SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Downloaden Sie, um offline zu lesen
IDENTITY THEFT: A GROWING EPIDEMIC?
WE ARE ALL VULNERABLE
Godwin Emmanuel, Oyedokun
HND (Acct.), BSc. (Acct. Ed), MBA (Acct. & Fin.), MSc. (Acct.), MSc. (Bus & Econs.), MSc. (FACI),
MTP (SA), ACA, FCTI, ACIB, MNIM, CNA, FCFIP, FCE, FERP, CICA, CFA, CFE, CIPFA, CPFA,
ABR, CertIFR
godwinoye@yahoo.com
+2348033737184, +2348055863944 & +2348095419026
President, ACFE Lagos Chapter
Partner, Audit and Forensic Services
Ibraheem Jimoh & Co Chartered Accountants
Being a lecture delivered at the January edition of the monthly Meeting of members of ICAN Lagos
Mainland & District Society, held at the RAILWAY RECREATION CLUB, beside Lagos Mainland Local
Government Secretariat, APAPA ROAD, Oyingbo, Lagos
On January 21, 2017
INTRODUCTION
INTRODUCTION
 According to the Federal Trade Commission,
identity theft was the number one fraud
complaint during calendar year 2008.
 And limiting your use of your personal computer
may not help much: a study released by Javelin
Strategy and Research reported that in 2009,
most identity thefts were taking place offline, not
online -- just the opposite of what many of us
here present might think.
 One other troubling finding: the study found that
43 percent of all identity thefts are committed by
someone the victim knows.
INTRODUCTION
 The methods criminals use to steal personal information
change frequently, particularly those that exploit
technology.
 In addition, while identity theft leads to billions of dollars
in losses each year, we consumers aren’t necessarily on the
hook for the full tab.
 In fact, financial institutions assume most of the liability
for spending-related fraud.
 This paper does not in any way pretend to cover all aspect
of Identity theft, but it will do justice to the salient issues
that would help us all as participants in taking extra care
in our dealing either as corporate organisation or
individual.
 The rest of this paper would explore the meaning of
identity theft and identity fraud, how it is being
perpetrated, how to protect ourselves, how to detect same
and what to do if it is established.
IDENTITY THEFT AND IDENTITY FRAUD:
DEFINITIONS
IDENTITY THEFT AND IDENTITY FRAUD:
DEFINITIONS
 Identity theft: Identity theft happens when fraudsters
access enough information about someone’s identity (such as
their name, date of birth, current or previous addresses) to
commit identity fraud.
 Identity theft can take place whether the fraud victim is
alive or deceased.
 Identity theft can lead to fraud that can have a direct impact
on personal finance and could also make it difficult for one to
obtain loans, credit cards or a mortgage until the matter is
resolved.
 Identity fraud: Identity fraud can be described as the use
of that stolen identity in criminal activity to obtain goods or
services by deception.
7
USES OF IDENTITY DETAILS
Fraudsters can use identity details to:
 Open bank accounts.
 Obtain credit cards, loans and state benefits.
 Order goods in your name.
 Take over your existing accounts.
 Take out mobile phone contracts.
 Obtain genuine documents such as passports and
driving licences in your name.
Stealing an individual’s identity details does not, on
its own, constitute identity fraud, but using that
identity for any of the above activities does.
8
FINANCIAL INSTITUTION AND THE
BURDEN OF LOSS
 Consumer information is readily available via the
Internet and criminals engaged in a continuous
game of technological one-upmanship with law
enforcement, one wonder what the future holds for
our financial security.
 Will sophisticated fraudsters be able to overcome
advances in voice and fingerprint recognition once
the technology ultimately becomes cost-effective for
mainstream use?
 Will financial institutions continue to eat the losses
deriving from unauthorized transactions, or will
liability shift more to the consumer at some point?
9
STEMMING IDENTITY THEFT IN NIGERIA
 In Nigeria, we are familiar with online payment platforms -
Quickteller, Virtual Terminal Network, PocketMoni, InterSwitch –
as well as the use of automated teller machines (ATM) in
facilitating e-commerce.
 But with the increased flexibility in handling transactions comes
the added cyber challenge of identity theft or credit card theft
 Lack of a central and unique electronic identification system has
made it virtually impossible to authenticate a specific user in a
uniform fashion across services/platforms.
 The NIMC Act is an option in dealing with some threats to our ICT
infrastructures and a way out in dealing with identity theft.
 The Commission was established to “establish, own, operate,
maintain and manage the National Identity Database in Nigeria”
1
0
FACT ABOUT IDENTITY THEFT FACTS
Common Victims Ski and Play Tennis
 Major credit bureau Experian found the common
activities of people who were more often
victimized by identity theft to have involved in
any of the following activities:
 Skiing
 Tennis
 Politics
 Cultural/arts
 Foreign travel
 Charities/volunteering
1
1
FACT ABOUT IDENTITY THEFT FACTS
 One in 700 thieves are Caught
 Most Common thieves are your family
 Million Records Exposed in Data Breaches
 Common Victims are Children & Deceased
 Smartphone Owners’ Habits Increase Chance of
Fraud
 Victims need five full weeks off to restore Identity
1
2
HOW IDENTITY THEFT ARE COMMITTED
 The human imagination and creativity are endless when it comes
to stealing things,” says Peter Keane, dean emeritus and professor
at the Golden Gate University College of Law.
 Identity thieves commit their crime in several ways:
 Your Trash
 Your Mail
 Phishing
 Skimming
 Straightforward Theft
 Conning
 Address Manipulation
 Information given away
 Dumpster diving
 Shoulder surfing
 Wallet or document theft
1
3
HOW IDENTITY THEFT ARE COMMITTED
 Bogus phone calls
 Pretexting
 Business record theft
 Malware
 Spam
 Spear phishing
 Hacking
 Restaurants
 Data Breaches
 Hacked Shopping Sites
1
4
PROTECTION AGAINST IDENTITY/THEFT
AND FRAUD
The following are also recommended for adequate protection against
the risk of identity theft and fraud:
 Don’t throw out anything with your name, address or financial
details without shredding it first.
 If you receive an unsolicited email or phone call from what appears
to be your bank or building society asking for your security details,
never reveal your full password, login details or account numbers.
Be aware that a bank will never ask for your PIN or for a whole
security number or password.
 If you are concerned about the source of a call, wait five minutes
and call your bank from a different telephone making sure there is
a dialling tone.
1
5
PROTECTION AGAINST IDENTITY/THEFT
AND FRAUD
 Check your statements carefully and report anything suspicious to
the bank or financial service provider concerned.
 Don’t leave things like bills lying around for others to look at.
 If you’re expecting a bank or credit card statement and it doesn’t
arrive, tell your bank or credit card company.
 The three credit reference agencies offer a credit report checking
service to alert you to any key changes on your credit file that
could indicate potential fraudulent activity.
 It is particularly helpful to check your personal credit file 2-3
months after you have moved house.
1
6
WHAT TO DO AS A VICTIM OF
IDENTITY FRAUD
The victim of identity fraud should:
 Act quickly
 Report it to your bank as soon as possible.
 Report the matter to the relevant organisation
 Depending on their advice, you should then alert your
local police force
 Report all lost or stolen documents
 Get a copy of your credit report
 Look at your credit report closely
 The credit reference agencies will contact lenders on
your behalf where fraudulent applications have been
made or fraudulent credit accounts opened in order to
restore your credit history to its former state.
HOW TO PREVENT IDENTITY THEFT
HOW TO PREVENT IDENTITY THEFT
Preventing identity theft starts with managing your personal information
carefully and sensibly. The following among others are recommended
precautions to keep your personal information safe:
 Only carry essential documents with you
 Keep new cheques out of the mail
 Be careful when giving out personal information over the phone
 Your trash is their treasure
 Make sure others are keeping you safe
 Stay on top of your credit
 Protect your Social Security Number
 Follow your credit card billing cycles closely
 Keep a list of account numbers, expiration dates and telephone
numbers filed away
 Create passwords or PIN numbers out of a random mix of letters and
numbers
HOW TO PREVENT IDENTITY THEFT
 Commit all passwords to memory.
 When using an ATM machine, make sure no one is hovering over
you and can see you enter your password.
 When participating in an online auction, try to pay the seller
directly with a credit card so you can dispute the charges if the
merchandise does not arrive or was misrepresented
 Adopt an attitude of healthy skepticism toward websites that
offer prizes or giveaways.
 Choose a commercial online service that offers parental control
features
HOW TO PREVENT IDENTITY THEFT
 Tell your children never to give out their address telephone
number password school name or any other personal information.
 Make sure your children know to never agree to meet face-to-face
with someone they have met online without discussing it with
you.
 Tell your children never to respond to messages that have bad
words, are scary, or just seem weird.
 Tell your children never to enter an area that charges for services
without asking you first.
 Tell children never send a picture of themselves to anyone
without your permission.
 Make sure that access to the Internet at your children’s school is
monitored by adults.
CONCLUSION
SUMMARY AND CONCLUSION
 Identity theft is the fastest growing crime in
Nigeria, the truth of the matter is that the so called
developed country have also recorded the highest
number of cases in the time past, and it is currently
the most common consumer complaint.
 Identity theft costs victims a lot of money, stress and
time, but impostors show no mercy as they continue
to find new and more sophisticated ways to commit
the crime (bestidtheftcompanys.com).
SUMMARY AND CONCLUSION
 Identity theft can cost you a lot of money as well as create
confusion across the breadth of your life, but despite the horror
stories, you have to wonder how prevalent identity theft
actually is as well as what you can do to prevent it (Odysseas
Papadimitriou, 2013).
 Identity theft and fraud are terrifying prospects for consumers,
as they can lead to financial losses and credit score damage.
 However, these types of crime are far less common than you
might think, and you can further reduce the likelihood of
falling victim to them by taking a few commonsense measures
to protect your personal information.
SUMMARY AND CONCLUSION
 Distinguished members of my District (ICAN
LMDS), I can confirm to you that we are all
venerable because the issue of identity theft has
became growing epidemic and sure, exercising
common sense will always be your best defence
against identity thieves, the hope is that advances in
identity verification will also make life more difficult
for criminals in the future.
 Conferences and or training of this nature would
help our members and continue to shape their
consciousness while implementing safety measure or
investing cases of identity theft.
SUMMARY AND CONCLUSION
 Take credit card transactions, for example. Steven
Myers, an assistant professor of informatics and
computing at the Indiana University have this to
say: “A credit-card is supposed to identify the
person, but it is easy to imagine the deployment of
technology which uses a camera to perform facial
recognition, a mic to perform voice recognition, etc.,”
 “Right now those technologies are very expensive,
but research is going on to bring down the cost of
biometric measures, so that should bring down
identity theft a lot.” (Swapnoneel Roy, an assistant
professor with the University of North
Florida’s School of Computing)
SUMMARY AND CONCLUSION
 Still, we can’t expect identity theft to disappear
altogether, in part because the potential payoff will
always allure criminals and in part because we are
increasingly putting more and more of our personal
information online for the world to see.
 Vijay Kanabar, an associate professor of computer
science and administrative services at Boston
University also stated that “the biggest disturbing
trend in identity theft will definitely be social media,
as there will be no privacy.”
CASES
 Ayo Animashaun victim of identity theft
 The HipTv boss made this known on July 2015 when he announced on
Instagram that an impostor is trying to rip off up and coming artistes by
demanding payment for airing their music videos on his programme.
 Another Ayo Animashaun impersonating him. He charges and collects money
on behalf of HipTv. This guy mirrors all his posts, It won’t be surprised if he
reposts this to confuse people. His original Facebook account has over 4,800
friends as opposed to the fake account.
TV personality, Ayo Animashaun
CASES
 Nigerian Woman in UK Arrested for Identity Theft
 Oluwaseun Adenubi, a 30 year old Nigerian woman in the UK, has been
arrested by the UK authorities and charged with identity theft.
 It was discovered that she stole the identity of another Nigerian-British born
woman so as to have her needs and those of her baby, taken care of by that
country’s tax payers.
 This is according to reports by Daily Mail. Adenubi posed as Rita Ogunkunle to
obtain free NHS medical care during the delivery of her son Moses, and also
got a £3,500 payment in the process.
 In addition to that she has been receiving about £9000/year in state handouts
while living in the east London suburb.
 She also allowed Ogunkunle, 32, and partner Michael Adebambo, 46, to
register as Moses’s parents to get him free NHS care and a UK passport, a
court heard.
CASES
 Nigerian twist #1: Trust me — send no money
 The scam: In London, England, a would-be renter is fooled into believing she’s
dealing with a legitimate apartment owner when he tells her there’s no need to
send an advance payment to him.
 The cunning crook spins a story about having trouble with previous renters
and wanting proof of her ability to pay. But he suggests she should send some
money — about $2500 — as an electronic payment to a friend or relative of her
choice.
 That way, he says, it will prove she has the money but it will remain safe.
Here’s the catch: as proof of payment, he asks for a scanned copy of the
transfer payment. A while later, posing as the friend or relative, he uses this
copy to collect the money from a Western Union office.
 The solution: It’s not clear if Western Union was fooled into thinking the
document was an original or if they will pay out on presentation of a copy. All
they would say is that they are investigating the scam.
 Meanwhile, the message is clear: not only should you not send electronic
payments to someone you don’t know and trust but also don’t send them a copy
either.
CASES
 Nigerian twist #2: Send me the stuff — I’ll use PayPal
 The scam: Wise to the use of forged checks and stolen credit cards to pay for
items they’re selling, many vendors using services like eBay and Craigslist
now insist they’ll only accept payments via PayPal, especially to buyers who
ask for shipment overseas — usually to Africa.
 Fine. But what happens when you get an email apparently from PayPal saying
your account has now been credited with the money you’re awaiting?
 Well, if you don’t independently check your account, you may have just
received a fake message that’s not from PayPal at all.
 It’s easy to do if the buyer gets your email address and it’s just as easy for
scammers to design a message that looks like the real thing. And that’s what
they’re now doing in a big way.
 The solution: Simple. As suggested above, check your PayPal account to
make sure the money really is there.
CASES
 Nigerian twist #3: It’s OK — we’re the FBI, um, the President
 The scam: A resident of North Kenai, Alaska, sniffs out a scam when she
receives a $30,000 check, supposedly from the Central Bank of Nigeria, and is
told to take 10% and forward the rest. She doesn’t.
 Later she gets what seems to be an email from the FBI. It says they’ve been
monitoring her email and investigating the bank and “confirmed your contract
payment is 100% genuine and hitch free.”
 She still doesn’t bite, so a couple of days later the scammers send another
message, this time from the “United Nations 2007 Compensations Payments
Directive” saying the Nigerian government is concerned about its image and
the President wants to pay the woman $300,000 compensation to redeem its
good name!
 Now, of course, they just want her bank details so they can forward the money.
She doesn’t fall for that either.
 The solution: Talk about persistence! As usual, the warnings here are that you
don’t get money for nothing, never wire cash to someone you don’t know, and
don’t give your bank details to someone you don’t know — even someone who
says he’s the President of Nigeria!
THANKS FOR LISTENING
REFERENCES
 Arowosaiye Y. I, (2013) “The New Phenomenon of Phishing, Credit Card Fraud, Identity Theft, Internet Piracy and
Nigerian Criminal Law” available
at http://www.unilorin.edu.ng/publications/arowosayeyi/THE_NEW_PHENOMENON_OF_PHISHING.pdf accessed
14/01/2013
 http://www.actionfraud.police.uk/fraud_protection/identity_fraud
 http://www.nigerianlawtoday.com/2013/01/stemming-identity-theft-in-nigeria_16.html
 http://www.ncpc.org/topics/fraud-and-identity-theft/tips-to-prevent-identity-theft
 http://www.nigeriacreditreport.com/services/creditadvice/identitytheft.htm
 http://www.ncpc.org/topics/fraud-and-identity-theft/tips-to-prevent-identity-theft
 http://www.nigeriacreditreport.com/services/creditadvice/identitytheft.htm
 https://www.dia.govt.nz/Identity---How-does-identity-theft-happen
 https://www.transunion.com/personal-credit/identity-theft-and-fraud/how-to-prevent-identity-theft.page
 Papadimitriou, O (2013). Identity Theft: What It Is, How It Happens & the Best Protection
 Downloaded from http://www.cardhub.com/edu/identity-theft/
 Leamy, E. (2008). How Identity Theft Happens and How to Protect Yourself: downloaded from
http://abcnews.go.com/Technology/story?id=4766894&page=1
 Sid Kirchheimer (2013). 10 Ways to Prevent Identity Theft: Downloaded 11/11/2015 on from
http://www.aarp.org/money/scams-fraud/info-09-2013/prevent-identity-theft.html
 www.nimc.gov.ng
 10 Shocking ID Theft Facts of 2012 downloaded on 11/11/2015 from http://bestidtheftcompanys.com/10-shocking-id-
theft-facts-of-2012
 http://www.scambusters.org/nigerianscams.html
 http://jaguda.com/2015/08/11/nigerian-woman-in-uk-arrrested-for-identity-theft/
 http://thenationonlineng.net/ayo-animashaun-victim-of-identity-theft/
 http://wreg.com/2015/11/08/bartlett-woman-charged-with-identity-theft-stealing-362k-from-employer/

Weitere ähnliche Inhalte

Was ist angesagt?

4 Most Common Forensic Accounting Investigation Cases
4 Most Common Forensic Accounting Investigation Cases4 Most Common Forensic Accounting Investigation Cases
4 Most Common Forensic Accounting Investigation CasesVeriti Consulting LLC
 
Forensic accounting
Forensic accountingForensic accounting
Forensic accountingruquia shah
 
Ebook audit case study
Ebook audit case studyEbook audit case study
Ebook audit case studyngocnhian
 
Application of forensic audit and investigation in resolving tax related frau...
Application of forensic audit and investigation in resolving tax related frau...Application of forensic audit and investigation in resolving tax related frau...
Application of forensic audit and investigation in resolving tax related frau...Newman Enyioko
 
Application of forensic audit and investigation in resolving tax related frau...
Application of forensic audit and investigation in resolving tax related frau...Application of forensic audit and investigation in resolving tax related frau...
Application of forensic audit and investigation in resolving tax related frau...Newman Enyioko
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in bankssathyananda prabhu
 
Forensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert WitnessForensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert WitnessNeeraj Aarora
 
Application of forensic accounting a tool for confidence in auditors’ reports
Application of forensic accounting a tool for confidence in auditors’ reportsApplication of forensic accounting a tool for confidence in auditors’ reports
Application of forensic accounting a tool for confidence in auditors’ reportsAlexander Decker
 
Forensic Accounting | Accounting
Forensic Accounting | AccountingForensic Accounting | Accounting
Forensic Accounting | AccountingTransweb Global Inc
 
jurnal fraud not detected.pdf
jurnal fraud not detected.pdfjurnal fraud not detected.pdf
jurnal fraud not detected.pdfYuanSari1
 
Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managersrickycfe
 

Was ist angesagt? (20)

Forensic accounting and investigation a means of curbing money laundering act...
Forensic accounting and investigation a means of curbing money laundering act...Forensic accounting and investigation a means of curbing money laundering act...
Forensic accounting and investigation a means of curbing money laundering act...
 
Forensic/Investigation report writing techniques
Forensic/Investigation report writing techniquesForensic/Investigation report writing techniques
Forensic/Investigation report writing techniques
 
eNAIRA: BENEFITS AND CHALLENGES
eNAIRA: BENEFITS AND CHALLENGESeNAIRA: BENEFITS AND CHALLENGES
eNAIRA: BENEFITS AND CHALLENGES
 
4 Most Common Forensic Accounting Investigation Cases
4 Most Common Forensic Accounting Investigation Cases4 Most Common Forensic Accounting Investigation Cases
4 Most Common Forensic Accounting Investigation Cases
 
Forensic accounting
Forensic accountingForensic accounting
Forensic accounting
 
D4S2 Red Flags.pptx
D4S2 Red Flags.pptxD4S2 Red Flags.pptx
D4S2 Red Flags.pptx
 
Ebook audit case study
Ebook audit case studyEbook audit case study
Ebook audit case study
 
Application of forensic audit and investigation in resolving tax related frau...
Application of forensic audit and investigation in resolving tax related frau...Application of forensic audit and investigation in resolving tax related frau...
Application of forensic audit and investigation in resolving tax related frau...
 
Application of forensic audit and investigation in resolving tax related frau...
Application of forensic audit and investigation in resolving tax related frau...Application of forensic audit and investigation in resolving tax related frau...
Application of forensic audit and investigation in resolving tax related frau...
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in banks
 
Forensic accounting
Forensic accountingForensic accounting
Forensic accounting
 
Introduction to Forensic Accounting
Introduction to Forensic AccountingIntroduction to Forensic Accounting
Introduction to Forensic Accounting
 
Skill set, ethical conduct and professional communication for forensic accoun...
Skill set, ethical conduct and professional communication for forensic accoun...Skill set, ethical conduct and professional communication for forensic accoun...
Skill set, ethical conduct and professional communication for forensic accoun...
 
Forensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert WitnessForensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert Witness
 
Application of forensic accounting a tool for confidence in auditors’ reports
Application of forensic accounting a tool for confidence in auditors’ reportsApplication of forensic accounting a tool for confidence in auditors’ reports
Application of forensic accounting a tool for confidence in auditors’ reports
 
Forensic Accounting | Accounting
Forensic Accounting | AccountingForensic Accounting | Accounting
Forensic Accounting | Accounting
 
jurnal fraud not detected.pdf
jurnal fraud not detected.pdfjurnal fraud not detected.pdf
jurnal fraud not detected.pdf
 
Fraud principles1
Fraud principles1Fraud principles1
Fraud principles1
 
Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managers
 
Introduction to Forensic Accounting
Introduction to Forensic AccountingIntroduction to Forensic Accounting
Introduction to Forensic Accounting
 

Ähnlich wie Identity theft godwin oyedokun

Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft PreventionOremDPS
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pdjeelsonani003567
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft- Mark - Fullbright
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentityForce
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft TestLisa Sosebee
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRon Drew
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminarmullarkea
 

Ähnlich wie Identity theft godwin oyedokun (20)

Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd
 
Identity Theft Overview Webinar
Identity Theft Overview WebinarIdentity Theft Overview Webinar
Identity Theft Overview Webinar
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent It
 
Fight Back Against Identity Theft 98160
Fight Back Against Identity Theft  98160Fight Back Against Identity Theft  98160
Fight Back Against Identity Theft 98160
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptb
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
 

Mehr von Godwin Emmanuel Oyedokun MBA MSc ACA ACIB FCTI FCFIP CFE

Mehr von Godwin Emmanuel Oyedokun MBA MSc ACA ACIB FCTI FCFIP CFE (20)

IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
 
Growing Our Digital World In Nigeria: Forensic and Tax Accounting Perspective
Growing Our Digital World In Nigeria: Forensic and Tax Accounting PerspectiveGrowing Our Digital World In Nigeria: Forensic and Tax Accounting Perspective
Growing Our Digital World In Nigeria: Forensic and Tax Accounting Perspective
 
FRAUD IDENTIFICATION IN FORENSIC TAX INVESTIGATION AND RULE OF EVIDENCE
FRAUD IDENTIFICATION IN FORENSIC TAX INVESTIGATION AND RULE OF EVIDENCEFRAUD IDENTIFICATION IN FORENSIC TAX INVESTIGATION AND RULE OF EVIDENCE
FRAUD IDENTIFICATION IN FORENSIC TAX INVESTIGATION AND RULE OF EVIDENCE
 
GENERAL OVERVIEW OF ACCOUNTING AND FINANCIAL REPORTING BEST PRACTICES AND STR...
GENERAL OVERVIEW OF ACCOUNTING AND FINANCIAL REPORTING BEST PRACTICES AND STR...GENERAL OVERVIEW OF ACCOUNTING AND FINANCIAL REPORTING BEST PRACTICES AND STR...
GENERAL OVERVIEW OF ACCOUNTING AND FINANCIAL REPORTING BEST PRACTICES AND STR...
 
YES I DO: HOW SACRED IS YOUR MARRIAGE VOW?
YES I DO:  HOW SACRED IS YOUR MARRIAGE VOW?YES I DO:  HOW SACRED IS YOUR MARRIAGE VOW?
YES I DO: HOW SACRED IS YOUR MARRIAGE VOW?
 
PROSPECT AND CHALLENGES OF DIGITAL TAXES IN THE 21ST CENTURY
PROSPECT AND CHALLENGES OF DIGITAL TAXES IN THE 21ST CENTURYPROSPECT AND CHALLENGES OF DIGITAL TAXES IN THE 21ST CENTURY
PROSPECT AND CHALLENGES OF DIGITAL TAXES IN THE 21ST CENTURY
 
ANALYTICAL REVIEW AND PROCEDURE: RESEARCH AND ACCEPTABLE PAPER FOR INDEXED JO...
ANALYTICAL REVIEW AND PROCEDURE: RESEARCH AND ACCEPTABLE PAPER FOR INDEXED JO...ANALYTICAL REVIEW AND PROCEDURE: RESEARCH AND ACCEPTABLE PAPER FOR INDEXED JO...
ANALYTICAL REVIEW AND PROCEDURE: RESEARCH AND ACCEPTABLE PAPER FOR INDEXED JO...
 
MANAGEMENT, SUSTAINABLE DEVELOPMENT, SECURITY AND SUPPLY CHAIN TRANSFORMATION...
MANAGEMENT, SUSTAINABLE DEVELOPMENT, SECURITY AND SUPPLY CHAIN TRANSFORMATION...MANAGEMENT, SUSTAINABLE DEVELOPMENT, SECURITY AND SUPPLY CHAIN TRANSFORMATION...
MANAGEMENT, SUSTAINABLE DEVELOPMENT, SECURITY AND SUPPLY CHAIN TRANSFORMATION...
 
CAMA 2020 THE IMPORTANCE AND THE REVIEW
CAMA 2020 THE IMPORTANCE AND THE REVIEWCAMA 2020 THE IMPORTANCE AND THE REVIEW
CAMA 2020 THE IMPORTANCE AND THE REVIEW
 
Tax incentives and the reality of revenue generation in nigeria prof oyedokun...
Tax incentives and the reality of revenue generation in nigeria prof oyedokun...Tax incentives and the reality of revenue generation in nigeria prof oyedokun...
Tax incentives and the reality of revenue generation in nigeria prof oyedokun...
 
Presentation skills preparation and sourcing of materials using microsoft po...
Presentation skills  preparation and sourcing of materials using microsoft po...Presentation skills  preparation and sourcing of materials using microsoft po...
Presentation skills preparation and sourcing of materials using microsoft po...
 
Building trust in a connected cfe world prof. godwin oyedokun 2020
Building trust in a connected cfe world prof. godwin oyedokun 2020Building trust in a connected cfe world prof. godwin oyedokun 2020
Building trust in a connected cfe world prof. godwin oyedokun 2020
 
Bribery and corruption alm cft by prof oyedokun
Bribery and corruption alm cft by prof oyedokunBribery and corruption alm cft by prof oyedokun
Bribery and corruption alm cft by prof oyedokun
 
Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)
 
BUILDING TRUST IN A CONNECTED WORLD – HAYNNE’S ROYAL COMMISSION
BUILDING TRUST IN A CONNECTED WORLD – HAYNNE’S ROYAL COMMISSIONBUILDING TRUST IN A CONNECTED WORLD – HAYNNE’S ROYAL COMMISSION
BUILDING TRUST IN A CONNECTED WORLD – HAYNNE’S ROYAL COMMISSION
 
Creative accounting, tax, and financial fraud. 3rd acfe conference
Creative accounting, tax, and financial fraud. 3rd acfe conferenceCreative accounting, tax, and financial fraud. 3rd acfe conference
Creative accounting, tax, and financial fraud. 3rd acfe conference
 
Financial intelligence; emerging perspective to productive entrepreneurial
Financial intelligence; emerging perspective to productive entrepreneurialFinancial intelligence; emerging perspective to productive entrepreneurial
Financial intelligence; emerging perspective to productive entrepreneurial
 
Impact of taxation on gov revenue generation in nigeria
Impact of taxation on gov revenue generation in nigeriaImpact of taxation on gov revenue generation in nigeria
Impact of taxation on gov revenue generation in nigeria
 
Taxation as a tool for Stimulating Revenue Generation in public sector organi...
Taxation as a tool for Stimulating Revenue Generation in public sector organi...Taxation as a tool for Stimulating Revenue Generation in public sector organi...
Taxation as a tool for Stimulating Revenue Generation in public sector organi...
 
FORENSIC ACCOUNTING AND THE WAR AGAINST CORRUPTION IN NIGERIA: A NEXUS
FORENSIC ACCOUNTING AND THE WAR AGAINST CORRUPTION IN NIGERIA: A NEXUSFORENSIC ACCOUNTING AND THE WAR AGAINST CORRUPTION IN NIGERIA: A NEXUS
FORENSIC ACCOUNTING AND THE WAR AGAINST CORRUPTION IN NIGERIA: A NEXUS
 

Kürzlich hochgeladen

PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 

Kürzlich hochgeladen (17)

PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 

Identity theft godwin oyedokun

  • 1. IDENTITY THEFT: A GROWING EPIDEMIC? WE ARE ALL VULNERABLE Godwin Emmanuel, Oyedokun HND (Acct.), BSc. (Acct. Ed), MBA (Acct. & Fin.), MSc. (Acct.), MSc. (Bus & Econs.), MSc. (FACI), MTP (SA), ACA, FCTI, ACIB, MNIM, CNA, FCFIP, FCE, FERP, CICA, CFA, CFE, CIPFA, CPFA, ABR, CertIFR godwinoye@yahoo.com +2348033737184, +2348055863944 & +2348095419026 President, ACFE Lagos Chapter Partner, Audit and Forensic Services Ibraheem Jimoh & Co Chartered Accountants Being a lecture delivered at the January edition of the monthly Meeting of members of ICAN Lagos Mainland & District Society, held at the RAILWAY RECREATION CLUB, beside Lagos Mainland Local Government Secretariat, APAPA ROAD, Oyingbo, Lagos On January 21, 2017
  • 3. INTRODUCTION  According to the Federal Trade Commission, identity theft was the number one fraud complaint during calendar year 2008.  And limiting your use of your personal computer may not help much: a study released by Javelin Strategy and Research reported that in 2009, most identity thefts were taking place offline, not online -- just the opposite of what many of us here present might think.  One other troubling finding: the study found that 43 percent of all identity thefts are committed by someone the victim knows.
  • 4. INTRODUCTION  The methods criminals use to steal personal information change frequently, particularly those that exploit technology.  In addition, while identity theft leads to billions of dollars in losses each year, we consumers aren’t necessarily on the hook for the full tab.  In fact, financial institutions assume most of the liability for spending-related fraud.  This paper does not in any way pretend to cover all aspect of Identity theft, but it will do justice to the salient issues that would help us all as participants in taking extra care in our dealing either as corporate organisation or individual.  The rest of this paper would explore the meaning of identity theft and identity fraud, how it is being perpetrated, how to protect ourselves, how to detect same and what to do if it is established.
  • 5. IDENTITY THEFT AND IDENTITY FRAUD: DEFINITIONS
  • 6. IDENTITY THEFT AND IDENTITY FRAUD: DEFINITIONS  Identity theft: Identity theft happens when fraudsters access enough information about someone’s identity (such as their name, date of birth, current or previous addresses) to commit identity fraud.  Identity theft can take place whether the fraud victim is alive or deceased.  Identity theft can lead to fraud that can have a direct impact on personal finance and could also make it difficult for one to obtain loans, credit cards or a mortgage until the matter is resolved.  Identity fraud: Identity fraud can be described as the use of that stolen identity in criminal activity to obtain goods or services by deception.
  • 7. 7 USES OF IDENTITY DETAILS Fraudsters can use identity details to:  Open bank accounts.  Obtain credit cards, loans and state benefits.  Order goods in your name.  Take over your existing accounts.  Take out mobile phone contracts.  Obtain genuine documents such as passports and driving licences in your name. Stealing an individual’s identity details does not, on its own, constitute identity fraud, but using that identity for any of the above activities does.
  • 8. 8 FINANCIAL INSTITUTION AND THE BURDEN OF LOSS  Consumer information is readily available via the Internet and criminals engaged in a continuous game of technological one-upmanship with law enforcement, one wonder what the future holds for our financial security.  Will sophisticated fraudsters be able to overcome advances in voice and fingerprint recognition once the technology ultimately becomes cost-effective for mainstream use?  Will financial institutions continue to eat the losses deriving from unauthorized transactions, or will liability shift more to the consumer at some point?
  • 9. 9 STEMMING IDENTITY THEFT IN NIGERIA  In Nigeria, we are familiar with online payment platforms - Quickteller, Virtual Terminal Network, PocketMoni, InterSwitch – as well as the use of automated teller machines (ATM) in facilitating e-commerce.  But with the increased flexibility in handling transactions comes the added cyber challenge of identity theft or credit card theft  Lack of a central and unique electronic identification system has made it virtually impossible to authenticate a specific user in a uniform fashion across services/platforms.  The NIMC Act is an option in dealing with some threats to our ICT infrastructures and a way out in dealing with identity theft.  The Commission was established to “establish, own, operate, maintain and manage the National Identity Database in Nigeria”
  • 10. 1 0 FACT ABOUT IDENTITY THEFT FACTS Common Victims Ski and Play Tennis  Major credit bureau Experian found the common activities of people who were more often victimized by identity theft to have involved in any of the following activities:  Skiing  Tennis  Politics  Cultural/arts  Foreign travel  Charities/volunteering
  • 11. 1 1 FACT ABOUT IDENTITY THEFT FACTS  One in 700 thieves are Caught  Most Common thieves are your family  Million Records Exposed in Data Breaches  Common Victims are Children & Deceased  Smartphone Owners’ Habits Increase Chance of Fraud  Victims need five full weeks off to restore Identity
  • 12. 1 2 HOW IDENTITY THEFT ARE COMMITTED  The human imagination and creativity are endless when it comes to stealing things,” says Peter Keane, dean emeritus and professor at the Golden Gate University College of Law.  Identity thieves commit their crime in several ways:  Your Trash  Your Mail  Phishing  Skimming  Straightforward Theft  Conning  Address Manipulation  Information given away  Dumpster diving  Shoulder surfing  Wallet or document theft
  • 13. 1 3 HOW IDENTITY THEFT ARE COMMITTED  Bogus phone calls  Pretexting  Business record theft  Malware  Spam  Spear phishing  Hacking  Restaurants  Data Breaches  Hacked Shopping Sites
  • 14. 1 4 PROTECTION AGAINST IDENTITY/THEFT AND FRAUD The following are also recommended for adequate protection against the risk of identity theft and fraud:  Don’t throw out anything with your name, address or financial details without shredding it first.  If you receive an unsolicited email or phone call from what appears to be your bank or building society asking for your security details, never reveal your full password, login details or account numbers. Be aware that a bank will never ask for your PIN or for a whole security number or password.  If you are concerned about the source of a call, wait five minutes and call your bank from a different telephone making sure there is a dialling tone.
  • 15. 1 5 PROTECTION AGAINST IDENTITY/THEFT AND FRAUD  Check your statements carefully and report anything suspicious to the bank or financial service provider concerned.  Don’t leave things like bills lying around for others to look at.  If you’re expecting a bank or credit card statement and it doesn’t arrive, tell your bank or credit card company.  The three credit reference agencies offer a credit report checking service to alert you to any key changes on your credit file that could indicate potential fraudulent activity.  It is particularly helpful to check your personal credit file 2-3 months after you have moved house.
  • 16. 1 6 WHAT TO DO AS A VICTIM OF IDENTITY FRAUD The victim of identity fraud should:  Act quickly  Report it to your bank as soon as possible.  Report the matter to the relevant organisation  Depending on their advice, you should then alert your local police force  Report all lost or stolen documents  Get a copy of your credit report  Look at your credit report closely  The credit reference agencies will contact lenders on your behalf where fraudulent applications have been made or fraudulent credit accounts opened in order to restore your credit history to its former state.
  • 17. HOW TO PREVENT IDENTITY THEFT
  • 18. HOW TO PREVENT IDENTITY THEFT Preventing identity theft starts with managing your personal information carefully and sensibly. The following among others are recommended precautions to keep your personal information safe:  Only carry essential documents with you  Keep new cheques out of the mail  Be careful when giving out personal information over the phone  Your trash is their treasure  Make sure others are keeping you safe  Stay on top of your credit  Protect your Social Security Number  Follow your credit card billing cycles closely  Keep a list of account numbers, expiration dates and telephone numbers filed away  Create passwords or PIN numbers out of a random mix of letters and numbers
  • 19. HOW TO PREVENT IDENTITY THEFT  Commit all passwords to memory.  When using an ATM machine, make sure no one is hovering over you and can see you enter your password.  When participating in an online auction, try to pay the seller directly with a credit card so you can dispute the charges if the merchandise does not arrive or was misrepresented  Adopt an attitude of healthy skepticism toward websites that offer prizes or giveaways.  Choose a commercial online service that offers parental control features
  • 20. HOW TO PREVENT IDENTITY THEFT  Tell your children never to give out their address telephone number password school name or any other personal information.  Make sure your children know to never agree to meet face-to-face with someone they have met online without discussing it with you.  Tell your children never to respond to messages that have bad words, are scary, or just seem weird.  Tell your children never to enter an area that charges for services without asking you first.  Tell children never send a picture of themselves to anyone without your permission.  Make sure that access to the Internet at your children’s school is monitored by adults.
  • 22. SUMMARY AND CONCLUSION  Identity theft is the fastest growing crime in Nigeria, the truth of the matter is that the so called developed country have also recorded the highest number of cases in the time past, and it is currently the most common consumer complaint.  Identity theft costs victims a lot of money, stress and time, but impostors show no mercy as they continue to find new and more sophisticated ways to commit the crime (bestidtheftcompanys.com).
  • 23. SUMMARY AND CONCLUSION  Identity theft can cost you a lot of money as well as create confusion across the breadth of your life, but despite the horror stories, you have to wonder how prevalent identity theft actually is as well as what you can do to prevent it (Odysseas Papadimitriou, 2013).  Identity theft and fraud are terrifying prospects for consumers, as they can lead to financial losses and credit score damage.  However, these types of crime are far less common than you might think, and you can further reduce the likelihood of falling victim to them by taking a few commonsense measures to protect your personal information.
  • 24. SUMMARY AND CONCLUSION  Distinguished members of my District (ICAN LMDS), I can confirm to you that we are all venerable because the issue of identity theft has became growing epidemic and sure, exercising common sense will always be your best defence against identity thieves, the hope is that advances in identity verification will also make life more difficult for criminals in the future.  Conferences and or training of this nature would help our members and continue to shape their consciousness while implementing safety measure or investing cases of identity theft.
  • 25. SUMMARY AND CONCLUSION  Take credit card transactions, for example. Steven Myers, an assistant professor of informatics and computing at the Indiana University have this to say: “A credit-card is supposed to identify the person, but it is easy to imagine the deployment of technology which uses a camera to perform facial recognition, a mic to perform voice recognition, etc.,”  “Right now those technologies are very expensive, but research is going on to bring down the cost of biometric measures, so that should bring down identity theft a lot.” (Swapnoneel Roy, an assistant professor with the University of North Florida’s School of Computing)
  • 26. SUMMARY AND CONCLUSION  Still, we can’t expect identity theft to disappear altogether, in part because the potential payoff will always allure criminals and in part because we are increasingly putting more and more of our personal information online for the world to see.  Vijay Kanabar, an associate professor of computer science and administrative services at Boston University also stated that “the biggest disturbing trend in identity theft will definitely be social media, as there will be no privacy.”
  • 27. CASES  Ayo Animashaun victim of identity theft  The HipTv boss made this known on July 2015 when he announced on Instagram that an impostor is trying to rip off up and coming artistes by demanding payment for airing their music videos on his programme.  Another Ayo Animashaun impersonating him. He charges and collects money on behalf of HipTv. This guy mirrors all his posts, It won’t be surprised if he reposts this to confuse people. His original Facebook account has over 4,800 friends as opposed to the fake account. TV personality, Ayo Animashaun
  • 28. CASES  Nigerian Woman in UK Arrested for Identity Theft  Oluwaseun Adenubi, a 30 year old Nigerian woman in the UK, has been arrested by the UK authorities and charged with identity theft.  It was discovered that she stole the identity of another Nigerian-British born woman so as to have her needs and those of her baby, taken care of by that country’s tax payers.  This is according to reports by Daily Mail. Adenubi posed as Rita Ogunkunle to obtain free NHS medical care during the delivery of her son Moses, and also got a £3,500 payment in the process.  In addition to that she has been receiving about £9000/year in state handouts while living in the east London suburb.  She also allowed Ogunkunle, 32, and partner Michael Adebambo, 46, to register as Moses’s parents to get him free NHS care and a UK passport, a court heard.
  • 29. CASES  Nigerian twist #1: Trust me — send no money  The scam: In London, England, a would-be renter is fooled into believing she’s dealing with a legitimate apartment owner when he tells her there’s no need to send an advance payment to him.  The cunning crook spins a story about having trouble with previous renters and wanting proof of her ability to pay. But he suggests she should send some money — about $2500 — as an electronic payment to a friend or relative of her choice.  That way, he says, it will prove she has the money but it will remain safe. Here’s the catch: as proof of payment, he asks for a scanned copy of the transfer payment. A while later, posing as the friend or relative, he uses this copy to collect the money from a Western Union office.  The solution: It’s not clear if Western Union was fooled into thinking the document was an original or if they will pay out on presentation of a copy. All they would say is that they are investigating the scam.  Meanwhile, the message is clear: not only should you not send electronic payments to someone you don’t know and trust but also don’t send them a copy either.
  • 30. CASES  Nigerian twist #2: Send me the stuff — I’ll use PayPal  The scam: Wise to the use of forged checks and stolen credit cards to pay for items they’re selling, many vendors using services like eBay and Craigslist now insist they’ll only accept payments via PayPal, especially to buyers who ask for shipment overseas — usually to Africa.  Fine. But what happens when you get an email apparently from PayPal saying your account has now been credited with the money you’re awaiting?  Well, if you don’t independently check your account, you may have just received a fake message that’s not from PayPal at all.  It’s easy to do if the buyer gets your email address and it’s just as easy for scammers to design a message that looks like the real thing. And that’s what they’re now doing in a big way.  The solution: Simple. As suggested above, check your PayPal account to make sure the money really is there.
  • 31. CASES  Nigerian twist #3: It’s OK — we’re the FBI, um, the President  The scam: A resident of North Kenai, Alaska, sniffs out a scam when she receives a $30,000 check, supposedly from the Central Bank of Nigeria, and is told to take 10% and forward the rest. She doesn’t.  Later she gets what seems to be an email from the FBI. It says they’ve been monitoring her email and investigating the bank and “confirmed your contract payment is 100% genuine and hitch free.”  She still doesn’t bite, so a couple of days later the scammers send another message, this time from the “United Nations 2007 Compensations Payments Directive” saying the Nigerian government is concerned about its image and the President wants to pay the woman $300,000 compensation to redeem its good name!  Now, of course, they just want her bank details so they can forward the money. She doesn’t fall for that either.  The solution: Talk about persistence! As usual, the warnings here are that you don’t get money for nothing, never wire cash to someone you don’t know, and don’t give your bank details to someone you don’t know — even someone who says he’s the President of Nigeria!
  • 33. REFERENCES  Arowosaiye Y. I, (2013) “The New Phenomenon of Phishing, Credit Card Fraud, Identity Theft, Internet Piracy and Nigerian Criminal Law” available at http://www.unilorin.edu.ng/publications/arowosayeyi/THE_NEW_PHENOMENON_OF_PHISHING.pdf accessed 14/01/2013  http://www.actionfraud.police.uk/fraud_protection/identity_fraud  http://www.nigerianlawtoday.com/2013/01/stemming-identity-theft-in-nigeria_16.html  http://www.ncpc.org/topics/fraud-and-identity-theft/tips-to-prevent-identity-theft  http://www.nigeriacreditreport.com/services/creditadvice/identitytheft.htm  http://www.ncpc.org/topics/fraud-and-identity-theft/tips-to-prevent-identity-theft  http://www.nigeriacreditreport.com/services/creditadvice/identitytheft.htm  https://www.dia.govt.nz/Identity---How-does-identity-theft-happen  https://www.transunion.com/personal-credit/identity-theft-and-fraud/how-to-prevent-identity-theft.page  Papadimitriou, O (2013). Identity Theft: What It Is, How It Happens & the Best Protection  Downloaded from http://www.cardhub.com/edu/identity-theft/  Leamy, E. (2008). How Identity Theft Happens and How to Protect Yourself: downloaded from http://abcnews.go.com/Technology/story?id=4766894&page=1  Sid Kirchheimer (2013). 10 Ways to Prevent Identity Theft: Downloaded 11/11/2015 on from http://www.aarp.org/money/scams-fraud/info-09-2013/prevent-identity-theft.html  www.nimc.gov.ng  10 Shocking ID Theft Facts of 2012 downloaded on 11/11/2015 from http://bestidtheftcompanys.com/10-shocking-id- theft-facts-of-2012  http://www.scambusters.org/nigerianscams.html  http://jaguda.com/2015/08/11/nigerian-woman-in-uk-arrrested-for-identity-theft/  http://thenationonlineng.net/ayo-animashaun-victim-of-identity-theft/  http://wreg.com/2015/11/08/bartlett-woman-charged-with-identity-theft-stealing-362k-from-employer/