- Fulfills Steps 3 and 4 of GSUSA Junior Cybersecurity Investigator badge requirements.
- Leaders – please be aware of double dipping and make your own informed choice.
Info Needed for badge requirements: Identity theft happens when someone steals your personal information, like your name or address, and uses it to pretend to be you. They might use this information to take money, open accounts, or make purchases in your name. Thieves can steal your identity by going through your trash for papers with private details or by watching what you type on a computer or phone. Even pictures are part of your identity because they can be used on ID cards. Keeping your private information safe is important to stop people from pretending to be you!
If someone steals your identity, you need to act fast. First, tell the police what happened so they can help. Next, change your passwords to stop the thief from using them. Then, call places like your bank or credit card company to block the thief from using your accounts. If your passport, social security number, or driver’s license was stolen, contact the right office to report it and get new ones. Acting quickly helps protect your information and fix any problems
Items Needed
- Tent cards or signs for each station:
- POLICE
- PASSWORD
- CREDIT CARD COMPANY
- BANK
- PASSPORT DEPARTMENT
- SOCIAL SECURITY DEPARTMENT
- DEPARTMENT OF MOTOR VEHICLES
- Pens and paper
- Index cards with pre-written Identity Theft Scenarios (cut out and glued to separate cards) (You can use VTK Identity Theft Scenarios by GSUSA)
- List for each station of which scenarios apply to them (See Station Head Quick Reference List below)
- (Optional) Stickers
- (Optional) Ink pads and 7 different stamps
Before the Meeting
- Place the tent cards or signs around the room to create seven stations, each representing a key organization.
Instructions
- Assign seven scouts as station heads, one for each station. Provide station heads with paper, pens, and optional stamps or stickers.
- For larger groups, pair scouts at each station.
- For smaller groups, assign one scout to manage multiple stations.
- Assign scouts as identity theft victims. For larger groups, pair victims to work together; for smaller groups, each victim can play out multiple scenarios.
- Explain that each station represents a step a person might take if their identity is stolen. Victims take turns picking an Identity Theft Scenario card and reading it aloud to the group.
- Victims decide which stations they need to visit based on their scenario. Station heads confirm if victims are in the right place and mark their card with a pen or (optional) stamp or sticker. (See Station Head Quick Reference List below.)
- After completing the activity, discuss as a group:
- What steps did victims take to protect and repair their identities?
- How long do you think it might take to fix identity theft? (Answer: It can take weeks, months, or even years.)
- How might someone find out their identity was stolen? (Answers: Unexpected bank withdrawals, purchases they didn’t make, or a notice from a cybersecurity investigator.)
Station Head Quick Reference List
1. POLICE
- Identity stolen online
- Someone pretending to be them on social media
- Credit card information stolen
- Bank account information stolen
- Passport information stolen
- Social security number stolen
- Driver’s license information stolen
- All private information exposed in a website hack
2. PASSWORD
- Someone pretending to be them on social media
- All private information exposed in a website hack
3. CREDIT CARD COMPANY
- Credit card information stolen
- All private information exposed in a website hack
4. BANK
- Bank account information stolen
- All private information exposed in a website hack
5. PASSPORT DEPARTMENT
- Passport information stolen
- All private information exposed in a website hack
6. SOCIAL SECURITY DEPARTMENT
- Social security number stolen
- All private information exposed in a website hack
7. DEPARTMENT OF MOTOR VEHICLES
- Driver’s license information stolen
- All private information exposed in a website hack