• No results found

Fraud and Identity Theft. Megan Stearns, Credit Counselor

N/A
N/A
Protected

Academic year: 2021

Share "Fraud and Identity Theft. Megan Stearns, Credit Counselor"

Copied!
40
0
0

Loading.... (view fulltext now)

Full text

(1)

Fraud and Identity Theft

(2)

Agenda

• Fraud and identity theft statistics • Fraud

• Identity theft

• Identity theft prevention

• Protecting your Social Security Number • Online prevention

(3)

Indiana Fraud and Identity Theft

Statistics

• In 2013, Indiana ranked 35th in the U.S. for

(4)

U.S. Fraud and Identity Theft Statistics

• In 2013, Florida ranked 1st in the U.S. for both

fraud and identity theft complaints.

(5)
(6)
(7)

Types of Fraud Scams

• Skimming • Email phishing • Phone phishing • Data breaches • Check scams – Internet sales – Lottery scams

(8)

Skimming

• Thief swipes your debit or credit card through a hand-held device

• Thief installs an overlay device on an ATM

– These devices glean information off the magnetic strip on the back of the card

• Name, account number, expiration date, and security features

(9)

Skimming

(10)

Email Phishing

• Email messages are sent that try to trick you into clicking on a link to reveal your financial and personal information

– Sense of urgency

– State account will be closed or restricted if you do not take action

• Purdue Federal CU or any legitimate

(11)

Email Phishing

• What to do:

– Do not reply

– Do not click on links

– Do not open attachments

– Do not provide personal or financial information via email

– Use anti-virus software and firewall protection

– Contact the Federal Trade Commission (FTC) if you have been scammed

(12)

Phone Phishing

• Technology is used to create a legitimate

sounding copy of a financial institution’s message • Number will show up on your caller ID as the

financial institution

• Message will state your card has been compromised

• You will be prompted to verify the card number and PIN to re-activate

(13)

Data Breach

• When information has been subject to unauthorized access

– The information is usually lost, stolen, or hacked into

• Merchant processors • Lost tapes

(14)

Types of Check Scams

• Internet sales • Lottery scams

(15)

Internet Sale Scam

• Buyer sends you a larger check than expected • You are instructed to wire excess funds

through Western Union or Money Gram • Original check is counterfeit and returned

(16)

Lottery Scams

• Receive an email or piece of mail notifying you that you’ve won the lottery

• Cashiers check, commercial check or U.S. Treasury check is received

• Check is larger than expected or you owe taxes • Instructed to wire out the difference

• Original check is returned as counterfeit

(17)

Email and Fax Solicitations

• Commonly known as Nigerian scams

• Your help is requested to move funds from fraudster’s country to the United States

• Need your account number to hold the money • Money is withdrawn from your account

(18)

Secret Shopper Scams

• Receive a letter and a check

– Instructed to cash the check and make several detailed purchases over the next few days

– Usually one or two of the purchases involves wiring funds out via Western Union or Money Gram

• Check returned as counterfeit

(19)

Helpful Tips

• Do not accept checks over the purchase price • Do not wire out any excess funds

• Verify contact information provided for checks received

• Do not respond to emails asking for personal or financial information

(20)

What is identity theft?

• Occurs when someone assumes your identity by using:

– Your date of birth

– Social Security Number – Photo identification

(21)

What is identity theft?

• Impact on victims

– Damaged credit record – Loss of job opportunities

(22)

What is identity theft?

• Impact on consumers

– Cost of fraud reduces profit margins for companies

(23)

How do fraudsters obtain your

information?

• Stealing your wallet/ purse

• Stealing your statements from your mailbox • Diverting your mail to a new address

• Digging through the trash • Phishing scams

• Compromised debit or credit cards from a data breach

(24)

How do fraudsters use your personal

information?

• Open new accounts in your name and go shopping

– Accounts then reported as delinquent on your credit report

• Call your creditors and change your billing address

• Take out loans, buy cars, get utility services in your name

• Authorize electronic transfers to drain your account

(25)

ID Theft Prevention

• Do not give out your personal information • Store all personal information in a safe place • Safeguard wallets, purses, checkbooks, and

account statements – at home and at work • Protect your PINs and other passwords

• Guard against shoulder surfers • Carry only a minimum amount of

(26)

ID Theft Prevention

• Review statements and account activity on a regular basis

• Pay attention to billing cycles

• Sign up for fraud alert services provided by your financial institutions

• Sign up for e-statements, direct deposit, and online bill pay

(27)

ID Theft Prevention

• Opt out of preapproved credit offers by calling 888. 5 OPT OUT or online at

www.optoutprescreen.com

• Mail bills from a locked mailbox or Post Office • Stop mail if you’re out of town

(28)

ID Theft Prevention

• Review your credit report

– Make sure you recognize all the accounts – Make sure you recognize all addresses – Review your report at least annually

– You are entitled to one free credit report a year from each of the three credit bureaus

(29)

ID Theft Prevention

• Review your credit report

– www.annualcreditreport.com

– 877.322.8228

– Annual Credit Report Request Service P.O. Box 105281

(30)

Protect Your Social Security Number

• Ask “Why do you need it?”

• Don’t carry Social Security card in your wallet, unless you need it that day

• Don’t use last 4 digits of SSN as a PIN

– Memorize PINs

• Don’t let clerks write SSN on checks as ID • Don’t have SSN preprinted on checks

(31)

Protect Your Social Security Number

Must give SSN

• Credit unions/ banks • Employers

• Income tax records • Loan applications

• Credit bureau reports • College records

May want to refuse

• Over the phone

• On personal checks • On club membership • As ID for purchases

(32)

Online Prevention

• Don’t click on links within email messages from unknown sources

• Look for https:// in the URL

• Use up-to-date antivirus and firewall software • Avoid emailing personal and financial

information

(33)

Online Prevention

• Shopping

– Shop only with companies you know

– Pay only with a credit card or third-party intermediary

– Consider having a credit card designated for online only purchases

– Watch for URL to change from http:// or https:// – Use a secure browser

(34)
(35)

What to do if you are a victim

• Contact the Federal Trade Commission (FTC) Identity Theft Hotline

– 877.ID.Theft (877.438.4338) – www.consumer.gov/idtheft

• The FTC will put your information into a

(36)

What to do if you are a victim

• Contact your financial institutions and creditors

• Follow each conversation with a certified letter, return receipt requested

– Keep copies

• Close your accounts if possible

(37)

What to do if you are a victim

• File a police report

• Keep a copy of the report and case number for your records

• Contact the fraud departments of all three credit bureaus

(38)

What to do if you are a victim

• Credit bureau contact information

(39)
(40)

Megan Stearns

Email: [email protected] Phone: 765.497.7455

References

Related documents

A systematic review of allostatic load in relation to socioeconomic position: poor fidelity and major inconsistencies in biomarkers employed..

Jackrabbits Colors ...Yellow and Blue Conference ...Western Wrestling Conference Air Force, North Dakota State, Northern Colorado, Northern Iowa, South Dakota

These include a Git-based revision control system for tracking the code evolution during the typical performance tuning cycle, an environment detection tool for capturing the

 If Arc Pro Server is installed on the same blade as (is co-resident with) another Cisco application, including Cisco Unified Communications Manager and Unity, the Arc Pro

When a listener expresses the perception of meaning in a musical piece, her report stems from the existence of these two sorts of mental states in the mind:

A. If you are a victim of identity theft, the Fraud Assist Toolbox can help you with several of the most common types of fraud tactics, such as identity theft related to credit

up or shred credit card statements; ABM, credit, or debit card receipts; bank deposit receipts; loan solicitations; and other documents that contain personal financial

• Purchase a shredder and destroy unneeded credit card offers, receipts, bank statements, credit card bills, and any other documents that contain personal information that