Title: Safeguarding Your Computer
1Identity theft
Florida Department ofLaw Enforcement Computer
Crime Center
Dan Leonard
2Overview
- Acquisition of Our Personal Information
- Its Misuse
- Staying as Safe as Possible
- Recovery Steps
3Identity Theft
ID theft occurs when an unauthorized person
pretends to be you or uses your personal
information
4(No Transcript)
5ID Theft
- Became a federal crime in 1998 with the passage
of The Identity Theft and Assumption Deterrence
Act - Florida statute 817.568 took effect in 1999 --
Criminal use of personal identification
information
6ID Theft Statistics
7ID Theft Statistics
8ID Theft Statistics
9ID Theft Statistics
10Who Gets Hurt?
- Victims bear the emotional costs
- Businesses and citizens bear the financial costs
- Everyone but the criminal
11Identity Theft
Someone got my Social Security number off the
Internet and stole my identity. Thank God I
hated being me!
12How do they get my information?(No-tech ways)
- Theft of wallets, purses
- Mail theft
- Change of address cards
- Dumpster diving
- Shoulder surfing
- Find info in your home
- Moles
- Social engineering
13How do they get my information?(No-tech ways)
- Pretexting creating a scenario (a pretext) to
persuade a target to release information. - Used to trick businesses into disclosing customer
information - Involves prior research
- Most U.S. companies still verify a client by
asking only for SSN, date of birth, or mothers
maiden name
14How do they get my information?(Hi-tech ways)
Criminals skimmer, mounted and colored to
resemble exterior of real ATM. A pinhole camera
is mounted inside a plastic brochure holder to
capture PIN.
15Skimming
- The customers credit card is used to pay for a
legitimate transaction
HOWEVER
... the card is diverted by an employee, who
swipes the card
through an illegally-used device that stores the
information from the cards magnetic strip ...
16(No Transcript)
17How do they get my information?(Hi-tech ways)
- Social Engineering
- Malware
- Phishing
- Vishing
18How do they get my information?(Hi-tech ways)
- Malware
- -Virus
- -Trojan Horse
- - Key Logger
19Phishing
- Sending a message claiming to be a business to
scam the user into surrendering private
information
Phishing attacks use both social engineering and
technical subterfuge to steal consumers'
identity and financial account credentials.
20Spear Phishing
- A highly targeted e-mail attack that a scammer
will send only to people within - a small group, such as a company
Spear phishers also target people who use
a certain product or web site. Scammers use
any information to personalize a phishing scam to
as specific a group as possible
21How Does Phishing Work?
- You receive a spoofed email that appears to be
from a legitimate company - The email informs you that there has been a
problem with your account - A link in the email takes you to a counterfeit
website usually a copy of a major company like
Amazon, eBay, or a Bank of America - You are instructed to fix the problem by entering
sensitive personal information at the risk of
losing access to the account
22(No Transcript)
23(No Transcript)
24(No Transcript)
25Tips to Avoid Getting Hooked
- Be skeptical of email that asks for personal
information - DO NOT click on the link provided
- Access your user information only through the
companys homepage
26More Tips
- If a web address is spoofed it is likely to have
an excessively long URL - Always report fraudulent or suspicious email to
your ISP - Contact law enforcement if youve been a victim
27www.antiphishing.org
28Internet Crime Complaint Center
www.ic3.gov
29Vishing
- Uses Voice Over IP (VOIP) technology instead of a
misdirected web link to steal user info - Attacker calls phone numbers in a given region
using war dialer - Automated recording alerts consumer to fraudulent
activity with their credit card or bank account - Victim instructed to call phone number thats
shown in spoofed caller ID and shows the same
name as financial company - When victim calls, automated message instructs to
enter account information
30What do they do with the information?
- Existing account fraud
- Change the mailing address on your accounts
- Forge checks and wipe out your existing account
- New account fraud
- Open new lines of credit
- Open accounts to write bad checks
- Other
- Commit crimes and give your name as an alias
31ID Theft Prevention
- Use a credit card
- Fair Credit Billing Act limits consumer liability
- Electronic Fund Transfer Act limits consumer
liability for ATM or debit cards, with
stipulations - Ensure electronically printed credit card
receipts show only the last 4 or 5 digits - Get a free credit report annually
- www.annualcreditreport.com
- Shred all documents containing personal info
- Dont email personal or financial information
32ID Theft Prevention (Cont.)
- Update anti-virus and anti-spyware software
regularly - Do not download files from strangers
- Do not click on links fromunknown people
- Use a secure connection for online transactions
33Secure Connection
34Secure Connection
35Secure Connection
36ID Theft Prevention (Cont.)
- Don't enter your SSN on web pages if you can help
it - Use a firewall
- Safeguard all your account numbers and passwords
37Strong Passphrase Example
Working nine to 5, what a way to make a living
38Password Hint
- If you cant remember your password, write down a
HINT - W925,waw2mal dolly
39(No Transcript)
40If You Think Youre a Victim
- Call the FTC ID Theft Hotline 1-877-IDTHEFT
(877-438-4338) - Contact the 3 major credit bureaus
- Fraud alert vs. credit freeze
- File a report with your local police
- Contact your creditors
41http//www.fdle.state.fl.us
42(No Transcript)
43(No Transcript)
44If You Think Youre a Victim
- Report stolen checks
- Remember to report stolen or compromisedATM or
debit cards immediately - Notify local Postal Inspector of any mail fraud
- Call Social Security Administration if Social
Security Number has been used fraudulently - Dont give in!
45http//myfloridalegal.com/identitytheft
46http//www.consumer.gov/idtheft
47Contact Information
- Computer Crime Center
- Florida Dept of Law Enforcement
- 2331 Phillips Rd.
- Tallahassee, FL 32308
- (850) 617-1350
- ComputerCrimeCenter_at_fdle.state.fl.us