SlideShare a Scribd company logo
1 of 50
Download to read offline
Identity Theft:
How to Reduce Your Risk
https://learn.extension.org/events/2326
This material is based upon work supported by the National Institute of Food and Agriculture, U.S. Department of Agriculture, and the Office of Family
Readiness Policy, U.S. Department of Defense under Award Numbers 2010-48869-20685, 2012-48755-20306, and 2014-48770-22587.
Question #1:
Has Anyone (or Family Member)
Been an ID Theft Victim?
ā€¢ Describe the situation
ā€¢ Who was the fraudster (if known)?
ā€¢ How was the case resolved?
Back in the Dayā€¦.
What did people do when they
wanted to steal a lot of
money?
Some Famous Bank
Robbers in U.S. History
ā€¢ Bonnie and Clyde
ā€¢ John Dillinger
ā€¢ Willie Sutton
Today Most Financial Theft is
Done Through Identity Theft
ā€¢ A major white-collar crime: https://www.fbi.gov/about-
us/investigate/white_collar
ā€¢ Thief may not know victim
ā€¢ No need to use physical violence
ā€¢ Less risk of being caught
ā€¢ Technology and carelessness with data help thieves
What is Identity Theft?
ļ‚§ Fraud committed via the stealing and unlawful
use of key pieces of personal identification
information (PII)
ļ‚§ In other words, when bad things happen to
someoneā€™s good name.
Identity Theft is in the News!
What Personal Information is
Stolen by Identity Thieves?
Name
Address
Date of birth
Social
Security
number (SSN)
Health
insurance ID
number
Mother's
maiden name
Username and
passwords for
web sites
Driver's
license
Personal
identification
numbers
(PINs)
Credit card
information
(numbers and
expiry dates)
Bank account
numbers
Signature
Passport
number
Sources of Personal Information
Signs of Identity Theft
ā€¢ Items in your credit report that arenā€™t yours
ā€¢ Calls or letters from creditors, medical providers, or
law enforcement
ā€¢ Negative notification at a critical point in life
ā€“ Buying a home or car
ā€“ Applying for a job
ā€¢ Zero balances in bank accounts
ā€¢ When a child starts getting credit offers or debt calls
ā€¢ Delay in processing an income tax refund
ā€¢ Other?
Are YOU at Risk For
Identity Theft?
Take this 15-question quiz adapted from
Experian to find out
The lower your score, the better
1. You receive offers of pre-approved credit and, if you
decide not to accept them, you do not shred them (10
points)
2. You carry your Social Security card (or other
document with your SS number on it) in your wallet (10
points)
3. You do not have a post office box or a locked,
secured mailbox (5 points)
4. You drop off your outgoing mail at an open, unlocked
box or basket (10 points)
5. You have sensitive personal data posted online (e.g.,
a blog or social media) (10 points)
6. You do not shred or tear banking and credit
information when you throw it in the trash (10 points)
7. You provide your Social Security number (SSN)
whenever asked (20 points)
ā€“ Add 5 points if you provide it orally without checking
to see who might be listening
8. You are required to use your SSN as an employee
or student ID number (5 points)
9. Your SSN is printed on an employee badge that you
wear (10 points)
10. Your SSN or driverā€™s license number is printed on
your personal checks (20 points)
11. You are listed in a Whoā€™s Who Guide (5 points)
12. You carry an insurance card in your wallet and it
contains your SSN or your spouseā€™s SSN (20 points)
13. You have not ordered a copy of your credit report
for at least two years (10 points)
14. You write checks with a ā€œregularā€ pen instead of a
gel pen with ink that cannot be ā€œwashedā€ (5 points)
15. You do not believe that people would root around
in your trash looking for credit or financial information
(10 points)
What Your Identity Theft
Risk Score Means
ā€¢ 100+ Points: You are at HIGH RISK. You should
purchase a paper shredder and become more
security aware in document handling.
ā€¢ 50-100 points: Your odds of being victimized are
about average; higher if you have good credit.
ā€¢ 0-50 points: Congratulations! You have a high
security IQ. Keep up the good work.
Question #2:
How Were Your Quiz Scores?
ā€¢ 0 to 50 points? (Lower Risk)
ā€¢ 50 to 100 points?
ā€¢ 100+ points? (High Risk)
FTC Identity Theft Video #1:
How Identity Theft Happens
http://www.youtube.com/watch?v=-IEBVIh7bzc
FTC Identity Theft Video #2:
Case Stories of Real People
http://www.youtube.com/watch?v=OoPJImjP1ZQ
Who are Identity Thieves?
ā€¢ Narcotics users or sellers
ā€¢ Organized crime and gangs
ā€¢ Opportunists
ā€¢ Desperate people
ā€¢ Employees (business and government)
ā€¢ Family members or someone close to you
Types of Identity Theft
Credit card fraud Bank account fraud
Communications services fraud Health insurance fraud
Fraudulent loans Tax refund identity theft
Childrenā€™s identity theft Driverā€™s license fraud
ā€¦and more!
Driverā€™s License Identity Theft
ā™¦ Your driving privileges could be
suspended or revoked
ā™¦ You could be arrested during a
routine traffic stop for crimes you did
not commit
ā™¦ Thieves can open bank accounts,
apply for credit, and cash checks in
your name
Childrenā€™s Identity Theft
http://today.msnbc.msn.com/id/42997608/ns/today-
parenting_and_family/t/stop-id-thieves-stealing-your-
kids-credit/
ā€œI owe $20,000 on
four credit cards, my
car was repossessed,
and I turn two next
monthā€
Criminals often use childrenā€™s identities, not for credit
fraud, but to obtain a driverā€™s license, commit crimes,
collect Social Security, and obtain medical treatment
Medical Identity Theft
Video
http://www.youtube.com/watch?v=EePx7STsnOI
How Identity Theft Occurs
Identity thievesā€¦
ā€¢ steal wallets and purses containing your ID
ā€¢ steal your mail
ā€¢ rummage through trash (ā€œdumpster divingā€)
ā€¢ pose fraudulently as someone else to get your
information (ā€œpretextingā€)
ā€¢ steal data with skimming devices
Skimming is stealing credit /debit card numbers with a
device that reads and decodes information from the
magnetic strip on the back of credit or debit cards
Skimming Machines
More Identity Theft Methods
Identity thievesā€¦
ā€¢ steal business or personnel records at your
workplace
ā€¢ find personal info in your home
ā€¢ use info you put on the Internet
ā€¢ buy personal info from ā€œinside sourcesā€
ā€¢ ā€œshoulder surfā€ at ATMs and telephones
How Identity Thieves
Use Stolen Information
ā€¢ Open new credit card accounts
ā€¢ Establish phone or wireless service
ā€¢ Open new bank accounts and write bad checks
ā€¢ Counterfeit checks or debit cards
ā€¢ Buy cars and take out car loans
ā€¢ Get fraudulent income tax refunds
ā€¢ Get medical care in a victimā€™s name
ā€¦.and more!
Reducing Identity Theft Risk
ā€¢ Destroy credit card applications, receipts, bank, and
billing statements
ā€¢ Avoid giving your SSN unless itā€™s absolutely
necessary -- use other identifiers
ā€¢ Pay attention to billing cycles
ā€¢ Guard your mail from theft
ā€¢ Put passwords on smart phones
ā€¢ Donā€™t let your credit card out of your sight
More Ways to Reduce
Identity Theft Risk
ā€¢ Carry as little identification info as possible
ā€¢ Limit the number of credit cards you carry
ā€¢ Donā€™t give personal identification info on the
phone unless you initiate the call
ā€¢ Be cautious with personal info in your home
ā€¢ Check who has access to personal info at work
ā€¢ Clean out your car
Still More Ways to
Reduce Identity Theft Risk
ā€¢ Donā€™t carry your SS card
ā€¢ Save ATM and credit card receipts to check
against statements
ā€¢ Alert family members to dangers of pretexting
ā€¢ Make sure your credit reports are accurate
ā€¢ Write checks with uniball gel pens
Question #3:
Can You Suggest Any Other
Identity Theft Risk Reduction
Strategies?
Technology Scams:
Phishing,
Fraudulent E-mails, etc.
Look-Alike (Fake) Web Sites
ā€¢ Spoof e-mail messages sent to ā€œverifyā€ or
ā€œupdateā€ account info
ā€¢ Appears to come from reputable company
ā€“ Example: eBay, Best Buy, banks, merchants
ā€¢ Looks ā€œlegitimateā€
ā€¢ Scam is called ā€œphishingā€
ā€“ Get people to disclose sensitive data
ā€“ Data used to commit identity theft
Red Flags of a Phishing Scam
ā€¢ E-mails that direct users to a Web site to
ā€œvalidateā€ or ā€œupdateā€ info
ā€¢ Threats that accounts will be closed
ā€¢ Grammatical errors and typos
ā€¢ Lack of a specific contact person, phone
number, or address
ā€¢ Words Like ā€œUrgentā€ and ā€œImmediatelyā€
Phishing Video:
Symantic Guide to
Scary Internet Stuff
http://www.youtube.com/watch?v=K8lWLwuiDwk
Steps To Avoid Phishing
ā€¢ Be cautious: African refugees with $10 million,
suspended FDIC insurance, etc.
ā€¢ Realize that banks never ask for account info,
especially in an e-mail
ā€¢ Ditto for the IRS
ā€¢ Donā€™t click on any links in suspicious e-mails
ā€¢ Report suspicious e-mails to companies and
spam@uce.gov
ā€¢ D-E-L-E-T-E
Phishing Sample #1
After the last annual calculations of your fiscal activity
we have determined that you are eligible to receive a tax
refund of $92.50. Please submit the tax refund request
and allow us 3-6 days in order to process it. A refund
can be delayed for a variety of reasons. For example
submitting invalid records or applying after the deadline.
To access the form for your tax refund, please click:
http://easy-
classifieds.com/Internal/Revenue/service/verify.html
Regards, Internal Revenue Service
Phishing Sample #2
ATTN: An Iraqi made a fixed deposit of 44.5m usd in my bank branch and he
died with his entire family leaving behind no next of kin,am ready to share
70/30 with you if you choose to stand as my deceased client next of kin.
Pls indicate by sending the following below to show your interest. 1.YOUR
NAME 2.YOUR RESIDENT ADDRESS 3.YOUR OCCUPATION 4.YOUR
PHONE NUMBER 5.DATE OF BIRTH 6.COUNTRY OF RESIDENT 7. ANY
FORM OF YOUR IDENTIFICATION OR INTERNATIONAL PASSPORT
Your response with the requested information should be sent to reach me at
my personal email address below: yi.simon19@gmail.com
Yours Truly, Simon Yi
Phishing Sample #3
Attention: Beneficiary I wish to use this medium and my office to inform you
that your CONTRACT/INHERITANCE Payment of USD10,500,000.00 only
from CENTRAL BANK OF NIGERIA has been RELEASED and APPROVED
for onward transfer to you via ATM CARD which you will use in withdrawing
your funds in any ATM SERVICE MACHINE in any part of the world, but the
maximum you can withdraw in a day is USD$10,000 Only.
The United States government has mandated the CENTRAL BANK OF
NIGERIA, to send you the ATM CARD and PIN NUMBER. Therefore You are
advised to contact the Head of ATM CARD Department of the CENTRAL
BANK OF NIGERIA for further instructions on how to dispatch your ATM
CARD to you.
Name: REV FR MARTINS UZOR DIRECTOR ATM DEPARTMENT OF CBN
Email: lap111@blumail.org
Spear Phishing
ā€¢ Instead of casting out thousands of random e-mails,
spear phishers target victims more personally
ā€“ May have stolen ID info
ā€“ People that attend the same college OR use the
same bank OR work for same employer, etc.
ā€¢ E-mails to victims are more ā€œpersonal,ā€ which makes
them dangerous and deceptive
Question #4:
Do You Have Any Good
Examples of Phishing
Schemes?
Rutgers Cooperative Extension
Online Identity Theft Quiz
www.rce.rutgers.edu/money/identitytheft/default.asp
The online quiz provides both
personalized feedback to users and
a database for ongoing research
2014 Study Findings
ā€¢ The higher the score, the more frequently identity theft risk
reduction practices are performed. The mean quiz score
was 73.58 out of 100. Mean scores for individual quiz items
ranged from 2.50 to 4.48 (1= Never, 5 = Always)
ā€¢ Two areas of weakness were checking oneā€™s credit report
annually (2.65) and securing incoming mail (2.50).
ā€¢ Almost two-thirds (64.4%) of respondents scored between 70
and 100. The three risk reduction strategies that were
performed most frequently (mean score above 4) were not
divulging oneā€™s SSN, not printing sensitive data on
checks, and practicing ā€œgeneral security consciousnessā€
Identity Theft Actions
Proactive
ā€¢ Monitoring annual credit
reports
ā€¢ Free credit scores
ā€¢ Risk reduction strategies
ā€¢ Opt out of prescreened
credit offers:
http://www.consumer.ftc.gov
/articles/0262-stopping-
unsolicited-mail-phone-
calls-and-email
Reactive
ā€¢ Fraud alert
ā€¢ Credit freeze
ā€¢ FTC affidavit
ā€¢ File police report
ā€¢ Notify creditors
ā€¢ Change account numbers
ā€¢ Change passwords
Key Follow-Up Actions
Fraud Alert
ļ‚§ A fraud alert notifies
lenders to take precautions
to check your identity
before extending credit
ļ‚§ Credit agency has to call
you to confirm any request
it receives to open an
account in your name
Credit Freeze
ļ‚§ A credit freeze is a more
serious step. It denies
lenders and others (except
those you already have a
relationship with) access to
your credit report so they
canā€™t extend credit
ļ‚§ Keeps everyone- including
YOU- from applying for
additional credit
Identity Theft Resources
ā€¢ Reporting Identity Theft (FINRA):
http://www.saveandinvest.org/protect-your-money-report-
fraud/reporting-identity-theft
ā€¢ Identity Theft Affidavit (FTC):
http://www.consumer.ftc.gov/articles/pdf-0094-identity-theft-
affidavit.pdf
ā€¢ Identity Theft IQ Test (Privacy Rights Clearinghouse):
https://www.privacyrights.org/itrc-quiz1.htm
ā€¢ Identity Theft and Your Social Security Number (Social
Security Administration): https://www.ssa.gov/pubs/EN-05-
10064.pdf
New Resource:
IdentityTheft.gov
Key Takeaways
ā€¢ Identity theft uses ā€œno techā€ and high tech methods
ā€¢ Minimize the amount of information that can be
stolen from you
ā€¢ You cannot control every identity theft risk factor
ā€¢ Identity theft is a crime that should be reported
ā€¢ Act immediately to stop further use of your identity
Find all upcoming and recorded webinars covering:
Personal Finance
Military Caregiving
Family Development
Family Transitions
Network Literacy
Nutrition & Wellness
Community Capacity Building
This material is based upon work supported by the National Institute of Food and Agriculture, U.S. Department of Agriculture, and the Office of Family
Readiness Policy, U.S. Department of Defense under Award Numbers 2010-48869-20685, 2012-48755-20306, and 2014-48770-22587.
www.extension.org/62581

More Related Content

What's hot

Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
Ā 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
Ā 
The Identity Theft Checklist ā€“ Guidance for the general public.nz
The Identity Theft Checklist ā€“ Guidance for the general public.nzThe Identity Theft Checklist ā€“ Guidance for the general public.nz
The Identity Theft Checklist ā€“ Guidance for the general public.nz- Mark - Fullbright
Ā 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft- Mark - Fullbright
Ā 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
Ā 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft Rahmat Inggi
Ā 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft PresentationLisa Sosebee
Ā 
Id Theft
Id TheftId Theft
Id Theftmojo_5
Ā 
Data theft
Data theftData theft
Data theftLaura
Ā 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada- Mark - Fullbright
Ā 
Identity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for VictimsIdentity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for Victims- Mark - Fullbright
Ā 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft PreventionOremDPS
Ā 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
Ā 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
Ā 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
Ā 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
Ā 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents- Mark - Fullbright
Ā 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
Ā 

What's hot (20)

Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
Ā 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
Ā 
The Identity Theft Checklist ā€“ Guidance for the general public.nz
The Identity Theft Checklist ā€“ Guidance for the general public.nzThe Identity Theft Checklist ā€“ Guidance for the general public.nz
The Identity Theft Checklist ā€“ Guidance for the general public.nz
Ā 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
Ā 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
Ā 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
Ā 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
Ā 
Id Theft
Id TheftId Theft
Id Theft
Ā 
Data theft
Data theftData theft
Data theft
Ā 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
Ā 
Identity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for VictimsIdentity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for Victims
Ā 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
Ā 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
Ā 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
Ā 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
Ā 
Identity theft
Identity theftIdentity theft
Identity theft
Ā 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
Ā 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
Ā 
Identity Theft and You
Identity Theft and YouIdentity Theft and You
Identity Theft and You
Ā 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
Ā 

Viewers also liked

Tetra Pak Arabia Newsletter May 2009 Highlights
Tetra Pak Arabia Newsletter May 2009 HighlightsTetra Pak Arabia Newsletter May 2009 Highlights
Tetra Pak Arabia Newsletter May 2009 Highlightsraufhameed
Ā 
Age of empires creadores
Age of empires creadoresAge of empires creadores
Age of empires creadoresdiegoazarabanda
Ā 
Diploma Certificate Of Jose Babu
Diploma Certificate Of Jose BabuDiploma Certificate Of Jose Babu
Diploma Certificate Of Jose BabuJose Babu
Ā 
CPF para estrangeiros
CPF para estrangeirosCPF para estrangeiros
CPF para estrangeirosjuramentado05
Ā 
A new hybrid approach for solving travelling salesman problem using ordered c...
A new hybrid approach for solving travelling salesman problem using ordered c...A new hybrid approach for solving travelling salesman problem using ordered c...
A new hybrid approach for solving travelling salesman problem using ordered c...eSAT Journals
Ā 
KehindeAfolabi_SCLA_ECR
KehindeAfolabi_SCLA_ECRKehindeAfolabi_SCLA_ECR
KehindeAfolabi_SCLA_ECRKehinde Afolabi
Ā 
Prijsbook 2014@ 32
Prijsbook 2014@ 32Prijsbook 2014@ 32
Prijsbook 2014@ 32jhonthijzen
Ā 
Geopolitik
GeopolitikGeopolitik
Geopolitikyeoja99
Ā 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
Ā 

Viewers also liked (12)

Tetra Pak Arabia Newsletter May 2009 Highlights
Tetra Pak Arabia Newsletter May 2009 HighlightsTetra Pak Arabia Newsletter May 2009 Highlights
Tetra Pak Arabia Newsletter May 2009 Highlights
Ā 
Age of empires creadores
Age of empires creadoresAge of empires creadores
Age of empires creadores
Ā 
Diploma Certificate Of Jose Babu
Diploma Certificate Of Jose BabuDiploma Certificate Of Jose Babu
Diploma Certificate Of Jose Babu
Ā 
CPF para estrangeiros
CPF para estrangeirosCPF para estrangeiros
CPF para estrangeiros
Ā 
A new hybrid approach for solving travelling salesman problem using ordered c...
A new hybrid approach for solving travelling salesman problem using ordered c...A new hybrid approach for solving travelling salesman problem using ordered c...
A new hybrid approach for solving travelling salesman problem using ordered c...
Ā 
KehindeAfolabi_SCLA_ECR
KehindeAfolabi_SCLA_ECRKehindeAfolabi_SCLA_ECR
KehindeAfolabi_SCLA_ECR
Ā 
Prijsbook 2014@ 32
Prijsbook 2014@ 32Prijsbook 2014@ 32
Prijsbook 2014@ 32
Ā 
Slideshare
SlideshareSlideshare
Slideshare
Ā 
Geopolitik
GeopolitikGeopolitik
Geopolitik
Ā 
Doping prezentacija - Marija Vozar
Doping prezentacija - Marija VozarDoping prezentacija - Marija Vozar
Doping prezentacija - Marija Vozar
Ā 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
Ā 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
Ā 

Similar to Identity Theft-How to Reduce Your Risk-03-16

Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft TestLisa Sosebee
Ā 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
Ā 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminarmullarkea
Ā 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada- Mark - Fullbright
Ā 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
Ā 
Identity Theft Overview
Identity Theft OverviewIdentity Theft Overview
Identity Theft Overviewgaby350
Ā 
Senior Audience Presentation
Senior Audience PresentationSenior Audience Presentation
Senior Audience Presentation- Mark - Fullbright
Ā 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
Ā 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft- Mark - Fullbright
Ā 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft- Mark - Fullbright
Ā 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionAlan Greggo
Ā 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftDolf Dunn
Ā 
Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
Ā 
1. cyber crime series - identity theft
1. cyber crime series  - identity theft1. cyber crime series  - identity theft
1. cyber crime series - identity theftIsaac Feliciano
Ā 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You- Mark - Fullbright
Ā 
Identity Theft
Identity TheftIdentity Theft
Identity TheftLisa Sosebee
Ā 

Similar to Identity Theft-How to Reduce Your Risk-03-16 (19)

Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
Ā 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
Ā 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
Ā 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
Ā 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
Ā 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
Ā 
Identity Theft Overview
Identity Theft OverviewIdentity Theft Overview
Identity Theft Overview
Ā 
Senior Audience Presentation
Senior Audience PresentationSenior Audience Presentation
Senior Audience Presentation
Ā 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
Ā 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
Ā 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
Ā 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
Ā 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
Ā 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
Ā 
Identity Theft Overview Webinar
Identity Theft Overview WebinarIdentity Theft Overview Webinar
Identity Theft Overview Webinar
Ā 
1. cyber crime series - identity theft
1. cyber crime series  - identity theft1. cyber crime series  - identity theft
1. cyber crime series - identity theft
Ā 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
Ā 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
Ā 
Identity theft
Identity theftIdentity theft
Identity theft
Ā 

More from Barbara O'Neill

Final Rutgers Syllabus-Fall 2019
Final Rutgers Syllabus-Fall 2019Final Rutgers Syllabus-Fall 2019
Final Rutgers Syllabus-Fall 2019Barbara O'Neill
Ā 
Inflation Causes, Impacts, Mitigation Strategies, and Benefits
 Inflation Causes, Impacts, Mitigation Strategies, and Benefits Inflation Causes, Impacts, Mitigation Strategies, and Benefits
Inflation Causes, Impacts, Mitigation Strategies, and BenefitsBarbara O'Neill
Ā 
Income Tax Issues for Older Adults-02-23-UPDATED.pptx
Income Tax Issues for Older Adults-02-23-UPDATED.pptxIncome Tax Issues for Older Adults-02-23-UPDATED.pptx
Income Tax Issues for Older Adults-02-23-UPDATED.pptxBarbara O'Neill
Ā 
Dr. Barbara O'Neill-Short CV
Dr. Barbara O'Neill-Short CVDr. Barbara O'Neill-Short CV
Dr. Barbara O'Neill-Short CVBarbara O'Neill
Ā 
Inflation Fighting Strategies Class-01-23.pdf
Inflation Fighting Strategies Class-01-23.pdfInflation Fighting Strategies Class-01-23.pdf
Inflation Fighting Strategies Class-01-23.pdfBarbara O'Neill
Ā 
Can Farmers Ever Afford to Retire-01-23.pdf
Can Farmers Ever Afford to Retire-01-23.pdfCan Farmers Ever Afford to Retire-01-23.pdf
Can Farmers Ever Afford to Retire-01-23.pdfBarbara O'Neill
Ā 
Carney Clan Cookie Contest Entries
Carney Clan Cookie Contest Entries Carney Clan Cookie Contest Entries
Carney Clan Cookie Contest Entries Barbara O'Neill
Ā 
RMD Planning Worksheet-12-22.pdf
RMD Planning Worksheet-12-22.pdfRMD Planning Worksheet-12-22.pdf
RMD Planning Worksheet-12-22.pdfBarbara O'Neill
Ā 
2022 Reference List
2022 Reference List2022 Reference List
2022 Reference ListBarbara O'Neill
Ā 
2022 Personal Finance Trends-References
2022 Personal Finance Trends-References2022 Personal Finance Trends-References
2022 Personal Finance Trends-ReferencesBarbara O'Neill
Ā 
Income Tax Issues for Older Adults-MTP-02-22.pdf
Income Tax Issues for Older Adults-MTP-02-22.pdfIncome Tax Issues for Older Adults-MTP-02-22.pdf
Income Tax Issues for Older Adults-MTP-02-22.pdfBarbara O'Neill
Ā 
Beyond Legal Documents-12 Planning Strategies-Good Ending-08-22.pdf
Beyond Legal Documents-12 Planning Strategies-Good Ending-08-22.pdfBeyond Legal Documents-12 Planning Strategies-Good Ending-08-22.pdf
Beyond Legal Documents-12 Planning Strategies-Good Ending-08-22.pdfBarbara O'Neill
Ā 
Give Yourself a Financial Check-Up-Older Adult Version
Give Yourself a Financial Check-Up-Older Adult VersionGive Yourself a Financial Check-Up-Older Adult Version
Give Yourself a Financial Check-Up-Older Adult VersionBarbara O'Neill
Ā 
Five Tips to Flip Your Retirement Switch-06-22.pdf
Five Tips to Flip Your Retirement Switch-06-22.pdfFive Tips to Flip Your Retirement Switch-06-22.pdf
Five Tips to Flip Your Retirement Switch-06-22.pdfBarbara O'Neill
Ā 
Leveraging LinkedIn Presentation
Leveraging LinkedIn PresentationLeveraging LinkedIn Presentation
Leveraging LinkedIn PresentationBarbara O'Neill
Ā 
AAFCS 2022 Presentation on Opiods
AAFCS 2022 Presentation on OpiodsAAFCS 2022 Presentation on Opiods
AAFCS 2022 Presentation on OpiodsBarbara O'Neill
Ā 
Digital Assets Inventory Presentation-BMO-04-22.pdf
Digital Assets Inventory Presentation-BMO-04-22.pdfDigital Assets Inventory Presentation-BMO-04-22.pdf
Digital Assets Inventory Presentation-BMO-04-22.pdfBarbara O'Neill
Ā 
Creating Attractive Graphics Presentation-MTP-03-22.pdf
Creating Attractive Graphics Presentation-MTP-03-22.pdfCreating Attractive Graphics Presentation-MTP-03-22.pdf
Creating Attractive Graphics Presentation-MTP-03-22.pdfBarbara O'Neill
Ā 
35 Useful Personal Finance Web Sites
35 Useful Personal Finance Web Sites35 Useful Personal Finance Web Sites
35 Useful Personal Finance Web SitesBarbara O'Neill
Ā 
Social Media 101 Handouts
Social Media 101 HandoutsSocial Media 101 Handouts
Social Media 101 HandoutsBarbara O'Neill
Ā 

More from Barbara O'Neill (20)

Final Rutgers Syllabus-Fall 2019
Final Rutgers Syllabus-Fall 2019Final Rutgers Syllabus-Fall 2019
Final Rutgers Syllabus-Fall 2019
Ā 
Inflation Causes, Impacts, Mitigation Strategies, and Benefits
 Inflation Causes, Impacts, Mitigation Strategies, and Benefits Inflation Causes, Impacts, Mitigation Strategies, and Benefits
Inflation Causes, Impacts, Mitigation Strategies, and Benefits
Ā 
Income Tax Issues for Older Adults-02-23-UPDATED.pptx
Income Tax Issues for Older Adults-02-23-UPDATED.pptxIncome Tax Issues for Older Adults-02-23-UPDATED.pptx
Income Tax Issues for Older Adults-02-23-UPDATED.pptx
Ā 
Dr. Barbara O'Neill-Short CV
Dr. Barbara O'Neill-Short CVDr. Barbara O'Neill-Short CV
Dr. Barbara O'Neill-Short CV
Ā 
Inflation Fighting Strategies Class-01-23.pdf
Inflation Fighting Strategies Class-01-23.pdfInflation Fighting Strategies Class-01-23.pdf
Inflation Fighting Strategies Class-01-23.pdf
Ā 
Can Farmers Ever Afford to Retire-01-23.pdf
Can Farmers Ever Afford to Retire-01-23.pdfCan Farmers Ever Afford to Retire-01-23.pdf
Can Farmers Ever Afford to Retire-01-23.pdf
Ā 
Carney Clan Cookie Contest Entries
Carney Clan Cookie Contest Entries Carney Clan Cookie Contest Entries
Carney Clan Cookie Contest Entries
Ā 
RMD Planning Worksheet-12-22.pdf
RMD Planning Worksheet-12-22.pdfRMD Planning Worksheet-12-22.pdf
RMD Planning Worksheet-12-22.pdf
Ā 
2022 Reference List
2022 Reference List2022 Reference List
2022 Reference List
Ā 
2022 Personal Finance Trends-References
2022 Personal Finance Trends-References2022 Personal Finance Trends-References
2022 Personal Finance Trends-References
Ā 
Income Tax Issues for Older Adults-MTP-02-22.pdf
Income Tax Issues for Older Adults-MTP-02-22.pdfIncome Tax Issues for Older Adults-MTP-02-22.pdf
Income Tax Issues for Older Adults-MTP-02-22.pdf
Ā 
Beyond Legal Documents-12 Planning Strategies-Good Ending-08-22.pdf
Beyond Legal Documents-12 Planning Strategies-Good Ending-08-22.pdfBeyond Legal Documents-12 Planning Strategies-Good Ending-08-22.pdf
Beyond Legal Documents-12 Planning Strategies-Good Ending-08-22.pdf
Ā 
Give Yourself a Financial Check-Up-Older Adult Version
Give Yourself a Financial Check-Up-Older Adult VersionGive Yourself a Financial Check-Up-Older Adult Version
Give Yourself a Financial Check-Up-Older Adult Version
Ā 
Five Tips to Flip Your Retirement Switch-06-22.pdf
Five Tips to Flip Your Retirement Switch-06-22.pdfFive Tips to Flip Your Retirement Switch-06-22.pdf
Five Tips to Flip Your Retirement Switch-06-22.pdf
Ā 
Leveraging LinkedIn Presentation
Leveraging LinkedIn PresentationLeveraging LinkedIn Presentation
Leveraging LinkedIn Presentation
Ā 
AAFCS 2022 Presentation on Opiods
AAFCS 2022 Presentation on OpiodsAAFCS 2022 Presentation on Opiods
AAFCS 2022 Presentation on Opiods
Ā 
Digital Assets Inventory Presentation-BMO-04-22.pdf
Digital Assets Inventory Presentation-BMO-04-22.pdfDigital Assets Inventory Presentation-BMO-04-22.pdf
Digital Assets Inventory Presentation-BMO-04-22.pdf
Ā 
Creating Attractive Graphics Presentation-MTP-03-22.pdf
Creating Attractive Graphics Presentation-MTP-03-22.pdfCreating Attractive Graphics Presentation-MTP-03-22.pdf
Creating Attractive Graphics Presentation-MTP-03-22.pdf
Ā 
35 Useful Personal Finance Web Sites
35 Useful Personal Finance Web Sites35 Useful Personal Finance Web Sites
35 Useful Personal Finance Web Sites
Ā 
Social Media 101 Handouts
Social Media 101 HandoutsSocial Media 101 Handouts
Social Media 101 Handouts
Ā 

Recently uploaded

High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escortsranjana rawat
Ā 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingAggregage
Ā 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarHarsh Kumar
Ā 
VIP Kolkata Call Girl Serampore šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Serampore šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Serampore šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Serampore šŸ‘‰ 8250192130 Available With Roomdivyansh0kumar0
Ā 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130Suhani Kapoor
Ā 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfshaunmashale756
Ā 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHenry Tapper
Ā 
VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130
VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130
VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130Suhani Kapoor
Ā 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignHenry Tapper
Ā 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...First NO1 World Amil baba in Faisalabad
Ā 
Malad Call Girl in Services 9892124323 | ā‚¹,4500 With Room Free Delivery
Malad Call Girl in Services  9892124323 | ā‚¹,4500 With Room Free DeliveryMalad Call Girl in Services  9892124323 | ā‚¹,4500 With Room Free Delivery
Malad Call Girl in Services 9892124323 | ā‚¹,4500 With Room Free DeliveryPooja Nehwal
Ā 
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithAdamYassin2
Ā 
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
Ā 
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 šŸ’‹āœ”šŸ’•šŸ˜˜ Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 šŸ’‹āœ”šŸ’•šŸ˜˜ Naughty Call Girls Se...Russian Call Girls In Gtb Nagar (Delhi) 9711199012 šŸ’‹āœ”šŸ’•šŸ˜˜ Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 šŸ’‹āœ”šŸ’•šŸ˜˜ Naughty Call Girls Se...shivangimorya083
Ā 
Andheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot ModelsAndheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot Modelshematsharma006
Ā 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companiesprashantbhati354
Ā 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfAdnet Communications
Ā 
Chapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th editionChapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th editionMuhammadHusnain82237
Ā 

Recently uploaded (20)

Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024
Ā 
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Ā 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of Reporting
Ā 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh Kumar
Ā 
VIP Kolkata Call Girl Serampore šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Serampore šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Serampore šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Serampore šŸ‘‰ 8250192130 Available With Room
Ā 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
Ā 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdf
Ā 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview document
Ā 
VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130
VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130
VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130
Ā 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaign
Ā 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Ā 
Malad Call Girl in Services 9892124323 | ā‚¹,4500 With Room Free Delivery
Malad Call Girl in Services  9892124323 | ā‚¹,4500 With Room Free DeliveryMalad Call Girl in Services  9892124323 | ā‚¹,4500 With Room Free Delivery
Malad Call Girl in Services 9892124323 | ā‚¹,4500 With Room Free Delivery
Ā 
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam Smith
Ā 
Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024
Ā 
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Saharanpur Anushka 8250192130 Independent Escort Se...
Ā 
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 šŸ’‹āœ”šŸ’•šŸ˜˜ Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 šŸ’‹āœ”šŸ’•šŸ˜˜ Naughty Call Girls Se...Russian Call Girls In Gtb Nagar (Delhi) 9711199012 šŸ’‹āœ”šŸ’•šŸ˜˜ Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 šŸ’‹āœ”šŸ’•šŸ˜˜ Naughty Call Girls Se...
Ā 
Andheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot ModelsAndheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot Models
Ā 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companies
Ā 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdf
Ā 
Chapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th editionChapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th edition
Ā 

Identity Theft-How to Reduce Your Risk-03-16

  • 1. Identity Theft: How to Reduce Your Risk https://learn.extension.org/events/2326 This material is based upon work supported by the National Institute of Food and Agriculture, U.S. Department of Agriculture, and the Office of Family Readiness Policy, U.S. Department of Defense under Award Numbers 2010-48869-20685, 2012-48755-20306, and 2014-48770-22587.
  • 2. Question #1: Has Anyone (or Family Member) Been an ID Theft Victim? ā€¢ Describe the situation ā€¢ Who was the fraudster (if known)? ā€¢ How was the case resolved?
  • 3. Back in the Dayā€¦. What did people do when they wanted to steal a lot of money?
  • 4. Some Famous Bank Robbers in U.S. History ā€¢ Bonnie and Clyde ā€¢ John Dillinger ā€¢ Willie Sutton
  • 5. Today Most Financial Theft is Done Through Identity Theft ā€¢ A major white-collar crime: https://www.fbi.gov/about- us/investigate/white_collar ā€¢ Thief may not know victim ā€¢ No need to use physical violence ā€¢ Less risk of being caught ā€¢ Technology and carelessness with data help thieves
  • 6. What is Identity Theft? ļ‚§ Fraud committed via the stealing and unlawful use of key pieces of personal identification information (PII) ļ‚§ In other words, when bad things happen to someoneā€™s good name.
  • 7. Identity Theft is in the News!
  • 8. What Personal Information is Stolen by Identity Thieves? Name Address Date of birth Social Security number (SSN) Health insurance ID number Mother's maiden name Username and passwords for web sites Driver's license Personal identification numbers (PINs) Credit card information (numbers and expiry dates) Bank account numbers Signature Passport number
  • 9. Sources of Personal Information
  • 10. Signs of Identity Theft ā€¢ Items in your credit report that arenā€™t yours ā€¢ Calls or letters from creditors, medical providers, or law enforcement ā€¢ Negative notification at a critical point in life ā€“ Buying a home or car ā€“ Applying for a job ā€¢ Zero balances in bank accounts ā€¢ When a child starts getting credit offers or debt calls ā€¢ Delay in processing an income tax refund ā€¢ Other?
  • 11. Are YOU at Risk For Identity Theft? Take this 15-question quiz adapted from Experian to find out The lower your score, the better
  • 12. 1. You receive offers of pre-approved credit and, if you decide not to accept them, you do not shred them (10 points) 2. You carry your Social Security card (or other document with your SS number on it) in your wallet (10 points) 3. You do not have a post office box or a locked, secured mailbox (5 points) 4. You drop off your outgoing mail at an open, unlocked box or basket (10 points) 5. You have sensitive personal data posted online (e.g., a blog or social media) (10 points)
  • 13. 6. You do not shred or tear banking and credit information when you throw it in the trash (10 points) 7. You provide your Social Security number (SSN) whenever asked (20 points) ā€“ Add 5 points if you provide it orally without checking to see who might be listening 8. You are required to use your SSN as an employee or student ID number (5 points) 9. Your SSN is printed on an employee badge that you wear (10 points) 10. Your SSN or driverā€™s license number is printed on your personal checks (20 points)
  • 14. 11. You are listed in a Whoā€™s Who Guide (5 points) 12. You carry an insurance card in your wallet and it contains your SSN or your spouseā€™s SSN (20 points) 13. You have not ordered a copy of your credit report for at least two years (10 points) 14. You write checks with a ā€œregularā€ pen instead of a gel pen with ink that cannot be ā€œwashedā€ (5 points) 15. You do not believe that people would root around in your trash looking for credit or financial information (10 points)
  • 15. What Your Identity Theft Risk Score Means ā€¢ 100+ Points: You are at HIGH RISK. You should purchase a paper shredder and become more security aware in document handling. ā€¢ 50-100 points: Your odds of being victimized are about average; higher if you have good credit. ā€¢ 0-50 points: Congratulations! You have a high security IQ. Keep up the good work.
  • 16. Question #2: How Were Your Quiz Scores? ā€¢ 0 to 50 points? (Lower Risk) ā€¢ 50 to 100 points? ā€¢ 100+ points? (High Risk)
  • 17. FTC Identity Theft Video #1: How Identity Theft Happens http://www.youtube.com/watch?v=-IEBVIh7bzc
  • 18. FTC Identity Theft Video #2: Case Stories of Real People http://www.youtube.com/watch?v=OoPJImjP1ZQ
  • 19. Who are Identity Thieves? ā€¢ Narcotics users or sellers ā€¢ Organized crime and gangs ā€¢ Opportunists ā€¢ Desperate people ā€¢ Employees (business and government) ā€¢ Family members or someone close to you
  • 20. Types of Identity Theft Credit card fraud Bank account fraud Communications services fraud Health insurance fraud Fraudulent loans Tax refund identity theft Childrenā€™s identity theft Driverā€™s license fraud ā€¦and more!
  • 21. Driverā€™s License Identity Theft ā™¦ Your driving privileges could be suspended or revoked ā™¦ You could be arrested during a routine traffic stop for crimes you did not commit ā™¦ Thieves can open bank accounts, apply for credit, and cash checks in your name
  • 23. ā€œI owe $20,000 on four credit cards, my car was repossessed, and I turn two next monthā€ Criminals often use childrenā€™s identities, not for credit fraud, but to obtain a driverā€™s license, commit crimes, collect Social Security, and obtain medical treatment
  • 25. How Identity Theft Occurs Identity thievesā€¦ ā€¢ steal wallets and purses containing your ID ā€¢ steal your mail ā€¢ rummage through trash (ā€œdumpster divingā€) ā€¢ pose fraudulently as someone else to get your information (ā€œpretextingā€) ā€¢ steal data with skimming devices
  • 26. Skimming is stealing credit /debit card numbers with a device that reads and decodes information from the magnetic strip on the back of credit or debit cards Skimming Machines
  • 27. More Identity Theft Methods Identity thievesā€¦ ā€¢ steal business or personnel records at your workplace ā€¢ find personal info in your home ā€¢ use info you put on the Internet ā€¢ buy personal info from ā€œinside sourcesā€ ā€¢ ā€œshoulder surfā€ at ATMs and telephones
  • 28. How Identity Thieves Use Stolen Information ā€¢ Open new credit card accounts ā€¢ Establish phone or wireless service ā€¢ Open new bank accounts and write bad checks ā€¢ Counterfeit checks or debit cards ā€¢ Buy cars and take out car loans ā€¢ Get fraudulent income tax refunds ā€¢ Get medical care in a victimā€™s name ā€¦.and more!
  • 29. Reducing Identity Theft Risk ā€¢ Destroy credit card applications, receipts, bank, and billing statements ā€¢ Avoid giving your SSN unless itā€™s absolutely necessary -- use other identifiers ā€¢ Pay attention to billing cycles ā€¢ Guard your mail from theft ā€¢ Put passwords on smart phones ā€¢ Donā€™t let your credit card out of your sight
  • 30. More Ways to Reduce Identity Theft Risk ā€¢ Carry as little identification info as possible ā€¢ Limit the number of credit cards you carry ā€¢ Donā€™t give personal identification info on the phone unless you initiate the call ā€¢ Be cautious with personal info in your home ā€¢ Check who has access to personal info at work ā€¢ Clean out your car
  • 31. Still More Ways to Reduce Identity Theft Risk ā€¢ Donā€™t carry your SS card ā€¢ Save ATM and credit card receipts to check against statements ā€¢ Alert family members to dangers of pretexting ā€¢ Make sure your credit reports are accurate ā€¢ Write checks with uniball gel pens
  • 32. Question #3: Can You Suggest Any Other Identity Theft Risk Reduction Strategies?
  • 34. Look-Alike (Fake) Web Sites ā€¢ Spoof e-mail messages sent to ā€œverifyā€ or ā€œupdateā€ account info ā€¢ Appears to come from reputable company ā€“ Example: eBay, Best Buy, banks, merchants ā€¢ Looks ā€œlegitimateā€ ā€¢ Scam is called ā€œphishingā€ ā€“ Get people to disclose sensitive data ā€“ Data used to commit identity theft
  • 35. Red Flags of a Phishing Scam ā€¢ E-mails that direct users to a Web site to ā€œvalidateā€ or ā€œupdateā€ info ā€¢ Threats that accounts will be closed ā€¢ Grammatical errors and typos ā€¢ Lack of a specific contact person, phone number, or address ā€¢ Words Like ā€œUrgentā€ and ā€œImmediatelyā€
  • 36. Phishing Video: Symantic Guide to Scary Internet Stuff http://www.youtube.com/watch?v=K8lWLwuiDwk
  • 37. Steps To Avoid Phishing ā€¢ Be cautious: African refugees with $10 million, suspended FDIC insurance, etc. ā€¢ Realize that banks never ask for account info, especially in an e-mail ā€¢ Ditto for the IRS ā€¢ Donā€™t click on any links in suspicious e-mails ā€¢ Report suspicious e-mails to companies and spam@uce.gov ā€¢ D-E-L-E-T-E
  • 38. Phishing Sample #1 After the last annual calculations of your fiscal activity we have determined that you are eligible to receive a tax refund of $92.50. Please submit the tax refund request and allow us 3-6 days in order to process it. A refund can be delayed for a variety of reasons. For example submitting invalid records or applying after the deadline. To access the form for your tax refund, please click: http://easy- classifieds.com/Internal/Revenue/service/verify.html Regards, Internal Revenue Service
  • 39. Phishing Sample #2 ATTN: An Iraqi made a fixed deposit of 44.5m usd in my bank branch and he died with his entire family leaving behind no next of kin,am ready to share 70/30 with you if you choose to stand as my deceased client next of kin. Pls indicate by sending the following below to show your interest. 1.YOUR NAME 2.YOUR RESIDENT ADDRESS 3.YOUR OCCUPATION 4.YOUR PHONE NUMBER 5.DATE OF BIRTH 6.COUNTRY OF RESIDENT 7. ANY FORM OF YOUR IDENTIFICATION OR INTERNATIONAL PASSPORT Your response with the requested information should be sent to reach me at my personal email address below: yi.simon19@gmail.com Yours Truly, Simon Yi
  • 40. Phishing Sample #3 Attention: Beneficiary I wish to use this medium and my office to inform you that your CONTRACT/INHERITANCE Payment of USD10,500,000.00 only from CENTRAL BANK OF NIGERIA has been RELEASED and APPROVED for onward transfer to you via ATM CARD which you will use in withdrawing your funds in any ATM SERVICE MACHINE in any part of the world, but the maximum you can withdraw in a day is USD$10,000 Only. The United States government has mandated the CENTRAL BANK OF NIGERIA, to send you the ATM CARD and PIN NUMBER. Therefore You are advised to contact the Head of ATM CARD Department of the CENTRAL BANK OF NIGERIA for further instructions on how to dispatch your ATM CARD to you. Name: REV FR MARTINS UZOR DIRECTOR ATM DEPARTMENT OF CBN Email: lap111@blumail.org
  • 41. Spear Phishing ā€¢ Instead of casting out thousands of random e-mails, spear phishers target victims more personally ā€“ May have stolen ID info ā€“ People that attend the same college OR use the same bank OR work for same employer, etc. ā€¢ E-mails to victims are more ā€œpersonal,ā€ which makes them dangerous and deceptive
  • 42. Question #4: Do You Have Any Good Examples of Phishing Schemes?
  • 43. Rutgers Cooperative Extension Online Identity Theft Quiz www.rce.rutgers.edu/money/identitytheft/default.asp The online quiz provides both personalized feedback to users and a database for ongoing research
  • 44. 2014 Study Findings ā€¢ The higher the score, the more frequently identity theft risk reduction practices are performed. The mean quiz score was 73.58 out of 100. Mean scores for individual quiz items ranged from 2.50 to 4.48 (1= Never, 5 = Always) ā€¢ Two areas of weakness were checking oneā€™s credit report annually (2.65) and securing incoming mail (2.50). ā€¢ Almost two-thirds (64.4%) of respondents scored between 70 and 100. The three risk reduction strategies that were performed most frequently (mean score above 4) were not divulging oneā€™s SSN, not printing sensitive data on checks, and practicing ā€œgeneral security consciousnessā€
  • 45. Identity Theft Actions Proactive ā€¢ Monitoring annual credit reports ā€¢ Free credit scores ā€¢ Risk reduction strategies ā€¢ Opt out of prescreened credit offers: http://www.consumer.ftc.gov /articles/0262-stopping- unsolicited-mail-phone- calls-and-email Reactive ā€¢ Fraud alert ā€¢ Credit freeze ā€¢ FTC affidavit ā€¢ File police report ā€¢ Notify creditors ā€¢ Change account numbers ā€¢ Change passwords
  • 46. Key Follow-Up Actions Fraud Alert ļ‚§ A fraud alert notifies lenders to take precautions to check your identity before extending credit ļ‚§ Credit agency has to call you to confirm any request it receives to open an account in your name Credit Freeze ļ‚§ A credit freeze is a more serious step. It denies lenders and others (except those you already have a relationship with) access to your credit report so they canā€™t extend credit ļ‚§ Keeps everyone- including YOU- from applying for additional credit
  • 47. Identity Theft Resources ā€¢ Reporting Identity Theft (FINRA): http://www.saveandinvest.org/protect-your-money-report- fraud/reporting-identity-theft ā€¢ Identity Theft Affidavit (FTC): http://www.consumer.ftc.gov/articles/pdf-0094-identity-theft- affidavit.pdf ā€¢ Identity Theft IQ Test (Privacy Rights Clearinghouse): https://www.privacyrights.org/itrc-quiz1.htm ā€¢ Identity Theft and Your Social Security Number (Social Security Administration): https://www.ssa.gov/pubs/EN-05- 10064.pdf
  • 49. Key Takeaways ā€¢ Identity theft uses ā€œno techā€ and high tech methods ā€¢ Minimize the amount of information that can be stolen from you ā€¢ You cannot control every identity theft risk factor ā€¢ Identity theft is a crime that should be reported ā€¢ Act immediately to stop further use of your identity
  • 50. Find all upcoming and recorded webinars covering: Personal Finance Military Caregiving Family Development Family Transitions Network Literacy Nutrition & Wellness Community Capacity Building This material is based upon work supported by the National Institute of Food and Agriculture, U.S. Department of Agriculture, and the Office of Family Readiness Policy, U.S. Department of Defense under Award Numbers 2010-48869-20685, 2012-48755-20306, and 2014-48770-22587. www.extension.org/62581