Identity Theft - If you are me, then who am I

22
If you are me, then who am I? The Who, What, When, Why and How of Identity Theft.

Transcript of Identity Theft - If you are me, then who am I

Page 1: Identity Theft - If you are me, then who am I

If you are me,then who am I?

The Who, What, When, Why and How of Identity Theft.

Apolonio Garcia
Want to see this answer broken up into two parts: 1) how to prevent ID theft, 2) how to respond when you suspect ID theft.
Unknown
Apps - please take a look at the information I added and let me know of any changes you want.
Apolonio Garcia
Can you give me a few interesting real world examples?
Unknown
I used Target and Anthem - are there others you had in mind?
Page 2: Identity Theft - If you are me, then who am I

Who I am, what I do.

Apolonio “Apps” Garcia

Page 3: Identity Theft - If you are me, then who am I

I am NOT a ...and this is NOT

Official Disclaimer

Page 4: Identity Theft - If you are me, then who am I

Agenda

What is identity theft?

Who wants to be me?

Why do they want my information?

How do they get my information?

What can I do about it?

Page 5: Identity Theft - If you are me, then who am I

What is Identity Theft?

The fraudulent acquisition and use of a

person's private identifying information,

usually for financial gain.

Page 6: Identity Theft - If you are me, then who am I

Became a Federal Crime on October 30, 1998 Identity Theft and Assumption Deterrence Act of 1998

Page 7: Identity Theft - If you are me, then who am I

12.6 Million

Source: Federal Trade Commission

Page 8: Identity Theft - If you are me, then who am I

Breach Identity Theft

Page 9: Identity Theft - If you are me, then who am I
Page 10: Identity Theft - If you are me, then who am I

Who Wants to Be Me?

“A stolen identity is a powerful cloak of anonymity for criminals and terrorists… and a danger to

national securityand private citizens alike.”

Page 11: Identity Theft - If you are me, then who am I
Page 12: Identity Theft - If you are me, then who am I

24 year old Donald Batiste ran a credit repair company in Louisiana that used Synthetic Identity Fraud to obtain over $5M in loans and merchandise.

Page 13: Identity Theft - If you are me, then who am I

In a Louisiana state prison,

Thompson started stealing a raft of personal information from more than 61 individuals, churches, financial institutions, and businesses. That information enabled him to steal from the victims’ bank accounts and use their credit to buy big-ticket items—like appliances, cell phones, and big-screen TVs. He even attempted to purchase a luxury SUV.

Page 14: Identity Theft - If you are me, then who am I

The Professional Hackers:

Russian Hackers1.2 billion user name and password combinations and more than 500 million email addresses

Target Breachnames, mailing addresses, phone numbers or email addresses for up to 70 million individuals.

Anthem Breachnames, birthdays, medical IDs, Social Security numbers, street addresses, e-mail addresses and employment information

Page 15: Identity Theft - If you are me, then who am I

Personal Theft is More Common Than You Think

Identity Theft from Someone You Know

Page 16: Identity Theft - If you are me, then who am I

What Information do they want?

Names Social

Security numbers

Dates of birth Medicare numbers

Addresses Birth certificates

Death certificates Passport numbers

Passwords Telephone numbers

Financial account numbers

Biometric data (like fingerprints, iris scans)

Apolonio Garcia
Would like to see more examples of how the bad guys use / benefit from stolen identities.
Unknown
Please see slide 23 - is that what you had in mind?
Page 17: Identity Theft - If you are me, then who am I

How do they get my Information?

Let’s try it ourselves...

Page 18: Identity Theft - If you are me, then who am I

How do they get my Information?

Smishing Scam Audio

Page 19: Identity Theft - If you are me, then who am I

Try to Take Easy Steps to help PREVENT Identity Theft

Page 20: Identity Theft - If you are me, then who am I
Page 21: Identity Theft - If you are me, then who am I

IT HAPPENED!What To Do Right AwayAct quickly to limit the damage.

Step 1: Call the companies where you know fraud occurred.Step 2: Place a fraud alert and get your credit report.Step 3: Report identity theft to the FTC.Step 4: File a report with your local police department.

Page 22: Identity Theft - If you are me, then who am I

What To Do NextTake a deep breath and begin to repair the damage.