Computer Vulnerabilities & Criminal Activity Identity Theft & Credit Card Fraud 7.2 October 24, 2011.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
© Family Economics & Financial Education – October 2010 – The Essentials to Take Charge of Your Finances – Depository Institution Essentials – Slide 1.
COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
OVER VIEW OF BANKING FRAUDS
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
Identity Theft Presented by Christina Williams and Lazaro Juarez Orange County’s Credit Union.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Kimberly Castner-Scott. What is Identity Theft I Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully.
1 Identity Theft and Phishing: What You Need to Know.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
What is identity theft, and how can you protect yourself from it?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Identity Theft By: Caroline Branton, Laura Hunter, Sinead McFarlane.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Debit Card Plastic card that looks like a credit card
Security, Privacy, and Ethics Online Computer Crimes.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
17-2 Financial Services and Electronic Banking. Types of financial services Savings services Financial institutions accept money for safekeeping. A broad.
Electronic Payment Systems
MKTG 476 SECURITY Lars Perner, Instructor 1 Internet Security  Servers  Hacking  Publicly available information  Information storage  Intrusion methods.
Scholarship Scams Avoiding Scholarship Scams, Phishing & Identity Theft at All Cost.
 More than ___% of teens have a savings account.  ___% of teens age have a checking account. ___% of those ages have one.  Likewise, ___%
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Cyber Crimes.
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Scams & Schemes Common Sense Media.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Unethical use of Computers and Networks
Identity Theft Philippa Lawson Canadian Internet Policy and Public Interest Clinic University of Ottawa
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Identity Theft.
Business Administration term project 2 (25%) financial Management Systems Debit card and credit card payments By Ashleigh Gray.
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
You. are at risk for the fastest growing crimes crime.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Computer Vulnerabilities & Criminal Activity Identity Theft & Credit Card Fraud 6.1 March 1, 2010 Identity Theft & Credit Card Fraud 6.1 March 1, 2010.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
The Dangers and Consequences of Identity Theft By: Deandre Bennett.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Checking & Savings Accounts Economics What is a Checking Account?  Common financial service used by many consumers (a place to keep money)  Funds.
Computer Crime Second Part of Chapter 7 A gift of Fire – Sara Baase.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
IDENTITY THEFT Nicholas Michalak. Agenda What is Identity Theft? Background of Identity Theft Legislation Against it Different types and Examples What.
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
 Did YOU Know?!?  Tennessee is bordered by 8 states: Alabama, Arkansas, Georgia, Kentucky, Mississippi, Missouri, North Carolina and Virginia - more.
Identity Theft Officer Bill Roscop Mount Prospect Police Department.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Identity Theft It’s a crime!
Done by… Hanoof Al-Khaldi Information Assurance
Protecting Your Identity:
Depository Institution Essentials
Depository Institution Essentials
Protecting Your Identity
Depository Institution Essentials
Presentation transcript:

Computer Vulnerabilities & Criminal Activity Identity Theft & Credit Card Fraud 7.2 October 24, 2011

Definition of Identity Theft A person commits the crime of identity theft if, without the authorization, consent, or permission of the victim, and with the intent to defraud for his or her own benefit or the benefit of a third person, he or she does any of the following: 1. Obtains, records, or accesses identifying information that would assist in accessing financial resources, obtaining identification documents, or obtaining benefits of the victim. 2. Obtains goods or services through the use of identifying information of the victim. 3. Obtains identification documents in the victim's name. US Legal Definitions

Identity Theft and Assumption Deterrence Act 18 U.S.C § 1028 Makes it a federal crime to: “knowingly transfers or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law”

Connecticut Criminal Law - Identity Theft a.html

Protected Information Name Date of birth Social Security number Driver's license number Financial services account numbers, including checking and savings accounts Credit or debit card numbers Personal identification numbers (PIN) Electronic identification codes Automated or electronic signatures Biometric data Fingerprints Passwords Parent's legal surname prior to marriage

States with Mandatory ID Theft Investigation California Louisiana Minnesota

Motivation for Identity Theft Financial Desires Greed Strain Theory

Individuals Committing Identity Theft Individuals May have some relationship to the victim Often have no prior criminal record Illegal Immigrants Methamphetamine Users Career Criminals Gangs Hells Angels MS-13 Foreign Organized Crime Groups Asia Eastern Europe

Victims of Identity Theft Higher education / higher income Age Married Basically, individuals most likely to have a good credit rating / credit history

Methods of Obtaining Identity Information Dumpster Diving Skimming Phishing Change of Address Theft of Personal Property Pretexting / Social Engineering

How the Internet is used for ID Theft Hackers Interception of transmissions - retailer to credit card processor Firewall penetration - data search Access to underlying applications Social Engineering / Phishing / Pretexting Malware / Spyware / Keystroke Loggers

Crimes Following Identity Theft Credit Card Fraud Phone/Utility Fraud Bank/Finance Fraud Government Document Fraud Employment Fraud Medical Fraud Misrepresentation during arrest

Problem with Identity Theft Investigation Lapse of time between crime and the time the crime is reported Monetary amount Jurisdiction Anonymity

Identity Theft Investigation t/law-enforcement/investigations.html Identity Theft Data Clearing House Identity Theft Transaction Records Subpoena or victim’s permission Request for documents Must be in writing Authorized by the victim Be sent address specified by the business Allow the business 30 days to respond

Credit Card Fraud “Wide-ranging term for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction.” Wikipedia

“Carding” “The unauthorized use of credit and debit card account information to fraudulently purchase goods and services.” DATA BREACHES:WHAT THE UNDERGROUND WORLD OF “CARDING” REVEALS - US DOJ

Carding Terminology Dumps - information electronically copied from the magnetic stripe on the back of credit and debit cards. Track 1 is alpha-numeric and contains the customer’s name and account number Track 2 is numeric and contains the account number, expiration date, the secure code (known as the CVV ),and discretionary institution data. PIN - Personal Information Number BIN - Bank Information Number

Carding Terminology cont. Full Info” or “Fulls” - a package of data about a victim, including for example address, phone number, social security number, credit or debit account numbers and PINs, credit history report, mother’s maiden name, and other personal identifying information

How Credit Card Information Obtained Online In bulk from hackers who have compromised large databases hes.htm Phishing Malware

Types of Carding Carding Online Using stolen credit cards to purchase goods & services online Carding to a drop - having goods sent to another physical address Cobs - changing billing address with credit card company

Types of Carding cont. In-Store Carding Presenting a counterfeit credit card that had been encoded with stolen account information to a cashier at a physical retail store location More risky Higher level of sophistication

Types of Carding cont. Cashing The act of obtaining money, rather than retail goods and services, with the unauthorized use of stolen financial information Pin Cashing - Using dump information to encode a strip on a card to use at ATMs

Types of Carding cont. Gift Card Vending Purchasing gift cards from retail merchants at their physical stores using counterfeit credit cards and reselling such cards for a percentage of their actual value Sales maybe online or face-to-face

Carding Forums Online Tutorials on different types of carding-related activities Private and public message posting enabling members to buy and sell blocks of stolen account information and other goods and services Hyperlinks for hacking tools and downloadable computer code to assist in network intrusions; Other exploits such as source code for phishing webpages Lists of proxies Areas designated for naming and banning individuals who steal from other members

Carding Websites (all disabled)

Sample Carding Web Sites