1 / 50

Avoiding Fraud

We’re all about YOU!. Avoiding Fraud. Session Objectives Fraud & Scams How to protect yourself What to do if you are a victim Additional Information. Identity Theft It occurs when someone uses your: Name Social Security number Other identifying information … without your permission,

orla-greene
Télécharger la présentation

Avoiding Fraud

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. We’re all about YOU! Avoiding Fraud

  2. Session Objectives • Fraud & Scams • How to protect yourself • What to do if you are a victim • Additional Information

  3. Identity Theft It occurs when someone uses your: • Name • Social Security number • Other identifying information … without your permission, to establish new accounts in your name.

  4. How many victims? • 2003 – 10.1Million • 2004 – close to 9.8Million • 2005 - 9.3 Million • 2006 - 8.9 Million • 2007 - 8.4 Million • Privacy Rights Clearing House

  5. How can this impact YOU? • Damaged credit record • Loss of job opportunities • Refused loans: • education, housing, or cars • Spend months or years cleaning up the mess • Mean fraud amount per victim:2007:$5,720 2006: $6,383 2005: $5,993 • No. of hours spent resolving problems:2007:25 hours 2006: 40 hours 2005: 28 hours • Worst-case scenario: Victim is arrested

  6. Who is most vulnerable? • Ages 18-24 • Suburban residence • Income ≥ $75,000 • Ongoing problems: 1/5 of the victims • Justice department

  7. How do crooks get your information? Misuse by family/friends Lost/stolen wallets Theft from mailboxes; dumpster diving Others (less common): Steal records from employer Shoulder surfing at ATMs or phone booths Pose as landlord to obtain credit report Fill out change of address to divert mail Phishing/ Pharming / Vishing

  8. A crook has your info. Now what? Use your name to: • Open new accounts • change billing address • ring up charges before your mail catches up to you • Take out loans, buy a car, or establish phone service • Authorize electronic transfers • drain your account • File for bankruptcy to avoid paying debts • Pretend to be you during an arrest

  9. Skimming Switched Collect Clone

  10. Skimming Devices

  11. Pretexting Use of • False • Forged • Counterfeit • Lost • stolen Information to get a customer’s information from a financial institution Common tactic: pose as a survey firm

  12. When can you give out your SSN? Give out SSN to: Give out SSN to: • Credit unions/banks • Employers • Income tax records • Loan applications • Credit bureau reports • College records • Over the phone • On personal checks • On driver’s license • On club membership • As ID for store purchases • As general identification

  13. How to order your free credit report • Get one free report per year from each agency: • annualcreditreport.com • Call 877-322-8228 • Send request form to: (read envelope) • It’s also free if you’re: • Denied credit within the past 60 days • Victim of identity theft • Welfare recipient • Unemployed and job-hunting • Resident of CO, GA, ME, MD, MA, NJ, and VT • Annual Credit Report Request Service • P.O. Box 105281, Atlanta, GA • 30348-5281

  14. What is spamming? Sending unsolicited e-mail indiscriminately to multiple mailing lists, individuals, or newsgroups

  15. What is spoofing? Creating a replica of a legitimate Web page to fool you into submitting personal, financial, or password data

  16. What is phishing? Luring victims to a fake web site through spam. See current scams at antiphishing.org

  17. It’s probably a phishing attack! Beware e-mail messages that: • Use a generic greeting • (“Dear Visa customers” or “Dear friend”) • Refer to an urgent problem • State that your account will be shut down unless you reconfirm your billing information • Urge you to click on a link within a message you weren’t expecting Phishing in the World

  18. Pharming • Practice of redirecting Internet domain name requests to illegitimate Web sites. • To capture your personal information and commit ID theft. • Differs from phishing in how you’re redirected.(through technical means)

  19. Pharming can occur 4 ways • Static domain name spoofing(Misspellings: vvestcu.org vs. westcu.org) • Malicious software—Malware(Viruses and Trojans redirect you to the false site) • Domain hijacking(Hacker hijacks legitimate site and redirects all traffic) • DNS poisoning (most dangerous)(You enter correct URL, but poisoned server redirects)

  20. Even if there are no warning signs You should: • Check your credit report anyway! • Beware of e-mails and web sites offering “free” credit reports • Don’t give your SSN just to get a free report

  21. If you are a victim • Place fraud alert on your credit reports. • Contact FTC’s ID Theft Hotline at 877-IDTHEFT. • Close affected accounts. Use FTC’s “ID theft affidavit” at ftc.gov/idtheft. • Follow each conversation with a certified letter, return receipt requested; keep copies. • File a police report where ID theft took place. • Get copies of police reports and send to creditors.

  22. The “Big Three” Credit Reporting Agencies Experian Order report: 888-397-3742 Fraud Unit: 888-397-3742 experian.com TransUnion Order report: 800-888-4213 Fraud Unit: 800-680-7289 transunion.com Equifax Order report: 800-685-111 Fraud Unit: 800-525-6285 equifax.com

  23. What else do you need to know?

  24. Internet Fraud – Shop Safely Online • Shop only with companies you know. • Pay only with credit card, or with third-party intermediary • you have some protections if merchandise is defective, not as described, or is not received at all • URL must change from http:// to https://. • Track online purchases easily: Use separate credit card • Use secure browser (look for closed padlock or unbroken key at bottom of browser window—not payment page).

  25. Protect Yourself Online – Social/Networking Websites • Myspace, Facebook, Linkedin, and others • do not show your address, phone number, or other personal information • Use the privacy settings so people only see what you want them to see • Only accept people you know • Beware the applications when asking for information could be made by crooks

  26. Protect Yourself • On the Phone • Ask why they need it • Never give out personal info or authorize payment (unless you initiated the call and trust the company) • Hang up if necessary • Online Transactions • Make sure it is secure – https:// and a closed padlock • Verified by VISA and/or MasterCard’s Secure Code • Shred • All documents with personal/financial information

  27. Protect Yourself • Review statements and credit report • Annually – credit report • Account statements: by mail – monthly; online – more often • Mail • Mail from locked mailbox or post office • Stop mail while out of town • Shoulder Surfers • Be aware of your surroundings

  28. Protect Yourself • E-mail • Only open attachments you are expecting • Do not click on links from unfamiliar senders • Use strong passwords (letter- both upper and lower, numbers and symbols) • Avoid automatic log-in • Computer • Install and keep updated • Virus software • Firewall software • Spyware detection/removal • Spam blocker – antiphishing.org • Secure browser – for online transactions

  29. Protect Yourself • Passwords • Don’t use recognizable information (age, phone number, SSN, birthday) • Memorize them – do not keep them written down • Safeguard – all personal information (SSN card, bank statements, checks, purse) • Do not carry it around with you • Personal Information • Give out on a need to know and trusted basis • Do not leave receipts • They can contain your credit card information

  30. Protect Yourself • Keep name off prescreened lists • 888-5opt-out • Optoutprescreen.com • Electronic deposit • Paychecks, dividends, pension, SS payments, and tax refunds

  31. Useful Purchases • Cross cut shredder • Prices $40 and up • Shred paper, cds, credit cards • Top brands and prices: • Anti-spy ware software • McAfee • Symantic • Webroot

  32. Check Fraud • The manipulation of checks to deceive an innocent victim expecting value in exchange for their money • http://www.ckfraud.org/ckfraud.html#check

  33. or could cost you plenty! Every day, thousands of Americans receive sweepstakes offers, but not all of them are legitimate. How can you tell the difference between a real sweepstakes and a scam? Legitimate sweepstakes are fun andfree. They specify that no purchase is needed to win and buying a product will not increase your chances of winning--you never have to pay to collect a prize. Remember: You do not have to pay to enter a sweepstakes or collect a prize. If you're asked to pay, the sweepstakes is a scam.

  34. Credit Card Fraud Fraudulent use of another person’s credit card and number

  35. Telemarketing Fraud refers to any scheme to defraud in which the persons carrying out the scheme use the telephone as their primary means of communicating with prospective victims and trying to persuade them to send money to the scheme.

  36. More Resources Federal Trade Commission CRC-240 Washington, D.C. 20580 877-IDTHEFT (toll-free) www.consumer.gov/idtheft • Better Business Bureau • bbbonline.org • Anti-Phishing Working Group antiphishing.org • Privacy Rights Clearinghouse • privacyrights.org

  37. SCAMMED! The news of my father death, and my uncle,s involvement in an air crash in december 2002 while on a business trip to benin republic caused my mother heartfailure and other related complications of which she later died in the hospital After we have spent a lot of money on her. Before our mother died, she told us that our father deposited some money which he made from diamond sales and contracts at this bank here in Ivory Coast and that we should pray and find a trust worthy foreign business partner who would help us to transfer and invest this money in profitable business venture overseas.She told us to do this quickly so that we can leave Ivory Coast and, then settle down abroad. She gave us the bank document to prove the deposit and then told us that my father used my name as the next of kin and beneficiary to the money in the bank in the event of his death. If you are willing to assist us, please let us know immediately so that you will arrange the transfer of the money to your account with the bank. What’s Going on Here? What’s Going on Here? 5-N 1 2

  38. What should you do? 1 of 7 Dealing With Deception You walk up to an ATM and a guy who appears to be waiting his turn walks up behind you. But he’s uncomfortably close—right over your shoulder—as you get ready to enter your PIN. 5-O-1

  39. What should you do? 2 of 7 Dealing With Deception You’re at a cash register in a store and have given the clerk your credit card. She holds on to it, probably to verify your signature. But then she says she needs to grab something from the back and starts to walk away with your card in hand. 5-O-2

  40. What should you do? 3 of 7 Dealing With Deception A caller says she’s from your credit card company and wants to offer you a higher credit limit for being such a good customer. You reply, “Great, what do I have to do?” And she tells you to give her your Social Security number for verification. 5-O-3

  41. What should you do? 4 of 7 Dealing With Deception You’ve found a pair of shoes at a great price on a Web site you just found. You start the check-out process and notice that the padlock at the bottom of your computer screen is open and that the Web page address starts with “http” instead of “https.” 5-O-4

  42. What should you do? 5 of 7 Dealing with Deception • You get an E-mail from an online bookstore you frequently buy from. It says that the credit card on your account has expired and gives you a link to update your information. 5-O-5

  43. What should you do? 6 of 7 Dealing With Deception Your friend sends you an E-mail about cool new software that lets you share music with others for free. He sends you the link to download the software, which is from a site you’ve never heard of. 5-O-6

  44. What should you do? 7 of 7 Dealing With Deception You’re upset about losing in an online auction. But then you get an E-mail stating the winner backed out and that you can have the item if you still want it, and to just send your credit card information via E-mail. 5-O-7

More Related