Josh Moulin: Internet Scams and Identity Theft Prevention

504 views

Published on

This presentation is designed to be 30 minutes and provides the audience with some information on Internet scams and how to protect themselves against identity theft.

The presentation was designed and given by Josh Moulin, an 11 year veteran of law enforcement and now a cybersecurity team lead for a federal agency that focuses on national security. Josh has multiple certifications in law enforcement and digital forensics and has been considered an expert in his field. Josh speaks across the nation on various cyber issues and has been qualified as an expert witness in both state and federal court on numerous occasions.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
504
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
7
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Josh Moulin: Internet Scams and Identity Theft Prevention

  1. 1. JoshMoulin.com     Financial  Fraud  and  ID  The0   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   1  
  2. 2. Instructor’s  Background   n  11  years  in  law  enforcement   n  Commander  –  cyber  crime   task  force   n  Board  of  Directors  –  NaLonal   White  Collar  Crime  Center   (NW3C)   n  Leads  cyber  security  team  for   a  federal  agency  that  focuses   on  naLonal  security   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   2  
  3. 3. Crimes  CommiRed  with  Technology   IdenLty  The0   DomesLc  Violence   Homicide/Suicide   Internet  Fraud/Forgery   E-­‐mail  Threats   Bomb  Threats   Stalking  &  Harassment   Missing  Persons   Child  ExploitaLon  &  Abuse   Gambling   ProsLtuLon   ExtorLon   NarcoLcs   So0ware  Piracy   Intrusions/Hacking/Trade  Secrets   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   3  
  4. 4. IdenLty  The0   n Online  ID  The0  accounts  for  only  10%   of  all  ID  the0   n The  other  90%  is  tradiLonal  ID  the0.     ID’s  are  stolen  a  variety  of  ways   including:   n Dumpster  diving  (use  a  confe`  shredder)   n Obtaining  old  IT  equipment  (copy  machines,   personal  computers,  cell  phones   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   4  
  5. 5. IdenLty  The0   n Finding  personal  informaLon  on  public   websites  (government  and  social  networks)   n Stealing  informaLon  from  burglary,  vehicle   break-­‐ins,  purses,  wallets,  etc.   n Skimming  informaLon  using  RFID  chips  or   skimmers   n AdverLsing  bogus  jobs  to  obtain  job   applicaLons  and  resumes   n Vishing  –  (telephone  scams)   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   5  
  6. 6. Copy  Machines   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   6  
  7. 7. High-­‐Tech  ID  The0   n VicLms  of  high-­‐tech  ID  the0  may  have   had  their  informaLon  stolen  a  variety   of  ways  including:   n Phishing  Scams   n SMS  Scams  (text  messages)   n Obtaining  usernames  and  passwords   n InfiltraLng  company  or  medical  data   n InfecLng  a  personal  computer  with  malware   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   7  
  8. 8. OperaLng  System  Updates  and  Patches   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   8  
  9. 9. IE  ConLnued   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   9  
  10. 10. Viewing  CerLficates   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   10  
  11. 11. Mozilla  Firefox   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   11  
  12. 12. Mozilla  Firefox   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   12  
  13. 13. Mozilla  Firefox  ConLnued   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   13  
  14. 14. Phishing  Examples   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   14  
  15. 15. Phishing  Examples   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   15  
  16. 16. Peer  to  Peer   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   16  
  17. 17. Peer  to  Peer   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   17  
  18. 18. P2P   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   18  
  19. 19. Website  Scraping   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   19  
  20. 20. Why  do  People  Commit  ID  The0?   n Suspects  will  steal  idenLLes  to:   n Open  a  bank  account  in  the  vicLm’s  name   n Buy  vehicles  on  credit  in  the  vicLm’s  name   n Submit  loan  and  credit  applicaLons  in  the   vicLm’s  name   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   20  
  21. 21. Tips  to  Protect  Against  ID  The0   n There  are  several  everyday  things   people  can  do  to  reduce  their  chances   of  being  a  vicLm  of  ID  the0  including:   n Use  a  cross-­‐cut  shredder  for  all  documents   with  personal  informaLon  on  it   n Get  mail  promptly  and  pay  aRenLon  to   missing  mail   n Review  all  bank  and  credit  acLvity  regularly   for  any  suspicious  acLvity   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   21  
  22. 22. Tips  to  Protect  Against  ID  The0   n Have  your  statements  sent  to  you   electronically  to  reduce  personal  informaLon   in  the  mail  and  trash   n Don’t  carry  your  Social  Security  Card     n Protect  your  PIN  when  entering  it  into  any   device   n Pay  aRenLon  to  where  your  card  goes  during   a  transacLon   n Treat  all  financial  emails  with  cauLon   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   22  
  23. 23. Tips  to  Protect  Against  ID  The0   n Do  not  provide  personal  informaLon  or   account  informaLon  over  the  phone  to   anyone  who  called  you   n Use  strong  passwords  online   n Have  up  to  date  anLvirus  on  all  computers   n Maintain  the  operaLng  system  security   patches  on  all  computers   n Before  making  a  purchase  online,  make  sure   you’re  doing  so  from  a  secure  site   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   23  
  24. 24. Online  Scams   n According  to  the  NW3C  online  scams   increased  by  110%  from  last  year   n Cyber  fraud  accounted  for  $559  M   n Some  of  the  most  common  online   scams  include:   n Fraudulent  e-­‐cards   n Free  iPad  offers   n Rental  scams   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   24  
  25. 25. Online  Scams   n Publically  available  WiFi   n Fake  gi0  cards   n Immediate  assistance  scams   n Work  from  home  scams   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   25  
  26. 26. Wireless  Internet   n Ensure  wireless  Internet  is  secure  with   encrypLon,  requiring  a  password  to   access   n Consider  MAC  address  filtering  as  well   n “War  Driving”  is  a  common  occurance     ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   26  
  27. 27. War  Driving   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   27  
  28. 28. Wireless  Routers   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   28  
  29. 29. For  Further  InformaLon…   www.JoshMoulin.com   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   29  

×