Identity Theft: Prevention & Survival Crime of the Century Provide By: Nick Sabetta Don t t Let Someone Steal Your Good Name
What is Identity Theft? When someone uses your personal information without your permission to commit fraud or other crimes.
Categories of Identity Theft 1. True Name Identity Theft - obtains personal information for the purpose of establishing new accounts. 2. Account Takeover steals personal information and uses it to gain access to the victim s existing accounts. 3. Criminal Identity Theft when a criminal uses the stolen information in place of their own to law enforcement.
Thieves use your Identity To establish driving privileges. To establish Social Security and/or other social service benefits. To establish medical benefits. To avoid detection of their true identity. To establish credit.
2007 Identity Fraud Survey Report 3.7% of the adult U.S. population were victims of identity fraud. 8.1 million American adults were victims of identity theft. (Total of 35.7 million in last six years.) The total U.S. cost was $45 billion, a 8% decline from previous year. The total average loss per victim $5,720. The average out-of of-pocket cost per victim $750; total annual out-of of-pocket loss nationwide is $5 billion. The average resolution time per victim 28 hours. Emotional impact parallels that of victims of violent crimes.
How Victims Discover ID Theft
How Information Was Obtained
Common Methods Used to Obtain Personal Data Physically Steal It Use of Mechanical or Electronic Device Social Engineering
Common Methods Used to Obtain Personal Data Stolen computers Password protected Firewall protected Anti-Virus protected Adware/spyware protected Encrypted files and hard drive
Common Methods Used to Obtain Personal Data Stolen wallet/purse Social Security card Medicaid/Medicare card Unnecessary credit cards Passwords/ Passwords/PINsPINs
Common Methods Used to Obtain Personal Data Mailbox Account Statements Checks Pre-approved credit
Information valuable to a thief from your checks
Common Methods Used to Obtain Personal Data Dumpster Diving Shred Curbside Pickup Community/shared disposal
Common Methods Used to Obtain Personal Data Shoulder Surfing Buffer zone Camera capabilities
Common Methods Used to Obtain Personal Data Skimming/Swiping Obtaining electronic data from credit cards Magnetic strip RFI receiver Personal observation
Common Methods Used to Obtain Personal Data
Methods Used to Obtain Personal Data
Common Methods Used to Obtain Personal Data Phishing using fake emails to appear it came from legitimate financial organization or online retailer.
Common Methods Used to Obtain Personal Data Phishing the bait: email or pop-up messages that claim to be from a business or organization you may deal with an Internet service provider (ISP), bank, or an online payment service. The message may ask you to update, validate, or confirm your account information or face dire consequences.
Secure Web Page Explorer 6
Secure Web Page Explorer 7
Common Methods Used to Obtain Personal Data Telephone Solicitors Computers
Common Methods Used to Obtain Personal Data Family Members identity data is misused by member. Trusted Insider information stolen by an employee or other participant in transaction/service. ice. Legal Sources an attacker, armed with just a bit of 419 Scams similar to information pretends to be the account holder and works their way into access, commonly known as`pretexting. similar to pretexting,, were the attacker now pretends to be an agent of an organization and request information from an account holder.
Personal Relationship with Thief
Problem Resolution
Out-of of-pocket Payments by Victims
ID Theft Prevention & Survival Plan Action One: Spot It Bills that do not arrive as expected. Unexpected credit cards or account statements. Calls or letters about purchases you did not make. Denials of credit for no apparent reason
ID Theft Prevention & Survival Plan Action Two: Inspect It Review your financial accounts and billing statements for discrepancies or suspicious activity. Review your credit by obtaining a credit report, at least once a year. (One free report per calendar year) www.annualcreditreport.com
Credit Monitoring Services
ID Theft Prevention & Survival Plan Action Three: Guard It Guard your personal information Carry only the identification you need Leave passports, birth certificates, social security cards, personal identification numbers (PIN), and passwords in a safe and secured place. Never give personal information over the telephone or internet, unless you initiate the contact. Never release your PIN or password. Find out how the information you do provide to legitimate companies will be use and who will have access to it.
ID Theft Prevention & Survival Plan Action Four: Watch It Mind Your Mail & Trash Take outgoing mail to a post office. Promptly pickup your mail once delivered. Have your mail held at a post office when on vacation. If possible, bring your trash to the curbside just prior to pickup. Shred all personal documents before discarding in trash.
ID Theft Prevention & Survival Plan Action Five: Protect It Password protect your accounts Change your password frequently Don t t use easily identifiable information like birthdays, wedding/anniversaries, any portion of your Social Security number, phone number, or home address.
ID Theft Prevention & Survival Plan Action Six: Opt Out Of It Get off solicitation lists. Opt out of receiving unsolicited credit offers in the mail by contacting the following: 1-888-5-OPTOUT (567-8688) for more information. Contact the three National Credit Bureaus and inquire about the OPT OUT plan.
ID Theft Prevention & Survival Plan Action Seven: Report It Alert all Three Major Credit Bureaus to request a Fraud Alert on your credit report. This alerts creditors to call you before any new accounts could be opened in your name. Contact creditors and financial institutions. Immediately call the security or fraud department and close the account. File a report with the local police department and keep a record. Contact the Federal Trade Commission, 1-8771 877-ID-THEFT, which provides information to ID theft victims and maintains a Identity Theft Data Clearinghouse.
Credit/Security Freeze Locks or freezes access to the consumer credit report and credit score. Without this information, a business (creditor) will not issue new credit. When the consumer wants to get new credit, he or she uses a PIN to unlock access to a credit file. Placing a credit freeze does not affect your credit score nor does it keep you from getting your free annual credit report, or from buying your credit report or score. Connecticut Law Eligibility: All consumers Fees: $10 to place the freeze, lift it temporarily, or remove it altogether; $12 to lift it temporarily for a specific creditor. Effective date of law: January 1, 2006
For more information contact: Nick Sabetta Liberty Bank Corporate Security & Investigations Office: 860-638-2912 Cell: 860-301-3055 Email: nsabetta@liberty-bank.com