Identity Theft FBI Norfolk (757) 455-0100 SA Mark T. Park.

Slides:



Advertisements
Similar presentations
Avoid Identity Theft TCU Technology Resources
Advertisements

MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up.
Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Preventing Identity Theft Beware the Trails You Leave Behind Use limitations: These materials may be used only for nonprofit, noncommercial educational.
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Kimberly Castner-Scott. What is Identity Theft I Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully.
1 Identity Theft and Phishing: What You Need to Know.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
October 27,  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.
A ID Theft & ACCOUNT FRAUD Welcome to MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP Prevention & Clean Up © 2011.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
Internet Safety Dr. Steve Broskoske Misericordia University.
7.3.1.G1. © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide.
WHEN BAD THINGS HAPPEN TO GOOD NAMES IDENTITY THIEVES FRADULENTLY USE YOUR PERSONAL INFORMATION TO.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity theft: Real or Virtual? By: Alex Metzler.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 ©2014 NEFE High School Financial Planning Program® | Lesson 2-5: Identity.
Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime,
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
7.3.1.G1 According to The federal Trade Commission, Identity theft Affects Approximately 12.6Million People Every year.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 (C)2012 National Endowment for Financial Education | Lesson 2-5 Identity.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
IDENTITY THEFT Tom Behn Willie Johnson Mike Kellen.
Identity Theft One of America's fastest growing crimes.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
IDENTITY THEFT Nicholas Michalak. Agenda What is Identity Theft? Background of Identity Theft Legislation Against it Different types and Examples What.
Identity Theft The fastest growing type of fraud..
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Fraud Risks How can organizations and individuals protect themselves? Presentation for AGA/ASMC March 25, 2015.
Jeff loses his identity! Lesson 5: Identity Theft.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
IDENTITY THEFT Seneca Stairs. #1- Phishing  Phishing is when you get an from someone claiming to be an agency that you have an account in.  They.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Lesson 10A: The Three D’s of Identify Theft
Protecting Your Assets By Preventing Identity Theft
Identity Theft It’s a crime!
Protecting Your Credit Identity
Protecting Your Identity:
When you get caught for Identity Theft
By: Johnathan Rowse, Jacob Palmer, Kayla Morgan, Paige Frasier
Jeff loses his identity!
Protecting Your Credit Identity
Identity Theft Essentials
Presentation transcript:

Identity Theft FBI Norfolk (757) SA Mark T. Park

Cyber Unit Computer based Crimes Computer based Crimes Forensic analysis Forensic analysis Internet Scams Internet Scams Other crimes with a cyber nexus Other crimes with a cyber nexus Child Pornography Child Pornography Cyber is high on the national and regional priority lists Cyber is high on the national and regional priority lists

Introduction Video

IDENTITY THEFT Definition Definition Why and How Why and How Tools and Methods Tools and Methods Minimizing Your Risk Minimizing Your Risk Indications of ID Theft Indications of ID Theft What to do if Victimized What to do if Victimized

What is Identity Theft? Someone uses bits and pieces of information about a person. (ex: SSN) Someone uses bits and pieces of information about a person. (ex: SSN) Represents him or herself as that person for fraudulent purposes. (ex: Obtaining credit cards or loans, getting a cell phone, etc.) Represents him or herself as that person for fraudulent purposes. (ex: Obtaining credit cards or loans, getting a cell phone, etc.) Worse case, someone commits a crime in the victim’s name. (ex: Internet fraud) Worse case, someone commits a crime in the victim’s name. (ex: Internet fraud)

Who is at Risk ? EVERYONE (including children and the deceased) EVERYONE (including children and the deceased) Over 6 million people victimized every year Over 6 million people victimized every year Trans Union receives over 2,000 fraud reports a day Trans Union receives over 2,000 fraud reports a day

AT WHAT COST? Approximately $6000 Mean Loss Per Victim Approximately $6000 Mean Loss Per Victim 600 Hours to Recover 600 Hours to Recover Estimated annual loss of $53 Billion in U.S. for Businesses and Consumers. Estimated annual loss of $53 Billion in U.S. for Businesses and Consumers. Number of victims and total losses are probably much higher because not all agencies classify certain crimes as ID Theft. Number of victims and total losses are probably much higher because not all agencies classify certain crimes as ID Theft.

Federal Legislation Identity Theft and Assumption Deterrence Act (18 USC 1028) Identity Theft and Assumption Deterrence Act (18 USC 1028) –1028(a)(7) “conventional ID Theft” This section makes it a crime to knowingly transfer, possess, or use without lawful authority a means of identification of another person with the intent to commit unlawful activity. Makes Identity theft a felony. Penalty of 5 years enhancements allowable (phishing, terrorism) Makes Identity theft a felony. Penalty of 5 years enhancements allowable (phishing, terrorism) Allows for victim restitution. Victims are not liable for bills accumulated by the imposters Allows for victim restitution. Victims are not liable for bills accumulated by the imposters

Why is it so prevalent ? Social Security numbers are commonly used as ID (often when not required) Social Security numbers are commonly used as ID (often when not required) Criminals can steal mail Criminals can steal mail Dishonest employees can obtain credit card information and victim’s information Dishonest employees can obtain credit card information and victim’s information Internet is a great source of information Internet is a great source of information Simple method – stealing someone’s wallet Simple method – stealing someone’s wallet

How do thieves use stolen identities? To commit financial fraud: To commit financial fraud: Phone/Utilities fraud (18%) Bank Fraud (17%) Employment Related Fraud (14%) Credit card fraud (26%) Credit card fraud (26%) Loan Fraud (5%) Concealment of Criminal Identity/Record Concealment of Criminal Identity/Record Restart with a “ Clean Slate ” Terrorism Terrorism

METHODS: SKIMMING Where a thief temporarily steals a credit card and runs it through a “skimmer” which is a credit card reader to steal information off of the card. Where a thief temporarily steals a credit card and runs it through a “skimmer” which is a credit card reader to steal information off of the card.

MAGNETIC STRIPE READERS & CARD PRINTERS

This ATM looks normal …

Look closer…a skimmer was placed in front of the card reader

Anything “look” amiss here?

Hidden camera to Record your PIN Entry

The Internet as a Tool Identities could be easily purchased online Identities could be easily purchased online You can purchase a fake drivers license You can purchase a fake drivers license Identities are frequently bought and sold in bulk on the Internet by criminals at an average cost of $14 to $18 for each stolen identity Identities are frequently bought and sold in bulk on the Internet by criminals at an average cost of $14 to $18 for each stolen identity

Phishing

Phishing Defined Phishing is the term coined by hackers who imitate legitimate companies in s and fake websites to trick people in to sharing personal information. Phishing is the term coined by hackers who imitate legitimate companies in s and fake websites to trick people in to sharing personal information. Victims include AOL, Best Buy, eBay and the Federal Trade Commission. Victims include AOL, Best Buy, eBay and the Federal Trade Commission. As of May 2007 there were over 37,000 fake web sites As of May 2007 there were over 37,000 fake web sites

Phishing Derivatives Spear Phishing - Uses More Targeted Information Against Specific Group Spear Phishing - Uses More Targeted Information Against Specific Group Vishing – Prompt by to Call Toll Free Number to “Verify” Personal Information Vishing – Prompt by to Call Toll Free Number to “Verify” Personal Information Whaling – targets top level executives. Whaling – targets top level executives.

How “Phishing” Works The typical phishing scam usually starts with an message. (ex: work from home, post your résumé, Viagra) The typical phishing scam usually starts with an message. (ex: work from home, post your résumé, Viagra) The directs the victim to a fake web page, sometimes containing false addresses, fictitious web addresses, malware. The directs the victim to a fake web page, sometimes containing false addresses, fictitious web addresses, malware. The “Lure” often contains a place for the victim to enter personal data. The “Lure” often contains a place for the victim to enter personal data. Sometimes the scam opens the real web page, but uses a fake pop-up screen. Sometimes the scam opens the real web page, but uses a fake pop-up screen.

Earthlink

Citibank

Paypal

Paypal

AOL

E-Bay

CVV Phishing Scheme CVV Code (3 Digits) on the Back of Credit Cards CVV Code (3 Digits) on the Back of Credit Cards Call from Person Claiming to be with your Credit Card Company Call from Person Claiming to be with your Credit Card Company Already have Card Number Already have Card Number Sound Official, and Only ask for CVV code Sound Official, and Only ask for CVV code

ADDITIONAL TRICKS USED BY THIEVES Dumpster Diving Dumpster Diving Mail Theft Mail Theft Shoulder Surfing Shoulder Surfing Social Engineering Social Engineering IRS IRS Service of Court documents Service of Court documents Credit Card companies Credit Card companies

Minimize Your Risk Use secure mailbox for outgoing mail Use secure mailbox for outgoing mail Shred trash Shred trash Cancel lost/stolen cards ASAP. Cancel lost/stolen cards ASAP. Use credit cards, not debit cards online Use credit cards, not debit cards online Check your credit at least once a year Check your credit at least once a year Activate computer protections: keep software up to date, install virus and spyware software, and utilize your firewall Activate computer protections: keep software up to date, install virus and spyware software, and utilize your firewall Enable encryption on wireless routers Enable encryption on wireless routers Erase your hard drive when you dispose of your old computer Erase your hard drive when you dispose of your old computer Use “disposable” to thwart would-be spammers Use “disposable” to thwart would-be spammers Check web URLs and links carefully Check web URLs and links carefully

INDICATIONS OF ID THEFT Unauthorized Charges on your Accounts Unauthorized Charges on your Accounts Credit is denied despite good credit history Credit is denied despite good credit history Contact from creditors regarding debts you did not obtain or authorize Contact from creditors regarding debts you did not obtain or authorize Credit card and bank statements that are not received in the mail as expected Credit card and bank statements that are not received in the mail as expected

What should a victim do first ? File a report with local police File a report with local police File a complaint with the Federal Trade Commission File a complaint with the Federal Trade Commission Close accounts that were compromised or opened fraudulently Close accounts that were compromised or opened fraudulently Place a fraud alert on your credit reports and review your credit report Place a fraud alert on your credit reports and review your credit report

What’s a Fraud Alert? Legally requires creditors to use “reasonable policies and procedures” to verify your identity before issuing credit in your name. Legally requires creditors to use “reasonable policies and procedures” to verify your identity before issuing credit in your name. There are 2 types of Fraud Alert: There are 2 types of Fraud Alert: - Initial Alert: for 90 days - Extended Alert: for 7 years. Available if you’ve been a victim of identity theft and you provide the consumer reporting company with an Identity Theft Report

Online Identity Theft In addition to reporting to local police, file an FTC identity theft complaint at In addition to reporting to local police, file an FTC identity theft complaint at You can also report online thefts by filing complaint with (a joint effort of the FBI and the National White Collar Crime Center) You can also report online thefts by filing complaint with (a joint effort of the FBI and the National White Collar Crime Center)

Identity theft complaints and the FBI The FBI will except complaints from the victim, IC3 or another agency The FBI will except complaints from the victim, IC3 or another agency Generally the FBI handles larger more complex cases with multiple victims and/or large monetary losses Generally the FBI handles larger more complex cases with multiple victims and/or large monetary losses Smaller cases are referred to local agencies. Smaller cases are referred to local agencies.

Questions ?