SlideShare a Scribd company logo
1 of 35
Eghbal Ghazizadeh
Agenda
   Identity Theft & Film
   What is identity theft?
   Types of the Identity Theft
   Statistics & Identity Theft
   How does identity theft work?
   Techniques
   Warning signs
   How to steal an identity?
   Countermeasures
   Protect yourself
   Regional legal responses
Identity Theft & Film
What is Identity Theft?

   Identity theft is a form of stealing
      someone's identity in which
  someone pretends to be someone
    else by assuming that person's
 identity, typically in order to access
resources or obtain credit and other
    benefits in that person's name
What is Identity Theft?
• The term identity theft was coined in 1964
• Determining the link between data breaches and
  identity theft is challenging
• Probability of becoming a victim to identity theft as a
  result of a data breach is ... around only 2%
What is Identity Theft?

Identity theft occurs when someone uses
your name, your Social Security number,
  or some other personal, financial, or
    medical information without your
   permission to commit fraud or other
                  crimes.
Types of the Identity Theft

Criminal identity theft
        (posing as another person when apprehended for a crime)
Financial identity theft
     (using another's identity to obtain credit, goods and services)
Identity cloning
    (using another's information to assume his or her identity in daily life)
Medical identity theft
    (using another's identity to obtain medical care or drugs)
Child identity theft.
    (children are valued because they do not have any information associated with them)
Statistics & Identity Theft

Consider the following:
 One million people in Canada will suffer from some form
of identity theft totalling over $6 billion

50% of the cases reported will be as a result of
unauthorized credit card charges.

20% of the victims will know their thieves

The average time between the date of the theft and when
it is noticed by the victim will be 14 months.
Statistics
How Does Identity Theft Work?
 • Identity theft works in a range of ways
 • from crude methods to well organised scams
      Human-Based           Computer-Based


                        Wealth
 personal information
 Cards
 Mail
 public records
 Information saved in our computers
 Information posted on social networking sites
Techniques
Techniques
• Rummaging through rubbish for personal
  information (dumpster diving)
• Retrieving personal data from redundant IT
  equipment
• Using public records about individual citizens
  (electoral rolls) Stealing bank or credit cards,
  identification cards, passports, authentication
  tokens ( pickpocketing, housebreaking or
  mail theft)
• Common-knowledge questioning (what was
  your first car model?)
Techniques
• Skimming information from bank or credit
  cards (Clone Card)
• Using 'contactless' credit card readers to
  acquire data wirelessly from RFID-enabled
  passports
• Observing users typing ( shoulder Surfing)
• Stealing personal information from computers
  ( Malware, Trojan horse, Keystroke, Other
  Spyware)
• Hacking computer networks, systems and
  databases (SQl Injection)
Techniques
•   Exploiting breaches (Social Address, IC Number)
•   Advertising bogus job ( Resume, CV)
•   Exploiting insider access and abusing the rights of privileged IT users
    to access
•   Impersonating trusted organizations in emails, SMS text messages,
    phone calls (Phishing)
•   Brute-force attacking weak passwords and using inspired guesswork
•   Obtaining castings of fingers for falsifying fingerprint identification.
•   Browsing social networking websites for personal details
•   Using false pretences to trick individuals (Pretexting)
•   Guessing Social Security numbers by using information found
TOOLS
• Gunter Ollmann said, “Interested in credit card theft?
  There’s an app for that.”
• The new program for infecting users’ computers is
  called Zeus (inexperienced hacker can operate it)
            SpyEye/ZeuS Toolkit v1.3.05
Warning signs

• You get an email, SMS or a phone call out of
  the blue asking you to ‘validate’ or ‘confirm’
  banking details.
• You notice that amounts of money go missing
  from your bank account without any
  explanations.
• The caller pushes you to provide personal
  information and discourages you from
  checking if it’s a genuine request.
• You are unable to obtain credit or a loan
  because of an inexplicably bad credit rating.
Protect Yourself
Such organizations offer recommendations on how individuals can prevent their
information falling into the wrong hands

•If your personal information is lost, stolen, or
otherwise compromised, you can minimize the
potential damage from identity theft.

•Put a Fraud Alert on Your Credit Reports
•
Review Your Credit Reports
•
Create an Identity Theft Report
•
Protect Yourself

•NEVER send money or give personal details to people you don’t know
and trust.
•If you receive a call from your bank or any other organisation, don’t
provide your personal details—instead ask for their name and a contact
number. Check with the organisation in question before calling
back. NEVER rely on a number provided in an email or click on the
provided link—instead find the contact number through an internet
search or check the back of your ATM card.
•If you receive a request from a friend or family member stranded while
on holiday asking you to transfer money to them, contact them by phone
or alternative contact to verify the request is genuine before sending any
money or providing personal details.
•
Protect Yourself

• Regularly check your credit card and/or bank
  statements to ensure that suspicious transactions are
  detected.
• Log directly onto websites you are interested in rather
  than clicking on links provided in an email.
• Always get independent advice if you are unsure
  whether an offer or request is genuine.
Protect Yourself

•   To reduce or minimize the risk of becoming a victim of identity theft or fraud,
    there are some basic steps you can take. For starters, just remember the word


                               SCAM
Stingy about giving out your personal information
Check your financial information regularly
Ask periodically for a copy of your credit report
Maintain careful records of your banking and financial accounts.
ID Theft Resources
Regional legal responses
•   Australia (135.1 General dishonesty)
•   Canada (Under section 402.2 of the Criminal Code of Canada )
•   France (In France, a person convicted of identity theft can be
    sentenced up to five years in prison and fined up to €75,000)
•   Hong Kong (Under HK Laws. Chap 210 Theft Ordinance, sec. 16A
    Fraud )
•   India (Under the Information Technology Act 2000 Chapter IX Sec 66C)
SSO & ID Theft
Identity theft

More Related Content

What's hot

Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
pooja_doshi
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 

What's hot (20)

Identity theft
Identity theftIdentity theft
Identity theft
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Phishing
PhishingPhishing
Phishing
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Phishing
PhishingPhishing
Phishing
 
Phishing & Pharming
Phishing & PharmingPhishing & Pharming
Phishing & Pharming
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 

Similar to Identity theft

Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
Matt Smith
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
Randall Chesnutt
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
jwnollet
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
Matt Smith
 

Similar to Identity theft (20)

Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Identity theft

  • 2. Agenda  Identity Theft & Film  What is identity theft?  Types of the Identity Theft  Statistics & Identity Theft  How does identity theft work?  Techniques  Warning signs  How to steal an identity?  Countermeasures  Protect yourself  Regional legal responses
  • 4. What is Identity Theft? Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name
  • 5. What is Identity Theft? • The term identity theft was coined in 1964 • Determining the link between data breaches and identity theft is challenging • Probability of becoming a victim to identity theft as a result of a data breach is ... around only 2%
  • 6. What is Identity Theft? Identity theft occurs when someone uses your name, your Social Security number, or some other personal, financial, or medical information without your permission to commit fraud or other crimes.
  • 7. Types of the Identity Theft Criminal identity theft (posing as another person when apprehended for a crime) Financial identity theft (using another's identity to obtain credit, goods and services) Identity cloning (using another's information to assume his or her identity in daily life) Medical identity theft (using another's identity to obtain medical care or drugs) Child identity theft. (children are valued because they do not have any information associated with them)
  • 8. Statistics & Identity Theft Consider the following: One million people in Canada will suffer from some form of identity theft totalling over $6 billion 50% of the cases reported will be as a result of unauthorized credit card charges. 20% of the victims will know their thieves The average time between the date of the theft and when it is noticed by the victim will be 14 months.
  • 10. How Does Identity Theft Work? • Identity theft works in a range of ways • from crude methods to well organised scams Human-Based Computer-Based Wealth personal information Cards Mail public records Information saved in our computers Information posted on social networking sites
  • 12. Techniques • Rummaging through rubbish for personal information (dumpster diving) • Retrieving personal data from redundant IT equipment • Using public records about individual citizens (electoral rolls) Stealing bank or credit cards, identification cards, passports, authentication tokens ( pickpocketing, housebreaking or mail theft) • Common-knowledge questioning (what was your first car model?)
  • 13. Techniques • Skimming information from bank or credit cards (Clone Card) • Using 'contactless' credit card readers to acquire data wirelessly from RFID-enabled passports • Observing users typing ( shoulder Surfing) • Stealing personal information from computers ( Malware, Trojan horse, Keystroke, Other Spyware) • Hacking computer networks, systems and databases (SQl Injection)
  • 14. Techniques • Exploiting breaches (Social Address, IC Number) • Advertising bogus job ( Resume, CV) • Exploiting insider access and abusing the rights of privileged IT users to access • Impersonating trusted organizations in emails, SMS text messages, phone calls (Phishing) • Brute-force attacking weak passwords and using inspired guesswork • Obtaining castings of fingers for falsifying fingerprint identification. • Browsing social networking websites for personal details • Using false pretences to trick individuals (Pretexting) • Guessing Social Security numbers by using information found
  • 15. TOOLS • Gunter Ollmann said, “Interested in credit card theft? There’s an app for that.” • The new program for infecting users’ computers is called Zeus (inexperienced hacker can operate it) SpyEye/ZeuS Toolkit v1.3.05
  • 16. Warning signs • You get an email, SMS or a phone call out of the blue asking you to ‘validate’ or ‘confirm’ banking details. • You notice that amounts of money go missing from your bank account without any explanations. • The caller pushes you to provide personal information and discourages you from checking if it’s a genuine request. • You are unable to obtain credit or a loan because of an inexplicably bad credit rating.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. Protect Yourself Such organizations offer recommendations on how individuals can prevent their information falling into the wrong hands •If your personal information is lost, stolen, or otherwise compromised, you can minimize the potential damage from identity theft. •Put a Fraud Alert on Your Credit Reports • Review Your Credit Reports • Create an Identity Theft Report •
  • 29. Protect Yourself •NEVER send money or give personal details to people you don’t know and trust. •If you receive a call from your bank or any other organisation, don’t provide your personal details—instead ask for their name and a contact number. Check with the organisation in question before calling back. NEVER rely on a number provided in an email or click on the provided link—instead find the contact number through an internet search or check the back of your ATM card. •If you receive a request from a friend or family member stranded while on holiday asking you to transfer money to them, contact them by phone or alternative contact to verify the request is genuine before sending any money or providing personal details. •
  • 30. Protect Yourself • Regularly check your credit card and/or bank statements to ensure that suspicious transactions are detected. • Log directly onto websites you are interested in rather than clicking on links provided in an email. • Always get independent advice if you are unsure whether an offer or request is genuine.
  • 31. Protect Yourself • To reduce or minimize the risk of becoming a victim of identity theft or fraud, there are some basic steps you can take. For starters, just remember the word SCAM Stingy about giving out your personal information Check your financial information regularly Ask periodically for a copy of your credit report Maintain careful records of your banking and financial accounts.
  • 33. Regional legal responses • Australia (135.1 General dishonesty) • Canada (Under section 402.2 of the Criminal Code of Canada ) • France (In France, a person convicted of identity theft can be sentenced up to five years in prison and fined up to €75,000) • Hong Kong (Under HK Laws. Chap 210 Theft Ordinance, sec. 16A Fraud ) • India (Under the Information Technology Act 2000 Chapter IX Sec 66C)
  • 34. SSO & ID Theft