Identity Theft OnLine versus Real Time Identity Theft

  • Slides: 23
Download presentation
Identity Theft: On-Line versus Real Time

Identity Theft: On-Line versus Real Time

Identity Theft: On-Line versus Real Time

Identity Theft: On-Line versus Real Time

On-Line versus Real Time Patricia J. Munsell Lisa D’Adamo-Weinstein, Ph. D. Communication and Self

On-Line versus Real Time Patricia J. Munsell Lisa D’Adamo-Weinstein, Ph. D. Communication and Self Expression in the Digital Age April 28, 2010

Are these internet swindlers really new, or are they the same old cons that

Are these internet swindlers really new, or are they the same old cons that have been operating since the beginning of time?

Identity Theft and Social Engineering �“Identity theft �“Social refers to all crime engineering is

Identity Theft and Social Engineering �“Identity theft �“Social refers to all crime engineering is the art of that uses persuasion. ” personal data for Mc. Afee Avert Labs (2) fraud or deception. ” US Dept of Justice (1)

“Some online criminals find it easier to exploit human nature than to exploit holes

“Some online criminals find it easier to exploit human nature than to exploit holes in your software” Microsoft Online Safety help page

Cognitive Bias �Authority Bias �Bandwagon Effect �Wishful Thinking (3)

Cognitive Bias �Authority Bias �Bandwagon Effect �Wishful Thinking (3)

Human Nature Remains Unchanged “Dishonest politicians, spies and con men know that appealing to

Human Nature Remains Unchanged “Dishonest politicians, spies and con men know that appealing to emotion… is a very effective means to their ends. Social engineers continue that tradition. ” (4) Mc. Afee Avert Labs

2008 Internet Fraud Statistics � Check Fraud 7. 8% � Confidence Fraud 14. 4%

2008 Internet Fraud Statistics � Check Fraud 7. 8% � Confidence Fraud 14. 4% � $2, 000. 00 � Nigerian Letter Fraud 5. 2% � $1, 650. 00 � Computer Fraud 3. 8% � $1, 000. 00 � Non-delivery (merchandise and payment) 28. 6% � $800. 00 � Auction Fraud 16. 3% � $610. 00 � Credit/Debit Card Fraud 4. 7% • � $223. 00 (7)

Crime and Deception The Trojan Horse

Crime and Deception The Trojan Horse

Diet and Exercise Scams These cons successfully reinvent themselves to work in any available

Diet and Exercise Scams These cons successfully reinvent themselves to work in any available medium. (8)

You’re Not in Kansas Anymore Dorothy meets the kindly con man, Professor Marvel. He

You’re Not in Kansas Anymore Dorothy meets the kindly con man, Professor Marvel. He glances at her suitcase and says, “ Let me guess, you’ve run away!” “Why it’s as if you can read my mind”! she replies. (9)

What is a Ponzi Scheme? A ponzi (a type of pyramid) scheme involves payment

What is a Ponzi Scheme? A ponzi (a type of pyramid) scheme involves payment of purported returns to existing investors from funds contributed by new investors. U. S. Securities & Exchange Commission

“The Talented Mr. Madoff”

“The Talented Mr. Madoff”

The Badir Brothers “ A formidable skill set. ” Blind from birth, the brothers

The Badir Brothers “ A formidable skill set. ” Blind from birth, the brothers combined their talents with supersensitive hearing…creating … a formidable skill set” Wired. com (12)

“Catch Me if You Can” Impersonator and check scam artist Frank Abagnale with Leo

“Catch Me if You Can” Impersonator and check scam artist Frank Abagnale with Leo Decaprio who played him in the film, “Catch Me if You Can” (13)

Dear Sir or Madam…. . The Spanish Prisoner Nigerian Letter Scam DEAR SIR, URGENT

Dear Sir or Madam…. . The Spanish Prisoner Nigerian Letter Scam DEAR SIR, URGENT AND CONFIDENTIAL BUSINESS PROPOSAL I AM MARIAM ABACHA, WIDOW OF THE LATE NIGERIAN HEAD OF STATE, GEN. SANI ABACHA. AFTER HE DEATH OF MY HUSBAND WHO DIED MYSTERIOUSLY…

2008 FBI Report on Internet Crime �Complaints of internet crime hit an all time

2008 FBI Report on Internet Crime �Complaints of internet crime hit an all time high in 2008. �FBI received a total of 275, 284 million complaints, a 33. 1% increase over last year. (15)

Ze Frank, internet artist TED conference 2005 (18)

Ze Frank, internet artist TED conference 2005 (18)

Works Sited 1. United States. Dept. of Justice. CRM: Fraud: Identity Theft and Identity

Works Sited 1. United States. Dept. of Justice. CRM: Fraud: Identity Theft and Identity Fraud web 30 March 201 2. Dang, Hiep. “The Origins of Social Engineering” www. mcafee. com/us Fall 2008 web 30 March 2010 3. “List of Cognitive Biases” Wikipedia: The On-Line Encyclopedia. 30 March 2010 4. Raman, Karthik. “Ask and You Will Receive” www. mcafee. com/us Fall 2008 web 30 March 2010

Works Sited 5. Consumer Fraud Reporting. “Crime Statistics. ” www. Consumerfraudreporting. org/internet_scam_statistics. htm 6.

Works Sited 5. Consumer Fraud Reporting. “Crime Statistics. ” www. Consumerfraudreporting. org/internet_scam_statistics. htm 6. “Trojan Horse”. Wikipedia: The Free Encyclopedia. 22 July. 2004 web 30 March 2010 (photo) 7. “Sea Monkeys : The Official Site. ” www. seamonkey. com 15 August 2007 web 30 March 2010 (photo) 8. Somers, Suzanne. “Thigh Master. ” www. asseenontv. com/prod-pages/thighmaster_gold. html web 30 March 2010 (photo) 9. Flleming, Victor, The Wizard of Oz, MGM, 1939. 10. United States. Securities and Exchange Commission. Ponzi Schemes – Frequently Asked Questions. Web 22 April 2010 11. Gagnier, Monica, “The Rise and Fall of Bernard L. Madoff”, Business Week. www. businessweek. com 12 December 2008. web 21 April 2010

Works Sited 12. Thibodeau, Patrick, “Madoff touted ‘advanced technology to his clients/victims. ” http:

Works Sited 12. Thibodeau, Patrick, “Madoff touted ‘advanced technology to his clients/victims. ” http: //www. computerworld. com 15 December 2008 web 30 March 2010 13. Kaplan, Michael, “Three Blind Phreaks. ” Wired. com web 30 March 2010 14. Mullins, Luke, “How Frank Abagnale Would Swindle You” www. usnews. com 19 May 2008 web 30 March 2010 15. “Spanish Prisoner” Wikipedia: The Free Encyclopedia. (photo) “Nigerian Letter “ Wikipedia: The Free Encyclopedia. (photo) 16. United States. Dept. of Justice. CRM: Fraud: Identity Theft and Identity Fraud web 30 March 2010