National Crime Prevention Council 2005 Identity Theft and Strategies for Crime Prevention.

Slides:



Advertisements
Similar presentations
An Educational Partnership of Consumer Action and Chase
Advertisements

Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
[your name, organization] Protecting Your Identity: What to Know, What to Do.
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up.
Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Preventing Identity Theft Beware the Trails You Leave Behind Use limitations: These materials may be used only for nonprofit, noncommercial educational.
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
Identity Theft and Strategies for Crime Prevention National Crime Prevention Council 2006.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Identity Theft INDEPENDENT LIVING: MANAGING YOUR MONEY.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
A ID Theft & ACCOUNT FRAUD Welcome to MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP Prevention & Clean Up © 2011.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
Crime Prevention IDENTITY THEFT ©This TCLEOSE approved Crime Prevention Curriculum is the property of CSCS-ICJS CRIME PREVENTION II Institute for Criminal.
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity theft: Real or Virtual? By: Alex Metzler.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Be Cautious of Identity Theft By: Sydney Langley.
Crime Prevention Part II IDENITY THEFT ©TCLEOSE Course #2102 Crime Prevention Curriculum Part II is the intellectual property of CSCS-ICJS (2009) Institute.
Identity Theft.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft Tiffany Setzer & Cassie Conkwright.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Jeff loses his identity! Lesson 8: Identity Theft.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Beware! Identity Theft. Imagine getting a letter from the Internal Revenue Service (IRS) demanding that you pay $5,700 in back taxes. That’s what happened.
Protecting Your Assets By Preventing Identity Theft
Protecting Your Identity:
IDENTITY Theft Financial Literacy Identity Theft.
When you get caught for Identity Theft
Protecting Your Identity:
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Protecting Yourself from Fraud including Identity Theft
Protecting Your Identity
Protecting Yourself from Fraud including Identity Theft
Protecting Your Credit Identity
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

National Crime Prevention Council 2005 Identity Theft and Strategies for Crime Prevention

National Crime Prevention Council Objectives What is identity theft? What is identity theft? Why worry about it? Why worry about it? How does it happen? How does it happen? Why has identity theft emerged? Why has identity theft emerged? What is being done about it? What is being done about it? What can I do about it? What can I do about it?

National Crime Prevention Council What Is Identity Theft? One person, using information gathered from some source, takes on the identity of another person without permission and conducts a variety of activities using that identity. One person, using information gathered from some source, takes on the identity of another person without permission and conducts a variety of activities using that identity. The intent is to use that identity for personal gain, generally with the intent to defraud others. The intent is to use that identity for personal gain, generally with the intent to defraud others.

National Crime Prevention Council What Is NOT Identity Theft? Someone using your credit card with your knowledge and consent to make a purchase Someone using your credit card with your knowledge and consent to make a purchase Someone properly exercising a legally granted power of attorney on your behalf Someone properly exercising a legally granted power of attorney on your behalf Someone making up a fake name and signing into a hotel. This may be a crime, but it’s not identity theft. Someone making up a fake name and signing into a hotel. This may be a crime, but it’s not identity theft.

National Crime Prevention Council Why Worry About Identity Theft? It is the fastest-growing crime in the nation. It is the fastest-growing crime in the nation. More than 10 million people are victimized by it each year, the most victimized group being those between the ages of 19 and 29. More than 10 million people are victimized by it each year, the most victimized group being those between the ages of 19 and 29. It can cost an average of 80 hours and more than $1,400 to clear up a simple case of identity theft that is caught early. It can cost an average of 80 hours and more than $1,400 to clear up a simple case of identity theft that is caught early.

National Crime Prevention Council Why Worry About Identity Theft? (cont.) Some victims lose many thousands of dollars as well as their good credit rating and consumer reputations. Some victims lose many thousands of dollars as well as their good credit rating and consumer reputations. It costs our economy $40 billion or more each year. It costs our economy $40 billion or more each year. (Source: Federal Trade Commission Synovate Study 2003,

National Crime Prevention Council Why Worry About Identity Theft? (cont.) Deterrence and apprehension are not yet effective. Prevention is the best defense. Deterrence and apprehension are not yet effective. Prevention is the best defense. There are jurisdictional problems concerning where the crime occurs. There are jurisdictional problems concerning where the crime occurs. It is an attractive crime to criminals because of its low risk and high return. It is an attractive crime to criminals because of its low risk and high return.

National Crime Prevention Council How Identity Theft Works STEP 1—Getting the Identity The thief or thieves look for information in any number of ways: The thief or thieves look for information in any number of ways: – Discarded documents in the trash – Receipts from purchases – Lost or stolen wallets or purses – Online “phishing” for personal data – Stolen mail from mailboxes – Thieves are thinking of new, inventive ways every day.

National Crime Prevention Council How Identity Theft Works STEP 1—Getting the Identity (cont.) Some thieves go “wholesale” by getting lists of information on individuals through computer hacking, theft, or bribery. Some thieves go “wholesale” by getting lists of information on individuals through computer hacking, theft, or bribery. The information may be resold to other crooks or used numerous times by the original thief or thieves. The information may be resold to other crooks or used numerous times by the original thief or thieves. Profits may be used to support additional criminal activities such as drugs and terrorism. Profits may be used to support additional criminal activities such as drugs and terrorism.

National Crime Prevention Council How Identity Theft Works STEP 2—Exploiting the Identity With the information that becomes available, the thief may have false IDs made: With the information that becomes available, the thief may have false IDs made: – A state driver’s license with the thief’s picture and the victim’s name – Non-driver’s state license –Social Security card –Employer ID –Credit cards

National Crime Prevention Council How Identity Theft Works STEP 2—Exploiting the Identity (cont.) The thief may simply begin leveraging one piece of information to obtain or establish other information or assets. These may include The thief may simply begin leveraging one piece of information to obtain or establish other information or assets. These may include –New credit card accounts – State or local licenses –Accounts with utility companies, apartment leases, or even home mortgages

National Crime Prevention Council How Identity Theft Works STEP 3—Discovering the Theft The thief continues to build a “persona” using the victim’s name, good credit, and even good character references. The thief never pays the bills, but the victim is left with a bad name and ruined credit. The thief continues to build a “persona” using the victim’s name, good credit, and even good character references. The thief never pays the bills, but the victim is left with a bad name and ruined credit. Eventually, the victim tries to get a new credit account and is turned down, gets a bill for a credit card he or she never owned, or starts getting calls from bill collectors. Eventually, the victim tries to get a new credit account and is turned down, gets a bill for a credit card he or she never owned, or starts getting calls from bill collectors.

National Crime Prevention Council How Identity Theft Works STEP 3—Discovering the Theft (cont.) The thief might abandon the victim’s identity because he or she has “spoiled” the name of the victim (e.g., with a criminal offense or bankruptcy). The thief might abandon the victim’s identity because he or she has “spoiled” the name of the victim (e.g., with a criminal offense or bankruptcy). When the crime or ruined credit is discovered, the victim is left to clean up the mess. When the crime or ruined credit is discovered, the victim is left to clean up the mess.

National Crime Prevention Council How Identity Theft Works STEP 4—Reporting and Restoring The victim reports it to the local police and to the nation’s major credit bureaus. The victim reports it to the local police and to the nation’s major credit bureaus. The victim asks the credit bureaus to note the identity theft crime on his or her credit report. The victim asks the credit bureaus to note the identity theft crime on his or her credit report. The victim may need to consult with a local victims’ assistance agency or an attorney for specific steps necessary in a given state. The victim may need to consult with a local victims’ assistance agency or an attorney for specific steps necessary in a given state.

National Crime Prevention Council How Identity Theft Works STEP 4—Reporting and Restoring (cont.) The victim also files a complaint through the Federal Trade Commission registry at The victim also files a complaint through the Federal Trade Commission registry at The victim completes an ID theft affidavit, available in identity theft section. The victim completes an ID theft affidavit, available in identity theft section.

National Crime Prevention Council Frequently Asked Questions Frequently Asked Questions

National Crime Prevention Council Where and How Do They Get My Information ? Telephone calls asking you to “update records” Telephone calls asking you to “update records” Theft of incoming bills, which show your account number Theft of incoming bills, which show your account number Theft of outgoing mail and bill payments Theft of outgoing mail and bill payments

National Crime Prevention Council Where and How Do They Get My Information? (cont.) Redirection of stolen mail, where the thief files a change of address on your credit card bills Redirection of stolen mail, where the thief files a change of address on your credit card bills “Phishing” in which the sender sends out an or pop-up message that looks like it came from a real bank or credit card company and asks for identifying information. Legitimate groups will never do this. “Phishing” in which the sender sends out an or pop-up message that looks like it came from a real bank or credit card company and asks for identifying information. Legitimate groups will never do this.

National Crime Prevention Council Where and How Do They Get My Information? (cont.) What is “phishing”? The Internet is a new, convenient, and trusted way to do business that has allowed criminals to create illegitimate s or pop-up messages posing as your bank, credit card, or utility company. The Internet is a new, convenient, and trusted way to do business that has allowed criminals to create illegitimate s or pop-up messages posing as your bank, credit card, or utility company.

National Crime Prevention Council Where and How Do They Get My Information? (cont.) What is “phishing”? (cont.) They create a phony reason why you need to give them your personal information (e.g., bank routing number, Social Security number). They create a phony reason why you need to give them your personal information (e.g., bank routing number, Social Security number). They use the ease of online transactions to their advantage, hoping you will be fooled. They use the ease of online transactions to their advantage, hoping you will be fooled.

National Crime Prevention Council Where and How Do They Get My Information? (cont.) More places… Going through trash to recover bills Going through trash to recover bills Credit card receipts that you discard or toss out with a shopping bag Credit card receipts that you discard or toss out with a shopping bag Noticing a bill you tossed in a public trash can Noticing a bill you tossed in a public trash can Second impressions of credit cards Second impressions of credit cards Casual use of Social Security numbers and other similar identifiers Casual use of Social Security numbers and other similar identifiers

National Crime Prevention Council Sample “Phishing”

National Crime Prevention Council How To Avoid a “Phishing” Scam Tips from the FTC: If you get an or pop-up message that asks for personal or financial information, do not reply or click on the link in the message. Legitimate companies don’t ask for this information via . If you get an or pop-up message that asks for personal or financial information, do not reply or click on the link in the message. Legitimate companies don’t ask for this information via .

National Crime Prevention Council How To Avoid a “Phishing” Scam (cont.) Tips from the FTC: If you are concerned about your account, contact the organization using its legitimate telephone number or open a new Internet browser and type in the company’s correct web address. If you are concerned about your account, contact the organization using its legitimate telephone number or open a new Internet browser and type in the company’s correct web address.

National Crime Prevention Council How To Avoid a “Phishing” Scam (cont.) More tips from the FTC Don’t personal or financial information. If you initiate a transaction and want to provide your personal or financial information through an organization’s website, look for indicators that the site is secure. Don’t personal or financial information. If you initiate a transaction and want to provide your personal or financial information through an organization’s website, look for indicators that the site is secure.

National Crime Prevention Council How To Avoid a “Phishing” Scam (cont.) More tips from the FTC A “lock” icon on the browser’s status bar or a URL for a website that begins “ (the “s” stands for “secure”) indicates that you are on a secure site. A “lock” icon on the browser’s status bar or a URL for a website that begins “ (the “s” stands for “secure”) indicates that you are on a secure site. Unfortunately, no indicator is foolproof; some phishers have forged security icons. Unfortunately, no indicator is foolproof; some phishers have forged security icons.

National Crime Prevention Council How To Avoid a “Phishing” Scam (cont.) Use antivirus software and keep it up-to-date. Some phishing s contain software that can harm your computer or track your activities on the Internet without your knowledge. Antivirus software scans incoming communications for troublesome files. Look for antivirus software that recognizes current viruses as well as older ones, can effectively reverse the damage, and updates automatically. Use antivirus software and keep it up-to-date. Some phishing s contain software that can harm your computer or track your activities on the Internet without your knowledge. Antivirus software scans incoming communications for troublesome files. Look for antivirus software that recognizes current viruses as well as older ones, can effectively reverse the damage, and updates automatically.

National Crime Prevention Council How To Avoid a “Phishing” Scam (cont.) A firewall helps make you invisible on the Internet and blocks all communications from unauthorized sources. It’s especially important to run a firewall if you have a broadband connection. Finally, your operating system (e.g., Windows or Linux) may offer free software “patches” to close holes in the system that hackers or phishers could exploit. A firewall helps make you invisible on the Internet and blocks all communications from unauthorized sources. It’s especially important to run a firewall if you have a broadband connection. Finally, your operating system (e.g., Windows or Linux) may offer free software “patches” to close holes in the system that hackers or phishers could exploit.

National Crime Prevention Council Why Is ID Theft on the Rise? Computers have made record-keeping faster but have removed human analysis, making it easier for someone to steal an identity or pose as another person. Computers have made record-keeping faster but have removed human analysis, making it easier for someone to steal an identity or pose as another person. More and more transactions are being handled electronically, and that trend is continuing to increase dramatically. More and more transactions are being handled electronically, and that trend is continuing to increase dramatically. More computer hackers now go for monetary returns, not for the thrill of conquering another computer. More computer hackers now go for monetary returns, not for the thrill of conquering another computer.

National Crime Prevention Council Why Is ID Theft on the Rise? (cont.) Mobility means that many of us shop in stores all over our community, the region, or the country, so we are more anonymous than ever. Mobility means that many of us shop in stores all over our community, the region, or the country, so we are more anonymous than ever. Many of us find it hard to believe that ID theft could happen to us, even though millions are victims each year. Many of us find it hard to believe that ID theft could happen to us, even though millions are victims each year.

National Crime Prevention Council What Can We Do About It? Consumer education, like the information we’re sharing today, helps you reduce your risk of becoming a victim. Consumer education, like the information we’re sharing today, helps you reduce your risk of becoming a victim. Education is an ongoing process as new techniques emerge. Education is an ongoing process as new techniques emerge. Information about prevention and ways to stop ID theft spread quickly as well. Information about prevention and ways to stop ID theft spread quickly as well.

National Crime Prevention Council What Can We Do About It? (cont.) New ways are being found to tighten security on electronic payment systems and to detect “out of the ordinary” purchase patterns. New ways are being found to tighten security on electronic payment systems and to detect “out of the ordinary” purchase patterns. Some credit card payment systems now signal only the last four digits of your card number, so that someone who steals your receipt can’t steal your good name. Some credit card payment systems now signal only the last four digits of your card number, so that someone who steals your receipt can’t steal your good name.

National Crime Prevention Council What Can We Do About It? (cont.) New shredders are coming onto the market, making thorough document destruction easier at home. New shredders are coming onto the market, making thorough document destruction easier at home.

National Crime Prevention Council Who Is Vulnerable? People who Keep their money in bank accounts Keep their money in bank accounts Use credit or debit cards Use credit or debit cards Generate trash with unshredded paper in it Generate trash with unshredded paper in it Casually toss credit card or other receipts into public receptacles Casually toss credit card or other receipts into public receptacles Get personal bills by mail or electronically Get personal bills by mail or electronically Don’t check their credit card reports and bank statements Don’t check their credit card reports and bank statements

National Crime Prevention Council Who Is Vulnerable? (cont.) People who Don’t regularly check their credit bureau reports Don’t regularly check their credit bureau reports Have accessible mail boxes Have accessible mail boxes

National Crime Prevention Council Prevention Check your bank, credit card, and similar statements monthly. Make sure you receive them, and make sure the charges are yours. Check your bank, credit card, and similar statements monthly. Make sure you receive them, and make sure the charges are yours. Immediately call your bank or credit card company if you don’t receive your bill. Immediately call your bank or credit card company if you don’t receive your bill.

National Crime Prevention Council Prevention (cont.) Consider registering with the Direct Marketing Association to refuse any unsolicited credit offers. Consider registering with the Direct Marketing Association to refuse any unsolicited credit offers. NEVER provide account information over the Internet or the telephone unless you originated the call and unless you are absolutely certain of the party you are speaking to. NEVER provide account information over the Internet or the telephone unless you originated the call and unless you are absolutely certain of the party you are speaking to.

National Crime Prevention Council Prevention (cont.) Rip up receipts if you will not need them for warranties or returns. Rip up receipts if you will not need them for warranties or returns. Shred any unwanted credit, loan, or credit card offers – or at least cut them up with scissors – before putting them in the trash. Shred any unwanted credit, loan, or credit card offers – or at least cut them up with scissors – before putting them in the trash.

National Crime Prevention Council Prevention (cont.) Do not give out your real name or other personal information in Internet chat rooms. Use a screen name. Do not give out your real name or other personal information in Internet chat rooms. Use a screen name. Do not authorize others to use your credit cards. They may not take the same care that you do. Do not authorize others to use your credit cards. They may not take the same care that you do. Deposit mail in a U.S. Postal Service mailbox. Deposit mail in a U.S. Postal Service mailbox. Make sure your mailbox is secure. Make sure your mailbox is secure.

National Crime Prevention Council How To Handle Identity Theft File a police report immediately. File a police report immediately. Notify the three major credit bureaus and each of your credit or debit card issuers of the identity theft, and ask that appropriate alerts and closures be filed. Notify the three major credit bureaus and each of your credit or debit card issuers of the identity theft, and ask that appropriate alerts and closures be filed. File a report with the Federal Trade Commission’s Complaint Center, and obtain an ID theft affidavit, which is available online at File a report with the Federal Trade Commission’s Complaint Center, and obtain an ID theft affidavit, which is available online at

National Crime Prevention Council How To Handle Identity Theft (cont.) Check credit reports, immediately report any incorrect activity, and ensure that a fraud alert is still active on your account. Check credit reports, immediately report any incorrect activity, and ensure that a fraud alert is still active on your account. Carry copies of documents with you – the police report, the affidavit, and any other formal records that attest to your identity – in case of emergency. Carry copies of documents with you – the police report, the affidavit, and any other formal records that attest to your identity – in case of emergency.

National Crime Prevention Council How To Handle Identity Theft (cont.) Check court records in your general area for bankruptcies and for mortgage liens using your name. Many records are automated, which makes the job easier. Check court records in your general area for bankruptcies and for mortgage liens using your name. Many records are automated, which makes the job easier.

National Crime Prevention Council Encourage Everyone To… Review methods of handling personal information Review methods of handling personal information Take prevention strategies to heart – and encourage others to do so Take prevention strategies to heart – and encourage others to do so Speak out about the need for preventive action and laws that protect identity theft victims Speak out about the need for preventive action and laws that protect identity theft victims

National Crime Prevention Council Online Resources Federal Trade Commission: Federal Trade Commission: Department of Justice: Department of Justice: Better Business Bureau: Better Business Bureau: United States Postal Service: United States Postal Service:

National Crime Prevention Council Online Resources Many nonprofit organizations are committed to promoting prevention and recovery from identity theft. Here are a few: Many nonprofit organizations are committed to promoting prevention and recovery from identity theft. Here are a few:

National Crime Prevention Council National Crime Prevention Council 1000 Connecticut Avenue, NW, Thirteenth Floor Washington, DC www.ncpc.org