Identity Theft A personal perspective Jon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training Specialist Kevin Helpert Police Lieutenant Protect Your Past, Secure.

Download Report

Transcript Identity Theft A personal perspective Jon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training Specialist Kevin Helpert Police Lieutenant Protect Your Past, Secure.

Slide 1

Identity Theft
A personal perspective
Jon Allen, CISSP, EnCE Information Security Officer
Amy Alexander Technology Training Specialist
Kevin Helpert Police Lieutenant

Protect Your Past, Secure Your Future


Slide 2

Introduction


Identity crime is a widespread crime in the United States.
Identity theft was not formally recognized as a specific federal
offense until 1998 when Congress passed a law, the Identity
Theft and Assumption Deterrence Act.



The Federal Trade Commission (FTC) reported that for 2009
ID Theft continued to top the list of consumer complaints and
accounted for over 21% of all complaints.



The median value gained by thieves using ID theft is $500.
Source: FTC Sentinel Report

Protect Your Past, Secure Your Future


Slide 3

General Facts and Projections






According to the 2006 FTC Identity Theft Survey
Report, approx. 8.3 million American consumers
were victimized.
Misuse of existing credit cards accounted for 38% of
all cases
Victims of new account fraud spent an average of 10
hours to resolve the issue with some spending in
excess of 100 hours

Source: FTC Sentinel Report

Protect Your Past, Secure Your Future


Slide 4

General Facts and Projections
(continued)









Computers, the internet, and cell phones have made
this type of crime quick and easy.
Prior to 2003, U.S. Department of Justice studies
revealed 98% of ID thieves went free.
ID theft victims are usually victimized again… after
90 days because the victim has restored their credit
and the suspect still has the personal information of
the victim.
Terrorist groups, including 9-11-01, are among those
funded by identity theft.
Protect Your Past, Secure Your Future


Slide 5

Identity Theft by State
(on per-capita basis)

Rank
1
2
3
4
5
6
7
8
9
10

State
Arizona
California
Nevada
Texas
Florida
New York
Georgia
Colorado
New Mexico
Maryland

Victims/100,000
137.1
120.1
114.2
107.9
105.6
100.1
91.6
89.0
87.5
85.8

Source: FTC Sentinel Report

Protect Your Past, Secure Your Future


Slide 6

Identity Theft Types



Credit card fraud
Utilities Fraud
Bank fraud
Employment- related fraud

23%
18%
13%
14%



Other (medical/ child support, etc)

13.4%



Loan fraud

5%





Source: FTC Sentinel Report

Protect Your Past, Secure Your Future


Slide 7

ID Theft Victims by Age









Under 19 years of age
Ages 20 to 29
Ages 30 to 39
Ages 40 to 49
Ages 50 to 59
Ages 60 to 69
Age 70 and older

Source: FTC Sentinel Report

Protect Your Past, Secure Your Future

2%
19%
23%
24%
20%
8%
4%


Slide 8

Other Victim Data





Race or Ethnicity is not a significant factor.
Household incomes of more than $75,000 per
year are targeted more often.
Urban vs. Rural: individuals in urban/
suburban settings are almost twice as likely to
be victimized than rural individuals.

Protect Your Past, Secure Your Future


Slide 9

Objectives


With this information, you will be better
informed if you become a victim, able to start
the process of recovery after becoming a
victim, and know who to contact along with
access to free resources.

Protect Your Past, Secure Your Future


Slide 10

Points of Discussion


General identity theft information



How easy it is to become a victim



Mistakes we make



How you can assist during an investigation if
you become a victim
Protect Your Past, Secure Your Future


Slide 11

Types of Identity Theft











Various frauds
Scams
Counterfeit ID’s
Altered checks
Counterfeit checks
Stolen credit cards
Stolen ID’s
Fraudulent social security cards
Protect Your Past, Secure Your Future


Slide 12

Sources of information













Burglaries
Telephone solicitations
Stolen wallets and purses
Property records
Court records
Marriage and divorce
certificates
Hacked computer
information
On-line purchases
Mailbox
(look for flags in up position)
Protect Your Past, Secure Your Future


Slide 13

Sources of information
(Continued)













Product warranty cards
Change of address
Dumpster or trash diving
Posing as a landlord to obtain credit
report
Shoulder surfing
Cell phones with picture/video
capabilities
‘Phishing’ through the internet and
phone
Sales Clerks, bank clerks, etc. who
copy personal application information
Protect Your Past, Secure Your Future


Slide 14

Sources of information
(Continued)









Waiters and other store employees
who use ‘skimmers’ and sell
information
People searches on the internet
Lost or stolen receipts
Written checks (computer
programs and scanners)
Credit card verification scam (email or phone)
Protect Your Past, Secure Your Future


Slide 15

Information from mail


Telephone & utility bills
(name, phone #, address, acct #)



Credit card statement
(name, address, card #, limit, exp, type



Bank statement
(name, address, bank name, account #, checks)



Boxes of checks
(blank checks ready to use)



Credit card offers
(name, address, contact #)



Paychecks and stubs
(name, address, employer, acct #, SSN)



Retirement statements
(name, address, acct #, balance, employer
contact information, SSN)



Annual SS statement
(name, address, SSN #’s (spouse & dependants)



W-2’s and other tax forms
(everything needed to assume your ID)

Protect Your Past, Secure Your Future


Slide 16

Social Networks


Exposing security question answers




Location data




But my profile is private

Including embedded photo data

Identity thieves are information miners

Protect Your Past, Secure Your Future


Slide 17

Tips to protect yourself





Write “check ID” on back side of
credit card and sign
Keep credit card in sight
Drop bills off at post office
(or pay with cashiers check)





Pick up boxes of checks at bank
personally
Do not respond to e-mails asking
for personal information, call your
credit card company from a
number listed on the statement

Protect Your Past, Secure Your Future


Slide 18

Personal Story


Amy can you describe for us the events that
you believe lead to you becoming a victim of
identify theft

Protect Your Past, Secure Your Future


Slide 19

Security Freeze







Called anti-identity theft freeze
Allows individuals to block access to their
credit reports until they personally unlock the
files by contacting the credit bureaus and
providing a PIN number
Without the code, a fraudster cannot open an
account in their name
Cost nothing for victims of ID theft, approx.
$10.00 for anyone else
Protect Your Past, Secure Your Future


Slide 20

Security Freeze




Write all three credit bureaus with the request
For more information… log onto www.ftc.gov
Provide… name, address for last 5 years, SSN,
DOB, 2 proofs of address (bills?), and a copy
of the police report if a victim, along with
completing a fraud affidavit

Protect Your Past, Secure Your Future


Slide 21

Social Engineering





Do you know who worked on your computer?
Did the person you sign in for watch you type
your password?
Have you ever walked away from your
computer and left it unlocked?

Protect Your Past, Secure Your Future


Slide 22

Prevent Social Engineering






Lock your computer when you are away from
the desk
Verify that anyone working on your computer
has an picture ITS badge or is authenticated
through the helpline
Never share any account passwords

Protect Your Past, Secure Your Future


Slide 23

Phishing the new SPAM






A combination of attacks to yield personal
information
Hard to tell a legitimate email
Will not go away

Protect Your Past, Secure Your Future


Slide 24

Protect Your Past, Secure Your Future


Slide 25

Spearing

Protect Your Past, Secure Your Future


Slide 26

Account Security


Pick a good password







Minimum of 8 characters in length
Must contain 3 out of 4 categories
Upper case, lower case, number and symbol

Never share your password
Lock or logout of a computer when you leave
it.

Protect Your Past, Secure Your Future


Slide 27

Protect Your Data




Verify that Windows/Mac Updates are being
applied to your computer
Check that Symantec Antivirus is up to date

Protect Your Past, Secure Your Future


Slide 28

Social Security Number






The Social Security Number policy governs
the use of SSN on campus
Any new retention of SSN electronic or on
paper must be approved by the CIO
Old stores of SSN should be protected or
deleted.

Protect Your Past, Secure Your Future


Slide 29

Personal Story


Amy can you talk about how you realized you
were a victim of identity theft?

Protect Your Past, Secure Your Future


Slide 30

If you become a victim…
(Continued)




Organize a file of all related paperwork for easy
access
Follow up in writing with all contacts made by phone
or in person
a. Use certified mail, with return receipt requested
b. Keep copies of all correspondence or forms used
c. Keep all originals if possible



File a complaint with the FTC (ask for any
information or paperwork)

Protect Your Past, Secure Your Future


Slide 31

If you become a victim


Place a fraud alert on credit reports, then
review reports
a. Once one credit bureau is contacted,
the other two should automatically be
notified to place alerts… *but check for
yourself !
b. All three bureaus should send the victim
information
c. Get copies for law enforcement
Protect Your Past, Secure Your Future


Slide 32

If you become a victim…








Contact any credit card companies
Contact the local law enforcement agency
Close any accounts that have been tampered or
opened fraudulently
Close all checking and savings accounts that
could be affected
Retrieve copies of bank and credit card
statements, and note fraudulent items
Protect Your Past, Secure Your Future


Slide 33

If you become a victim…
(Continued)




Contact the check verification companies
Contact the major credit reporting bureaus
Contact the Social Security Administrative
offices if Social Security number used (800269-0271)

Protect Your Past, Secure Your Future


Slide 34

Remember




If your Baylor University ID card is lost or stolen…
deactivate your card on-line immediately (DO NOT
WAIT!!!!!!!!).
By doing so, you lessen the chances of a potential
suspect to gain unauthorized access to a building or
dorm. This also prevents the card from being used
like a credit card (Example: BearBucks and the BU Bookstore).

**Go to Cashier’s office webpage… click on “ID Card”… click on “Lost/
Stolen ID Card Link”

Protect Your Past, Secure Your Future


Slide 35

Personal Story


Amy where is your case of identity theft today?

Protect Your Past, Secure Your Future


Slide 36

Baylor Police Department
(254)710-2222

Protect Your Past, Secure Your Future


Slide 37

Questions???

Protect Your Past, Secure Your Future