1 / 23

Your ID, My ID

Your ID, My ID. AGA/ACFE Fraud and Technology Seminar October 17, 2007. People Places Things Events. What Crooks Look For:. People. Many Different Search Capabilities Free or Fee-For-Service Addresses & Phone Numbers Other Relations A LOT of information is already tracked

conroy
Download Presentation

Your ID, My ID

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Your ID, My ID AGA/ACFE Fraud and Technology Seminar October 17, 2007

  2. People Places Things Events What Crooks Look For:

  3. People • Many Different Search Capabilities • Free or Fee-For-Service • Addresses & Phone Numbers • Other Relations • A LOT of information is already tracked • A LOT of people know WHO YOU ARE

  4. People • Yahoo People Search, White Pages, 411 • ZabaSearch • Intelius • Veromi • Reverse Look-ups • Phone Numbers • Addresses • Check Point, Lexis-Nexis

  5. Places • Maps & Directions • 2D, 3D, & Arial • Place Names or Locations • Physical Addresses and Areas

  6. Things • Topical Searches • Boolean Logic • Refine and Narrow Results • Acronyms and Aliases/AKAs • Common Misspellings

  7. Events • Who, What, When, Where, How • Known Particulars & Facts • Possible/Plausible Circumstances • Boolean Logic • Welcome to the “Else’s” • Who Else, What Else, When Else, etc.

  8. Boolean Logic • Mathematical in Nature • Use of “AND”, “OR”, and “NOT” • Also includes exact counterparts • “But Not” is synonymous with “And Not” Elements and Sets Use of Quotation Marks Use of Character Strings

  9. SSN Death Index • SSDI Database • Fairly Robust Search Capabilities

  10. Examples of Searches • Let’s Find Ross McDonald • Name? Address? Telephone Numbers? Other Info? • Which is the “right” Ross? • What Other Info is Available about Ross?

  11. What If Your ID is Stolen? 1st Four Steps to Consider: 1. Place a Fraud Alert on your Credit Report o Review your Credit Reports • Once Fraud Alert Placed, You can get a copy of your credit report from each company • Ask Credit Reporting companies to only list your last 4 digits of your SSN on their reports

  12. What If Your ID is Stolen? 2. Close Accounts that have been tampered with or fraudulently opened o Call the security or fraud department of each company which has the account o Send info via certified/return receipt mail o Never send originals, only copies o File a dispute on any charges in question

  13. What If Your ID is Stolen? • File a complaint with the FTC o Use online form or call 1-877-ID THEFT o Sharing info with FTC allows sharing across all states o Provide copy of FTC complaint to police to include in their police report o Constitutes an ID Theft Report o Can be used to permanently block info from being filed on your credit report, ensures debts do not reappear on your credit report, prevents a company from attempting to collect on debts resulting from ID theft, and places an external fraud alert on your credit report.

  14. What If Your ID is Stolen? • File a Report with your Local Police o Check also with AG Office o Bring FTC complaint, letters, and other supporting documentation o Ask that FTC complaint be incorporated in their report o Ask for copy of Local Police ID Theft Report o Use to dispute other instances, as they arise

  15. What is a Fraud Alert Good For? Initial Fraud Alert is good for 90 days on Credit Reports o Keeps thief from opening new accounts Extended Fraud Alert is good for 7 years o Potential creditors MUST contact you directly o Consumer reporting agencies MUST remove your name from marketing lists for pre-screened offers for 5 years, unless you ask them to put you back on their lists

  16. Search Engines • Google http://www.google.com/ • Yahoo http://www.yahoo.com/ • Dogpile http://www.dogpile.com/ • AltaVista http://www.altavista.com/ • WebCrawler http://www.webcrawler.com/ • MetaCrawler http://www.metacrawler.com/ • Lycos http://www.lycos.com/ • Ask http://www.ask.com/ • MSN http://www.msn.com/

  17. People Look-Ups/Search/Finder • Yahoo People http://people.yahoo.com/ • AnyWho (AT&T) http://www.anywho.com/ • People Lookup http://www.peoplelookup.com/ • InfoSpace http://www.infospace.com/ • WhitePages http://www.whitepages.com/ • AOL People Lookup http://peopleconnection.aol.com/main/ • Veromi www.veromi.net • Intelius www.intelius.com • Zabasearch www.zabasearch.com

  18. Reverse Look-Ups/Search/Finder • People Lookup http://www.peoplelookup.com/reverse-phone-lookup.html • MSN http://www.whitepages.com/reverse_address

  19. Pay Sites • US Search http://www.ussearch.com/consumer/allproducts.jsp • CheckPoint Systems http://www.checkpointsystems.com/ • Lexis-Nexis http://global.lexisnexis.com/us • Searchsystems.net http://www.searchsystems.net/

  20. Other Information • Maps http://maps.yahoo.com • News Sources Many, many, many • Business Look-up Dunn & Bradstreet, Manta, etc. • Internet Sites Whois • Old SSNs/Death Index http://ssdi.rootsweb.com

  21. How Your ID Can Be Stolen • Readily Available Public Records • Purchased Records and Other Info • Credit Reports • Credit Offers – Email, Phone, Mail • Other Phone/Email/Mail Phishing Scams • Information from others, such as family

  22. How Your ID Can Be Stolen • Interception of Records (electronic or hardcopy) • Legitimate Purchase of Records & Info • Stolen from a 3rd Party • Malware, Cookies, & Key Loggers • Compromised Websites • ISP Intrusions • Many Other Ways

  23. Any Questions?

More Related