Its easy to steal. Its much harder to enjoy the proceeds…

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Frauds, Scams and Financial Euphoria
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
IDENTITY THEFT AND FRAUD CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
1 Identity Theft and Phishing: What You Need to Know.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
Oklahoma’s Personal Financial Literacy Passport © Oklahoma State Department of Education. All rights reserved. 1 Teacher Presentation Series 9 Standard.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Modules 9.1.  When someone knowingly deceives you for their own personal gain.  They convince you that something is true when it isn’t.  They make.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
What is identity theft, and how can you protect yourself from it?
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Ohio Division of Securities Your Name Here Investment Fraud and Investor Protection.
FORENSIC ACCOUNTING - BA Slide 12-1 Today’s Topics n Organizational Fraud n Consumer Fraud.
Chapter 19 Protecting E-Commerce systems. Is IT different? There is some discussion that IT today is no different than past enabling technologies Telegraph.
Network Externalities
Chapter 5 Identity Theft and related topics. Synopsis What is identity theft? What is phishing? How does phishing work? What is pharming? Whose identity.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Some Types of Scams and what you need to now about them and what you need to now about them.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Scams Stevie's Scam School videos
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
The Importance of a Good Credit Score and How to Read a Credit Report
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Beware! Consumer Fraud Module 9.1.
Personal Finance Unit 2.02 Understand Threats to Financial Security.
Objectives  Explore ways to prevent identity theft.  Determine the differences between identity theft and consumer fraud.  Examine how media and technological.
Scams & Schemes Common Sense Media.
ICT in Banking.
Part 6—Managing Your Income
UNIT VII – Personal Financial Literacy Consumer Protection & Fraud.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Common Scams Lewis Collantine & Clare Cunningham Thurrock Trading Standards 8 th September 2015.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
 people will go through your trash to get credit card numbers. Like old mail that you threw away, had your number on it a lot of the time its with.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
1.3 Safeguarding Your Privacy Identity Theft is the illegal use of an individual’s personal information.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Identity Theft Officer Bill Roscop Mount Prospect Police Department.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Chapter 6 What is identity theft?.  What are the three Credit Bureaus which you can obtain your FICO SCORE?  Is a high FICO score a measure of winning.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
Fraud, scams and commercial exploitation. The dangers Children are still generally quite trusting and uncritical about what they read online They are.
Fraud: Does it really only happen to others? Amanda Francis.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Presented by: Mrs. Flowers SALES AND MARKETING CONSUMER RESPONSIBILITIES.
Identity Theft Westerville Division of Police. What is Identity Theft? “to obtain, possess, or use any personal identifying information of any living.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Early Warning Law Enforcement Insights on Emerging Trends and Typologies 11:10 – 12:15 PM, Yale Club, New York.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Oklahoma’s Personal Financial Literacy Passport
Network Externalities
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Its easy to steal. Its much harder to enjoy the proceeds… Frauds and Scams Jack Lang ***Health Warning*** DO NOT TRY THIS AT HOME You will meet strange new people and change your life….not for the better Its easy to steal. Its much harder to enjoy the proceeds…

Frauds and Scams Straightforward dishonesty System weaknesses False accounting Insider abuse False customer claims Credit cards etc: Attacks and counter measures Identity theft Long firm Con tricks System weaknesses Telco fraud TV decoders Hack attack: blackmail – DoS attacks Inside trading and market manipulation Insider trading: Guinness, Leason and others Boiler room schemes Money laundering: layering Unreal Maths Ponzi schemes Lotteries Financial Euphoria Institutional fraud Enron, false customer numbers, churn Countermeasures Follow the money

Dishonesty Most likely attack Insider with authorised access False accounting Spoof invoices Spoof purchases Spoof bank orders etc Poor control: Leason etc Countermeasures: Cleanliness: Double entry book-keeping; asset register; purchasing system 2 signatures for critical functions (e.g. cheques) Good control systems and audit Locks & keys Vet staff & have good staff relations Corporate culture Unusual behaviour patterns Unsocial hours, expensive tastes

Credit Cards Overall cost of fraud Motivation – who gets the reward? Spain 0.01% UK 0.2% USA 1.0% BUT for certain sites, customer not present – 40% Motivation – who gets the reward? Huge hype “Evil Hackers” Employment for security types No case of fraud resulting from interception! Getting sense from mail is hard Real problem: hacked or crooked end systems Many ways to collect or generate valid card numbers “Shoulder surfing” – video camera Hacking end systems more for show than practicality

Dishonest customers False customer claims and repudiation “I did not order these goods” “You did not ship me the goods I ordered” Countermeasures: Audit Secure audit trails Stolen credit cards Check card before shipping e.g. $1 transaction end to end Check ship address is card address

Credit Cards Originally fraud risk borne by banks Introduction of mail order and telephone (and web) order (MOTO) risk for transactions with the cardholder not present passed to merchant. MOTO have lower floor limits, and in delivery only to cardholder address Not possible to check addresses for e-delivery, or overseas or services like Worldpay) 40% fraud for some sites Paypal fraud Traditional frauds: Stolen cards Pre-issue Identity theft

Credit Cards Evolution of forgery Free Lunch Attack Countermeasure Simple copy Hologram Alter embossing Check mag strip Emboss mag strip # TDC Make up strip CVV, CVC Skimming Intrusion detection Free Lunch

Lotteries and Scams Lotteries: tax on the ignorant Poor estimate of low probability events Premium rate telephone scams TV quiz shows and auctions Phone this number to win… Straight frauds Ponzi schemes (Pyramid sells) Credit card and other personal details misuse Telecom scams Boiler room operations

False Identity Legend: e.g. Giles Murchiston Long Firm Fraud Birth certificate ->Passport Passport + Utility Bill-> Bank Account Bank Account -> Credit Card -> NHS record, Employment benefit Email address (e.g Hotmail, NetIdentity) Telephone entry Long Firm Fraud

Con tricks Setup Hook and Bait Sting Shut-out Select the mark Establish credibility Hook and Bait Small steps Greed and desire Sting Special limited time offer… Things are not what they seem… Shut-out Exit route

FTC Top Ten Top Ten Dot Cons Con artists have gone high-tech, using new technology to peddle traditional scams. Scam artists can be just a click away.  Internet Auctions You might not get what you bought…. International Modem Dialing Hold on while we re-direct you Internet Access Services Didn’t we tell you about the cancellation fee? Credit Card Fraud Web Cramming Let us design your web site/process your orders… Multilevel Marketing Plans and Pyramids Travel and VacationBusiness Investment Opportunities Health Care Products and Services

HK Top Ten No.1 - Fake Gold Rings No.2 - Bogus Modelling Agencies No.3 - London ("Loco") Gold No.4 - Fake Herbs etc. No.5 - "Dropped" Money No.6 - The "Ketchup" Gang No.7 - Nigerian Letters No.8 - Chain Letters And Pyramid Schemes No.9 - Overclocking No.10 - Superstition Deception

System weaknesses Telco fraud Re-direct TV decoders Blocking Fake cards Hack attacks: blackmail – DoS attacks

Inside trading and market manipulation Insider trading: Guinness, and others Market illiquid for small stocks or large orders “Upstairs market” What is a “fair market”? Anonymity and disclosure: Pre-trade Post-trade Boiler room schemes Money laundering: Layering Getting it into and out of the banking system Bureau de Change & offshore banks Disguise as legitimate business

Unreal Maths Ponzi schemes Much older Named after Carl Ponzi, who collected $9.8 million from 10,550 people ( including ¾ of the Boston Police Force ) and then paid out $7.8 million in just 8 months in 1920 Boston by offering  profits of 50% every 45 days.  Much older Pay early investors from later capital Pyramid selling (Multi-Level Marketing) MM Albania

More Maths Lotteries Financial Euphoria Tax on the poor and the ignorant How Casonava made his money Not all promoters are honest! Financial Euphoria Tulipmania (1637) South Sea Bubble (1720) Railways (1849) Radio and Aeroplanes (1920) Dot.Com J.K. Galbraith

Institutional & Governmental fraud False assurances Enron BP Murdoch 3G Telco licences Bad statistics Telco customer numbers, churn Unemployment, hospital waiting lists Web-site clicks, adverts

Countermeasures Caution Cleanliness Follow the money If something is too good to be true, it probably is! Cleanliness Conventional double-entry bookkeeping Audit Culture Realistic risk assesment Follow the money Hard to disappear