Identity theft By: Blake D uncan.

Slides:



Advertisements
Similar presentations
FRAUD PREVENTION TRAINING FRAUD PREVENTION TRAINING.
Advertisements

Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
D ETER D ETECT D EFEND CiTiZEN. When Someone Uses Your Personally Identifying Information, Like Your Name, Social Security Number, Or Credit Card Number,
What is Identity Theft, and how can you protect yourself from it?
1 If You Are Me, Then Who Am I? Tips on Identity Theft Prevention California Office of Privacy Protection.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Protecting Your Identity: What to Know, What to Do.
The Dangers of Identity Theft By: Hannah Wolin 7 th Grade Marshall Middle School Anderson.
Identity Theft By: Nakeisha Barnett Thursday 2-3:15 3/4/06.
 Using someone else’s personal identifying information  Usually for a financial benefit  Can ruin your credit rating.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
MONEY MANAGEMENT II Billing Errors/Disputes & Identity Theft.
WHAT IS IT? Also called Identity Fraud, Identity Theft is when an individual uses another persons identifying information, such as name, social security.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 ©2014 NEFE High School Financial Planning Program® | Lesson 2-5: Identity.
Unethical use of Computers and Networks
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
IDENTITY THEFT OCCURS WHEN A CRIMINAL USES ANOTHER PERSON'S PERSONAL INFORMATION TO TAKE ON THAT PERSON'S IDENTITY. IDENTITY THEFT IS MUCH MORE THAN MISUSE.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Identity Theft.
Identity Fraud By: Owen DeBalko. Explanation Identity fraud means the fraudulent use of an individual's identifying information to commit crimes, unlawfully.
FOUR TYPES OF IDENTITY THEFT. 1. FINANCIAL IDENTITY THEFT  Just using your stolen credit card details to buy things is the example we all know about.
Keep It Safe. Homework (Passport page 42) How’s It Going?
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
By: Taylor Budwash.. o Identity Theft is the unorganized gain and use of a true person’s identity and personal information for unlawful purpose.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
WHO’s IN YOUR “WALLET” WHO’s IN YOUR “WALLET” YOU BETER “RECOGNIZE” YOU BETER “RECOGNIZE” STEPPING $2o0 $300 $400 $500 $400 $300 $200 $500 $400 $300.
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
Jeff loses his identity! Lesson 8: Identity Theft.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Identity Theft How it happens and how to avoid it.
You. are at risk for the fastest growing crimes crime.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft One of America's fastest growing crimes.
The Dangers and Consequences of Identity Theft By: Deandre Bennett.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft Project By: Timmy Townsend And Eric Fields.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
IDENTITY THEFT. WHAT IS IDENTITY THEFT? Identity theft refers to stealing someone else’s personal information in order to obtain credit or other benefits.
1 Identity Theft Prevention and the Red Flag Rules.
 Did YOU Know?!?  Tennessee is bordered by 8 states: Alabama, Arkansas, Georgia, Kentucky, Mississippi, Missouri, North Carolina and Virginia - more.
Identity Theft By: Andrew Hicks. Contents What is Identity theft? History Types of Identity Theft Are you safe? (The most common ways Identity theft is.
Jeff loses his identity! Lesson 5: Identity Theft.
Analyzing Credit and Debt  When you use credit responsibly it can be very convenient because you can use it to buy things now and pay for them later by.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Protecting Your Assets By Preventing Identity Theft
Identity Theft Chelsea Weser.
Mrs. Esman Computer Special
When you get caught for Identity Theft
Five Unethical Uses of Computers
By: Johnathan Rowse, Jacob Palmer, Kayla Morgan, Paige Frasier
Advantages and Disadvantages of Credit
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Jeff loses his identity!
Identity Theft By Omer Ersen.
Presentation transcript:

Identity theft By: Blake D uncan

What is identity theft ? the fraudulent acquisition and use of a person's private identifying information, usually for financial gain. Identity theft occurs when someone uses another's personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.

History of Identity Theft ? The term identity theft was coined in 1964;[3] however, it is not literally possible to steal an identity — less ambiguous terms are identity fraud or impersonation — terms which tend less toward emplacement of onus upon the impersonated person and which tend more toward emplacement properly of the onus upon the victim and the perpetrator of fraud.

Types of Identity Theft. Criminal identity theft (posing as another person when apprehended for a crime) Financial identity theft (using another's identity to obtain credit, goods and services) Identity cloning (using another's information to assume his or her identity in daily life) Medical identity theft (using another's identity to obtain medical care or drugs) Child identity theft.

Identity cloning and concealment In this situation, the identity thief impersonates someone else in order to conceal their own true identity. Examples might be illegal immigrants, people hiding from creditors or other individuals, or those who simply want to become "anonymous" for personal reasons. Another example are posers, a label given to people who use somebody else’s photos and information through social networking sites. Mostly, posers create believable stories involving friends of the real person they are imitating. Unlike identity theft used to obtain credit which usually comes to light when the debts mount, concealment may continue indefinitely without being detected, particularly if the identity thief is able to obtain false credentials in order to pass various authentication tests in everyday life.

Criminal identity theft. When a criminal fraudulently identifies himself to police as another individual at the point of arrest, it is sometimes referred to as "Criminal Identity Theft." In some cases criminals have previously obtained state-issued identity documents using credentials stolen from others, or have simply presented fake ID. Provided the subterfuge works, charges may be placed under the victim's name, letting the criminal off the hook. It can be difficult for the victim of a criminal identity theft to clear their record. The steps required to clear the victim's incorrect criminal record depend in which jurisdiction the crime occurred and whether the true identity of the criminal can be determined.

Synthetic identity theft. A variation of identity theft which has recently become more common is synthetic identity theft, in which identities are completely or partially fabricated. The most common technique involves combining a real social security number with a name and birthdate other than the ones associated with the number. Synthetic identity theft is more difficult to track as it doesn't show on either person's credit report directly, but may appear as an entirely new file in the credit bureau or as a subfile on one of the victim's credit reports.

Medical identity theft. In addition to risks of financial harm common to all forms of identity theft, the thief's medical history may be added to the victim's medical records. Inaccurate information in the victim's records is difficult to correct and may affect future insurability or cause doctors relying on the misinformation to deliver inappropriate medical care.

Child identity theft. Child identity theft occurs when a minor’s identity is used by another person for the impostor’s personal gain. The impostor can be a family member, a friend, or even a stranger who targets children. The Social Security numbers of children are valued because they do not have any information associated with them. Thieves can establish lines of credit, obtain driver’s licenses, or even buy a house using a child’s identity.

Financial identity theft. The most common type is financial identity theft, where someone wants to gain economical benefits in someone else's name. This includes getting credits, loans, goods and services, claiming to be someone else.

Thank You. This is the end of my presentation. Here Is a video about identity theft. http://www.consumer.ftc.gov/media/video-0023-what-identity-theft