Pinero v. Jackson Hewitt Tax Service Inc. et al

Filing 1

COMPLAINT with Jury Demand against Jackson Hewitt Tax Service Inc., Jackson Hewitt Inc, Crescent City Tax Service, Inc. (Filing fee $ 350.) filed by Vicki L. Pinero. (Attachments: # 1 Exhibit A pt 1, # 2 Exhibit A pt 2, # 3 Exhibit B, # 4 Exhibit C, # 5 Exhibit D, # 6 Exhibit E, # 7 Exhibit F pt 1, # 8 Exhibit pt 2, # 9 Exhibit G, # 10 Exhibit H, # 11 Exhibit I pt 1, # 12 Exhibit I pt 2, # 13 Exhibit I pt 3, # 14 Exhibit I pt 4, # 15 Exhibit I pt 5, # 16 Exhibit J pt 1, # 17 Exhibit J pt 2, # 18 Exhibit J pt 3, # 19 Exhibit K pt 1, # 20 Exhibit K pt 2, # 21 Exhibit L, # 22 Exhibit M, # 23 Exhibit N, # 24 Exhibit O, # 25 Exhibit P, # 26 Exhibit Q)(rll, ) (Additional attachment(s) added on 5/22/2008: # 27 Civil Cover Sheet) (rll, ).

Download PDF
Identity Fraud Trends and Patterns: Building a Data-Based Foundation for Proactive Enforcement October 2007 Gary R. Gordon, Ed.D. Donald J. Rebovich, Ph.D. Kyung-Seok Choo, Ph.D. Judith B. Gordon, MLS Center for Identity Management and Information Protection Utica College Exhibit J Exhibit J - Part 1 of 2 This project was supported by Grant No. 2006-DD-BX-K086 awarded by the Bureau of Justice Assistance. The Bureau of Justice Assistance is a component of the Office of Justice Programs, which also includes the Bureau of Justice Statistics, the National Institute of Justice, the Office of Juvenile Justice and Delinquency Prevention, and the Office for Victims of Crime. Points of view or opinions in this document are those of the author and do not represent the official position or policies of the United State Department of Justice. © 2007 Center for Identity Management and Information Protection Exhibit J - Part 1 of 2 ii Acknowledgements Several organizations and individuals were instrumental in this project. The authors extend their thanks to the Bureau of Justice Assistance for providing funding, guidance, and direction. The United States Secret Service allowed the authors access to data and space in which to work. Their cooperation, guidance, and support were crucial to the success of this endeavor; the authors owe them a debt of gratitude. Special thanks go to the Criminal Investigative Division staff, as they graciously escorted the authors in and out of the building countless times. The administration of Utica College provided support and grant management. Several Utica College undergraduates worked tirelessly to input the data into the statistical analysis software. About CIMIP The Center for Identity Management and Information Protection at Utica College is a research collaborative dedicated to furthering a national research agenda on identity management, information sharing, and data protection. Founded in June 2006, its ultimate goal is to impact policy, regulation, and legislation, working toward a more secure homeland. CIMIP's partners, LexisNexis, IBM, TransUnion, United States Secret Service, United States Marshal Service, Federal Bureau of Investigation, Utica College, Carnegie Mellon University, Indiana University, and Syracuse University, are committed to working together to provide resources, gather subject matter experts, provide access to sensitive data, and produce results that will be put into action in the form of best practices, new policies, regulations, and legislation, training opportunities, and proactive initiatives for solving the growing problems of identity fraud and theft, secure sharing of information, and information protection. To learn more about CIMIP, visit www.cimip.org. Exhibit J - Part 1 of 2 iii About the Authors Gary R. Gordon, Ed.D., principal investigator, is a professor of Economic Crime Programs at Utica College. In 1988, Professor Gordon developed the first major in Economic Crime Investigation in the United States. He also developed a Master's Degree in Economic Crime Management that commenced in January 1999, using a distance learning format. In 1988, Dr. Gordon founded the Economic Crime Institute (ECI) of Utica College and is its Executive Director. He has coordinated seventeen national conferences focusing on economic crime issues. In June 2006, he founded the Center for Identity Management and Information Protection and serves as its Executive Director. Donald J. Rebovich, Ph.D. is associate professor and chair of the Economic Crime Investigation Program at Utica College. He is the assistant editor of the Journal of Economic Crime Management. His background includes research in identity theft, economic crime victimization, white collar crime prosecution, and multi-jurisdictional task force development. Before coming to Utica College, Professor Rebovich served as research director for the National White Collar Crime Center (NW3C) and for the American Prosecutors Research Institute. Kyung-Seok Choo, Ph.D. is assistant professor and chair of the Criminal Justice Program, at Utica College. His background includes research on Korean gangs and delinquent groups in Korean American communities. He is a recipient of the Morton and Roberta Clayman fellowship, through which he researched gangs and immigrant youth. He is also actively involved in research on sex trafficking of Korean women to the United States. Judith B. Gordon, MLS is the program administrator for CIMIP. In addition to being a researcher, she manages CIMIP's research projects, and coordinates the researchers' activities. She is a contributing author of the LexisNexis/Economic Crime Institute (ECI) white paper: Identity Fraud: A Critical National and Global Threat and has been involved in researching the three additional white papers supported by LexisNexis and ECI. Exhibit J - Part 1 of 2 iv Table of Contents Executive Summary .............................................................................1 Introduction ........................................................................................6 Goals and Value of the Study ......................................................... .......9 The Empirical Approach ............................................................ .........10 Identity Theft Definition .....................................................................10 Source of Data ................................................................................10 Elements Collected ..........................................................................10 Data Analysis .................................................................................11 Excluded Cases ..............................................................................11 Data Limitations ..............................................................................12 Findings ............................................................................................13 The Case ......................................................................................14 Secret Service Case Classification ...................................................14 Secret Service Regions .................................................................16 Case Referral .............................................................................................17 Jurisdiction ..................................................................................20 Federal Statutes Violated ...............................................................21 State Statutes Violated ...............................................................................22 Disposition ..................................................................................23 Actual Loss .................................................................................................26 Timing of Cases ...........................................................................27 Geographical Scope .....................................................................29 The Case in Summary ...................................................................30 The Offenders .................................................................................31 Gender, Race, Age, Place of Birth ....................................................31 Arrest History ...............................................................................36 Motivating Factors .........................................................................38 An Identity Theft Offender in Summary ..............................................40 The Commission of the Crime ............................................................41 Offenses Facilitated by Identity Theft .................................................41 Exhibit J - Part 1 of 2 v Insider Identity Theft .......................................................................42 Individual Activity vs. Organized Group Activity: Roles...........................43 Offender Methods ......................................................................................47 Utilization of Methods by Offenders ...................................................51 Patterns of Offender Methods ..........................................................52 Points of Compromise ....................................................................53 The Commission of the Offense in Summary .......................................54 Victimization ....................................................................................55 The Victims ..................................................................................55 Methods of Victimization (other than individuals) ..................................56 Offender Relationship to Individual Victims ..........................................57 Defendants Stealing Identifying Information through Employment.............59 Victimization in Summary ................................................................60 Recommendations ..............................................................................................61 Proactive Measures ..........................................................................61 Law Enforcement Training ..............................................................................62 Management of Cases and Resources ...........................................................63 Executive Briefings ......................... ...........................................................63 Future Research ..............................................................................64 Conclusion .........................................................................................65 Appendix: Collection Template ........................................................................68 References ........................................................................................74 Exhibit J - Part 1 of 2 vi List of Figures Figure 1: Most Frequent Primary Case Type .............................................14 Figure 2: Most Frequent Secondary Case Type ................................................15 Figure 3: Secret Service Regions .......................................................................16 Figure 4: Referral to Secret Service ... .....................................................18 Figure 5: Case Jurisdiction ....................................................................20 Figure 6: Most Frequently Violated Federal Statutes ....................................21 Figure 7: Most Frequently Violated State Statutes ......................................22 Figure 8: Months of Incarceration ............................................................23 Figure 9: Months of Probation ................................................................24 Figure 10: Restitution ...........................................................................25 Figure 11: Number of Defendants and Actual Loss .....................................26 Figure 12: Case Duration ......................................................................28 Figure 13: Year the Case Opened ...........................................................28 Figure 14: Geographical Scope ..............................................................29 Figure 15: Characteristics of Offenders ....................................................32 Figure 16: Race by Gender ...................................................................33 Figure 17: Age by Gender .....................................................................34 Figure 18: Age by Race ........................................................................35 Figure 19: Race by Arrest .....................................................................36 Figure 20: Arrest Type ..........................................................................37 Figure 21: Motivating Factors .................................................................38 Figure 22: Offenses Facilitated by Identity Theft .........................................41 Figure 23: Identity Theft at Types of Employment ..............................................42 Figure 24: Number of Defendants ...........................................................44 Figure 25: Offender Methods .................................................................49 Figure 26: Interrelationships among Methods ............................................50 Figure 27: Points of Compromise for Identity Theft .....................................53 Figure 28: Victims by Category ...............................................................55 Figure 29: Methods of Financial Services Industry Victimization ....................56 Figure 30: Offender and Victim Relationships ............................................58 Exhibit J - Part 1 of 2 vii Figure 31: Type of Employment Used to Steal Identities .............................59 Exhibit J - Part 1 of 2 viii Executive Summary The purpose of this study was to provide empirical evidence on which law enforcement can base enhanced proactive identity theft control and prevention efforts. It focuses on identity theft offenders, which sets it apart from previous surveys and other research which have centered on identity theft victims. As a result of the study of closed United States Secret Service cases with an identity theft component (2000-2006), empirical data concerning the key factors relevant to the criminal behavior of identity thieves and the conditions under which that behavior occurs are available to law enforcement agencies and corporate security and fraud investigators for the first time. The results fill a gap identified in the President's Identity Theft Task Force report. The report states, "Unlike some groups of criminals, identity thieves cannot be readily classified. No surveys provide comprehensive data on their primary personal or demographic characteristics" (April 2007, p, 12).This study has gathered and analyzed comprehensive data on identity theft offenders in order to provide both the public and private sectors with information they need to combat these crimes. For the purposes of this study, the definition of identity theft is aligned with that presented in the President's Identity Theft Task Force report, Combating Identity Theft: A Strategic Plan. "Although identity theft is defined in many different ways, it is, fundamentally, the misuse of another individual's personal information to commit fraud" (April 2007, p. 2). Personal information includes name, address, Social Security number, and date of birth, but excludes credit cards, debit cards, and other bank cards. The data for the study was collected at the Secret Service headquarters by the four authors of this report. Seven hundred and thirty four cases with an identity theft component, which were opened and closed between 2000 and 2006, were reviewed; data was collected on 517, as the other 217 were excluded. Findings After the data collection and analysis were completed, the findings were separated into four categories: the case, the offenders, the commission of the crime, and victimization. Highlights of these areas follow. The Case: Case characteristics include Secret Service classification, Secret Service region, referral to Secret Service, jurisdiction, statutes violated, disposition, actual dollar loss, timing and duration, and geographical scope. Many of the cases were classified as "Fraudulent Use of Account Number" and "Identity Theft." The highest percentage of cases was from Region 1 ­ Northeastern United States and were referred to the Secret Service by local or state law enforcement. Exhibit J - Part 1 of 2 1 The cases were referred to the Secret Service from various sources. o Approximately 47% of the cases were referred to the Secret Service by local and state law enforcement agencies. o Corporate security and/or fraud investigators referred 20.4% of the cases. Most cases fell under federal jurisdiction, with 18 USC 1028, Identity Fraud, and 18 USC 1029, Access Device Fraud, most frequently violated. Approximately half of the defendants in the cases were sentenced to incarceration, often in combination with probation, and restitution. The median actual dollar loss was $31,356. The Offenders: The data analysis showed more diversity among the age, race, gender, and criminal backgrounds of offenders than the picture held by conventional wisdom. Most of the offenders ­ 42.5% -- were between 25 and 34 years of age at the time that the case was opened. o The 35 ­ 49 age group made up 33% of the offenders. o 18.5% were between 18 and 24 years old. o The remaining 6% were 50 years old or older. 53.8% of the offenders were black; 38.3% were white. One third of the offenders were female. o Of the females, almost two thirds were black. 24.1% of the offenders were born outside of the United States. 71% of the offenders had no arrest history. o Of those who did, a third were for fraud, forgery, or identity theft or fraud. The most prevalent motive of the offenders was personal gain. It took several forms including using fraudulently obtained personal identifying information to: o Obtain and use credit o Procure cash o Conceal actual identity o Apply for loans to purchase motor vehicles The Commission of the Crime: The data was examined to determine the modus operandi of the offenders, the organized nature of the crimes and offenders, and identity theft through employment. In most of the cases, the identity theft facilitated other offenses. o The most frequent offense that was facilitated by identity theft was fraud. o The next most frequent was larceny. Organized group activity was discerned in 42.4% of the cases ­ involving from 2- 45 offenders. 2 Exhibit J - Part 1 of 2 o The roles that the defendants took varied, but most frequently involved stealing or obtaining personal identifying information and using it for personal gain. o In cases with three or more offenders, there is definite coordination and organization, allowing the group to take advantage of criminal opportunities, to create opportunities for crime, and to avoid detection. In approximately half of the cases, the Internet and/or other technological devices were used in the commission of the crime. o Within the half with no use of the Internet or technology, nontechnological methods, such as change of address and dumpster diving, were used in 20% of the cases. o The limited number of cases opened in 2005 and 2006 prevented any trending analysis of Internet and technological use. The point of compromise for stealing personal identifying information or documents was determined in 274 of the cases. o In 50% of those cases a business (service, retail, financial industry, corporation) provided the point of compromise or vulnerability. o A family member or friend was the point of compromise in approximately 16% of the 274 cases. Approximately a third of the cases involved identity theft through employment. o The most frequent type of employment from which personal identifying information or documents were stolen was retail (stores, car dealerships, gas stations, casinos, restaurants, hotels, hospitals, doctors offices) ­ 43.8% o Private corporations were vulnerable to insider identity theft in about 20% of those cases. Victimization: Although most of the media attention surrounding identity theft and fraud has focused on individuals, they did not make up the largest percentage of victims in this study. Over a third (37.1%) of the victims were financial industry organizations: banks, credit unions, and credit card companies. Individuals accounted for 34.3% of the victims. 21.3% of the victims were retail businesses (stores, car dealerships, gas stations, casinos, restaurants, hotels, hospitals, doctors' offices). Victimization of organizations took several forms: o The financial services industry was most frequently victimized by offenders using fraudulently obtained personal identifying information to obtain new credit card accounts, to apply for and obtain fraudulent loans, to utter checks, and to transfer funds. Exhibit J - Part 1 of 2 3 o The retail industry was victimized by the use of stolen identity information to open store accounts and by purchasing merchandise with fraudulent credit cards. The data show that most individuals were victimized by individuals they did not know. o 59% of the victims did not know the offenders. o 10.5% of the victims were customers or clients of the offender. o 5% of the victims were related to the offender 20.3% of the 939 offenders in the cases committed identity theft at their place of employment. o Of those offenders, 59.7% were employed by a retail business. o 22.2% were employed by a financial services industry organization. The findings presented here must be used to improve and increase proactive measures that law enforcement and fraud investigators use to combat identity theft, including investigation, prevention, detection, and prosecution. The information concerning offender characteristics and modus operandi should be used in law enforcement training. The picture that this study paints of identity theft offenses and offenders should be used in prioritizing and managing cases and resources. Law enforcement executives will be able to use this information to develop policy, allocate resources, and advocate training. Recommendations The recommendations presented here are based on the use of the study's empirical evidence. While conjecture and conventional wisdom may have led to some of the same conclusions in the past, this study allows law enforcement and corporate security leaders and policy makers to point to the data as a basis for implementing them. The data should be used to foster proactive investigation, detection, prevention, and prosecution. Recommendation 1: Local and state law enforcement leaders should encourage more cooperation with federal law enforcement where it has begun and foster it where it is not occurring. Recommendation 2: Law enforcement at all levels should be aware of the offender characteristics and the role of identity theft in other crimes and apply that knowledge to their investigations. Law enforcement should continue to share the information they find with corporate entities, such as the financial services industry, so that prevention and detection strategies can be enhanced. Recommendation 3: The findings of this research study regarding federal and state statutes and disposition should be used as a basis on which to build policy and practice in prosecuting identity theft at all levels. Exhibit J - Part 1 of 2 4 Law enforcement training programs will benefit from the knowledge gained from the empirical findings. Recommendation 4: The findings should be infused into the many fine existing training programs to move beyond assumptions and anecdotes and gain a greater understanding of identity theft. These findings provide the information law enforcement managers need to assign resources and prioritize cases. Recommendation 5: The findings of this study should be reviewed by law enforcement executives to gain a broader picture of where to focus their resources to combat identity theft. Recommendation 6: So that law enforcement agencies at all levels can share case information, collaborate on investigations, and better prioritize and manage their cases and resources, standardized case classifications should be established. Based on the empirical findings, consideration should be given to including identity theft as a primary classification code. Executive briefings will allow law enforcement executives to develop policy, allocate resources, and advocate training based on empirical research. Recommendation 7: A briefing on the research findings which will aid law enforcement executives in developing and implementing policies and procedures for investigation and prosecution of identity theft crimes should be made available. Recommendation 8: A briefing on the research findings which will provide law enforcement executives with cutting edge information to share with corporations should be made available. This study should be used as a model for a series of research studies. Recommendation 9: This model for research should be applied to cases held by local, state, and other federal law enforcement agencies. Recommendation 10: Building on the baseline created through this research, further longitudinal study of Secret Service closed cases with an identity theft component should be undertaken to determine trends and patterns of the crime in the near past and to anticipate future trends and areas of vulnerability. The authors anticipate that this groundbreaking study will make a difference in the prevention, detection, investigation, and mitigation of identity theft and fraud crimes. The empirical results regarding identity theft offenders and offenses will provide the basis for proactive procedures, policies, training, and management of resources. The continuation of this study to Secret Service cases that have closed since 2006 will allow the authors to complete trending analysis, so that predictions can be made and actions taken. Exhibit J - Part 1 of 2 5 Introduction The purpose of this BJA funded project is to identify patterns and trends of identity theft, so that public law enforcement and private sector security departments will have added knowledge to apply to a proactive means of thwarting this insidious crime. While statistics and anecdotes abound regarding identity theft victims, there has been little research into the trends and patterns of the crime, characteristics of the offenders, and methods used by individual criminals, as well as organized crime activity. Societal perceptions about identity crimes are based on a combination of notorious case incidents, broadcast vignettes depicting the unfortunate experiences of the victims, media announcements cautioning against behavior that may precipitate victimization, and, quite often, word-of-mouth. This information can have a powerful impact on the manner in which the general public synthesizes the information and draws conclusions about the actual level of danger the crime poses to them. In other words, assumptions become reality. While no less than a decade ago "identity theft" was apt to be met with curiosity and some bewilderment, it has become one of the most recognizable crime terms of the 21st century. Even so, questions remain regarding what it really represents, what type of person is most likely to commit this crime, what criminal methods are most commonly (and successfully) employed, and who is in most jeopardy of being victimized. In order to contain and prevent identity theft, these questions must be answered through an "empirical" approach, anchored in a thorough analysis of criminal justice system data. Law Enforcement and the Challenges Identity Theft Presents The United States Secret Service is actively involved in the investigation and prosecution of identity theft and fraud crimes. According to its website (www.secretservice.gov/criminal.shtml): Identity crimes are defined as the misuse of personal or financial identifiers in order to gain something of value and/or facilitate other criminal activity. The Secret Service is the primary federal agency tasked with investigating identity theft/fraud and its related activities under Title 18, United States Code, Section 1028. Identity crimes are some of the fastest growing and most serious economic crimes in the United States for both financial institutions and persons whose identifying information has been illegally used. The Secret Service records criminal complaints, assists victims in contacting other relevant investigative and consumer protection agencies and works with other federal, state and local law enforcement and reporting agencies to identify perpetrators. Exhibit J - Part 1 of 2 6 Similar information can be found on the websites of the United States Postal Inspection Service, the Federal Bureau of Investigation, the Federal Trade Commission, the Social Security Administration, the Department of Justice, many state police departments, several local police departments, and the numerous not-for-profit organizations devoted to combating identity theft and helping citizens to recover from it. Identity crimes are far reaching, as the attention given to it by government entities, the businesses that have emerged in an effort to thwart it, and the many stories from the media indicate. Statistics from Consumer Sentinel, the database of complaints maintained by the Federal Trade Commission, indicate that the highest percentage of complaints received in 2006 (36%) were concerning identity theft (http://www.ftc.gov/opa/2007/02/topcomplaints.shtm). Since 2001, the same has been true; the highest percentage of complaints received during each year concerned identity theft. President George Bush established the President's Task Force on Identity Theft in May 2006 by Executive Order 13402. The Task Force report (April 2007, p. 1) states, "The problem of identity theft has become more complex and challenging to the general public, the government, and the private sector." While the Internet, with its chat rooms, electronic banking and payments, phishing and pharming, malware and Spyware, and pretexting, has certainly added a dimension to the crime, the basics are also still employed by identity thieves: common theft, mail theft and change of address, dumpster diving, database and network hacking, and insider theft. The purposes for which identity thieves can use the stolen personal identifier information has been exacerbated by the Internet, as online credit applications, purchases, bank transfers, and the like eliminate the need for face to face contact. Law enforcement is, of course, faced with the challenges that the growing complexity of the crime presents. Those challenges are compounded by the lack of empirical data showing trends and patterns. According to the FTC, in 2006 62% of the identity theft victims who made reports on the FTC website did not notify a law enforcement agency. In a February 2005 article from The Police Chief, "Identity Theft and Police Response: Prevention," the author, Ed Dadisho of the Los Angeles Police Department, states, "Statistics on identity theft are useful for law enforcement agencies in many ways and can determine trends in suspect methodology, victim thought processes, and consolidation of resources to combat identity theft." He goes on to say, "One of the most important ways to prevent identity theft is to educate police officers on the latest techniques to recognize during traffic stops and other detentions." Such proactive strategies and training require knowledge gathered from research studies such as this one, in which closed United States Secret Service cases involving identity theft were studied and analyzed. For example, it is essential for law enforcement to understand the nature of identity thieves. The President's Identity Task Force Report states, "Unlike some groups of criminals, identity thieves cannot be readily classified. No surveys provide comprehensive data on Exhibit J - Part 1 of 2 7 their primary personal or demographic characteristics. For the most part, victims are not in a good position to know who stole their information or misused it" (April 2007 p. 12). Exhibit J - Part 1 of 2 8 Goals and Value of the Study The mission of this project is to use the compilation of study results as a compass by which law enforcers can navigate through the fog of past conjecture to proactively facilitate effective identity theft enforcement efforts. The analysis of the data will lead to a fuller realization of trends, patterns, and groups perpetrating identity theft. It is the first step toward what is meant to be a successive series of like endeavors gauging the evolution of identity theft as a distinct crime type. They will assist law enforcement administrators, at all government levels, in creating and implementing policies for effective investigation and prosecution of identity theft. The project was guided by four goals which were intended to provide the law enforcement community with the robust empirical information necessary to enhance identity theft control and prevention efforts. Goal: To explore and identify, from a national perspective, key identity theft offense, offender, and case characteristics. Goal: To collect and analyze criminal case data for the purpose of establishing an empirically-based profile of identity theft offense, offender, and case characteristics. Goal: To isolate those empirically obtained offense, offender and case factors that accurately represent the challenges to effective identity theft control and prevention. Goal: To convert the aggregation and analysis of identity theft crime case data into a substantive and formative guide to aid the successful control and prevention of identity theft. The findings of this study will provide reliable information that can be used to improve law enforcement methods. This project stands as an example of applied research in its truest sense, in that it is the planned collection and analysis of criminal justice data regarding identity theft in order to assist the law enforcement community in making informed decisions. The findings on offender characteristics, modus operandi, and the varied reactions of the criminal justice system to these offenses can sensitize law enforcement to early warning signs of the complexities of identity theft cases, preparing them for the investigative road ahead. This study supplies something to the law enforcement community that, heretofore, has not been available: a scientific presentation of the key factors relevant to the criminal behavior of identity theft and the conditions under which that behavior occurs. In the final analysis, the true worth of the study will be measured by the extent to which the consumers of the information maximize the findings to affect control of the commission of identity theft. Exhibit J - Part 1 of 2 9 The Empirical Approach The primary aim of this project was to perform an exploratory quantitative and qualitative analysis of United States Secret Service closed cases to detect and synthesize identity theft patterns and trends. The researchers had no preconceived notions at the onset of the research, and did not test hypotheses. The process consisted of three steps: initial exploratory analysis of cases; iterative collection and analysis of the cases; and intensive data analysis to determine patterns. Identity Theft Definition In the report of the President's Task Force on Identity Theft, identity theft is defined in this way, "Although identity theft is defined in many different ways, it is, fundamentally, the misuse of another individual's personal information to commit fraud" (April 2007, p. 2). Although there is ongoing debate concerning the definition of identity theft, for the purposes of this study, the researchers agree with the Task Force definition, but consider personal information to be personal identifying information -- name, address, Social Security number, date of birth, which may be included on documents such as driver's licenses and birth certificates. Access devices ­ credit cards, debit cards, ATM cards ­ are excluded. While the theft of a credit card may result in fraudulent charges, it does not result in the theft of an identity. The Task Force report agrees: "For example, a stolen credit card may lead to thousands of dollars in fraudulent charges, but the card generally would not provide the thief with enough information to establish a false identity" (p. 3). Source of Data The data for this study was collected from United States Secret Service closed cases with an identity theft component which were opened and closed between 2000 and 2006. The staff at Secret Service headquarters selected the cases for the research team, based on the primary and secondary case codes that Secret Service uses to classify its cases. Seven hundred and thirty four cases were made available. The cases consisted of compilations of e-mail communications from the field office to headquarters, generally from one agent, throughout the duration of the case. The research team, working at Secret Service Headquarters in Washington, D.C., collected data on 517 of these, as the other 217 were excluded (see below). Elements Collected The researchers independently reviewed several of the same cases to determine which elements were of importance. They then came to consensus on the elements, based on the goals of the study and the available data. The elements Exhibit J - Part 1 of 2 10 were categorized and arranged in a template to assure uniformity in data collection. (See Appendix A.) As the cases focused on the offenders and the offense, the team chose several demographic and characteristic elements, including sex, race, date of birth, place of birth, and criminal history. The characteristics of the offense included the Secret Service classification and region, the actual loss, jurisdiction, statutes violated, disposition, the way in which the case was referred to the United States Secret Service, and details of the case including a summary of the file's case notes, the defendants' roles and relationships to the victim, the methods used, the number of defendants (including organized group activity), the geographical scope, and the victim, i.e. individual, government agency, etc. Data Analysis Upon completion of the collection phase, the data was inputted into statistical analysis software. The initial univariant analysis was studied and discussed by the research team to discern significant findings and determine further detailed analysis. The process was repeated so that patterns and trends could be discerned and useful information could be provided for law enforcement and corporate security organizations. The summaries of the agent's case notes were studied using content analysis tools. As initial content analysis was completed, it was discussed to determine further analysis. Excluded Cases 29.6% per cent of the 734 cases available to the team were determined to be outside the definitional scope of this study. The factors used to exclude a case were: Existing account fraud: The team determined before beginning data collection that cases which dealt solely with existing account fraud where personal identifying information was not used would be eliminated. The President's Task Force Report defines existing account fraud as follows, "This occurs when thieves obtain account information involving credit, brokerage, banking, or utility accounts which are already open" (April 2007, p. 3). No discernible connection to identity theft. Cases that were opened before 2000. Exhibit J - Part 1 of 2 11 Data Limitations The data used in this study was collected from Secret Service cases related to identity theft that were opened and closed between January 2000 and March 2007 and made available to the research team. These cases were referred to and accepted by the Secret Service during that time period. This data does not represent all of the identity theft cases that were investigated and prosecuted during this time period by the Secret Service and other law enforcement agencies. The characteristics of cases that were not referred to and/or accepted by the Secret Service, but investigated by local or state law enforcement or another federal entity (e.g. USPIS, FBI), may differ, as may conclusions drawn from them concerning trends and patterns. However, the differences may not be great and the findings of this study should be applied to state and local law enforcement efforts. The researchers recognize that there is an unknown figure of identity theft crimes. Exhibit J - Part 1 of 2 12 Findings The data collected has been separated into four categories: the case, the offenders, the commission of the crime, and victimization. The variables within each are reported and explained in this section. The following characteristics of the case were examined: The way in which the Secret Service classified the case The distribution of the cases among the Secret Service regions The way in which the case was referred to the Secret Service The jurisdiction under which the cases fell The federal and state statutes that were violated The disposition of the case: incarceration, probation, restitution The actual dollar loss The timing and duration of the cases The geographical scope: local, state, interstate, international The offender characteristics analyzed were: Demographics o Gender o Age o Race Arrest History o Types of offenses Motivating Factors In analyzing the commission of the crime, the following characteristics were studied: Offenses facilitated by identity thefts Individual activity versus group activity and the roles the offenders took Offender Methods: Internet, technological, and non-technological o Utilization of methods by offenders o Patterns Point of Compromise Victimization characteristics included: The victims: organizations and individuals Methods of victimization (other than individuals) Offender relationship to individual victims Identity theft through employment Exhibit J - Part 1 of 2 13 The Case Secret Service Case Classification The Secret Service classifies its cases by primary and secondary code types. Each case is assigned one primary code when it is opened, based on the initial facts of the case. As the case evolves, secondary case codes are added. The agent in charge of the case and the office manager determine what codes to assign. When the case is sent to Secret Service headquarters, the classifications are reviewed and adjusted if necessary. Figure 1 displays the most frequent primary case types represented by the 517 cases. Fifty per cent of the cases were classified as Fraudulent Use of Account Numbers, Fraudulent Access Device Applications, Stolen Bank Issued Cards, Financial Institution Fraud (FIF) Involving Check Fraud, Counterfeit Bank Issued Credit Cards, Counterfeit Commercial Checks, and Counterfeit State Driver's licenses. A quarter of the cases (listed as other) were of primary code types ranging from altered documents to other counterfeit documents to various types of financial institution fraud. Figure 1. Most Frequent Primary Case Type Primary Case Type Description Fraudulent use of account number Fraudulent access device Stolen Bank issued cards All other cases involving FIF* investigation FIF* involving check fraud Counterfeit Bank issued card Counterfeit commercial checks Counterfeit State Driver Licence Fraudulently obtained Genuine ID/Social Security Card Manufacturing commercial/counterfeit check Account takeover access/bank card Stolen/Forged commercial/personal check Fraudulent retail business card application All Others Total *FIF=Financial Institution Fraud Frequency 78 58 36 35 34 27 23 22 19 15 14 12 11 133 517 Percent 15.1 11.2 7.0 6.8 6.6 5.2 4.4 4.3 3.7 2.9 2.7 2.3 2.1 25.7 100.0 Exhibit J - Part 1 of 2 14 Figure 2 shows the most frequent secondary case types. The numbers exceed the total number of cases because more than one secondary case type can be assigned to a case. Identity Fraud, which the Secret Service defines as the misuse of personal or financial identifiers for personal gain or to facilitate other criminal activity, was listed as a secondary case type in 87.2% (451) of the 517 cases. Significant Community Impact, which was a secondary code in 51.5% of the cases, is based on the number of people and/or accounts that are involved and the potential impact of the crime. Figure 2. Most Frequent Secondary Case Type Secondary Case Type Description Identity Fraud Significant Commuity Impact Crimes Involving Use of Evolving Technology Domestic Multi-District Counterfeit State Drivers Licenses All Other Non-Prioritization Investigations Organized Crime Groups All Other Task Forces Fraudulent Use of Account Numbers Fraudulent Access Device Applications Electronic Crimes Task Force Financial Crimes Task Force Fraudulent Retail Business Card Applications Transnational Criminal Activity Fraudulently Obtained Genuine ID Conterfeit Social Security Cards Stolen Bank Issued Cards Counterfeit Bank Issued Credit Cards Drug Related (Non-Task Force) Frequency 451 264 163 100 70 67 60 49 46 40 37 37 30 24 24 20 18 8 8 Percent 87.2 51.5 31.5 19.3 13.5 12.9 11.6 9.5 8.9 7.7 7.2 7.2 5.8 4.6 4.6 3.9 3.5 1.5 1.5 Exhibit J - Part 1 of 2 15 Secret Service Regions Each of the cases was housed in a regional or field office. These offices are in one of four regions designated by the Secret Service. Region 1 encompasses the Northeastern United States, Europe, Russia, and South Africa. Region 2 is comprised of the Midwest United States and Canada. The Southern United States, South America, and Central America make up Region 3. The 4th region includes the Western United States and Far East. Figure 3 shows that of the 517 cases, 35.2% (182) were from Secret Service field offices in Region 1, the Northeastern United States (180) and Europe (2). 28.8% (149) came from Secret Service field offices in the Southern United States. Eighty eight of the cases were from Secret Service field offices in the Midwestern United States and five were from Canada, for a total of 18% from Region 2. The cases from the Western United States (93), Region 4, made up18% of the total. None of those was from the Far East. Figure 3: Secret Service Regions N=517 Region 4 Western U.S. . 93 (18&) Region 1 . Northeastern U.S. 182 (35.2%) Region 3 Southern U.S. 149 (28.8%) Region 2 Midwest U.S. 93 (18%) Exhibit J - Part 1 of 2 16 Case Referral In each case file, the way in which the case was referred to the Secret Service was identified. The Secret Service was brought in through several channels, categorized as follows: Victim Individual other than the victim o Includes anonymous tip, attorney, defendant turning himself in, confidential informant, private investigator, witness Local or state law enforcement agencies o Includes local and county police departments, local and county sheriff's offices, state police, district or state attorney Federal agencies o Includes Secret Service headquarters, field or regional offices, FBI, DEA, ATF, etc. Task forces o Counterfeit Crimes o Economic and Identity Crimes o Electronic Crimes o Financial Crimes o Identity Theft o Organized Crime Private sector security/fraud investigation o Includes card processors, corporations, credit card companies, financial institutions, nursing homes, retail establishments, small business, higher education Exhibit J - Part 1 of 2 17 Figure 4 shows that the largest percentage of the cases was referred to the Secret Service by local or state law enforcement: 246 cases or 47.6%. The identity theft or fraud was discovered during a routine traffic stop in 20 of those cases. (This may also have been the case in many of the others; the case files did not always indicate how law enforcement became involved.) The next most frequent referral is from private sector security and/or fraud investigations: 20.3% (105). 14.3% (74) of the cases were referred from other federal agencies. Within that category, 29 of the cases were brought to the Secret Service by the United States Postal Inspection Service. In 10.6% of the cases (55), the victim contacted the Secret Service directly. Figure 4. Referral to Secret Service N=517 Individual Other than Victim Victim 18 (3.5%) 55 (10.6%) Missing 3 (0.6%) Federal Agency 74 (14.3%) Private Sector Security/ Fraud Investigatiion 105 (20.3%) State or Local Enforcement 246 (47.8%) 16 (3.1%) Task Forces Exhibit J - Part 1 of 2 18 Case Referral: Local Law Enforcement In this case from Region 2 (Midwest U.S.) the defendant was involved in a car accident. During the accident investigation, counterfeit personal checks, counterfeit identification, and a computer disk containing templates for U.S. Treasury checks, IRS refund checks, Social Security cards, and state drivers licenses were found. The detective from the local police department notified the Secret Service Financial Crimes Task Force. When interviewed, the defendant admitted that he had used the computer to commit several crimes. He obtained a LexisNexis account number from an attorney friend and used it to obtain Social Security numbers. He said he "hacked" into a military site where he accessed over 100 Social Security numbers. He made counterfeit Social Security cards and sold them to illegal immigrants. He used counterfeit bank checks and false identification to purchase a vehicle. The case was tried under state jurisdiction using a statute related to the interstate transportation of stolen property. The defendant, who had no arrest history, was sentenced to two years of incarceration and three years of probation. Exhibit J - Part 1 of 2 19 Jurisdiction The jurisdiction of each case was dependent on the U.S. Attorney's Office in the area. Each office has guidelines for cases it will prosecute. Secret Service cases often start as state cases, but as the investigation evolves, they meet the thresholds for a federal case and the state charges are dropped. As shown in Figure 5, the jurisdiction for the majority of the cases was federal: 320 out of 499 (64.1%). Individual states had jurisdiction in 30.9% (154) of the cases; 3.8% (19) were a combination of state and federal; and the jurisdiction of 6 cases (1.2%) was outside the United States. In 18 cases, the jurisdiction was not made available. Of the 320 cases with federal jurisdiction, 41.8% (134) were referred to the Secret Service from local or state law enforcement. Ninety two (59.7%) of the state jurisdiction cases were referred from local or state law enforcement. In many of these cases, victims were in one state and offenders in another. N=499* Figure 5. Case Jurisdiction 300 320 (64.1%) 200 154 (30.9%) 100 19 (3.8%) 0 Federal State Federal and State 6 (1.2%) Foreign *18 cases are excluded. Exhibit J - Part 1 of 2 20 Federal Statutes Violated While in the past, identity theft cases were more apt to be prosecuted using mail and wire fraud statutes, Figure 6 shows that within the cases under federal and federal and state jurisdiction (339), federal statute 18 USC 1029 -- Fraud and related activity in connection with access devices -- was violated 161 times. Federal statute 18 USC 1028 -- Fraud and related activity in connection with identification documents, authentication features, and information ­ was violated 133 times. This may indicate that prosecutors have become more willing to use these relatively new statutes. It should be noted that in most cases, more than one statute was violated, though not all were charged, and that more than one statute under the larger designation, such as 18 USC 1029, may have been violated. Seventy eight of the violations were of 18 USC 1344 ­ Bank Fraud. Misuse of Social Security Number, 42 USC 408(a)(7)(B), was noted in 49 of the cases. Figure 6. Most Frequently Violated Federal Statutes N 18 USC 1029 18 USC 1028 18 USC 1344 42 USC 408 (a) (7) (B) 18 USC 371 18 USC 1341 18 USC 1343 Access Device Fraud ID Fraud Bank Fraud Misuse of SSN Conspiracy to Commit Access Device Fraud Mail Fraud Wire Fraud 161 133 78 49 44 28 28 Exhibit J - Part 1 of 2 21 State Statutes Violated In the 173 cases that came under state jurisdiction or federal and state jurisdiction, several statutes in each state were violated. These statutes were placed into 15 categories, as shown in Figure 7. As with the federal statutes, in many cases more than one statute was violated and more than one statute within each category could be charged. The most frequent type of state statute violated was identity theft/fraud, followed by theft/larceny/stolen property and forgery. Credit card fraud statutes were violated 55 times. Statutes in these four categories were violated a total of 267 times. Figure 7. Most Frequently Violated State Statutes N Identity Theft/Fraud Theft/Larceny/Stolen Property Forgery Credit Card Fraud Bank/Check Fraud Unspecified Fraud Conspiracy/RICO Criminal Impersonation Drugs Counterfeiting Computer Crime Miscellaneous Tampering Weapons Assault, Violent Crimes 82 69 61 55 17 13 11 10 10 7 6 6 6 4 2 Exhibit J - Part 1 of 2 22 Disposition Dispositions included incarceration, probation, restitution, and fines. There were 933 defendants in the 517 cases in this study. Four hundred and seventy nine (51.3%) of the defendants received a sentence of incarceration; however, the term of incarceration was not collected for 43 individuals. The majority of defendants whose sentences were known (54.8%) received a sentence of 24 months or less, as shown in Figure 8. Of the 479 defendants sentenced to incarceration, 67.4% (323) were federally prosecuted; 26.7% (128) were prosecuted under state jurisdiction. Five percent (24) were prosecuted using both federal and state statutes; .8% (4) received incarceration in a foreign jurisdiction. These percentages align with the percentage of cases that fell under each jurisdiction. Figure 8. Months of Incarceration N=436* 61 to 72 2.5% Over 72 8.0% 49 to 60 6.0% Upto 12 28.9% 37 to 48 12.4% 25 to36 16.3% 13 to 24 25.9% * 43 unspecified cases are excluded Exhibit J - Part 1 of 2 23 Federal Jurisdiction, 18 USC 1028 and 1029, Incarceration In this case, which was referred to the Dallas, Texas field office by a local police department, the defendant confessed to stealing personal identifier information from members of the athletic club where he worked. Using the information, he produced counterfeit identification document on his home computer and opened numerous credit accounts. He purchased merchandise with the fraudulent accounts and sold it to friends at a discount. His arrest history included misdemeanor theft and possession of marijuana. He was charged with both 18 USC 1028 and 1029 and was sentenced to 15 months incarceration, 36 months probation, and $54,720 in restitution. Four hundred and eighty (51.4%) defendants received a sentence of probation; the term was not collected for three of them. Figure 9 depicts the range of probation sentences and the frequency. Of the known probation sentences, the majority 60.6 % (289) received a 25 to 36 month probation term. 21.8 % (104) of the defendants received a probation sentence between 37 and 60 months. A small percentage, 1.5 %, (7) received over 60 months. The remainder (16.4%, 77) received a sentence of up to 24 months. Figure 9. Months of Probation N=477* Over 60 1.50% Upto 24 16.10% 37 to 60 21.80% 25 to 36 60.60% *3 unspecified cases are excluded Exhibit J - Part 1 of 2 24 In most cases, those sentenced to incarceration also received a period of probation. Three hundred and eleven, or 65%, of the 479 defendants who received incarceration were also given probation. One hundred and sixty nine defendants (18%) were sentenced to probation with no incarceration. Three hundred and sixty one (38.7%) of the 933 defendants were ordered to pay restitution. In most cases, the amount of the restitution was congruent with the reported actual loss. Figure 10 illustrates the restitution ranges and the frequency in each grouping. One hundred and fifty six of those (43.2%) who received restitution sentences were required to pay less than $20,000. Figure 10. Restitution N Up to 10,000 10,001 to 20,000 20,001 to 30,000 30,001 to 40,000 40,001 to 50,000 50,001 to 60,000 60,001 to 70,000 70,001 to 80,000 80,001 to 90,000 90,001 to 100,000 Over 100,000 Total 97 59 45 34 16 16 14 2 9 4 65 361 Percent 26.9% 16.3% 12.5% 9.4% 4.4% 4.4% 3.9% .6% 2.5% 1.1% 18.0% 100.0% Two hundred and twenty four defendants were sentenced to both incarceration and probation and were required to pay restitution. In some cases, defendants received probation and restitution. In a few, the defendant's only sentence was restitution. Exhibit J - Part 1 of 2 25 Actual Loss The amount of loss caused by the cases varied greatly, from no dollar loss in 34 to $13,000,000 in one case. In 47 cases, the actual loss was not available to the researchers. The median loss among the cases was $31,356. As shown in Figure 11, the actual loss varied with the number of defendants in the case. The median loss in cases where the offender worked alone was $22,526. That figure rose to $42,710 in cases with two defendants, and to $84,439 in cases with 5. Figure 11. Number of Defendants and Actual Loss* Actual $ Loss # of Defendants 1 2 3 4 5 6 or more Total N 268 109 37 18 17 21 470 % of Total N 57.0% 23.2% 7.9% 3.8% 3.6% 4.5% 100.0% Median $22,526 $42,710 $31,532 $48,547 $84,439 $150,000 $31,356 *47 unknown cases are excluded Exhibit J - Part 1 of 2 26 Actual Loss: the Extremes In a case representative of a zero dollar loss, a Houston area task force was contacted by a bank fraud investigator concerning an employee of the bank who was involved in a fraudulent transaction. The bank employee, the single defendant in the case, applied for and received a loan in another individual's name. When the car dealership refused the loan check because it was not made out in the defendant's name, he attempted to deposit it into his account at the bank where he was an assistant manager. He had applied for the loan online, using the victim's Social Security number, date of birth, and home and work phones. The defendant changed the victim's first name from Jane to Jan, and used his own address and utility bill. The victim was unaware of the car loan, but knew that someone had attempted to apply for a credit card using her personal identifiers. In the case where the actual loss was $13,000,000, a bank investigator contacted the Dallas Secret Service field office concerning a case of identity theft related to bank fraud. The defendant, acting alone, used false information about his identity and financial status to receive millions of dollars of loans to purchase luxury vehicles. He used the identity of a person serving life in prison for several of these, as well as to open credit accounts and buy two houses. He also used the identities of incarcerated individuals to establish several shell companies and attract investors, whom he subsequently defrauded. Timing of Cases For the purposes of this study, case duration is defined as the time between the dates that the case was opened and closed by the Secret Service. Figure 12 shows that the duration for the majority of the cases was two years or less ­ 365 of 517 cases or 70.6%. Figure 13 shows that most of the cases in the study were opened in 2002 (30.4%,156) and 2003 (25.7%,132). Exhibit J - Part 1 of 2 27 Figure 12. Case Duration N=517 200 204 150 161 100 92 50 44 16 0 Less 1 yr 1 to 2 yr 2 to 3 yr 3 to 4 yr More 4 yr Figure 13. Year the Case Opened N=514* 150 156 (30.4%) 132 (25.7%) 100 80 (15.6%) 50 64 (12.5%) 59 (11.5%) 0 14 (2.7%) 2000 2001 200 2 2003 2004 2005 9 (1.8%) 2006 * 3 missing cases are excluded Exhibit J - Part 1 of 2 28 Geographical Scope Data was collected concerning the geographic range of the cases. If the offenders and their victims were located in one place, such as a metropolitan area, the case was considered "local." If they operated in several cities and towns within one state, the designation was "within state." "Interstate" was for cases in which the offenders operated in more than one state or in which the offenders were in one state or states and the victims in another state or states. In "international" cases the offense reached from the United States to another country. As shown in Figure 14, the cases were fairly evenly divided among local, state, and interstate. Figure 14. Geographical Scope N=517 International 27 (5.2%) Local Interstate 181 (35%) 173 (33.5%) Within state 136 (26.3%) Exhibit J - Part 1 of 2 29 The Case in Summary Based on the findings, a typical closed Secret Service case involving identity theft was referred to a field or regional office in Region 1 (Northeastern United States and Europe) by local or state law enforcement. The case was opened in 2002 or 2003 and closed within two years, and its geographical scope was local or interstate. The case's primary classification was Fraudulent Use of Account Numbers, with a secondary classification of Identity Theft. The jurisdiction was federal and either 18 USC 1029 or 18 USC 1028 was violated. The actual loss was $20,000 or less. At least one defendant was convicted and given a sentence including incarceration of 24 months or less, probation of 2 -3 years, and restitution less than $20,000. The following case illustrates this, with the exception of the referral to the Secret Service. A "Typical" Case The victim contacted the Newark, New Jersey field office in August 2002. He reported that he had received numerous credit card account statements from retail stores, none of which he had authorized. The case's primary classification was Fraudulent Use of Account Numbers. One of the secondary classifications was Identity Fraud. The defendant had purchased a birth certificate and W-2 form in the name of the victim. He used those to obtain a duplicate driver's license, which he used to open store credit card accounts in the local area. The actual loss was $13,175. The case fell under federal jurisdiction. The defendant pled guilty to charges of 18 USC 1029(a)(2), Access Device Fraud, and was sentenced to 18 months in prison, 3 years of probation, and ordered to pay $13,175 in restitution. The case was closed in March 2004. Exhibit J - Part 1 of 2 30 The Offenders In order to gain a greater understanding of the type of individual who is likely to commit identity theft, data collected on the offender included gender, race, age at the time the Secret Service case was opened, and place of birth. Information was also gathered from the files concerning arrest history and the types of prior offenses, and motivating factors. Gender, Race, Age, Place of Birth Within the 517 cases included in this study, there were 933 defendants or offenders. As Figure 15 indicates, 67.4% (627) of the offenders were male. Females accounted for a sizable minority of 32.6% (303).The gender of three of the offenders was not made available. Also included in Figure 15 is the distribution of age, race, and whether or not the defendant had an arrest history. The age statistics are based on the age of the defendant during the year in which the case was opened. Information on the age of 116 offenders was not made available. The largest percentage of offenders ­ 42.5% -- were between 25 and 34 years of age (347). The 35 ­ 49 age group made up 33% of the offenders (270). 18.5% (151) were between 18 and 24 years old. The remaining 6% (49) were 50 years old or older. The majority of the offenders were black: 53.8% (467). White offenders accounted for 38.3% (332). 4.8% (42) of the offenders were Hispanic and 3.1% (27) were Asian. The race for 65 of the offenders was not made available. Information on arrest history was available for 922 of the defendants. Most of them ­ 71% (655) did not have any prior arrest history, while 29% (267) did. Exhibit J - Part 1 of 2 31 Figure 15. Characteristics of Offenders Total Gender Male Female Age 18-24 25-34 35-49 50-64 65 or older Race White Black Hispanic Asian Arrest Yes No Number 933 627 303 Subtotal 930 a Percent 100% 67.4% 32.6% 100%* 18.5% 42.5% 33.0% 5.1% 0.9% 100%* 38.3% 53.8% 4.8% 3.1% 100%* 29% 71% 100%* 151 347 270 42 7 Subtotal 817 b 332 467 42 27 Subtotal 868 267 655 Subtotal 922 d c * % calculation in each variable excludes unknown cases a. 3 unknown due to various reasons b. 116 unknown due to various reasons c. 65 unknown due to various reasons d. 11 unknown due to various reasons Information on the offenders' place of birth was available for 660 offenders. While a clear majority of these offenders was born in the United States, almost one quarter (24.1%, 159) were not. The top five countries represented were Mexico (21), Nigeria (20), the United Kingdom (12), Cuba (11), and Israel (7). Exhibit J - Part 1 of 2 32 Figure 16 shows that there is a relationship between race and gender among the offenders. Most of the female offenders were black 61.6% (172). 30.8% (86) were white. Of all white offenders, 25.9% were female, as opposed to the black offenders where 36.9% were female. The distribution of blacks and whites among male offenders was more even ­ 41.8% (246) of the males were white; 50% (294) were black. Figure 16. Race by Gender Gender Race White Count % within Race % within Sex % of Total Black Count % within Race % within Sex % of Total Asian Count % within Race % within Sex % of Total Hispanic Count % within Race % within Sex % of Total Total Count % of Total Male 246 74.1% 41.8% 28.4% 294 63.1% 50.0% 33.9% 19 70.4% 3.2% 2.2% 29 69.0% 4.9% 3.3% 588 67.8% Female 86 25.9% 30.8% 9.9% 172 36.9% 61.6% 19.8% 8 29.6% 2.9% .9% 13 31.0% 4.7% 1.5% 279 32.2% 4.8% 867 100.0% 3.1% 42 53.7% 27 38.3% 466 Total 332 Percentages and totals are based on responses. Exhibit J - Part 1 of 2 33 A more detailed analysis provides some insight into the

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?