SlideShare a Scribd company logo
Identity Theft &
Prevention
PRESENTATION BY
JAMSHED MASOOD
Identity Theft in the Digital Age!!!
• “46000 New IdentityTheftVictim Every Day in 2017” (Javelin
Strategy & Research’s 2017 IdentityTheft Report for USA)
• More than 17 million victims had more than $ 17 billion stolen over the
year.
What’s Identity Theft?
• Identity fraud is defined as the unauthorized
use of another person’s personal information
to achieve illicit financial gains
• Identity fraud can range from simply using a
stolen payment card account, to making a
fraudulent purchase, to taking control of
existing accounts or opening new accounts.
• It’s a serious crime that can wreak havoc with
• Finances
• Credit history
• Insurance
• And Reputation
ID Theft – the breakdown
Types of ID Theft
• Children with:
• CNIC
• No associated information
• No one to pay attention – for years
• Deceased Individuals with:
• CNICs and accounts to close
• Personal data
• Pre-occupied families
• Synthetic Identities:
• False information mixed with real to
create a new identity
• YOU with your:
– Bank and credit accounts
– Investments
– Insurance
– CNIC and Govt documents
Purposes of ID Theft
• To obtain financial and / or medical services and benefits
• To conceal identity, with multiple motives:
• Creditor and tax evasion
• Avoiding criminal records
• Illegal immigration
• Phishing, whaling
• Funding espionage, terrorism
Financial Identity Theft
• The most common variety, used to:
• Steal money
• Bank and investment account fraud
• Obtain credit
• Credit and debit card fraud
• Loan fraud
• Set up a means to launder money
• International crimes
• Consequences include:
• Loss of savings / investments
• Damaged credit
• Tax Losses
Medical ID Theft
• “How Medical IdentityTheft Can GiveYou
a Decade of Headaches” (Bloomberg.com/tech-
blog 11/8/12)
• “…you have to go provider by provider, hospital
by hospital, office by office and correct each
record….
• “…while you’re… trying to clean up the records,
the identity thief can continue to go around and
get medical services in the victim’s name. Really
there’s no way to effectively shut it down.”
• Medical identity fraud is estimated to cost the healthcare
industry almost $40 billion annually, driving up the cost of
healthcare for everyone.
ID Theft Methods
• Account Hijacking
• The fastest growing form of identity
theft; occurs when a criminal obtains
your personal banking information and
uses it to take over your bank
accounts.
• Dumpster Diving: searching
through garbage for personal
information
• Retrieving personal data from IT equipment
and storage media disposed of carelessly
• Retrieving paper bank and credit card
statements from home trash bins
Camera
More ID Theft Methods
• Hacking
• Taking information from computers
through viruses andTrojan horses
• Infiltrating organizations that store and
process large amounts of particularly
valuable personal information
• Shoulder Surfing
• Eavesdropping or looking over
someone’s shoulder to obtain personal
information
Methods, continued
• Phishing and Social Engineering
• Impersonating a reputable institution to gain trust, and then
asking for information.
– Browsing social
networking websites
for personal details
published by users,
often using this
information to
appear more
credible.
Methods, continued
• Just Plain Stealing
• Pickpocketing, housebreaking, or other theft: physically
stealing bank or credit cards, identification cards, passports,
etc.
• Using public records about individual citizens, published in
official registers
– “Skimming”
information from bank
or credit cards
– Exploiting insider access
and abusing the rights
of privileged IT users
Recent Examples close to home
• Accounts Opened and Operated without Knowledge
• Money Laundering
• Accounts of Deceased Operated withoutVerification
• BISP Calls
• Callers Impersonating as Bank Call Centers Asking for Info
• SIM Issuance on CNIC Copies
• Stolen ATM and Credit Cards
• Use of Stolen SIMs in illegal activities
Easy protections
• Do not give out financial information (account numbers, credit
card numbers or your CNIC number) unless you know the
organization or person requesting this information.
• Notify your bank
or credit card
company of any
suspicious phone
inquiries asking
for account
information.
What can you do?
• Take proper steps to safeguard your personal information:
• Carry as few credit cards as possible and periodically check to make sure
you still have them all. Use an aluminum card case.
• Guard your CNIC and Health insurance cards like money.
• Try Not to carry around your CNIC and try not to write your CNIC
number on anything.
– Guard your banking and credit card
PINs (Personal Identification
Numbers) and passwords carefully.
Don’t write them down.
• Make your PINs and passwords hard
for someone else to guess.
• Never use your birth date or any digits
from your CNIC number.
Computer Precautions
• Install a firewall, anti-virus software, and
anti-spam software on your computer
and make sure these systems are
updated often.
• Be wary of pop-ups. Most are just
legitimate ads, but always close them
from theTask Manager. Clicking the X
could install a virus on your computer.
• Don’t open emails from people you
don’t know.
10 Golden Rules
1. There’s no guaranteed get-rich-quick schemes - sound
to good to be true?
2. Never send money or give out your details when you do
not know / trust the person or company you are giving
them to.
3. Destroy personal information, shred documents, credit
cards etc.
4. Log directly onto a website rather than clicking on the
link provided.
5. Never reply to spam emails, even when you're trying to
stop them.
10 Golden Rules
6. Always remember: scammers are cunning and clever.They
know how to manipulate you to produce the response they
want.
7. Legitimate banks and companies will not ask for your details
via email or phone.
8. Just because a company has a well designed website doesn't
means it is legitimate.
9. Be suspicious. If you are unsure about anything, seek advice
from family or Police.
10. Never get embarrassed by reporting a scam – If you spot a
scam or have been scammed contact
http://www.nr3c.gov.pk/
ThankYou!
Feel free to ask
any questions!

More Related Content

PPT
Identity theft
PPTX
Identity Theft Presentation
PDF
Cyber fraud in banks
PDF
Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...
PPTX
Identity Theft
PPT
Id Theft Presentation
PPTX
Bank frauds & its safety
DOCX
KYC Know Your Customer
Identity theft
Identity Theft Presentation
Cyber fraud in banks
Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...
Identity Theft
Id Theft Presentation
Bank frauds & its safety
KYC Know Your Customer

What's hot (20)

PPTX
PPT on Phishing
PPTX
Cyber Security 101: Training, awareness, strategies for small to medium sized...
PPTX
Banks and cybersecurity v2
PPTX
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
PDF
PROJECT REPORT NPCI by Ravi Kiran
PPT
Identity Theft Presentation
PPTX
Phishing
PDF
Frauds in banking
PPTX
know your customer
PPTX
Information Security Awareness, Petronas Marketing Sudan
PPT
Credit card fraud
PPTX
Financial Crimes
PDF
Scams and-fraud-presentation
PDF
End-User Security Awareness
PPTX
Bank frauds vk (2)
PPTX
Cyber Security Awareness Session for Executives and Non-IT professionals
PDF
Employee Security Awareness Program
PDF
Security Awareness Training
PPTX
Identity theft ppt
PPTX
Password Policy and Account Lockout Policies
PPT on Phishing
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Banks and cybersecurity v2
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
PROJECT REPORT NPCI by Ravi Kiran
Identity Theft Presentation
Phishing
Frauds in banking
know your customer
Information Security Awareness, Petronas Marketing Sudan
Credit card fraud
Financial Crimes
Scams and-fraud-presentation
End-User Security Awareness
Bank frauds vk (2)
Cyber Security Awareness Session for Executives and Non-IT professionals
Employee Security Awareness Program
Security Awareness Training
Identity theft ppt
Password Policy and Account Lockout Policies
Ad

Similar to Identity Theft and How to Prevent Them in the Digital Age (20)

PDF
Identity theft
PPT
Identity Theft Lake Placid 2012
PDF
Identity Theft Awareness 101 - Basics
PDF
Identity Theft ppt
DOCX
Identity theft in the internet
PDF
Identity Theft: The Other You
PPT
Identity Theft: How to Avoid It
PPT
How to Prevent ID Theft
PPT
ID Theft
PPTX
Identity Theft Overview
PDF
Computer Crimes - Identity Theft
PPT
Identity Theft Scams
PPTX
Identity Theft.pptx
PDF
The Identity Theft Checklist – Guidance for the general public.nz
PDF
Misuse of personal information
PPT
Identity theft power_point
PDF
Youth Protection Guide - Canada
PPTX
cyber IDENTITY THEFT AND IDENTITY FRAUD.pptx
PPT
Avoiding Fraud and Identity Theft - October 2008
PPT
Id Theft Seminar 6
Identity theft
Identity Theft Lake Placid 2012
Identity Theft Awareness 101 - Basics
Identity Theft ppt
Identity theft in the internet
Identity Theft: The Other You
Identity Theft: How to Avoid It
How to Prevent ID Theft
ID Theft
Identity Theft Overview
Computer Crimes - Identity Theft
Identity Theft Scams
Identity Theft.pptx
The Identity Theft Checklist – Guidance for the general public.nz
Misuse of personal information
Identity theft power_point
Youth Protection Guide - Canada
cyber IDENTITY THEFT AND IDENTITY FRAUD.pptx
Avoiding Fraud and Identity Theft - October 2008
Id Theft Seminar 6
Ad

More from Maven Logix (6)

PPTX
Transforming Healthcare Through Telemedicine
PPTX
Concepts and Rights About Data Privacy and Security
PDF
How to Response Cyber Data Breaches at Pakistan
PPTX
Capability Building for Cyber Defense: Software Walk through and Screening
PPTX
PostGreSQL Performance Tuning
PPTX
Information Technology in Renewable Energy
Transforming Healthcare Through Telemedicine
Concepts and Rights About Data Privacy and Security
How to Response Cyber Data Breaches at Pakistan
Capability Building for Cyber Defense: Software Walk through and Screening
PostGreSQL Performance Tuning
Information Technology in Renewable Energy

Recently uploaded (20)

PDF
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
PDF
Cost to Outsource Software Development in 2025
PPTX
chapter 5 systemdesign2008.pptx for cimputer science students
DOCX
How to Use SharePoint as an ISO-Compliant Document Management System
PDF
AI/ML Infra Meetup | Beyond S3's Basics: Architecting for AI-Native Data Access
PDF
Salesforce Agentforce AI Implementation.pdf
PDF
Wondershare Recoverit Full Crack New Version (Latest 2025)
PDF
STL Containers in C++ : Sequence Container : Vector
PDF
Ableton Live Suite for MacOS Crack Full Download (Latest 2025)
PPTX
Trending Python Topics for Data Visualization in 2025
PDF
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
PPTX
Computer Software and OS of computer science of grade 11.pptx
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
PDF
Types of Token_ From Utility to Security.pdf
PDF
DNT Brochure 2025 – ISV Solutions @ D365
PDF
Designing Intelligence for the Shop Floor.pdf
PDF
Autodesk AutoCAD Crack Free Download 2025
DOCX
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
PPTX
Advanced SystemCare Ultimate Crack + Portable (2025)
PPTX
GSA Content Generator Crack (2025 Latest)
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
Cost to Outsource Software Development in 2025
chapter 5 systemdesign2008.pptx for cimputer science students
How to Use SharePoint as an ISO-Compliant Document Management System
AI/ML Infra Meetup | Beyond S3's Basics: Architecting for AI-Native Data Access
Salesforce Agentforce AI Implementation.pdf
Wondershare Recoverit Full Crack New Version (Latest 2025)
STL Containers in C++ : Sequence Container : Vector
Ableton Live Suite for MacOS Crack Full Download (Latest 2025)
Trending Python Topics for Data Visualization in 2025
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
Computer Software and OS of computer science of grade 11.pptx
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
Types of Token_ From Utility to Security.pdf
DNT Brochure 2025 – ISV Solutions @ D365
Designing Intelligence for the Shop Floor.pdf
Autodesk AutoCAD Crack Free Download 2025
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
Advanced SystemCare Ultimate Crack + Portable (2025)
GSA Content Generator Crack (2025 Latest)

Identity Theft and How to Prevent Them in the Digital Age

  • 2. Identity Theft in the Digital Age!!! • “46000 New IdentityTheftVictim Every Day in 2017” (Javelin Strategy & Research’s 2017 IdentityTheft Report for USA) • More than 17 million victims had more than $ 17 billion stolen over the year.
  • 3. What’s Identity Theft? • Identity fraud is defined as the unauthorized use of another person’s personal information to achieve illicit financial gains • Identity fraud can range from simply using a stolen payment card account, to making a fraudulent purchase, to taking control of existing accounts or opening new accounts. • It’s a serious crime that can wreak havoc with • Finances • Credit history • Insurance • And Reputation
  • 4. ID Theft – the breakdown
  • 5. Types of ID Theft • Children with: • CNIC • No associated information • No one to pay attention – for years • Deceased Individuals with: • CNICs and accounts to close • Personal data • Pre-occupied families • Synthetic Identities: • False information mixed with real to create a new identity • YOU with your: – Bank and credit accounts – Investments – Insurance – CNIC and Govt documents
  • 6. Purposes of ID Theft • To obtain financial and / or medical services and benefits • To conceal identity, with multiple motives: • Creditor and tax evasion • Avoiding criminal records • Illegal immigration • Phishing, whaling • Funding espionage, terrorism
  • 7. Financial Identity Theft • The most common variety, used to: • Steal money • Bank and investment account fraud • Obtain credit • Credit and debit card fraud • Loan fraud • Set up a means to launder money • International crimes • Consequences include: • Loss of savings / investments • Damaged credit • Tax Losses
  • 8. Medical ID Theft • “How Medical IdentityTheft Can GiveYou a Decade of Headaches” (Bloomberg.com/tech- blog 11/8/12) • “…you have to go provider by provider, hospital by hospital, office by office and correct each record…. • “…while you’re… trying to clean up the records, the identity thief can continue to go around and get medical services in the victim’s name. Really there’s no way to effectively shut it down.” • Medical identity fraud is estimated to cost the healthcare industry almost $40 billion annually, driving up the cost of healthcare for everyone.
  • 9. ID Theft Methods • Account Hijacking • The fastest growing form of identity theft; occurs when a criminal obtains your personal banking information and uses it to take over your bank accounts. • Dumpster Diving: searching through garbage for personal information • Retrieving personal data from IT equipment and storage media disposed of carelessly • Retrieving paper bank and credit card statements from home trash bins Camera
  • 10. More ID Theft Methods • Hacking • Taking information from computers through viruses andTrojan horses • Infiltrating organizations that store and process large amounts of particularly valuable personal information • Shoulder Surfing • Eavesdropping or looking over someone’s shoulder to obtain personal information
  • 11. Methods, continued • Phishing and Social Engineering • Impersonating a reputable institution to gain trust, and then asking for information. – Browsing social networking websites for personal details published by users, often using this information to appear more credible.
  • 12. Methods, continued • Just Plain Stealing • Pickpocketing, housebreaking, or other theft: physically stealing bank or credit cards, identification cards, passports, etc. • Using public records about individual citizens, published in official registers – “Skimming” information from bank or credit cards – Exploiting insider access and abusing the rights of privileged IT users
  • 13. Recent Examples close to home • Accounts Opened and Operated without Knowledge • Money Laundering • Accounts of Deceased Operated withoutVerification • BISP Calls • Callers Impersonating as Bank Call Centers Asking for Info • SIM Issuance on CNIC Copies • Stolen ATM and Credit Cards • Use of Stolen SIMs in illegal activities
  • 14. Easy protections • Do not give out financial information (account numbers, credit card numbers or your CNIC number) unless you know the organization or person requesting this information. • Notify your bank or credit card company of any suspicious phone inquiries asking for account information.
  • 15. What can you do? • Take proper steps to safeguard your personal information: • Carry as few credit cards as possible and periodically check to make sure you still have them all. Use an aluminum card case. • Guard your CNIC and Health insurance cards like money. • Try Not to carry around your CNIC and try not to write your CNIC number on anything. – Guard your banking and credit card PINs (Personal Identification Numbers) and passwords carefully. Don’t write them down. • Make your PINs and passwords hard for someone else to guess. • Never use your birth date or any digits from your CNIC number.
  • 16. Computer Precautions • Install a firewall, anti-virus software, and anti-spam software on your computer and make sure these systems are updated often. • Be wary of pop-ups. Most are just legitimate ads, but always close them from theTask Manager. Clicking the X could install a virus on your computer. • Don’t open emails from people you don’t know.
  • 17. 10 Golden Rules 1. There’s no guaranteed get-rich-quick schemes - sound to good to be true? 2. Never send money or give out your details when you do not know / trust the person or company you are giving them to. 3. Destroy personal information, shred documents, credit cards etc. 4. Log directly onto a website rather than clicking on the link provided. 5. Never reply to spam emails, even when you're trying to stop them.
  • 18. 10 Golden Rules 6. Always remember: scammers are cunning and clever.They know how to manipulate you to produce the response they want. 7. Legitimate banks and companies will not ask for your details via email or phone. 8. Just because a company has a well designed website doesn't means it is legitimate. 9. Be suspicious. If you are unsure about anything, seek advice from family or Police. 10. Never get embarrassed by reporting a scam – If you spot a scam or have been scammed contact http://www.nr3c.gov.pk/
  • 19. ThankYou! Feel free to ask any questions!

Editor's Notes

  • #18: There are no guaranteed get rich schemes. These schemes are designed to pull people in and scam them out of a lot of money. You should always be suspicious of offers that say “you can win a load of money by clicking on the link or get rich quick by going to this website” If it sound too good to be true its will be.   Never send money or give your details out to any one you haven’t met or do not know or trust. As seen before scammers will develop your trust with the use of online relationships and sob stories.   The same also applies to companies; do not send money or give your details to companies you do not know or trust – Always carry out checks on companies such as addresses and contact information, even searching the address on things like google maps will give you an idea if they are genuine – Banks & legitimate businesses will never ask for you details and information over the phone or by email so do not hand it over.   Destroy any documents, credit/debit cards and anything else with your personal details on. If criminals get hold of your personal information they can carry out criminal activities online with your money and information.   Never be embarrassed to report a scam these scammers are very clever and devious so there is no shame in being deceived. However if you spot a scam or have been scammed yourself you can contact action fraud or alternatively if you know the suspect or their location contact the police immediately.
  • #19: There are no guaranteed get rich schemes. These schemes are designed to pull people in and scam them out of a lot of money. You should always be suspicious of offers that say “you can win a load of money by clicking on the link or get rich quick by going to this website” If it sound too good to be true its will be.   Never send money or give your details out to any one you haven’t met or do not know or trust. As seen before scammers will develop your trust with the use of online relationships and sob stories.   The same also applies to companies; do not send money or give your details to companies you do not know or trust – Always carry out checks on companies such as addresses and contact information, even searching the address on things like google maps will give you an idea if they are genuine – Banks & legitimate businesses will never ask for you details and information over the phone or by email so do not hand it over.   Destroy any documents, credit/debit cards and anything else with your personal details on. If criminals get hold of your personal information they can carry out criminal activities online with your money and information.   Never be embarrassed to report a scam these scammers are very clever and devious so there is no shame in being deceived. However if you spot a scam or have been scammed yourself you can contact action fraud or alternatively if you know the suspect or their location contact the police immediately.
  • #20: The audience will now ask questions in relation to Cyber Crime and the Presentation.