Computer Vulnerabilities & Criminal Activity Identity Theft & Credit Card Fraud 6.1 March 1, 2010 Identity Theft & Credit Card Fraud 6.1 March 1, 2010.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
OVER VIEW OF BANKING FRAUDS
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
ICT at Work Banking and Finance.
Identity Theft Presented by Christina Williams and Lazaro Juarez Orange County’s Credit Union.
Module 5: financial services review
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
Computer Vulnerabilities & Criminal Activity Identity Theft & Credit Card Fraud 7.2 October 24, 2011.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
What is identity theft, and how can you protect yourself from it?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Identity Theft By: Caroline Branton, Laura Hunter, Sinead McFarlane.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Debit Card Plastic card that looks like a credit card
Security, Privacy, and Ethics Online Computer Crimes.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
17-2 Financial Services and Electronic Banking. Types of financial services Savings services Financial institutions accept money for safekeeping. A broad.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
Electronic Payment Systems
MKTG 476 SECURITY Lars Perner, Instructor 1 Internet Security  Servers  Hacking  Publicly available information  Information storage  Intrusion methods.
Scholarship Scams Avoiding Scholarship Scams, Phishing & Identity Theft at All Cost.
 More than ___% of teens have a savings account.  ___% of teens age have a checking account. ___% of those ages have one.  Likewise, ___%
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Cyber Crimes.
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
Scams & Schemes Common Sense Media.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Unethical use of Computers and Networks
Identity Theft Philippa Lawson Canadian Internet Policy and Public Interest Clinic University of Ottawa
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Identity Theft.
Business Administration term project 2 (25%) financial Management Systems Debit card and credit card payments By Ashleigh Gray.
You. are at risk for the fastest growing crimes crime.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
The Dangers and Consequences of Identity Theft By: Deandre Bennett.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Checking & Savings Accounts Economics What is a Checking Account?  Common financial service used by many consumers (a place to keep money)  Funds.
Computer Crime Second Part of Chapter 7 A gift of Fire – Sara Baase.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
IDENTITY THEFT Nicholas Michalak. Agenda What is Identity Theft? Background of Identity Theft Legislation Against it Different types and Examples What.
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
 Did YOU Know?!?  Tennessee is bordered by 8 states: Alabama, Arkansas, Georgia, Kentucky, Mississippi, Missouri, North Carolina and Virginia - more.
Identity Theft Officer Bill Roscop Mount Prospect Police Department.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Identity Theft It’s a crime!
Done by… Hanoof Al-Khaldi Information Assurance
Protecting Your Identity:
Depository Institution Essentials
Depository Institution Essentials
Depository Institution Essentials
Presentation transcript:

Computer Vulnerabilities & Criminal Activity Identity Theft & Credit Card Fraud 6.1 March 1, 2010 Identity Theft & Credit Card Fraud 6.1 March 1, 2010

Definition of Identity Theft A person commits the crime of identity theft if, without the authorization, consent, or permission of the victim, and with the intent to defraud for his or her own benefit or the benefit of a third person, he or she does any of the following: 1. Obtains, records, or accesses identifying information that would assist in accessing financial resources, obtaining identification documents, or obtaining benefits of the victim. 2. Obtains goods or services through the use of identifying information of the victim. 3. Obtains identification documents in the victim's name. A person commits the crime of identity theft if, without the authorization, consent, or permission of the victim, and with the intent to defraud for his or her own benefit or the benefit of a third person, he or she does any of the following: 1. Obtains, records, or accesses identifying information that would assist in accessing financial resources, obtaining identification documents, or obtaining benefits of the victim. 2. Obtains goods or services through the use of identifying information of the victim. 3. Obtains identification documents in the victim's name. US Legal Definitions

Identity Theft and Assumption Deterrence Act 18 U.S.C § 1028 Makes it a federal crime to: “knowingly transfers or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law” Makes it a federal crime to: “knowingly transfers or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law”

Connecticut Criminal Law - Identity Theft odes/title53a/sec53a-129a.html odes/title53a/sec53a-129a.html

Protected Information  Name  Date of birth  Social Security number  Driver's license number  Financial services account numbers, including checking and savings accounts  Credit or debit card numbers  Name  Date of birth  Social Security number  Driver's license number  Financial services account numbers, including checking and savings accounts  Credit or debit card numbers  Personal identification numbers (PIN)  Electronic identification codes  Automated or electronic signatures  Biometric data  Fingerprints  Passwords  Parent's legal surname prior to marriage  Personal identification numbers (PIN)  Electronic identification codes  Automated or electronic signatures  Biometric data  Fingerprints  Passwords  Parent's legal surname prior to marriage

States with Mandatory ID Theft Investigation  California  Louisiana  Minnesota  California  Louisiana  Minnesota

Motivation for Identity Theft Financial Desires Greed Strain Theory Financial Desires Greed Strain Theory

Individuals Committing Identity Theft  Individuals  May have some relationship to the victim  Often have no prior criminal record  Illegal Immigrants  Methamphetamine Users  Career Criminals  Gangs  Hells Angels  MS-13  Foreign Organized Crime Groups  Asia  Eastern Europe  Individuals  May have some relationship to the victim  Often have no prior criminal record  Illegal Immigrants  Methamphetamine Users  Career Criminals  Gangs  Hells Angels  MS-13  Foreign Organized Crime Groups  Asia  Eastern Europe

Victims of Identity Theft  Higher education / higher income  Age  Married  Basically, individuals most likely to have a good credit rating / credit history  Higher education / higher income  Age  Married  Basically, individuals most likely to have a good credit rating / credit history

Methods of Obtaining Identity Information  Dumpster Diving  Skimming  Phishing  Change of Address  Theft of Personal Property  Pretexting / Social Engineering  Dumpster Diving  Skimming  Phishing  Change of Address  Theft of Personal Property  Pretexting / Social Engineering

How the Internet is used for ID Theft  Hackers  Interception of transmissions - retailer to credit card processor  Firewall penetration - data search  Access to underlying applications  Social Engineering / Phishing / Pretexting  Malware / Spyware / Keystroke Loggers  Hackers  Interception of transmissions - retailer to credit card processor  Firewall penetration - data search  Access to underlying applications  Social Engineering / Phishing / Pretexting  Malware / Spyware / Keystroke Loggers

Crimes Following Identity Theft  Credit Card Fraud  Phone/Utility Fraud  Bank/Finance Fraud  Government Document Fraud  Employment Fraud  Medical Fraud  Misrepresentation during arrest  Credit Card Fraud  Phone/Utility Fraud  Bank/Finance Fraud  Government Document Fraud  Employment Fraud  Medical Fraud  Misrepresentation during arrest

Problem with Identity Theft Investigation  Lapse of time between crime and the time the crime is reported  Monetary amount  Jurisdiction  Anonymity  Lapse of time between crime and the time the crime is reported  Monetary amount  Jurisdiction  Anonymity

Identity Theft Investigation  /law-enforcement/investigations.html /law-enforcement/investigations.html  Identity Theft Data Clearing House  Identity Theft Transaction Records  Subpoena or victim’s permission  Request for documents  Must be in writing  Authorized by the victim  Be sent address specified by the business  Allow the business 30 days to respond  /law-enforcement/investigations.html /law-enforcement/investigations.html  Identity Theft Data Clearing House  Identity Theft Transaction Records  Subpoena or victim’s permission  Request for documents  Must be in writing  Authorized by the victim  Be sent address specified by the business  Allow the business 30 days to respond

Credit Card Fraud “Wide-ranging term for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction.” Wikipedia

“Carding” “The unauthorized use of credit and debit card account information to fraudulently purchase goods and services.” “The unauthorized use of credit and debit card account information to fraudulently purchase goods and services.” DATA BREACHES:WHAT THE UNDERGROUND WORLD OF “CARDING” REVEALS - US DOJ

Carding Terminology  Dumps - information electronically copied from the magnetic stripe on the back of credit and debit cards.  Track 1 is alpha-numeric and contains the customer’s name and account number  Track 2 is numeric and contains the account number, expiration date, the secure code (known as the CVV),and discretionary institution data.  PIN - Personal Information Number  BIN - Bank Information Number  Dumps - information electronically copied from the magnetic stripe on the back of credit and debit cards.  Track 1 is alpha-numeric and contains the customer’s name and account number  Track 2 is numeric and contains the account number, expiration date, the secure code (known as the CVV),and discretionary institution data.  PIN - Personal Information Number  BIN - Bank Information Number

Carding Terminology cont.  Full Info” or “Fulls” - a package of data about a victim, including for example address, phone number, social security number, credit or debit account numbers and PINs, credit history report, mother’s maiden name, and other personal identifying information

How Credit Card Information Obtained Online  In bulk from hackers who have compromised large databases  s.htm s.htm  Phishing  Malware  In bulk from hackers who have compromised large databases  s.htm s.htm  Phishing  Malware

Types of Carding  Carding Online  Using stolen credit cards to purchase goods & services online  Carding to a drop - having goods sent to another physical address  Cobs - changing billing address with credit card company  Carding Online  Using stolen credit cards to purchase goods & services online  Carding to a drop - having goods sent to another physical address  Cobs - changing billing address with credit card company

Types of Carding cont.  In-Store Carding  Presenting a counterfeit credit card that had been encoded with stolen account information to a cashier at a physical retail store location  More risky  Higher level of sophistication  In-Store Carding  Presenting a counterfeit credit card that had been encoded with stolen account information to a cashier at a physical retail store location  More risky  Higher level of sophistication

Types of Carding cont.  Cashing  The act of obtaining money, rather than retail goods and services, with the unauthorized use of stolen financial information  Pin Cashing - Using dump information to encode a strip on a card to use at ATMs  Cashing  The act of obtaining money, rather than retail goods and services, with the unauthorized use of stolen financial information  Pin Cashing - Using dump information to encode a strip on a card to use at ATMs

Types of Carding cont.  Gift Card Vending  Purchasing gift cards from retail merchants at their physical stores using counterfeit credit cards and reselling such cards for a percentage of their actual value  Sales maybe online or face-to-face  Gift Card Vending  Purchasing gift cards from retail merchants at their physical stores using counterfeit credit cards and reselling such cards for a percentage of their actual value  Sales maybe online or face-to-face

Carding Forums Online  Tutorials on different types of carding-related activities  Private and public message posting enabling members to buy and sell blocks of stolen account information and other goods and services  Hyperlinks for hacking tools and downloadable computer code to assist in network intrusions;  Other exploits such as source code for phishing webpages  Lists of proxies  Areas designated for naming and banning individuals who steal from other members  Tutorials on different types of carding-related activities  Private and public message posting enabling members to buy and sell blocks of stolen account information and other goods and services  Hyperlinks for hacking tools and downloadable computer code to assist in network intrusions;  Other exploits such as source code for phishing webpages  Lists of proxies  Areas designated for naming and banning individuals who steal from other members

Carding Websites (all disabled)          

Sample Carding Web Sites