46
Identity Theft A Presentation for the Florida Association of Computer User Groups Saturday March 8, 2008 Hewie Poplock [email protected]

Identity Theft A Presentation for the

Embed Size (px)

Citation preview

Page 1: Identity Theft A Presentation for the

Identity Theft

A Presentation for theFlorida Association of Computer User Groups

Saturday March 8, 2008

Hewie [email protected]

Page 2: Identity Theft A Presentation for the

What is Identity Theft?

According to the non-profit Identity Theft Resource Center, identity theft is sub-divided into four categories:

1. Financial Identity Theft

2. Criminal Identity Theft

3. Identity Cloning

4. Business/Commercial Identity Theft

Page 3: Identity Theft A Presentation for the

Today

We are going to talk about

Financial Identity Theft

Page 4: Identity Theft A Presentation for the

Ways Identity Theft Can Occur

Thieves:• Steal wallets and purses • Steal mail• Complete a change of address• Rummage through trash known as

“dumpster diving” • Find personal information in homes • Use personal information individuals share

on the Internet • Send e-mail posing as legitimate companies

or government agencies (phishing)

Page 5: Identity Theft A Presentation for the

Ways Identity Theft Can Occur

• Business record theft

• Eavesdrop (shoulder surfing)

• Drive by (pharming)

• Browse social network

• Simple research

Page 6: Identity Theft A Presentation for the

Trends

The 2006 Identity Fraud Report offers 10 key data points on identity fraud:

1. The number of adult victims of identity fraud has increased dramatically in 2007

2. The average fraud amount has increased

3. The vast majority of identity fraud victims (68%) incur no out-of-pocket expenses

4. Victims are spending more time to resolve identity fraud cases

Means of Access

5. 90 percent of data compromise takes place through traditional offline channels

Page 7: Identity Theft A Presentation for the

Trends (con’t)

6. Lost or stolen wallets, checkbooks or credit cards continue to be the primary source

7. Almost half (47 %) of all identity theft is perpetrated by someone known

8. Nearly 70 % of consumers are shredding document

Demographic differences:

9. The 65+ demographic age group has the smallest rate of identity fraud victims (2.3%).

10.The 35-44 demographic age group has the highest average fraud amount ($9,435).

Page 8: Identity Theft A Presentation for the

ID theft is only going to get worse

• The loss or theft of personal data soared in 2007

• Institutions are spending more to protect data, the investment often is too little, too late.

• More data breaches - responding in a reactive way

• Fourfold increase in 2007 from 2006

• Attrition.org, estimates more than 162 million records compromised through 2007

Mark Jewell The associated press December 31, 2007 BOSTON, OrlandoSentinel.com

Page 9: Identity Theft A Presentation for the

Time

• Hours resolving ID Theft - 40 to 1,200 hours.

• Most difficult part was the dispute resolution process, then the practical consequences and by the emotional impact and stress.

• More than half did not discover the fraud until after the first month

• Nearly a third unable to repair identities a year after stolen

• "For many, it takes time just to prove you didn't do it.”

Page 10: Identity Theft A Presentation for the

Consequences

• Personal expenses vary from $0 to $1,200 or more• Collection agency harassment• Denial of new credit• Being unable to use existing credit cards• Being unable to obtain loans• Utility shut off• Criminal investigation• Arrest• Civil suit • Difficulties opening or accessing bank accounts

Page 11: Identity Theft A Presentation for the

Prevention• Keep all sensitive wallets, documents, checkbooks

and credit cards securely locked away at home and at work.

• Keep passwords hidden (even in your own home) and change them frequently.

• Do not respond to suspicious e-mails• Don't discard a computer without completely

destroying the data on the hard drive.• Use secure passwords for your credit card, bank and

phone accounts. • Secure personal information in your home and work • Don’t give out personal information over the phone,

through the mail or over the internet

Page 12: Identity Theft A Presentation for the

Prevention (con’t)

• Guard your mail and trash from theft• Before discarding, shred all private documents• opt-out of receiving free offers of credit • Only carry the id and credit/debit cards that you

actually need • Notify your credit card company if you are planning

to travel out of state. • Sign up for automatic payroll deposits• Review Credit Reports from each of the three major

credit bureaus once a year• Use Online versions of bills, statements and checks

Page 13: Identity Theft A Presentation for the

Data TheftData theft touches 150,000 Massachusetts seniors

December 01, 2007 (IDG News Service) The state of Massachusetts is warning 150,000 members of its Prescription Advantage insurance program that their personal information may have been snatched by an identity thief.

Local authorities arrested a lone identity thief in August who had been using information taken from the program in an attempted identity theft scheme, said Alison Goodwin, a spokeswoman for the state's Executive Office of Health and Human Services.

Goodwin could not add many details on the nature of the breach, citing an ongoing criminal investigation, but she said Prescription Advantage is conducting an internal review of the incident to determine if additional security measures might be required.

Page 14: Identity Theft A Presentation for the

Means of Access

Page 15: Identity Theft A Presentation for the
Page 16: Identity Theft A Presentation for the

2007 Security Hall of Shame• Framingham, Mass.- based retailer TJX. The breach it disclosed in January (several months after the

fact) was the biggest ever involving payment card data.

• TJX itself claimed that over 45.6 million cards belonging to customers were compromised in an intrusion that went undetected for over 18 months

• The U.K's VA: HMRC misplaces records on 25 million kids In November, the United Kingdom's HMRC (Her Majesty's Revenue and Customs) department managed to achieve VA-level snafu status when it disclosed that it lost computer disks containing personal information on 25 million juvenile benefit claimants

• Personal information on over 8.5 million individuals was compromised when a senior database administrator working for Certegy Check Services Inc., a subsidiary of Fidelity National, illegally downloaded the data and sold it to brokers.

• TD Ameritrade Holding Corp. Brokerage firm Ameritrade in September disclosed that someone had broken into one of its systems and stolen contact information such as names, addresses and phone numbers belonging to all of its more than 6.2 million retail and institutional customers.

• Monster.com Names, e-mail addresses, mailing addresses, phone numbers and resume IDs belonging to an estimated 1.6 million job seekers were accessed from Monster.com's resume database in August.

• Supervalu gets phished Eden Prairie, Minn.-based grocery chain Supervalu in February was conned into sending $10 million to two fake bank accounts by phishers posing as employees working for two of the company's approved suppliers.

Computerworld

Page 17: Identity Theft A Presentation for the

Breaches

Here is a 145 page list of Data breaches from January,2005 to February 2008

ChronDataBreaches

Page 18: Identity Theft A Presentation for the

Botnet Arrests

Page 19: Identity Theft A Presentation for the

Detraction

Do NOT leave your purse in your shopping cart

Video

Page 20: Identity Theft A Presentation for the

Bank ATMs converted to steal bank customer IDs

• A team of organized criminals installs equipment on legitimate bank ATMs to steal both the ATM card number and the PIN.

Page 21: Identity Theft A Presentation for the

Equipment being installed on front of existing bank card slot.

Page 22: Identity Theft A Presentation for the

The equipment as it appears installed over the normal ATM bank slot.

Page 23: Identity Theft A Presentation for the

The PIN reading camera being installed on the ATM is housed in an innocent looking leaflet enclosure.

The PIN reading camera being installed on the ATM is housed in an innocent looking leaflet enclosure.

The PIN reading camera being installed on the ATM is housed in an innocent looking leaflet enclosure.

The PIN reading camera being installed on the ATM is housed in an innocent looking leaflet enclosure.

Page 24: Identity Theft A Presentation for the

The camera shown installed and ready to capture PINs by looking down on the keypad as you enter your PIN.

Page 25: Identity Theft A Presentation for the
Page 26: Identity Theft A Presentation for the

FBI Computer Advice

• Keep Your Firewall Turned On

• Install or Update Your Antivirus Software

• Install or Update Your Antispyware Technology

• Keep Your Operating System Up to Date

• Be Careful What You Download

• Turn Off Your Computer

Page 27: Identity Theft A Presentation for the

Some Additional Advice

• Checking your "sent items" file or "outgoing" mailbox for messages you did not intend to send

• Taking action immediately if your computer is infected

• Learning more about securing your computer at

http://www.OnGuardOnline.gov

Page 28: Identity Theft A Presentation for the

Florida Law

• 1. Seniors over 65 can freeze all three CRB for free, as well as those who have had identity theft

• 2. Seniors over 65 can permanently unfreeze the accounts for free

• 3. Seniors over 65 have to pay the $10 to temporarily unfreeze and pay $10 to re-freeze any or each CRB for any reason

• 4. The fee does not apply to victims of identity theft

Page 29: Identity Theft A Presentation for the

Safe On-Line Shopping

• Shop Where You're Safe

• Look for the Padlock

• Don't Shop at Random Stores

• Do Not Use Debit Cards

• Use a Virtual Credit Card

Page 30: Identity Theft A Presentation for the

Temporary Credit Cards 1

Page 31: Identity Theft A Presentation for the

Temporary Credit Cards 2

Page 32: Identity Theft A Presentation for the

Temporary Credit Cards 3

Page 33: Identity Theft A Presentation for the

Temporary Credit Cards 4

Page 34: Identity Theft A Presentation for the

Temporary Credit Cards 5

Page 35: Identity Theft A Presentation for the

Temporary Credit Cards 6

Page 36: Identity Theft A Presentation for the

If You are a Victim

• Place a fraud alert on your credit reports and review your credit reports

• Place a security freeze on your credit reports. • Close any accounts that have been tampered with

or opened fraudulently. • File a police report and ask for a copy for your

records • File a complaint with the Federal Trade

Commission and the Attorney General’s Office. • Write down the name of anyone you talk to, what

s/he told you, and the date of the conversation.

Page 37: Identity Theft A Presentation for the

If You are a Victim (con’t)

• Follow-up in writing with all contacts you have made about the identity theft on the phone or in person. Use certified mail, return receipt requested, for all correspondence regarding identity theft.

• Keep all copies of all correspondence or forms relating to identity theft.

• Keep the originals of supporting documentation, like police reports and letters to and from creditors; send copies only.

• Keep old files, even if you believe the problem is resolved. If it happens again, you will be glad you did.

Page 38: Identity Theft A Presentation for the

Most digital copiers manufactured in the past five years have disk drives to reproduce documents.

The same machines that are commonly used to spit out copies of tax returns for millions of Americans can retain the data being scanned.

If the data on the copier's disk aren't protected with encryption or an overwrite mechanism, and if someone with malicious motives gets access to the machine, industry experts say sensitive information from original documents could get into the wrong hands.

Page 39: Identity Theft A Presentation for the
Page 40: Identity Theft A Presentation for the

Some Videos

mayor_robbed_at_gas_station.flvdebit_card_scam skimmer_at_work

Page 41: Identity Theft A Presentation for the

Purse Theft Advisory

Page 42: Identity Theft A Presentation for the

Children & ID Theft

Protect your children

• The latest tactic these crooks are using is to steal the identity of children, preferably infants!

• Order a credit report on each of your minor children

at least once each year.

Page 43: Identity Theft A Presentation for the

The Bad Guys Do Get Caught

Page 44: Identity Theft A Presentation for the

Users often to blame

Page 45: Identity Theft A Presentation for the

Clarifying Four Key Misconceptions Surrounding Identity Fraud

• Misconception #1: "Consumers are helpless to protect themselves“

• Misconception #2: "Consumers bear the brunt of the financial losses from identity fraud“

• Misconception #3: "Internet use increases the risks of identity fraud“

• Misconception #4: " Seniors are most frequent targets of fraud operators”

Page 46: Identity Theft A Presentation for the

A Final Word

Think!