SlideShare a Scribd company logo
Identity Theft &
Prevention
PRESENTATION BY
JAMSHED MASOOD
Identity Theft in the Digital Age!!!
• “46000 New IdentityTheftVictim Every Day in 2017” (Javelin
Strategy & Research’s 2017 IdentityTheft Report for USA)
• More than 17 million victims had more than $ 17 billion stolen over the
year.
What’s Identity Theft?
• Identity fraud is defined as the unauthorized
use of another person’s personal information
to achieve illicit financial gains
• Identity fraud can range from simply using a
stolen payment card account, to making a
fraudulent purchase, to taking control of
existing accounts or opening new accounts.
• It’s a serious crime that can wreak havoc with
• Finances
• Credit history
• Insurance
• And Reputation
ID Theft – the breakdown
Types of ID Theft
• Children with:
• CNIC
• No associated information
• No one to pay attention – for years
• Deceased Individuals with:
• CNICs and accounts to close
• Personal data
• Pre-occupied families
• Synthetic Identities:
• False information mixed with real to
create a new identity
• YOU with your:
– Bank and credit accounts
– Investments
– Insurance
– CNIC and Govt documents
Purposes of ID Theft
• To obtain financial and / or medical services and benefits
• To conceal identity, with multiple motives:
• Creditor and tax evasion
• Avoiding criminal records
• Illegal immigration
• Phishing, whaling
• Funding espionage, terrorism
Financial Identity Theft
• The most common variety, used to:
• Steal money
• Bank and investment account fraud
• Obtain credit
• Credit and debit card fraud
• Loan fraud
• Set up a means to launder money
• International crimes
• Consequences include:
• Loss of savings / investments
• Damaged credit
• Tax Losses
Medical ID Theft
• “How Medical IdentityTheft Can GiveYou
a Decade of Headaches” (Bloomberg.com/tech-
blog 11/8/12)
• “…you have to go provider by provider, hospital
by hospital, office by office and correct each
record….
• “…while you’re… trying to clean up the records,
the identity thief can continue to go around and
get medical services in the victim’s name. Really
there’s no way to effectively shut it down.”
• Medical identity fraud is estimated to cost the healthcare
industry almost $40 billion annually, driving up the cost of
healthcare for everyone.
ID Theft Methods
• Account Hijacking
• The fastest growing form of identity
theft; occurs when a criminal obtains
your personal banking information and
uses it to take over your bank
accounts.
• Dumpster Diving: searching
through garbage for personal
information
• Retrieving personal data from IT equipment
and storage media disposed of carelessly
• Retrieving paper bank and credit card
statements from home trash bins
Camera
More ID Theft Methods
• Hacking
• Taking information from computers
through viruses andTrojan horses
• Infiltrating organizations that store and
process large amounts of particularly
valuable personal information
• Shoulder Surfing
• Eavesdropping or looking over
someone’s shoulder to obtain personal
information
Methods, continued
• Phishing and Social Engineering
• Impersonating a reputable institution to gain trust, and then
asking for information.
– Browsing social
networking websites
for personal details
published by users,
often using this
information to
appear more
credible.
Methods, continued
• Just Plain Stealing
• Pickpocketing, housebreaking, or other theft: physically
stealing bank or credit cards, identification cards, passports,
etc.
• Using public records about individual citizens, published in
official registers
– “Skimming”
information from bank
or credit cards
– Exploiting insider access
and abusing the rights
of privileged IT users
Recent Examples close to home
• Accounts Opened and Operated without Knowledge
• Money Laundering
• Accounts of Deceased Operated withoutVerification
• BISP Calls
• Callers Impersonating as Bank Call Centers Asking for Info
• SIM Issuance on CNIC Copies
• Stolen ATM and Credit Cards
• Use of Stolen SIMs in illegal activities
Easy protections
• Do not give out financial information (account numbers, credit
card numbers or your CNIC number) unless you know the
organization or person requesting this information.
• Notify your bank
or credit card
company of any
suspicious phone
inquiries asking
for account
information.
What can you do?
• Take proper steps to safeguard your personal information:
• Carry as few credit cards as possible and periodically check to make sure
you still have them all. Use an aluminum card case.
• Guard your CNIC and Health insurance cards like money.
• Try Not to carry around your CNIC and try not to write your CNIC
number on anything.
– Guard your banking and credit card
PINs (Personal Identification
Numbers) and passwords carefully.
Don’t write them down.
• Make your PINs and passwords hard
for someone else to guess.
• Never use your birth date or any digits
from your CNIC number.
Computer Precautions
• Install a firewall, anti-virus software, and
anti-spam software on your computer
and make sure these systems are
updated often.
• Be wary of pop-ups. Most are just
legitimate ads, but always close them
from theTask Manager. Clicking the X
could install a virus on your computer.
• Don’t open emails from people you
don’t know.
10 Golden Rules
1. There’s no guaranteed get-rich-quick schemes - sound
to good to be true?
2. Never send money or give out your details when you do
not know / trust the person or company you are giving
them to.
3. Destroy personal information, shred documents, credit
cards etc.
4. Log directly onto a website rather than clicking on the
link provided.
5. Never reply to spam emails, even when you're trying to
stop them.
10 Golden Rules
6. Always remember: scammers are cunning and clever.They
know how to manipulate you to produce the response they
want.
7. Legitimate banks and companies will not ask for your details
via email or phone.
8. Just because a company has a well designed website doesn't
means it is legitimate.
9. Be suspicious. If you are unsure about anything, seek advice
from family or Police.
10. Never get embarrassed by reporting a scam – If you spot a
scam or have been scammed contact
http://www.nr3c.gov.pk/
ThankYou!
Feel free to ask
any questions!

More Related Content

What's hot (20)

PPTX
Credit card frauds
Rushikesh Maddalwar
 
PPT
Identity Theft: How to Avoid It
hewie
 
PPTX
Phishing and hacking
Md. Mehadi Hassan Bappy
 
PPS
Introduction to Cyber law (IT Act 2000)
Ambar Deo
 
PPTX
PHISHING PROJECT REPORT
vineetkathan
 
PPTX
Information Privacy
imehreenx
 
PPT
Identity Theft
Blinsink
 
PPTX
Phishing
HHSome
 
PPT
Phishing: Swiming with the sharks
Nalneesh Gaur
 
PPTX
Phishing--The Entire Story of a Dark World
Avishek Datta
 
PDF
The Social Media Bait - Fraud & Cybercrime
Parag Deodhar
 
PPTX
Credit card frauds
Jeetendra Khilnani
 
KEY
Identity theft
Ashley Arkfeld
 
PPTX
Insider threat v3
Lancope, Inc.
 
PPTX
Information-Control-and-Privacy.Powerpoint
kathymolina568
 
PPTX
Frauds and scams
Harold Stallard
 
PDF
Cyber fraud in banks
Network Intelligence India
 
PPTX
Information Privacy
primeteacher32
 
PPT
Cyber Forensic - Policing the Digital Domain
ppd1961
 
PPTX
Indian Cyber laws
mulikaa
 
Credit card frauds
Rushikesh Maddalwar
 
Identity Theft: How to Avoid It
hewie
 
Phishing and hacking
Md. Mehadi Hassan Bappy
 
Introduction to Cyber law (IT Act 2000)
Ambar Deo
 
PHISHING PROJECT REPORT
vineetkathan
 
Information Privacy
imehreenx
 
Identity Theft
Blinsink
 
Phishing
HHSome
 
Phishing: Swiming with the sharks
Nalneesh Gaur
 
Phishing--The Entire Story of a Dark World
Avishek Datta
 
The Social Media Bait - Fraud & Cybercrime
Parag Deodhar
 
Credit card frauds
Jeetendra Khilnani
 
Identity theft
Ashley Arkfeld
 
Insider threat v3
Lancope, Inc.
 
Information-Control-and-Privacy.Powerpoint
kathymolina568
 
Frauds and scams
Harold Stallard
 
Cyber fraud in banks
Network Intelligence India
 
Information Privacy
primeteacher32
 
Cyber Forensic - Policing the Digital Domain
ppd1961
 
Indian Cyber laws
mulikaa
 

Similar to Identity Theft and How to Prevent Them in the Digital Age (20)

PDF
Identity theft
Nick Chandi
 
PPT
Identity theft
Eqhball Ghazizadeh
 
PPT
Identity Theft Lake Placid 2012
Mark Kotzin
 
PDF
Identity Theft Awareness 101 - Basics
Deb Vosejpka
 
DOCX
Identity theft in the internet
mohmd-kutbi
 
PDF
Identity Theft: The Other You
- Mark - Fullbright
 
PPT
How to Prevent ID Theft
hewie
 
PPT
ID Theft
Willhack
 
PPTX
Identity Theft Overview
gaby350
 
PDF
Computer Crimes - Identity Theft
Jlove Minguez
 
PPT
Identity Theft Scams
ncpd
 
PPTX
Identity Theft.pptx
raminder12_kaur
 
PPTX
Identity Theft Presentation
charlesgarrett
 
PDF
The Identity Theft Checklist – Guidance for the general public.nz
- Mark - Fullbright
 
PDF
Misuse of personal information
Zev Aidikoff
 
PPT
Identity theft power_point
efandeye
 
PDF
Youth Protection Guide - Canada
- Mark - Fullbright
 
PPTX
cyber IDENTITY THEFT AND IDENTITY FRAUD.pptx
mcjaya2024
 
PPT
Avoiding Fraud and Identity Theft - October 2008
FinancialCenter
 
PPT
Id Theft Seminar 6
krupp
 
Identity theft
Nick Chandi
 
Identity theft
Eqhball Ghazizadeh
 
Identity Theft Lake Placid 2012
Mark Kotzin
 
Identity Theft Awareness 101 - Basics
Deb Vosejpka
 
Identity theft in the internet
mohmd-kutbi
 
Identity Theft: The Other You
- Mark - Fullbright
 
How to Prevent ID Theft
hewie
 
ID Theft
Willhack
 
Identity Theft Overview
gaby350
 
Computer Crimes - Identity Theft
Jlove Minguez
 
Identity Theft Scams
ncpd
 
Identity Theft.pptx
raminder12_kaur
 
Identity Theft Presentation
charlesgarrett
 
The Identity Theft Checklist – Guidance for the general public.nz
- Mark - Fullbright
 
Misuse of personal information
Zev Aidikoff
 
Identity theft power_point
efandeye
 
Youth Protection Guide - Canada
- Mark - Fullbright
 
cyber IDENTITY THEFT AND IDENTITY FRAUD.pptx
mcjaya2024
 
Avoiding Fraud and Identity Theft - October 2008
FinancialCenter
 
Id Theft Seminar 6
krupp
 
Ad

More from Maven Logix (6)

PPTX
Transforming Healthcare Through Telemedicine
Maven Logix
 
PPTX
Concepts and Rights About Data Privacy and Security
Maven Logix
 
PDF
How to Response Cyber Data Breaches at Pakistan
Maven Logix
 
PPTX
Capability Building for Cyber Defense: Software Walk through and Screening
Maven Logix
 
PPTX
PostGreSQL Performance Tuning
Maven Logix
 
PPTX
Information Technology in Renewable Energy
Maven Logix
 
Transforming Healthcare Through Telemedicine
Maven Logix
 
Concepts and Rights About Data Privacy and Security
Maven Logix
 
How to Response Cyber Data Breaches at Pakistan
Maven Logix
 
Capability Building for Cyber Defense: Software Walk through and Screening
Maven Logix
 
PostGreSQL Performance Tuning
Maven Logix
 
Information Technology in Renewable Energy
Maven Logix
 
Ad

Recently uploaded (20)

PDF
AI Image Enhancer: Revolutionizing Visual Quality”
docmasoom
 
PDF
Step-by-Step Guide to Install SAP HANA Studio | Complete Installation Tutoria...
SAP Vista, an A L T Z E N Company
 
PPTX
Explanation about Structures in C language.pptx
Veeral Rathod
 
PDF
How to Download and Install ADT (ABAP Development Tools) for Eclipse IDE | SA...
SAP Vista, an A L T Z E N Company
 
PPT
Why Reliable Server Maintenance Service in New York is Crucial for Your Business
Sam Vohra
 
PDF
WatchTraderHub - Watch Dealer software with inventory management and multi-ch...
WatchDealer Pavel
 
PDF
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
PDF
New Download FL Studio Crack Full Version [Latest 2025]
imang66g
 
PPT
Activate_Methodology_Summary presentatio
annapureddyn
 
PDF
ChatPharo: an Open Architecture for Understanding How to Talk Live to LLMs
ESUG
 
PDF
Salesforce Implementation Services Provider.pdf
VALiNTRY360
 
PDF
advancepresentationskillshdhdhhdhdhdhhfhf
jasmenrojas249
 
PDF
Using licensed Data Loss Prevention (DLP) as a strategic proactive data secur...
Q-Advise
 
PDF
System Center 2025 vs. 2022; What’s new, what’s next_PDF.pdf
Q-Advise
 
PPTX
Web Testing.pptx528278vshbuqffqhhqiwnwuq
studylike474
 
PPTX
Employee salary prediction using Machine learning Project template.ppt
bhanuk27082004
 
PDF
AWS_Agentic_AI_in_Indian_BFSI_A_Strategic_Blueprint_for_Customer.pdf
siddharthnetsavvies
 
PDF
Troubleshooting Virtual Threads in Java!
Tier1 app
 
PPTX
Role Of Python In Programing Language.pptx
jaykoshti048
 
PPTX
Presentation about variables and constant.pptx
kr2589474
 
AI Image Enhancer: Revolutionizing Visual Quality”
docmasoom
 
Step-by-Step Guide to Install SAP HANA Studio | Complete Installation Tutoria...
SAP Vista, an A L T Z E N Company
 
Explanation about Structures in C language.pptx
Veeral Rathod
 
How to Download and Install ADT (ABAP Development Tools) for Eclipse IDE | SA...
SAP Vista, an A L T Z E N Company
 
Why Reliable Server Maintenance Service in New York is Crucial for Your Business
Sam Vohra
 
WatchTraderHub - Watch Dealer software with inventory management and multi-ch...
WatchDealer Pavel
 
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
New Download FL Studio Crack Full Version [Latest 2025]
imang66g
 
Activate_Methodology_Summary presentatio
annapureddyn
 
ChatPharo: an Open Architecture for Understanding How to Talk Live to LLMs
ESUG
 
Salesforce Implementation Services Provider.pdf
VALiNTRY360
 
advancepresentationskillshdhdhhdhdhdhhfhf
jasmenrojas249
 
Using licensed Data Loss Prevention (DLP) as a strategic proactive data secur...
Q-Advise
 
System Center 2025 vs. 2022; What’s new, what’s next_PDF.pdf
Q-Advise
 
Web Testing.pptx528278vshbuqffqhhqiwnwuq
studylike474
 
Employee salary prediction using Machine learning Project template.ppt
bhanuk27082004
 
AWS_Agentic_AI_in_Indian_BFSI_A_Strategic_Blueprint_for_Customer.pdf
siddharthnetsavvies
 
Troubleshooting Virtual Threads in Java!
Tier1 app
 
Role Of Python In Programing Language.pptx
jaykoshti048
 
Presentation about variables and constant.pptx
kr2589474
 

Identity Theft and How to Prevent Them in the Digital Age

  • 2. Identity Theft in the Digital Age!!! • “46000 New IdentityTheftVictim Every Day in 2017” (Javelin Strategy & Research’s 2017 IdentityTheft Report for USA) • More than 17 million victims had more than $ 17 billion stolen over the year.
  • 3. What’s Identity Theft? • Identity fraud is defined as the unauthorized use of another person’s personal information to achieve illicit financial gains • Identity fraud can range from simply using a stolen payment card account, to making a fraudulent purchase, to taking control of existing accounts or opening new accounts. • It’s a serious crime that can wreak havoc with • Finances • Credit history • Insurance • And Reputation
  • 4. ID Theft – the breakdown
  • 5. Types of ID Theft • Children with: • CNIC • No associated information • No one to pay attention – for years • Deceased Individuals with: • CNICs and accounts to close • Personal data • Pre-occupied families • Synthetic Identities: • False information mixed with real to create a new identity • YOU with your: – Bank and credit accounts – Investments – Insurance – CNIC and Govt documents
  • 6. Purposes of ID Theft • To obtain financial and / or medical services and benefits • To conceal identity, with multiple motives: • Creditor and tax evasion • Avoiding criminal records • Illegal immigration • Phishing, whaling • Funding espionage, terrorism
  • 7. Financial Identity Theft • The most common variety, used to: • Steal money • Bank and investment account fraud • Obtain credit • Credit and debit card fraud • Loan fraud • Set up a means to launder money • International crimes • Consequences include: • Loss of savings / investments • Damaged credit • Tax Losses
  • 8. Medical ID Theft • “How Medical IdentityTheft Can GiveYou a Decade of Headaches” (Bloomberg.com/tech- blog 11/8/12) • “…you have to go provider by provider, hospital by hospital, office by office and correct each record…. • “…while you’re… trying to clean up the records, the identity thief can continue to go around and get medical services in the victim’s name. Really there’s no way to effectively shut it down.” • Medical identity fraud is estimated to cost the healthcare industry almost $40 billion annually, driving up the cost of healthcare for everyone.
  • 9. ID Theft Methods • Account Hijacking • The fastest growing form of identity theft; occurs when a criminal obtains your personal banking information and uses it to take over your bank accounts. • Dumpster Diving: searching through garbage for personal information • Retrieving personal data from IT equipment and storage media disposed of carelessly • Retrieving paper bank and credit card statements from home trash bins Camera
  • 10. More ID Theft Methods • Hacking • Taking information from computers through viruses andTrojan horses • Infiltrating organizations that store and process large amounts of particularly valuable personal information • Shoulder Surfing • Eavesdropping or looking over someone’s shoulder to obtain personal information
  • 11. Methods, continued • Phishing and Social Engineering • Impersonating a reputable institution to gain trust, and then asking for information. – Browsing social networking websites for personal details published by users, often using this information to appear more credible.
  • 12. Methods, continued • Just Plain Stealing • Pickpocketing, housebreaking, or other theft: physically stealing bank or credit cards, identification cards, passports, etc. • Using public records about individual citizens, published in official registers – “Skimming” information from bank or credit cards – Exploiting insider access and abusing the rights of privileged IT users
  • 13. Recent Examples close to home • Accounts Opened and Operated without Knowledge • Money Laundering • Accounts of Deceased Operated withoutVerification • BISP Calls • Callers Impersonating as Bank Call Centers Asking for Info • SIM Issuance on CNIC Copies • Stolen ATM and Credit Cards • Use of Stolen SIMs in illegal activities
  • 14. Easy protections • Do not give out financial information (account numbers, credit card numbers or your CNIC number) unless you know the organization or person requesting this information. • Notify your bank or credit card company of any suspicious phone inquiries asking for account information.
  • 15. What can you do? • Take proper steps to safeguard your personal information: • Carry as few credit cards as possible and periodically check to make sure you still have them all. Use an aluminum card case. • Guard your CNIC and Health insurance cards like money. • Try Not to carry around your CNIC and try not to write your CNIC number on anything. – Guard your banking and credit card PINs (Personal Identification Numbers) and passwords carefully. Don’t write them down. • Make your PINs and passwords hard for someone else to guess. • Never use your birth date or any digits from your CNIC number.
  • 16. Computer Precautions • Install a firewall, anti-virus software, and anti-spam software on your computer and make sure these systems are updated often. • Be wary of pop-ups. Most are just legitimate ads, but always close them from theTask Manager. Clicking the X could install a virus on your computer. • Don’t open emails from people you don’t know.
  • 17. 10 Golden Rules 1. There’s no guaranteed get-rich-quick schemes - sound to good to be true? 2. Never send money or give out your details when you do not know / trust the person or company you are giving them to. 3. Destroy personal information, shred documents, credit cards etc. 4. Log directly onto a website rather than clicking on the link provided. 5. Never reply to spam emails, even when you're trying to stop them.
  • 18. 10 Golden Rules 6. Always remember: scammers are cunning and clever.They know how to manipulate you to produce the response they want. 7. Legitimate banks and companies will not ask for your details via email or phone. 8. Just because a company has a well designed website doesn't means it is legitimate. 9. Be suspicious. If you are unsure about anything, seek advice from family or Police. 10. Never get embarrassed by reporting a scam – If you spot a scam or have been scammed contact http://www.nr3c.gov.pk/
  • 19. ThankYou! Feel free to ask any questions!

Editor's Notes

  • #18: There are no guaranteed get rich schemes. These schemes are designed to pull people in and scam them out of a lot of money. You should always be suspicious of offers that say “you can win a load of money by clicking on the link or get rich quick by going to this website” If it sound too good to be true its will be.   Never send money or give your details out to any one you haven’t met or do not know or trust. As seen before scammers will develop your trust with the use of online relationships and sob stories.   The same also applies to companies; do not send money or give your details to companies you do not know or trust – Always carry out checks on companies such as addresses and contact information, even searching the address on things like google maps will give you an idea if they are genuine – Banks & legitimate businesses will never ask for you details and information over the phone or by email so do not hand it over.   Destroy any documents, credit/debit cards and anything else with your personal details on. If criminals get hold of your personal information they can carry out criminal activities online with your money and information.   Never be embarrassed to report a scam these scammers are very clever and devious so there is no shame in being deceived. However if you spot a scam or have been scammed yourself you can contact action fraud or alternatively if you know the suspect or their location contact the police immediately.
  • #19: There are no guaranteed get rich schemes. These schemes are designed to pull people in and scam them out of a lot of money. You should always be suspicious of offers that say “you can win a load of money by clicking on the link or get rich quick by going to this website” If it sound too good to be true its will be.   Never send money or give your details out to any one you haven’t met or do not know or trust. As seen before scammers will develop your trust with the use of online relationships and sob stories.   The same also applies to companies; do not send money or give your details to companies you do not know or trust – Always carry out checks on companies such as addresses and contact information, even searching the address on things like google maps will give you an idea if they are genuine – Banks & legitimate businesses will never ask for you details and information over the phone or by email so do not hand it over.   Destroy any documents, credit/debit cards and anything else with your personal details on. If criminals get hold of your personal information they can carry out criminal activities online with your money and information.   Never be embarrassed to report a scam these scammers are very clever and devious so there is no shame in being deceived. However if you spot a scam or have been scammed yourself you can contact action fraud or alternatively if you know the suspect or their location contact the police immediately.
  • #20: The audience will now ask questions in relation to Cyber Crime and the Presentation.