SlideShare a Scribd company logo
1 of 20
Download to read offline
Reporter: J’Love Minguez


Identity theft is a form of stealing
someone's identity in which someone
pretends to be someone else by assuming
that person's identity, usually as a method
to gain access to resources or obtain credit
and other benefits in that person's name.
Mail from banks, institutions, and
even new credit card offers contain valuable
personal information which identity
thieves can use to drain accounts and open
new credit cards in your name. They get the
information by stealing mail right out of
your mailbox, or as in the case of dumpster
diving, out of the trash after it has been
thrown out.
If you've ever received an email
from a "bank" or other financial institution
asking for account information, thieves
could have been phishing for your identity.
(The word is derived from "fishing,"
because the emails are like bait.) Clicking
on their link will send you to a site that
looks the same as the actual institution, but
actually belongs to the thief.
A combination of the words "voice"
and "phishing", vishing is like phishing,
except the thieves use the phone instead of
email. They may leave a message
pretending to be your bank or some other
company. When you call back, they'll take
your personal information.
Thieves have started seeking
treatment using another person's name and
medical insurance information. They can
get it by stealing your wallet or hacking into
a doctor's or hospital's computer system.
Spyware is a malicious computer
program that installs itself on your PC and
then allows thieves to record your personal
information - like a credit card number,
password, or Social Security number.
Skimming is a way for a thief to get
your ATM or credit card information by
installing their own card reader on an ATM
machine. When you pass your card through
the skimming device, it records your card
information.
Thieves can gain access to this
information by hacking into the network,
by posing as a business partner, or after an
employee loses a computer, disk or box of
files.
Identity thieves are using social
networking sites to find out your personal
information. They use the information they
find on the site to pretend to be someone
they're not and coax other information out
of you - like your Social Security number.
The thief acquires a child's personal
information, then creates fraudulent
accounts in their name. But because
children usually don't have financial
accounts until they are older, no one may
find out about the theft for many years,
allowing the problems to be greatly
compounded.
Thieves are experts at duplicating
legitimate online storefronts. Before you
know it, you’ve completed your transaction
and inadvertently handed over the personal
information they need to commit fraud.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.

Pervasive telephone scams
Phishing
False promises of “free money” from inflated
refunds
Return preparer fraud
Hiding income offshore
Impersonation of charitable organizations
False income, expenses, or exemptions
Frivolous arguments
Falsely claiming zero wages
Abusive tax structures
Misuse of trusts


The Kansas Department of Revenue's Office of Special
Investigation arrested five individuals Thursday in the
Wichita area suspected of crimes relating to driver's
license fraud and identity card fraud.

▪ Reggie Conner, 46,
▪ Manuel De Jesus Aguero-Herrera, 28,
▪ Gladys Melissa Morales-Salome, 25,
▪ Federico Ibarra, 21,
▪ Arturo Ibarra, 21,









If you receive an unsolicited email or phone call from
what appears to be your bank or building society asking
for your security details, never reveal your full password,
login details or account numbers.
Do not give out personal information on the phone, fax
or on social media platforms
Use privacy settings to manage the information you
share and with whom you share it. Be selective about
what you post and accepting friends.
Never give personal or account details to anyone who
contacts you unexpectedly. Be suspicious even if they
claim to be from your bank or the police.
Keep your personal documents in a safe place,
preferably in a lockable drawer or cabinet at home.
Consider storing valuable financial documents such as
share certificates with your bank.




Act quickly – you mustn’t ignore the
problem. Even though you didn’t order
those goods or open that bank account, the
bad debts will end up under your name and
address.
You should report all lost or stolen
documents – such as passports, driving
licences, plastic cards, cheque books.

More Related Content

What's hot

Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Fraud in Ecommerce
Fraud in EcommerceFraud in Ecommerce
Fraud in EcommerceMartyn Sukys
 
Id Theft
Id TheftId Theft
Id Theftmojo_5
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftDolf Dunn
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft PresentationLisa Sosebee
 
E commerce fraud
E commerce fraudE commerce fraud
E commerce fraudmiteshppt
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentationRoel Palmaers
 
Understanding Phishing E-Mail Scams
Understanding Phishing E-Mail ScamsUnderstanding Phishing E-Mail Scams
Understanding Phishing E-Mail ScamsJohn Poster
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internetmohmd-kutbi
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation nickski51
 
4 Most Common Financial Crimes To Protect Against
4 Most Common Financial Crimes To Protect Against4 Most Common Financial Crimes To Protect Against
4 Most Common Financial Crimes To Protect AgainstVeriti Consulting LLC
 
What are the negative and lasting effects of identity theft
What are the negative and lasting effects of identity theftWhat are the negative and lasting effects of identity theft
What are the negative and lasting effects of identity theftcFirst
 

What's hot (20)

Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Phishing
PhishingPhishing
Phishing
 
Public private partnership Identity Theft
Public private partnership Identity TheftPublic private partnership Identity Theft
Public private partnership Identity Theft
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Fraud in Ecommerce
Fraud in EcommerceFraud in Ecommerce
Fraud in Ecommerce
 
Id Theft
Id TheftId Theft
Id Theft
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
E commerce fraud
E commerce fraudE commerce fraud
E commerce fraud
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
 
Understanding Phishing E-Mail Scams
Understanding Phishing E-Mail ScamsUnderstanding Phishing E-Mail Scams
Understanding Phishing E-Mail Scams
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Identity fraud
Identity fraudIdentity fraud
Identity fraud
 
e-Fraud ppt
e-Fraud ppte-Fraud ppt
e-Fraud ppt
 
4 Most Common Financial Crimes To Protect Against
4 Most Common Financial Crimes To Protect Against4 Most Common Financial Crimes To Protect Against
4 Most Common Financial Crimes To Protect Against
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Features of-scam
Features of-scamFeatures of-scam
Features of-scam
 
What are the negative and lasting effects of identity theft
What are the negative and lasting effects of identity theftWhat are the negative and lasting effects of identity theft
What are the negative and lasting effects of identity theft
 

Similar to Computer Crimes - Identity Theft

All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theftFlora Runyenje
 
All about identity theft
All about identity theftAll about identity theft
All about identity theftMrwilson6
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft PreventionOremDPS
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada- Mark - Fullbright
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft- Mark - Fullbright
 
Identity Theft Overview
Identity Theft OverviewIdentity Theft Overview
Identity Theft Overviewgaby350
 
Powerpoint Mini Project.Pdf
Powerpoint  Mini Project.PdfPowerpoint  Mini Project.Pdf
Powerpoint Mini Project.PdfSanea
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pntjessmc1
 
Identity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineIdentity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineKristi Valentini
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft Rahmat Inggi
 

Similar to Computer Crimes - Identity Theft (20)

Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theft
 
All about identity theft
All about identity theftAll about identity theft
All about identity theft
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
What is Identity (ID) Theft ?
What is Identity (ID) Theft ?What is Identity (ID) Theft ?
What is Identity (ID) Theft ?
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Identity Theft Overview
Identity Theft OverviewIdentity Theft Overview
Identity Theft Overview
 
Powerpoint Mini Project.Pdf
Powerpoint  Mini Project.PdfPowerpoint  Mini Project.Pdf
Powerpoint Mini Project.Pdf
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pnt
 
Identity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineIdentity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazine
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 
Trilegiant 1
Trilegiant 1Trilegiant 1
Trilegiant 1
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 

Recently uploaded (20)

Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

Computer Crimes - Identity Theft

  • 2.  Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, usually as a method to gain access to resources or obtain credit and other benefits in that person's name.
  • 3.
  • 4. Mail from banks, institutions, and even new credit card offers contain valuable personal information which identity thieves can use to drain accounts and open new credit cards in your name. They get the information by stealing mail right out of your mailbox, or as in the case of dumpster diving, out of the trash after it has been thrown out.
  • 5. If you've ever received an email from a "bank" or other financial institution asking for account information, thieves could have been phishing for your identity. (The word is derived from "fishing," because the emails are like bait.) Clicking on their link will send you to a site that looks the same as the actual institution, but actually belongs to the thief.
  • 6. A combination of the words "voice" and "phishing", vishing is like phishing, except the thieves use the phone instead of email. They may leave a message pretending to be your bank or some other company. When you call back, they'll take your personal information.
  • 7. Thieves have started seeking treatment using another person's name and medical insurance information. They can get it by stealing your wallet or hacking into a doctor's or hospital's computer system.
  • 8. Spyware is a malicious computer program that installs itself on your PC and then allows thieves to record your personal information - like a credit card number, password, or Social Security number.
  • 9. Skimming is a way for a thief to get your ATM or credit card information by installing their own card reader on an ATM machine. When you pass your card through the skimming device, it records your card information.
  • 10. Thieves can gain access to this information by hacking into the network, by posing as a business partner, or after an employee loses a computer, disk or box of files.
  • 11. Identity thieves are using social networking sites to find out your personal information. They use the information they find on the site to pretend to be someone they're not and coax other information out of you - like your Social Security number.
  • 12. The thief acquires a child's personal information, then creates fraudulent accounts in their name. But because children usually don't have financial accounts until they are older, no one may find out about the theft for many years, allowing the problems to be greatly compounded.
  • 13. Thieves are experts at duplicating legitimate online storefronts. Before you know it, you’ve completed your transaction and inadvertently handed over the personal information they need to commit fraud.
  • 14.
  • 15. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. Pervasive telephone scams Phishing False promises of “free money” from inflated refunds Return preparer fraud Hiding income offshore Impersonation of charitable organizations False income, expenses, or exemptions Frivolous arguments Falsely claiming zero wages Abusive tax structures Misuse of trusts
  • 16.  The Kansas Department of Revenue's Office of Special Investigation arrested five individuals Thursday in the Wichita area suspected of crimes relating to driver's license fraud and identity card fraud. ▪ Reggie Conner, 46, ▪ Manuel De Jesus Aguero-Herrera, 28, ▪ Gladys Melissa Morales-Salome, 25, ▪ Federico Ibarra, 21, ▪ Arturo Ibarra, 21,
  • 17.
  • 18.      If you receive an unsolicited email or phone call from what appears to be your bank or building society asking for your security details, never reveal your full password, login details or account numbers. Do not give out personal information on the phone, fax or on social media platforms Use privacy settings to manage the information you share and with whom you share it. Be selective about what you post and accepting friends. Never give personal or account details to anyone who contacts you unexpectedly. Be suspicious even if they claim to be from your bank or the police. Keep your personal documents in a safe place, preferably in a lockable drawer or cabinet at home. Consider storing valuable financial documents such as share certificates with your bank.
  • 19.
  • 20.   Act quickly – you mustn’t ignore the problem. Even though you didn’t order those goods or open that bank account, the bad debts will end up under your name and address. You should report all lost or stolen documents – such as passports, driving licences, plastic cards, cheque books.