SlideShare a Scribd company logo
1 of 7
1
CYBER CRIME
Chapter 5
Objectives
· Understand the difference between identity theft and identity
fraud
· Explore the five types of identity theft/fraud
· Discuss the virtual and Internet methods in which computer
criminals steal identities
· Develop a knowledge of the crimes committed due to identity
theft
Details
I. Identity Theft: Illegal use or transfer of an individual’s
personal identification
information.
Identity Fraud: Illegal activities based on the fraudulent use of
identifying information of a real or fictitious person.
· Creation of fictitious identity by using a “breeder”
document(fictitious or stolen identifiers)
· Used by criminals to create additional lines of credit and
separate bank accounts
· Used by terrorists to conceal their own identity, hide from
authorities or gain access to sensitive information
Types of Identity Theft/Fraud
· Assumption of Identity: individual assumes the identity of
their victim, including all aspects of the victim’s lives
· Rarest form of identity theft/fraud
· Theft for Employment or Border Entry: Fraudulent use of
stolen or fictitious personal information to obtain employment
or gain entry into US
· Alien Registration Cards
· Nonimmigrant Visas
· Passports and Citizenship Documents
· Border Crossing Cards
· Virtual Identity Theft/Fraud: Use of personal, professional, or
other dimensions of identity toward creating a fraudulent virtual
personality
· On-line dating
· Role playing
· Accessing deviant sites or locations containing questionable
content
· Extra Marital Affairs
· Use for harassment or stalking
· Criminals may use to deceive others to reveal personal
information or solicit a criminal act
· Credit Identity Theft/Fraud: Use of stolen personal and
financial information to facilitate the creation of fraudulent
accounts. It requires the affirmative act of securing additional
credit.
· Criminals use to create additional sources of revenue through
the establishment of multiple accounts
· FTC (2011) reported 60% of all identity theft victims stated
their personal information was used to open new accounts,
transfer funds, or commit tax/wage related fraud
II. Scope and Victimology
· Developing crime statistics for Identity Theft/Fraud has been
difficult
· Lack of reporting by the public
· Lack of reporting by police to federal agencies
· Jurisdictional discrepancies in crime measurement
· Selective enforcement based on community standards and
department resources
· First comprehensive study conducted by Government
Accounting Office (2002)
· Identity Theft was dramatically increasing
· Calls to the Identity Theft Clearinghouse increased over 500%
in two years
· Losses incurred by MasterCard and Visa increased by 43%
· No significant loss of consumer confidence as online shopping
increased
· Number-one consumer complaint to the Federal Trade
Commission (FTC)
· FTC Study (2004): 15 million Americans victimized in 2003.
· Total annual cost to individuals was $5 billion; businesses was
$47 billion
· Total cost to Law Enforcement was $15,000-20,000 per case
· Four overall trends emerged by 2011
· Identity fraud incidents continued to increase but financial
costs to consumers decreased due to improved prevention and
detection tools which shortened the time between violation and
discovery
· Social networking activity increased the likelihood of
victimization because a lot of personal information is
exchanged publicly
· Smartphone owners are more likely to be victimized as 62%
fail to safeguard their devices with passwords
· Data breaches were increasing and more damaging
· Most common items exposed were credit card, debit card and
Social Security numbers
· Victim Profile: white males, early 40’s who lived in
metropolitan areas
· Victim Impact: Long term repercussions
· Harassment form debt collectors
· Banking problems
· Loan rejection
· Utility cutoffs
· Arrest for perpetrator’s other crimes
III. Physical Methods of Identity Theft
· Mail Theft: Theft of breeder documents (driver’s licenses,
passports, financial statements, birth certificates, death records)
from physical mailboxes; done randomly or popcorning when
mailbox red flag signals outgoing mail
· Dumpster Diving: Retrieving confidential documents from
trash cans or dumpsters; software, passwords, company
directories, personnel records
· Historically, murder weapons, corpses, bookmaking
spreadsheets and narcotics have been retrieved from trash cans
· Theft of Computers: Physical theft of laptop and desktop
computers is among the most common techniques employed by
identity thieves
· Private homes or buildings; public transit, especially airports,
hotels, recreation centers and government offices
· November 2011; desktop computer stolen from the offices of
Sutter Medical Foundation contained medical records of 3.3
million patients
· Science Applications International Corp. and Tricare Corp.;
Backup tapes stolen from employee’s car; impacted 5.1 million
military personnel and their families
· See case studies on page 129
· Bag Operations: Surreptitious entry into a hotel room to steal,
photograph or photocopy documents; steal or copy magnetic
media; or download information from laptop computers
· Scheme is designed to obtain information while leaving the
physical items in place
· Conducted by host countries (intelligence services) against
visiting diplomats or officials from a foreign government
· Insiders: Many authorities suggest corporate and government
insiders pose the greatest risk to identity theft
· Careless employees
· Sloppy handling procedures
· Failure to properly destroy data on discarded equipment
IV. Virtual or Internet-Facilitated Methods
· Phishing: most common recognized method of online identity
theft/fraud;
Soliciting information by e-mail or culling of individual to fake
web sites
· Spoofing: sending e-mails or Web sites by using company
trademarks and logos; online shopping sites-financial
institutions; eBay or PayPal, U.S. Bank, Citibank
· Pharming: advanced form of phishing; redirects the connection
between an IP address and its intended site
· Redirectors: malicious programs which redirect users network
traffic to undesired sites
· Advance-fee Fraud or 419 fraud: Fraudster sends e-mail to
victim asking for assistance claiming “found money”; solicits
personal or financial information as part of the con
· Spyware
· Browser-based software designed to capture and transmit
personal information to third parties without the knowledge and
consent of the owner
· Surreptitiously installed on a user’s machine to intercept or
take control over the interaction between users and their
computers
· Victims precipitate their own problems by opening file
attachments, downloading free software, screensavers, songs,
adult Web sites which contain the spyware
V. Crimes Facilitated by Identity Theft/Fraud
Four Phase Process
· Stolen identifiers are procured
· Breeder document is created
· Breeder document used to create additional fraudulent
documents and solidify a false identity
· Fraudulent identity is employed in the commission of a
criminal act
· Student loan fraud, immigration fraud, social security fraud,
insurance fraud, credit card fraud, tax fraud, various Internet
scams

More Related Content

Similar to 1CYBER CRIMEChapter 5Objectives· Understand the differen.docx

West Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updatedWest Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updatedAdam Singer
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Preventionfmi_igf
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudMatt Smith
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS- Mark - Fullbright
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftMartha Brown
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 
Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft- Mark - Fullbright
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfDigital EYE Media
 
GROUP 4-final presentation.pptx. in TLE
GROUP  4-final presentation.pptx. in TLEGROUP  4-final presentation.pptx. in TLE
GROUP 4-final presentation.pptx. in TLEmenezachristal
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
IDSHield Services and Features
IDSHield Services and FeaturesIDSHield Services and Features
IDSHield Services and FeaturesAntonio Muniz Olan
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 

Similar to 1CYBER CRIMEChapter 5Objectives· Understand the differen.docx (20)

West Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updatedWest Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updated
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Prevention
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Cyber Laundering and the AML Directives
Cyber Laundering and the AML DirectivesCyber Laundering and the AML Directives
Cyber Laundering and the AML Directives
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
 
Training For Bank Employees
Training For Bank EmployeesTraining For Bank Employees
Training For Bank Employees
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Identity Theft * Canada
Identity Theft * CanadaIdentity Theft * Canada
Identity Theft * Canada
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect Yourself
 
GROUP 4-final presentation.pptx. in TLE
GROUP  4-final presentation.pptx. in TLEGROUP  4-final presentation.pptx. in TLE
GROUP 4-final presentation.pptx. in TLE
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
IDSHield Services and Features
IDSHield Services and FeaturesIDSHield Services and Features
IDSHield Services and Features
 
ID Theft
ID TheftID Theft
ID Theft
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 

More from herminaprocter

2. Framework Graphic  Candidates will create a graphic that re.docx
2. Framework Graphic  Candidates will create a graphic that re.docx2. Framework Graphic  Candidates will create a graphic that re.docx
2. Framework Graphic  Candidates will create a graphic that re.docxherminaprocter
 
2. Research Article Review – Read one (1) research articles on T.docx
2. Research Article Review – Read one (1) research articles on T.docx2. Research Article Review – Read one (1) research articles on T.docx
2. Research Article Review – Read one (1) research articles on T.docxherminaprocter
 
2) In examining Document 4 and Document 6, how did the.docx
2) In examining Document 4 and Document 6, how did the.docx2) In examining Document 4 and Document 6, how did the.docx
2) In examining Document 4 and Document 6, how did the.docxherminaprocter
 
2-3 pages in length (including exhibits, tables and appendices.docx
2-3 pages in length (including exhibits, tables and appendices.docx2-3 pages in length (including exhibits, tables and appendices.docx
2-3 pages in length (including exhibits, tables and appendices.docxherminaprocter
 
2. Sandra is a parent who believes that play is just entertainment f.docx
2. Sandra is a parent who believes that play is just entertainment f.docx2. Sandra is a parent who believes that play is just entertainment f.docx
2. Sandra is a parent who believes that play is just entertainment f.docxherminaprocter
 
2.2 Discussion What Is LeadershipGetting StartedR.docx
2.2 Discussion What Is LeadershipGetting StartedR.docx2.2 Discussion What Is LeadershipGetting StartedR.docx
2.2 Discussion What Is LeadershipGetting StartedR.docxherminaprocter
 
2.  You are a member of the Human Resource Department of a medium-si.docx
2.  You are a member of the Human Resource Department of a medium-si.docx2.  You are a member of the Human Resource Department of a medium-si.docx
2.  You are a member of the Human Resource Department of a medium-si.docxherminaprocter
 
2.1.  What is Strategic Human Resource Management Differentiate bet.docx
2.1.  What is Strategic Human Resource Management Differentiate bet.docx2.1.  What is Strategic Human Resource Management Differentiate bet.docx
2.1.  What is Strategic Human Resource Management Differentiate bet.docxherminaprocter
 
2,___Use of no less than six slides and no more than seven .docx
2,___Use of no less than six slides and no more than seven .docx2,___Use of no less than six slides and no more than seven .docx
2,___Use of no less than six slides and no more than seven .docxherminaprocter
 
2. Multicultural Interview Paper Students may begin this.docx
2. Multicultural Interview Paper Students may begin this.docx2. Multicultural Interview Paper Students may begin this.docx
2. Multicultural Interview Paper Students may begin this.docxherminaprocter
 
2-4A summary of your findings regarding sexual orientation and.docx
2-4A summary of your findings regarding sexual orientation and.docx2-4A summary of your findings regarding sexual orientation and.docx
2-4A summary of your findings regarding sexual orientation and.docxherminaprocter
 
2- to 4A description of the services in your local communi.docx
2- to 4A description of the services in your local communi.docx2- to 4A description of the services in your local communi.docx
2- to 4A description of the services in your local communi.docxherminaprocter
 
2  or more paragraphAs previously noted, the Brocks have some of.docx
2  or more paragraphAs previously noted, the Brocks have some of.docx2  or more paragraphAs previously noted, the Brocks have some of.docx
2  or more paragraphAs previously noted, the Brocks have some of.docxherminaprocter
 
2-1 IntroductionUber Technologies Inc. (Uber) is a tech startu.docx
2-1 IntroductionUber Technologies Inc. (Uber) is a tech startu.docx2-1 IntroductionUber Technologies Inc. (Uber) is a tech startu.docx
2-1 IntroductionUber Technologies Inc. (Uber) is a tech startu.docxherminaprocter
 
2 postsRe Topic 2 DQ 1Social determinants of health are fac.docx
2 postsRe Topic 2 DQ 1Social determinants of health are fac.docx2 postsRe Topic 2 DQ 1Social determinants of health are fac.docx
2 postsRe Topic 2 DQ 1Social determinants of health are fac.docxherminaprocter
 
2 peer responses due in 4 hoursMALEETAS POSTWorld War .docx
2 peer responses due in 4 hoursMALEETAS POSTWorld War .docx2 peer responses due in 4 hoursMALEETAS POSTWorld War .docx
2 peer responses due in 4 hoursMALEETAS POSTWorld War .docxherminaprocter
 
2 Pages for 4 questions below1) Some say that analytics in gener.docx
2 Pages for 4 questions below1) Some say that analytics in gener.docx2 Pages for 4 questions below1) Some say that analytics in gener.docx
2 Pages for 4 questions below1) Some say that analytics in gener.docxherminaprocter
 
2 Ethics Session 1.pptxEthics in Engineering Pra.docx
2 Ethics Session 1.pptxEthics in Engineering Pra.docx2 Ethics Session 1.pptxEthics in Engineering Pra.docx
2 Ethics Session 1.pptxEthics in Engineering Pra.docxherminaprocter
 
2 1 5L e a r n I n g o b j e c t I v e sC H A P T E R.docx
2 1 5L e a r n I n g  o b j e c t I v e sC H A P T E R.docx2 1 5L e a r n I n g  o b j e c t I v e sC H A P T E R.docx
2 1 5L e a r n I n g o b j e c t I v e sC H A P T E R.docxherminaprocter
 
2 Requirements Elicitation A Survey of Techniques, Ap.docx
2  Requirements Elicitation  A Survey of Techniques, Ap.docx2  Requirements Elicitation  A Survey of Techniques, Ap.docx
2 Requirements Elicitation A Survey of Techniques, Ap.docxherminaprocter
 

More from herminaprocter (20)

2. Framework Graphic  Candidates will create a graphic that re.docx
2. Framework Graphic  Candidates will create a graphic that re.docx2. Framework Graphic  Candidates will create a graphic that re.docx
2. Framework Graphic  Candidates will create a graphic that re.docx
 
2. Research Article Review – Read one (1) research articles on T.docx
2. Research Article Review – Read one (1) research articles on T.docx2. Research Article Review – Read one (1) research articles on T.docx
2. Research Article Review – Read one (1) research articles on T.docx
 
2) In examining Document 4 and Document 6, how did the.docx
2) In examining Document 4 and Document 6, how did the.docx2) In examining Document 4 and Document 6, how did the.docx
2) In examining Document 4 and Document 6, how did the.docx
 
2-3 pages in length (including exhibits, tables and appendices.docx
2-3 pages in length (including exhibits, tables and appendices.docx2-3 pages in length (including exhibits, tables and appendices.docx
2-3 pages in length (including exhibits, tables and appendices.docx
 
2. Sandra is a parent who believes that play is just entertainment f.docx
2. Sandra is a parent who believes that play is just entertainment f.docx2. Sandra is a parent who believes that play is just entertainment f.docx
2. Sandra is a parent who believes that play is just entertainment f.docx
 
2.2 Discussion What Is LeadershipGetting StartedR.docx
2.2 Discussion What Is LeadershipGetting StartedR.docx2.2 Discussion What Is LeadershipGetting StartedR.docx
2.2 Discussion What Is LeadershipGetting StartedR.docx
 
2.  You are a member of the Human Resource Department of a medium-si.docx
2.  You are a member of the Human Resource Department of a medium-si.docx2.  You are a member of the Human Resource Department of a medium-si.docx
2.  You are a member of the Human Resource Department of a medium-si.docx
 
2.1.  What is Strategic Human Resource Management Differentiate bet.docx
2.1.  What is Strategic Human Resource Management Differentiate bet.docx2.1.  What is Strategic Human Resource Management Differentiate bet.docx
2.1.  What is Strategic Human Resource Management Differentiate bet.docx
 
2,___Use of no less than six slides and no more than seven .docx
2,___Use of no less than six slides and no more than seven .docx2,___Use of no less than six slides and no more than seven .docx
2,___Use of no less than six slides and no more than seven .docx
 
2. Multicultural Interview Paper Students may begin this.docx
2. Multicultural Interview Paper Students may begin this.docx2. Multicultural Interview Paper Students may begin this.docx
2. Multicultural Interview Paper Students may begin this.docx
 
2-4A summary of your findings regarding sexual orientation and.docx
2-4A summary of your findings regarding sexual orientation and.docx2-4A summary of your findings regarding sexual orientation and.docx
2-4A summary of your findings regarding sexual orientation and.docx
 
2- to 4A description of the services in your local communi.docx
2- to 4A description of the services in your local communi.docx2- to 4A description of the services in your local communi.docx
2- to 4A description of the services in your local communi.docx
 
2  or more paragraphAs previously noted, the Brocks have some of.docx
2  or more paragraphAs previously noted, the Brocks have some of.docx2  or more paragraphAs previously noted, the Brocks have some of.docx
2  or more paragraphAs previously noted, the Brocks have some of.docx
 
2-1 IntroductionUber Technologies Inc. (Uber) is a tech startu.docx
2-1 IntroductionUber Technologies Inc. (Uber) is a tech startu.docx2-1 IntroductionUber Technologies Inc. (Uber) is a tech startu.docx
2-1 IntroductionUber Technologies Inc. (Uber) is a tech startu.docx
 
2 postsRe Topic 2 DQ 1Social determinants of health are fac.docx
2 postsRe Topic 2 DQ 1Social determinants of health are fac.docx2 postsRe Topic 2 DQ 1Social determinants of health are fac.docx
2 postsRe Topic 2 DQ 1Social determinants of health are fac.docx
 
2 peer responses due in 4 hoursMALEETAS POSTWorld War .docx
2 peer responses due in 4 hoursMALEETAS POSTWorld War .docx2 peer responses due in 4 hoursMALEETAS POSTWorld War .docx
2 peer responses due in 4 hoursMALEETAS POSTWorld War .docx
 
2 Pages for 4 questions below1) Some say that analytics in gener.docx
2 Pages for 4 questions below1) Some say that analytics in gener.docx2 Pages for 4 questions below1) Some say that analytics in gener.docx
2 Pages for 4 questions below1) Some say that analytics in gener.docx
 
2 Ethics Session 1.pptxEthics in Engineering Pra.docx
2 Ethics Session 1.pptxEthics in Engineering Pra.docx2 Ethics Session 1.pptxEthics in Engineering Pra.docx
2 Ethics Session 1.pptxEthics in Engineering Pra.docx
 
2 1 5L e a r n I n g o b j e c t I v e sC H A P T E R.docx
2 1 5L e a r n I n g  o b j e c t I v e sC H A P T E R.docx2 1 5L e a r n I n g  o b j e c t I v e sC H A P T E R.docx
2 1 5L e a r n I n g o b j e c t I v e sC H A P T E R.docx
 
2 Requirements Elicitation A Survey of Techniques, Ap.docx
2  Requirements Elicitation  A Survey of Techniques, Ap.docx2  Requirements Elicitation  A Survey of Techniques, Ap.docx
2 Requirements Elicitation A Survey of Techniques, Ap.docx
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationNeilDeclaro1
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answersdalebeck957
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 

Recently uploaded (20)

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

1CYBER CRIMEChapter 5Objectives· Understand the differen.docx

  • 1. 1 CYBER CRIME Chapter 5 Objectives · Understand the difference between identity theft and identity fraud · Explore the five types of identity theft/fraud · Discuss the virtual and Internet methods in which computer criminals steal identities · Develop a knowledge of the crimes committed due to identity theft Details I. Identity Theft: Illegal use or transfer of an individual’s personal identification information. Identity Fraud: Illegal activities based on the fraudulent use of identifying information of a real or fictitious person. · Creation of fictitious identity by using a “breeder” document(fictitious or stolen identifiers) · Used by criminals to create additional lines of credit and separate bank accounts · Used by terrorists to conceal their own identity, hide from authorities or gain access to sensitive information Types of Identity Theft/Fraud · Assumption of Identity: individual assumes the identity of their victim, including all aspects of the victim’s lives · Rarest form of identity theft/fraud
  • 2. · Theft for Employment or Border Entry: Fraudulent use of stolen or fictitious personal information to obtain employment or gain entry into US · Alien Registration Cards · Nonimmigrant Visas · Passports and Citizenship Documents · Border Crossing Cards · Virtual Identity Theft/Fraud: Use of personal, professional, or other dimensions of identity toward creating a fraudulent virtual personality · On-line dating · Role playing · Accessing deviant sites or locations containing questionable content · Extra Marital Affairs · Use for harassment or stalking · Criminals may use to deceive others to reveal personal information or solicit a criminal act · Credit Identity Theft/Fraud: Use of stolen personal and financial information to facilitate the creation of fraudulent accounts. It requires the affirmative act of securing additional credit. · Criminals use to create additional sources of revenue through the establishment of multiple accounts · FTC (2011) reported 60% of all identity theft victims stated
  • 3. their personal information was used to open new accounts, transfer funds, or commit tax/wage related fraud II. Scope and Victimology · Developing crime statistics for Identity Theft/Fraud has been difficult · Lack of reporting by the public · Lack of reporting by police to federal agencies · Jurisdictional discrepancies in crime measurement · Selective enforcement based on community standards and department resources · First comprehensive study conducted by Government Accounting Office (2002) · Identity Theft was dramatically increasing · Calls to the Identity Theft Clearinghouse increased over 500% in two years · Losses incurred by MasterCard and Visa increased by 43% · No significant loss of consumer confidence as online shopping increased · Number-one consumer complaint to the Federal Trade Commission (FTC) · FTC Study (2004): 15 million Americans victimized in 2003. · Total annual cost to individuals was $5 billion; businesses was $47 billion · Total cost to Law Enforcement was $15,000-20,000 per case
  • 4. · Four overall trends emerged by 2011 · Identity fraud incidents continued to increase but financial costs to consumers decreased due to improved prevention and detection tools which shortened the time between violation and discovery · Social networking activity increased the likelihood of victimization because a lot of personal information is exchanged publicly · Smartphone owners are more likely to be victimized as 62% fail to safeguard their devices with passwords · Data breaches were increasing and more damaging · Most common items exposed were credit card, debit card and Social Security numbers · Victim Profile: white males, early 40’s who lived in metropolitan areas · Victim Impact: Long term repercussions · Harassment form debt collectors · Banking problems · Loan rejection · Utility cutoffs · Arrest for perpetrator’s other crimes III. Physical Methods of Identity Theft · Mail Theft: Theft of breeder documents (driver’s licenses, passports, financial statements, birth certificates, death records)
  • 5. from physical mailboxes; done randomly or popcorning when mailbox red flag signals outgoing mail · Dumpster Diving: Retrieving confidential documents from trash cans or dumpsters; software, passwords, company directories, personnel records · Historically, murder weapons, corpses, bookmaking spreadsheets and narcotics have been retrieved from trash cans · Theft of Computers: Physical theft of laptop and desktop computers is among the most common techniques employed by identity thieves · Private homes or buildings; public transit, especially airports, hotels, recreation centers and government offices · November 2011; desktop computer stolen from the offices of Sutter Medical Foundation contained medical records of 3.3 million patients · Science Applications International Corp. and Tricare Corp.; Backup tapes stolen from employee’s car; impacted 5.1 million military personnel and their families · See case studies on page 129 · Bag Operations: Surreptitious entry into a hotel room to steal, photograph or photocopy documents; steal or copy magnetic media; or download information from laptop computers · Scheme is designed to obtain information while leaving the physical items in place · Conducted by host countries (intelligence services) against visiting diplomats or officials from a foreign government · Insiders: Many authorities suggest corporate and government insiders pose the greatest risk to identity theft
  • 6. · Careless employees · Sloppy handling procedures · Failure to properly destroy data on discarded equipment IV. Virtual or Internet-Facilitated Methods · Phishing: most common recognized method of online identity theft/fraud; Soliciting information by e-mail or culling of individual to fake web sites · Spoofing: sending e-mails or Web sites by using company trademarks and logos; online shopping sites-financial institutions; eBay or PayPal, U.S. Bank, Citibank · Pharming: advanced form of phishing; redirects the connection between an IP address and its intended site · Redirectors: malicious programs which redirect users network traffic to undesired sites · Advance-fee Fraud or 419 fraud: Fraudster sends e-mail to victim asking for assistance claiming “found money”; solicits personal or financial information as part of the con · Spyware · Browser-based software designed to capture and transmit personal information to third parties without the knowledge and consent of the owner · Surreptitiously installed on a user’s machine to intercept or take control over the interaction between users and their computers · Victims precipitate their own problems by opening file
  • 7. attachments, downloading free software, screensavers, songs, adult Web sites which contain the spyware V. Crimes Facilitated by Identity Theft/Fraud Four Phase Process · Stolen identifiers are procured · Breeder document is created · Breeder document used to create additional fraudulent documents and solidify a false identity · Fraudulent identity is employed in the commission of a criminal act · Student loan fraud, immigration fraud, social security fraud, insurance fraud, credit card fraud, tax fraud, various Internet scams