National Webcast Initiative Identity Theft The crime that keeps on taking! Thursday, February 16, 2006 3:00pm – 4:00pm Eastern National Webcast Initiative William F. Pelgrin Joint Partnership between MS-ISAC and DHS US-CERT Coordinated through the New York State Office of Cyber Security and Critical Infrastructure Coordination and the New York State Forum Provides timely and practical information regarding cyber security topics Webcast documents: http://www.cscic.state.ny.us/msisac/webcasts/02_06/index.htm Current Listing of Vendors Interested In Participation Accenture Aon AT&T Cisco Computer Associates CDW-G CGI CMA D&D Consulting Ernst & Young Foundstone/McAfee Gartner HP IIC ISS, Inc. Jay Dee Systems Keane MCI Microsoft Nortel Novell NYSTEC Oracle R&H Security Consulting LLC SAIC SAS SRA International, Inc. Sybase Symantec Veritas This listing will continue to evolve over time Identity Theft Introduction Between January and December 2005, Consumer Sentinel, the complaint database developed and maintained by the FTC, received over 685,000 consumer fraud and identity theft complaints. Consumers reported losses from fraud of more than $680 million. Today’s presentation will focus on: What Identity Theft Is What you can do to Protect Yourself against Identity Theft What to do if you are, or think you may be, a victim of identity theft Identity Theft and the Online World Resources on Identity Theft National Cyber Security Division U.S. Department of Homeland Security • US-CERT – established in September 2003 and is the operational arm of the National Cyber Security Division at the Department of Homeland Security • Nation’s focal point for preventing, protecting against, and responding to cyber security threats and vulnerabilities • US-CERT also hosts a public website, at www.uscert.gov, which provides a wealth of information regarding cyber security Presenters Howard Schmidt, CISSP, CISM President & CEO R & H Security Consulting LLC ____________ D. Scott Parsons Deputy Assistant Secretary Office of Critical Infrastructure Protection and Compliance Policy U.S. Department of the Treasury ____________ Joseph Martucci Senior Security Engineer Symantec Consulting Services What is Identity Theft? We All Have a Role to Play In Combating Identity Theft The fight against Identity Theft involves cooperation by: Federal and State government Law enforcement Financial institutions and businesses Technology innovators Consumers A Legal Definition Under the Fair and Accurate Credit Transactions Act of 2003, Identity Theft means: “A fraud committed or attempted using the identifying information of another person without authority.” 16 CFR § 603.2 There is an important difference between credit card fraud, which is now included in the definition, and someone actually assuming an identity to commit fraud. Poll: What type(s) of personal information need to be safegu... [Live Meeting Multiple Choice Poll. Use Live Meeting > Edit Slide Properties... to edit.] Account numbers Address Security codes from the back of credit and debit cards Driver's license number Mother's maiden Name Internet passwords All of the Above Identity Thieves Look For: Name Address Date of birth Social Security number Driver’s license number Mother’s maiden name Account numbers Card expiration dates Internet passwords Personal identification numbers User IDs for online account access Security codes from the back of credit and debit cards Other identifying information How Your Identity Can Be Stolen Loss or theft of your wallet, purse, or credit card Mail theft Skimming information from the magnetic strip on credit or debit cards “Dumpster diving” through the trash “Shoulder surfing,” looking over your shoulder when you are entering a PIN or password Common Types of Identity Theft or Financial Fraud Unauthorized transactions on existing accounts (e.g., unauthorized charges on a credit card or checks on a checking account) – often more easily corrected than the others Takeover of existing accounts (e.g., prolonged use or emptying of a financial account) Creation of new accounts Businesses and Identity Theft Why be concerned Businesses are prime targets for identity theft. Identity theft often happens from the inside. Identity theft is bad for business. Potential legal liability. Businesses and Identity Theft Steps to reduce the risk Establish privacy policies. If you don’t need it, don’t collect it. Record retention and disposal schedule. Personnel – Background checks. Data and network security. Restrict access to sensitive data, on a “need to know” basis. Training and awareness. Accountability for compliance. What You Can Do To Protect Yourself Minimizing the Risks of Becoming a Victim Do not leave a lot of financial records lying around your house for prying eyes to see Do not keep information that you don’t need in your purse or wallet Do not carry your Social Security Number with you Do not leave credit or debit card receipts at the ATM, gas pump, or anywhere else Do not keep personal identification numbers attached to credit, debit, or ATM cards Minimizing the Risks of Becoming a Victim Shred personal records or get rid of them as effectively as possible Beware of giving information to anyone over the phone or Internet unless you initiate the contact Remember that your bank or credit card issuers already have your account numbers, PINs, access codes, passwords, Social Security numbers and other information they need. They won’t phone or e-mail you to ask for it. Protect your mail – send and receive it safely Poll: How long has it been since you reviewed your credit re... [Live Meeting Multiple Choice Poll. Use Live Meeting > Edit Slide Properties... to edit.] Recently (within the last month) Between 1-6 months ago Over a year ago Never I don't know where to get my credit report Minimizing the Risks of Becoming a Victim Check your credit report at least once a year To see whether accounts have been opened in your name without your knowledge To spot unexpected delinquency on established accounts To review your credit report before making a major purchase These reports can be free and are easy to get Contact: www.AnnualCreditReport.com for a free credit report once every 12 months from each of the three nationwide consumer reporting agencies (i.e., “credit bureaus”): Equifax, Experian, TransUnion Poll: Have you ever been a victime of Identity Theft? [Live Meeting Multiple Choice Poll. Use Live Meeting > Edit Slide Properties... to edit.] Yes No I'm not sure What To Do If You Are, Or Think You May Be, A Victim of Identity Theft Warning Signs A financial institution may call if a transaction seems out of the ordinary You may see unauthorized charges on a credit card or checking account statement You may see an account that you did not open on your credit report You may get a call from a collection agency asking why you have not paid a bill Poll: Do you know what to do if you have or may have become ... [Live Meeting Multiple Choice Poll. Use Live Meeting > Edit Slide Properties... to edit.] Yes No I'm not sure “Must Do” List – Act Quickly! 1. Contact the financial institutions or the companies where the information about you has been misused and let them know that you’re a victim of Identity Theft 2. Contact the credit reporting agencies (Equifax, Experian, TransUnion) to report your suspicions about Identity Theft, and request a fraud alert “Must Do” List – Act Quickly! 3. Contact your local police department to report the crime, and get a copy of your police report 4. Contact the Federal Trade Commission for helpful information and because the FTC tracks incidents of Identity Theft Identity Theft and the Online World Phishing Uses spam or junk e-mails that: Seek to obtain the same kind of information that any ID thief wants May mimic: Financial institutions Government agencies Computer software companies e-Commerce sites Other legitimate businesses Phishing May ask you to go to a Web site to verify and enter your personal information May contain a link that takes you to a Web site that looks just like your bank’s At the fake Web site, crooks copy, or “spoof,” graphics from real Web sites The message may include an excuse (e.g., the bank is undergoing a computer upgrade), or sound urgent or intimidating (e.g., you will lose access to your account if you don’t provide the information promptly) Spyware Spyware software: Monitors your online activity and diverts information while you are using legitimate Web sites May be installed on your computer when you visit deceptive Web sites, download seemingly innocent games or other software, or open e-mails that may have spyware attached Poll: What type of security is used on your personal/home co... [Live Meeting Multiple Choice Poll. Use Live Meeting > Edit Slide Properties... to edit.] Anti-Virus Spyware Firewall Nothing Protect Yourself from Phishing Update your browsers, spam filters, anti-virus and anti-spyware software regularly Use parental controls Visit a Web site by typing the Web address - or URL – into your Web browser yourself, not by clicking a link Look for the “s” in “https” when engaging in financial transactions because it indicates scrambling or encryption of the communication (don’t just copy a link that appears to have an “s” in “https”) Look for the lock icon in the lower right corner of the screen when engaging in financial or other sensitive transactions because the lock signifies an encrypted session (Spoofed phishing sites may have fake locks, so beware) Protect Yourself from Phishing More information on Phishing is available at: www.SecretService.gov www.Antiphishing.org www.FTC.gov Poll: Do you think you have been tricked into responding to ... [Live Meeting Multiple Choice Poll. Use Live Meeting > Edit Slide Properties... to edit.] Yes No I don't know Online Safety Generally, you can operate safely on the Internet, but you need to use common sense Protect your computer like you would protect your personal financial information. Turn it off when you walk away from the computer so that no one else can gain access while you are not there Use a firewall Make sure that your operating system and software are updated on a frequent basis (keep patches current) Online Safety Make sure that you have anti-spam software—many phishing attacks come as a result of spam Use strong passwords Words or numbers that are not easy to guess Use a combination of numbers, letters, and other characters Do not use the same password for every account. Consider changing your passwords periodically. Online Safety Know the Web address—or “URL”—of the Web site that you are going to visit Read and learn how the Web site is going to protect and use your personal information Clean your hard drive before you dispose of an old computer Summary Minimizing the Risk of Identity Theft Minimize the amount of information that can be stolen. Monitor your credit report and account statements. Be sensitive about disclosing your personal information to others on and offline. Answer the questions Who, Why and How. Protect your computer and online experience Summary: What to Do if you become a Victim of Identity Theft Immediately notify any one of the nationwide reporting agencies (Experian, Equifax, Transunion) and place a fraud alert on your credit report. Contact the company where you believe the fraudulent account was opened or where the fraudulent transaction was made. File a complaint with your local police department or the police department where the identity theft took place. Don’t wait to get help, there are organizations that are aware of this issue and are set up to help victims like the FTC. Keep records of all your communications and follow up in writing by certified mail return receipt. Identity Theft Resources Identity Theft: Outsmarting the Crooks DVD Order your DVD by visiting: http://www.treas.gov/offices/domestic-finance/financialinstitution/cip/identity-theft.shtml Identity Theft Resources Federal Trade Commission: http://www.consumer.gov/idtheft/ US Department of the Treasury: http://www.treas.gov/offices/domestic-finance/financialinstitution/cip/identity-theft.shtml (BBBOnline: http://www.bbbonline.org/IDTheft/ Privacy Rights Clearinghouse: http://www.privacyrights.org/identity.htm Identity Theft Resource Center: http://www.idtheftcenter.org/index.shtml Fight Identity Theft: http://www.fightidentitytheft.com/ Anti-Phishing Working Group: http://www.antiphishing.org/consumer_recs.html CarnegieMellon: http://www.cert.org/homeusers/HomeComputerSecurity/ Questions and Answers ? Thank you for participating The archive of today’s session will be available at: http://www.cscic.state.ny.us/msisac/webcasts/02_06/index.htm Mark Your Calendar! The next National Webcast Initiative is scheduled for April 13, 2006! Poll: What cyber security topic would you be interested in f... [Live Meeting Multiple Choice Poll. Use Live Meeting > Edit Slide Properties... to edit.] Remote Access Identity Management and Access Control VoIP Instant Messaging and How to Protect Your Home Computer Insider Threat Other (please enter your response in the Q&A tool) Poll: How are you participating in today's webcast? [Live Meeting Multiple Choice Poll. Use Live Meeting > Edit Slide Properties... to edit.] Individually In a group setting In a group setting In a group setting In a group setting In a group setting with with with with with < 5 people 6 - 10 people 11 - 20 people 21 - 40 people > 40 people Poll: Did you find today's webcast useful in helping to adva... [Live Meeting Multiple Choice Poll. Use Live Meeting > Edit Slide Properties... to edit.] Yes No- Please explain using the Questions and Answers Tool Poll: How did you learn about today's webcast? [Live Meeting Multiple Choice Poll. Use Live Meeting > Edit Slide Properties... to edit.] From the MS-ISAC From US-CERT/DHS From the US Treasury From NCSA From NYS CSCIC From NYS FORUM Other - please explain using the Questions and Answers Tool National Webcast Initiative ~ Identity Theft ~ The crime that keeps taking! February 16, 2006 Thank You!