Presentation is loading. Please wait.

Presentation is loading. Please wait.

ID Theft: When Bad Things Happen To Your Good Name IEEE Computer Society Northern Virginia Chapter 20 November 2003.

Similar presentations


Presentation on theme: "ID Theft: When Bad Things Happen To Your Good Name IEEE Computer Society Northern Virginia Chapter 20 November 2003."— Presentation transcript:

1 ID Theft: When Bad Things Happen To Your Good Name IEEE Computer Society Northern Virginia Chapter 20 November 2003

2 2 Disclaimer This presentation contains subject matter and editorial information concerning the topic of Identity Theft and related Internet Security concerns and suggestions for how to minimize the risks. This presentation does not represent the official position of the IEEE, the Federal Trade Commission (FTC) or any other federal government agency. The IEEE Computer Society assumes no liability or responsibility for the specific applicability of the information provided. As the content provided may not be appropriate for all circumstances—you must use your own judgment—and, to the extent you believe appropriate, the assistance of an attorney, CPA, or other professional advisors to assist you in clearing up any fraud or Identity Theft problems. Trademarks/Copyrights Trademarks, service marks, product and service names, slogans and trade names used in this presentation are the property of their respective owners and are subject to the legal policies thereof. All rights reserved. Disclaimer & Trademarks/Copyrights

3 3 Four most common types of identity theft Data collected from law enforcement sources indicate that the four most common types of identity theft are: Data collected from law enforcement sources indicate that the four most common types of identity theft are: –Credit card fraud - Victims report that either a credit card account is opened in their name or an existing account is being used without authorization –Bank fraud - A thief either opens an unauthorized checking or savings account in another person's name or writes checks on someone else's account, sometimes after stealing checks –Bank fraud - A thief either opens an unauthorized checking or savings account in another person's name or writes checks on someone else's account, sometimes after stealing checks –Communications services - A thief uses an unsuspecting victim’s name to open service with a utility, such as the phone company –Fraudulent loans - A thief uses the victim's identity to obtain a loan for a car or other item

4 4 About credit reports Most common way that consumers find out they’re victims of identity theft Most common way that consumers find out they’re victims of identity theft –When they try to make a major purchase  Such as a house or a car  The deal can be lost or delayed  While the credit report mess is straightened out Checking your report on a regular basis Checking your report on a regular basis  Allows you to fix problems before they jeopardize a major financial transaction  And catch mistakes and fraud before they wreak havoc on your personal finances  Don’t underestimate the importance of this step

5 5 Your doors and windows are locked... What about your PC? You may be careful about locking your doors and windows, and keeping your personal papers in a secure place You may be careful about locking your doors and windows, and keeping your personal papers in a secure place But, depending on what you use your personal computer for, an identity thief may not need to set foot in your house to steal your personal information But, depending on what you use your personal computer for, an identity thief may not need to set foot in your house to steal your personal information The following tips can help you keep your computer and your personal information safe The following tips can help you keep your computer and your personal information safe

6 6 Secure your PC and laptop computers 1. Be aware – computer viruses can have a variety of damaging effects, including introducing “malicious code” or “malware” – for example:  Code that causes your computer to send out files or other stored information  Worms that use your system to launch attacks on other computers 2. Use virus protection software and download updates regularly, and when a new virus alert is announced 3. Be on the alert for security repairs, patches, and service release updates  Download updates from your operating system’s website  Download updates from your operating system’s website

7 7 Secure your PC and laptop computers 4. Do not download files sent to you by strangers or click on hyperlinks from people you don’t know  Opening a file could expose your system to a computer virus or a program that could hijack your network connection  Opening a file could expose your system to a computer virus or a program that could hijack your network connection 5. Use a firewall software program  Required, regardless of your connection speed Dial-up, cable, DSL, or satellite Dial-up, cable, DSL, or satellite High-speed connections leave your computer connected to the Internet 24 hours a day High-speed connections leave your computer connected to the Internet 24 hours a day The firewall program will allow you to stop uninvited guests from accessing your computer The firewall program will allow you to stop uninvited guests from accessing your computer Without it, hackers can take over your computer and access your personal information stored on it or use it to commit other crimes Without it, hackers can take over your computer and access your personal information stored on it or use it to commit other crimes

8 8 Firewall Software Firewall Software Norton Personal Firewall 2004 Norton Personal Firewall 2004 McAfee Personal Firewall Plus v5.0 McAfee Personal Firewall Plus v5.0 Sygate Personal Firewall Pro v5.0 Sygate Personal Firewall Pro v5.0 BlackICE PC Protection v3.6 BlackICE PC Protection v3.6 ZoneAlarm Pro v4.0 ZoneAlarm Pro v4.0 Virus Scan Software Virus Scan Software Norton AntiVirus 2004 Norton AntiVirus 2004 McAfee VirsusScan v8.0 McAfee VirsusScan v8.0 Spam Filtering Software Spam Filtering Software Norton AntiSpam 2004 Norton AntiSpam 2004 McAfee SpamKiller v5.0 McAfee SpamKiller v5.0 Microsoft Outlook 2003 junk mail filter Microsoft Outlook 2003 junk mail filter Internet security software (examples of some of the internet security products available, not an exhaustive list) (examples of some of the internet security products available, not an exhaustive list) Security Suites Security Suites Norton Internet Security 2004 Norton Internet Security 2004 Norton Internet Security 2004 Norton Internet Security 2004 - Firewall, AntiVirus, AntiSpam McAfee Internet Security Suite 6 McAfee Internet Security Suite 6 McAfee Internet Security Suite 6 McAfee Internet Security Suite 6 - Firewall, VisusScan, SpamKiller

9 9 Anti-Spyware – an emerging category of privacy/security software used to ferret out and destroy annoyances and non-virus threats such as adware, hacking tools, and keystroke logging programs Anti-Spyware – an emerging category of privacy/security software used to ferret out and destroy annoyances and non-virus threats such as adware, hacking tools, and keystroke logging programs Examples of standalone spyware detection/removal utilities: Examples of standalone spyware detection/removal utilities: LavaSoftAd-aware Professional/Pluswww.lavasoftusa.com LavaSoft Ad-aware Professional/Pluswww.lavasoftusa.comwww.lavasoftusa.com BPS Spyware/Adware Remover v7.0www.bulletproofsoft.com BPS Spyware/Adware Remover v7.0www.bulletproofsoft.comwww.bulletproofsoft.com Webroot Spy Sweeper v2.1www.webroot.com Webroot Spy Sweeper v2.1www.webroot.comwww.webroot.com Spybot Search & Destroy v1.2www.pcworld.com/downloads (click on Privacy and Security) Spybot Search & Destroy v1.2www.pcworld.com/downloads (click on Privacy and Security)www.pcworld.com/downloads Spyware detection and removal software

10 10 What to do if “ID Theft” happens? In spite of these precautions, no matter how careful you are, you still may find that your personal information is being used fraudulently In spite of these precautions, no matter how careful you are, you still may find that your personal information is being used fraudulently Your best defense is taking fast action to minimize future damage: Your best defense is taking fast action to minimize future damage: –Contact your local law enforcement agency immediately File a police report in the jurisdiction where the theft occurred File a police report in the jurisdiction where the theft occurred This proves to the credit providers you were diligent This proves to the credit providers you were diligent –Next, immediately notify the national crediting reporting agencies by calling Experian at 1-888-397-3742, Equifax at 1-800-270-3435 and Trans Union at 1-800-680-7289 Place a “Fraud Alert” on your name and SSN Place a “Fraud Alert” on your name and SSN Then, any company that checks your credit knows your information was stolen – they must contact you by phone to authorize new credit Then, any company that checks your credit knows your information was stolen – they must contact you by phone to authorize new credit

11 11 What to do if “ID Theft” happens? –Also, immediately contact your banks, creditors, and utilities to close any fraudulent accounts Call to close all credit card accounts that may have been jeopardized Call to close all credit card accounts that may have been jeopardized Also file a written “Identity Theft Affidavit” with each creditor Also file a written “Identity Theft Affidavit” with each creditor –Obtain a copy of the FTC’s ID Theft Affidavit form Download copy of the ID Theft Affidavit.pdf file online Download copy of the ID Theft Affidavit.pdf file onlineID Theft Affidavit.pdf fileID Theft Affidavit.pdf file Or call 1-877-ID-THEFT for a copy Or call 1-877-ID-THEFT for a copy –If your checks are stolen or you believe your bank account has been compromised, you should Call each of the following companies: Call each of the following companies: –Certegy, Inc.1-800-437-5120 –Global Payments1-800-766-2748 –TeleCheck1-800-710-9898 –SCAN1-800-262-7771

12 12 File a complaint with Federal Trade Commission (FTC) File a complaint with Federal Trade Commission (FTC) The FTC is the federal clearinghouse for complaints by victims of identity theft The FTC is the federal clearinghouse for complaints by victims of identity theft Call 1-877-FTC-HELP or www.ftc.gov/ftc/complaint.htm Call 1-877-FTC-HELP or www.ftc.gov/ftc/complaint.htmwww.ftc.gov/ftc/complaint.htm The FTC may refer victim complaints to other appropriate government agencies and private organizations for further action The FTC may refer victim complaints to other appropriate government agencies and private organizations for further action File a complaint with U.S. Postal Inspector File a complaint with U.S. Postal Inspector Contact postal officials for fraud involving the mail Contact postal officials for fraud involving the mail www.usps.com/postalinspectors/fraud/MailFraudComplaint. htm www.usps.com/postalinspectors/fraud/MailFraudComplaint. htm www.usps.com/postalinspectors/fraud/MailFraudComplaint. htm www.usps.com/postalinspectors/fraud/MailFraudComplaint. htm File complaints with State and Federal Agencies

13 13 VISA Teams with National Consumer Group “Call For Action” a consumer network based in Maryland “Call For Action” a consumer network based in Maryland Offers assistance to victims of Identity Theft: Offers assistance to victims of Identity Theft: –Call 1-866-ID HOTLINE (toll free) –Free, confidential counseling –Managed by national network of consumer agencies –Assistance offered by trained/professional volunteers –Walk you through ID Theft recovery process, step-by-step Individualized attention – same counselor who answers a call will continue with case until resolved Individualized attention – same counselor who answers a call will continue with case until resolved –Also provides important phone numbers For law enforcement and credit bureaus For law enforcement and credit bureaus And, brochure with additional information on Identity Theft available online: www.callforaction.org And, brochure with additional information on Identity Theft available online: www.callforaction.orgwww.callforaction.org

14 14 Resources/Web Sites www.ftc.gov/bcp/conline/pubs/credit/idtheft.htm www.consumer.gov/idtheft/ www.usdoj.gov/criminal/fraud/idtheft.html www.ifccfbi.gov www.identitytheft.org www.idtheftcenter.org www.bbb.org/alerts/Idtheft.asp www.identity-theft-protection.com www.consumerinfosystems.com www.privacyrights.org/identity.htm www.experian.com www.equifax.com www.transunion.com

15 15 Further Reading Abagnale, Frank W. The Art of the Steal: How to Protect Yourself and Your Business from Fraud, America’s #1 Crime. New York: Broadway Books division of Random House, 2001. Metz, Cade Protect Your PC - Because evildoers won’t hesitate to exploit every loophole, blind spot, and unguarded entrance, you need TOTAL SECURITY. New York: PC Magazine/Ziff Davis Media, October 1, 2003 Vol. 22 No 17, pp 83-92 www.pcmag.com/article2/0,4149,1258833,00.asp www.pcmag.com/article2/0,4149,1258833,00.asp Nichols, Randall K., Ryan, Daniel J., and Ryan, Julie J.C.H. Defending Your Digital Assets Against Hackers, Crackers, Spies and Thieves. New York : McGraw-Hill, 2000. Vacca, John R. Identity Theft: How to Minimize Your Risk of Becoming a Victim. New Jersey : Prentice Hall PTR, 2003.


Download ppt "ID Theft: When Bad Things Happen To Your Good Name IEEE Computer Society Northern Virginia Chapter 20 November 2003."

Similar presentations


Ads by Google