Presentation is loading. Please wait.

Presentation is loading. Please wait.

Identity Theft Mike Carr, Esq., CISSP CSN Information Security Officer September 2004.

Similar presentations


Presentation on theme: "Identity Theft Mike Carr, Esq., CISSP CSN Information Security Officer September 2004."— Presentation transcript:

1

2 Identity Theft Mike Carr, Esq., CISSP CSN Information Security Officer September 2004

3 Identity Theft © 2003 Citibank, N.A. Used with permission.

4 Identity Theft We’ve all seen the commercials …and read the headlines …and read the headlines

5 Identity Theft What exactly is it?What exactly is it? How does it happen?How does it happen? What can we do to prevent it?What can we do to prevent it? What should I do if I am a victim?What should I do if I am a victim?

6 Identity Theft What exactly is it?What exactly is it? –ID Theft is a form of fraud that occurs when… Someone pretends to be you and…Someone pretends to be you and… You are billed for their purchasesYou are billed for their purchases You are arrested for their crimesYou are arrested for their crimes You are denied credit for not paying your (their) billsYou are denied credit for not paying your (their) bills You are accused of under-reporting your wagesYou are accused of under-reporting your wages (someone gets a job & gives H/R your SSN)

7 Identity Theft ID Theft is a federal crimeID Theft is a federal crime –18 U.S.C. §1708 – Mail theft or filing a false change-of-address

8 Identity Theft –Identity Theft Act - 18 U.S.C. §1028 “to knowingly … use … identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of Federal law”“to knowingly … use … identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of Federal law”

9 Identity Theft ID Theft is also a state crimeID Theft is also a state crime –Nebraska Revised Statutes § : Criminal Impersonation§ : Criminal Impersonation § : Unauthorized Use of a Financial Transaction Device§ : Unauthorized Use of a Financial Transaction Device –Iowa Code: § 715A.8: Identity Theft –Kansas Statute : Identity Theft

10 Identity Theft And it’s getting bad…And it’s getting bad… –$47.5 Billion stolen in 2002 –9.9 million individuals affected –Avg 175 hrs spent straightening out Taking between 2-4 yearsTaking between 2-4 years

11 Identity Theft As recently as Aug 26…As recently as Aug 26… –US DOJ’s Operation Web Snare –June 1 through August 26 –150,000 victims –$215M estimated losses

12 Identity Theft Operation Web Snare IndictmentsOperation Web Snare Indictments –Internet “sales” of phantom items –Credit card trafficking via Internet chat –Hacked into online ordering system and placed fraudulent orders

13 Identity Theft © 2003 Citibank, N.A. Used with permission.

14 Identity Theft How does it happen?How does it happen? –Thieves get a SSN & apply for credit (“application fraud”) –Thieves steal mail and hijack an account (“account takeover”) –Thieves get bank routing & account numbers and transfer $$

15 Identity Theft How does it happen?How does it happen? –Wallets & Purses get stolen –“Dumpster Diving” (taken from trash) –Mail Theft from unsecured mailboxesfrom unsecured mailboxes from mail processing areasfrom mail processing areas change of address card  new credit cards get re-directed to thieveschange of address card  new credit cards get re-directed to thieves

16 Identity Theft How does it happen?How does it happen? –Papers left out on desks –Passwords written on Post-It Notes –PDAs & Laptops get lost or stolen

17 Identity Theft How does it happen?How does it happen? –“Inside” jobs access to computer applicationsaccess to computer applications access to storage roomsaccess to storage rooms “friends”, ex-spouses“friends”, ex-spouses –Obtained from Credit Bureaus thief poses as landlord, etc.thief poses as landlord, etc. credit headers containing SSN soldcredit headers containing SSN sold

18 Identity Theft How does it happen?How does it happen? –SSNs, etc. get read from unencrypted –“phishing” (bogus online forms) –PCs accessed via unsecured home wireless networks (war driving) –“trojan” computer viruses from attachments or Peer-to-Peer file sharing

19 Identity Theft What can we do?What can we do? 1. Try to prevent it from happening 2. Discover it quickly if it does happen 3. Report it if it happens

20 Identity Theft Try to prevent itTry to prevent it –Don’t give personal info unless you initiate the call –Buy and use a shredder (if realistic) –Don’t carry SSN card with you –Use a password vs. mother’s maiden name –Put outgoing mail in secured mailbox

21 Identity Theft Try to prevent itTry to prevent it –Keep wallet/purse in “safe” place at work –Opt out of pre-screened credit card offers ( OPTOUT) –Password protect your PC and files –Keep your passwords secret –Only shop on secure websites –Don’t personal or confidential information

22 Identity Theft Try to prevent itTry to prevent it –Use a personal firewall on your PC –Secure your wireless network at home –Watch out for “shoulder surfing” –Don’t put passwords on Post-It Notes –Watch out for future versions of camera phones (snapping pics of your checkbook, etc.)

23 Identity Theft Try to prevent itTry to prevent it –Follow the “Golden Rules of ” 1. Never open attachments from strangers 2. Never open from friends if unexpected 3. If you are going to open it -- Never open directly – save 1st

24 Identity Theft Detect it earlyDetect it early –Call if bills don’t come on time –Review monthly statements –Write to get credit report –Review credit report annually Look for new accts andLook for new accts and Denied accts where you didn’t applyDenied accts where you didn’t apply

25 Identity Theft And then report it (if it happens)And then report it (if it happens) –Contact credit bureau fraud depts Close fraudulent or tampered acctsClose fraudulent or tampered accts –Contact credit card companies & banks –File a police and Postal Inspector report get a copy to send to creditorsget a copy to send to creditors –File an impersonation report –Contact Dept of Motor Vehicles

26 Identity Theft © 2003 Citibank, N.A. Used with permission

27 Identity Theft It’s “funny” untilIt’s “funny” until –It happens to you or –A mistake on your part allows it to happen to someone else And the University gets suedAnd the University gets sued And/or...And/or... people lose their jobs because of it

28 Identity Theft More info available at andwww.idtheftcenter.org

29 Identity Theft csn.nebraska.edu/security


Download ppt "Identity Theft Mike Carr, Esq., CISSP CSN Information Security Officer September 2004."

Similar presentations


Ads by Google