22
Identity Theft Identity Theft Jourdan Hoapili Jourdan Hoapili Taylor Cullen Taylor Cullen Justin Enos Justin Enos

Identity Theft Jourdan Hoapili Taylor Cullen Justin Enos

  • View
    218

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Identity Theft Jourdan Hoapili Taylor Cullen Justin Enos

Identity TheftIdentity Theft

Jourdan HoapiliJourdan Hoapili

Taylor CullenTaylor Cullen

Justin EnosJustin Enos

Page 2: Identity Theft Jourdan Hoapili Taylor Cullen Justin Enos

The Risk of Credit CardsThe Risk of Credit Cards Definitions of Important TermsDefinitions of Important Terms Interest. Interest. Interest is the amountInterest is the amount you pay for using credit. This automatically makes theyou pay for using credit. This automatically makes the item more expensive than if you had just paid for it withitem more expensive than if you had just paid for it with cash.cash. Revolving Credit.Revolving Credit. Revolving credit is a type of credit that does not Revolving credit is a type of credit that does not

have a fixed number of payments and the customer pays a have a fixed number of payments and the customer pays a commitment fee. This can be a very bad type of credit.commitment fee. This can be a very bad type of credit.

Overspending. Overspending. People often use credit to live beyondPeople often use credit to live beyond their means—buying items they simply can’t afford. Astheir means—buying items they simply can’t afford. As time goes on and the amount they owe grows, it getstime goes on and the amount they owe grows, it gets harder and harder to pay down the balance.harder and harder to pay down the balance. Debt. Debt. The amounts you borrow add up to what is calledThe amounts you borrow add up to what is called your your debt, debt, or the entire amount of money you owe toor the entire amount of money you owe to lenders. These lenders have legal claims against yourlenders. These lenders have legal claims against your future income should you not be able to repay a debt.future income should you not be able to repay a debt. And if you take on too much debt, it can completelyAnd if you take on too much debt, it can completely derail your financial plan—and your future.derail your financial plan—and your future. Identity Theft.Identity Theft. Identity theft occurs when someoneIdentity theft occurs when someone uses your personal information without your permissionuses your personal information without your permission to commit fraud or other crimes. Each time you give outto commit fraud or other crimes. Each time you give out your credit card or Social Security number, you’re at riskyour credit card or Social Security number, you’re at risk for someone stealing that information to run up debts infor someone stealing that information to run up debts in your name.your name.

The first digit in your credit-card number signifies the system:

3 - travel/entertainment cards (such as American Express and Diners Club)

4 - Visa

5 - MasterCard

6 - Discover Card

Page 3: Identity Theft Jourdan Hoapili Taylor Cullen Justin Enos

Important TermImportant TermIdentity TheftIdentity Theft

Identity theft is when someone Identity theft is when someone uses your social security number, uses your social security number, your bank credit card number, your bank credit card number, your driver's license number or your driver's license number or any other form of identity any other form of identity without your knowledge or without your knowledge or permission. permission.

Page 4: Identity Theft Jourdan Hoapili Taylor Cullen Justin Enos

Your Identity Can Be Your Identity Can Be Compromised at the Check Compromised at the Check

Out StandOut Stand If you are a consumer, the chances If you are a consumer, the chances

of your credit card number being of your credit card number being intercepted as it travels intercepted as it travels over the over the InternetInternet is is very smallvery small. It is actually . It is actually at a at a higher riskhigher risk when you use it in a when you use it in a real life storereal life store, as the merchant not , as the merchant not only has all of your credit card only has all of your credit card details, but also a copy of your details, but also a copy of your signature. signature.

Page 5: Identity Theft Jourdan Hoapili Taylor Cullen Justin Enos

StatisticsStatistics The number of US adult victims of identity fraud The number of US adult victims of identity fraud

decreased from 10.1 million in 2003 and 9.3 decreased from 10.1 million in 2003 and 9.3 million in 2005 to 8.9 million in 2006. million in 2005 to 8.9 million in 2006.

Total one year fraud amount rose from $53.2 Total one year fraud amount rose from $53.2 billion in 2003 and $54.4 billion in 2005 to $56.6 billion in 2003 and $54.4 billion in 2005 to $56.6 billion in 2006. billion in 2006.

The mean fraud amount per fraud victim rose The mean fraud amount per fraud victim rose from $5,316 in 2003 and $5,993 in 2005 to from $5,316 in 2003 and $5,993 in 2005 to $6,278 in 2006. $6,278 in 2006.

The mean resolution time is at a high of 40 The mean resolution time is at a high of 40 hours per victim in 2006 compared to 28 hours hours per victim in 2006 compared to 28 hours in 2005 and 33 hours in 2003. in 2005 and 33 hours in 2003.

Page 6: Identity Theft Jourdan Hoapili Taylor Cullen Justin Enos

Advice - How to minimize Advice - How to minimize your risk of identity theftyour risk of identity theft

Never make one-sided Never make one-sided assumptions or take things for assumptions or take things for granted where your identity is granted where your identity is concerned. concerned.

Do not throw credit card Do not throw credit card statements, old credit cards or statements, old credit cards or bank statements, etc. in the bank statements, etc. in the trash. trash. Shred them.Shred them.

Sign the back of your card as Sign the back of your card as ""Check IDCheck ID". If a store clerk ". If a store clerk asks to see your card, he or asks to see your card, he or she will check the signature she will check the signature on the back and compare it on the back and compare it with some other form of ID with some other form of ID you have. you have.

Create good passwords to Create good passwords to minimize your chances of your minimize your chances of your identity being stolenidentity being stolen

Page 7: Identity Theft Jourdan Hoapili Taylor Cullen Justin Enos

Stolen wallets, What to do Stolen wallets, What to do if your credit card is stolen.if your credit card is stolen.

Make Make copies copies of all your credit cards, ID cards of all your credit cards, ID cards and licenses -- everything in your wallet. and licenses -- everything in your wallet.

The second thing to do is The second thing to do is call the companiescall the companies that issued your credit cards to that issued your credit cards to report the report the thefttheft. .

Next, call the three national credit-reporting Next, call the three national credit-reporting agencies to report the theft, and ask them to agencies to report the theft, and ask them to attach a attach a 'fraud alert'fraud alert' to all your credit cards. ' to all your credit cards.

Call the Call the policepolice in the jurisdiction where your in the jurisdiction where your credit card(s) was stolen to credit card(s) was stolen to report the theft.report the theft.

Page 8: Identity Theft Jourdan Hoapili Taylor Cullen Justin Enos

PhishingPhishing

Page 9: Identity Theft Jourdan Hoapili Taylor Cullen Justin Enos

What is phishing?What is phishing?

Phishing is the act of using a website Phishing is the act of using a website to get personal informationto get personal information

It can be very deadlyIt can be very deadly You won’t know it happened until You won’t know it happened until

too latetoo late Sometimes it’s impossible to detectSometimes it’s impossible to detect

Page 10: Identity Theft Jourdan Hoapili Taylor Cullen Justin Enos

How to prevent phishingHow to prevent phishing

Be cautiousBe cautious Use a firewall/antivirusUse a firewall/antivirus Avoid online transactionsAvoid online transactions

Page 11: Identity Theft Jourdan Hoapili Taylor Cullen Justin Enos

If you have been phished:If you have been phished:

Cancel your credit cardCancel your credit card Call a private investigator to help you Call a private investigator to help you

track down the phishermantrack down the phisherman There is no guarantee to getting your There is no guarantee to getting your

identity safe once again or even identity safe once again or even catching the person who your identitycatching the person who your identity

The best way to avoid the situation is The best way to avoid the situation is to be very cautiousto be very cautious

Page 12: Identity Theft Jourdan Hoapili Taylor Cullen Justin Enos

Why be concernedWhy be concerned

The computer is almost always The computer is almost always connected to the internetconnected to the internet

Even while not surfing your Even while not surfing your computer can be automated to do computer can be automated to do certain things through the use of certain things through the use of trojan viruses, like send credit card trojan viruses, like send credit card numbers and passwords to an numbers and passwords to an anonymous email accountanonymous email account

Hackers could target anyoneHackers could target anyone

Page 13: Identity Theft Jourdan Hoapili Taylor Cullen Justin Enos

Other things to be Other things to be concerned aboutconcerned about

Keyloggers, worms, backdoors, Keyloggers, worms, backdoors, exploitsexploits

Said objects can ruin youSaid objects can ruin you Keyloggers/worms found in trojansKeyloggers/worms found in trojans Backdoors/exploits typically found in Backdoors/exploits typically found in

new softwarenew software

Page 14: Identity Theft Jourdan Hoapili Taylor Cullen Justin Enos

Mac users:Mac users:

The only reason macs are ‘safer’ than The only reason macs are ‘safer’ than windows at this pint in time is because windows at this pint in time is because no hacker cares about them, as the no hacker cares about them, as the mass consumer product is windows at mass consumer product is windows at this moment in time. A british hacker this moment in time. A british hacker gained full access to a ‘secured’ mac in gained full access to a ‘secured’ mac in under an hour, using exploits he found under an hour, using exploits he found on the spot. He was then awarded on the spot. He was then awarded $10,000 for exposing the exploit to $10,000 for exposing the exploit to apple.apple.

Page 15: Identity Theft Jourdan Hoapili Taylor Cullen Justin Enos

PII?PII?

Personal Identifiable InformationPersonal Identifiable Information Individuals name or firstIndividuals name or first Social security number, access code Social security number, access code

or passwordor password

Page 16: Identity Theft Jourdan Hoapili Taylor Cullen Justin Enos

ProtectionProtection

Do not collect and retain PII unless Do not collect and retain PII unless neededneeded

Keep PII documents in shred bins Keep PII documents in shred bins when no longer neededwhen no longer needed

Encrypt PII on zip drives, etc.Encrypt PII on zip drives, etc.

Page 17: Identity Theft Jourdan Hoapili Taylor Cullen Justin Enos

Security Breach of PIISecurity Breach of PII

Likely to happen if electronic files Likely to happen if electronic files containing PII are sharedcontaining PII are shared

Loss of Files with PIILoss of Files with PII Inadvertant disclosure of PII to Inadvertant disclosure of PII to

unauthorized partiesunauthorized parties

Page 18: Identity Theft Jourdan Hoapili Taylor Cullen Justin Enos

Preventing ScamsPreventing Scams

Avoid sites that require information Avoid sites that require information and looksomewhat weirdand looksomewhat weird

Avoid leaving and inserting your Avoid leaving and inserting your name and PII etc. and keeping your name and PII etc. and keeping your info to yourselfinfo to yourself

Keep all information locked. To Keep all information locked. To avoid Trojans etc.avoid Trojans etc.

Page 19: Identity Theft Jourdan Hoapili Taylor Cullen Justin Enos

What not to do with your What not to do with your informationinformation

Store info on a public computerStore info on a public computer Email PIIEmail PII Scratch paperScratch paper

Page 20: Identity Theft Jourdan Hoapili Taylor Cullen Justin Enos

SourcesSources http://www.privacyrights.org/ar/idtheftsurhttp://www.privacyrights.org/ar/idtheftsur

veys.htmveys.htm http://209.85.173.104/search?q=cache:m0http://209.85.173.104/search?q=cache:m0

O0-VN4GiMJ:www.scambusters.org/creditO0-VN4GiMJ:www.scambusters.org/creditcard.html+What+to+do+if+your+credit+card.html+What+to+do+if+your+credit+card+is+stolen.&hl=en&ct=clnk&cd=3&card+is+stolen.&hl=en&ct=clnk&cd=3&gl=usgl=us

http://www.justice-explained.com/identity-http://www.justice-explained.com/identity-theft-protection.asptheft-protection.asp

http://www.phahealth.us/identity-theft.hthttp://www.phahealth.us/identity-theft.htmlml

http://www.ccrod.org/identity/identity_thehttp://www.ccrod.org/identity/identity_theft_contacts.htmlft_contacts.html

Page 21: Identity Theft Jourdan Hoapili Taylor Cullen Justin Enos

More sourcesMore sources

Http://www.zdnet.com/au/news/security/sHttp://www.zdnet.com/au/news/security/soa/Mac-OS-X-hacked-under-30-minutes/0,oa/Mac-OS-X-hacked-under-30-minutes/0,130061744,139241748,00.htm130061744,139241748,00.htm

Http://www.webopedia.com/term/p/phishiHttp://www.webopedia.com/term/p/phishing/htmng/htm

Http://webopedia.internet.com/Http://webopedia.internet.com/DidYouKnow/Internet/2004/virus.aspDidYouKnow/Internet/2004/virus.asp

http://en.wikipedia.org/wiki/phishinghttp://en.wikipedia.org/wiki/phishing http://www.microsoft.com/protect/http://www.microsoft.com/protect/

yourself/phishing/identify.mspxyourself/phishing/identify.mspx

Page 22: Identity Theft Jourdan Hoapili Taylor Cullen Justin Enos

More sourcesMore sources

Protection of personally identifiable Protection of personally identifiable information (Pii) – Mr. Millsinformation (Pii) – Mr. Mills

http://www.idtheftcenter.org/http://www.idtheftcenter.org/ http://www.idtheftcenter.org/artman2/http://www.idtheftcenter.org/artman2/

publish/c_tips/publish/c_tips/Fact_Sheet_117_IDENTITY_THEFT_AND_Fact_Sheet_117_IDENTITY_THEFT_AND_THE_DECEASED_-THE_DECEASED_-_PREVENTION_AND_VICTIM_TIPS.shtml_PREVENTION_AND_VICTIM_TIPS.shtml

http://www.identitytheft.org.ukhttp://www.identitytheft.org.uk http://www.imdb.com/title/tt0430211/http://www.imdb.com/title/tt0430211/