SlideShare a Scribd company logo
Cyber Identity Theft Presentation [email_address]
THE GLOBAL INTERNET POPULATION 1.1 Billion World Wide  16 % of Pop.  (2006) 2 Percent 53 Percent Oceania/Australia 2 Percent 10 Percent Middle East 2 Percent 3 Percent Africa 7 Percent 15 Percent Latin America/Caribbean 22 Percent 69 Percent North America 29 Percent 36 Percent Europe 36 Percent 10 Percent Asia Percentage of WWW Usage Percentage of Internet Penetration Of Population Region
COMPUTER CRIME TRENDS UNITED STATES ,[object Object],[object Object],[object Object],[object Object],[object Object]
Potential Threats Info Warrior Terrorist Industrial Espionage Revenge, Extortion, Financial Gain, Institutional Change Reduce U.S.. Decision Space, Strategic Advantage, Chaos, Target Damage Monetary Gain Thrill, Challenge, Prestige Thrill, Challenge National  Intelligence Institutional  Hacker Recreational Hacker Information for Political, Military, Economic Advantage Visibility, Publicity, Chaos, Political Change Competitive Advantage Organized Crime National  Security  Threats Shared  Threats Local  Threats President’s Commission on Critical Infrastructure Protection
CRIMINAL COMPUTER  INTRUSIONINVESTIGATIONS Computer based financial transactions will present an increasingly tempting target for criminals Theft of Proprietary Data: Customer List, Email, Research, Marketing Plans, Personnel Data .
BOT NETS APPLICATIONS- Spamming  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bot Nets Evolution ,[object Object],[object Object],[object Object]
Denial of Service / DDoS Internet Relay Chat Target “ Master” “ Target ”
 
 
Identity Theft - Exposure ,[object Object],[object Object],[object Object],[object Object],[object Object]
Points of Compromise of Someone’s Identifying Information  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Laptop computer Skimming
Identity Theft Major Breaches ,[object Object],Source: Privacy Rights Clearinghouse 45.7 Million System Hacked TJ Max January 2007 Copyright © 2005-2007. Privacy Rights Clearinghouse   40 Million Systems Hacked CardSystems June 2005 243,000 Laptop Theft Ernst & Young UK June 2006 1.2 Million Backup tapes lost Bank of America Feb 2005 3.9 Million Backup tapes lost CitiFinancial June 2005 1.4 Million System Hacked DSW Retail April 2005 # of Credit Card Numbers Type of Breach NAME DATE
Phishing ,[object Object],[object Object]
Anti-Phishing Continuum Prevent Detect Respond ,[object Object],[object Object],[object Object]
Phishing --- IRS Accounts
Phishing—Amazon.com
Phishing—Credit Unions
What can I do??????
How to minimize your risk! ,[object Object],[object Object],[object Object],[object Object]
Minimizing your risks cont’d…. ,[object Object],[object Object],[object Object]
Minimizing your risks   cont’d…. ,[object Object],[object Object],[object Object],[object Object],[object Object]
Warning Signs Credit inexplicably denied. Routine financial statements stop arriving in a timely manner. Creditors making phone calls on accounts you’ve never authorized. A new or renewed credit card is not received.
What to do if you’re Victimized! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What to do if you’re victimized cont’d…. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What to do if you’re victimized cont’d…. Keep a detailed log of all contacts: - Location called. - Name of person(s) you spoke to:   Title and call back number with ext. - Ask and write down what the procedures are  for that entity.
How to minimize your risk! ,[object Object],[object Object],[object Object],[object Object]
INTERNET FRAUD 2000 = 16,838 complaints 2001 = 49,957 complaints 2002 = 75,063 complaints 2003 = 66,534 complaints 2004 = 103,959 complaints 2005 = 231,493 complaints 2006 = 207,492 complaints 2007 = 206,884 complaints
www.ic3.gov
GUARDING THE NATIONS INFRASTRUCTURE www.infragard.net
“ Critical infrastructures are those physical and cyber-based systems essential to the minimum operations of the economy and government.” Presidential Decision Directive-63 May 1998
 
Joint FBI/US-DHS Cyber Security Email request:  [email_address]
Let’s take a Break Questions?

More Related Content

What's hot

Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
Barry Caplin
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
efandeye
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
Radiant Minds
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6
krupp
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
ronwolfinger
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
charlesgarrett
 
Data theft
Data theftData theft
Data theft
Laura
 

What's hot (20)

The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystem
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6
 
Id Theft
Id TheftId Theft
Id Theft
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud
 
Data theft
Data theftData theft
Data theft
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Phishing
PhishingPhishing
Phishing
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 

Viewers also liked (10)

First Principles Vulnerability Assessment
First Principles Vulnerability AssessmentFirst Principles Vulnerability Assessment
First Principles Vulnerability Assessment
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Ppt on internet
Ppt on internetPpt on internet
Ppt on internet
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to ID Theft

Id theft-phishing-research
Id theft-phishing-researchId theft-phishing-research
Id theft-phishing-research
Justin Saunders
 
Naccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity TheftNaccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity Theft
mherr_riskconsult
 

Similar to ID Theft (20)

Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Id theft-phishing-research
Id theft-phishing-researchId theft-phishing-research
Id theft-phishing-research
 
Fulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity TheftFulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity Theft
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theft
 
Identity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for VictimsIdentity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for Victims
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptb
 
What is Identity (ID) Theft ?
What is Identity (ID) Theft ?What is Identity (ID) Theft ?
What is Identity (ID) Theft ?
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Dealing With ID Theft
Dealing With ID TheftDealing With ID Theft
Dealing With ID Theft
 
Identity Theft Overview Webinar
Identity Theft Overview WebinarIdentity Theft Overview Webinar
Identity Theft Overview Webinar
 
Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
Identity Theft Scams
Identity Theft ScamsIdentity Theft Scams
Identity Theft Scams
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charities
 
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana HarrisID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana Harris
 
Is this a scam.pdf
Is this a scam.pdfIs this a scam.pdf
Is this a scam.pdf
 
Naccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity TheftNaccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity Theft
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

ID Theft

  • 1. Cyber Identity Theft Presentation [email_address]
  • 2. THE GLOBAL INTERNET POPULATION 1.1 Billion World Wide 16 % of Pop. (2006) 2 Percent 53 Percent Oceania/Australia 2 Percent 10 Percent Middle East 2 Percent 3 Percent Africa 7 Percent 15 Percent Latin America/Caribbean 22 Percent 69 Percent North America 29 Percent 36 Percent Europe 36 Percent 10 Percent Asia Percentage of WWW Usage Percentage of Internet Penetration Of Population Region
  • 3.
  • 4. Potential Threats Info Warrior Terrorist Industrial Espionage Revenge, Extortion, Financial Gain, Institutional Change Reduce U.S.. Decision Space, Strategic Advantage, Chaos, Target Damage Monetary Gain Thrill, Challenge, Prestige Thrill, Challenge National Intelligence Institutional Hacker Recreational Hacker Information for Political, Military, Economic Advantage Visibility, Publicity, Chaos, Political Change Competitive Advantage Organized Crime National Security Threats Shared Threats Local Threats President’s Commission on Critical Infrastructure Protection
  • 5. CRIMINAL COMPUTER INTRUSIONINVESTIGATIONS Computer based financial transactions will present an increasingly tempting target for criminals Theft of Proprietary Data: Customer List, Email, Research, Marketing Plans, Personnel Data .
  • 6.
  • 7.
  • 8. Denial of Service / DDoS Internet Relay Chat Target “ Master” “ Target ”
  • 9.  
  • 10.  
  • 11.
  • 12.
  • 13.  
  • 15.
  • 16.
  • 17.
  • 18. Phishing --- IRS Accounts
  • 21. What can I do??????
  • 22.
  • 23.
  • 24.
  • 25. Warning Signs Credit inexplicably denied. Routine financial statements stop arriving in a timely manner. Creditors making phone calls on accounts you’ve never authorized. A new or renewed credit card is not received.
  • 26.
  • 27.
  • 28. What to do if you’re victimized cont’d…. Keep a detailed log of all contacts: - Location called. - Name of person(s) you spoke to: Title and call back number with ext. - Ask and write down what the procedures are for that entity.
  • 29.
  • 30. INTERNET FRAUD 2000 = 16,838 complaints 2001 = 49,957 complaints 2002 = 75,063 complaints 2003 = 66,534 complaints 2004 = 103,959 complaints 2005 = 231,493 complaints 2006 = 207,492 complaints 2007 = 206,884 complaints
  • 32. GUARDING THE NATIONS INFRASTRUCTURE www.infragard.net
  • 33. “ Critical infrastructures are those physical and cyber-based systems essential to the minimum operations of the economy and government.” Presidential Decision Directive-63 May 1998
  • 34.  
  • 35. Joint FBI/US-DHS Cyber Security Email request: [email_address]
  • 36. Let’s take a Break Questions?

Editor's Notes

  1. Good afternoon ladies and gentlemen. I am Special Agent Hatcher with the New Orleans FBI NIPCIP squad. Hand outs should be available.