SlideShare une entreprise Scribd logo
1  sur  54
Télécharger pour lire hors ligne
Module XLVI - Investigating Identity
Theft Cases
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
News: Five from ID Theft Ring
Indicted for Using Bogus Credit Cards,
Buying Meth
Source: http://www.rockymountainnews.com/
By Hector Gutierrez,
Published November 5, 2008 at 7:30 p.m.
Five people have been indicted in an ID theft operation in which they allegedly used bogus credit cards and
bought methamphetamines with the cash they got after reselling purchased items, Aurora police announced
Wednesday.
The Denver grand jury returned indictments last week against the five charging them with numerous counts,
including violating the Colorado Organized Crime Control Act, theft, forgery, identity theft and conspiracy to
commit computer crime, forgery, and theft.
The ring's alleged leader, Shadwick Weaver, 35, was in custody in the Douglas County Jail when the
indictment was handed down, police said. Weaver is facing 56 criminal counts and was being held on
$500,000 bail.
Detectives from the police department's economic crimes unit and a crime analyst began investigating the
group in April after the found out that they may have been involved in a variety of white-collar crimes in
Aurora and the north Denver metro area, detective Robert Friel, police spokesman, said.
The group members allegedly got hold of victims' identities by burglarizing homes, breaking into cars and
vehicle larceny, the detective said. The ring also possessed equipment that they used to manufacture
documents such as counterfeit checks, credit cards, Social Security cards, drivers licenses, photo identities
and employee badges. Detectives believe the group possessed about 300 such bogus documents, Friel said.
"We executed a search warrant and we believe we took away their tools that they were using to carry out the
scheme," the detective said.
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
News: Woman Jailed for Stealing
Identities
Source: http://www.faxts.com/
Written by FBI
Tuesday, 21 October 2008 15:55
PHILADELPHIA - Jocelyn Kirsch, 23, of Novato, California, was sentenced today to five years in prison for
her role in an extensive identity theft and fraud scheme, announced Acting United States Attorney Laurie
Magid.
Kirsch pleaded guilty in July 2008, to conspiracy, aggravated identity theft, access device fraud, bank
fraud, and money laundering. Between November 2006 and November 30, 2007, Kirsch and co-defendant
Edward Anderton stole identity information, credit cards, and credit card account information from
numerous victims, including friends, co-workers, neighbors, fellow students, bar patrons, and others, and
used those stolen materials extensively to buy merchandise and obtain cash. Anderton pleaded guilty in
June 2008 and is scheduled for sentencing on November 14, 2008. In addition to the prison terms, United
States District Court Judge Eduardo Robreno ordered Kirsch to pay $101,033 restitution, a $600 special
assessment, and to complete five years of supervised release.
Over the course of a year, defendants Anderton and Kirsch used the identities of more than 16 victims in
numerous illegal transactions to obtain more than $119,000 in cash and merchandise. They also made
failed attempts to obtain more than $122,000 in additional cash and merchandise. The defendants used
the proceeds of their fraud scheme to help fund their lavish lifestyle that included trips to Florida, Paris,
Hawaii, Montreal, and the Turks and Caicos Islands in the Caribbean.
The case was investigated by the Federal Bureau of Investigation, the United States Postal Inspection
Service, the Philadelphia Police Department, The University of Pennsylvania Police Department, and the
Philadelphia District Attorney’s Office. It was prosecuted by Assistant United States Attorney Louis D.
Lappen and Special Assistant United States Attorney Lisa Caulfield.
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Objective
• Identity Theft
• Who Commits Identity Theft
• How Criminals Get Information
• Techniques Used By Criminals
• How Does a Criminal Use Information?
• Investigating Identity Theft
• Identity Theft Laws
• Protection From Identity Theft
This module will familiarize you with:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
Identity Theft
Who Commits Identity Theft
How Criminals Get Information
Techniques Used By Criminals
How Does a Criminal Use
Information?
Investigating Identity Theft
Identity Theft Laws
Protection From Identity Theft
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Identity Theft
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Identity Theft
Identity theft is an unauthorized use of others’ personal
information for fraudulent or unlawful activities
Identity thieves steal name and reputation and use them
for their own financial gain
It causes serious breaches of privacy
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Identifying Information
Names (current or former)
Social Security numbers
Driver’s license numbers
Bank account/credit card numbers
Birth dates
Residential and/or work address
Tax identification numbers
Medical identifications
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Identity Theft Statistics for 2007
FTC received 813,899 consumer fraud
and identity theft complaints
Credit card fraud (23%) was the most
common form of reported identity
theft followed by phone or utilities
fraud (18%), employment fraud (14%),
and bank fraud (13%)
Other significant categories of identity
theft reported by victims were
government documents/benefits fraud
(11%) and loan fraud (5%)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Identity Theft Complaints by Age
of the Consumer
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Examples of Identity Theft
A person is not able to renew his/her Driving License or register to vote
due to crimes committed in his/her name by another person
People have been denied employment or fired when a criminal record
showed on the background check which was done by another person
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Who Commits Identity Theft
Professional thieves
Strangers
Family members and
relatives
Friends/acquaintances
Co-Employees
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
How Criminals Get Information
Stealing files from work places, shops, medical services, banks, etc.
Stealing wallet or purse
Stealing information from home or car
Stealing information from mail ( Bank and credit card statements, checks,
loan pre-approvals, tax information )
Scam phone calls where a stranger asks for personal or financial
information
Hacking into an organization’s computers
Conning information out of employees
Bribing an employee who has access to records
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
How Personal Information was
Stolen: Statistics
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Techniques Used by Criminals
Non technological methods:
• Dumpster diving
• Shoulder surfing
• Telemarketing scams
• Bribing or inserting dishonest employees
• Mail theft/interception
• Masquerading and Social hacking
Technological methods:
• Credit card skimming
• Spy cameras in ATMs
• Phishing and Pharming
• Wireless communication interception
• Software ( Viruses/Hijacking and Spyware)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
How Does a Criminal use
Information?
Obtains new credit cards and makes changes to the existing bank
accounts
Goes on a spending spree with the stolen credit cards and
identification
Changes the credit cards’ mailing address
Obtains personal, student, car, and mortgage loans
Gets job using the victim’s name and social security number
Obtains wireless telephone equipment or services
Files fraudulent tax returns
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
FTC Consumer Sentinel
Consumer Sentinel is an investigative cyber tool which provides members
of the Consumer Sentinel Network to access millions of consumer
complaints
It includes complaints about:
• Identity theft
• Computers, the Internet, and online auctions
• Telemarketing scams
• Advance-fee loans and credit scams
• Sweepstakes, lotteries, and prizes
• Business opportunities and work-at-home schemes
• Debt collection, credit reports, and financial matters
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
FTC Consumer Sentinel:
Screenshot 1
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
FTC Consumer Sentinel:
Screenshot 2
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Identity Theft Movies
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigating Identity Theft
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigating Identity Theft
Interview the victim
Get the credit reports
Collect information about online activities of the victim
Collect information about the websites where victim has disclosed personal information
Search the FTC consumer sentinel
Collect information from point of sale
Collect information from courier services
Get call records from service providers if stolen identity is used to obtain phone service
Search the suspect’s address
Obtain search and seize warrant
Seize the computer and mobile devices from suspects
Collect the browser’s information from the suspect’s computer
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Interview the Victim
Enquire about how the identity was stolen
Ask when the victim first suspected that the identity was stolen
Ask whether the victim uses his/her identity online
Enquire about victim’s work place security policies
Note all the details collected from the victim
Provide a copy of the incident report to the victim to straighten
out credit histories
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Get the Credit Reports
For every consumer transactions, credit reports and
credit scores are used
Get the credit report on the victim’s name and check it
properly
Credit reports are supplied by:
• Equifax: http://www.equifax.com
• Experian: http://www.experian.com/
• TransUnion: http://www.transunion.com/
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Sample Credit Report
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Collect Information About
Online Activities of Victim
Check the victim’s online activities
Check whether the victim has answered any spam mail
Check whether he/she is an victim of the phishing site
Collect the browsing history, cookies, cache, search
history, offline website data, and all the available
information from the victim’s computer
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Collect Information About the Websites
Where Victim Has Disclosed Personal
Information
If the victim has given sensitive information online, check for the
websites address
Check the website details using:
• http://www.whois.net/
• http://centralops.net/co/
Information regarding any website (currently down) since its launch can
be found at:
• http://www.archive.org/
Investigate the website’s security policies
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
http://www.whois.net/
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
http://centralops.net/co/
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
http://www.archive.org/
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Search the FTC Consumer
Sentinel
Consumer Sentinel is a secure online database of millions of consumer
complaints
Any federal, state, or local law enforcement agency can access the
Consumer Sentinel
Search and study similar type of cases (Gives an idea how past cases are
solved)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Collect Information from Point
of Sale
Check whether the thief has purchased any goods in person
Collect all the details about the thief from the merchant
Collect the photos and video tapes if any from the cameras
installed at the merchant’s place
Check for any contact information given to the merchant
(mailing address or phone numbers )
Check how the merchandise is delivered
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Collect Information from Courier
Services
Check whether the thief has bought any goods online (By checking
the credit card bills)
If so, contact the vendors and check how the goods are delivered
Collect the mailing addresses, telephone numbers, and courier
service details
Bogus addresses may also be useful as the identity thief uses same
bogus address in multiple crimes
Contact the courier services and collect the information from the
delivery persons
• Obtain the package delivery history
• Get a brief idea about the person to whom the goods are delivered
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Get Call Records from Service Providers if
Stolen Identity is Used to Obtain Phone
Service
• Contact service providers and check the applications
• Get the call records
• Trap the most communicated phone numbers
If the stolen identity is used to obtain the
phone service:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Search the Suspect’s Address
Check for the suspect’s address
Check the suspect’s criminal history to see if he/she is
involved in a similar fraud in the past
Check the suspect’s trash to get any bills, vouchers, covers
or envelopes, etc.
If the suspect is from other jurisdiction or operating in
other jurisdiction, contact other law enforcement agencies
where he/she lives
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Obtain Search and Seize Warrant
If any person is susceptible, provide all the clues in the court
Obtain search and seize warrant for further investigation
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Seize the Computer and Mobile
Devices from Suspects
Seize the computer, cell phones, and other electronic equipment from
suspect’s home
Search the suspect’s home and surroundings
Seize all the credit cards, bank notes, check books, etc. which is on the
victim’s name
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Collect the Browser Information
from Suspect’s Computer
• Browsing information
• Search history
• Cache
• Cookies
• Offline website data
• Authentication sessions
After seizing the suspect’s computer, check for:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Identity Theft Laws
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
United States: Federal Identity Theft and
Assumption Deterrence Act of 1998
18 U.S.C. § 1028(a)(7) Federal law was passed in 1998
Prohibits “knowingly transfers or uses, without lawful authority, a
means of identification of another person with the intent to commit, or
to aid or abet, any unlawful activity that constitutes a violation of
Federal law, or that constitutes a felony under any applicable State or
local law”
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Unites States Federal Laws
18 U.S.C. § 1028 – Identification Fraud
18 U.S.C. § 1029 – Credit Card Fraud
18 U.S.C. § 1030 – Computer Fraud
18 U.S.C. § 1341 – Mail Fraud
18 U.S.C. § 1343 – Wire Fraud
18 U.S.C. § 1344 – Financial Institution Fraud
18 U.S.C. § 1708 – Mail Theft
18 U.S.C. § 1546 – Immigration Document Fraud
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Australia
According to Commonwealth level, under the Criminal
Code Amendment Act 2000 which amended certain
provisions within the Criminal Code Act 1995,
135.1 General dishonesty
Obtaining a gain
(1) A person is guilty of an offense if:
(a) the person does anything with the intention of
dishonestly obtaining benefit from another person; and
(b) the other person is a Commonwealth entity
Penalty: Imprisonment for 5 years
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Canada
Under the section 403 of the Criminal Code of Canada,
every one who fraudulently personates any person, living or
dead,
(a) with intent to gain advantage for himself or another person,
(b) with intent to obtain any property or an interest in any
property, or
(c) with intent to cause disadvantage to the person whom he
personates or another person, is guilty of an indictable offense and
liable to imprisonment for a term not exceeding ten years or an
offense punishable on summary conviction
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Hong Kong
THEFT ORDINANCE - CHAPTER 210
SEC 16A
If any person by any deceit (whether or not the deceit is
the sole or main inducement) and with intent to defraud
induces another person to commit an act or make an
omission, which results either-
(a) in benefit to any person other than the second-mentioned
person; or
(b) in prejudice or a substantial risk of prejudice to any person
other than the first-mentioned person, the first-mentioned person
commits the offense of fraud and is liable on conviction upon
indictment to imprisonment for 14 years
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
United Kingdom
Data Protection Act protects the personal data in United Kingdom
It covers all personal data which an organization may hold, including
names, birthday and anniversary dates, addresses, telephone numbers,
etc.
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Protection From Identity Theft
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Protection from ID Theft
Check bank account balances regularly
Order the credit reports and review carefully
Check SSA Annual Earnings Statement
Secure all the personal information
Never leave sensitive information in vehicles
Use strong passwords for logging into bank accounts and computers
Enquire about security policies at workplace
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Protection from ID Theft (cont’d)
Never use public computers for accessing sensitive information
Do not provide personal information over the phone, Internet, or
through the mail
Guard mails and trashcans from theft
Pay attention to billing cycles
Keep virus protection and security suite software updated
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
What Should Victims Do?
Report to local police and get a copy of report
Call fraud departments of CRAs and get fraud alerts and victim
statements placed on credit reports
Contact creditors fraud departments, report fraudulent accounts, and
charges
Notify each creditor in writing about the identity fraud
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Resources for Victims
www.consumer.gov/idtheft or www.ftc.gov
1-877-ID-THEFT or 1-877-438-4338
www.identitytheft.org
www.idtheftcenter.org
www.privacyrights.org
US Trustees – for bankruptcy (http://www.usdoj.gov/ust/)
Social Security Office of Inspector General (http://www.ssa.gov/oig/)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Summary
Identity theft is the theft or unauthorized use of others’ personal identifying information for
fraudulent or unlawful activities
Criminals steal files from work places, shops, medical services, banks, etc.
Obtain new credit cards and make changes to the existing bank accounts
Check whether the victim has answered any spam mail redirecting him/her to the phishing
sites
If the victim has given sensitive information online, investigate such website’s address
Collect the photos and video tapes if any from the cameras installed at the merchant’s place
Obtain search and seize warrant for further investigation
Never use public computers for accessing sensitive information
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

Contenu connexe

Tendances

Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
Jonan Momo
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
ian_oguis
 
International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...
USAID CEED II Project Moldova
 

Tendances (20)

File000160
File000160File000160
File000160
 
File000164
File000164File000164
File000164
 
Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the Web
 
National framework for digital forensics bangladesh context
National framework for digital forensics   bangladesh context National framework for digital forensics   bangladesh context
National framework for digital forensics bangladesh context
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
File000166
File000166File000166
File000166
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Volonino ppt 01
Volonino ppt 01Volonino ppt 01
Volonino ppt 01
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
File000168
File000168File000168
File000168
 
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacy
 
International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...
 
File000145
File000145File000145
File000145
 
Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
 
File000098
File000098File000098
File000098
 
File000095
File000095File000095
File000095
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Chapter14
Chapter14Chapter14
Chapter14
 
A Tale of One City
A Tale of One CityA Tale of One City
A Tale of One City
 

En vedette

Ce Hv6 Module 18 Web Based Password Cracking Techniques
Ce Hv6 Module 18 Web Based Password Cracking TechniquesCe Hv6 Module 18 Web Based Password Cracking Techniques
Ce Hv6 Module 18 Web Based Password Cracking Techniques
Kislaychd
 
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimesModule 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
sagaroceanic11
 
Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) Course
Mercury Solutions Limited
 
Presentacion corporativa affinalia
Presentacion corporativa affinaliaPresentacion corporativa affinalia
Presentacion corporativa affinalia
Alejandro Ternero
 
Tarifa kaysun ligera_2014_0
Tarifa kaysun ligera_2014_0Tarifa kaysun ligera_2014_0
Tarifa kaysun ligera_2014_0
Rooibos13
 

En vedette (20)

File000153
File000153File000153
File000153
 
Ce Hv6 Module 18 Web Based Password Cracking Techniques
Ce Hv6 Module 18 Web Based Password Cracking TechniquesCe Hv6 Module 18 Web Based Password Cracking Techniques
Ce Hv6 Module 18 Web Based Password Cracking Techniques
 
File000129
File000129File000129
File000129
 
File000123
File000123File000123
File000123
 
CEH v7 brochure
CEH v7 brochureCEH v7 brochure
CEH v7 brochure
 
File000138
File000138File000138
File000138
 
File000131
File000131File000131
File000131
 
File000120
File000120File000120
File000120
 
Module 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimesModule 19 tracking emails and investigating email crimes
Module 19 tracking emails and investigating email crimes
 
Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) Course
 
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
 
El calentamiento
El calentamientoEl calentamiento
El calentamiento
 
Soy mujer en cristo
Soy mujer en cristoSoy mujer en cristo
Soy mujer en cristo
 
Joomla 3.0 avanzado
Joomla 3.0 avanzadoJoomla 3.0 avanzado
Joomla 3.0 avanzado
 
Presentacion corporativa affinalia
Presentacion corporativa affinaliaPresentacion corporativa affinalia
Presentacion corporativa affinalia
 
The Data Republic
The Data RepublicThe Data Republic
The Data Republic
 
FotomontaggIo in 10 mosse
FotomontaggIo in 10 mosseFotomontaggIo in 10 mosse
FotomontaggIo in 10 mosse
 
Social Media Marketing für KMUs und Nonprofits
Social Media Marketing für KMUs und NonprofitsSocial Media Marketing für KMUs und Nonprofits
Social Media Marketing für KMUs und Nonprofits
 
Tarifa kaysun ligera_2014_0
Tarifa kaysun ligera_2014_0Tarifa kaysun ligera_2014_0
Tarifa kaysun ligera_2014_0
 
הרצאה שיווק באינטרנט
הרצאה שיווק באינטרנטהרצאה שיווק באינטרנט
הרצאה שיווק באינטרנט
 

Similaire à File000159

1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
jesusamckone
 
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
herminaprocter
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
jwnollet
 
What is investigative reporting How is it relevant to white collar .pdf
What is investigative reporting How is it relevant to white collar .pdfWhat is investigative reporting How is it relevant to white collar .pdf
What is investigative reporting How is it relevant to white collar .pdf
eyevisioncare1
 
PREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSPREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERS
Greg Ewers
 
Identity theft, its psychosocial effect and victim support.pptx
Identity theft, its psychosocial effect and victim support.pptxIdentity theft, its psychosocial effect and victim support.pptx
Identity theft, its psychosocial effect and victim support.pptx
Waridah Makena
 

Similaire à File000159 (20)

1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
 
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Seniors And Crime Prevention
Seniors And Crime PreventionSeniors And Crime Prevention
Seniors And Crime Prevention
 
An Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South AfricaAn Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South Africa
 
Identity Theft * Canada
Identity Theft * CanadaIdentity Theft * Canada
Identity Theft * Canada
 
From Credit Cards to Power Plants to Puppies - We Hack Everything
From Credit Cards to Power Plants to Puppies - We Hack EverythingFrom Credit Cards to Power Plants to Puppies - We Hack Everything
From Credit Cards to Power Plants to Puppies - We Hack Everything
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect you
 
What is investigative reporting How is it relevant to white collar .pdf
What is investigative reporting How is it relevant to white collar .pdfWhat is investigative reporting How is it relevant to white collar .pdf
What is investigative reporting How is it relevant to white collar .pdf
 
PREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSPREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERS
 
Identity theft, its psychosocial effect and victim support.pptx
Identity theft, its psychosocial effect and victim support.pptxIdentity theft, its psychosocial effect and victim support.pptx
Identity theft, its psychosocial effect and victim support.pptx
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 

Plus de Desmond Devendran

Plus de Desmond Devendran (18)

Siam key-facts
Siam key-factsSiam key-facts
Siam key-facts
 
Siam foundation-process-guides
Siam foundation-process-guidesSiam foundation-process-guides
Siam foundation-process-guides
 
Siam foundation-body-of-knowledge
Siam foundation-body-of-knowledgeSiam foundation-body-of-knowledge
Siam foundation-body-of-knowledge
 
Enterprise service-management-essentials
Enterprise service-management-essentialsEnterprise service-management-essentials
Enterprise service-management-essentials
 
Service Integration and Management
Service Integration and Management Service Integration and Management
Service Integration and Management
 
Diagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_enDiagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_en
 
CHFI 1
CHFI 1CHFI 1
CHFI 1
 
File000176
File000176File000176
File000176
 
File000175
File000175File000175
File000175
 
File000174
File000174File000174
File000174
 
File000173
File000173File000173
File000173
 
File000172
File000172File000172
File000172
 
File000171
File000171File000171
File000171
 
File000170
File000170File000170
File000170
 
File000169
File000169File000169
File000169
 
File000163
File000163File000163
File000163
 
File000162
File000162File000162
File000162
 
File000156
File000156File000156
File000156
 

Dernier

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

File000159

  • 1. Module XLVI - Investigating Identity Theft Cases
  • 2. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited News: Five from ID Theft Ring Indicted for Using Bogus Credit Cards, Buying Meth Source: http://www.rockymountainnews.com/ By Hector Gutierrez, Published November 5, 2008 at 7:30 p.m. Five people have been indicted in an ID theft operation in which they allegedly used bogus credit cards and bought methamphetamines with the cash they got after reselling purchased items, Aurora police announced Wednesday. The Denver grand jury returned indictments last week against the five charging them with numerous counts, including violating the Colorado Organized Crime Control Act, theft, forgery, identity theft and conspiracy to commit computer crime, forgery, and theft. The ring's alleged leader, Shadwick Weaver, 35, was in custody in the Douglas County Jail when the indictment was handed down, police said. Weaver is facing 56 criminal counts and was being held on $500,000 bail. Detectives from the police department's economic crimes unit and a crime analyst began investigating the group in April after the found out that they may have been involved in a variety of white-collar crimes in Aurora and the north Denver metro area, detective Robert Friel, police spokesman, said. The group members allegedly got hold of victims' identities by burglarizing homes, breaking into cars and vehicle larceny, the detective said. The ring also possessed equipment that they used to manufacture documents such as counterfeit checks, credit cards, Social Security cards, drivers licenses, photo identities and employee badges. Detectives believe the group possessed about 300 such bogus documents, Friel said. "We executed a search warrant and we believe we took away their tools that they were using to carry out the scheme," the detective said.
  • 3. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited News: Woman Jailed for Stealing Identities Source: http://www.faxts.com/ Written by FBI Tuesday, 21 October 2008 15:55 PHILADELPHIA - Jocelyn Kirsch, 23, of Novato, California, was sentenced today to five years in prison for her role in an extensive identity theft and fraud scheme, announced Acting United States Attorney Laurie Magid. Kirsch pleaded guilty in July 2008, to conspiracy, aggravated identity theft, access device fraud, bank fraud, and money laundering. Between November 2006 and November 30, 2007, Kirsch and co-defendant Edward Anderton stole identity information, credit cards, and credit card account information from numerous victims, including friends, co-workers, neighbors, fellow students, bar patrons, and others, and used those stolen materials extensively to buy merchandise and obtain cash. Anderton pleaded guilty in June 2008 and is scheduled for sentencing on November 14, 2008. In addition to the prison terms, United States District Court Judge Eduardo Robreno ordered Kirsch to pay $101,033 restitution, a $600 special assessment, and to complete five years of supervised release. Over the course of a year, defendants Anderton and Kirsch used the identities of more than 16 victims in numerous illegal transactions to obtain more than $119,000 in cash and merchandise. They also made failed attempts to obtain more than $122,000 in additional cash and merchandise. The defendants used the proceeds of their fraud scheme to help fund their lavish lifestyle that included trips to Florida, Paris, Hawaii, Montreal, and the Turks and Caicos Islands in the Caribbean. The case was investigated by the Federal Bureau of Investigation, the United States Postal Inspection Service, the Philadelphia Police Department, The University of Pennsylvania Police Department, and the Philadelphia District Attorney’s Office. It was prosecuted by Assistant United States Attorney Louis D. Lappen and Special Assistant United States Attorney Lisa Caulfield.
  • 4. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Objective • Identity Theft • Who Commits Identity Theft • How Criminals Get Information • Techniques Used By Criminals • How Does a Criminal Use Information? • Investigating Identity Theft • Identity Theft Laws • Protection From Identity Theft This module will familiarize you with:
  • 5. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Flow Identity Theft Who Commits Identity Theft How Criminals Get Information Techniques Used By Criminals How Does a Criminal Use Information? Investigating Identity Theft Identity Theft Laws Protection From Identity Theft
  • 6. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Identity Theft
  • 7. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Identity Theft Identity theft is an unauthorized use of others’ personal information for fraudulent or unlawful activities Identity thieves steal name and reputation and use them for their own financial gain It causes serious breaches of privacy
  • 8. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Identifying Information Names (current or former) Social Security numbers Driver’s license numbers Bank account/credit card numbers Birth dates Residential and/or work address Tax identification numbers Medical identifications
  • 9. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Identity Theft Statistics for 2007 FTC received 813,899 consumer fraud and identity theft complaints Credit card fraud (23%) was the most common form of reported identity theft followed by phone or utilities fraud (18%), employment fraud (14%), and bank fraud (13%) Other significant categories of identity theft reported by victims were government documents/benefits fraud (11%) and loan fraud (5%)
  • 10. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Identity Theft Complaints by Age of the Consumer
  • 11. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Examples of Identity Theft A person is not able to renew his/her Driving License or register to vote due to crimes committed in his/her name by another person People have been denied employment or fired when a criminal record showed on the background check which was done by another person
  • 12. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Who Commits Identity Theft Professional thieves Strangers Family members and relatives Friends/acquaintances Co-Employees
  • 13. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited How Criminals Get Information Stealing files from work places, shops, medical services, banks, etc. Stealing wallet or purse Stealing information from home or car Stealing information from mail ( Bank and credit card statements, checks, loan pre-approvals, tax information ) Scam phone calls where a stranger asks for personal or financial information Hacking into an organization’s computers Conning information out of employees Bribing an employee who has access to records
  • 14. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited How Personal Information was Stolen: Statistics
  • 15. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Techniques Used by Criminals Non technological methods: • Dumpster diving • Shoulder surfing • Telemarketing scams • Bribing or inserting dishonest employees • Mail theft/interception • Masquerading and Social hacking Technological methods: • Credit card skimming • Spy cameras in ATMs • Phishing and Pharming • Wireless communication interception • Software ( Viruses/Hijacking and Spyware)
  • 16. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited How Does a Criminal use Information? Obtains new credit cards and makes changes to the existing bank accounts Goes on a spending spree with the stolen credit cards and identification Changes the credit cards’ mailing address Obtains personal, student, car, and mortgage loans Gets job using the victim’s name and social security number Obtains wireless telephone equipment or services Files fraudulent tax returns
  • 17. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited FTC Consumer Sentinel Consumer Sentinel is an investigative cyber tool which provides members of the Consumer Sentinel Network to access millions of consumer complaints It includes complaints about: • Identity theft • Computers, the Internet, and online auctions • Telemarketing scams • Advance-fee loans and credit scams • Sweepstakes, lotteries, and prizes • Business opportunities and work-at-home schemes • Debt collection, credit reports, and financial matters
  • 18. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited FTC Consumer Sentinel: Screenshot 1
  • 19. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited FTC Consumer Sentinel: Screenshot 2
  • 20. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Identity Theft Movies
  • 21. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigating Identity Theft
  • 22. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigating Identity Theft Interview the victim Get the credit reports Collect information about online activities of the victim Collect information about the websites where victim has disclosed personal information Search the FTC consumer sentinel Collect information from point of sale Collect information from courier services Get call records from service providers if stolen identity is used to obtain phone service Search the suspect’s address Obtain search and seize warrant Seize the computer and mobile devices from suspects Collect the browser’s information from the suspect’s computer
  • 23. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Interview the Victim Enquire about how the identity was stolen Ask when the victim first suspected that the identity was stolen Ask whether the victim uses his/her identity online Enquire about victim’s work place security policies Note all the details collected from the victim Provide a copy of the incident report to the victim to straighten out credit histories
  • 24. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Get the Credit Reports For every consumer transactions, credit reports and credit scores are used Get the credit report on the victim’s name and check it properly Credit reports are supplied by: • Equifax: http://www.equifax.com • Experian: http://www.experian.com/ • TransUnion: http://www.transunion.com/
  • 25. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Sample Credit Report
  • 26. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Collect Information About Online Activities of Victim Check the victim’s online activities Check whether the victim has answered any spam mail Check whether he/she is an victim of the phishing site Collect the browsing history, cookies, cache, search history, offline website data, and all the available information from the victim’s computer
  • 27. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Collect Information About the Websites Where Victim Has Disclosed Personal Information If the victim has given sensitive information online, check for the websites address Check the website details using: • http://www.whois.net/ • http://centralops.net/co/ Information regarding any website (currently down) since its launch can be found at: • http://www.archive.org/ Investigate the website’s security policies
  • 28. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited http://www.whois.net/
  • 29. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited http://centralops.net/co/
  • 30. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited http://www.archive.org/
  • 31. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Search the FTC Consumer Sentinel Consumer Sentinel is a secure online database of millions of consumer complaints Any federal, state, or local law enforcement agency can access the Consumer Sentinel Search and study similar type of cases (Gives an idea how past cases are solved)
  • 32. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Collect Information from Point of Sale Check whether the thief has purchased any goods in person Collect all the details about the thief from the merchant Collect the photos and video tapes if any from the cameras installed at the merchant’s place Check for any contact information given to the merchant (mailing address or phone numbers ) Check how the merchandise is delivered
  • 33. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Collect Information from Courier Services Check whether the thief has bought any goods online (By checking the credit card bills) If so, contact the vendors and check how the goods are delivered Collect the mailing addresses, telephone numbers, and courier service details Bogus addresses may also be useful as the identity thief uses same bogus address in multiple crimes Contact the courier services and collect the information from the delivery persons • Obtain the package delivery history • Get a brief idea about the person to whom the goods are delivered
  • 34. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Get Call Records from Service Providers if Stolen Identity is Used to Obtain Phone Service • Contact service providers and check the applications • Get the call records • Trap the most communicated phone numbers If the stolen identity is used to obtain the phone service:
  • 35. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Search the Suspect’s Address Check for the suspect’s address Check the suspect’s criminal history to see if he/she is involved in a similar fraud in the past Check the suspect’s trash to get any bills, vouchers, covers or envelopes, etc. If the suspect is from other jurisdiction or operating in other jurisdiction, contact other law enforcement agencies where he/she lives
  • 36. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Obtain Search and Seize Warrant If any person is susceptible, provide all the clues in the court Obtain search and seize warrant for further investigation
  • 37. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Seize the Computer and Mobile Devices from Suspects Seize the computer, cell phones, and other electronic equipment from suspect’s home Search the suspect’s home and surroundings Seize all the credit cards, bank notes, check books, etc. which is on the victim’s name
  • 38. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Collect the Browser Information from Suspect’s Computer • Browsing information • Search history • Cache • Cookies • Offline website data • Authentication sessions After seizing the suspect’s computer, check for:
  • 39. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Identity Theft Laws
  • 40. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited United States: Federal Identity Theft and Assumption Deterrence Act of 1998 18 U.S.C. § 1028(a)(7) Federal law was passed in 1998 Prohibits “knowingly transfers or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law”
  • 41. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Unites States Federal Laws 18 U.S.C. § 1028 – Identification Fraud 18 U.S.C. § 1029 – Credit Card Fraud 18 U.S.C. § 1030 – Computer Fraud 18 U.S.C. § 1341 – Mail Fraud 18 U.S.C. § 1343 – Wire Fraud 18 U.S.C. § 1344 – Financial Institution Fraud 18 U.S.C. § 1708 – Mail Theft 18 U.S.C. § 1546 – Immigration Document Fraud
  • 42. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Australia According to Commonwealth level, under the Criminal Code Amendment Act 2000 which amended certain provisions within the Criminal Code Act 1995, 135.1 General dishonesty Obtaining a gain (1) A person is guilty of an offense if: (a) the person does anything with the intention of dishonestly obtaining benefit from another person; and (b) the other person is a Commonwealth entity Penalty: Imprisonment for 5 years
  • 43. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Canada Under the section 403 of the Criminal Code of Canada, every one who fraudulently personates any person, living or dead, (a) with intent to gain advantage for himself or another person, (b) with intent to obtain any property or an interest in any property, or (c) with intent to cause disadvantage to the person whom he personates or another person, is guilty of an indictable offense and liable to imprisonment for a term not exceeding ten years or an offense punishable on summary conviction
  • 44. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Hong Kong THEFT ORDINANCE - CHAPTER 210 SEC 16A If any person by any deceit (whether or not the deceit is the sole or main inducement) and with intent to defraud induces another person to commit an act or make an omission, which results either- (a) in benefit to any person other than the second-mentioned person; or (b) in prejudice or a substantial risk of prejudice to any person other than the first-mentioned person, the first-mentioned person commits the offense of fraud and is liable on conviction upon indictment to imprisonment for 14 years
  • 45. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited United Kingdom Data Protection Act protects the personal data in United Kingdom It covers all personal data which an organization may hold, including names, birthday and anniversary dates, addresses, telephone numbers, etc.
  • 46. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Protection From Identity Theft
  • 47. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Protection from ID Theft Check bank account balances regularly Order the credit reports and review carefully Check SSA Annual Earnings Statement Secure all the personal information Never leave sensitive information in vehicles Use strong passwords for logging into bank accounts and computers Enquire about security policies at workplace
  • 48. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Protection from ID Theft (cont’d) Never use public computers for accessing sensitive information Do not provide personal information over the phone, Internet, or through the mail Guard mails and trashcans from theft Pay attention to billing cycles Keep virus protection and security suite software updated
  • 49. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited What Should Victims Do? Report to local police and get a copy of report Call fraud departments of CRAs and get fraud alerts and victim statements placed on credit reports Contact creditors fraud departments, report fraudulent accounts, and charges Notify each creditor in writing about the identity fraud
  • 50. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Resources for Victims www.consumer.gov/idtheft or www.ftc.gov 1-877-ID-THEFT or 1-877-438-4338 www.identitytheft.org www.idtheftcenter.org www.privacyrights.org US Trustees – for bankruptcy (http://www.usdoj.gov/ust/) Social Security Office of Inspector General (http://www.ssa.gov/oig/)
  • 51. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Summary Identity theft is the theft or unauthorized use of others’ personal identifying information for fraudulent or unlawful activities Criminals steal files from work places, shops, medical services, banks, etc. Obtain new credit cards and make changes to the existing bank accounts Check whether the victim has answered any spam mail redirecting him/her to the phishing sites If the victim has given sensitive information online, investigate such website’s address Collect the photos and video tapes if any from the cameras installed at the merchant’s place Obtain search and seize warrant for further investigation Never use public computers for accessing sensitive information
  • 52. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 53. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 54. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited