SlideShare a Scribd company logo
IDENTITY THEFT: A GROWING EPIDEMIC?
WE ARE ALL VULNERABLE
Godwin Emmanuel, Oyedokun
HND (Acct.), BSc. (Acct. Ed), MBA (Acct. & Fin.), MSc. (Acct.), MSc. (Bus & Econs.), MSc. (FACI),
MTP (SA), ACA, FCTI, ACIB, MNIM, CNA, FCFIP, FCE, FERP, CICA, CFA, CFE, CIPFA, CPFA,
ABR, CertIFR
godwinoye@yahoo.com
+2348033737184, +2348055863944 & +2348095419026
President, ACFE Lagos Chapter
Partner, Audit and Forensic Services
Ibraheem Jimoh & Co Chartered Accountants
Being a lecture delivered at the January edition of the monthly Meeting of members of ICAN Lagos
Mainland & District Society, held at the RAILWAY RECREATION CLUB, beside Lagos Mainland Local
Government Secretariat, APAPA ROAD, Oyingbo, Lagos
On January 21, 2017
INTRODUCTION
INTRODUCTION
 According to the Federal Trade Commission,
identity theft was the number one fraud
complaint during calendar year 2008.
 And limiting your use of your personal computer
may not help much: a study released by Javelin
Strategy and Research reported that in 2009,
most identity thefts were taking place offline, not
online -- just the opposite of what many of us
here present might think.
 One other troubling finding: the study found that
43 percent of all identity thefts are committed by
someone the victim knows.
INTRODUCTION
 The methods criminals use to steal personal information
change frequently, particularly those that exploit
technology.
 In addition, while identity theft leads to billions of dollars
in losses each year, we consumers aren’t necessarily on the
hook for the full tab.
 In fact, financial institutions assume most of the liability
for spending-related fraud.
 This paper does not in any way pretend to cover all aspect
of Identity theft, but it will do justice to the salient issues
that would help us all as participants in taking extra care
in our dealing either as corporate organisation or
individual.
 The rest of this paper would explore the meaning of
identity theft and identity fraud, how it is being
perpetrated, how to protect ourselves, how to detect same
and what to do if it is established.
IDENTITY THEFT AND IDENTITY FRAUD:
DEFINITIONS
IDENTITY THEFT AND IDENTITY FRAUD:
DEFINITIONS
 Identity theft: Identity theft happens when fraudsters
access enough information about someone’s identity (such as
their name, date of birth, current or previous addresses) to
commit identity fraud.
 Identity theft can take place whether the fraud victim is
alive or deceased.
 Identity theft can lead to fraud that can have a direct impact
on personal finance and could also make it difficult for one to
obtain loans, credit cards or a mortgage until the matter is
resolved.
 Identity fraud: Identity fraud can be described as the use
of that stolen identity in criminal activity to obtain goods or
services by deception.
7
USES OF IDENTITY DETAILS
Fraudsters can use identity details to:
 Open bank accounts.
 Obtain credit cards, loans and state benefits.
 Order goods in your name.
 Take over your existing accounts.
 Take out mobile phone contracts.
 Obtain genuine documents such as passports and
driving licences in your name.
Stealing an individual’s identity details does not, on
its own, constitute identity fraud, but using that
identity for any of the above activities does.
8
FINANCIAL INSTITUTION AND THE
BURDEN OF LOSS
 Consumer information is readily available via the
Internet and criminals engaged in a continuous
game of technological one-upmanship with law
enforcement, one wonder what the future holds for
our financial security.
 Will sophisticated fraudsters be able to overcome
advances in voice and fingerprint recognition once
the technology ultimately becomes cost-effective for
mainstream use?
 Will financial institutions continue to eat the losses
deriving from unauthorized transactions, or will
liability shift more to the consumer at some point?
9
STEMMING IDENTITY THEFT IN NIGERIA
 In Nigeria, we are familiar with online payment platforms -
Quickteller, Virtual Terminal Network, PocketMoni, InterSwitch –
as well as the use of automated teller machines (ATM) in
facilitating e-commerce.
 But with the increased flexibility in handling transactions comes
the added cyber challenge of identity theft or credit card theft
 Lack of a central and unique electronic identification system has
made it virtually impossible to authenticate a specific user in a
uniform fashion across services/platforms.
 The NIMC Act is an option in dealing with some threats to our ICT
infrastructures and a way out in dealing with identity theft.
 The Commission was established to “establish, own, operate,
maintain and manage the National Identity Database in Nigeria”
1
0
FACT ABOUT IDENTITY THEFT FACTS
Common Victims Ski and Play Tennis
 Major credit bureau Experian found the common
activities of people who were more often
victimized by identity theft to have involved in
any of the following activities:
 Skiing
 Tennis
 Politics
 Cultural/arts
 Foreign travel
 Charities/volunteering
1
1
FACT ABOUT IDENTITY THEFT FACTS
 One in 700 thieves are Caught
 Most Common thieves are your family
 Million Records Exposed in Data Breaches
 Common Victims are Children & Deceased
 Smartphone Owners’ Habits Increase Chance of
Fraud
 Victims need five full weeks off to restore Identity
1
2
HOW IDENTITY THEFT ARE COMMITTED
 The human imagination and creativity are endless when it comes
to stealing things,” says Peter Keane, dean emeritus and professor
at the Golden Gate University College of Law.
 Identity thieves commit their crime in several ways:
 Your Trash
 Your Mail
 Phishing
 Skimming
 Straightforward Theft
 Conning
 Address Manipulation
 Information given away
 Dumpster diving
 Shoulder surfing
 Wallet or document theft
1
3
HOW IDENTITY THEFT ARE COMMITTED
 Bogus phone calls
 Pretexting
 Business record theft
 Malware
 Spam
 Spear phishing
 Hacking
 Restaurants
 Data Breaches
 Hacked Shopping Sites
1
4
PROTECTION AGAINST IDENTITY/THEFT
AND FRAUD
The following are also recommended for adequate protection against
the risk of identity theft and fraud:
 Don’t throw out anything with your name, address or financial
details without shredding it first.
 If you receive an unsolicited email or phone call from what appears
to be your bank or building society asking for your security details,
never reveal your full password, login details or account numbers.
Be aware that a bank will never ask for your PIN or for a whole
security number or password.
 If you are concerned about the source of a call, wait five minutes
and call your bank from a different telephone making sure there is
a dialling tone.
1
5
PROTECTION AGAINST IDENTITY/THEFT
AND FRAUD
 Check your statements carefully and report anything suspicious to
the bank or financial service provider concerned.
 Don’t leave things like bills lying around for others to look at.
 If you’re expecting a bank or credit card statement and it doesn’t
arrive, tell your bank or credit card company.
 The three credit reference agencies offer a credit report checking
service to alert you to any key changes on your credit file that
could indicate potential fraudulent activity.
 It is particularly helpful to check your personal credit file 2-3
months after you have moved house.
1
6
WHAT TO DO AS A VICTIM OF
IDENTITY FRAUD
The victim of identity fraud should:
 Act quickly
 Report it to your bank as soon as possible.
 Report the matter to the relevant organisation
 Depending on their advice, you should then alert your
local police force
 Report all lost or stolen documents
 Get a copy of your credit report
 Look at your credit report closely
 The credit reference agencies will contact lenders on
your behalf where fraudulent applications have been
made or fraudulent credit accounts opened in order to
restore your credit history to its former state.
HOW TO PREVENT IDENTITY THEFT
HOW TO PREVENT IDENTITY THEFT
Preventing identity theft starts with managing your personal information
carefully and sensibly. The following among others are recommended
precautions to keep your personal information safe:
 Only carry essential documents with you
 Keep new cheques out of the mail
 Be careful when giving out personal information over the phone
 Your trash is their treasure
 Make sure others are keeping you safe
 Stay on top of your credit
 Protect your Social Security Number
 Follow your credit card billing cycles closely
 Keep a list of account numbers, expiration dates and telephone
numbers filed away
 Create passwords or PIN numbers out of a random mix of letters and
numbers
HOW TO PREVENT IDENTITY THEFT
 Commit all passwords to memory.
 When using an ATM machine, make sure no one is hovering over
you and can see you enter your password.
 When participating in an online auction, try to pay the seller
directly with a credit card so you can dispute the charges if the
merchandise does not arrive or was misrepresented
 Adopt an attitude of healthy skepticism toward websites that
offer prizes or giveaways.
 Choose a commercial online service that offers parental control
features
HOW TO PREVENT IDENTITY THEFT
 Tell your children never to give out their address telephone
number password school name or any other personal information.
 Make sure your children know to never agree to meet face-to-face
with someone they have met online without discussing it with
you.
 Tell your children never to respond to messages that have bad
words, are scary, or just seem weird.
 Tell your children never to enter an area that charges for services
without asking you first.
 Tell children never send a picture of themselves to anyone
without your permission.
 Make sure that access to the Internet at your children’s school is
monitored by adults.
CONCLUSION
SUMMARY AND CONCLUSION
 Identity theft is the fastest growing crime in
Nigeria, the truth of the matter is that the so called
developed country have also recorded the highest
number of cases in the time past, and it is currently
the most common consumer complaint.
 Identity theft costs victims a lot of money, stress and
time, but impostors show no mercy as they continue
to find new and more sophisticated ways to commit
the crime (bestidtheftcompanys.com).
SUMMARY AND CONCLUSION
 Identity theft can cost you a lot of money as well as create
confusion across the breadth of your life, but despite the horror
stories, you have to wonder how prevalent identity theft
actually is as well as what you can do to prevent it (Odysseas
Papadimitriou, 2013).
 Identity theft and fraud are terrifying prospects for consumers,
as they can lead to financial losses and credit score damage.
 However, these types of crime are far less common than you
might think, and you can further reduce the likelihood of
falling victim to them by taking a few commonsense measures
to protect your personal information.
SUMMARY AND CONCLUSION
 Distinguished members of my District (ICAN
LMDS), I can confirm to you that we are all
venerable because the issue of identity theft has
became growing epidemic and sure, exercising
common sense will always be your best defence
against identity thieves, the hope is that advances in
identity verification will also make life more difficult
for criminals in the future.
 Conferences and or training of this nature would
help our members and continue to shape their
consciousness while implementing safety measure or
investing cases of identity theft.
SUMMARY AND CONCLUSION
 Take credit card transactions, for example. Steven
Myers, an assistant professor of informatics and
computing at the Indiana University have this to
say: “A credit-card is supposed to identify the
person, but it is easy to imagine the deployment of
technology which uses a camera to perform facial
recognition, a mic to perform voice recognition, etc.,”
 “Right now those technologies are very expensive,
but research is going on to bring down the cost of
biometric measures, so that should bring down
identity theft a lot.” (Swapnoneel Roy, an assistant
professor with the University of North
Florida’s School of Computing)
SUMMARY AND CONCLUSION
 Still, we can’t expect identity theft to disappear
altogether, in part because the potential payoff will
always allure criminals and in part because we are
increasingly putting more and more of our personal
information online for the world to see.
 Vijay Kanabar, an associate professor of computer
science and administrative services at Boston
University also stated that “the biggest disturbing
trend in identity theft will definitely be social media,
as there will be no privacy.”
CASES
 Ayo Animashaun victim of identity theft
 The HipTv boss made this known on July 2015 when he announced on
Instagram that an impostor is trying to rip off up and coming artistes by
demanding payment for airing their music videos on his programme.
 Another Ayo Animashaun impersonating him. He charges and collects money
on behalf of HipTv. This guy mirrors all his posts, It won’t be surprised if he
reposts this to confuse people. His original Facebook account has over 4,800
friends as opposed to the fake account.
TV personality, Ayo Animashaun
CASES
 Nigerian Woman in UK Arrested for Identity Theft
 Oluwaseun Adenubi, a 30 year old Nigerian woman in the UK, has been
arrested by the UK authorities and charged with identity theft.
 It was discovered that she stole the identity of another Nigerian-British born
woman so as to have her needs and those of her baby, taken care of by that
country’s tax payers.
 This is according to reports by Daily Mail. Adenubi posed as Rita Ogunkunle to
obtain free NHS medical care during the delivery of her son Moses, and also
got a £3,500 payment in the process.
 In addition to that she has been receiving about £9000/year in state handouts
while living in the east London suburb.
 She also allowed Ogunkunle, 32, and partner Michael Adebambo, 46, to
register as Moses’s parents to get him free NHS care and a UK passport, a
court heard.
CASES
 Nigerian twist #1: Trust me — send no money
 The scam: In London, England, a would-be renter is fooled into believing she’s
dealing with a legitimate apartment owner when he tells her there’s no need to
send an advance payment to him.
 The cunning crook spins a story about having trouble with previous renters
and wanting proof of her ability to pay. But he suggests she should send some
money — about $2500 — as an electronic payment to a friend or relative of her
choice.
 That way, he says, it will prove she has the money but it will remain safe.
Here’s the catch: as proof of payment, he asks for a scanned copy of the
transfer payment. A while later, posing as the friend or relative, he uses this
copy to collect the money from a Western Union office.
 The solution: It’s not clear if Western Union was fooled into thinking the
document was an original or if they will pay out on presentation of a copy. All
they would say is that they are investigating the scam.
 Meanwhile, the message is clear: not only should you not send electronic
payments to someone you don’t know and trust but also don’t send them a copy
either.
CASES
 Nigerian twist #2: Send me the stuff — I’ll use PayPal
 The scam: Wise to the use of forged checks and stolen credit cards to pay for
items they’re selling, many vendors using services like eBay and Craigslist
now insist they’ll only accept payments via PayPal, especially to buyers who
ask for shipment overseas — usually to Africa.
 Fine. But what happens when you get an email apparently from PayPal saying
your account has now been credited with the money you’re awaiting?
 Well, if you don’t independently check your account, you may have just
received a fake message that’s not from PayPal at all.
 It’s easy to do if the buyer gets your email address and it’s just as easy for
scammers to design a message that looks like the real thing. And that’s what
they’re now doing in a big way.
 The solution: Simple. As suggested above, check your PayPal account to
make sure the money really is there.
CASES
 Nigerian twist #3: It’s OK — we’re the FBI, um, the President
 The scam: A resident of North Kenai, Alaska, sniffs out a scam when she
receives a $30,000 check, supposedly from the Central Bank of Nigeria, and is
told to take 10% and forward the rest. She doesn’t.
 Later she gets what seems to be an email from the FBI. It says they’ve been
monitoring her email and investigating the bank and “confirmed your contract
payment is 100% genuine and hitch free.”
 She still doesn’t bite, so a couple of days later the scammers send another
message, this time from the “United Nations 2007 Compensations Payments
Directive” saying the Nigerian government is concerned about its image and
the President wants to pay the woman $300,000 compensation to redeem its
good name!
 Now, of course, they just want her bank details so they can forward the money.
She doesn’t fall for that either.
 The solution: Talk about persistence! As usual, the warnings here are that you
don’t get money for nothing, never wire cash to someone you don’t know, and
don’t give your bank details to someone you don’t know — even someone who
says he’s the President of Nigeria!
THANKS FOR LISTENING
REFERENCES
 Arowosaiye Y. I, (2013) “The New Phenomenon of Phishing, Credit Card Fraud, Identity Theft, Internet Piracy and
Nigerian Criminal Law” available
at http://www.unilorin.edu.ng/publications/arowosayeyi/THE_NEW_PHENOMENON_OF_PHISHING.pdf accessed
14/01/2013
 http://www.actionfraud.police.uk/fraud_protection/identity_fraud
 http://www.nigerianlawtoday.com/2013/01/stemming-identity-theft-in-nigeria_16.html
 http://www.ncpc.org/topics/fraud-and-identity-theft/tips-to-prevent-identity-theft
 http://www.nigeriacreditreport.com/services/creditadvice/identitytheft.htm
 http://www.ncpc.org/topics/fraud-and-identity-theft/tips-to-prevent-identity-theft
 http://www.nigeriacreditreport.com/services/creditadvice/identitytheft.htm
 https://www.dia.govt.nz/Identity---How-does-identity-theft-happen
 https://www.transunion.com/personal-credit/identity-theft-and-fraud/how-to-prevent-identity-theft.page
 Papadimitriou, O (2013). Identity Theft: What It Is, How It Happens & the Best Protection
 Downloaded from http://www.cardhub.com/edu/identity-theft/
 Leamy, E. (2008). How Identity Theft Happens and How to Protect Yourself: downloaded from
http://abcnews.go.com/Technology/story?id=4766894&page=1
 Sid Kirchheimer (2013). 10 Ways to Prevent Identity Theft: Downloaded 11/11/2015 on from
http://www.aarp.org/money/scams-fraud/info-09-2013/prevent-identity-theft.html
 www.nimc.gov.ng
 10 Shocking ID Theft Facts of 2012 downloaded on 11/11/2015 from http://bestidtheftcompanys.com/10-shocking-id-
theft-facts-of-2012
 http://www.scambusters.org/nigerianscams.html
 http://jaguda.com/2015/08/11/nigerian-woman-in-uk-arrrested-for-identity-theft/
 http://thenationonlineng.net/ayo-animashaun-victim-of-identity-theft/
 http://wreg.com/2015/11/08/bartlett-woman-charged-with-identity-theft-stealing-362k-from-employer/

More Related Content

What's hot

Forensic accounting and investigation a means of curbing money laundering act...
Forensic accounting and investigation a means of curbing money laundering act...Forensic accounting and investigation a means of curbing money laundering act...
Forensic accounting and investigation a means of curbing money laundering act...
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Forensic/Investigation report writing techniques
Forensic/Investigation report writing techniquesForensic/Investigation report writing techniques
Forensic/Investigation report writing techniques
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
eNAIRA: BENEFITS AND CHALLENGES
eNAIRA: BENEFITS AND CHALLENGESeNAIRA: BENEFITS AND CHALLENGES
4 Most Common Forensic Accounting Investigation Cases
4 Most Common Forensic Accounting Investigation Cases4 Most Common Forensic Accounting Investigation Cases
4 Most Common Forensic Accounting Investigation Cases
Veriti Consulting LLC
 
Forensic accounting
Forensic accountingForensic accounting
Forensic accounting
ruquia shah
 
D4S2 Red Flags.pptx
D4S2 Red Flags.pptxD4S2 Red Flags.pptx
D4S2 Red Flags.pptx
30rustiegmailcom
 
Ebook audit case study
Ebook audit case studyEbook audit case study
Ebook audit case study
ngocnhian
 
Application of forensic audit and investigation in resolving tax related frau...
Application of forensic audit and investigation in resolving tax related frau...Application of forensic audit and investigation in resolving tax related frau...
Application of forensic audit and investigation in resolving tax related frau...
Newman Enyioko
 
Application of forensic audit and investigation in resolving tax related frau...
Application of forensic audit and investigation in resolving tax related frau...Application of forensic audit and investigation in resolving tax related frau...
Application of forensic audit and investigation in resolving tax related frau...
Newman Enyioko
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in banks
sathyananda prabhu
 
Forensic accounting
Forensic accountingForensic accounting
Forensic accounting
Lakshita Kumar
 
Introduction to Forensic Accounting
Introduction to Forensic AccountingIntroduction to Forensic Accounting
Introduction to Forensic Accounting
Rahul Magan,MBA Finance
 
Skill set, ethical conduct and professional communication for forensic accoun...
Skill set, ethical conduct and professional communication for forensic accoun...Skill set, ethical conduct and professional communication for forensic accoun...
Skill set, ethical conduct and professional communication for forensic accoun...
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Forensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert WitnessForensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert Witness
Neeraj Aarora
 
Application of forensic accounting a tool for confidence in auditors’ reports
Application of forensic accounting a tool for confidence in auditors’ reportsApplication of forensic accounting a tool for confidence in auditors’ reports
Application of forensic accounting a tool for confidence in auditors’ reports
Alexander Decker
 
Forensic Accounting | Accounting
Forensic Accounting | AccountingForensic Accounting | Accounting
Forensic Accounting | Accounting
Transweb Global Inc
 
jurnal fraud not detected.pdf
jurnal fraud not detected.pdfjurnal fraud not detected.pdf
jurnal fraud not detected.pdf
YuanSari1
 
Fraud principles1
Fraud principles1Fraud principles1
Fraud principles1
Sevisa Isufaj
 
Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managers
rickycfe
 
Introduction to Forensic Accounting
Introduction to Forensic AccountingIntroduction to Forensic Accounting
Introduction to Forensic Accounting
Treasury Consulting LLP
 

What's hot (20)

Forensic accounting and investigation a means of curbing money laundering act...
Forensic accounting and investigation a means of curbing money laundering act...Forensic accounting and investigation a means of curbing money laundering act...
Forensic accounting and investigation a means of curbing money laundering act...
 
Forensic/Investigation report writing techniques
Forensic/Investigation report writing techniquesForensic/Investigation report writing techniques
Forensic/Investigation report writing techniques
 
eNAIRA: BENEFITS AND CHALLENGES
eNAIRA: BENEFITS AND CHALLENGESeNAIRA: BENEFITS AND CHALLENGES
eNAIRA: BENEFITS AND CHALLENGES
 
4 Most Common Forensic Accounting Investigation Cases
4 Most Common Forensic Accounting Investigation Cases4 Most Common Forensic Accounting Investigation Cases
4 Most Common Forensic Accounting Investigation Cases
 
Forensic accounting
Forensic accountingForensic accounting
Forensic accounting
 
D4S2 Red Flags.pptx
D4S2 Red Flags.pptxD4S2 Red Flags.pptx
D4S2 Red Flags.pptx
 
Ebook audit case study
Ebook audit case studyEbook audit case study
Ebook audit case study
 
Application of forensic audit and investigation in resolving tax related frau...
Application of forensic audit and investigation in resolving tax related frau...Application of forensic audit and investigation in resolving tax related frau...
Application of forensic audit and investigation in resolving tax related frau...
 
Application of forensic audit and investigation in resolving tax related frau...
Application of forensic audit and investigation in resolving tax related frau...Application of forensic audit and investigation in resolving tax related frau...
Application of forensic audit and investigation in resolving tax related frau...
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in banks
 
Forensic accounting
Forensic accountingForensic accounting
Forensic accounting
 
Introduction to Forensic Accounting
Introduction to Forensic AccountingIntroduction to Forensic Accounting
Introduction to Forensic Accounting
 
Skill set, ethical conduct and professional communication for forensic accoun...
Skill set, ethical conduct and professional communication for forensic accoun...Skill set, ethical conduct and professional communication for forensic accoun...
Skill set, ethical conduct and professional communication for forensic accoun...
 
Forensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert WitnessForensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert Witness
 
Application of forensic accounting a tool for confidence in auditors’ reports
Application of forensic accounting a tool for confidence in auditors’ reportsApplication of forensic accounting a tool for confidence in auditors’ reports
Application of forensic accounting a tool for confidence in auditors’ reports
 
Forensic Accounting | Accounting
Forensic Accounting | AccountingForensic Accounting | Accounting
Forensic Accounting | Accounting
 
jurnal fraud not detected.pdf
jurnal fraud not detected.pdfjurnal fraud not detected.pdf
jurnal fraud not detected.pdf
 
Fraud principles1
Fraud principles1Fraud principles1
Fraud principles1
 
Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managers
 
Introduction to Forensic Accounting
Introduction to Forensic AccountingIntroduction to Forensic Accounting
Introduction to Forensic Accounting
 

Similar to Identity theft godwin oyedokun

Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
- Mark - Fullbright
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
Lisa Sosebee
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
Springboard
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
Quicken Loans Zing Blog
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
OremDPS
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd
jeelsonani003567
 
Identity Theft Overview Webinar
Identity Theft Overview WebinarIdentity Theft Overview Webinar
Identity Theft Overview Webinar
Community Legal Education Ontario (CLEO)
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
- Mark - Fullbright
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
- Mark - Fullbright
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
- Mark - Fullbright
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent It
IdentityForce
 
Fight Back Against Identity Theft 98160
Fight Back Against Identity Theft  98160Fight Back Against Identity Theft  98160
Fight Back Against Identity Theft 98160
Mindy W Gilbert 937.206.7973 megilbert@firstam.com
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
Lisa Sosebee
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
Ron Drew
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
Barry Caplin
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
Angela Lawson
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptb
DudleyDoright
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
- Mark - Fullbright
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
Harold Stallard
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
mullarkea
 

Similar to Identity theft godwin oyedokun (20)

Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd
 
Identity Theft Overview Webinar
Identity Theft Overview WebinarIdentity Theft Overview Webinar
Identity Theft Overview Webinar
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent It
 
Fight Back Against Identity Theft 98160
Fight Back Against Identity Theft  98160Fight Back Against Identity Theft  98160
Fight Back Against Identity Theft 98160
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptb
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
 

More from Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR

Financial Intelligence in a Depressed Economy
Financial Intelligence in a Depressed EconomyFinancial Intelligence in a Depressed Economy
Financial Intelligence in a Depressed Economy
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
The Board and Audit Committee: Enhancing the Board and Audit Committee Role
The Board and Audit Committee:  Enhancing the Board and Audit Committee RoleThe Board and Audit Committee:  Enhancing the Board and Audit Committee Role
The Board and Audit Committee: Enhancing the Board and Audit Committee Role
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Legal Updates and Compliance Management ICMA
Legal Updates and Compliance Management ICMALegal Updates and Compliance Management ICMA
Legal Updates and Compliance Management ICMA
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Effective Application of Financial Intelligence in a Critical Economic Situation
Effective Application of Financial Intelligence in a Critical Economic SituationEffective Application of Financial Intelligence in a Critical Economic Situation
Effective Application of Financial Intelligence in a Critical Economic Situation
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Challenges and Prospects of Improving Internal Generated Revenue (IGR) throug...
Challenges and Prospects of Improving Internal Generated Revenue (IGR) throug...Challenges and Prospects of Improving Internal Generated Revenue (IGR) throug...
Challenges and Prospects of Improving Internal Generated Revenue (IGR) throug...
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Artificial and Human Intelligence in Business Prof. Oyedokun.pptx
Artificial and Human Intelligence in Business Prof. Oyedokun.pptxArtificial and Human Intelligence in Business Prof. Oyedokun.pptx
Artificial and Human Intelligence in Business Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Deterring Corporate Fraud and Effective Functioning within an Organisational ...
Deterring Corporate Fraud and Effective Functioning within an Organisational ...Deterring Corporate Fraud and Effective Functioning within an Organisational ...
Deterring Corporate Fraud and Effective Functioning within an Organisational ...
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Digital Taxation Framework Prof Oyedokun.pptx
Digital Taxation Framework Prof Oyedokun.pptxDigital Taxation Framework Prof Oyedokun.pptx
Digital Taxation Framework Prof Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Fraud Management in the Workplace NCRIB Lecture
Fraud Management in the Workplace NCRIB LectureFraud Management in the Workplace NCRIB Lecture
Fraud Management in the Workplace NCRIB Lecture
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Upholding Ethical & Professional Standards in a Compromising Environment
Upholding Ethical & Professional Standards in a Compromising EnvironmentUpholding Ethical & Professional Standards in a Compromising Environment
Upholding Ethical & Professional Standards in a Compromising Environment
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
The Fraud Examiner’s Report – What the Certified Fraud Examiner Should Know
The Fraud Examiner’s Report –  What the Certified Fraud Examiner Should KnowThe Fraud Examiner’s Report –  What the Certified Fraud Examiner Should Know
The Fraud Examiner’s Report – What the Certified Fraud Examiner Should Know
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
CITN Ibadan Finance Act to the Rescue Prof Oyedokun.pptx
CITN Ibadan Finance Act to the Rescue  Prof Oyedokun.pptxCITN Ibadan Finance Act to the Rescue  Prof Oyedokun.pptx
CITN Ibadan Finance Act to the Rescue Prof Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
NEW NORMAL! WHAT BECOMES OF ACCOUNTING PROFESSION
NEW NORMAL!  WHAT BECOMES OF ACCOUNTING PROFESSION NEW NORMAL!  WHAT BECOMES OF ACCOUNTING PROFESSION
NEW NORMAL! WHAT BECOMES OF ACCOUNTING PROFESSION
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
RI Techniques of Academic Writing Prof. Oyedokun.pptx
RI Techniques of Academic Writing Prof. Oyedokun.pptxRI Techniques of Academic Writing Prof. Oyedokun.pptx
RI Techniques of Academic Writing Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
The Role of Compliance Officer in Forensic Accounting and Taxation in Nigeria
The Role of Compliance Officer in Forensic Accounting and Taxation in NigeriaThe Role of Compliance Officer in Forensic Accounting and Taxation in Nigeria
The Role of Compliance Officer in Forensic Accounting and Taxation in Nigeria
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Role of Information Technology in Revenue - Prof Oyedokun.pptx
Role of Information Technology in Revenue  - Prof Oyedokun.pptxRole of Information Technology in Revenue  - Prof Oyedokun.pptx
Role of Information Technology in Revenue - Prof Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Security Challenges and Their Socio-Economic Implications on Education
Security Challenges and Their Socio-Economic Implications on EducationSecurity Challenges and Their Socio-Economic Implications on Education
Security Challenges and Their Socio-Economic Implications on Education
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptxSWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 

More from Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR (20)

Financial Intelligence in a Depressed Economy
Financial Intelligence in a Depressed EconomyFinancial Intelligence in a Depressed Economy
Financial Intelligence in a Depressed Economy
 
The Board and Audit Committee: Enhancing the Board and Audit Committee Role
The Board and Audit Committee:  Enhancing the Board and Audit Committee RoleThe Board and Audit Committee:  Enhancing the Board and Audit Committee Role
The Board and Audit Committee: Enhancing the Board and Audit Committee Role
 
Legal Updates and Compliance Management ICMA
Legal Updates and Compliance Management ICMALegal Updates and Compliance Management ICMA
Legal Updates and Compliance Management ICMA
 
Effective Application of Financial Intelligence in a Critical Economic Situation
Effective Application of Financial Intelligence in a Critical Economic SituationEffective Application of Financial Intelligence in a Critical Economic Situation
Effective Application of Financial Intelligence in a Critical Economic Situation
 
Challenges and Prospects of Improving Internal Generated Revenue (IGR) throug...
Challenges and Prospects of Improving Internal Generated Revenue (IGR) throug...Challenges and Prospects of Improving Internal Generated Revenue (IGR) throug...
Challenges and Prospects of Improving Internal Generated Revenue (IGR) throug...
 
Artificial and Human Intelligence in Business Prof. Oyedokun.pptx
Artificial and Human Intelligence in Business Prof. Oyedokun.pptxArtificial and Human Intelligence in Business Prof. Oyedokun.pptx
Artificial and Human Intelligence in Business Prof. Oyedokun.pptx
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
 
Deterring Corporate Fraud and Effective Functioning within an Organisational ...
Deterring Corporate Fraud and Effective Functioning within an Organisational ...Deterring Corporate Fraud and Effective Functioning within an Organisational ...
Deterring Corporate Fraud and Effective Functioning within an Organisational ...
 
Digital Taxation Framework Prof Oyedokun.pptx
Digital Taxation Framework Prof Oyedokun.pptxDigital Taxation Framework Prof Oyedokun.pptx
Digital Taxation Framework Prof Oyedokun.pptx
 
Fraud Management in the Workplace NCRIB Lecture
Fraud Management in the Workplace NCRIB LectureFraud Management in the Workplace NCRIB Lecture
Fraud Management in the Workplace NCRIB Lecture
 
Upholding Ethical & Professional Standards in a Compromising Environment
Upholding Ethical & Professional Standards in a Compromising EnvironmentUpholding Ethical & Professional Standards in a Compromising Environment
Upholding Ethical & Professional Standards in a Compromising Environment
 
The Fraud Examiner’s Report – What the Certified Fraud Examiner Should Know
The Fraud Examiner’s Report –  What the Certified Fraud Examiner Should KnowThe Fraud Examiner’s Report –  What the Certified Fraud Examiner Should Know
The Fraud Examiner’s Report – What the Certified Fraud Examiner Should Know
 
CITN Ibadan Finance Act to the Rescue Prof Oyedokun.pptx
CITN Ibadan Finance Act to the Rescue  Prof Oyedokun.pptxCITN Ibadan Finance Act to the Rescue  Prof Oyedokun.pptx
CITN Ibadan Finance Act to the Rescue Prof Oyedokun.pptx
 
NEW NORMAL! WHAT BECOMES OF ACCOUNTING PROFESSION
NEW NORMAL!  WHAT BECOMES OF ACCOUNTING PROFESSION NEW NORMAL!  WHAT BECOMES OF ACCOUNTING PROFESSION
NEW NORMAL! WHAT BECOMES OF ACCOUNTING PROFESSION
 
RI Techniques of Academic Writing Prof. Oyedokun.pptx
RI Techniques of Academic Writing Prof. Oyedokun.pptxRI Techniques of Academic Writing Prof. Oyedokun.pptx
RI Techniques of Academic Writing Prof. Oyedokun.pptx
 
The Role of Compliance Officer in Forensic Accounting and Taxation in Nigeria
The Role of Compliance Officer in Forensic Accounting and Taxation in NigeriaThe Role of Compliance Officer in Forensic Accounting and Taxation in Nigeria
The Role of Compliance Officer in Forensic Accounting and Taxation in Nigeria
 
Role of Information Technology in Revenue - Prof Oyedokun.pptx
Role of Information Technology in Revenue  - Prof Oyedokun.pptxRole of Information Technology in Revenue  - Prof Oyedokun.pptx
Role of Information Technology in Revenue - Prof Oyedokun.pptx
 
Security Challenges and Their Socio-Economic Implications on Education
Security Challenges and Their Socio-Economic Implications on EducationSecurity Challenges and Their Socio-Economic Implications on Education
Security Challenges and Their Socio-Economic Implications on Education
 
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptxSWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
 
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
 

Recently uploaded

[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 

Recently uploaded (20)

[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 

Identity theft godwin oyedokun

  • 1. IDENTITY THEFT: A GROWING EPIDEMIC? WE ARE ALL VULNERABLE Godwin Emmanuel, Oyedokun HND (Acct.), BSc. (Acct. Ed), MBA (Acct. & Fin.), MSc. (Acct.), MSc. (Bus & Econs.), MSc. (FACI), MTP (SA), ACA, FCTI, ACIB, MNIM, CNA, FCFIP, FCE, FERP, CICA, CFA, CFE, CIPFA, CPFA, ABR, CertIFR godwinoye@yahoo.com +2348033737184, +2348055863944 & +2348095419026 President, ACFE Lagos Chapter Partner, Audit and Forensic Services Ibraheem Jimoh & Co Chartered Accountants Being a lecture delivered at the January edition of the monthly Meeting of members of ICAN Lagos Mainland & District Society, held at the RAILWAY RECREATION CLUB, beside Lagos Mainland Local Government Secretariat, APAPA ROAD, Oyingbo, Lagos On January 21, 2017
  • 3. INTRODUCTION  According to the Federal Trade Commission, identity theft was the number one fraud complaint during calendar year 2008.  And limiting your use of your personal computer may not help much: a study released by Javelin Strategy and Research reported that in 2009, most identity thefts were taking place offline, not online -- just the opposite of what many of us here present might think.  One other troubling finding: the study found that 43 percent of all identity thefts are committed by someone the victim knows.
  • 4. INTRODUCTION  The methods criminals use to steal personal information change frequently, particularly those that exploit technology.  In addition, while identity theft leads to billions of dollars in losses each year, we consumers aren’t necessarily on the hook for the full tab.  In fact, financial institutions assume most of the liability for spending-related fraud.  This paper does not in any way pretend to cover all aspect of Identity theft, but it will do justice to the salient issues that would help us all as participants in taking extra care in our dealing either as corporate organisation or individual.  The rest of this paper would explore the meaning of identity theft and identity fraud, how it is being perpetrated, how to protect ourselves, how to detect same and what to do if it is established.
  • 5. IDENTITY THEFT AND IDENTITY FRAUD: DEFINITIONS
  • 6. IDENTITY THEFT AND IDENTITY FRAUD: DEFINITIONS  Identity theft: Identity theft happens when fraudsters access enough information about someone’s identity (such as their name, date of birth, current or previous addresses) to commit identity fraud.  Identity theft can take place whether the fraud victim is alive or deceased.  Identity theft can lead to fraud that can have a direct impact on personal finance and could also make it difficult for one to obtain loans, credit cards or a mortgage until the matter is resolved.  Identity fraud: Identity fraud can be described as the use of that stolen identity in criminal activity to obtain goods or services by deception.
  • 7. 7 USES OF IDENTITY DETAILS Fraudsters can use identity details to:  Open bank accounts.  Obtain credit cards, loans and state benefits.  Order goods in your name.  Take over your existing accounts.  Take out mobile phone contracts.  Obtain genuine documents such as passports and driving licences in your name. Stealing an individual’s identity details does not, on its own, constitute identity fraud, but using that identity for any of the above activities does.
  • 8. 8 FINANCIAL INSTITUTION AND THE BURDEN OF LOSS  Consumer information is readily available via the Internet and criminals engaged in a continuous game of technological one-upmanship with law enforcement, one wonder what the future holds for our financial security.  Will sophisticated fraudsters be able to overcome advances in voice and fingerprint recognition once the technology ultimately becomes cost-effective for mainstream use?  Will financial institutions continue to eat the losses deriving from unauthorized transactions, or will liability shift more to the consumer at some point?
  • 9. 9 STEMMING IDENTITY THEFT IN NIGERIA  In Nigeria, we are familiar with online payment platforms - Quickteller, Virtual Terminal Network, PocketMoni, InterSwitch – as well as the use of automated teller machines (ATM) in facilitating e-commerce.  But with the increased flexibility in handling transactions comes the added cyber challenge of identity theft or credit card theft  Lack of a central and unique electronic identification system has made it virtually impossible to authenticate a specific user in a uniform fashion across services/platforms.  The NIMC Act is an option in dealing with some threats to our ICT infrastructures and a way out in dealing with identity theft.  The Commission was established to “establish, own, operate, maintain and manage the National Identity Database in Nigeria”
  • 10. 1 0 FACT ABOUT IDENTITY THEFT FACTS Common Victims Ski and Play Tennis  Major credit bureau Experian found the common activities of people who were more often victimized by identity theft to have involved in any of the following activities:  Skiing  Tennis  Politics  Cultural/arts  Foreign travel  Charities/volunteering
  • 11. 1 1 FACT ABOUT IDENTITY THEFT FACTS  One in 700 thieves are Caught  Most Common thieves are your family  Million Records Exposed in Data Breaches  Common Victims are Children & Deceased  Smartphone Owners’ Habits Increase Chance of Fraud  Victims need five full weeks off to restore Identity
  • 12. 1 2 HOW IDENTITY THEFT ARE COMMITTED  The human imagination and creativity are endless when it comes to stealing things,” says Peter Keane, dean emeritus and professor at the Golden Gate University College of Law.  Identity thieves commit their crime in several ways:  Your Trash  Your Mail  Phishing  Skimming  Straightforward Theft  Conning  Address Manipulation  Information given away  Dumpster diving  Shoulder surfing  Wallet or document theft
  • 13. 1 3 HOW IDENTITY THEFT ARE COMMITTED  Bogus phone calls  Pretexting  Business record theft  Malware  Spam  Spear phishing  Hacking  Restaurants  Data Breaches  Hacked Shopping Sites
  • 14. 1 4 PROTECTION AGAINST IDENTITY/THEFT AND FRAUD The following are also recommended for adequate protection against the risk of identity theft and fraud:  Don’t throw out anything with your name, address or financial details without shredding it first.  If you receive an unsolicited email or phone call from what appears to be your bank or building society asking for your security details, never reveal your full password, login details or account numbers. Be aware that a bank will never ask for your PIN or for a whole security number or password.  If you are concerned about the source of a call, wait five minutes and call your bank from a different telephone making sure there is a dialling tone.
  • 15. 1 5 PROTECTION AGAINST IDENTITY/THEFT AND FRAUD  Check your statements carefully and report anything suspicious to the bank or financial service provider concerned.  Don’t leave things like bills lying around for others to look at.  If you’re expecting a bank or credit card statement and it doesn’t arrive, tell your bank or credit card company.  The three credit reference agencies offer a credit report checking service to alert you to any key changes on your credit file that could indicate potential fraudulent activity.  It is particularly helpful to check your personal credit file 2-3 months after you have moved house.
  • 16. 1 6 WHAT TO DO AS A VICTIM OF IDENTITY FRAUD The victim of identity fraud should:  Act quickly  Report it to your bank as soon as possible.  Report the matter to the relevant organisation  Depending on their advice, you should then alert your local police force  Report all lost or stolen documents  Get a copy of your credit report  Look at your credit report closely  The credit reference agencies will contact lenders on your behalf where fraudulent applications have been made or fraudulent credit accounts opened in order to restore your credit history to its former state.
  • 17. HOW TO PREVENT IDENTITY THEFT
  • 18. HOW TO PREVENT IDENTITY THEFT Preventing identity theft starts with managing your personal information carefully and sensibly. The following among others are recommended precautions to keep your personal information safe:  Only carry essential documents with you  Keep new cheques out of the mail  Be careful when giving out personal information over the phone  Your trash is their treasure  Make sure others are keeping you safe  Stay on top of your credit  Protect your Social Security Number  Follow your credit card billing cycles closely  Keep a list of account numbers, expiration dates and telephone numbers filed away  Create passwords or PIN numbers out of a random mix of letters and numbers
  • 19. HOW TO PREVENT IDENTITY THEFT  Commit all passwords to memory.  When using an ATM machine, make sure no one is hovering over you and can see you enter your password.  When participating in an online auction, try to pay the seller directly with a credit card so you can dispute the charges if the merchandise does not arrive or was misrepresented  Adopt an attitude of healthy skepticism toward websites that offer prizes or giveaways.  Choose a commercial online service that offers parental control features
  • 20. HOW TO PREVENT IDENTITY THEFT  Tell your children never to give out their address telephone number password school name or any other personal information.  Make sure your children know to never agree to meet face-to-face with someone they have met online without discussing it with you.  Tell your children never to respond to messages that have bad words, are scary, or just seem weird.  Tell your children never to enter an area that charges for services without asking you first.  Tell children never send a picture of themselves to anyone without your permission.  Make sure that access to the Internet at your children’s school is monitored by adults.
  • 22. SUMMARY AND CONCLUSION  Identity theft is the fastest growing crime in Nigeria, the truth of the matter is that the so called developed country have also recorded the highest number of cases in the time past, and it is currently the most common consumer complaint.  Identity theft costs victims a lot of money, stress and time, but impostors show no mercy as they continue to find new and more sophisticated ways to commit the crime (bestidtheftcompanys.com).
  • 23. SUMMARY AND CONCLUSION  Identity theft can cost you a lot of money as well as create confusion across the breadth of your life, but despite the horror stories, you have to wonder how prevalent identity theft actually is as well as what you can do to prevent it (Odysseas Papadimitriou, 2013).  Identity theft and fraud are terrifying prospects for consumers, as they can lead to financial losses and credit score damage.  However, these types of crime are far less common than you might think, and you can further reduce the likelihood of falling victim to them by taking a few commonsense measures to protect your personal information.
  • 24. SUMMARY AND CONCLUSION  Distinguished members of my District (ICAN LMDS), I can confirm to you that we are all venerable because the issue of identity theft has became growing epidemic and sure, exercising common sense will always be your best defence against identity thieves, the hope is that advances in identity verification will also make life more difficult for criminals in the future.  Conferences and or training of this nature would help our members and continue to shape their consciousness while implementing safety measure or investing cases of identity theft.
  • 25. SUMMARY AND CONCLUSION  Take credit card transactions, for example. Steven Myers, an assistant professor of informatics and computing at the Indiana University have this to say: “A credit-card is supposed to identify the person, but it is easy to imagine the deployment of technology which uses a camera to perform facial recognition, a mic to perform voice recognition, etc.,”  “Right now those technologies are very expensive, but research is going on to bring down the cost of biometric measures, so that should bring down identity theft a lot.” (Swapnoneel Roy, an assistant professor with the University of North Florida’s School of Computing)
  • 26. SUMMARY AND CONCLUSION  Still, we can’t expect identity theft to disappear altogether, in part because the potential payoff will always allure criminals and in part because we are increasingly putting more and more of our personal information online for the world to see.  Vijay Kanabar, an associate professor of computer science and administrative services at Boston University also stated that “the biggest disturbing trend in identity theft will definitely be social media, as there will be no privacy.”
  • 27. CASES  Ayo Animashaun victim of identity theft  The HipTv boss made this known on July 2015 when he announced on Instagram that an impostor is trying to rip off up and coming artistes by demanding payment for airing their music videos on his programme.  Another Ayo Animashaun impersonating him. He charges and collects money on behalf of HipTv. This guy mirrors all his posts, It won’t be surprised if he reposts this to confuse people. His original Facebook account has over 4,800 friends as opposed to the fake account. TV personality, Ayo Animashaun
  • 28. CASES  Nigerian Woman in UK Arrested for Identity Theft  Oluwaseun Adenubi, a 30 year old Nigerian woman in the UK, has been arrested by the UK authorities and charged with identity theft.  It was discovered that she stole the identity of another Nigerian-British born woman so as to have her needs and those of her baby, taken care of by that country’s tax payers.  This is according to reports by Daily Mail. Adenubi posed as Rita Ogunkunle to obtain free NHS medical care during the delivery of her son Moses, and also got a £3,500 payment in the process.  In addition to that she has been receiving about £9000/year in state handouts while living in the east London suburb.  She also allowed Ogunkunle, 32, and partner Michael Adebambo, 46, to register as Moses’s parents to get him free NHS care and a UK passport, a court heard.
  • 29. CASES  Nigerian twist #1: Trust me — send no money  The scam: In London, England, a would-be renter is fooled into believing she’s dealing with a legitimate apartment owner when he tells her there’s no need to send an advance payment to him.  The cunning crook spins a story about having trouble with previous renters and wanting proof of her ability to pay. But he suggests she should send some money — about $2500 — as an electronic payment to a friend or relative of her choice.  That way, he says, it will prove she has the money but it will remain safe. Here’s the catch: as proof of payment, he asks for a scanned copy of the transfer payment. A while later, posing as the friend or relative, he uses this copy to collect the money from a Western Union office.  The solution: It’s not clear if Western Union was fooled into thinking the document was an original or if they will pay out on presentation of a copy. All they would say is that they are investigating the scam.  Meanwhile, the message is clear: not only should you not send electronic payments to someone you don’t know and trust but also don’t send them a copy either.
  • 30. CASES  Nigerian twist #2: Send me the stuff — I’ll use PayPal  The scam: Wise to the use of forged checks and stolen credit cards to pay for items they’re selling, many vendors using services like eBay and Craigslist now insist they’ll only accept payments via PayPal, especially to buyers who ask for shipment overseas — usually to Africa.  Fine. But what happens when you get an email apparently from PayPal saying your account has now been credited with the money you’re awaiting?  Well, if you don’t independently check your account, you may have just received a fake message that’s not from PayPal at all.  It’s easy to do if the buyer gets your email address and it’s just as easy for scammers to design a message that looks like the real thing. And that’s what they’re now doing in a big way.  The solution: Simple. As suggested above, check your PayPal account to make sure the money really is there.
  • 31. CASES  Nigerian twist #3: It’s OK — we’re the FBI, um, the President  The scam: A resident of North Kenai, Alaska, sniffs out a scam when she receives a $30,000 check, supposedly from the Central Bank of Nigeria, and is told to take 10% and forward the rest. She doesn’t.  Later she gets what seems to be an email from the FBI. It says they’ve been monitoring her email and investigating the bank and “confirmed your contract payment is 100% genuine and hitch free.”  She still doesn’t bite, so a couple of days later the scammers send another message, this time from the “United Nations 2007 Compensations Payments Directive” saying the Nigerian government is concerned about its image and the President wants to pay the woman $300,000 compensation to redeem its good name!  Now, of course, they just want her bank details so they can forward the money. She doesn’t fall for that either.  The solution: Talk about persistence! As usual, the warnings here are that you don’t get money for nothing, never wire cash to someone you don’t know, and don’t give your bank details to someone you don’t know — even someone who says he’s the President of Nigeria!
  • 33. REFERENCES  Arowosaiye Y. I, (2013) “The New Phenomenon of Phishing, Credit Card Fraud, Identity Theft, Internet Piracy and Nigerian Criminal Law” available at http://www.unilorin.edu.ng/publications/arowosayeyi/THE_NEW_PHENOMENON_OF_PHISHING.pdf accessed 14/01/2013  http://www.actionfraud.police.uk/fraud_protection/identity_fraud  http://www.nigerianlawtoday.com/2013/01/stemming-identity-theft-in-nigeria_16.html  http://www.ncpc.org/topics/fraud-and-identity-theft/tips-to-prevent-identity-theft  http://www.nigeriacreditreport.com/services/creditadvice/identitytheft.htm  http://www.ncpc.org/topics/fraud-and-identity-theft/tips-to-prevent-identity-theft  http://www.nigeriacreditreport.com/services/creditadvice/identitytheft.htm  https://www.dia.govt.nz/Identity---How-does-identity-theft-happen  https://www.transunion.com/personal-credit/identity-theft-and-fraud/how-to-prevent-identity-theft.page  Papadimitriou, O (2013). Identity Theft: What It Is, How It Happens & the Best Protection  Downloaded from http://www.cardhub.com/edu/identity-theft/  Leamy, E. (2008). How Identity Theft Happens and How to Protect Yourself: downloaded from http://abcnews.go.com/Technology/story?id=4766894&page=1  Sid Kirchheimer (2013). 10 Ways to Prevent Identity Theft: Downloaded 11/11/2015 on from http://www.aarp.org/money/scams-fraud/info-09-2013/prevent-identity-theft.html  www.nimc.gov.ng  10 Shocking ID Theft Facts of 2012 downloaded on 11/11/2015 from http://bestidtheftcompanys.com/10-shocking-id- theft-facts-of-2012  http://www.scambusters.org/nigerianscams.html  http://jaguda.com/2015/08/11/nigerian-woman-in-uk-arrrested-for-identity-theft/  http://thenationonlineng.net/ayo-animashaun-victim-of-identity-theft/  http://wreg.com/2015/11/08/bartlett-woman-charged-with-identity-theft-stealing-362k-from-employer/