Upload
apolonio-apps-garcia
View
238
Download
2
Embed Size (px)
Citation preview
If you are me,then who am I?
The Who, What, When, Why and How of Identity Theft.
Who I am, what I do.
Apolonio “Apps” Garcia
I am NOT a ...and this is NOT
Official Disclaimer
Agenda
What is identity theft?
Who wants to be me?
Why do they want my information?
How do they get my information?
What can I do about it?
What is Identity Theft?
The fraudulent acquisition and use of a
person's private identifying information,
usually for financial gain.
Became a Federal Crime on October 30, 1998 Identity Theft and Assumption Deterrence Act of 1998
12.6 Million
Source: Federal Trade Commission
Breach Identity Theft
Who Wants to Be Me?
“A stolen identity is a powerful cloak of anonymity for criminals and terrorists… and a danger to
national securityand private citizens alike.”
24 year old Donald Batiste ran a credit repair company in Louisiana that used Synthetic Identity Fraud to obtain over $5M in loans and merchandise.
In a Louisiana state prison,
Thompson started stealing a raft of personal information from more than 61 individuals, churches, financial institutions, and businesses. That information enabled him to steal from the victims’ bank accounts and use their credit to buy big-ticket items—like appliances, cell phones, and big-screen TVs. He even attempted to purchase a luxury SUV.
The Professional Hackers:
Russian Hackers1.2 billion user name and password combinations and more than 500 million email addresses
Target Breachnames, mailing addresses, phone numbers or email addresses for up to 70 million individuals.
Anthem Breachnames, birthdays, medical IDs, Social Security numbers, street addresses, e-mail addresses and employment information
Personal Theft is More Common Than You Think
Identity Theft from Someone You Know
What Information do they want?
Names Social
Security numbers
Dates of birth Medicare numbers
Addresses Birth certificates
Death certificates Passport numbers
Passwords Telephone numbers
Financial account numbers
Biometric data (like fingerprints, iris scans)
How do they get my Information?
Let’s try it ourselves...
How do they get my Information?
Smishing Scam Audio
Try to Take Easy Steps to help PREVENT Identity Theft
IT HAPPENED!What To Do Right AwayAct quickly to limit the damage.
Step 1: Call the companies where you know fraud occurred.Step 2: Place a fraud alert and get your credit report.Step 3: Report identity theft to the FTC.Step 4: File a report with your local police department.
What To Do NextTake a deep breath and begin to repair the damage.