Consumer Fraud - How to Avoid Being Scammed

Similar documents
Online Fraud and Identity Crime Risks and Realities. Russell G Smith Principal Criminologist

Risks and responses to fraud in Australia. Dr Russell G Smith Principal Criminologist

Cyber Crime Research. Presentation by the Australian Institute of Criminology. Dr Russell G Smith Principal Criminologist

Veda: Fraud Focus Group Forum

International Serious and Organised Crime Conference

VPS Fraud Control Network Understanding and responding to public sector fraud and corruption. Dr Russell G Smith Principal Criminologist

Market Intelligence Cell. Fighting Financial Crime

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

SENIORS ONLINE SECURITY

Identification processes in the. Russell G Smith Principal Criminologist. higher education sector risks & countermeasures

Protecting Yourself from Identity Theft

Fraud Guide Fraud Protection

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Personal Security - Preventing and Curing Identity Theft

Protect yourself online

Fraud. Your guide to protecting yourself from fraud

Standard 9: The student will identify and explain consumer fraud and identity theft.

Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on

Small businesses: What you need to know about cyber security

RC284. Protect Yourself Against Identity Theft

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity

CORPORATE IDENTITY FRAUD: A PRIMER

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection

Security Guide. for electronic transactions. UniBank is a division of Teachers Mutual Bank Limited

Discussion paper. Discussion paper on the coverage of crime statistics. 23 January Office for National Statistics paper

Identity Theft Protection

Armstrong State University Fall Staff Assembly. Chief Wayne Willcox, MSCJ, CLEE

Beware! Consumer Fraud

Customer Awareness for Security and Fraud Prevention

Avoid completing forms in messages that ask for personal financial information.

Anti- Fraud Guide. Mariano Ciriotti Group Compliance Director Small World May 2013 Version 1.0. Contents:

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Learn to protect yourself from Identity Theft. First National Bank can help.

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

IDENTITY THEFT. A. What Do I Do First? Take the following steps as soon as you discover you have been a victim of identity theft.

Dear Concerned Consumer,

Fraud and Identity Theft. Megan Stearns, Credit Counselor

Visa CREDIT Card General Guidelines

Deception scams drive increase in financial fraud

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

Online security. Defeating cybercriminals. Protecting online banking clients in a rapidly evolving online environment. The threat.

Identity crime and misuse in Australia: Results of the 2013 online survey

Appendix consumer fraud survey

Driving License. National Insurance Number

Identity Theft Protection Plans

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

Identity Theft Awareness: Don t Fall Victim to these Common Scams

Identity Theft Protection

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

Putting Telephone Scams... On Hold

THE HOME LOAN SAVINGS BANK. Corporate Account Takeover & Information Security Awareness

How to Protect Yourself From Identity Theft and Internet Scams

Corporate Account Takeover & Information Security Awareness

Preventing identity theft

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

Mifflinburg Bank & Trust. Corporate Account Takeover & Information Security Awareness

INFORMATION FOR VICTIMS OF FRAUD CRIMES SCHERTZ POLICE DEPARTMENT

Learning English with CBC Radio Living in Alberta. Identity Theft

Identity Theft Prevention Presented by: Matt Malone Assero Security

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

S.A.F.E. Recognize a scam before you become a victim of fraud Division of Consumer Protection

THE STATE BAR OF TEXAS. Just Hang UP. Protect Yourself From Unscrupulous Telemarketers and Con Artists

When registering on a jobsite, first ensure that the site is reputable and has a physical address and landline phone number.

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

How To Protect Yourself From Identity Theft

Corporate Account Takeover & Information Security Awareness

IDENTITY THEFT RESOURCE KIT

Contents. About the Authors. It Pays to be Alert 2. Traditional Types of Fraud 3-4. Hi-Tech Fraud 5-6. Identity Theft 7.

Promoting a cyber security culture and demand compliance with minimum security standards;

Almost 400 million people 1 fall victim to cybercrime every year.

Benefits of LifeLock Ultimate Plus. About LifeLock. 3 Layers of Protection DETECT ALERT RESTORE FACT SHEET LIFELOCK ULTIMATE PLUS

ELECTRONIC AUTHENTICATION. Understanding the New. Multi-factor authentication and layered security are

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit

C o n s u m e r FRAUD. What You Need To Know Dodge Pa rk Sterling Heights, MI

Preventing and Intervening in Situations of Financial Abuse

IDENTITY THEFT and YOU

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness

Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS

Corporate Account Takeover & Information Security Awareness. Customer Training

Advance Fee Loans. Computer Malware Scams. Credit Repair Scams

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

ELDER CONSUMER SCAMS AND FRAUD

STUDENT S INFORMATION SECURITY GUIDE

Protecting your business against External Fraud

which you did not make,

Acceptable Use Policy

Retail/Consumer Client. Internet Banking Awareness and Education Program

Di Marzio Research IDENTITY THEFT CONCERNS AND EXPERIENCES. Survey Data Report on: prepared for. Marketing and Strategic Research Consultancy

Fraud Protection module

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009

Identity Theft is a Crime in the State of New Jersey.

Netsafe/ AVG New Zealand. NetSafe/ AVG New Zealand. Cyber Security Research. Cyber Security Research. Supplementary Tables. March 2011.

2012 NORTON CYBERCRIME REPORT

Cyber crime. lingua house. 1 Internet crime. Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + Match the following words to their correct definitions:

Protecting Yourself Against Fraud and Identity Theft

Office of the Privacy Commissioner of Canada. Identity Theft and You

FLIP IDENTITY THEFT. (Financial Literacy in Practice) February 2015 OVERVIEW TEACHER NOTES TEACHER NOTES

Transcription:

Understanding Consumer Fraud How to avoid being scammed Russell G Smith Principal Criminologist

Introduction Fraud has existed throughout history Dr Samuel Johnson observed in The Rambler in 1784: Whoever commits a fraud is guilty not only of the particular injury to him whom he deceives, but of the diminution of that confidence which constitutes not only the ease but the existence of society. Inspector John Nugent s Registry of Flash Men (1841-44) Emily Syster begging letter imposter (today s charity fraudster) Simon Hunt false insurance claim (today s car accident fraudster) Mick Bell advance fee thief (today s Nigerian email fraudster) Frauds, scams, tricks, cons, swindles, rooks, flim flams, gyps Fraud: dishonest or deceitful means to obtain some unjust advantage Scam: a fraudulent invitation, request, notification or offer designed to obtain someone s personal information or money or otherwise to obtain a financial benefit by deceptive means (Aust Bureau of Statistics 2008)

Scam categories Advance fee schemes Non-delivery and defective products and services Unsolicited and unwanted goods and services Scam sub-categories Pyramid schemes, Ponzi schemes, chain letters, Nigerian emails, business opportunities, prizes and lotteries, dating scams Online auctions, internet services, computer products, sexual services, credit and loan scams, health scams, educational qualifications Spam, securities and investment fraud, bait advertising, inertia selling Identity fraud Phishing, plastic card fraud, card skimming, unauthorised transactions, online banking fraud

Online identity fraud Online fraud Dishonest or deceitful means to obtain some unjust advantage, facilitated through the use of the internet Syntactic exploitation of technical vulnerabilities to commit fraud (e.g. malware, plastic card skimming, illegal funds transfers, Wi-Fi) Semantic exploitation of social vulnerabilities to gain information (e.g. scam solicitations, identity-related fraud, auction fraud) Blended using technical means to facilitate semantic attacks Identity crime Identity fraud Misuse of personal information to commit fraud Identity theft Use of another person s personal information without their knowledge or permission Lent identity Knowingly allowing personal information to be used

Inter-related concepts

Understanding the risks The Internet as a source of personal information 1.8 billion global Internet users 31 Dec 2009 27% of world population 17 million Internet users in Australia 80% of the Aust population Facebook and Myspace have 200 million registered users globally Personal information at risk Life history information name, age, address, govt numbers: licence etc Financial information bank accounts, card numbers, PINs, passwords Accidental data leakage cases Card Systems Solutions lost details of 40 million accounts TJMaxx lost details of 90 million customers over 2 years HM Revenue & Customs 25 million child benefit records lost* Driver & Vehicle Licensing Agency 3 million learner driver details lost* *Source: Fraud Advisory Panel 2009

Understanding the risks Relevant identity crime types Obtaining finance dishonestly; opening bank accounts in false names; money laundering; motor vehicle re-birthing; credit card fraud; tax evasion; obtaining benefits; obtaining licences; avoiding driving demerit points; immigration fraud; terrorism High risk activities Loss of laptops, mobiles and USBs (46% of breaches: Symantec 2007) Sharing of personal information online (e.g. social networking sites) Ofcom UK 44% of users allowed others to see personal information; 25% of social networking site users posted personal information openly Data trafficking via the digital underground economy USA Operation Firewall 28 people from 6 countries buying and selling 1.7 million credit card numbers in 2004

The digital underground market Asset Pay-out for each unique adware installation Going rate US$ Malware package, basic version $1,000-$2,000 30 cents in the United States 20 cents in Canada; 10 cents in the UK; 2 cents elsewhere Malware package with add-on services Varying prices starting at 420 Exploit kit rental 1 hour $0.99 to $1 Undetected copy of an informationstealing certain Trojan Distributed Denial of Service attack $80, may vary $100 per day 10,000 compromised PCs $1,000 Stolen bank account credentials Varying prices starting at $50 1 million freshly-harvested emails (unverified) $8 up, depending on quality Source: Trend Micro 2007

Phishing risks Phishing attack reports / month 23,187 (12/08) to 28,897 (12/09) 25% increase Increase in spear-phishing and whale-phishing (high net-worth targets) Unique phishing websites / month 15,709 (12/08) to 46,190 (12/09) 194% increase Industry sectors attacked (Oct-Dec 2009) Financial 39%, Payments 33%, Auction 13%, Other 13%, Retail 2% Large increase in attacks on social networking sites (incl. in Other) Banking Trojan / Password stealing crimeware / quarter 218,297 (Q4/08) to 3,354,177 (Q4/09) 1,437% increase Rogue anti-malware programs detected / month 9,287 (12/08) to 122,335 (12/09) 1,217% increase Source: www.apwg.org

Phishing

Measuring the extent of the problem Sir Josiah Stamp Some Economic Factors in Modern Life The government are very keen on amassing statistics. They collect them, add them, raise them to the nth power, take the cube root, and prepare wonderful diagrams. But you must never forget that every one of these figures comes in the first instance from the village watchman, who just puts down what he damn pleases (Stamp 1929, pp.158-9) Aust Aust Bureau of Statistics 2008 (14,320 individuals > 15 yrs) 36% exposed to scams; 3% victims of identity fraud + 2% other scams Total losses 2006-07: A$977 million; Mean A$2,156 per person UK Cyber Source Online Fraud 2009 (1,000 online shoppers) 33% of shoppers a victim of online credit card fraud or knew of a victim USA Javelin Strategy & Research 2008 (5,075 consumers) 8 million victims of ID theft (4% of population) losing US$45 billion

Why people respond to scams Routine activities theory (Cohen & Felson 1979) Opportunities, motivated offenders, absence of capable guardians High internet usage with lax security measures enhances risk Life-style exposure theory (Hindelang, Gottfredson & Garofalo 1978) Demographic variables in conjunction with lifestyle relate to risk Age, sex, education and income level may be correlated with risk levels Negative life events may increase vulnerabilities through a desire to respond to grief or loss by engaging in consumerism or risk-taking Self-control theory (Gottfredson & Hirschi 1990) Low self-control and impulsiveness may enhance vulnerabilities Desire for immediate gratification increases risk Participating in financial risk-taking enhances risk Responding to scams without undertaking checks increases risk

Advance fee fraud study Research team Australian Institute of Criminology, University of Melbourne and Victoria Police Population 9,241 Victorians who had transferred funds to Nigeria using Western Union from 1 April 2007 to 31 March 2008 (12 months) 7,831 excluded (multiple transactions, non-victorian, incomplete address information, multiple victims at one address) Sample / results 1,410 individuals sent questionnaire 3 September 2008 202 responded (14%); 120 victims (59%); 82 non-victims (41%) Dating (36%), assistance (11%), online transactions (9%), lotteries (8%), job offers (7%), other types of advance fee scams (33%)

Significant risk factors (those more likely to be victims) Demographics Older age groups (45-54, >65); Lower income groups (<$20,000 pa) Lower education (secondary schooling or lower); Unemployed Lifestyle Suffered from depression in last five years Suffered a personal financial crisis or lost job in last 5 years Diagnosed with a serious illness in last five years Risk-taking Likely to trust strangers; Likely to make impulsive decisions Unlikely to wait for something due Computer usage and security Likely to use the Internet for longer hours (10-19, >20 hours a week) Likely to employ more computer security measures

Policy solutions Level of risk Risks from syntactic attacks continuing to develop 1 in 20 household users victimised by scams or identity fraud 0.03% of credit card transactions fraudulent, Jan-Dec 2009 (APCA) Problems of lack of knowledge, prevention and behaviour change Policy directions Using multiple solutions rather than one Ensuring cooperation between public and private sectors Improving education ACFT; computer driving licence Improving victim support reporting, loss recovery, counselling Legislation Criminalisation of identity fraud and possession of equipment Identity fraud court victimisation certificates

Technical solutions Document security and verification Chip/PIN credit card roll-out Inter-agency document verification systems Identity cards? BD&M cards; overseas identity cards Industry responses Software solutions to make high risk behaviour impossible Anti-skimming devices on card readers Enhanced security of online personal information Online transaction monitoring, notification and blocking Biometrics e-passports (facial scanning) Online fingerprint scanning and voice recognition

Protecting yourself against scams Protect your money Never respond to an email asking you for your PINs or passwords Never send money to someone you don t know or trust Only invest with licensed financial services providers Protect your phone Be suspicious of unexpected calls and text messages Hang up. Or text STOP to unwanted mobile SMS messages Don t give out your number to just anyone Protect your computer Keep your security software up to date, and turn on automatic updates Don t respond in any way to unsolicited emails; When in doubt, delete! Protect your identity Never give out your details to someone you don t know or trust Don t just bin it destroy it (old bills, records or expired cards) Use strong passwords; check your credit report www.vedaadvantage.com

Russell.Smith@aic.gov.au