Identity Theft One of the Fasting Growing Crimes in America and Beyond
Objectives <ul><li>Ability to define the term “identity theft” </li></ul><ul><li>Ability to determine if someone has been ...
Introduction – What is Identity Theft? <ul><li>According to the Federal Trade Commission, Identity Theft is the fastest gr...
Identity Theft – No Little Problem <ul><li>Identity theft is one of the fastest growing crimes in America   </li></ul><ul>...
Identity Theft – A Federal Crime <ul><li>The Identity Theft and Assumption Deterrence Act of 1998 made Identity Theft a fe...
How Personal Information is Gathered <ul><li>Dumpster diving </li></ul><ul><ul><li>Personal information, when stolen from ...
Shredder – Necessary Equipment <ul><li>To minimize your risk of identity theft, be sure to shred all unused convenience ch...
How Personal Information is Collected Through Legitimate Business Records <ul><li>Recently personal medical files for hund...
Phishing <ul><li>Creation of a phony web site pretending to be a legitimate company </li></ul><ul><li>Sending email to the...
Phishing Example <ul><li>One recent phishing ploy  spoofed  an AOL web page. </li></ul><ul><li>The perpetrator had used  a...
The Phony AOL Web Form http://www.millersmiles.co.uk/identitytheft/AOL-email-scam-1115521443a.htm
Federal Laws Concerning Phishing <ul><li>Identity theft - 18 U.S.C. § 1028 (a)(7) </li></ul><ul><li>Wire fraud - 18 U.S.C....
Federal Crime & Punishment <ul><li>Bank and wire fraud - up to 30 years in prison </li></ul><ul><li>Identity theft and cre...
Social Engineering <ul><li>Con Game - tricking a person into revealing information </li></ul><ul><li>Memorizing access cod...
How to Prevent Identity Theft <ul><li>Education   </li></ul><ul><li>Coalition on Online Identity Theft   </li></ul><ul><li...
How to Prevent Identity Theft  Part Two <ul><li>Never leave personal information on your computer without having a firewal...
How to Prevent Identity Theft Part Three <ul><li>Never use your mother's maiden name, the last four digits of your Social ...
How to Prevent Identity Theft Part Four <ul><li>Review all credit card transactions each month when you receive your credi...
How to Prevent Identity Theft Part Five <ul><li>Install a locking mailbox to ensure the security of mail delivered to your...
Prevention of Identity Theft by Education <ul><li>People must be educated as to the value of information </li></ul><ul><li...
Checking a Web Site’s Security Certificate <ul><li>Check the security certificates for web sites from which you purchase p...
Checking for Secure Web Sites <ul><li>Check the URL (the web address) of the web site you are doing business with </li></u...
Checking Security Features When Using Netscape Navigator <ul><li>To check the security in Netscape, look at the padlock in...
Checking Security Features When Using Internet Explorer <ul><li>When using Internet Explorer as your browser, open the pag...
What to Do If You Become a Victim of Identity Theft <ul><li>Call the Federal Trade Commission’s Identity Theft Toll-free H...
What to Do If You Become a Victim of Identity Theft <ul><li>File a police report as soon as possible </li></ul><ul><li>Con...
What to Do If You Become a Victim of Identity Theft <ul><li>Also make your complaints in writing, asking each creditor to ...
Fighting Identity Theft <ul><li>Federal Trade Commission   </li></ul><ul><li>Internet Fraud Complaint Center   </li></ul><...
Federal Trade Commission  <ul><li>This federal agency, created in 1914 to eliminate unfair methods of competition and unfa...
Internet Fraud Complaint Center <ul><li>A joint effort between the FBI and the National White Collar Crime Center that inv...
Internet Fraud Complaint Center <ul><li>Complaints can be made 24/7, directly to the IFCC, using the online complaint form...
How to Identify the Source of Email
Identity Theft Resources <ul><li>U.S. Dept. of Justice - http://www.usdoj.gov/ </li></ul><ul><ul><li>Fraud Section  </li><...
Operation E-Con <ul><li>A joint effort by the FBI, the U.S. Secret Service, the Dept. of Justice, the U.S Postal Inspectio...
New Identity Theft Laws <ul><li>Fair and Accurate Credit Transactions Act (FACTA) of 2003   </li></ul><ul><li>Free annual ...
National Listing of Identify Theft Citations & Penalties by State   <ul><li>The National Conference of State Legislatures ...
California’s Changing View on Identity Theft <ul><li>In California, &quot;The law making Identity Theft a crime was enacte...
Upcoming SlideShare
Loading in …5
×

Identity theft power_point

1,617
-1

Published on

Published in: Technology
0 Comments
4 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,617
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
75
Comments
0
Likes
4
Embeds 0
No embeds

No notes for slide

Identity theft power_point

  1. 1. Identity Theft One of the Fasting Growing Crimes in America and Beyond
  2. 2. Objectives <ul><li>Ability to define the term “identity theft” </li></ul><ul><li>Ability to determine if someone has been a victim of identity theft and if so actions to be taken </li></ul><ul><li>Ability to identify methods to prevent identity theft </li></ul><ul><li>Ability to identify resources for more information on identity theft </li></ul>
  3. 3. Introduction – What is Identity Theft? <ul><li>According to the Federal Trade Commission, Identity Theft is the fastest growing crime in America </li></ul><ul><li>Stealing someone’s personal information and using it to assume someone’s identity </li></ul><ul><li>The fraudulent use of personal information to open new accounts and/or purchase items using existing accounts </li></ul>
  4. 4. Identity Theft – No Little Problem <ul><li>Identity theft is one of the fastest growing crimes in America </li></ul><ul><li>&quot;Identity theft is a big-ticket item in terms of money and time according to Howard Beales, director of the FTC's Bureau of Consumer Protection.” </li></ul><ul><li>Cost to consumers in 2002 </li></ul><ul><ul><li>$5 billion in expenses </li></ul></ul><ul><li>Cost to businesses in 2002 </li></ul><ul><ul><li>$50 million </li></ul></ul><ul><li>[ 1] http://www.washingtontimes.com/functions/print.php?StoryID=20030903-095305-3951r 06/7/2004 </li></ul>
  5. 5. Identity Theft – A Federal Crime <ul><li>The Identity Theft and Assumption Deterrence Act of 1998 made Identity Theft a federal crime. </li></ul><ul><li>Identity theft occurs when someone knowingly transfers or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of the Federal law. </li></ul>
  6. 6. How Personal Information is Gathered <ul><li>Dumpster diving </li></ul><ul><ul><li>Personal information, when stolen from your property either through dumpster diving or theft, provide a criminal with a wealth of information with which to open new accounts or use existing accounts </li></ul></ul>
  7. 7. Shredder – Necessary Equipment <ul><li>To minimize your risk of identity theft, be sure to shred all unused convenience checks, credit card offers, credit card receipts, bank statements, pre-approved loan offers, and canceled checks </li></ul>
  8. 8. How Personal Information is Collected Through Legitimate Business Records <ul><li>Recently personal medical files for hundreds of patients were found discarded outside a medical clinic. Identity thieves could have used these files </li></ul><ul><li>Businesses are required by law to protect their client's personally identifying information and to discard these files safely </li></ul><ul><li>Thieves steal valuable personal information from customer files and personnel files </li></ul>
  9. 9. Phishing <ul><li>Creation of a phony web site pretending to be a legitimate company </li></ul><ul><li>Sending email to the victim impersonating (spoofing) a legitimate company </li></ul><ul><li>The criminal collects personal and financial information such as credit card and Social Security numbers </li></ul>
  10. 10. Phishing Example <ul><li>One recent phishing ploy spoofed an AOL web page. </li></ul><ul><li>The perpetrator had used authentic AOL logos and other genuine hyperlinks in the email message sent to the victims. </li></ul><ul><li>He told the victims that there had been a billing error . </li></ul><ul><li>It directed the victims to click on an embedded hyperlink, which when clicked took the unsuspecting user to a phony web page , that had been created to look much like the company's authentic web site, and from which the thief collected personal and financial information </li></ul>
  11. 11. The Phony AOL Web Form http://www.millersmiles.co.uk/identitytheft/AOL-email-scam-1115521443a.htm
  12. 12. Federal Laws Concerning Phishing <ul><li>Identity theft - 18 U.S.C. § 1028 (a)(7) </li></ul><ul><li>Wire fraud - 18 U.S.C. § 1343 </li></ul><ul><li>Credit card or access device fraud 18 U.S.C. § 1029 </li></ul><ul><li>Bank fraud 18 U.S.C. § 1344 </li></ul><ul><li>Computer fraud 18 U.S.C. § 1030 (a)(4) </li></ul><ul><li>CAN-SPAM Act 18 U.S.C. § 1037 </li></ul>
  13. 13. Federal Crime & Punishment <ul><li>Bank and wire fraud - up to 30 years in prison </li></ul><ul><li>Identity theft and credit card fraud - up to 15 years in prison </li></ul><ul><li>CAN-SPAM Act violations - up to 5 years in prison </li></ul><ul><li>According to the U.S. Department of Justice, individuals convicted of these crimes may also face </li></ul><ul><ul><li>substantial fines and </li></ul></ul><ul><ul><li>forfeiture of his/her property </li></ul></ul>
  14. 14. Social Engineering <ul><li>Con Game - tricking a person into revealing information </li></ul><ul><li>Memorizing access codes and passwords by shoulder surfing (looking over someone's shoulder as they log in ) </li></ul><ul><li>Pretending to be an employer, loan officer or landlord to fraudulently obtain your credit report </li></ul>
  15. 15. How to Prevent Identity Theft <ul><li>Education </li></ul><ul><li>Coalition on Online Identity Theft </li></ul><ul><li>Padlock your credit file </li></ul><ul><li>Check your credit report annually </li></ul><ul><li>Share personal information only with people and companies you trust </li></ul><ul><li>Make online purchases only with companies having secure connections </li></ul><ul><li>Never give out your personal information over the phone unless you initiated the call. </li></ul><ul><li>Never have your Social Security number printed on your checks </li></ul>
  16. 16. How to Prevent Identity Theft Part Two <ul><li>Never leave personal information on your computer without having a firewall in place. </li></ul><ul><li>After opening your mail, shred all unused credit card offers, unused convenience checks, and any other pieces of mail that include personally identifying information. </li></ul><ul><li>Never keep passwords to financial data on your computer. </li></ul><ul><li>Likewise never keep your ATM or credit card pin numbers in your wallet or your car. If either are stolen, the thieves have instant access to your accounts. </li></ul>
  17. 17. How to Prevent Identity Theft Part Three <ul><li>Never use your mother's maiden name, the last four digits of your Social Security number, your birth date, your pet's name, or any other easily recognized letters and numbers as your pin number or passwords. </li></ul><ul><li>If the amount of mail you normally receive drops suddenly; contact your post office to make sure no one has fraudulently filed a change of address card for your address. </li></ul>
  18. 18. How to Prevent Identity Theft Part Four <ul><li>Review all credit card transactions each month when you receive your credit card statement. </li></ul><ul><li>Shred all expired credit cards before putting them in the trash. </li></ul>
  19. 19. How to Prevent Identity Theft Part Five <ul><li>Install a locking mailbox to ensure the security of mail delivered to your home. </li></ul><ul><li>Mail all payments and other documents with personal or financial information from the post office or at a postal drop box, never from your mailbox. </li></ul><ul><li>Thieves may take your checks from unsecured mailboxes and bleach them so they may be used again. </li></ul>
  20. 20. Prevention of Identity Theft by Education <ul><li>People must be educated as to the value of information </li></ul><ul><li>They must be trained to protect information (even if the information they have access to appears to be of relatively low value) </li></ul><ul><li>People must be made aware of what social engineering is and how social engineers operate. </li></ul>
  21. 21. Checking a Web Site’s Security Certificate <ul><li>Check the security certificates for web sites from which you purchase products or do other financial transactions </li></ul><ul><li>Go to the web site and click on the VeriSign Secure Site link to verify that the security certificate is in the same name as the company. </li></ul><ul><li>If the company name listed there doesn't match the company owning the site, be wary of submitting financial information. Security certificates are sometimes held in the parent company’s name. </li></ul>
  22. 22. Checking for Secure Web Sites <ul><li>Check the URL (the web address) of the web site you are doing business with </li></ul><ul><li>Whenever you are entering your credit card information or other financial information when ordering online, the address should display https, rather than http, if you are connecting to a secure web site; ex. https://amazon.com/cgi-bin </li></ul>
  23. 23. Checking Security Features When Using Netscape Navigator <ul><li>To check the security in Netscape, look at the padlock in the lower right corner. </li></ul><ul><ul><li>unlocked = not secure </li></ul></ul><ul><ul><li>locked = secure </li></ul></ul><ul><li>To check the level of encryption, left click the lock in the lower right-hand corner of the page. A pop up window will appear and tell you whether or not the page you are viewing is encrypted and what type of encryption is being used. </li></ul>
  24. 24. Checking Security Features When Using Internet Explorer <ul><li>When using Internet Explorer as your browser, open the page whose security you want to check. </li></ul><ul><li>Right click on the page and then go to properties. </li></ul><ul><li>When you click properties, a pop up window will appear with information on the site's security. </li></ul>
  25. 25. What to Do If You Become a Victim of Identity Theft <ul><li>Call the Federal Trade Commission’s Identity Theft Toll-free Hotline (877 – IDTHEFT) </li></ul><ul><li>Call all three of the major credit bureaus </li></ul><ul><ul><li>Experian - 1-888-397-3742 </li></ul></ul><ul><ul><li>EquiFax - 1-800-525-6285 </li></ul></ul><ul><ul><li>TransUnion - 1-800-680-7289 </li></ul></ul><ul><li>For identity theft involving student information or federal education funds, contact U.S. Department of Education, Office of Inspector General </li></ul><ul><ul><li>1-800-647-8733 </li></ul></ul>
  26. 26. What to Do If You Become a Victim of Identity Theft <ul><li>File a police report as soon as possible </li></ul><ul><li>Contact your creditors for all affected accounts </li></ul><ul><ul><li>&quot;A &quot;fraud alert&quot; will be automatically placed on each of your credit reports within 24 hours. This alerts creditors to call you for permission before any new accounts are opened in your name. </li></ul></ul><ul><ul><li>Not all creditors pay attention to &quot;fraud alerts.&quot; You need to stay vigilant for any new accounts that may be opened.“ [1] </li></ul></ul><ul><ul><li>[1] http://www.bankrate.com/brm/news/credit-management/identity-theft.asp 6/22/04 </li></ul></ul>
  27. 27. What to Do If You Become a Victim of Identity Theft <ul><li>Also make your complaints in writing, asking each creditor to provide you and any law enforcement agencies investigating the crime(s) with copies of all documentation that shows fraudulent activity. </li></ul><ul><li>By making your complaint in writing, you are documenting the time and date when you became aware of the incident. This may protect you from responsibility for additional charges. </li></ul>
  28. 28. Fighting Identity Theft <ul><li>Federal Trade Commission </li></ul><ul><li>Internet Fraud Complaint Center </li></ul><ul><li>U.S. Department of Justice </li></ul><ul><li>Identity Theft Resource Center (ITRC) </li></ul><ul><li>Operation E-con </li></ul>
  29. 29. Federal Trade Commission <ul><li>This federal agency, created in 1914 to eliminate unfair methods of competition and unfair or deceptive practices concerning commerce, is now focused on the growing threat of identity theft </li></ul><ul><ul><li>2003 - 42% of the complaints received by the FTC concerned identity theft. </li></ul></ul><ul><ul><li>Training seminars are available for investigators and prosecutors on how to access the FTC's Consumer Sentinel database, an identity theft resource, which can securely access the nearly 200,000 complaints filed before June 2002. </li></ul></ul>
  30. 30. Internet Fraud Complaint Center <ul><li>A joint effort between the FBI and the National White Collar Crime Center that investigates complaints of fraud perpetrated on the Internet. </li></ul><ul><li>This organization acts a hub for complaints and can analyze data to quickly identify new Internet crime trends. </li></ul><ul><li>The IFCC also can then make referrals to the appropriate law enforcement agency. </li></ul>
  31. 31. Internet Fraud Complaint Center <ul><li>Complaints can be made 24/7, directly to the IFCC, using the online complaint form. Directions on how to file a complaint are found at: http://www1.ifccfbi.gov/strategy/howtofile.asp </li></ul><ul><li>Victims have come forward from 89 countries </li></ul><ul><li>Auction fraud accounts for almost two-thirds of all complaints received by the IFCC </li></ul><ul><ul><li>Authentic Ebay addresses </li></ul></ul><ul><ul><li>http://cgi3.ebay.com/ http://arribada.ebay.com/ </li></ul></ul><ul><ul><li>Phony Ebay addresses </li></ul></ul><ul><ul><li>http://signin.ebay.com@10.19.32.4/ http://signin-ebay.com/ </li></ul></ul>
  32. 32. How to Identify the Source of Email
  33. 33. Identity Theft Resources <ul><li>U.S. Dept. of Justice - http://www.usdoj.gov/ </li></ul><ul><ul><li>Fraud Section </li></ul></ul><ul><li>Identity Theft Resource Center (ITRC) </li></ul><ul><li>http://www.idtheftcenter.org/index.shtml </li></ul><ul><ul><li>FAQ's on identity theft </li></ul></ul><ul><ul><li>Contains alerts and information on new identity theft scams </li></ul></ul><ul><ul><li>Includes a guide to organizing an identity theft case </li></ul></ul>
  34. 34. Operation E-Con <ul><li>A joint effort by the FBI, the U.S. Secret Service, the Dept. of Justice, the U.S Postal Inspection Service, the Federal Trade Commission along with National White Collar Crime Center (NW3C) and local and state law enforcement agencies aimed at prosecuting world wide Cyber Crime, including Identity Theft. </li></ul><ul><li>Prosecution of 130 subjects </li></ul><ul><li>90 investigations involving 89,000 victims with estimated losses on nearly $200 million. [1] </li></ul><ul><li>[1] http://www.ifccfbi.gov/strategy/ifcc-econbrief.pdf. 6/23/04 </li></ul>
  35. 35. New Identity Theft Laws <ul><li>Fair and Accurate Credit Transactions Act (FACTA) of 2003 </li></ul><ul><li>Free annual credit reports for consumers </li></ul><ul><li>Businesses are required to hide portions of credit card and social security numbers on receipts </li></ul><ul><li>Created a national fraud hotline so you only have to make one call to report identity theft </li></ul>
  36. 36. National Listing of Identify Theft Citations & Penalties by State <ul><li>The National Conference of State Legislatures (http://www.ncsl.org/programs/lis/privacy/idt-statutes.htm) </li></ul><ul><li>A comprehensive listing of citations and penalties listed alphabetically by state. </li></ul>
  37. 37. California’s Changing View on Identity Theft <ul><li>In California, &quot;The law making Identity Theft a crime was enacted as a misdemeanor crime in 1998. </li></ul><ul><li>In 1999, the law was upgraded to an alternate felony/misdemeanor crime .&quot; [1] </li></ul><ul><li>[1] http://www.infolinkscreening.com/InfoLink/Resources/Articles/IdentityTheft.aspx 6/23/04 </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×