127 52 8MB
English Pages 204 Year 1984
*
Use l a n i m i r C e
sf
O
he
ay
u Aas a
oe
5
i
W Pou L crore tr? Te -siae
ame
Lait g deep
Pope
ot
anses
s s agree avon oP
n
uf ( Rone. Dy
The Criminal Use
of
False Identification
Loompanics Unlimited Port Townsend, Washington
Published by: Loompanics Unlimited PO Box 1197 Port Townsend, WA 98368 Printed
in U.S.A.
ISBN: 0-915179-05-9
THE CRIMINAL
USE OF FALSE
IDENTIFICATION A Summary Report on the Nature, Scope, and Impact of False ID Use in the United States with Recommendations to Combat the Problem
NOVEMBER
1976
The Report of the Federal Advisory Committee on False Identification UNITED
STATES DEPARTMENT OF JUSTICE
ACKNOWLEDGEMENTS The Committee Chairman gratefully acknowledges all those who have contributed to this Report, particularly Deputy Attorney General Harold R. Tyler, Jr., Assistant Attorney General Richard L. Thornburgh, Deputy Assistant Attorney General John C. Keeney, General Crimes Section Chief Alfred L. Hantman,
Former
Section
Chief Carl W. Belcher; Douglas H. Westbrook of the Criminal Division, Emil Schroeder, FBI who originally presented the false identification problem to the Criminal Division; Deputy Director William F. Duggan of the Passport Office who spent hundreds of hours working on this project; Staff Director Dr. Thomas P. Kabaservice of the MITRE Corporation whose professionalism produced the final work product; Joseph Kochanski of the Law Enforcement Assistance Administration who coordinated LEAA’s contribution to the Committee; and the Committee’s 80 members and friends who contributed 18 months of their time and effort as volunteers.
ABSTRACT The criminal with
use of false identification
a multi-billion
dollar
impact
the general public. In November
on
is a national problem
government,
business,
and
1974 the U.S. Attorney General
established the Federal Advisory Committee on False Identification (FACFI) to assess the problem and recommend solutions. With MITRE support, the FACFI conducted surveys and examined the extent of false ID use in six major problem areas: drug smuggling, illegal immigration, fugitives from justice, fraud against business, fraud against government, and other criminal activity. The Committee ranked potential solutions in these areas by criteria that included not only an assessment of effectiveness but also an evaluation of possible impact on public convenience and privacy. This report contains the findings, background
material, recommendations,
and
plans for implementation of the proposed solutions of the FACFI, and the appendices offer a comprehensive archive of current information available on the problem.
July
Mr. David Muchow, Chairman, Federal Advisory Committee on Department of Justice, Washington, D.C.
Dear
Mr.
25,
False
1976
Identification,
Muchow:
I was very interested in your work on false identification. the (deleted) Department of Motor Vehicles we issue drivers and I.D. cards all day. You have no idea what goes on.
Here at licenses
Birth certificates are accepted without anything to connect them with the bearer. If he says it is his, that is final. Uncertified photostats are accepted as conclusive, and you know what can be done with any document in a photostat machine. In the case of a female, only the first name need match, as she says she is married. We see the same faces getting licenses and I.D. names all the time; for the purposes of welfare alien fraud. Why
do we
do
complaints.
nothing?
The
Because
attitude
of
all
employees
supervision
cards in different fraud, and illegal
are
is,
terrified
"Don't
rock
of
the
courtesy
boat;
your job is to issue." Employees who expose fraud in identity face real, and I mean real trouble. Avoiding courtesy complaints is the most aim of the Department, and always was. We are keeping our fingers crossed for you interest but seeing this farce corrected. If
it
were
known
who
wrote
this
to
you,
the
and
your
group.
Department
would
We
have
try
bring dismissal charges against me, civil service notwithstanding; therefore I cannot sign this letter. Please believe we are almost fed up with what is happening.
Sincerely
(Signed
and
with
best
an
X)
wishes,
for-
no
to
and all
CONTENTS Background PART
and
Membership
of the FACFI...
1
airs. Deans
5
I: A Look at the Problem
Pritt
oeask COtce
Meports. 6.2... 25.68 eon
GOVEniImMentaraymMentsino.
Gomimercial
sc ws. ccnanoe 5
Pansactions ..% ... ocd... «sae 79
SCANS Serer ican
Federal
49
ces ogi ote tc, kt
Identification
RC
Documents
OSS ee
109
........
127
State and Local Identification Documents.
.171
BACKGROUND AND MEMBERSHIP OF THE FACFI The Federal Advisory Committee on False Identification (FACFI) was formed in 1974. Its creation was a product of several converging trends:
Federal, state and local law enforcement agencies were being deluged with a host of new false identification techniques. Criminals and fugitives were using these techniques to perpetrate crimes and avoid arrest. Underground pamphlets such as the Paper Trip detailed steps for defrauding the public, while printing presses cranked out counterfeit “official” documents such as birth certificates and driver’s licenses and advertised them for sale in interstate commerce. There was a growing concern on the part of citizens and public interest groups that false identification could be used for unauthorized access to confidential
information,
and that pri-
vacy was being invaded when criminals used innocent persons’ names to commit crimes. The growing mobility of Americans required a more secure system of identifying strangers in commercial transactions such as cashing checks and using credit cards. The public was becoming more concerned over disclosures that millions of illegal aliens were entering the country, rampant fraud in government social welfare programs was coming to light, and innumerable
other crimes
involving false iden-
tification were increasing in number. On
September
15,
1973
and
October
3, 1973,
Miss
Frances
Knight, Director, and Mr. William Duggan, Deputy Director of the Passport Office, U.S. Department of State, testified on false identifi-
cation before the Internal Security Subcommittee of the Senate Judiciary Committee.* Their testimony called attention to passport *Hearing Before the Subcommittee to Investigate the Administration of the Internal Security Act of the Committee on the Judiciary, United States Senate, September 15,
1972, 92nd Congress 2d Session.
frauds and forgeries related to illegal narcotics trafficking and other crimes. In the Fall of 1973, the Passport Office and the Federal Bureau
of Investigation exchanged information concerning the increasing problem of false identification. These discussions led to an informal meeting among interested Federal agencies and others concerning the use of false identification.
On
May
10, 1974, a one-day confer-
ence of forty-four representatives from more than ment agencies and other organizations was held at emy, Quantico, Virginia. This meeting concluded imous recommendation that an interagency task identification be formed to combat the problem. In the Fall of 1974, the Criminal
fifteen governthe FBI Acadwith the unanforce on false
Division of the Department
of|
Justice prepared the necessary charter documents to establish a Federal Advisory Committee on False Identification. On October 14, 1974, Attorney General William B. Saxbe officially announced its creation. In his address, the Attorney General made the following statement: ; False identification is a common denominator in a wide range of serious crimes. Let me cite a few examples. The Weatherman organization has taken credit for a number of terrorist bombings. False identification has been found on some of its members taken into custody. It appears that false identification may be a factor in the success of 23 others who have successfully eluded capture thus far. But false credentials can touch virtually every aspect of crime. They are frequently used by narcotics peddlers and by persons passing counterfeit checks and securities, by those who take part in bank swindles, and in Social Security and welfare frauds.
Car thieves often use false identification, not only to thwart police, but to rent or lease cars which are then driven off and
sold. The list of offenses could go on and on. They include widespread and costly frauds through the use of credit cards. And another growing problem is the use of false identification by
illegal aliens who insulate themselves from authorities as they settle into new jobs and new lives . . .* The announcement of the formation of the Federal Advisory Committee on False Identification and its charter were published in the Federal Register of October 22, 1974.**The charter states the nature and purpose of this Committee are: 1.
‘Yo identify, with
the assistance
of Federal,
state, and
local
agencies, as well as representatives from the private sector and the public:
(a) the various criminal techniques used to obtain false identification; (b) the types of persons committing such crimes; and (c) the nature and extent of such crimes including their impact upon the criminal justice system and commercial transactions such as check passing, credit card fraud, and the obtaining
of fraudulent
loans, securities,
and other
commercial paper.
2. To develop a coordinated Federal plan for meeting the threat which Executive Branch Agencies face from false identification. Such plan will include a discussion of closing any loopholes in existing Federal laws, regulations or procedures, and
strengthening the enforcement of such laws, regulations and procedures. 3. To assist state and local law enforcement agencies and bureaus of vital statistics in developing effective measures to prevent the obtaining of false identification and its criminal use. 4.
To provide Federal, state and local agencies a forum and mechanism for the exchange of information on false identification.
In its deliberations, the Committee sought not only to aid law enforcement agencies but also to protect personal privacy. As Deputy Attorney General Harold R. Tyler, Jr. stated to the Committee: *Address by William
B. Saxbe, Columbus, Ohio, October
14, 1974.
**The Committee was chartered pursuant to the Federal Advisory Committee Act of
1972 (P.L. 92-463, Oct. 6, 1972) .
_.. this is the very purpose of your Committee: to recommend law enforcement methods which are compatible with every citizen’s vital right to reasonable privacy and fair treatment.* The first meeting of the FACFI was held on November 14, in the Department of Justice, and monthly meetings were thereafter. All of its meetings were open to the general public all voting in the Committee was done by a consensus of those sent, including members of the public. Because
of the extensive
scope of the problem,
the FACFI
1974 held and prewas
divided into five Task Forces, each dealing with a different phase of the false identification problem: ‘Task Force I—Government Payments Task Force [I—Commercial Transactions
Task Force I1I—Fugitives Task Force I[V—Federal Identification Documents Task Force V—State and Local Identification Documents.
FACFI
membership
consisted of representatives of government
agencies at Federal, state and local levels, law enforcement
officials,
business groups such as the American Bankers Association, and members of the general public. All were volunteers and received no travel funds or remuneration for their assistance. Many independent business firms provided voluntary support to the Committee by sending observers to meetings and by contributing valuable technical background information. In October 1975, The MITRE Corporation was retained under contract with the Department of Justice to act as technical and editorial staff to the FACFI. MITRE support included: assisting us in gathering additional data covering gaps in the initial FACFI surveys to determine the nature and scope of the false identification problem; surveying the state of the art in technology areas that dealt
with potential solutions to the false identification problem; compiling a set of potential solutions to be voted upon and revised by the FACFI;
conducting
other
technical
research;
and
drafting
the
FACFI final report. *Address
by Harold
R. Tyler,
Jr., to the
Identification, May 8, 1975.
4
Federal
Advisory
Committee
on
False
PART A Look
I:
at the Problem
CONTENTS SECTION:
|-=tINTRODUCTIONM
SECTION-Il
—
THE
SCOPE
ce
OF THE
tine acs eee ene
ne é
PROBLEM.....77.
12
ESfeGl Oni SOCIOLY) Sse ares ye ea gr do eee 13 DetinitiONS: 5 228:. 2 oes oweet pe caletec tA ota ioc she aes icaera ahs)
SECTION Ill — COMMON IDENTIFICATION DOCUMENT Sra. .o. net wa ears Be ete ea ee a eral
eee
Birth "GernliiCater.ner. > scmanerarette tee oe. ka dine cake sce DFIVEr Sh ICIS ec eore tsore ese ia olayces or veo,ages aragate U.S. FRaSsspom eer ay ak: tees eee Oa oe ~ «Bre 20" U.S. Visa-ande Alien We ati. esas. 5evs cee SOClal SCCULIY RC ONG a weecreerr at oh cas 50a ssa oncra ee Selective Services Drafts Gard x; Joon. ce ceee panwen sane VotermRegistrationy Gardin ote cassie. «0k de eee Credit: CAS ray one, Marae Genes Ala ck? fhv.5 et nee Non-Government ID.........: a a re ee
SEC FIONAY
=a FRAUDULENT
AID tWSEsse ee sertee
sii LWA 20 21 Zoo Zo 24 24 25 26
27
Drug- Smeg glinGries tne tans ee 29 Hhegal- tmMONgQKnatlotr sa. it aramid ati ee ee 30 FUGIUIVES: [FORT FIUS UC Cues tre see. upsets vs Mace eee 32 Fraud Againists Business. spec. > cciacsas us ohn Meee 33 Check: Porgenya ans RiaUCsrwi:s.:.+..5:4en Wes ere eee 33 Credit. Carer ra eae. ee a clane ais 5 Salen s 2s een Ue 36 SOCUIIUICS RRAUClrere ote dcr.caterers axe = octal aha ream eee ane 38 EMDOZZICMION Carer nae etc cn cine oc mtn ees nae 40 Fraud AgainsteGoverniment.17...4. .. eee ee 41 Welfare Frauds or etree sre et on oe er, SR 42 SocialsSecurity* Fraud). saouretse.e ceos oe ee 46 Other CriminalwACuvityae wi e.2 oe ee Jae es 47
SECTION
AN
Around animals,
he
5,000
rings
and axes
goods
he had
issued
banking
and
Today, symbol
for
for
Chinese
of
years
paper
In the past in
than
when
and
five
and money
is
strong
twenty-five
his
gave
goods
safeguards
or
domesticate such
as
what
later,
the
years
ago
in Europe.
a sophisticated
in
process
on
an
international
1975
--
participates
system
years
"goods
against
hundred
transactions
million
to
he bartered years
further
socio-economic
even
for
two
thousand
developed
215
a person
exchange on
--
began
possessions
Previously,
computerized
complex
man
using
Four
money,
were
in
society
different
extent
of
exchangeof goods
manipulation
increasingly
large
primitive
goods.
paper
currency
American
currency
when
concept
he wanted.
first
in
markedly
INTRODUCTION
"exchange"
the
the
the
those
scale. this
ago,
introduced
1
in ways
that
are
ago.
for goods"
services,
he
criminal
or accepted
depended
incursion
to
in
a
these
transactions:
e
Personal acted,
e
In rupted
knowledge
today's
on
the
person
legitimacy
society, of
with
whom
he
trans-
both
Transient
nature
e
Necessity
of
checks,
of
of the medium
these
safeguards
of exchange.
have
been
the:
e
whose
the
and
Reliance
because
of
of the
relying
credit
cards,
legitimacy
on
population,
paper
substitutes
signature
is not
and
on
guaranteed.
(e.g.,
application)
dis-
The
modern
businessman
or
government
with whom he deals. (who
personally
gold
coin,
stitute,
or
1968
Members
of
that
--
less this
was
in the papers
This
eluded who
we
find
carry
counterfeited
at
startling, However,
both the
into
use
city
an
not
usually
in earlier
purchase,
tender)
with
the
he
its
accepts he
The
city
an
rate,
equal the
economy in
the
country,
and
each
must
of
If
Everywhere has
to
who
the and
in
of
shelter
the
false
from
own
would
paper
be
ID
to
of
fraud,
were
one
goes, the
to prove
he's
appropriate
goods,
is much
'somebody',
document
or
he
card
says he actually is that person. His 'identification’, or ID makes him that person. Amazing,
right?
Well
longer
not
really.
a people
society,
....American but
a PAPER
society
pro-
being and
confidence.
Trip:
present
An
entitled
obvious
"buy"
not
identities
public
prosecution
same
societies,
ends.
currency
general
the
identity
has
all
manual
currency
dollar
impact to
the
count-
are.
transacting
how much the
in
our
we
present
1967
(not
which
no
a sub-
of residence."
other
systemto their
our
March
carry
a do-it-yourself
become
use
place
"prove"
manner
confirms have
know we
element,
published
rate.
Paper
the
has
Americans
detect.
From
know
days
bit
bearer
"Between
their
not
that
in our
advice
that
36,600,000
move,
prevailing
has
to
states --
do
criminal
alarming
to
legal
along
we
accumulated
increase
the
When
the
whose
at
animal
changed
population
shift
of
to
from
year)
common.
press
Trip
liferating
to
year
mobile
notice
ways
Paper
entry
Shock
we have
"underground" The
in Future
significant
the
the
in a single
than one
once
counterpart
of his
of which
does
verify.
Toffler
March
ing children
way
to
his
teeth
examined
authenticity
ability
Alvin and
the
carefully
the
limited
Unlike
checked
employee
is
society....
services,
harder
The paper says who you are, not you. Actually, of course, you do know who you are, but you don't want the paper telling you who you are. The solution? The Paper Trip!
— HOW a D WHYS
Figure
The
1.
manual
step
by step,
for
fraudulent
readers
Cover
that
of Underground
continues
how
one
may
purposes.
with
a
with
such
obtain For
false
Publication
rhetoric
many
false
example,
the
The
and
Paper
then
outlines,
identities authors
Trip
and
inform
use
them
their
ID:
You can rent a car, never fee, and drive it all the
pay more than the initial way across the country and back without paying for more than gas and oil. Use good ID and simply leave the car somewhere after the trip. You disappear. This is not car theft, either.
Such
techniques
called
"Gemini
appear
Completely
Advertisements
were
Gallery" and
such
as
presented
in which Start this
a New also
an
in
another
article
Life appear:
with
underground
proposed a Brand
"How New
paper
to Dis-
Identity."
Figure
Such David
and
2.
disappearing
Black
tried
documented
munity
show
under
out
the
posed
on
a false
complete
set
The
a crime. tion
as
of
means
become
sampled
the
state
government,
order
to
We cation
define
have
a New
not
the methods
so
ID
fantastic.
proposed
February
fraud
on
the
1, 1976,
successfully
Paper
himself
in
CBS
Trip
a com-
television
provided
is perpetrated.
who
Journalist
by The
he established Interviews
on
Identity
further
A CBS
obtained
researcher
and
used
a
IDs.
out
to
just
law
create
clear
commonly
false
the
been
scope
of
evidence used
in
10
and
the
identity
problem
the
experience
enforcement,
full
a
how big has
accumulated
the
indeed,
which
imposter
nationwide
found
documents
of
with
false
an
exist
Finding
has
Securing
identity.
false
do
many
on
are,
broadcast
of how
camera
acts
ease
"60 Minutes,'"'
documentation
has
Advertisement
task
of
of
in
order
false
the
to
identifica-
FACFI.
The
of officials
in
the
community
business
commit
Federal
FACFI and
in
problem.
of widespread
abuses
our
These
society.
in
identifi-
abuses
not
only fraud upon
subject
the
committed, which
our
public they
to
also
commercial
a grievous undermine and
and the
governmental
14
illegal trust
"tax"
among
"
through
individuals
institutions
depend.
the
SECTION
THE
The illegal
work use
therefore,
as
criminal further
the as
the
were
abuse
delicate
reveal
the
and
to
The
and
the
economic,
with
an
open
affected
in
to
as
this
Federal
the
much
and
study
breadth
of
the
of have,
and
depth
problem
in
legal
effects
on
society
from
for
safeguards
undertaking
and
state
was
to
against
dealing
with
as
well
of maintaining
find
answers
to
such
as:
e
Who
is
e
How
big
e
Where
are
false
identification?
e
Which
are
e@
Are
is
To what
the
most
of
ID use?
problem?
losses
incurred
significant
violence
nature
aided
as
as
a
problem
well
by false
as
result
of
areas?
those
of
an
identification?
extent?
e
What
state
e
What
state,
false
false
financial
crimes
economic
the
by
and
ID use
Federal
Federal,
already
laws
or
technical
exist?
2
now
How
exist
the
the
jurisdictions
principle
We wished
the
We
protecting
underlying
society.
serious
documents.
impact
social
in
of
and
of
first
recommendations
Committee
Acts
the
full
a view
making
PROBLEM
counterfeit
investigation
to
relationship
freedoms
questions
of
OF THE
represents
fide
our
addressed
abuse.
Privacy
FACFI bona
in order
Questions
populace
the
both
extended
possible
U.S.
of
of
SCOPE
2
regarding
safeguards
effective
ID use?
against
are
they?
-
In
e
What
@
Which
finding
are
possible
solutions
answers
a serious
problem
EFFECT
SOCIETY
ON
The
criminal
multibillion tion
of
is
this
cant
of
the
American
related
extent
of
but
should
pays
for
the
creased the
also
to
cost
goods
and
The
of
a false
use
import
or
illegal
levels. and
addition the
The
in
to
the
exceeded
or
of
per
year.
on
The
small
the
Most
signifi-
fraud
Our
and
estimates best
available
individual
business,
they
but
card
based
citizen
primarily
businesses
encounter
a
identifica-
fail
the
in
in-
because
consumer
choice.
welfare
maintain
such
to
credit
are
When
a devastating
costs
of
against
obtain
to
uncover
represents
False
$1 billion
complete.
losses
of
to
to
or
one's
dollar
but
status
impact
activities
taxpayers
other
not also
social as
on
an
benefits,
illegal
government
only
results
undermines
at
in
public
government.
findings
form
as
documents
instruments.
business
fraud
ID
begun
counterfeiting,
areas
crime
loss
success
indirect
his of
committing
example,
has
over
and
the
on
has
States.
well
services.
of
drugs,
fugitive
United
negotiable
ID
severe
terms
Our
has
false
FACFI
fraud
considered
in
confidence
IDs
of
of
particularly
direct
in
cost
in
effects be
suffers
alien all
the not
the
check
other
the
identification
in
occur
problem?
import.
business
and
the
recommend?
false
to
losses
securities
data
of
of
to
questions,
problem
loss
of
we
these
costing
is
do
considerable
use
dollar
additional
theft
to of
solutions
indicate
legal
tax
fraudulent fraud
cost the
of
that
burden,
individual
pays
payments
against
and
an
welfare
available
13
in
In New
benefits from
our
society,
additional
services
government.
providing
resources
an
to
illegal users
York
and
taxpayers.
of
City,
tax false for
municipal The
in
services
Immigration
and
Naturalization
population
Through aliens they
--
the are
are
of
the
we
would
emphasize
The
recently as
illegal
Passport
the
the
have
has
While of
that
we
these
the
time,
already
--
over
are
it
cannot
yet on
of
of New
illegal
that
accurate
of
these
to which estimates
individual
type
York's
aliens.
benefits
make
the
this
10%
is probable
or welfare
crimes
burden
it
is
taxpayer,
crime
is
felt
by
into
sees She
the
and
false
identification
1973,
March
1975
carried
in
U.S.
that
the
of
"The
to
blatant
be
point
to
been
in
expensive
for
an
growing
extensive
and
Office
fraud
has
on
scope,
estimated in
at cash
a minimum assistance
14
of
$150.00
alone.
of
fraud,
the
problem
has
been
area
of
as
ringing
concern
Not
only
but
individual
For
example,
Investigators probing Chicago welfare frauds uncovered one case which must be near the top in sheer gall and ingenuity: a thirty-one count fraud indictment charged a welfare recipient with the receipt of illegal welfare benefits, medical assistance, food stamps, in addition to Social Security and Veterans benefits from four non-existent spouses.... The recipient of all these benefits used 80 different names; 30 different addresses and 15 different telephone numbers. The total annual benefits received by this one person annually
ID
and
benefits
the
continues:
was
1974,
43 years."
abuse.
abuse.
5,
false
Director
action
Passport
of
of welfare
Knight,
and
identification
incidents
warnings
receipt
Frances
identification
proven
demonstrated
the
28,
5,
apprised
investigation
states
false
current
of
Record of June
perpetrated
on passport
statistics
been
of December
entry
overdue.
alarm
Knight
persons
employment
Congressional
Office
Although long
that
identification,
either
impact
estimated
nationwide.
especially
long
has
million
false
entitled.
Congress
and
one
of
enjoying
not
problem. most
about
use
national
citizens
Service
for have
cases
Miss
a
Added other
to
losses
False
IDs
e
Illegally
e
Collect
e
Take entrance
e
Escape
are
can
enter
those
be
exams
Gain
Practice
entry
into
bonuses
is
the
homes
true
false
ID
use
in
from
learning.
the military
services.
for unqualified
students.
apprehension. for
a profession
public
of higher
and tests or
with
to:
institutions
prosecution
@
connected
used
re-enlistment
e
The TD
such
areas.
robbery
under
victim
or
false
of
crimes
of violence.
credentials.
the
growing
menace
of
false
use’.
DEFINITIONS
Certain
fine of
own
for
obtain
tion
is
does
not
an
in
the
encompass
the
presents the
also
Committee
of an
individual crime this
a check
knowledge
transactions
by citizens
did
the
was
use
certain
a hostile not
than
of
use
the of
an
false
crime.
This
of a forged
supporting
(NSF)
existing
check
a crime
will
check
documenta-
However,
fraud account
not
in his
clear.
identification
it
in which
Our
documents
for
by fugitives.
to establish or
against
that
consider
under
other
commission
transaction.
includes
ments
attributes
this
not-sufficient-funds
de-
individual
if no
victim
We
by an
even
of
report.
use
benefits,
simple
with
this
of a previous
by the
non-criminal
however,
or personal
consequences to
for
intentional
include
definition
organized
upon
the
assisting
enough
other
as
demanded
name
The
or
of
legal
is broad
agreed
fraud a name
purpose
the
cash
individual
true
were
containing the
in avoiding
definition to
definitions
identification
a document
his
or
false
the
non-criminal
circumstances,
a "cover" foreign
a primary
area
15
to avoid
power. of
use
such
the
of
as
false
reprisals
Within
its
Committee's
docu-
the necessity
from
charter, investigation.
There
are
adequate
tification
Included
documents the
as
licenses,
as
whose
bearer.
well
of
to
an
These
passports,
employee
Any
we
have
identification
e
Alteration by
elements,
physical
creation
source our
of
to
e
to
create
Imposture
a
of
of
false
refers
(living
or
such
as
presenting
cate
to
apply
to
badges,
can
and
For
fundamental
military
purposes
methods
of
purposes.
a legitimate identification age,
legitimate
bearer.
or
unauthorized
document
by an
unauthorized
identification. includes blank
For
the
official
unform
ID.
the
use
legal
of
documents
a deceased a driver's
16
another as
person's license.
as
be
identity.
of
cards,
of
of
driver's
photograph,
the
a genuine
deceased)
for
credit
abuse
a false
to
ident-
types
and
certificates,
false
the
many
checks
three
name,
were
identification
an
counterfeiting
use
obtaining
not
significant
the
a complete
purposes,
(ID)
documents to
for
the
refers
support
authorized to
defined
document
as
for
is
birth
these
description
Counterfeiting
as
claim
changing
such
document
identification
of
refers
cases
purpose
government such
a fraudulent
document
in such
name.
or major
IDs
cards.
support
new
include
an
e
a
identification
used
classification
using
channels
in
intended
commonly
identification used
legal
documents
person's one's
birth
own,
certifi-
-
SECTION
COMMON
The-United
used
to
need
for
such
several de
types
facto
legal of
the
employment designed
only
documents.
age,
driver's
identification
blind
place is
benefits
persons.
or
for
now
for
become
many
other
sources
as
and
which
is
citizenship and
documents. as
in
The an
transactions;
for
this
to non-drivers
issued de
be
become
in employment
"licenses"
serve
can
frequent
transactions,
have
certificate,
other
documents
also
the
indispensable
commercial
special
use
parentage used
obtaining
has
that
of
commercial such
birth
of birth,
issue
Several
private
and
The
document
Because
for
extensively
license
document
states
and
a unique
in
for
agencies
have
DOCUMENTS
the bearer.
not
state-issued
and
of
documents
individual,
many
not
of
applications
reason,
does
verification
of
named
IDENTIFICATION
identity
identification
proof
the
States
verify
3
by government
facto
identification
documents.
This
section
tion
documents
gain
access
that
to
use
used
or
or
certificates
in
local
vital
to
issue
certified
states
are
issued
received
records
birth
Approximately
the
the
various
either
as
as
breeder
types
of
primary
common
IDs
documents
to
for
identifica-
defraud
or
obtaining
further
falsify.
CERTIFICATE
Birth
are
are
or benefits,
identification
BIRTH
summarizes
requestor
the United
offices,
copies
of
year,
processed
are
and
over
birth
certificates
10 million
each
and
in
over
the
The
only
identity.
1%
name
generally
of which
are (Only
exclusively
copies
80 percent
by mail.
usually
7,000
are
certificates.
issued
certified
States
at
the
kept
authorized in
a few
state
level.)
of birth
certificates
of
requested
and
indications
those
return
of
the
address
are of
requestor's
There
ment
or
may
if
mate
need
regard
for
all
the
vital
these copy
certificate
can
person
of
the
whose
the
same
time
as
way
of obtaining (IDI)
death
cate
the
an
either
false
or
to
illegal
alien
several
new
lent
illegal being
honor
an
and
To
the
docu-
certifi-
has
legitiD.C.
of which
must
no
law
state
unsigned
date,
using
that
request
false
for
many They
the
an
Death
state
birth
imposter's of
of birth
identity
a birth and
can in
a
certifi-
names
be
of
obtained
local
of a person's
identification
an
about
This
Infant
by browsing
officials of which
relate,
homicide
vital
death.
by the
in
the
The
IDI
also
used
U.S.
passports
18
the
to
IDI
Phillipines
He
of up
documented
example,
in California
and
apprehended.
have
used for
certificates
fees
name
3.
for himself
charging
born
because
information
citizens.
aliens,
the
Frequently
a copy
place
this
in
childhood.
and
for
acquire
and
IDs
a person
called
accounts
Naturalization
citizenship,
of
detect
This (found
in Figure
wanted
-to
easily
a person,
in early
apply
person.
documents.
of
uncorrelated
the
quite
assumes.
newspaper
and
can
identity
died
certificate
identities
U.S.
birth
found
imposter
difficult
only
from
obtaining
false
who
largely
illustrated
claims
deceased
a copy
additional
the
challenged.
a death
of
obtaining
or
Washington,
have to
of
A request
birth
obtain
identification
needs
Immigration false
We
refuse
to
the
but
of a deceased
office)
is
and
documents,
certificate
assume
--is
are
be
imposter
process
birth
to
method
to
from
method
form
person's
imposter
be used
himself
records
parents
records
the
copies.
individual
states
to
an
identity
choose
unlikely
the
person.
official
then
will
is
Some
conditions,
imposter
and
to
as public
interested
either
certified
of another
related
document.
for
for
certificate.
a certified
Identity
a copy
is
a registry
Under
the
for
records
to any
a birth
standards
requests
requester
authorizes
of
uniform
be made
the
supplied
for
no
processing
legally
cate
be
are
for
the
IDI
$2000
at
for
who
using
method
for
case
to
of of
an
created
the
least
this
method
the
many
records
obtain 12
of
fraudu-
other
service
before
OBTAIN NAME, DATE, PLACE OF BIRTH OF DECEASED INFANT APPLY FOR BIRTH CERTIFICATE
APPLY
FOR
DRIVER'S LICENSE
APPLY
igh Mie
FOR
SOCIAL SECURITY NUMBER
OPEN CHECKING ACCOUNT APPLY FOR CREDIT CARDS
APPLY FOR U.S. PASSPORT
Figure
Although
to
be
feit
application
the most and
altered frauds.
of birth
certificates
over
1,000
different
Counterfeit
printers
and
document
is
date
are
of birth
purposes
are
methods
are
seals
are
Theft
blank
forms
in
some
cedures
states for
forms
may
by
blank
to
or
the
be
can
found
be
lack
used
of
used
seals of
an
the
Genuine
to
create
by dishonest
strict
forms.
19
vary
from
in
issued
legitimate altered
forms
counterfeit
and
U.S.;
certified
"dependent"
employees
the
underground
inexpensive
blank
security
forms
widely
Documents
and
identi-
that
corresponding
additional
Erasure
fact
presently
obtained if
appears
counter-
in false
by the
photocopying.
attempted.
misuse
by imposters
certificate,
been
aided
common.
sometimes or
also
is
to invent
less
copies
the birth
detect
against
usually
official of
have
documents
secure
Method
authenticating
difficult
not
welfare the
of
Counterfeiting and
IDI
certified
abuse
certificates
copies.
change
The
for
significant
fication
3.
APPLY FOR PUBLIC ASSISTANCE
for
to
tax
and
even
certificates. is
or
photocopying
made
accounting
easy
pro-
DRIVER'S
LICENSE
Driver's of
business
and
always
some
bearer
type
is
the
on
36
the
name,
cannot
date,
initial
and
is
birthplace
an
a valid
always
well.
Thirty-three
in
four and
of
these
used
to
documents tion the
are form
for
that also and
counterfeit is
extremely
this
the
46
system
31
use
in
not
legal the
of hair. maintained states.
number;
of
date,
carry
18 color
license
systems
In
however,
the
Social
using
the
are
content
from
another
as
proof;
ID,
Securi-
SSN
out-of-state difficult.
the
from
license
to
close
or
proof
of
of identity
certificate
name.
and
card
a card.
"proof"
varies,
as
non-drivers;
similar
birth
by merchants
application
20
to
an
the
however,
"underground"
license
of
if
certificate
such
pass
issuance
be waived
identification
false
full
states,
as
a false
of
A birth
or
obtain
same
enough
driver's
False
an
proof
state.
license)
is accepted
license,
in
some
issue
to
to
may
a baptismal
certificate
required
good
a
or
a driver's
available of
prior
license
certificate
often
positive
applicant
a birth
a license
seek
proof
as
is not
legally
to
presently
form
a driver's
obtain
Act
of
and
such
military
states,
the birth
in applying
be
the
District
for
birth
collected
however,
accepted
states
same
birthplace
Since
of
license;
records,
the
record
record
claim
school
in
to
and
is
the
a driver's
license;
of eyes,
as
Privacy
that
address,
A photograph
(SSN)
serves
extended
fact
of U.S.
number
jurisdictions
accept
(usually
the
the
and
a credential
L975.
presents
certificate
types
36 color
SSN
of
be
driver's
applicant
age
the
to January,
Forty-four
51
Administration's
provisions
ty number Prior
to
as
signature,
description.
the
50 states
license
in part
Security
Vehicle
by all
the
bearer's
40 weight,
jurisdictions
under
issued of
due
the
of
Social
Motor
is
of physical
height,
bearer's
eleven
are
popularity
carries
used
bearer's The
The
transactions
license
in
licenses
Columbia.
can
Counterfeit visual
inspec-
sources.
Because
detection
of
local
police
counterfeiting
a
appear
to
be
Twenty-nine
resist are
most
common
of
driver's
attempts
still
U.S.
the types
too
at
Passports
as
drug
smuggling.
and
either
citizenship
identity birth
however,
and
can
(such
a
the
as
By
none
before
is
bearer;
is
driver's
are
licenses.
measures
that
foolproof
and
a passport
agent
or
period
of
several
some
by mail
or
be
picked
false
Because
in
ID
the
use,
alleviating
frauds
in
1972,
the
a result
to
detection 1975.
these
When
As
in
te
cases
problem.
to
for
fiscal e449
frauds
perpetrated
in the
through
28%
drug
has
21
A
submitted
photo
witness
who
in
After
passport
is
ID
knows
person
a
delivered
fraud
there
is
concentrating
number
of
sharply,
passport
from
a fraud
Passport
on
174
in 1971
detection
Office
pro-
increased
application
stage
(as opposed
of
cases
in
reported
passport
frauds
1975
19747
fraud.
keep
and
Ha
1973
detected
increased:
"to16L7
helped
trafficking
passport
be
initiated the
identity of
applicant.
the
rose
through
application
especially
States
pean
the
applicant.
a
passport been
can
citizenship;
official.
the
1972
Office
1971
7see
by
of
in
from
must
has
domestic
year
in
upon
of
of
of
completed
program,
fraud
arrest)
number
L972.
activities,
this
detect
upon
The
Passport of
a passport proof
authorized the
Office
in the United
ability
methods
all
Passport
to
evidence
by a government-issued
in person
detected
288
gram.
other
up
almust
this
from
travel,
purposes
attests
by affidavit
days,
illegal
specific
accepted
either or
international
such
a passport
Applications
waiting
may
the
license)
personally.
for or
therefore,
required
usually
established
driver's
applicant
essential purposes
definition,
its
citizenship
be
are
legitimate
of
certificate
identity
are
of
incorporate
altered.
» which
for
288
abuse
PASSPORT
used
its
of
licenses
alteration;
easily
be
to
forms
from
19/5"
down
illegal
to
53%
by all 174
in
1971;
Detecting
those
alien
criminal
entry,
that
U.S.
VISA
AND
ALIEN
A visa mission
visa
is
to
an
apply
an
alien
citizen
skills
has
supply
sometimes to
who
visa
U.S.
immigrant
on
has
or
journalists,
foreign
however,
validity
alien's
continuing
fraudulent U.S.,
financial
visa
visa.
illegal
alien's
same
pay
a
an
and
these
with
that
visas
to
is
granted
family
or
eventually
issued a U.S.
skill
ties
obtain
U.S.
by
he
for
of
this
work.
or
temporary
each
nor
job
fraudulent
his
his
that
overstays
by any
abandon)
are,
trainees
for
or
depends
is unable
reasons
(3)
on
the
to obtain
visa
by using
for visiting
He
also
already
can
the
buy
contains
his
visa
are
issued
(1)
nonimmigrant
a nonimmigrant
employment.
stay
to
who
of visa
who
or
Some
aliens
officials,
get
limited
intend
trip.
type
passport he
not
to
An alien to
or
a student;
does
the
government
altered
the
job
neither
(2)
to misrepresent
in
of
employment
attempts
status
or
Once
U.S.
generally
and
a
a
becomes
an
alien.
Both
officers
the often
documents
his
counterfeit valid
visa
or
marriages
(that
to
artists;
immigrant
the
is
relationship
pleasure;
abroad
example,
an
in
visa
have
permits
specific
the
work
number who
in sham
funds
permit
and
per-
visas.
residence
sufficient
categories
immigrant
family
The
visa
business
a
granting
A U.S.
a profession
Aliens
nonimmigrant
has
or
participate
get
by a visitor who
the
nation
nation.
immigrant
a close
UGS
by a host
host
settle
alien,
in
the
An
either
limited
A U.S.
and
to
who
documents
alien
bearer
resident
issued
enter
citizenship.
or
is
to
for
in short year
the
CARD
a document
alien
permits
to
ID
immigrant
abroad; visa
Form
I=151
gal
resident
an
at
the
and
port
a photo alien.
evidence
of his
entering
the
When
right
U.S.
nonimmigrant
immigration of ID
entry. card
Each
which
traveling
to re-enter
might
use
visas
officer
the
serves
U.S. or
each
immigrant
outside
a stolen
22
examines
to the
by consular
entering
is
then
identify U.S.
An alien
counterfeited
he
given
him uses
set
on
I-151,
as
a a le-
this
as
illegally while
an
illegal
his
alien
identity
already
as
a
Immigration permit the
I-151,
SOCIAL
these
to
photo
gain
SECURITY
be
used
for
and
in obtaining
use.
Social
Prior upon out
to
before tion
for
an
forged
the
the
The
against
intended
suppliers
The
to
establish
cards
to
to
a visa.
Like
counterfeiting
and
U.S.
commercial to
do not
in the name
form,
of
the
several
the
the
are
in its
4.2
individual
by mail,
identity,
recent
Security
acceptable
documents i.e.,
that
with-
age,
and
testimony Administra-
in applying
are
easily
baptismal
certificate,
card.
present
form has
no
safeguards
"cards"
are
also
Ostensibly
the
reproductions
cardholder
authenticity
23
or
In
Social
that
pretenses,
Unofficial
of
required.
registration
card
a driver's
imposter
over
of any
in person
Evidence
is now
false
the
SSN.
identity.
official
card
records
as
that
suppliers.
remind
and
estimates
included
check
racords
Administration
of documents
Security
tax
Although
against
applicant
under
for
Security
employment
protected
issued
list
Social
Administration
nor
were
an
the
used
application of
Security
documents.
unique
SSNs an
counterfeiting.
only
I-151
without
in maintaining
one
and voter
Social
from
the
Social
than
kinds
obtained
card,
neither
evidence
of
SSN. or
library
mail
of
by the
more
Congress,
listed
an
crossing
area
subject
into
is widely
is
1974,
other
citizenship
are
entry
identification
Security
have
submission any
other
it
people
cards
border
border
document
number
number,
The
issue
identification,
important
Security
million
use
alien.
U.S.
intended
personal
become
Social
ID
might
CARD
has
license
U.S.
also the
illegal
never
an
the
resident
to visit
Although to
legal
officers
Mexicans
alteration
in
of his
SSN;
of SSNs
available
however,
provided
by are
the
by their
customers,
so
the
unofficial
cards
can
be used
to
support
a false
identity.
SELECTIVE
It
SERVICE
is estimated
issued
before
issued
only
tion
or
cards
the
as
prove
designed.
The
application tains
no
draft is
and
limited
from
dence
of
not
and
usually
used
and
that under to
can
be demanded
any
other
the
of his
used
for
rarely,
as
which
unsecure:
background it
cards
were
they
were
Although
been
uses
is notoriously
its
1975.
they have
for
uses
classificaidentification
they
it
were
is merely
information
is
easily
if ever,
not
at
forged;
cause
it
a
the it
to
con-
be
J
cards
the
are
by their
as
cards
as
example,
support
into
issued
holders
For
Mexico.
their
part
by local The
entitling
U.S.
are
for
registration
very
easy
and
ability data
24
is
not
of
the
for
as
passport,
re-
eviand
application.
under
by FACFI false
staff
pre-
jurisdictions,
the the
is a verbal local
typically
citizen-
accepted
license
of
and
frequently
procedures
is required,
officials
age
of
residence
in many
identity
Boards
are
a U.S.
to obtain
is permitted
of
cards
of
they
applying
appearance
residence,
evidence
of a driver's
voter are
by local
these
claim
However, when
by mail
of perjury. of
as
and
a personal
citizenship,
penalty
check
these
where
number,
unverified;
accepted
investigation that
even
individual
citizenship
Registration
age,
in
the
largely
to
tenses.
of
out
draft
CARD
suggests
and
million
sent
purposes.
Canada
age
thirty
issuer.
by persons
entry
Limited
are
was
as
informing
well
registration
ship
presented
of
card
is
REGISTRATION
for
one
unserialized;
by the
Election
are
as
photograph;
Voter
as many
Service
stage
scrutinized
VOTER
last
age
postcard;
CARD
that
a means
Selective
to
typed
DRAFT
very
only
evidence
registrant
declaration Board
of
limited.
given
Election
Since tion
of
the
the
voter
registration
legitimate
imposters.
Voter
attempting
illegal
aliens
for
this
CREDIT
CARDS
Although
bearer,
registration
entry
a credit
card
information
which,
firm
validity
the
of
authentication
is
is
charge
required
outlets the
to
unless
the
Charge
and
Bank
Credit requests
credit
cards
arises
Cards
in a false
theft
of
can
can
be
cards
be
not
then
at
the
of
an
or
no
other
the
as
or
about
form
that
identity;
the
a
card.
application
or by
cardholders.
One
reported:
of
it for
i.e., Although the
card
Master
Credit card thieves sometimes use the cards they steal but more often they peddle them in underworld circles. When the black market was at its height in New York, a thief would sell a card to dealer for $25; the dealer in turn would dispose
be
ID
retail
cash.
issuing
from
con-
of
application
by false
mail
may
of
such
obtain
before
illegal
and
variety
validity cards
to
to
cardholder
Normally
information
made
by aliens
sold
printed
a wide
the
by
$350.
means
used
obtained
from
used
been
to
card.
to
ease
by a merchant,
by mailing
but
is
up
Bank
even
obtained
check
name
legitimate
as
cardholder.
descrip-
relative
have
primary the
physical
certain
checked
services
no
with
commonly
and
ranging
on
or
information,
reference
used
are
U.S.
the
signature
the
are
when
goods
Americard
credit
and
article
of
contains be
contains
card,
a question
authenticity
the
at prices
embossed the
can
cards
into
purpose
card
it
most
identities
account obtained
use
is an
of
1,000
form
equally
a credit credit
as
$150
if the
card were
'clean'
--
a signature.
by an
common
told
as much
without
a
imposter of
abuse,
serious
card
cards
of
abuse.
fraud
using
25
a stolen
obtaining
One
committed
300
credit credit
card
appears
cards
in many
recent
newspaper
by one
different
to
false
person
who
identities.
had
NON-GOVERNMENT
When
IDs
a person
applies
purposes,
for
other
tion
to
reinforce
other
include
baptismal
certificates,
business cates lish
cards
are
uses
student
ID cards,
of all
lieu
of birth Such
obtained
or
constructed
fraudulently.
are
made
order
to
This
printers,
sometimes
be obtained
used
and and
unofficial
in the
Commercial
membership many ID
unofficial
cards
employee
can
be
can
ID was
usually
badges,
easily
in every
26
large
courtesy
or IDs
to be
from
cards,
estabare
stationery can
be
city.
the
type
most
the mails.
be obtained
counterfeited.
to
baptismal
photo
found
stolen
certifi-
however,
religious-goods
of checks
badges,
Baptismal
Blank
at
cashing
documents
certificates
available
studios
identifica-
documents,
by mail.
by photographic
non-government,
frequently Business
can
identity
employee
types.
child.
or
in
establishing
Privately-issued
a dependent
certificates
accepted
is
privately-issued
documentation.
cards
or
of
stores,
of
sometimes
and membership
sometimes
benefits
e.g.,
age,
easily
he
for
from
and
job
other
types
SECTION
4
FRAUDULENT
Crimes
assisted
a significant
blem
affects
ment
benefits
that
is
every
from
Possession someone
intent
appear
almost
to profile As
in
the
false
to
of
at
case
they
typical
the
yielded
false
typical
check
also
of
types
a large
only
is
who
not
does
business. holders, by
One
involved
travel
Since the
further
false
IDs
means
pro-
of
govern-
business
health
and
a request using
as
is
in
occurs
well.
to
group
exists
of
type
distinguishing
or only
review
Zt
fraud;
woman
the
male,
of
typical
which
users.
of
Here
18
to
false
the
40 years
of
typical
age,
government-related
40%
of
the
passport
of passport
characteristic
identification
a profile
a description
fraud.
decreasing in
of
the
"invisibility"
on
surveys
identification
check
traveler,
fits
from
Similarly,
the
in passport
a family
FACFI
unemployed fact
has
suspects
or
dis-
unsuccessful.
for
false
legitimate
found
and
perpetrators
of
we have
in
largely
unmarried,
which
mother
a criminal,
appear
Attempts
were
Thus,
area,
gives
percentage
user
cost
against
to
successful
fraud
description
for
represent
this
indistinguishable
international
possibility
IDs
public
a middle-aged
with
this
screening
in
an
to
as
suspects
usually
the
described
exception
identification
offender
degree
welfare
describes
threat
trace.
a young,
a metropolitan
of
fraud
documents
fraud,
represent.
be
of
quite
of welfare
of
a
of
are
to
can
terms
the
false
suspect
legitimate
in
the
false
indirectly,
cost
a crime,
of
fraud
several
or
fugitives.
without
user
many
or
identification
and
forger
The
the and
and
typical
description
of
household
committing will
one
Directly
consumers,
pretend
the
resident
of
imposters,
identification
groups
use
smugglers
on
the
of
a
to
on
drug
the
problem.
American
paid
passed
safety
by
national
ID USE
passport fraud
emerged
are
to
some
applications.
more
of
those
likely
to
be
For
repeat
example,
offenders 76%
1971
had
this
compares
of
those
previously
The
than
of the
A random
was
being
sought
fugitive
was
known
to
the
fugitives
more
aliases,
than
30 different
from
justice,
the
checks,
Security
the
scope
welfare
of
The
of almost
6,000
25%
use
of
supported
state
that
more
checks
ID other
ID,
than
the
in
fraud
involving
provide
firm
stolen
from
of
losses
Social
in
figures
the
state
are
during
to
mails
and
the
1974
and
local
order
of
over
the
check
itself
of
a stolen
cashing
most
commonly
inspectors
checks.
determined
When
$22
A sampling
by postal
cash
forged
of
received
cashed.
definitely
frequency
FY
value
undertaken
the
one
face
subsequently
was
forgery).
followed
assists
used
by a stolen
was
to
involve
(which becheck the
welfare
was
com-
ID
and
license.
section of
used
fugitives
cannot
a total
and
ID used
driver's
nationally
with
were
ID,
or
and
and
Service
false
by another
these
five
have
welfare
such
cases
upon
the
annually.
of
photo
This
dollars
type
ID
to
a
75 of
immigration
experience
sampled
a false
is known
crime.
case
under
and
checks
the
the
a false
mercial
we
the
of
every
In
in
once;
is un-
in which
alias.
materially
benefit
the mails these
least
overall
in
identified
illegal
Although
checks
of
for
cases that
one
been
subject
IDs
by forgery,
from
least
at
IDs by criminals
500
securities,
suggests
140,864
determine
the
false
Inspection
stolen
comes
of
U.S. of
at
apprehended.
counterfeiting
crime
68%
showed
smuggling,
cards,
Postal
FBI
the
of
reports
to
case
of millions
million
of
used
government
cashed
false
and
same
only
criminals
identities.
checks.
departments
hundreds
About
use
of
previously
drug
credit
benefit
subsequently
have had
false
aiding
of
the
for
forgery the
rate
use
by
in one
Besides
stolen
on
and
for for
sampling
fugitive
cases,
average
arrested
a recidivism
universality
questionable.
the
arrested
been
with
is
presents
false
IDs.
data These
on
the
significant
findings
28
are
fraudulent
probably
uses
conservative
because
our
studies
tion
that
have
much
more
difficult
access
to
of
problem
the
below,
false
and
are
been
based
only
detected.
The
to
commit
if
identification in
lists
the
six
the
on
Summary National
Problem Drug
Arca
of
and
Impact
Extent of False 8O';
be
such
easy
2 summarizes
for
Identification
> $1 billion/yr.
identifica-
would
in more
this
of Problem
ID Use
of hard drugs
Sources
smugeled
Illegal Immigration
> $12 billion/yr. *
Unknown, used in entry, employment, welfare application
Fugitives
> 300,000
~ 100',
From
Justice
=
=a
Fraud
Against Government
Other > *
Customs
Service,
of Data Drug
Criminal
Activity
of Federal
| Unknown
Office
bnmigration & Naturalization Service, independent studies
cases
FBI,
a
Unknown
sheriffs
and police survey
-
> $1 billion/yr.
American Bankers Assoc., independent studies
Unknown
Surveys
Very common
FBI,
of Welfare officials, published studics
sheriffs and police survey
SMUGGLING
False smuggling U.S.
and
rings
Drug
drugs such
studied 1973, hashish
identification that
addicts.
the
hard One
t
Enforcement
Passport
More than Estimated U.S. tax burden Includes out-of-pocket losses and cost of collection attempts
DRUG
to
fugitives/yr.
ye
$3 billion/yr.
extent
estimate.
Administration,
Fraud Against Business
the
detail
2
Scope
Scope of Problem
Smuggling
false
have
discussed
information
False
not
Table
areas,
Table
of
illustrate
did
documents.
of
cases
we
criminals
problem
sources
those
crimes
are
is the
imported whose
in
the
indispensable the
bulk
compiled
of
to
by rings
smuggling
alone
is
U.S.
The
the
the
by the
Administration
Brotherhood
group
into
carry
Statistics
Enforcement
group
this
is
hard U.S.
show
making
extensive
activities
have
of Eternal estimated principal
PAE)
love. to
have
means
well-organized drugs
supplied
Customs that use
been
of
by which
of
all
false
IDs.
carefully
Between smuggled
Service
80%
24 this
1968 tons
and of
group
avoided
detection false
was
by securing
The
activities of
of October
1973,
to members
of
with
25
FY
drugs
four
Service 1973,
$100
U.S.
passports,
under
is more
of
seizures
not
as
conclude
illegal
as
The
to
be
separate
on
small
each
such
drugs,
the
through
occasion
bonds
before
time of
these
groups
was
estimates
not
by the
1967
of
at
members
an
cost the
years
value"
that
the
drugs
rings
his
using
From value
the
estimated
drugs
smuggled
false
IDs.
of
$1 billion
does
of
goods
of programs
criminal
to
justice
its
made
not
treat
increase each
the
addicts,
year through
indirect
by addicts
the
by
Assuming
available
include
stolen
of
$1 billion
of
a minimum
estimate
as
using
narcotics
IDs
rings,
fact,
value
1973. false
seizure).
in
of
U.S.
through
(though,
purchases
Such
ILLEGAL
four
identities;
fiscal
constant
to
the
accomplished
obtained
considered
on
the As
attributed
were
well-organized
include
identification.
movement
group.
were
relatively
or by individuals
costs
their
was
dangerous
by these
false
purchase
of
for
captured
does
we
society,
false
("street
by
smuggling
in
who
indicate
been
frauds
arrested
forfeiting
smuggled
which
lost
had
these
Indictments
was
involving
million
likely),
Love
smuggling
frauds
of
individual
obtained
individuals
being
and
were
successfully
of
The
operation
Eternal
discovered.
obtained
level
of
passport
fifty-one
different
seizures
in FY 1973,
to
or
system.
IMMIGRATION
most
presently
are
as
a solitary
certificates.
by posting
records
for
separate
LSD
Accurate
unknown
is
the
Brotherhood use
group;
was
totalled
ID
birth
under
statements
the
130
this
identity
Customs In
of
escaped
true
the
individuals.
leader
occasions
of
false
counterfeit
against
he
such
names.
extensiveness
the
documents,
adults.
recent
living
The
in
U.S.
estimate the
U.S.
of is
about
Immigration
30
and
the
number
8 million,
of
illegal
6 million
Naturalization
aliens of whom
Service
believes
that
the
more
than
adult
number
illegal
$2,000
per
alien
services
and paid
estimated
tax
at
The
the
use be
U.S.
$12
extent
of
from sent
tax
presence
for
1976.
this
and
(border-crossing
countered
by INS
at
purchased
a total
seized
aliens.
seizures
of
price
such
of
of
1976,
on
the
least
with
fraudulent
border
the Southwest
times
alien
border account
by the
citizenship
use
the
by INS.
the
of
for
falsely
least
fraudulent
31
but
esti-
to
believed INS
were
en-
documents
smuggling
had rings
documents
those
in
use
the
that
total
thus
fact
black
Entrants
being This
by
large
market
least
study
documents
indicated
entered
U.S.
that
through
the
is
during in
of aliens South-
routinely
citizenship
along
admission.
Together,
of a million or
which
by INS
number
10 times
in gaining
a quarter
Study,
undertaken
detected
claiming
successful at
is
by occasional
successfully
at
The
attributed
illicit of
does
steadily.
routinely
documents
were
fraction
the
Study
of
job
of payments
cards)
these
public
burden
illicit
and
as
supported
Fraudulent
Alien
Additionally,
of aliens
to
and
be
unknown
1975;
number
been
declining
completed
14
entries U.S.
forms
is
can
15,000
vendors
a small
has
subject,
ports.
number
groups
only
Illegal
recently
at
be
aliens
is
each
the
tax
or balance
burden
of
for
supported
to
of
fiscal
The
not
The
registration
document
million.
belief
documents
west
detected
to
This
the Major
was
1975
these
$1.7
alien
are
illegal
rate
to be
aliens.
Over
during from
counterfeit
A study
FY
of
is believed
illegal
part
personnel
in Mexico
cost
and
such
aliens.
aliens
increasing.
costs
by illegal
staggering
by illegal
the U.S.
related
by aliens
U.S.
the
documents
substantial
the
from
documents
been
of
they
costs
by illegal
at the
study
extent
billion
to which
false
the
on
direct
indirect
evasion
out
increasing burden
in a recent
and
citizens
is tax
considers to
aliens
burden
over
net
estimate
benefits
the
funds
aliens
The
is estimated
losses
from
mated
to
of
include
losses
by
illegal
year.
This
welfare
displacement
not
such per
year.
by
taxes
of
250,000
false
verbal
illegal claims
It
is
reasonable
citizenship
are
welfare
benefits
heavily
to
false of
the
recent
in
restricting
applying
FROM
Escaped obtain
and
to
false
They
not
aliens
entitled,
is
which
of age, number,
benefits
legal
use
increasing
and
fication.
Figure IDI
included
and
have
new
of
because
and
state
illegal
been
as
Liberation
Army,
activities, to
time
that
citizenlegisla-
aliens.
previously
in
public's
ID
who
strip
for
and
have
common
capture. Weather
gone
use
of
violent
crimes
false
including is
always
Army,
extensive
effective
use,
mentioned,
comic
detection
arrest of
almost
Liberation
.make
escape
because
false
method the
avoid
Black
able
of
to
fugitives
the
their
4 shows
dangerous
documents such
Symbionese
on
other
the
identi-
specific
enough
knowledge
lexicon.
ROPER & MIKE NOMAD
Saunders & Overgard { TO ME 2-- NONE, LANK/---BUT, TO A CERTAIN GIRL WHO WANTS TO CHANGE HER IDENTITY, IT'S WORTH 4200/
(fue DECEASED Ast}
hs
ACCIDENT BIA
Ged
VICTIM / Mi \
RS
L
STEVE
i}
ROPER
RANGEL? WHAT GOOD I5 A STRANGER'S BIRTH CERTIFICATE ¢
by Allen Saunders and William Overgard,
Figure
or
and
contributes The
identity,
to
status
employment
cited.
probably
evidence Security
to
obtaining
previously
of welfare
periods
use
STEVE
Social
groups
carry
considerable
be
a
claims
in
JUSTICE
underground
the
are
burden
for
identification
Underground,
of
for
payment
of militant
IDs.
they tax
false
aliens
by illegal
prisoners
false
Members
to
which
requirements
tion
for
to
that
illegal
estimated
ship
FUGITIVES
assume
by
documentation
the
to
used
4,
Dangerous
Courtesy of Field Newspaper
Fugitives:
32
Customers
for
Syndicate.
False
IDs
-
The
1973
number
and
1975
records
an
each
Center
are
(NCIC),
1974
or
crimes
The
dollar
but
not
in
all
of
fugitives
pose
cannot
and
to
estimate
undetected
police
on
in
society
AGAINST
BUSINESS
Check
Forgery
and
In
cashing
accounts of
loss
false
to
of
usual
fugitive
of
warrants
Investigation
on
Federal
in
offenses
identification
in
more by
the
in
the
have
the
found
use
of
number
that
of public notorious
in
the
their
false
false
IDs
threat
to
success
by
such
is
While
we
fugitives,
to move public
or
con-
danger
IDs.
criminals
serious
by criminal
offenders
of
and
of
of
loss
success
status
dangerous a
IDs.
banks,
or
working
artist.
See
possession obtained accounts,
false
checks
equipment
5.
30 different
15 driver's 4 credit
of
have
the
birth
licenses, and
from
as
we
freely
safety
and
arrested
certificates 17 Social
to
IDs
33
and
the
or
Security IDs.
of
criminal
financial
burglary
part
check
forger
with which
drawn
com-
successful
are
check
or
common
cause
that
forger
10 miscellaneous
mails
the most
robbery
measure
false
departments
the
a major
from
experienced
A recently
cards,
become
loss
of
sheriff's
cited
in great sets
and
stolen
was
the
is due
complete
Figure
either
names,
exceeding
loss
more
of police
checks,
Bad
far
This one
survey of
bearing
bined. use
is
Information
Fraud
a nationwide
fraudulent
use
under
false
covert
the of
"criminal Crime
morale.
FRAUD
on
of
wanted"
Bureau
availability
ability
160,000
indicted
of
felt
We
the
Between
travel.
caused
their
cost
the
use
is
society.
the
that
sought
be measured
impact
in maintaining
emphasize
the
is considerable.
National
Federal
fugitives
enforcement
dependent
the
interstate
fugitives
critically
The
however, Its
law
into
persons
37,891
impact
cannot,
justice
of approximately entered
involving
losses.
fidence
from
the NCIC.
located
major
fugitives
were
into
fiscal
fugitives
average
year
entered
for
of
of
fraud
had
he had
cards,
the
in his
already
11 checking
34
Robbery" "Bank a Be Scene
Aided
CashingCheck
"Disguise" ID False A By Really Could Common A 5. Figure
In
1973,
States;
clear
of
about
these,
and were
amounted which
to
counterfeit
cost
of
must to
if
The
typical
for
food
of
single
average
food
per week,
check
uncollectible losses
the
According
tion,
losses rate
bad
of
85%
check
these
of
of Food
sales
cases.
and
total
reported
the
Super
therefore, volume
appear
to
We do not
a
of
in the hands
involve
while
1974.
and
been
per year
counterfeiting),
returned
of its
Chains
sales;
$12,500
losses
in
to cash payroll have
and that
million
to 90%
in-
not.
estimates
$450
losses
estimated
and
number
Commerce
for
or
to
40%
count
false
are
as
checks
on which
collection
Small
Business
Administra-
made.
to
a study
checks
35
conducted
accounted
for
in 1967-1968.
(in percentage
and
60%
(forgery
larger
to business
in general
an
"not-sufficient-funds"
much
ultimately
with
is increas-
expected
food
that
approximately
stores
retail
about
estimate
at
of total
$240 per week
About
fraud
0.04%
be
The
does
of
Association
from
counterfeiting
as a "bank" Bad
we
written
exceeded
checks
acts
about
store,
puts
thieves.
identification
Department
customers.
at
hard
transactions
the National
Institute
$60,000
for
and
identi-
checks
averages
totalled
may
of
million.
Thus,
losses
false
losses
which
checks
items"
of all bad
$750
of checks
these
receives
over
total.
forgery
often
amount
checks,
to
25 million
representing
forged
the number
U.S.
store
by members Market
this
and
of
food
to
United
failed
"return
1973,
out-of-pocket
these
particularly
and in addition checks
is
rate
The
losses
government
to
to year,
hits
businesses.
check
added
Since
the
fraud
bad
sales
be
on
in the
of 150)
These in
dollar
amounts
counterfeit
out
forged,
total
collect
from year
even
$30,
checks
to
or
average
around
in 1973.
Check
the
forged
due
rapidly
crease,
of
counterfeit
to be
check,
$1 billion
small
returned
Since
or
losses
ing
depositor.
checks
attempting
$10 per the
to the
to be
written
(one
million
fraud.
is estimated
0.65%
returned
169
proved
fication
25 bitiion checks were
approximately
of
times
profits)
that
by the
about
The over
reported
35
13%
small 3 times
for
of
all
business the
large
crime-related
suffers
average
of
businesses.
a loss business
Banks
however,
take
the
in other
of
stolen
significantly
the
losses direct
than
the
the
result
revealed
loss
is
suffered
conducted
presenting
checks
hit
by the
savings
accounts;
average
an
mitted
with
often
Division
"has
of
false
Credit
Card
phony
card
identification
$643.
IDs
licenses,
driver's
used
$216,
new
the The
form
the
banks
while
banks
the
were
much
were
$3,734,521
crimes
were
com-
of identification and
believes
and
the
activities
to
and/or
Insurance
are
defraud
in-
checking
of these
of bankers
licenses
to
IDs
Association
belief
bank loss
as
incidents.
from
average was
rather
losses
resulting
in this-activity
transactions.
Bankers
indirect
However,
Most
though
check
investigating
in opening
lost
driver's
the
two
can
fraud
imposter,
a card
by a person the
issuer
using
with of
Charge)
occur
use
the
have
largest
and Master
either on
false
$6,586.
transactions
of
to business
by an
of
of was
is
estimates
the
for various
The
banks
Even
of
suffer
to banks
crime. use
Association
of
than
contributing
acceptor
cost
checks;
higher
Protection
this
survey
law enforcement
most
prevalent
means
banks."
Fraud
(Bank Americard
card
the
bonds
the long-held
billings
Losses
per
funds
in bank
first
bad
affecting
$50 million.
losses
false
the American
that
as
the
crime
identification
Credit
gross
total
falsified
verified
officials
of
of
fraud
Bankers
at
of all
checks
identification
savings
use
of
depositors
1974
through
per
used
by the
such
false
cashing
American
their
of
form
7%
considerably
counterfeit
in 1974
losses
cashed
for
with
most
and
checks,
5% to
average
principal
The
banks
about
to
with
forgeries
significant
average harder
The
to
of bad
only
tend
checks,
also.
bank,
dividuals
on
losses
due
A survey
from
loss
businesses.
forgery
bank
the
dollar
as
continued
bank
reached
a result
such
cards:
card
or
circumstances.
36
intent.
grow
card
$17.6
of
in volume;
types
or
These
losses
in 1974. of
of a lost
card,
the merchant
the
associations
billion
three
misuse
of a counterfeit criminal
to
credit
or
false
stolen
application
accepting
may it,
for
affect depending
bank
A 1974
U.S.
credit
cards
year.
from
Sources
have in
Department
been
the
of
limited,
States
of
the
area
at
publication
the
on
has
Fraud
Association's
devoted
tions
exclusively
in
G.
the
Pat
numerous with
unit
ties
Bland,
other
be
the
Application
only
identifying
card
fraud
losses
information
Section
of
the
in January
investigative
and
combatting
one
1975,
of
its
fraudulent
kind
applica-
industry.
Agent
well-organized to
card
helpful
on
per
Association.
may
to
credit
losses
$500 million
credit
receive
Formed the
placed
approximately
estimates
Committee
from
Bankcard
Commerce
sources
specific
but
application
Western
all
in Charge groups
they
of
the
found
Section,
describes
operating
in
the
California
states
These organizations are involved in the establishment of phoney credit files, loan fraud of all types and phoney businesses, some of which go so far as to file articles of incorporation to further their devious ends. Most of the better organized groups utilize fraudulent identification to insure success in their ventures. One such business averaged in excess of $5,000 per month in deposits on Master Charge Cards that were all obtained in fraud applications.
Individual
included
and
months
tion
one
another with
seem
cases
suspect,
who
investigated
wanted
victimized
only two
cards.
to be only
a part
for
by
murder,
a California The
the
Fraud
Application
who
had
used
bank
for
$26,000
examples
uncovered
of a much larger
37
identities,
in
by the
incidence
four Associa-
level.
continues:
Our statistics show an increase in caseload during this first year of 673% over 1974. Initially, our average loss per case was approximately $2,800. After our first year of operation, we had reduced this average loss to $405 per identified fraud application.
37
Section
Bland
He
total
participation
The
experience
verifies
yet
to
where
the
especially
in areas
in
no
feels
reliable
that
California
in every
major
fraud
fraud
much
crime.
to
"there
alone,
has
are
and
accumulated
vast
amounts
such
been
their
as
group that
card
until
thousands the
this
fraud
credit
opinion,
area
by
of
forthcoming
literally
in
metropolitan
identification
securities losses,
data
the
fraud, now.
of fraud same
have
The
appli-
situation
in the nation."
Fraud
potential
used
being
be uncovered,
False
of
information of
Securities
or
industry.
estimation
Association
exists
and
credit
FACFI's
virtually
cants
by the
have
they
when
obtained
are
results
measureable
most
the
that
notes
do not
in
makes
the
distinguish
between therefore
necessary
securities
losses
by widely
differing
only
between
is
describe
false
up
securities
less
It
introduced
fraud
losses
a portion
many
potential
and
identification to
fraud
define
in order
loss
of
industry;
to
estimates
the
on
actual
and
other
carefully
terms
eliminate
actual
reports
types
confusion
contained
in various
the
of
reports.
The
FACFI
stolen
or
use
false
of
that
IDs.
certificates
cash or checks.
is
certificates
name
the
bearer
do not
of
is
assumed
require
identification
criminal.
of
and
would
record, are
are
of
interest
are
owner,
of
not
an
are
are
not
the
to
are
legal
ID
for
similar
38
are
the
elements
"bearer
as
documents,"
and
imprinted
with
by anyone
and
for
Bearer
their
upon
negotiable to
through
negotiable owner.
bear
lost,
of value,
criminal
negotiation;
be necessary
legally
negotiated
registered
they
value
ownership
securities
certificates
therefore
that
with
represent
If the
to be
use
Registered
owner
record,
the
they
which
a specific
concermed
securities
Because
as
the
the
specifically
counterfeited
securities
much
is
checks,
in
false
negotiation
their only
certificates
therefore,
face
by the that
the
by a
name
owner
some
of
measure
of
of
fraud
is necessary
rightful
owner.
certificate owner
of
This
or
use
of
lost
or
An "actual
of loss" stolen;
loss"
to
bearer
cash.
certificates
certificates.
may ID
accomplished
use
of
the
concerned
an
which
through
are
lost still
mentioned
1973,
or
as
the
are
of
consent
of the
alteration
to
of
the
impersonate
the
arises
securities
below
before
the
Committee
on
statement
by Mr.
judgment
Government,
be as high from
as an
the
state,
estimated
W.
loss,
actual
the
loss,
or
sale
through a loan.
and
light
of
corporate
figure was number
the
on
missing
false
Senate
and
securities
based
Investi-
aes Ou
on
of handlers
of
the concern.
U.S.
ee
extrapolation,
applicability
subsequently
of this
of
lost,
are
from
Subcommittee
that
or
from
collected
duPont
the
We
resulting
in the
total
validate
industry
Negotiation
data
and
conwhen
registered
financial
Operations,
This
to
replace
secure
value
are
a loss
cash
Permanent
municipal
incurs
counterfeited
Henry
securities.
securities
negotiated.
loss
ID;
dollar
1% of
established
or
the
$50 billion".
was
to
Government
that
can
when
those
by the
to
of actual
evaluated
the
considered
he
suffered
fales
of
securities
fraudulently
of
were
testimony
of
stolen,
use
value
or stolen
collateral
lost,
the
the
conversion
cases
included
of
form
industry
stolen,
be
are
gations,
risk
without
attempt
lost
owner
may
certificates
securities
tion
the
an
equals
by direct
only with
negotiated
No basis
take in
financial
risk
certificates
be
stolen
ownership
only when
Although
Loss
if registered
to the
the
may
In
fraud false
occurs
verted
sources
transfer
record.
A "risk are
to
could
informaof securities.
to
define
ID to
the
this
figure.
The U.S. of
Marshals'
287 banking
period
1971-1973,
representing in that
was
loss
equated
of
on
stated
11 incidents
a dollar
report
Service,
institutions,
the basis that
of stolen $5,136,554
only
to
39
risk
of a 1974-1975
during or
securities
reported.
loss
as
survey
three-year
fraudulent
were of
the
defined
Loss above.
Neither
actual
loss
nor
false
ID
involvement
were
addressed
specif-
ically.
In a report
entitled
Member
the
low
of
from
"Magnitude
Firms
reported
million
reporting
Corporation
million actual
ranged
loss
the
extent of
as
Since to
the
best
cover
the
of
to
of
$14.7
million
to
from
in
a
1970.
Data
Clearing
1972
to
$104
specifically may
address
have
been
FACFI.
(NASD),
the period
area
of
false
an
almost
Inc.,
90%
vis-a-vis
that
Replies
response,
reported
counterfeit
securities
previously
The value
con-
1972-1974
identification.
securities
of misappropriation".
securities
ranged
Dealers
convering
of
stolen
identification
value
"...incurred
in
Exchange
in N.Y.S.E.
or
Stock
do not
representing
loss
Stock
million
N.Y.S.E.
false
the marketplace
forms
Securities
of Securities
specific
York
Corporation
the
direct
New
of lost
figures
to which
Association
cases
some
reported
of
of its membership
a return
through
a high
these
little
respondents,
44 distinct and/or
to
$24.1
are
to
Clearing
from a low
or
2,734
Stolen
to
they
a survey
attempted from
in 1973
Since
The National ducted
Stock
by The
value
organizations
in 1973.
involved,
and
the market
the N.Y.S.E.
$4.6
conducted
of Lost
1969-1972,"
to
all
of a survey
obtained
of this
loss
was
$563,412.
the
FACFI,
NASD the
indication
survey
specifically
information
of
the
scope
reported of
the
addressed therein
false
the
area
appears
ID problem
to in
of be
concerm the
securities
fraud.
Embezzlement
Embezzlement may
is
be perpetrated.
their
true
name,
the
employees
hired
1974,
Washington,
the
under
another While
area
the majority
potential false D.C.
in which of
fraud
embezzlers
of infiltration
identities Metropolitan
40
against
should Police
operate
of business not
business under
firms
be overlooked.
Department
by In
investigated
twenty-two
be
cases
complaints
average
for
loss
Banks losses
borrower. falls
However,
through
of
grantors
type
false
made
to
are
incident
also
involves
a confederate
cannot
in
1974.
was
about
subjected loans
found
to
with
The
as
be located
$3,000.
large
false
a dishonest
posing
to
of all
Department
making
fraud
was
15%
identibank
a legitimate
when
the
loan
the
names
of
the
data
banks
in
these
loan
to match
their
bogus
scheme with
$188
The
from
losses
lost
false
in
false can
effectiveness
fiscal
of
false
often
businesses
or
prosecutors
to
AGAINST
We have grams
are
take
tities,
and
year
persons
credit-reporting
acquire
ratings.
in
loans
complete
A single on
have
been
bank
nonexistent
1975. may
written
off
sustain
it
difficult
a fraud
for a
losses
Total
identification
makes
blamed
embezzlement
swindles
unwittingly
perpetrator
of
schemes
credit
schemes
fraud
the
fictitious
identification.
ID credit
be
fraud
$200,000
borrower" million
of
FRAUD
by a criminal's
in
institutions
such
accomplished
of
such
the
is
ratings
"nonexistent of
grantors
debts. traces
IDs
fraud
manipulation
borrowers
financial
because
loan
credit
by one
part
eredit
of
internal
These
may
of
for
"borrower"
Participants
victimized
major
type
excellent
the
services.
by
this
the
the
reported
by persons
loans
suspect
due.
creating
cars
credit
processes
Another
sets
other
by
each
the
represented
cases
handled
from
embezzlement
Typically, who
in which
These
embezzlement
and
fication.
embezzlement
ID.
to business
through
officer
of
a false
using
never as
reported
losses
to
be known simple
bad
in removing for
all
victimized
complaint.
GOVERNMENT
found
very
that
most
vulnerable
various claiming
forms
--
to
state
and
false
identification
applying
nonexistent
for benefits
dependents,
41
national
or
in
social
under the
welfare
fraud.
Such
several
case
of
profraud iden-
Social
all
Security
programs,
claimants
to be
for benefits;
in
a dependent
fact,
some
of
a covered
states
do not
wage
of
identity
the
verifying
for
exist
standards
uniform
No
earner.
claiming
require
any
identification.
In
a recent
of using money
four
and
Romero,
and
stamps
Director to
than
of welfare
different
food
difficult often
case
of
know
the
happening
personnel.
or
Social
in which
studies
stolen"
both
that were
cities
is
able
of
large to
$50,000
was
Social
accused
in welfare
According
a scale
detect
admits,
to
Orlando
Services,
it
is happening
with
present
"I'm scared
is
committed
City
by imposters,
checks
and
or
stolen
with
the
is
more
procedures
to death
cashed
this
kind
of
this
have
shown
with
stamps,
is
aid of a false mentioned
checks
by forgers.
fraud
usually
food
Philadelphia,
to 40% of all welfare
subsequently
from
almost
period.
Department this
of benefits
Security
York
30%
collect
a woman
is
cases."
fraud
in New
revealed
on
Romero
Misappropriation
way
Denver
if fraud
in other
to
in Denver,
a four-year
the Department
limited
welfare
names over
fraud
reaches
ID.
The
previously,
reported The
stolen another
"lost
or
loss
in
annual
multimillion
dollar
proportions.
Welfare
Fraud
Our
surveys
standards have
for welfare
a very
in public
We have,
idea
therefore,
collection
fact,
good
assistance
who and
welfare
stitution
of a photo resulted
to
such
have
fraud;
the
42
of identification nor
state
$37 billion
agencies
per
year
payments.
estimate
using
the
several
admitted however,
for welfare
closing
lack
Federal
almost
Security
accurately
ID program in the
to
receiving
officials
for detecting
in 1973
due
neither
by individuals
procedure
City
is
Social
no way
of benefits
several
that,
recipients,
that we
scope
there
have
3,000
organize
that
in New
cases
In
is no
noted
recipients
of about
of multiple
identities.
in-
York
of in-
eligibility. per
year,
which
payments cases
These
for
represented
FY
1974,
represented
procedure
was
the
Although been
Attorney
benefits
under
in early
1975
of
attempts the
false
that
in the
are no present
which
the
New York to
FACFI
City
reduce
ments
for
stolen
has
checks
or
also
$4.8
million.
public
welfare
York
City,
subsequently
value
of checks
therefore, the year, ments
than
practice, is
so
slow
the
and
City
is
30%
uncertain
assistance of
these
change
in
may
have
not
been
(New York
City)
applications
Assistance
he
one
for
declared
serious
and
checks from
an
of
the
problem
for which
were
the
of
checks
annual
about
ending to
The
of
taxpayers,
1973
in or
of approxi-
the
total
total
was
$28 million;
$8.4 million
of total
welfare
of a forged
for
paycheck,
the
loss;
in
for welfare
check
losses
in
for
lost
The
least
responsible
replace-
month
replacements
October at
and
1972.
for which
of recovery
43
16%
for
in 1974
loss
fraudulently.
acceptor
the
each
reported
in an
FY 1974.
losses.
made
10,000
the year
amounted
legally
was
issued
checks
for
problem
Philadelphia
effort
represents
cashed
a major
average
resulting
of
is
0.7%
that
has
most
approximately
the process
fraud
center,
",...the
stolen
41%
fraud
for
issuer,
however,
or
in the year
through
represents
in New York
rather
the
which
over
replaced
losses
checks,
figure
were
welfare
data
in Philadelphia
issued
major
problem
County
a determined
forged,
In New
only
of multiple
welfare
lost
This
budget
City
portion
recipients.
the
is
million
safeguards...".
About
mately
the
to
$7.2
York
a large
Queens
fraud
received
alone.
New
of
identification
of Public
of welfare
subsequently
ID
cases
Before
reported
all
that
a single
forged
were
were
the
of
adequate
studies.
mailing
Philadelphia
in
type
administration
stolen
false
after
names
of
ID program,
several
this
faced
at
a saving
since
a photo
photo
found
there
Cashing
0.6%
likely
payments,
example,
District
about
seems
issuance
by
For
It
produced
multiple
many
discouraged
eliminated.
closings
fact,
absorb
most
of
The the
food
stamp
program
now
where
it encompasses
point
payment
level
structured
tion
of
ing
of
$5.2
provides
fraud
state,
billion
while
such
all
Not food
in the
investigations
have
false
identification
fraud
stamp
stamp
Arkansas, cases,
57
year.
Federal
cases
or
19.1
has
has
false
cases
about
This
be
our
data
on
a loss
to
the
Federal
identification where
evidence
fraud
funds
of
Pulaski
Arkansas were
of nearly
stamp
prosecu-
However,
all
a
presently
In North
of
and
to
participat-
false
sparse.
uncovered.
food
and
by the
significant
2.5%
as
returned
identification
2% of all
recipients
program
covered
must
only
carried
beginnings
investigation
be
been
been
modest
million
pursued,
includes
of
to
must
then,
been
from
year.
recovered
program
which
These
funds,
costs
funds
fraud
one
per
surprisingly,
local
County,
expanded
a disincentive
in that
government.
has
food
recorded
$19,000
in
expended
in
in
the
county.
The
sparseness
tification
fraud
assessment
of
of
data
does
the not
identification
(1% to been
the
seriously
has
fraud
were
uncovered
unique
to
those
of
false
an
investigation
only
primary
reason
welfare
programs
and
are
been
the in
localities
or
the
the
have
We
percentage
The
false
this
of
it has
only
is
be
ID
characteristic
the
therefore,
has
may
false
incidence
existence
that
identification
fraud
paucity
proportions
where
a significant
conclude,
is
the
estimates
methods
iden-
accurate
False
significant
programs
on
that
however,
jurisdiction
reported
of data
false
an
been
of
the
fraud
in
generally
ignored.
audits
based
in
in welfare
on
permit
insignificant.
investigations.
fraud.
nationwide
crime;
is
these
received not
sophisticated
that
lack
this
in every
Even
fraud
of such for
of
been does
discovered
least
the
has
problem
payments)
identification
Periodic
the
investigated.
since
that
of welfare
impact
that
total
low,
unrecognized
data
area
national mean
quite
audits
the
the
fraud
2% of
agencies
of
in
of
Federal on
federally~sponsored government
actual
cases
44
are
welfare
required
selected
at
by
random
programs law. and
by
state
These in
sufficient
numbers
to be a statistically
audits
involve
a careful
cases.
One
would
suppose,
fertile
and
valid
source
welfare
fraud,
the
case;
extent
of
fraud
mentioned
of
to determine overpayment audited
and
by
outright
or
simply
are
for
assurance
Action
to
of such
reports
show
fact,
the
food
are
contrary stamp
in
stamp had
of
were nation.
took
the
funds
even
and
program)
Welfare
is merely
that
could
be
or
of
agency
mistake.
the
caused personnel,
Federal fraud
action;
of such
to
of ineligibility,
suspected
true.
have
to
however,
referrals
For
ineligible;
in 378
to
state the
or
audit
any
that was
cases
in overpayments
of
the
1973-1975!
over
the
no
lost
cases
Those
ineligible funds;
in
audit
audited
against
In contrast,
1973-1975
have
of in
ineligibility
claims
ineligibility
stamp
of
Federal
the
who
however,
government.
numbers
the highest made
stamp
45
state;
a recent
50%
food
from food
recipients
the
recover
example,
this
years
lowest
of
the Federal
to
Massachusetts
in fiscal
welfare
the highest
trying
showed
Yet
from
be made
which
necessarily is
number
not
according
means
responsibility
must
nation's
action
$103,000
sole
program
recipients
one
3.1%, over
the
public
the
states
not
the
is
which
possible
of
the
benefits,
recipient
of
this
Education
stamp
be a
types
is not
audits
categories
innocent
cases
and
would
all
made.
actions
that
Massachusetts rate
is
food
any
the
an
report
on
are
recover
fraud
recipients
data
they
reports
the
no
that
committed
of
or
investigation
contain
fraud
Ineligibility,
part
of
The
selected
determing
of the
of Health, the
caseload.
the
audits
in
Suspected
for
total of
Unfortunately,
objective
received
error to
these
useless
in the broad
have
the
required
authorities reports
on
the
prevalence
fraud.
Department
not
a procedural
auditors
The
underpayment.
fraud
that the
government.
rates"
should
on
ID
of
investigation
virtually
of Agriculture
"error
case
is
audits.
the U.S.
Department
data
false
data
against
in these
instructions (and
audit
sample
and
therefore, of
including
the
valid
review
period
recipients.
Utah rates
food
which at
to recover
is
that
such
provide
laxness
is
encouraged
effective
ID
standards
enumerate
welfare to
such
100
$13.7
program,
fraud
in all
1973,
cases,
these
are
types
743
or
relationship ment.
Since
entitlement tion
fraud
cleared ment
may
has
detected
20%
involved
provided
been
to
of
make
state
no
effort
Security
of
3,762
in both
RSI
and
falsification earner,
classify
A majority
of
investigation
the or
Insurance
compared
of to
the
beneficiaries. ‘ In
Administration
illegai
fraud
cases
Of
these
these
age,
or
multiple
be presented
suspected
reim-
instances
programs.
by agreement
of
Health
of identity, or
and
Supplemental
form
potential
DI
of of
to beneficiaries.
the
low
value
Retirement
and
reported
remarkably
Social
issuance
the
of potential
must
cases.
in
under
The
a total
wage
the
a total
payments
benefits,
evidence
very
to
failure
audits
which
(DI),
monthly
we would
The
agencies
and
include
Income
number
for which
a covered
programs
Medicare.
and
available,
following
to
as
establish
false
fraud to
entitle-
identifica-
cases
repay
were
the
govern-
overpayment.
low
explained is
programs
is
for
with
documentary
any
programs
annual
expenses,
year
year,
to benefits,
for
be
provide
in
includes
were
to
These
which
of payments
latest
figures
in
states
responsible
Disability
billion
which
level
the
all
(SSI),
of medical
(HI)
Federal
uncovered
against
each
1975.
(RSI),
$9.2
are
checks
fiscal
Income
bursement
of
in
additional
immense
programs
benefit
Insurance
Security An
Security
billion
of
recipients,
Fraud
million
Survivors
fraud
action
take
failure
welfare
abuse.
Security
Social over
suspected
to
and
programs
deter
Social
of
instances
the
by for
find
also
We
it.
punish
and
discover
to
effort
least
the
there
where
prevalent
is most
abuse,
of program
types
other
like
programs,
in welfare
fraud
identification
false
that
conclude
only
can
We
incidence by several
established
of
fraud
factors.
by prior
46
detected
in RSI
and DI
First,
coverage
under
payment
into
the
system;
in
programs these the
case
of RSI,
coverage
documentary
firm
Second,
to
required
for
record
SSI
program
programs
for
the
require
prior
somewhat intent
in
the
SSI
appears
issued
fact
is
ever,
which
the
Secret
capabilities
false
successful
when
1973
disabled.
the RSI
or the
ID
fraud
replace
This
on
program
and
welfare
does
thus
might
to
persons
DI programs incidence
state
of
not
be
suspected
available.
from
loss the
stolen
in Social
forgery
more
of
Security stolen
frequently
Treasury.
The
regularly
of
to
entitlement,
mailed
to
forged
Service
during
1975
Security
benefit
than
any
probable
72,500
of Social
benefit
Treasury
were
checks
checks.
other
reason
recipients
the
of approximately
type
for
each
month.
checks
Social
Security
involved
a loss
$10 million.
ACTIVITY
examples
he
illustrate
success can
usefulness
confidence.
in
data
fraud
65%
forgeries
engaging
A citizen
are
or
criminal's
with
are
they
foregoing
the
result
by the
CRIMINAL
criminal
tials
advanced
and
is yet
by the U.S.
government
The
ease
to
no
of
checks
47,000
These
the
where
source
that
investigated
checks.
than
program
Security
Approximately
OTHER
has
establish
However,
programs
check
blind
to
attractive
largest
to
Processing
make
are
Security
Social
that
payments.
period
adjudication the
instituted
elderly,
fraud.
The
Social
was
payment
more on
fraud
this
an
and
of prior
Third,
retrieval
and
10 years
difficult.
The
of
least
evidence
of Data
Bureau
search
at
entitlement.
establish
Administration's
more
requires
is most
a criminal In large
is dependent
obtain
of
false
in crimes
often
tries cities,
major
false IDs
categories
in large
identification
has
not
been
of a lesser
scope.
victimized
by the
to gain
access
legitimate
47
lost
use
measure
crimes
on
documents; on
of
the
false
to his home, servicemen
of
and
the how-
common
creden-
business, utility
or
company of
the
employees
often
widespread
apartments
using
fear a
concerned
about
involving
for
the
growing
in
1974,
an
crime
increased
Individuals
Investigations
Police
showed
complaints
about
ID.
police
this
increase
may
handled.
Police use
do
their
access
departments
are
false
police
IDs
in New
York
88%
over
23%
in 1974
ID was
average
$380.
48
1973,
over
the
fraud
in 50%
complaint
and
by criminals. City
totalled
arrests
(268)
period.
by
by the Washington,
because
particularly
while
same
directly
a factor
job
to homes
impersonators of
of
to
gaining
be victimized
a false The
difficult
by only
also
conducted
that
it
imposters
false
Incidents 1,358
find of
"confidence
D.C.
of the involved
men,"
Metropolitan
876
fraud
a loss
of
Task
PART
Il:
Force
Reports
TASK FORCE REPORTS In order to address the many aspects of the use of false identification and to focus the concerns and expertise of its members, the FACFI divided into these five Task Forces:
e
Task Force | — Government Payments, which focused on false identification fraud in programs that involve disbursement of monies to individuals by local, state and Federal agencies.
e
Task Force 1! — Commercial Transactions, which was concerned with the fraudulent use of personal identification in over-the-counter sales and bank transactions.
e
Task Force II! — Fugitives, which concentrated on the use of false identification by fugitives to avoid detection and arrest or linkage to a previous criminal record, to remain in a covert status, or to aid in the commission of further crimes.
e
Task Force IV — Federal Documents, which investigated the use of false or fraudulently obtained Federal documents in the conduct of criminal activity.
e
Task Force V — State and Local Documents, which focused on the use of false or fraudulently obtained state- and community-issued documents in the com-
mission of crimes. The initial assignment for each Task Force was to determine the nature and scope of the false identification problem in their area.
liminary suggestions for solutions.
Task Force reports were to include their findings and pre-
To gather the necessary information, each Task Force examined
a variety of public reports and agency records, and conducted seventeen mail surveys of national and international scope.
The material gathered in this fashion reflects the experience and the records of
several hundred responsible individuals in business, law enforcement, and government.
First drafts of the five Task Force reports were issued between May 1975 and September 1975. The FACFI staff used these reports in developing a summary of the national false identification
problem and in formulating preliminary proposals for solutions.
The reports from Task Forces |
through V have since been redrafted to reduce the amount of repetitive material and to obtaina
more uniform and readable format.
50
REPORT OF THE GOVERNMENT
PAYMENTS TASK FORCE
ON THE SCOPE OF THE FALSE IDENTIFICATION PROBLEM AND PRELIMINARY
RECOMMENDATIONS
FOR SOLUTIONS
Submitted to
Federal Advisory Committee On False Identification David J. Muchow, Chairman
May 1976
51
CONTENTS SECTION:
| =-“INTRODUC
TIONG
ener
nectar etree 53
PUIDOSO % deen eran hrerie teria cen eee ae ete aS cael 53 SCOPO oh. ors eaten: Bega eter ali RSE teers ota a amt 53 Data Gathering aye at eee ree cere aie omer tare 53 Evaluation: Of Data cee pan ata art serdar eee 2 atone 53
SECTION
lio
Génerahzat
hbHEsFARSEsDaPROBLEM
Srvarvasd
wetease te see O18)
pene eet 28 FRomn-.-- 55
ApplicationaR Mase sew: wis eee ae tare. ome atians x’ min 55 WSE "PHASES ere eee oe eee eee Sees wits 56 AnalysiSOL PlOGranns sas terre tae ee Se 56 Aid to Families with Dependent Children......... 56 Medicaidis ast acted VRAIS oe ws 64 FOOG: Slang... co emer ee tener nett iteee ce terete ets 64 SOCialasecurityalRrOG ham Saaseraanak trteccteteks. « s2c00 ee 70
SECTION
Ill —
PRELIMINARY
RECOMMENDATIONS
75
General--.2:2 928 Veer ee ree eee oe ee "5 Recommendations to State Government............ Vs Recommendations to Federal Government ......... TCL
52
-
Report
of
the
Government on
Scope
of
the
Preliminary
False
Payments
Task
Force
the
Identification
Recommendations
SECTION
Problem
for
and
Solutions
I
INTRODUCTION
Purpose
The mission of the Task Force is to investigate the national impact of false identification fraud on programs that involve payments by local, state, and federal governments to individuals. Scope
Four areas, each of which involves programs of national scope, were investigated by the Task Force. These areas included the Aid to Families of Dependent Children (AFDC) and Medicaid programs administered by the Assistance Payments Administration, Department of HEW; the Food Stamp Program of the Department of Agriculture; and four programs administered by the Social Security Administration: Supplemental Security Income (SSI), Health Insurance (HI), Disability Insurance (DI), and Retirement and Survivors Insurance (RSI). Programs Department of
administered by the Veterans Administration and the Housing and Urban Development that involve government
payments
not
Data
were
investigated.
Gathering
Questionnaires
tigated.
Eighty-six
were
sets
prepared
for
each
of questionnaires
of
the
four
covering
areas
AFDC,
inves-
Medicaid
and Food Stamps were sent to Directors of Welfare in each state as well as Guam, Puerto Rico and the Virgin Islands; Welfare Quality Control Directors in several states; state and county auditors in several states; and the Inspectors General of New York and Michigan. Twenty sets of questionnaires covering the four Social Security Administration programs were sent to Social Security Headquarters and Regional Offices throughout the country. Evaluation
of
Data
Approximately 40% of the questionnaires have been returned. Evident thus far is the apparent lack of information relative to
53
the frequency of false ID fraud and its fiscal implications. This lack of information should not be taken to mean that a problem does not exist. Results of several investigations carried out independently by individual states and localities will be cited that show significant impact from false ID fraud in government payments programs. Several of the returned questionnaires have contained expressions of deep concern about the use of false identification and the hope that something can be done to alleviate the problem. The Office of the Commissioner of Welfare, Department of HEW, has recommended on several occasions to the National Welfare Fraud Association that information on frequency and impact of false ID fraud should be collected by the states and reported to the NEW National Center of Social Statistics in Washington, D.C.
54
SECTION THE
FALSE
II
ID PROBLEM
General
False ID fraud in government-assisted welfare and social insurance programs has significant national problem potential because of the ubiquitous nature and staggering dollar volume of such programs. For example, in January 1975, a nationwide average of 11.1 million AFDC recipients were receiving benefits at the rate of $730 million each month; this represents an annual cost to tax-
payers of $8.8 billion. The federal government issued over 100 million benefit checks in fiscal 1975 under SSI, DI, and RSI programs;
these
$13.7 care)
billion. amounted
checks
represented.a
total
dollar
value
of
over
Benefits under the HI program (which includes to an additional $9.2 billion in fiscal 1975.
Medi-
Government payments programs have generally displayed a steady growth in beneficiaries over recent years; the growth of some programs, such as Food Stamps, has been spectacular. In 1965, recipients of Food Stamp benefits numbered 400,000 and total benefits were $36 million. As of January 1975, the program had expanded over a hundredfold to encompass 19.1 million recipients and a payment level of $5.2 billion per year. Programs of this scale present many opportunities for abuse by fraud, whether by false ID or not. Even if only a small percentage of the transactions between government and the beneficiaries of these programs are fraudulent, the total dollar loss to taxpayers in direct payments and costs of fraud detection and prosecution can be very high. Thus, although our surveys have indicated that false ID fraud is generally viewed as only a small part of total program abuse, the Government Payments Task Force has concluded that such fraud constitutes a significant national problem that is deserving of further study.
Government
in both are
discussed
Application
All
payment
"application"
the
programs
and
"use"
are
subjected
phases
to
false
of the programs
ID fraud
and
these
below.
Phase
programs
of application for phase," applicants
studied
by the
Task
Force
require
some
sort
future benefits. During this "application are asked to identify themselves and any depen-
dents on whose behalf program benefits are sought. The types of identification documents currently required by state agencies were found to vary widely, ranging from none at all to a selfThe most commonly used consistent set of official documents. documents in false ID fraud in this phase appear to be birth and baptismal certificates, state-issued driver's licenses, and Social Security cards.
55
Fraudulent documents are obtained in a number of ways. Birth certificates are usually genuine documents that have been altered and then photocopied. Baptismal and some birth certificates, on the other hand, can be easily generated by forging data on official appearing blanks bought at stationery stores or through mail order companies.
Fraudulently
theft
and
using
a false
the
used
counterfeiting;
Social
birth
Security
driver's
they
can
certificate card
was
licenses
also
be
are
obtained
as a "breeder"
never
intended
obtained
by
document.
to
be
used
through
application,
Although as
an
iden-
tity document, it is used extensively as such in both legitimate and fraudulent transactions. Until recently, little identification was required to establish a new Social Security account. Thus, it was possible for an individual to establish accounts under several aliases. This has led to the collection of multiple benefits not only from Social Security programs but also from other government payments programs in which the multiple Social Security cards served
as “identity documents" at application. Social also been obtained by theft or counterfeiting. nent"
Social
supplying
Security
mail-order
or fictitious; these for identification.
cards firms
made with
unofficial
of metal an
account
cards
are
can
Security cards have Unofficial "permaalso be obtained by
number
that
sometimes
is
used
assumed
successfully
The period between application for government benefits and the receipt of benefits varies from a few-days (or weeks) in the case of emergency relief payments to several months (or years) in the case of certain Social Security programs.
Use
Phase
False
ID has been employed
in the
"use"
phase
when
persons
fraudulently assume the identity of others to collect their benefits. This use of false ID occurs most commonly in the cashing of stolen government checks or Food Stamps. Apparently, many banks and
businesses are identification Analysis
of
willing to cash these of the endorser.
instruments
without
adequate
Programs
The following sections present analyses by the Task Force of surveys of AFDC, Medicaid, Food Stamp, and Social Security programs. The analyses describe the range of requirements for recipient identification in application and use phases of the programs, and give available data on the scope of the false identification problem.
Aid
to Families Sources
of
with
Dependent
Children
Information
Twenty-eight responses to the questionnaires on the use of false identification to obtain Aid to Families with Dependent Children (AFDC) have been received. Respondents represent twenty-
56
five states, one the Commonwealth The
county (Los Angeles), of Puerto Rico.
Normal
one
territory
(Guam),
and
Process
The AFDC process begins when an applicant (generally one adult and one or more children) indicates verbally or in writing that they are in need of public assistance. Initial application may be made by phone, in writing or by personal appearance at a local political subdivision. Eligibility for public assistance under the AFDC program is limited to U.S. citizens and legal aliens permanently residing in the U.S. Eligibility criteria include resource and income limitations, financial need and deprivation. When application is made and the welfare organization is satisfied that the applicant is indeed eligible, instructions are generally forwarded to an office of the state welfare organization from which grants are issued. In some states, grants are prepared centrally within counties, in others by the state welfare office and
still
to
others
by the
state
controller
or
treasurer.
Once AFDC eligibility is established, states are not required issue an AFDC identification document to recipients. Of the
twenty-eight respondents to 2 issue an ID with no photo
the and
questionnaire, 21 issue no ID
5 issue at all.
a photo
ID,
The financial assistance provided to AFDC recipients is usually in the form of a semi-monthly check or warrant. Nationwide, as of January 1975, there were an average of 11.1 million AFDC recipients receiving benefits each month. ID
for
It the
for
Benefits
is evident that a wide initial identification
documents
accepted
and
the
variety of AFDC
number
of
of documents applicants.
respondents
are The
accepting
follow: ieee
DETENTCenCit 1caceccscies scree ders aceescie ceseree
2 COCTaIMSCCUL LEY
CALC a ..4 steransretersiscleveje sxefoiaxelexea=O
3) Pe
Drv ELS
MHGEISE sie cic ole cele ciclecieidiels slale steleie ects
4.
Welfare
1D.
Be
(Geacbite
6.
Employer
(it
formersreciptents)ic. ccjeiejcteyetcie
GriglyonnogagasooondoojcenndenodooOG Identification
He
=Sellective
Sa
Military
Identification
Oy)
Military
Discharge
1.OceHOOds tl en
Service
Cards
7,
&
Card.........20+++-.10
ccclss cece lees cees sokO (Card... sic. ice ce LO
sPapers. cl. sis sslsusissecces sald
SEaMp MUD). titre cittee va:e\earel erBierertieveeVelsineclersion
Lonel)
O
Catdiasisicisie's cic oavercleieiercre c/eis'e.e/e sieielecse 0
Sa
acceptable types of them
12.
Immigration
13%)
Baptismal
and
Naturalization
Documents...1/7
1 4cne
Marri ageCertitdicatesny.iterctelele stele crctelarsiotale
ROCOLGSsrerslereleteletelaieicieletetaieioietetelsielol
rom
toni
Of interest is the fact that five states returning questionnaires make no attempt to verify an applicant's identity. Some states only require identification to verify the birth of the children for whom assistance is sought, but none for the adult applicant who will also receive assistance. Most jurisdictions rarely, if ever, check the
authenticity
of "breeder"
The importance trated by a report!
identification
documents.
of an effective identification program is illusof the Office of the New York State Comptroller.
The New York Legislature, according to this report, mandated the New York City Human Resources Administration issue photo identification cards to all recipients of public assistance in the
that
AFDC or)
program. prevent
"The the
primary
cashing
purpose
of lost
of the Photo
and
stolen
ID was
to
(reduce
checks."
This report found that "as of May, 1973, about 3,000 cases were closed as a result of the Photo ID program. This represented a savings of about $7.2 million a year in payments to ineligible recipients." This reduction in caseload apparently came about
either
as
the
willingness"
result to
ID
for
be
of fictitious
photographed
Check
on
cases the
being
part
of
closed some
or
an
"un-
recipients.
Cashing
The types of documents accepted as a means of identifying recipients when benefits are obtained (e.g., when AFDC checks are cashed), depends on the criteria established by the banks and merchants who cash the checks. Unfortunately, a significant number of banks and merchants require little if any identification when cashing government checks. Checks are cashed under the false assumption that
government
issued
checks
are
automatically
"good."
Evidence
of
this can be seen of the Treasury,
in Figure 1, a chart prepared by the Department Fiscal Service, Operations Planning and Research
Staff
entitled
in a study
"Report
on Forged
Treasury
The basis of the Treasury report was a review checks for which a formal affidavit of forgery was Treasurer of the United States during the month of
iL Audit
Report
on
Administration,
Photo
Report
ID
Program,
No.
New
NYC-22-74,
limphasis added. 58
York
City
Feb.
15,
Checks."
of all forged filed with the August, 1972.
Human
1974.
Resources
juawys!qeis3 109
59
=
69 | oz
6Lt| 16
co
£1
ajqi627
/Z_ Buy je10)
SYaADD |j@
eo) sway}
JaquinU 40 “G"|
swI0)
sayRO sw0y 4o *Q")
Sl
Jaquinu jo sway!
AjjediouudAserjw “G"| “(ZE)
701| es
tt | we
=
sie
re etlOf
>”
ez | ov
62 | uw
\
osz |
at
vb | Vat hi
gozp |
S21015
(pp)
‘(gg) Ging
SUOIeIg
aUIjoseg
:sMO}|04
YAY)
Ua}
BuIysed
asOW
‘syUaWIYsI|qeysa
Yyoee
yO SAGA}
XIS
JeyIO
SYBAOD
/E
“(OL) ewoH
aANejaYy 0}
“Wa}!
swal| Buimoys ‘a
geze}
cet
zre |
sesz|
wat
vsz | erg
ats |
ses
vez |
98 | zwei get |
81
aL
16
26 |
sol eze
al eC |
6'SL | zzs ser | tet
66
Arjeay
zz |
UO!PeIIjsUap] UMOYS
UMOYS UO 240
SuoMel20ssy
JUaWYSsI|geysy aay sydayQ Payseg
SUII0} JO “’| 248M Jeg
SaSed OM}
s6p | 9se
ooo}
g69
vor
ozp | 965 |
vez |
go |
z99 |
zz
v | zt |
Vz
Bt
eee vip | vol
9 | 6p |
12 us
gl 6Y
zz
spudsebuy "(Z) 4aI0A psed "| “(L)
=.
VONeWJOyU! asNedaq U! | pI
= =
z9 | ov
0s
|
+ Lh lee vee
82
eet
74
gle
6 |
jeoy ‘al susso4 [@
vee | eit |
100 sws04 /{ R
ep |
II
NOILWOISILNIO!
cat
--
Vp
9S
--
v8
499y9 Buiyse pued
‘(gg)
aunbi4 | —
BUIJeaq “G"|
z
v9 | ee
UL
--
y1pasg spseg |) “(7
Sl... =
Sloe
sel 8
{vu
z
Zt
Sel | vt
-
z
raat
-
\
== 9
999 | Vp
ZL
=
z
fol
--
Ney
t
sz
Oral
9
sz | ol
£
ras}
quawAojdw3
ve
at
adoasi6ay dig ain
fl | 6z
payuasasd Si JayeaJ6UeY) ay)
‘payuasaud Buipnjour
ala ilaa =
ver| i
601
2/9169swian|
a
eee
eon| vt
9
’
8
ut
Le
“wuiqus3 /E
sway}10
e10)
9:82
vL
sv8N0
22y19
9s
Buryseg-42049 ity (
1uewedag a101g
8°02
s
sonbs7aso1g
£
ee | Lt
ul
jeiduawwog yueg
Ase2019a101g
{81905 Ayunoeg Swad)ON Buimoys ‘al
ol
ces|
gore
98| 9
vi6| olz
zug| git
sce| 601
s98| ot
Lye| 179
jo%
/|_
IV
eiauewWwo? /yeyoueuss
104m Paysey
$,J8AUQ, asuaat]
S,H3SHOON3
Buisany
(|)
pue
Aruourny
Buisnoy/waiy
RB sBuUINeS
UeO7
'(~G)
se ‘s¥2ay2
91
el
Olt
es
62
82
Vy
A total
of
3,978
forged
instruments
were
comparing the types of identification accepting them, reveals that 81.3% or contain written evidence on the check
time
of cashing.
The
study
found
that
reviewed.
The
chart,
used with the establishments 3,236 forged checks did not that an ID was used at the
"the
rate
of acceptance
of
drivers' licenses and Social Security cards as a means of identification is particularly high in department stores and other establishments whereas these identification forms (except for one instance) are unacceptable to check-cashing firms. Also, use of the Regiscope? as a means of identification is relatively low in commercial banks (4.6%) and department stores (4.1%), relatively high in grocery (24.4%) and liquor (25%) stores, and extremely high
in check-cashing AFDC
firms
(66.6%)."
Fraud
The survey requested specific information on the extent and impact of AFDC identification-related fraud. Data requested included the number of fraud cases investigated in which false ID was used, the fiscal impact of the fraud, estimates of the percentage of total AFDC frauds that involve false ID, administrative costs of prosecuting false ID, and types and use of false ID encountered.
Twenty-three of twenty-eight responses to all these queries left the questions blank or stated that the information was either not available or unknown. The states supplying some of the reques— ted information estimated that less than 2% of AFDC fraud cases involved the use of false identification. However, one state readily admitted that because fraud reports do not generally specify the nature of the fraud, true percentages are likely to be much higher. As a result, the Task Force has concluded that the frequency of the use of false identification remains undetermined because of the lack of adequate information at all levels of government and the private sector.
Because of the dearth of information, it is necessary to turn to specific welfare fraud reports in order to demonstrate the seriousness of the false identification problem. It should be pointed out that the available reports are not limited to obvious problems of false identification, but include numerous other fraudulent practices such as forgery, which is a false ID crime, the check itself being the false ID. It is abundantly clear that if proper identification is required at the time a public assistance check is cashed, millions of dollars can be saved annually. The
Mail
Theft
Issue
One of the most serious problems encountered by jurisdictions that mail checks to welfare recipients is mail theft. A Pennsylvania
3
A device that photographs cashing the check,
both
the
60
check
and
the
individual
study!
has
found
that
"Pennsylvania
welfare
checks
are
stolen
with
much greater frequency" than any other checks sent by mail. A prime reason for this is due to the length of time it takes Pennsylvania to complete an investigation on reports of lost or stolen checks.
In September non-receipt
area
were
and
October,
complaints
for
"checks
1974,
it was
currently
issued
in July
that similar delays are common areas throughout the country.
of
Most a lost
found
that
in progress
in
of 1971."
in many
of
the
investigations
the
of
Philadelphia
It should larger
be noted
metropolitan
states, including Pennsylvania, upon receiving a report or stolen check, have the recipient complete an affidavit
and issue a replacement check within twenty-four or forty-eight hours. These affidavits are used as the basis for collecting information to be used in any subsequent investigation. The Pennsylvania Grand Jury found that the majority of non-receipt claims cannot be resolved after a search of the files of the State
Treasury
Department.
of
the
cases
or
forged.'"'
are
Statistics
determined
Another
20%
to
indicate involve
of the
cases
that
checks
are
"approximately that
have
determined
to
41%
been
stolen
constitute
fraud, that is, a check was received and cashed by the welfare recipient but subsequently reported as lost or stolen, in order to obtain a double payment. A study by the New York State Comptroller! found that over thirty percent of the checks for which replacements have been issued are subsequently determined to have been fraudulently cashed. These percentages are shocking when one considers the number of replacement checks issued. The Pennsylvania Federal Grand Jury found the following:
"For the month of January, 1971, the incredible total of over twenty-six thousand replacement checks was issued in Philadelphia alone. Since the average welfare check amounts to approximately one hundred and eight dollars, the value of these replacement checks was more than two million six hundred thousand dollars. In 1972 and early 1973, ten thousand replacement checks, totalling over one million dollars, were being issued each month in Philadelphia alone. That figure is currently reduced to four or five thousand replacement checks per month, with an approximate value of one-half million dollars. This reduction, however, should not lull us into
lReport of the Federal Grand Jury for the Eastern District of Pennsylvania on Welfare Check Theft and Fraud in Pennsylvania and the Administrative Processing of Pennsylvania Welfare Recipient Complaints on Non-Receipt. laudit
Report
on
Human Resources
Fraudulent
Duplicate
Administration,
Check
NYC-50-74.
61
Claims,
New
York
City
believing that there has been a proportionately great reduction in the rate of theft of welfare checks. The continued and diversified enforcement efforts of the Postal Inspectors and some improvements in the process-— ing of these checks have reduced the theft rate. However,
most of the reduction of monthly replacement checks from twenty-six thousand to five thousand is the result of a substantial reduction in the number of checks being delivered by the mails.” The
City
Fraudulent
revealed
assistance
audit
that
(Human
Resources
310,000
checks
Check
in fiscal
payments
found
stolen."
Deplicate
that
were
"during
year
approximately
the year
Administration
worth
They also
a backlog
of 110,000
on which
no recoupment
that
which
in New
City's
$1.2 York
had
cashed
had been
These figures are substantiated gation of Welfare Fraud by Office of
The
1973,
City)
been
York
public
billion.
October,
HRA
replaced
reported
"as of November,
fraudulently
action
New
audit
the
ended
of
$28 million
found
Claims
1974,
checks
lost
1973,
there
worth
$9.7
or
was million
taken."
by the Report on Investithe Queens District Attorney
for the Year 1974, This report states that "the most serious problem faced in the administration of Public Assistance and one for which there are no adequate present safeguards is the multiple collection of welfare payments by people using several aliases." The report further states that "it appears that the only way to eliminate this type of welfare cheating is to require a form of identification which is absolutely unique to each individual and
which
and
is not
of fraudulent
duplication."
A recent article in the Washington Post on check thieves their victims, with emphasis on federally issued checks,
indicates The
capable
that
article
upwards
of $15,000,000
are
lost
"The check thieves
steal about
$50,000
to
forgery.
a day by forging
government checks. Most of those direct carried by the banks and businesses that forged checks. The indirect costs borne government
departments
that
investigate
the stolen
checks
into
the millions
A recent
Audit
due
stated:
review
and Quality
runs
conducted
Control
by the
showed
that
New
62
and
replace
each year."
York
welfare
the State of New York alone account for ulently cashed checks each year. It is studies were made of fraudulently cashed in other major metropolitan areas across would double or triple. It is unlikely Philadelphia metropolitan areas are the these problems.
losses are cash the by various
State
Office
of
checks
issued
by
$12,000,000 likely that government
the that only
in if
fraudsimilar
checks
issued
county, these figures the New York and ones experiencing
False The
come
most
under
order
to
il -
ID
Suspect
common
characteristics
investigation
obtain
20-30
AFDC
years
2-
Female;
3-
Unemployed;
4.
Has
5-
Resides
Profile
for
using
benefits
of
completed
are
as
The
fraud
7.
Had
no
12 years
8-
Has
resided
occurred
prior
individuals
who
have
identification
in
follows:
age;
of education;
in a metropolitan
6-
of
fraudulent
in
area;
a metropolitan
criminal
record;
in present
area;
and
residence
six months.
Apparent thus far is the fact that the amount of detectable fraud is commensurate with the effort made to detect it. As an example, of 343 cases sent to the prosecutor by the Special Investigative Section of the Department of Social and Health Services in the State of Washington, 338 or 98.5% resulted in guilty verdicts. This occurred in the first year of their operation beginning August, 1973. The annual report of the Special Investigation Unit for Suffolk County, New York, stated that "as a result of activities by the Special Investigation Unit in the year 1974, over one million dollars in fraud was uncovered, and resulted in an additional savings to the County of $900,000 in Public Assistance cases being closed." The
Treasury
Department!
expresses
the
frustration
in government concerned with the fraudulent cashing the question of proper identification. They state: "Tt is apparent that particularly banks,
of
of
those
checks
and
check-cashing establishments, and do not take proper precautions.
They are accepting checks (in some cases for large dollar amounts) with questionable endorsements and
forms
of identification
reliable. observance
It of
which
are not,
obviously,
is entirely conceivable that strict the simple maxim 'Know your endorser
- require identification' would reduce substantially the incidence of encashment of stolen and forged Treasury checks."
lipeport Fiscal
on Forged Service
Treasury
Operations
Checks," Planning
63
Department and
Research
of the Treasury, Staff.
Medicaid Sources
of
Information
Twenty-six responses to the questionnaires on the use of false identification to obtain Medicaid benefits have been received by respondents representing twenty-four states, one county (Los Angeles) and one territory (Guam). Analysis
While card
all
and/or
of
Data
states
Medicaid
Received
issue
some
labels,
the
form
of Medicaid
conclusion
that
identification must
be
drawn
from
the responses received is that states have little, if any, knowledge concerning the use of false identification in the Medicaid
program. keep
A common
Medicaid
fraud
response
is that
statistics
and,
states
are
therefore,
"not
required"
to
do not.
The states that did provide some information indicate that the problem appears to be more in the nature of provider fraud rather than recipient fraud. One state that found some recipients using Medicaid cards belonging to other persons discovered that in most instances the imposters were themselves eligible for Medicaid or other medical assistance but had lost or mislaid their own Medicaid ID.
The Task Force is, therefore, unable to provide any meaningful data relative to the use of false identification in obtaining Medicaid benefits. The Task Force believes that states should be required to mainuniform and detailed statistics on Medicaid fraud. In addition to providing meaningful national data, such statistics would serve as administrative tools for corrective action at all government levels.
tain
Food
Stamps
Sources
of
Information
The Food Stamp questionnaire was mailed to Welfare Departments of all U.S. states and territories. Twenty-four responses have been received; respondents represent twenty-two states, one county
(Los Angeles), and one territory (Guam). sisted of twelve separate questionnaires of as many counties. The
Normal
Maryland's response confilled out by officials
Process
The Food Stamp application process begins when an individual or family applies for benefits at a local or state welfare office (in many urban areas, community service organizations serve under
64
-
contract to the state as registration offices). Eligibility for Food Stamp benefits is limited to U.S. citizens and legal aliens in permanent residence and is based on income level, number of dependents, and certain other eligibility requirements. Recipients of federally-supported state assistance programs such as Aid to
Families
with Dependent Children
(AFDC)
are automatically
eligible
If the local registration office is for Food Stamp benefits. satisfied that the applicant meets eligibility criteria, the application is forwarded to an office of the state welfare departUpon a favorable determination, ment for a final determination. the applicant is provided with a Food Stamp ID card and (in most states) his first Authorization to Purchase The Food (ATP) card. Stamp ID is usually not a photo ID card; in Massachusetts, for example, it is a machine-readable card containing the applicant's The name and signame, Social Security Number, and signature. nature of an authorized proxy may also appear on the card. The ATP
document
also
is
a machine-readable
authorized face value of food coupons purchase price. The purchase price is the applicant and ranges from zero to Food Stamps may value of the coupons. authorized outlets, which are usually
stores
or
community
service
card
containing
the
to be purchased and the determined by the need of slightly less than the face be purchased at statebanks but may be retail
The
agencies.
"stamps"
(more properly
ATP are presently coupons) are issued by the federal government. issued monthly; revalidation, which entails redetermination of eligibility and issuance of a new Food Stamp ID, is required every three months. ID
at
Registration
It is apparent that there is no nationally-accepted standard for identification of Food Stamp applicants upon registration. Eight states require no identity documents at this point. Fourteen of the twenty-six respondents accept a Social Security card as identification at and eleven accept
registration; nine accept a driver's license, immigration and naturalization documents. Several
respondents
"if applicable"
ing One
noted
on immigration
documents,
imply-
that selection was exercised in demanding proof of citizenship. respondent (a Southwestern state) indicated that ID was required
"only if citizenship as choices! are Other documents
is questioned."
accepted by at not listed but
All the documents
suggested
least three of the respondents. accepted by one or more respondents
include library cards, income documents, bills, and "personal papers." Some of the respondents indicated that the responsibility of
the
of the
state
agencies
applicant,
lthe list programs added to
not
is
his
to
determine
true
the
eligibility
and
need
level
identity.
of suggested documents appears in the description of AFDC in this report; current and expired Food Stamp ID's were this list.
65
ID
for
Claiming
Stamps
The standards for identification of recipients picking up Food Stamps in person are apparently tighter and more uniform than those applying at registration. Twenty-three of the twenty-six respondents accept a current Food Stamp ID at this point; several respondents accept only this document for Food Stamp pickup. Ten respondents would accept the Food Stamp ID of a former recipient, six a driver's license, and five a current welfare ID. Only one respondent indicated that most of the documents listed as choices are accepted; none indicated that no ID is required for Food Stamp pickup. ID
for
Food
Purchase
The Food Stamp ID was also most frequently mentioned (nineteen responses) as the usual document required when Food Stamps are used to purchase food. Nine respondents indicated that an old Food Stamp ID would be accepted. Four respondents stated that the required ID
would while
depend on the "sales two believed that no Food
Stamp
outlet" at which the stamps were used, ID is usually required by food stores.
Fraud
Specific information was requested to the extent and impact of Food Stamp Fraud. The number of fraud cases investigated in which false ID was used, the fiscal impact of the fraud, estimates of the fraction of total Food Stamp frauds that involve false ID, administrative costs of prosecuting false ID, and types and use of false ID encountered. Unfortunately, the most common response (ten of
twenty-six) One
to
all
respondent's
state
welfare
formation)
these
comment
queries
departments:
since
there
was
summarized
"No
is no
"Information the
record
apparent
kept
requirement
(of
Not
Available."
attitude
this
to do so."
type
of
many
of in-
Almost
as
common (nine responses) was the comment that false ID fraud is nonexistent in the respondent's jurisdiction!, This was not only the response of such sparsely populated rural states as Oklahoma, North Dakota, and Montana, but also of urban states such as Connecticut and Delaware. Completely
in
contrast
to
these
responses
was
the
report
sub-
mitted by the State of Arkansas. This report covered only NonPublic Assistance Food Stamp recipients in North Pulaski County, which includes only 2.5% of statewide Food Stamp recipients. Nevertheless,
in FY
73-74,
this
county
(which
includes
part
of
Little Rock, Ark.) recorded 57 cases of false ID fraud carrying a loss to the Federal government of $18,740. All cited cases involved 2
i
Same
as
suggested
for
Food
Stamp
If no records are maintained, a statement can be given much
application.
it is questionable credence.
66
as
to whether
such
false ID at the time of application; seven cases also included the use of false ID at the time of food purchase. In 31 cases, imposter identification was used; counterfeit identification was used in 24 cases; and altered identification in 2 cases. The state estimated its administrative cost in prosecuting these cases to be $3500.
The Arkansas data are extremely significant, considering the relatively small sample of Food Stamp recipients that yielded all these cases. Two possible explanations of the data are suggested: either Little Rock, Ark. is a hotbed of false ID fraud, or the problem
is
being
in most
of
the
overlooked
nation.
the Arkansas response, more nearly correct:
"Since
April
1974,
(and
Some
suggests
the
therefore
additional that
the
prosecuting
declared
nonexistent)
information, latter
quoted
from
explanation
attorney
is
in Pulaski
County has been extremely concerned with all aspects of recipient abuse of the Food Stamp Program and has been very active in the prosecution of food stamp fraud cases.
To
date,
three
hundred
and
ten
(310)
felony
charges
of
false pretense have been filed against one hundred and twenty-seven (127) persons in Pulaski County. Thus far
eleven (11) persons have been found guilty with sentencing ranging from five (5) years in the State Penitentiary to one
(1)
year
suspended."
Substantive data on false ID fraud was also received from Los Angeles County, California. However, no special breakout for Food Stamp fraud could be provided: the figures given refer to
welfare fraud of all types. False ID fraud cases investigated increased from 24 in FY 70-71 to 103 in FY 73-74. Estimated welfare and Food Stamp payments to recipients as a result of this fraud totalled $24,170 in FY 70-71 and $85,148 in FY 73-74. Common
ID
Fraud
Documents
The documents most frequently Arkansas are Social Security Cards Social Security Cards are obtained
false
names;
unofficial
"permanent"
used in false ID fraud in and Food Stamp ID documents. by application under one or more
Social
Security
cards
made
of
aluminum are obtained by mail order and sometimes used as ID documents. The most frequent abuse of the non-photographic Food Stamp
ID is the
"loan"
of it to unauthorized
purchasing Food Stamps. is not used in Arkansas.
Apparently,
parties the
who
then use
intermediate
ATP
it in
document
California listed baptismal and birth certificates and driver's licenses as the most frequently abused ID documents. Birth certificates are commonly used to support the existence and ages of claimed dependent children; blank baptismal certificates are available in stationery stores, while birth certificates are most frequently genuine documents that are altered and then photocopied.
67
Most were
used
of the driver's licenses counterfeit documents. False
ID
Suspect
false
in
fraud
ID
in
California
Profile
Arkansas and California showed good agreement in their profile of the typical suspect in false ID investigation; both identified a young (18-30) unemployed woman resident in a metropolitan area. California described the typical suspect as not having a prior criminal record, while Arkansas could not supply data on prior criminal records. Both states cited metropolitan areas as the most common locales for ID fraud. Extent
None
of
indicated
of
the
the
Problem
twenty-six
a belief
that
respondents
false
ID fraud
to
the
Food
represents
Stamp
survey
a majority
of
total Food Stamp fraud cases. However, the Arkansas response, which contained the most detailed data on false ID fraud, estimated the
proportion of false ID cases as 10% of the total fraud cases. Much more common methods of fraud include falsification of income, medical expenses, or number of dependents. In Los Angeles County, the percentage of welfare fraud cases investigated that involved false ID was less than 1% for all years reported (FY 70-74 inclusive). Estimates of false ID fraud as percentages of total Food Stamp fraud supplied by other respondents ranged from below 1% to 5%; no basis for these estimates was given. Analysis
of
ID
Fraud
Data
These estimates establish clearly that the use of false ID is perceived as a minor problem with respect to overall abuse of the Food Stamp program. Three comments, however, appear to be in order. They are: (1) Based on the wide variance of the Arkansas response from the national sample, false ID fraud is probably much more widespread and considerably more frequent than most state welfare departments realize; (2) All of the methods of false ID use
that
were
detected
are
very
primitive.
This
includes
the
unauthorized use of Food Stamp ID, phony or duplicate Social Security Cards, and counterfeit driver's licenses; and (3) More sophis-— ticated methods of false ID (such as Infant Death Identity)1 could be in widespread use but not currently detected. Disposition
Cases the
local
of Food
of
Cases
Stamp
prosecutor's
fraud,
office
when
discovered,
(usually
are
county-level)
referred for
to
disposi-
tion. The cost-sharing provisions of the Food Stamp program do not provide a strong incentive for state and local prosecution of Food Stamp fraud; in fact, they provide the states with a strong
1 See
Part
I, Section
3 of
the
FACFI
68
Final
Report.
disincentive. The states pay a portion of the administrative costs of the program, including costs for the apprehension and prosecution of offenders. The entire cost of the coupons fraudulently obtained, on the other hand, is borne by the Federal government. Therefore, added emphasis on fraud results in added costs to the state, yet all funds recovered must be returned to the Federal government. Stolen or forged Food Stamp ID and ATP
cards
can
coupons
be used
where
no
at banks effort
and
retail
is made
to
stores
confirm
to obtain the
and
identity
of
"spend" the
bearer. The Food Stamp ID used in most states is not a photo ID and can, in certain cases, be used by a proxy to purchase coupons for a designated recipient. These characteristics make it relatively easy to counterfeit or to use if stolen. Federal guidelines for state action (FNS [FS] Instruction 736-1) make it extremely unlikely that states will elect to prosecute any but the most flagrant abusers of the Food Stamp program. Finally, several respondents to the Food Stamp survey indicated that communication is poor between state and local welfare officials regarding abuses of the Food Stamp program. Suggestions
Several
for
suggestions
Solutions
were
made
by survey
respondents
to
con-
sider the problem of false ID fraud. Establishment of a photo ID system was the most common suggestion. One respondent, however, in making this suggestion noted that this "would be one more
harassment
to Food
Stamp
Program
participants."'"
One
state
sug-
gested that others follow its practice of mailing Food Stamp ID and ATP documents in separate envelopes; this makes it more difficult for a thief to obtain both documents. One respondent
preferred the (apparently older) the former permits close control
FS-4 over
form to the ATP card "since currency of ID." The
Arkansas respondent suggested requiring at intake to the program. Finally, one
more than one form of ID respondent appealed to the
Federal
government
to
program
specification
workers
to perform
other
such
checking
"simplify
tasks,
as
to
free
ID!"
An overall view of the responses suggests the need for some uniform type of identification requirement to be used at application. Application frauds using counterfeit or imposter identities appear to be the most common types of known ID fraud. The Social Security card was mentioned most frequently as a document used in false ID fraud; until recently it has been very easy to obtain Social Security cards under assumed identities. It remains to be seen whether new regulations by the Social Security Administration will have a long-range effect on the false ID problem. For the present, acceptance of the Social Security card alone as an ID for the Food Stamp program should certainly be discouraged. More fundamentally, there is a need to restructure the balance of state and Federal responsibilities in the Food Stamp program to improve the efficiency of its administration and to discourage abuses of the program.
69
Social
Security
Sources
The Social Social Security
sible (HI),
of
Programs
Information
Security questionnaire was sent to appropriate Administration bureaus, including those respon-
for Supplemental Security Income (SSI), Health Insurance Disability Insurance (DI), and Retirement and Survivors
Insurance (RSI). of International
In addition, copies Operations (RSI) and
Laboratory in the Office information. It was the
"false
identification"
mentation
problem The
at
Normal
of Administration, a rich opinion of the Laboratory
is a very the
were sent to the Division the Documents Analysis
Social
small
part
Security
of the
source of Chief that
false
docu-
Administration.
Process
Social Security programs are unique among those considered by the Government Payments Task Force in that a large majority of the working population of the U.S. is registered for benefits under these programs. Registration or opening of a Social Security Account typically takes place upon an individual's first application for salary or wage paying work. Prior to 1974, little or no documentary evidence of identity was required to register for Social Security benefits. There is some evidence of multiple registrations under a variety of aliases, a procedure which can enable the collection of multiple benefits. The Social Security Administration instituted procedures in 1974 calling for presentation of documentary evidence of identity upon registration. Once
registered,
an
individual
ject to withholding of Social contributions are required of any
change
affecting
and acquisition Social Security
in
covered
employment
Security contributions; employers. Federal law
contributions
to
or loss of dependents, Administration.
the
program,
be reported
is
sub-
similar requires
such
as
promptly
that marriage
to
the
Application for benefits, as distinct from registration, normally occurs when an individual enters a status eligible for benefits. Eligible circumstances include retirement after age 62, permanent disability, blindness, and for survivors, the death of a
covered
wage
earner.
Documentary
evidence
of
eligibility
must
be presented with the application for benefits. However, no investigation of the claim is usually made unless there is some reason for suspicion. Referrals of possible fraud in Social Security
cases ID
generally
originate
from
voluntary
informants.
Required
Only the birth certificate and Social Security card were listed by all components as being accepted for initial determination for eligibility. The Supplemental Security Income Program appears to
70
-
accept more types of documents initially the Social Security Administration.
than
any
other
bureau
of
The types of documents shown as an acceptable means of identifying recipients when benefits are obtained, either when checks are cashed or services received, are varied. All four bureaus indicated that documents such as driver licenses, marriage certificates, credit cards, etc., are used. In fact, only two types of identification mentioned on the questionnaire that were not used by any bureau were the Welfare ID and the Food Stamp ID. From these statistics, it appears that the most common document used for identification purposes is the driver's license which is easily obtained, altered, and forged. Another in common use is the Social Security card which was never intended to be used for identification purposes. Social
The
most
Security
common
Program
response
mation not available."" investigated for fraud
to
Fraud
fraud
The survey in the four
impact
question
was
"infor-
yielded a total of only 56 cases fiscal years 1970-1974 that
involved the use of false identity. Of these, 17 cases were classified as altered ID, 5 as counterfeits, and 21 as imposter cases; classification was not made for the other 8 cases. No records of fraud based on false Insurance Bureau. In
cants would stated formed
response
for not
to
identity
Question
have
been
F, number
kept
of
by the
cases
Disability
in which
appli-
benefits were refused benefits because they could or provide identification, the Bureau of Health Insurance
that in their program, services in emergency situations even if
could conceivably an individual did
be pernot have
his health insurance identification card. They pointed out, though, that the physician or provider may not be able to collect from Medicare if it develops that the patient was not entitled to the services performed. All other respondents indicated that they were not aware of any cases. It was generally agreed among the respondents that it cannot be assumed that if identification is required, fraud has not taken place. In most cases, if a person decides to file a false application he would also have obtained false identification. In addition, it is not always possible to detect the fraudulent act unless a complete and extensive investigation is initiated when the claim is filed. In many cases, the fraudulent act is detected by reports from informers or through development of the initial claim, a subsequent claim, or a post adjudicative discrepancy. Relative to administrative costs and manpower resources for fraud investigation involving false identification, it appears that only a very small percentage of time is spent on the problem of false identification. In fact, 5 percent or less of all cases
71
examined for possible fraud by the Document Analysis Laboratory at the Social Security Administration involve false identification. These cases usually do not involve attempts at false identity. Rather, the individual has attempted to change certain facts about himself for personal benefit. For example, he may attempt to show that he is older than he actually is in order to qualify for retirement benefits. False
The most cation
as
ID
Techniques
common
reported
techniques
for
obtaining
fraudulent
identifi-
were:
1.
File several Forms SS-5 (Application for a Social Security Account Number) using completely different identifying information on each application (i.e., different name, parent's names, place of birth, birth date). When application is made on the various account numbers, a false birth certificate or affidavit supposedly signed by the parent is used3
2.
Find
3.
Applicant, who may be receiving wife's or widow's benefits, can file for retirement insurance using maiden name and falsely state that she had not previously filed for benefits;
4.
An applicant a person who
or
to use
steal
that
another the new
5.
An
person's
can obtain died at an
can
assume
legal wife,
Social
the birth early age
individual's
wage record and account number;
applicant
earner's
another
identity
Security
certificate of and then proceed
to build
subsequently
file
the
of
with
identity
the wage
up under
a wage
earner's
know-
ledge, using the marriage record pertaining to legal wife as proof of age on the basis of her allegation that this was the only proof of age available; and who
obtain is not
card;
the
6.
Contact a church of an individual certificate;
7.
Obtain fraudulent documents from outside the United States from both civil and religious sources, such as local civil registries and church records. It is sometimes possible to bribe the civil or church official to issue fraudulent documents.
%2
a baptismal certificate the requester of said
False There
was
ID
Suspect
general
Profile
agreement
among
all
respondents
as
to
the
profile of the typical suspect in false ID investigation: most are at least 65, can be either male or female, many are unemployed, with little known regarding their educational backgrounds. There are more cases of attempted use of false identification in metropolitan areas than rural or suburban areas, possibly because little or no identification is required in less populated areas since people tend to know each other better. Control
of
Abuse
It is a Federal offense subject to criminal penalties for an individual to furnish false information to the Social Security Administration in connection with the establishment and maintenance of Social Security earnings records, to use a Social Security number (SSN) with false information, to use a counterfeit SSN, or to use
someone
else's
SSN.
There are definite procedures to follow when a beneficiary fails to receive a check. Briefly, a beneficiary reports the nonreceipt to the SSA district office which in turn will forward the nonreceipt allegation to the Treasury Disbursing Center which has responsibility for issuing the payment. At this point, a request is made to place a stop payment in the Treasury system against the original check. If the original check is later presented for payment, the Treasury will make the determination as to the proper method of recovery. When a nonreceipt claim is received and the original check is paid by the Treasury and the check is found to bear an unauthorized endorsement, the Department of the Treasury will request directly the refund of these payments. Suggestions
for
Solutions
Several suggestions were made to counter the problem of false ID fraud. The use of the Social Security numbers as a universal identifier was the most common suggestion. However, this has already been considered in terms of the danger of invasion of privacy, the cost to the Federal Government, the time required to institute the system and the effectiveness of such a system for alleviating the
problem.
The
use
of the number
for
such
a system
seems
unlikely
at this time. Other respondents suggested that more specific care should be taken in identifying the claimant. They further suggested that all documentary proofs should be examined carefully. If any document appears altered or not authentic, a Document Specialist should be requested to verify the document. When fraud is suspected, development of the fraud aspects should be started quickly. Another suggestion was the universal use of one or more corroborating documents, rather than the use of only one. Along these lines, an applicant for a Social Security number must show convincing evidence of Preferably, the evidence will show his age or date of identity.
73
birth, his address, and his signature, and be at least several months old. Still another common suggestion was that all individuals applying for Social Security numbers could be fingerprinted when applying for benefits in order to establish their identity. This too would probably be unfeasible and not readily accepted by the public.
74
-
SECTION PRELIMINARY
III
RECOMMENDATIONS
General
The Government Payments Task Force presents in this section a list of preliminary recommendations to reduce the incidence of false ID fraud in the programs studied. These recommendations were developed from survey responses, by individual Task Force members after a review of survey findings, and by other individuals with whom Task Force members had contact. It should be emphasized that these recommendations represent individual viewpoints and do not neces-— sarily reflect the opinions of all Task Force members. The recom-— mendations have also not yet been screened, compared, and examined with respect to such criteria as cost effectiveness, practicality, and likelihood of public acceptance. Since detailed management of cost-shared welfare programs, including AFDC, Medicaid, and Food Stamps, is relegated to individual states, while Social Security is a strictly Federal program, recommendations have been divided into those that apply to state and Federal governments. Recommendations
1.
to
Provide be used
(ice.,
State
Government
a tamper-proof identification card which may for all assistance programs in the state,
AFDC.
Food
Stamps,
SSL,
Hit, Di5
is suggested that this ID card, the following information:
a.
Name
and
b.
Social
c.
Case
address
Security
or
other
of
as
recipient
Number
state
of
and RST).
a minimum,
(embossed) ;
recipient
number
Lt
contain
(embossed);
(embossed);
Note: This number should correspond with a case number and/or Social Security Number included on the assistance check, Food Stamps, etc. d.
Color cover
photograph of recipient large at least one-half of one side
e.
Signature
f.
Name
and
the
card;
g.
The
right
h.
Issuance
of the
and
to card;
recipient;
telephone
and
enough of the
number
left
thumb
expiration
75
of the
print date
of
office
of
the
the
issuing
recipient;
card;
i.
Any other data of the program
necessary for which
j.
A postage free return mailing statement and a warning, in bold type, of the consequences of misuse of the card. The card should conform to standard credit card size so that it can be used in credit card embossing machines.
Consider requiring merchants assistance checks to impress from the ID card onto similar to the use of
to satisfy requirements the card is issued; and
and the
others who cash public embossed information
the check prior credit cards);
to
cashing
(i.e.,
Consider sending or transmitting electronically public assistance checks to conveniently located banks where recipients would be required to personally claim and
sign for their benefits. This would make it practically impossible for a recipient to obtain a replacement check by falsely claiming that he did not receive the original. This would also substantially reduce the problem of assistance checks being stolen from the mails. This procedure would probably be more practical in metropolitan areas, which the Task Force surveys have shown
to
be high-risk
areas
for
false
ID welfare
fraud;
Recipients should be required to report stolen welfare checks directly to the local police and to sign an affidavit under penalty of perjury before being issued a replacement check; Identification should be required (ID card as described above) for cashing Food Stamps; merchants should not be paid for fraudulently used Food Stamps; Penalties Food
for
Stamps
Uniform claimed
knowingly
should
accepting
be made
standards for dependents at
fraudulently
cashed
severe;
identification of recipients and intake should be adopted by all
states;
The
security
tificates as
to
and
resist
of "breeder" driver's
documents
licenses
alteration,
such as birth
should
counterfeiting,
and
use
imposters. Steps such as mandatory matching of and death certificates and carefully controlled issuance should be immediately implemented.
76
cer-
be upgraded
so
by
birth
Recommendations
1.
the
Federal
Government
The Federal government should develop comprehensive standards for recipient identification for cost-shared assistance programs, and provide financial assistance to
2.
to
The
the
states
Food
Stamp
in
implementing
Program
should
these
be
standards;
restructured
by
legislation requiring state sharing of stamp cost and providing more Federal Assistance in costs of prosecuting Food Stamp fraud. These measures would
provide control
the states with incentives of this program;
for
improved
3.
Food Stamps should be redesigned to resist use of stolen coupons. One means of doing this would be to provide two signature blocks for recipients. One block would be signed upon the receipt of the stamps and the other at the time of use (i.e., similar to the use of Traveler's Checks);
4.
Positive identification of required prior to approval Social Security benefits.
V7
recipients should be of applications for
a oo
ft
ot
the (te) >
+ iT
i n
aa
aaaaiaeiae ibe oy
;
~~
led
eae
< userd;
py Lewedexgnen Ae ae ] isa
dozsderzegy Dem Aphis 2th ata, porepum). ; balan ins on ty ts
oo
on }
coe vt
= , Me
gaeedy
Ach erectile aL Ly 1m My df aaiene re
Tl - oeims
48
«aq od une” _
v4 baslec’ senate Pa arm)? boot sit its 2405 gam, Fo faizele ettin Qurrtepsy wolsnl ekasl
= Sep on ndepy td, seat areAti Lo RDI ycithn
bine HRT Mt ee
OEE A obiz
6071 bel
45549008
Lin > pagomach 94, DAV A Saou» 11 W DEdOdse alg yews “0 tte r) ioe
Las
rs
i
a
us
0
qOW
Ri ad. ate?
a Mantescases thes 0
PEt d)
'
f¢tmeay
ates
THES iw
zh
“tab Gepatalt 1 AORF eins
pavios Denne
e: 46,«Water.
ae
Wh id dy, hee.
Saang! Cet whsthtrre
o4
a3. je pene
Ss ean
Aiciald-noim tExdorhutid
gekad Fo
oBIps lainey, wen .
ic
eit
on)
Sooke oath bival be
dz oigae eden
athe
tS
Deiraokies. el aet
~~
i
‘1 Neda eat S abulaesly wadaeee pe odeenohane Lque lis PHM GILIgE TE my SAAPEL og~ Tile.
—
8
emia Pir bulvnie
petites
«ries, whigs
ta
be
ght ia! o
a
Paial)
fee
(een
font ba pg,
ba
:
‘Undiet®
cleine?
opl®tet
;
»: leo(ay henge
af
ete
-
ae
eas »
y=
lee
134 aie
\- ae
a
@
hwe Jai
tae
(e——iae”
Gipc atone. oe2 eh, teeth cownls
Kasur’ = try~
Ce
trees
re
ahs
-
: ported
stents, ont”
ipted bs ail ae
*
wx.
“an? & s
i,
ee ae se
i
-
005 « ;
(ieee
e6tiee Ns
auid.
:-
:
°
a :
wt e
jiose Of ele Dirth .o8 “gea Tieds ware dG brane documeda Uapeyie il
cCineowty
rhe re aaa
TO
thie
—— ante as
ldcudea?
any
eure
:
Ac, ais
aadel
caxvtiPitete
a
ta
very. i
far,
rt.
ee
a
itieipts
Bio
cate
4
re
e
The
mas Vie
~
wa
—_ >
and Bnkeve) ve egal
ay cone Sel oe +
ceed
A
:
aii
ae eee
aD
ive
af thio
gi
7
e sk