Presentation is loading. Please wait.

Presentation is loading. Please wait.

Presented to Temple Baptist Academy, April 21, 2009.

Similar presentations


Presentation on theme: "Presented to Temple Baptist Academy, April 21, 2009."— Presentation transcript:

1 Presented to Temple Baptist Academy, April 21, 2009

2 Agenda Identity theft in general, and how it applies to minors Identity theft as applied to cell phones, and social networks (MySpace/Facebook) Some basic tips regarding home PC security

3 Identity theft in general, and how it applies to minors

4 Types of Identity Theft Financial identity theft - using another's identity to obtain goods and services Business/commercial identity theft - using another's business name to obtain credit Criminal identity theft -posing as another when apprehended for a crime Identity cloning - using another's information to assume his or her identity in daily life Medical identity theft -using another's information to obtain medical care or drugs For purposes of this presentation, will be focusing on financial identity theft, criminal identity theft, and identity cloning. » Source:

5 Why should you care? Children and teens are especially susceptible to having their identity stolen due to a typically longer period of time between the initial theft and discovery. –Criminals often steal children’s identities to escape law enforcement authorities –Because children and teens have no credit, their identities are often cloned by those with severely damaged credit to maintain their financial activities. –Due to the economic downturn, identity theft is expected to continue to increase, especially in this area. Source: Identity Theft Resource Center

6 Financial Identity Theft Some underlying flaws in the credit reporting system that enable identity theft: –Credit issuers may not have a way to verify the age of an applicant (especially if the application for credit is online or over the phone). –Credit reporting agencies often do not share information about the age of an applicant. Age is often determined by what is stated on the first application for credit. Because age is not systematically verified by credit issuers or double-checked by credit reporting agencies, very easy for an imposter to use a teen’s identity to obtain credit. Source: Identity Theft Resource Center

7 Criminal identity theft Typically occurs when a person “borrows” the information of a minor to get a driver’s license/passport or uses the child’s identity when caught in a criminal act. –Information is often sold on the black market to illegal immigrants trying to obtain identity documentation. As NM is a border state, this is an issue. Source: Identity Theft Resource Center

8 Identity Cloning Happens when someone assumes your identity for financial, criminal, and/or government purposes –Other people (i.e. felons) that are trying to restart their lives/avoid arrest. –Terrorists Source: Identity Theft Resource Center

9 How would you know if this happened to you? (the hard way) Unfortunately, most of the time, this is discovered the hard way –Denied credit, car loan, or financial aid for college –Unable to open bank/checking account –When obtaining a driver’s license, learn there is already a license for your name/SSN. There may even be tickets/citations/bench warrants in your name.

10 How would you know if this happened to you? (the easy way) Obtain a free credit report –Will show accounts opened in your name Request a copy of your records from DMV (if there are any, this will show it) –Confidential release form included in handout packet.

11 Identity theft as applied to cell phones, MySpace and Facebook

12 Cell phones SENSITIVE DATA ON MOBILES Personal 16% - Bank account details 24% - Pin numbers/passwords 11% - Social security/tax details 10% - Store credit card information Business 77% - Work-related names/addresses 30% - Use mobile as a work diary 17% - Work-related documents 23% - Customers' information 40% of users do not use any security features(password or pass-phrase protect, encryption) at all Source: Credant Technologies

13 Why should I care? “But I don’t have a business, I don’t have a credit card, why should I care?” – , passwords, birthdays, personal diary, documents, pictures, names of family members, pets normally stored on cell phones. –This information can easily enable someone to pose as you and set up accounts, or worse yet, pose as you in sending messages to friends and family members.

14 What to do With the advent of 3G phones that easily surf the internet, cell phones are carrying increasingly personal information, and have the same capabilities as a personal computer Treat a smartphone the same as a personal computer when it comes to security –Password or pass-phrase protect –Use antivirus applications –Encrypt data on your phone if that option is available to you –Report if lost or stolen ASAP

15 Social networks - some cautions Taken from a message I sent to a friend that recently joined Facebook: –1. do not display your birth year –2. absolutely do not store credit card information –3. no personal info (address, etc) –4.do not mention where you WILL BE going, etc, no physical whereabouts. –5. set your profile so only your friends can see your profile, your friends, or anything that can identify you.

16 Social networks EVERYTHING YOU POST IS PUBLIC AND PERMANENT

17 Ooooooooops Brooklyn police officer Vaughn Etienne –Posted what he called “trash talk” on MySpace using the mood “devious”. –His posts were subpoenaed into a Brooklyn court to discredit him. –Because of the nature and tone of his comments, reasonable doubt was established and a convict out on parole for a burglary charge had a felony gun possession charge dropped. Source: The New York Times 3/11/09

18 Home PC security Roger Grimes, security advisor, wrote the following for InfoWorld, states that: –25-50% of home computers are infected in a year –Normal causes of malware being found on home PCs are: User tricked into installing malware 95% Unpatched software that leaves a security hole open 4% Zero day hole 1%

19 What to do Instead of focusing on specific software or techniques to keep your PC safe, the following philosophy is recommended: 1. never install anything that you are not sure is 100% legitimate (nothing from pop-up windows, etc.) 2. keep your software patched and up to date (operating system updates, etc) 3. do not use a user profile with administrator rights to your computer (admin rights can normally install programs, make changes to programs, etc).

20 Resources/references Identity Theft Resource Center “Mobile users at risk of ID theft”. BBC News.3/18/09. “Study: Mobile Phones Contain Treasure Trove of Unprotected Data”. Wilson, Tim. DarkReading. 3/18/09. “The Officer Who Posted Too Much on MySpace”. Dwyer, Jim. The New York Times. 3/11/09. Excellent reference for home PC security “The Only Two things you need to know about home computing security” Grimes, Roger. InfoWorld. 12/25/08. ly_two_th.html ly_two_th.html


Download ppt "Presented to Temple Baptist Academy, April 21, 2009."

Similar presentations


Ads by Google