• No results found

Alameda County Office of the District Attorney. Nancy O Malley District Attorney

N/A
N/A
Protected

Academic year: 2021

Share "Alameda County Office of the District Attorney. Nancy O Malley District Attorney"

Copied!
73
0
0

Loading.... (view fulltext now)

Full text

(1)

Alameda County

Office of the

District Attorney

Nancy O’Malley

District Attorney

(2)

Mission Statement

To review and prosecute criminal

violations of the laws, to protect

consumers and the environment

and to support and protect victims

of crime within the County on

behalf of the people of the State of

California.

(3)

IDENTIFY THEFT:

Don’t YOU be a Victim

(4)
(5)

STEALING THE OLD

FASHIONED WAY

• Small gain, great risk

• Victim can ID you

• Victim can fight back

• Police can chase you

• Gun enhancements

• “Strike” charges

(6)

STEALING VIA ID THEFT

• High profit- low risk

• No victim contact • No weapon use • Police undermanned and overwhelmed • If caught- probation or misdemeanor

(7)

“Stop. Think. Connect.”

Campaign

STOP

Before you use the internet, take time to

understand the risks and learn how to

spot potential problems.

(8)

“Stop. Think. Connect.”

Campaign

THINK

Take a moment to be certain the path

ahead is clear. Watch for warning signs

and consider how your actions online

could impact your safety, or your

family’s.

(9)

“Stop. Think. Connect.”

Campaign

CONNECT

Enjoy the Internet with greater

confidence, knowing you’ve taken the

right steps to safeguard yourself and

your computer.

(10)

Cybersafety

The rules and behaviors designed to keep

individuals safe whenever they are connected to the internet.

(11)

Ask yourself:

• WHO is asking for my personal information?

• WHAT information is requested?

• WHY do they need this personal information?

(12)

Stranger Danger!

• Don’t chat online or exchange emails with strangers

• Don’t accept strangers into your Facebook or other online profiles

• Don’t share information about yourself in strangers in other forums

(13)

Stranger Danger!

• Don’t put personal information in public postings

eg. where you live, work, go to school

• Don’t leave your mobile devices where other people can access them

(14)

Cybercrime

• Stealing, trading, or making illegal copies of music and software

• Using stolen credit cards to make purchases

• Identity theft, pretending to be someone you’re not

(15)

Mobile devices

• Greater risk for theft or loss

• There’s an app for everything – do you know where your information is going?

• Cell phones are now accessible by hackers

• Many phones have settings and capture

information that tells the world where you are and have been

(16)

THINK….

(17)

ID THEFT - DEFINITION

Obtaining the “Personal Identifying Information” of another person AND using it to do something illegal. PC 530.5

(18)

COMMON EXAMPLES:

•Victim’s credit card used to make fraudulent purchases.

•Victim’s “PII” used to fraudulently open an account.

•Victim’s “PII” used to manufacture

(19)

Lawyer scammed out of $182,000 in

check-fraud scam

Lawyers Warned to Be

(20)

Lawyer scammed out of $182,000 in

check-fraud scam

•Houston lawyer;

•Law firm was scammed out of $182,500;

•Client who contacted and hired him through e-mail

(21)

PERSONAL IDENTIFYING

INFORMATION - PC 530.55(b)

Name and address.

Telephone number.

Driver's license number.

Social security number.

Place of employment.

Employee identification number.

Government passport number.

(22)

PERSONAL IDENTIFYING

INFORMATION – PC 530.55(b)

Mother's maiden name.

Demand deposit account number.

Savings account number.

Credit card number.

PIN or password.

Unique biometric data like fingerprints.

Voice print.

(23)

WHO IS A “PERSON” ?

PENAL CODE §530.55(a)

• Natural Person (living or deceased)

Firm

Association

Organization

Partnership

Business trust

Company or Corporation

Limited liability company

Public entity
(24)

KEY COMPONENT OF

THE CRIME

Acquisition of personal

identifying information

(25)
(26)

HOW DO IDENTITY THEIVES

GET PII

(27)
(28)

Jury Scam Alert

The Administrative Office of the Courts has seen

a recent resurgence in use of a jury identity theft scam. More than a dozen states-including

California-have issued public warnings about calls from people claiming to be court officials

seeking personal information.

The Federal Bureau of Investigation is aware of the scam and cautions people

(29)

Jury Scam Alert

The Administrative Office of the Courts and Staff of the superior courts will never ask

past or prospective jurors for

financial details, credit card numbers, bank account or personal information like Social Security numbers.

Please do not provide this type of information

(30)

COMPUTER HACKING

• CheckFree Corp. (Atlanta, GA)

• Their electronic bill payment service was compromised & criminals took control of several of the company's Internet domains and redirected customer traffic to a malicious Web site hosted in the Ukraine.

• This breach was reported in 12/3/08.

• 5,000,000 accounts/records compromised

(31)
(32)

WIRELESS ACCESS POINTS

• Risk #1 – Exposure of data on computer. • Risk #2 – Exposure of data to & from WAP. • Risk #3 – Unauthorized use of your WAP. • Solution = WAP security i.e. lock down!

(33)

WAP SECURITY TIPS

1. Change WAP default name.

2. Change WAP administrator password.

3. Enable WAP’s encryption feature.

4. Enable MAC address control (PC adapter card).

5. Download WAP software updates for patches.

(34)

LAPTOP COMPUTER LOST

• US Army

• Security breach regarding PII stored on a lost laptop computer affecting more than 6,000

beneficiaries. Names, Social Security

numbers and health information was stored on the laptop.

(35)

LAPTOP COMPUTER STOLEN

• Starbucks Corp. (Seattle, WA)

• A laptop containing private information on employees was stolen. The

information included names, addresses and Social Security numbers.

(36)

UNWIPED COMPUTER

GIVEN TO 3

RD

P

• Law office of former Texas attorney

• Used computer and memory stick purchased from a pawn shop. Contained PII traced back to law office of a Texas attorney who no

longer practices law. The attorney is now a Texas State Representative.

(37)

HIGH-TECH METHODS OF

OBTAINING PII

Credit card skimmers.

Bluetooth skimmers on atm’s, gas pumps...

Hacking unsecured wireless networks (goal:

data of connected computers).

Phishing scams.

(38)

HIGH-TECH METHODS OF

OBTAINING PII

(39)
(40)

HIGH-TECH METHODS OF

OBTAINING PII

•Recently, Lucky’s Stores hit by use of skimmer on the ATM

(41)
(42)
(43)
(44)
(45)
(46)
(47)

LOW-TECH METHODS

OF OBTAINING PII

• Mail theft

• Theft wallets, purses & other personal property

• Residential & auto burglary

• Dumpster diving & garbage

• Social engineering via phone

• Insider employee theft

(48)

NEGLIGENT DISPOSAL OF

DOCUMENTS WITH PII

Pinellas County & Florida state

agency offices

Documents with Social Security

numbers, medical information and

PII found in trash containers at

government buildings.

***privacyrights.org
(49)

NEGLIGENT DISPOSAL OF

DOCUMENTS WITH PII

Hundreds of improperly discarded

records were found including

medical data, privileged

communications between attorneys

and clients, juvenile defendant

records and child abuse materials.

(50)

PEOPLE V. TROY THOMAS

(PII obtained via murder)

Victim was executed at his home

by defendant (def)

After killing the victim, def

spent 3 hours organizing v’s pii

for use

(51)

PEOPLE V. TROY THOMAS

(PII obtained via murder)

Def’s plan: transfer all of v’s assets

into his name

Def was caught after falling asleep

in v’s car w/ the dead body in the

backseat.

(52)

PENAL CODE §530.5

3 METHODS OF VIOLATING

1. Use of PII - PC 530.5(a)

2. Acquire/retain PII – PC 530.5(c)(1)–(3)

(53)

COMMON WAYS PII IS USED

Create counterfeit

identifications

Credit card account takeovers

(54)

COMMON WAYS PII IS USED

Open new bank accounts

Make/negotiate counterfeit

checks

(55)

COMMON WAYS PII IS USED

Purchase vehicles/real estate

Bankruptcy filings – automatic

stay

(56)

SAMPLE CASE

PEOPLE V. JOHN DOE

• Police received an informant tip that Mr. Doe was involved in identity theft.

•The informant revealed that Mr. DOE WAS GENERATING IN EXCESS OF $1,000,000 A YEAR MANUFACTURING CHECKS, ids, ETC.

•After further investigation, police obtained a search for Mr. Doe’s residence.

(57)

EVIDENCE RECOVERED

DURING THE SEARCH

•2007 Ferrari purchased using an ID Theft victim’s PII.

•Mortgage documents showing house purchase using ID Theft victim’s PII.

•$1,200,000 cash.

•Over 500 counterfeit identifications.

(58)
(59)
(60)
(61)
(62)
(63)
(64)
(65)

REDUCING THE RISK

• Accept reality - your PII is an asset.

• Proactively securing your “PII” by reducing access to it.

• Secure your “PII” in safe place.

• Use secure mailboxes.

• Safeguard your personal property, such as wallets & purses.

(66)

REDUCING THE RISK

• Use a credit card instead of a debit card.

• Use a security freeze to block your credit block profile.

• Do not use common passwords/pins, such as birth date, maiden name, etc.

• Don’t give out your “pi” over the phone unless you know the caller.

• Check your credit report every 3 months to verify no fraud activity.

(67)

BASIC 4 STEPS IF

VICTIMIZED?

• File a police report in city where you reside or place of business.

• Contact the merchant/issuer of credit to close line of credit.

• Contact the 3 credit bureas. (Experian, trans union & equifax)

• CONTACT THE FEDERAL TRADE

COMMISSION AT 877-438-4338 OR ONLINE AT http://www.Consumer.Gov/idtheft.

(68)

ID THEFT VICTIM RIGHTS

OVERVIEW

1. File an identity theft police report.

PC 530.6(a) - City of residence or place of business

2. Obtain copies of documents related to the fraud. PC 530.8(a) www.oispp.ca.gov

3. Remove fraudulent information from credit files. CA Civil Code 1785.16 et seq, Fed. Fair Credit Reporting Act, etc.

(69)

ID THEFT VICTIM RIGHTS

OVERVIEW

4. Right to receive up to 12 free credits reports (1 per mo). 1 Year from date of police report. CA CC 1785.15.3(b)

5. Right to stop debt collection on fraud transactions. CA CC 1788.18

6. Right to sue or assert a defense regarding ownership of property obtained through identity theft.

(70)

ID THEFT VICTIM RIGHTS

CRIME COMMITTED IN VICTIM’S NAME

7. Expedited Superior court hearing and judge’s order finding victim factually innocent.

-Criminal record then deleted, sealed or labeled fraud. -PC 530.6

8. Listing in CA DOJ Identity Theft Victim Registry. -PC 530.6 & PC 530.7

(71)

VICTIM RESOURCES

Free credit reports annually.

www.annualcreditreport.com

Obtaining security freezes.

www.transunion.com

www.equifax.com

www.experian.com

Victim information and forms. www.ftc.gov

(72)
(73)

Questions?

The Alameda County District Attorney’s Office

Nancy E. O’Malley, District Attorney

Phone: (510) 272 – 6222 Email: info@acgov.org

http://www.Consumer.Gov/idtheft.

References

Related documents

Restricted information includes passwords and PINs, Social Security Numbers, credit card and financial account numbers, credit check information, FERPA-protected student

Sensitive information is defined as any personal information (i.e.- Social Security number, driver’s license number, bank account, credit card numbers, etc.) or company

card, bank account, or Social Security numbers to a caller. For assistance call the Okaloosa County Sheriff’s Office Fraud

In addition, attribution of the dramatic effect of this single residue “switch” on product outcome to electrostatic stabilization of the ent-pimarenyl carbocation intermediate

In accordance with the decisions taken at Higher Education General Meeting dated on 13.02.2013, foreign students will be admitted to Necmettin Erbakan University based on the

There are no potential significant threats associated with operation of a waste disposal site with regards to the storage, treatment and discharge of tailings from mines in the

Technician staff was sent to a local community college pharmacy technician training program and were required to take a certification

Many service providers are positioning themselves incorrectly to offer their customers the benefits of IaaS which include: less wasted time on managing and monitoring It