1 / 23

Identity Theft: On-Line versus Real Time

Identity Theft: On-Line versus Real Time. Identity Theft: On-Line versus Real Time. On-Line versus Real Time. Patricia J. Munsell Lisa D’Adamo -Weinstein, Ph.D. Communication and Self Expression in the Digital Age April 28,2010.

malia
Download Presentation

Identity Theft: On-Line versus Real Time

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Identity Theft: On-Line versus Real Time

  2. Identity Theft: On-Line versus Real Time

  3. On-Line versus Real Time Patricia J. Munsell Lisa D’Adamo-Weinstein, Ph.D. Communication and Self Expression in the Digital Age April 28,2010

  4. Are these internet swindlers really new, or are they the same old cons that have been operating since the beginning of time?

  5. Identity Theft and Social Engineering “Identity theft refers to all crime that uses personal data for fraud or deception.” US Dept of Justice (1) “Social engineering is the art of persuasion.” McAfee Avert Labs (2)

  6. “Some online criminals find it easier to exploit human nature than to exploit holes in your software” Microsoft Online Safety help page

  7. Cognitive Bias • Authority Bias • Bandwagon Effect • Wishful Thinking (3)

  8. Human Nature Remains Unchanged “Dishonest politicians, spies and con men know that appealing to emotion… is a very effective means to their ends. Social engineers continue that tradition.” McAfee Avert Labs (4)

  9. 2008 Internet Fraud Statistics • Check Fraud 7.8% • Confidence Fraud 14.4% • $2,000.00 • Nigerian Letter Fraud 5.2% • $1,650.00 • Computer Fraud 3.8% • $1,000.00 • Non-delivery (merchandise and payment) 28.6% • $800.00 • Auction Fraud 16.3% • $610.00 • Credit/Debit Card Fraud 4.7% • $223.00 (7)

  10. Crime and Deception The Trojan Horse

  11. Diet and Exercise Scams These cons successfully reinvent themselves to work in any available medium.(8)

  12. You’re Not in Kansas Anymore Dorothy meets the kindly con man, Professor Marvel. He glances at her suitcase and says, “ Let me guess, you’ve run away!” “Why it’s as if you can read my mind”! she replies. (9)

  13. What is a Ponzi Scheme? A ponzi (a type of pyramid) scheme involves payment of purported returns to existing investors from funds contributed by new investors. U.S. Securities & Exchange Commission

  14. “The Talented Mr. Madoff”

  15. The Badir Brothers “ A formidable skill set.” Blind from birth, the brothers combined their talents with supersensitive hearing…creating… a formidable skill set” Wired.com (12)

  16. “Catch Me if You Can” Impersonator and check scam artist Frank Abagnale with Leo Decaprio who played him in the film, “Catch Me if You Can” (13)

  17. Dear Sir or Madam….. The Spanish Prisoner Nigerian Letter Scam DEAR SIR, URGENT AND CONFIDENTIAL BUSINESS PROPOSAL I AM MARIAM ABACHA, WIDOW OF THE LATE NIGERIAN HEAD OF STATE, GEN. SANI ABACHA. AFTER HE DEATH OF MY HUSBAND WHO DIED MYSTERIOUSLY…

  18. 2008 FBI Report on Internet Crime Complaints of internet crime hit an all time high in 2008. FBI received a total of 275,284 million complaints, a 33.1% increase over last year. (15)

  19. Ze Frank, internet artist TED conference 2005 (18)

  20. Works Sited 1. United States. Dept. of Justice. CRM: Fraud:Identity Theft and Identity Fraud web 30 March 201 2. Dang, Hiep. “The Origins of Social Engineering” www.mcafee.com/us Fall 2008 web 30 March 2010 3. “List of Cognitive Biases” Wikipedia: Wikipedia: The On-Line Encyclopedia. 30 March 2010 4. Raman, Karthik. “Ask and You Will Receive” www.mcafee.com/us Fall 2008 web 30 March 2010

  21. Works Sited 5. Consumer Fraud Reporting. “Crime Statistics.” www. Consumerfraudreporting.org/internet_scam_statistics.htm 6. “Trojan Horse”. Wikipedia: The Free Encyclopedia. 22 July.2004 web 30March 2010 (photo) 7. “Sea Monkeys :The Official Site.” www.seamonkey.com 15August 2007 web 30March 2010 (photo) 8. Somers, Suzanne. “Thigh Master.” www.asseenontv.com/prod-pages/thighmaster_gold.html web 30March 2010 (photo) 9. Flleming, Victor, The Wizard of Oz, MGM, 1939. 10. United States. Securities and Exchange Commission. Ponzi Schemes – Frequently Asked Questions. Web 22April 2010 11. Gagnier, Monica, “The Rise and Fall of Bernard L. Madoff”, Business Week. www.businessweek.com 12 December 2008. web 21 April 2010

  22. Works Sited 12. Thibodeau, Patrick, “Madoff touted ‘advanced technology to his clients/victims.” http://www.computerworld.com 15 December 2008 web 30 March 2010 13. Kaplan, Michael, “Three Blind Phreaks.” Wired.com web 30March 2010 14. Mullins, Luke, “How Frank Abagnale Would Swindle You” www.usnews.com 19May2008 web 30 March 2010 15. “Spanish Prisoner” Wikipedia: Wikipedia: The Free Encyclopedia. (photo) “Nigerian Letter “ Wikipedia: Wikipedia: The Free Encyclopedia. (photo) 16. United States. Dept. of Justice. CRM: Fraud: Identity Theft and Identity Fraud web 30 March 2010

More Related