here two assignments or tasks to complete first video's link https://www.youtube.com/watch?v=Vsxxsrn2Tfs https://www.youtube.com/watch?v=SZQLbsYGP_E&t=1s https://www.youtube.com/watch?v=FtRe0_2AwBg...

1 answer below »
here two assignments or tasks to complete first
video's link

https://www.youtube.com/watch?v=Vsxxsrn2Tfs


https://www.youtube.com/watch?v=SZQLbsYGP_E&t=1s


https://www.youtube.com/watch?v=FtRe0_2AwBg










first task which has 200 level words is discussion post

1.

Identity Theft Discussion Forum -
1 postings

(200 words) about interesting topics studied in this chapter.If you find related article / web sites, feel free to share / post them here are well. This will be very resourceful to everyone in the class.


this is from chapter 3 I attached files and all





task 2 is


In groups,

discuss Identity



Theft that
may have occurred to you, family, friends or find one online. Pick the one with that caused the most damaged and write the story. I will conform with prof story need how many words I am sure one page is enough but by tm I will conform it. to start task 2 watch all video'sand read chapter notes and understand all and task one is only about chapter 3 and notes.


























IDENTITY THEFT IDENTITY THEFT What Is Identity Theft ? When persons identity is stolen by individuals and using their identity for use of monetary gain, commit fraud and other crimes. personally identifying information, such as 1. Your name 2. Social Security number 3. Credit card number 4. Birth Date 5. Address How ID theft starts ? Dumpster Diving (Dig for money) • Many individual recycle paper that have billing, bank statements, hospital records and thieves get out to search for in garbage for any personal Information Skimming (Card Reader). • steal credit/debit card numbers by using a special storage device when processing your card. • Phishing. Fraudsters pretend to be financial institutions or companies and send spam or pop-up messages to get you to reveal your personal information. • Changing Your Address. Fraudsters divert your billing statements to another location by completing a change of address form. • Old-Fashioned Stealing. Fraudsters steal wallets and purses; mail, including bank and credit card statements; pre-approved credit offers; and new checks or tax information. Fraudsters steal personnel records, or bribe employees who have access. • Pretexting. Fraudsters use false pretenses to obtain your personal information from financial institutions, telephone companies, and other sources. How Identity Theft Occurs After Identity Is Stolen As soon as someone identity is stolen , Identity thieves have numerous ways of using their information such as: • Credit card fraud • Phone or utilities fraud • Bank/finance fraud • Other frauds Credit card fraud • Fraudsters may open new credit card accounts in your name. When they use the cards and don't pay the bills, the delinquent accounts appear on your credit report. • Fraudsters may change the billing address on your credit card so that you no longer receive bills, and then run up charges on your account. Because your bills are now sent to a different address, it may be some time before you realize there's a problem. Credit card fraud Continue.. • Famous case of the Credit card fraud • Most recent Albert Gonzalez He collected over 170 million credit card and ATM card number by himself. He was working with ShdowCrew group stole 1.5 million credit card numbers then sold them online along with fraudulent passports, health insurance cards and birth certificates. 4.3 million was stolen from the identity theft victims. http://www.ranker.com/review/albert-gonzalez/30948432 http://www.ranker.com/review/albert-gonzalez/30948432 Credit card fraud Continue.. • He hacked TJX Companies, stealing over 45 million credit card numbers, and Heartland Payment Systems, taking another 130 million credit card numbers • March 2010, Gonzalez was sentenced to serve two concurrent 20-year sentences in federal prison. Phone or utilities fraud • Fraudsters may open a new phone or wireless account in your name, or run up charges on your existing account. • Fraudsters may use your name to get utility services like electricity, heating, or cable TV. Bank and financial fraud: • Fraudsters create counterfeit checks using the victim name or account number. • Fraudsters open a bank account under the victim personal information and write bad checks. • Fraudsters clone the victim ATM or debit card and make electronic withdrawals with their information, draining their accounts. • Fraudsters take out loans under the victim personal information such as Social security number. Government documents fraud: • Fraudsters may get a driver's license or official ID card issued in the victim’s name but with the crook’s picture. • Fraudsters may use the victim's name and Social Security number to get government benefits under their name. • Fraudsters may file a fraudulent tax return using the victim’s social security number and other personal information . Government documents fraud continued.. • Most recent Case • A group of man in Arizona started scheme of tax return • Filed about 1900 tax return • $ 4 million dollars in tax refunds • Using social security number of deceased • Opened about 140 bank accounts Other Types of Frauds • Fraudsters may get a job using the victim’s Social Security number. • Fraudsters may rent a house or get medical services using the victim’s name. • Fraudsters may give the victim’s personal information to police during an arrest. If they don't show up for their court date, a warrant for arrest is issued in the victim’s name. Medical fraud Investigating An Identity Theft case • You may find out when bill collection agencies contact you for overdue debts you never incurred. • You may find out when you apply for a mortgage or car loan and learn that problems with your credit history are holding up the loan. • You may find out when you get something in the mail about an apartment you never rented, a house you never bought, or a job you never held. • Hospital Bills you never had or visited Law • • Impersonation of ID Theft • If the person has benefited in the less than 500 o Up to 18 months in prison and a fine of up to $10,000 o up to 3-5 years in prison. and can be fined up to $15,000 o up to 5 to 10 years in prison and a fine of up to $150,000 • Use of personal identifying information of another o 5 to 10 years in prison and a fine of up to $150,000. • Trafficking in personal identifying information pertaining to another person o Manufacturing and possessing any personal information of a person without person's consent and using for act of fraud Up to 18 months in prison and a fine of up to Law continued... o o Manufacturing and possessing 20 or more items pertaining personal information of four or more persons without person's consent and using for act of fraud  up to 3-5 years in prison. and can be fined up to $15,000. o Manufacturing and possessing 50 or more items pertaining personal information of four or more persons without person's consent and using for act of fraud  up to 5 to 10 years in prison and a fine of up to $150,000 Cost of Fraud Who are the Victims? • Elder are most like the victims of ID theft o lack of information o Are sensitive to fall for tricks • Working class o Lack knowledge of ID theft information o Mostly concentrated on work and make ends meet • College Students o leave traces of information everywhere o school paper and giving SSN to most like everyone Number of Victims How to prevent ID Theft? How can you help? • Watch for shoulder-surfers. • Shred important papers • Analyze your credit report annually • Protect your social security number - DON'T CARRY WITH YOU • Report suspicious activity • Place passwords on your credit cards, banks, phone accounts. • Don't store personal information on mobile devices. • Leave your unneeded credit cards, Social Security card, birth certificate and passport at home. Restoring your credit • contact your local authorities and obtain a police report so that the matter can be investigated and also to show to lenders. • First thing you should do is obtain a copy of your credit report through all three of the credit bureaus to find out what is fraudulent and incorrect and what is not. • The three credit bureaus are TransUnion, Equifax, and Experian. Work Cited Blue Cross Blue Shield Of Michigan. (n.d.). Fraud case files. Retrieved from Blue Cross Blue Shield of Michigan website: http://www.bcbsm.com/home/health_care_fraud/fraud_files.shtml Zetter, K. (2010, April 08). Identity thieves filed for $4 million in tax refunds using names of living and dead. Retrieved from Threat Level website: http://www.wired.com/threatlevel/2010/04/fake-tax-returns/ Morton, H. (2010, April 31). Identity theft state statutes. Retrieved from National Conference of State Legislatures website: http://www.ncsl.org/issues-research/banking/identity-theft-state- statutes.aspx#NJ O'Dell, J. (2011, January 29). How much does identity theft cost? Retrieved from Mashable Tech website: http://mashable.com/2011/01/29/identity-theft-infographic/ Chapter 3 Identity Theft: Tools and Techniques of 21 st Century Bandits Chapter Outline I. Introduction A. Identity has been generally defined as the theft of someone’s identity through the use of some form of personal identifying information, with the information being used for some fraudulent activity. B. A variety of different methods are employed in the classification of identity theft. C. Two primary classifications of identity theft 1. Situations in which an individual’s identity is stolen and the thief assumes the physical identity of the victim. a. This title of identity theft is rarely encountered. 2. Situations involving credit fraud/financial fraud. D. Assuming the life of a potential victim 1. Difficult to accomplish 2. It is possible for a terrorist organization or an extremist group to assume another’s identity in an attempt to remain hiding during the planning stages of an attack. 3. Person may find themselves seeking a lifestyle that is beyond their means and may find that living someone else’s life allows them an escape. E. The theft of a victim’s credit identity 1. A financially devastating criminal act. 2. This is the fastest-growing high-technology crime in the world . 3. A person becomes the victim of this form of identity theft when the thief is able to obtain a small amount of personal identifying information (normally a social security number, address, employer, spouse’s name, etc.) and then uses that information to being modifying the victim’s credit accounts. i. There are a variety of ways this information can be
Answered 5 days AfterSep 17, 2022

Answer To: here two assignments or tasks to complete first video's link...

Deepak answered on Sep 23 2022
74 Votes
Last Name:    1
Name:
Professor:
Course:
Date:
Title: Identity Theft
Contents
Introduction    3
Carding…………………………………………………………………………………………….4
Carding Attack Process……………………………………………………………………………5
Important Point……………………………………………………………………………………5
Prevent Carding…………………………………………………………………………………...6
Task 2…………………………………………………………………
…………………………..7
References………………………………………………………………………………………10
Introduction
    Identity theft is defined as the illicit acquisition of personal information such as a SS number, bank account details, or credit card info. Identity thief must gain access to your private information by breaching the law and through fraud or force. They might take this information from you either purposefully or unintentionally. When someone establishes a new credit card or other form of account in your name, this is considered identity theft. This can happen when someone uses your personal information to apply for a job, buy digital currency as well as products from ecommerce, or rack up charges on existing accounts.
Identity theft is one of the most rapidly expanding crimes in the United States, with an estimated cost of $5 billion to $15 billion yearly. An estimated 15 to 20 million Americans are victims of identity theft each year. Identity theft has cost up to 3.5 million individuals money. Perpetrators may take personal information through mail or phone communications, as well as from Internet sites they stumble across while conducting personal research (such as credit cards, banks, etc.) Some criminals attempt to get personal information by contacting random phone numbers to make free calls that leave a calling card in the recipient's inbox (also known as "call harvesting"). This practice is termed unsolicited identity theft and is unlawful in the majority of states.
Carding
Carding is a means of obtaining online merchandise using forged payment methods. Carders make use of information and data obtained from others. This is significant for anybody and their money. If someone finds it in this situation, there are strict punishments in place. These crimes are handled by cyber security police departments, which are unaffected by any government in any country.
Carding is a credit card scam in which a carder steals or intentionally use your credit card information to purchase prepaid gift cards or products. After obtaining your information, thieves try modest transactions on the internet to verify the validity of your card. If they are successful, the fraudster will use your information to purchase gift cards from retailers such as Amazon or Walmart.
The entire procedure may be completed in minutes, allowing a fraudster to flee with stolen cash before you even know what has happened.
Gift and prepaid cards, unlike other types of credit card fraud, cannot be traced. So, once the fraudster has completed the transaction, they can use the gift cards to buy products or sell them for cash.
Carding Attack Process
A carding attack generally consists of the following steps:
Credit card numbers are obtained by carders through illicit marketplaces, hacked websites, or payment methods.
Carders then use bots to make modest transactions across several websites. To establish the authenticity of card data, each attempt compares a card number to a merchant's...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here