Académique Documents
Professionnel Documents
Culture Documents
Identity Theft
Module 10
Simplifying Security.
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
05/16/2011,11:16:54AMPDT
OaklandPoliceShutDownBayAreaWideIdentityTheftOperation
OAKLAND Callingitthebiggesttheyhaveseen,OaklandpolicesaidMondaythatanidentitytheftoperationthat
manufacturedphonychecks,IDs andcredit cards hasbeenshutdown.
OfficialssaidtherearepotentiallythousandsofvictimsallovertheBayAreaandinotherstatesandthepossibilityofan
untoldamountofmonetaryloss.
PoliceChiefAnthonyBatts saidbreakinguptheoperationisparticularlyimportanttolawenforcementbecauseidentitytheft
"putsfearineveryone,"includinghimself.
Theoperation,whichOfficerHollyJoshicalleda"onestopshop"foridentitytheft,wasrunoutofaHaywardapartmentin
the21000blockofFoothillBoulevard,whereresidentMishel CavinessWilliams,40,wasarrestedlastweekassheleftthe
apartment.Shehad$4,000 incashonher,policesaid.
http://www.mercurynews.com
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
Woman Sought in
Theft
May23,2011
Suffolkpoliceareseekingassistancelocatingawomanwhoallegedlytookanelderlymansdebitcardanduseditonseveral
occasions.PolicehavefivefelonywarrantsonfileforLavonda GoosieMoore,37,forcreditcardtheft,creditcardfraud,
criminallyreceivingmoney,thirdoffensepetitlarcenyandidentitytheft.
PolicesayMooretookadebitcardfromthevictimonHillStreetonMay15anduseditonmultipleoccasionsatanATMandat
retailstores.TherealsoisawarrantonfileforMooreforthirdoffensepetitlarcenyinanunrelatedcase.
Mooreslastknownaddressisthe600blockofBrookAvenue.AnyonewhohasinformationonMooreslocationisaskedtocall
CrimeLineat1888LOCKUUP.CallerstoCrimeLineneverhavetogivetheirnamesorappearincourt,andmaybeeligiblefora
rewardofupto$1,000.
http://www.suffolknewsherald.com
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
75%
$54 billion
13%
4.8%
TheTotalFraudAmount
VictimWhoKnew
CrimesWereCommitted
http://www.spendonlife.com
PercentofPopulation
VictimizedbyIdentity
Fraud
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
Scenario
ConsumerComplaint
Ilostmypursein2006.ButsurprisinglyIgotnoticesofbouncedchecksin2007.
Aboutayearlater,Ireceivedinformationthatsomeoneusingmyidentityhadbought
acar.In2008,IcametoknowthatsomeoneisusingmySocialSecurityNumber fora
numberofyears.ApersongotarrestedandproducedmySSNonhisarrestsheet.
Icantgetcreditbecauseofthissituation.Iwasdeniedamortgage,employment,
creditcardsandmedicalcareformychildren.
http://www.networkworld.com
Module Objectives
WhatisIdentityTheft?
WhattodoifIdentityisStolen?
PersonalInformationthatCanbe
Stolen
ReportingIdentityTheft
ProsecutingIdentityTheft
HowdoAttackersStealIdentity?
GuidelinesforIdentityTheft
Protection
WhatdoAttackersdowithStolen
Identity?
GuidelinesforProtectionfrom
ComputerBasedIdentityTheft
ExamplesofIdentityTheft
HowtoFindifYouareaVictimof
IdentityTheft?
IPAddressHidingTools
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
Module Flow
Identity Theft
Social
Engineering
What to Do if
Identity Is Stolen
Reporting
Identity Theft
Protection from
Identity Theft
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
Financial
losses
Criminal
charges
Identity
TheftEffects
Itleadstodenialof
employment,health
carefacilities,mortgage,
bankaccountsandcredit
cards,etc.
Legal
issues
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
Names
Address
Birthcertificates
Dateofbirth
Creditcard/Bank
accountnumbers
Drivinglicense
numbers
Mothers
maidenname
Socialsecurity
numbers
Telephone
numbers
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
SocialEngineering
Itisanactofmanipulating
peopletrusttoperform
certainactionsordivulging
privateinformation,without
usingtechnicalcracking
methods
Fraudsterpretendtobea
financialinstitutionand
sendspam/popup
messagestotricktheuser
torevealpersonal
information
Hacking
TheftofPersonalStuff
Fraudstersmaysteal
walletsandpurses,mails
includingbankandcredit
cardstatements,pre
approvedcreditoffers,and
newchecksortax
information
Attackersmayhackthe
computersystemsto
stealconfidential
personalinformation
10
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
Theymayopennew
creditcardaccountsin
thenameoftheuserand
donotpaythebills
Phone or Utilities
Fraud
Theymayopenanew
phoneorwirelessaccount
intheusersname,orrun
upchargesonhis/her
existingaccount
Theymayuseusersname
togetutilityservicessuch
aselectricity,heating,or
cableTV
11
Other Fraud
Theymaygetajobusing
legitimateusersSocial
Securitynumber
Theymaygivelegitimate
usersinformationtopolice
duringanarrestandifthey
donotturnupfortheir
courtdate,awarrantfor
arrestisissuedon
legitimateusersname
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
Government
DocumentsFraud
Theymaycreatecounterfeitchecks
usingvictimsnameoraccountnumber
Theymaygetadrivinglicenseor
officialIDcardissuedonlegitimate
usersnamebutwiththeirphoto
Theymayopenabankaccountin
victimsnameandissuethechecks
Theymayusevictimsnameand
SocialSecuritynumbertoget
governmentbenefits
TheymaycloneanATMordebitcard
andmakeelectronicwithdrawalson
victimsname
Theymayfileafraudulenttaxreturn
usinglegitimateuserinformation
Theymaytakealoanonvictimsname
12
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
Original
IdentityTheft
SameName:TRENTCHARLESARSENAUL
13
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
Module Flow
Identity Theft
Social
Engineering
What to Do if
Identity Is Stolen
Reporting
Identity Theft
Protection from
Identity Theft
14
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
Social Engineering
Social
Engineering
Social Engineers
Attempt to Gather
Types of Social
Engineering
Socialengineeringisthe
artofconvincingpeople
torevealconfidential
information
Sensitiveinformation
suchascreditcard
details,socialsecurity
number,etc.
Humanbasedsocial
engineering
Itisthetrickusedtogain
sensitiveinformation by
exploitingthebasic
humannature
Passwords
Computerbased
socialengineering
Otherpersonal
information
15
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
Hi,wearefromCONSESCO
Software.Wearehiringnew
peopleforoursoftwaredevelopment
team.Wegotyourcontactnumber
frompopularjobportals.
Pleaseprovidedetailsofyourjobprofile,
currentprojectinformation,
socialsecuritynumber,andyour
residentialaddress.
16
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
17
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
Hi,IamJohnBrown.I'mwiththe
externalauditorsArthurSanderson.We've
beentoldbycorporatetodoasurprise
inspectionofyourdisasterrecovery
procedures.
Yourdepartmenthas10minutestoshow
mehowyouwouldrecoverfroma
websitecrash.
18
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
Amancallsacompanyshelpdeskandsays
hehasforgotten hispassword.Headds
thatifhemissesthedeadlineonabig
advertisingproject,hisbossmightfirehim.
Thehelpdeskworkerfeelssorryforhim
andquicklyresetsthepassword,
unwittinglygivingtheattackerclear
entranceintothecorporate
network
19
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
Shouldersurfing
Eavesdroppingis
unauthorizedlisteningof
conversationsorreading
ofmessages
Itisinterceptionofany
formofcommunication
suchasaudio,video,or
written
Shouldersurfingisthe
procedurewherethe
attackerslookoverthe
usersshouldertogain
criticalinformationsuchas
passwords,personal
identificationnumber,
accountnumbers,credit
cardinformation,etc.
Attackermayalsowatchthe
userfromadistanceusing
binocularsinordertoget
thepiecesofinformation
20
Dumpsterdiving
Dumpsterdivingincludes
searchingforsensitive
informationatthetarget
companystrashbins,
printertrashbins,user
deskforstickynotes,etc.
Itinvolvescollectionof
phonebills,contact
information,financial
information,operations
relatedinformation,etc.
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
Popup
Windows
Windowsthatsuddenlypopup
whilesurfingtheInternetand
askforusersinformation to
loginorsignin
Hoax
Letters
Gatheringpersonalinformation
bychattingwithaselectedonline
usertogetinformationsuchas
birthdatesandmaidennames
Chain
Letters
Instant
Chat
Messenger
Chainlettersareemailsthatoffer
freegifts suchasmoneyand
softwareontheconditionthatthe
userhastoforward themailtothe
saidnumberofpersons
21
Spam
Email
Irrelevant,unwanted,and
unsolicitedemail tocollectthe
financialinformation,social
securitynumbers,andnetwork
information
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
FakeBankWebpage
22
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
23
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
24
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
Module Flow
Identity Theft
Social
Engineering
What to Do if
Identity Is Stolen
Reporting
Identity Theft
Protection from
Identity Theft
25
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
Youreceivebills,invoices,orreceiptsaddressed toyouforgoodsorservices
youhaventaskedfor
Younolongerreceiveyourcreditcardorbankstatements
Younoticethatsomeofyourmailseemstobemissing
Yourrequestformortgageoranyotherloanisrejectedcitingyourbadcredit
historydespiteyouhavingagoodcreditrecord
26
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
Youloseimportant
documents suchas
yourpassportor
drivinglicense
Youreceive
creditcard
statementwith
newaccount
Youidentify
irregularities in
yourcreditcard
andbank
statements
Youaredeniedfor
socialbenefits
citingthatyouare
alreadyclaiming
27
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
Module Flow
Identity Theft
Social
Engineering
What to Do if
Identity Is Stolen
Reporting
Identity Theft
Protection from
Identity Theft
28
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
Immediatelyinformcreditbureaus
andestablishfraudalerts
Requestforacreditreport
Reviewthecreditreportsandalert
thecreditagencies
Freezethecreditreportswithcredit
reportingagencies
Contactallofyourcreditorsand
notifythemofthefraudulentactivity
Changeallthepasswordsofonline
accounts
Closetheaccountsthatyouknowor
believehavebeentamperedwithor
openedfraudulently
29
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
Takeadvicefrompolice
andreportingagencies
abouthowtoprotect
yourselffromfurther
identitycompromise
Fileacomplaintwith
identitytheftand
cybercrimereporting
agenciessuchasthe
FTC
Tellthedebtcollectors
thatyouareavictimof
fraudandarenot
responsibleforthe
unpaidbill
Askthecreditcard
companyaboutnew
accountnumbers
30
Askthebanktoreportthe
fraudtoaconsumer
reportingagencysuchas
ChexSystemsthatcompiles
reportsonchecking
accounts
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
Module Flow
Identity Theft
Social
Engineering
What to Do if
Identity Is Stolen
Reporting
Identity Theft
Protection from
Identity Theft
31
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
http://www.ftc.gov
32
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
econsumer.gov
econsumer.govisaportalforyou
asaconsumertoreport complaints aboutonline
andrelated transactions withforeigncompanies
http://www.econsumer.gov
33
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
TheInternetCrimeComplaint
Centers(IC3)missionistoserveasa
vehicletoreceive,develop,andrefer
criminalcomplaints regardingthe
rapidlyexpandingarenaofcyber
crime
TheInternetCrimeComplaintCenter
(IC3)isapartnershipbetweenthe
FederalBureauofInvestigation(FBI),
theNationalWhiteCollarCrime
Center(NW3C),andtheBureauof
JusticeAssistance(BJA)
http://www.ic3.gov
34
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
Fileacomplaintwith
theFederalTrade
Commissionand
completeaffidavits
toproveyour
innocenceonthe
claimsofidentity
theftandfraudulent
activity
Obtainacopyofthe
policecomplaintto
provetothe
organizationsthat
youhavefiledan
identitytheft
complaint
35
ContacttheDistrict
Attorney'sofficefor
furtherprosecuting
theindividualswho
maybeinvolvedin
theidentitytheft
Regularlyupdate
yourselfregarding
theinvestigation
processtoensure
thatthecaseis
beingdealtwith
properly
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
Module Flow
Identity Theft
Social
Engineering
What to Do if
Identity Is Stolen
Reporting
Identity Theft
IP Hiding Tools
36
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
http://www.quickhideip.com
37
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
HideIPNG
http://www.ultrareach.com
http://www.hideipsoft.com
HideMyIP
TOR
http://www.hidemyip.com
http://www.torproject.org
IPHider
Anonymizer Universal
http://www.iphider.org
http://www.anonymizer.com
AntiTracks
HideTheIP
http://www.giantmatrix.com
http://www.hidetheip.com
38
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
Module Summary
Identitytheftistheprocessofusingsomeoneelsespersonalinformationforthe
personalgainoftheoffender
Criminalslookthroughtrashforbillsorotherpaperwithpersonalinformationonit
Criminalscallthevictimimpersonatingagovernmentofficialorotherlegitimate
businesspeopleandrequestpersonalinformation
Keepthecomputeroperatingsystemandotherapplicationsuptodate
Donotreplytounsolicitedemailthatasksforpersonalinformation
Usestrongpasswordsforallfinancialaccounts
Reviewbank/creditcardstatements/creditreportsregularly
39
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
40
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
41
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.
42
CopyrightbyEC-Council
AllRightsReserved.ReproductionisStrictlyProhibited.