Identity Theft A personal perspective - PowerPoint PPT Presentation

identity theft a personal perspective n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Identity Theft A personal perspective PowerPoint Presentation
Download Presentation
Identity Theft A personal perspective

play fullscreen
1 / 37
Identity Theft A personal perspective
1 Views
Download Presentation
gwyneth
Download Presentation

Identity Theft A personal perspective

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Identity TheftA personal perspective Jon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training Specialist Kevin Helpert Police Lieutenant Protect Your Past, Secure Your Future

  2. Introduction Source: FTC Sentinel Report Identity crime is a widespread crime in the United States. Identity theft was not formally recognized as a specific federal offense until 1998 when Congress passed a law, the Identity Theft and Assumption Deterrence Act. The Federal Trade Commission (FTC) reported that for 2009 ID Theft continued to top the list of consumer complaints and accounted for over 21% of all complaints. The median value gained by thieves using ID theft is $500. Protect Your Past, Secure Your Future

  3. General Facts and Projections Source: FTC Sentinel Report According to the 2006 FTC Identity Theft Survey Report, approx. 8.3 million American consumers were victimized. Misuse of existing credit cards accounted for 38% of all cases Victims of new account fraud spent an average of 10 hours to resolve the issue with some spending in excess of 100 hours Protect Your Past, Secure Your Future

  4. General Facts and Projections(continued) Computers, the internet, and cell phones have made this type of crime quick and easy. Prior to 2003, U.S. Department of Justice studies revealed 98% of ID thieves went free. ID theft victims are usually victimized again… after 90 days because the victim has restored their credit and the suspect still has the personal information of the victim. Terrorist groups, including 9-11-01, are among those funded by identity theft. Protect Your Past, Secure Your Future

  5. Identity Theft by State(on per-capita basis) Source: FTC Sentinel Report Rank State Victims/100,000 1 Arizona 137.1 2 California 120.1 3 Nevada 114.2 4 Texas 107.9 5 Florida 105.6 6 New York 100.1 7 Georgia 91.6 8 Colorado 89.0 9 New Mexico 87.5 10 Maryland 85.8 Protect Your Past, Secure Your Future

  6. Identity Theft Types Source: FTC Sentinel Report Credit card fraud 23% Utilities Fraud 18% Bank fraud 13% Employment- related fraud 14% Other (medical/ child support, etc) 13.4% Loan fraud 5% Protect Your Past, Secure Your Future

  7. ID Theft Victims by Age Source: FTC Sentinel Report Under 19 years of age 2% Ages 20 to 29 19% Ages 30 to 39 23% Ages 40 to 49 24% Ages 50 to 59 20% Ages 60 to 69 8% Age 70 and older 4% Protect Your Past, Secure Your Future

  8. Other Victim Data Race or Ethnicity is not a significant factor. Household incomes of more than $75,000 per year are targeted more often. Urban vs. Rural: individuals in urban/ suburban settings are almost twice as likely to be victimized than rural individuals. Protect Your Past, Secure Your Future

  9. Objectives With this information, you will be better informed if you become a victim, able to start the process of recovery after becoming a victim, and know who to contact along with access to free resources. Protect Your Past, Secure Your Future

  10. Points of Discussion General identity theft information How easy it is to become a victim Mistakes we make How you can assist during an investigation if you become a victim Protect Your Past, Secure Your Future

  11. Various frauds Scams Counterfeit ID’s Altered checks Counterfeit checks Stolen credit cards Stolen ID’s Fraudulent social security cards Types of Identity Theft Protect Your Past, Secure Your Future

  12. Sources of information • Burglaries • Telephone solicitations • Stolen wallets and purses • Property records • Court records • Marriage and divorce certificates • Hacked computer information • On-line purchases • Mailbox (look for flags in up position) Protect Your Past, Secure Your Future

  13. Sources of information(Continued) • Product warranty cards • Change of address • Dumpster or trash diving • Posing as a landlord to obtain credit report • Shoulder surfing • Cell phones with picture/video capabilities • ‘Phishing’ through the internet and phone • Sales Clerks, bank clerks, etc. who copy personal application information Protect Your Past, Secure Your Future

  14. Sources of information(Continued) • Waiters and other store employees who use ‘skimmers’ and sell information • People searches on the internet • Lost or stolen receipts • Written checks (computer programs and scanners) • Credit card verification scam (e-mail or phone) Protect Your Past, Secure Your Future

  15. Information from mail • Telephone & utility bills (name, phone #, address, acct #) • Credit card statement (name, address, card #, limit, exp, type • Bank statement (name, address, bank name, account #, checks) • Boxes of checks (blank checks ready to use) • Credit card offers (name, address, contact #) • Paychecks and stubs (name, address, employer, acct #, SSN) • Retirement statements (name, address, acct #, balance, employer contact information, SSN) • Annual SS statement (name, address, SSN #’s (spouse & dependants) • W-2’s and other tax forms (everything needed to assume your ID) Protect Your Past, Secure Your Future

  16. Social Networks • Exposing security question answers • But my profile is private • Location data • Including embedded photo data • Identity thieves are information miners Protect Your Past, Secure Your Future

  17. Tips to protect yourself • Write “check ID” on back side of credit card and sign • Keep credit card in sight • Drop bills off at post office (or pay with cashiers check) • Pick up boxes of checks at bank personally • Do not respond to e-mails asking for personal information, call your credit card company from a number listed on the statement Protect Your Past, Secure Your Future

  18. Personal Story • Amy can you describe for us the events that you believe lead to you becoming a victim of identify theft Protect Your Past, Secure Your Future

  19. Security Freeze Called anti-identity theft freeze Allows individuals to block access to their credit reports until they personally unlock the files by contacting the credit bureaus and providing a PIN number Without the code, a fraudster cannot open an account in their name Cost nothing for victims of ID theft, approx. $10.00 for anyone else Protect Your Past, Secure Your Future

  20. Security Freeze Write all three credit bureaus with the request For more information… log onto www.ftc.gov Provide… name, address for last 5 years, SSN, DOB, 2 proofs of address (bills?), and a copy of the police report if a victim, along with completing a fraud affidavit Protect Your Past, Secure Your Future

  21. Social Engineering Do you know who worked on your computer? Did the person you sign in for watch you type your password? Have you ever walked away from your computer and left it unlocked? Protect Your Past, Secure Your Future

  22. Prevent Social Engineering Lock your computer when you are away from the desk Verify that anyone working on your computer has an picture ITS badge or is authenticated through the helpline Never share any account passwords Protect Your Past, Secure Your Future

  23. Phishing the new SPAM A combination of attacks to yield personal information Hard to tell a legitimate email Will not go away Protect Your Past, Secure Your Future

  24. Protect Your Past, Secure Your Future

  25. Spearing Protect Your Past, Secure Your Future

  26. Account Security • Pick a good password • Minimum of 8 characters in length • Must contain 3 out of 4 categories • Upper case, lower case, number and symbol • Never share your password • Lock or logout of a computer when you leave it. Protect Your Past, Secure Your Future

  27. Protect Your Data Verify that Windows/Mac Updates are being applied to your computer Check that Symantec Antivirus is up to date Protect Your Past, Secure Your Future

  28. Social Security Number The Social Security Number policy governs the use of SSN on campus Any new retention of SSN electronic or on paper must be approved by the CIO Old stores of SSN should be protected or deleted. Protect Your Past, Secure Your Future

  29. Personal Story • Amy can you talk about how you realized you were a victim of identity theft? Protect Your Past, Secure Your Future

  30. If you become a victim…(Continued) Organize a file of all related paperwork for easy access Follow up in writing with all contacts made by phone or in person a. Use certified mail, with return receipt requested b. Keep copies of all correspondence or forms used c. Keep all originals if possible File a complaint with the FTC (ask for any information or paperwork) Protect Your Past, Secure Your Future

  31. If you become a victim Place a fraud alert on credit reports, then review reports a. Once one credit bureau is contacted, the other two should automatically be notified to place alerts… *but check for yourself ! b. All three bureaus should send the victim information c. Get copies for law enforcement Protect Your Past, Secure Your Future

  32. If you become a victim… • Contact any credit card companies • Contact the local law enforcement agency • Close any accounts that have been tampered or opened fraudulently • Close all checking and savings accounts that could be affected • Retrieve copies of bank and credit card statements, and note fraudulent items Protect Your Past, Secure Your Future

  33. If you become a victim…(Continued) • Contact the check verification companies • Contact the major credit reporting bureaus • Contact the Social Security Administrative offices if Social Security number used (800-269-0271) Protect Your Past, Secure Your Future

  34. Remember If your Baylor University ID card is lost or stolen… deactivate your card on-line immediately (DO NOT WAIT!!!!!!!!). By doing so, you lessen the chances of a potential suspect to gain unauthorized access to a building or dorm. This also prevents the card from being used like a credit card (Example: BearBucks and the BU Bookstore). **Go to Cashier’s office webpage… click on “ID Card”… click on “Lost/ Stolen ID Card Link” Protect Your Past, Secure Your Future

  35. Personal Story • Amy where is your case of identity theft today? Protect Your Past, Secure Your Future

  36. Baylor Police Department(254)710-2222 Protect Your Past, Secure Your Future

  37. Questions??? Protect Your Past, Secure Your Future