New To Scamming-All Types Of Scam(Part 2)

New To Scamming-All Types Of Scam(Part 2)
Like Tweet Pin it Share Share Email

Scam and a scammerNew To Scamming-All Types Of Scam(Part 2)

Continuation from our series Part 2 from Part 1


There are usually two sets of SCAMMING involved with identity theft: the one who steals and then sells your identity, and the one who buys and uses it.
There are two general categories of Identity Theft:

i)Account takeover – This is when crooks take over your bank accounts. The person gets the information needed to convince the bank that they are you, and the bank gives them access to your money or line
of credit. This can include all of the information associated with your account: account numbers, card numbers, passwords, PINs, security codes, social security numbers and other personal information.
True-name fraud – This is when crooks get the personal information they need to establish an account in your name, such as a credit card, a new bank account, renting or buying a property, obtaining medical
insurance, or establishing a utility service. You may never know about these accounts until they become delinquent and the collection agency comes calling, or you’re refused a loan because of “unpaid debts”
you never knew you had, or until you’re arrested because there’s a warrant in your name. Or perhaps you’re mistreated during an emergency medical situation because your medical records show the
records of the criminal rather than yours. While some of this may seem unbelievable, all of these scenarios happen all too often.
Whether you lose money outright or you have to straighten out the disaster a crook has made of your life by using your name to commit crimes, you are a victim of fraud. Don’t let this happen to you: be
vigilant when anyone (even friends or family members, who are — sadly — often involved in identity theft asks for any personal or financial information from you at any time, for any reason. Sound paranoid?
That isn’t such a bad thing these days. When it comes to identity crime, you’re better safe than sorry.

II)The “Ishings” – Phishing, Vishing and Smishing.

With the advent of digital services, cybercriminals have created devious new ways of stealing victims’ personally identifiable information (PII). The terms used to describe this type of fraud follow a fishing
theme (i.e., baiting a hook and casting a line in the water, hoping to lure fish to bite). First seen in emails, the technique has evolved, using the same basic bait-and-hook technique, customized as needed to
work through phone and text messaging services.

PII is no longer the only thing at risk to an “ishing” attack. It is also used to lure victims to web sites where their electronic devices can be infected by Trojans or viruses. To add insult to injury, these techniques
are only successful if the victim voluntarily complies with the crook’s request, not recognizing that these requests are illegitimate.

To avoid becoming a victim, don’t respond to these directives immediately. Question all unexpected requests for PII, instructions to call unrecognized phone numbers or directions to click on links. Contact
authentic organizations through other channels and make sure the contacts and requests are legitimate before responding.

-Phishing – Fraud operators bait victims by sending emails that appear to be from a reliable source, asking the recipients to respond to the email in various ways, e.g., send a return email with information or
click on a link in the email. Those recipients who respond become victims. Able to send a large number of phishing emails in mass distributions, the crooks need only a small percentage of recipients to
respond in order to make it a worthwhile catch.
Example: Victim receives an email from his bank telling him that he needs to update his password immediately or risk having his online banking service shut down. The victim clicks on the link in the email,
which takes him to a fake (“spoofed”) bank site where he is instructed to enter his username and current password. He complies and in so doing, gives the fraud operator his on-line banking login information.
Vishing – Since Voice of Internet Protocol (VoIP) technology became available as an option to traditional telephone services, criminals recognized an opportunity to collect victims’ numeric PII (e.g. credit and
bank account numbers, PINs, security codes, SSNs, dates of birth) through their telephone devices, by creating the illusion that they were interacting with a legitimate organization.
Example: Victim receives an automated phone message that there is a suspicious transaction on her credit card account and to please call a number to confirm the transaction is legitimate. The victim calls
the phone number given and is asked to enter her credit card number and security code on the key pad so she can be “authenticated” as the real customer, which is how the crooks get her card information
for future fraudulent transactions.

-Smishing – It wasn’t long before smart phones and texting became a popular communication channel, and with it, scoundrels saw the chance to use SMS – Short Messaging Service – to convince texters to
respond to fraudulent texted communications.
Example: Victim receives a text message that he is about to be charged for a service the victim never ordered. He is told that he needs to contact the company immediately to cancel the order or be
responsible for the charge. The text includes a hyper-link, which the victim clicks on, taking him to a fake website that triggers the download of a program that breaches the security features of his phone.
Types of Payment Fraud Scams
So let’s talk about some of the more common scams:

6)Auction scams and advertising scams (sellers) – In a “wire-back scam,” often seen with auctions and classified ads (both print and online), a crook buys what you have to sell and gives you a check for
much more than the amount of the item with some rational excuse (e.g., they were unsure of the shipping amount or thought there might be additional shipping fees associated with the purchase). The crook
asks you to wire back whatever you don’t need. Sounds simple enough, so you send the item and wire back the extra money. But when the check returns as fraudulent, you’re out the amount you wired and
probably also the item you sold.

7)“Call-back” scams – You get a call, a letter or an email directing you to call a number for some compelling reason. So you call, and after listening to a long message, you’re put on hold for a while. What you
don’t realize is that you’ve dialed an expensive overseas pay-per-minute service that charges an exorbitant fee for every minute you’re connected. (Often this is an “809” or a “900” number.) You may not know
you’ve been scammed until you get your whopping phone bill.

8)Charity scams– Americans in general are generous people and when they hear of someone in need, they are anxious to help. Crooks take advantage of this generosity by creating all sorts of heartbreaking
stories to open people’s hearts – and wallets – relying on your trust that the bogus organization they’re describing is legitimate. The causes these crooks say they are representing most often include:
-Sick or missing children
-Hospitals needing life-saving equipment
-Overcrowded orphanages
-Victims of earthquakes, floods and other acts of Nature
-There are legitimate needs out there, but be sure you are dealing with a reputable organization.

9)Fake government scams– Any contact from any government agency is bound to make us anxious to please, but government agencies do not use email to initiate contact with people, nor do they ask for
personal or financial information.

i)FBI scams – The FBI will never email you to notify you of an inheritance or of money recovered from a drug sting, nor do they assess fines by email.

ii)IRS Scams – The IRS does not discuss tax matters online or ask for personal or financial information via email.

iii)Social Security scams – Like the IRS, the Social Security Administration will never request personal or financial information via email.

The lesson is the same with other government organizations: an email contact is unlikely to be legitimate, and any contact should be verified with the purported agency first by using a phone number from the
telephone book or dialing 411. Do not use a phone number supplied in the letter or email to verify the agency’s legitimacy.

10)Handyman scams – Someone comes to your door and offers to do some needed maintenance like cleaning gutters, raking leaves, or shoveling snow, for a very attractive rate. They will ask for a check for
payment, which gives them your name, address, the name of your bank and your checking account information. Elders are particularly attractive targets for this type of scam. (By the way, this is also a
technique used by burglars to “case” a house as part of planning for a break-in later.)

11)job scams– We’ve all seen the “work from your home” advertisements on online job boards and in the newspaper. With these, just filling out the application is a risk. If you’re asked for personal information
that identifies you, like your social security or driver’s license number, or if the so-called employer wants to deposit money into your bank account as part of the job, move on. These are usually some form of
“wire-back” scams. Examples of common job scams include:

12)Mystery shoppers – In this scam, the crooks ask you to test their “customer service” when using payment services. First, they send a check and ask you to cash it so that you will not have to use any of
“your own money” for the job. You’re also given a number of wire service locations (or other electronic payment services) and instructed to pretend to be a customer by sending some of the money to a name
and address at each location. At the end of all this, they tell you, you’ll be asked to “rate your customer service experience.” Your wires will go through, returning the money to the crooks, while the check
initially deposited into your account will be returned as a fraudulent payment and charged against you.

13)Money manager or collection manager – With this scheme, your “job” is to monitor money being deposited into your account during the day. At the end of each day, you’re told, you’ll wire the majority of the
money back to a certain location, keeping a percentage as your “fee”. Sound good? It won’t when the money deposited is charged back because the bank has discovered it’s fraudulent, and the money to
repay the bank is gone in those wires you sent out each day. And it’s all on you now.

14)Lottery scams and sweepstakes scams – If you didn’t enter, you can’t win!! Especially foreign lotteries or sweepstakes. And if you did enter, you wouldn’t be required to send them money to pay taxes or
anything else before receiving your prize. This is a classic “advance-fee scam.”

15)Nigerian or “419” scams – Among the most notorious “advance-fee scams,” “Nigerian”-type scams now originate in many other countries, but they are still named for the country where they started (“419”
refers to the Nigerian criminal code that makes them illegal). The essence of these scams is to represent that there is a substantial amount of money that the perpetrator — supposedly a dignitary of some
type — must route out of their country to a safe haven, and that they would gladly let you have a percentage of the money if you would only let them transfer the money into your accountfor safe keeping. In the
beginning, the Nigerian scammers were just trying to get victim bank account information so they could then drain the victims’ accounts, but it wasn’t long before they realized the opportunity they had to get
the victims to willingly send them the money. Since their inception – and with the increasing recognition of the traditional “Nigerian” scam – the scam stories have morphed into:

16)Orphan scams – The crooks represent themselves as youngsters who have just lost their parents and need to get their inheritance out of the country before a nefarious aunt or uncle gets control of the
money. For a percentage of the inheritance …

17)Assassinated official or “coup” scams – With these, a high-ranking public or military official has been killed mysteriously (often in a plane or helicopter crash) along with their families. The message urges
the recipient to allow them to wire money before the coup gets ahold of it …

18)Inheritance scams – If neither you nor your relatives have ever heard of the person or know of anyone else in the family related to them, no, you don’t have a long-lost relative who decided to leave you their
fortune in another country.

19)Dying philanthropist scams – Here, after years of deceitful business practices, a rich foreigner learns he is dying of a terrible disease and has a change of heart. He’s looking for a trustworthy American so
that the funds can be donated to charitable causes, with a fair percentage of the fortune to be kept by said trustworthy American for their troubles …
And the list continues. If you think it’s unlikely that a stranger in a foreign country would contact you and ask you to hang onto some money for them for whatever reason, you’re right. Ignore these fairy tales.

21)Social engineering scams– “Social engineering” is a fancy term to refer to the way criminals convince people to do things that then allow the crook to commit a crime. In this age of immediacy and a desire
for relationships (upon which social networking depends), trusting souls become all too vulnerable to these types of scams, which include:
Friend’s friend scams – A friend introduces you to a new friend of his. A couple of weeks later, that new friend needs helping cashing his “paycheck.” Your mutual friend isn’t around, he tells you, so can you
help him? You take him to your bank and cash the check for him on the strength of your relationship with the bank. When the check returns for “forged endorsement” (or another reason) and the bank charges
your account, your friend’s friend can’t be found to pay you back.

22)Sweetheart scams – You meet someone who’s new in town. You think they’re wonderful and you date for a while. Maybe you even move in together. Then one day your sweetheart asks if you’d help cash
a check at your bank since she doesn’t have a local account. You do, and that’s the last time you see her. The check bounces a few days later and the bank comes to you for the money. Let’s just hope the
money is all you’ve lost.

23)Relative-in-distress scams – This is one of the newer scams. Grandparents (or aunts or uncles) get a sudden urgent call or email from a “grandchild” saying they’ve been falsely arrested somewhere and
they need money wired immediately for bail. The message asks to “please don’t tell mom and dad …”

24)Telemarketing, auction and ad scams (buyers) – You’re offered (or win the bid on) a product, and you provide payment information to place an order. The item either never arrives or what arrives is not
what you thought you were getting. You try to contact the seller, but you can forget about getting your money back since the company is nowhere to be found.
Scams Perpetrated Against Seniors
Like anyone else, seniors can fall prey to almost any of the scams posted on this site, including identity theft, charity scams, relative-in-distress, and telemarketing fraud. However, some scams seem more
often targeted toward vulnerable seniors such as:

25)Power of Attorney Fraud – The crook seeks to obtain a Limited or Special Power of Attorney, enabling them to access funds and other assets, including bank accounts and real estate, and make legal
decisions that are not in the best interest of the victim.

26)Unsolicited Work – Fraudsters coerce, intimidate or otherwise manipulate individuals into agreeing to home repairs they often do not need. Sometimes they offer a very attractive rate and then perform a
shoddy or incomplete job and leave the home in disarray, insisting on more money to complete the work and return the home to order. Frequently, they insist on cash and on accompanying the victim to the
bank to withdraw funds.

27)Companion Scam – a stranger enters the victim’s life to win their affection and gain influence for the sole purpose of financially exploiting the senior victim. The perpetrator uses undue influence including
threats (or real) physical and emotional abuse. Seniors, overwhelmed by intimidation, the fear of be left alone or the embarrassment of being duped, are less likely to report the activity to trusted family or law
enforcement while there is still a chance to recover at least some of their assets.

28)Theft of Income – A perpetrator, who can sometimes include an unscrupulous caregiver or even a family member, commits theft by obtaining access to the senior’s pension or Social Security check,
checking, savings or money market accounts, or credit or debit cards, repeatedly draining the victim’s funds every time they are replenished by the next month’s payments.
Fraud is always evolving. will keep updating this information as new types of payments frauds surface.

Comments (9)

Leave a Reply

Your email address will not be published. Required fields are marked *