Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Avoiding Fraud and Identity Theft - October 2008


Published on

Slides from our member education seminar.

Published in: Business, Economy & Finance
  • Be the first to comment

Avoiding Fraud and Identity Theft - October 2008

  1. 1. Avoiding Fraud We’re all about YOU!
  2. 2. <ul><li>Session Objectives </li></ul><ul><li>Fraud & Scams </li></ul><ul><li>How to protect yourself </li></ul><ul><li>What to do if you are a victim </li></ul><ul><li>Additional Information </li></ul>
  3. 3. <ul><li>Identity Theft </li></ul><ul><li>It occurs when someone uses your: </li></ul><ul><ul><li>Name </li></ul></ul><ul><ul><li>Social Security number </li></ul></ul><ul><ul><li>Other identifying information </li></ul></ul><ul><li>… without your permission, </li></ul><ul><li>to establish new accounts in your name . </li></ul>
  4. 4. <ul><li>How many victims? </li></ul><ul><li>2003 – 10.1 Million </li></ul><ul><li>2004 – close to 9.8 Million </li></ul><ul><li>2005 - 9.3 Million </li></ul><ul><li>2006 - 8.9 Million </li></ul><ul><li>2007 - 8.4 Million </li></ul><ul><ul><li>Privacy Rights Clearing House </li></ul></ul>
  5. 5. <ul><li>How can this impact YOU? </li></ul><ul><li>Damaged credit record </li></ul><ul><li>Loss of job opportunities </li></ul><ul><li>Refused loans: </li></ul><ul><ul><li>education, housing, or cars </li></ul></ul><ul><li>Spend months or years cleaning up the mess </li></ul><ul><li>Mean fraud amount per victim: 2007:$5,720 2006: $6,383 2005: $5,993 </li></ul><ul><li>No. of hours spent resolving problems: 2007:25 hours 2006: 40 hours 2005: 28 hours </li></ul><ul><li>Worst-case scenario: Victim is arrested </li></ul>
  6. 6. <ul><li>Who is most vulnerable? </li></ul><ul><li>Ages 18-24 </li></ul><ul><li>Suburban residence </li></ul><ul><li>Income ≥ $75,000 </li></ul><ul><li>Ongoing problems: 1/5 of the victims </li></ul><ul><ul><ul><ul><ul><li>Justice department </li></ul></ul></ul></ul></ul>
  7. 7. <ul><li>How do crooks get your information? </li></ul><ul><li>Misuse by family/friends </li></ul><ul><li>Lost/stolen wallets </li></ul><ul><li>Theft from mailboxes; dumpster diving </li></ul><ul><li>Others (less common): </li></ul><ul><ul><li>Steal records from employer </li></ul></ul><ul><ul><li>Shoulder surfing at ATMs or phone booths </li></ul></ul><ul><ul><li>Pose as landlord to obtain credit report </li></ul></ul><ul><ul><li>Fill out change of address to divert mail </li></ul></ul><ul><ul><li>Phishing/ Pharming / Vishing </li></ul></ul>
  8. 8. <ul><li>A crook has your info. Now what? </li></ul><ul><li>Use your name to: </li></ul><ul><li>Open new accounts </li></ul><ul><li>change billing address </li></ul><ul><ul><li>ring up charges before your mail catches up to you </li></ul></ul><ul><li>Take out loans, buy a car, or establish phone service </li></ul><ul><li>Authorize electronic transfers </li></ul><ul><ul><li>drain your account </li></ul></ul><ul><li>File for bankruptcy to avoid paying debts </li></ul><ul><li>Pretend to be you during an arrest </li></ul>
  9. 9. <ul><li>Skimming </li></ul><ul><li>Switched </li></ul><ul><li>Collect </li></ul><ul><li>Clone </li></ul>
  10. 10. <ul><li>Skimming Devices </li></ul>
  11. 11. <ul><li>Pretexting </li></ul><ul><li>Use of </li></ul><ul><ul><ul><ul><li>False </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Forged </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Counterfeit </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Lost </li></ul></ul></ul></ul><ul><ul><ul><ul><li>stolen </li></ul></ul></ul></ul><ul><li>Information to get a customer’s information from a financial institution </li></ul><ul><li>Common tactic: pose as a survey firm </li></ul>
  12. 12. <ul><li>When can you give out your SSN? </li></ul>Give out SSN to: Give out SSN to: <ul><li>Credit unions/banks </li></ul><ul><li>Employers </li></ul><ul><li>Income tax records </li></ul><ul><li>Loan applications </li></ul><ul><li>Credit bureau reports </li></ul><ul><li>College records </li></ul><ul><li>Over the phone </li></ul><ul><li>On personal checks </li></ul><ul><li>On driver’s license </li></ul><ul><li>On club membership </li></ul><ul><li>As ID for store purchases </li></ul><ul><li>As general identification </li></ul>
  13. 13. <ul><li>How to order your free credit report </li></ul><ul><li>Get one free report per year from each agency: </li></ul><ul><ul><li> </li></ul></ul><ul><ul><li>Call 877-322-8228 </li></ul></ul><ul><ul><li>Send request form to: (read envelope) </li></ul></ul><ul><li>It’s also free if you’re: </li></ul><ul><ul><li>Denied credit within the past 60 days </li></ul></ul><ul><ul><li>Victim of identity theft </li></ul></ul><ul><ul><li>Welfare recipient </li></ul></ul><ul><ul><li>Unemployed and job-hunting </li></ul></ul><ul><ul><li>Resident of CO, GA, ME, MD, MA, NJ, and VT </li></ul></ul><ul><ul><li>Annual Credit Report Request Service </li></ul></ul><ul><ul><li>P.O. Box 105281, Atlanta, GA </li></ul></ul><ul><ul><li> 30348-5281 </li></ul></ul>
  14. 14. <ul><li>What is spamming? </li></ul><ul><li>Sending unsolicited e-mail indiscriminately to multiple mailing lists, individuals, or newsgroups </li></ul>
  15. 15. <ul><li>What is spoofing? </li></ul><ul><li>Creating a replica of a legitimate Web page to fool you into submitting personal, financial, or password data </li></ul>
  16. 16. <ul><li>What is phishing? </li></ul><ul><li>Luring victims to a fake web site through spam. See current scams at </li></ul>
  17. 17. <ul><li>It’s probably a phishing attack! </li></ul><ul><li>Beware e-mail messages that: </li></ul><ul><li>Use a generic greeting </li></ul><ul><li>(“Dear Visa customers” or “Dear friend”) </li></ul><ul><li>Refer to an urgent problem </li></ul><ul><li>State that your account will be shut down unless you reconfirm your billing information </li></ul><ul><li>Urge you to click on a link within a message you weren’t expecting </li></ul><ul><li>Phishing in the World </li></ul>
  18. 20. <ul><li>Pharming </li></ul><ul><li>Practice of redirecting Internet domain name requests to illegitimate Web sites. </li></ul><ul><li>To capture your personal information and commit ID theft. </li></ul><ul><li>Differs from phishing in how you’re redirected. (through technical means) </li></ul>
  19. 21. <ul><li>Pharming can occur 4 ways </li></ul><ul><li>Static domain name spoofing (Misspellings: vs. </li></ul><ul><li>Malicious software—Malware (Viruses and Trojans redirect you to the false site) </li></ul><ul><li>Domain hijacking (Hacker hijacks legitimate site and redirects all traffic) </li></ul><ul><li>DNS poisoning (most dangerous) (You enter correct URL, but poisoned server redirects) </li></ul>
  20. 22. Receive unfamiliar bills Denied credit collection agencies try to collect Oftentimes, there aren’t any! credit card/financial statements stop arriving or have fraudulent charges No mail Signs you are a victim
  21. 23. <ul><li>Even if there are no warning signs </li></ul><ul><li>You should: </li></ul><ul><li>Check your credit report anyway! </li></ul><ul><li>Beware of e-mails and web sites offering “free” credit reports </li></ul><ul><ul><ul><li>Don’t give your SSN just to get a free report </li></ul></ul></ul>
  22. 24. <ul><li>If you are a victim </li></ul><ul><li>Place fraud alert on your credit reports. </li></ul><ul><li>Contact FTC’s ID Theft Hotline at 877-IDTHEFT. </li></ul><ul><li>Close affected accounts. Use FTC’s “ID theft affidavit” at . </li></ul><ul><li>Follow each conversation with a certified letter, return receipt requested; keep copies . </li></ul><ul><li>File a police report where ID theft took place. </li></ul><ul><li>Get copies of police reports and send to creditors . </li></ul>
  23. 25. <ul><li>The “Big Three” Credit Reporting Agencies </li></ul><ul><li>Experian </li></ul><ul><li>Order report: 888-397-3742 </li></ul><ul><li>Fraud Unit: 888-397-3742 </li></ul><ul><li> </li></ul><ul><li>TransUnion </li></ul><ul><li> Order report: 800-888-4213 </li></ul><ul><li>Fraud Unit: 800-680-7289 </li></ul><ul><li> </li></ul><ul><li>Equifax </li></ul><ul><li>Order report: 800-685-111 </li></ul><ul><li>Fraud Unit: 800-525-6285 </li></ul><ul><li> </li></ul>
  24. 26. <ul><li>What else do you need to know? </li></ul>
  25. 27. <ul><li>Internet Fraud – Shop Safely Online </li></ul><ul><li>Shop only with companies you know. </li></ul><ul><li>Pay only with credit card, or with third-party intermediary </li></ul><ul><ul><li>you have some protections if merchandise is defective, not as described, or is not received at all </li></ul></ul><ul><li>URL must change from http:// to http s ://. </li></ul><ul><li>Track online purchases easily: Use separate credit card </li></ul><ul><li>Use secure browser (look for closed padlock or unbroken key at bottom of browser window—not payment page). </li></ul>
  26. 28. <ul><li>Protect Yourself Online – Social/Networking Websites </li></ul><ul><li>Myspace, Facebook, Linkedin, and others </li></ul><ul><ul><li>do not show your address, phone number, or other personal information </li></ul></ul><ul><ul><li>Use the privacy settings so people only see what you want them to see </li></ul></ul><ul><ul><li>Only accept people you know </li></ul></ul><ul><ul><li>Beware the applications when asking for information could be made by crooks </li></ul></ul>
  27. 29. <ul><li>Protect Yourself </li></ul><ul><li>On the Phone </li></ul><ul><ul><li>Ask why they need it </li></ul></ul><ul><ul><li>Never give out personal info or authorize payment (unless you initiated the call and trust the company) </li></ul></ul><ul><ul><li>Hang up if necessary </li></ul></ul><ul><li>Online Transactions </li></ul><ul><ul><li>Make sure it is secure – https:// and a closed padlock </li></ul></ul><ul><ul><li>Verified by VISA and/or MasterCard’s Secure Code </li></ul></ul><ul><li>Shred </li></ul><ul><ul><li>All documents with personal/financial information </li></ul></ul>
  28. 30. <ul><li>Protect Yourself </li></ul><ul><li>Review statements and credit report </li></ul><ul><ul><li>Annually – credit report </li></ul></ul><ul><ul><li>Account statements: by mail – monthly; online – more often </li></ul></ul><ul><li>Mail </li></ul><ul><ul><li>Mail from locked mailbox or post office </li></ul></ul><ul><ul><li>Stop mail while out of town </li></ul></ul><ul><li>Shoulder Surfers </li></ul><ul><ul><li>Be aware of your surroundings </li></ul></ul>
  29. 31. <ul><li>Protect Yourself </li></ul><ul><li>E-mail </li></ul><ul><ul><li>Only open attachments you are expecting </li></ul></ul><ul><ul><li>Do not click on links from unfamiliar senders </li></ul></ul><ul><ul><li>Use strong passwords (letter- both upper and lower, numbers and symbols) </li></ul></ul><ul><ul><li>Avoid automatic log-in </li></ul></ul><ul><li>Computer </li></ul><ul><ul><li>Install and keep updated </li></ul></ul><ul><ul><ul><li>Virus software </li></ul></ul></ul><ul><ul><ul><li>Firewall software </li></ul></ul></ul><ul><ul><ul><li>Spyware detection/removal </li></ul></ul></ul><ul><ul><ul><li>Spam blocker – </li></ul></ul></ul><ul><ul><ul><li>Secure browser – for online transactions </li></ul></ul></ul>
  30. 32. <ul><li>Protect Yourself </li></ul><ul><li>Passwords </li></ul><ul><ul><li>Don’t use recognizable information (age, phone number, SSN, birthday) </li></ul></ul><ul><ul><li>Memorize them – do not keep them written down </li></ul></ul><ul><ul><li>Safeguard – all personal information (SSN card, bank statements, checks, purse) </li></ul></ul><ul><ul><li>Do not carry it around with you </li></ul></ul><ul><li>Personal Information </li></ul><ul><ul><li>Give out on a need to know and trusted basis </li></ul></ul><ul><li>Do not leave receipts </li></ul><ul><ul><li>They can contain your credit card information </li></ul></ul>
  31. 33. <ul><li>Protect Yourself </li></ul><ul><li>Keep name off prescreened lists </li></ul><ul><ul><li>888-5opt-out </li></ul></ul><ul><ul><li> </li></ul></ul><ul><li>Electronic deposit </li></ul><ul><ul><li>Paychecks, dividends, pension, SS payments, and tax refunds </li></ul></ul>
  32. 34. <ul><li>Useful Purchases </li></ul><ul><li>Cross cut shredder </li></ul><ul><ul><li>Prices $40 and up </li></ul></ul><ul><ul><li>Shred paper, cds, credit cards </li></ul></ul><ul><ul><li>Top brands and prices: </li></ul></ul><ul><li>Anti-spy ware software </li></ul><ul><ul><li>McAfee </li></ul></ul><ul><ul><li>Symantic </li></ul></ul><ul><ul><li>Webroot </li></ul></ul>36.00 79.00 70.00 Low end price 150.00 90.00 Middle price 60.00 340.00 105.00 High end price Royal Business Machines Ativa Init Brands and Prices
  33. 35. <ul><li>Check Fraud </li></ul><ul><li>The manipulation of checks to deceive an innocent victim expecting value in exchange for their money </li></ul><ul><ul><ul><ul><ul><li> </li></ul></ul></ul></ul></ul>
  34. 36. <ul><li>or could cost you plenty! </li></ul><ul><li>Every day, thousands of Americans receive sweepstakes offers, but not all of them are legitimate. How can you tell the difference between a real sweepstakes and a scam? Legitimate sweepstakes are fun and free . They specify that no purchase is needed to win and buying a product will not increase your chances of winning--you never have to pay to collect a prize. </li></ul><ul><li>Remember: You do not have to pay to enter a sweepstakes or collect a prize. </li></ul><ul><li>If you're asked to pay, the sweepstakes is a scam. </li></ul>
  35. 40. <ul><li>Credit Card Fraud </li></ul><ul><li>Fraudulent use of another person’s credit card and number </li></ul>
  36. 41. <ul><li>Telemarketing Fraud </li></ul><ul><li>refers to any scheme to defraud in which the persons carrying out the scheme use the telephone as their primary means of communicating with prospective victims and trying to persuade them to send money to the scheme. </li></ul>
  37. 42. <ul><li>More Resources </li></ul><ul><li>Federal Trade Commission </li></ul><ul><li>CRC-240 </li></ul><ul><li>Washington, D.C. 20580 </li></ul><ul><li>877-IDTHEFT (toll-free) </li></ul><ul><li> </li></ul><ul><li>Better Business Bureau </li></ul><ul><li> </li></ul><ul><li>Anti-Phishing Working Group </li></ul><ul><li>Privacy Rights Clearinghouse </li></ul><ul><li> </li></ul>
  38. 43. SCAMMED! 1 5-N The news of my father death, and my uncle,s involvement in an air crash in december 2002 while on a business trip to benin republic caused my mother heartfailure and other related complications of which she later died in the hospital After we have spent a lot of money on her. Before our mother died, she told us that our father deposited some money which he made from diamond sales and contracts at this bank here in Ivory Coast and that we should pray and find a trust worthy foreign business partner who would help us to transfer and invest this money in profitable business venture overseas.She told us to do this quickly so that we can leave Ivory Coast and, then settle down abroad. She gave us the bank document to prove the deposit and then told us that my father used my name as the next of kin and beneficiary to the money in the bank in the event of his death. If you are willing to assist us, please let us know immediately so that you will arrange the transfer of the money to your account with the bank. What’s Going on Here? What’s Going on Here? 2
  39. 44. Dealing With Deception <ul><li>You walk up to an ATM and a guy who appears to be waiting his turn walks up behind you. But he’s uncomfortably close—right over your shoulder—as you get ready to enter your PIN. </li></ul>5-O-1 1 of 7 What should you do?
  40. 45. <ul><li>You’re at a cash register in a store and have given the clerk your credit card. She holds on to it, probably to verify your signature. But then she says she needs to grab something from the back and starts to walk away with your card in hand. </li></ul>Dealing With Deception 5-O-2 2 of 7 What should you do?
  41. 46. <ul><li>A caller says she’s from your credit card company and wants to offer you a higher credit limit for being such a good customer. You reply, “Great, what do I have to do?” And she tells you to give her your Social Security number for verification. </li></ul>Dealing With Deception 5-O-3 3 of 7 What should you do?
  42. 47. <ul><li>You’ve found a pair of shoes at a great price on a Web site you just found. You start the check-out process and notice that the padlock at the bottom of your computer screen is open and that the Web page address starts with “http” instead of “https.” </li></ul>Dealing With Deception 5-O-4 4 of 7 What should you do?
  43. 48. <ul><li>You get an E-mail from an online bookstore you frequently buy from. It says that the credit card on your account has expired and gives you a link to update your information. </li></ul>Dealing with Deception 5-O-5 5 of 7 What should you do?
  44. 49. <ul><li>Your friend sends you an E-mail about cool new software that lets you share music with others for free. He sends you the link to download the software, which is from a site you’ve never heard of. </li></ul>Dealing With Deception 5-O-6 6 of 7 What should you do?
  45. 50. <ul><li>You’re upset about losing in an online auction. But then you get an E-mail stating the winner backed out and that you can have the item if you still want it, and to just send your credit card information via E-mail. </li></ul>Dealing With Deception 5-O-7 7 of 7 What should you do?