SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
Reporter: J’Love Minguez


Identity theft is a form of stealing
someone's identity in which someone
pretends to be someone else by assuming
that person's identity, usually as a method
to gain access to resources or obtain credit
and other benefits in that person's name.
Mail from banks, institutions, and
even new credit card offers contain valuable
personal information which identity
thieves can use to drain accounts and open
new credit cards in your name. They get the
information by stealing mail right out of
your mailbox, or as in the case of dumpster
diving, out of the trash after it has been
thrown out.
If you've ever received an email
from a "bank" or other financial institution
asking for account information, thieves
could have been phishing for your identity.
(The word is derived from "fishing,"
because the emails are like bait.) Clicking
on their link will send you to a site that
looks the same as the actual institution, but
actually belongs to the thief.
A combination of the words "voice"
and "phishing", vishing is like phishing,
except the thieves use the phone instead of
email. They may leave a message
pretending to be your bank or some other
company. When you call back, they'll take
your personal information.
Thieves have started seeking
treatment using another person's name and
medical insurance information. They can
get it by stealing your wallet or hacking into
a doctor's or hospital's computer system.
Spyware is a malicious computer
program that installs itself on your PC and
then allows thieves to record your personal
information - like a credit card number,
password, or Social Security number.
Skimming is a way for a thief to get
your ATM or credit card information by
installing their own card reader on an ATM
machine. When you pass your card through
the skimming device, it records your card
information.
Thieves can gain access to this
information by hacking into the network,
by posing as a business partner, or after an
employee loses a computer, disk or box of
files.
Identity thieves are using social
networking sites to find out your personal
information. They use the information they
find on the site to pretend to be someone
they're not and coax other information out
of you - like your Social Security number.
The thief acquires a child's personal
information, then creates fraudulent
accounts in their name. But because
children usually don't have financial
accounts until they are older, no one may
find out about the theft for many years,
allowing the problems to be greatly
compounded.
Thieves are experts at duplicating
legitimate online storefronts. Before you
know it, you’ve completed your transaction
and inadvertently handed over the personal
information they need to commit fraud.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.

Pervasive telephone scams
Phishing
False promises of “free money” from inflated
refunds
Return preparer fraud
Hiding income offshore
Impersonation of charitable organizations
False income, expenses, or exemptions
Frivolous arguments
Falsely claiming zero wages
Abusive tax structures
Misuse of trusts


The Kansas Department of Revenue's Office of Special
Investigation arrested five individuals Thursday in the
Wichita area suspected of crimes relating to driver's
license fraud and identity card fraud.

▪ Reggie Conner, 46,
▪ Manuel De Jesus Aguero-Herrera, 28,
▪ Gladys Melissa Morales-Salome, 25,
▪ Federico Ibarra, 21,
▪ Arturo Ibarra, 21,









If you receive an unsolicited email or phone call from
what appears to be your bank or building society asking
for your security details, never reveal your full password,
login details or account numbers.
Do not give out personal information on the phone, fax
or on social media platforms
Use privacy settings to manage the information you
share and with whom you share it. Be selective about
what you post and accepting friends.
Never give personal or account details to anyone who
contacts you unexpectedly. Be suspicious even if they
claim to be from your bank or the police.
Keep your personal documents in a safe place,
preferably in a lockable drawer or cabinet at home.
Consider storing valuable financial documents such as
share certificates with your bank.




Act quickly – you mustn’t ignore the
problem. Even though you didn’t order
those goods or open that bank account, the
bad debts will end up under your name and
address.
You should report all lost or stolen
documents – such as passports, driving
licences, plastic cards, cheque books.

Contenu connexe

Tendances

Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
Barry Caplin
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
Lisa Sosebee
 

Tendances (20)

Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Phishing
PhishingPhishing
Phishing
 
Public private partnership Identity Theft
Public private partnership Identity TheftPublic private partnership Identity Theft
Public private partnership Identity Theft
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Fraud in Ecommerce
Fraud in EcommerceFraud in Ecommerce
Fraud in Ecommerce
 
Id Theft
Id TheftId Theft
Id Theft
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
E commerce fraud
E commerce fraudE commerce fraud
E commerce fraud
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
 
Understanding Phishing E-Mail Scams
Understanding Phishing E-Mail ScamsUnderstanding Phishing E-Mail Scams
Understanding Phishing E-Mail Scams
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Identity fraud
Identity fraudIdentity fraud
Identity fraud
 
e-Fraud ppt
e-Fraud ppte-Fraud ppt
e-Fraud ppt
 
4 Most Common Financial Crimes To Protect Against
4 Most Common Financial Crimes To Protect Against4 Most Common Financial Crimes To Protect Against
4 Most Common Financial Crimes To Protect Against
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Features of-scam
Features of-scamFeatures of-scam
Features of-scam
 
What are the negative and lasting effects of identity theft
What are the negative and lasting effects of identity theftWhat are the negative and lasting effects of identity theft
What are the negative and lasting effects of identity theft
 

Similaire à Computer Crimes - Identity Theft

ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
OremDPS
 
Powerpoint Mini Project.Pdf
Powerpoint  Mini Project.PdfPowerpoint  Mini Project.Pdf
Powerpoint Mini Project.Pdf
Sanea
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pnt
jessmc1
 
Identity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineIdentity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazine
Kristi Valentini
 

Similaire à Computer Crimes - Identity Theft (20)

Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theft
 
All about identity theft
All about identity theftAll about identity theft
All about identity theft
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
What is Identity (ID) Theft ?
What is Identity (ID) Theft ?What is Identity (ID) Theft ?
What is Identity (ID) Theft ?
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Identity Theft Overview
Identity Theft OverviewIdentity Theft Overview
Identity Theft Overview
 
Powerpoint Mini Project.Pdf
Powerpoint  Mini Project.PdfPowerpoint  Mini Project.Pdf
Powerpoint Mini Project.Pdf
 
White Collar Crime Pwr Pnt
White Collar Crime Pwr PntWhite Collar Crime Pwr Pnt
White Collar Crime Pwr Pnt
 
Identity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineIdentity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazine
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 
Trilegiant 1
Trilegiant 1Trilegiant 1
Trilegiant 1
 

Dernier

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Dernier (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 

Computer Crimes - Identity Theft

  • 2.  Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, usually as a method to gain access to resources or obtain credit and other benefits in that person's name.
  • 3.
  • 4. Mail from banks, institutions, and even new credit card offers contain valuable personal information which identity thieves can use to drain accounts and open new credit cards in your name. They get the information by stealing mail right out of your mailbox, or as in the case of dumpster diving, out of the trash after it has been thrown out.
  • 5. If you've ever received an email from a "bank" or other financial institution asking for account information, thieves could have been phishing for your identity. (The word is derived from "fishing," because the emails are like bait.) Clicking on their link will send you to a site that looks the same as the actual institution, but actually belongs to the thief.
  • 6. A combination of the words "voice" and "phishing", vishing is like phishing, except the thieves use the phone instead of email. They may leave a message pretending to be your bank or some other company. When you call back, they'll take your personal information.
  • 7. Thieves have started seeking treatment using another person's name and medical insurance information. They can get it by stealing your wallet or hacking into a doctor's or hospital's computer system.
  • 8. Spyware is a malicious computer program that installs itself on your PC and then allows thieves to record your personal information - like a credit card number, password, or Social Security number.
  • 9. Skimming is a way for a thief to get your ATM or credit card information by installing their own card reader on an ATM machine. When you pass your card through the skimming device, it records your card information.
  • 10. Thieves can gain access to this information by hacking into the network, by posing as a business partner, or after an employee loses a computer, disk or box of files.
  • 11. Identity thieves are using social networking sites to find out your personal information. They use the information they find on the site to pretend to be someone they're not and coax other information out of you - like your Social Security number.
  • 12. The thief acquires a child's personal information, then creates fraudulent accounts in their name. But because children usually don't have financial accounts until they are older, no one may find out about the theft for many years, allowing the problems to be greatly compounded.
  • 13. Thieves are experts at duplicating legitimate online storefronts. Before you know it, you’ve completed your transaction and inadvertently handed over the personal information they need to commit fraud.
  • 14.
  • 15. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. Pervasive telephone scams Phishing False promises of “free money” from inflated refunds Return preparer fraud Hiding income offshore Impersonation of charitable organizations False income, expenses, or exemptions Frivolous arguments Falsely claiming zero wages Abusive tax structures Misuse of trusts
  • 16.  The Kansas Department of Revenue's Office of Special Investigation arrested five individuals Thursday in the Wichita area suspected of crimes relating to driver's license fraud and identity card fraud. ▪ Reggie Conner, 46, ▪ Manuel De Jesus Aguero-Herrera, 28, ▪ Gladys Melissa Morales-Salome, 25, ▪ Federico Ibarra, 21, ▪ Arturo Ibarra, 21,
  • 17.
  • 18.      If you receive an unsolicited email or phone call from what appears to be your bank or building society asking for your security details, never reveal your full password, login details or account numbers. Do not give out personal information on the phone, fax or on social media platforms Use privacy settings to manage the information you share and with whom you share it. Be selective about what you post and accepting friends. Never give personal or account details to anyone who contacts you unexpectedly. Be suspicious even if they claim to be from your bank or the police. Keep your personal documents in a safe place, preferably in a lockable drawer or cabinet at home. Consider storing valuable financial documents such as share certificates with your bank.
  • 19.
  • 20.   Act quickly – you mustn’t ignore the problem. Even though you didn’t order those goods or open that bank account, the bad debts will end up under your name and address. You should report all lost or stolen documents – such as passports, driving licences, plastic cards, cheque books.