identity theft scams

35
October 2007 October 2007 1 1 Identity Theft: Identity Theft: A Matter of When A Matter of When Not If Not If © September 2008

Post on 14-Sep-2014

1.305 views

Category:

Education


0 download

DESCRIPTION

Identity theft is a crime used to refer to fraud that involves someone pretending to be someone else in order to steal money or get other benefits. This presentation, by National City Police Investigator Di Zinno, contains useful information and tips for preventing identity theft.

TRANSCRIPT

Page 1: Identity Theft Scams

October 2007October 2007 111

Identity Theft:Identity Theft:

A Matter of WhenA Matter of When

Not IfNot If

© September 2008

Page 2: Identity Theft Scams

October 2007October 2007 222

Tom Di Zinno/NCPDTom Di Zinno/NCPDInvestigations 336-4473Investigations 336-4473

Page 3: Identity Theft Scams

October 2007October 2007 333

What is PersonalWhat is PersonalIdentifying Information?Identifying Information?

Social Security NumbersSocial Security Numbers Driver’s license numbersDriver’s license numbers Address, phone numbers, date of birthAddress, phone numbers, date of birth Birth Certificate informationBirth Certificate information Mother’s maiden name, other family Mother’s maiden name, other family

informationinformation Financial account numbersFinancial account numbers Biometric information on an individualBiometric information on an individual Medical InfoMedical Info

Page 4: Identity Theft Scams

October 2007October 2007 444

Identity Theft:Identity Theft:The Classic ViewThe Classic View

Identity theft occurs when an Identity theft occurs when an imposter gains access to imposter gains access to personal identifying information personal identifying information (PII) and uses it for (PII) and uses it for financialfinancial gain:gain:

New lines of credit, loans, and New lines of credit, loans, and mortgagesmortgages

New accounts, account New accounts, account takeover, checking/debit fraud takeover, checking/debit fraud

Tenancy and utilitiesTenancy and utilities Medical Billing and IdentityMedical Billing and Identity

Page 5: Identity Theft Scams

October 2007October 2007 555

Identity Theft:Identity Theft:The Big PictureThe Big Picture

Identity theft Identity theft alsoalso occurs when an occurs when an imposter gains access to personal imposter gains access to personal identifying information and uses it identifying information and uses it for:for:

Jobs, employment, contractsJobs, employment, contracts Government accounting issuesGovernment accounting issues Government support servicesGovernment support services Avoidance of arrest and criminal Avoidance of arrest and criminal

recordsrecords Medical servicesMedical services

Page 6: Identity Theft Scams

October 2007October 2007 666

Everyone is VulnerableEveryone is Vulnerable

15 million victims a year 15 million victims a year (1)(1)

Identity Theft is a Dual CrimeIdentity Theft is a Dual Crime Cost of Identity TheftCost of Identity Theft

American households:American households: $6 $6 billion/yearbillion/year

Total fraud loss:Total fraud loss: $56.6 $56.6 billion/yearbillion/year

Average fraud loss: Average fraud loss:

$6,383/per case$6,383/per case

Page 7: Identity Theft Scams

October 2007October 2007 777

Who are these Thieves?Who are these Thieves?

Narcotics users or sellersNarcotics users or sellers Notable connection to Meth Notable connection to Meth

AddictsAddicts

Organized crimeOrganized crime OpportunistsOpportunists Desperate people – Desperate Desperate people – Desperate

actionsactions Family members or someone Family members or someone

close to youclose to you

Page 8: Identity Theft Scams

October 2007October 2007 888

How Thieves How Thieves Obtain InformationObtain Information

Lost/Stolen wallets Lost/Stolen wallets Mail theftMail theft DumpstersDumpsters Shoulder surfingShoulder surfing Telephone solicitationsTelephone solicitations ““Phishing” and scamsPhishing” and scams Lack of computer security / InternetLack of computer security / Internet Areas beyond your controlAreas beyond your control Data breachesData breaches

Page 9: Identity Theft Scams

October 2007October 2007 999

NIGERIAN SCAMSNIGERIAN SCAMS Mystery ShopperMystery Shopper Overpayment ScamOverpayment Scam Romance ScamRomance Scam Lottery ScamLottery Scam 419 Scam419 Scam FBI ScamFBI Scam

Page 10: Identity Theft Scams

October 2007October 2007 101010

Phishing ScamsPhishing Scams

Email or Telephone alertsEmail or Telephone alerts Your account has been Your account has been

terminated/put on hold etcterminated/put on hold etc Directs you to a website or Directs you to a website or

phone bankphone bank Asks for you to confirm infoAsks for you to confirm info

Page 11: Identity Theft Scams

October 2007October 2007 111111

““Phishing” EmailPhishing” EmailFrom: Chase Bank [mailto:[email protected]: Chase Bank [mailto:[email protected]: Wednesday, September 24, 2008 1:00 PMSent: Wednesday, September 24, 2008 1:00 PMSubject: Important : Chase Bank customer service MessageSubject: Important : Chase Bank customer service Message

<http://www.chase.com/ccpmweb/shared/image/chaseNewlogo.gif<http://www.chase.com/ccpmweb/shared/image/chaseNewlogo.gif

Dear Chase OnlineSM Customer:Dear Chase OnlineSM Customer:

A message regarding "Re: Credit Card - Update Profile User" has been A message regarding "Re: Credit Card - Update Profile User" has been sent to our Secure Message Center.sent to our Secure Message Center.

To see your message: To see your message:

** follow this link to Log on to Chase Online. follow this link to Log on to Chase Online. <http://chaseonlineuser.by.<http://chaseonlineuser.by.ruru/secure_membin_Chaseonline_email/secure_membin_Chaseonline_email_id43432gjg98982beh32k9878e.htm> Once you log on, you can _id43432gjg98982beh32k9878e.htm> Once you log on, you can see your new message and Update Profile in the Secure Update see your new message and Update Profile in the Secure Update Center. Center.

** Please fill in the required information. This is required for us to Please fill in the required information. This is required for us to continue to offer you a safe and risk free environment.. continue to offer you a safe and risk free environment..

Thank you for being a valued Chase customer.Thank you for being a valued Chase customer.

Page 12: Identity Theft Scams

October 2007October 2007 121212

Pharming ScamsPharming Scams

Web BasedWeb Based False Web SiteFalse Web Site False Search Engine infoFalse Search Engine info May be preceeded by PhishingMay be preceeded by Phishing LEARN TO READ URLLEARN TO READ URL LOOK FOR ENCRIPTIONLOOK FOR ENCRIPTION MODIFY SEARCHSMODIFY SEARCHS

Page 13: Identity Theft Scams

October 2007October 2007 131313

Mortgage ScamsMortgage Scams

FICO Score SitesFICO Score Sites Loan ModificationLoan Modification Foreclosure PreventionForeclosure Prevention Foreclosure Prevention Foreclosure Prevention

ProductsProducts BrokersBrokers

Page 14: Identity Theft Scams

October 2007October 2007 141414

Insurance ScamsInsurance Scams

Free Medical TestsFree Medical Tests Free Medical ProductsFree Medical Products Cheap Prescriptions Cheap Prescriptions

Page 15: Identity Theft Scams

October 2007October 2007 151515

SCIMMINGSCIMMING

Primarily Aimed at your Debit Primarily Aimed at your Debit CardCard

Gasoline RetailersGasoline Retailers RestaurantsRestaurants RetailersRetailers Now Taken over by Organized Now Taken over by Organized

CrimeCrime Use Gift/Green Dot CardsUse Gift/Green Dot Cards

Page 16: Identity Theft Scams

October 2007October 2007 161616

Put Your Wallet on a DietPut Your Wallet on a Diet

Don’t carry your SSN card with Don’t carry your SSN card with youyou

Minimize number of credit Minimize number of credit cardscards

Don’t carry children’s SSN’sDon’t carry children’s SSN’s Minimize pieces of ID which Minimize pieces of ID which

carry SSNcarry SSN

Page 17: Identity Theft Scams

October 2007October 2007 171717

CLEAN OUT YOUR CARCLEAN OUT YOUR CAR

Id’sId’s Credit CardsCredit Cards Check booksCheck books Old ReceiptsOld Receipts Medical CardsMedical Cards RecordsRecords

Page 18: Identity Theft Scams

October 2007October 2007 181818

Protect Your CheckbookProtect Your Checkbook Don’t put your Social Security Don’t put your Social Security

number on your checks number on your checks Don’t carry blank checks or deposit Don’t carry blank checks or deposit

slipsslips Use specialized pens when writing Use specialized pens when writing

out checksout checks Shred all unused or old checksShred all unused or old checks Only use checks with merchants Only use checks with merchants

you knowyou know Use ATM card when possibleUse ATM card when possible Monitor your monthly statements Monitor your monthly statements

carefullycarefully

Page 19: Identity Theft Scams

October 2007October 2007 191919

Debit or Credit?Debit or Credit?

Debit Cards = Your MoneyDebit Cards = Your Money Cash removed immediately from an Cash removed immediately from an

existing accountexisting account Limited time to report loss or unauthorized Limited time to report loss or unauthorized

use of carduse of card If loss is not reported, greater risk of If loss is not reported, greater risk of

losing all funds in accountlosing all funds in account

Credit Cards = Their MoneyCredit Cards = Their Money Allows consumers to buy goods and Allows consumers to buy goods and

services on creditservices on credit Greater protection from fraud loss if Greater protection from fraud loss if

reported within 60 daysreported within 60 days

Page 20: Identity Theft Scams

October 2007October 2007 202020

Protect Your MailProtect Your Mail

Go to a U.S. Post Office when mailing Go to a U.S. Post Office when mailing bills or other important documentsbills or other important documents

Use a locked mailbox to send and Use a locked mailbox to send and receive all mailreceive all mail

Never leave mail unattended for Never leave mail unattended for pickuppickup

Monitor your mail for the regular items Monitor your mail for the regular items you receiveyou receive

Don’t utilize a community outbox (i.e. Don’t utilize a community outbox (i.e. at work)at work)

Page 21: Identity Theft Scams

October 2007October 2007 212121

Shred, Destroy and Opt-OutShred, Destroy and Opt-Out Cross-cut shred papers you Cross-cut shred papers you

throw out, especially those with throw out, especially those with personal identifying informationpersonal identifying information

Destroy pre-approved credit Destroy pre-approved credit offers by shreddingoffers by shredding

Opt out of pre-approved credit Opt out of pre-approved credit card offers card offers

(888-5OPT-OUT)(888-5OPT-OUT)

Page 22: Identity Theft Scams

October 2007October 2007 222222

Shoulder Surfing andShoulder Surfing andTelephone SolicitationsTelephone Solicitations

Never provide SSN to anyone unless they Never provide SSN to anyone unless they have a good reason for needing it. Watch have a good reason for needing it. Watch for eavesdroppers and ask for privacy for eavesdroppers and ask for privacy when conducting financial business.when conducting financial business.

Never provide personal information during Never provide personal information during a phone call which you did not initiate. a phone call which you did not initiate.

Page 23: Identity Theft Scams

October 2007October 2007 232323

Safeguard Safeguard Your ComputerYour Computer

Keep Firewall, Antivirus, and Anti-Keep Firewall, Antivirus, and Anti-Spyware software updated, Spyware software updated, automatically is bestautomatically is best

Popup BlockersPopup Blockers Pop-ups are a perfect place to plant a Pop-ups are a perfect place to plant a

virus or Trojan program. You never virus or Trojan program. You never know who wrote the program, or that know who wrote the program, or that person’s intent. If you don’t know the person’s intent. If you don’t know the supplier, do not allow it to run or supplier, do not allow it to run or install! install!

Be aware of risks of malwareBe aware of risks of malware

Page 24: Identity Theft Scams

October 2007October 2007 242424

Defend AgainstDefend AgainstSocial NetworkingSocial Networking

Myspace, Facebook, YouTubeMyspace, Facebook, YouTube Keep personal information Keep personal information

PERSONALPERSONAL Remember these are not your Remember these are not your

friendsfriends Question profiles – presume they Question profiles – presume they

may be falsemay be false Blogs and Chat Rooms can be Blogs and Chat Rooms can be

used as a way to find out more used as a way to find out more about you, for criminal purposesabout you, for criminal purposes

Page 25: Identity Theft Scams

October 2007October 2007 252525

On-Line / InternetOn-Line / InternetExperienceExperience

Use secure web sites for Use secure web sites for financial transactionsfinancial transactions Paying bills on linePaying bills on line Managing financial accountsManaging financial accounts

Implement password protectionImplement password protection This includes your user This includes your user

accounts, wireless routers, accounts, wireless routers, online accounts, and perhaps online accounts, and perhaps even stored spreadsheets even stored spreadsheets that are privatethat are private

Page 26: Identity Theft Scams

October 2007October 2007 262626

Peer-to-PeerPeer-to-PeerSafeguardsSafeguards

These are programs like Limewire, These are programs like Limewire, Kazaa, SoulSeek.Kazaa, SoulSeek.

Do not store personal or financial Do not store personal or financial information on the same computer information on the same computer you use for file sharing. you use for file sharing.

Check the security preferences for Check the security preferences for the program you are using. See if the program you are using. See if you can set it so that only designated you can set it so that only designated folders can be accessed by the file folders can be accessed by the file sharing program. sharing program.

Look into encrypting personal and Look into encrypting personal and vital information. Some newer vital information. Some newer computers come with this function computers come with this function already built in. already built in.

Page 27: Identity Theft Scams

October 2007October 2007 272727

Areas Beyond Areas Beyond Your ControlYour Control

Areas beyond your control:Areas beyond your control: Any database where your Any database where your

personal information is on filepersonal information is on file An employee who processes a An employee who processes a

purchase you make and steals purchase you make and steals the informationthe information

A company that handles your A company that handles your financial datafinancial data

Page 28: Identity Theft Scams

October 2007October 2007 282828

Data BreachesData Breaches ITRC Breach Data as of ITRC Breach Data as of

12/31/07:12/31/07: 446 breaches affecting more than 446 breaches affecting more than

127 million individual records127 million individual records

ITRC Breach Data as of ITRC Breach Data as of 10/1/2008:10/1/2008: 516 breaches affecting more than 516 breaches affecting more than

30.3 million records30.3 million records

Page 29: Identity Theft Scams

October 2007October 2007 292929

Be Pro-ActiveBe Pro-ActiveOrder Credit ReportsOrder Credit Reports

Order free credit reportsOrder free credit reports 877-322-8228877-322-8228

Stagger requestsStagger requests Review credit reports carefullyReview credit reports carefully Review monthly bank and Review monthly bank and

credit card statements or credit card statements or review account transactions review account transactions onlineonline

Page 30: Identity Theft Scams

October 2007October 2007 303030

Extra PrecautionExtra PrecautionPlace a Credit FreezePlace a Credit Freeze

Consider the possibility of Consider the possibility of placing a credit freeze on your placing a credit freeze on your credit filecredit file Assist elderly family members Assist elderly family members

in placing them on their credit in placing them on their credit filesfiles

See How to “Freeze” Your See How to “Freeze” Your Credit Files: Credit Files: www.oispp.ca.gov/consumer_privacy/conwww.oispp.ca.gov/consumer_privacy/consumer/documents/pdf/cis10securityfreeze.sumer/documents/pdf/cis10securityfreeze.pdfpdf

Page 31: Identity Theft Scams

October 2007October 2007 313131

If a Victim, First StepsIf a Victim, First Steps

Place a “Fraud Alert” on your Place a “Fraud Alert” on your credit reportscredit reports

Close Affected AccountsClose Affected Accounts File a Police ReportFile a Police Report Report the crime to the Federal Report the crime to the Federal

Trade CommissionTrade Commission Contact the ITRCContact the ITRC

Page 32: Identity Theft Scams

October 2007October 2007 323232

Negative TrendsNegative Trends San Diego’s # 1 crime: Vehicle break San Diego’s # 1 crime: Vehicle break

insins Stealing items which can be used to Stealing items which can be used to

commit identity theftcommit identity theft Data on the move – laptops or flash Data on the move – laptops or flash

drivesdrives Insider theft - by employees or othersInsider theft - by employees or others ScamsScams Misuse of information -children and the Misuse of information -children and the

deceaseddeceased

Page 33: Identity Theft Scams

October 2007October 2007 333333

PredictionsPredictions Negative:Negative:

More cases linked to Meth More cases linked to Meth use/dealinguse/dealing

Large scale ID brokering Large scale ID brokering worldwideworldwide

More sophisticated attacks and More sophisticated attacks and development of identity theft ringsdevelopment of identity theft rings

Younger thievesYounger thieves

Positive:Positive:New policing and legislative New policing and legislative solutionssolutions

Page 34: Identity Theft Scams

October 2007October 2007 343434

The Bottom LineThe Bottom Line

The only successful way to fight The only successful way to fight identity theft will be with a team identity theft will be with a team

approach. approach.

Each of us has to be more vigilentEach of us has to be more vigilent

Businesses, law enforcement, Businesses, law enforcement, governmental agencies, legislators governmental agencies, legislators and consumers must combine their and consumers must combine their efforts to stem the growth of identity efforts to stem the growth of identity

theft.theft.

Page 35: Identity Theft Scams

October 2007October 2007 353535

QuestionsQuestions