Id Theft & PhishingBy: Audie, Fae, Jeff, and Julia
ID TheftOccurs when an unauthorized party uses your personal information to commit fraud.
Id Theft10 million cases1 in 20 adultsFastest Growing CrimeVictims are often Arrested
Id Theft (How it Occurs)PhishingOld MailDumpster DivingHackingOnline TransactionsLost/Stolen Purse/Wallet
PreventativesCredit Protection ServiceRun Credit Annually (all 3 agencies)Shred Old MailKeep Mailing Address Up-to-DateNever Carry Social Security CardNever Give out Personal InformationDon’t Carry What You Don’t Need
If You Become AVictim175 hours, $800Police ReportObtain Credit ReportsFTC ReportGet Credit Protection ServiceKeep Detailed Notes of ConversationsMake a list of Names and NumbersCopies of Everything
Phishingattempting to acquire sensitive information such as usernames, passwords and credit card information through an electronic communication.
PhishingAOHell (1996)Transition to Financial Institutions (2001)Social Networking Sites (2006)Further Development (Present)
Spear PhishingTargeted versions of phishingPhishers are able to determine which banks potential victims use, and target bogus e-mails accordingly.
WhalingSpear Phishing high profile targetsPhishing directed specifically at senior level executives, wealthy individuals
More ResourcesID Theft   http://www.ftc.govPhishing http://www.antiphishing.org/http://www.onguardonline.gov/topics/phishing.aspx

Id Theft & Phishing2

  • 1.
    Id Theft &PhishingBy: Audie, Fae, Jeff, and Julia
  • 2.
    ID TheftOccurs whenan unauthorized party uses your personal information to commit fraud.
  • 3.
    Id Theft10 millioncases1 in 20 adultsFastest Growing CrimeVictims are often Arrested
  • 4.
    Id Theft (Howit Occurs)PhishingOld MailDumpster DivingHackingOnline TransactionsLost/Stolen Purse/Wallet
  • 7.
    PreventativesCredit Protection ServiceRunCredit Annually (all 3 agencies)Shred Old MailKeep Mailing Address Up-to-DateNever Carry Social Security CardNever Give out Personal InformationDon’t Carry What You Don’t Need
  • 8.
    If You BecomeAVictim175 hours, $800Police ReportObtain Credit ReportsFTC ReportGet Credit Protection ServiceKeep Detailed Notes of ConversationsMake a list of Names and NumbersCopies of Everything
  • 9.
    Phishingattempting to acquiresensitive information such as usernames, passwords and credit card information through an electronic communication.
  • 10.
    PhishingAOHell (1996)Transition toFinancial Institutions (2001)Social Networking Sites (2006)Further Development (Present)
  • 11.
    Spear PhishingTargeted versionsof phishingPhishers are able to determine which banks potential victims use, and target bogus e-mails accordingly.
  • 12.
    WhalingSpear Phishing highprofile targetsPhishing directed specifically at senior level executives, wealthy individuals
  • 17.
    More ResourcesID Theft http://www.ftc.govPhishing http://www.antiphishing.org/http://www.onguardonline.gov/topics/phishing.aspx