josh moulin: internet scams and identity theft prevention
DESCRIPTION
This presentation is designed to be 30 minutes and provides the audience with some information on Internet scams and how to protect themselves against identity theft. The presentation was designed and given by Josh Moulin, an 11 year veteran of law enforcement and now a cybersecurity team lead for a federal agency that focuses on national security. Josh has multiple certifications in law enforcement and digital forensics and has been considered an expert in his field. Josh speaks across the nation on various cyber issues and has been qualified as an expert witness in both state and federal court on numerous occasions.TRANSCRIPT
JoshMoulin.com Financial Fraud and ID The0
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 1
Instructor’s Background
n 11 years in law enforcement n Commander – cyber crime task force
n Board of Directors – NaLonal White Collar Crime Center (NW3C)
n Leads cyber security team for a federal agency that focuses on naLonal security
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 2
Crimes CommiRed with Technology
IdenLty The0 DomesLc Violence Homicide/Suicide
Internet Fraud/Forgery E-‐mail Threats Bomb Threats
Stalking & Harassment Missing Persons
Child ExploitaLon & Abuse Gambling ProsLtuLon ExtorLon NarcoLcs
So0ware Piracy Intrusions/Hacking/Trade Secrets
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 3
IdenLty The0
n Online ID The0 accounts for only 10% of all ID the0
n The other 90% is tradiLonal ID the0. ID’s are stolen a variety of ways including: n Dumpster diving (use a confe` shredder) n Obtaining old IT equipment (copy machines, personal computers, cell phones
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 4
IdenLty The0 n Finding personal informaLon on public websites (government and social networks)
n Stealing informaLon from burglary, vehicle break-‐ins, purses, wallets, etc.
n Skimming informaLon using RFID chips or skimmers
n AdverLsing bogus jobs to obtain job applicaLons and resumes
n Vishing – (telephone scams)
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 5
Copy Machines
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 6
High-‐Tech ID The0
n VicLms of high-‐tech ID the0 may have had their informaLon stolen a variety of ways including: n Phishing Scams n SMS Scams (text messages) n Obtaining usernames and passwords n InfiltraLng company or medical data n InfecLng a personal computer with malware
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 7
OperaLng System Updates and Patches
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 8
IE ConLnued
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 9
Viewing CerLficates
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 10
Mozilla Firefox
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 11
Mozilla Firefox
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 12
Mozilla Firefox ConLnued
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 13
Phishing Examples
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 14
Phishing Examples
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 15
Peer to Peer
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 16
Peer to Peer
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 17
P2P
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 18
Website Scraping
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 19
Why do People Commit ID The0?
n Suspects will steal idenLLes to: n Open a bank account in the vicLm’s name n Buy vehicles on credit in the vicLm’s name n Submit loan and credit applicaLons in the vicLm’s name
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 20
Tips to Protect Against ID The0
n There are several everyday things people can do to reduce their chances of being a vicLm of ID the0 including: n Use a cross-‐cut shredder for all documents with personal informaLon on it
n Get mail promptly and pay aRenLon to missing mail
n Review all bank and credit acLvity regularly for any suspicious acLvity
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 21
Tips to Protect Against ID The0
n Have your statements sent to you electronically to reduce personal informaLon in the mail and trash
n Don’t carry your Social Security Card n Protect your PIN when entering it into any device
n Pay aRenLon to where your card goes during a transacLon
n Treat all financial emails with cauLon
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 22
Tips to Protect Against ID The0
n Do not provide personal informaLon or account informaLon over the phone to anyone who called you
n Use strong passwords online n Have up to date anLvirus on all computers n Maintain the operaLng system security patches on all computers
n Before making a purchase online, make sure you’re doing so from a secure site
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 23
Online Scams
n According to the NW3C online scams increased by 110% from last year
n Cyber fraud accounted for $559 M n Some of the most common online scams include: n Fraudulent e-‐cards n Free iPad offers n Rental scams
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 24
Online Scams n Publically available WiFi n Fake gi0 cards n Immediate assistance scams n Work from home scams
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 25
Wireless Internet
n Ensure wireless Internet is secure with encrypLon, requiring a password to access
n Consider MAC address filtering as well n “War Driving” is a common occurance
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 26
War Driving
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 27
Wireless Routers
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 28
For Further InformaLon… www.JoshMoulin.com
© Josh Moulin -‐ GCFA,CFCE,CAWFE,DFCP,ACE,CEECS 29