Managing False Information NiiBen C. A. Ayivorh AML/CFT Consultant Nii-Int’l L.L.C.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
Prepared for: Presented by: Risky Business 2012 Conference Tony La Rosa, Manager Mid-Iowa Credit Counseling Park Fair Mall 100 E. Euclid Ave., Ste. 157.
COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
Victoria ISD Common Sense Media Grade 6: Scams and schemes
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Identity Theft Presented by Christina Williams and Lazaro Juarez Orange County’s Credit Union.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
Identity Theft. MIS Training Institute, Inc.Section X - Slide 2CS1 053 ©Network Security Services, LLC Outline n Definitions n Methods used n Ways to.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
What is identity theft, and how can you protect yourself from it?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Basic Banking Services - Activity 1
FDIC Money Smart for Young Adults
$$$$$$$ Know your Money! Financial Institutions and Services.
 Safety  Security  Convenience  Cost  Financial Future.
IDENTITY THEFT BY: Victoria Jeffcoat CSCI 101 Lecture Tuesday 2pm.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Do Now: Banking Basics By the end of this block you should have an understanding of personal banking services and how they can benefit you.
Banking in the United States. Banking Safety FDIC is the Federal Deposit Insurance Corporation On May 20, 2009, President Obama signed the Helping Families.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
Protecting your money: Identity Theft
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Security Awareness Identity Theft October Security Awareness. Identity Theft Someone acquires enough information about you to pose as you and.
IDENTITY THEFT EPIDEMIC How We Can Protect Ourselves.
Scams & Schemes Common Sense Media.
Landlord Utility Services Work Instructions. To enter the portal, simply enter your assigned User ID and Password, provided by Consumers Energy. Log In.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Be Cautious of Identity Theft By: Sydney Langley.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Protecting Your Identity Anders Olson Computers III September 18, 2008.
By: Asfa Khan and Huda Mukhtar
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
TODAY’S AGENDA 1.Budgeting Project review- they are due electronically tomorrow 2.Budgeting Quiz (DVD) and test questions afterwards 3.Ch. 10 Baking 4.Ch.
Identity Theft The fastest growing type of fraud..
Opening up a Checking Account Eliseo Lugo III. 2 To choose the one that’s right for you when the time comes To take the right steps to open a bank account.
Identity Theft Officer Bill Roscop Mount Prospect Police Department.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
By Brooke Rogers Identity theft is the act of acquiring and collecting a persons information with the intent of using it for criminal purposes. Identity.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
Identity Theft It’s a crime!
Protecting Your Credit Identity
Protecting Yourself from Fraud including Identity Theft
Identity Theft Prevention Program Training
Protecting Your Identity
Protecting Yourself from Fraud including Identity Theft
Smart Business for eGeneration Companies
Protecting Your Credit Identity
Protecting Yourself from Fraud including Identity Theft
Colorado “Protections For Consumer Data Privacy” Law
Lesson 4.2 Banking Services and Fees
Smart Business for eGeneration Companies
Presentation transcript:

Managing False Information NiiBen C. A. Ayivorh AML/CFT Consultant Nii-Int’l L.L.C

Identification  Drivers License  Passport  National ID Card  Voters Registration Card

Integrity of Identification  How do you Verify PII  Method of Verification &Certification  Signature Cards  Social Security Card  Birth and Death Data

Methods and Evolution  Why  Methods  Indicators of the Crime  How to Detect the Crime  How to Mitigate the risk  How to Protect (Personal Information)

 Credit card fraud  Drugs  Bank Fraud  loan fraud  counterfeit checks  loan fraud Why Multiple Identity

Methods and Evolution  Washing Checks  Tracing Credit Card  Dumpster Diving  Mail Box Heist  counterfeit checks  loan fraud (Personal Information)

Information Collection  Restaurants  Trash Cans  Hackers Underground Auction Sites

Online/ Mail

Regular Mail (419 Letters)

Money Transfer (Insider)

Technology

 Fake ATM  Data Collection  Account numbers  PINs ATM Invasion

Health Fraud

Charity Fraud

Mobile Phone Fraud

Emergency Fraud

Job and Employement Fraud

Public Sources Corporate information – officers – incorporation information – financial information – address – type of business – affiliated companies – phone numbers

Other Sources Ex-wives/husbands Local community groups Associations Trade Magazines Newspaper articles Who’s who Magazines Trash Covers Mail Covers Neighbors co-workers business associates

Internet Trojian SW

Hijack Internet Security Help!

Dear valued customer, We have launched our new and secured online banking site. This process is in line with the cbn cashless policy To Recipients Today at 1:13 PM

Hijack Internet Security Help! To Me Apr 11 at 9:08 PM Good Day Sir/Madam, Fund transfer request was raised in your favour by our customer at Zenith Bank Nigeria Plc Victoria Island Lagos. Kindly check your account details on the attachment,to confirm if your account details corresponds with the one the attachment.

Hijack Internet Security Help! Taking effect from today you will not be able to log into your online banking account and your firstonline account will be terminated if you fail to migrate to the new site accordingly. KINDLY FOLLOW THE BELOW INSTRUCTION 1. Go to online.com/corp/. 2.Enter Your Current USERID & PASSWORD & a TOKEN CODE 3. It is mandatory to enter the code generated by your FBN hardware token device

Internet Security Help! 4. Lastly, Provide the Answer to your secret questions 5. Please kindly move this message to your inbox folder if found in your junk KINDLY NOTE THAT YOU ARE REQUIRED TO IN PUT YOUR TOKEN CODE FOR SUCCESSFUL UPDATES TO OUR NEW SITE You must Synchronize your token to avoid locking of your token thereby making it impossible to carry out transactions online.

How do you manage Theft? Nigeria Government? Financial Institution? Law Enforcement? FIU? EFCC?

 Private Entity (Vetted) (Life Lock)  Government Oversight  Bank Out Reach: KYC of Habits and travels  Update Government Data  Information protection & Sharing Policy Solutions

 Public Awareness PII (Personal Identifiable Information)  Control Equipment Credit Card Machine, ID Photo making Machine etc.. Solutions

 Bankruptcy records  Civil and Criminal Court Records  Divorce and Legal Separation Records  Liens and Judgment Records  Assets  Property ownership  cars  boats Public Source Databases

Public Information - continued  Professional license – medical, dental, insurance, stock brokers, attorney, CPA, Notery Licenses – Liquor license  telephone numbers  weapons permits  hunting/fishing license  Death records  Building permits  grantor and grantee records

Public Records - continued  Tax records  property ownership  liens  judgments  business records - corporation record  phone records

And the list goes on and on…

Questions?????