Upload
james-wilkins
View
218
Download
0
Embed Size (px)
Citation preview
Identity-Theft is the Identity-Theft is the fastest growing crime in fastest growing crime in America; America; 9.9 MILLION victims were 9.9 MILLION victims were reported last year,reported last year,according to a Federal according to a Federal Trade Commission Trade Commission survey!survey!
What is Identity What is Identity Theft or Identity Theft or Identity Fraud? Fraud?
Identity theft or identity fraud (true name Identity theft or identity fraud (true name fraud) is the criminal act of taking a victim's fraud) is the criminal act of taking a victim's identity for the purpose of obtaining credit, identity for the purpose of obtaining credit, credit cards from banks and/or retailers, credit cards from banks and/or retailers, stealing money from the victim's existing stealing money from the victim's existing accounts, applying for loans in the victim's accounts, applying for loans in the victim's name, establishing accounts with utility name, establishing accounts with utility companies, leasing automobiles and companies, leasing automobiles and residences, filing bankruptcy, and/or even residences, filing bankruptcy, and/or even obtaining employment. obtaining employment.
THE IDENTITY THIEF IS THE IDENTITY THIEF IS LOOKING FOR YOU! LOOKING FOR YOU!
How Does Identity Theft How Does Identity Theft Occur?Occur?
All that is needed is a little All that is needed is a little information, such as your social information, such as your social security number, birth date, security number, birth date, address, phone number, or any address, phone number, or any other information which can be other information which can be discovered. discovered.
Protect Your IdentityProtect Your Identity A good security plan has two parts: A good security plan has two parts: one focused on security rules to one focused on security rules to prevent identity theft and another prevent identity theft and another focused on all the things you need to focused on all the things you need to do when you discover a theft. The plan do when you discover a theft. The plan doesn't need to be longer than a page doesn't need to be longer than a page or two. or two.
Plan one: PrecautionsPlan one: Precautions
You should establish security You should establish security precautions for yourself and your precautions for yourself and your family, in the home and family, in the home and elsewhere. elsewhere.
Plan one: Precautions Plan one: Precautions
Protect your householdProtect your household: Create : Create security rules for your house. Include a security rules for your house. Include a plan for how mail should be handled, plan for how mail should be handled, who shreds credit card offers, what who shreds credit card offers, what happens when everyone goes on happens when everyone goes on vacation, and where friends and vacation, and where friends and neighbors cannot go in the house. neighbors cannot go in the house.
Protect yourselfProtect yourself: Have everyone : Have everyone check their credit reports regularly. I check their credit reports regularly. I recommend at least every three recommend at least every three months. Learn how to read your report months. Learn how to read your report and understand what it tells you. and understand what it tells you.
Plan one: PrecautionsPlan one: Precautions
Secure the houseSecure the house: Burglars increasingly focus : Burglars increasingly focus on identity theft for bigger payoffs. Make sure to on identity theft for bigger payoffs. Make sure to keep yourself and your documents safe. Consider keep yourself and your documents safe. Consider a burglar alarm, security lights, window and door a burglar alarm, security lights, window and door locks, data safes, locked filing cabinets, and locks, data safes, locked filing cabinets, and which floorboard you want to hide your tax which floorboard you want to hide your tax returns under. returns under.
Protect your PCProtect your PC: Use security technology. : Use security technology. Firewalls keep hackers out. Antivirus software Firewalls keep hackers out. Antivirus software keeps viruses and worms out. Encryption keeps viruses and worms out. Encryption protects sensitive data. Web filters keep your protects sensitive data. Web filters keep your family members (especially the young ones) family members (especially the young ones) away from websites they probably shouldn't see. away from websites they probably shouldn't see.
Plan two: Know who to Plan two: Know who to callcall If you realize someone stole your If you realize someone stole your
identity, you'll probably panic. identity, you'll probably panic. Most people do. Don't waste a lot Most people do. Don't waste a lot of valuable time trying to gather of valuable time trying to gather the information you need to the information you need to minimize the impact of the crime. minimize the impact of the crime. Before you become a victim, Before you become a victim, make a checklist of the following. make a checklist of the following.
Plan two: Know who to Plan two: Know who to call call All your accounts and account All your accounts and account
contacts contacts The credit and legal agencies you The credit and legal agencies you
need to contact if something need to contact if something happens happens
The forms you'll need to fill out if The forms you'll need to fill out if you become a victimyou become a victim
How Identity Thieves How Identity Thieves OperateOperate Some scammers buy fake birth Some scammers buy fake birth
certificates and IDs while others hack certificates and IDs while others hack into databases. In March 2001, the FBI into databases. In March 2001, the FBI reported that 40 corporations in 20 reported that 40 corporations in 20 states were targeted by hackers states were targeted by hackers operating outside the United States. operating outside the United States. Activities compromised the security of Activities compromised the security of more than 1 million credit card more than 1 million credit card numbers stored by the hacked numbers stored by the hacked corporations. Most of the hacking corporations. Most of the hacking activity originated in Eastern Europe, activity originated in Eastern Europe, China, and the former Soviet republics. China, and the former Soviet republics.
How Identity Thieves How Identity Thieves OperateOperate
But the latest trend in identity But the latest trend in identity theft is "skimming." Take a theft is "skimming." Take a restaurant as an example. A restaurant as an example. A waiter swipes your credit card waiter swipes your credit card two times: once for the meal, and two times: once for the meal, and once to copy all the data off the once to copy all the data off the magnetic strip into a small magnetic strip into a small device. device.
How Identity Thieves How Identity Thieves OperateOperate
The criminal who supplied the The criminal who supplied the waiter with the skimming device waiter with the skimming device then downloads the swiped card's then downloads the swiped card's information into his or her information into his or her computer, puts the information computer, puts the information on counterfeit cards, and uses on counterfeit cards, and uses those cards to buy goods and those cards to buy goods and services using your account. services using your account.
How Identity Thieves How Identity Thieves OperateOperate
Even more computer-savvy Even more computer-savvy crooks are loading merchants' crooks are loading merchants' credit card machines with credit card machines with "skimmer bugs" that program the "skimmer bugs" that program the machine to transmit card machine to transmit card information to a remote location. information to a remote location.