Partnering to Minimize the Impact of Data Compromises

Slides:



Advertisements
Similar presentations
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Advertisements

By Derek Hahn Washington State Director of Finance and Ian Newby Lake Stevens Member In 3-D.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
Identity Theft Presented by Christina Williams and Lazaro Juarez Orange County’s Credit Union.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Computers, Freedom and Privacy April 23, 2004 Identity Theft: Addressing the Problem in California Joanne McNabb, Chief CA Office of Privacy Protection.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
1 Information and Systems Security/Compliance Security Day The Information and Systems Security/Compliance Program Dave Kovarik.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
Green Mountain Payroll Conference Joseph McCarthy CPA IRS Senior Stakeholder Liaison cell office Joseph.
Criminal Investigation Internal Revenue Service Internal Revenue Service Criminal Investigation (Accountants with Guns) Andrew T. Hromoko, Jr. Special.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
IDENTITY THEFT. Identity Theft Defined When someone uses another person’s name, address, social security number, bank or credit card account number, or.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Understanding and Preventing.  Acquiring someone’s identifying information and impersonating them for gain.
Information Security Sharon Welna Information Security Officer.
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Preventing and Detecting Identity Theft: Partnering with the IRS to Meet the Challenge Anita Douglas Senior Stakeholder Liaison November 13, 2015.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Proprietary and Confidential Don’t be the Next Cyber Crime Statistic C. Kevin deBrucky, Vice President PINACLE ® Security Manager.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
CYBER RISKS IN THE HEALTHCARE INDUSTRY HIROC 's Annual Risk Management Conference, April 2015 Jim Patterson, Partner, Co-Head of Fraud Law, Toronto, Bennett.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
IRS, CRIMINAL INVESTIGATION AND IDENTITY THEFT/DATA BREACHES
 Definition  How thieves steal identity  Origin  Possible impacts on the small island nation of Vanuatu  Precaution Measures.
Fraudulent and Questioned Documents. Top 5 Countries Originating Fraud.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
OKLAHOMA SOCIETY OF CPAS TULSA CHAPTER April 21, 2016 Anita Douglas Senior Stakeholder Liaison 1.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Protecting Your Assets By Preventing Identity Theft
Oklahoma’s Personal Financial Literacy Passport
Identity Theft It’s a crime!
You’ve Been Hacked! What to do when your personal information has been compromised Paul T. Yoder, Information Systems Security Specialist.
October 27, 2016 Main Line Association for Continuing Education
Advanced Income Tax Law
Gift Card Risk Mitigation – Presentation A
Melissa McBee Anderson Ethan Via Federal Bureau of Investigations
Data Compromises: A Tax Practitioners “Nightmare”
Tax Identity Theft Presenter Date
The Best Way To Secure U R Self
Lesson 2- Protecting Yourself Online
Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk.
“CYBER SPACE” - THE UNDERGROUND ECONOMY
Protecting Yourself from Fraud including Identity Theft
December 12, 2018 CPA Continuing Education Society of PA
Business Compromise and Cyber Threat
How are you fraud proofing?
Lesson 2- Protecting Yourself Online
Identity Theft By Kerry Freeman, EA.
Protecting Yourself from Fraud including Identity Theft
A Secret Service Perspective on Credit Card Fraud
Identity Theft and Credit Safety
Presentation transcript:

Partnering to Minimize the Impact of Data Compromises Brian Thomas Supervisory Special Agent – Group 03 IRS Criminal Investigation

Internal Revenue Service Criminal Investigation Criminal Investigation serves the American public by investigating potential criminal violations of the Internal Revenue Code and related financial crimes in a manner that fosters confidence in the tax system and compliance with the law.

Overview Anatomy of a Hack - Overview The Cyber Crime Threat Cyber Criminal Underground Actions When Compromised Cyber Security Resources

FBI Statistics 438,800,000 319,084,000 Overall 2013 35% Web Application Breaches 8% Insider Misuse Finance 27% Web Application Breaches 7% Insider Misuse IRS-CI Tracking over 200 Preparer and Payroll Service Compromises in 2015

ANATOMY OF A HACK

The Cyber Crime Threat Cyber criminals have adapted to today’s technology in exploiting the cyber arena These groups continually attack systems for monetary gain Malware Botnets Spam and phishing Extortion Identify theft Online fraud and unauthorized transactions

Business E-mail Comprise (BEC) Phishing Scheme “Mary, I want you to send me the list of W-2 copy of employees wage and tax statement for 2015, I need them in PDF file type, you can send it as an attachment. Kindly prepare the lists and email them to me asap. Thanks, CFO.”

BEC Findings Data mining of executives within an organization and disguising e-mail address (Using Social Media). Within 24 hours of the comprise, false returns are being prepared and submitted to IRS. Fraudulent refunds diverted to prepaid cards and RAL checks. Requesting taxpayers’ prior years transcripts. Create fictitious bank accounts in taxpayer’s names. Cloning Taxpayers’ credit cards. Taxpayers receiving refunds to which they are not entitled.

Actions When Compromised Contact IRS Stakeholder Liaison When Compromise Detected Stakeholder Liaison will refer Information within IRS (i.e. Criminal Investigations, Return Integrity & Compliance Services) Follow State Reporting Requirements (i.e. State Attorney General, State Consumer Protection Bureaus, State Police) Report Compromise to FBI, US Secret Service, Federal Trade Commission

Cyber Security Resources United States Computer Emergency Readiness Team (https://www.us-cert.gov/ncas/tips) AICPA Cyber Security Overview:  Available resources to broaden understanding of information security issues and concerns. Cyber Security Fraud What CPAs Should Know Webcast:  This series provides information to help practitioners answer questions about cyber security and fraud. American Payroll Association National Payroll Reporting Consortium

11/6/2018 Cyber Underground

Rules Governing Behavior

Where it all Starts: The Cyber Underground 2002: Less than 12 forums More than 800 Criminal Forums Represent 25+ languages More than 50 roles/specializations Nearly every cyber criminal has a membership on a forum (95%)

Questions?