1 Office of the Attorney General Commonwealth of Virginia Identity Theft.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

Prepared for: Presented by: Risky Business 2012 Conference Tony La Rosa, Manager Mid-Iowa Credit Counseling Park Fair Mall 100 E. Euclid Ave., Ste. 157.
Fighting Back Against Identity Theft A Presentation for CSM564 – Dr. Price By Matt Poole.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
Identity Theft Presented by Christina Williams and Lazaro Juarez Orange County’s Credit Union.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Preventing Identity Theft Beware the Trails You Leave Behind Use limitations: These materials may be used only for nonprofit, noncommercial educational.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Citizen & Neighborhood Resources Department City of Scottsdale, Arizona.
Identity Theft. MIS Training Institute, Inc.Section X - Slide 2CS1 053 ©Network Security Services, LLC Outline n Definitions n Methods used n Ways to.
TCLEOSE Course No th Legislature SB – 473; SECTION 8. Section , Occupations Code, is amended by adding Subsection (i) to read as follows:
Computers, Freedom and Privacy April 23, 2004 Identity Theft: Addressing the Problem in California Joanne McNabb, Chief CA Office of Privacy Protection.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Identity Theft.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
Houston, We Have a Problem. When Things go Wrong Ed Carter & Steve Hoffer Information Security Office Ohio University.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Information and Systems Security/Compliance Security Day The Information and Systems Security/Compliance Program Dave Kovarik.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
October 27,  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.
MONEY MANAGEMENT II Billing Errors/Disputes & Identity Theft.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
2015 ANNUAL TRAINING By: Denise Goff
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime,
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
7.3.1.G1 According to The federal Trade Commission, Identity theft Affects Approximately 12.6Million People Every year.
Identity Theft.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Jeff loses his identity! Lesson 8: Identity Theft.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
IDENTITY THEFT Nicholas Michalak. Agenda What is Identity Theft? Background of Identity Theft Legislation Against it Different types and Examples What.
Identity Theft The fastest growing type of fraud..
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
 Did YOU Know?!?  Tennessee is bordered by 8 states: Alabama, Arkansas, Georgia, Kentucky, Mississippi, Missouri, North Carolina and Virginia - more.
Identity Theft Officer Bill Roscop Mount Prospect Police Department.
Identity Theft FBI Norfolk (757) SA Mark T. Park.
IRS, CRIMINAL INVESTIGATION AND IDENTITY THEFT/DATA BREACHES
Jeff loses his identity! Lesson 5: Identity Theft.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Identity Theft It’s a crime!
Protecting Your Credit Identity
When you get caught for Identity Theft
Red Flags Rule An Introduction County College of Morris
Protecting Yourself from Fraud including Identity Theft
Identity Theft Prevention Program Training
Protecting Your Credit Identity
Presentation transcript:

1 Office of the Attorney General Commonwealth of Virginia Identity Theft

2 Outline Computer Crime Section Computer Crime Section ID Theft Statistics ID Theft Statistics ID Theft Laws ID Theft Laws ID Theft Trends ID Theft Trends ID Theft Tips ID Theft Tips Resources / Contact Info Resources / Contact Info

3 Office of the Attorney General’s Computer Crime Section  Formed in July 1999  Investigate & prosecute ID theft, child exploitation, and Computer Crime Act cases  Coordinate Commonwealth’s Internet crime fighting  Assist Law Enforcement Officers & Commonwealth Attorneys  Assist with computer crime and technology legislation

4

5 Identity Theft Statistics Compiled by the Federal Trade Commission (FTC)

6

7

8

9

10

11

12 ID THEFT LAWS

13 Identity Theft Protection Act State Agencies Regulated ( ) State Agencies Regulated ( ) “Government Data Collection and Dissemination Practices Act” “Government Data Collection and Dissemination Practices Act” Ensures safeguards for personal privacy by recordkeeping agencies of the Commonwealth and political subdivisions Ensures safeguards for personal privacy by recordkeeping agencies of the Commonwealth and political subdivisions Virginia Code Section Virginia Code Section Felony for acquiring and misusing personal identifying information Felony for acquiring and misusing personal identifying information

14 Identity Theft Virginia Code Section § Virginia Code Section § A. It shall be unlawful for any person, without the authorization or permission of the person or persons who are the subjects of the identifying information, with the intent to defraud, for his own use or the use of a third person, to: A. It shall be unlawful for any person, without the authorization or permission of the person or persons who are the subjects of the identifying information, with the intent to defraud, for his own use or the use of a third person, to: 1. Obtain, record or access identifying information which is not available to the general public that would assist in accessing financial resources, obtaining identification documents, or obtaining benefits of such other person; 2. Obtain goods or services through the use of identifying information of such other person; 3. Obtain identification documents in such other person's name; or 4. Obtain, record or access identifying information while impersonating a law-enforcement officer or an official of the government of the Commonwealth.

15 Identity Theft PENALTIES PENALTIES Class 1 Misdemeanor Class 1 Misdemeanor If over $200, Class 6 Felony If over $200, Class 6 Felony If 50 or more person’s identifying info stolen, then Class 6 Felony If 50 or more person’s identifying info stolen, then Class 6 Felony Class 5 Felony if information is used to commit another crime Class 5 Felony if information is used to commit another crime

16 u Name u Social Security Number u Credit Card Number u DOB u Driver’s License u Passport Number u Fingerprint u Voiceprint u Retina or Iris Image u Electronic ID Number “Personal Identifying Info” includes:

17 Database Breaches Unauthorized acquisition 50 or more persons in same transaction prohibited ( ) Unauthorized acquisition 50 or more persons in same transaction prohibited ( ) Felony: Up to 10 years Felony: Up to 10 years Response to Choicepoint, Lexis-Nexis, DSW Response to Choicepoint, Lexis-Nexis, DSW

18 Database Breach Cont Legislation 2008 Legislation Requires companies to notify AG’s Office and affected Virginia consumers if database of personal info is breached Requires companies to notify AG’s Office and affected Virginia consumers if database of personal info is breached If over 1,000, also must notify credit reporting agencies If over 1,000, also must notify credit reporting agencies “Reasonably harmed” standard triggers notification “Reasonably harmed” standard triggers notification Without “unreasonable delay” Without “unreasonable delay” Must alert law enforcement if would impede criminal investigation Must alert law enforcement if would impede criminal investigation

19 Destruction of Public Records Section The procedures for the disposal, physical destruction of public records with SS #s by The procedures for the disposal, physical destruction of public records with SS #s by Shredding Shredding Erasing Erasing Otherwise modifying SS #s to make them unreadable or undecipherable by any means. Otherwise modifying SS #s to make them unreadable or undecipherable by any means.

20 Credit Reporting Agencies-Notice of Police Reports Virginia Code § :1--a new section requires consumer reporting agencies, upon notice that a police report has been filed, to note on person’s credit report within 30 days of notice. Virginia Code § :1--a new section requires consumer reporting agencies, upon notice that a police report has been filed, to note on person’s credit report within 30 days of notice.

21 Virginia Computer Crimes Act Computer Crimes Act: Title – Computer Crimes Act: Title – Computer Crimes Act Definitions Computer Crimes Act Definitions Computer Fraud Computer Fraud SPAM SPAM Computer Trespass Computer Trespass Computer Invasion of Privacy Computer Invasion of Privacy Theft of Computer Services Theft of Computer Services Harassment by Computer Harassment by Computer Using Computer to Gather ID Info (Phishing) Using Computer to Gather ID Info (Phishing)

22 Fishing

23 Virginia Computer Crimes Act - Phishing § :1. Using a computer to gather identifying information; penalties. § :1. Using a computer to gather identifying information; penalties :1 A. It is unlawful for any person…to use a computer to obtain, access, or record, through the use of material artifice, trickery or deception, any identifying information…Any person who violates this section is guilty of a Class 6 felony. A. It is unlawful for any person…to use a computer to obtain, access, or record, through the use of material artifice, trickery or deception, any identifying information…Any person who violates this section is guilty of a Class 6 felony. B. Any person who violates this section and sells or distributes such information to another is guilty of a Class 5 felony. B. Any person who violates this section and sells or distributes such information to another is guilty of a Class 5 felony. C. Any person who violates this section and uses such information in the commission of another crime is guilty of a Class 5 felony C. Any person who violates this section and uses such information in the commission of another crime is guilty of a Class 5 felony

24

25 Virginia Computer Crimes Act Phishing Variations Phishing Variations Banking Trojans Banking Trojans Website Based Website Based “Vishing” “Vishing” VOIP Based VOIP Based Spear Phishing Spear Phishing Individual Targeting Individual Targeting

26 Virginia Computer Crimes Act Pharming Pharming Malicious Viruses Malicious Viruses Spyware Spyware Web Based/Personal Use Web Based/Personal Use “419” Scams “419” Scams

27 Virginia Computer Crimes Act "Vishing" Example "Vishing" Example

28 From: favour dickson Sent: Thursday, January 31, :43 AM Subject: ATM, From: favour dickson Sent: Thursday, January 31, :43 AM Subject: ATM, ATM, We have been instructed to pay $450,000 to you via ATM Card system. By this method, a domiciliary account will be created in your name and you will be given an account number and a pin code to enable you check and monitor your account online while an ATM CARD will be sent to you to for withdrawal from any ATM centre worldwide. There are 250 banks in the world on the " ATM International Card Operation System" you can withdraw your money from depending on the one you prefer that operates ATM withdrawer system in 149 countries and nearer to you. You are requested to contact our ATM PAYMENT CENTER. Breach in Republic of Benin Cotonou West Africa, contact person Mrs Gladys Offoer on address Contact her immediately so that you can be told what is require for the account to be activated as well as delivery of the card to you. Mr.Favou Dickson Director Credit Payment Department. Bell South Associates Inc United state of America ATM, We have been instructed to pay $450,000 to you via ATM Card system. By this method, a domiciliary account will be created in your name and you will be given an account number and a pin code to enable you check and monitor your account online while an ATM CARD will be sent to you to for withdrawal from any ATM centre worldwide. There are 250 banks in the world on the " ATM International Card Operation System" you can withdraw your money from depending on the one you prefer that operates ATM withdrawer system in 149 countries and nearer to you. You are requested to contact our ATM PAYMENT CENTER. Breach in Republic of Benin Cotonou West Africa, contact person Mrs Gladys Offoer on address Contact her immediately so that you can be told what is require for the account to be activated as well as delivery of the card to you. Mr.Favou Dickson Director Credit Payment Department. Bell South Associates Inc United state of

29 Common Sources of Identity Theft  Mail theft  Dumpster Diving  Unscrupulous employees  Internet Fraud  Stolen/lost wallet  Medical records with confidential information  Burglary/larceny (residential/auto)  “Friends” and relatives  Phone scams  Shoulder surfing  Unethical use of public documents

30 Who Should Victims Contact? Credit Bureaus Credit Bureaus Federal Trade Commission (FTC) Federal Trade Commission (FTC) Creditors (Card Issuers & Utilities) Creditors (Card Issuers & Utilities) Local Law Enforcement Local Law Enforcement Office of the Attorney General Office of the Attorney General

31 Credit Bureaus Immediately call the fraud units of the three credit reporting companies. Report the theft of credit cards, and the misuse of their account numbers. Request that their credit accounts be flagged Victims should request that a statement be added to their reports, such as: “My identification has been used to apply for fraudulent credit. Contact me at (victim’s telephone number) to verify ALL applications.”

32 Credit Bureaus

33 Creditors Victims should contact all creditors immediately with whom their name has been used fraudulently— by telephone and in writing. They should get replacement cards with new account numbers for their own accounts that have been used fraudulently. They should ask that old accounts be processed as “account closed at consumer’s request.”

34 Victims of unauthorized use of a credit card will be liable for no more than the first $50 of the loss, although this is often waived and the victim will not be required to pay any part of the loss. (15 USC 1643.) Request that credit grantors provide the victim with a copy of all fraudulent credit applications and all statements of incurred charges.

35 The Identity Theft Passport

36 The Identity Theft Passport Two ways will be generated: Filing of Police Report OR Expungement of Record in accordance with § Filing of Police Report OR Expungement of Record in accordance with § The Office of the Attorney General, in cooperation with the State Police, may issue an "Identity Theft Passport" stating that such an order has been submitted. The Office of the Attorney General, in cooperation with the State Police, may issue an "Identity Theft Passport" stating that such an order has been submitted. The Office of the Attorney General may provide access to such information to criminal justice agencies and individuals who have submitted a court order pursuant to this section. The Office of the Attorney General may provide access to such information to criminal justice agencies and individuals who have submitted a court order pursuant to this section.

37

38 Office of the Attorney General of Virginia Internet Crime Complaint Center Internet Crime Complaint Center Federal Trade Commission (FTC)

39 Questions?

40 Office of the Attorney General Office of the Attorney General Commonwealth of Virginia Commonwealth of Virginia 900 East Main Street 900 East Main Street Richmond, VA Richmond, VA Computer Crime Section (804)