Presented to Temple Baptist Academy, April 21, 2009.

20
Presented to Temple Baptist Academy, April 21, 2009

Transcript of Presented to Temple Baptist Academy, April 21, 2009.

Page 1: Presented to Temple Baptist Academy, April 21, 2009.

Presented to Temple Baptist Academy, April 21, 2009

Page 2: Presented to Temple Baptist Academy, April 21, 2009.

Agenda

• Identity theft in general, and how it applies to minors

• Identity theft as applied to cell phones, and social networks (MySpace/Facebook)

• Some basic tips regarding home PC security

Page 3: Presented to Temple Baptist Academy, April 21, 2009.

• Identity theft in general, and how it applies to minors

Page 4: Presented to Temple Baptist Academy, April 21, 2009.

Types of Identity Theft

• Financial identity theft - using another's identity to obtain goods and services

• Business/commercial identity theft - using another's business name to obtain credit

• Criminal identity theft -posing as another when apprehended for a crime

• Identity cloning - using another's information to assume his or her identity in daily life

• Medical identity theft -using another's information to obtain medical care or drugs

• For purposes of this presentation, will be focusing on financial identity theft, criminal identity theft, and identity cloning.

» Source: http://www.wikipedia.org

Page 5: Presented to Temple Baptist Academy, April 21, 2009.

Why should you care?

• Children and teens are especially susceptible to having their identity stolen due to a typically longer period of time between the initial theft and discovery. – Criminals often steal children’s identities to escape

law enforcement authorities– Because children and teens have no credit, their

identities are often cloned by those with severely damaged credit to maintain their financial activities.

– Due to the economic downturn, identity theft is expected to continue to increase, especially in this area.

Source: Identity Theft Resource Center

Page 6: Presented to Temple Baptist Academy, April 21, 2009.

Financial Identity Theft

• Some underlying flaws in the credit reporting system that enable identity theft:– Credit issuers may not have a way to verify the age of an

applicant (especially if the application for credit is online or over the phone).

– Credit reporting agencies often do not share information about the age of an applicant. Age is often determined by what is stated on the first application for credit.

• Because age is not systematically verified by credit issuers or double-checked by credit reporting agencies, very easy for an imposter to use a teen’s identity to obtain credit.

Source: Identity Theft Resource Center

Page 7: Presented to Temple Baptist Academy, April 21, 2009.

Criminal identity theft

• Typically occurs when a person “borrows” the information of a minor to get a driver’s license/passport or uses the child’s identity when caught in a criminal act. – Information is often sold on the black market

to illegal immigrants trying to obtain identity documentation. As NM is a border state, this is an issue.

Source: Identity Theft Resource Center

Page 8: Presented to Temple Baptist Academy, April 21, 2009.

Identity Cloning

• Happens when someone assumes your identity for financial, criminal, and/or government purposes– Other people (i.e. felons) that are trying to

restart their lives/avoid arrest.– Terrorists

Source: Identity Theft Resource Center

Page 9: Presented to Temple Baptist Academy, April 21, 2009.

How would you know if this happened to you? (the hard way)

• Unfortunately, most of the time, this is discovered the hard way– Denied credit, car loan, or financial aid for

college– Unable to open bank/checking account– When obtaining a driver’s license, learn there

is already a license for your name/SSN. There may even be tickets/citations/bench warrants in your name.

Page 10: Presented to Temple Baptist Academy, April 21, 2009.

How would you know if this happened to you? (the easy way)

• Obtain a free credit report– Will show accounts opened in your name

• Request a copy of your records from DMV (if there are any, this will show it)– Confidential release form included in handout

packet.

Page 11: Presented to Temple Baptist Academy, April 21, 2009.

• Identity theft as applied to cell phones, MySpace and Facebook

Page 12: Presented to Temple Baptist Academy, April 21, 2009.

Cell phones

• SENSITIVE DATA ON MOBILES Personal

• 16% - Bank account details • 24% - Pin numbers/passwords • 11% - Social security/tax details • 10% - Store credit card information • Business • 77% - Work-related names/addresses • 30% - Use mobile as a work diary • 17% - Work-related documents • 23% - Customers' information 40% of users do not use any security

features(password or pass-phrase protect, encryption) at all

Source: Credant Technologies

Page 13: Presented to Temple Baptist Academy, April 21, 2009.

Why should I care?

• “But I don’t have a business, I don’t have a credit card, why should I care?”– Email, passwords, birthdays, personal diary,

documents, pictures, names of family members, pets normally stored on cell phones.

– This information can easily enable someone to pose as you and set up accounts, or worse yet, pose as you in sending messages to friends and family members.

Page 14: Presented to Temple Baptist Academy, April 21, 2009.

What to do

• With the advent of 3G phones that easily surf the internet, cell phones are carrying increasingly personal information, and have the same capabilities as a personal computer

• Treat a smartphone the same as a personal computer when it comes to security– Password or pass-phrase protect– Use antivirus applications– Encrypt data on your phone if that option is available

to you– Report if lost or stolen ASAP

Page 15: Presented to Temple Baptist Academy, April 21, 2009.

Social networks - some cautions

• Taken from a message I sent to a friend that recently joined Facebook:– 1. do not display your birth year– 2. absolutely do not store credit card information– 3. no personal info (address, etc)– 4.do not mention where you WILL BE going, etc, no

physical whereabouts. – 5. set your profile so only your friends can see your

profile, your friends, or anything that can identify you.

Page 16: Presented to Temple Baptist Academy, April 21, 2009.

Social networks

•EVERYTHING YOU POST IS PUBLIC

AND PERMANENT

Page 17: Presented to Temple Baptist Academy, April 21, 2009.

Ooooooooops

• Brooklyn police officer Vaughn Etienne– Posted what he called “trash talk” on MySpace using

the mood “devious”.– His posts were subpoenaed into a Brooklyn court to

discredit him. – Because of the nature and tone of his comments,

reasonable doubt was established and a convict out on parole for a burglary charge had a felony gun possession charge dropped.

Source: The New York Times 3/11/09

Page 18: Presented to Temple Baptist Academy, April 21, 2009.

Home PC security

• Roger Grimes, security advisor, wrote the following for InfoWorld, states that:– 25-50% of home computers are infected in a

year– Normal causes of malware being found on

home PCs are:• User tricked into installing malware 95%• Unpatched software that leaves a security hole

open 4%• Zero day hole 1%

Page 19: Presented to Temple Baptist Academy, April 21, 2009.

What to do

Instead of focusing on specific software or techniques to keep your PC safe, the following philosophy is recommended:1. never install anything that you are not sure is 100% legitimate (nothing from pop-up windows, etc.)2. keep your software patched and up to date (operating system updates, etc)3. do not use a user profile with administrator rights to your computer (admin rights can normally install programs, make changes to programs, etc).

Page 20: Presented to Temple Baptist Academy, April 21, 2009.

Resources/referencesIdentity Theft Resource Center http://www.idtheftcenter.org“Mobile users at risk of ID theft”. BBC News.3/18/09.http://news.bbc.co.uk/2/hi/technology/7950263.stm“Study: Mobile Phones Contain Treasure Trove of Unprotected Data”. Wilson, Tim. DarkReading. 3/18/09.http://www.darkreading.com/security/client/showArticle.jhtml?articleID=215901048“The Officer Who Posted Too Much on MySpace”. Dwyer, Jim. The New York Times. 3/11/09. http://www.nytimes.com/2009/03/11/nyregion/11about.html?_r=4&pagewnnted=print

Excellent reference for home PC securityhttp://www.firewallguide.com/overview.htm“The Only Two things you need to know about home computing security” Grimes, Roger. InfoWorld. 12/25/08. http://weblog.infoworld.com/securityadviser/archives/2008/12/the_only_two_th.html