Скачать презентацию Greater Cleveland PC Users Group IDENTITY THEFT February Скачать презентацию Greater Cleveland PC Users Group IDENTITY THEFT February

5b0cbcc7df11b4308b1266f70f891b68.ppt

  • Количество слайдов: 63

Greater Cleveland PC Users Group IDENTITY THEFT February 14, 2009 Some slides are from Greater Cleveland PC Users Group IDENTITY THEFT February 14, 2009 Some slides are from an ORIGINAL Presentation by Sgt. Eric Gilbert and Sgt. Hiland Priddy, Texas Department of Public Safety (DPS) for mandatory Texas Law Enforcement Officer In Service Training

Monday, February 09, 2009 Identity Theft on the Rise, But Victims Take Action Quicker Monday, February 09, 2009 Identity Theft on the Rise, But Victims Take Action Quicker Associated Press NEW YORK--The number of Americans ensnared by identity theft is on the rise, but victims are striking back more quickly and limiting how much is stolen. Continued next slide. . . 2

Monday, February 09, 2009 Identity Theft on the Rise, But Victims Take Action Quicker Monday, February 09, 2009 Identity Theft on the Rise, But Victims Take Action Quicker Associated Press In 2008, the number of identity theft cases jumped 22% to 9. 9 million, according to a study released Monday by Javelin Strategy & Research. The good news is that the cost per incident -- including unrecovered losses and legal fees -- fell 31% to $496. 3

One reason for the spike in cases is likely the worsening economy. Just last One reason for the spike in cases is likely the worsening economy. Just last month, 598, 000 jobs were slashed across the country and unemployment jumped to 7. 6%. "The short story is that criminals are getting more desperate, " said Jim Van Dyke, spokesman for Javelin, which started tracking identity theft cases in 2003. Last year marked the first time the number of cases rose. 4

Crimes of opportunity, such as stolen wallets, were linked to 43% of cases last Crimes of opportunity, such as stolen wallets, were linked to 43% of cases last year, up from 33% in 2007. That might be why women were 26% more likely to be victims of identity theft; they reported more cases of lost or stolen information during instore purchases. Online access accounted for only 11% of cases, according to the survey. 5

Despite the growing number of victims, the total fraud amount edged up just 7% Despite the growing number of victims, the total fraud amount edged up just 7% to $48 billion over the previous year. That's because victims are uncovering cases faster to limit losses. Another reason is that financial institutions are taking more steps to thwart thieves, according to the Javelin study. 6

JAVELIN SURVEY REPORT ON ID THEFT 7 JAVELIN SURVEY REPORT ON ID THEFT 7

An example of how the PHISHING form of IDENTITY THEFT is geographically targeted, a An example of how the PHISHING form of IDENTITY THEFT is geographically targeted, a form of “SPEAR PHISHING” Following is one of my local savings banks. This particular PHISH only showed up in the south Texas area. Other targeted PHISHING attacks targeted local credit unions, local banks, and other local institutions. 8

Another variety sends cell phone text messages targeted to localities saying that your debit Another variety sends cell phone text messages targeted to localities saying that your debit card is frozen or your account is locked and that you need to call an 800 number. When that 800 number is called, the victim is asked for debit card number and PIN. 9

10 10

11 11

NOTE THE SPELLING IN THE URL… “orangesav. Lngs. com 12 NOTE THE SPELLING IN THE URL… “orangesav. Lngs. com 12

Domain Name: ORANGESAVLNGS. COM Registrar: MELBOURNE IT, LTD. D/B/A INTERNET NAMES WORLDWIDE Whois Server: Domain Name: ORANGESAVLNGS. COM Registrar: MELBOURNE IT, LTD. D/B/A INTERNET NAMES WORLDWIDE Whois Server: whois. melbourneit. com Referral URL: http: //www. melbourneit. com Creation Date: 13 -jun-2008 Expiration Date: 13 -jun-2009 Domain Name. . orangesavlngs. com Organisation Name. . John Davis Organisation Address. 49960 Esperanza Organisation Address. carson Organisation Address. 95350 Organisation Address. CA Organisation Address. UNITED STATES Admin Email. . johndaviiis [email protected] com Admin Phone. . +1. 5554843948 Note the “ 555” Admin Fax. . . 13

NOTE CORRECT URL ABOVE 14 NOTE CORRECT URL ABOVE 14

Definition and Types • Identity Crime is defined as: – Theft or misuse of Definition and Types • Identity Crime is defined as: – Theft or misuse of personal or financial identifiers in order to gain something of value and / or facilitate other criminal activity. • Types of Identity Crimes include: – – – Identity Theft Credit card / Access Device Fraud (skimming) Check Fraud False Identification Fraud Passport / Visa Fraud 15

Scope • ID Crime often facilitates: – – – – – Mail theft & Scope • ID Crime often facilitates: – – – – – Mail theft & fraud Illegal Narcotics / drugs Organized crime Financial fraud (money laundering) Mortgage fraud Weapons trafficking Homicide Terrorism Wire fraud Computer crime / internet intrusions 16

Scope • ID Crimes often begin with: – Wallet / Purse theft – Muggings Scope • ID Crimes often begin with: – Wallet / Purse theft – Muggings – Computer intrusion – Mail theft – Dumpster diving (theft of trash) – Theft of business documents or info – Theft from medical facilities, hotels, etc. 17

Types of Identifiers • Personal: – – – Name and Date of Birth Social Types of Identifiers • Personal: – – – Name and Date of Birth Social Security Number Address and phone numbers Driver’s license and passport numbers Mother’s maiden name; pet name; etc. • Financial: – Credit card numbers (including security codes) – Bank account numbers – ATM Card and PIN numbers – Insurance policy numbers 18

Current Trends • Use of current / latest technologies. • Scams include: – Over Current Trends • Use of current / latest technologies. • Scams include: – Over hearing cell phone conversations. – Reading other’s faxes or email. – Hacking into computers. – Telephone and e-mail scams. – Careless online shopping and banking. – PHISHING 19

Official US Gov’t ID THEFT WEBSITE http: //www. ftc. gov/idtheft 20 Official US Gov’t ID THEFT WEBSITE http: //www. ftc. gov/idtheft 20

1 -877 -ID THEFT 21 1 -877 -ID THEFT 21

22 22

RATE OF IDENTITY THEFT FTC SYNOVATE REPORT Dated 11/07 for CY 2005 23 RATE OF IDENTITY THEFT FTC SYNOVATE REPORT Dated 11/07 for CY 2005 23

COST OF IDENTITY THEFT IN US IN 2005 24 COST OF IDENTITY THEFT IN US IN 2005 24

COST TO INDIVIDUALS IN TIME 25 COST TO INDIVIDUALS IN TIME 25

26 26

OTHER PROBLEMS FACED BY VICTIMS 27 OTHER PROBLEMS FACED BY VICTIMS 27

Need For Immediacy in Reporting 28 Need For Immediacy in Reporting 28

29 29

30 30

31 31

Protecting Yourself Against Online Identity Theft Jack Germain, newsfactor. com Tue Feb 6, 10: Protecting Yourself Against Online Identity Theft Jack Germain, newsfactor. com Tue Feb 6, 10: 22 AM ET Internet identity theft is one of the fastest -growing crimes in the U. S. today. For five straight years, the Federal Trade Commission (FTC) ranked it as one of the most-reported types of fraud. Despite the increasing awareness of identity theft among consumers and financial institutions, the identity-theft racket shows no signs of slowing. . . 32

Protecting Yourself Against Online Identity Theft Jack Germain, newsfactor. com Tue Feb 6, 10: Protecting Yourself Against Online Identity Theft Jack Germain, newsfactor. com Tue Feb 6, 10: 22 AM ET "True identity theft is a problem that goes far beyond simple credit-card fraud, against which consumers are fully protected, thanks to zero-liability laws and other regulations, " says Dave Collett, a spokesperson for Master. Card. "ID theft is when a person's entire identity is taken over. For that to happen, a fraudster would need far more information than just what is found on a credit or debit card. " 33

Protecting Yourself Against Online Identity Theft (2) All too often, consumers provide that needed Protecting Yourself Against Online Identity Theft (2) All too often, consumers provide that needed information unknowingly through careless Web surfing and by using computers whose security is breached by virus and spyware infections. One of the leading causes of identity theft online is consumers falling prey to phishing attacks, a form of identity theft that employs a criminal strategy that security professionals call 34 social engineering.

Protecting Yourself Against Online Identity Theft (2) Essentially, the process works by tricking e-mail Protecting Yourself Against Online Identity Theft (2) Essentially, the process works by tricking e-mail recipients into going to phony Web sites to divulge personal data, like bankaccount numbers or credit-card information. Identity thieves also use technical subterfuge through spyware and Trojans to capture user names and passwords so they can gain access to consumers' financial details. 35

How common is PHISHING? What are the losses? 36 How common is PHISHING? What are the losses? 36

37 37

APWG Releases December 2008 Phishing Trends Report 221 in 7/04 38, 514 in 9/07 APWG Releases December 2008 Phishing Trends Report 221 in 7/04 38, 514 in 9/07 28, 151 in 6/08 www. antiphishing. org 38

PHISHING IS ENDEMIC, STEALING IDs FROM MILLIONS! Forward email to reportphishing@antiphishing. org 39 PHISHING IS ENDEMIC, STEALING IDs FROM MILLIONS! Forward email to [email protected] org 39

PHISHING Note the warning in the subject line of the email below 40 PHISHING Note the warning in the subject line of the email below 40

41 41

42 42

NOTE INTERNET ADDRESS IN THE ADDRESS BAR 43 NOTE INTERNET ADDRESS IN THE ADDRESS BAR 43

44 44

45 45

FORWARD TO: spoof@paypal. com 46 FORWARD TO: [email protected] com 46

EBAY PHISHING TO STEAL PASSWORDS 47 EBAY PHISHING TO STEAL PASSWORDS 47

NOTE INTERNET ADDRESS IN THE ADDRESS BAR Forward to: spoof@ebay. com 48 NOTE INTERNET ADDRESS IN THE ADDRESS BAR Forward to: [email protected] com 48

49 49

PHISHING 50 PHISHING 50

51 51

Now who can access the victims’ information? This site was registered in Missouri, but Now who can access the victims’ information? This site was registered in Missouri, but hosted in TAIWAN! Others were hosted in Germany, Mexico, India, Czechoslovakia, and the Netherlands 52

53 http: //www. kotlovka. ru/picnews/help/www. irs. gov 53 http: //www. kotlovka. ru/picnews/help/www. irs. gov

54 54

Perpetrating Methods • Stealing a wallet / purse with personal and financial identifiers. • Perpetrating Methods • Stealing a wallet / purse with personal and financial identifiers. • Unsecured mail with bank and credit card statements, pre-approved credit offers, new checks, tax info. • May complete a “change of address form” to divert your mail to another location. • Rummage through trash – “dumpster diving” – at your home or business. 55

www. Opt. Out. Pre. Screen. com 888 -5 -OPTOUT 888 -567 -8688 800 -680 www. Opt. Out. Pre. Screen. com 888 -5 -OPTOUT 888 -567 -8688 800 -680 -7293 56

57 57

Perpetrating Methods • Obtaining credit report by posing as a landlord, employer or other Perpetrating Methods • Obtaining credit report by posing as a landlord, employer or other legitimate requestor. • Personal information found in the home or shared on the internet. • “Business record theft. ” • “Shoulder surfing. ” • Email, website “spoofing” or “scamming. ” 58

State Security Freeze Laws A security freeze lets consumers stop thieves from getting credit State Security Freeze Laws A security freeze lets consumers stop thieves from getting credit in their names. A security freeze locks, or freezes, access to the consumer credit report and credit score. Without this information, a business will not issue new credit to a thief. When the consumer wants to get new credit, he or she uses a PIN to unlock access to the credit file. In ALL States as of November 1, 2007 ANYONE can get a security freeze for $10 or less (sometimes FREE for victims); and a $10 fee to temporarily lift, or remove a security freeze Placement at one CRA must be honored by all TO PLACE A SECURITY FREEZE http: //www. Consumers. Union. org/Security. Freeze. htm 59

60 60

Credit Report Example http: //www. annualcreditreport. com 61 Credit Report Example http: //www. annualcreditreport. com 61

Prevention – Personal Awareness • Do not give out personal identifier information over the Prevention – Personal Awareness • Do not give out personal identifier information over the phone or Internet. • Stay informed about your personal financial records with frequent checks of credit history, bank records, i. e. , extra or unknown transactions. • Limit personal information on necessary public distribution items (checks, business cards). • Purchase a home shredder. • Consider Identity Theft Insurance. • PRACTICE “SAFE HEX” 62

Ira Wilsker iwilsker@apcug. net KLVI 560 AM 6 -7 PM CENTRAL TIME Mondays, online Ira Wilsker [email protected] net KLVI 560 AM 6 -7 PM CENTRAL TIME Mondays, online at KLVI. com 1 -800 -330 -5584 Personal Technology Column Every week in the EXAMINER http: //www. theexaminer. com