Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?

Slides:



Advertisements
Similar presentations
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
Advertisements

The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1 Identity Theft and Phishing: What You Need to Know.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Protecting Yourself from Fraud including Identity Theft
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
Beware! Consumer Fraud Module 9.1.
7.3.1.G1. © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide.
WHAT IS IT? Also called Identity Fraud, Identity Theft is when an individual uses another persons identifying information, such as name, social security.
Cyber Crimes.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
By: Mrs. McGinnis Sept,  Fradulent online shops  Sites that distruibute pirated music, videos and software  Bogus charity websites  Sites that.
Objectives  Explore ways to prevent identity theft.  Determine the differences between identity theft and consumer fraud.  Examine how media and technological.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Identity Theft.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Computer crimes.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft One of America's fastest growing crimes.
 Grab your handouts and settle in  Roll Call Question: Hard or soft shell tacos???  Bell Work:  How is interest of a savings account different from.
Protecting Your Assets By Preventing Identity Theft 1.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
S CAMS AND S CHEMES. I DENTIFY T HEFT Someone unlawfully obtains and uses a person’s personal data to commit fraud or deception for financial gain Opens.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
IDENTITY THEFT Seneca Stairs. #1- Phishing  Phishing is when you get an from someone claiming to be an agency that you have an account in.  They.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Done by… Hanoof Al-Khaldi Information Assurance
Newer Technologies Fraud
A Project on CYBER SECURITY
When you get caught for Identity Theft
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Protecting Yourself from Fraud including Identity Theft
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Protecting Your Identity
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?

Identity Theft and Fraud Identity Theft: A crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain. Examples: ◦ Phishing ◦ Skimming ◦ Credit Card theft

Fraud: Deliberate deception usually for economic gain. Examples of Fraud: Ponzi Schemes Pyramid Schemes On line scams

Types of Fraud and Identity Theft A: Phishing: attempt to acquire identity of someone by asking for sensitive information i.e. username, password, credit card number. Phishing will direct the user to visit a website where they are asked to update personal information, such as a password, credit card, social security number. ** A legitimate business will always ask for the information on a secure website or in person.

B: Pyramid Scheme A form of investment (illegal in the US and elsewhere) in which each paying participant recruits two further participants, with returns being given to early participants using money contributed by later ones. Usually involve Get rich quick types of advertising. People at the top make money by getting people at the bottom to join or pay for products.

The main characteristic of a pyramid scheme is that participants only make money by recruiting more members. Product based: a product is sold Naked scheme: a no fail investment opportunity is sold.

C: Credit and Debit Card Theft Identity theft: the unauthorized use of personal identification information to commit credit fraud or other crimesIdentity theft Identity assumption: long-term victimization of identification information Fraud spree: unauthorized charges on existing accounts. Hackers can steal account information from personal computers or company computers.

Credit card fraud schemes generally fall into one of two categories of fraud: application fraud and account takeover. Application fraud refers to the unauthorized opening of credit card accounts in another person's name. This may occur if an offender can obtain enough personal information about the victim to completely fill out the credit card application. Account takeovers typically involve the criminal hijacking of an existing credit card account. Here an offender obtains enough personal information about a victim to change the account's billing address. The perpetrator then subsequently reports the card lost or stolen in order to obtain a new card and make fraudulent purchases with it.

There are many ways that credit thieves can steal your information - Using lost or stolen credit cards - Stealing from your mailbox - Looking over your shoulder during transactions - Going through your trash - Sending unsolicited - Making false telephone solicitations - Looking at personnel records -Taking your number down or rubbing the number on paper

D: Ponzi Scheme A Ponzi scheme is a scam investment designed to separate investors from their money. It is named after Charles Ponzi, who constructed one such scheme at the beginning of the 20th century, though the concept was well known prior to Ponzi. The investment always has extraordinary return potential. The scheme is designed to convince the public to place their money into a fraudulent investment. Once the scam artist feels that enough money has been collected, he disappears - taking all the money with him.

How do they work? Convince a few people to invest. After the specified time return the investment money to the investors plus the specified interest rate or return. Pointing to the historical success of the investment, convince more investors to place their money into the system. Typically the vast majority of the earlier investors will return. Why would they not? The system has been providing them with great benefits. Repeat steps 1 through 3 a number of times. During step 2 at one of the cycles, break the pattern. Instead of returning the investment money and paying the promised return, escape with the money and start a new life. Bernie Madoff former NASDAQ Chairman notorious Ponzi Scheme fraudster. Arrested in Stole over 64 billion-largest in history.

E: On line Fraud On line fraud can happen in multiple ways. Some examples Work at Home Ads: These are usually too good to be true ads that tell people they can make lots of money working from home. The scam artist sets up a legitimate looking website. The person is asked to handle donations for a natural disaster. The worker’s bank account is used to handle the funds and when a large sum of money is deposited the scammer drains the account. “Be part of one of America’s Fastest Growing Industries. Be the Boss! Earn thousands of dollars a month from home”

Internet fraud can occur in chat rooms, , message boards, or on websites. message boardsmessage boards Malware is short for “malicious software." It includes viruses and spyware that get installed on your computer, phone, or mobile device without your consent. These programs can cause your device to crash and can be used to monitor and control your online activity. Criminals use malware to steal personal information, send spam, and commit fraud.

F: Identity Theft Identity Theft occurs when someone steals a person’s Social Security card, or gains enough personal information on the person to gain access to financial information what-identity-theft what-identity-theft

G: Skimming Card skimming' is the illegal copying of information from the magnetic strip of a credit or ATM card. It is a more direct version of a phishing scam. Skimming takes place when scammers place skimming machines at ATM’s that take the customers card number and then use it. Watch for unusual devices on the ATM swipe. machine