Presentation is loading. Please wait.

Presentation is loading. Please wait.

Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Similar presentations


Presentation on theme: "Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy."— Presentation transcript:

1 Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy Alexander Technology Training Specialist Kevin Helpert Police LieutenantKevin Helpert Police Lieutenant Identity Theft A personal perspective Protect Your Past, Secure Your Future

2 Introduction Identity crime is a widespread crime in the United States. Identity theft was not formally recognized as a specific federal offense until 1998 when Congress passed a law, the Identity Theft and Assumption Deterrence Act. Identity crime is a widespread crime in the United States. Identity theft was not formally recognized as a specific federal offense until 1998 when Congress passed a law, the Identity Theft and Assumption Deterrence Act. The Federal Trade Commission (FTC) reported that for 2009 ID Theft continued to top the list of consumer complaints and accounted for over 21% of all complaints. The Federal Trade Commission (FTC) reported that for 2009 ID Theft continued to top the list of consumer complaints and accounted for over 21% of all complaints. The median value gained by thieves using ID theft is $500. The median value gained by thieves using ID theft is $500. Source: FTC Sentinel Report Protect Your Past, Secure Your Future

3 General Facts and Projections According to the 2006 FTC Identity Theft Survey Report, approx. 8.3 million American consumers were victimized. According to the 2006 FTC Identity Theft Survey Report, approx. 8.3 million American consumers were victimized. Misuse of existing credit cards accounted for 38% of all cases Misuse of existing credit cards accounted for 38% of all cases Victims of new account fraud spent an average of 10 hours to resolve the issue with some spending in excess of 100 hours Victims of new account fraud spent an average of 10 hours to resolve the issue with some spending in excess of 100 hours Protect Your Past, Secure Your Future Source: FTC Sentinel Report

4 General Facts and Projections (continued) Computers, the internet, and cell phones have made this type of crime quick and easy. Computers, the internet, and cell phones have made this type of crime quick and easy. Prior to 2003, U.S. Department of Justice studies revealed 98% of ID thieves went free. Prior to 2003, U.S. Department of Justice studies revealed 98% of ID thieves went free. ID theft victims are usually victimized again… after 90 days because the victim has restored their credit and the suspect still has the personal information of the victim. ID theft victims are usually victimized again… after 90 days because the victim has restored their credit and the suspect still has the personal information of the victim. Terrorist groups, including , are among those funded by identity theft. Terrorist groups, including , are among those funded by identity theft. Protect Your Past, Secure Your Future

5 Identity Theft by State (on per-capita basis) Rank State Victims/100,000 Rank State Victims/100,000 1 Arizona Arizona California California Nevada Nevada Texas Texas Florida Florida New York New York Georgia Georgia Colorado Colorado New Mexico New Mexico Maryland Maryland 85.8 Protect Your Past, Secure Your Future Source: FTC Sentinel Report

6 Identity Theft Types Credit card fraud23% Credit card fraud23% Utilities Fraud18% Utilities Fraud18% Bank fraud13% Bank fraud13% Employment- related fraud14% Employment- related fraud14% Other (medical/ child support, etc) 13.4% Other (medical/ child support, etc) 13.4% Loan fraud5% Loan fraud5% Protect Your Past, Secure Your Future Source: FTC Sentinel Report

7 ID Theft Victims by Age Under 19 years of age 2% Under 19 years of age 2% Ages 20 to 2919% Ages 20 to 2919% Ages 30 to 3923% Ages 30 to 3923% Ages 40 to 4924% Ages 40 to 4924% Ages 50 to 5920% Ages 50 to 5920% Ages 60 to 69 8% Ages 60 to 69 8% Age 70 and older 4% Age 70 and older 4% Protect Your Past, Secure Your Future Source: FTC Sentinel Report

8 Other Victim Data Race or Ethnicity is not a significant factor. Race or Ethnicity is not a significant factor. Household incomes of more than $75,000 per year are targeted more often. Household incomes of more than $75,000 per year are targeted more often. Urban vs. Rural: individuals in urban/ suburban settings are almost twice as likely to be victimized than rural individuals. Urban vs. Rural: individuals in urban/ suburban settings are almost twice as likely to be victimized than rural individuals. Protect Your Past, Secure Your Future

9 Objectives With this information, you will be better informed if you become a victim, able to start the process of recovery after becoming a victim, and know who to contact along with access to free resources. With this information, you will be better informed if you become a victim, able to start the process of recovery after becoming a victim, and know who to contact along with access to free resources. Protect Your Past, Secure Your Future

10 Points of Discussion General identity theft information General identity theft information How easy it is to become a victim How easy it is to become a victim Mistakes we make Mistakes we make How you can assist during an investigation if you become a victim How you can assist during an investigation if you become a victim Protect Your Past, Secure Your Future

11 Types of Identity Theft Various frauds Various frauds Scams Scams Counterfeit IDs Counterfeit IDs Altered checks Altered checks Counterfeit checks Counterfeit checks Stolen credit cards Stolen credit cards Stolen IDs Stolen IDs Fraudulent social security cards Fraudulent social security cards Protect Your Past, Secure Your Future

12 Sources of information Burglaries Burglaries Telephone solicitations Telephone solicitations Stolen wallets and purses Stolen wallets and purses Property records Property records Court records Court records Marriage and divorce certificates Marriage and divorce certificates Hacked computer information Hacked computer information On-line purchases On-line purchases Mailbox Mailbox (look for flags in up position)(look for flags in up position) Protect Your Past, Secure Your Future

13 Sources of information (Continued) Product warranty cards Product warranty cards Change of address Change of address Dumpster or trash diving Dumpster or trash diving Posing as a landlord to obtain credit report Posing as a landlord to obtain credit report Shoulder surfing Shoulder surfing Cell phones with picture/video capabilities Cell phones with picture/video capabilities Phishing through the internet and phone Phishing through the internet and phone Sales Clerks, bank clerks, etc. who copy personal application information Sales Clerks, bank clerks, etc. who copy personal application information Protect Your Past, Secure Your Future

14 Sources of information (Continued) Waiters and other store employees who use skimmers and sell information Waiters and other store employees who use skimmers and sell information People searches on the internet People searches on the internet Lost or stolen receipts Lost or stolen receipts Written checks (computer programs and scanners) Written checks (computer programs and scanners) Credit card verification scam (e- mail or phone) Credit card verification scam (e- mail or phone) Protect Your Past, Secure Your Future

15 Information from mail Telephone & utility bills Telephone & utility bills (name, phone #, address, acct #)(name, phone #, address, acct #) Credit card statement Credit card statement (name, address, card #, limit, exp, type(name, address, card #, limit, exp, type Bank statement Bank statement (name, address, bank name, account #, checks)(name, address, bank name, account #, checks) Boxes of checks Boxes of checks (blank checks ready to use)(blank checks ready to use) Credit card offers Credit card offers (name, address, contact #)(name, address, contact #) Paychecks and stubs Paychecks and stubs (name, address, employer, acct #, SSN)(name, address, employer, acct #, SSN) Retirement statements Retirement statements (name, address, acct #, balance, employer contact information, SSN) Annual SS statement Annual SS statement (name, address, SSN #s (spouse & dependants)(name, address, SSN #s (spouse & dependants) W-2s and other tax forms W-2s and other tax forms (everything needed to assume your ID)(everything needed to assume your ID) Protect Your Past, Secure Your Future

16 Social Networks Exposing security question answers Exposing security question answers But my profile is private But my profile is private Location data Location data Including embedded photo data Including embedded photo data Identity thieves are information miners Identity thieves are information miners Protect Your Past, Secure Your Future

17 Tips to protect yourself Write check ID on back side of credit card and sign Write check ID on back side of credit card and sign Keep credit card in sight Keep credit card in sight Drop bills off at post office Drop bills off at post office (or pay with cashiers check) (or pay with cashiers check) Pick up boxes of checks at bank personally Pick up boxes of checks at bank personally Do not respond to s asking for personal information, call your credit card company from a number listed on the statement Do not respond to s asking for personal information, call your credit card company from a number listed on the statement Protect Your Past, Secure Your Future

18 Personal Story Amy can you describe for us the events that you believe lead to you becoming a victim of identify theft Amy can you describe for us the events that you believe lead to you becoming a victim of identify theft Protect Your Past, Secure Your Future

19 Security Freeze Called anti-identity theft freeze Called anti-identity theft freeze Allows individuals to block access to their credit reports until they personally unlock the files by contacting the credit bureaus and providing a PIN number Allows individuals to block access to their credit reports until they personally unlock the files by contacting the credit bureaus and providing a PIN number Without the code, a fraudster cannot open an account in their name Without the code, a fraudster cannot open an account in their name Cost nothing for victims of ID theft, approx. $10.00 for anyone else Cost nothing for victims of ID theft, approx. $10.00 for anyone else Protect Your Past, Secure Your Future

20 Security Freeze Write all three credit bureaus with the request Write all three credit bureaus with the request For more information… log onto For more information… log onto Provide… name, address for last 5 years, SSN, DOB, 2 proofs of address (bills?), and a copy of the police report if a victim, along with completing a fraud affidavit Provide… name, address for last 5 years, SSN, DOB, 2 proofs of address (bills?), and a copy of the police report if a victim, along with completing a fraud affidavit Protect Your Past, Secure Your Future

21 Social Engineering Do you know who worked on your computer? Do you know who worked on your computer? Did the person you sign in for watch you type your password? Did the person you sign in for watch you type your password? Have you ever walked away from your computer and left it unlocked? Have you ever walked away from your computer and left it unlocked? Protect Your Past, Secure Your Future

22 Prevent Social Engineering Lock your computer when you are away from the desk Lock your computer when you are away from the desk Verify that anyone working on your computer has an picture ITS badge or is authenticated through the helpline Verify that anyone working on your computer has an picture ITS badge or is authenticated through the helpline Never share any account passwords Never share any account passwords Protect Your Past, Secure Your Future

23 Phishing the new SPAM A combination of attacks to yield personal information A combination of attacks to yield personal information Hard to tell a legitimate Hard to tell a legitimate Will not go away Will not go away Protect Your Past, Secure Your Future

24

25

26

27 Spearing

28 Account Security Pick a good password Pick a good password Minimum of 8 characters in length Minimum of 8 characters in length Must contain 3 out of 4 categories Must contain 3 out of 4 categories Upper case, lower case, number and symbol Upper case, lower case, number and symbol Never share your password Never share your password Lock or logout of a computer when you leave it. Lock or logout of a computer when you leave it. Protect Your Past, Secure Your Future

29 Protect Your Data Verify that Windows/Mac Updates are being applied to your computer Verify that Windows/Mac Updates are being applied to your computer Check that Symantec Antivirus is up to date Check that Symantec Antivirus is up to date Protect Your Past, Secure Your Future

30 Social Security Number The Social Security Number policy governs the use of SSN on campus The Social Security Number policy governs the use of SSN on campus Any new retention of SSN electronic or on paper must be approved by the CIO Any new retention of SSN electronic or on paper must be approved by the CIO Old stores of SSN should be protected or deleted. Old stores of SSN should be protected or deleted. Protect Your Past, Secure Your Future

31 Personal Story Amy can you talk about how you realized you were a victim of identity theft? Amy can you talk about how you realized you were a victim of identity theft? Protect Your Past, Secure Your Future

32 If you become a victim… (Continued) Organize a file of all related paperwork for easy access Organize a file of all related paperwork for easy access Follow up in writing with all contacts made by phone or in person Follow up in writing with all contacts made by phone or in person a. Use certified mail, with return receipt requesteda. Use certified mail, with return receipt requested b. Keep copies of all correspondence or forms usedb. Keep copies of all correspondence or forms used c. Keep all originals if possiblec. Keep all originals if possible File a complaint with the FTC (ask for any information or paperwork) File a complaint with the FTC (ask for any information or paperwork) Protect Your Past, Secure Your Future

33 If you become a victim Place a fraud alert on credit reports, then review reports Place a fraud alert on credit reports, then review reports a. Once one credit bureau is contacted,a. Once one credit bureau is contacted, the other two should automatically be the other two should automatically be notified to place alerts… *but check for notified to place alerts… *but check for yourself ! yourself ! b. All three bureaus should send the victimb. All three bureaus should send the victim information information c. Get copies for law enforcement c. Get copies for law enforcement Protect Your Past, Secure Your Future

34 If you become a victim… Contact any credit card companies Contact any credit card companies Contact the local law enforcement agency Contact the local law enforcement agency Close any accounts that have been tampered or opened fraudulently Close any accounts that have been tampered or opened fraudulently Close all checking and savings accounts that could be affected Close all checking and savings accounts that could be affected Retrieve copies of bank and credit card statements, and note fraudulent items Retrieve copies of bank and credit card statements, and note fraudulent items Protect Your Past, Secure Your Future

35 If you become a victim… (Continued) Contact the check verification companies Contact the check verification companies Contact the major credit reporting bureaus Contact the major credit reporting bureaus Contact the Social Security Administrative offices if Social Security number used ( ) Contact the Social Security Administrative offices if Social Security number used ( ) Protect Your Past, Secure Your Future

36

37 If you become a victim… (Continued) Contact check verification companies Contact check verification companies Telecheck Telecheck CheckRite CheckRite Certegy, Inc Certegy, Inc International Check Service International Check Service Protect Your Past, Secure Your Future

38 Major Credit Reporting Bureaus P.O. Box Atlanta, GA Fraud Victim Assistance Division P.O. Box 6790 Fullerton, CA P.O. Box 1017 Allen, TX Protect Your Past, Secure Your Future

39 Remember If your Baylor University ID card is lost or stolen… deactivate your card on-line immediately (DO NOT WAIT!!!!!!!!). If your Baylor University ID card is lost or stolen… deactivate your card on-line immediately (DO NOT WAIT!!!!!!!!). By doing so, you lessen the chances of a potential suspect to gain unauthorized access to a building or dorm. This also prevents the card from being used like a credit card (Example: BearBucks and the BU Bookstore). By doing so, you lessen the chances of a potential suspect to gain unauthorized access to a building or dorm. This also prevents the card from being used like a credit card (Example: BearBucks and the BU Bookstore). **Go to Cashiers office webpage… click on ID Card… click on Lost/ Stolen ID Card Link Protect Your Past, Secure Your Future

40 Personal Story Amy where is your case of identity theft today? Amy where is your case of identity theft today? Protect Your Past, Secure Your Future

41 Baylor Police Department (254) Protect Your Past, Secure Your Future

42 Questions???


Download ppt "Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy."

Similar presentations


Ads by Google