Crime Prevention Part II IDENITY THEFT ©TCLEOSE Course #2102 Crime Prevention Curriculum Part II is the intellectual property of CSCS-ICJS (2009) Institute.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

National Crime Prevention Council 2005 Identity Theft and Strategies for Crime Prevention.
1 If You Are Me, Then Who Am I? Tips on Identity Theft Prevention California Office of Privacy Protection.
Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Preventing Identity Theft Beware the Trails You Leave Behind Use limitations: These materials may be used only for nonprofit, noncommercial educational.
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
Identity Theft and Strategies for Crime Prevention National Crime Prevention Council 2006.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Identity Theft INDEPENDENT LIVING: MANAGING YOUR MONEY.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
C REDIT H ISTORY A ND R ATINGS 1 Copyright © Texas Education Agency, All rights reserved.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
Crime Prevention IDENTITY THEFT ©This TCLEOSE approved Crime Prevention Curriculum is the property of CSCS-ICJS CRIME PREVENTION II Institute for Criminal.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity theft: Real or Virtual? By: Alex Metzler.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
Be Cautious of Identity Theft By: Sydney Langley.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft Tiffany Setzer & Cassie Conkwright.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Beware! Identity Theft. Imagine getting a letter from the Internal Revenue Service (IRS) demanding that you pay $5,700 in back taxes. That’s what happened.
Protecting Your Assets By Preventing Identity Theft
Identity Theft It’s a crime!
IDENTITY Theft Financial Literacy Identity Theft.
When you get caught for Identity Theft
Protecting Your Identity:
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Protecting Yourself from Fraud including Identity Theft
Protecting Your Identity
Protecting Yourself from Fraud including Identity Theft
Protecting Your Credit Identity
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Crime Prevention Part II IDENITY THEFT ©TCLEOSE Course #2102 Crime Prevention Curriculum Part II is the intellectual property of CSCS-ICJS (2009) Institute for Criminal Justice Studies

Learning Objectives Learning Objective: The student will be able to define identity theft Learning Objective: The student will be able to discuss and explain why you should worry about identity theft Learning Objective: The student will be able to explain how identity theft occurs Learning Objective: The student will be able to explain how identity theft has emerged Learning Objective: The student will be able to explain what is being done about identity theft Learning Objective: The student will be able to explain ways to protect yourself against identity theft

What Is Identity Theft? One person, using information gathered from some source, takes on the identity of another person without permission and conducts a variety of activities using that identity. The intent is to use that identity for personal gain, generally with the intent to defraud others.

What Is NOT Identity Theft? Someone using your credit card with your knowledge and consent to make a purchase Properly exercising a legally granted power of attorney on your behalf Making up a fake name and signing into a hotel - this may be a crime, but it’s not identity theft

Why Worry About Identity Theft? One in 33 households discovered at least one type of ID theft during the previous 12 months. Source: “First Estimates from the National Crime Victimization Survey, Identity Theft, 2006 Bureau of Justice Statistics Bulletin

Why Worry About Identity Theft? (Cont’d) Households headed by persons age and those with the highest incomes were the most likely victims. One in five victimized households spent about one month resolving problems resulting from ID theft.

Why Worry About Identity Theft? (Cont’d) U.S. adult victims of identity fraud in 2005 = 9.3 million. In 2005, total one-year fraud amount = $54.4 billion. (Source: Javelin Strategy and Research 2006 Identity Fraud Survey Report

Four Key Points 1.People are not helpless in protecting themselves from ID theft. 2.Consumers do not bear the brunt of the loss. 3.Internet use does not increase risk of ID fraud. 4.Seniors are not the most frequent targets of identity thieves.

Why Worry About Identity Theft? (cont.) Deterrence and apprehension are not yet effective. Prevention is the best defense. There are jurisdictional problems concerning where the crime occurs.

Why Worry About Identity Theft? (cont.) It is an attractive crime to criminals because of its low risk and high return.

How Identity Theft Works STEP 1—Getting the Identity The thief or thieves look for information in any number of ways Discarded documents in the trash Receipts from purchases Lost or stolen wallets or purses

How Identity Theft Works STEP 1—Getting the Identity The thief or thieves look for information in any number of ways Online “phishing” for personal data Stolen mail from mailboxes Thieves are thinking of new, inventive ways every day.

How Identity Theft Works STEP 1—Getting the Identity (cont.) Some thieves go “wholesale” by getting lists of information on individuals through computer hacking, theft, or bribery.

How Identity Theft Works STEP 1—Getting the Identity (cont.) The information may be resold to other crooks or used numerous times by the original thief or thieves. Profits may be used to support additional criminal activities such as drug use and terrorism.

How Identity Theft Works STEP 2—Exploiting the Identity With the information that becomes available, the thief may have false IDs made A state driver’s license with the thief’s picture and the victim’s name Non-driver’s state license

How Identity Theft Works STEP 2—Exploiting the Identity Continued: With the information that becomes available, the thief may have false IDs made – Continued: Social Security card Employer ID Credit cards

How Identity Theft Works (cont.) STEP 2—Exploiting the Identity (cont.) The thief may simply begin leveraging one piece of information to obtain or establish other information or assets.

How Identity Theft Works (cont.) STEP 2—Exploiting the Identity (cont.) These may include New credit card accounts State or local licenses Accounts with utility companies, apartment leases, or even home mortgages.

How Identity Theft Works STEP 3—Discovering the Theft Thief builds “persona” using the victim’s name, good credit, & good character references Thief never pays the bills Victim - bad name & ruined credit. Victim gets bill for a credit card - never owned & collection calls

How Identity Theft Works STEP 3 - Discovering the Theft (cont.) victim’s identityThe thief might abandon the victim’s identity because he/she has “spoiled” the name of the victim (criminal offense bankruptcy). When the crime or ruined credit is discovered, the victim is left to clean up the mess.

How Identity Theft Works STEP 4—Reporting and Restoring Victim reports the theft police & credit bureaus. Victim asks the credit bureaus to note the identity theft crime on his or her credit report.

How Identity Theft Works STEP 4—Reporting and Restoring The victim may need to consult with a local victim’s assistance agency or an attorney to obtain information on the necessary, specific steps in a given state.

How Identity Theft Works STEP 4—Reporting and Restoring STEP 4—Reporting and Restoring (cont.) The victim can also file an online report and affidavit with the Federal Trade Commission registry at Go to the identity theft section.

Frequently Asked Questions

Where and How Do They Get My Information ? Telephone calls asking you to “update records” Theft of incoming bills, which show your account number Theft of outgoing mail and bill payments.

Where and How Do They Get My Information? (cont.) Redirection of stolen mail, thief files a change of address on your credit card bills

Where and How Do They Get My Information? (cont.) Phishing “ Phishing ” in which the sender sends out an or pop-up message that looks like it came from a real bank or credit card company and asks for identifying information. Legitimate companies will never do this.

Where and How Do They Get My Information? (cont.) What is “phishing”? pop-up messages posing as your bank, credit card, or utility company The Internet is a new, convenient, and trusted way to do business, but it also has allowed criminals to create illegitimate s or pop-up messages posing as your bank, credit card, or utility company.

Where and How Do They Get My Information? (cont.) What is “phishing”? (cont.) phony reasonCreate a phony reason why you need to give them your personal information (e.g., bank routing number, Social Security number). ease of onlineUse the ease of online transactions to their advantage, hoping you will be fooled.

Where and How Do They Get My Information? (cont.) More places… Going through trash to recover bills Credit card receipts that you discard or toss out with a shopping bag

Where and How Do They Get My Information? (cont.) More places…..cont’d Noticing a bill you tossed in a public trash can Second impressions Second impressions of credit cards Casual use of Social Security numbers and other similar identifiers

How To Avoid a “Phishing” Scam Tips from the FTC Tips from the FTC : If you get an or pop-up message that asks for personal or financial information, do not reply or click on the link in the message. Legitimate companies don’t ask for this information via .

How To Avoid a “Phishing” Scam (cont.) Tips from the FTC: Tips from the FTC: If you are concerned about your account, contact the organization using its legitimate telephone number or open a new Internet browser and type in the company’s correct web address.

How To Avoid a “Phishing” Scam (cont.) More tips from the FTC: More tips from the FTC: Don’t personal or financial information. If you initiate a transaction and want to provide your personal or financial information through an organization’s website, look for indicators that the site is secure.

How To Avoid a “Phishing” Scam (cont.) More tips from the FTC More tips from the FTC : A “lock” icon on the browser’s status bar or a URL for a website that begins “ (the “s” stands for “secure”) indicates that you are on a secure site. and Unfortunately, no indicator is foolproof; some phishers have forged security icons.

How To Avoid a “Phishing” Scam (cont.) Use antivirus software & keep it up to date. Some phishing s contain software that can harm your computer or track your activities on the Internet without your knowledge. Antivirus software scans incoming communications for troublesome files. Antivirus software that recognizes current viruses as well as older ones can reverse damage & updates automatically.

How To Avoid a “Phishing” Scam (cont.) Firewall makes you invisible on the Internet Blocks all communications from unauthorized sources. Your operating system (e.g., Windows or Linux) may offer free software “patches” to close holes in the system that hackers or phishers could exploit.

Why is ID Theft on the Rise? Computers have made record keeping faster. Automation removes human analysis, easier for someone to steal an identity or pose as another More and more transactions are being handled electronically More computer hackers now go for monetary returns, not for the thrill of conquering another computer.

Why is ID Theft on the Rise? (cont.) Mobility Mobility means we shop in more stores all over our communities, regions, or the country, so we are more anonymous than ever. native Many of us are native don’t believe that ID theft could happen to us, even though millions are victims each year.

What Can We Do About It? education Consumer education helps reduce risk of becoming a victim. new technologies Education is an ongoing process as new technologies & new criminal techniques emerge. prevention Information about prevention and ways to stop ID theft spread quickly as well.

What Can We Do About It? (cont.) security on electronic payment New methods developed to tighten security on electronic payment systems and to detect “out of the ordinary” purchase patterns. Credit card payment systems Credit card payment systems now signal only the last four digits of your card number

What Can We Do About It? (cont.) shredders New shredders are coming into the market, making thorough document destruction easier at home.

Who Is Vulnerable? People who Keep their money in bank accounts Use credit or debit cards Generate trash with unshredded paper in it

Who Is Vulnerable? People who – Continued: Casually toss credit card or other receipts into public receptacles Get personal bills by mail or electronically Don’t check their credit card reports and bank statements

Who Is Vulnerable? People who – Continued: Don’t regularly check their credit bureau reports Have accessible mail boxes Pretty much everyone on the planet old enough to have money and/or a credit card!

Prevention Check your bank, credit card, and similar statements monthly. Make sure you receive them and make sure the charges are yours. Immediately call your bank or credit card companies if you don’t receive your bill.

Prevention (cont.) Consider registering with the Direct Marketing Association to stop unsolicited credit offers. NEVER NEVER provide account information over the Internet or the telephone

Prevention (cont.) Rip up receipts if you will not need them for warranties or returns. Shred any unwanted credit, loan, or credit card offers – or at least cut them up with scissors – before putting them in the trash.

Prevention (cont.) Do not Do not authorize others to use your credit cards. They may not take the same care that you do. Deposit mail in a U.S. Postal Service mailbox. Make sure your mailbox is secure.

Prevention (cont.) Do not give out your real name or other personal information in Internet chat rooms. Use a screen name.

Review: Coping With Identity Theft File a police report immediately. Notify the three major credit bureaus Notify the three major credit bureaus and each of your credit or debit card issuers of the identity theft and ask that appropriate alerts and closures be filed.

Review: Coping With Identity Theft Federal Trade Commission’s File a report with the Federal Trade Commission’s Complaint Center and obtain an ID Theft Affidavit, which is available online atwww.ftc.gov

Review: Coping With Identity Theft Check credit reports, immediately report any incorrect activity, and ensure that a fraud alert is active on your account. Carry copies of all documents filed with you

Review: Coping With Identity Theft Check court records in your general area for bankruptcies and for mortgage liens using your name. Automated records makes the job easier.

Review: Coping With Identity Theft Review their habits about handling personal information. Take prevention strategies to heart – and encourage others to do so.

Review: Coping With Identity Theft Speak out about the need for preventive action and laws that protect identity theft victims. QUESTIONS

DEFINE & PROCESS Define identity theft Discuss why you should worry about it Examine how identity theft occurs Look at how identity theft has emerged Discuss what is being done about identity theft Look at ways to protect yourself

FINAL TEST REVIEW We will do your final test review and then you will be done for the day!

Online Resources Federal Trade Commission: Department of Justice: Better Business Bureau: United States Postal Service: National Criminal Justice Reference Service:

Online Resources Many nonprofit organizations are committed to promoting prevention and recovery from identify theft. Here are a few:

National Crime Prevention Council 1000 Connecticut Avenue, NW Thirteenth Floor Washington, DC

Contact Information 350 N. Guadalupe, Suite 140, PMB 164 San Marcos, Texas Institute for Criminal Justice Studies ©TCLEOSE Course #2101 Crime Prevention Curriculum Part I is the intellectual property of CSCS-ICJS (2009)