of the Comptroller of the 
Currency; Office of Thrift Supervision; Social Security Administration; 
United States Postal Inspection Service; United States Secret Service; 
United States Securities and Exchange Commission; and United States 
Trustee.
    \13\ The Federal Trade Commission expects to receive a second, and 
larger, printing of the booklet shortly. The Social Security 
Administration and the Federal Deposit Insurance Corporation have also 
printed and distributed When Bad Things Happen. The FTC has provided 
the booklet on zip disk to other agencies who are interested in 
printing additional copies.
---------------------------------------------------------------------------
C. Identity Theft Clearinghouse--Launched Online
    The Identity Theft Act authorized the Commission to establish a 
central repository of consumer complaints about identity theft, and to 
refer appropriate cases to law enforcement for prosecution. The 
Identity Theft Complaint Database, which was activated in November 
1999, provides law enforcement with specific investigative material and 
also allows our public and private sector partners to examine larger, 
trend-based information to determine ways to reduce the incidence of 
identity theft. Currently, the Clearinghouse contains data from 
consumers who contact the FTC through the toll free number or website. 
We are pursuing ways to collect complaint data from other agencies and 
private sector entities to allow Clearinghouse users to see as much 
identity theft complaint data as possible.\14\
---------------------------------------------------------------------------
    \14\ Our Consumer Sentinel database, which houses consumer fraud 
complaints, receives complaint data from Better Business Bureaus, 
consumer outreach organizations and others. The Commission is looking 
to replicate this approach with identity theft complaints.
---------------------------------------------------------------------------
    With a database as rich as the Clearinghouse should become, 
Commission staff can and do refer cases for potential prosecution. To 
maximize use of the data, the Commission now provides law enforcement 
partners with direct access to the Clearinghouse through Consumer 
Sentinel, a secure website for sharing complaints and other information 
with consumer protection law enforcers. Starting this month, law 
enforcement and appropriate regulatory offices can access the 
Clearinghouse through their desktop computers. This access will enable 
them to readily and easily spot identity theft problems in their own 
backyards and to coordinate with other law enforcement officers when 
the database reveals common schemes or perpetrators. The FTC staff will 
continue to comb through the data to spot cases for referral, but has 
also enabled others to use the data to ferret out the bad actors for 
prosecution.
    The Identity Theft Act also authorized the Commission to share 
complaint data with ``appropriate entities,'' \15\ including the three 
national consumer reporting agencies and others in the financial 
services industry. The Commission does not envision providing access to 
the complete database for these private sector entities because 
unfettered access could interfere with law enforcement efforts. FTC 
data analysts can, however, identify patterns that reveal a business or 
business practice that exposes consumers to a high risk of identity 
theft. Commission staff will forward appropriate information about 
these complaints to the entities involved so they can evaluate and 
revise those practices. Similarly, staff plans to share complaint data 
with a business if data reveal that business fails to respond to 
legitimate consumer complaints about identity theft or frustrates 
consumers' efforts to correct misinformation on their credit reports.
---------------------------------------------------------------------------
    \15\ The Identity Theft Assumption and Deterrence Act provides, in 
pertinent part, ``the Federal Trade Commission shall establish 
procedures to . . . refer [identity theft] complaints . . . to 
appropriate entities, which may include referral to . . . the 3 major 
national consumer reporting agencies.'' 18 U.S.C. Sec. 1028 (note).
---------------------------------------------------------------------------
 II. WHAT THE CLEARINGHOUSE TELLS US ABOUT IDENTITY THEFT IN CALIFORNIA

    We are already seeing the fruits of collecting and analyzing 
identity theft complaints in a single repository. The basic complaint 
data show that the most common forms of identity theft reported by 
California consumers during the first nine months \16\ of operation 
were:\17\
---------------------------------------------------------------------------
    \16\ The data analysis covers the period from November 1, 1999 
through July 31, 2000.
    \17\ Many consumers experience more than one type of identity 
theft. Therefore, the percentages represent the number of consumers who 
reported each type of identity theft.
---------------------------------------------------------------------------
           Credit Card Fraud--Approximately 50% of consumers 
        reported credit card fraud--i.e., a credit card account opened 
        in their name or a ``takeover'' of their existing credit card 
        account;
           Communications Services--Approximately 28% reported 
        that the identity thief opened up telephone, cellular, or other 
        utility service in their name;
           Bank Fraud--Approximately 17% reported that a 
        checking or savings account had been opened in their name, and/
        or that fraudulent checks had been written;
           Fraudulent Loans--Approximately 10% reported that 
        the identity thief obtained a loan, such as a car loan, in 
        their name; and
           Government Documents or Benefits--Approximately 8% 
        of consumers reported that the identity thief had obtained 
        government documents or benefits (such as a driver's license) 
        or filed documents (such as a tax return) in their name.\18\
---------------------------------------------------------------------------
    \18\ These statistics reflect complaints made by California 
consumers. However, nationwide statistics are similar: 54% Credit Card 
Fraud; 26% Communications Services; 17% Bank Fraud; 11% Fraudulent 
Loans; and 8% Government Documents or Benefits.
---------------------------------------------------------------------------
    Not surprisingly, the states with the largest populations account 
for the largest numbers of complainants and suspects. California, New 
York, and Florida, in descending order, represent the states with the 
highest number of complainants. About 60% of California victims calling 
the identity theft hotline report their age. Of these, approximately 
41% fall between 30 and 44 years of age. Approximately 24% are between 
age 45 and 64, and 25% are between age 19 and 29. About 7% of those 
reporting their ages are 65 and over; and slightly over 2% are age 18 
and under.
    The data also reveal information about the perpetrators. Almost 60% 
of the caller-complainants provided some identifying information about 
the identity thief, such as a name, address, or phone number. Los 
Angeles was the most common location for suspects reported by 
California consumers; it was reported more than three times more often 
than Oakland, the next most common location.
    Commission staff also are assessing the data on the monetary impact 
of identity theft.Some complainants provided estimates of the dollar 
amounts obtained by the thief, because they have received the resulting 
bills or been notified of the resulting bad debts. The range of dollar 
amounts reported by California consumers varies widely, with 
approximately 30% of complainants reporting theft of under $1,000; 
approximately 31% of complainants reporting theft totaling between 
$1,000 and $5,000; approximately 12% of complainants reporting theft 
totaling between $5,000 and $10,000; and approximately 16% of 
complainants reporting theft of over $10,000. California consumers 
reported a total monetary loss of nearly $18 million.
    Consumers also report the harm to their reputation or daily life. 
The most common nonmonentary harm reported by consumers is damage to 
their credit report through derogatory, inaccurate information. Forty-
nine percent of California consumers reported that they were harmed in 
this manner. This negative credit information leads to the other 
problems most commonly reported by victims, including loan denials, 
bounced checks, and rejection of credit cards. Identity theft victims 
also report repeated contacts by debt collectors for the bad debt 
incurred by the identity thief. Many consumers report that they have to 
spend significant amounts of time resolving these problems.
    Consumers also report problems with the institutions that provided 
the credit, goods, or services to the identity thief in the consumer's 
name. These institutions often attempt to collect the bad debt from the 
victim, or report the bad debt to a consumer reporting agency, even 
after the victim believes that he or she has shown that the debt is 
fraudulent. Consumers further complain that these institutions' 
inadequate or lax security procedures failed to prevent the identity 
theft in the first place; that customer service or fraud departments 
were not responsive; or that the companies refused to close or correct 
the unauthorized accounts after notification by the consumer.

                            III. NEXT STEPS

A. The Identity Theft Prevention Act of 2000, S. 2328
    The Commission has made great strides in assisting consumers and 
law enforcement to combat identity theft, but recognizes that much 
remains to be done. Earlier this year, the Identity Theft Prevention 
Act of 2000, S. 2328, was introduced in the Senate. This Act would 
effectively address many areas of identity theft vulnerability and 
would protect many consumers from becoming victims of this very serious 
crime. Under S. 2328, consumers will have access to information that 
may reveal indicia of identity theft or the source of erroneous 
information resulting from identity theft. These measures will enable 
consumers to better protect themselves against identity theft and avoid 
some of the frustrations that often accompany their efforts to undo the 
harm inflicted by the identity thief. Providing for free annual credit 
reports and requiring that credit card issuers advise consumers of 
requests for changes of address to credit accounts will help consumers 
help themselves. Further, requiring clear and conspicuous fraud alerts 
on credit reports will help to thwart the ability of identity thieves 
to commit ongoing fraud. The Commission is confident that these 
proposals will assist consumers who contact the Commission's Identity 
Theft Data Clearinghouse to describe the problems they encounter 
attempting to prevent and remedy identity theft.

B. Victim Assistance Workshop
    The Commission will soon begin sharing certain limited information 
from its Identity Theft Clearinghouse with banks, creditors and other 
businesses whose practices are frequently associated with identity 
theft complaints. The goal is to encourage and enable industry and 
individual companies to develop better fraud prevention practices and 
consumer assistance techniques. To that end, the Commission will 
convene a workshop for industry, consumer groups, the public, and law 
enforcement on Identity Theft victim assistance, prevention, and 
prosecution on October 23-24, 2000. This workshop follows the National 
Summit on Identity Theft of March, 2000, which initiated a dialogue 
between the public and private sectors on identity theft. The Social 
Security Administration, the Department of Justice and the U.S. Secret 
Service will convene later workshops on identity theft prevention and 
prosecution.

                             IV. CONCLUSION

    The Identity Theft Clearinghouse, the toll free hotline phone 
counselors, and the consumer education campaign have helped the FTC 
begin to address the serious problems associated with identity theft. 
While more work remains to be done, the Commissions is optimistic that 
heightened awareness by consumers and businesses will help reduce the 
occurrences of this fraud. The FTC looks forword to working with the 
Subcommittee to find additional ways to prevent this crime and to 
assist its victims.

[GRAPHIC] [TIFF OMITTED] T3465A.022

[GRAPHIC] [TIFF OMITTED] T3465A.023

[GRAPHIC] [TIFF OMITTED] T3465A.024

[GRAPHIC] [TIFF OMITTED] T3465A.025

[GRAPHIC] [TIFF OMITTED] T3465A.026

    Senator Feinstein. Thanks very much, Mr. Klurfeld.
    I'd like to introduce Jane Vezeris, the Deputy Inspector 
General of the Social Security Administration.
    She has served as Deputy Inspector General since January 3 
of this year.
    Prior to this position, she had a distinguished career with 
the U.S. Secret Service.
    She held a number of supervisory positions in the service, 
including Special Agent, in charge of the Intelligence 
Division, and Deputy Assistant Director in the Office of Public 
Affairs, and the Office of Investigations.
    Her last position at the Secret Service was as Assistant 
Director, Office of Administration, and as such, she served as 
the Chief Financial Officer.
    Welcome, I look forward to your comments.

                   STATEMENT OF JANE VEZERIS

    Ms. Vezeris. Thank you, good morning.
    Senator Feinstein. Good morning.
    Ms. Vezeris. Thank you for the opportunity to be here 
today, and discuss our office's continuing fight against 
identity theft.
    Your interest in the issue has already been instrumental in 
reducing identity theft, and your continuing commitment gives 
us reason to be optimistic that our ongoing efforts will be 
even more successful, so thank you.
    As you know, the enactment of the Identity Theft Act of 
1998, introduced by your subcommittee was the first piece of 
comprehensive legislation, aimed at what is rapidly becoming 
the most popular and insidious crime of the new century.
    In the 2 years since, we've learned that the problem is 
larger than anyone realized and that additional legislation 
must be enacted, if law enforcement is to keep pace with 
identity thieves.
    Two bills introduced by you and the subcommittee are 
important steps in the right direction, and we look forward to 
working with you, to make both Senate Bills 2328 and 2699 
important laws in this crusade.
    The need for such legislation cannot be understated. The 
stories of the victims of identity theft, such as those that 
have testified here today, are heart-rending.
    The stories of the perpetrators themselves can sometimes be 
absolutely shocking. And perhaps one of the most enterprising 
identity thieves we've come across recently hails from Southern 
California.
    Our agents in San Diego were alerted, when a local law 
enforcement individual became suspicious, as to the validity of 
a Social Security number presented by a man they were 
questioning.
    Our query of Social Security Administration records 
revealed that the number actually was assigned to a seventy 
year old woman in South Dakota.
    Our agents quickly discovered that this man had been a 
fugitive felon for 17 years, with four prior felony 
convictions, including prison escape.
    He had created through the use of fraudulently obtained or 
counterfeited identification documents, 33 separate and 
distinct identities.
    Some of these were stolen, while others were entirely 
fictitious. Either way, he was able to use them, not only to 
avoid capture, but to, excuse me, to obtain employment as the 
Chief of a Fire Department, the Security Chief for a County 
Fair, and other significant positions of trust.
    He was also able to commit bank fraud, by obtaining credit 
cards and loans under his assumed aliases, while receiving 
Social Security benefits under three of his identities.
    This individual was recently the subject of a 14-count 
Grand Jury Indictment, and further criminal proceedings remain 
pending.
    He illustrates the extent to which one individual can steal 
and create identities, capable of fooling banks, employers and 
even government agencies.
    While most of our identity theft cases are not this 
extraordinary, this man's exploits certainly are not isolated 
occurrences.
    In California alone, we've opened 42 identity theft 
investigations, since last October, and we've obtained 20 
convictions.
    These represent only the most egregious cases, those that 
we chose to investigate, based on our limited resources.
    In fiscal year 1999, 62,000 of the 75,000 allegations that 
we receive involve some form of Social Security number misuse.
    These numbers led us to launch Social Security number 
misuse pilot projects, in five cities across the country, in 
which our agents work jointly with Federal, State, and State 
local law enforcement agencies, to target perpetrators of 
identity crimes and Social Security number misuse.
    Already, these pilots have been successful, and we've 
opened 197 investigations, resulting in 61 convictions, and 
clearly I can add that our experience supports Chief Baca's 
enthusiasm for having a comprehensive approach, a team approach 
in, in tackling this issue.
    The ever-increasing number of identity theft incidents has 
exploded, as the Internet has offered new and easier ways for 
individuals to obtain false identification documents, including 
Social Security numbers.
    To combat this, we've expanded the scope of these pilots to 
include undercover sale and purchase of Social Security cards, 
over the Internet.
    Hopefully, this will enable us, for the first time, to 
determine the scope of the Internet trafficking of false 
identification documents.
    As considerable as our efforts have been, much remains to 
be done.
    Senate Bills 2328 and 2699 are important steps, in that 
they provide law enforcement with additional tools.
    I am particularly pleased with the additional civil 
monetary penalty provisions, contained in S. 2328.
    Civil monetary penalties have proven to be a highly 
effective tool, in the many cases that are not accepted for 
criminal or civil, criminal prosecution or civil action.
    I am also pleased to see that Senate Bill 2699 recognizes 
the importance of formally distinguishing between valid and 
invalid transfers of Social Security number information.
    While we have some concerns, with respect to certain 
enforcement mechanisms in the current draft, we stand ready to 
work with your staff, to make both bills more effective in the 
war against identity theft, and to protect consumers on the 
front end.
    Congress should take an aggressive approach, by providing 
comprehensive criminal, civil and administrative sanctions, for 
the sale, purchase and misuse of Social Security numbers, which 
are quite often at the core of identity theft crimes.
    I thank you for commitment to doing so, and offer the 
Inspector General's assistance, in reaching our common goal.
    [The prepared statement Jane E. Vezeris follows:]

                 Prepared Statement of Jane E. Vezeris

    Good morning, Senator. Thank you for the opportunity to appear 
today and discuss the Social Security Administration, Office of the 
Inspector General's continuing fight against Identity Theft. Your 
interest in the issue has already been instrumental in reducing 
identity theft, and your continuing commitment gives us reason to be 
optimistic that our ongoing efforts will be even more successful.
    As you know, the enactment of the Identity Theft Assumption and 
Deterrence Act of 1998, introduced by your Subcommittee on Technology, 
Terrorism and Government Information, was the first piece of 
comprehensive legislation aimed at what is rapidly becoming the most 
popular and most insidious crime of the new century. In the 2 years 
since, we've learned that the problem is larger than anyone realized, 
and that additional legislation must be enacted if law enforcement is 
to keep pace with identity thieves. Two bills introduced by you and the 
subcommittee are important steps in the right direction. We look 
forward to working with you to make Senate Bills 2328 and 2699 
important laws in their crusade.
    The need for such legislation cannot be understated. The stories of 
victims of identity theft, such as those that testified here today, are 
heart-rending. The stories of the perpetrators themselves can be 
absolutely shocking. Perhaps one of the most enterprising identity 
thieves we've come across hails from southern California.
    Our agents in San Diego were alerted when local law enforcement 
became suspicious as to the validity of a Social Security number 
presented by a man they were questioning. Our query of the Social 
Security Administration's records revealed that the Social Security 
number was actually assigned to a 70-year-old woman from South Dakota.
    Our agents quickly discovered that this man had been a fugitive 
felon for 17 years, with four prior felony convictions including prison 
escape. He had created, through the use of fraudulently obtained or 
counterfeited identification documents, 33 separate and distinct 
identities. Some of these were stolen, while others were entirely 
fictitious. Either way, he was able to use them not only to avoid 
capture, but to obtain employment as the chief of a fire department, 
the security chief for a county fair, and other positions of trust. He 
was also able to commit bank fraud by obtaining credit cards and loans 
under his assumed identities while receiving Social Security benefits 
under three of his identities.
    This individual was recently the subject of a 14-count grant jury 
indictment, and further criminal proceedings remain pending. He 
illustrates the extent to which one individual can both steal and 
create identities capable of fooling banks, employers, and even 
government agencies.
    While most of our identity theft cases are not this extraordinary, 
this man's exploits certainly are not isolated occurrences. In 
California alone, we've opened 42 identity theft investigations since 
last October, and have obtained 20 convictions. These represent only 
the most egregious cases-those that we chose to use our limited 
resources to investigate.
    In Fiscal Year 1999, 62,000 of the 75,000 allegations we received 
involved some form of Social Security number misuse. These numbers led 
us to launch Social Security number misuse pilot projects in five 
cities across the nation, in which our agents work jointly with Federal 
and State law enforcement agencies to target perpetrators of identity 
crimes and Social Security number misuse. Already, these pilots have 
achieved an unparalleled success, opening 197 investigations resulting 
in 61 convictions in the first year.
    The ever-increasing number of identity theft incidents has exploded 
as the Internet has offered new and easier ways for individuals to 
obtain false identification documents, including Social Security cards. 
To combat this, we've expanded the scope of these pilots to include the 
undercover sale and purchase of Social Security cards over the 
Internet. This will enable us, for the first time, to determine the 
scope of Internet trafficking in false identification documents.
    As considerable as our efforts have been, much remains to be done. 
Senate Bills 2328 and 2699 are important steps in that they provide law 
enforcement with additional tools. I am particularly pleased with the 
additional Civil Monetary Penalty provisions contained in Senate Bill 
2328. Civil Monetary Penalties have proven to be a highly effective 
tool in the many cases that are not accepted for criminal prosecution 
or civil action. I am also pleased to see that Senate Bill 2699 
recognizes the importance of formally distinguishing between valid and 
invalid transfers of Social Security number information. While we have 
some significant concerns with respect to certain enforcement 
mechanisms in the current draft of the Bill, we stand ready to work 
with your staff to make both Bills more effective in the war against 
identity theft.
    Congress should take an aggressive approach by providing 
comprehensive criminal, civil, and administrative sanctions for the 
sale, purchase, and misuse of Social Security numbers, which are quite 
often the starting point for identity theft crimes. I thank you for 
your commitment to doing so. and offer the Inspector General's 
assistance in reaching our common goal. Thank you.

    Senator Feinstein. Thank you very much. At the appropriate 
time, I'll ask you about what enforcement provisions you have 
concerns about. So, we'll get to that.
    I'd now like to introduce our last witness, Mr. Michael 
Ahern, U.S. Postal Inspection Service.
    Mr. Ahern represents the Postal Inspection Service. He's 
been with the U.S. Postal Service for 27 years. He began his 
inspection career as a U.S. Postal Inspector in Detroit.
    He progressed through a series of management positions in 
Washington. He was promoted to Assistant Inspector in charge, 
in the Los Angeles Division, then to Postal Inspector in 
charge, in the Boston Division.
    He became Deputy Chief for Western Field Operations, this 
year.
    Welcome, Mr. Ahern.

                 STATEMENT OF MICHAEL E. AHERN

    Mr. Ahern. Thank you Senator, and good morning.
    It's a pleasure to appear here this morning before you, and 
the Subcommittee on Terrorism--Technology, Terrorism and 
General Government.
    On behalf of the Chief Postal Inspector, I want to thank 
you for holding these hearings on identity fraud, the fastest 
growing crime in America.
    It's also a pleasure to appear here, to discuss the role of 
the Postal Inspection Service in these endeavors, and I'd also 
like to let you know that the Postal Inspection Service is very 
supportive of your Senate Bill 2328 and Senate Bill 2699 that 
addressed the identity theft issues.
    Many of the crimes connected with, connected with identity 
theft, involve mail fraud or mail theft.
    To give you kind of an overview nationally, postal 
inspectors make approximately ten thousand, three hundred 
arrests.
    Approximately five thousand of those arrests are related to 
mail theft, and about twenty-four hundred, excuse me, fifteen 
hundred arrests relate directly to mail fraud.
    Our last fiscal year, these statistics are from fiscal year 
1999, we've also obtained an, approximately $606 million in 
court order and voluntary restitution in these cases.
    One of the things that was addressed earlier by, I believe, 
the victims, and some of the prior testimony, is that how easy 
it is to obtain personal information.
    Pre-approved credit card applications, pre-approved credit 
card forms that are discarded in the mail, are targeted by 
these identity thieves.
    Armed with this information, of course, the criminals try 
to activate credit cards, and use it without the victim's 
knowledge.
    The successful identity thieves ensure that steps are 
taken, that the victim is unaware that her, his or her identity 
is taken over.
    In those types of cases, where a change of address is used, 
or, I believe, Mari Frank gave an example how an address was 
used, with her name at a different location, the victim becomes 
unaware of the damage that is being done to their credit, 
reputation and assets.
    Over the past 5 years, the Inspection Service has started a 
data base, to try to track some identity theft investigations.
    In fiscal year 1995, we had a 165 investigations. This 
fiscal year today, we can see that there's more than a 300-
percent increase. We have open investigations, involving 
identity theft.
    So, how do we address the fundamentals of identity theft? 
The Inspection Service has partnered and worked with different 
law enforcement agencies, the financial community, credit card 
companies.
    We've established the Credit Card Mail Security Working 
Group. This group meets at least twice a year to discuss 
prevention initiatives, security initiatives, share 
intelligence and discuss best practices.
    Inter-agency cooperation, I think, is very important. In 
June of this year, the Southern California Division assigned 
two postal inspectors, to work with Lee Baca, Sheriff Lee 
Baca's strike force on identity theft, and we welcome the 
opportunity to strengthen our relationship with the Sheriff's 
Office, and I'd like to commend and applaud Sheriff Baca for 
showing the initiative and leadership in this effort, and as 
you mentioned, it's the first identity theft strike force, in 
the country, and we will continue to work with the Sheriff's 
Department.
    Since 1998, the credit card team of postal inspectors 
located in Los Angeles, have worked on ATM fraudulent use, 
which involves identity theft take-overs.
    In 1998, the industry, in the Los Angeles area, would incur 
$106,000 in daily, that's daily fraudulent transactions.
    Today, we're down to less than $25,000 in daily 
transactions that are fraudulent, reported to the Postal 
Inspection Service.
    So, we're not completely, we haven't completely eliminated 
that problem, but we have had a lot of success. Some of it, of 
course, is working with this Credit Card Mail Security Group.
    There are a number of statutes, historically, there are two 
statutes that are 125 years old. This is the mail fraud 
statute, and the civil false representation and lottery 
statutes.
    The public policy behind these statutes, is simply that the 
postal system, created by Congress to serve the American 
public, should not, should not be used to conduct schemes that 
seek to cheat the public.
    I believe you're aware of, I know you're aware of the 
recent legislation work you've done on that Identity Theft and 
Assumption Deterrence Act of 1998.
    The Postal Inspection Service was one of the primary law 
enforcement agencies behind that initiative, simply because of 
the impact on the postal service and the mail.
    The Postal Inspection Service supports the additional 
legislative efforts that you have taken, regardingthese 
identity theft schemes.
    The Identity Theft Prevention Act of 2000, which you 
introduced on March 30, 2000, contains several key provisions, 
designed to prevent identity-related fraud in credit 
transactions and credit reports.
    And of course the Social Security Number Protection Act of 
2000, which you introduced, Senator, on June 8, 2000, grants 
the Federal Government the authority to limit the sale and 
purchase of Social Security, Social Security account numbers, 
in circumstances that could result in fraudulent transactions.
    One of the things the Postal Inspection Service thinks, we 
think is very important is just not going out, arresting 
people. That's very important, but we think prevention plays a 
real key role.
    So, our agency has done a couple of things similar to what 
Sheriff Lee Baca has. We have a nationwide identity theft 
awareness pamphlet that tells people what identity theft is, 
how to prevent becoming a victim, and if you are a victim, what 
state you should, what steps you should take, and how to 
contact credit, credit card companies.
    A couple of other areas in prevention, we have a website. 
It's usps.gov/postalinspectors, that issues fraud advisories 
about different types of identity theft schemes, and how to 
prevent that.
    And earlier this year in March, Showtime released a movie, 
called, ``Inspectors II'' and it was based on the investigative 
files of the postal inspectors, specifically, identity theft 
investigations.
    Last Fall, every household in America received a postcard, 
and it's called, ``Project No Fraud,'' is what it is. ``Project 
No Fraud'' was to alert the public of telemarketing schemes. 
How to protect yourself on telemarketing schemes.
    This is, this involves delivery of a 120 million pieces of 
mail to every address in America, to alert people.
    Why do I bring this up? Because, next Spring, we're having 
``Project No Fraud II,'' and in that particular project, we 
will send out to every household in America, a 120 million 
addresses, awareness of identity theft, and what you can do to 
prevent identity theft, and if you are a victim, what you can 
do about that, also.
    The Postal Inspection Service is committed to working 
together with Federal, State and local agencies in combating 
this financially crippling crime.
    You can be certain that postal inspectors will continue to 
work with everybody to resolve this problem and prevent crime 
from occurring.
    Senator, the U.S. Postal Inspection Service applauds your 
efforts in supporting law enforcement and protecting consumers 
throughout the United States, and our agency fully supports 
enactment of Senate Bill 2328 and Senate Bill 2699.
    Thank you, and like the others, we'd be happy to answer any 
questions you may have.
    [The prepared statement of Michael E. Ahern follows:]

                 Prepared Statement of Michael E. Ahern

    Good morning Senator Feinstein and members of the Senate Judiciary 
Committee's Subcommittee on Technology, Terrorism and General 
Government. I am Michael Ahern, Deputy Chief Postal Inspector, Western 
Field Operations, U.S. Postal Inspection Service.
    On behalf of the Chief Postal Inspector, I want to thank you for 
holding this hearing on the topic of identity theft, America's fastest 
growing crime. It is an honor to appear before you today to discuss the 
subject of identity theft and related fraud, and the role of the Postal 
Inspection Service in combating this rapidly growing category of crime. 
I also appreciate this opportunity to show our support for the 
legislation you have introduced, S. 2328 and S. 2699; both designed to 
prevent identity related crimes.
    As you know, the mission of the United States Postal Inspection 
Service is to protect the U.S. Postal Service, its employees and its 
customers from criminal attack, and to protect the nation's mail system 
from criminal misuse. As one of the our country's oldest federal law 
enforcement agencies, founded by Benjamin Franklin, the United States 
Postal Inspection Service has a long, proud and successful history of 
fighting criminals who attack our nation's postal system and misuse it 
to defraud, endanger or otherwise threaten the American public. As the 
primary law enforcement arm of the United States Postal Service, the 
U.S. Postal Inspection Service is a highly specialized, professional 
organization performing investigative and security functions essential 
to a stable and sound postal system.
    During fiscal year 1999, U.S. Postal Inspectors arrested 10,388 
criminal suspects. Of those suspects identified, 5,051 were arrested on 
charges related to mail theft. Postal Inspectors investigated 3,427 
mail fraud cases in 1999 and responded to 70,000 consumer fraud 
complaints. Mail fraud investigations resulted in 1,523 arrests, 
approximately $606.2 million in court-ordered and voluntary 
restitution, and 1,165 civil or administrative actions.
    Among its varied duties, the Inspection Service works to rid the 
mail of drug trafficking and money laundering; mail bombs; and, perhaps 
one of the most despicable crimes, child exploitation. In combating 
fraudulent practices involving the mail, the Inspection Service employs 
a workforce of roughly 2000 Postal Inspectors, 1400 Postal Police 
Officers and 900 professional, technical and support employees.

                   IDENTITY THEFT AND IDENTITY FRAUD

    Identity theft and identity fraud are terms used to refer to all 
types of crime in which someone wrongfully obtains and uses another 
person's personal data in some way that involves fraud or deception, 
typically for economic gain. All organized criminal groups appear to be 
involved to various degrees in identity theft schemes. The traditional 
reliance upon an individual'spersonal information by business and 
financial organizations, an increased availability of identifying 
information through the internet and other communications networks, and 
a willingness by criminal groups to manipulate information unlawfully 
obtained has led to an explosion in identity theft related crimes.
    The August edition of the FBI Law Enforcement Bulletin reported 
that true identity theft victims are estimated to number from 350,000 
to 500,000 annually. Literally hundreds of millions of dollars are lost 
annually to these insidious criminals, not to mention the frustration 
and emotional scars felt by their victims who are forced to take 
excruciating steps to regain their good credit. Of course, in the end 
we will all pay, because the losses suffered by the financial 
institutions are passed along to the American consumer in the form of 
higher interest rates and fees.
    Identity theft criminals have been increasingly successful in 
obtaining personal data such as social security numbers, bank account 
or credit card numbers, victim's telephone calling care numbers, as 
well as other valuable identifying data. These criminals use the stolen 
personal information to apply for credit cards; to open new bank 
accounts; apply for loans; apply for apartment rentals, and to 
establish services with utility and phone companies, just to mention a 
few. In the United States and Canada, many people have reported that 
unauthorized persons have taken funds out of their bank or financial 
accounts, or in the worst cases, taken over their identities 
altogether, running up vast debts and committing crimes while using the 
victim's names. In many cases, a victim's losses may include not only 
out-of-pocket financial losses, but substantial additional financial 
costs associated with trying to restore his/her reputation in the 
community and correcting erroneous information for which the criminal 
is responsible.
    It can sometimes take identity theft victims years to repair their 
consumer credit file after becoming victimized. If the criminal takes 
steps to ensure that bills for the falsely obtained credit cards or 
bank statements showing the unauthorized withdrawal are sent to an 
address other than the victim's, the victim may not become aware of 
what is happening until the criminal has already inflicted substantial 
damage on the victim's assets, credit and reputation.
    The August edition of Security Management Magazine reported that a 
survey of identity theft victims indicated most victims do not learn of 
the theft of their identify until 14 months after it has occurred. 
Those victims further reported an average of 175 hours actively trying 
to clear their names.

                        IDENTITY RELATED CRIMES

    Many people do not realize how easily criminals can obtain our 
personal data without having to break into our homes. Some criminals 
engage in ``dumpster diving''--going through potential victims' garbage 
cans or a communal dumpster or trash bin--to obtain copies of checks, 
credit card or bank statements, or other records that typically bear 
names, addresses, and even telephone numbers. These types of records 
make it easier for criminals to get control over accounts and assume 
identities. ``Pre-approved'' credit cards received in the mail and 
discarded without being torn-up are favored targets of the identity 
thief. Armed with this information, criminals may try to activate 
credit cards for their use without the victim's knowledge. If mail is 
left unsecured, criminals may try to intercept it and redirect it to 
another location; again to gain the personal financial information 
contained within. Even in public places criminals may engage in 
``shoulder surfing''--watching their intended victim from a nearby 
location asthe victim punches in their telephone calling card number or 
credit card number.
    In recent years, the Internet has become an appealing place for 
criminals to obtain identifying data, such as passwords or even banking 
information. In their haste to explore the exciting features of the 
Internet, many people respond to ``Spam''--unsolicited E-mail--which 
promises them some benefit but requests identifying data. In some 
cases, criminals reportedly have used this scheme to obtain large 
amounts of personal data.

                             INVESTIGATIONS

    Each of the Inspection Service's eighteen (18) field divisions 
conducts fraud investigations relating to identity theft within their 
respective boundaries. Identity theft investigations are reported, 
categorized, and tracked in an Inspection Service national database 
used by management to coordinate the appropriate investigative 
response. The following chart illustrates the recent rise in identity 
theft investigations conducted by postal inspectors nationwide:
        Fiscal Year                                       Investigations
1995..............................................................   165
1996..............................................................   178
1997..............................................................   198
1998..............................................................   371
1999..............................................................   491
FYTD-2000.........................................................   626

    As indicated above, identity theft activities have increased by 
almost 300 percent during the last 5 years, with a corresponding 
increase in the number of arrests and convictions. Although a national 
concern, the Inspection Service has observed that the largest 
metropolitan areas, including New York, Chicago and Los Angeles, have 
been responsible for the majority of the increase in identity theft 
activities.
    To address the fundamentals of identity theft, the Inspection 
Service works hard to improve communication between the credit card 
industry, financial institutions and law enforcement. One initiative 
undertaken by the Inspection Service in this regard has been its 
sponsorship of the Credit Card Mail Security Working Group. This group, 
comprised of various members of the financial and law enforcement 
communities, meets semi-annually and offers insight and feedback 
relating to current programs and practices, security concerns and 
prevention initiatives.

                        INTERAGENCY COOPERATION

    Postal Inspectors participate on multiple task force operations 
throughout the nation. In June of this year, two Postal Inspectors from 
the Southern California Division began working with the Los Angeles 
County Sheriff's task force to combat identity theft. The Inspection 
Service welcomes this opportunity to strengthen our working 
relationship with the Los Angeles County Sheriff's Department, and 
would like to thank Sheriff Lee Baca for his initiative and leadership 
in directing this campaign.
    Since 1998, the Los Angeles credit card team has been working with 
credit card companies and local banks to reduce the losses from 
fraudulent credit card cash advances. As a result of this team effort, 
daily fraudulent cash advance activities were significantly reduced 
during the period by 1999 through July 2000, from $106,000 to $23,000.
    In January 2000, a federal grand jury at Oakland, California, 
returned indictments on four individuals based on an identity theft 
investigation conducted by the Inspection Service's Northern California 
Division. This case involved mail theft in the California communities 
of San Ramon,Livermore, Hayward, Pleasanton, Danville, Castro Valley, 
Dublin, Newark, and San Leandro. The four suspects stole mail to obtain 
checks, credit cards and identification documents. They then created 
false identification documents for the purpose of cashing checks and 
purchasing merchandise. Postal Inspectors recovered stolen mail, false 
drivers licenses, altered passports and computer equipment.
    In Pittsburgh, Pennsylvania, the Inspection Service leads the 
Financial Crimes Task Force of Southwestern Pennsylvania. This task 
force commenced its operation on January 17, 1995, and is housed at the 
Pittsburgh office of the Postal Inspection Service. Members include the 
United States Postal Inspection Service, the United States Secret 
Service, the Allegheny County, PA, Police Department and District 
Attorney's Office, the City of Pittsburgh, PA, Police Department, the 
Federal Bureau of Investigation, the Westmoreland County, PA, District 
Attorney's Office, the Greensburg, PA, Police Department and the 
Pennsylvania State Police.
    Originally, this task force was formed to target major credit card 
fraud in the Pittsburgh area. However, with the cancer of identity 
theft spreading rapidly throughout America, this task force has 
directed most of its resources toward identity theft investigations. In 
fact, many of their investigations have led them to criminal groups 
victimizing communities and citizens around the country. The Financial 
Crimes Task Force of Southwestern Pennsylvania is yet another 
illustration of how the Inspection Service has effectively partnered 
with other agencies in combating identity theft.
    In a recent Inspection Service investigation based in Chicago, 
Illinois, the destructive activities of an identity thief resulted in 
the loss of thousands of dollars and the death of a primary victim. In 
July 1999, the identity thief began dating the estranged wife of a 
local Chicago resident. Without his knowledge, the wife assisted the 
thief in stealing her former spouse's identity by providing the thief 
with his personal information. In August of that same year, the thief 
leased a sport utility vehicle (SUV) in the spouse's name using the 
spouse's home address as his own information.
    In January 2000, an associate of the thief opened a mailbox at a 
commercial mail receiving agency (CMRA) using counterfeit driver's 
license in the spouse's name. A Change of Address (COA) order was then 
filed, directing the spouse's mail from his legitimate address to the 
CMRA mailbox. This mailbox was used to obtain credit cards and cash 
advances in the spouse's name. Later that month, the thief met with a 
former girlfriend and provided her with a credit card in the name of 
yet another former girlfriend. This second victim dated the thief when 
she was a probation officer. She had ended the relationship and had no 
knowledge the thief was misusing her personal information. The credit 
card was used to obtain two cash advances totaling over $5000.
    Also during January, the spouse had a dispute with his estranged 
wife while she was parked in the leased SUV. He later learned the SUV 
had been fraudulently leased in his name. The spouse filed a complaint 
with the Chicago Police department after realizing that he was a victim 
of identity theft with losses exceeding $220,000.
    In February, the spouse received a package from the thief, wrapped 
as a FedEx delivery. After holding the package for a few days, he 
received a voice mail message on his cell phone indicating the package 
was a gift from the thief. As he sat in his living room, he opened the 
package, which exploded, killing him instantly.
    The investigation into the identity theft and bombing incident 
disclosed involvement on the part of another associate of the identity 
thief. In May of this year, the individual who assisted in the 
construction of the bomb was arrested. In a storage shed owned by the 
suspect's girlfriend, Postal Inspectors found boxes containing numerous 
fraudulent documents, computer equipment and $100,000 in counterfeit 
20-dollar bills. Later that month, the identity thief himself was 
arrested in Los Angeles, California, using the name and fraudulent 
driver's license of yet another victim. He is currently being held 
without bond and is scheduled to be indicted for the murder of the 
victim's spouse.

                           GOVERNING STATUTES

    A number of statutes enable us to take action against fraudulent 
practices involving the use of the mail. Our priority weapons include 
two statutes originally enacted over 125 years ago: the criminal mail 
fraud statute and the civil false representations and lottery statute. 
The public policy that underlies these statues remains valid today. The 
postal system created by Congress to serve the American public should 
not be used to conduct schemes that seek to cheat the public.
    While some schemes may change, con artists take advantage of 
economic trends and current events and plan their schemes accordingly. 
With today's fast-paced society and modern technology, the magnitude of 
mail fraud schemes is much greater and impacts more people than ever 
before.

        THE IDENTITY THEFT AND ASSUMPTION DETERRENCE ACT OF 1998

    The Inspection Service was one of the primary law enforcement 
agencies involved in the legislation initiative to combat identity 
theft, due to the impact of these offenses on the Postal Service and 
the mail. The Postal Inspection Service has long understood that the 
majority of identity theft schemes involve the use of the mail.
    Public Law 105-318, The Identity Theft and Assumption Deterrence 
Act of 1998, was signed into law on October 30, 1998. This law expanded 
the scope of the identity fraud statute (18 U.S.C. Sec. 1028), and made 
it a federal crime for the unauthorized use of personal identification 
in the commission of any federal law (felony or misdemeanor), or a 
state or local felony. This Act was needed since Section 1028 [``Fraud 
and related activity in connection with identification documents''] 
previously addressed only the fraudulent creation, use, or transfer of 
identification documents, and not the theft or criminal use of the 
underlying personal information. The Act criminalizes fraud in 
connection with unlawful theft and misuse of personal identifying 
information itself, regardless of whether it appears or is used in 
documents.
    The Postal Inspection Service supports additional legislative 
efforts to reduce identity related schemes. The Identity Theft 
Prevention Act of 2000, S. 2328, introduced by Senator Feinstein on 
March 30, 2000, contains several key provisions designed to prevent 
identity related fraud in credit transactions and credit reports. Under 
this Act, credit card issuers would be required to confirm cardholder 
change of address requests; notifications would be mailed to 
cardholders to confirm additional car requests; the Fair Credit 
Reporting Act would be amended to require consumer reporting agencies 
to comply with fraud alert procedures; and a standardized form would be 
developed for consumers to notify creditors and credit reporting 
agencies of identity fraud.
    The Social Security Number Protection Act of 2000, S. 2699, also 
introduced by Senator Feinstein on June 8, 2000, grants the Federal 
government the authority to limit the sale and purchase of social 
security account numbers in circumstances that could result in 
fraudulent activities. The Postal Inspection Service supports 
restrictions on the use and dissemination of social security numbers, 
as they continue to be one of the prime personal identifiers used by 
financial institutions for credit and banking purposes. The Social 
Security Administration reported over 30,000 complaints relating to the 
misuse of social security numbers during 1999. As long as this practice 
exists, social security number will remain a keep element in the crime 
of identity theft.

                           OTHER INITIATIVES

    In an effort to enhance the penalties associated with identity 
related crimes, the Inspection Service has met with and submitted 
recommendations to the United States Sentencing Commission. Those 
proposals have included a specific guideline to address the offense 
element of multiple victims in both the theft and fraud guidelines.
    The Inspection Service further supports a change in the valuation 
loss for credit card offenses. In past years, we have asked the 
Commission to establish the alternate loss as the credit line of credit 
cards (the true intended loss) as opposed to the $100 minimal loss per 
card. We believe this is a more accurate measurement of intended loss, 
but support the Commission's proposed $1000 loss as a better 
alternative to the minimal value the guidelines currently set for 
stolen but unused credit cards.

                         PREVENTION INITIATIVES

    While the Postal Inspection Service works hard to identify and 
prosecute promoters of mail fraud, we also recognize our ability to 
lessen the impact of fraud upon the public through various prevention 
campaigns. In a survey commissioned by the Postal Inspection Service it 
was revealed that 48 percent of the respondents who were victims of 
fraud did not report the crime, often citing they did not know where to 
go for help.
    Inspection Service efforts to prevent identity theft can best be 
summarized as an educational campaign to alert members of the public 
and business communities to identity related schemes, and the problems 
associated with them. Those efforts have included the publication of a 
brochure titled, Identity Theft, An Awareness & Victim Guide, the 
posting of identity related fraud advisories on the Inspection 
Service's we page (located at www.usps.gov/postalinspectors), and the 
March 12, 2000, release of the Showtime movie, The Inspectors 2, based 
on Inspection Service files relating to identity theft investigations.
    An 11-minute video titled, Identity Theft: The Game of the Name, 
was recently produced by the Inspection Service as an informational and 
reparative guide for victims of identity theft. This video profiles the 
exploits of an identity thief, and documents the trials and 
tribulations of identity fraud victims. This video will be available 
for distribution to law enforcement personnel and the general public.
    In an effort to educate consumers, the Postal Inspection Service, 
in November 1999, joined forces with several federal, state and private 
agencies, including the AARP, Better Business Bureaus' Foundation, 
Department of Justice, Federal Bureau of Investigation, Federal Trade 
Commission, National Association of Attorneys General, and the 
Securities and Exchange Commission, to launch project KNOW FRAUD. This 
initiativewas the largest consumer protection effort ever undertaken, 
designed to connect the public with those agencies that can help and 
provide consumers with new resources to stop telemarketing and mail 
fraud. A toll-free number and a KNOW FRAUD Website were also 
established to provide consumers with additional fraud prevention 
information and to link them with law enforcement officials who would 
share the information.
    Although work continues on the first KNOW FRAUD initiative, plans 
are underway for a second one to launch in early 2001. Focusing on 
identity theft, the goal of this new effort is to deliver to every home 
in America prevention information that will raise their awareness of 
this growing trend and provide them with protective tactics. 
Information on identity theft can already be found at the KNOW FRAUD 
Web site (located at http:www.consumer.gov/KNOW FRAUD), and consumers 
may call a toll-free Identity Theft Hotline (1-877-IDTHEFT) for help 
with problems related to this crime. All complaints are input to the 
Consumer Sentinel's Identity Theft Data Clearinghouse.
    Agencies participating in KNOW FRAUD: Identity Theft include the 
U.S. Postal Inspection Service, AARP, the Council of Better Business 
Bureaus' Foundation, the Department of Justice, the FBI, the Federal 
Trade Commission, the National Association of Attorneys General and the 
Securities and Exchange Commission.

                            PREVENTION STEPS

    As part of the Postal Inspection Service's ongoing campaign to help 
educate and empower the American public when dealing with those 
criminals who attempt to steal the most personal of all things--your 
identity, I would offer the following prevention tips:
     Promptly remove mail from your mailbox after delivery.
     Deposit outgoing mail in post office collection mailboxes 
or at your local post office. Do not leave mail in unsecured mail 
receptacles.
     Never give personal information over the telephone, such 
as your social security number, date of birth, mother's maiden name, 
credit card number, or bank PIN code, unless you initiated the phone 
call. Protect this information and release it only when absolutely 
necessary.
     Shred pre-approved credit applications, credit card 
receipts, bills and other financial information you don't want before 
discarding them in the trash or recycling bin.
     Empty your wallet of extra credit cards and identification 
cards or better yet, cancel credit cards you don't use and maintain a 
list of the credit cards you do use.
     Order your credit report from the three credit bureaus 
(Equifax, Experian Information Solutions, and TransUnion) once a year 
to check for fraudulent activity or other discrepancies.
     Never leave receipts at bank machines, bank counters, 
trash receptacles, or unattended gasoline pumps. Keep track of all your 
paperwork. When you no longer need it, destroy it.
     Memorize your social security number and all of your 
passwords. Do not record them on any cards or anything in your wallet 
or purse.
     Sign all new credit cards upon receipt.
     Save all credit card receipts and match them against your 
monthly bills.
     Be conscious of normal receipt of routine financial 
statements. Contact the sender if they are not received in the mail.
     Notify your credit card companies and financial 
institutions in advance of any change of address or phone number.
     Never loan your credit cards to anyone.
     Never put your credit card or any other financial account 
number on a postcard or on the outside of an envelop
     If you applied for a new credit card and it hasn't arrived 
in a timely manner, call the bank or credit card company involved.
     Report all lost or stolen credit cards immediately.
     Closely monitor expiration dates on your credit cards. 
Contact the credit card issuer if replacement cards are not received 
prior to the expiration dates.
     Beware of mail or telephone solicitations disguised as 
promotions offering instant prizes or awards designed solely to obtain 
your personal information or credit card numbers.

                     INTERNET AND ON-LINE SERVICES

     Use caution when disclosing checking account numbers, 
credit card numbers or other personal financial data at any Web site or 
on-line service location unless you receive a secured authentication 
key from your provider.
     When you subscribe to an on-line service, you may be asked 
to give credit card information. When you enter any interactive service 
site, beware of con artists who may ask you to ``confirm'' your 
enrollment service by disclosing passwords or the credit card account 
number used to subscribe. Don't give it out!

                ACTIONS STEPS FOR IDENTITY THEFT VICTIMS

     Contact all creditors, by phone and in writing, to inform 
them of the problem.
     Call your nearest U.S. Postal Inspection Service office 
and your local police.
     Contact the Federal Trade Commission at 1-877-ID-THEFT, to 
report the problem. Call each of the three credit bureaus' fraud units 
to report identity theft: Equifax Credit Bureau, Fraud, 1-800-525-6285; 
TransUnion Credit Bureau, Fraud, 1-800-680-7289; Experian Information 
Solutions, 1-888-397-0949.
     Ask to have a ``Fraud Alert/Victim Impact'' statement 
placed in your credit file asking that creditors call you before 
opening any new accounts.
     Alert your banks to flag your accounts and contact you to 
confirm any unusual activity; request a change of PIN and a new 
password.
     Keep a log of all your contacts and make copies of all 
documents. You may also wish to contact a privacy or consumer advocacy 
group regarding illegal activity.
     Contact the Social Security Administration's Fraud Hotline 
1-800-269-0271.
     Contact the state office of the Department of Motor 
Vehicles (DMV) to see if another license has been issued in your name. 
If so, request a new license number and fill out the DMV's complaint 
form to begin the fraud investigation process.
    The Postal Inspection Service will continue its public awareness 
and educational campaigns to prevent the spread and related 
consequences of identity theft. You can be certain that Postal 
Inspectors nationwide will continue to work together with all other 
federal, state and local law enforcement agencies to aggressively 
investigate, arrest and seek prosecution for those individuals who dare 
victimize hard working Americans through identity takeover schemes.
    Thank you.

    Senator Feinstein. Thanks very much, thank you. I think 
that was excellent testimony.
    I have found that many people don't really think this is a 
problem yet.
    And yet every bit of testimony that we have had indicates 
that indentify theft, in fact, is a growing problem, and that 
we need to move.
    I want the record just to reflect that I have sent a letter 
to the Secretary of the Treasury, urging that he take action, 
so that the Social Security number is not as available on the 
window envelopes that they send out checks on, and I think 
that's a real problem.
    My first question would be, has anybody got any information 
that the government itself, in that sense, is helping people 
gain these numbers indiscriminately?
    Ms. Vezeris. I think that has been an issue, and I believe 
that that may have already been initiated, that the Social 
Security number has been removed from the visible portion of 
the envelope, you know, when, when government checks are being 
mailed.
    Senator Feinstein. Oh, that's excellent. I'm glad to hear 
that.
    Ms. Vezeris. So, I, I believe that that's, if it's not, if 
it's not already happened, it's in the works.
    Senator Feinstein. We'll check and see.
    Ms. Vezeris. And then I'll, I'll verify that----
    Senator Feinstein. If you would.
    Ms. Vezeris [continuing]. With your office.
    Senator Feinstein. Thank you.
    Ms. Vezeris. Yeah, be happy to.
    Senator Feinstein. Thank you, very much. I think that's, 
that's helpful.
    Second question, you mentioned that there, there is some 
concern on the enforcement provisions. Do you want to give me 
some input in that direction?
    Ms. Vezeris. Sure. I think that these bills are, are 
wonderful, in its efforts to try to, at the front end help the 
consumers.
    The concern that we have, and something that we'd like to 
try to work out before it's enacted, is the interplay between 
the FTC's regulatory responsibilities, in defining what is, and 
what isn't appropriate business practices, as far as the use 
and sale of the SSN, and how they will be treating perceived 
violations under their unfair trade practices, as that relates 
to our investigative efforts.
    And I guess what we would recommend is that the FTC would 
concentrate on legitimate commerce, and not be entertaining, 
let's say, as an example, an Internet company that sells 
identity documents, claiming that they're novelty items, to try 
to circumvent the law, that the FTC would not try to treat that 
as an unfair business practice, but rather have law enforcement 
immediately get into that type of investigation, as a criminal 
matter, and not as an unfair business practice.
    And I think it's just a matter of kind of working that out, 
before the legislation.
    Senator Feinstein. So, this is a difference in point of 
view, between the FTC and the Social Security Administration. 
Is that fair assumption?
    Ms. Vezeris. I--you don't, I----
    Senator Feinstein. Because we worked closely with the FTC, 
in drafting this.
    Mr. Klurfeld. I would only remark parenthetically, Senator, 
that the Federal Trade Commission has not formally commented on 
Senate Bill 2699.
    So, I can't really, because I can't speak on behalf of the 
full commission, what its position would be.
    However, expressing my own position, certainly any 
legislative measure, to restrict access to Social Security 
numbers, which seems to be the centerpiece of this fraud in 
terms of capturing someone's identity, would certainly thwart 
identity theft.
    So, to that extent, I would say that, that conceptually, 
this is very important legislation.
    We are sensitive to the fact that there are legitimate uses 
for perhaps the sale of this identifying information, as my 
colleague indicated, in terms of, of legitimate commerce, but 
also to the extent that there is a great potential for misuse, 
then this also needs to be looked at very closely and, and the 
commission, of course, would do so at your request.
    Senator Feinstein. Yeah, we've received testimony that 
there are twelve websites, involved in the sale of this 
personal identification, and we know at least four of them sell 
Social Security numbers, no questions asked for as little as 
$25.
    My view is a very clear one, that that should not be 
permitted. You should not be able to sell anybody's, anyone 
else's Social Security number, period, the end.
    What I'd like to ask is that either you give Tom 
Oscherwitz, my judiciary Counsel the person in your department, 
so we can get this remedied between the two departments, before 
you leave.
    My second point relates to your comment it is possible to 
buy a fraudulent Social Security card over the Internet.
    Could you elaborate on that point, so that we have it in 
the record?
    Ms. Vezeris. What, what some of these Internet companies 
will do, is they will sell things that, that purport to be a 
Social Security card, for instance.
    What they will do is attach a sticker on it that says 
novelty item, you know, or not for purposes of identification, 
but that sticker is very easily removable, and then once you do 
that, you in fact, have, have something that would deceive 
someone into thinking that it was a real form of 
identification.
    And, and that has, I mean that's, that's out there.
    Senator Feinstein. And you know very well, the sticker's 
going to be taken off, and the card is going to be used.
    So, I mean that clearly, I think we should respond to, but 
our point in this legislation, and this has been pretty well 
gone over, is that the Social Security number should not be 
sold, except for a specific number of limited circumstances.
    Ms. Vezeris. Right.
    Senator Feinstein. And I assume you've reviewed the 
information and you're in agreement with those circumstances.
    Ms. Vezeris. Yes, I mean we've, we've worked with your 
staff on those, on those items.
    Senator Feinstein. OK.
    Ms. Vezeris. I may add one other point of concern, and it's 
really just a technical point.
    We really appreciate the civil monetary penalty provisions 
in your bills, because it really adds another dimension.
    It's another tool in law enforcement's box, if you will.
    Senator Feinstein. Right.
    Ms. Vezeris. Especially, with the demands in, at the U.S. 
attorney's offices for instance.
    They can't prosecute all of the cases that, that are 
presented.
    So, at least we have then an opportunity to financially 
attack these people that are trying to do these things.
    One of the concerns that we have with respect to the, CM, 
with the civil monetary penalty provision, is we would want to 
make sure that the way it's drafted, it does cover people who 
are selling these Social Security cards, with this novelty 
sticker on it.
    It's something that we would just like to work with your 
office, and make sure that the language is, will cover that.
    Senator Feinstein. OK, thank you very much.
    Let me ask Mari Frank this question. In July, when you 
tried to report the second instance of credit card fraud to 
three major credit bureaus, I'd like to know what their 
response was.
    Was it difficult, getting through on the phone? Were you 
provided with adequate information?
    Ms. Frank. That's a, that's an excellent question. I was 
able to get through after about 30 minutes to Trans Union and 
to Equifax. Experian had no human on the phone. You could not 
get one.
    I wrote letters to all three, return receipt requested. I 
sent a copy of my driver's license and my mortgage statement, 
and I did, within about a week, from Trans Union and Equifax, 
get my credit report.
    From Experian, it took me about 20 days, and then they sent 
me a letter saying that I had to pay $8, which is not true. I 
am, as a victim, allowed to get a credit report for free.
    And so, then I called and spoke to them. And, as a matter 
of fact, I spoke to the head of the Fraud Department, Tim 
Puckett, and explained to him, he said to me, to, to let you 
know that this doesn't always happen, and he didapologize, but 
it did take me this, you know, so long to get my credit report, and 
then when I did get, finally get a number to get a human being, that 
took me another half hour.
    So, someone who has already been through this, who's pretty 
savvy, had to experience this, as badly as I did, I told him 
that there really needs to be some changes, because obviously, 
if it happened to me, and I had the problems that I did, then I 
can just imagine what the other consumers are experiencing.
    Also, by the way, there's no help from the credit reporting 
agencies, and they are the one source that all victims must go 
to.
    Not everybody knows to go to the Federal Trade Commission 
yet, or the Social Security Administration, but everyone has to 
go to the credit reporting agencies.
    So, I would really like to have that kind of public private 
venture, where you work together, because they are not 
sporting, you know, referrals and assistance.
    Senator Feinstein. So, let me get this straight.
    So, a victim would have to go to all three agencies?
    Ms. Frank. Yes.
    Senator Feinstein. Is there, is it not possible to evolve a 
kind of one-stop shop between the agencies?
    It seems to me, you know, knowing how hard it is to make 
these calls, to get through to the right person, it seems to me 
some kind of one stop shop--yes please.
    Mr. Klurfeld. I, I think that's a, a excellent comment, 
that it would certainly be far more efficient for a victim to 
be able to file one affidavit.
    The Federal Trade Commission is working with the credit 
reporting agencies, to try to establish that a complaint to us 
could then be forwarded immediately, basically, the most 
efficient way is one-stop shopping to the three credit 
reporting agencies.
    When I also think of the volume of, of, I mean this really 
resonates, but on our own website, in terms of identity theft, 
we have recorded a hundred thirty-nine thousand hits, for 
people who are obviously concerned about this.
    And, I mean, obviously everyone isn't complaining but 
people do express great concern and apprehension about this.
    If you were a victim, it would be excellent to be able to 
either file your affidavit with us, and we could then 
immediately transmit it to the credit reporting agencies, or if 
there were a mechanism for them to cooperate inter se, so 
they're filing it with one, would generate the fraud alerts, 
which are so critical to their, to competitors.
    Sheriff Baca. May I comment on that?
    Senator Feinstein. Please. Ms. Vezeris, and then we'll go 
to the Sheriff.
    Ms. Vezeris. I, I would just like to add one thing.
    On the enforcement side, we have established an agreement 
between the FTC and our office, and as allegations come in, 
presume most of them come to our hotline, although they can 
come through field offices, as well.
    But when those allegations come in, with the permission of 
the caller, we then, we've already, it's a, it's a new 
agreement, and we've only done this at one time, but we will 
exchange that information with the FTC directly.
    So, the caller can provide the information to us, and it 
will be fed into the FTC, so they don't have to make multiple 
calls.
    Senator Feinstein. But is there any reason that the Federal 
departments would feel you could not have a one-stop shop, 
whether it's the FTC or wherever, there should be one?
    Mr. Klurfeld. Correct.
    Senator Feinstein. Then would you mind very much talking 
among yourselves, and seeing who it should be and how we get 
that started? That'd be helpful. Sheriff.
    Sheriff Baca. I would like to say this, that if a victim 
were to come to the Sheriff's Department and define the scope 
of their problem, and one of course would be, an element of 
that scope, would be that they want to know what their credit 
report truly says.
    People don't have experience with all of us in law 
enforcement. They tend to wander a lot on the, on the field of 
where do I get my help.
    And so the Federal Trade Commission is, is extraordinary, 
as is the Social Security and the Postal Service.
    All three of these agencies have incredible capabilities.
    But the average citizen really needs someone like a seeing-
eye dog, to kind of let them go here and go there.
    Now, we ought to be able to do that in the Sheriff's 
Department. My investigators who are here, Sergeant Rolando 
Bracamontes, where are you? He's right there, stand up please, 
Joe Dulla.
    Two of my investigators here could be very easily by 
policy, the person, the contact persons to the Federal Trade 
Commission, if that's where we trigger the process, or to 
Social Security, or even to the Postal Service that, that the 
training that local law enforcement needs to have is not one 
when say a victim comes in and says, what do I do? I make these 
phone calls, no one's on the phone. I got hits on two credit 
agencies, however, I need the third, can you help?
    And then, I think the process should be, yeah, we can help, 
and we will just automatically contact these agencies for the 
victims and get things rolling, 'cause we're gonna wanna see 
that stuff, too.
    Senator Feinstein. That's excellent. Yeah, Mr. Klurfeld.
    Mr. Klurfeld. Thank you. Again, responding to your 
initiatives, Senator, from the 1998 bill, the clearinghouse 
again is really the central repository, and this month, we are 
making it accessible to all law enforcement officers, 
throughout the country.
    So, to the extent that you have a laptop computer, or you 
are online, and no matter how small your police department, or 
how large your police department, you will now have access to 
the very data that we have, and therefore you will be able to 
track trends.
    So, if you wanted to find out whether a certain type of 
identity theft is erupting in your particular market or 
jurisdiction, city, town, even village, you will be able to 
access the Federal Trade Commission data.
    Senator Feinstein. Well, let's say that the FTC is the 
agency that handles all the complaints. Would it be possible 
then for the sheriff or the law enforcement officer, wherever 
the complaint comes in to register that affidavit with your 
department to save time? Because I'll tellyou, people have a 
terrible time, when it comes to the Federal Government. I hate to say 
it, but they really do, even getting to the right place is a----
    Sheriff Baca. Well, hey, you make the, you make it a 
strong, you make a strong point there, Senator.
    I think, ideally, we're saying that it would be nice to 
have the Federal Trade Commission investigator in the task 
force, as Social Security and postal, recognizing it's, it's a 
break from the traditional way of doing things.
    But these investigations have so many tentacles, that the 
applications of inquiry are beyond just what we're telling you 
here.
    When you're dealing with financial institutions, this 
country, and Jeff you might know the answer, I don't know how 
many financial institutions are registered with the Federal 
Trade Commission, but it's gotta be what?
    Mr. Klurfeld. We don't have a registration system for 
financial institutions, but clearly there are----
    Sheriff Baca. Well, there's gotta be----
    Mr. Klurfeld. When you're talking about the global economy, 
you're talking about millions, probably.
    Sheriff Baca. Exactly, and, and so the expertise of dealing 
with the victim's plight, is one that has to cross over, just 
what we know in, in local law enforcement, and that's why I 
think the, the skill level is incredible, the availability of 
this kind of expertise is one that is emerging now.
    Mr. Ahern. The, if, if I could just make one point.
    Senator Feinstein. Finish, then Mr. Ahern has a comment.
    Mr. Klurfeld. We have a database called Consumer Sentinel, 
in which every law enforcement agency, and consumer protection, 
non-government agencies, such as a Better Business Bureau, 
input data to us, so we are able to find out where fraud is 
erupting, throughout the landscape.
    This is not just confined to identity fraud theft, excuse 
me, but whether you're talking about telemarketing fraud or 
tele-funding, prize promotions, the hit list of really the rape 
and pillage out there, in terms of the fraud landscape.
    By virtue of that database, you will also have access to 
all of the identity theft data, and you will be able to input, 
for example, if another victim were to come to you, by virtue 
of your taking in that information, you will be able to input 
it automatically, in to the Federal database, and that can be 
shared, as you've indicated.
    You know, this thing is global at this point, and it's 
vital that we do, you know, cooperate, Federal, State, all 
levels of law enforcement.
    I think we have to use all the tools that are available to 
us, in terms of high tech, because quite frankly, it is, it is 
obvious that the thief is using all those weapons and we must 
be as, as alert as, as they are and use the same tools.
    Ms. Frank. Senator Feinstein, can I add one quick point?
    Senator Feinstein. Before Mari----
    Ms. Frank. OK.
    Senator Feinstein. Mr. Ahern was next, and then I'll----
    Ms. Frank. OK.
    Mr. Ahern. OK, thank you Senator.
    One thing that kind of identified the problem to us was a 
couple of years ago, prior to us coming out with the identity 
theft awareness, bulletin and prior to ``Project No Fraud,'' we 
actually ran a survey, two people, and found out that 48 
percent of the victims of an identity theft didn't readily 
report it, because they didn't know where to go.
    And I think that's what we're talking about here. So, we're 
talking education, and you know, prevention is very important.
    This Consumer Sentinel that Jeff mentioned, I do know we 
have a postal inspector at our headquarters office assigned 
full-time with FTC. I think that's a step in the right 
direction.
    But I'd like to support what the Sheriff said there, some 
kind of system, if we just have one place, that's fine for a 
clearinghouse, but the problem is it comes in, in a lot of 
different areas, and we have to make sure all the agencies, the 
Social Security Administration, that we forward this on, or 
have some way electronically.
    Because I think in the past, a victim calls in to a credit 
agency, and they don't get a response, they can't get a human 
voice, they just get frustrated. They might report to a local 
police officer in a small town somewhere. It might not go 
forward, and have to make sure we capture that.
    So, I think some of the efforts, some of the discussion 
here, the data base with Consumer Sentinel is a step in the 
right direction. We'd be supportive of that.
    Senator Feinstein. Thank you very much.
    Ms. Frank. I get about a hundred e-mails and phone calls 
from victims a month, and the victims either report to the 
police, or to the credit reporting agencies, and I'm happy to 
hear that Sheriff Baca is going to refer them to the FTC.
    I think that's a great place to start, and, and you move 
on, but if the credit reporting agencies, perhaps in your bill, 
you could make it incumbent upon the credit reporting agencies 
to have a referral to the FTC, because when you call in and 
you're listening to the voice mail, there's no referral to the 
FTC now, and in the letter that I just received last week, 
there was no referral to the FTC.
    So, I think that would be a great place to start, is have 
that as part of the bill.
    Senator Feinstein. What, what do you think?
    Mr. Klurfeld. I, I think that is excellent also.
    Again, as much information as can be obtained to track 
trends, to find out what the extent of the problem is, is 
certainly welcome, to interdict the problem.
    Ms. Frank. And then you refer on, as well, correct? If they 
need help?
    Mr. Klurfeld. Yes, we do, and also back to law enforcement. 
The only caveat I would have to give is again a bureaucratic 
one that, that would be a decision for the commission itself to 
make, rather than for Jeffrey Klurfeld to arena to himself.
    Senator Feinstein. I understand. But you will take it back.
    Mr. Klurfeld. Absolutely.
    Senator Feinstein. Yeah, because----
    Sheriff Baca. And we'll help you, if you need letters and 
support.
    Senator Feinstein. That, that, that's great. I mean, I 
think it is so hard, and I think if there were oneclearinghouse 
affidavit recipient, that if it was a Social Security fraud, that it, 
you know, a copy went to Social Security, if it was post office, it 
went to post office, if it was another area, the FTC is really the 
agency, it seemed to me, equipped to handle that, but it is clear that, 
you know, we have hundreds of thousands of these now a year, so going 
to have to get cracking.
    Lieutenant, you wanted to----
    Lieutenant Jordan. Yes, one of the things, Senator, that we 
did, when we started our task force, we got the strike force 
deputies to advise the citizens that were victims of identity 
theft to contact, contact the people from the Federal Trade 
Commission.
    Also, for the police officers' standard and training class 
that we developed the curriculum for, earlier this year, that 
is one of the things we stressed for all the officers and 
deputy sheriffs throughout the State of California to do this.
    Senator Feinstein. Well, that's great.
    Well, all right. Selene, do you have any comments that you 
might like to add at this, at this point? Or else, I think 
we'll----
    Ms. Kassin. Well, I think that the FTC would be wonderful 
as a clearinghouse, only because with my personal experience, I 
was shuffled from one police department to another police 
department, to another police department, and there were 
jurisdictional issues, and nobody would give me any 
information.
    So, I had no information, and again I had the same 
experience as Mari Frank, calling the credit card, calling the 
credit bureaus and being put on hold, and, and pushing one, 
pushing 10, pushing five, and not, not, not having any 
resources to where to go next. It was a lot of investigation on 
my part.
    Senator Feinstein. Well, I, I think that's an excellent 
point. I think you made the point very clearly. We've got a 
couple of charts up there, and I don't think they're terribly 
visible, but I think they're important.
    One chart outlines the steps that identity theft victims 
can take, and another shows how to prevent identity theft from 
happening, I think there's some very good statements in these 
charts, that consumers should know, like, first, regularly 
review your credit card statements, and bank statements for 
unauthorized withdrawals or charges.
    Second, tear or shred charge receipts, pre-approved credit 
applications, bank checks and statements, so that these don't 
float around, but particularly, the credit card receipt.
    Another one is don't carry your social security card in 
your purse or wallet. I do, most people do, I think.
    Order copies of your credit card report each year and 
review them for errors, and the numbers are right there on that 
first chart.
    And I think importantly, don't give out personal 
information over the phone, unless you know the contact is a 
valid one.
    At work, be careful who has personal access to your 
personal information, and so on, but I think these are 
important things.
    If there is any number one thing a person can do to protect 
their identity, does anyone have a suggestion what it might be, 
Mari?
    Ms. Frank. I, I think we need to have a monitoring of our 
credit reports more often, like some have, there are some 
websites that may be going up that will offer free reviewing of 
monitoring on a weekly basis, because that is the only place 
you're going to really know if you're a victim of fraud.
    Neither Selene nor I could have done anything to protect 
what happened to us, nothing. If we did every one of these 
things, it wouldn't have done anything to help us, you know, 
not carrying our Social Security number, not talking on the 
phone, not giving out personal information on the Internet.
    Senator Feinstein. Wouldn't have made a difference.
    Ms. Frank. The truth of the matter is, the way to really, 
at least get a quick response, is to find out if there's any 
inquiries that are fraudulent, that are coming on your credit 
report. That's the one thing you can do.
    And if you can take your profile off-line, then no one 
could access it, to get your credit.
    In other words, if I could, and I've been asking the credit 
reporting agencies to do that, which is they won't allow us to 
take our profile off-line, so that no credit cards could be 
issued.
    So, that would be another thing, to allow, have that, that 
a consumer could take his credit off-line.
    Senator Feinstein. I think that's a good point. Yes, and, 
and I think our bill mandates that every consumer would be 
entitled to one free credit----
    Ms. Frank. Right.
    Senator Feinstein [continuing]. Report a year.
    Ms. Frank. We do.
    Senator Feinstein. I mean, just getting a credit report is 
difficult.
    So, I think your point, allowing the consumer to remove 
their credit from on-line would also be something we should 
add. So, I think that's a good point.
    Any other suggestions, and we'll close it off?
    Well, let me just say, I think this has been a great 
hearing. I thank you very much.
    Sheriff, you're going to ask each of these departments for 
cooperation and assignment, and I'm happy to back you up on 
that.
    Sheriff Baca. We have an excellent relationship now, 
Senator. I think that undoubtedly, their resources are like any 
law enforcement agency's resources, limited.
    If it's possible that they can assign full-time 
investigators to this task force, we have the space available, 
the office equipment is there.
    I think it would be useful. I think we're just at the tip 
of the iceberg, Senator, to be really honest with you.
    Obviously, you've focused on the right part of the problem. 
Undoubtedly, there are people in this audience here, who have 
had fraudulent credit card charges on their accounts, and then 
when they've called their credit card agency sources, they've 
literally had those charges wiped off. Police reports were 
never made.
    The issue has a clear need for a tremendous amount of 
additional research.
    Senator Feinstein. All right.
    Sheriff Baca. You've done a magnificent job, but there's 
much more that we need to find out about it.
    Senator Feinstein. That's absolutely right.
    Sheriff Baca. And when we find out more, Senator, as you 
know, we're gonna come back to you with this information, and I 
think we should probably give you a, an update, probably in 
another 6 months to a year, as to where we've gone from here.
    You, you've done wonderful, you're the leader on this 
matter.
    Senator Feinstein. Well, it's, as you said, it's the tip of 
the iceberg, and we can only address what we know is happening 
now, but my sense is that this is going to be growing in 
sophistication, as the data becomes available, and I think the 
key thing that I'm trying to do is make a beachhead with the 
Social Security number.
    Social Security numbers shouldn't be something that's 
traded or sold. It's not intended to be that, it's not meant to 
be that, that's not its purpose.
    And so, if we can get that established and really, just 
kind of crack down in one area, it might, then we can see what 
else develops, but it's an ever-moving target, no question.
    Let me just thank everybody very, very much, and the 
hearing stands adjourned. Thank you.
    [Whereupon, at 10:44 a.m., the subcommittee adjourned.]

                                
