Download presentation
Presentation is loading. Please wait.
Published byMyrtle Lynch Modified over 8 years ago
1
Identity Theft By: Andrew Hicks
2
Contents What is Identity theft? History Types of Identity Theft Are you safe? (The most common ways Identity theft is committed) Protection From Theft Conclusion
3
What Is Identity Theft? Identity theft- is a term used to refer to fraud that involves pretending to be someone else in order to steal money, gain access, or get other benefits.
4
History Long before the internet was around, identity thieves could steal your identity through "dumpster diving," (going through your trash to find personally identifying information on papers you had thrown out like bills and other documents.) They could also use “phone scams” to find out your personal information. For example, an identity thief could phone someone and tell that person that she had won a prize and he (the thief) just needed some personal information like her birth date or social security number to verify her identity. The thief could then use this information in whatever way he chose. Now, with the growth of the internet and other technology, identity theft has become more common, easier to perform, and safer to perform without getting caught.
5
Types Of Identity Theft According to the non-profit Identity Theft Resource Center, identity theft is sub-divided into four categories: Financial identity theft -using another's identity to obtain goods and services. Criminal identity theft -posing as another when apprehended for a crime. Identity cloning (using another's information to assume his or her identity in daily life. Business/commercial identity theft -using another's business name to obtain credit.
6
Financial Identity Theft Occurs when a criminal obtains a loan from a financial institution by impersonating someone else. The criminal pretends to be the victim by presenting an accurate name, address, birth date, or other information that the lender requires as a means of establishing identity. Even if this information is checked against the data at a national consumer reporting agency, the lender will encounter no concerns, as all of the victim's information matches the records. The lender has no easy way to discover that the person is pretending to be the victim, especially if an original, government-issued id can't be verified (as is the case in online, mail, telephone, and fax-based transactions). This kind of crime is considered non-self-revealing, although authorities may be able to track down the criminal if the funds for the loan were mailed to them. The criminal keeps the money from the loan, the financial institution is never repaid, and the victim is wrongly blamed for defaulting on a loan he/she never authorized.
7
Criminal Identity Theft When a criminal identifies himself to police as another individual it is sometimes referred to as "Criminal Identity Theft." In some cases the criminal will obtain a state issued ID using stolen documents or personal information belonging to another person, or they might simply use a fake ID. When the criminal is arrested for a crime, they present the ID to authorities, who place charges under the identity theft victim's name and release the criminal. When the criminal fails to appear for his court hearing, a warrant would be issued under the assumed name. The victim might learn of the incident if the state suspends their own drivers license, or through a background check performed for employment or other purposes, or in rare cases could be arrested when stopped for a minor traffic violation.
8
Identity Cloning A criminal acquires personal identifiers, and then impersonates someone for the purpose of concealment from authorities. This may be done by a person who wants to avoid arrest for crimes, by a person who is working illegally in a foreign country, or by a person who is hiding from creditors or other individuals. Unlike credit-dependent financial crimes, concealment can continue for an indeterminate amount of time without ever being detected. Additionally, the criminal might attempt to obtained fraudulent documents or IDs consistent with the cloned identity to make the impersonation even more convincing and concealed.
9
Business/Commercial Identity Theft A business, school or organization is victimized by a thief or exposed to brand and financial risk because of a careless employee or false representation.
10
Many people do not realize how easily criminals can obtain our personal data without having to break into our homes. In public places, for example, criminals may engage in "shoulder surfing" watching you from a nearby location as you punch in your telephone calling card number or credit card number or listen in on your conversation if you give your credit-card number over the telephone to a hotel or rental car company. Even the area near your home or office may not be secure. Some criminals engage in "dumpster diving" going through your garbage cans or a communal dumpster or trash bin -- to obtain copies of your checks, credit card or bank statements, or other records that typically bear your name, address, and even your telephone number. These types of records make it easier for criminals to get control over accounts in your name and assume your identity. Are You Safe? (The most common ways Identity theft is committed)
11
Are You Safe? Cont. If you receive applications for "preapproved" credit cards in the mail, but discard them without tearing up the enclosed materials, criminals may retrieve them and try to activate the cards for their use without your knowledge. (Some credit card companies, when sending credit cards, have adopted security measures that allow a card recipient to activate the card only from his or her home telephone number but this is not yet a universal practice.) Also, if your mail is delivered to a place where others have ready access to it, criminals may simply intercept and redirect your mail to another location. In recent years, the Internet has become an appealing place for criminals to obtain identifying data, such as passwords or even banking information. In their haste to explore the exciting features of the Internet, many people respond to "spam" unsolicited E-mail that promises them some benefit but requests identifying data, without realizing that in many cases, the requester has no intention of keeping his promise. In some cases, criminals reportedly have used computer technology to obtain large amounts of personal data. With enough identifying information about an individual, a criminal can take over that individual's identity to conduct a wide range of crimes: for example, false applications for loans and credit cards, fraudulent withdrawals from bank accounts, fraudulent use of telephone calling cards, or obtaining other goods or privileges which the criminal might be denied if he were to use his real name. If the criminal takes steps to ensure that bills for the falsely obtained credit cards, or bank statements showing the unauthorized withdrawals, are sent to an address other than the victim's, the victim may not become aware of what is happing until the criminal has already inflicted substantial damage on the victim's assets, credit, and reputation.
12
What Is The Government Doing? In the fall of 1998, Congress passed the Identity Theft and Assumption Deterrence Act. This legislation created a new offense of identity theft, which prohibits knowingly transferring or using, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law. This offense, in most circumstances, carries a maximum term of 15 years' imprisonment, a fine, and criminal forfeiture of any personal property used or intended to be used to commit the offense.
13
Protection-Cont. If you think you've become a victim of identity theft or fraud, act immediately to minimize the damage to your personal funds and financial accounts, as well as your reputation: Contact the Federal Trade Commission (FTC) to report the situation, whether Online,Federal Trade Commission (FTC) Online By telephone toll-free at 1-877-ID THEFT (877-438-4338) or TDD at 202-326-2502, or By mail to Consumer Response Center, FTC, 600 Pennsylvania Avenue, N.W., Washington, DC 20580. You may also need to contact other agencies for other types of identity theft: Your local office of the Postal Inspection Service if you suspect that an identity thief has submitted a change-of-address form with the Post Office to redirect your mail, or has used the mail to commit frauds involving your identity;Postal Inspection Service The Social Security Administration if you suspect that your Social Security number is being fraudulently used (call 800-269-0271 to report the fraud);Social Security Administration The Internal Revenue Service if you suspect the improper use of identification information in connection with tax violations (call 1-800-829-0433 to report the violations).Internal Revenue Service
14
S.C.A.M. Protection Be Stingy about giving out your personal information to others unless you have a reason to trust them, regardless of where you are. Check your financial information regularly, and look for what should be there and what shouldn't. Ask periodically for a copy of your credit report. Maintain careful records of your banking and financial accounts.
15
Personal Examples and Questions
16
References http://www.usdoj.gov/criminal/fraud/website s/idtheft.html http://www.usdoj.gov/criminal/fraud/website s/idtheft.html http://en.wikipedia.org/wiki/Identity_theft http://www.ftc.gov/bcp/edu/microsites/idthef t/consumers/about-identity-theft.html http://www.ftc.gov/bcp/edu/microsites/idthef t/consumers/about-identity-theft.html http://www.identitytheftcreditfraud.com/iden titythefthistory.htm http://www.identitytheftcreditfraud.com/iden titythefthistory.htm http://en.wikipedia.org/wiki/Federal_Trade_C ommission http://en.wikipedia.org/wiki/Federal_Trade_C ommission
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.