1 And Tips to Avoid Becoming a Victim Recent Cyber Crime Cases.

Slides:



Advertisements
Similar presentations
Setting up a Gmail Account & Safety
Advertisements

DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Banking Services AVAILABLE FOR A SMALL BUSINESS. BANKING SERVICES 2 Welcome 1. Agenda 2. Ground Rules 3. Introductions.
The ABCs of Credit Card Finance Essential Facts for Students 2007 Carol A. Carolan, Ph.D.
The ABCs of Credit Card Finance Essential Facts for Students 2012 Carol A. Carolan, Ph.D.
Teacher instructions:
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Chapter © 2010 South-Western, Cengage Learning Responsibilities and Costs of Credit Using Credit Wisely Costs of Credit 18.
Account HIGHJACKING & IDENTITY THEFT GPCE Credit Union has prepared a slide show presentation to examine the most prevalent financial crimes at work today.
Operational Risks Task 13. What is CNP? CNP stands for Card Not Present and is when you order or pay for something online as you are not in front of the.
Presented by: Blue Green Systems. Inspiration Why people buy/sell online  Convenience  Better Prices  Variety  Fewer Expenses  Comparison of Prices.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking – Slide 1 Funded by a grant from Take Charge America,
Week 1.
1 If You Are Me, Then Who Am I? Beating Identity Theft Office of the California Attorney General.
Display slides 2 and 3 with Procedure step 2 in the lesson.
Teacher instructions: 1.Print the lesson, 2.Display slide 2 with Procedure steps 1 and 2 in the lesson. 3.Display slide 3 with Procedure step 4. Draw lines.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Today’s Agenda… Knowledge Check What is Cyber Crime? Identity Theft Phishing Common Scams inc. online and mobile phone scams Prevention Methods.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
1 Identity Theft and Phishing: What You Need to Know.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
PERSONAL FINANCIAL MANAGEMENT
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
What is identity theft, and how can you protect yourself from it?
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Internet Fraud By: Noelle Woodman.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Objectives  Explore ways to prevent identity theft.  Determine the differences between identity theft and consumer fraud.  Examine how media and technological.
Scams & Schemes Common Sense Media.
ICT in Banking.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 (C)2012 National Endowment for Financial Education | Lesson 2-5 Identity.
Jeff loses his identity! Lesson 8: Identity Theft.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Identity Theft How it happens and how to avoid it.
REACTION AND ACTION RESPONDING TO FRAUD 1. THE VICTIMS THE CON IS TAILORED TO THE PROSPECTIVE VICTIMS. 2.
Cybersecurity Test Review Introduction to Digital Technology.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
IDENTITY THEFT Nicholas Michalak. Agenda What is Identity Theft? Background of Identity Theft Legislation Against it Different types and Examples What.
Identity Theft The fastest growing type of fraud..
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Jeff loses his identity! Lesson 5: Identity Theft.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Internet Safety.
Done by… Hanoof Al-Khaldi Information Assurance
HOW DO I KEEP MY COMPUTER SAFE?
Freedom Independence Transition
What is Phishing? Pronounced “Fishing”
Identity Theft By Omer Ersen.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

1 And Tips to Avoid Becoming a Victim Recent Cyber Crime Cases

2 Introduction Detective Darin Webster Austin Police Department High Tech Crimes Unit

3 We Investigate... Breach of Computer Security Cellular Phone Cloning Unlawful Interception Online Financial Crimes Any Major Crime Whose Victim is a High Tech Company

4 Case #1: Breach of Computer Security Details:  Boyfriend/Girlfriend break up  Victim checks online and finds mail in trash folder victim did not delete  Victim finds mail in sent items folder that was sent to the suspect (not by victim)

5 Case #1: Breach of Computer Security Lessons Learned:  Many online accounts allow password reset based on “secret question”  Most of our “significant others” are going to know the answer to this question

6 Case #1: Breach of Computer Security Tips to Avoid Becoming a Victim:  Lie!!!  The secret question is only a password established to verify your identity  Don't use something easily discovered or known by someone else  After a break up, change passwords just as you would change the locks on your doors

7 Case #2: Unlawful Interception Details  Husband and Wife are going through divorce  Husband sends Wife an enticing attachment  Wife clicks attachment  Husband suddenly knows details of Wife's computer usage

8 Case #2: Unlawful Interception Lessons Learned  Texas is a “one party state” in regards to “Wiretapping”  Only one party needed to consent to the Interception

9 Case #2: Unlawful Interception Tips to Avoid Becoming a Victim:  Be wary of attachments from anyone, even people you know  Update your software  Operating System  Anti virus  Anti spyware  If you use monitoring software to watch your children, edit Windows registry to notify the user

10 Case #2: Unlawful Interception Tips to Avoid Becoming a Victim:  Trust your instincts!  Get it checked out  Computer repair business  Private Investigator  Once you have evidence, go to the Police

11 Case #3: Auction Fraud Details  Suspects start legitimate online auction business  Suspects sell items they don't own, hoping to purchase them at a lower price than they net on the auction  Financial difficulty follows  Suspects ignore customer complaints  Customers turn to Police

12 Case #3: Auction Fraud Lessons Learned  Don't ignore debts to customers when you have difficulty completing transaction  Ignoring debts to customers can turn a civil case into a criminal one

13 Case #3: Auction Fraud Tips to Avoid Becoming a Victim:  When shopping online remember:  You don't know who this person is  You don't know if he/she is where they say they are, the Internet is GLOBAL  Don't spend more than you can afford to lose  Read the website's terms of service

14 Case #4: Identity Theft Details:  Suspect works at Cellular phone company with access to sensitive data  Suspect obtains apartment and utilities in victim's name  Suspect orders merchandise in victim's name

15 Case #4: Identity Theft Lessons Learned:  Be vigilant!  You can do everything right, and still be a victim

16 Case #4: Identity Theft Tips to Avoid Becoming a Victim:  Guard your personal information very aggressively  Opt Out  Shred everything  One tiny piece could be the key to the kingdom  Check credit reports often  Children are the best victims, check theirs too!

17 Case #5: Overpayment Scam Details:  Victim advertises on Internet  Victim contacted by interested party who is overseas  Victim receives cashier's check or money order (usually more than the amount agreed upon) to deposit into their account

18 Case #5: Overpayment Scam Details:  Suspect needs money sent back to them or a third party  Victim writes checks or wires the money to suspect from own account  Cashier's check or money order later discovered counterfeit  Victim owes bank the money for the counterfeit check

19 Case #5: Overpayment Scam Lessons Learned:  In doing business with someone overseas:  You have little or no recourse if deal goes bad  Police have little or no jurisdiction overseas  Wiring money is commonly used by scammers.  Any paper can be counterfeit:  Cash  Cashier's checks  Money orders

20 Case #5: Overpayment Scam Tips to Avoid Becoming a Victim:  Avoid business transactions with persons or businesses overseas  Never wire funds to someone you don't know  Recognize a scam when you see one

21 Case #5: Overpayment Scam Tips to Avoid Becoming a Victim:  Google for Internet scams and know the telltale signs of one  Don't try to “set up” the scammer for the Police  The scammers are usually overseas and the best we can do is prevent the crime in the first place

22 Conclusion Change passwords often Be wary of online transactions Guard personal information Update your software Check your credit report often Lie on the secret question Check stuff out! Google It!!! If it sounds to good to be true, it is!