Guidance and legal memoranda relating to this topic can be found in the Criminal Resource Manual
| Fraudulent Production, Use or Trafficking in Counterfeit or Unauthorized Access Devices—18 U.S.C. § 1029(a)(1-4) | Criminal Resource Manual at 1024 |
| Fraudulent Production, Use, or Trafficking in Telecommunications Instruments Modified or Altered to Access Telecommunications Services—18 U.S.C. § 1029(a)(5) | Criminal Resource Manual at 1025 |
| Fraudulent Production, Use, or Trafficking in Hardware or Software Used for Modification of Telecommunications Instruments—18 U.S.C. § 1029(a)(6) | Criminal Resource Manual at 1026 |
| Fraudulent Transactions with One or More Access Devices for Payment or Anything of Value totaling $1000 or more During a One-Year Period—18 U.S.C. § 1029(a)(5) | Criminal Resource Manual at 1027 |
| Solicitation of Unauthorized Access Device or Selling Information Regarding an Application to Obtain an Access Device—18 U.S.C. § 1029(a)(6) | Criminal Resource Manual at 1028 |
| Fraudulent Presentment and Related Unauthorized Credit Card Transactions Made by Access Device—18 U.S.C. § 1029(a)(7) | Criminal Resource Manual at 1029 |
| Definitions | Criminal Resource Manual at 1030 |
| Responsibilities of Investigative Agencies | Criminal Resource Manual at 1031 |
[cited in Criminal Resource Manual 964; 1313]
[updated October 2016]
Updated September 19, 2018

