SlideShare a Scribd company logo
1 of 16
Identity Theft 
& 
Online Fraud 
Colin Holder - Director
1.Nat West 10,059 
2.HSBC 8206 
3.Barclays 7501 
4.Nationwide Building Society 7294 
5.Santander 3176 
6.Lloyds 3145 
7.Bank of Scotland 1987 
8.RBS 1839 
9.Tesco Bank 1373 
10.Marks and Spencers 1277 
11.Clydesdale Bank 1046 
12.Co-Operative Bank 800 
13.CapitolOne 686 
14.MBNA 593 
15.Sainsburys Bank 454 
16.John Lewis 430
1. Purchase credit card with CVV 
2. Instructions to Dobber 
3. Credit Report
7 
CHECKERS 
PCWorld 
Sainsburys 
Skype 
Staples 
Starbucks 
Tesco 
Toys 'R' Us 
Very 
Vodafone 
GAP 
Grattan 
Groupon 
ISME 
Littlewoods 
Match.com 
Next 
O2.co.uk 
PayPal 
Amazon 
Apple 
ASDA 
ASOS 
Currys 
Dell 
DHL 
EBay 
Game
Government Private 
Companies House 
Electoral Roll 
Land Registry 
Births Deaths Marriages 
DVLA 
Insolvencies 
192.Com 
TraceGenie 
Experian 
Equifax 
Callcredit 
Duedil 
Rightmove 
Marketing Hacks
Identity Takeover 
1. Purchase credit card with CVV 
2. Instructions to Dobber 
3. Credit Report 
4. Obtain Email/Bank/Address 
5. Pretext /Online 
6. Change password 
7. Use credit card to order goods 
8. Goods Delivered to accommodation address
Identity Database 
•Over 400,000,00 records of Compromised Personal Data 
•Circa 10,000,000 UK records 
•Over 1,000,000 Scammers Email addresses 
•Over 1,200,000 Scammer IP addresses 
•Over 100,000 Mail Drop addresses
Who we Are 
• 10 Years of innovative data acquisition 
• Only providers of the C6 Data Continuum 
• ID Verification and Authentication 
• Politically Exposed Person’s 
• Sanctions 
• Adverse Media 
• Enhanced Due Diligence Reports 
• Identity Fraud Intelligence 
• Unique Database of Stolen Identities Worldwide 
• 20.000 + Records of criminal money laundering accounts.
How we are different 
Search 
Competitors rely on search technology to look for publicly available data 
We collect personal data that is being actively traded by criminals 
Global searches retrieve a lot of noise and irrelevant information. False positives undermine the product value. 
Criminal Sources | We gather data through covert collection techniques. Our data is pure criminal. No false positives. 
Expertise | Our processes are designed and operated by former senior Detectives of New Scotland Yard. 
Targeted | We know where to look and what to look for. We improve our data constantly to retain the focus on identity fraud. 
Adaptation | We adjust our collection techniques to intercept the rapidly evolving criminal activity. 
Criminals are ahead of the game. They adjust their techniques knowing that search techniques are after them. 
Search-based techniques cast the net too wide. Massive data sets are unmanageable and valuable data is missed. 
Identity theft is a growing, evolving crime that needs constant analysis. A criminal perspective is essential to provide the right product. 
Intelligence
Our Clients 
•C6 provide intelligence to over 300 clients in 40 jurisdictions around the globe 
•Our clients work in multiple industries from aviation to financial services to manufacturing 
•Sample client list 
Barclays Retail 
Riyad Bank 
Western Union 
Barclaycard 
Heathrow Airport 
Coca Cola 
HSBC 
Gatwick Airport 
B&Q 
Bank of China 
Prudential 
Financial Conduct Authority
Colin Holder 
www.c6-intelligence.com 
07970 938163 
01256 301510 
colin.holder@c6-intelligence.com

More Related Content

Similar to 05 Identity Theft (C6)

eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Merchants
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
 
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...Neo4j
 
2020 Scams & ID Theft
2020 Scams & ID Theft2020 Scams & ID Theft
2020 Scams & ID TheftMary Hagan
 
Cyber security (2) (2)
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)ameyjakate
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Preventionfmi_igf
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsGabor Szathmari
 
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...Big Data Week
 
Dorado Industries TrendWatch 2.0 Q1 2017
Dorado Industries TrendWatch 2.0 Q1  2017Dorado Industries TrendWatch 2.0 Q1  2017
Dorado Industries TrendWatch 2.0 Q1 2017Dorado Industries
 
Armour Intelligence: Actionable Intelligence explained
Armour Intelligence: Actionable Intelligence explainedArmour Intelligence: Actionable Intelligence explained
Armour Intelligence: Actionable Intelligence explainedHelena Martin
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
The basics of mobile payments
The basics of mobile paymentsThe basics of mobile payments
The basics of mobile paymentsPragati Rai
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charitiesBlake Morgan LLP
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayIRJET Journal
 
AusPayNet CEO, Dr Leila Fourie - Seamless Payments Expo - May 2017
AusPayNet CEO, Dr Leila Fourie  - Seamless Payments  Expo - May 2017AusPayNet CEO, Dr Leila Fourie  - Seamless Payments  Expo - May 2017
AusPayNet CEO, Dr Leila Fourie - Seamless Payments Expo - May 2017Australian Payments Network
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)Jermaine Smith
 

Similar to 05 Identity Theft (C6) (20)

eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers Presentation
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
 
2020 Scams & ID Theft
2020 Scams & ID Theft2020 Scams & ID Theft
2020 Scams & ID Theft
 
Cyber security (2) (2)
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Prevention
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scams
 
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
 
Recent PCI Hacks
Recent PCI HacksRecent PCI Hacks
Recent PCI Hacks
 
Dorado Industries TrendWatch 2.0 Q1 2017
Dorado Industries TrendWatch 2.0 Q1  2017Dorado Industries TrendWatch 2.0 Q1  2017
Dorado Industries TrendWatch 2.0 Q1 2017
 
Armour Intelligence: Actionable Intelligence explained
Armour Intelligence: Actionable Intelligence explainedArmour Intelligence: Actionable Intelligence explained
Armour Intelligence: Actionable Intelligence explained
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
The basics of mobile payments
The basics of mobile paymentsThe basics of mobile payments
The basics of mobile payments
 
ONLINE FRAUD GUIDE
ONLINE FRAUD GUIDEONLINE FRAUD GUIDE
ONLINE FRAUD GUIDE
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charities
 
Future of Financial Tech
Future of Financial TechFuture of Financial Tech
Future of Financial Tech
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
AusPayNet CEO, Dr Leila Fourie - Seamless Payments Expo - May 2017
AusPayNet CEO, Dr Leila Fourie  - Seamless Payments  Expo - May 2017AusPayNet CEO, Dr Leila Fourie  - Seamless Payments  Expo - May 2017
AusPayNet CEO, Dr Leila Fourie - Seamless Payments Expo - May 2017
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
 

More from #TheFraudTube

09 bis 15-34_provisional_implementation_plan_for_parts_7_and_8_of_sbee
09   bis 15-34_provisional_implementation_plan_for_parts_7_and_8_of_sbee09   bis 15-34_provisional_implementation_plan_for_parts_7_and_8_of_sbee
09 bis 15-34_provisional_implementation_plan_for_parts_7_and_8_of_sbee#TheFraudTube
 
FCF 5th Feb 2015 06 - Safer Jobs
FCF 5th Feb 2015 06 - Safer JobsFCF 5th Feb 2015 06 - Safer Jobs
FCF 5th Feb 2015 06 - Safer Jobs#TheFraudTube
 
FCF 5th Feb 2015 04 - FDB Tech
FCF 5th Feb 2015 04 - FDB TechFCF 5th Feb 2015 04 - FDB Tech
FCF 5th Feb 2015 04 - FDB Tech#TheFraudTube
 
FCF 5th Feb 2015 03 - Local Authority Fraud
FCF 5th Feb 2015 03 - Local Authority FraudFCF 5th Feb 2015 03 - Local Authority Fraud
FCF 5th Feb 2015 03 - Local Authority Fraud#TheFraudTube
 
FCF 5th Feb 2015 02 - Landscape of Alcohol Fraud
FCF 5th Feb 2015 02 - Landscape of Alcohol FraudFCF 5th Feb 2015 02 - Landscape of Alcohol Fraud
FCF 5th Feb 2015 02 - Landscape of Alcohol Fraud#TheFraudTube
 
FCF 5th Feb 2015 01 - Welcome & Introductions
FCF 5th Feb 2015 01 - Welcome & IntroductionsFCF 5th Feb 2015 01 - Welcome & Introductions
FCF 5th Feb 2015 01 - Welcome & Introductions#TheFraudTube
 
The Fraud & Cybercrime Forum: Agenda 5th Feb 2015
The Fraud & Cybercrime Forum: Agenda 5th Feb 2015The Fraud & Cybercrime Forum: Agenda 5th Feb 2015
The Fraud & Cybercrime Forum: Agenda 5th Feb 2015#TheFraudTube
 
00 FCF Agenda 15th July 2014
00   FCF Agenda 15th July 201400   FCF Agenda 15th July 2014
00 FCF Agenda 15th July 2014#TheFraudTube
 
10 fraud bribery-and_money_laundering_offences_-_definitive_guideline
10   fraud bribery-and_money_laundering_offences_-_definitive_guideline10   fraud bribery-and_money_laundering_offences_-_definitive_guideline
10 fraud bribery-and_money_laundering_offences_-_definitive_guideline#TheFraudTube
 
07 FCF Resources 15th July 2014
07   FCF Resources 15th July 201407   FCF Resources 15th July 2014
07 FCF Resources 15th July 2014#TheFraudTube
 
06 Minutes - FCF May 2014
06   Minutes - FCF May 201406   Minutes - FCF May 2014
06 Minutes - FCF May 2014#TheFraudTube
 
04 A-Z of Fraud & Cybercrime (Workshop)
04   A-Z of Fraud & Cybercrime (Workshop)04   A-Z of Fraud & Cybercrime (Workshop)
04 A-Z of Fraud & Cybercrime (Workshop)#TheFraudTube
 
03 Member Spotlight (Virgin Media)
03   Member Spotlight (Virgin Media)03   Member Spotlight (Virgin Media)
03 Member Spotlight (Virgin Media)#TheFraudTube
 
01 Welcome & Introductions - FCF 15th July 2014
01   Welcome & Introductions - FCF 15th July 201401   Welcome & Introductions - FCF 15th July 2014
01 Welcome & Introductions - FCF 15th July 2014#TheFraudTube
 
The Fraud & Cybercrime Forum from #TheFraudTube: Agenda 15th July 2014, London
The Fraud & Cybercrime Forum from #TheFraudTube: Agenda 15th July 2014, LondonThe Fraud & Cybercrime Forum from #TheFraudTube: Agenda 15th July 2014, London
The Fraud & Cybercrime Forum from #TheFraudTube: Agenda 15th July 2014, London#TheFraudTube
 
FCF June 2014 - 02 fraud facts 2 p securing board level support for anti fra...
 FCF June 2014 - 02 fraud facts 2 p securing board level support for anti fra... FCF June 2014 - 02 fraud facts 2 p securing board level support for anti fra...
FCF June 2014 - 02 fraud facts 2 p securing board level support for anti fra...#TheFraudTube
 
FCF June 2014 - 00 fcf agenda 19th may 2014
 FCF June 2014 - 00 fcf agenda 19th may 2014 FCF June 2014 - 00 fcf agenda 19th may 2014
FCF June 2014 - 00 fcf agenda 19th may 2014#TheFraudTube
 

More from #TheFraudTube (20)

09 bis 15-34_provisional_implementation_plan_for_parts_7_and_8_of_sbee
09   bis 15-34_provisional_implementation_plan_for_parts_7_and_8_of_sbee09   bis 15-34_provisional_implementation_plan_for_parts_7_and_8_of_sbee
09 bis 15-34_provisional_implementation_plan_for_parts_7_and_8_of_sbee
 
FCF 5th Feb 2015 06 - Safer Jobs
FCF 5th Feb 2015 06 - Safer JobsFCF 5th Feb 2015 06 - Safer Jobs
FCF 5th Feb 2015 06 - Safer Jobs
 
FCF 5th Feb 2015 04 - FDB Tech
FCF 5th Feb 2015 04 - FDB TechFCF 5th Feb 2015 04 - FDB Tech
FCF 5th Feb 2015 04 - FDB Tech
 
FCF 5th Feb 2015 03 - Local Authority Fraud
FCF 5th Feb 2015 03 - Local Authority FraudFCF 5th Feb 2015 03 - Local Authority Fraud
FCF 5th Feb 2015 03 - Local Authority Fraud
 
FCF 5th Feb 2015 02 - Landscape of Alcohol Fraud
FCF 5th Feb 2015 02 - Landscape of Alcohol FraudFCF 5th Feb 2015 02 - Landscape of Alcohol Fraud
FCF 5th Feb 2015 02 - Landscape of Alcohol Fraud
 
FCF 5th Feb 2015 01 - Welcome & Introductions
FCF 5th Feb 2015 01 - Welcome & IntroductionsFCF 5th Feb 2015 01 - Welcome & Introductions
FCF 5th Feb 2015 01 - Welcome & Introductions
 
The Fraud & Cybercrime Forum: Agenda 5th Feb 2015
The Fraud & Cybercrime Forum: Agenda 5th Feb 2015The Fraud & Cybercrime Forum: Agenda 5th Feb 2015
The Fraud & Cybercrime Forum: Agenda 5th Feb 2015
 
00 FCF Agenda 15th July 2014
00   FCF Agenda 15th July 201400   FCF Agenda 15th July 2014
00 FCF Agenda 15th July 2014
 
10 fraud bribery-and_money_laundering_offences_-_definitive_guideline
10   fraud bribery-and_money_laundering_offences_-_definitive_guideline10   fraud bribery-and_money_laundering_offences_-_definitive_guideline
10 fraud bribery-and_money_laundering_offences_-_definitive_guideline
 
09 pdf show-240
09   pdf show-24009   pdf show-240
09 pdf show-240
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
07 FCF Resources 15th July 2014
07   FCF Resources 15th July 201407   FCF Resources 15th July 2014
07 FCF Resources 15th July 2014
 
06 Minutes - FCF May 2014
06   Minutes - FCF May 201406   Minutes - FCF May 2014
06 Minutes - FCF May 2014
 
04 A-Z of Fraud & Cybercrime (Workshop)
04   A-Z of Fraud & Cybercrime (Workshop)04   A-Z of Fraud & Cybercrime (Workshop)
04 A-Z of Fraud & Cybercrime (Workshop)
 
03 Member Spotlight (Virgin Media)
03   Member Spotlight (Virgin Media)03   Member Spotlight (Virgin Media)
03 Member Spotlight (Virgin Media)
 
02 Easy Solutions
02   Easy Solutions02   Easy Solutions
02 Easy Solutions
 
01 Welcome & Introductions - FCF 15th July 2014
01   Welcome & Introductions - FCF 15th July 201401   Welcome & Introductions - FCF 15th July 2014
01 Welcome & Introductions - FCF 15th July 2014
 
The Fraud & Cybercrime Forum from #TheFraudTube: Agenda 15th July 2014, London
The Fraud & Cybercrime Forum from #TheFraudTube: Agenda 15th July 2014, LondonThe Fraud & Cybercrime Forum from #TheFraudTube: Agenda 15th July 2014, London
The Fraud & Cybercrime Forum from #TheFraudTube: Agenda 15th July 2014, London
 
FCF June 2014 - 02 fraud facts 2 p securing board level support for anti fra...
 FCF June 2014 - 02 fraud facts 2 p securing board level support for anti fra... FCF June 2014 - 02 fraud facts 2 p securing board level support for anti fra...
FCF June 2014 - 02 fraud facts 2 p securing board level support for anti fra...
 
FCF June 2014 - 00 fcf agenda 19th may 2014
 FCF June 2014 - 00 fcf agenda 19th may 2014 FCF June 2014 - 00 fcf agenda 19th may 2014
FCF June 2014 - 00 fcf agenda 19th may 2014
 

Recently uploaded

ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...AgileNetwork
 
Reflecting, turning experience into insight
Reflecting, turning experience into insightReflecting, turning experience into insight
Reflecting, turning experience into insightWayne Abrahams
 
Board Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch PresentationBoard Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch Presentationcraig524401
 
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingSimplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingCIToolkit
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Reviewthomas851723
 
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证jdkhjh
 
self respect is very important in this crual word where everyone in just thin...
self respect is very important in this crual word where everyone in just thin...self respect is very important in this crual word where everyone in just thin...
self respect is very important in this crual word where everyone in just thin...afaqsaeed463
 
Measuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsMeasuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsCIToolkit
 
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)jennyeacort
 
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixUnlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixCIToolkit
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentationmintusiprd
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Roomdivyansh0kumar0
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Nehwal
 
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchFarmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchRashtriya Kisan Manch
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineeringthomas851723
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sectorthomas851723
 

Recently uploaded (17)

ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
 
Reflecting, turning experience into insight
Reflecting, turning experience into insightReflecting, turning experience into insight
Reflecting, turning experience into insight
 
Board Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch PresentationBoard Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch Presentation
 
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingSimplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Review
 
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Servicesauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
 
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
 
self respect is very important in this crual word where everyone in just thin...
self respect is very important in this crual word where everyone in just thin...self respect is very important in this crual word where everyone in just thin...
self respect is very important in this crual word where everyone in just thin...
 
Measuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsMeasuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield Metrics
 
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
 
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixUnlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentation
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
 
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchFarmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineering
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sector
 

05 Identity Theft (C6)

  • 1. Identity Theft & Online Fraud Colin Holder - Director
  • 2.
  • 3.
  • 4. 1.Nat West 10,059 2.HSBC 8206 3.Barclays 7501 4.Nationwide Building Society 7294 5.Santander 3176 6.Lloyds 3145 7.Bank of Scotland 1987 8.RBS 1839 9.Tesco Bank 1373 10.Marks and Spencers 1277 11.Clydesdale Bank 1046 12.Co-Operative Bank 800 13.CapitolOne 686 14.MBNA 593 15.Sainsburys Bank 454 16.John Lewis 430
  • 5.
  • 6. 1. Purchase credit card with CVV 2. Instructions to Dobber 3. Credit Report
  • 7. 7 CHECKERS PCWorld Sainsburys Skype Staples Starbucks Tesco Toys 'R' Us Very Vodafone GAP Grattan Groupon ISME Littlewoods Match.com Next O2.co.uk PayPal Amazon Apple ASDA ASOS Currys Dell DHL EBay Game
  • 8. Government Private Companies House Electoral Roll Land Registry Births Deaths Marriages DVLA Insolvencies 192.Com TraceGenie Experian Equifax Callcredit Duedil Rightmove Marketing Hacks
  • 9. Identity Takeover 1. Purchase credit card with CVV 2. Instructions to Dobber 3. Credit Report 4. Obtain Email/Bank/Address 5. Pretext /Online 6. Change password 7. Use credit card to order goods 8. Goods Delivered to accommodation address
  • 10.
  • 11. Identity Database •Over 400,000,00 records of Compromised Personal Data •Circa 10,000,000 UK records •Over 1,000,000 Scammers Email addresses •Over 1,200,000 Scammer IP addresses •Over 100,000 Mail Drop addresses
  • 12. Who we Are • 10 Years of innovative data acquisition • Only providers of the C6 Data Continuum • ID Verification and Authentication • Politically Exposed Person’s • Sanctions • Adverse Media • Enhanced Due Diligence Reports • Identity Fraud Intelligence • Unique Database of Stolen Identities Worldwide • 20.000 + Records of criminal money laundering accounts.
  • 13. How we are different Search Competitors rely on search technology to look for publicly available data We collect personal data that is being actively traded by criminals Global searches retrieve a lot of noise and irrelevant information. False positives undermine the product value. Criminal Sources | We gather data through covert collection techniques. Our data is pure criminal. No false positives. Expertise | Our processes are designed and operated by former senior Detectives of New Scotland Yard. Targeted | We know where to look and what to look for. We improve our data constantly to retain the focus on identity fraud. Adaptation | We adjust our collection techniques to intercept the rapidly evolving criminal activity. Criminals are ahead of the game. They adjust their techniques knowing that search techniques are after them. Search-based techniques cast the net too wide. Massive data sets are unmanageable and valuable data is missed. Identity theft is a growing, evolving crime that needs constant analysis. A criminal perspective is essential to provide the right product. Intelligence
  • 14. Our Clients •C6 provide intelligence to over 300 clients in 40 jurisdictions around the globe •Our clients work in multiple industries from aviation to financial services to manufacturing •Sample client list Barclays Retail Riyad Bank Western Union Barclaycard Heathrow Airport Coca Cola HSBC Gatwick Airport B&Q Bank of China Prudential Financial Conduct Authority
  • 15.
  • 16. Colin Holder www.c6-intelligence.com 07970 938163 01256 301510 colin.holder@c6-intelligence.com