Date post: | 14-Sep-2014 |
Category: |
Education |
View: | 1,295 times |
Download: | 0 times |
October 2007October 2007 111
Identity Theft:Identity Theft:
A Matter of WhenA Matter of When
Not IfNot If
© September 2008
October 2007October 2007 222
Tom Di Zinno/NCPDTom Di Zinno/NCPDInvestigations 336-4473Investigations 336-4473
October 2007October 2007 333
What is PersonalWhat is PersonalIdentifying Information?Identifying Information?
Social Security NumbersSocial Security Numbers Driver’s license numbersDriver’s license numbers Address, phone numbers, date of birthAddress, phone numbers, date of birth Birth Certificate informationBirth Certificate information Mother’s maiden name, other family Mother’s maiden name, other family
informationinformation Financial account numbersFinancial account numbers Biometric information on an individualBiometric information on an individual Medical InfoMedical Info
October 2007October 2007 444
Identity Theft:Identity Theft:The Classic ViewThe Classic View
Identity theft occurs when an Identity theft occurs when an imposter gains access to imposter gains access to personal identifying information personal identifying information (PII) and uses it for (PII) and uses it for financialfinancial gain:gain:
New lines of credit, loans, and New lines of credit, loans, and mortgagesmortgages
New accounts, account New accounts, account takeover, checking/debit fraud takeover, checking/debit fraud
Tenancy and utilitiesTenancy and utilities Medical Billing and IdentityMedical Billing and Identity
October 2007October 2007 555
Identity Theft:Identity Theft:The Big PictureThe Big Picture
Identity theft Identity theft alsoalso occurs when an occurs when an imposter gains access to personal imposter gains access to personal identifying information and uses it identifying information and uses it for:for:
Jobs, employment, contractsJobs, employment, contracts Government accounting issuesGovernment accounting issues Government support servicesGovernment support services Avoidance of arrest and criminal Avoidance of arrest and criminal
recordsrecords Medical servicesMedical services
October 2007October 2007 666
Everyone is VulnerableEveryone is Vulnerable
15 million victims a year 15 million victims a year (1)(1)
Identity Theft is a Dual CrimeIdentity Theft is a Dual Crime Cost of Identity TheftCost of Identity Theft
American households:American households: $6 $6 billion/yearbillion/year
Total fraud loss:Total fraud loss: $56.6 $56.6 billion/yearbillion/year
Average fraud loss: Average fraud loss:
$6,383/per case$6,383/per case
October 2007October 2007 777
Who are these Thieves?Who are these Thieves?
Narcotics users or sellersNarcotics users or sellers Notable connection to Meth Notable connection to Meth
AddictsAddicts
Organized crimeOrganized crime OpportunistsOpportunists Desperate people – Desperate Desperate people – Desperate
actionsactions Family members or someone Family members or someone
close to youclose to you
October 2007October 2007 888
How Thieves How Thieves Obtain InformationObtain Information
Lost/Stolen wallets Lost/Stolen wallets Mail theftMail theft DumpstersDumpsters Shoulder surfingShoulder surfing Telephone solicitationsTelephone solicitations ““Phishing” and scamsPhishing” and scams Lack of computer security / InternetLack of computer security / Internet Areas beyond your controlAreas beyond your control Data breachesData breaches
October 2007October 2007 999
NIGERIAN SCAMSNIGERIAN SCAMS Mystery ShopperMystery Shopper Overpayment ScamOverpayment Scam Romance ScamRomance Scam Lottery ScamLottery Scam 419 Scam419 Scam FBI ScamFBI Scam
October 2007October 2007 101010
Phishing ScamsPhishing Scams
Email or Telephone alertsEmail or Telephone alerts Your account has been Your account has been
terminated/put on hold etcterminated/put on hold etc Directs you to a website or Directs you to a website or
phone bankphone bank Asks for you to confirm infoAsks for you to confirm info
October 2007October 2007 111111
““Phishing” EmailPhishing” EmailFrom: Chase Bank [mailto:[email protected]: Chase Bank [mailto:[email protected]: Wednesday, September 24, 2008 1:00 PMSent: Wednesday, September 24, 2008 1:00 PMSubject: Important : Chase Bank customer service MessageSubject: Important : Chase Bank customer service Message
<http://www.chase.com/ccpmweb/shared/image/chaseNewlogo.gif<http://www.chase.com/ccpmweb/shared/image/chaseNewlogo.gif
Dear Chase OnlineSM Customer:Dear Chase OnlineSM Customer:
A message regarding "Re: Credit Card - Update Profile User" has been A message regarding "Re: Credit Card - Update Profile User" has been sent to our Secure Message Center.sent to our Secure Message Center.
To see your message: To see your message:
** follow this link to Log on to Chase Online. follow this link to Log on to Chase Online. <http://chaseonlineuser.by.<http://chaseonlineuser.by.ruru/secure_membin_Chaseonline_email/secure_membin_Chaseonline_email_id43432gjg98982beh32k9878e.htm> Once you log on, you can _id43432gjg98982beh32k9878e.htm> Once you log on, you can see your new message and Update Profile in the Secure Update see your new message and Update Profile in the Secure Update Center. Center.
** Please fill in the required information. This is required for us to Please fill in the required information. This is required for us to continue to offer you a safe and risk free environment.. continue to offer you a safe and risk free environment..
Thank you for being a valued Chase customer.Thank you for being a valued Chase customer.
October 2007October 2007 121212
Pharming ScamsPharming Scams
Web BasedWeb Based False Web SiteFalse Web Site False Search Engine infoFalse Search Engine info May be preceeded by PhishingMay be preceeded by Phishing LEARN TO READ URLLEARN TO READ URL LOOK FOR ENCRIPTIONLOOK FOR ENCRIPTION MODIFY SEARCHSMODIFY SEARCHS
October 2007October 2007 131313
Mortgage ScamsMortgage Scams
FICO Score SitesFICO Score Sites Loan ModificationLoan Modification Foreclosure PreventionForeclosure Prevention Foreclosure Prevention Foreclosure Prevention
ProductsProducts BrokersBrokers
October 2007October 2007 141414
Insurance ScamsInsurance Scams
Free Medical TestsFree Medical Tests Free Medical ProductsFree Medical Products Cheap Prescriptions Cheap Prescriptions
October 2007October 2007 151515
SCIMMINGSCIMMING
Primarily Aimed at your Debit Primarily Aimed at your Debit CardCard
Gasoline RetailersGasoline Retailers RestaurantsRestaurants RetailersRetailers Now Taken over by Organized Now Taken over by Organized
CrimeCrime Use Gift/Green Dot CardsUse Gift/Green Dot Cards
October 2007October 2007 161616
Put Your Wallet on a DietPut Your Wallet on a Diet
Don’t carry your SSN card with Don’t carry your SSN card with youyou
Minimize number of credit Minimize number of credit cardscards
Don’t carry children’s SSN’sDon’t carry children’s SSN’s Minimize pieces of ID which Minimize pieces of ID which
carry SSNcarry SSN
October 2007October 2007 171717
CLEAN OUT YOUR CARCLEAN OUT YOUR CAR
Id’sId’s Credit CardsCredit Cards Check booksCheck books Old ReceiptsOld Receipts Medical CardsMedical Cards RecordsRecords
October 2007October 2007 181818
Protect Your CheckbookProtect Your Checkbook Don’t put your Social Security Don’t put your Social Security
number on your checks number on your checks Don’t carry blank checks or deposit Don’t carry blank checks or deposit
slipsslips Use specialized pens when writing Use specialized pens when writing
out checksout checks Shred all unused or old checksShred all unused or old checks Only use checks with merchants Only use checks with merchants
you knowyou know Use ATM card when possibleUse ATM card when possible Monitor your monthly statements Monitor your monthly statements
carefullycarefully
October 2007October 2007 191919
Debit or Credit?Debit or Credit?
Debit Cards = Your MoneyDebit Cards = Your Money Cash removed immediately from an Cash removed immediately from an
existing accountexisting account Limited time to report loss or unauthorized Limited time to report loss or unauthorized
use of carduse of card If loss is not reported, greater risk of If loss is not reported, greater risk of
losing all funds in accountlosing all funds in account
Credit Cards = Their MoneyCredit Cards = Their Money Allows consumers to buy goods and Allows consumers to buy goods and
services on creditservices on credit Greater protection from fraud loss if Greater protection from fraud loss if
reported within 60 daysreported within 60 days
October 2007October 2007 202020
Protect Your MailProtect Your Mail
Go to a U.S. Post Office when mailing Go to a U.S. Post Office when mailing bills or other important documentsbills or other important documents
Use a locked mailbox to send and Use a locked mailbox to send and receive all mailreceive all mail
Never leave mail unattended for Never leave mail unattended for pickuppickup
Monitor your mail for the regular items Monitor your mail for the regular items you receiveyou receive
Don’t utilize a community outbox (i.e. Don’t utilize a community outbox (i.e. at work)at work)
October 2007October 2007 212121
Shred, Destroy and Opt-OutShred, Destroy and Opt-Out Cross-cut shred papers you Cross-cut shred papers you
throw out, especially those with throw out, especially those with personal identifying informationpersonal identifying information
Destroy pre-approved credit Destroy pre-approved credit offers by shreddingoffers by shredding
Opt out of pre-approved credit Opt out of pre-approved credit card offers card offers
(888-5OPT-OUT)(888-5OPT-OUT)
October 2007October 2007 222222
Shoulder Surfing andShoulder Surfing andTelephone SolicitationsTelephone Solicitations
Never provide SSN to anyone unless they Never provide SSN to anyone unless they have a good reason for needing it. Watch have a good reason for needing it. Watch for eavesdroppers and ask for privacy for eavesdroppers and ask for privacy when conducting financial business.when conducting financial business.
Never provide personal information during Never provide personal information during a phone call which you did not initiate. a phone call which you did not initiate.
October 2007October 2007 232323
Safeguard Safeguard Your ComputerYour Computer
Keep Firewall, Antivirus, and Anti-Keep Firewall, Antivirus, and Anti-Spyware software updated, Spyware software updated, automatically is bestautomatically is best
Popup BlockersPopup Blockers Pop-ups are a perfect place to plant a Pop-ups are a perfect place to plant a
virus or Trojan program. You never virus or Trojan program. You never know who wrote the program, or that know who wrote the program, or that person’s intent. If you don’t know the person’s intent. If you don’t know the supplier, do not allow it to run or supplier, do not allow it to run or install! install!
Be aware of risks of malwareBe aware of risks of malware
October 2007October 2007 242424
Defend AgainstDefend AgainstSocial NetworkingSocial Networking
Myspace, Facebook, YouTubeMyspace, Facebook, YouTube Keep personal information Keep personal information
PERSONALPERSONAL Remember these are not your Remember these are not your
friendsfriends Question profiles – presume they Question profiles – presume they
may be falsemay be false Blogs and Chat Rooms can be Blogs and Chat Rooms can be
used as a way to find out more used as a way to find out more about you, for criminal purposesabout you, for criminal purposes
October 2007October 2007 252525
On-Line / InternetOn-Line / InternetExperienceExperience
Use secure web sites for Use secure web sites for financial transactionsfinancial transactions Paying bills on linePaying bills on line Managing financial accountsManaging financial accounts
Implement password protectionImplement password protection This includes your user This includes your user
accounts, wireless routers, accounts, wireless routers, online accounts, and perhaps online accounts, and perhaps even stored spreadsheets even stored spreadsheets that are privatethat are private
October 2007October 2007 262626
Peer-to-PeerPeer-to-PeerSafeguardsSafeguards
These are programs like Limewire, These are programs like Limewire, Kazaa, SoulSeek.Kazaa, SoulSeek.
Do not store personal or financial Do not store personal or financial information on the same computer information on the same computer you use for file sharing. you use for file sharing.
Check the security preferences for Check the security preferences for the program you are using. See if the program you are using. See if you can set it so that only designated you can set it so that only designated folders can be accessed by the file folders can be accessed by the file sharing program. sharing program.
Look into encrypting personal and Look into encrypting personal and vital information. Some newer vital information. Some newer computers come with this function computers come with this function already built in. already built in.
October 2007October 2007 272727
Areas Beyond Areas Beyond Your ControlYour Control
Areas beyond your control:Areas beyond your control: Any database where your Any database where your
personal information is on filepersonal information is on file An employee who processes a An employee who processes a
purchase you make and steals purchase you make and steals the informationthe information
A company that handles your A company that handles your financial datafinancial data
October 2007October 2007 282828
Data BreachesData Breaches ITRC Breach Data as of ITRC Breach Data as of
12/31/07:12/31/07: 446 breaches affecting more than 446 breaches affecting more than
127 million individual records127 million individual records
ITRC Breach Data as of ITRC Breach Data as of 10/1/2008:10/1/2008: 516 breaches affecting more than 516 breaches affecting more than
30.3 million records30.3 million records
October 2007October 2007 292929
Be Pro-ActiveBe Pro-ActiveOrder Credit ReportsOrder Credit Reports
Order free credit reportsOrder free credit reports 877-322-8228877-322-8228
Stagger requestsStagger requests Review credit reports carefullyReview credit reports carefully Review monthly bank and Review monthly bank and
credit card statements or credit card statements or review account transactions review account transactions onlineonline
October 2007October 2007 303030
Extra PrecautionExtra PrecautionPlace a Credit FreezePlace a Credit Freeze
Consider the possibility of Consider the possibility of placing a credit freeze on your placing a credit freeze on your credit filecredit file Assist elderly family members Assist elderly family members
in placing them on their credit in placing them on their credit filesfiles
See How to “Freeze” Your See How to “Freeze” Your Credit Files: Credit Files: www.oispp.ca.gov/consumer_privacy/conwww.oispp.ca.gov/consumer_privacy/consumer/documents/pdf/cis10securityfreeze.sumer/documents/pdf/cis10securityfreeze.pdfpdf
October 2007October 2007 313131
If a Victim, First StepsIf a Victim, First Steps
Place a “Fraud Alert” on your Place a “Fraud Alert” on your credit reportscredit reports
Close Affected AccountsClose Affected Accounts File a Police ReportFile a Police Report Report the crime to the Federal Report the crime to the Federal
Trade CommissionTrade Commission Contact the ITRCContact the ITRC
October 2007October 2007 323232
Negative TrendsNegative Trends San Diego’s # 1 crime: Vehicle break San Diego’s # 1 crime: Vehicle break
insins Stealing items which can be used to Stealing items which can be used to
commit identity theftcommit identity theft Data on the move – laptops or flash Data on the move – laptops or flash
drivesdrives Insider theft - by employees or othersInsider theft - by employees or others ScamsScams Misuse of information -children and the Misuse of information -children and the
deceaseddeceased
October 2007October 2007 333333
PredictionsPredictions Negative:Negative:
More cases linked to Meth More cases linked to Meth use/dealinguse/dealing
Large scale ID brokering Large scale ID brokering worldwideworldwide
More sophisticated attacks and More sophisticated attacks and development of identity theft ringsdevelopment of identity theft rings
Younger thievesYounger thieves
Positive:Positive:New policing and legislative New policing and legislative solutionssolutions
October 2007October 2007 343434
The Bottom LineThe Bottom Line
The only successful way to fight The only successful way to fight identity theft will be with a team identity theft will be with a team
approach. approach.
Each of us has to be more vigilentEach of us has to be more vigilent
Businesses, law enforcement, Businesses, law enforcement, governmental agencies, legislators governmental agencies, legislators and consumers must combine their and consumers must combine their efforts to stem the growth of identity efforts to stem the growth of identity
theft.theft.
October 2007October 2007 353535
QuestionsQuestions