Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security...

37
Jon Allen, CISSP, EnCE Information Jon Allen, CISSP, EnCE Information Security Officer Security Officer Amy Alexander Technology Training Amy Alexander Technology Training Specialist Specialist Kevin Helpert Police Lieutenant Kevin Helpert Police Lieutenant Identity Identity Theft Theft A personal perspective A personal perspective Protect Your Past, Secure Your Future

Transcript of Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security...

Page 1: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer

Amy Alexander Technology Training SpecialistAmy Alexander Technology Training Specialist

Kevin Helpert Police LieutenantKevin Helpert Police Lieutenant

Identity TheftIdentity TheftA personal perspectiveA personal perspective

Protect Your Past, Secure Your Future

Page 2: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

IntroductionIntroduction Identity crimeIdentity crime is a widespread crime in the United States. is a widespread crime in the United States.

Identity theft was not formally recognized as a specific federal Identity theft was not formally recognized as a specific federal offense until 1998 when Congress passed a law, the offense until 1998 when Congress passed a law, the Identity Identity Theft and Assumption Deterrence ActTheft and Assumption Deterrence Act. .

The Federal Trade Commission (FTC) reported that for 2009 The Federal Trade Commission (FTC) reported that for 2009 ID Theft continued to top the list of consumer complaints and ID Theft continued to top the list of consumer complaints and accounted for over 21% of all complaints.accounted for over 21% of all complaints.

The median value gained by thieves using ID theft is $500.The median value gained by thieves using ID theft is $500.

Source: FTC Sentinel Report

Protect Your Past, Secure Your Future

Page 3: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

General Facts and ProjectionsGeneral Facts and Projections According to the 2006 FTC Identity Theft Survey According to the 2006 FTC Identity Theft Survey

Report, approx. 8.3 million American consumers Report, approx. 8.3 million American consumers were victimized.were victimized.

Misuse of existing credit cards accounted for 38% of Misuse of existing credit cards accounted for 38% of all casesall cases

Victims of new account fraud spent an average of 10 Victims of new account fraud spent an average of 10 hours to resolve the issue with some spending in hours to resolve the issue with some spending in excess of 100 hoursexcess of 100 hours

Protect Your Past, Secure Your Future

Source: FTC Sentinel Report

Page 4: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

General Facts and ProjectionsGeneral Facts and Projections(continued)(continued)

Computers, the internet, and cell phones have made Computers, the internet, and cell phones have made this type of crime quick and easy.this type of crime quick and easy.

Prior to 2003, U.S. Department of Justice studies Prior to 2003, U.S. Department of Justice studies revealed 98% of ID thieves went free.revealed 98% of ID thieves went free.

ID theft victims are usually victimized again… after ID theft victims are usually victimized again… after 90 days because the victim has restored their credit 90 days because the victim has restored their credit and the suspect still has the personal information of and the suspect still has the personal information of the victim.the victim.

Terrorist groups, Terrorist groups, including 9-11-01including 9-11-01, are among those , are among those funded by identity theft.funded by identity theft.

Protect Your Past, Secure Your Future

Page 5: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Identity Theft by StateIdentity Theft by State(on per-capita basis)(on per-capita basis)

Rank Rank StateState Victims/100,000 Victims/100,000

11 ArizonaArizona 137.1137.1

22 CaliforniaCalifornia 120.1120.133 NevadaNevada 114.2114.244 TexasTexas 107.9107.9

5 5 Florida Florida 105.6105.666 New YorkNew York 100.1100.177 Georgia Georgia 91.6 91.6 88 ColoradoColorado 89.089.099 New MexicoNew Mexico 87.587.51010 MarylandMaryland 85.885.8

Protect Your Past, Secure Your Future

Source: FTC Sentinel Report

Page 6: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Identity Theft TypesIdentity Theft Types

Credit card fraudCredit card fraud 23%23% Utilities FraudUtilities Fraud 18%18% Bank fraudBank fraud 13%13% Employment- related fraudEmployment- related fraud 14%14% Other (medical/ child support, etc) Other (medical/ child support, etc) 13.4%13.4% Loan fraudLoan fraud 5%5%

Protect Your Past, Secure Your Future

Source: FTC Sentinel Report

Page 7: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

ID Theft Victims by AgeID Theft Victims by Age

Under 19 years of ageUnder 19 years of age 2% 2% Ages 20 to 29Ages 20 to 29 19%19% Ages 30 to 39Ages 30 to 39 23%23% Ages 40 to 49Ages 40 to 49 24%24% Ages 50 to 59Ages 50 to 59 20%20% Ages 60 to 69Ages 60 to 69 8% 8% Age 70 and olderAge 70 and older 4% 4%

Protect Your Past, Secure Your Future

Source: FTC Sentinel Report

Page 8: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Other Victim DataOther Victim Data

Race or Ethnicity is not a significant factor.Race or Ethnicity is not a significant factor. Household incomes of more than $75,000 per Household incomes of more than $75,000 per

year are targeted more often.year are targeted more often. Urban vs. RuralUrban vs. Rural: individuals in urban/ : individuals in urban/

suburban settings are almost twice as likely to suburban settings are almost twice as likely to be victimized than rural individuals.be victimized than rural individuals.

Protect Your Past, Secure Your Future

Page 9: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

ObjectivesObjectives

With this information, you will be better With this information, you will be better informed if you become a victim, able to start informed if you become a victim, able to start the process of recovery after becoming a the process of recovery after becoming a victim, and know who to contact along with victim, and know who to contact along with access to free resources.access to free resources.

Protect Your Past, Secure Your Future

Page 10: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Points of DiscussionPoints of Discussion

General identity theft informationGeneral identity theft information

How easy it is to become a victimHow easy it is to become a victim

Mistakes we makeMistakes we make

How you can assist during an investigation if How you can assist during an investigation if you become a victim you become a victim

Protect Your Past, Secure Your Future

Page 11: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Types of Identity TheftTypes of Identity Theft

Various fraudsVarious frauds ScamsScams Counterfeit ID’sCounterfeit ID’s Altered checksAltered checks Counterfeit checksCounterfeit checks Stolen credit cardsStolen credit cards Stolen ID’sStolen ID’s Fraudulent social security cardsFraudulent social security cards

Protect Your Past, Secure Your Future

Page 12: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Sources of informationSources of information BurglariesBurglaries Telephone solicitationsTelephone solicitations Stolen wallets and pursesStolen wallets and purses Property recordsProperty records Court recordsCourt records Marriage and divorce Marriage and divorce

certificatescertificates Hacked computer Hacked computer

informationinformation On-line purchasesOn-line purchases Mailbox Mailbox

(look for flags in up position)(look for flags in up position)

Protect Your Past, Secure Your Future

Page 13: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Sources of informationSources of information(Continued)(Continued)

Product warranty cardsProduct warranty cards Change of addressChange of address Dumpster or trash divingDumpster or trash diving Posing as a landlord to obtain credit Posing as a landlord to obtain credit

reportreport Shoulder surfingShoulder surfing Cell phones with picture/video Cell phones with picture/video

capabilitiescapabilities ‘‘Phishing’ through the internet and Phishing’ through the internet and

phonephone Sales Clerks, bank clerks, etc. who Sales Clerks, bank clerks, etc. who

copy personal application informationcopy personal application information

Protect Your Past, Secure Your Future

Page 14: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Sources of informationSources of information(Continued)(Continued)

Waiters and other store employees Waiters and other store employees who use ‘skimmers’ and sell who use ‘skimmers’ and sell informationinformation

People searches on the internetPeople searches on the internet Lost or stolen receiptsLost or stolen receipts Written checks Written checks (computer (computer

programs and scanners)programs and scanners) Credit card verification scam Credit card verification scam (e-(e-

mail or phone)mail or phone)

Protect Your Past, Secure Your Future

Page 15: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Information from mailInformation from mail Telephone & utility bills Telephone & utility bills

(name, phone #, address, acct #)(name, phone #, address, acct #)

Credit card statement Credit card statement (name, address, card #, limit, exp, type(name, address, card #, limit, exp, type

Bank statement Bank statement (name, address, bank name, account #, checks)(name, address, bank name, account #, checks)

Boxes of checks Boxes of checks (blank checks ready to use)(blank checks ready to use)

Credit card offers Credit card offers (name, address, contact #)(name, address, contact #)

Paychecks and stubs Paychecks and stubs (name, address, employer, acct #, SSN)(name, address, employer, acct #, SSN)

Retirement statements Retirement statements (name, address, acct #, balance, employer (name, address, acct #, balance, employer contact information, SSN)contact information, SSN)

Annual SS statement Annual SS statement (name, address, SSN #’s (spouse & dependants)(name, address, SSN #’s (spouse & dependants)

W-2’s and other tax formsW-2’s and other tax forms(everything needed to assume your ID)(everything needed to assume your ID)

Protect Your Past, Secure Your Future

Page 16: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Social NetworksSocial Networks

Exposing security question answersExposing security question answers But my profile is privateBut my profile is private

Location data Location data Including embedded photo dataIncluding embedded photo data

Identity thieves are information minersIdentity thieves are information miners

Protect Your Past, Secure Your Future

Page 17: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Tips to protect yourselfTips to protect yourself Write Write “check ID” “check ID” on back side of on back side of

credit card and signcredit card and sign Keep credit card in sightKeep credit card in sight Drop bills off at post office Drop bills off at post office (or pay with cashiers check)(or pay with cashiers check)

Pick up boxes of checks at bank Pick up boxes of checks at bank personallypersonally

Do not respond to e-mails asking Do not respond to e-mails asking for personal information, call for personal information, call your credit card company from a your credit card company from a number listed on the statementnumber listed on the statement

Protect Your Past, Secure Your Future

Page 18: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Personal StoryPersonal Story

Amy can you describe for us the events that Amy can you describe for us the events that you believe lead to you becoming a victim of you believe lead to you becoming a victim of identify theftidentify theft

Protect Your Past, Secure Your Future

Page 19: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Security FreezeSecurity Freeze

Called anti-identity theft freezeCalled anti-identity theft freeze Allows individuals to block access to their Allows individuals to block access to their

credit reports until they personally unlock the credit reports until they personally unlock the files by contacting the credit bureaus and files by contacting the credit bureaus and providing a PIN numberproviding a PIN number

Without the code, a fraudster cannot open an Without the code, a fraudster cannot open an account in their nameaccount in their name

Cost nothing for victims of ID theft, approx. Cost nothing for victims of ID theft, approx. $10.00 for anyone else$10.00 for anyone else

Protect Your Past, Secure Your Future

Page 20: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Security FreezeSecurity Freeze

Write all three credit bureaus with the requestWrite all three credit bureaus with the request For more information… log onto For more information… log onto www.ftc.govwww.ftc.gov Provide… name, address for last 5 years, SSN, Provide… name, address for last 5 years, SSN,

DOB, 2 proofs of address (bills?), and a copy DOB, 2 proofs of address (bills?), and a copy of the police report if a victim, along with of the police report if a victim, along with completing a fraud affidavitcompleting a fraud affidavit

Protect Your Past, Secure Your Future

Page 21: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Social EngineeringSocial Engineering

Do you know who worked on your computer?Do you know who worked on your computer? Did the person you sign in for watch you type Did the person you sign in for watch you type

your password?your password? Have you ever walked away from your Have you ever walked away from your

computer and left it unlocked?computer and left it unlocked?

Protect Your Past, Secure Your Future

Page 22: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Prevent Social EngineeringPrevent Social Engineering

Lock your computer when you are away from Lock your computer when you are away from the deskthe desk

Verify that anyone working on your computer Verify that anyone working on your computer has an picture ITS badge or is authenticated has an picture ITS badge or is authenticated through the helplinethrough the helpline

Never share any account passwordsNever share any account passwords

Protect Your Past, Secure Your Future

Page 23: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Phishing the new SPAMPhishing the new SPAM

A combination of attacks to yield personal A combination of attacks to yield personal informationinformation

Hard to tell a legitimate emailHard to tell a legitimate email Will not go awayWill not go away

Protect Your Past, Secure Your Future

Page 24: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Protect Your Past, Secure Your Future

Page 25: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Protect Your Past, Secure Your Future

SpearingSpearing

Page 26: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Account SecurityAccount Security

Pick a good passwordPick a good password Minimum of 8 characters in lengthMinimum of 8 characters in length Must contain 3 out of 4 categoriesMust contain 3 out of 4 categories Upper case, lower case, number and symbolUpper case, lower case, number and symbol

Never share your passwordNever share your password Lock or logout of a computer when you leave Lock or logout of a computer when you leave

it.it.

Protect Your Past, Secure Your Future

Page 27: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Protect Your DataProtect Your Data

Verify that Windows/Mac Updates are being Verify that Windows/Mac Updates are being applied to your computerapplied to your computer

Check that Symantec Antivirus is up to dateCheck that Symantec Antivirus is up to date

Protect Your Past, Secure Your Future

Page 28: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Social Security NumberSocial Security Number

The Social Security Number policy governs The Social Security Number policy governs the use of SSN on campusthe use of SSN on campus

Any new retention of SSN electronic or on Any new retention of SSN electronic or on paper must be approved by the CIOpaper must be approved by the CIO

Old stores of SSN should be protected or Old stores of SSN should be protected or deleted.deleted.

Protect Your Past, Secure Your Future

Page 29: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Personal StoryPersonal Story

Amy can you talk about how you realized you Amy can you talk about how you realized you were a victim of identity theft?were a victim of identity theft?

Protect Your Past, Secure Your Future

Page 30: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

If you become a victim…If you become a victim…(Continued)(Continued)

Organize a file of all related paperwork for easy Organize a file of all related paperwork for easy accessaccess

Follow up in writing with all contacts made by phone Follow up in writing with all contacts made by phone or in personor in persona. Use certified mail, with return receipt requesteda. Use certified mail, with return receipt requestedb. Keep copies of all correspondence or forms usedb. Keep copies of all correspondence or forms usedc. Keep all originals if possiblec. Keep all originals if possible

File a complaint with the FTC (File a complaint with the FTC (ask for any ask for any information or paperworkinformation or paperwork))

Protect Your Past, Secure Your Future

Page 31: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

If you become a victimIf you become a victim

Place a fraud alert on credit reports, then Place a fraud alert on credit reports, then review reportsreview reports

a. Once one credit bureau is contacted, a. Once one credit bureau is contacted, the other two should automatically be the other two should automatically be notified to place alerts… notified to place alerts… *but check for *but check for yourself !yourself !

b. All three bureaus should send the victimb. All three bureaus should send the victim informationinformation

c. Get copies for law enforcementc. Get copies for law enforcement

Protect Your Past, Secure Your Future

Page 32: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

If you become a victim…If you become a victim… Contact any credit card companiesContact any credit card companies Contact the local law enforcement agencyContact the local law enforcement agency Close any accounts that have been tampered or opened fraudulentlyClose any accounts that have been tampered or opened fraudulently Close all checking and savings accounts that could be affectedClose all checking and savings accounts that could be affected Retrieve copies of bank and credit card statements, and note Retrieve copies of bank and credit card statements, and note

fraudulent itemsfraudulent items

Protect Your Past, Secure Your Future

Page 33: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

If you become a victim…If you become a victim…(Continued)(Continued)

Contact the check verification companiesContact the check verification companies Contact the major credit reporting bureausContact the major credit reporting bureaus Contact the Social Security Administrative Contact the Social Security Administrative

offices if Social Security number used (800-offices if Social Security number used (800-269-0271)269-0271)

Protect Your Past, Secure Your Future

Page 34: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

RememberRemember

If your Baylor University ID card is lost or stolen… If your Baylor University ID card is lost or stolen… deactivate your card on-line immediately deactivate your card on-line immediately (DO NOT (DO NOT

WAIT!!!!!!!!)WAIT!!!!!!!!). . By doing so, you lessen the chances of a potential By doing so, you lessen the chances of a potential

suspect to gain unauthorized access to a building or suspect to gain unauthorized access to a building or dorm. This also prevents the card from being used dorm. This also prevents the card from being used like a credit card like a credit card (Example: BearBucks and the BU Bookstore)(Example: BearBucks and the BU Bookstore)..

**Go to Cashier’s office webpage… click on “ID Card”… click on “Lost/ **Go to Cashier’s office webpage… click on “ID Card”… click on “Lost/ Stolen ID Card Link”Stolen ID Card Link”

Protect Your Past, Secure Your Future

Page 35: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Personal StoryPersonal Story

Amy where is your case of identity theft today?Amy where is your case of identity theft today?

Protect Your Past, Secure Your Future

Page 36: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Baylor Police DepartmentBaylor Police Department(254)710-2222(254)710-2222

Protect Your Past, Secure Your Future

Page 37: Jon Allen, CISSP, EnCE Information Security OfficerJon Allen, CISSP, EnCE Information Security Officer Amy Alexander Technology Training SpecialistAmy.

Questions???Questions???

Protect Your Past, Secure Your Future