Internet Investigations. Internet Investigations Theres a charge on my credit card, but I didnt make that purchase. – Most common criminal investigation.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

CREDIT CARD TRANSACTIONS
Prepared for: Presented by: Risky Business 2012 Conference Tony La Rosa, Manager Mid-Iowa Credit Counseling Park Fair Mall 100 E. Euclid Ave., Ste. 157.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
Identity Theft “When Bad Things Happen To Your Good Name” Federal Trade Commission.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft.
Identity Theft INDEPENDENT LIVING: MANAGING YOUR MONEY.
CHAPTER THIRTEEN ACCOUNTING FOR PURCHASES McGraw-Hill/Irwin Accounting Fundamentals, 7/e © 2006 The McGraw-Hill Companies, Inc., All Rights Reserved.
Lesson 8 Getting a Credit Card. Key Terms APR Credit Credit Card Creditor Debtor Finance Charge Interest Rate Introductory Rate Late Fees Minimum Payment.
NETWORKING Let’s get serious about Career Development.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Sample Check Register. Sample Blank Check Register.
ICHAT is the only public resource for non-fingerprint-based Michigan criminal history background checks.
Identity Theft “When Bad Things Happen To Your Good Name” Federal Trade Commission.
Introduction to the Wonderful World of Criminal Charge Screening Barbara J. Trathen Marion County Prosecutors Office November 29, 2011.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
FORENSIC ACCOUNTING - BA124 - Fall 2008Slide 13-1 Today’s Topics n Consumer Fraud.
Use the Internet to Find a Job Presented by Highland College Placement Office.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Chapter 4 Billing Schemes.
Kimberly Siebott Lynn Yip. Definition  A crime in which the perpetrator develops a scheme using one or more elements of the Internet to deprive a person.
CHAPTER ELEVEN INTRODUCTION TO MERCHANDISING BUSINESSES: SALES.
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
MONEY MANAGEMENT II Billing Errors/Disputes & Identity Theft.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
2015 ANNUAL TRAINING By: Denise Goff
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Objectives  Explore ways to prevent identity theft.  Determine the differences between identity theft and consumer fraud.  Examine how media and technological.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
The Forensic Accounting Legal Environment McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
IDENTITY THEFT OCCURS WHEN A CRIMINAL USES ANOTHER PERSON'S PERSONAL INFORMATION TO TAKE ON THAT PERSON'S IDENTITY. IDENTITY THEFT IS MUCH MORE THAN MISUSE.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
Identity Theft.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
Special Journals: Purchases and Cash Payments
Banking Services 7.3 Reconcile your checkbook. 7.3 Balance your checkbook Goals: ◦Identify information that is provided on a checking account statement.
WHO’s IN YOUR “WALLET” WHO’s IN YOUR “WALLET” YOU BETER “RECOGNIZE” YOU BETER “RECOGNIZE” STEPPING $2o0 $300 $400 $500 $400 $300 $200 $500 $400 $300.
August 19 & 22, Objectives  Identify adequate, reliable information resources for personal and family problem solving.  Explore ways to prevent.
Internet Safety Internet Safety LPM
You. are at risk for the fastest growing crimes crime.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Banking Services 7.3 Balance your checkbook. Goals: ◦Identify information that is provided on a checking account statement. ◦Explain how to reconcile.
1.3 Safeguarding Your Privacy Identity Theft is the illegal use of an individual’s personal information.
At the end of each day the evening manager at each store enters a code into the cash register, after which the cash register connects to the central computer.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Checking & Savings Accounts Economics What is a Checking Account?  Common financial service used by many consumers (a place to keep money)  Funds.
The Causeway Company uses the following procedures to process the cash received from credit sales. The mailroom receives checks and remittance advices.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Immediate Issues & Tasks after the discovery of Occupational Fraud March 17, 2016.
Marketing Essentials Chapter 16 Section 1.  Most retail sales will use cash, debit, or credit sales for consumer goods.  Sometimes retail sales offer.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
Federal Identity Theft Investigations Richard W. Downing Assistant Deputy Chief Computer Crime and Intellectual Property Section U.S. Department of Justice.
Jeff loses his identity! Lesson 5: Identity Theft.
Identity Theft It’s a crime!
You’ve Been Hacked! What to do when your personal information has been compromised Paul T. Yoder, Information Systems Security Specialist.
Criminal Prosecutors with Computer Forensics
When you get caught for Identity Theft
By: Johnathan Rowse, Jacob Palmer, Kayla Morgan, Paige Frasier
Who Uses Encryption? Module 7 Section 3.
Protecting Your Identity
Checking Accounts, Debit Cards & Check Writing
Presentation transcript:

Internet Investigations

Internet Investigations Theres a charge on my credit card, but I didnt make that purchase. – Most common criminal investigation I paid for it, but I didnt receive it. – eBay Someone hacked my…. – Bank account – account

Internet Investigations Key elements to a successful investigation – Location of the offender Where in the world are they – Identification of the offender Who was typing on the keyboard – Admission by the offender Prosecutors like confessions

Internet Investigations Location Where in the world are they….Literally

Internet Investigations Location Begin with the company where the unauthorized activity occurred

Internet Investigations

Location Begin with the company where the unauthorized activity occurred – Was an I.P. Address captured – Confirm time zone of I.P. Address capture

Internet INvestigations

Internet Investigations Location The company where the unauthorized activity occurred – Was an I.P. Address captured – Confirm time zone of I.P. Address capture Internet Service Provider – Search Warrant for subscriber records – May need to account for time zone differences

Internet Investigations Key Elements of a Successful Investigation Location of the offender Identification of the offender

Internet Investigations Identification

Internet investigations Identification Though probably false, gather all information provided to company at the time of the transaction Verify a connection between the offender and the location provided by the I.S.P. Additional search warrant(s) might be necessary to gather additional information and or to seize the offenders computer

Internet Investigations Key Elements of a Successful Investigation Location of the offender Identification of the offender Admission by the offender

Internet investigations Admission In general, without a confession prosecutors are less likely to file charges Be prepared for the interview Dont rush an interview Interviewing is a skill that needs to be practiced

Internet investigations Paul Pantani Senior Investigator – Consumer Fraud Unit Riverside County District Attorneys Office