SlideShare a Scribd company logo
1 of 42
Identity Theft, Nigerian Fraud,
and Cyberbulling. What it is,
How it works, and how to protect
yourself:
A Presentation by Matt Smith. President of Litchfield
County Computer, L.L.C.
Presentation Outline
• Identity Theft
• Nigerian Fraud
• Cyberbulling
Identity Theft
What is Identity Theft
• Identity theft is when someone uses your
personally identifying information, like your
name, Social Security number, or credit
card number, without your permission, to
commit fraud or other crimes.
• 27.3 million Americans have been victims
of identity theft within the last 5 years.
• Second most reported crime to the federal
government in 2003.
How Criminals get your Information
• Business records get stolen
• Shoulder Surfing
• Dumpster Diving
• Theft of mail
• Pretending to be someone of authority
• Internet based attacks (known as online identity theft)
• Social Security Number
• Skimming
• Phishing
• Diversion of bills/records to another location
• Photocopiers
How Criminals get your
Information: Internet based attacks
• Credit card and other personal information
is stored in a database by an online
merchant.
• These databases require Internet access
in order to operate.
• The database is broken into, allowing for
large amounts of personal information to
be stolen.
How Criminals get your
Information: Not as secure as you
think
• Many people that shop online are familiar with
the lock on their browser that indicates a secure
connection.
• This is a security misconception, the data is only
encrypted while it is being sent to the merchant.
Once it is sent it is stored in plaintext form and
can be stolen.
• It could also be stolen from the shopper via
various means (shoulder surfing or a virus)
The TJX Security Breach
• TJX is the parent company of Marshalls,
TJMAXX, and several other retail stores.
• Sometime in the summer of 2005, two attackers
broke into the wireless network of the Marshalls
in St. Paul, MN and Miami, FL.
• Once they were inside the store’s network, they
were able to break into TJX headquarters.
• A confirmed 45.6 million credit and debit card
numbers were stolen. This is the second largest
data breach in U.S. history.
The TJX Security Breach
• The mastermind behind the breach was a
man by the name of Albert Gonzales.
• Mr. Gonzales was also one of the heads of
Shadowcrew, an ID theft Internet Mafia that
was broken up by the USSS in 2004
• While he was helping the USSS take down
Shadowcrew, he was plotting his next
attack – TJX
TJX/Heartland Security Breach
• Mr. Gonzales also masterminded the
Heartland credit card processor security
breach in which a confirmed 130 million
credit card numbers and the magnetic
stripe data off the cards were stolen – this
is the largest data breach in U.S. History
• Mr. Gonzales has now been indicted for his
parts in the TJX/Heartland security
breaches.
How Criminals get your Information:
Social Security Number
• Your Social Security Number is a unique
identifier.
• Because of this it’s often used as the
primary key that identifies individual
records in a database.
• The SSN is a powerful tool. If a criminal
has your SSN it can be used to get other
personal information about you.
How Criminals get your
Information: Skimming
• Skimming is the act of running a credit
card though a device that is designed to
capture and store the information on many
credit cards for easy access later by a
computer.
• You can also skim a card by writing down
the card information on a piece of paper
when the card is out of sight.
How Criminals get your
Information: Skimming
• Skimming attacks often occur in
restaurants and other places where your
credit card must be taken out of your sight
to be scanned for payment.
How Criminals get your
Information: Phishing
• Phishing is when someone tries to get
your information by putting a fake banking
(or other site) on the Internet. Once the
site is online the phisher will send out
spam emails looking for victims.
• These spam emails will look and sound
official. However they are merely traps to
get you to reveal your personal
information.
How Criminals get your
Information: Phishing
How Criminals get your
Information: Phishing
How Criminals get your
Information: Phishing
How Criminals get your
Information: Photocopiers
• ID Theft via photocopier is a very new
threat (March, ’07)
• Photocopiers made in the last 5 years
have the same hard drives that computers
do.
• These hard drives are used to store every
document the copier has ever copied.
This data has very little chance of being
overwritten.
How Criminals get your
Information: Photocopiers
• These hard drives can be stolen from the
copier, revealing personal information.
• They also become a problem after the
copier is disposed of.
• Sharp and Xerox make security kits.
However, the security kit must be applied
to the copier.
• Be very cautious about what you copy on
a public copier.
How Criminals use your Information
• Diversion of your credit card bill.
• Open new credit and/or bank accounts.
• Forge checks and/or debit cards.
• Take out car loans and buy cars (very
common).
• Set up phone or cell service.
• File bankruptcy in your name.
• Commit crimes in your name.
Signs of Identity Theft
• You don’t get your normal bills
• Getting credit cards and account
statements that you didn’t apply for
• Creditor tries to repossess a car you don’t
own
• Police contact you after “you” commit a
crime
• Being denied credit for no reason
• Sudden unexplained calls from collection
agencies
If Your Identity is Stolen
• 1. Contact your local Police Department
and have them file a police report.
Although they will not be able to do much
else other than file a report you will NEED
a police report for later steps to help prove
that there has been a crime. Make sure
that you get a copy of the police report.
• 2. Cancel all accounts where the
suspicious activity was seen. This
includes credit and debit cards.
If Your Identity is Stolen
• 3. Contact the 3 credit bureaus. They are
http://www.equifax.com, http://
www.experian.com, and http://
www.transunion.com. They will place a fraud
alert on your account(s). If you skip this
step, you run the risk of the identity thief
being able to reopen the accounts you had
closed in step 2.
• 4. Contact the FTC at
http://www.consumer.gov/idtheft and file a
report.
If Your Identity is Stolen:
• 5. Contact your creditors and inform them
of the situation. Provide copies of your
police report if requested.
How to Protect Yourself
• Make sure no one is looking over your
shoulder when entering sensitive
information.
• Shred your sensitive trash.
• Never allow your credit card out of your
sight when a payment is being made.
• If your mail is stolen, report it immediately
to the post office. Get a locking mailbox if
possible.
How to Protect Yourself
• If you are not sure if an official sounding
communication is legitimate, check directly with
your bank, credit card company, etc.
• Shop or bank online as little as possible.
• If you notice that you are not getting your bills
contact your creditors immediately.
• Do not copy sensitive information (tax returns)
on a public copier.
• Be very careful in giving out your SSN. The only
people that should need it are State and Federal
agencies and your employer.
How to Protect Yourself
• Use good computer security: Keep your
antivirus and antispyware software updated
and scan your computer regularly.
• Avoid websites that are likely to infect your
computer with malware.
• Use a pop up blocker.
Nigerian Fraud
What Is Nigerian Fraud
• Nigerian Fraud is a type of scam where
you send the scammer a sum of money in
order to receive something in return
(usually a large sum of money).
• The initial contact is usually made via
email, although other methods (fax, snail
mail) can be used.
• There are many variants of Nigerian
Fraud.
Variants of Nigerian Fraud
• The most common form of Nigerian Fraud
involves you being asked to help the
scammer move a large sum of money of
the country in exchange for a portion of
the money. The scammer will ask for
money to help with fees involved in
moving the money.
Variants of Nigerian Fraud
• Another form of Nigerian Fraud is the
lottery scam in which the scammer claims
that the victim has won a lottery and
needs to pay “processing fees” in order to
receive the winnings.
• The reshipping scam is also common.
This is where a scammer will ship stolen
goods to a victim so the victim can ship
them to another location in return for
receiving a sum of money.
Variants of Nigerian Fraud
• The reshipping scam is especially
hazardous for the victim because as soon
as the victim receives the stolen goods the
victim is an accomplice to a crime.
An Example of Nigerian Fraud
Another Example of Nigerian Fraud
How to Protect Yourself
• If you get a Nigerian scam email in your
inbox, don't respond to it.
• Be careful of any “Work from home” type
job offers. These are often used to hide
reshipping scams.
Cyberbullying
Cyberbulling Statistics
• 33 percent of youth have been victimized by cyber
bullying.
• Among this percentage, being ignored and
disrespected were the most common forms of cyber
bullying.
• The primary cyber bullying location where victimizing
occurs is in chat rooms (56 percent).
• Following chat rooms, 49 percent are victimized via
instant message and 28 percent via e-mail.
• 34 percent of youth who are bullied feel frustrated, 30
percent angry and 22 percent feel sad.
Cyberbulling Statistics
• Oddly, because many studies show that females often
deal with harder situations by becoming sad, this
particular study suggests that females feel much angrier
than males about being cyber-bullied.
• 41 percent of victims do not tell anyone in their off-screen
lives about their abuse, but 38 percent did tell an online
friend.
• The situation only improved for 19 percent of victims when
they did tell someone about the bullying.
• 17 percent admitted to bullying another individual online.
• Of the offenders interviewed most considered it fun or
instructive; such as a way to strengthen their victims.
• More than half of study participants feel that cyber bullying
is as bad, or worse, as bullying in real life.
Megan Meier Case
• Megan Taylor Meier was a 13 year old
Missouri girl that committed suicide as a
result of cyberbulling.
• Megan’s neighbor has created a fake
MySpace profile of a boy to find out if
Megan had been saying bad things about
her daughter online.
• The comments made turned hateful.
Megan Meier Case
• As there was no law against Cyberbulling
at the time an attempt was made to use the
Computer Fraud And Abuse Act to
prosecute the case against Lori Drew. This
attempt failed.
Protecting Yourself
• Treat a cyber bully like you would treat a
normal bully – ignore them. Bullies thrive
on attention. If there are any indications
that threats to your offline safety may be
involved contact your local police.
Any Questions

More Related Content

What's hot

Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6krupp
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringGAURAV. H .TANDON
 
Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...VogelDenise
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftExperian_US
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft Rahmat Inggi
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Preventionfmi_igf
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 
Www geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_crWww geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_crBrady Allen
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz- Mark - Fullbright
 

What's hot (20)

Identity theft
Identity theftIdentity theft
Identity theft
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
How to protect yourself from identity theft
How to protect yourself from identity theftHow to protect yourself from identity theft
How to protect yourself from identity theft
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...
 
Identity Theft 101
Identity Theft 101Identity Theft 101
Identity Theft 101
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Avoiding Online Job Scams
Avoiding Online Job ScamsAvoiding Online Job Scams
Avoiding Online Job Scams
 
Identity Theft and You
Identity Theft and YouIdentity Theft and You
Identity Theft and You
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Prevention
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Www geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_crWww geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_cr
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
 

Similar to Identity Theft nigerian fraud cyberbullying

Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudMatt Smith
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 
Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 
A delightful way to teach kids about computers
A delightful way to teach kids about computersA delightful way to teach kids about computers
A delightful way to teach kids about computers806670
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & PrecautionsTalwant Singh
 
Common Fraud Schemes - Presentation
Common Fraud Schemes - PresentationCommon Fraud Schemes - Presentation
Common Fraud Schemes - PresentationChristopher Hoina
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraudtomciolkosz
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!tomciolkosz
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crimevishalgohel12195
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterJose L. Quiñones-Borrero
 
GROUP 4-final presentation.pptx. in TLE
GROUP  4-final presentation.pptx. in TLEGROUP  4-final presentation.pptx. in TLE
GROUP 4-final presentation.pptx. in TLEmenezachristal
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Versiondanc752
 

Similar to Identity Theft nigerian fraud cyberbullying (20)

Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
A delightful way to teach kids about computers
A delightful way to teach kids about computersA delightful way to teach kids about computers
A delightful way to teach kids about computers
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
Public private partnership Identity Theft
Public private partnership Identity TheftPublic private partnership Identity Theft
Public private partnership Identity Theft
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Common Fraud Schemes - Presentation
Common Fraud Schemes - PresentationCommon Fraud Schemes - Presentation
Common Fraud Schemes - Presentation
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraud
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
GROUP 4-final presentation.pptx. in TLE
GROUP  4-final presentation.pptx. in TLEGROUP  4-final presentation.pptx. in TLE
GROUP 4-final presentation.pptx. in TLE
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
What is Identity (ID) Theft ?
What is Identity (ID) Theft ?What is Identity (ID) Theft ?
What is Identity (ID) Theft ?
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 

Identity Theft nigerian fraud cyberbullying

  • 1. Identity Theft, Nigerian Fraud, and Cyberbulling. What it is, How it works, and how to protect yourself: A Presentation by Matt Smith. President of Litchfield County Computer, L.L.C.
  • 2. Presentation Outline • Identity Theft • Nigerian Fraud • Cyberbulling
  • 4. What is Identity Theft • Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes. • 27.3 million Americans have been victims of identity theft within the last 5 years. • Second most reported crime to the federal government in 2003.
  • 5. How Criminals get your Information • Business records get stolen • Shoulder Surfing • Dumpster Diving • Theft of mail • Pretending to be someone of authority • Internet based attacks (known as online identity theft) • Social Security Number • Skimming • Phishing • Diversion of bills/records to another location • Photocopiers
  • 6. How Criminals get your Information: Internet based attacks • Credit card and other personal information is stored in a database by an online merchant. • These databases require Internet access in order to operate. • The database is broken into, allowing for large amounts of personal information to be stolen.
  • 7. How Criminals get your Information: Not as secure as you think • Many people that shop online are familiar with the lock on their browser that indicates a secure connection. • This is a security misconception, the data is only encrypted while it is being sent to the merchant. Once it is sent it is stored in plaintext form and can be stolen. • It could also be stolen from the shopper via various means (shoulder surfing or a virus)
  • 8. The TJX Security Breach • TJX is the parent company of Marshalls, TJMAXX, and several other retail stores. • Sometime in the summer of 2005, two attackers broke into the wireless network of the Marshalls in St. Paul, MN and Miami, FL. • Once they were inside the store’s network, they were able to break into TJX headquarters. • A confirmed 45.6 million credit and debit card numbers were stolen. This is the second largest data breach in U.S. history.
  • 9. The TJX Security Breach • The mastermind behind the breach was a man by the name of Albert Gonzales. • Mr. Gonzales was also one of the heads of Shadowcrew, an ID theft Internet Mafia that was broken up by the USSS in 2004 • While he was helping the USSS take down Shadowcrew, he was plotting his next attack – TJX
  • 10. TJX/Heartland Security Breach • Mr. Gonzales also masterminded the Heartland credit card processor security breach in which a confirmed 130 million credit card numbers and the magnetic stripe data off the cards were stolen – this is the largest data breach in U.S. History • Mr. Gonzales has now been indicted for his parts in the TJX/Heartland security breaches.
  • 11. How Criminals get your Information: Social Security Number • Your Social Security Number is a unique identifier. • Because of this it’s often used as the primary key that identifies individual records in a database. • The SSN is a powerful tool. If a criminal has your SSN it can be used to get other personal information about you.
  • 12. How Criminals get your Information: Skimming • Skimming is the act of running a credit card though a device that is designed to capture and store the information on many credit cards for easy access later by a computer. • You can also skim a card by writing down the card information on a piece of paper when the card is out of sight.
  • 13. How Criminals get your Information: Skimming • Skimming attacks often occur in restaurants and other places where your credit card must be taken out of your sight to be scanned for payment.
  • 14. How Criminals get your Information: Phishing • Phishing is when someone tries to get your information by putting a fake banking (or other site) on the Internet. Once the site is online the phisher will send out spam emails looking for victims. • These spam emails will look and sound official. However they are merely traps to get you to reveal your personal information.
  • 15. How Criminals get your Information: Phishing
  • 16. How Criminals get your Information: Phishing
  • 17. How Criminals get your Information: Phishing
  • 18. How Criminals get your Information: Photocopiers • ID Theft via photocopier is a very new threat (March, ’07) • Photocopiers made in the last 5 years have the same hard drives that computers do. • These hard drives are used to store every document the copier has ever copied. This data has very little chance of being overwritten.
  • 19. How Criminals get your Information: Photocopiers • These hard drives can be stolen from the copier, revealing personal information. • They also become a problem after the copier is disposed of. • Sharp and Xerox make security kits. However, the security kit must be applied to the copier. • Be very cautious about what you copy on a public copier.
  • 20. How Criminals use your Information • Diversion of your credit card bill. • Open new credit and/or bank accounts. • Forge checks and/or debit cards. • Take out car loans and buy cars (very common). • Set up phone or cell service. • File bankruptcy in your name. • Commit crimes in your name.
  • 21. Signs of Identity Theft • You don’t get your normal bills • Getting credit cards and account statements that you didn’t apply for • Creditor tries to repossess a car you don’t own • Police contact you after “you” commit a crime • Being denied credit for no reason • Sudden unexplained calls from collection agencies
  • 22. If Your Identity is Stolen • 1. Contact your local Police Department and have them file a police report. Although they will not be able to do much else other than file a report you will NEED a police report for later steps to help prove that there has been a crime. Make sure that you get a copy of the police report. • 2. Cancel all accounts where the suspicious activity was seen. This includes credit and debit cards.
  • 23. If Your Identity is Stolen • 3. Contact the 3 credit bureaus. They are http://www.equifax.com, http:// www.experian.com, and http:// www.transunion.com. They will place a fraud alert on your account(s). If you skip this step, you run the risk of the identity thief being able to reopen the accounts you had closed in step 2. • 4. Contact the FTC at http://www.consumer.gov/idtheft and file a report.
  • 24. If Your Identity is Stolen: • 5. Contact your creditors and inform them of the situation. Provide copies of your police report if requested.
  • 25. How to Protect Yourself • Make sure no one is looking over your shoulder when entering sensitive information. • Shred your sensitive trash. • Never allow your credit card out of your sight when a payment is being made. • If your mail is stolen, report it immediately to the post office. Get a locking mailbox if possible.
  • 26. How to Protect Yourself • If you are not sure if an official sounding communication is legitimate, check directly with your bank, credit card company, etc. • Shop or bank online as little as possible. • If you notice that you are not getting your bills contact your creditors immediately. • Do not copy sensitive information (tax returns) on a public copier. • Be very careful in giving out your SSN. The only people that should need it are State and Federal agencies and your employer.
  • 27. How to Protect Yourself • Use good computer security: Keep your antivirus and antispyware software updated and scan your computer regularly. • Avoid websites that are likely to infect your computer with malware. • Use a pop up blocker.
  • 29. What Is Nigerian Fraud • Nigerian Fraud is a type of scam where you send the scammer a sum of money in order to receive something in return (usually a large sum of money). • The initial contact is usually made via email, although other methods (fax, snail mail) can be used. • There are many variants of Nigerian Fraud.
  • 30. Variants of Nigerian Fraud • The most common form of Nigerian Fraud involves you being asked to help the scammer move a large sum of money of the country in exchange for a portion of the money. The scammer will ask for money to help with fees involved in moving the money.
  • 31. Variants of Nigerian Fraud • Another form of Nigerian Fraud is the lottery scam in which the scammer claims that the victim has won a lottery and needs to pay “processing fees” in order to receive the winnings. • The reshipping scam is also common. This is where a scammer will ship stolen goods to a victim so the victim can ship them to another location in return for receiving a sum of money.
  • 32. Variants of Nigerian Fraud • The reshipping scam is especially hazardous for the victim because as soon as the victim receives the stolen goods the victim is an accomplice to a crime.
  • 33. An Example of Nigerian Fraud
  • 34. Another Example of Nigerian Fraud
  • 35. How to Protect Yourself • If you get a Nigerian scam email in your inbox, don't respond to it. • Be careful of any “Work from home” type job offers. These are often used to hide reshipping scams.
  • 37. Cyberbulling Statistics • 33 percent of youth have been victimized by cyber bullying. • Among this percentage, being ignored and disrespected were the most common forms of cyber bullying. • The primary cyber bullying location where victimizing occurs is in chat rooms (56 percent). • Following chat rooms, 49 percent are victimized via instant message and 28 percent via e-mail. • 34 percent of youth who are bullied feel frustrated, 30 percent angry and 22 percent feel sad.
  • 38. Cyberbulling Statistics • Oddly, because many studies show that females often deal with harder situations by becoming sad, this particular study suggests that females feel much angrier than males about being cyber-bullied. • 41 percent of victims do not tell anyone in their off-screen lives about their abuse, but 38 percent did tell an online friend. • The situation only improved for 19 percent of victims when they did tell someone about the bullying. • 17 percent admitted to bullying another individual online. • Of the offenders interviewed most considered it fun or instructive; such as a way to strengthen their victims. • More than half of study participants feel that cyber bullying is as bad, or worse, as bullying in real life.
  • 39. Megan Meier Case • Megan Taylor Meier was a 13 year old Missouri girl that committed suicide as a result of cyberbulling. • Megan’s neighbor has created a fake MySpace profile of a boy to find out if Megan had been saying bad things about her daughter online. • The comments made turned hateful.
  • 40. Megan Meier Case • As there was no law against Cyberbulling at the time an attempt was made to use the Computer Fraud And Abuse Act to prosecute the case against Lori Drew. This attempt failed.
  • 41. Protecting Yourself • Treat a cyber bully like you would treat a normal bully – ignore them. Bullies thrive on attention. If there are any indications that threats to your offline safety may be involved contact your local police.