Identity Theft and the Impact on the Telecom Industry Debbie Ogle Corporate Security Fraud Manager January 27, 2005.

Slides:



Advertisements
Similar presentations
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
Advertisements

Parachute Neighborhood Watch Presentation February 9, 2010.
Identity Theft “When Bad Things Happen To Your Good Name” Federal Trade Commission.
Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Identity Theft “When Bad Things Happen To Your Good Name” El Camino Community College Police Department Sgt. Kirk Johnston Josh Armstrong.
Kimberly Castner-Scott. What is Identity Theft I Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully.
1 Identity Theft and Phishing: What You Need to Know.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Identity Theft INDEPENDENT LIVING: MANAGING YOUR MONEY.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Presented By The Plano Police Department Crime Prevention Unit.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Identity Theft “When Bad Things Happen To Your Good Name” Federal Trade Commission.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
IDENTITY THEFT BY: Victoria Jeffcoat CSCI 101 Lecture Tuesday 2pm.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
October 27,  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
WHEN BAD THINGS HAPPEN TO GOOD NAMES IDENTITY THIEVES FRADULENTLY USE YOUR PERSONAL INFORMATION TO.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Security Awareness Identity Theft October Security Awareness. Identity Theft Someone acquires enough information about you to pose as you and.
IDENTITY THEFT EPIDEMIC How We Can Protect Ourselves.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
IDENTITY THEFT. Identity Theft Defined When someone uses another person’s name, address, social security number, bank or credit card account number, or.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Identity Theft.
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
You. are at risk for the fastest growing crimes crime.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Presented By Plano Police Department Crime Prevention Unit.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Identity Theft The fastest growing type of fraud..
Identity Theft Officer Bill Roscop Mount Prospect Police Department.
 Definition  How thieves steal identity  Origin  Possible impacts on the small island nation of Vanuatu  Precaution Measures.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Beware! Identity Theft. Imagine getting a letter from the Internal Revenue Service (IRS) demanding that you pay $5,700 in back taxes. That’s what happened.
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
IDENTITY THEFT.
Identity Theft It’s a crime!
#1 Consumer Fraud Complaint – 5th straight year!
IDENTITY Theft Financial Literacy Identity Theft.
When you get caught for Identity Theft
Protecting Yourself from Fraud including Identity Theft
Protecting Your Identity
Protecting Yourself from Fraud including Identity Theft
Protecting Your Credit Identity
Protecting Yourself from Fraud including Identity Theft
Identity Theft and Credit Safety
Presentation transcript:

Identity Theft and the Impact on the Telecom Industry Debbie Ogle Corporate Security Fraud Manager January 27, 2005

2 Part I The Truth About Identity Theft

3 What is Identity Theft?  Identity theft is the fraudulent use of a person’s name and identifying data by someone else to obtain credit, merchandise, or services  All that identity thieves really need to open new accounts under your name or to drain your existing accounts are three pieces of information: –Your full name –Your date of birth –Your Social Security Number

4 How Does Identity Theft Occur?  Obtaining information from businesses or other institutions by: –Stealing records from employers –Bribing an employee who has access to these records –Hacking into an organization’s computer  Rummaging through trash in a practice known as “dumpster diving”  Obtaining credit reports by posing as a landlord, employer, or someone else who may have a legal right to the information  Stealing wallets and purses containing identification and credit and bank cards

5 How Does Identity Theft Occur?  Stealing mail, including credit card statements, pre-approved offers, new checks, or tax information  Completing a change of address form to divert your mail to another location  “Skimming” - stealing credit and debit card numbers as your card is processed by using a special information storage device  “Phishing” - scamming information from you by posing as a legitimate business person or government official

6 What Can Happen Once Your Identity is Stolen?  New credit card accounts can be opened, which show up on your credit report when not paid  Utility services can be established in your name (phone, electricity, etc.)  New bank accounts can be opened and bad checks written on those accounts  Counterfeit checks and debit cards can be used to drain your existing bank account  Auto loans can be obtained in your name  Your name can be given to police during an arrest

7 How is Identity Theft Discovered?  According to a survey in 2003 by the Federal Trade Commission (FTC): –52% of victims (approximately 5 million people) discovered identity theft by monitoring their accounts –26% (approximately 2.5 million people) reported they were alerted to suspicious account activity by companies such as credit card issuers or banks –8% reported that they first learned of identity theft when they applied for credit and were turned down

8 Is Identity Theft Really a Big Problem?  The Department of Justice says identity theft is the nation’s fastest growing financial crime  A survey released by the Federal Trade Commission showed that 27.3 million Americans have been victims of identity theft in the last five years  In the last year alone, 9.9 million people were victims of identity theft  Last year’s identity theft losses to businesses and financial institutions totaled nearly $48 billion  Consumer victims reported $5 billion in out-of-pocket expenses

9 Cases of Identity Theft  In testing the security of online merchant Guess before buying a pair of jeans, a 19 year old novice programmer was able to break in and retrieve 200,000 customer names and credit card numbers  A 22 year old student from Bulgaria issued a fake credit card in the name of Microsoft Chairman Bill Gates as part of a global crime gang producing counterfeit driver’s licenses and passports in more than 25 countries  A 16 year old recently discovered he had a DUI on his record before he even had a driver’s license; perpetrator had also opened credit card accounts and obtained a mortgage  Last year Visa, MasterCard, and American Express confirmed that an unknown hacker had accessed 8 million credit card records from a merchant processor; a research and advisory firm estimates that at least 1% of those accounts (80,000 consumers) will become targets of fraud

10 What is Being Done About Identity Theft?  The Identity Theft and Assumption Deterrence Act enacted by Congress in 1998 made identity theft a federal crime  Violations are investigated by the Secret Service, FBI, Postal Inspection Service, and Social Security Administration  In most cases, conviction for identity theft carries a maximum of 15 years imprisonment

11 How Can You Minimize the Risk of Identity Theft?  Periodically review your credit report looking for inquiries you did not initiate, accounts you did not open, and unexplained debts on your true accounts  Place passwords on your credit card, bank, and phone accounts  Do not give out personal information on the phone, through the mail, or over the Internet unless you have initiated the contact  Deposit outgoing mail in post office collection boxes instead of home mailbox  Shred charge receipts, copies of credit applications, insurance forms, physician statements, check and bank statements, and expired charge cards

12 Part II The Impact of Identity Theft on the Telecom Industry

13 How is Identity Theft Impacting the Telecom Industry?  According to a survey released in March 2004 by the Telecommunications Risk Management Association (TRMA), identity theft is the leading type of fraud affecting the telecom industry  According to the FTC, phone or utility fraud ranks second only to credit card fraud in number of fraud cases reported  Identity theft is being used to steal products and services from telecom companies  Fraudulent phone accounts are being established and kept in good standing in order to commit more serious crimes

14 How is Fraud Being Perpetrated Against Telecom Companies?  Phone accounts are being paid using stolen credit cards and banking information  Accounts are being established using stolen identities for people unable to obtain service  Residential and small business accounts are being established and cell phones are being ordered against those accounts  Customers are receiving calls from perpetrators pretending to represent telecom companies insisting that customers provide their credit card or bank information to pay past due accounts

15 What is BellSouth Doing to Combat Identity Theft?  Corporate Security developed a comprehensive Corporate Fraud Program that focuses on the prevention, detection, investigation, and correction of fraud  Corporate Security investigates identity theft cases and works with law enforcement to track and apprehend perpetrators  Credit Verification Group assists victims of identity theft in clearing their records  Customer Markets working on improvements to the customer authentication process –Completed trial for “out-of-wallet” customer authentication tool –Conducting trial with Network, Small Business, and Accounts Receivable to identify fraudulent small business accounts prior to installation

16 Who is Liable?  Ligand Pharmaceuticals settled a negligence lawsuit in San Diego over identity thefts that occurred when personnel records were left in an unlocked area; a worker discovered the records and used them to open fraudulent credit accounts  Federal class action lawsuit settled for $2.5 million for identity theft and invasion of privacy against car dealerships that placed 168 loans in plaintiffs’ names without their knowledge  $81 million lawsuit filed against Bank of America accusing the bank and an employee of scheming to get thousands of unauthorized consumer credit reports and selling them to third parties

17 Questions? Corporate Security Fraud Managers Debbie Ogle Cheryl Jordan