computer crimes - identity theft

20
Reporter: J’Love Minguez

Upload: jlove-minguez

Post on 01-Nov-2014

161 views

Category:

Education


2 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Computer Crimes - Identity Theft

Reporter: J’Love Minguez

Page 2: Computer Crimes - Identity Theft

Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, usually as a method to gain access to resources or obtain credit and other benefits in that person's name.

Page 3: Computer Crimes - Identity Theft
Page 4: Computer Crimes - Identity Theft

Mail from banks, institutions, and even new credit card offers contain valuable personal information which identity thieves can use to drain accounts and open new credit cards in your name. They get the information by stealing mail right out of your mailbox, or as in the case of dumpster diving, out of the trash after it has been thrown out.

Page 5: Computer Crimes - Identity Theft

If you've ever received an email from a "bank" or other financial institution asking for account information, thieves could have been phishing for your identity. (The word is derived from "fishing," because the emails are like bait.) Clicking on their link will send you to a site that looks the same as the actual institution, but actually belongs to the thief.

Page 6: Computer Crimes - Identity Theft

A combination of the words "voice" and "phishing", vishing is like phishing, except the thieves use the phone instead of email. They may leave a message pretending to be your bank or some other company. When you call back, they'll take your personal information.

Page 7: Computer Crimes - Identity Theft

Thieves have started seeking treatment using another person's name and medical insurance information. They can get it by stealing your wallet or hacking into a doctor's or hospital's computer system.

Page 8: Computer Crimes - Identity Theft

Spyware is a malicious computer program that installs itself on your PC and then allows thieves to record your personal information - like a credit card number, password, or Social Security number.

Page 9: Computer Crimes - Identity Theft

Skimming is a way for a thief to get your ATM or credit card information by installing their own card reader on an ATM machine. When you pass your card through the skimming device, it records your card information.

Page 10: Computer Crimes - Identity Theft

Thieves can gain access to this information by hacking into the network, by posing as a business partner, or after an employee loses a computer, disk or box of files.

Page 11: Computer Crimes - Identity Theft

Identity thieves are using social networking sites to find out your personal information. They use the information they find on the site to pretend to be someone they're not and coax other information out of you - like your Social Security number.

Page 12: Computer Crimes - Identity Theft

The thief acquires a child's personal information, then creates fraudulent accounts in their name. But because children usually don't have financial accounts until they are older, no one may find out about the theft for many years, allowing the problems to be greatly compounded.

Page 13: Computer Crimes - Identity Theft

Thieves are experts at duplicating legitimate online storefronts. Before you know it, you’ve completed your transaction and inadvertently handed over the personal information they need to commit fraud.

Page 14: Computer Crimes - Identity Theft
Page 15: Computer Crimes - Identity Theft

1.2. Pervasive telephone scams3. Phishing4. False promises of “free money” from inflated

refunds5. Return preparer fraud6. Hiding income offshore7. Impersonation of charitable organizations8. False income, expenses, or exemptions9. Frivolous arguments10. Falsely claiming zero wages11. Abusive tax structures12. Misuse of trusts

Page 16: Computer Crimes - Identity Theft

The Kansas Department of Revenue's Office of Special Investigation arrested five individuals Thursday in the Wichita area suspected of crimes relating to driver's license fraud and identity card fraud.

▪ Reggie Conner, 46,

▪ Manuel De Jesus Aguero-Herrera, 28,

▪ Gladys Melissa Morales-Salome, 25,

▪ Federico Ibarra, 21,

▪ Arturo Ibarra, 21,

Page 17: Computer Crimes - Identity Theft
Page 18: Computer Crimes - Identity Theft

If you receive an unsolicited email or phone call from what appears to be your bank or building society asking for your security details, never reveal your full password, login details or account numbers.

Do not give out personal information on the phone, fax or on social media platforms

Use privacy settings to manage the information you share and with whom you share it. Be selective about what you post and accepting friends.

Never give personal or account details to anyone who contacts you unexpectedly. Be suspicious even if they claim to be from your bank or the police.

Keep your personal documents in a safe place, preferably in a lockable drawer or cabinet at home. Consider storing valuable financial documents such as share certificates with your bank.

Page 19: Computer Crimes - Identity Theft
Page 20: Computer Crimes - Identity Theft

Act quickly – you mustn’t ignore the problem. Even though you didn’t order those goods or open that bank account, the bad debts will end up under your name and address.

You should report all lost or stolen documents – such as passports, driving licences, plastic cards, cheque books.