2. What is Identity Theft?
• Identity theft happens when someone uses your personally
identifying information, like your name, social security
number, or credit card number, without your permission, to
commit fraud or other crimes.
3. What Can Thieves Do With Your Identity
• Credit Card Fraud: Open a CC in your name and or change
the billing address for your cards.
• Phone and Utilities: Open a new accounts in your name or
“run up” charges on your existing accounts.
• Bank/Financial: Create “fake” checks in your name or
account number, write bad checks in your name, make a
“fake” ATM card to impersonate yours, and or take a loan
out in your name.
• Government: Use your DL information to get a DL with your
name and their picture, use your SSN to get benefits, file
fraudulent tax returns with your information.
4. Types of Fraud
Credit Card
Government
Doc/Benefit
Phone and Utility
Employee Fraud
Bank Fraud
Loan Fraud
Other
5. Number of ID Theft Police Reports
Filled Police
Report
Did Not File
Report
6. Cost to Consumers
Out of Pocket Expense
($631 per consumer)
Number of Identity
Theft Victims
7. Common Techniques Used By Thieves
• Dumpster Diving – Going through your trash to find mail or
information with your name on it.
• Skimming – Stealing credit card numbers by using a special
“hidden” device when you are processing a transaction on
your card.
• Phishing – Make a “fake” website of a bank or a company
and send emails asking for account information verification.
• Social Engineering – Using very special speaking techniques
to get people to give out confidential information
8. Preventing Dumpster Diving
• Invest in a small paper shredder. They can be
purchased at any local retail store.
• Ensure that everything that has your name and
address or any other personal information is
shredded.
• Make sure to not leave any mail with
confidential information unattended in your
mailbox for long periods of time.
• Use online “e-statements” for all your accounts.
9. How To Prevent Phishing
• Do not open any emails or attachments from anyone
you do not know.
• Ensure that all banking websites you use have the
“lock symbol” located at the bottom of the web
browser (Firefox, Internet Explorer).
• Do not open links in emails. Type the address of the
website your trying to access and not the link.
• Opt-Out of email newsletters or “junk mail lists”.
• Bottom Line: If it looks suspicious, DON’T CLICK IT.
10. Credit Card and Debit Card Rights
• Credit Card Loss or Fraudulent Charges (FCBA)
• Max liability under federal law for unauthorized
use of your credit card is $50.
• If you report the loss before the card is used the
card issuer can not hold you liable.
• Also, if the loss involves your credit card
number, but not the card itself, you have no
liability for unauthorized use.
11. Credit Card and Debit Card Rights
Continued
• ATM or Debit Card Loss or Fraudulent Transfers (EFTA).
• Your liability under federal law for unauthorized use of your
ATM or debit card depends on how quickly you report the loss.
• If you report an ATM or debit card missing before it's used
without your permission, the card issuer cannot hold you
responsible for any unauthorized transfers.
• If unauthorized use occurs before you report it, your liability
under federal law depends on how quickly you report the loss.
12. EFTA Example
• If you report the loss within two business days after you
realize your card is missing, you will not be responsible for
more than $50 for unauthorized use. However, if you don't
report the loss within two business days after you discover the
loss, you could lose up to $500 because of an unauthorized
transfer.
13. Reducing The Risk of Social Engineering
• Make sure you keep track of your
personal information and do not
give out your information freely on
the internet. Make sure you shred
any personal documents with
confidential information.
• Social engineering can sometimes
be very difficult to catch because
of the simplicity of the attack. This
is why many companies have
implemented multiple forms of
identity verification.
14. How To Protect Yourself Online
• Use strong complex passwords. Instead
of “abc123” use a password like
“S!lLy$linkys!0p&” (SillySlinkySlope)
• Keep your operating system (Windows)
and your software programs up to date.
• Keep your firewall turned ON.
• Enable your virus protection.
• Do not post any information on the
internet that could be used to reset any
of your online accounts.
15. Anti-virus and Malware Removal
Recommendations
• Microsoft Security Essentials
• Avast
• DOM32
• Malware Bytes
16. How to Protect Computer
and Mobile Device Data
• The process of deleting files is not enough. Ensure
all sensitive information is removed.
• Simply reinstalling the operating system DOES
NOT ERASE YOUR FILES!
• A free option for Windows based computers is
Eraser.
• For other operating systems, see Darik's Boot and
Nuke (DBAN).
• Ensure all your mobile device data is encrypted.
17. Mobile Device Security
• As mobile devices become as powerful as
desktop computers it is vital invest in security.
• Invest in a remote lock remote wipe solution if
the device is ever stolen.
• Enable virus, malware, and firewall on the
device.
• Some solutions come with a siren or loud sound
to “scare” thieves.
• Free solutions include: Apple’s Find My
iPhone, F-Secure Anti-Theft for
Mobile, Microsoft's find my phone.
18. Identities Can Be Stolen
Without The Internet
• In 2007, The Washington Post
published an article detailing a case
of identity theft, the victim’s
identity was obtained from the ID
cards in a lost wallet.
(Jackman, 2007).
• On July 19th Koco 5 from Oklahoma
City reported a case of identity theft
perpetrated by using information on
discarded RX bottles.
(RX bottles can lead., 2007)
19. If Your Identity Is Ever Stolen
• File a police report with your local
police department.
• Check all of your credit reports, notify
creditors, and make sure to dispute
any unauthorized transactions on your
accounts.
• Swift action must be taken to restore
your name. The faster you do this
process the faster you can restore your
good name.
20. Importance Of Filing A Police Report
• Filing a report entitles you to certain legal
rights when you provided it to the three
major credit reporting agencies or
companies that the identity thief misused
your information.
• Identity Theft Report can be used to
PERMANENTLY block fraudulent information
that results from an identity theft.
• It will ensure these debts do not reappear
on your credit.
21. Importance of Filing A Police Report
Continued
• It prevents companies from continuing to collect on the debt
that resulted from identity theft or selling the debt to
others for collection.
• An Identity Theft Report is also needed to place an
extended fraud alert on your credit report.
• In short: properly reporting the identity theft to the proper
authorities will make the process run more smoothly.
22. How Long Can The Effects Of Identity
Theft Last
• There are many different factors that determine how long it
can last.
• Factors include: type of theft, whether the thief sold or
passed your information on to other thieves, whether or not
the thief was caught, and process to correct your credit
report.
• Victims should monitor their credit report several months
after to ensure it does not reoccur.
• Victims should check every three months during the first
year and once a year after.
23. More Ways To Protect Yourself
• Protect your social security number.
• Verify sources before sharing information.
• Safeguard wallet or purse.
• Store private information in secure locations.
• Implement a credit freeze on your credit report.
• Invest in identity theft insurance or credit monitoring.
24. More Ways To Protect Yourself
Continued
• Never write down your password or share it with others.
• Change your passwords at least every six months.
• Only friend people you know and trust on your social media
networks.
• When disposing your old computer, make sure you use data
erasing software before you remove it.
• If you have multiple passwords you cannot remember make an
encrypted file with a very strong password to protect it.
• Have the Postal Service hold your mail when you leave town.
25. Websites To Help You Stay Current
• Federal Trade Agency : Fighting Back Against Identity Theft
http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers
/about-identity-theft.html
• Clark Howard www.clarkhoward.com
• Ben Halpert CISSP www.benhalpert.com
• Symantec Education on Youtube
• http://www.idtheftcenter.org/
26. Resources
• Fighting Back Against Identity Theft: Federal Trade Commission
http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/abou
t-identity-theft.html
• Ben Halpert CISSP (Certified Information Security Professional)
www.benhalpert.com
• http://www.ftc.gov/bcp/edu/pubs/consumer/credit/cre04.shtm
• http://bucks.blogs.nytimes.com/2011/02/09/the-rising-cost-of-
identity-theft-for-consumers/