15

Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!

Embed Size (px)

Citation preview

Page 1: Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
Page 2: Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!

Identity-Theft is the Identity-Theft is the fastest growing crime in fastest growing crime in America; America; 9.9 MILLION victims were 9.9 MILLION victims were reported last year,reported last year,according to a Federal according to a Federal Trade Commission Trade Commission survey!survey!

Page 3: Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!

What is Identity What is Identity Theft or Identity Theft or Identity Fraud? Fraud?

Identity theft or identity fraud (true name Identity theft or identity fraud (true name fraud) is the criminal act of taking a victim's fraud) is the criminal act of taking a victim's identity for the purpose of obtaining credit, identity for the purpose of obtaining credit, credit cards from banks and/or retailers, credit cards from banks and/or retailers, stealing money from the victim's existing stealing money from the victim's existing accounts, applying for loans in the victim's accounts, applying for loans in the victim's name, establishing accounts with utility name, establishing accounts with utility companies, leasing automobiles and companies, leasing automobiles and residences, filing bankruptcy, and/or even residences, filing bankruptcy, and/or even obtaining employment. obtaining employment.

Page 4: Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!

THE IDENTITY THIEF IS THE IDENTITY THIEF IS LOOKING FOR YOU! LOOKING FOR YOU!

Page 5: Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!

How Does Identity Theft How Does Identity Theft Occur?Occur?

All that is needed is a little All that is needed is a little information, such as your social information, such as your social security number, birth date, security number, birth date, address, phone number, or any address, phone number, or any other information which can be other information which can be discovered. discovered.

Page 6: Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!

Protect Your IdentityProtect Your Identity        A good security plan has two parts: A good security plan has two parts: one focused on security rules to one focused on security rules to prevent identity theft and another prevent identity theft and another focused on all the things you need to focused on all the things you need to do when you discover a theft. The plan do when you discover a theft. The plan doesn't need to be longer than a page doesn't need to be longer than a page or two. or two.

Page 7: Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!

Plan one: PrecautionsPlan one: Precautions

You should establish security You should establish security precautions for yourself and your precautions for yourself and your family, in the home and family, in the home and elsewhere. elsewhere.

Page 8: Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!

Plan one: Precautions Plan one: Precautions

Protect your householdProtect your household: Create : Create security rules for your house. Include a security rules for your house. Include a plan for how mail should be handled, plan for how mail should be handled, who shreds credit card offers, what who shreds credit card offers, what happens when everyone goes on happens when everyone goes on vacation, and where friends and vacation, and where friends and neighbors cannot go in the house. neighbors cannot go in the house.

Protect yourselfProtect yourself: Have everyone : Have everyone check their credit reports regularly. I check their credit reports regularly. I recommend at least every three recommend at least every three months. Learn how to read your report months. Learn how to read your report and understand what it tells you. and understand what it tells you.

Page 9: Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!

Plan one: PrecautionsPlan one: Precautions

Secure the houseSecure the house: Burglars increasingly focus : Burglars increasingly focus on identity theft for bigger payoffs. Make sure to on identity theft for bigger payoffs. Make sure to keep yourself and your documents safe. Consider keep yourself and your documents safe. Consider a burglar alarm, security lights, window and door a burglar alarm, security lights, window and door locks, data safes, locked filing cabinets, and locks, data safes, locked filing cabinets, and which floorboard you want to hide your tax which floorboard you want to hide your tax returns under. returns under.

Protect your PCProtect your PC: Use security technology. : Use security technology. Firewalls keep hackers out. Antivirus software Firewalls keep hackers out. Antivirus software keeps viruses and worms out. Encryption keeps viruses and worms out. Encryption protects sensitive data. Web filters keep your protects sensitive data. Web filters keep your family members (especially the young ones) family members (especially the young ones) away from websites they probably shouldn't see. away from websites they probably shouldn't see.

Page 10: Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!

Plan two: Know who to Plan two: Know who to callcall If you realize someone stole your If you realize someone stole your

identity, you'll probably panic. identity, you'll probably panic. Most people do. Don't waste a lot Most people do. Don't waste a lot of valuable time trying to gather of valuable time trying to gather the information you need to the information you need to minimize the impact of the crime. minimize the impact of the crime. Before you become a victim, Before you become a victim, make a checklist of the following. make a checklist of the following.

Page 11: Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!

Plan two: Know who to Plan two: Know who to call call All your accounts and account All your accounts and account

contacts contacts The credit and legal agencies you The credit and legal agencies you

need to contact if something need to contact if something happens happens

The forms you'll need to fill out if The forms you'll need to fill out if you become a victimyou become a victim

Page 12: Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!

How Identity Thieves How Identity Thieves OperateOperate         Some scammers buy fake birth Some scammers buy fake birth

certificates and IDs while others hack certificates and IDs while others hack into databases. In March 2001, the FBI into databases. In March 2001, the FBI reported that 40 corporations in 20 reported that 40 corporations in 20 states were targeted by hackers states were targeted by hackers operating outside the United States. operating outside the United States. Activities compromised the security of Activities compromised the security of more than 1 million credit card more than 1 million credit card numbers stored by the hacked numbers stored by the hacked corporations. Most of the hacking corporations. Most of the hacking activity originated in Eastern Europe, activity originated in Eastern Europe, China, and the former Soviet republics. China, and the former Soviet republics.

Page 13: Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!

How Identity Thieves How Identity Thieves OperateOperate

But the latest trend in identity But the latest trend in identity theft is "skimming." Take a theft is "skimming." Take a restaurant as an example. A restaurant as an example. A waiter swipes your credit card waiter swipes your credit card two times: once for the meal, and two times: once for the meal, and once to copy all the data off the once to copy all the data off the magnetic strip into a small magnetic strip into a small device. device.

Page 14: Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!

How Identity Thieves How Identity Thieves OperateOperate

The criminal who supplied the The criminal who supplied the waiter with the skimming device waiter with the skimming device then downloads the swiped card's then downloads the swiped card's information into his or her information into his or her computer, puts the information computer, puts the information on counterfeit cards, and uses on counterfeit cards, and uses those cards to buy goods and those cards to buy goods and services using your account. services using your account.

Page 15: Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!

How Identity Thieves How Identity Thieves OperateOperate

Even more computer-savvy Even more computer-savvy crooks are loading merchants' crooks are loading merchants' credit card machines with credit card machines with "skimmer bugs" that program the "skimmer bugs" that program the machine to transmit card machine to transmit card information to a remote location. information to a remote location.