SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Downloaden Sie, um offline zu lesen
JoshMoulin.com	
  
	
  
Financial	
  Fraud	
  and	
  ID	
  The0	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   1	
  
Instructor’s	
  Background	
  
n  11	
  years	
  in	
  law	
  enforcement	
  
n  Commander	
  –	
  cyber	
  crime	
  
task	
  force	
  
n  Board	
  of	
  Directors	
  –	
  NaLonal	
  
White	
  Collar	
  Crime	
  Center	
  
(NW3C)	
  
n  Leads	
  cyber	
  security	
  team	
  for	
  
a	
  federal	
  agency	
  that	
  focuses	
  
on	
  naLonal	
  security	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   2	
  
Crimes	
  CommiRed	
  with	
  Technology	
  
IdenLty	
  The0	
  
DomesLc	
  Violence	
  
Homicide/Suicide	
  
Internet	
  Fraud/Forgery	
  
E-­‐mail	
  Threats	
  
Bomb	
  Threats	
  
Stalking	
  &	
  Harassment	
  
Missing	
  Persons	
  
Child	
  ExploitaLon	
  &	
  Abuse	
  
Gambling	
  
ProsLtuLon	
  
ExtorLon	
  
NarcoLcs	
  
So0ware	
  Piracy	
  
Intrusions/Hacking/Trade	
  Secrets	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   3	
  
IdenLty	
  The0	
  
n Online	
  ID	
  The0	
  accounts	
  for	
  only	
  10%	
  
of	
  all	
  ID	
  the0	
  
n The	
  other	
  90%	
  is	
  tradiLonal	
  ID	
  the0.	
  	
  
ID’s	
  are	
  stolen	
  a	
  variety	
  of	
  ways	
  
including:	
  
n Dumpster	
  diving	
  (use	
  a	
  confe`	
  shredder)	
  
n Obtaining	
  old	
  IT	
  equipment	
  (copy	
  machines,	
  
personal	
  computers,	
  cell	
  phones	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   4	
  
IdenLty	
  The0	
  
n Finding	
  personal	
  informaLon	
  on	
  public	
  
websites	
  (government	
  and	
  social	
  networks)	
  
n Stealing	
  informaLon	
  from	
  burglary,	
  vehicle	
  
break-­‐ins,	
  purses,	
  wallets,	
  etc.	
  
n Skimming	
  informaLon	
  using	
  RFID	
  chips	
  or	
  
skimmers	
  
n AdverLsing	
  bogus	
  jobs	
  to	
  obtain	
  job	
  
applicaLons	
  and	
  resumes	
  
n Vishing	
  –	
  (telephone	
  scams)	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   5	
  
Copy	
  Machines	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   6	
  
High-­‐Tech	
  ID	
  The0	
  
n VicLms	
  of	
  high-­‐tech	
  ID	
  the0	
  may	
  have	
  
had	
  their	
  informaLon	
  stolen	
  a	
  variety	
  
of	
  ways	
  including:	
  
n Phishing	
  Scams	
  
n SMS	
  Scams	
  (text	
  messages)	
  
n Obtaining	
  usernames	
  and	
  passwords	
  
n InfiltraLng	
  company	
  or	
  medical	
  data	
  
n InfecLng	
  a	
  personal	
  computer	
  with	
  malware	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   7	
  
OperaLng	
  System	
  Updates	
  and	
  Patches	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   8	
  
IE	
  ConLnued	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   9	
  
Viewing	
  CerLficates	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   10	
  
Mozilla	
  Firefox	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   11	
  
Mozilla	
  Firefox	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   12	
  
Mozilla	
  Firefox	
  ConLnued	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   13	
  
Phishing	
  Examples	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   14	
  
Phishing	
  Examples	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   15	
  
Peer	
  to	
  Peer	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   16	
  
Peer	
  to	
  Peer	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   17	
  
P2P	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   18	
  
Website	
  Scraping	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   19	
  
Why	
  do	
  People	
  Commit	
  ID	
  The0?	
  
n Suspects	
  will	
  steal	
  idenLLes	
  to:	
  
n Open	
  a	
  bank	
  account	
  in	
  the	
  vicLm’s	
  name	
  
n Buy	
  vehicles	
  on	
  credit	
  in	
  the	
  vicLm’s	
  name	
  
n Submit	
  loan	
  and	
  credit	
  applicaLons	
  in	
  the	
  
vicLm’s	
  name	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   20	
  
Tips	
  to	
  Protect	
  Against	
  ID	
  The0	
  
n There	
  are	
  several	
  everyday	
  things	
  
people	
  can	
  do	
  to	
  reduce	
  their	
  chances	
  
of	
  being	
  a	
  vicLm	
  of	
  ID	
  the0	
  including:	
  
n Use	
  a	
  cross-­‐cut	
  shredder	
  for	
  all	
  documents	
  
with	
  personal	
  informaLon	
  on	
  it	
  
n Get	
  mail	
  promptly	
  and	
  pay	
  aRenLon	
  to	
  
missing	
  mail	
  
n Review	
  all	
  bank	
  and	
  credit	
  acLvity	
  regularly	
  
for	
  any	
  suspicious	
  acLvity	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   21	
  
Tips	
  to	
  Protect	
  Against	
  ID	
  The0	
  
n Have	
  your	
  statements	
  sent	
  to	
  you	
  
electronically	
  to	
  reduce	
  personal	
  informaLon	
  
in	
  the	
  mail	
  and	
  trash	
  
n Don’t	
  carry	
  your	
  Social	
  Security	
  Card	
  	
  
n Protect	
  your	
  PIN	
  when	
  entering	
  it	
  into	
  any	
  
device	
  
n Pay	
  aRenLon	
  to	
  where	
  your	
  card	
  goes	
  during	
  
a	
  transacLon	
  
n Treat	
  all	
  financial	
  emails	
  with	
  cauLon	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   22	
  
Tips	
  to	
  Protect	
  Against	
  ID	
  The0	
  
n Do	
  not	
  provide	
  personal	
  informaLon	
  or	
  
account	
  informaLon	
  over	
  the	
  phone	
  to	
  
anyone	
  who	
  called	
  you	
  
n Use	
  strong	
  passwords	
  online	
  
n Have	
  up	
  to	
  date	
  anLvirus	
  on	
  all	
  computers	
  
n Maintain	
  the	
  operaLng	
  system	
  security	
  
patches	
  on	
  all	
  computers	
  
n Before	
  making	
  a	
  purchase	
  online,	
  make	
  sure	
  
you’re	
  doing	
  so	
  from	
  a	
  secure	
  site	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   23	
  
Online	
  Scams	
  
n According	
  to	
  the	
  NW3C	
  online	
  scams	
  
increased	
  by	
  110%	
  from	
  last	
  year	
  
n Cyber	
  fraud	
  accounted	
  for	
  $559	
  M	
  
n Some	
  of	
  the	
  most	
  common	
  online	
  
scams	
  include:	
  
n Fraudulent	
  e-­‐cards	
  
n Free	
  iPad	
  offers	
  
n Rental	
  scams	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   24	
  
Online	
  Scams	
  
n Publically	
  available	
  WiFi	
  
n Fake	
  gi0	
  cards	
  
n Immediate	
  assistance	
  scams	
  
n Work	
  from	
  home	
  scams	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   25	
  
Wireless	
  Internet	
  
n Ensure	
  wireless	
  Internet	
  is	
  secure	
  with	
  
encrypLon,	
  requiring	
  a	
  password	
  to	
  
access	
  
n Consider	
  MAC	
  address	
  filtering	
  as	
  well	
  
n “War	
  Driving”	
  is	
  a	
  common	
  occurance	
  	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   26	
  
War	
  Driving	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   27	
  
Wireless	
  Routers	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   28	
  
For	
  Further	
  InformaLon…	
  
www.JoshMoulin.com	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   29	
  

Weitere ähnliche Inhalte

Ähnlich wie Josh Moulin: Internet Scams and Identity Theft Prevention

Cyber Insurance - Setting the scene - The Scene
Cyber Insurance  - Setting the scene - The SceneCyber Insurance  - Setting the scene - The Scene
Cyber Insurance - Setting the scene - The SceneKoen Van Loo
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
Cyber security best practices
Cyber security best practicesCyber security best practices
Cyber security best practicesJohn Moylan
 
cyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearcyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearNIST, berhampur
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...HackIT Ukraine
 
Cyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle EastCyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle EastMohamed N. El-Guindy
 
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionCyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionmoldovaictsummit2016
 
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021Chris Hails
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityMehediHasan996
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 

Ähnlich wie Josh Moulin: Internet Scams and Identity Theft Prevention (20)

ICT ICA3
ICT ICA3ICT ICA3
ICT ICA3
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
 
Cyber Insurance - Setting the scene - The Scene
Cyber Insurance  - Setting the scene - The SceneCyber Insurance  - Setting the scene - The Scene
Cyber Insurance - Setting the scene - The Scene
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Cyber security best practices
Cyber security best practicesCyber security best practices
Cyber security best practices
 
cyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearcyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spear
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
 
Cybercriminality
CybercriminalityCybercriminality
Cybercriminality
 
Cyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle EastCyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle East
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionCyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, prevention
 
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
cybersecurity-101_4
cybersecurity-101_4cybersecurity-101_4
cybersecurity-101_4
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 

Kürzlich hochgeladen

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Kürzlich hochgeladen (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Josh Moulin: Internet Scams and Identity Theft Prevention

  • 1. JoshMoulin.com     Financial  Fraud  and  ID  The0   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   1  
  • 2. Instructor’s  Background   n  11  years  in  law  enforcement   n  Commander  –  cyber  crime   task  force   n  Board  of  Directors  –  NaLonal   White  Collar  Crime  Center   (NW3C)   n  Leads  cyber  security  team  for   a  federal  agency  that  focuses   on  naLonal  security   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   2  
  • 3. Crimes  CommiRed  with  Technology   IdenLty  The0   DomesLc  Violence   Homicide/Suicide   Internet  Fraud/Forgery   E-­‐mail  Threats   Bomb  Threats   Stalking  &  Harassment   Missing  Persons   Child  ExploitaLon  &  Abuse   Gambling   ProsLtuLon   ExtorLon   NarcoLcs   So0ware  Piracy   Intrusions/Hacking/Trade  Secrets   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   3  
  • 4. IdenLty  The0   n Online  ID  The0  accounts  for  only  10%   of  all  ID  the0   n The  other  90%  is  tradiLonal  ID  the0.     ID’s  are  stolen  a  variety  of  ways   including:   n Dumpster  diving  (use  a  confe`  shredder)   n Obtaining  old  IT  equipment  (copy  machines,   personal  computers,  cell  phones   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   4  
  • 5. IdenLty  The0   n Finding  personal  informaLon  on  public   websites  (government  and  social  networks)   n Stealing  informaLon  from  burglary,  vehicle   break-­‐ins,  purses,  wallets,  etc.   n Skimming  informaLon  using  RFID  chips  or   skimmers   n AdverLsing  bogus  jobs  to  obtain  job   applicaLons  and  resumes   n Vishing  –  (telephone  scams)   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   5  
  • 6. Copy  Machines   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   6  
  • 7. High-­‐Tech  ID  The0   n VicLms  of  high-­‐tech  ID  the0  may  have   had  their  informaLon  stolen  a  variety   of  ways  including:   n Phishing  Scams   n SMS  Scams  (text  messages)   n Obtaining  usernames  and  passwords   n InfiltraLng  company  or  medical  data   n InfecLng  a  personal  computer  with  malware   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   7  
  • 8. OperaLng  System  Updates  and  Patches   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   8  
  • 9. IE  ConLnued   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   9  
  • 10. Viewing  CerLficates   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   10  
  • 11. Mozilla  Firefox   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   11  
  • 12. Mozilla  Firefox   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   12  
  • 13. Mozilla  Firefox  ConLnued   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   13  
  • 14. Phishing  Examples   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   14  
  • 15. Phishing  Examples   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   15  
  • 16. Peer  to  Peer   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   16  
  • 17. Peer  to  Peer   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   17  
  • 18. P2P   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   18  
  • 19. Website  Scraping   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   19  
  • 20. Why  do  People  Commit  ID  The0?   n Suspects  will  steal  idenLLes  to:   n Open  a  bank  account  in  the  vicLm’s  name   n Buy  vehicles  on  credit  in  the  vicLm’s  name   n Submit  loan  and  credit  applicaLons  in  the   vicLm’s  name   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   20  
  • 21. Tips  to  Protect  Against  ID  The0   n There  are  several  everyday  things   people  can  do  to  reduce  their  chances   of  being  a  vicLm  of  ID  the0  including:   n Use  a  cross-­‐cut  shredder  for  all  documents   with  personal  informaLon  on  it   n Get  mail  promptly  and  pay  aRenLon  to   missing  mail   n Review  all  bank  and  credit  acLvity  regularly   for  any  suspicious  acLvity   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   21  
  • 22. Tips  to  Protect  Against  ID  The0   n Have  your  statements  sent  to  you   electronically  to  reduce  personal  informaLon   in  the  mail  and  trash   n Don’t  carry  your  Social  Security  Card     n Protect  your  PIN  when  entering  it  into  any   device   n Pay  aRenLon  to  where  your  card  goes  during   a  transacLon   n Treat  all  financial  emails  with  cauLon   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   22  
  • 23. Tips  to  Protect  Against  ID  The0   n Do  not  provide  personal  informaLon  or   account  informaLon  over  the  phone  to   anyone  who  called  you   n Use  strong  passwords  online   n Have  up  to  date  anLvirus  on  all  computers   n Maintain  the  operaLng  system  security   patches  on  all  computers   n Before  making  a  purchase  online,  make  sure   you’re  doing  so  from  a  secure  site   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   23  
  • 24. Online  Scams   n According  to  the  NW3C  online  scams   increased  by  110%  from  last  year   n Cyber  fraud  accounted  for  $559  M   n Some  of  the  most  common  online   scams  include:   n Fraudulent  e-­‐cards   n Free  iPad  offers   n Rental  scams   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   24  
  • 25. Online  Scams   n Publically  available  WiFi   n Fake  gi0  cards   n Immediate  assistance  scams   n Work  from  home  scams   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   25  
  • 26. Wireless  Internet   n Ensure  wireless  Internet  is  secure  with   encrypLon,  requiring  a  password  to   access   n Consider  MAC  address  filtering  as  well   n “War  Driving”  is  a  common  occurance     ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   26  
  • 27. War  Driving   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   27  
  • 28. Wireless  Routers   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   28  
  • 29. For  Further  InformaLon…   www.JoshMoulin.com   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   29