HSS Visiting Speaker Program Frank W. Abagnale: Fraud and Theft in the Information Age. October 28, 2009



Similar documents
Identity Theft Protection

According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection

IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage.

Standard 9: The student will identify and explain consumer fraud and identity theft.

IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

I dentity theft occurs

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

Identity Theft Problem and Solutions

Identity Theft Protection

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Beware! Identity Theft

CIVIL SERVICE SPORTS COUNCIL (CSSC) QUESTIONS & ANSWERS

Identity Theft Prevention Presented by: Matt Malone Assero Security

How To Protect Yourself From Identity Theft

Identity Theft Victim Packet

Identity Theft. Occurs when someone uses your personal information without your permission for personal gain.

How To Get Help From The Police Department

BE SAFE ONLINE: Lesson Plan

15 Bad Things Identity Thieves Can Do With Your Identity

Retail/Consumer Client. Internet Banking Awareness and Education Program

PROTECTION GUIDE Learn the Essentials & Immediate Steps to Protect Your Identity

Preventing Identity Theft National City Bank. How to protect your identity

DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008

Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on

RC284. Protect Yourself Against Identity Theft

Identity Theft Prevention Provided by the Colorado Bureau of Investigation Contact us at

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

Identity Theft. Protecting Your Credit Identity G1

National Cyber Security Month 2015: Daily Security Awareness Tips

Identity Theft Packet

Identity Theft and Strategies for Crime Prevention

Identity Theft. Presented By: Information Technology. James Blackwood, Michael Fouts, & Tiffany Mixon

Learn to protect yourself from Identity Theft. First National Bank can help.

Protecting Yourself From Identity Theft and Fraud. Detective Mike Kugler Bella Vista Police Department

FINANCIAL CRIMES. Lesson Plan and Course Outline. INSTRUCTOR EQUIPMENT/MATERIALS PowerPoint, LCD Projector, Computer, and Handouts

MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection

Do s & Don ts Reference website.

Identity Theft Grade Level 10-12

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

FINAL // FOR OFFICIAL USE ONLY. William Noonan

What is Identity Theft?

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09

Employee ID Theft Resource Guide

When life happens... Protect Against Identity Theft. Keeping personal information safe & what to do if it happens to you

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

Cybersecurity Best Practices

WASHINGTON ASSOCIATION OF SHERIFFS AND POLICE CHIEFS Model Policy on Identity Theft Policy, Procedures, and Victim Referral Information

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE

Chapter 9-Section 3. Consumer Protection Laws

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and

Preventing identity theft

Identity Theft and Tax Administration

CYBER SECURITY STRATEGY AN OVERVIEW

Identity Theft. What it is and How to Protect Yourself

Avoid completing forms in messages that ask for personal financial information.

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT

How to Prevent It What to Do If You Are a Victim

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT

PRACTICAL MONEY GUIDES IDENTITY THEFT. How to safeguard your identity and financial information from theft

When Your Child s Identity Is Stolen

Identity Theft Victim s Packet

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.

OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009

Identity Theft Prevention Program Compliance Model

Transcription:

1 of 8 In the United States, the FBI ranks cyber crime and identity theft as the third highest threat, just after terrorism and espionage. In October 2009, the FBI indicted the largest number of defendants in a multi-national cyber phishing identity theft scam. In August 2009, individuals were arrested and indicted for stealing 130 million credit and debit cards. Cyber and identity theft affects 15 million people annually 1 every four seconds at a cost of $60 billion per year. Mari-Josette Campagnone. Senior Advisor to the Chief Health Safety and Security Officer

What I did 40 years ago is now 4,000 times easier to do. Forty years ago it took a $1 million piece of equipment to produce a check. Today a more believable check can be created in a hotel room on a laptop p in 10 minutes. Forty years ago we have to fabricate information, today the real information can be obtained very easily as we share our information more openly. Technology breeds crime it always has it always will. 2 of 8

Education about these threats of fraud and theft is the best tool to protect oneself. Identity theft strikes approximately 15 million people each year at a cost of $60 billion. The totality of white-collar crime is estimated at $930 billion per year that is twice the DoD budget to defend the nation. White collar crime continues to grow. 3 of 8

To protect your identity, consider that everything you believe to be worthless is of much value to someone else. For example, the catalog you just threw away on the back is your identification, address, and source code it is all that I need to become you. How to mitigate this threat? Get a quality shredder Frank W. Abagnale. Author, Lecturer, 4 of 8

There are much differences in shredders: - Straight/ribbon cut the FBI Quantico lab can reconstruct a bank statement in less than one hour. - Criss-cross cut slightly better; the FBI lab can reconstruct documents in 8 hours. This was used in the government s legal actions with Tyco, Enron, Arthur Anderson, etc. - Security micro-cut is the best, it turns paper into confetti put a credit card into this and you have plastic sand. 5 of 8

About credit freeze and credit monitoring: -Credit freeze may be a good idea for some, but most individuals need their credit for work, business, and living. - A better option is credit monitoring. Some questions to ask of a credit monitoring service are: Do you monitor all three credit reporting bureaus? How do you notify me? (Real time notification is best, every few months or via mail is not useful to thwart the threat.) 6 of 8

Most of the security features and technologies on checks, government documents, passports, and credit cards were designed by me. Our checks give a great deal of information about us, anyone who sees the face of a check can draft on my account. The safest form of payment on the face of the earth is a credit card. Use a credit card for everything. By Federal law, I have no liability if it is stolen or fraudulently used. Debit card users risk the chances of thieves accessing their bank account. The smart consumer eliminates the risk by using a credit card. 7 of 8

We are living in a society in need of ethics education. These are not taught in homes, schools, or universities. We are sending young people into the market without character or character background. We put them into positions of trust and we risk betrayal of this trust. We must bring ethics into our homes, schools, universities, es, and workplace. pace As public servant, we hold the public s trust, there is nothing more important than ethics in guiding what we do. 8 of 8