SlideShare une entreprise Scribd logo
1  sur  47
Identity Theft
and
Strategies for Crime Prevention
National Crime Prevention Council 2006
Objectives
 Define identity theft
 Discuss why you should worry about it
 Examine how identity theft occurs
 Look at how identity theft has emerged
 Discuss what is being done about identity theft
 Look at ways to protect yourself

National Crime Prevention Council 2006

2
What Is Identity Theft?
 One person, using information gathered from

some source, takes on the identity of another
person without permission and conducts a
variety of activities using that identity.
 The intent is to use that identity for personal
gain, generally with the intent to defraud
others.

National Crime Prevention Council 2006

3
What Is NOT Identity Theft?
 Someone using your credit card with

your knowledge and consent to make a
purchase
 Someone properly exercising a legally
granted power of attorney on your behalf
 Someone making up a fake name and
signing into a hotel - this may be a
crime, but it’s not identity theft
National Crime Prevention Council 2006

4
Why Worry About Identity
Theft?





One in 33 households discovered at least one type of
ID theft during the previous 12 months.
Households headed by persons age 18-24 and those
with the highest incomes were the most likely
victims.
One in five victimized households spent about one
month resolving problems resulting from ID theft.
Source: “First Estimates from the National Crime Victimization Survey,
Identity Theft, 2004
Bureau of Justice Statistics Bulletin

National Crime Prevention Council 2006

5
Why Worry About Identity
Theft? (cont.)
 U.S. adult victims of identity fraud in 2005 =

9.3 million.
 In 2005, total one-year fraud amount = $54.4
billion.
(Source: Javelin Strategy and Research 2006 Identity Fraud Survey Report
www.javelinstrategy.com)

National Crime Prevention Council 2006

6
Four Key Points
 People are not helpless in protecting

themselves from ID theft.
 Consumers do not bear the brunt of the loss.
 Internet use does not increase risk of ID fraud.
 Seniors are not the most frequent targets of
identity thieves.
(Source: Javelin Strategy and Research 2006 Identity Fraud Survey Report
www.javelinstrategy.com)

National Crime Prevention Council 2006

7
Why Worry About Identity
Theft? (cont.)
 Deterrence and apprehension are not yet

effective. Prevention is the best defense.
 There are jurisdictional problems concerning
where the crime occurs.
 It is an attractive crime to criminals because of
its low risk and high return.

National Crime Prevention Council 2006

8
How Identity Theft Works
STEP 1—Getting the Identity


The thief or thieves look for information in any
number of ways
– Discarded documents in the trash
– Receipts from purchases
– Lost or stolen wallets or purses
– Online “phishing” for personal data
– Stolen mail from mailboxes
– Thieves are thinking of new, inventive ways
every day.
National Crime Prevention Council 2006

9
How Identity Theft Works
STEP 1—Getting the Identity (cont.)





Some thieves go “wholesale” by getting lists of
information on individuals through computer
hacking, theft, or bribery.
The information may be resold to other crooks or
used numerous times by the original thief or thieves.
Profits may be used to support additional criminal
activities such as drug use and terrorism.

National Crime Prevention Council 2006

10
How Identity Theft Works
STEP 2—Exploiting the Identity


With the information that becomes available, the thief
may have false IDs made
– A state driver’s license with the thief’s picture
and the victim’s name
– Non-driver’s state license
– Social Security card
– Employer ID
– Credit cards

National Crime Prevention Council 2006

11
How Identity Theft Works
STEP 2—Exploiting the Identity (cont.)


The thief may simply begin leveraging one piece of
information to obtain or establish other information
or assets. These may include
– New credit card accounts
– State or local licenses
– Accounts with utility companies, apartment leases, or
even home mortgages.

National Crime Prevention Council 2006

12
How Identity Theft Works
STEP 3—Discovering the Theft




The thief continues to build a “persona” using the
victim’s name, good credit, and even good character
references. The thief never pays the bills, but the
victim is left with a bad name and ruined credit.
Eventually, the victim tries to get a new credit
account and is turned down, or gets a bill for a credit
card he or she never owned, or starts getting calls
from bill collectors.
National Crime Prevention Council 2006

13
How Identity Theft Works
STEP 3—Discovering the Theft (cont.)




The thief might abandon the victim’s identity because
he or she has “spoiled” the name of the victim (e.g.,
with a criminal offense or bankruptcy).
When the crime or ruined credit is discovered, the
victim is left to clean up the mess.

National Crime Prevention Council 2006

14
How Identity Theft Works
STEP 4—Reporting and Restoring




The victim reports the theft to the local police and to
the nation’s major credit bureaus.
The victim asks the credit bureaus to note the identity
theft crime on his or her credit report.
The victim may need to consult with a local victim’s
assistance agency or an attorney to obtain information
on the necessary, specific steps in a given state.

National Crime Prevention Council 2006

15
How Identity Theft Works
STEP 4—Reporting and
Restoring (cont.)
 The victim can also file an online report and

affidavit with the Federal Trade
Commission registry at www.ftc.gov. Go to
the identity theft section.

National Crime Prevention Council 2006

16
Frequently Asked Questions

National Crime Prevention Council 2006

17
Where and How Do They
Get My Information ?
 Telephone calls asking you to “update records”
 Theft of incoming bills, which show your

account number
 Theft of outgoing mail and bill payments.

National Crime Prevention Council 2006

18
Where and How Do They
Get My Information? (cont.)
 Redirection of stolen mail, where the thief

files a change of address on your credit card
bills
 “Phishing” in which the sender sends out an
email or pop-up message that looks like it
came from a real bank or credit card
company and asks for identifying
information. Legitimate companies will
never do this.
National Crime Prevention Council 2006

19
Where and How Do They
Get My Information? (cont.)
What is “phishing”?
 The Internet is a new, convenient, and
trusted way to do business, but it also has
allowed criminals to create illegitimate
emails or pop-up messages posing as your
bank, credit card, or utility company.

National Crime Prevention Council 2006

20
Where and How Do They
Get My Information? (cont.)
What is “phishing”? (cont.)
 They create a phony reason why you need
to give them your personal information
(e.g., bank routing number, Social
Security number).
 They use the ease of online transactions to
their advantage, hoping you will be
fooled.
National Crime Prevention Council 2006

21
Where and How Do They
Get My Information? (cont.)
More places…
 Going through trash to recover bills
 Credit card receipts that you discard or
toss out with a shopping bag
 Noticing a bill you tossed in a public
trash can
 Second impressions of credit cards
 Casual use of Social Security numbers
and other similar identifiers
National Crime Prevention Council 2006

22
Sample “Phishing” Email

National Crime Prevention Council 2006

23
How To Avoid a “Phishing” Scam
Tips from the FTC:
 If you get an email or pop-up message that

asks for personal or financial information, do
not reply or click on the link in the message.
Legitimate companies don’t ask for this
information via email.

National Crime Prevention Council 2006

24
How To Avoid a “Phishing” Scam
(cont.)
Tips from the FTC:
 If you are concerned about your account,

contact the organization using its legitimate
telephone number or open a new Internet
browser and type in the company’s correct
web address.

National Crime Prevention Council 2006

25
How To Avoid a “Phishing” Scam
(cont.)
More tips from the FTC
 Don’t email personal or financial information.

If you initiate a transaction and want to
provide your personal or financial information
through an organization’s website, look for
indicators that the site is secure.

National Crime Prevention Council 2006

26
How To Avoid a “Phishing” Scam
(cont.)
More tips from the FTC
 A “lock” icon on the browser’s status bar or a

URL for a website that begins “https:” (the “s”
stands for “secure”) indicates that you are on a
secure site.
 Unfortunately, no indicator is foolproof; some
phishers have forged security icons.

National Crime Prevention Council 2006

27
How To Avoid a “Phishing” Scam
(cont.)


Use antivirus software and keep it up to date.
Some phishing emails contain software that can
harm your computer or track your activities on
the Internet without your knowledge. Antivirus
software scans incoming communications for
troublesome files. Look for antivirus software
that recognizes current viruses as well as older
ones that can effectively reverse the damage and
that updates automatically.

National Crime Prevention Council 2006

28
How To Avoid a “Phishing” Scam
(cont.)
 A firewall helps make you invisible on the

Internet and blocks all communications from
unauthorized sources. It’s especially important
to run a firewall if you have a broadband
connection. Finally, your operating system
(e.g., Windows or Linux) may offer free
software “patches” to close holes in the system
that hackers or phishers could exploit.

National Crime Prevention Council 2006

29
Why is ID Theft on the Rise?
 Computers have made record keeping

faster. Automation also removes human
analysis, making it easier for someone to
steal an identity or pose as another person.
 More and more transactions are being
handled electronically, and that trend is
continuing to increase dramatically.
 More computer hackers now go for
monetary returns, not for the thrill of
conquering another computer.
National Crime Prevention Council 2006

30
Why is ID Theft on the Rise?
(cont.)
 Mobility means that many of us shop in stores

all over our communities, regions, or the
country, so we are more anonymous than ever.
 Many of us find it hard to believe that ID theft
could happen to us, even though millions are
victims each year.

National Crime Prevention Council 2006

31
What Can We Do About It?
 Consumer education, like the information

we’re sharing today, helps you reduce your
risk of becoming a victim.
 Education is an ongoing process as new
technologies and new criminal techniques
emerge.
 Information about prevention and ways to stop
ID theft spread quickly as well.

National Crime Prevention Council 2006

32
What Can We Do About It?
(cont.)
 New ways are being found to tighten

security on electronic payment systems and
to detect “out of the ordinary” purchase
patterns.
 Some credit card payment systems now
signal only the last four digits of your card
number, so that someone who steals your
receipt can’t steal your good name.
National Crime Prevention Council 2006

33
What Can We Do About It?
(cont.)
 New shredders are coming into the market,

making thorough document destruction easier
at home.
“Don’t risk it, shred it.”

National Crime Prevention Council 2006

34
Who Is Vulnerable?
People who
 Keep their money in bank accounts
 Use credit or debit cards
 Generate trash with unshredded paper in it
 Casually toss credit card or other receipts
into public receptacles
 Get personal bills by mail or electronically
 Don’t check their credit card reports and
bank statements
National Crime Prevention Council 2006

35
Who Is Vulnerable?
(cont.)
People who
 Don’t regularly check their credit bureau
reports
 Have accessible mail boxes

National Crime Prevention Council 2006

36
Prevention
 Check your bank, credit card, and similar

statements monthly. Make sure you receive
them and make sure the charges are yours.
 Immediately call your bank or credit card
companies if you don’t receive your bill.

National Crime Prevention Council 2006

37
Prevention (cont.)
 Consider registering with the Direct Marketing

Association to stop unsolicited credit offers.
 NEVER provide account information over the
Internet or the telephone unless you originated
the call and unless you are absolutely certain
of the party to whom you are speaking.

National Crime Prevention Council 2006

38
Prevention (cont.)
 Rip up receipts if you will not need them for

warranties or returns.
 Shred any unwanted credit, loan, or credit card
offers – or at least cut them up with scissors –
before putting them in the trash.

National Crime Prevention Council 2006

39
Prevention (cont.)
 Do not give out your real name or other

personal information in Internet chat rooms.
Use a screen name.
 Do not authorize others to use your credit cards.
They may not take the same care that you do.
 Deposit mail in a U.S. Postal Service mailbox.
 Make sure your mailbox is secure.

National Crime Prevention Council 2006

40
Review: Coping With Identity Theft
 File a police report immediately.
 Notify the three major credit bureaus

and each of your credit or debit card
issuers of the identity theft and ask that
appropriate alerts and closures be filed.
 File a report with the Federal Trade
Commission’s Complaint Center and
obtain an ID Theft Affidavit, which is
available online at www.ftc.gov.
National Crime Prevention Council 2006

41
Review: Coping With ID Theft
(cont.)
 Check credit reports, immediately report any

incorrect activity, and ensure that a fraud alert
is active on your account.
 Carry copies of documents with you – the
police report, the affidavit, and any other
formal records that attest to your identity – in
case of emergency.

National Crime Prevention Council 2006

42
Review: Coping With Identity
Theft (cont.)
 Check court records in your general area for

bankruptcies and for mortgage liens using your
name. Many records are automated, which
makes the job easier.

National Crime Prevention Council 2006

43
Encourage Everyone to…
 Review their habits about handling personal

information.
 Take prevention strategies to heart – and
encourage others to do so.
 Speak out about the need for preventive action
and laws that protect identity theft victims.

National Crime Prevention Council 2006

44
Online Resources
 Federal Trade Commission: www.ftc.gov
 Department of Justice:

www.usdoj.gov/criminal/fraud/idtheft.html
 Better Business Bureau: www.bbb.org
 United States Postal Service: www.usps.com
 National Criminal Justice Reference Service:
www.ncjrs.gov

National Crime Prevention Council 2006

45
Online Resources
 Many nonprofit organizations are committed to

promoting prevention and recovery from identify
theft. Here are a few:
www.idtheftcenter.com/index.shtml
www.identitytheft.org/
www.privacyrights.org/identity.htm

National Crime Prevention Council 2006

46
National Crime Prevention
Council
1000 Connecticut Avenue, NW
Thirteenth Floor
Washington, DC 20036
202-466-6272
www.ncpc.org

National Crime Prevention Council 2006

47

Contenu connexe

Tendances

Cyber security laws
Cyber security lawsCyber security laws
Cyber security lawsNasir Bhutta
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in indiaAdv Prashant Mali
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in IndiaYogesh Lolge
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIAAnish Rai
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 
Preventive Vigilance, Frauds & Security Measures in banks
Preventive Vigilance, Frauds & Security Measures in banksPreventive Vigilance, Frauds & Security Measures in banks
Preventive Vigilance, Frauds & Security Measures in banksAbinash Mandilwar
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdfAnupmaMunshi
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft pptCut 2 Shreds
 
Crime prevention, Tips for Filipino Citezen
Crime prevention, Tips for Filipino CitezenCrime prevention, Tips for Filipino Citezen
Crime prevention, Tips for Filipino CitezenKenneth Malte
 
Role of Vigilance.pptx
Role of Vigilance.pptxRole of Vigilance.pptx
Role of Vigilance.pptxssuserc67962
 
Fraud in igaming 101
Fraud in igaming 101Fraud in igaming 101
Fraud in igaming 101Martyn Sukys
 

Tendances (20)

Theft
TheftTheft
Theft
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
White collar crime
White collar crimeWhite collar crime
White collar crime
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Vigilance
VigilanceVigilance
Vigilance
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Preventive Vigilance, Frauds & Security Measures in banks
Preventive Vigilance, Frauds & Security Measures in banksPreventive Vigilance, Frauds & Security Measures in banks
Preventive Vigilance, Frauds & Security Measures in banks
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Economic Crimes
Economic CrimesEconomic Crimes
Economic Crimes
 
Crime prevention, Tips for Filipino Citezen
Crime prevention, Tips for Filipino CitezenCrime prevention, Tips for Filipino Citezen
Crime prevention, Tips for Filipino Citezen
 
Role of Vigilance.pptx
Role of Vigilance.pptxRole of Vigilance.pptx
Role of Vigilance.pptx
 
Cyber espionage
Cyber espionageCyber espionage
Cyber espionage
 
Fraud in igaming 101
Fraud in igaming 101Fraud in igaming 101
Fraud in igaming 101
 

Similaire à Identity Theft and Strategies for Crime Prevention

PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS- Mark - Fullbright
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pdjeelsonani003567
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
Id theft-phishing-research
Id theft-phishing-researchId theft-phishing-research
Id theft-phishing-researchJustin Saunders
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca- Mark - Fullbright
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09jwnollet
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz- Mark - Fullbright
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15Naval OPSEC
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentationpat7777
 
Identity Theft
Identity TheftIdentity Theft
Identity Theftsarakr00
 

Similaire à Identity Theft and Strategies for Crime Prevention (20)

PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity Theft and You
Identity Theft and YouIdentity Theft and You
Identity Theft and You
 
Id theft-phishing-research
Id theft-phishing-researchId theft-phishing-research
Id theft-phishing-research
 
Identity Theft 101
Identity Theft 101Identity Theft 101
Identity Theft 101
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 

Plus de - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Plus de - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Dernier

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 

Dernier (20)

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 

Identity Theft and Strategies for Crime Prevention

  • 1. Identity Theft and Strategies for Crime Prevention National Crime Prevention Council 2006
  • 2. Objectives  Define identity theft  Discuss why you should worry about it  Examine how identity theft occurs  Look at how identity theft has emerged  Discuss what is being done about identity theft  Look at ways to protect yourself National Crime Prevention Council 2006 2
  • 3. What Is Identity Theft?  One person, using information gathered from some source, takes on the identity of another person without permission and conducts a variety of activities using that identity.  The intent is to use that identity for personal gain, generally with the intent to defraud others. National Crime Prevention Council 2006 3
  • 4. What Is NOT Identity Theft?  Someone using your credit card with your knowledge and consent to make a purchase  Someone properly exercising a legally granted power of attorney on your behalf  Someone making up a fake name and signing into a hotel - this may be a crime, but it’s not identity theft National Crime Prevention Council 2006 4
  • 5. Why Worry About Identity Theft?    One in 33 households discovered at least one type of ID theft during the previous 12 months. Households headed by persons age 18-24 and those with the highest incomes were the most likely victims. One in five victimized households spent about one month resolving problems resulting from ID theft. Source: “First Estimates from the National Crime Victimization Survey, Identity Theft, 2004 Bureau of Justice Statistics Bulletin National Crime Prevention Council 2006 5
  • 6. Why Worry About Identity Theft? (cont.)  U.S. adult victims of identity fraud in 2005 = 9.3 million.  In 2005, total one-year fraud amount = $54.4 billion. (Source: Javelin Strategy and Research 2006 Identity Fraud Survey Report www.javelinstrategy.com) National Crime Prevention Council 2006 6
  • 7. Four Key Points  People are not helpless in protecting themselves from ID theft.  Consumers do not bear the brunt of the loss.  Internet use does not increase risk of ID fraud.  Seniors are not the most frequent targets of identity thieves. (Source: Javelin Strategy and Research 2006 Identity Fraud Survey Report www.javelinstrategy.com) National Crime Prevention Council 2006 7
  • 8. Why Worry About Identity Theft? (cont.)  Deterrence and apprehension are not yet effective. Prevention is the best defense.  There are jurisdictional problems concerning where the crime occurs.  It is an attractive crime to criminals because of its low risk and high return. National Crime Prevention Council 2006 8
  • 9. How Identity Theft Works STEP 1—Getting the Identity  The thief or thieves look for information in any number of ways – Discarded documents in the trash – Receipts from purchases – Lost or stolen wallets or purses – Online “phishing” for personal data – Stolen mail from mailboxes – Thieves are thinking of new, inventive ways every day. National Crime Prevention Council 2006 9
  • 10. How Identity Theft Works STEP 1—Getting the Identity (cont.)    Some thieves go “wholesale” by getting lists of information on individuals through computer hacking, theft, or bribery. The information may be resold to other crooks or used numerous times by the original thief or thieves. Profits may be used to support additional criminal activities such as drug use and terrorism. National Crime Prevention Council 2006 10
  • 11. How Identity Theft Works STEP 2—Exploiting the Identity  With the information that becomes available, the thief may have false IDs made – A state driver’s license with the thief’s picture and the victim’s name – Non-driver’s state license – Social Security card – Employer ID – Credit cards National Crime Prevention Council 2006 11
  • 12. How Identity Theft Works STEP 2—Exploiting the Identity (cont.)  The thief may simply begin leveraging one piece of information to obtain or establish other information or assets. These may include – New credit card accounts – State or local licenses – Accounts with utility companies, apartment leases, or even home mortgages. National Crime Prevention Council 2006 12
  • 13. How Identity Theft Works STEP 3—Discovering the Theft   The thief continues to build a “persona” using the victim’s name, good credit, and even good character references. The thief never pays the bills, but the victim is left with a bad name and ruined credit. Eventually, the victim tries to get a new credit account and is turned down, or gets a bill for a credit card he or she never owned, or starts getting calls from bill collectors. National Crime Prevention Council 2006 13
  • 14. How Identity Theft Works STEP 3—Discovering the Theft (cont.)   The thief might abandon the victim’s identity because he or she has “spoiled” the name of the victim (e.g., with a criminal offense or bankruptcy). When the crime or ruined credit is discovered, the victim is left to clean up the mess. National Crime Prevention Council 2006 14
  • 15. How Identity Theft Works STEP 4—Reporting and Restoring    The victim reports the theft to the local police and to the nation’s major credit bureaus. The victim asks the credit bureaus to note the identity theft crime on his or her credit report. The victim may need to consult with a local victim’s assistance agency or an attorney to obtain information on the necessary, specific steps in a given state. National Crime Prevention Council 2006 15
  • 16. How Identity Theft Works STEP 4—Reporting and Restoring (cont.)  The victim can also file an online report and affidavit with the Federal Trade Commission registry at www.ftc.gov. Go to the identity theft section. National Crime Prevention Council 2006 16
  • 17. Frequently Asked Questions National Crime Prevention Council 2006 17
  • 18. Where and How Do They Get My Information ?  Telephone calls asking you to “update records”  Theft of incoming bills, which show your account number  Theft of outgoing mail and bill payments. National Crime Prevention Council 2006 18
  • 19. Where and How Do They Get My Information? (cont.)  Redirection of stolen mail, where the thief files a change of address on your credit card bills  “Phishing” in which the sender sends out an email or pop-up message that looks like it came from a real bank or credit card company and asks for identifying information. Legitimate companies will never do this. National Crime Prevention Council 2006 19
  • 20. Where and How Do They Get My Information? (cont.) What is “phishing”?  The Internet is a new, convenient, and trusted way to do business, but it also has allowed criminals to create illegitimate emails or pop-up messages posing as your bank, credit card, or utility company. National Crime Prevention Council 2006 20
  • 21. Where and How Do They Get My Information? (cont.) What is “phishing”? (cont.)  They create a phony reason why you need to give them your personal information (e.g., bank routing number, Social Security number).  They use the ease of online transactions to their advantage, hoping you will be fooled. National Crime Prevention Council 2006 21
  • 22. Where and How Do They Get My Information? (cont.) More places…  Going through trash to recover bills  Credit card receipts that you discard or toss out with a shopping bag  Noticing a bill you tossed in a public trash can  Second impressions of credit cards  Casual use of Social Security numbers and other similar identifiers National Crime Prevention Council 2006 22
  • 23. Sample “Phishing” Email National Crime Prevention Council 2006 23
  • 24. How To Avoid a “Phishing” Scam Tips from the FTC:  If you get an email or pop-up message that asks for personal or financial information, do not reply or click on the link in the message. Legitimate companies don’t ask for this information via email. National Crime Prevention Council 2006 24
  • 25. How To Avoid a “Phishing” Scam (cont.) Tips from the FTC:  If you are concerned about your account, contact the organization using its legitimate telephone number or open a new Internet browser and type in the company’s correct web address. National Crime Prevention Council 2006 25
  • 26. How To Avoid a “Phishing” Scam (cont.) More tips from the FTC  Don’t email personal or financial information. If you initiate a transaction and want to provide your personal or financial information through an organization’s website, look for indicators that the site is secure. National Crime Prevention Council 2006 26
  • 27. How To Avoid a “Phishing” Scam (cont.) More tips from the FTC  A “lock” icon on the browser’s status bar or a URL for a website that begins “https:” (the “s” stands for “secure”) indicates that you are on a secure site.  Unfortunately, no indicator is foolproof; some phishers have forged security icons. National Crime Prevention Council 2006 27
  • 28. How To Avoid a “Phishing” Scam (cont.)  Use antivirus software and keep it up to date. Some phishing emails contain software that can harm your computer or track your activities on the Internet without your knowledge. Antivirus software scans incoming communications for troublesome files. Look for antivirus software that recognizes current viruses as well as older ones that can effectively reverse the damage and that updates automatically. National Crime Prevention Council 2006 28
  • 29. How To Avoid a “Phishing” Scam (cont.)  A firewall helps make you invisible on the Internet and blocks all communications from unauthorized sources. It’s especially important to run a firewall if you have a broadband connection. Finally, your operating system (e.g., Windows or Linux) may offer free software “patches” to close holes in the system that hackers or phishers could exploit. National Crime Prevention Council 2006 29
  • 30. Why is ID Theft on the Rise?  Computers have made record keeping faster. Automation also removes human analysis, making it easier for someone to steal an identity or pose as another person.  More and more transactions are being handled electronically, and that trend is continuing to increase dramatically.  More computer hackers now go for monetary returns, not for the thrill of conquering another computer. National Crime Prevention Council 2006 30
  • 31. Why is ID Theft on the Rise? (cont.)  Mobility means that many of us shop in stores all over our communities, regions, or the country, so we are more anonymous than ever.  Many of us find it hard to believe that ID theft could happen to us, even though millions are victims each year. National Crime Prevention Council 2006 31
  • 32. What Can We Do About It?  Consumer education, like the information we’re sharing today, helps you reduce your risk of becoming a victim.  Education is an ongoing process as new technologies and new criminal techniques emerge.  Information about prevention and ways to stop ID theft spread quickly as well. National Crime Prevention Council 2006 32
  • 33. What Can We Do About It? (cont.)  New ways are being found to tighten security on electronic payment systems and to detect “out of the ordinary” purchase patterns.  Some credit card payment systems now signal only the last four digits of your card number, so that someone who steals your receipt can’t steal your good name. National Crime Prevention Council 2006 33
  • 34. What Can We Do About It? (cont.)  New shredders are coming into the market, making thorough document destruction easier at home. “Don’t risk it, shred it.” National Crime Prevention Council 2006 34
  • 35. Who Is Vulnerable? People who  Keep their money in bank accounts  Use credit or debit cards  Generate trash with unshredded paper in it  Casually toss credit card or other receipts into public receptacles  Get personal bills by mail or electronically  Don’t check their credit card reports and bank statements National Crime Prevention Council 2006 35
  • 36. Who Is Vulnerable? (cont.) People who  Don’t regularly check their credit bureau reports  Have accessible mail boxes National Crime Prevention Council 2006 36
  • 37. Prevention  Check your bank, credit card, and similar statements monthly. Make sure you receive them and make sure the charges are yours.  Immediately call your bank or credit card companies if you don’t receive your bill. National Crime Prevention Council 2006 37
  • 38. Prevention (cont.)  Consider registering with the Direct Marketing Association to stop unsolicited credit offers.  NEVER provide account information over the Internet or the telephone unless you originated the call and unless you are absolutely certain of the party to whom you are speaking. National Crime Prevention Council 2006 38
  • 39. Prevention (cont.)  Rip up receipts if you will not need them for warranties or returns.  Shred any unwanted credit, loan, or credit card offers – or at least cut them up with scissors – before putting them in the trash. National Crime Prevention Council 2006 39
  • 40. Prevention (cont.)  Do not give out your real name or other personal information in Internet chat rooms. Use a screen name.  Do not authorize others to use your credit cards. They may not take the same care that you do.  Deposit mail in a U.S. Postal Service mailbox.  Make sure your mailbox is secure. National Crime Prevention Council 2006 40
  • 41. Review: Coping With Identity Theft  File a police report immediately.  Notify the three major credit bureaus and each of your credit or debit card issuers of the identity theft and ask that appropriate alerts and closures be filed.  File a report with the Federal Trade Commission’s Complaint Center and obtain an ID Theft Affidavit, which is available online at www.ftc.gov. National Crime Prevention Council 2006 41
  • 42. Review: Coping With ID Theft (cont.)  Check credit reports, immediately report any incorrect activity, and ensure that a fraud alert is active on your account.  Carry copies of documents with you – the police report, the affidavit, and any other formal records that attest to your identity – in case of emergency. National Crime Prevention Council 2006 42
  • 43. Review: Coping With Identity Theft (cont.)  Check court records in your general area for bankruptcies and for mortgage liens using your name. Many records are automated, which makes the job easier. National Crime Prevention Council 2006 43
  • 44. Encourage Everyone to…  Review their habits about handling personal information.  Take prevention strategies to heart – and encourage others to do so.  Speak out about the need for preventive action and laws that protect identity theft victims. National Crime Prevention Council 2006 44
  • 45. Online Resources  Federal Trade Commission: www.ftc.gov  Department of Justice: www.usdoj.gov/criminal/fraud/idtheft.html  Better Business Bureau: www.bbb.org  United States Postal Service: www.usps.com  National Criminal Justice Reference Service: www.ncjrs.gov National Crime Prevention Council 2006 45
  • 46. Online Resources  Many nonprofit organizations are committed to promoting prevention and recovery from identify theft. Here are a few: www.idtheftcenter.com/index.shtml www.identitytheft.org/ www.privacyrights.org/identity.htm National Crime Prevention Council 2006 46
  • 47. National Crime Prevention Council 1000 Connecticut Avenue, NW Thirteenth Floor Washington, DC 20036 202-466-6272 www.ncpc.org National Crime Prevention Council 2006 47

Notes de l'éditeur

  1. Mention that the National Crime Prevention Council, in partnership with the Bureau of Justice Assistance, is the creator of this PowerPoint. After welcoming the participants, read and review each objective. Ask if there are any questions about the material that will be covered during the presentation. You may want to write a list of expectations for the training and then review this list at the end of the presentation to ensure that participants were satisfied. Or you may want to create a “parking lot” of questions or issues that may be addressed by the presentation. You can add to the list during the presentation and then review it at the end. Participants with unanswered questions or requests can be referred to additional resources.
  2. Before the presentation, research local data (if available) on cases of identity theft. Check with the consumer protection bureau, local police department, state attorney general’s office, prosecutor’s office, etc.
  3. You may want to find local numbers for this section. What cases or what number of crimes have taken place in your area? Check with the consumer protection bureau, local police department, prosecutor’s office, etc.
  4. Emphasize that identity thieves are finding new ways to operate every day and remind participants that being cautious and vigilant is the key to preventing ID theft.
  5. Make the connection between identity theft and methamphetamine use as one example.
  6. Various forms of identification can be created to give a thief access to even more of your personal information and assets. State and federal governments are working to make it harder to create fake state identification cards and Social Security cards.
  7. Depending on the audience’s concern you may want to explain the procedure of filing a report and affidavit online with the FTC. Go to the website for specifics.
  8. Remind participants that email is not secure, and they should never send personal information over email because it can be stolen by any hacker.
  9. Phony emails claiming to be from eBay, Amazon.com, and other well-known companies have appeared. Encourage participants to report suspicious activity to the Federal Trade Commission. Spam that is phishing for information should be forwarded to spam@uce.gov. Phony emails often claim that the recipient must respond at once and that there will be serious consequences for not providing information, as in the fake SunTrust email shown in this slide. It reads, “This process is mandatory, and if not completed... your account or credit card may be subject to temporary suspension.” This is a sure indicator that the email is phony! Ironically, the fake SunTrust email claims that the email shown is the bank’s response to fake emails claiming to be from SunTrust!
  10. For these new crimes, new safeguards and forms of government assistance are still being created. Update local information via your consumer protection office or state attorney general’s office. Check out www.ftc.gov for the most recent measures to prevent identity theft and protect victims.
  11. Cite examples
  12. Encourage participants to remember the phrase, “Don’t risk it, shred it.”
  13. Emphasize that this information applies to everyone! Stress the point that identity thieves don’t target people by age, race, ethnicity, or location. Everyone is a potential victim.
  14. Note the difference that taking swift action can make. The longer the thief has to exploit a person’s identity, the more harm will be done and the more time and money and heartache it will take to repair the damage and restore the victim’s good credit.
  15. Return to the list of objectives and items in the “parking lot.” Review each item, and summarize the key points covered during the presentation relating to that item.