Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
Dr. Ted M. Hammett, DBA CPA Assoc. Professor – Accounting University of Arkansas – Monticello 1.
Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Preventing Identity Theft Beware the Trails You Leave Behind Use limitations: These materials may be used only for nonprofit, noncommercial educational.
IDENTITY THEFT AND FRAUD CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
1 Identity Theft and Phishing: What You Need to Know.
Identity Theft and the Impact on the Telecom Industry Debbie Ogle Corporate Security Fraud Manager January 27, 2005.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Modules 9.1.  When someone knowingly deceives you for their own personal gain.  They convince you that something is true when it isn’t.  They make.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Presented By The Plano Police Department Crime Prevention Unit.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
FORENSIC ACCOUNTING - BA Slide 12-1 Today’s Topics n Organizational Fraud n Consumer Fraud.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
FORENSIC ACCOUNTING - BA Slide 12-1 Today’s Topics n Organizational Fraud n Shenanigan #4 n Consumer Fraud.
FORENSIC ACCOUNTING - BA124 - Fall 2008Slide 13-1 Today’s Topics n Consumer Fraud.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Albrecht, Albrecht, Albrecht, Zimbelman Chapter 14: Fraud Against Organizations © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned,
Protect Yourself from Identity Theft
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
Materials Developed By: CLARIFI CLARIFI ID Theft & Scams Don’t be a Victim.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
Beware! Consumer Fraud Module 9.1.
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Security Awareness Identity Theft October Security Awareness. Identity Theft Someone acquires enough information about you to pose as you and.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Fraud Examination, 3E Chapter 15: Consumer Fraud COPYRIGHT © 2009 South-Western, a part of Cengage Learning.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
IDENTITY THEFT. Identity Theft Defined When someone uses another person’s name, address, social security number, bank or credit card account number, or.
Identity Theft Andrew Schreiber Alex Demetriou Jessica Ferrell.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Identity Theft.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Albrecht, Albrecht, Albrecht, Zimbelman Fraud Examination, 4E © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated,
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
You. are at risk for the fastest growing crimes crime.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Presented By Plano Police Department Crime Prevention Unit.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Identity Theft!!! Bill Ketjen Matt Grodhaus Two forms of crime IDENTITY THEFT  Using personal information for deception IDENTITY FRAUD  Using personal.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Identity Theft The fastest growing type of fraud..
Identity Theft Officer Bill Roscop Mount Prospect Police Department.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
By Amanda Cowan.  When another person steals your information and uses it to commit fraud or other crimes  The information stolen can be:  Credit Card.
Identity Theft It’s a crime!
Understanding Your Credit Score
Protecting Yourself from Fraud including Identity Theft
Protecting Your Identity
Protecting Yourself from Fraud including Identity Theft
Protecting Your Credit Identity
Identity Theft Presented by 72 Facility
15 Consumer Fraud.
Presentation transcript:

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Fraud Examination, 4E Chapter 15: Consumer Fraud

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Learning Objectives  Define what consumer fraud is and understand its seriousness.  Understand identity theft.  Classify the various types of investment and consumer frauds.

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Consumer Fraud Definition  Any fraud where consumers are victims.

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Consumer Fraud Two Primary Types of Consumer Fraud 1.Identity Theft – most common type of consumer fraud, affecting thousands of people everyday. 2.Consumer Scams – fraudsters use various schemes to earn consumer’s confidence and then use that confidence to get the consumer to pay or invest money or provide personal information.

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Consumer Fraud Seriousness of the Problem The US Federal Trade Commission released a statistical survey in October 2007 with the following findings:  Nearly 30 million adults—13.5% of the adult population— were victims of fraud during  20% of African American were victims  18% of Hispanics were victims  12 % of non-Hispanic whites were victims

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Consumer Fraud Numbers of Victims in the Top 10 Frauds 1.Fraudulent weight-loss products – 4.8 million 2.Foreign lottery scams – 3.2 million 3.Unauthorized billing-buyers’ clubs – 3.2 million 4.Prize Promotions – 2.1 million 5.Work-at-home programs – 2.4 million 6.Credit card insurance – 2.1 million

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Consumer Fraud 7. Unauthorized billing-Internet services – 1.8 million 8. Advanced free-loan scams – 1.2 million 9.Credit repair scams 1.2 million 10.Business opportunities—0.8 million

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Consumer Fraud US FTC’s Response to Consumer Fraud Consumer Sentinel – a complaint database developed by the US Federal Trade Commission that tracks information about consumer fraud and identity theft and makes it available to law enforcement partners across the US and throughout the world.

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identity Theft  Identity theft is used describe those circumstances when someone uses another person’s name, address, Social Security number (SSN), bank or credit card account number, or other identifying information to commit fraud or other crimes.  40% of the frauds reported to the FTC over the last few years have involved some type of identity theft.

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identity Theft Cycle

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identity Theft How Identity Theft Occurs Stage 1: Discovery Gain Information Phase:  Searching trash  Stealing mail  Phishing  Scanning credit card information Information Verification Phase:  Telephone scams (Pretexting)  Trash searches

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identity Theft Stage 2: Action Accumulating Documentation Phase:  Perpetrator gets the tools to commit the fraud (applying for credit cards, a driver’s license, or fake check in the victim’s name) Cover-up or Concealment Actions Phase:  Perpetrator takes steps to cover or hide the financial footprints left throughout the identity theft process.  Example: Changing the billing address on a credit card so that the statements go to the fraudster’s address.

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identity Theft Stage 3: Trial 1 st Dimensional Actions Phase:  First attempts to test the stolen information.  If the test works, the fraudster attempts more 2 nd Dimensional Actions Phase:  Actions taken after the tests are successful  The fraudster usually attempts face-to-face transactions 3 rd Dimensional Actions Phase:  Fraudster opens bank accounts, establishes phone accounts, secures auto loans, etc.

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identity Theft Personal Information  Financial Gain The perpetrator may…  Buy large-ticket items  Take out car, home, or other loans  Establish phone or wireless services  Use counterfeit checks or debit cards  Open new bank accounts  File for bankruptcy  Report victim’s name to police  Open new credit card accounts  Change victim’s mailing address

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identity Theft Stealing a Victim’s Identity  Dumpster diving  Skimming  Social engineering  Stealing wallets/purses  Sneak into a victim’s home and steal information  Shoulder surfing  Phishing  Steal mail

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identity Theft Minimizing the Risk  Guard your mail from theft  Opt out of preapproved credit cards  Check you personal credit information at least annually  Guard Social Security card and number  Safeguard all personal information  Guard trash from theft  Protect wallet and other valuables  Protect the home, computer, passwords

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identity Theft  Prosecution of Identity Theft  When identity theft is committed, the perpetrator can be prosecuted criminally and/or civilly.  For prosecution, it is necessary to show the perpetrator acted with intent to defraud—usually easy to prove if evidence of the fake identity used to purchase an item, open an account, or obtain a credit card is collected.

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Identity Theft Once Identity Theft Occurs Victims should…  Contact the Federal Trade Commission  Contact local FBI and/or US Secret Service agencies  Contact the credit reporting agencies  Contact the local Postal Inspection Service  Contact the Internal Revenue Service  Contact the Social Security Administration  Contact personal financial institutions  Change personal identification information

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Consumer &Investment Scams Foreign Advance-Fee Scams  Nigerian Money Offers  Clearinghouse Scam  Purchase of Real Estate Scam  Sale of Crude Oil at below market price  Disbursement of money from wills

© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Consumer & Investment Scams

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Consumer & Investment Scams Work-at-Home Schemes  Multilevel Marketing  Pyramid Scheme  Chain Letter, Mail Stuffing, Product Testing, and Craft Assembly

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Consumer & Investment Scams Bogus Mystery Shopping Scams  Perpetrators promise victims a job to stroll through stores, enjoy the displays, shop for merchandise, and file reports about their experiences.  Fraudsters promise victims compensation ranging from $10–$40 an hour, plus the opportunity to keep all products evaluated.  Although some mystery shoppers’ advertisements are legitimate, the majority are not. Usually victims are conned out of “application charge”.

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Consumer & Investment Scams Telemarketing Frauds  Fraudsters set up giant rooms (referred to as boiler rooms) in rented offices where they train salespeople to find and defraud victims  Move from city to city using different names  Unwary investors lose about $1 million every hour to investment fraud promoted over the telephone  Elderly are more susceptible to telemarketing fraud than almost and other type of fraud.

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Consumer & Investment Scams  Safeguards Against Telemarketing Frauds  Never give a Social Security, credit card, or other information over the phone unless you initiate the call.  Put your information on the “do not call” registry

Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Investment/Consumer Scams Investment Scams  Unreasonable promised rates of return  Investments that do not make sound business sense  Pressure to get in early on the investment  Use of a special tax loophole or a tax avoidance scheme  A business with a history of bankruptcy or scandals