SlideShare ist ein Scribd-Unternehmen logo
1 von 63
How to Steal an
   Identity
My Name Is…


 Richard Hollis
 David Burton
 Sean Bennett
                  ?
… Call me
 Ishmael
The Definition


               “Identity theft is the pilfering of a
             individual’s personal identification
         information, such as name, date of birth,
          passport number, drivers licence, credit
         card number, mother’s maiden name etc.
                  in order to commit fraud”
First Recorded Theft



    Genesis iii: 13

 …and the woman said,
 “The serpent beguiled
   me, and I did eat”.
According to …


 Identity theft is the world’s fasted
            growing crime
Why?



  1. Hard to
  identify


         2. Hard to stop
Why?




 3. “That’s where the money
That’s Where the Money
is…
              2001
Name, Address DOB = £2.00

Credit card # = £2.00

Expiry date = £ 3.00

Security Code = £3.00                                  2006
                        Total = £10.00   Name, Address DOB = £1.00

                                         Credit card # = £1.00

                                         Expiry date = £ 1.00
                                                                                               2012
                                         Security Code = £2.00
                                                                                 Name, Address DOB = £.25
                                                                 Total = £5.00
                                                                                 Credit card # = £.25

                                                                                 Expiry date = £ .25

                                                                                 Security Code = £.25

                                                                                                        Total = £1.00
Chat Up Line # 63


 In March 2008 there were 76.8 million
National Insurance numbers in the UK*.
                           *U.K. Information Commissioner's Office




  UK Population = 61
  million
The Price We Pay

• Identity fraud accounts for a criminal cash
  flow of £12m per day.
• The mean fraud amount per victim is currently
  estimated at £5,783.
• The mean resolution time is over 100 hours
  per victim.
• Over 75% of victims are unable to clear up
  associated credit problems after 6 months.
Fraud Breakdown
Who Are You ?
Three Elements


 1. Attributed

 2. Biometric

 3. Biographi
    c
Attributed Identity

 •   Your name
 •   Date of birth
 •   Place of birth
 •   M other’s name
 •   Father’s name
 •   Family members
 •   Your race
                      Characteristics ascribed
                          to you at birth
Biometric Identity

•   Your height
•   Your weight
•   Color of your eyes
•   Color of your hair
•   Color of your skin
•   Birthmarks
•   Your DNA
•   Your fingerprints
•   Your footprints
•   Your retinal pattern     Your distinguishing
•   Your smell…            physical characteristics
Biographic Identity

 •   Birth certificate
 •   School records
 •   Work permit
 •   Drivers license
 •   Places of
     employment
 •   Places of residences
 •   Marriage certificate
     (s)
 •   Divorce certificate
     (s)                    Your life story
 •   Credit history          information
2 Types

Temporary       Bullet
proof
Attributed   Attributed

Biographic   Biometric

             Biographic
Top Ten Tips
How to Steal an Identity
Tip Number 1

• Take one that’s not being
  used
  – Friend (or frenemy)
  – Neighbour
  – Dead relative
  – Pensioner or invalid
  – Child
  – Co-worker
  – Person sitting next to you?
Birth & Marriage Notices
Genealogy Searches
List Pensioners
Death Notices
Get a Life…
People Search Engines
Google ‘em
Tip Number 2

• Go through their mail
  –   Credit card applications
  –   Credit card statements
  –   Bank statements
  –   Loyalty card promotions
  –   Membership applications
  –   Telephone calling cards
  –   Tax information
  –   Pay stubs - receipts
Tip Number 3

• Go through their trash
  –   Credit card applications
  –   Credit card statements
  –   Bank statement
  –   Loyalty card promotions
  –   Membership applications
  –   Telephone calling cards
  –   Tax information
  –   Pay stubs - receipts
  –   Credit card carbons
Tip Number 4

• Ask for it!
  –   “Pretexting” phone call
  –   Letters to former employers
  –   Military records
  –   FOIA requests
  –   DPA requests
  –   Public records
Credit Reports
Credit Reports
Tip Number 5

Buy the information
  –   Marketing companies
  –   Mailing lists
  –   Targeted media
  –   Email databases
  –   Membership lists
  –   Private detectives
  –   Cyber sleuths
Mailing Lists
Marketing Companies
Private Investigators
Tip Number 6



Buy an ID
Buy Two…
Buy Three…
That’s Where the Money
is…

•   Passport: £350
•   Driver’s license: £75
•   Birth Certificate: £50
•   Bank statements: £50
•   University Degree £45
•   Utility statements: £50
•   Insurance certificates: £25
Tip Number 7

               Hack one!
               •   Cookies
               •   Applets
               •   Trojans
               •   Phishing
               •   Pharming
               •   Harvesting
               •   Botting!
               •   Data Base
Armies Up Their Sleevies
Starter Kit…


Sam Spade very effective
freeware tool that crawls
websites searching and
grabbing email addresses
and address histories etc..
Data Base Hacking

• AKA: “The Mother Load”

• One stop shopping for your
  all your identity data needs…

• Think…Amazon, eBay, Visa,
  MasterCard…

• Think Google
Data Shadow
Chat Up Line #18


In one week, the average person living in Britain
has 3,254 pieces of personal information stored
about him or her in databases.*
                                     *Evening Standard Survey August 2008
Chat Up Line #27


The average UK citizen is in over 750 databases.*
                                 *UK Information Commissioner's' Report: “What Price Privacy?” 2009
Fact



You and I are bought and
     sold every day
Data =
Why Bother Hacking?
Why Bother?
Why Bother?
Why Bother?
Tip Number 8

• Make one
Make One
Make One
Tip Number 9

• Old school

  – Steal a wallet

  – Steal a purse

  – Kidnap someone !
Tip Number 10

• Don’t get caught
Don’t Get Caught

• Once you have it:
  
      Take control of it
  
      Change mailing address
  
      Open new accounts using
      a new (false) address
  
      Request higher credit
      limits
  
      Never drain the account
  
      Charge repeated small
      amounts to cards
  
      Move on…
Face of an Identity Thief


Ricky Leonard Swaner, 50,
arrested by FBI in Feb
2006 on multiple-count
Federal indictment fraud,
identity theft and obtaining
possession of over 2
million dollars of controlled
substances by fraud.
Reduce Your Risk

             • WAKE UP !
             • Practice ID discipline
             • Protect information
                 – Personnel
                 – Client - database
                 – Credit card
                 – Company
Protect Yourself

•   BE PRO-ACTIVE!
•   Look after your identity
•   Don’t give it away
•   Don’t throw it away
•   Don’t sell it
•   Don’t let it be taken from you
•   Look after it as if it belonged to you
Questions ?
26 Dover Street
         London
    United Kingdom
  +44 (0)20 3170 8955
+44 (0)20 3008 6011 (fax)

Weitere ähnliche Inhalte

Ähnlich wie Risk Factory How to Steal an Identity

Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Trainingswalton4
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentationpat7777
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Riskmilfamln
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada- Mark - Fullbright
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Versiondanc752
 
Chapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by RachelChapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by RachelVidaB
 
Identity Theft Overview
Identity Theft OverviewIdentity Theft Overview
Identity Theft Overviewgaby350
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09jwnollet
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
Id theft-phishing-research
Id theft-phishing-researchId theft-phishing-research
Id theft-phishing-researchJustin Saunders
 
1. cyber crime series - identity theft
1. cyber crime series  - identity theft1. cyber crime series  - identity theft
1. cyber crime series - identity theftIsaac Feliciano
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Themmilfamln
 

Ähnlich wie Risk Factory How to Steal an Identity (20)

Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 
Identity Theft Overview Webinar
Identity Theft Overview WebinarIdentity Theft Overview Webinar
Identity Theft Overview Webinar
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
Protect Your Identity
Protect Your IdentityProtect Your Identity
Protect Your Identity
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
Chapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by RachelChapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by Rachel
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Theft Overview
Identity Theft OverviewIdentity Theft Overview
Identity Theft Overview
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
 
Consumer fraud - Just Say No!
Consumer fraud - Just Say No!Consumer fraud - Just Say No!
Consumer fraud - Just Say No!
 
ID Theft
ID TheftID Theft
ID Theft
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
Id theft-phishing-research
Id theft-phishing-researchId theft-phishing-research
Id theft-phishing-research
 
1. cyber crime series - identity theft
1. cyber crime series  - identity theft1. cyber crime series  - identity theft
1. cyber crime series - identity theft
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Them
 

Mehr von Risk Crew

Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Risk Crew
 
Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891Risk Crew
 
Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Risk Crew
 
Risk Factory: Inside the Mind of a Hacker
Risk Factory: Inside the Mind of a HackerRisk Factory: Inside the Mind of a Hacker
Risk Factory: Inside the Mind of a HackerRisk Crew
 
Risk Factory The 2014 Numbers
Risk Factory The 2014 NumbersRisk Factory The 2014 Numbers
Risk Factory The 2014 NumbersRisk Crew
 
Risk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Crew
 
Risk Factory Big Daddy Digs Big Data
Risk Factory Big Daddy Digs Big DataRisk Factory Big Daddy Digs Big Data
Risk Factory Big Daddy Digs Big DataRisk Crew
 
Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013Risk Crew
 
Risk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile DevicesRisk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile DevicesRisk Crew
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Crew
 
Risk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Crew
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Crew
 
Risk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment IndustryRisk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment IndustryRisk Crew
 
Risk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Crew
 
Risk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Crew
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Crew
 
Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Crew
 
Risk Factory: Modems the Forgotten Back Door
Risk Factory: Modems the Forgotten Back DoorRisk Factory: Modems the Forgotten Back Door
Risk Factory: Modems the Forgotten Back DoorRisk Crew
 
Risk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic EavesdroppingRisk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic EavesdroppingRisk Crew
 
Risk Factory Geo-location Security Issues & Best Practices
Risk Factory Geo-location Security Issues & Best PracticesRisk Factory Geo-location Security Issues & Best Practices
Risk Factory Geo-location Security Issues & Best PracticesRisk Crew
 

Mehr von Risk Crew (20)

Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891
 
Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891
 
Risk Factory: Inside the Mind of a Hacker
Risk Factory: Inside the Mind of a HackerRisk Factory: Inside the Mind of a Hacker
Risk Factory: Inside the Mind of a Hacker
 
Risk Factory The 2014 Numbers
Risk Factory The 2014 NumbersRisk Factory The 2014 Numbers
Risk Factory The 2014 Numbers
 
Risk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best Practice
 
Risk Factory Big Daddy Digs Big Data
Risk Factory Big Daddy Digs Big DataRisk Factory Big Daddy Digs Big Data
Risk Factory Big Daddy Digs Big Data
 
Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013
 
Risk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile DevicesRisk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile Devices
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The Essentials
 
Risk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response Programme
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data Leakage
 
Risk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment IndustryRisk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment Industry
 
Risk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Factory: Let's Get Physical
Risk Factory: Let's Get Physical
 
Risk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to Fit
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
 
Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron?
 
Risk Factory: Modems the Forgotten Back Door
Risk Factory: Modems the Forgotten Back DoorRisk Factory: Modems the Forgotten Back Door
Risk Factory: Modems the Forgotten Back Door
 
Risk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic EavesdroppingRisk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic Eavesdropping
 
Risk Factory Geo-location Security Issues & Best Practices
Risk Factory Geo-location Security Issues & Best PracticesRisk Factory Geo-location Security Issues & Best Practices
Risk Factory Geo-location Security Issues & Best Practices
 

Kürzlich hochgeladen

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Kürzlich hochgeladen (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

Risk Factory How to Steal an Identity

  • 1. How to Steal an Identity
  • 2. My Name Is… Richard Hollis David Burton Sean Bennett ? … Call me Ishmael
  • 3. The Definition “Identity theft is the pilfering of a individual’s personal identification information, such as name, date of birth, passport number, drivers licence, credit card number, mother’s maiden name etc. in order to commit fraud”
  • 4. First Recorded Theft Genesis iii: 13 …and the woman said, “The serpent beguiled me, and I did eat”.
  • 5. According to … Identity theft is the world’s fasted growing crime
  • 6. Why? 1. Hard to identify 2. Hard to stop
  • 7. Why? 3. “That’s where the money
  • 8. That’s Where the Money is… 2001 Name, Address DOB = £2.00 Credit card # = £2.00 Expiry date = £ 3.00 Security Code = £3.00 2006 Total = £10.00 Name, Address DOB = £1.00 Credit card # = £1.00 Expiry date = £ 1.00 2012 Security Code = £2.00 Name, Address DOB = £.25 Total = £5.00 Credit card # = £.25 Expiry date = £ .25 Security Code = £.25 Total = £1.00
  • 9. Chat Up Line # 63 In March 2008 there were 76.8 million National Insurance numbers in the UK*. *U.K. Information Commissioner's Office UK Population = 61 million
  • 10. The Price We Pay • Identity fraud accounts for a criminal cash flow of £12m per day. • The mean fraud amount per victim is currently estimated at £5,783. • The mean resolution time is over 100 hours per victim. • Over 75% of victims are unable to clear up associated credit problems after 6 months.
  • 13. Three Elements 1. Attributed 2. Biometric 3. Biographi c
  • 14. Attributed Identity • Your name • Date of birth • Place of birth • M other’s name • Father’s name • Family members • Your race Characteristics ascribed to you at birth
  • 15. Biometric Identity • Your height • Your weight • Color of your eyes • Color of your hair • Color of your skin • Birthmarks • Your DNA • Your fingerprints • Your footprints • Your retinal pattern Your distinguishing • Your smell… physical characteristics
  • 16. Biographic Identity • Birth certificate • School records • Work permit • Drivers license • Places of employment • Places of residences • Marriage certificate (s) • Divorce certificate (s) Your life story • Credit history information
  • 17. 2 Types Temporary Bullet proof Attributed Attributed Biographic Biometric Biographic
  • 18. Top Ten Tips How to Steal an Identity
  • 19. Tip Number 1 • Take one that’s not being used – Friend (or frenemy) – Neighbour – Dead relative – Pensioner or invalid – Child – Co-worker – Person sitting next to you?
  • 20. Birth & Marriage Notices
  • 27. Tip Number 2 • Go through their mail – Credit card applications – Credit card statements – Bank statements – Loyalty card promotions – Membership applications – Telephone calling cards – Tax information – Pay stubs - receipts
  • 28. Tip Number 3 • Go through their trash – Credit card applications – Credit card statements – Bank statement – Loyalty card promotions – Membership applications – Telephone calling cards – Tax information – Pay stubs - receipts – Credit card carbons
  • 29. Tip Number 4 • Ask for it! – “Pretexting” phone call – Letters to former employers – Military records – FOIA requests – DPA requests – Public records
  • 32. Tip Number 5 Buy the information – Marketing companies – Mailing lists – Targeted media – Email databases – Membership lists – Private detectives – Cyber sleuths
  • 39. That’s Where the Money is… • Passport: £350 • Driver’s license: £75 • Birth Certificate: £50 • Bank statements: £50 • University Degree £45 • Utility statements: £50 • Insurance certificates: £25
  • 40. Tip Number 7 Hack one! • Cookies • Applets • Trojans • Phishing • Pharming • Harvesting • Botting! • Data Base
  • 41. Armies Up Their Sleevies
  • 42. Starter Kit… Sam Spade very effective freeware tool that crawls websites searching and grabbing email addresses and address histories etc..
  • 43. Data Base Hacking • AKA: “The Mother Load” • One stop shopping for your all your identity data needs… • Think…Amazon, eBay, Visa, MasterCard… • Think Google
  • 45. Chat Up Line #18 In one week, the average person living in Britain has 3,254 pieces of personal information stored about him or her in databases.* *Evening Standard Survey August 2008
  • 46. Chat Up Line #27 The average UK citizen is in over 750 databases.* *UK Information Commissioner's' Report: “What Price Privacy?” 2009
  • 47. Fact You and I are bought and sold every day
  • 53. Tip Number 8 • Make one
  • 56. Tip Number 9 • Old school – Steal a wallet – Steal a purse – Kidnap someone !
  • 57. Tip Number 10 • Don’t get caught
  • 58. Don’t Get Caught • Once you have it:  Take control of it  Change mailing address  Open new accounts using a new (false) address  Request higher credit limits  Never drain the account  Charge repeated small amounts to cards  Move on…
  • 59. Face of an Identity Thief Ricky Leonard Swaner, 50, arrested by FBI in Feb 2006 on multiple-count Federal indictment fraud, identity theft and obtaining possession of over 2 million dollars of controlled substances by fraud.
  • 60. Reduce Your Risk • WAKE UP ! • Practice ID discipline • Protect information – Personnel – Client - database – Credit card – Company
  • 61. Protect Yourself • BE PRO-ACTIVE! • Look after your identity • Don’t give it away • Don’t throw it away • Don’t sell it • Don’t let it be taken from you • Look after it as if it belonged to you
  • 63. 26 Dover Street London United Kingdom +44 (0)20 3170 8955 +44 (0)20 3008 6011 (fax)