SlideShare a Scribd company logo
1 of 7
1
CYBER CRIME
Chapter 5
Objectives
· Understand the difference between identity theft and identity
fraud
· Explore the five types of identity theft/fraud
· Discuss the virtual and Internet methods in which computer
criminals steal identities
· Develop a knowledge of the crimes committed due to identity
theft
Details
I. Identity Theft: Illegal use or transfer of an individual’s
personal identification
information.
Identity Fraud: Illegal activities based on the fraudulent use of
identifying information of a real or fictitious person.
· Creation of fictitious identity by using a “breeder”
document(fictitious or stolen identifiers)
· Used by criminals to create additional lines of credit and
separate bank accounts
· Used by terrorists to conceal their own identity, hide from
authorities or gain access to sensitive information
Types of Identity Theft/Fraud
· Assumption of Identity: individual assumes the identity of
their victim, including all aspects of the victim’s lives
· Rarest form of identity theft/fraud
· Theft for Employment or Border Entry: Fraudulent use of
stolen or fictitious personal information to obtain employment
or gain entry into US
· Alien Registration Cards
· Nonimmigrant Visas
· Passports and Citizenship Documents
· Border Crossing Cards
· Virtual Identity Theft/Fraud: Use of personal, professional, or
other dimensions of identity toward creating a fraudulent virtual
personality
· On-line dating
· Role playing
· Accessing deviant sites or locations containing questionable
content
· Extra Marital Affairs
· Use for harassment or stalking
· Criminals may use to deceive others to reveal personal
information or solicit a criminal act
· Credit Identity Theft/Fraud: Use of stolen personal and
financial information to facilitate the creation of fraudulent
accounts. It requires the affirmative act of securing additional
credit.
· Criminals use to create additional sources of revenue through
the establishment of multiple accounts
· FTC (2011) reported 60% of all identity theft victims stated
their personal information was used to open new accounts,
transfer funds, or commit tax/wage related fraud
II. Scope and Victimology
· Developing crime statistics for Identity Theft/Fraud has been
difficult
· Lack of reporting by the public
· Lack of reporting by police to federal agencies
· Jurisdictional discrepancies in crime measurement
· Selective enforcement based on community standards and
department resources
· First comprehensive study conducted by Government
Accounting Office (2002)
· Identity Theft was dramatically increasing
· Calls to the Identity Theft Clearinghouse increased over 500%
in two years
· Losses incurred by MasterCard and Visa increased by 43%
· No significant loss of consumer confidence as online shopping
increased
· Number-one consumer complaint to the Federal Trade
Commission (FTC)
· FTC Study (2004): 15 million Americans victimized in 2003.
· Total annual cost to individuals was $5 billion; businesses was
$47 billion
· Total cost to Law Enforcement was $15,000-20,000 per case
· Four overall trends emerged by 2011
· Identity fraud incidents continued to increase but financial
costs to consumers decreased due to improved prevention and
detection tools which shortened the time between violation and
discovery
· Social networking activity increased the likelihood of
victimization because a lot of personal information is
exchanged publicly
· Smartphone owners are more likely to be victimized as 62%
fail to safeguard their devices with passwords
· Data breaches were increasing and more damaging
· Most common items exposed were credit card, debit card and
Social Security numbers
· Victim Profile: white males, early 40’s who lived in
metropolitan areas
· Victim Impact: Long term repercussions
· Harassment form debt collectors
· Banking problems
· Loan rejection
· Utility cutoffs
· Arrest for perpetrator’s other crimes
III. Physical Methods of Identity Theft
· Mail Theft: Theft of breeder documents (driver’s licenses,
passports, financial statements, birth certificates, death records)
from physical mailboxes; done randomly or popcorning when
mailbox red flag signals outgoing mail
· Dumpster Diving: Retrieving confidential documents from
trash cans or dumpsters; software, passwords, company
directories, personnel records
· Historically, murder weapons, corpses, bookmaking
spreadsheets and narcotics have been retrieved from trash cans
· Theft of Computers: Physical theft of laptop and desktop
computers is among the most common techniques employed by
identity thieves
· Private homes or buildings; public transit, especially airports,
hotels, recreation centers and government offices
· November 2011; desktop computer stolen from the offices of
Sutter Medical Foundation contained medical records of 3.3
million patients
· Science Applications International Corp. and Tricare Corp.;
Backup tapes stolen from employee’s car; impacted 5.1 million
military personnel and their families
· See case studies on page 129
· Bag Operations: Surreptitious entry into a hotel room to steal,
photograph or photocopy documents; steal or copy magnetic
media; or download information from laptop computers
· Scheme is designed to obtain information while leaving the
physical items in place
· Conducted by host countries (intelligence services) against
visiting diplomats or officials from a foreign government
· Insiders: Many authorities suggest corporate and government
insiders pose the greatest risk to identity theft
· Careless employees
· Sloppy handling procedures
· Failure to properly destroy data on discarded equipment
IV. Virtual or Internet-Facilitated Methods
· Phishing: most common recognized method of online identity
theft/fraud;
Soliciting information by e-mail or culling of individual to fake
web sites
· Spoofing: sending e-mails or Web sites by using company
trademarks and logos; online shopping sites-financial
institutions; eBay or PayPal, U.S. Bank, Citibank
· Pharming: advanced form of phishing; redirects the connection
between an IP address and its intended site
· Redirectors: malicious programs which redirect users network
traffic to undesired sites
· Advance-fee Fraud or 419 fraud: Fraudster sends e-mail to
victim asking for assistance claiming “found money”; solicits
personal or financial information as part of the con
· Spyware
· Browser-based software designed to capture and transmit
personal information to third parties without the knowledge and
consent of the owner
· Surreptitiously installed on a user’s machine to intercept or
take control over the interaction between users and their
computers
· Victims precipitate their own problems by opening file
attachments, downloading free software, screensavers, songs,
adult Web sites which contain the spyware
V. Crimes Facilitated by Identity Theft/Fraud
Four Phase Process
· Stolen identifiers are procured
· Breeder document is created
· Breeder document used to create additional fraudulent
documents and solidify a false identity
· Fraudulent identity is employed in the commission of a
criminal act
· Student loan fraud, immigration fraud, social security fraud,
insurance fraud, credit card fraud, tax fraud, various Internet
scams

More Related Content

Similar to 1CYBER CRIMEChapter 5Objectives· Understand the differen.docx

West Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updatedWest Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updatedAdam Singer
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Preventionfmi_igf
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudMatt Smith
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS- Mark - Fullbright
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftMartha Brown
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 
Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft- Mark - Fullbright
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfDigital EYE Media
 
GROUP 4-final presentation.pptx. in TLE
GROUP  4-final presentation.pptx. in TLEGROUP  4-final presentation.pptx. in TLE
GROUP 4-final presentation.pptx. in TLEmenezachristal
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
IDSHield Services and Features
IDSHield Services and FeaturesIDSHield Services and Features
IDSHield Services and FeaturesAntonio Muniz Olan
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 

Similar to 1CYBER CRIMEChapter 5Objectives· Understand the differen.docx (20)

West Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updatedWest Point ID Theft and FCRA Presentation updated
West Point ID Theft and FCRA Presentation updated
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Prevention
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Cyber Laundering and the AML Directives
Cyber Laundering and the AML DirectivesCyber Laundering and the AML Directives
Cyber Laundering and the AML Directives
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
 
Training For Bank Employees
Training For Bank EmployeesTraining For Bank Employees
Training For Bank Employees
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Identity Theft * Canada
Identity Theft * CanadaIdentity Theft * Canada
Identity Theft * Canada
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect Yourself
 
GROUP 4-final presentation.pptx. in TLE
GROUP  4-final presentation.pptx. in TLEGROUP  4-final presentation.pptx. in TLE
GROUP 4-final presentation.pptx. in TLE
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
IDSHield Services and Features
IDSHield Services and FeaturesIDSHield Services and Features
IDSHield Services and Features
 
ID Theft
ID TheftID Theft
ID Theft
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 

More from jesusamckone

3 templates are due based on the focus review. Attached are the temp.docx
3 templates are due based on the focus review. Attached are the temp.docx3 templates are due based on the focus review. Attached are the temp.docx
3 templates are due based on the focus review. Attached are the temp.docxjesusamckone
 
3-4 pages Explain Internal and External recruiting. Discuss the pro.docx
3-4 pages Explain Internal and External recruiting. Discuss the pro.docx3-4 pages Explain Internal and External recruiting. Discuss the pro.docx
3-4 pages Explain Internal and External recruiting. Discuss the pro.docxjesusamckone
 
3-4 page essayInequality of income is greater in the United Sta.docx
3-4 page essayInequality of income is greater in the United Sta.docx3-4 page essayInequality of income is greater in the United Sta.docx
3-4 page essayInequality of income is greater in the United Sta.docxjesusamckone
 
3 Vision Visioning is relatively easy. Casting a shared and clea.docx
3 Vision Visioning is relatively easy. Casting a shared and clea.docx3 Vision Visioning is relatively easy. Casting a shared and clea.docx
3 Vision Visioning is relatively easy. Casting a shared and clea.docxjesusamckone
 
3 Power points on nutrition while home schooling1 for elementary.docx
3 Power points on nutrition while home schooling1 for elementary.docx3 Power points on nutrition while home schooling1 for elementary.docx
3 Power points on nutrition while home schooling1 for elementary.docxjesusamckone
 
3 paragraph minimum, in text references, and scholarly references. .docx
3 paragraph minimum, in text references, and scholarly references. .docx3 paragraph minimum, in text references, and scholarly references. .docx
3 paragraph minimum, in text references, and scholarly references. .docxjesusamckone
 
2HOW THANKSGIVING AND SUPER BOWL TRAFFIC CONTRIBUTE TO FLIGH.docx
2HOW THANKSGIVING AND SUPER BOWL TRAFFIC CONTRIBUTE TO FLIGH.docx2HOW THANKSGIVING AND SUPER BOWL TRAFFIC CONTRIBUTE TO FLIGH.docx
2HOW THANKSGIVING AND SUPER BOWL TRAFFIC CONTRIBUTE TO FLIGH.docxjesusamckone
 
3 page essay In-text scholar references in APA formatI.docx
3 page essay In-text scholar references in APA formatI.docx3 page essay In-text scholar references in APA formatI.docx
3 page essay In-text scholar references in APA formatI.docxjesusamckone
 
3 Law peer reviewed references needed.Answer the Discussion Board bo.docx
3 Law peer reviewed references needed.Answer the Discussion Board bo.docx3 Law peer reviewed references needed.Answer the Discussion Board bo.docx
3 Law peer reviewed references needed.Answer the Discussion Board bo.docxjesusamckone
 
3 Implementing Change hxdbzxyiStockThinkstockLearnin.docx
3 Implementing Change hxdbzxyiStockThinkstockLearnin.docx3 Implementing Change hxdbzxyiStockThinkstockLearnin.docx
3 Implementing Change hxdbzxyiStockThinkstockLearnin.docxjesusamckone
 
2To ADD names From ADD name Date ADD date Subject ADD ti.docx
2To  ADD names From  ADD name Date  ADD date Subject  ADD ti.docx2To  ADD names From  ADD name Date  ADD date Subject  ADD ti.docx
2To ADD names From ADD name Date ADD date Subject ADD ti.docxjesusamckone
 
3 page essay regarding civil liberties, civil rights, and the presid.docx
3 page essay regarding civil liberties, civil rights, and the presid.docx3 page essay regarding civil liberties, civil rights, and the presid.docx
3 page essay regarding civil liberties, civil rights, and the presid.docxjesusamckone
 
2TITLE OF PAPERDavid B. JonesColumbia Southe.docx
2TITLE OF PAPERDavid B. JonesColumbia Southe.docx2TITLE OF PAPERDavid B. JonesColumbia Southe.docx
2TITLE OF PAPERDavid B. JonesColumbia Southe.docxjesusamckone
 
2Running head THE JONES ACTThe Jones Act 2.docx
2Running head THE JONES ACTThe Jones Act 2.docx2Running head THE JONES ACTThe Jones Act 2.docx
2Running head THE JONES ACTThe Jones Act 2.docxjesusamckone
 
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docxjesusamckone
 
2BUS 503 JOURNAL .docx
2BUS 503 JOURNAL                                 .docx2BUS 503 JOURNAL                                 .docx
2BUS 503 JOURNAL .docxjesusamckone
 
2Fifth Edition COMMUNITY PSYCHOLOGY.docx
2Fifth Edition   COMMUNITY PSYCHOLOGY.docx2Fifth Edition   COMMUNITY PSYCHOLOGY.docx
2Fifth Edition COMMUNITY PSYCHOLOGY.docxjesusamckone
 
293Peter Singer has written about assisted reproduction, a.docx
293Peter Singer has written about assisted reproduction, a.docx293Peter Singer has written about assisted reproduction, a.docx
293Peter Singer has written about assisted reproduction, a.docxjesusamckone
 
26.5Albert Beveridge, Defense of Imperialism”Albert Beveridge (.docx
26.5Albert Beveridge, Defense of Imperialism”Albert Beveridge (.docx26.5Albert Beveridge, Defense of Imperialism”Albert Beveridge (.docx
26.5Albert Beveridge, Defense of Imperialism”Albert Beveridge (.docxjesusamckone
 
2Evaluating StocksEvaluating StocksLearning Team BFIN402.docx
2Evaluating StocksEvaluating StocksLearning Team BFIN402.docx2Evaluating StocksEvaluating StocksLearning Team BFIN402.docx
2Evaluating StocksEvaluating StocksLearning Team BFIN402.docxjesusamckone
 

More from jesusamckone (20)

3 templates are due based on the focus review. Attached are the temp.docx
3 templates are due based on the focus review. Attached are the temp.docx3 templates are due based on the focus review. Attached are the temp.docx
3 templates are due based on the focus review. Attached are the temp.docx
 
3-4 pages Explain Internal and External recruiting. Discuss the pro.docx
3-4 pages Explain Internal and External recruiting. Discuss the pro.docx3-4 pages Explain Internal and External recruiting. Discuss the pro.docx
3-4 pages Explain Internal and External recruiting. Discuss the pro.docx
 
3-4 page essayInequality of income is greater in the United Sta.docx
3-4 page essayInequality of income is greater in the United Sta.docx3-4 page essayInequality of income is greater in the United Sta.docx
3-4 page essayInequality of income is greater in the United Sta.docx
 
3 Vision Visioning is relatively easy. Casting a shared and clea.docx
3 Vision Visioning is relatively easy. Casting a shared and clea.docx3 Vision Visioning is relatively easy. Casting a shared and clea.docx
3 Vision Visioning is relatively easy. Casting a shared and clea.docx
 
3 Power points on nutrition while home schooling1 for elementary.docx
3 Power points on nutrition while home schooling1 for elementary.docx3 Power points on nutrition while home schooling1 for elementary.docx
3 Power points on nutrition while home schooling1 for elementary.docx
 
3 paragraph minimum, in text references, and scholarly references. .docx
3 paragraph minimum, in text references, and scholarly references. .docx3 paragraph minimum, in text references, and scholarly references. .docx
3 paragraph minimum, in text references, and scholarly references. .docx
 
2HOW THANKSGIVING AND SUPER BOWL TRAFFIC CONTRIBUTE TO FLIGH.docx
2HOW THANKSGIVING AND SUPER BOWL TRAFFIC CONTRIBUTE TO FLIGH.docx2HOW THANKSGIVING AND SUPER BOWL TRAFFIC CONTRIBUTE TO FLIGH.docx
2HOW THANKSGIVING AND SUPER BOWL TRAFFIC CONTRIBUTE TO FLIGH.docx
 
3 page essay In-text scholar references in APA formatI.docx
3 page essay In-text scholar references in APA formatI.docx3 page essay In-text scholar references in APA formatI.docx
3 page essay In-text scholar references in APA formatI.docx
 
3 Law peer reviewed references needed.Answer the Discussion Board bo.docx
3 Law peer reviewed references needed.Answer the Discussion Board bo.docx3 Law peer reviewed references needed.Answer the Discussion Board bo.docx
3 Law peer reviewed references needed.Answer the Discussion Board bo.docx
 
3 Implementing Change hxdbzxyiStockThinkstockLearnin.docx
3 Implementing Change hxdbzxyiStockThinkstockLearnin.docx3 Implementing Change hxdbzxyiStockThinkstockLearnin.docx
3 Implementing Change hxdbzxyiStockThinkstockLearnin.docx
 
2To ADD names From ADD name Date ADD date Subject ADD ti.docx
2To  ADD names From  ADD name Date  ADD date Subject  ADD ti.docx2To  ADD names From  ADD name Date  ADD date Subject  ADD ti.docx
2To ADD names From ADD name Date ADD date Subject ADD ti.docx
 
3 page essay regarding civil liberties, civil rights, and the presid.docx
3 page essay regarding civil liberties, civil rights, and the presid.docx3 page essay regarding civil liberties, civil rights, and the presid.docx
3 page essay regarding civil liberties, civil rights, and the presid.docx
 
2TITLE OF PAPERDavid B. JonesColumbia Southe.docx
2TITLE OF PAPERDavid B. JonesColumbia Southe.docx2TITLE OF PAPERDavid B. JonesColumbia Southe.docx
2TITLE OF PAPERDavid B. JonesColumbia Southe.docx
 
2Running head THE JONES ACTThe Jones Act 2.docx
2Running head THE JONES ACTThe Jones Act 2.docx2Running head THE JONES ACTThe Jones Act 2.docx
2Running head THE JONES ACTThe Jones Act 2.docx
 
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx
 
2BUS 503 JOURNAL .docx
2BUS 503 JOURNAL                                 .docx2BUS 503 JOURNAL                                 .docx
2BUS 503 JOURNAL .docx
 
2Fifth Edition COMMUNITY PSYCHOLOGY.docx
2Fifth Edition   COMMUNITY PSYCHOLOGY.docx2Fifth Edition   COMMUNITY PSYCHOLOGY.docx
2Fifth Edition COMMUNITY PSYCHOLOGY.docx
 
293Peter Singer has written about assisted reproduction, a.docx
293Peter Singer has written about assisted reproduction, a.docx293Peter Singer has written about assisted reproduction, a.docx
293Peter Singer has written about assisted reproduction, a.docx
 
26.5Albert Beveridge, Defense of Imperialism”Albert Beveridge (.docx
26.5Albert Beveridge, Defense of Imperialism”Albert Beveridge (.docx26.5Albert Beveridge, Defense of Imperialism”Albert Beveridge (.docx
26.5Albert Beveridge, Defense of Imperialism”Albert Beveridge (.docx
 
2Evaluating StocksEvaluating StocksLearning Team BFIN402.docx
2Evaluating StocksEvaluating StocksLearning Team BFIN402.docx2Evaluating StocksEvaluating StocksLearning Team BFIN402.docx
2Evaluating StocksEvaluating StocksLearning Team BFIN402.docx
 

Recently uploaded

Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 

Recently uploaded (20)

Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 

1CYBER CRIMEChapter 5Objectives· Understand the differen.docx

  • 1. 1 CYBER CRIME Chapter 5 Objectives · Understand the difference between identity theft and identity fraud · Explore the five types of identity theft/fraud · Discuss the virtual and Internet methods in which computer criminals steal identities · Develop a knowledge of the crimes committed due to identity theft Details I. Identity Theft: Illegal use or transfer of an individual’s personal identification information. Identity Fraud: Illegal activities based on the fraudulent use of identifying information of a real or fictitious person. · Creation of fictitious identity by using a “breeder” document(fictitious or stolen identifiers) · Used by criminals to create additional lines of credit and separate bank accounts · Used by terrorists to conceal their own identity, hide from authorities or gain access to sensitive information Types of Identity Theft/Fraud · Assumption of Identity: individual assumes the identity of their victim, including all aspects of the victim’s lives · Rarest form of identity theft/fraud
  • 2. · Theft for Employment or Border Entry: Fraudulent use of stolen or fictitious personal information to obtain employment or gain entry into US · Alien Registration Cards · Nonimmigrant Visas · Passports and Citizenship Documents · Border Crossing Cards · Virtual Identity Theft/Fraud: Use of personal, professional, or other dimensions of identity toward creating a fraudulent virtual personality · On-line dating · Role playing · Accessing deviant sites or locations containing questionable content · Extra Marital Affairs · Use for harassment or stalking · Criminals may use to deceive others to reveal personal information or solicit a criminal act · Credit Identity Theft/Fraud: Use of stolen personal and financial information to facilitate the creation of fraudulent accounts. It requires the affirmative act of securing additional credit. · Criminals use to create additional sources of revenue through the establishment of multiple accounts · FTC (2011) reported 60% of all identity theft victims stated
  • 3. their personal information was used to open new accounts, transfer funds, or commit tax/wage related fraud II. Scope and Victimology · Developing crime statistics for Identity Theft/Fraud has been difficult · Lack of reporting by the public · Lack of reporting by police to federal agencies · Jurisdictional discrepancies in crime measurement · Selective enforcement based on community standards and department resources · First comprehensive study conducted by Government Accounting Office (2002) · Identity Theft was dramatically increasing · Calls to the Identity Theft Clearinghouse increased over 500% in two years · Losses incurred by MasterCard and Visa increased by 43% · No significant loss of consumer confidence as online shopping increased · Number-one consumer complaint to the Federal Trade Commission (FTC) · FTC Study (2004): 15 million Americans victimized in 2003. · Total annual cost to individuals was $5 billion; businesses was $47 billion · Total cost to Law Enforcement was $15,000-20,000 per case
  • 4. · Four overall trends emerged by 2011 · Identity fraud incidents continued to increase but financial costs to consumers decreased due to improved prevention and detection tools which shortened the time between violation and discovery · Social networking activity increased the likelihood of victimization because a lot of personal information is exchanged publicly · Smartphone owners are more likely to be victimized as 62% fail to safeguard their devices with passwords · Data breaches were increasing and more damaging · Most common items exposed were credit card, debit card and Social Security numbers · Victim Profile: white males, early 40’s who lived in metropolitan areas · Victim Impact: Long term repercussions · Harassment form debt collectors · Banking problems · Loan rejection · Utility cutoffs · Arrest for perpetrator’s other crimes III. Physical Methods of Identity Theft · Mail Theft: Theft of breeder documents (driver’s licenses, passports, financial statements, birth certificates, death records)
  • 5. from physical mailboxes; done randomly or popcorning when mailbox red flag signals outgoing mail · Dumpster Diving: Retrieving confidential documents from trash cans or dumpsters; software, passwords, company directories, personnel records · Historically, murder weapons, corpses, bookmaking spreadsheets and narcotics have been retrieved from trash cans · Theft of Computers: Physical theft of laptop and desktop computers is among the most common techniques employed by identity thieves · Private homes or buildings; public transit, especially airports, hotels, recreation centers and government offices · November 2011; desktop computer stolen from the offices of Sutter Medical Foundation contained medical records of 3.3 million patients · Science Applications International Corp. and Tricare Corp.; Backup tapes stolen from employee’s car; impacted 5.1 million military personnel and their families · See case studies on page 129 · Bag Operations: Surreptitious entry into a hotel room to steal, photograph or photocopy documents; steal or copy magnetic media; or download information from laptop computers · Scheme is designed to obtain information while leaving the physical items in place · Conducted by host countries (intelligence services) against visiting diplomats or officials from a foreign government · Insiders: Many authorities suggest corporate and government insiders pose the greatest risk to identity theft
  • 6. · Careless employees · Sloppy handling procedures · Failure to properly destroy data on discarded equipment IV. Virtual or Internet-Facilitated Methods · Phishing: most common recognized method of online identity theft/fraud; Soliciting information by e-mail or culling of individual to fake web sites · Spoofing: sending e-mails or Web sites by using company trademarks and logos; online shopping sites-financial institutions; eBay or PayPal, U.S. Bank, Citibank · Pharming: advanced form of phishing; redirects the connection between an IP address and its intended site · Redirectors: malicious programs which redirect users network traffic to undesired sites · Advance-fee Fraud or 419 fraud: Fraudster sends e-mail to victim asking for assistance claiming “found money”; solicits personal or financial information as part of the con · Spyware · Browser-based software designed to capture and transmit personal information to third parties without the knowledge and consent of the owner · Surreptitiously installed on a user’s machine to intercept or take control over the interaction between users and their computers · Victims precipitate their own problems by opening file
  • 7. attachments, downloading free software, screensavers, songs, adult Web sites which contain the spyware V. Crimes Facilitated by Identity Theft/Fraud Four Phase Process · Stolen identifiers are procured · Breeder document is created · Breeder document used to create additional fraudulent documents and solidify a false identity · Fraudulent identity is employed in the commission of a criminal act · Student loan fraud, immigration fraud, social security fraud, insurance fraud, credit card fraud, tax fraud, various Internet scams