identity theft power_point

37
Identity Theft One of the Fasting Growing Crimes in America and Beyond

Post on 14-Sep-2014

1.357 views

Category:

Technology


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Identity theft power_point

Identity Theft

One of the Fasting Growing Crimes in America and Beyond

Page 2: Identity theft power_point

ObjectivesAbility to define the term “identity theft”Ability to determine if someone has been a victim of identity theft and if so actions to be takenAbility to identify methods to prevent identity theft Ability to identify resources for more information on identity theft

Page 3: Identity theft power_point

Introduction – What is Identity Theft?

According to the Federal Trade Commission, Identity Theft is the fastest growing crime in AmericaStealing someone’s personal information and using it to assume someone’s identityThe fraudulent use of personal information to open new accounts and/or purchase items using existing accounts

Page 4: Identity theft power_point

Identity Theft – No Little ProblemIdentity theft is one of the fastest growing crimes in America "Identity theft is a big-ticket item in terms of money and time according to Howard Beales, director of the FTC's Bureau of Consumer Protection.”Cost to consumers in 2002

$5 billion in expensesCost to businesses in 2002

$50 million [1] http://www.washingtontimes.com/functions/print.php?StoryID=20030903-095305-3951r 06/7/2004

Page 5: Identity theft power_point

Identity Theft – A Federal CrimeThe Identity Theft and Assumption Deterrence Act of 1998 made Identity Theft a federal crime.Identity theft occurs when someone knowingly transfers or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of the Federal law.

Page 6: Identity theft power_point

How Personal Information is Gathered

Dumpster divingPersonal information, when stolen from your property either through dumpster diving or theft, provide a criminal with a wealth of information with which to open new accounts or use existing accounts

Page 7: Identity theft power_point

Shredder – Necessary EquipmentTo minimize your risk of identity theft, be sure to shred all unused convenience checks, credit card offers, credit card receipts, bank statements, pre-approved loan offers, and canceled checks

Page 8: Identity theft power_point

How Personal Information is Collected Through Legitimate Business Records

Recently personal medical files for hundreds of patients were found discarded outside a medical clinic. Identity thieves could have used these filesBusinesses are required by law to protect their client's personally identifying information and to discard these files safelyThieves steal valuable personal information from customer files and personnel files

Page 9: Identity theft power_point

Phishing

Creation of a phony web site pretending to be a legitimate company

Sending email to the victim impersonating (spoofing) a legitimate company

The criminal collects personal and financial information such as credit card and Social Security numbers

Page 10: Identity theft power_point

Phishing ExampleOne recent phishing ploy spoofed an AOL web page.The perpetrator had used authentic AOL logos and other genuine hyperlinks in the email message sent to the victims. He told the victims that there had been a billing error.It directed the victims to click on an embedded hyperlink, which when clicked took the unsuspecting user to a phony web page, that had been created to look much like the company's authentic web site, and from which the thief collected personal and financial information

Page 11: Identity theft power_point

The Phony AOL Web Form

http://www.millersmiles.co.uk/identitytheft/AOL-email-scam-1115521443a.htm

Page 12: Identity theft power_point

Federal Laws Concerning Phishing

Identity theft - 18 U.S.C. § 1028 (a)(7)Wire fraud - 18 U.S.C. § 1343Credit card or access device fraud 18 U.S.C. § 1029Bank fraud 18 U.S.C. § 1344Computer fraud 18 U.S.C. § 1030 (a)(4)CAN-SPAM Act 18 U.S.C. § 1037

Page 13: Identity theft power_point

Federal Crime & PunishmentBank and wire fraud - up to 30 years in prison

Identity theft and credit card fraud - up to 15 years in prison

CAN-SPAM Act violations - up to 5 years in prison According to the U.S. Department of Justice, individuals convicted of these crimes may also face

substantial fines and forfeiture of his/her property

Page 14: Identity theft power_point

Social EngineeringCon Game - tricking a person into revealing informationMemorizing access codes and passwords by shoulder surfing (looking over someone's shoulder as they log in )Pretending to be an employer, loan officer or landlord to fraudulently obtain your credit report

Page 15: Identity theft power_point

How to Prevent Identity TheftEducation Coalition on Online Identity Theft Padlock your credit file Check your credit report annually Share personal information only with people and companies you trust

Make online purchases only with companies having secure connectionsNever give out your personal information over the phone unless you initiated the call.Never have your Social Security number printed on your checks

Page 16: Identity theft power_point

How to Prevent Identity Theft Part Two

Never leave personal information on your computer without having a firewall in place.After opening your mail, shred all unused credit card offers, unused convenience checks, and any other pieces of mail that include personally identifying information.

Never keep passwords to financial data on your computer. Likewise never keep your ATM or credit card pin numbers in your wallet or your car. If either are stolen, the thieves have instant access to your accounts.

Page 17: Identity theft power_point

How to Prevent Identity TheftPart Three

Never use your mother's maiden name, the last four digits of your Social Security number, your birth date, your pet's name, or any other easily recognized letters and numbers as your pin number or passwords.

If the amount of mail you normally receive drops suddenly; contact your post office to make sure no one has fraudulently filed a change of address card for your address.

Page 18: Identity theft power_point

How to Prevent Identity TheftPart Four

Review all credit card transactions each month when you receive your credit card statement.

Shred all expired credit cards before putting them in the trash.

Page 19: Identity theft power_point

How to Prevent Identity TheftPart Five

Install a locking mailbox to ensure the security of mail delivered to your home.Mail all payments and other documents with personal or financial information from the post office or at a postal drop box, never from your mailbox. Thieves may take your checks from unsecured mailboxes and bleach them so they may be used again.

Page 20: Identity theft power_point

Prevention of Identity Theft by Education

People must be educated as to the value of informationThey must be trained to protect information (even if the information they have access to appears to be of relatively low value)People must be made aware of what social engineering is and how social engineers operate.

Page 21: Identity theft power_point

Checking a Web Site’s Security Certificate

Check the security certificates for web sites from which you purchase products or do other financial transactionsGo to the web site and click on the VeriSign Secure Site link to verify that the security certificate is in the same name as the company. If the company name listed there doesn't match the company owning the site, be wary of submitting financial information. Security certificates are sometimes held in the parent company’s name.

Page 22: Identity theft power_point

Checking for Secure Web SitesCheck the URL (the web address) of the web site you are doing business withWhenever you are entering your credit card information or other financial information when ordering online, the address should display https, rather than http, if you are connecting to a secure web site; ex. https://amazon.com/cgi-bin

Page 23: Identity theft power_point

Checking Security Features When Using Netscape Navigator

To check the security in Netscape, look at the padlock in the lower right corner.

unlocked = not securelocked = secure

To check the level of encryption, left click the lock in the lower right-hand corner of the page. A pop up window will appear and tell you whether or not the page you are viewing is encrypted and what type of encryption is being used.

Page 24: Identity theft power_point

Checking Security Features When Using Internet Explorer

When using Internet Explorer as your browser, open the page whose security you want to check. Right click on the page and then go to properties. When you click properties, a pop up window will appear with information on the site's security.

Page 25: Identity theft power_point

What to Do If You Become a Victim of Identity Theft

Call the Federal Trade Commission’s Identity Theft Toll-free Hotline (877 – IDTHEFT)Call all three of the major credit bureaus

Experian - 1-888-397-3742EquiFax - 1-800-525-6285 TransUnion - 1-800-680-7289

For identity theft involving student information or federal education funds, contact U.S. Department of Education, Office of Inspector General

1-800-647-8733

Page 26: Identity theft power_point

What to Do If You Become a Victim of Identity Theft

File a police report as soon as possibleContact your creditors for all affected accounts

"A "fraud alert" will be automatically placed on each of your credit reports within 24 hours. This alerts creditors to call you for permission before any new accounts are opened in your name. Not all creditors pay attention to "fraud alerts." You need to stay vigilant for any new accounts that may be opened.“ [1]

[1] http://www.bankrate.com/brm/news/credit-management/identity-theft.asp 6/22/04

Page 27: Identity theft power_point

What to Do If You Become a Victim of Identity Theft

Also make your complaints in writing, asking each creditor to provide you and any law enforcement agencies investigating the crime(s) with copies of all documentation that shows fraudulent activity.

By making your complaint in writing, you are documenting the time and date when you became aware of the incident. This may protect you from responsibility for additional charges.

Page 28: Identity theft power_point

Fighting Identity TheftFederal Trade Commission Internet Fraud Complaint Center U.S. Department of Justice Identity Theft Resource Center (ITRC) Operation E-con

Page 29: Identity theft power_point

Federal Trade Commission This federal agency, created in 1914 to eliminate unfair methods of competition and unfair or deceptive practices concerning commerce, is now focused on the growing threat of identity theft

2003 - 42% of the complaints received by the FTC concerned identity theft.Training seminars are available for investigators and prosecutors on how to access the FTC's Consumer Sentinel database, an identity theft resource, which can securely access the nearly 200,000 complaints filed before June 2002.

Page 30: Identity theft power_point

Internet Fraud Complaint CenterA joint effort between the FBI and the National White Collar Crime Center that investigates complaints of fraud perpetrated on the Internet. This organization acts a hub for complaints and can analyze data to quickly identify new Internet crime trends. The IFCC also can then make referrals to the appropriate law enforcement agency.

Page 31: Identity theft power_point

Internet Fraud Complaint CenterComplaints can be made 24/7, directly to the IFCC, using the online complaint form. Directions on how to file a complaint are found at: http://www1.ifccfbi.gov/strategy/howtofile.aspVictims have come forward from 89 countriesAuction fraud accounts for almost two-thirds of all complaints received by the IFCC

Authentic Ebay addresseshttp://cgi3.ebay.com/http://arribada.ebay.com/Phony Ebay addresseshttp://[email protected]/http://signin-ebay.com/

Page 32: Identity theft power_point

How to Identify the Source of Email

Page 33: Identity theft power_point

Identity Theft ResourcesU.S. Dept. of Justice - http://www.usdoj.gov/

Fraud Section Identity Theft Resource Center (ITRC)

http://www.idtheftcenter.org/index.shtmlFAQ's on identity theftContains alerts and information on new identity theft scamsIncludes a guide to organizing an identity theft case

Page 34: Identity theft power_point

Operation E-ConA joint effort by the FBI, the U.S. Secret Service, the Dept. of Justice, the U.S Postal Inspection Service, the Federal Trade Commission along with National White Collar Crime Center (NW3C) and local and state law enforcement agencies aimed at prosecuting world wide Cyber Crime, including Identity Theft. Prosecution of 130 subjects90 investigations involving 89,000 victims with estimated losses on nearly $200 million. [1]

[1] http://www.ifccfbi.gov/strategy/ifcc-econbrief.pdf. 6/23/04

Page 35: Identity theft power_point

New Identity Theft LawsFair and Accurate Credit Transactions Act (FACTA) of 2003 Free annual credit reports for consumersBusinesses are required to hide portions of credit card and social security numbers on receiptsCreated a national fraud hotline so you only have to make one call to report identity theft

Page 36: Identity theft power_point

National Listing of Identify Theft Citations & Penalties by State

The National Conference of State Legislatures (http://www.ncsl.org/programs/lis/privacy/idt-statutes.htm)

A comprehensive listing of citations and penalties listed alphabetically by state.

Page 37: Identity theft power_point

California’s Changing View on Identity Theft

In California, "The law making Identity Theft a crime was enacted as a misdemeanor crime in 1998. In 1999, the law was upgraded to an alternate felony/misdemeanor crime."[1]

[1] http://www.infolinkscreening.com/InfoLink/Resources/Articles/IdentityTheft.aspx 6/23/04