Presentation on theme: "1 IDENTITY THEFT Targeting a Modern Problem with Modern Solutions Developed by Greg Nelson, CPCU and Lynn Davenport, CPCU For the CPCU Societys Information."— Presentation transcript:
1 IDENTITY THEFT Targeting a Modern Problem with Modern Solutions Developed by Greg Nelson, CPCU and Lynn Davenport, CPCU For the CPCU Societys Information Technology Interest Group
2 Overview Understand the implications of identity theft. Describe methods that thieves use to steal identities. Understand the financial and non-financial losses resulting from identity theft. Discuss the insurability of and availability of insurance for identity theft. Understand ways to reduce risk of identity theft.
3 What is Identity Theft? Identity theft occurs when someone uses your name, address, Social Security number (SSN), bank or credit card account number, or other identifying information without your knowledge to commit fraud or other crimes. - Federal Trade Commission
4 Unfortunate Victims Sample Case Studies: Michelle Brown: ( More than $50,000) Thief stole apartment rental application from her landlord. Used her personal information to spend more than $50,000: new car, liposuction, to rent properties, and to participate in drug trafficking. Perpetrator went to prison under Michelles name.
5 Unfortunate Victims Sample Case Studies: Lt. Col. John Stevens: ( $27,000 Jeep in Dallas) ( $113,000) Got a call one day from creditors wondering why he hadnt paid for his new $27,000 Jeep in Dallas, where he had never lived. Discovered 33 fraud accounts in his name after someone stole his PIN number, leaving him with $113,000 in unpaid debt. Took 3 years and $6000 to straighten things out, unable to secure credit to buy a vacation home.
6 Unfortunate Victims Sample Case Studies: Tracey Thomas: (Only $500) SS number stolen from health insurance card by a hospital employee. Rented an apartment, set up utilities, opened credit card accounts. Imposter defaulted on almost $15,000 worth of goods and services. Out of pocket loss was only $500 but she had to use 400 hours of vacation to work on clearing her name, and she was unable to get a legitimate mortgage.
7 Unfortunate Victims Sample Case Studies: Linda Trevino: (Could not get a job) SS number stolen from health insurance card by a hospital employee. Rented an apartment, set up utilities, opened credit card accounts. Imposter defaulted on almost $15,000 worth of goods and services. Out of pocket loss was only $500 but she had to use 400 hours of vacation to work on clearing her name, and she was unable to get a legitimate mortgage.
8 The Problem Identity theft = Number 1 consumer complaint Annual victims = 9 million 1 in 23 people = victims of ID theft Average fraud per victim = $6383 Average out of pocket cost to fix = $440/1180 Average time to fix problem = 40 hours Between 2003 & 2006, number of victims decreased but cost and time to resolve the problems have increased. Cost to buy a stolen identity??? BBB & Javelin 2006 Identity Fraud Report Updated from 2003 study
9 Are You at Risk?
10 Look in your wallet... Did you find your Medicare card in your wallet? The identification number on your Medicare card is your Social Security number. Only carry this card when you are going to a doctor's appointment or know you will need it. How many cards have your Social Security number? Thieves love your Social Security number. With your number, they can impersonate you and obtain new credit accounts. Make sure your SSN is not listed on your drivers license or bank checks. Do not carry your Social Security card with you. Which of these is a safe place in your home to store all the pieces of paper that have personal information about you? On the table just inside the front door In the kitchen junk drawer Next to the telephone In a secure desk drawer On the piano In a locked file cabinet
11 Myths & Misperceptions Internet increases the risks of identity theft. Only 9% of identity theft is from online activity. The 2005 ChoicePoint scandal is an example of a situation where identity thieves posed as authorized clients to access information that impacted 51 million consumers. This impersonation enabled them to gain access to ChoicePoints customer data. No one hacked into ChoicePoints system to steal identities; this was an old-fashioned scam. So online transactions really arent any riskier than the paper shuffle in terms of ID theft.
12 Myths & Misperceptions Consumers are helpless to protect themselves. 63% of fraud is created by friends/family, lost or stolen wallets, stolen home computers, and stolen mail. Consumers detect almost half of ID theft cases and detect them faster. A key part of self-detection is credit monitoring and credit reports.
13 How to Steal an Identity: Need Key Info Social Security number Medical ID cards Utility bills Property taxes Student ID cards Drivers license number Pre-approved credit card solicitations
14 Old Fashioned Paper Scams Steal wallet or purse, steal from your home Dumpster Diving Steal mail from mailbox
15 ATM Scams
16 Electronic Scams Pre-texting, which is the use of false pretenses to get your personal information. They may call you, pretend they are from a survey firm or one of your trusted creditors, and ask you some questions. When they get the info they want, they use it to call your financial institution and pretend they need information about their account.
17 Electronic Scams Phishing is another scam that is growing with increasing sophistication (grew 13-fold during 2004). Has anyone ever received an from PayPal warning that your account has been disabled, and you must log on through the link to reactivate your account? Its a scam! Thieves you a false link that appears to be from a trusted business such as eBay or your bank. However, when you click on the link and confirm account information or enter passwords, thieves record your personal information and use it later.
18 Sample Scam 1 Lets look at a real phishing attempt that was received in an . Youll notice it was not addressed to anyone by name, its very generic. The person who received this does have a PayPal account, so how would he or she know if this is real? They went directly to the PayPal website (not through the link) and logged into her account. On the account Resolution page, there were no open cases and no problems were found. They forwarded this to as directed by the websites security page, and received the response on the next page.
19 Sample Scam 1 This was the response from So, it was definitely a scam! Who knows what would have happened if shed clicked on the link in the .
20 Sample Scam 2
21 Phishing Risk Tips A few tips to help reduce the risk of phishing: Dont use the link in the . Log into the website directly by typing its correct address into your browser. Make sure youre on a secure website when submitting sensitive information. Be aware: Phishers can now forge both the https:// and a legitimate-looking web address. Again, dont depend on links.
22 Phishing Risk Tips More tips to help reduce the risk of phishing: They can also forge the yellow lock you see at the bottom of a secure site. Double click on the lock and you should see the security certificate for the site. If you get any warning that the sites address doesnt match the certificate, do not continue. Monitor your online accounts by regularly logging into them and checking your statements for accuracy. Keep your Internet security patches up to date. Report phishing by forwarding the to: and the FTC at Keep the original intact, including all headers.
23 Types of Losses Financial Losses Credit card bills, loans, contracts, etc. Cost to clear credit record Cost of notarizing fraud affidavits & mail Cost of time off work to handle situation Non-financial Losses Time and effort to clear record Damage to reputation Emotional impact Time spent in jail
24 Is ID Theft Insurable? Loss must be definite Loss must be accidental and fortuitous Potential loss must be large enough that it would cause hardship Chance of loss must be calculable Peril must be unlikely to happen to many of the group at the same time Cost of insurance must be economically feasible
25 Buy Insurance Many companies offer ID theft insurance AIG, Allstate, Chubb, Firemans Fund, Travelers, Encompass, Farmers, Liberty Mutual, MetLife Endorse homeowners policy Buy separate policy ISO Identity Fraud Expense Coverage Third party vendors Features: Limit of $15,000 to $30,000 Legal fees Time off from work Expenses to clear credit records But you still have HASSLE factor!
26 An Ounce of Prevention What you can do to reduce the hassle factor! Protect your personal info and ID Electronic Safeguards Paper Safeguards General Safeguards Check out the detailed Fact Sheet at for information on how to reduce your risk.
27 An Ounce of Prevention What you can do to reduce the hassle factor! Electronic Safeguards Use strong passwords (alpha-numeric-character, at least 8 digits) Dont write your passwords near your computer Dont click on a link in an that asks for personal info, type in the web address of the institution you already know Dont send credit card or SS # through , unsecured (sits on up to 30 servers)
28 An Ounce of Prevention What you can do to reduce the hassle factor! Paper Safeguards Protect mail with vacation hold and locking mailbox Shred paper documents, including credit card solicitations Monitor bills and review listing of items that have been charged
29 An Ounce of Prevention What you can do to reduce the hassle factor! General Safeguards Keep key info out of wallet/purse; keep it in secure place (no SSN card in wallet!) Check credit record periodically, free annually by Federal Law Decline free credit card offers (call OPT OUT) Dont give info to people you dont know, by phone, , internet, or in person Photocopy the contents of your wallet, both front and back. If ever lost or stolen, youll have copies of account numbers and phone numbers to cancel your cards. Also photocopy your passport when traveling and give a copy to a non-traveling family member. (keep in a safe place)
30 Beware and Be Aware ID Theft can happen to ANYONE. Know your risk areas! Lock up confidential documents & files Maintain a consistent privacy and document retention policy Shred confidential documents appropriately Be aware of risks with wireless hot spots and the information you transmit Encourage coworkers to do the same!
31 Hot Topic: Auto ID Theft Auto Cloning – Theft of your cars identity! How common is it? Been around for a long time, becoming more popular for organized crime rings. 225,000+ cloned vehicles seized by National Insurance Crime Bureau (NICB) in the past three years in U.S. 30% of cars purchased online are either flood vehicles or clones.
32 Hot Topic: Auto ID Theft Auto Cloning – Theft of your cars identity! How does it happen? Bad guy copies a Vehicle Identification Number (VIN) from a car (any car in parking lot or dealer lot) Creates a fake VIN sticker and title Steals a similar make/model car and replaces its VIN with the fake one. Now the stolen car is a clone of the legitimate car, and can be registered in another state. The stolen car is then sold to an innocent purchaser.
33 Hot Topic: Auto ID Theft Auto Cloning – Theft of your cars identity! What happens if you bought a stolen car unknowingly? Insurance is void, car can be seized by authorities and youll be stuck with the car payments.
34 Hot Topic: Auto ID Theft Auto Cloning – Theft of your cars identity! How do you protect yourself? Check your VIN numbers in multiple locations on your car to make sure they match. If they dont, dont buy it. Use resources to check history of the car before you buy. Resources
35 Key Resources Where to go for help Federal Trade Commission Credit Bureaus Equifax: ; Experian: EXPERIAN ( ); TransUnion: ; Annual Free Credit Report (Federal Law) Social Security Administration Fraud Line
36 Target prevention before ID thieves target you! For more information: Target prevention before ID thieves target you! For more information: