IDENTITY THEFT Nicholas Michalak. Agenda What is Identity Theft? Background of Identity Theft Legislation Against it Different types and Examples What.

Slides:



Advertisements
Similar presentations
Fighting Back Against Identity Theft A Presentation for CSM564 – Dr. Price By Matt Poole.
Advertisements

Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Kimberly Castner-Scott. What is Identity Theft I Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully.
1 Identity Theft and Phishing: What You Need to Know.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
Oklahoma’s Personal Financial Literacy Passport © Oklahoma State Department of Education. All rights reserved. 1 Teacher Presentation Series 9 Standard.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
What is identity theft, and how can you protect yourself from it?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Materials Developed By: CLARIFI CLARIFI ID Theft & Scams Don’t be a Victim.
Beware! Consumer Fraud Module 9.1.
Internet Safety Dr. Steve Broskoske Misericordia University.
Scholarship Scams Avoiding Scholarship Scams, Phishing & Identity Theft at All Cost.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Discussion Topics What is Identity Theft? Ways to Commit Identity Theft How Identity Thieves uses Victim’s Information Guarding your personal Information.
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Scams & Schemes Common Sense Media.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime,
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Be Cautious of Identity Theft By: Sydney Langley.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
By: Asfa Khan and Huda Mukhtar
You. are at risk for the fastest growing crimes crime.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Identity Theft The fastest growing type of fraud..
Identity Theft Officer Bill Roscop Mount Prospect Police Department.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Protecting Your Assets By Preventing Identity Theft
Identity Theft It’s a crime!
Protecting Your Identity:
When you get caught for Identity Theft
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Protecting Your Credit Identity
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

IDENTITY THEFT Nicholas Michalak

Agenda What is Identity Theft? Background of Identity Theft Legislation Against it Different types and Examples What Information Attackers Look For Ways Attackers Can Find Sensitive Information Ways to Try to Prevent it What to do if You are Victimized Conclusion

What is Identity Theft? Identity Theft refers to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain Often Categorized with Fraud and Extortion Fraud – deceiving a victim into doing something again their financial self interest Extortion – using a threat of harm to get a victim to pay money or perform some action to avoid the harm

Background Prior to the late 1990’s Identity theft was not considered a federal crime There was little jurisdiction regarding it In many cases people could easily get away with it Factors that increased the risk: Internet boom Online shopping and electronic banking Social media Increased number of credit card transactions

Legislation Fall 1998 Congress passed the Identity Theft and Deterrence Act. Prohibits “"knowingly transfer[ring] or us[ing], without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law." This includes acts such as: Credit card fraud Computer fraud Mail fraud Financial institution fraud Etc.

Types of Identity Theft Individual Identity Theft Carding – attackers steal credit card information Bank Account Theft – attackers steal information that allows them to access victims bank account Online Stock Account Theft - attackers steal information that allows them to sell, trade, and buy the victims stocks Corporate Identity Theft (less common) Attackers can illegitimately apply for and get access to company credit cards for personal use Financial and Intellectual Property Theft – attack get access to a firms intellectual property and sell this information to other criminals or corporate competitors

Information Attackers Search For Social Security Number Bank Account Number Credit Card Number Telephone or Calling Card Number Usernames and Passwords Other Personal Information Attacks are basically interested in anything that they can used in order to either steal from you directly or use to get approved for a loan or credit card in your name.

Ways Attackers Can Find Sensitive Information Using spyware and keyloggers to obtain sensitive information such as passwords and login details Recovering information that has been deleted from a hard drive Using binoculars and cameras to spy on ATM’s from far away Taking a wallet or purse that is not being supervised

Ways Attackers Can Find Sensitive Information Using offers to apply for credit under a different name and address Dumpster diving to get their hands on data Piecing together pieces of paper that have been torn or shredded Taking mail from mail boxes. Exploring social media websites

Preventing Identity Theft Be careful when shopping online Do not store information on a stores’ website Make sure the site you are using is legitimate Be conscious about what you put on social media websites Do not display sensitive information Do not post information about your location Choose good passwords and pins Do not use the same password for all accounts Never store passwords on your computer Avoid easily guessed passwords such as pet names, birth dates, phone numbers, etc.

Preventing Identity Theft Protect your computer Make sure you have a strong regularly updated firewall, anti-virus program and anti-spyware program. Beware of phishing scams Often include false lottery wins, request for money to “help” someone, etc. Before opening an link, check on the government department that is responsible for updating on regular scams. Do not accidentally give away your details Before getting rid of your computer, wipe out all of the information

Preventing Identity Theft Never answer unsolicited s Avoid opening s that do not make sense to you or are from an organization that you are unaware of. Have your virus protection turned on. Be aware of your surroundings Shade the monitor area while at an ATM Shield the keypad as you type in your pin number Shred important identification documents Use a shredder to shred important documents and then use two different trash cans to dispose of the documents.

What to do if you are victimized Act quickly Cancel cards immediately Contact the police If you fail to act quickly this can cause out of pocket expenses and tarnish your reputation It often takes much longer to recover from identity theft then it does to actually commit the crime. Contact the Federal Trade Commission (FTC) You can contact them online, by telephone, or by mail. They provide information and refer the complaints to appropriate entities.

What to do if you are victimized Contact the Social Security Administration Call if you suspect your social security number is being fraudulently used Contact all financial institutions You may need to cancel accounts, place stop-payment orders, and change your ATM card, account, and PIN number.

Conclusion Defined Identity Theft Discussed the background and legislation Types of Identity Theft Talked about how attackers retrieve information Explained what to do if you suspect you’ve been vicitimized

Sources "USDOJ: CRM: About the Criminal Division." USDOJ: CRM: About the Criminal Division. United States Department of Justice, n.d. Web. 29 Nov "Prevent and Report Identity Theft." USA.gov: The U.S. Government's Official Web Portal. N.p., n.d. Web. 29 Nov "Identity Theft Resource Center -." Identity Theft Resource Center. N.p., n.d. Web. 29 Nov Oliver, James M., Ph.D., ed. Pearson Custom Business Resources. New York: Pearson Learning Solutions, Print.