IDENTITY THEFT: Information for Personal Awareness, Response, Resources

IDENTITY THEFT: Information for Personal Awareness, Response, Resources PowerPoint PPT Presentation

  • Uploaded on
  • Presentation posted in: General

Download Presentation

IDENTITY THEFT: Information for Personal Awareness, Response, Resources

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript

1. IDENTITY THEFT: Information for Personal Awareness, Response, Resources

2. Identity Theft A Rapidly Growing Problem in America! What is it? How is it done? How can You protect yourself? What to do if this should happen to You!

3. 1992: Trans Union reported 35,235 complaints of ID theft 1997: Trans Union reported 522,922 complaints. U.S. Secret Service reported ID Theft losses $745m. 1999: Social Security Administration reported more than 39,000 cases of SSN abuse. Fed Trade Commission reported 700,000 victims of ID theft 2000: Independent study found 1 in 5 Americans victimized. On average, victims spend 175 hours and $808 to clear name Scope of the Problem?

4. What is it? Identity Fraud/Theft the obtaining of another person’s identity for the purpose of obtaining goods and/or services in that person’s name. The affects of this can range from bad credit to catastrophic!!!

5. Why is it increasing? Easy to accomplish. Hard to identify /catch the culprit. Can use your identity to facilitate a variety of crimes.

6. Most common ways to… steal? Theft of SSN Theft of Credit Card Numbers Theft of Driver’s License (The internet greatly aids these criminals)

7. How info obtained? The old fashion way of stealing your wallet, usually containing your Driver’s license (DOB), SSN, and valid credit cards (all these contain your name). Trashing-Stealing credit card receipts from business trash cans. From USG documentation. The Internet opens numerous doors for these criminals.

8. In the electronic era, your “identity” begins and ends with your social security number. An ID thief does not need your signature, fingerprints, photo, PIN’s, mother’s maiden name, or credit card expiration dates to exploit your name and credit reputation. How it Starts

9. Some credit card issuers will let you apply and be approved over the internet They’ll want to know your name, ssn, address, employment history, salary, etc Instant credit or correspondence via e-mail Applying for Credit

10. Now the “Bad Guy” can... Apply for several credit cards. Open bank accounts and write “bad” checks. Take out loans. Rent an apartment/house. Have utilities turned on. Remember—All this is in YOUR NAME! Big deal? You bet…credit and other issues could have an impact during security clearance background investigations.

11. It can happen to anyone. . Interested in specifics? Military One case in DoD involved 1300 victims around the world 2000 case on Okinawa resulted in GCM conviction of USN member who targeted at least three senior officers in his command. Cases prosecuted in Federal Court?

12. NCIS Case - November 1999 Alerted to possible case targeting senior officers Subject using ssn’s to open credit card accounts in Delaware Obtained from Congressional record available on-line 4371 names and ssn’s listed

13. Investigation revealed 1301 victims (as of March 00) All services, active duty and retired 181 Navy and Marine Corps Some victims targets by multiple suspects

14. LE Response Task Force created. US Secret Service, NCIS, et al Nationwide investigation Findings/Action: NCIS id’d on-line threat in 1993! ID’d 284 additional fraudulent accts in one day ID’d 700 fraudulent accounts Prevention of additional fraud Financial institutions notified Victims and potential victims notified by mail

15. Investigation results 3 arrests Additional suspects under investigation Loss at one bank - $1.5m Credit issues for 1300+ victims SSN’s still available on-line…

16. 5 steps to help protect yourself Add fraud alerts added to your credit file with the three major credit bureaus. Remove your personal information from the major commercial marketing databases/lists. Create an emergency phone list. Learn the basics of internet security. Implement basic security habits into your daily life.

17. Fraud Alerts… - provide the strongest protection against stolen identity credit thefts. - Is a system wherein the creditor must call you personally concerning any credit applications submitted to ensure you applied for the credit. - Is easy and free to accomplish! - The credit bureaus do not publicize this service until after you have become a victim. (WHY? They hope you will be able to obtain credit and instantly to induce buying impulses!)

18. How to initiate Fraud Alert: Send a letter that is 100 words or less. Include all your identifying information to include a photocopy of your driver’s license and a utility bill to prove your current address. Equifax P.O. Box 740241 Atlanta, GA 30374-0250 Experian (Formerly TRW) P.O. Box 1017 Allen, TX 75013 Trans Union P.O. Box 390 Springfield, Pa. 19064

19. Remove yourself from Mailing Lists You can’t buy anything these days without having to file forms with personal information; such as warranty cards, registration card, etc. This information is maintained for future mailing lists and sold to Direct Marketers. Believe it or not, you control what information these mailing lists contain about you and whether or not they can use it, disseminate it, or maintain it. To learn how to do this, contact:

20. Create an Emergency Phone List If you initiate Fraud Alerts, then virtually the only way to be victimized is the theft/loss of your valid credit (cards). Create a list of emergency phone numbers to cancel your accounts with your various creditors. Account Numbers to have? ATM Cards SSN’s Passports Drivers Lic Credit Cards Keep this information in a safe place and not on your person.

21. Basic Security Habits Before giving out any personal information, ask yourself, “Do I really have to give out this information and why?” Don’t answer personal questions on the Internet, WWW, or on the telephone unless you are certain the location/site is secure, or you know who is on the other end. Don’t carry your SSN Card in your wallet or purse. Resist the urge to place your SSN and other personal information on your checks.

22. Additional Steps You Can Take If you think you have been victimized… Contact the Social Security Administration to determine possible use of your SSN for employment or benefits Contact Telephone, Electrical, Gas and Water utilities to identify possible attempts to initiate service using your identity Contact the U.S. State Department to determine if application has been made for a “new” passport.

23. Basic Internet Security The Internet is not the enemy of personal privacy--you just need to know how it works. Encryption technology is used to secure web-sites. Never enter personal information on an unsecured web-site. A secure web-site is easily identifiable. In the top left corner of the browser the Internet address can be found starting with a http:// however on a secure web-site this will appear as https://

24. Other things to think about Shopping on-line Other general information to consider

25. What if it happens to you? This is an issue that needs to be resolved for several reasons. Your credit history may be impacted. Your security clearance may be effected. If you are victimized, anticipate working closely with law enforcement. Take note, however, that the involvement of law enforcement in your case may depend on the extent of victimization and available resources. Our goal? arrest and prosecution your goal? clearing your name and history.

26. Prior to meeting with MPI/NCIS or other Law Enforcement agency Compile background information Law Enforcement will need:

27. Personal considerations Have you received un-solicited offers of pre-approved credit in the mail? Have you properly disposed of those you chose to? Do you properly handle and dispose of financial or other mail containing your personal information? Do you check out web sites before you order on-line? (Remember, anyone can create a web page…) Have you ordered and reviewed a copy of your credit history within the past 2 years? Do you ask why when asked for your ssn or other personal information? Have you ever asked where that information is stored, how its protected, or who has access after you give it?

28. Resources Law Enforcement Other

29. Law Enforcement Resources including but not limited to: Camp S.D. Butler Provost Marshall – MPI: 645-7347 NCISRA Okinawa: 645-0506 U.S. Naval Criminal Investigative Service U.S. Secret Service FBI/Internet Complaint Center National White Collar Crime Center

30. Other resources including but not limited to: Identity Theft Resource Center Federal Trade Commission 1-877-ID-THEFT Social Security Administration U.S. State Department Direct Marketing Association

31. Ordering on-line? Read the information on the web site thoroughly before you place your order… does it have spelling errors? Does it make claims that seem hard to believe? Do they have a telephone number and street address (not a PO Box). Make certain the web site is secure before you enter your personal information or credit card number. Read over the company’s Privacy policy. Shopping on-line with companies located in the United States may be easier to work with if there is a problem later. After you place your order, print a copy of your order form. Keep your password private Check your credit card bills closely for several months after the transaction for unauthorized purchases. Check your credit history once a year for any new accounts opened

32. Other considerations When shopping in public, use caution when providing credit card or other personal information. Resist the temptation to put ssn and other personal info on checks. Properly dispose of personal, financial or medical information by shredding, tearing up, etc. Plan to get a copy of your credit report for review every two years – looking for accounts you didn’t establish. Be wary of telephone calls soliciting personal or account information.

33. Remember, the best protection you have is your attention to your information

  • Login