Document & Financial Crimes

The Document and Financial Crimes Unit is composed of ten sworn detectives, one civilian police investigator, and a sergeant. They are charged with the investigation of most of the crimes listed below. The following information is intended to better inform you of the types of financial crime, how to avoid becoming a victim, and how best to respond if any of these things should happen to you.

How Do I Report A Document Crime?

Someone has obtained credit in my name, used my Social Security Number, is cashing counterfeit checks listing my name and information or is presenting their picture ID to obtain any benefit. It is occurring outside of the city where I live. Where do I report the crime?


You are the victim of identity theft. ARS 13-2008.B provides that "A peace officer in any jurisdiction in which an element of the offense is committed or a result of the offense occurs may take a report." In other words, you may report the crime in the jurisdiction where you live or to the jurisdiction where the crime is occurring, or both. If you live in Mesa and the crime occurred in California, we can take a report from you and will then forward it to the jurisdiction best able to investigate the crime.

If the crime occurred in Mesa and you live out-of-state, you may report it to your jurisdiction and they may forward the case, or you may make your report directly to us. Keep in mind that the jurisdiction where the crime is occurring will have direct access to the facts of the case, the merchant, witnesses, etc. and the best chance of solving your case.

My wallet or purse was stolen and my credit cards/checks are now being presented all over the Valley. Do I need to make a police report for each new event?


No. Each time your check/credit card are presented to a merchant, it constitutes a new crime. When that merchant contacts you, document the date, whom you spoke with, by phone or letter, and advise them that you are a victim of theft and that they are the victim of a new and separate fraud and encourage them to contact their local PD and initiate a police report. Give them your original case number for reference. You do not need to initiate a new report yourself. Forward them a copy of your form letter and the merchants report.

Keep in mind that some merchants tolerate a certain amount of loss before they deem it worthwhile to prosecute. If they are the ones out the money, it is they who the courts recognize as a victim for prosecution purposes.

My wallet or purse was stolen. To whom do I report the crime?


Report the theft in the jurisdiction where it occurred.

Document Crimes Reporting Forms

These forms are not to be completed until you have a filed a police report with the Mesa Police Department and you have received a report number. If you need to file a police report, please call 480-644-2211.

Our mailing address has changed. Please make sure you are mailing completed packets to:

Mesa Police Department
Attn: Document Crimes
PO Box 1466
Mesa AZ 85211

Forgery Packet

This packet is specifically for businesses that have been victim of a forgery that is not in progress (i.e., check cashing businesses receives a returned check stamped as "FORGERY"). However, this could also include other documents as well.

Download Forgery Packet(PDF, 135KB)

Fraud Packet

Use this packet when the crime involves Identity Theft, Check Forgery, Credit Card Fraud or Account Fraud.

For example, use this packet when the crime involves the stealing of someone's identity, such as when a victim finds out that someone has stolen his or her social security number and is using it for employment. Another example may be when an account is opened using the victim's personal identifying information.

Download Fraud Packet(PDF, 219KB)

Embezzlement Packet

Use this packet when an employee is accused of stealing funds from their employer. There are two separate packets. One contains the instructions on how to complete the packet, as well as samples of all the forms. The second contains the blank forms which the needs victim to complete.

What if I'm a Victim?

  • Contact the three credit reporting agencies and have an advisory statement placed on your credit history advising that you are the victim of fraud and not to extend credit information to anyone with out contacting you directly, first.
     
  • Request a copy of your credit report and check all credit inquiries or extensions of credit you did not initiate. Ensure no credit was extended.
     
  • Contact any account holder unfamiliar to you, close the account, and make a report of identity theft in that jurisdiction if possible.
     
  • Close out all affected accounts completely. Do not freeze a block of checks and continue to use your checking account. This simply facilitates further intrusion.
     
  • Password protect new accounts against review or changes. Do not use your mother's maiden name, your zip code, the last four numbers of your Social Security Number or birthdates of family
    members.
     
  • Close out and open new credit card accounts after advising the issuer of fraudulent activity.
     
  • Request affidavits of forgery and return them immediately.
     
  • Do not enter into a civil agreement for repayment with an offending party known to you, unless you are willing to waive your right to prosecution, even if that party fails to honor the agreement.
     
  • Keep a log of events, phone calls, letters, whom you spoke with and when, and what was said.
     
  • Put together a form letter advising the merchant of the fraudulent activity on your account and your original case number. Forward this to any merchant requesting payment on a transaction you know to be fraudulent. Encourage that merchant to make a police report if he desires prosecution.
     
  • Keep up your log and let it do the work for you.
     
  • Call your local police department to file a report.

 

Counterfeit Currency

One used to have to engage the services of an accomplished engraver and a typesetter to produce anything that would closely approximate US Currency. Today, with the advent of the home computer, scanner, and high-resolution printers, virtually any criminal can print counterfeit bills. It is currently the policy of this Department to investigate all counterfeit currency cases that occur with in Mesa. When In-Custody arrests are not made, the case is forwarded to the United States Secret Service for follow up.

In those cases where there is no information that would lead to the identity of the passer, the accepting merchant may call the Secret Service directly.

Prevention:  Most counterfeit bills are a poor reflection on their maker. They are either too thin or too fat; too green or not green enough; the ink may be ill defined or run together. Look for irregularities in the bill and for well-defined micro printing. Hold new bills up to the light and look for the watermark image and security thread that states the bill's denomination.

Forged Checks

When a thief steals your blank checks he often completes them himself, signs your name or one of the account holder's names listed on the check to the signature line, and then presents them for payment to every merchant or financial institution who will accept them. Just as often, the thief will trade your checks with another criminal or solicit a third party to cash the checks for him.

Prevention:  Destroy all checks when you close an account, throw nothing away. Keep your checks in a secure location. Be mindful of the friend of a friend left unattended in your home and the family member struggling with addiction. Review your statement monthly to ensure you catch unauthorized checks in 60 days or less. Close any compromised account immediately and open a new pass-worded account.

Counterfeit Checks

Often times a criminal will steal only the account number listed at the bottom of your check. He will then make a computer generated check that bears his name, the identity of a third party whose name he has stolen, or a fictitious name for which he generates an ID. When this check is passed, someone else's face is presented but the funds are withdrawn from your account.

Prevention:  There is little you can do to prevent the counterfeiting of your account. Drop outgoing mail in a U.S. Post Office mail drop, avoid using the cluster box drop, and never use the red flag on your mailbox unless you plan on watching over it until the carrier arrives. Close any compromised account immediately.

Washed Checks

When a thief steals your mail, he often finds pre-completed outgoing checks. He may take these checks, dip them in a chemical solution, and then make them payable to the business of his choice. Use a gel pen when writing checks as this type of ink has been proven to resist chemical washing. Often the checks are used the same day they are stolen. Follow the same prevention tips found under counterfeit checks.

Insufficient Funds Checks

Checks that are written on a closed account, or have insufficient funds, and are less than $2000, are referred to the Maricopa County Check Enforcement Program to be handled civilly.

Credit Card Fraud

Lost or stolen credit cards are used until the credit card issuer suspends the card for unusual activity or until the account holder discovers they are missing and cancels them. Losses can be dramatic to the issuer, but are generally limited to $0 - $50 for the account holder who responsibly advises the credit card company of theft or loss immediately. Information on protecting your credit cards can be found at www.ftc.gov.

Credit card applications and checks are often mailed to the account holder without their knowledge. If these checks or applications are intercepted in the mail or not forwarded from a previous address, substantial financial loss can be incurred.

Credit card fraud is particularly insidious when only the account number is stolen. This can potentially occur anytime that you use the card. An unscrupulous clerk, waitress, waiter, phone solicitor, agent or "friend" can quickly jot the number down, skim the information, or imprint a second receipt and then save or sell the number for later use. These numbers are then used over the phone, the Internet, or with well-meaning, but unthinking, merchant employees.

When your card is used without your permission, the card issuer is generally out the money. The merchant or Internet site that accepts a number, without presentation of the card, suffers the loss.

Prevention:  Guard your credit cards. Be particular where you use them and don't let them out of your sight when making a purchase. Monitor your account at least monthly. Cancel lost or mislaid cards immediately. Do not give them to a third party for use on your behalf. This could be construed as an extension of credit on your part and any charges over the agreed upon use could become civil and your responsibility.

Identity Theft

Identity theft occurs "..if the person knowingly takes or uses any personal identifying information of another person, without the consent of that other person, with the intent to obtain or use the other person's identity for any unlawful purpose or to cause loss to a person." ARS 13-2008.A (class 4 felony). For information on how to protect yourself against identity theft, check out our Crime Prevention Publications page, which has several brochures on Identity Theft and many other topics.

Citations/Arrest

Occurs when a subject, most often known to the victim, uses the victim's personal information to avoid arrest, or as his own information when an arrest occurs. This often results in an arrest record or a warrant in the victim's name. This situation is usually cleared up during an identity hearing, requested by the victim, in the court where the charge was heard or the warrant issued.

Credit

Occurs when a subject uses the victim's information by phone or in person to obtain credit with merchants, most often for consumer goods, Internet porn sites or gambling. In some cases car loans, computers, mortgages and even bankruptcies are done using the victim's information.

Medical

Occurs when a subject uses the victim's information to obtain medical services, usually for in-patient procedures. The victim's social security number is most often compromised in this situation. Given the intimate knowledge a hospital gains from most procedures, this individual is usually caught. However the victim generally does not learn about the crime until a credit report is done or until they apply for services with the same care providers themselves.

Phones/Utilities

This most often occurs when a subject uses the victim's Social Security Number over the phone to activate cellular service on a mobile phone. The phone generally is active for 30 to 45 days until the bill goes unpaid or the victim receives it. The service provider generally absorbs the loss.

Prevention:  Do not share your information with anyone over the phone when you don't know who he or she is and you did not personally initiate the call. Don't give out your Social Security Number to anyone but those who have a direct need for it (i.e. your employer, accountant, tax preparer, etc.).  Your local merchant or libraries do not need your Social Security Number, even though it is a convenient way for them to track your information. Have your Social Security Number removed from your driver's license, health insurance cards and any other cards you may carry.

Check your credit history at least annually. Check all statements monthly. Be cautious with outgoing and incoming mail delivery. File change of address notices promptly with the merchants you do business with and with your local post office.

Internet Crimes

A great deal of business is conducted over the Internet. Thieves have learned to use the Internet to their advantage as well. Common practices include the use of your credit card number to order merchandise and services. Using your card to pay for Internet Provider services, access to porn sites and online gambling seem to be favorites. Other illegal activities include offering items for auction or for sale, accepting payment, and then failing to provide the promised merchandise, often over long distances.

In cases where the U.S. Mail is used to forward payment and receive products, the U.S. Postal Inspectors may be contacted to report a loss resulting from criminal activity. www.usps.com

In cases where the loss is incurred over the Internet, but where mail is not employed, an electronic complaint can be filed with the FBI at www.ic3.gov.

The Mesa Police Department does not presently investigate these crimes locally.

Mail Theft

Phoenix and vicinity has been identified by the U.S. Post Office as being a hot spot in the nation for mail theft. Thieves look for mailboxes in residential areas that conveniently announce that they contain outgoing mail with a bright red flag. Cluster boxes are a favorite for both incoming and outgoing mail. This mail generally contains outgoing bills, tax returns, credit applications, etc.

Mail theft and lost or stolen wallets and purses are increasingly the primary sources of stolen financial and identifying information used to attack and access your credit and accounts.