Download presentation
Presentation is loading. Please wait.
1
IDENTITY THEFT BY: Victoria Jeffcoat CSCI 101 Lecture Tuesday 2pm
2
WHAT IS IDENTITY THEFT? Identity Theft occurs when a person uses another person’s personal information to take on that person’s identity for whatever reason. Identity Theft is much more than misuse of Social Security Numbers, it can also include credit card and mail fraud. In many parts of the world Identity Theft is the fastest growing offence. This crime can also be a means of “blackmailing”, especially if medical privacy or political privacy has been violated, and if revealing the activities undertaken by the thief under the name of the victim would have serious consequences like loss of job or marriage. =
3
Credit Card Theft: How it’s Done Scenario: You had dinner with some friends at O’Charleys. All your friends pay with cash, and you’re the only one who pays with a credit card. You receive your bill, sign the merchant copy and leave. BUT…..you forgot to get your copy of the receipt. OOPS!! Did you know….that many of the credit card receipts have your credit card number printed right there for anyone to see or use. Just as your number could be stolen and used, someone can easily copy your signature as well. This mistake can lead to most simplest form of identity theft. With the little bit of information you left, someone can easily be on their way to making purchases by telephone or the Internet using your credit card number. ALSO…..with a persons name, SS#, and date of birth someone can get loans, access the existing person’s bank account, open new bank accounts, lease or buy cars, get insurance and who knows what else.
4
The Impact of Identity Theft Since the first case of Identity Theft in the United States, government officials, secret services, and several other agencies have been trying to crack down hard on this frequent crime. According to a September 2003 survey conducted by the Federal Trade Commission(FTC), and estimated 10 million people in the US found out they were victims of identity theft. Agencies hope in the future to prevent identity theft most likely through technological advancements that incorporate some physical aspect of a person’s body in order to verify identity. Commonly known as biometrics, a type of authentification that uses individually unique physical attributes such as fingerprints, speech, hand and written signatures.
5
Examples of Identity Theft Financial Fraud: this type of identity theft includes bank fraud, credit card fraud, computer and telecommunications fraud, social program fraud, tax refund fraud, mail fraud, and several more. FACT: A total of 25 types of financial identity fraud were investigated by the United States Secret Services over the years. Financial identity theft is the most prevalent. However.. There other types of Identity theft usually involve a financial element as well. Criminal Activities: This type of identity fraud involves taking on someone else's identity in order to commit a crime, enter a country, get special permits, hide one’s own identity, or commit acts of terrorism. EX. Computer and Cyber Crimes Organized Crime Drug Trafficking Alien Smuggling Money Laundering
6
PHISING A method of identity theft carried out through the creation of a website that seems to represent a legitimate company. The visitors to the site, thinking they are buying something from a real business, submit their personal information to the site. The criminals then use the personal information for their own purposes, or sell the information to other criminal parties.
7
How to Protect Ourselves DON’T give out your Social Security Number unless it is absolutely necessary. DESTROY any unwanted credit card offers. Don’t put any other information besides your name and address on your checks, and keep a close watch on your checkbook both when writing checks and when it’s lying around. SHRED any sensitive documents before you throw them into the trash. DON’T carry your Social Security card, passport, or birth certificated in your wallet or purse. DON’T mail bills or documents that contain personal data for your personal mail box.
8
References www.ssa.org http://computer.howstuffworks.com/identity theft1.htm http://en.wikipedia.org/wiki/Phising
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.