Identity Theft By: Andrew Hicks. Contents What is Identity theft? History Types of Identity Theft Are you safe? (The most common ways Identity theft is.

Slides:



Advertisements
Similar presentations
Presented (insert date) By (insert organizations name)
Advertisements

Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Compliance with Federal Trade Commission’s “Red Flag Rule”
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
By Derek Hahn Washington State Director of Finance and Ian Newby Lake Stevens Member In 3-D.
Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Kimberly Castner-Scott. What is Identity Theft I Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully.
1 Identity Theft and Phishing: What You Need to Know.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Identity Theft “When Bad Things Happen To Your Good Name” Federal Trade Commission.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
The ins and outs of By: Megan Tucker. What is identity theft? The stealing of a person’s information, especially credit cards and Social Security Number,
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
October 27,  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
Internet Safety Dr. Steve Broskoske Misericordia University.
7.3.1.G1. © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide.
Identity theft By: Blake D uncan.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Security Awareness Identity Theft October Security Awareness. Identity Theft Someone acquires enough information about you to pose as you and.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime,
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Identity Theft.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Understanding and Preventing.  Acquiring someone’s identifying information and impersonating them for gain.
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
Jeff loses his identity! Lesson 8: Identity Theft.
You. are at risk for the fastest growing crimes crime.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Identity Theft!!! Bill Ketjen Matt Grodhaus Two forms of crime IDENTITY THEFT  Using personal information for deception IDENTITY FRAUD  Using personal.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
IDENTITY THEFT Nicholas Michalak. Agenda What is Identity Theft? Background of Identity Theft Legislation Against it Different types and Examples What.
Identity Theft The fastest growing type of fraud..
Identity Theft Officer Bill Roscop Mount Prospect Police Department.
 Definition  How thieves steal identity  Origin  Possible impacts on the small island nation of Vanuatu  Precaution Measures.
Jeff loses his identity! Lesson 5: Identity Theft.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
IDENTITY THEFT.
Identity Theft It’s a crime!
When you get caught for Identity Theft
Protecting Your Credit
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Protecting Your Identity
Presentation transcript:

Identity Theft By: Andrew Hicks

Contents What is Identity theft? History Types of Identity Theft Are you safe? (The most common ways Identity theft is committed) Protection From Theft Conclusion

What Is Identity Theft? Identity theft- is a term used to refer to fraud that involves pretending to be someone else in order to steal money, gain access, or get other benefits.

History Long before the internet was around, identity thieves could steal your identity through "dumpster diving," (going through your trash to find personally identifying information on papers you had thrown out like bills and other documents.) They could also use “phone scams” to find out your personal information. For example, an identity thief could phone someone and tell that person that she had won a prize and he (the thief) just needed some personal information like her birth date or social security number to verify her identity. The thief could then use this information in whatever way he chose. Now, with the growth of the internet and other technology, identity theft has become more common, easier to perform, and safer to perform without getting caught.

Types Of Identity Theft According to the non-profit Identity Theft Resource Center, identity theft is sub-divided into four categories: Financial identity theft -using another's identity to obtain goods and services. Criminal identity theft -posing as another when apprehended for a crime. Identity cloning (using another's information to assume his or her identity in daily life. Business/commercial identity theft -using another's business name to obtain credit.

Financial Identity Theft Occurs when a criminal obtains a loan from a financial institution by impersonating someone else. The criminal pretends to be the victim by presenting an accurate name, address, birth date, or other information that the lender requires as a means of establishing identity. Even if this information is checked against the data at a national consumer reporting agency, the lender will encounter no concerns, as all of the victim's information matches the records. The lender has no easy way to discover that the person is pretending to be the victim, especially if an original, government-issued id can't be verified (as is the case in online, mail, telephone, and fax-based transactions). This kind of crime is considered non-self-revealing, although authorities may be able to track down the criminal if the funds for the loan were mailed to them. The criminal keeps the money from the loan, the financial institution is never repaid, and the victim is wrongly blamed for defaulting on a loan he/she never authorized.

Criminal Identity Theft When a criminal identifies himself to police as another individual it is sometimes referred to as "Criminal Identity Theft." In some cases the criminal will obtain a state issued ID using stolen documents or personal information belonging to another person, or they might simply use a fake ID. When the criminal is arrested for a crime, they present the ID to authorities, who place charges under the identity theft victim's name and release the criminal. When the criminal fails to appear for his court hearing, a warrant would be issued under the assumed name. The victim might learn of the incident if the state suspends their own drivers license, or through a background check performed for employment or other purposes, or in rare cases could be arrested when stopped for a minor traffic violation.

Identity Cloning A criminal acquires personal identifiers, and then impersonates someone for the purpose of concealment from authorities. This may be done by a person who wants to avoid arrest for crimes, by a person who is working illegally in a foreign country, or by a person who is hiding from creditors or other individuals. Unlike credit-dependent financial crimes, concealment can continue for an indeterminate amount of time without ever being detected. Additionally, the criminal might attempt to obtained fraudulent documents or IDs consistent with the cloned identity to make the impersonation even more convincing and concealed.

Business/Commercial Identity Theft A business, school or organization is victimized by a thief or exposed to brand and financial risk because of a careless employee or false representation.

Many people do not realize how easily criminals can obtain our personal data without having to break into our homes. In public places, for example, criminals may engage in "shoulder surfing" ­ watching you from a nearby location as you punch in your telephone calling card number or credit card number ­ or listen in on your conversation if you give your credit-card number over the telephone to a hotel or rental car company. Even the area near your home or office may not be secure. Some criminals engage in "dumpster diving" ­ going through your garbage cans or a communal dumpster or trash bin -- to obtain copies of your checks, credit card or bank statements, or other records that typically bear your name, address, and even your telephone number. These types of records make it easier for criminals to get control over accounts in your name and assume your identity. Are You Safe? (The most common ways Identity theft is committed)

Are You Safe? Cont. If you receive applications for "preapproved" credit cards in the mail, but discard them without tearing up the enclosed materials, criminals may retrieve them and try to activate the cards for their use without your knowledge. (Some credit card companies, when sending credit cards, have adopted security measures that allow a card recipient to activate the card only from his or her home telephone number but this is not yet a universal practice.) Also, if your mail is delivered to a place where others have ready access to it, criminals may simply intercept and redirect your mail to another location. In recent years, the Internet has become an appealing place for criminals to obtain identifying data, such as passwords or even banking information. In their haste to explore the exciting features of the Internet, many people respond to "spam" ­ unsolicited ­ that promises them some benefit but requests identifying data, without realizing that in many cases, the requester has no intention of keeping his promise. In some cases, criminals reportedly have used computer technology to obtain large amounts of personal data. With enough identifying information about an individual, a criminal can take over that individual's identity to conduct a wide range of crimes: for example, false applications for loans and credit cards, fraudulent withdrawals from bank accounts, fraudulent use of telephone calling cards, or obtaining other goods or privileges which the criminal might be denied if he were to use his real name. If the criminal takes steps to ensure that bills for the falsely obtained credit cards, or bank statements showing the unauthorized withdrawals, are sent to an address other than the victim's, the victim may not become aware of what is happing until the criminal has already inflicted substantial damage on the victim's assets, credit, and reputation.

What Is The Government Doing? In the fall of 1998, Congress passed the Identity Theft and Assumption Deterrence Act. This legislation created a new offense of identity theft, which prohibits knowingly transferring or using, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law. This offense, in most circumstances, carries a maximum term of 15 years' imprisonment, a fine, and criminal forfeiture of any personal property used or intended to be used to commit the offense.

Protection-Cont. If you think you've become a victim of identity theft or fraud, act immediately to minimize the damage to your personal funds and financial accounts, as well as your reputation: Contact the Federal Trade Commission (FTC) to report the situation, whether Online,Federal Trade Commission (FTC) Online By telephone toll-free at ID THEFT ( ) or TDD at , or By mail to Consumer Response Center, FTC, 600 Pennsylvania Avenue, N.W., Washington, DC You may also need to contact other agencies for other types of identity theft: Your local office of the Postal Inspection Service if you suspect that an identity thief has submitted a change-of-address form with the Post Office to redirect your mail, or has used the mail to commit frauds involving your identity;Postal Inspection Service The Social Security Administration if you suspect that your Social Security number is being fraudulently used (call to report the fraud);Social Security Administration The Internal Revenue Service if you suspect the improper use of identification information in connection with tax violations (call to report the violations).Internal Revenue Service

S.C.A.M. Protection Be Stingy about giving out your personal information to others unless you have a reason to trust them, regardless of where you are. Check your financial information regularly, and look for what should be there and what shouldn't. Ask periodically for a copy of your credit report. Maintain careful records of your banking and financial accounts.

Personal Examples and Questions

References s/idtheft.html s/idtheft.html t/consumers/about-identity-theft.html t/consumers/about-identity-theft.html titythefthistory.htm titythefthistory.htm ommission ommission