1 / 32

IDENTITY THEFT: Information for Personal Awareness, Response, Resources

tahir
Download Presentation

IDENTITY THEFT: Information for Personal Awareness, Response, Resources

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. IDENTITY THEFT: Information for Personal Awareness, Response, Resources

    2. Identity Theft A Rapidly Growing Problem in America! What is it? How is it done? How can You protect yourself? What to do if this should happen to You!

    3. 1992: Trans Union reported 35,235 complaints of ID theft 1997: Trans Union reported 522,922 complaints. U.S. Secret Service reported ID Theft losses $745m. 1999: Social Security Administration reported more than 39,000 cases of SSN abuse. Fed Trade Commission reported 700,000 victims of ID theft 2000: Independent study found 1 in 5 Americans victimized. On average, victims spend 175 hours and $808 to clear name Scope of the Problem?

    4. What is it? Identity Fraud/Theft the obtaining of another persons identity for the purpose of obtaining goods and/or services in that persons name. The affects of this can range from bad credit to catastrophic!!!

    5. Why is it increasing? Easy to accomplish. Hard to identify /catch the culprit. Can use your identity to facilitate a variety of crimes.

    6. Most common ways to steal? Theft of SSN Theft of Credit Card Numbers Theft of Drivers License (The internet greatly aids these criminals)

    7. How info obtained? The old fashion way of stealing your wallet, usually containing your Drivers license (DOB), SSN, and valid credit cards (all these contain your name). Trashing-Stealing credit card receipts from business trash cans. From USG documentation. The Internet opens numerous doors for these criminals.

    8. In the electronic era, your identity begins and ends with your social security number. An ID thief does not need your signature, fingerprints, photo, PINs, mothers maiden name, or credit card expiration dates to exploit your name and credit reputation. How it Starts

    9. Some credit card issuers will let you apply and be approved over the internet Theyll want to know your name, ssn, address, employment history, salary, etc Instant credit or correspondence via e-mail Applying for Credit

    10. Now the Bad Guy can... Apply for several credit cards. Open bank accounts and write bad checks. Take out loans. Rent an apartment/house. Have utilities turned on. RememberAll this is in YOUR NAME! Big deal? You betcredit and other issues could have an impact during security clearance background investigations.

    11. It can happen to anyone. . Interested in specifics? Military One case in DoD involved 1300 victims around the world 2000 case on Okinawa resulted in GCM conviction of USN member who targeted at least three senior officers in his command. Cases prosecuted in Federal Court? www.consumer.gov/idtheft/cases.htm

    12. NCIS Case - November 1999 Alerted to possible case targeting senior officers Subject using ssns to open credit card accounts in Delaware Obtained from Congressional record available on-line 4371 names and ssns listed

    13. Investigation revealed 1301 victims (as of March 00) All services, active duty and retired 181 Navy and Marine Corps Some victims targets by multiple suspects

    14. LE Response Task Force created. US Secret Service, NCIS, et al Nationwide investigation Findings/Action: NCIS idd on-line threat in 1993! IDd 284 additional fraudulent accts in one day IDd 700 fraudulent accounts Prevention of additional fraud Financial institutions notified Victims and potential victims notified by mail

    15. Investigation results 3 arrests Additional suspects under investigation Loss at one bank - $1.5m Credit issues for 1300+ victims SSNs still available on-line

    16. 5 steps to help protect yourself Add fraud alerts added to your credit file with the three major credit bureaus. Remove your personal information from the major commercial marketing databases/lists. Create an emergency phone list. Learn the basics of internet security. Implement basic security habits into your daily life.

    17. Fraud Alerts - provide the strongest protection against stolen identity credit thefts. - Is a system wherein the creditor must call you personally concerning any credit applications submitted to ensure you applied for the credit. - Is easy and free to accomplish! - The credit bureaus do not publicize this service until after you have become a victim. (WHY? They hope you will be able to obtain credit and instantly to induce buying impulses!)

    18. How to initiate Fraud Alert: Send a letter that is 100 words or less. Include all your identifying information to include a photocopy of your drivers license and a utility bill to prove your current address. Equifax P.O. Box 740241 Atlanta, GA 30374-0250 www.equifax.com Experian (Formerly TRW) P.O. Box 1017 Allen, TX 75013 www.experian.com Trans Union P.O. Box 390 Springfield, Pa. 19064 www.tuc.com

    19. Remove yourself from Mailing Lists You cant buy anything these days without having to file forms with personal information; such as warranty cards, registration card, etc. This information is maintained for future mailing lists and sold to Direct Marketers. Believe it or not, you control what information these mailing lists contain about you and whether or not they can use it, disseminate it, or maintain it. To learn how to do this, contact: www.e-mps.org

    20. Create an Emergency Phone List If you initiate Fraud Alerts, then virtually the only way to be victimized is the theft/loss of your valid credit (cards). Create a list of emergency phone numbers to cancel your accounts with your various creditors. Account Numbers to have? ATM Cards SSNs Passports Drivers Lic Credit Cards Keep this information in a safe place and not on your person.

    21. Basic Security Habits Before giving out any personal information, ask yourself, Do I really have to give out this information and why? Dont answer personal questions on the Internet, WWW, or on the telephone unless you are certain the location/site is secure, or you know who is on the other end. Dont carry your SSN Card in your wallet or purse. Resist the urge to place your SSN and other personal information on your checks.

    22. Additional Steps You Can Take If you think you have been victimized Contact the Social Security Administration to determine possible use of your SSN for employment or benefits Contact Telephone, Electrical, Gas and Water utilities to identify possible attempts to initiate service using your identity Contact the U.S. State Department to determine if application has been made for a new passport.

    23. Basic Internet Security The Internet is not the enemy of personal privacy--you just need to know how it works. Encryption technology is used to secure web-sites. Never enter personal information on an unsecured web-site. A secure web-site is easily identifiable. In the top left corner of the browser the Internet address can be found starting with a http:// however on a secure web-site this will appear as https://

    24. Other things to think about Shopping on-line Other general information to consider

    25. What if it happens to you? This is an issue that needs to be resolved for several reasons. Your credit history may be impacted. Your security clearance may be effected. If you are victimized, anticipate working closely with law enforcement. Take note, however, that the involvement of law enforcement in your case may depend on the extent of victimization and available resources. Our goal? arrest and prosecution your goal? clearing your name and history.

    26. Prior to meeting with MPI/NCIS or other Law Enforcement agency Compile background information Law Enforcement will need:

    27. Personal considerations Have you received un-solicited offers of pre-approved credit in the mail? Have you properly disposed of those you chose to? Do you properly handle and dispose of financial or other mail containing your personal information? Do you check out web sites before you order on-line? (Remember, anyone can create a web page) Have you ordered and reviewed a copy of your credit history within the past 2 years? Do you ask why when asked for your ssn or other personal information? Have you ever asked where that information is stored, how its protected, or who has access after you give it?

    28. Resources Law Enforcement Other

    29. Law Enforcement Resources including but not limited to: Camp S.D. Butler Provost Marshall MPI: 645-7347 NCISRA Okinawa: 645-0506 U.S. Naval Criminal Investigative Service www.ncis.navy.mil U.S. Secret Service www.treas.gov FBI/Internet Complaint Center www.ifccfbi.gov National White Collar Crime Center www.nw3c.org

    30. Other resources including but not limited to: Identity Theft Resource Center www.idtheftcenter.org Federal Trade Commission www.consumer.gov/idtheft 1-877-ID-THEFT Social Security Administration www.ssa.gov U.S. State Department www.travel.state.gov/passport_services Direct Marketing Association www.e-mps.org

    31. Ordering on-line? Read the information on the web site thoroughly before you place your order does it have spelling errors? Does it make claims that seem hard to believe? Do they have a telephone number and street address (not a PO Box). Make certain the web site is secure before you enter your personal information or credit card number. Read over the companys Privacy policy. Shopping on-line with companies located in the United States may be easier to work with if there is a problem later. After you place your order, print a copy of your order form. Keep your password private Check your credit card bills closely for several months after the transaction for unauthorized purchases. Check your credit history once a year for any new accounts opened

    32. Other considerations When shopping in public, use caution when providing credit card or other personal information. Resist the temptation to put ssn and other personal info on checks. Properly dispose of personal, financial or medical information by shredding, tearing up, etc. Plan to get a copy of your credit report for review every two years looking for accounts you didnt establish. Be wary of telephone calls soliciting personal or account information.

    33. Remember, the best protection you have is your attention to your information

More Related