FOIL FOIL FOIL FOIL FOIL FOIL The Sum of the Roots Times The Product of the Roots.
File: Foil Identity Theft.PPT 1 Yogi Schulz Foil Identity Theft Alberta Energy Leadership Forum...
-
Upload
julian-melton -
Category
Documents
-
view
213 -
download
0
Transcript of File: Foil Identity Theft.PPT 1 Yogi Schulz Foil Identity Theft Alberta Energy Leadership Forum...
File: Foil Identity Theft.PPT 1
Yogi Schulz
Foil Identity Theft
Alberta Energy Leadership ForumPresenter: Yogi Schulz
FoilIdentity Theft
March 2007 Copyright © 2007 by Corvelle Management Consultants
ENERGY
File: Foil Identity Theft.PPT 2
Yogi Schulz
Foil Identity TheftManagement Consultants
Yogi SchulzBiography
President of Corvelle Management Consultants
Information technology related management consulting
Project management and systems development
Computing Canada & Microsoft columnist
PPDM Association board member
Industry presenter:– Project World - 4 years
– CIPS Informatics - 7 years
– PMI - Information Systems SIG
– PPDM Association - several years
File: Foil Identity Theft.PPT 3
Yogi Schulz
Foil Identity Theft
PresentationOutline
Origin of skyrocketing identity theft
Consequences ofidentity theft
Behaviors that reduce risk of identity theft
Recognizing when we have become identity theft victims
Recommendations
Questions & Answers
File: Foil Identity Theft.PPT 4
Yogi Schulz
Foil Identity Theft
The Bottom Line
Buy a cross-cut shredder
Use it for all documents that contain your name, address and account information that you’re ready to discard
Foil Dumpster Divers
File: Foil Identity Theft.PPT 5
Yogi Schulz
Foil Identity Theft
~ 250,000 Identity TheftComplaints in 2006
File: Foil Identity Theft.PPT 6
Yogi Schulz
Foil Identity Theft
2006
PROVINCES VICTIMS $ LOSS
ON 3,353 $7,584,188.86
PQ 2,040 $4,674,504.44
BC 1,190 $2,035,365.27
AB 612 $1,439,474.29
MB 249 $151,860.16
SK 94 $61,192.28
NS 106 $155,039.49
NB 67 $92,396.07
NF 29 $30,107.04
UNKNOWN 12 $3,102.62
PE 11 $17,059.00
NT 7 $3,102.62
YK 7 $2,379.23
NU 1 $0
TOTALS 7,778 $16,283,776.91
~ 8,000Identity TheftComplaintsin 2006
File: Foil Identity Theft.PPT 7
Yogi Schulz
Foil Identity Theft
How Does Identity TheftHappen?
Dumpster Diving– Rummage through trash looking for personal information
Skimming– Steal credit/debit card numbers when processing your card
Phishing– Send spam or display pop-up windows
Changing Your Address– Divert your billing statements to another address
"Old-Fashioned" Stealing– Steal wallets and purses, mail, personnel records
File: Foil Identity Theft.PPT 8
Yogi Schulz
Foil Identity Theft
Summary Case StudiesChange of Address
I moved apartments and submitted my change of address card at the Post Office branch nearest me.
Unfortunately, they did not forward my mail to my new apartment.
So when my mail was dropped at my old address, the people there just left it out in a common area where anyone walking by could take it.
Someone took my personal mail from my bank and then filled out credit card applications and sent them in my name.
When you move and fill out the change of address card, be sure to watch for a letter from the Post Office at your new address confirming that you've changed your address.
If you don't get such a letter within a couple weeks, be sure to check with the Post Office to make sure they indeed paid attention to your change of address card.
Send your own change-of-address letters to your bank, credit cards, magazines.
File: Foil Identity Theft.PPT 9
Yogi Schulz
Foil Identity Theft
Summary Case StudiesStolen Wallet
Recently, my wallet (including credit cards, driver's license, passport, and social insurance number) was stolen from my office. Within an hour, my credit cards were being used to buy pagers, car audio equipment, cigarettes, liquor, etc.
Within two days, a woman was opening bank accounts, buying cell phones and commencing cell phone service, and applying for credit in my name. The last two months have been a nightmare.
However, I am extremely fortunate, in that my identity thief was arrested by the California Highway Patrol (following an unrelated traffic stop), and is currently being prosecuted in ABC County for a number of identity-theft related crimes. I am one of the lucky ones: My identity thief was caught carrying all of my identification (in addition to the identification of a number of other people). She was also carrying checks she had attempted to write on the fraudulent accounts, ATM/check cards for the fraudulent accounts, and several other pieces of information linking her to the theft of my identity. Most disturbingly, when she was arrested, and later while in custody, she continued to insist that her name was "Kathleen Z."
Despite the fact that my thief was arrested a week and a half ago, I am still fighting to clear my name, and I still dread opening my mailbox or answering the phone. Just a few days ago I discovered that my identity thief used my name, driver's license, and a fraudulent ATM/Visa check card issued in my name to pay for a hotel stay. The issuer of the card had granted my thief a line of credit when she opened the fraudulent account, and persisted in honoring check card transactions despite a growing negative balance.
Just today I received another debt collection letter from Equifax Check Services, demanding payment of a bounced check written by my identity thief.
With two photo IDs and my social security number, this woman succeeded in completely disrupting my life, even though she looks nothing like me. I am only now beginning to put my life back together, although I am told that it will take years before I clear my credit reports of fraudulent inquiries and bounced check notices.
Just recently, I learned that there is a petty theft charge against me in the city of PQR, California, because my identity thief was caught shoplifting. My thief was not arrested at the time, but was instead issued a "ticket," in my name, with my driver's license number, my date of birth, but a different address. The police officer failed to notice that my thief misspelled my name when signing the ticket. If my thief had not been arrested later by the CHP, and if the PQR police had not run a check for my name in the course of executing a search warrant for a motel room the thief rented there in my name, I never would have learned that "I" have a date to appear in criminal court and answer to this charge, and a bench warrant would have been issued for me. (I still have not straightened all of this out, and as of now, I am still named as the defendant.)
One of the most disturbing aspects of all of this is that banks, credit card companies, and merchants facilitate identity theft through their policies and practices.
Cingular One approved my identity thief's application for credit and cell phone service despite the fact that I had placed fraud alerts with all three major credit reporting agencies.
Wells Fargo Bank permitted my identity thief to open an account in my name, using my photo IDs, and allowed her to withdraw $6,000 in cash, despite the fact that she had only deposited $100.
Washington Mutual Bank also opened an account for her in my name, using my photo IDs, without running a credit check other than with ChexSystems. Despite a deposit of only $20, and a negative balance which eventually grew to over $4,000, Washington Mutual continued to honor my identity thief’s transactions.
ChexSystems only provides banks with information regarding misuse of bank accounts (e.g., overdrafts). They do not inform inquiring banks of recent requests by other banks, or of fraudulent activity. Nor is it possible to add a "fraud alert" to one’s ChexSystems file. Consequently, when Washington Mutual Bank requested information about me, they were not told that Wells Fargo had requested information about me two weeks earlier.
Several stores approved credit card transactions despite the fact that my thief either didn't sign the credit card slips, spelled my name wrong, or signed in a manner that did not look anything like my signature on the back of my credit cards.
Still others allowed my thief to try credit card after credit card, until she found one that hadn't been reported stolen yet.
Several other merchants accepted checks from my thief despite the fact that the spelling of my name in the signature did not match the spelling printed on the fraudulent checks.
Numerous people accepted my photo ids without noting that this woman looks nothing like me, other than that we are both black and are both tall.
Instant survey:Who has theirsocial insurance numberin their purse or wallet?
File: Foil Identity Theft.PPT 10
Yogi Schulz
Foil Identity Theft
Yes, Ma’am, I’m calling from your local utilityto confirm some information, please . . .
Could I have your date of birth, social security number and any credit card numbers or bank account numbers, please?
File: Foil Identity Theft.PPT 11
Yogi Schulz
Foil Identity Theft
Origin of skyrocketing identity theft
Ubiquitous computerization of personal data– Business, Government
– School, Leisure
Replacement of cash by electronic payment– Debit cards, Interac
– Gift cards, E-mail money transfer
Creation of many personal profiles at web sites
PIPEDA to reduceidentity theft risk
Creates identity theft riskbanks are managing
Creates identity theft riskwe need to manage
File: Foil Identity Theft.PPT 12
Yogi Schulz
Foil Identity Theft
Consequences ofIdentity Theft
Loss of assets
Loss of credit rating until corrected
Huge effort to:– Undo the damage
– Correct the incorrect records
Frustration;feeling of being violated
Huge distracting hassle
File: Foil Identity Theft.PPT 13
Yogi Schulz
Foil Identity Theft
Real world behaviors that reduce identity theft risk
Shred paper with personalinformation
Give out your credit card number cautiously
Don’t sign up for “free” offers
Provide only the minimum information
Decline offers that are too good to be true
Minimize spread of personal information
File: Foil Identity Theft.PPT 14
Yogi Schulz
Foil Identity Theft
Web behaviors thatreduce identity theft risk
Share personal informationonly when browser lock is on
Don’t sign up for “free” offers
Delete suspicious e-mail
Manage your passwords
Proactively reduce snooping on your PC
Practice cautious web surfing
IE 6
IE 7
File: Foil Identity Theft.PPT 15
Yogi Schulz
Foil Identity Theft
Reduce Snoopingon your PC - 1
Install a router/firewall Delete browsing history
50% ofCable/DSL customersdo not have a router
File: Foil Identity Theft.PPT 16
Yogi Schulz
Foil Identity Theft
Reduce Snoopingon your PC - 2
Remove spyware Delete/block viruses
“Can’t you see,You need to do something here?”
File: Foil Identity Theft.PPT 17
Yogi Schulz
Foil Identity Theft
Detecting that we have become identity theft victims
Missing statements
Credit card company calls
Unexpected credit denial
Bank calls to ask an unexpected question
Businesses call
File: Foil Identity Theft.PPT 18
Yogi Schulz
Foil Identity Theft
Recovering fromIdentity Theft
Call the toll-free fraud number of a credit bureau– Place a fraud alert on your credit report
– Help prevent an identity thief from opening additional accounts in your name
Contact creditors to close any accounts that have been tampered with or opened fraudulently– Ask to speak with someone in the security or fraud department of
each creditor
– Follow up in writing
File a report with your local police– Get a copy of the police report in case the creditors, credit bureaus
or others need proof of the crime
File: Foil Identity Theft.PPT 19
Yogi Schulz
Foil Identity Theft
Conclusions
Small behavior changes will foil identity theft
You don’t have to become a victimof identity theft
File: Foil Identity Theft.PPT 20
Yogi Schulz
Foil Identity Theft
Recommendations
Buy a cross-cut shredder and use it
Be cautious on the Web and with your e-mail
Review your credit card statements
Buy your own credit history report and scrutinize it
Improve your PC defenses
Simple precautionsreduce risk dramatically
File: Foil Identity Theft.PPT 21
Yogi Schulz
Foil Identity Theft
Questions & Answers
Dogbert
will explain it
to you
File: Foil Identity Theft.PPT 22
Yogi Schulz
Foil Identity Theft
1800, 250 - 6th Ave. S.W.Calgary, Alberta Canada T2P 3H7
Phone: (403) 249-5255E-mail: [email protected]
Web: www.corvelle.com
President of Corvelle Management Consultants
Information technology related management consulting
Project management and systems development
Computing Canada & Microsoft columnist
PPDM Association board member
Foil Identity Theft
Management Consultants
File: Foil Identity Theft.PPT 23
Yogi Schulz
Foil Identity Theft
Major Anti-VirusSoftware Vendors
McAfee– us.mcafee.com
Symantec– www.symantec.com/index.htm
Trend Micro– www.trendmicro.com
File: Foil Identity Theft.PPT 24
Yogi Schulz
Foil Identity Theft
Major Spyware RemovalSoftware Vendors
Lava Soft - Ad-aware– www.lavasoftusa.com
Spybot Search & Destroy– www.safer-networking.org
Lava Soft - Ad-aware– www.lavasoftusa.com
Spybot Search & Destroy– www.safer-networking.org
File: Foil Identity Theft.PPT 25
Yogi Schulz
Foil Identity Theft
Bibliography - 1
Consumer Sentinel– www.consumer.gov/sentinel
Equifax Canada - Identity Theft Page– learn.equifax.com/cs/Satellite?
c=DS_General_Cont_C&childpagename=DecisionSimple%2FDS_General_Cont_C%2FDSSecurityTemplate&cid=1162911749279&pagename=DecisionSimple%2FPage%2FDSLayoutTemplate&ParentLinkID=1162919652622&ParentArticleID=1163017991036
Fighting Back Against Identity Theft– www.ftc.gov/bcp/edu/pubs/consumer/idtheft/idt01.htm
Fraud and Identity Theft – www.vaonline.org/fraud.html
FTC Identity Theft– www.ftc.gov/bcp/edu/microsites/idtheft
Help keep spam out of your inbox– Tips for Reducing and Managing Junk E-Mail– www.microsoft.com/athome/security/email/fightspam.mspx
File: Foil Identity Theft.PPT 26
Yogi Schulz
Foil Identity Theft
Bibliography - 2
Interac Association– en.wikipedia.org/wiki/Interac
Identity Theft Resource Center– www.idtheftcenter.org
Identity Theft – Alberta– www.servicealberta.gov.ab.ca/pdf/tipsheets/Identity%20theft.pdf
Identity Theft - What to do if it happens to you– www.gs.gov.nl.ca/cca/tpl/pdf/id-theft/id-theft-per-steps.pdf
Personal Information Protection and Electronic Documents Act (PIPEDA)
– privacyforbusiness.ic.gc.ca/epic/internet/inpfb-cee.nsf/en/Home
PhoneBusters– www.phonebusters.com/english/index.html
Privacy Commissioner of Canada– www.privcom.gc.ca/fs-fi/02_05_d_10_e.asp
File: Foil Identity Theft.PPT 27
Yogi Schulz
Foil Identity Theft
Bibliography - 3
Privacy Rights Clearinghouse– www.privacyrights.org
RCMP - Identity Theft– www.rcmp-grc.gc.ca//scams/identity_theft_e.htm
Recovering From Identity Theft– www.insideid.com/idtheft/article.php/3438261– www.simplejoe.com/article-recovering-from-identity-theft.htm
Stop Thieves from Stealing You– Consumer Reports, October 2003, p. 12
What is Identity Theft? - Ontario– www.gov.on.ca/MGS/en/ConsProt/STEL02_045992.html