SlideShare a Scribd company logo
If you are me,
then who am I?
The Who, What, When, Why and How of
Identity Theft.
Who I am, what I do.
Apolonio “Apps” Garcia
I am NOT a ...and this is NOT
Official Disclaimer
Agenda
What is identity theft?
Who wants to be me?
Why do they want my information?
How do they get my information?
What can I do about it?
What is Identity Theft?
The fraudulent acquisition and use of a
person's private identifying information,
usually for financial gain.
Became a Federal Crime on October 30, 1998
Identity Theft and Assumption Deterrence Act of 1998
12.6 Million
Source: Federal Trade Commission
Breach
Identity
Theft
Who Wants to Be Me?
“A stolen identity is a powerful
cloak of anonymity for criminals
and terrorists… and a danger to
national security
and private citizens
alike.”
24 year old Donald Batiste ran a credit
repair company in Louisiana that used
Synthetic Identity Fraud to obtain over
$5M in loans and merchandise.
In a Louisiana state prison,
Thompson started stealing a raft of personal information from
more than 61 individuals, churches, financial institutions, and
businesses. That information enabled him to steal from the
victims’ bank accounts and use their credit to buy big-ticket
items—like appliances, cell phones, and big-screen TVs. He
even attempted to purchase a luxury SUV.
The Professional Hackers:
Russian Hackers
1.2 billion user name and password combinations
and more than 500 million email addresses
Target Breach
names, mailing addresses, phone numbers or
email addresses for up to 70 million individuals.
Anthem Breach
names, birthdays, medical IDs, Social Security
numbers, street addresses, e-mail addresses
and employment information
Personal Theft is More Common Than
You Think
Identity Theft from Someone You Know
What Information do they want?
Names Social
Security numbers
Dates of birth Medicare numbers
Addresses Birth certificates
Death certificates Passport numbers
Passwords Telephone numbers
Financial account numbers
Biometric data (like fingerprints, iris scans)
How do they get my Information?
Let’s try it ourselves...
How do they get my Information?
Smishing Scam Audio
Try to Take Easy Steps to help
PREVENT Identity Theft
IT HAPPENED!
What To Do Right Away
Act quickly to limit the damage.
Step 1: Call the companies where you know fraud occurred.
Step 2: Place a fraud alert and get your credit report.
Step 3: Report identity theft to the FTC.
Step 4: File a report with your local police department.
What To Do Next
Take a deep breath and begin to repair the damage.

More Related Content

What's hot

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
hewie
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
English Online Inc.
 
Scams will never stop
Scams will never stopScams will never stop
Scams will never stop
Oregon Law Practice Management
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
Billy Warero
 
Identity theft
Identity theftIdentity theft
Identity theft
Eqhball Ghazizadeh
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
mullarkea
 
Identity Theft Checklist
Identity Theft Checklist Identity Theft Checklist
Identity Theft Checklist
- Mark - Fullbright
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
Cut 2 Shreds
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
carlgiardina
 
RedCompass RedFlag Accelerator
RedCompass RedFlag AcceleratorRedCompass RedFlag Accelerator
RedCompass RedFlag Accelerator
cgalleani
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
- Mark - Fullbright
 
5 Types of Identity Theft - Canada
5 Types of Identity Theft - Canada5 Types of Identity Theft - Canada
5 Types of Identity Theft - Canada
- Mark - Fullbright
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
- Mark - Fullbright
 

What's hot (20)

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
 
Scams will never stop
Scams will never stopScams will never stop
Scams will never stop
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity fraud
Identity fraudIdentity fraud
Identity fraud
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
 
Identity Theft Checklist
Identity Theft Checklist Identity Theft Checklist
Identity Theft Checklist
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
RedCompass RedFlag Accelerator
RedCompass RedFlag AcceleratorRedCompass RedFlag Accelerator
RedCompass RedFlag Accelerator
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
Advice iq safeguards against id theft
Advice iq safeguards against id theftAdvice iq safeguards against id theft
Advice iq safeguards against id theft
 
Fight Back Against Identity Theft 98160
Fight Back Against Identity Theft  98160Fight Back Against Identity Theft  98160
Fight Back Against Identity Theft 98160
 
Identity theft
Identity theftIdentity theft
Identity theft
 
5 Types of Identity Theft - Canada
5 Types of Identity Theft - Canada5 Types of Identity Theft - Canada
5 Types of Identity Theft - Canada
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 

Viewers also liked

CIBC 19th Annual Whistler Institutional Investor Conference
CIBC 19th Annual Whistler Institutional Investor ConferenceCIBC 19th Annual Whistler Institutional Investor Conference
CIBC 19th Annual Whistler Institutional Investor Conference
Carling Gaze
 
Tej Kohli Cornea Institute
Tej Kohli Cornea InstituteTej Kohli Cornea Institute
Tej Kohli Cornea Institute
Kohli Ventures
 
Software libre
Software libreSoftware libre
Software libre
Jesus Contreras Padilla
 
How LinkedIn trains its sales reps
How LinkedIn trains its sales repsHow LinkedIn trains its sales reps
How LinkedIn trains its sales reps
Hannah Spanos
 
Каталог Фаберлик Дом
Каталог Фаберлик  ДомКаталог Фаберлик  Дом
Каталог Фаберлик Дом
Elena Pobedash
 
SMARTair™ Intro 2016
SMARTair™ Intro 2016SMARTair™ Intro 2016
SMARTair™ Intro 2016
echobay270668
 
Coloring pages for kids
Coloring pages for kidsColoring pages for kids
Coloring pages for kids
Kids Academy Co
 
FSA ELA IG - www.lumoslearning.com
FSA ELA IG - www.lumoslearning.comFSA ELA IG - www.lumoslearning.com
FSA ELA IG - www.lumoslearning.com
Steven Jarvis
 
Tv reycling process
Tv reycling processTv reycling process
Tv reycling process
Arman Sadeghi
 

Viewers also liked (12)

CIBC 19th Annual Whistler Institutional Investor Conference
CIBC 19th Annual Whistler Institutional Investor ConferenceCIBC 19th Annual Whistler Institutional Investor Conference
CIBC 19th Annual Whistler Institutional Investor Conference
 
Tej Kohli Cornea Institute
Tej Kohli Cornea InstituteTej Kohli Cornea Institute
Tej Kohli Cornea Institute
 
Software libre
Software libreSoftware libre
Software libre
 
Fact Sheet
Fact SheetFact Sheet
Fact Sheet
 
How LinkedIn trains its sales reps
How LinkedIn trains its sales repsHow LinkedIn trains its sales reps
How LinkedIn trains its sales reps
 
cafe
cafecafe
cafe
 
Каталог Фаберлик Дом
Каталог Фаберлик  ДомКаталог Фаберлик  Дом
Каталог Фаберлик Дом
 
SMARTair™ Intro 2016
SMARTair™ Intro 2016SMARTair™ Intro 2016
SMARTair™ Intro 2016
 
Coloring pages for kids
Coloring pages for kidsColoring pages for kids
Coloring pages for kids
 
Multi Usaha Tehnik Presentation
Multi Usaha Tehnik PresentationMulti Usaha Tehnik Presentation
Multi Usaha Tehnik Presentation
 
FSA ELA IG - www.lumoslearning.com
FSA ELA IG - www.lumoslearning.comFSA ELA IG - www.lumoslearning.com
FSA ELA IG - www.lumoslearning.com
 
Tv reycling process
Tv reycling processTv reycling process
Tv reycling process
 

Similar to Identity Theft - If you are me, then who am I

Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09jwnollet
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
Barry Caplin
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
pat7777
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
Quicken Loans Zing Blog
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Versiondanc752
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
Rahmat Inggi
 
Identity theft- Horowitz Law
Identity theft- Horowitz LawIdentity theft- Horowitz Law
Identity theft- Horowitz Law
Sanford Horowitz
 
Identity Theft 101
Identity Theft 101Identity Theft 101
Identity Theft 101
BestIDTheftCompanys.com
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
John Hamilton, DAHC,EHC,CFDAI, CPP, PSPO
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
swalton4
 

Similar to Identity Theft - If you are me, then who am I (10)

Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 
Identity theft- Horowitz Law
Identity theft- Horowitz LawIdentity theft- Horowitz Law
Identity theft- Horowitz Law
 
Identity Theft 101
Identity Theft 101Identity Theft 101
Identity Theft 101
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 

More from "Apolonio \"Apps\"" Garcia

Crash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative AnalysisCrash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative Analysis
"Apolonio \"Apps\"" Garcia
 
Introduction to Open FAIR
Introduction to Open FAIRIntroduction to Open FAIR
Introduction to Open FAIR
"Apolonio \"Apps\"" Garcia
 
Introduction to scenario based risk analysis part 3
Introduction to scenario based risk analysis  part 3Introduction to scenario based risk analysis  part 3
Introduction to scenario based risk analysis part 3
"Apolonio \"Apps\"" Garcia
 
Introduction to scenario based risk analysis part 2
Introduction to scenario based risk analysis  part 2Introduction to scenario based risk analysis  part 2
Introduction to scenario based risk analysis part 2
"Apolonio \"Apps\"" Garcia
 
Introduction to Scenario Based Risk Analysis
Introduction to Scenario Based Risk AnalysisIntroduction to Scenario Based Risk Analysis
Introduction to Scenario Based Risk Analysis
"Apolonio \"Apps\"" Garcia
 
Greater Cincinnati Infragard Healthcare and Public Health Sector
Greater Cincinnati Infragard Healthcare and Public Health Sector Greater Cincinnati Infragard Healthcare and Public Health Sector
Greater Cincinnati Infragard Healthcare and Public Health Sector
"Apolonio \"Apps\"" Garcia
 

More from "Apolonio \"Apps\"" Garcia (6)

Crash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative AnalysisCrash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative Analysis
 
Introduction to Open FAIR
Introduction to Open FAIRIntroduction to Open FAIR
Introduction to Open FAIR
 
Introduction to scenario based risk analysis part 3
Introduction to scenario based risk analysis  part 3Introduction to scenario based risk analysis  part 3
Introduction to scenario based risk analysis part 3
 
Introduction to scenario based risk analysis part 2
Introduction to scenario based risk analysis  part 2Introduction to scenario based risk analysis  part 2
Introduction to scenario based risk analysis part 2
 
Introduction to Scenario Based Risk Analysis
Introduction to Scenario Based Risk AnalysisIntroduction to Scenario Based Risk Analysis
Introduction to Scenario Based Risk Analysis
 
Greater Cincinnati Infragard Healthcare and Public Health Sector
Greater Cincinnati Infragard Healthcare and Public Health Sector Greater Cincinnati Infragard Healthcare and Public Health Sector
Greater Cincinnati Infragard Healthcare and Public Health Sector
 

Recently uploaded

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Identity Theft - If you are me, then who am I

  • 1. If you are me, then who am I? The Who, What, When, Why and How of Identity Theft.
  • 2. Who I am, what I do. Apolonio “Apps” Garcia
  • 3. I am NOT a ...and this is NOT Official Disclaimer
  • 4. Agenda What is identity theft? Who wants to be me? Why do they want my information? How do they get my information? What can I do about it?
  • 5. What is Identity Theft? The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
  • 6. Became a Federal Crime on October 30, 1998 Identity Theft and Assumption Deterrence Act of 1998
  • 7. 12.6 Million Source: Federal Trade Commission
  • 9.
  • 10. Who Wants to Be Me? “A stolen identity is a powerful cloak of anonymity for criminals and terrorists… and a danger to national security and private citizens alike.”
  • 11.
  • 12. 24 year old Donald Batiste ran a credit repair company in Louisiana that used Synthetic Identity Fraud to obtain over $5M in loans and merchandise.
  • 13. In a Louisiana state prison, Thompson started stealing a raft of personal information from more than 61 individuals, churches, financial institutions, and businesses. That information enabled him to steal from the victims’ bank accounts and use their credit to buy big-ticket items—like appliances, cell phones, and big-screen TVs. He even attempted to purchase a luxury SUV.
  • 14. The Professional Hackers: Russian Hackers 1.2 billion user name and password combinations and more than 500 million email addresses Target Breach names, mailing addresses, phone numbers or email addresses for up to 70 million individuals. Anthem Breach names, birthdays, medical IDs, Social Security numbers, street addresses, e-mail addresses and employment information
  • 15. Personal Theft is More Common Than You Think Identity Theft from Someone You Know
  • 16. What Information do they want? Names Social Security numbers Dates of birth Medicare numbers Addresses Birth certificates Death certificates Passport numbers Passwords Telephone numbers Financial account numbers Biometric data (like fingerprints, iris scans)
  • 17. How do they get my Information? Let’s try it ourselves...
  • 18. How do they get my Information? Smishing Scam Audio
  • 19. Try to Take Easy Steps to help PREVENT Identity Theft
  • 20.
  • 21. IT HAPPENED! What To Do Right Away Act quickly to limit the damage. Step 1: Call the companies where you know fraud occurred. Step 2: Place a fraud alert and get your credit report. Step 3: Report identity theft to the FTC. Step 4: File a report with your local police department.
  • 22. What To Do Next Take a deep breath and begin to repair the damage.

Editor's Notes

  1. https://www.fbi.gov/neworleans/press-releases/2010/no021710.htm