SlideShare a Scribd company logo
1 of 148
Hi-Tech Frauds of Identity Theft, Identity
Cloning And Address Mirroring
How to remain safe from such
invisible crimes ?
Introduction
• Identity theft is the deliberate use of someone
else's identity, usually as a method to gain a
financial advantage or obtain credit and
other benefits in the other person's name,
and perhaps to the other person's
disadvantage or loss.
Identity theft
Introduction
• The person whose identity has been
assumed may suffer adverse consequences,
especially if they are held responsible for the
perpetrator's actions.
• Identity theft occurs when someone uses
another's personally identifying
information, like their name, identifying
number, or credit card number, without their
permission, to commit fraud or other crimes.
Identity Theft
Introduction
• The term identity theft was coined in 1964.
• Since that time, the definition of identity theft has
been statutorily prescribed throughout both the
U.K. and the United States as the theft of
personally identifying information, generally
including a person’s name, date of birth, social
security number, driver’s license number, bank
account or credit card numbers, PIN numbers,
electronic signatures, fingerprints, passwords, or
any other information that can be used to access
a person’s financial resources.
Identity Theft
Introduction
• Determining the link between data breaches
and identity theft is challenging, primarily
because identity theft victims often do not
know how their personal information was
obtained, and identity theft is not always
detectable by the individual victims.
Identity Theft
Introduction
• Identity fraud is often but not necessarily
the consequence of identity theft.
• Someone can steal or misappropriate
personal information without then
committing identity theft using the
information about every person, such as when
a major data breach occurs.
Identity Fraud
Introduction
• An October 2010 article entitled "Cyber
Crime Made Easy" explained the level to
which hackers are using malicious software.
As one security specialist named Gunter
Ollmann said, "Interested in credit card
theft? There's an app for that." This
statement summed up the ease with which
these hackers are accessing all kinds of
information online.
"Cyber Crime Made Easy"
Introduction
• The new program for infecting users'
computers is called Zeus; and the program
is so hacker friendly that even an
inexperienced hacker can operate it.
Although the hacking program is easy to use,
that fact does not diminish the devastating
effects that Zeus (or other software like
Zeus) can do to a computer and the user.
Zeus (malware)
Introduction
• For example, the article stated that programs
like Zeus can steal credit card information,
important documents, and even documents
necessary for homeland security.
• If the hacker were to gain this information, it
would mean identity theft or even a possible
terrorist attack. The ITAC says that about 15
million Americans are having their identity
stolen, in 2012
Zeus (Malware)
Types of Identity Theft
• Identity Theft is Sub-divide Into Five Categories:
• Criminal Identity Theft (posing as another person when
apprehended for a crime)
• Financial Identity Theft (using another's identity to obtain credit,
goods and services)
• Identity Cloning (using another's information to assume his or her
identity in daily life)
• Medical Identity Theft (using another's identity to obtain medical
care or drugs)
• Child Identity Theft.
• Identity theft may be used to facilitate or fund other crimes
including illegal immigration, terrorism, phishing and espionage.
There are cases of identity cloning to attack payment systems,
including online credit card processing and medical insurance
Types of Identity Theft
Types of Identity Theft
Identity Cloning And Concealment
• In this situation, the identity thief impersonates
someone else in order to conceal their own true
identity.
• Examples might be illegal immigrants,
people hiding from creditors or other
individuals, or those who simply want to
become "anonymous" for personal reasons.
Identity Cloning And Concealment
Identity Cloning And Concealment
• Another example is posers, a label given to
people who use somebody else's photos and
information through social networking sites.
Mostly, posers create believable stories involving
friends of the real person they are imitating.
Unlike identity theft used to obtain credit
which usually comes to light when the debts
mount, concealment may continue indefinitely
without being detected, particularly if the
identity thief is able to obtain false credentials
in order to pass various authentication tests in
everyday life has.
posers, a label given to people who use somebody else's
photos and information through social networking sites
Criminal Identity Theft
• When a criminal fraudulently identifies himself to
police as another individual at the point of arrest, it is
sometimes referred to as "Criminal Identity Theft."
• In some cases criminals have previously obtained
state-issued identity documents using credentials
stolen from others, or have simply presented a fake
ID.
• Victims might only learn of such incidents by chance,
for example by receiving court summons, discovering
their drivers licenses are suspended when stopped for
minor traffic violations, or through background
checks performed for employment purposes.
Criminal Identity Theft
Criminal Identity Theft
• It can be difficult for the victim of a criminal
identity theft to clear their record.
• The steps required to clear the victim's incorrect
criminal record depend in which jurisdiction the
crime occurred and whether the true identity of the
criminal can be determined.
• The victim might need to locate the original arresting
officers and prove their own identity by some reliable
means such as fingerprinting or DNA testing, and
may need to go to a court hearing to be cleared of
the charges.
Synthetic Identity Theft
• A variation of identity theft which has recently
become more common is synthetic identity theft, in
which identities are completely or partially fabricated.
• The most common technique involves combining a real
social security number with a name and birth-date other
than the ones associated with the number.
• Synthetic identity theft is more difficult to track as it
doesn't show on either person's credit report
directly, but may appear as an entirely new file in
the credit bureau or as a subfile on one of the
victim's credit reports.
Synthetic Identity Theft
Synthetic Identity Theft
• Synthetic identity theft primarily harms the
creditors who unwittingly grant the
fraudsters credit.
• Individual victims can be affected if their
names become confused with the synthetic
identities, or if negative information in their
sub-files impacts their credit ratings
Synthetic Identity Theft
Medical Identity Theft
• Privacy researcher Pam Dixon, founder of the World
Privacy Forum, coined the term medical identity theft.
• In the report, she defined the crime for the first time and
made the plight of victims public.
• The report's definition of the crime is that medical
identity theft occurs when someone seeks medical care
under the identity of another person.
• Insurance theft is also very common, if a thief has your
insurance information and or your insurance card, they can
seek medical attention posing as yourself.
• In addition to risks of financial harm common to all
forms of identity theft, the thief's medical history may
be added to the victim's medical records.
Medical Identity Theft
Medical Identity Theft
• Inaccurate information in the victim's
records is difficult to correct and may affect
future insurability or cause doctors relying
on the misinformation to deliver inappropriate
medical care.
Medical Identity Theft
Child Identity Theft
• Child identity theft occurs when a minor's
identity is used by another person for the
impostor's personal gain.
• The impostor can be a family member, a friend, or
even a stranger who targets children.
• The Social Security numbers of children are
valued because they do not have any
information associated with them. Thieves can
establish lines of credit, obtain driver's
licenses, or even buy a house using a child's
identity.
Child Identity Theft
Child Identity Theft
• This fraud can go undetected for years, as most
children do not discover the problem until
years later.
• Child identity theft is fairly common, and
studies have shown that the problem is
growing. The largest study on child identity theft,
as reported by Richard Power of the Carnegie
Mellon Cylab with data supplied by All Clear ID,
found that of 40,000 children, 10.2% were victims
of identity theft.
Child Identity Theft
Financial Identity Theft
• The most common type is financial identity
theft, where someone wants to gain
economical benefits in someone else's name.
This includes getting credits, loans, goods and
services, claiming to be someone else
Techniques for obtaining and exploiting
personal information for identity theft
• Identity thieves typically obtain and exploit
personally identifiable information about
individuals, or various credentials they use to
authenticate themselves, in order to impersonate
them.
• Examples include:
Techniques for obtaining and exploiting
personal information for identity theft
• Rummaging through rubbish for personal
information (dumpster diving)
• Retrieving personal data from redundant IT
equipment and storage media including PCs,
servers, PDAs, mobile phones, USB memory
sticks and hard drives that have been disposed
of carelessly at public dump sites, given away or
sold on without having been properly sanitized
• Using public records about individual citizens,
published in official registers such as electoral
rolls
Rummaging through rubbish for
personal information (Dumpster Diving)
Techniques for obtaining and exploiting
personal information for identity theft
• Stealing bank or credit cards, identification cards,
passports, authentication tokens typically by
pickpocketing, housebreaking or mail theft.
• Common-knowledge questioning schemes that offer
account verification and compromise: "What's your
mother's maiden name?", "what was your first car
model?", or "What was your first pet's name?", etc.
• Skimming information from bank or credit cards
using compromised or hand-held card readers, and
creating clone cards
Techniques for obtaining and exploiting
personal information for identity theft
Techniques for obtaining and exploiting
personal information for identity theft
Techniques for obtaining and exploiting
personal information for identity theft
• Using 'contactless' credit card readers to acquire data
wirelessly from RFID-enabled passports.
• Shoulder-Surfing, involves an individual who discreetly
watches or hears others providing valuable personal
information. This is particularly done in crowded places
because it is relatively easy to observe someone as they fill
out forms, enter PIN numbers on ATM's or even type
passwords on smartphones.
• Stealing personal information from computers using
breaches in browser security or malware such as Trojan
horse keystroke logging programs or other forms of
spyware.
Using 'Contactless' Credit Card
Shoulder-Surfing
Shoulder-Surfing
Stealing personal information from computers using
breaches in browser security or malware
Techniques for obtaining and exploiting
personal information for identity theft
• Hacking computer networks, systems and databases to
obtain personal data, often in large quantities
• Exploiting breaches that result in the publication or
more limited disclosure of personal information such as
names, addresses, Social Security number or credit card
numbers
• Advertising bogus job offers in order to accumulate
resumes and applications typically disclosing applicants'
names, home and email addresses, telephone numbers and
sometimes their banking details
• Exploiting insider access and abusing the rights of
privileged IT users to access personal data on their
employers' systems
Advertising bogus job offers in order to accumulate
resumes and applications typically disclosing
applicants
Techniques for obtaining and exploiting
personal information for identity theft
• Infiltrating organizations that store and
process large amounts or particularly valuable
personal information.
• Impersonating trusted organizations in emails,
SMS text messages, phone calls or other forms
of communication in order to dupe victims into
disclosing their personal information or login
credentials, typically on a fake corporate website
or data collection form (phishing)
Infiltrating organizations that store and process
large amounts or particularly valuable personal
information.
Impersonating trusted organizations
in emails
Techniques for obtaining and exploiting personal
information for identity theft
• Brute-force attacking weak passwords and using
inspired guesswork to compromise weak password reset
questions.
• Obtaining castings of fingers for falsifying fingerprint
identification. Browsing social networking websites for
personal details published by users, often using this
information to appear more credible in subsequent social
engineering activities
• Diverting victims' email or post in order to obtain
personal information and credentials such as credit
cards, billing and bank/credit card statements, or to
delay the discovery of new accounts and credit agreements
opened by the identity thieves in the victims' names
Brute-force attacking weak
passwords
Techniques for obtaining and exploiting
personal information for identity theft
• Using false pre-tenses to trick individuals, customer
service representatives and help desk workers into
disclosing personal information and login details or
changing user passwords/access rights (pretesting)
• Stealing cheques (checks) to acquire banking
information, including account numbers and bank codes
• Guessing Social Security numbers by using information
found on Internet social networks such as Facebook and
MySpace
• Low security/privacy protection on photos that are
easily clickable and downloaded on social networking
sites.
• Befriending strangers on social networks and taking
advantage of their trust until private information is given.
Techniques for obtaining and exploiting
personal information for identity theft
Stealing Cheques (Checks) To Acquire
Banking Information
Indicators that you may be a victim
of identity theft
• The majority of identity theft victims do not realize that
they are a victim until it has negatively impacted their
lives. Many people do not find out that their identities have
been stolen until they are contacted by financial institutions
or discover suspicious activities on their bank accounts.
• According to an article by Herb Weisbaum, everyone in
the US should assume that their personal information
has been compromised at one point.
• It is therefore of great importance to watch out for
warning signs that your identity has been compromised.
The following are ten indicators that someone else might be
using your identity.
Indicators that you may be a victim of
identity theft
Indicators that you may be a victim of identity
theft
• Credit or debit card charges for goods or services you
are not aware of, including unauthorized withdrawals
from your account
• Receiving calls from credit or debit card fraud control
department warning of possible suspicious activity on
your credit card account
• Receiving credit cards that you did not apply for
• Receiving information that a credit scoring investigation
was done. They are often done when a loan or phone
subscription was applied for.
• Checks bouncing for lack of enough money in your
account to cover the amount. This might be as a result of
unauthorized withdrawals from your account
Credit or debit card charges for goods or services you are not
aware of, including unauthorized withdrawals from your
account
Receiving credit cards that you did
not apply for
Indicators that you may be a victim
of identity theft
• Identity theft criminals may commit crimes with your personal
information. You may not realize this until you see the police on
your door arresting you for crimes that you did not commit
• Sudden changes to your credit score may indicate that someone
else is using your credit cards
• Bills for services like gas, water, electricity not arriving in time.
This can be an indication that your mail was stolen or redirected
• Being not approved for loans because your credit report
indicates that you are not credit worthy
• Receiving notification from your post office informing you that
your mails are being forwarded to another unknown address
• Your yearly tax returns indicating that you have earned more
than you have actually earned. This might indicate that someone is
using your national identification number e.g. SSN to report their
earnings to the tax authorities
Sudden changes to your credit score may indicate
that someone else is using your credit cards
Bills for services like gas, water,
electricity not arriving in time
Receiving notification from your post office informing you
that your mails are being forwarded to another unknown
address
Identity Cloning
• Identity cloning just may be the scariest
variation of all identity theft.
• Instead of stealing your personal information
for financial gain or committing crimes in your
name, identity clones comprise your life by
actually living and working as you.
• They may even pay bills as you - get engaged
and married as you - start a family as you. To
sum things up, identity cloning is the act of an
imposter literally assuming your life in a different
location.
Identity Cloning
Identity Cloning
• An identity clone will go after as much information
about you as possible.
• They will look to find out what city and state you were
born in and what street your grew up on.
• They will want to know where you attended school and
what relationships you may have been involved in. They
will want to know information concerning your parents and
other family members.
• Of course, they would like to have your name address
and Social Security number as well. In a nutshell,
identity clones want as much personal information
about you as they can attain. This enables them to
answer questions in an informative manner when they
are on the move or asked about your life.
Identity Cloning
What Motivates Identity
Cloning ?
• Identity clones consist of individuals hiding under the
radar. Many of them are convicted criminals, those
running from the law, or people who suffer from
psychological problems.
• Identity clones often seek out names of the deceased or
young people. Sometimes, getting a hold of a Social
Security number is all it takes to completely assume the
life of that person.
• They also look for individuals who work in the areas of
law enforcement or the fire department. These fields
require their employees to become licensed, allowing an
imposter to get a foot in the door and clone more
identities
Identity clones consist of individuals
hiding under the radar.
Identity Clones Often Seek Out Names Of The
Deceased Or Young People
Signs of Identity Cloning
• Victims of identity cloning typically learn of
the crime after reviewing a recent credit
report.
• The report may list more than one address
or mysterious charges under their name.
• They may also become aware of the crime
when noticing dual addresses on the
statements of their Social Security benefits.
Signs of Identity Cloning
Signs of Identity Cloning
Signs of Identity Cloning
The Consequences of Identity Cloning
• Unfortunately, victims of identity cloning have a very
difficult time resuming a normal life.
• They are often subject to paying for attorneys and private
investigators to prove their case.
• Identity cloning causes a much greater loss opposed to
most types of identity theft when considering the time and
financial expenses required to get things back in order.
Unfortunately, victims of identity cloning have
a very difficult time resuming a normal life
The Consequences of Identity Cloning
• Action should be taken immediately if there is even
a remote possibility of someone using your life for
identity cloning.
• Of course, making a report to your local police
department is a wise move, though attorneys and
private investigators have more of the ammunition it
takes to restore your compromised identity.
• To completely avoid the malicious crime of identity
cloning, you should remain cautious when on the
web, remain aware of your transactions and activities,
and always protect your personal information.
Action should be taken immediately if there is even a
remote possibility of someone using your life for
identity cloning
The Consequences of Identity Cloning
• Some people use the terms “identity theft” and
“identity cloning” interchangeably. But they are
definitely NOT the same thing.
• Identity thieves steal personal and financial
information for specific purposes. For example, they
might want your name, address, Social Security number
and credit card data in order to buy products in physical
stores or online, or to get a line of credit or buy
property. Or they may want to sell this information on
the black market.
• True identity clones, however, want to actually
assume your identity. They want to BECOME you.
True identity clones, however, want
to actually assume your identity.
The Consequences of Identity Cloning
• Identity Clones Actually Live And Work As You.
They Even Pay The Bills As You. They Get Married
As You. They have kids as you. They send their kids to
school as you.”
• Identity Clones Want Even MORE Information About
You, So They Can Impersonate You For Years And
Years.
• They want to know where you grew up, who your
friends are, which church you attend, which
retailers you frequent, how you dress, which
cosmetics you use anything that can help them
impersonate you.
Identity Clones Actually Live And Work As You.
They Even Pay The Bills As You. They Get Married
As You.
Who Are Identity Clones?
• Some identity clones have been known to go
to ridiculous extremes to impersonate
people, and these types of clones are often
mentally ill.
• Most identity clones are people trying to
escape the law and/or their creditors. In other
words, they’re “on the lam,” and trying to hide
out until the “heat is off.”
Some identity clones have been known to go to
ridiculous extremes to impersonate people
Who Are Identity Clones?
• Many of these thieves look to the deceased for
help. They search for people (often young
people) who have died, and steal their Social
Security and/or birth certificate information.
• Then they assume the identity of the “dearly
departed” to get passports, credit cards, car
loans, mortgages — you name it. With just a
little basic information, it can be easy for an
identity clone to build a reputation as the person
they are imitating
Ghosting (Paper Tripping)
Ghosting (Identity Theft)
• Ghosting (identity theft) Ghosting is a form
of identity theft in which someone steals the
identity, and sometimes even the role within
society, of a specific dead person (the "ghost")
who is not widely known to be deceased.
How can you tell if you’ve been a victim
of identity cloning?
• In most cases, the only way to know if
you’ve been scammed is to order a copy of
your credit report from one of the three
major credit reporting agencies
• If you’ve truly been a victim of identity
cloning, the first thing you’ll probably notice
on the report is duplicate addresses for your
bank and credit accounts.
If you’ve truly been a victim of identity cloning, the
first thing you’ll probably notice on the report is
duplicate addresses for your bank and credit
accounts.
How can you tell if you’ve been a victim
of identity cloning?
• And, if you’re a member of a professional
organization those for doctors or lawyers,
for example you may see two (or more)
people registered with your name and
address.
• Some identity clones choose to impersonate
doctors and lawyers so they can practice
those professions without a license while
earning hefty salaries.
Some identity clones choose to impersonate doctors
and lawyers so they can practice those professions
without a license
How can you tell if you’ve been a victim
of identity cloning?
• if you’ve been the victim of identity cloning, it
will take some time and money to remedy the
situation. You will likely have to hire an
attorney or a private investigator to prove that
you not the clone are the “real deal.”
• But if you’re vigilant in protecting your
identity and regularly request copies of your
credit reports, it’s unlikely that you’ll discover
an identity clone signing for a UPS package at
your front door when you return from vacation.
Address Mirroring
• Determined criminals will often go to great lengths
to perpetrate their scams.
• In a popular business identity theft scheme known as
address mirroring (a twist on the traditional "business
bust-out" credit scam), business identity thieves closely
mirror the physical address of the unsuspecting target
business in order to obtain credit, loans, cash advances,
and goods and services in the victim business' name.
If the thieves can avoid detection or arousing
suspicion by their activities, this tactic can be
surprisingly simple and effective in a very short
period of time.
Address Mirroring
How the scam works
• Step 1: Identify a suitable location & target
company
• This scam is most often used in a multi-floor
office building or large business complex with
many business tenants. Multiple floors or
buildings and large numbers of occupying
businesses reduce the likelihood that the
thieves' activities will attract attention.
Step 1: Identify a suitable location
& target company
How the scam works
• Step 2: Obtain business credit reports or
other useful information on the target
company
• Thieves may attempt to gain information about
the company's finances, credit, suppliers,
owners and officers, and general business
activities in order to reduce the chances of
raising suspicion and maximize their illegal
gains.
Step 2: Obtain business credit reports or other
useful information on the target company
How the scam works
• Step 3: Rent office space in the same building as the
target company
• Using bogus information and funds or stolen credit
cards obtained through previous criminal activity, the
thieves rent or lease space in the same building usually
on another floor or in a low traffic area of the building
or complex.
• They keep a low profile, typically with no business signs
or other indicators of their business activities, although
they may move some minimal office furniture in simply to
avoid raising suspicion.
• If one of their group remains at the location during
business hours, it is most often a low level member
whose job is to merely to keep up appearances and
accept the deliveries.
Step 3: Rent office space in the same
building as the target company
How The Scam Works
• Step 4: Apply for credit and loans or purchase
goods in the victim business’ name or both
• Once the new "office" is set up, the thieves quickly get
to work. Depending on the nature of the scam, they
may either:
• a). apply for credit cards, loans, and lines of credit in
the business' name which they will promptly max out
through purchases and cash advances; or
• b). begin ordering products and services in the name of
their target business, with any company that accepts
purchase orders, offers invoicing, or payment terms
being a potential source of goods.
Step 4: Apply for credit and loans or purchase goods in the
victim business’ name or both
How The Scam Works
• Either way, as quickly as possible, credit is
maxed and orders are placed for high value
items that are fast and easy to sell.
• Expedited shipping or delivery is necessary
because the thieves won't stay in this
location for long, and extra shipping costs
are not a concern because the thieves have
no intention of paying the bill anyway.
Step 4: Apply for credit and loans or purchase goods
in the victim business’ name or both
How The Scam Works
• Step 5: Disappear with the proceeds and
find the next victim
• As soon as the thieves have racked up tens of
thousands of dollars in fraudulent purchases,
have maxed out available credit, or they have
begun to raise suspicion, it is time to pack up
and disappear.
Step 5: Disappear with the proceeds and
find the next victim
How The Scam Works
• In 30 to 90 days, the business that the
thieves were impersonating at that location
will begin to receive telephone calls and
correspondence from creditors seeking
payment, and must prove that they did not
order or receive the goods that were
actually delivered to their physical location.
Depending upon the severity of the fraud, it
may take months or years to fully unravel
and resolve.
the business that the thieves were impersonating at that location will begin
to receive telephone calls and correspondence from creditors seeking
payment, and must prove that they did not order or receive the goods that
were actually delivered to their physical location
Why it works ?
• Thieves use address mirroring to take
advantage of weak or ineffective transaction
and application review processes; and, to
exploit weaknesses in address-based
verification, authentication, and fraud
detection systems.
Thieves use address mirroring to take advantage of
weak or ineffective transaction and application
review processes
Why it works ?
"Exact Match"
• Address-based verification programs generally
consider it an "exact match" when the
customer's street address (line 1) and zip
code provided at the time of the transaction
match the information on record. In other
words, these systems may disregard address
line 2, such as a suite number, building
number, etc.
Why it works ?
• As you can see in the two examples below,
merchants are often advised by their credit card
processors that if an exact match occurs (address line
1 and the zip code), then it is safe to complete the
transaction. However, if the transaction later turns out
to be fraudulent, the business may still suffer the
combined loss of both goods and revenue, with little
hope of recovery.
• A very large fraudulent order of this nature can
have a significant negative impact on a business.
Why it works ?
• Consider this:
If you ignored address line 2, how would you know which of
these is the legitimate business before you shipped goods or
extended credit ?
• 1) ABC Company
1100 42nd Street SW
Anytown, Florida 54321
• 2) ABC Company
1100 42nd Street SW
Suite 107
Anytown, Florida 54321
Individual Identity Protection
• The acquisition of personal identifiers is made
possible through serious breaches of privacy.
• For consumers, this is usually a result of them
naively providing their personal information or
login credentials to the identity thieves as a result of
being duped but identity-related documents such as
credit cards, bank statements, utility bills, check-books
etc.
• May Also Be Physically Stolen From Vehicles,
Homes, Offices, And Not The Least Letter Boxes, Or
Directly From Victims By Pickpockets And Bag
Snatchers.
Individual Identity Protection
• Guardianship of personal identifiers by
consumers is the most common intervention
strategy recommended by the US Federal
Trade Commission, Canadian Phone Busters
and most sites that address identity theft.
• Such organizations offer recommendations
on how individuals can prevent their
information falling into the wrong hands.
Individual Identity Protection
• Identity theft can be partially mitigated by not
identifying oneself unnecessarily (a form of information
security control known as risk avoidance).
• This implies that organizations, IT systems and
procedures should not demand excessive amounts of
personal information or credentials for identification and
authentication.
• Requiring, storing and processing personal identifiers
(such as Social Security number, national identification
number, driver's license number, credit card number,
etc.) increases the risks of identity theft unless this
valuable personal information is adequately secured at all
times.
Individual Identity Protection
Individual Identity Protection
• Committing personal identifiers to memory
is a sound practice that can reduce the risks
of a would-be identity thief from obtaining
these records.
• To help in remembering numbers such as
social security numbers and credit card
numbers, it is helpful to consider using
mnemonic techniques or memory aids such as
the mnemonic Major System.
Individual Identity Protection
Individual Identity Protection
• Identity thieves sometimes impersonate dead
people, using personal information obtained
from death notices, gravestones and other
sources to exploit delays between the death and
the closure of the person's accounts, the
inattentiveness of grieving families and
weaknesses in the processes for credit-checking.
• Such crimes may continue for some time until
the deceased's families or the authorities notice
and react to anomalies.
Individual Identity Protection
• In recent years, commercial identity theft
protection/insurance services have become available in
many countries.
• These services purport to help protect the individual
from identity theft or help detect that identity theft has
occurred in exchange for a monthly or annual
membership fee or premium.
• The services typically work either by setting fraud alerts
on the individual's credit files with the three major
credit bureaus or by setting up credit report monitoring
with the credit bureaux.
• While identity theft protection/insurance services have been
heavily marketed, their value has been called into question
Individual Identity Protection
Identity protection by organizations
• In their May 1998 testimony before the United States
Senate, the Federal Trade Commission (FTC)
discussed the sale of Social Security numbers and
other personal identifiers by credit-raters and data
miners.
• The FTC agreed to the industry's self-regulating
principles restricting access to information on credit
reports. According to the industry, the restrictions vary
according to the category of customer. Credit reporting
agencies gather and disclose personal and credit
information to a wide business client base.
Identity protection by organizations
• Poor Stewardship Of Personal Data By
Organizations, Resulting In Unauthorized
Access To Sensitive Data, Can Expose
Individuals To The Risk Of Identity Theft.
• Poor Corporate Diligence Standards Which
Can Result In Data Breaches Include:
Identity Protection By Organizations
• failure to shred confidential information before
throwing it into dumpsters
• failure to ensure adequate network security
• credit card numbers stolen by call center
agents and people with access to call recordings
• the theft of laptop computers or portable
media being carried off-site containing vast
amounts of personal information. The use of
strong encryption on these devices can reduce the
chance of data being misused should a criminal
obtain them.
Identity Protection By Organizations
Failure To Shred Confidential
Information
Failure To Ensure Adequate Network
Security
Identity Protection By Organizations
• The Brokerage Of Personal Information To
Other Businesses Without Ensuring That The
Purchaser Maintains Adequate Security
Controls.
• Failure of governments, when registering sole
proprietorships, partnerships, and corporations, to
determine if the officers listed in the Articles of
Incorporation are who they say they are.
• This potentially allows criminals access to
personal information through credit rating and
data mining services.
Identity protection by organizations
• The failure of corporate or government
organizations to protect consumer privacy,
client confidentiality and political privacy has
been criticized for facilitating the acquisition of
personal identifiers by criminals.
• Using various types of biometric information,
such as fingerprints, for identification and
authentication has been cited as a way to
thwart identity thieves, however there are
technological limitations and privacy concerns
associated with these methods as well.
Identity Protection By Organizations
Legal Responses
• India
• Under the Information Technology Act 2000
Chapter IX Sec 66C
• SECTION 66C
• PUNISHMENT FOR IDENTITY THEFT Whoever,
fraudulently or dishonestly makes use of the electronic
signature, password or any other unique identification
feature of any other person, shall be punished with
imprisonment of either description for a term which
may extend to three years and shall also be liable to
fine which may extend to rupees one lakh.
Legal Responses
Serious Fraud Investigation Office
• http://sfio.nic.in/
CBI Economic Offence Wing
• http://cbi.gov.in/
Legal Service India - Identity Theft
• http://www.legalserviceindia.com/article/l278-
Identity-Theft.html
RBI Fraud Online Complaint
Sachet Portal
• https://sachet.rbi.org.in/
FBI, Identity Theft
• https://www.fbi.gov/investigate/white-collar-
crime/identity-theft
References
• Identity Theft- A Critical And Comparative Analysis Of Various Laws
In India
• http://racolblegal.com/identity-theft-a-critical-and-comparative-analysis-
of-various-laws-in-india/
• Identity theft
• https://en.wikipedia.org/wiki/Identity_theft
• Identity Cloning: Attack Of The Identity Clones
• https://www.scambusters.org/identitycloning.html
• What is Identity Cloning?
• https://www.spamlaws.com/identity-cloning.html
• What Are Identity Theft and Identity Fraud?
• https://www.justice.gov/criminal-fraud/identity-theft/identity-theft-and-
identity-fraud
Thanks…
In the social jungle of human existence, there is no feeling of
being alive without a sense of identity...

More Related Content

What's hot

Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentationpooja_doshi
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
Cyber crime - and digital device.pptx
Cyber crime - and digital device.pptxCyber crime - and digital device.pptx
Cyber crime - and digital device.pptxAlAsad4
 
Piggy Backing & Tailgating (Security)
Piggy Backing & Tailgating (Security)Piggy Backing & Tailgating (Security)
Piggy Backing & Tailgating (Security)GAURAV. H .TANDON
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber CrimesDINESH KAMBLE
 
Cyberstalking
CyberstalkingCyberstalking
CyberstalkingTrevschic
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspaceDr. Arun Verma
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt newOnkar1431
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidenceOnline
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDr Raghu Khimani
 
Image processing in forensic science
Image processing in forensic scienceImage processing in forensic science
Image processing in forensic sciencevenati munishareddy
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessSibesh Singh
 

What's hot (20)

Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
 
Cyber crime - and digital device.pptx
Cyber crime - and digital device.pptxCyber crime - and digital device.pptx
Cyber crime - and digital device.pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Piggy Backing & Tailgating (Security)
Piggy Backing & Tailgating (Security)Piggy Backing & Tailgating (Security)
Piggy Backing & Tailgating (Security)
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Image processing in forensic science
Image processing in forensic scienceImage processing in forensic science
Image processing in forensic science
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

Similar to Remain Safe from Hi-Tech Identity Thefts Like Identity Cloning and Address Mirroring

What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft- Mark - Fullbright
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada- Mark - Fullbright
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra poojakalra10
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudMatt Smith
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentationpat7777
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Versiondanc752
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz- Mark - Fullbright
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS- Mark - Fullbright
 
Expert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessExpert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessEric Schiowitz
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 

Similar to Remain Safe from Hi-Tech Identity Thefts Like Identity Cloning and Address Mirroring (20)

What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra Identity theft and there types by pooja kalra
Identity theft and there types by pooja kalra
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
Expert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessExpert FSO Insider Threat Awareness
Expert FSO Insider Threat Awareness
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 

More from GAURAV. H .TANDON

Suicide Prevention through Architecture (Building) and City Planning
Suicide Prevention through  Architecture (Building) and City PlanningSuicide Prevention through  Architecture (Building) and City Planning
Suicide Prevention through Architecture (Building) and City PlanningGAURAV. H .TANDON
 
Suicide Prevention through Architecture (Building) and City Planning
Suicide Prevention through  Architecture (Building) and City PlanningSuicide Prevention through  Architecture (Building) and City Planning
Suicide Prevention through Architecture (Building) and City PlanningGAURAV. H .TANDON
 
Digital Detoxing in Smart Cities
Digital Detoxing in Smart CitiesDigital Detoxing in Smart Cities
Digital Detoxing in Smart CitiesGAURAV. H .TANDON
 
Digital Detoxing in Smart Cities
Digital Detoxing in Smart CitiesDigital Detoxing in Smart Cities
Digital Detoxing in Smart CitiesGAURAV. H .TANDON
 
Crash for Cash-Organized Crime (COC).pptx
Crash for Cash-Organized Crime (COC).pptxCrash for Cash-Organized Crime (COC).pptx
Crash for Cash-Organized Crime (COC).pptxGAURAV. H .TANDON
 
Ecological Footprint (1).pptx
Ecological Footprint (1).pptxEcological Footprint (1).pptx
Ecological Footprint (1).pptxGAURAV. H .TANDON
 
The unethical practice of gift giving to doctors by pharma companies
The unethical practice of gift giving to doctors by pharma companiesThe unethical practice of gift giving to doctors by pharma companies
The unethical practice of gift giving to doctors by pharma companiesGAURAV. H .TANDON
 
Gamification of Smart Cities
Gamification of Smart Cities Gamification of Smart Cities
Gamification of Smart Cities GAURAV. H .TANDON
 
Collusion and Fraud Detection on Electronic Energy Meters
Collusion and Fraud Detection on Electronic Energy Meters Collusion and Fraud Detection on Electronic Energy Meters
Collusion and Fraud Detection on Electronic Energy Meters GAURAV. H .TANDON
 
Cyber Security in Smart Buildings
Cyber Security in Smart Buildings Cyber Security in Smart Buildings
Cyber Security in Smart Buildings GAURAV. H .TANDON
 

More from GAURAV. H .TANDON (20)

Suicide Prevention through Architecture (Building) and City Planning
Suicide Prevention through  Architecture (Building) and City PlanningSuicide Prevention through  Architecture (Building) and City Planning
Suicide Prevention through Architecture (Building) and City Planning
 
Suicide Prevention through Architecture (Building) and City Planning
Suicide Prevention through  Architecture (Building) and City PlanningSuicide Prevention through  Architecture (Building) and City Planning
Suicide Prevention through Architecture (Building) and City Planning
 
Digital Detoxing in Smart Cities
Digital Detoxing in Smart CitiesDigital Detoxing in Smart Cities
Digital Detoxing in Smart Cities
 
Digital Detoxing in Smart Cities
Digital Detoxing in Smart CitiesDigital Detoxing in Smart Cities
Digital Detoxing in Smart Cities
 
Premerital Sceening .pptx
Premerital Sceening .pptxPremerital Sceening .pptx
Premerital Sceening .pptx
 
Polymath(Renaissance man)
Polymath(Renaissance man)Polymath(Renaissance man)
Polymath(Renaissance man)
 
Crash for Cash-Organized Crime (COC).pptx
Crash for Cash-Organized Crime (COC).pptxCrash for Cash-Organized Crime (COC).pptx
Crash for Cash-Organized Crime (COC).pptx
 
Voting Age .pptx
Voting Age .pptxVoting Age .pptx
Voting Age .pptx
 
Ecological Footprint (1).pptx
Ecological Footprint (1).pptxEcological Footprint (1).pptx
Ecological Footprint (1).pptx
 
Urban Heat Island Effect
Urban Heat Island EffectUrban Heat Island Effect
Urban Heat Island Effect
 
Communication Skills
Communication SkillsCommunication Skills
Communication Skills
 
The unethical practice of gift giving to doctors by pharma companies
The unethical practice of gift giving to doctors by pharma companiesThe unethical practice of gift giving to doctors by pharma companies
The unethical practice of gift giving to doctors by pharma companies
 
Compassionate Cities
Compassionate CitiesCompassionate Cities
Compassionate Cities
 
Gamification of Smart Cities
Gamification of Smart Cities Gamification of Smart Cities
Gamification of Smart Cities
 
Anti-Microbial Copper
Anti-Microbial Copper Anti-Microbial Copper
Anti-Microbial Copper
 
Smart Forest City
Smart Forest City Smart Forest City
Smart Forest City
 
Smart forest cities
Smart forest cities Smart forest cities
Smart forest cities
 
Automotive Hacking
Automotive Hacking Automotive Hacking
Automotive Hacking
 
Collusion and Fraud Detection on Electronic Energy Meters
Collusion and Fraud Detection on Electronic Energy Meters Collusion and Fraud Detection on Electronic Energy Meters
Collusion and Fraud Detection on Electronic Energy Meters
 
Cyber Security in Smart Buildings
Cyber Security in Smart Buildings Cyber Security in Smart Buildings
Cyber Security in Smart Buildings
 

Recently uploaded

Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesFinlaw Associates
 
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptxQUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptxnibresliezel23
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书Fir L
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws descriptionranaanish11062001
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书Fir L
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfMilind Agarwal
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaBridgeWest.eu
 

Recently uploaded (20)

Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and Challenges
 
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptxQUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad Visa
 

Remain Safe from Hi-Tech Identity Thefts Like Identity Cloning and Address Mirroring

  • 1. Hi-Tech Frauds of Identity Theft, Identity Cloning And Address Mirroring How to remain safe from such invisible crimes ?
  • 2. Introduction • Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss.
  • 4. Introduction • The person whose identity has been assumed may suffer adverse consequences, especially if they are held responsible for the perpetrator's actions. • Identity theft occurs when someone uses another's personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
  • 6. Introduction • The term identity theft was coined in 1964. • Since that time, the definition of identity theft has been statutorily prescribed throughout both the U.K. and the United States as the theft of personally identifying information, generally including a person’s name, date of birth, social security number, driver’s license number, bank account or credit card numbers, PIN numbers, electronic signatures, fingerprints, passwords, or any other information that can be used to access a person’s financial resources.
  • 8. Introduction • Determining the link between data breaches and identity theft is challenging, primarily because identity theft victims often do not know how their personal information was obtained, and identity theft is not always detectable by the individual victims.
  • 10. Introduction • Identity fraud is often but not necessarily the consequence of identity theft. • Someone can steal or misappropriate personal information without then committing identity theft using the information about every person, such as when a major data breach occurs.
  • 12. Introduction • An October 2010 article entitled "Cyber Crime Made Easy" explained the level to which hackers are using malicious software. As one security specialist named Gunter Ollmann said, "Interested in credit card theft? There's an app for that." This statement summed up the ease with which these hackers are accessing all kinds of information online.
  • 14. Introduction • The new program for infecting users' computers is called Zeus; and the program is so hacker friendly that even an inexperienced hacker can operate it. Although the hacking program is easy to use, that fact does not diminish the devastating effects that Zeus (or other software like Zeus) can do to a computer and the user.
  • 16. Introduction • For example, the article stated that programs like Zeus can steal credit card information, important documents, and even documents necessary for homeland security. • If the hacker were to gain this information, it would mean identity theft or even a possible terrorist attack. The ITAC says that about 15 million Americans are having their identity stolen, in 2012
  • 18. Types of Identity Theft • Identity Theft is Sub-divide Into Five Categories: • Criminal Identity Theft (posing as another person when apprehended for a crime) • Financial Identity Theft (using another's identity to obtain credit, goods and services) • Identity Cloning (using another's information to assume his or her identity in daily life) • Medical Identity Theft (using another's identity to obtain medical care or drugs) • Child Identity Theft. • Identity theft may be used to facilitate or fund other crimes including illegal immigration, terrorism, phishing and espionage. There are cases of identity cloning to attack payment systems, including online credit card processing and medical insurance
  • 21. Identity Cloning And Concealment • In this situation, the identity thief impersonates someone else in order to conceal their own true identity. • Examples might be illegal immigrants, people hiding from creditors or other individuals, or those who simply want to become "anonymous" for personal reasons.
  • 22. Identity Cloning And Concealment
  • 23. Identity Cloning And Concealment • Another example is posers, a label given to people who use somebody else's photos and information through social networking sites. Mostly, posers create believable stories involving friends of the real person they are imitating. Unlike identity theft used to obtain credit which usually comes to light when the debts mount, concealment may continue indefinitely without being detected, particularly if the identity thief is able to obtain false credentials in order to pass various authentication tests in everyday life has.
  • 24. posers, a label given to people who use somebody else's photos and information through social networking sites
  • 25. Criminal Identity Theft • When a criminal fraudulently identifies himself to police as another individual at the point of arrest, it is sometimes referred to as "Criminal Identity Theft." • In some cases criminals have previously obtained state-issued identity documents using credentials stolen from others, or have simply presented a fake ID. • Victims might only learn of such incidents by chance, for example by receiving court summons, discovering their drivers licenses are suspended when stopped for minor traffic violations, or through background checks performed for employment purposes.
  • 27. Criminal Identity Theft • It can be difficult for the victim of a criminal identity theft to clear their record. • The steps required to clear the victim's incorrect criminal record depend in which jurisdiction the crime occurred and whether the true identity of the criminal can be determined. • The victim might need to locate the original arresting officers and prove their own identity by some reliable means such as fingerprinting or DNA testing, and may need to go to a court hearing to be cleared of the charges.
  • 28. Synthetic Identity Theft • A variation of identity theft which has recently become more common is synthetic identity theft, in which identities are completely or partially fabricated. • The most common technique involves combining a real social security number with a name and birth-date other than the ones associated with the number. • Synthetic identity theft is more difficult to track as it doesn't show on either person's credit report directly, but may appear as an entirely new file in the credit bureau or as a subfile on one of the victim's credit reports.
  • 30. Synthetic Identity Theft • Synthetic identity theft primarily harms the creditors who unwittingly grant the fraudsters credit. • Individual victims can be affected if their names become confused with the synthetic identities, or if negative information in their sub-files impacts their credit ratings
  • 32. Medical Identity Theft • Privacy researcher Pam Dixon, founder of the World Privacy Forum, coined the term medical identity theft. • In the report, she defined the crime for the first time and made the plight of victims public. • The report's definition of the crime is that medical identity theft occurs when someone seeks medical care under the identity of another person. • Insurance theft is also very common, if a thief has your insurance information and or your insurance card, they can seek medical attention posing as yourself. • In addition to risks of financial harm common to all forms of identity theft, the thief's medical history may be added to the victim's medical records.
  • 34. Medical Identity Theft • Inaccurate information in the victim's records is difficult to correct and may affect future insurability or cause doctors relying on the misinformation to deliver inappropriate medical care.
  • 36. Child Identity Theft • Child identity theft occurs when a minor's identity is used by another person for the impostor's personal gain. • The impostor can be a family member, a friend, or even a stranger who targets children. • The Social Security numbers of children are valued because they do not have any information associated with them. Thieves can establish lines of credit, obtain driver's licenses, or even buy a house using a child's identity.
  • 38. Child Identity Theft • This fraud can go undetected for years, as most children do not discover the problem until years later. • Child identity theft is fairly common, and studies have shown that the problem is growing. The largest study on child identity theft, as reported by Richard Power of the Carnegie Mellon Cylab with data supplied by All Clear ID, found that of 40,000 children, 10.2% were victims of identity theft.
  • 40. Financial Identity Theft • The most common type is financial identity theft, where someone wants to gain economical benefits in someone else's name. This includes getting credits, loans, goods and services, claiming to be someone else
  • 41. Techniques for obtaining and exploiting personal information for identity theft • Identity thieves typically obtain and exploit personally identifiable information about individuals, or various credentials they use to authenticate themselves, in order to impersonate them. • Examples include:
  • 42. Techniques for obtaining and exploiting personal information for identity theft • Rummaging through rubbish for personal information (dumpster diving) • Retrieving personal data from redundant IT equipment and storage media including PCs, servers, PDAs, mobile phones, USB memory sticks and hard drives that have been disposed of carelessly at public dump sites, given away or sold on without having been properly sanitized • Using public records about individual citizens, published in official registers such as electoral rolls
  • 43. Rummaging through rubbish for personal information (Dumpster Diving)
  • 44. Techniques for obtaining and exploiting personal information for identity theft • Stealing bank or credit cards, identification cards, passports, authentication tokens typically by pickpocketing, housebreaking or mail theft. • Common-knowledge questioning schemes that offer account verification and compromise: "What's your mother's maiden name?", "what was your first car model?", or "What was your first pet's name?", etc. • Skimming information from bank or credit cards using compromised or hand-held card readers, and creating clone cards
  • 45. Techniques for obtaining and exploiting personal information for identity theft
  • 46. Techniques for obtaining and exploiting personal information for identity theft
  • 47. Techniques for obtaining and exploiting personal information for identity theft • Using 'contactless' credit card readers to acquire data wirelessly from RFID-enabled passports. • Shoulder-Surfing, involves an individual who discreetly watches or hears others providing valuable personal information. This is particularly done in crowded places because it is relatively easy to observe someone as they fill out forms, enter PIN numbers on ATM's or even type passwords on smartphones. • Stealing personal information from computers using breaches in browser security or malware such as Trojan horse keystroke logging programs or other forms of spyware.
  • 51. Stealing personal information from computers using breaches in browser security or malware
  • 52. Techniques for obtaining and exploiting personal information for identity theft • Hacking computer networks, systems and databases to obtain personal data, often in large quantities • Exploiting breaches that result in the publication or more limited disclosure of personal information such as names, addresses, Social Security number or credit card numbers • Advertising bogus job offers in order to accumulate resumes and applications typically disclosing applicants' names, home and email addresses, telephone numbers and sometimes their banking details • Exploiting insider access and abusing the rights of privileged IT users to access personal data on their employers' systems
  • 53. Advertising bogus job offers in order to accumulate resumes and applications typically disclosing applicants
  • 54. Techniques for obtaining and exploiting personal information for identity theft • Infiltrating organizations that store and process large amounts or particularly valuable personal information. • Impersonating trusted organizations in emails, SMS text messages, phone calls or other forms of communication in order to dupe victims into disclosing their personal information or login credentials, typically on a fake corporate website or data collection form (phishing)
  • 55. Infiltrating organizations that store and process large amounts or particularly valuable personal information.
  • 57. Techniques for obtaining and exploiting personal information for identity theft • Brute-force attacking weak passwords and using inspired guesswork to compromise weak password reset questions. • Obtaining castings of fingers for falsifying fingerprint identification. Browsing social networking websites for personal details published by users, often using this information to appear more credible in subsequent social engineering activities • Diverting victims' email or post in order to obtain personal information and credentials such as credit cards, billing and bank/credit card statements, or to delay the discovery of new accounts and credit agreements opened by the identity thieves in the victims' names
  • 59. Techniques for obtaining and exploiting personal information for identity theft • Using false pre-tenses to trick individuals, customer service representatives and help desk workers into disclosing personal information and login details or changing user passwords/access rights (pretesting) • Stealing cheques (checks) to acquire banking information, including account numbers and bank codes • Guessing Social Security numbers by using information found on Internet social networks such as Facebook and MySpace • Low security/privacy protection on photos that are easily clickable and downloaded on social networking sites. • Befriending strangers on social networks and taking advantage of their trust until private information is given.
  • 60. Techniques for obtaining and exploiting personal information for identity theft
  • 61. Stealing Cheques (Checks) To Acquire Banking Information
  • 62. Indicators that you may be a victim of identity theft • The majority of identity theft victims do not realize that they are a victim until it has negatively impacted their lives. Many people do not find out that their identities have been stolen until they are contacted by financial institutions or discover suspicious activities on their bank accounts. • According to an article by Herb Weisbaum, everyone in the US should assume that their personal information has been compromised at one point. • It is therefore of great importance to watch out for warning signs that your identity has been compromised. The following are ten indicators that someone else might be using your identity.
  • 63. Indicators that you may be a victim of identity theft
  • 64. Indicators that you may be a victim of identity theft • Credit or debit card charges for goods or services you are not aware of, including unauthorized withdrawals from your account • Receiving calls from credit or debit card fraud control department warning of possible suspicious activity on your credit card account • Receiving credit cards that you did not apply for • Receiving information that a credit scoring investigation was done. They are often done when a loan or phone subscription was applied for. • Checks bouncing for lack of enough money in your account to cover the amount. This might be as a result of unauthorized withdrawals from your account
  • 65. Credit or debit card charges for goods or services you are not aware of, including unauthorized withdrawals from your account
  • 66. Receiving credit cards that you did not apply for
  • 67. Indicators that you may be a victim of identity theft • Identity theft criminals may commit crimes with your personal information. You may not realize this until you see the police on your door arresting you for crimes that you did not commit • Sudden changes to your credit score may indicate that someone else is using your credit cards • Bills for services like gas, water, electricity not arriving in time. This can be an indication that your mail was stolen or redirected • Being not approved for loans because your credit report indicates that you are not credit worthy • Receiving notification from your post office informing you that your mails are being forwarded to another unknown address • Your yearly tax returns indicating that you have earned more than you have actually earned. This might indicate that someone is using your national identification number e.g. SSN to report their earnings to the tax authorities
  • 68. Sudden changes to your credit score may indicate that someone else is using your credit cards
  • 69. Bills for services like gas, water, electricity not arriving in time
  • 70. Receiving notification from your post office informing you that your mails are being forwarded to another unknown address
  • 71. Identity Cloning • Identity cloning just may be the scariest variation of all identity theft. • Instead of stealing your personal information for financial gain or committing crimes in your name, identity clones comprise your life by actually living and working as you. • They may even pay bills as you - get engaged and married as you - start a family as you. To sum things up, identity cloning is the act of an imposter literally assuming your life in a different location.
  • 73. Identity Cloning • An identity clone will go after as much information about you as possible. • They will look to find out what city and state you were born in and what street your grew up on. • They will want to know where you attended school and what relationships you may have been involved in. They will want to know information concerning your parents and other family members. • Of course, they would like to have your name address and Social Security number as well. In a nutshell, identity clones want as much personal information about you as they can attain. This enables them to answer questions in an informative manner when they are on the move or asked about your life.
  • 75. What Motivates Identity Cloning ? • Identity clones consist of individuals hiding under the radar. Many of them are convicted criminals, those running from the law, or people who suffer from psychological problems. • Identity clones often seek out names of the deceased or young people. Sometimes, getting a hold of a Social Security number is all it takes to completely assume the life of that person. • They also look for individuals who work in the areas of law enforcement or the fire department. These fields require their employees to become licensed, allowing an imposter to get a foot in the door and clone more identities
  • 76. Identity clones consist of individuals hiding under the radar.
  • 77. Identity Clones Often Seek Out Names Of The Deceased Or Young People
  • 78. Signs of Identity Cloning • Victims of identity cloning typically learn of the crime after reviewing a recent credit report. • The report may list more than one address or mysterious charges under their name. • They may also become aware of the crime when noticing dual addresses on the statements of their Social Security benefits.
  • 79. Signs of Identity Cloning
  • 80. Signs of Identity Cloning
  • 81. Signs of Identity Cloning
  • 82. The Consequences of Identity Cloning • Unfortunately, victims of identity cloning have a very difficult time resuming a normal life. • They are often subject to paying for attorneys and private investigators to prove their case. • Identity cloning causes a much greater loss opposed to most types of identity theft when considering the time and financial expenses required to get things back in order.
  • 83. Unfortunately, victims of identity cloning have a very difficult time resuming a normal life
  • 84. The Consequences of Identity Cloning • Action should be taken immediately if there is even a remote possibility of someone using your life for identity cloning. • Of course, making a report to your local police department is a wise move, though attorneys and private investigators have more of the ammunition it takes to restore your compromised identity. • To completely avoid the malicious crime of identity cloning, you should remain cautious when on the web, remain aware of your transactions and activities, and always protect your personal information.
  • 85. Action should be taken immediately if there is even a remote possibility of someone using your life for identity cloning
  • 86. The Consequences of Identity Cloning • Some people use the terms “identity theft” and “identity cloning” interchangeably. But they are definitely NOT the same thing. • Identity thieves steal personal and financial information for specific purposes. For example, they might want your name, address, Social Security number and credit card data in order to buy products in physical stores or online, or to get a line of credit or buy property. Or they may want to sell this information on the black market. • True identity clones, however, want to actually assume your identity. They want to BECOME you.
  • 87. True identity clones, however, want to actually assume your identity.
  • 88. The Consequences of Identity Cloning • Identity Clones Actually Live And Work As You. They Even Pay The Bills As You. They Get Married As You. They have kids as you. They send their kids to school as you.” • Identity Clones Want Even MORE Information About You, So They Can Impersonate You For Years And Years. • They want to know where you grew up, who your friends are, which church you attend, which retailers you frequent, how you dress, which cosmetics you use anything that can help them impersonate you.
  • 89. Identity Clones Actually Live And Work As You. They Even Pay The Bills As You. They Get Married As You.
  • 90. Who Are Identity Clones? • Some identity clones have been known to go to ridiculous extremes to impersonate people, and these types of clones are often mentally ill. • Most identity clones are people trying to escape the law and/or their creditors. In other words, they’re “on the lam,” and trying to hide out until the “heat is off.”
  • 91. Some identity clones have been known to go to ridiculous extremes to impersonate people
  • 92. Who Are Identity Clones? • Many of these thieves look to the deceased for help. They search for people (often young people) who have died, and steal their Social Security and/or birth certificate information. • Then they assume the identity of the “dearly departed” to get passports, credit cards, car loans, mortgages — you name it. With just a little basic information, it can be easy for an identity clone to build a reputation as the person they are imitating
  • 94. Ghosting (Identity Theft) • Ghosting (identity theft) Ghosting is a form of identity theft in which someone steals the identity, and sometimes even the role within society, of a specific dead person (the "ghost") who is not widely known to be deceased.
  • 95. How can you tell if you’ve been a victim of identity cloning? • In most cases, the only way to know if you’ve been scammed is to order a copy of your credit report from one of the three major credit reporting agencies • If you’ve truly been a victim of identity cloning, the first thing you’ll probably notice on the report is duplicate addresses for your bank and credit accounts.
  • 96. If you’ve truly been a victim of identity cloning, the first thing you’ll probably notice on the report is duplicate addresses for your bank and credit accounts.
  • 97. How can you tell if you’ve been a victim of identity cloning? • And, if you’re a member of a professional organization those for doctors or lawyers, for example you may see two (or more) people registered with your name and address. • Some identity clones choose to impersonate doctors and lawyers so they can practice those professions without a license while earning hefty salaries.
  • 98. Some identity clones choose to impersonate doctors and lawyers so they can practice those professions without a license
  • 99. How can you tell if you’ve been a victim of identity cloning? • if you’ve been the victim of identity cloning, it will take some time and money to remedy the situation. You will likely have to hire an attorney or a private investigator to prove that you not the clone are the “real deal.” • But if you’re vigilant in protecting your identity and regularly request copies of your credit reports, it’s unlikely that you’ll discover an identity clone signing for a UPS package at your front door when you return from vacation.
  • 100. Address Mirroring • Determined criminals will often go to great lengths to perpetrate their scams. • In a popular business identity theft scheme known as address mirroring (a twist on the traditional "business bust-out" credit scam), business identity thieves closely mirror the physical address of the unsuspecting target business in order to obtain credit, loans, cash advances, and goods and services in the victim business' name. If the thieves can avoid detection or arousing suspicion by their activities, this tactic can be surprisingly simple and effective in a very short period of time.
  • 102. How the scam works • Step 1: Identify a suitable location & target company • This scam is most often used in a multi-floor office building or large business complex with many business tenants. Multiple floors or buildings and large numbers of occupying businesses reduce the likelihood that the thieves' activities will attract attention.
  • 103. Step 1: Identify a suitable location & target company
  • 104. How the scam works • Step 2: Obtain business credit reports or other useful information on the target company • Thieves may attempt to gain information about the company's finances, credit, suppliers, owners and officers, and general business activities in order to reduce the chances of raising suspicion and maximize their illegal gains.
  • 105. Step 2: Obtain business credit reports or other useful information on the target company
  • 106. How the scam works • Step 3: Rent office space in the same building as the target company • Using bogus information and funds or stolen credit cards obtained through previous criminal activity, the thieves rent or lease space in the same building usually on another floor or in a low traffic area of the building or complex. • They keep a low profile, typically with no business signs or other indicators of their business activities, although they may move some minimal office furniture in simply to avoid raising suspicion. • If one of their group remains at the location during business hours, it is most often a low level member whose job is to merely to keep up appearances and accept the deliveries.
  • 107. Step 3: Rent office space in the same building as the target company
  • 108. How The Scam Works • Step 4: Apply for credit and loans or purchase goods in the victim business’ name or both • Once the new "office" is set up, the thieves quickly get to work. Depending on the nature of the scam, they may either: • a). apply for credit cards, loans, and lines of credit in the business' name which they will promptly max out through purchases and cash advances; or • b). begin ordering products and services in the name of their target business, with any company that accepts purchase orders, offers invoicing, or payment terms being a potential source of goods.
  • 109. Step 4: Apply for credit and loans or purchase goods in the victim business’ name or both
  • 110. How The Scam Works • Either way, as quickly as possible, credit is maxed and orders are placed for high value items that are fast and easy to sell. • Expedited shipping or delivery is necessary because the thieves won't stay in this location for long, and extra shipping costs are not a concern because the thieves have no intention of paying the bill anyway.
  • 111. Step 4: Apply for credit and loans or purchase goods in the victim business’ name or both
  • 112. How The Scam Works • Step 5: Disappear with the proceeds and find the next victim • As soon as the thieves have racked up tens of thousands of dollars in fraudulent purchases, have maxed out available credit, or they have begun to raise suspicion, it is time to pack up and disappear.
  • 113. Step 5: Disappear with the proceeds and find the next victim
  • 114. How The Scam Works • In 30 to 90 days, the business that the thieves were impersonating at that location will begin to receive telephone calls and correspondence from creditors seeking payment, and must prove that they did not order or receive the goods that were actually delivered to their physical location. Depending upon the severity of the fraud, it may take months or years to fully unravel and resolve.
  • 115. the business that the thieves were impersonating at that location will begin to receive telephone calls and correspondence from creditors seeking payment, and must prove that they did not order or receive the goods that were actually delivered to their physical location
  • 116. Why it works ? • Thieves use address mirroring to take advantage of weak or ineffective transaction and application review processes; and, to exploit weaknesses in address-based verification, authentication, and fraud detection systems.
  • 117. Thieves use address mirroring to take advantage of weak or ineffective transaction and application review processes
  • 118. Why it works ? "Exact Match" • Address-based verification programs generally consider it an "exact match" when the customer's street address (line 1) and zip code provided at the time of the transaction match the information on record. In other words, these systems may disregard address line 2, such as a suite number, building number, etc.
  • 119. Why it works ? • As you can see in the two examples below, merchants are often advised by their credit card processors that if an exact match occurs (address line 1 and the zip code), then it is safe to complete the transaction. However, if the transaction later turns out to be fraudulent, the business may still suffer the combined loss of both goods and revenue, with little hope of recovery. • A very large fraudulent order of this nature can have a significant negative impact on a business.
  • 120. Why it works ? • Consider this: If you ignored address line 2, how would you know which of these is the legitimate business before you shipped goods or extended credit ? • 1) ABC Company 1100 42nd Street SW Anytown, Florida 54321 • 2) ABC Company 1100 42nd Street SW Suite 107 Anytown, Florida 54321
  • 121. Individual Identity Protection • The acquisition of personal identifiers is made possible through serious breaches of privacy. • For consumers, this is usually a result of them naively providing their personal information or login credentials to the identity thieves as a result of being duped but identity-related documents such as credit cards, bank statements, utility bills, check-books etc. • May Also Be Physically Stolen From Vehicles, Homes, Offices, And Not The Least Letter Boxes, Or Directly From Victims By Pickpockets And Bag Snatchers.
  • 122. Individual Identity Protection • Guardianship of personal identifiers by consumers is the most common intervention strategy recommended by the US Federal Trade Commission, Canadian Phone Busters and most sites that address identity theft. • Such organizations offer recommendations on how individuals can prevent their information falling into the wrong hands.
  • 123. Individual Identity Protection • Identity theft can be partially mitigated by not identifying oneself unnecessarily (a form of information security control known as risk avoidance). • This implies that organizations, IT systems and procedures should not demand excessive amounts of personal information or credentials for identification and authentication. • Requiring, storing and processing personal identifiers (such as Social Security number, national identification number, driver's license number, credit card number, etc.) increases the risks of identity theft unless this valuable personal information is adequately secured at all times.
  • 125. Individual Identity Protection • Committing personal identifiers to memory is a sound practice that can reduce the risks of a would-be identity thief from obtaining these records. • To help in remembering numbers such as social security numbers and credit card numbers, it is helpful to consider using mnemonic techniques or memory aids such as the mnemonic Major System.
  • 127. Individual Identity Protection • Identity thieves sometimes impersonate dead people, using personal information obtained from death notices, gravestones and other sources to exploit delays between the death and the closure of the person's accounts, the inattentiveness of grieving families and weaknesses in the processes for credit-checking. • Such crimes may continue for some time until the deceased's families or the authorities notice and react to anomalies.
  • 128. Individual Identity Protection • In recent years, commercial identity theft protection/insurance services have become available in many countries. • These services purport to help protect the individual from identity theft or help detect that identity theft has occurred in exchange for a monthly or annual membership fee or premium. • The services typically work either by setting fraud alerts on the individual's credit files with the three major credit bureaus or by setting up credit report monitoring with the credit bureaux. • While identity theft protection/insurance services have been heavily marketed, their value has been called into question
  • 130. Identity protection by organizations • In their May 1998 testimony before the United States Senate, the Federal Trade Commission (FTC) discussed the sale of Social Security numbers and other personal identifiers by credit-raters and data miners. • The FTC agreed to the industry's self-regulating principles restricting access to information on credit reports. According to the industry, the restrictions vary according to the category of customer. Credit reporting agencies gather and disclose personal and credit information to a wide business client base.
  • 131. Identity protection by organizations • Poor Stewardship Of Personal Data By Organizations, Resulting In Unauthorized Access To Sensitive Data, Can Expose Individuals To The Risk Of Identity Theft. • Poor Corporate Diligence Standards Which Can Result In Data Breaches Include:
  • 132. Identity Protection By Organizations • failure to shred confidential information before throwing it into dumpsters • failure to ensure adequate network security • credit card numbers stolen by call center agents and people with access to call recordings • the theft of laptop computers or portable media being carried off-site containing vast amounts of personal information. The use of strong encryption on these devices can reduce the chance of data being misused should a criminal obtain them.
  • 133. Identity Protection By Organizations
  • 134. Failure To Shred Confidential Information
  • 135. Failure To Ensure Adequate Network Security
  • 136. Identity Protection By Organizations • The Brokerage Of Personal Information To Other Businesses Without Ensuring That The Purchaser Maintains Adequate Security Controls. • Failure of governments, when registering sole proprietorships, partnerships, and corporations, to determine if the officers listed in the Articles of Incorporation are who they say they are. • This potentially allows criminals access to personal information through credit rating and data mining services.
  • 137. Identity protection by organizations • The failure of corporate or government organizations to protect consumer privacy, client confidentiality and political privacy has been criticized for facilitating the acquisition of personal identifiers by criminals. • Using various types of biometric information, such as fingerprints, for identification and authentication has been cited as a way to thwart identity thieves, however there are technological limitations and privacy concerns associated with these methods as well.
  • 138. Identity Protection By Organizations
  • 139. Legal Responses • India • Under the Information Technology Act 2000 Chapter IX Sec 66C • SECTION 66C • PUNISHMENT FOR IDENTITY THEFT Whoever, fraudulently or dishonestly makes use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh.
  • 141. Serious Fraud Investigation Office • http://sfio.nic.in/
  • 142. CBI Economic Offence Wing • http://cbi.gov.in/
  • 143. Legal Service India - Identity Theft • http://www.legalserviceindia.com/article/l278- Identity-Theft.html
  • 144. RBI Fraud Online Complaint Sachet Portal • https://sachet.rbi.org.in/
  • 145. FBI, Identity Theft • https://www.fbi.gov/investigate/white-collar- crime/identity-theft
  • 146. References • Identity Theft- A Critical And Comparative Analysis Of Various Laws In India • http://racolblegal.com/identity-theft-a-critical-and-comparative-analysis- of-various-laws-in-india/ • Identity theft • https://en.wikipedia.org/wiki/Identity_theft • Identity Cloning: Attack Of The Identity Clones • https://www.scambusters.org/identitycloning.html • What is Identity Cloning? • https://www.spamlaws.com/identity-cloning.html • What Are Identity Theft and Identity Fraud? • https://www.justice.gov/criminal-fraud/identity-theft/identity-theft-and- identity-fraud
  • 148. In the social jungle of human existence, there is no feeling of being alive without a sense of identity...