SlideShare ist ein Scribd-Unternehmen logo
1 von 61
FRAUDS AND SCAMS

SPONSORED BY
COEBURN POLICE DEPT
CREATED BY H. STALLARD JANUARY 2008
hstallard@yahoo.com
FRAUDS AND SCAMS
This presentation will look at the different
kinds of frauds and scams prevalent in our
society today.
We will show you how to identify them.
We will give you some advice on how to avoid
them.
And we will show you what to do if you are
the victim of one of these crimes.
FRAUDS AND SCAMS
All frauds and scams have two goals in common.
They want your money
or

They want the information that will get your
money.
FRAUDS AND SCAMS
Anyone can be victim of a fraud or scam. But 9 out
of 10 times the elderly are targeted because they are
more likely to have pensions, saving accounts, money
marketing accounts, jewelry, and are usually more
trusting.
TYPES OF FRAUDS AND SCAMS
Those attempted in person…
TYPES OF FRAUDS AND SCAMS
Telemarketing Scams…
TYPES OF FRAUDS AND SCAMS
Those attempted through

E-Mail

Snail Mail
TYPES OF FRAUDS AND SCAMS
Those directed at Credit Cards and ATM
Machines
TYPES OF FRAUDS AND SCAMS

Identity Theft
General tip-offs to a fraud or scam
1. They contact you first.
2. They want cash only.
3. They use phrases like… hurry, today only, last
chance, you must act now.
4. It is a get rich quick thing.
5. Sounds too good to be true.
6. They want money up front.
7. They need your credit card number, bank
account number, or check number.
General tip-offs to a fraud or scam
8. Something is free but you must pay
shipping, handling, postage, tax, etc to
receive it.
9. They use scare tactics. (If you don’t fix the
roof now it will cost you thousands later.)
10.You don't need to check out the company
with your family, lawyer, accountant, local
Better Business Bureau, or consumer
protection agency.
11.You can't afford to miss this 'high-profit, norisk' offer.
In Person Scams
Most in person scams are of the home repair
type.
In Person Scams
Roof Repair
Asphalt Driveway Paving
Furnace or Heat Pump
Water Heater Repair
Pest Control Inspections
Siding
In Person Scams
The scam artists use high pressure tactics to sell unneeded
and overpriced contracts for "home improvements.“
In these scams they approach you first.
They talk too fast (to confuse you) and pressure you to sign
papers today;

They have left-over supplies from another job and will let
you have them cheap.
They were driving by and just happened to notice a
problem with your roof, driveway, porch, etc.
In Person Scams
They want to offer you a free inspection of your
roof, driveway, porch, etc.
They need cash up front to buy the materials to
fix the problem.

If they actually come back, the work is poorly
done usually with inferior materials.
Often these scam artists charge more than their
quoted prices or their work does not live up to
their promises.
Telemarketing Scams
Under Federal Law:
It’s illegal for a telemarketer to call you if you
have asked not to be called.
Calling times are restricted to the hours
between 8 a.m. and 9 p.m.
Telemarketers must tell you it’s a sales call,
the name of the seller, and what they are
selling…
before they make their pitch.
Telemarketing Scams
Under Federal Law:
If it’s a prize promotion, they must tell you that
you don’t have to pay or buy anything to enter or
win.
Telemarketers may not lie about any information.
Before you pay, telemarketers must tell you the
total cost of the goods and any restrictions on
getting or using them, or that a sale is final or
non-refundable.
Telemarketing Scams
Under Federal Law:
In a prize promotion, they must tell you the
odds of winning, that no purchase or payment
is necessary to win and any restrictions or
conditions of receiving the prize.
Telemarketers may not withdraw money from
your checking account without your express,
verifiable authorization.
Telemarketing Scams
Under Federal Law:
It’s illegal for any company to ask you to pay
or buy something to win a prize, or to claim
that paying will increase your chances of
winning.
It’s illegal to buy and sell tickets to foreign
lotteries by phone or mail.
Telemarketing Scams
To resist high-pressure sales tactics...
Say so if you don’t want the seller to call back.
If they do call back, they’re breaking the law.
That’s a signal to hang up.
Ask for written information about the
product, service, investment opportunity or
charity that’s the subject of the call.
Telemarketing Scams
To resist high-pressure sales tactics...
Hang up if you are asked to pay for a prize…
free is free.
Keep information about your bank accounts
and credit cards private unless you know who
you are dealing with.
Hang up if a telemarketer calls before 8 a.m.
or after 9 p.m.
Telemarketing Scams
To resist high-pressure sales tactics...
Check out any company with the state and
local consumer protection office before you
buy any product or service or donate any
money as a result of an unsolicited phone call.
Do not send money — cash, check or money
order — by courier, overnight delivery or wire
to anyone who insists on immediate payment.
PHISHING
Phishing on the Internet
PHISHING
Phishing is a type of deception designed to steal
your valuable personal data, such as credit card
numbers, passwords, account data, or other
information by masquerading as a trustworthy
entity in an electronic communication.
PayPal, eBay, and online banks, are common
targets.
PHISHING
What does a phishing scam look like?
They often include official-looking logos from
real organizations and other identifying
information taken directly from legitimate Web
sites.
PHISHING
To make these phishing e-mail messages look
even more legitimate, the scam artists may place
a link in them that appears to go to the
legitimate Web site but it actually takes you to a
phony scam site or possibly a pop-up window
that looks exactly like the official site.
PHISHING
How to tell if an e-mail message is fraudulent.

Phrases to look for if you think an e-mail message is a
phishing scam.
Verify or reactivate your account.
If you don't respond, your account will be closed.
Dear Valued Customer---Phishing e-mail messages are
usually sent out in bulk and often do not contain your first
or last name.
Click the link below to gain access to your account.
PHISHING
How to tell if an e-mail message is fraudulent.
PHISHING
How to tell if an e-mail message is fraudulent.
PHISHING
How to tell if an e-mail message is fraudulent.
PHISHING
How to tell if an e-mail message is fraudulent.
PHISHING
How to tell if an e-mail message is fraudulent.
PHISHING
How to protect yourself from Internet Phishing
Use the latest products and services to help warn and protect you
from online scams
Install the Microsoft Phishing Filter

Install up-to-date antivirus and antispyware software.
Don’t open any unsolicited or suspicious E-Mail messages.
MAIL FRAUD

The US Postal Service lists 50 different
categories that you can make a mail fraud
complaint about.
MAIL FRAUD
Everything said previously about scams also applies to mail
fraud.
If you suspect you are a victim of mail fraud, you can
contact the US Postal Inspection Service through your local
post office or go on line and File a Mail Fraud Complaint.
CREDIT CARD FRAUD
Your card…

Or its information
5050 6060 7070 8080
Exp. 01/09
is the goal here
TO PREVENT CREDIT CARD FRAUD
Never give your card number over the phone
or internet unless you initiated the call.
Never provide your credit card information on
a website that is not a secure site.
Shred all credit card applications you receive.
Memorize your PIN. NEVER write it down.
TO PREVENT CREDIT CARD FRAUD
Don’t let your card out of your sight if at all
possible when it is being used.
TO PREVENT CREDIT CARD FRAUD
Shield your credit card number so that others
around you can't copy it.
Keep a list in a secure place with all of your
account numbers, expiration dates, phone
number, and address of each bank that has
issued you a credit card.
Never sign a blank credit card receipt.
Draw a line through blanks on the receipt
where additional charges could be
fraudulently added.
IF YOU SUSPECT CREDIT CARD FRAUD:
If your credit cards are lost or stolen, contact
the issuer(s) immediately.
Most credit card companies have toll-free
numbers and 24-hour service to deal with
these emergencies.
By US law, once you have reported the loss or
theft of your credit card, you have no more
responsibility for unauthorized charges.
Your maximum liability under federal US law is
$50 per credit card
ATM SCAMS
ATM SCAMS
ATM SCAMS
ATM SCAMS
ATM SCAMS
ATM SCAMS
ATM SCAMS
ATM SCAMS
IDENTITY THEFT
WHAT IS IDENTITY THEFT?
Identity-Theft is the fastest growing crime in
America; 9.9 MILLION victims were reported
in 2004 according to a Federal Trade
Commission survey.
Identity theft occurs when someone uses your
personally identifying information, like your
name, Social Security number, or credit card
number, without your permission, to commit
fraud or other crimes.
HOW DO THIEVES STEAL AN
IDENTITY?
Dumpster Diving…

They rummage through trash looking for bills
or other paper with your personal information
on it.
HOW DO THIEVES STEAL AN
IDENTITY?
Skimming…

They steal credit/debit card numbers by using
a special storage device when processing your
card.
HOW DO THIEVES STEAL AN
IDENTITY?
Phishing…

They pretend to be financial institutions or
companies and send spam or pop-up
messages to get you to reveal your personal
information.
HOW DO THIEVES STEAL AN
IDENTITY?
Changing your address…

They divert your billing statements to another
location by completing a change of address
form.
HOW DO THIEVES STEAL AN
IDENTITY?
Old-Fashioned Stealing…

They steal wallets and purses; mail, including
bank and credit card statements; preapproved credit offers; and new checks or tax
information. They steal personnel records, or
bribe employees who have access.
HOW CAN YOU FIND OUT IF YOUR
IDENTITY WAS STOLEN?
The best way to find out is to monitor your
accounts and bank statements each month,
and check your credit report on a regular
basis.
HOW CAN YOU FIND OUT IF YOUR
IDENTITY WAS STOLEN?
You may find out when…
Bill collection agencies contact you for
overdue debts you never incurred.
You apply for a mortgage or car loan and learn
that problems with your credit history are
holding up the loan.
You get something in the mail about an
apartment you never rented, a house you
never bought, or a job you never held.
What are the steps I should take if I'm
a victim of identity theft?
1. Place a fraud alert on your credit reports, and
review your credit reports. (see hand out)
2. Close the accounts that you know, or believe,
have been tampered with or opened
fraudulently.
3. File a complaint with the Federal Trade
Commission. (see hand out)
4. File a report with your local police or the police
in the community where the identity theft took
place.
REMEMBER…THEY ARE OUT THERE
WAITING FOR YOU
• COEBURN POLICE DEPARTMENT
• 114 FRONT STREET
• 395-2111
• CHIEF SCOTT BROOKS
• sbrooks@townofcoeburn.com

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt newOnkar1431
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in indiaArpan Shah
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gbensonoo
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft Rahmat Inggi
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing AttacksJagan Mohan
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]Sorav Jain
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet FraudGoose & Gander
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesAshesh R
 

Was ist angesagt? (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud
 
Phishing
PhishingPhishing
Phishing
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 

Andere mochten auch

5.4 whose laws rule the web
5.4 whose laws rule the web 5.4 whose laws rule the web
5.4 whose laws rule the web Hasan Dang
 
Chapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by RachelChapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by RachelVidaB
 
Elder Care: Fraud Protection
Elder Care: Fraud ProtectionElder Care: Fraud Protection
Elder Care: Fraud Protectioncaretocontinue
 
Fraud Committed Against the Elderly in N.C.
Fraud Committed Against the Elderly in N.C.Fraud Committed Against the Elderly in N.C.
Fraud Committed Against the Elderly in N.C.NCCPPR
 
Protect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the ElderlyProtect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the ElderlyGlass Jacobson
 
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015Age Action
 
Respite Now's Senior Scam Alert presentation
Respite Now's Senior Scam Alert presentationRespite Now's Senior Scam Alert presentation
Respite Now's Senior Scam Alert presentationRespiteNowGreg
 
Fraud forgery and scams powerpoint
Fraud forgery and scams powerpointFraud forgery and scams powerpoint
Fraud forgery and scams powerpointmortgagerateutah
 
Neuroeconomics Evidence for Decision-making Theory
Neuroeconomics Evidence for Decision-making TheoryNeuroeconomics Evidence for Decision-making Theory
Neuroeconomics Evidence for Decision-making TheoryMeiling XU
 
Navigating Elder Financial Abuse
Navigating Elder Financial AbuseNavigating Elder Financial Abuse
Navigating Elder Financial AbuseMegan Yip
 
Scammin Elderly PP
Scammin Elderly PPScammin Elderly PP
Scammin Elderly PPKatelyn Lutz
 
HCS 420 Elderly Scams Presentation FINAL
HCS 420 Elderly Scams Presentation FINALHCS 420 Elderly Scams Presentation FINAL
HCS 420 Elderly Scams Presentation FINALGina Leymeister
 
Elder Abuse: A Concern For Social Work Practice ...Lloyd Dsouza
Elder Abuse: A Concern For Social Work Practice ...Lloyd DsouzaElder Abuse: A Concern For Social Work Practice ...Lloyd Dsouza
Elder Abuse: A Concern For Social Work Practice ...Lloyd Dsouzadyutirajagiri
 
Overview of Neuroeconomics
Overview of NeuroeconomicsOverview of Neuroeconomics
Overview of Neuroeconomicsdpirouz
 
Elder financial exploitation gov conf presentation
Elder financial exploitation gov conf presentation Elder financial exploitation gov conf presentation
Elder financial exploitation gov conf presentation rexnayee
 
EC4024 Financial Economics Lecture 19L Neurofinance
EC4024 Financial Economics Lecture 19L NeurofinanceEC4024 Financial Economics Lecture 19L Neurofinance
EC4024 Financial Economics Lecture 19L NeurofinanceStephen Kinsella
 

Andere mochten auch (20)

5.4 whose laws rule the web
5.4 whose laws rule the web 5.4 whose laws rule the web
5.4 whose laws rule the web
 
Chapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by RachelChapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by Rachel
 
Elder Care: Fraud Protection
Elder Care: Fraud ProtectionElder Care: Fraud Protection
Elder Care: Fraud Protection
 
Fraud Committed Against the Elderly in N.C.
Fraud Committed Against the Elderly in N.C.Fraud Committed Against the Elderly in N.C.
Fraud Committed Against the Elderly in N.C.
 
Protect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the ElderlyProtect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the Elderly
 
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
 
Respite Now's Senior Scam Alert presentation
Respite Now's Senior Scam Alert presentationRespite Now's Senior Scam Alert presentation
Respite Now's Senior Scam Alert presentation
 
Fraud forgery and scams powerpoint
Fraud forgery and scams powerpointFraud forgery and scams powerpoint
Fraud forgery and scams powerpoint
 
Neuroeconomics Evidence for Decision-making Theory
Neuroeconomics Evidence for Decision-making TheoryNeuroeconomics Evidence for Decision-making Theory
Neuroeconomics Evidence for Decision-making Theory
 
Navigating Elder Financial Abuse
Navigating Elder Financial AbuseNavigating Elder Financial Abuse
Navigating Elder Financial Abuse
 
Scammin Elderly PP
Scammin Elderly PPScammin Elderly PP
Scammin Elderly PP
 
Elder Abuse on the Front Lines
Elder Abuse on the Front LinesElder Abuse on the Front Lines
Elder Abuse on the Front Lines
 
Senior scams
Senior scamsSenior scams
Senior scams
 
Keeping The Elderly Safe In The 21st Century
Keeping The Elderly Safe In The 21st CenturyKeeping The Elderly Safe In The 21st Century
Keeping The Elderly Safe In The 21st Century
 
HCS 420 Elderly Scams Presentation FINAL
HCS 420 Elderly Scams Presentation FINALHCS 420 Elderly Scams Presentation FINAL
HCS 420 Elderly Scams Presentation FINAL
 
What is neuroeconomics
What is neuroeconomicsWhat is neuroeconomics
What is neuroeconomics
 
Elder Abuse: A Concern For Social Work Practice ...Lloyd Dsouza
Elder Abuse: A Concern For Social Work Practice ...Lloyd DsouzaElder Abuse: A Concern For Social Work Practice ...Lloyd Dsouza
Elder Abuse: A Concern For Social Work Practice ...Lloyd Dsouza
 
Overview of Neuroeconomics
Overview of NeuroeconomicsOverview of Neuroeconomics
Overview of Neuroeconomics
 
Elder financial exploitation gov conf presentation
Elder financial exploitation gov conf presentation Elder financial exploitation gov conf presentation
Elder financial exploitation gov conf presentation
 
EC4024 Financial Economics Lecture 19L Neurofinance
EC4024 Financial Economics Lecture 19L NeurofinanceEC4024 Financial Economics Lecture 19L Neurofinance
EC4024 Financial Economics Lecture 19L Neurofinance
 

Ähnlich wie Protect Yourself from Fraud and Identity Theft

Ähnlich wie Protect Yourself from Fraud and Identity Theft (20)

cian A lottery scam
cian A lottery scamcian A lottery scam
cian A lottery scam
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Senior Scams - Just say no!
Senior Scams - Just say no!Senior Scams - Just say no!
Senior Scams - Just say no!
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
Identity Theft Overview Webinar
Identity Theft Overview WebinarIdentity Theft Overview Webinar
Identity Theft Overview Webinar
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Internet Scams, Identity Theft And
Internet Scams, Identity Theft AndInternet Scams, Identity Theft And
Internet Scams, Identity Theft And
 
Putting Telephone Scams... on Hold
Putting Telephone Scams... on HoldPutting Telephone Scams... on Hold
Putting Telephone Scams... on Hold
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Consumer fraud - Just Say No!
Consumer fraud - Just Say No!Consumer fraud - Just Say No!
Consumer fraud - Just Say No!
 
Scams 0710
Scams 0710Scams 0710
Scams 0710
 
Phishing
PhishingPhishing
Phishing
 
Identity Theft 101
Identity Theft 101Identity Theft 101
Identity Theft 101
 
Frauds and Seniors
Frauds and SeniorsFrauds and Seniors
Frauds and Seniors
 

Mehr von Harold Stallard

Recognizing gang affiliation
Recognizing gang affiliationRecognizing gang affiliation
Recognizing gang affiliationHarold Stallard
 
Danger from a stranger 2a
Danger from a stranger 2aDanger from a stranger 2a
Danger from a stranger 2aHarold Stallard
 
Surviving an armed robbery
Surviving an armed robberySurviving an armed robbery
Surviving an armed robberyHarold Stallard
 
So you want to join a gang
So you want to join a gangSo you want to join a gang
So you want to join a gangHarold Stallard
 
Kids and alcohol for grades 5, 6, 7 and 8
Kids and alcohol for grades 5, 6, 7 and 8Kids and alcohol for grades 5, 6, 7 and 8
Kids and alcohol for grades 5, 6, 7 and 8Harold Stallard
 
Understanding How the Criminal Picks a Victim
Understanding How the Criminal Picks a VictimUnderstanding How the Criminal Picks a Victim
Understanding How the Criminal Picks a VictimHarold Stallard
 
School security public version
School security public versionSchool security public version
School security public versionHarold Stallard
 

Mehr von Harold Stallard (11)

Recognizing gang affiliation
Recognizing gang affiliationRecognizing gang affiliation
Recognizing gang affiliation
 
Danger from a stranger 2a
Danger from a stranger 2aDanger from a stranger 2a
Danger from a stranger 2a
 
Danger from a stranger
Danger from a strangerDanger from a stranger
Danger from a stranger
 
The art of shoplifting
The art of shopliftingThe art of shoplifting
The art of shoplifting
 
Surviving an armed robbery
Surviving an armed robberySurviving an armed robbery
Surviving an armed robbery
 
Surviving a burglary
Surviving a burglarySurviving a burglary
Surviving a burglary
 
So you want to join a gang
So you want to join a gangSo you want to join a gang
So you want to join a gang
 
Kids and alcohol for grades 5, 6, 7 and 8
Kids and alcohol for grades 5, 6, 7 and 8Kids and alcohol for grades 5, 6, 7 and 8
Kids and alcohol for grades 5, 6, 7 and 8
 
Understanding How the Criminal Picks a Victim
Understanding How the Criminal Picks a VictimUnderstanding How the Criminal Picks a Victim
Understanding How the Criminal Picks a Victim
 
Personal safety
Personal safetyPersonal safety
Personal safety
 
School security public version
School security public versionSchool security public version
School security public version
 

Kürzlich hochgeladen

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 

Kürzlich hochgeladen (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

Protect Yourself from Fraud and Identity Theft

  • 1. FRAUDS AND SCAMS SPONSORED BY COEBURN POLICE DEPT CREATED BY H. STALLARD JANUARY 2008 hstallard@yahoo.com
  • 2. FRAUDS AND SCAMS This presentation will look at the different kinds of frauds and scams prevalent in our society today. We will show you how to identify them. We will give you some advice on how to avoid them. And we will show you what to do if you are the victim of one of these crimes.
  • 3. FRAUDS AND SCAMS All frauds and scams have two goals in common. They want your money or They want the information that will get your money.
  • 4. FRAUDS AND SCAMS Anyone can be victim of a fraud or scam. But 9 out of 10 times the elderly are targeted because they are more likely to have pensions, saving accounts, money marketing accounts, jewelry, and are usually more trusting.
  • 5. TYPES OF FRAUDS AND SCAMS Those attempted in person…
  • 6. TYPES OF FRAUDS AND SCAMS Telemarketing Scams…
  • 7. TYPES OF FRAUDS AND SCAMS Those attempted through E-Mail Snail Mail
  • 8. TYPES OF FRAUDS AND SCAMS Those directed at Credit Cards and ATM Machines
  • 9. TYPES OF FRAUDS AND SCAMS Identity Theft
  • 10. General tip-offs to a fraud or scam 1. They contact you first. 2. They want cash only. 3. They use phrases like… hurry, today only, last chance, you must act now. 4. It is a get rich quick thing. 5. Sounds too good to be true. 6. They want money up front. 7. They need your credit card number, bank account number, or check number.
  • 11. General tip-offs to a fraud or scam 8. Something is free but you must pay shipping, handling, postage, tax, etc to receive it. 9. They use scare tactics. (If you don’t fix the roof now it will cost you thousands later.) 10.You don't need to check out the company with your family, lawyer, accountant, local Better Business Bureau, or consumer protection agency. 11.You can't afford to miss this 'high-profit, norisk' offer.
  • 12. In Person Scams Most in person scams are of the home repair type.
  • 13. In Person Scams Roof Repair Asphalt Driveway Paving Furnace or Heat Pump Water Heater Repair Pest Control Inspections Siding
  • 14. In Person Scams The scam artists use high pressure tactics to sell unneeded and overpriced contracts for "home improvements.“ In these scams they approach you first. They talk too fast (to confuse you) and pressure you to sign papers today; They have left-over supplies from another job and will let you have them cheap. They were driving by and just happened to notice a problem with your roof, driveway, porch, etc.
  • 15. In Person Scams They want to offer you a free inspection of your roof, driveway, porch, etc. They need cash up front to buy the materials to fix the problem. If they actually come back, the work is poorly done usually with inferior materials. Often these scam artists charge more than their quoted prices or their work does not live up to their promises.
  • 16. Telemarketing Scams Under Federal Law: It’s illegal for a telemarketer to call you if you have asked not to be called. Calling times are restricted to the hours between 8 a.m. and 9 p.m. Telemarketers must tell you it’s a sales call, the name of the seller, and what they are selling… before they make their pitch.
  • 17. Telemarketing Scams Under Federal Law: If it’s a prize promotion, they must tell you that you don’t have to pay or buy anything to enter or win. Telemarketers may not lie about any information. Before you pay, telemarketers must tell you the total cost of the goods and any restrictions on getting or using them, or that a sale is final or non-refundable.
  • 18. Telemarketing Scams Under Federal Law: In a prize promotion, they must tell you the odds of winning, that no purchase or payment is necessary to win and any restrictions or conditions of receiving the prize. Telemarketers may not withdraw money from your checking account without your express, verifiable authorization.
  • 19. Telemarketing Scams Under Federal Law: It’s illegal for any company to ask you to pay or buy something to win a prize, or to claim that paying will increase your chances of winning. It’s illegal to buy and sell tickets to foreign lotteries by phone or mail.
  • 20. Telemarketing Scams To resist high-pressure sales tactics... Say so if you don’t want the seller to call back. If they do call back, they’re breaking the law. That’s a signal to hang up. Ask for written information about the product, service, investment opportunity or charity that’s the subject of the call.
  • 21. Telemarketing Scams To resist high-pressure sales tactics... Hang up if you are asked to pay for a prize… free is free. Keep information about your bank accounts and credit cards private unless you know who you are dealing with. Hang up if a telemarketer calls before 8 a.m. or after 9 p.m.
  • 22. Telemarketing Scams To resist high-pressure sales tactics... Check out any company with the state and local consumer protection office before you buy any product or service or donate any money as a result of an unsolicited phone call. Do not send money — cash, check or money order — by courier, overnight delivery or wire to anyone who insists on immediate payment.
  • 24. PHISHING Phishing is a type of deception designed to steal your valuable personal data, such as credit card numbers, passwords, account data, or other information by masquerading as a trustworthy entity in an electronic communication. PayPal, eBay, and online banks, are common targets.
  • 25. PHISHING What does a phishing scam look like? They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites.
  • 26. PHISHING To make these phishing e-mail messages look even more legitimate, the scam artists may place a link in them that appears to go to the legitimate Web site but it actually takes you to a phony scam site or possibly a pop-up window that looks exactly like the official site.
  • 27.
  • 28. PHISHING How to tell if an e-mail message is fraudulent. Phrases to look for if you think an e-mail message is a phishing scam. Verify or reactivate your account. If you don't respond, your account will be closed. Dear Valued Customer---Phishing e-mail messages are usually sent out in bulk and often do not contain your first or last name. Click the link below to gain access to your account.
  • 29. PHISHING How to tell if an e-mail message is fraudulent.
  • 30. PHISHING How to tell if an e-mail message is fraudulent.
  • 31. PHISHING How to tell if an e-mail message is fraudulent.
  • 32. PHISHING How to tell if an e-mail message is fraudulent.
  • 33. PHISHING How to tell if an e-mail message is fraudulent.
  • 34. PHISHING How to protect yourself from Internet Phishing Use the latest products and services to help warn and protect you from online scams Install the Microsoft Phishing Filter Install up-to-date antivirus and antispyware software. Don’t open any unsolicited or suspicious E-Mail messages.
  • 35. MAIL FRAUD The US Postal Service lists 50 different categories that you can make a mail fraud complaint about.
  • 36. MAIL FRAUD Everything said previously about scams also applies to mail fraud. If you suspect you are a victim of mail fraud, you can contact the US Postal Inspection Service through your local post office or go on line and File a Mail Fraud Complaint.
  • 37. CREDIT CARD FRAUD Your card… Or its information 5050 6060 7070 8080 Exp. 01/09 is the goal here
  • 38. TO PREVENT CREDIT CARD FRAUD Never give your card number over the phone or internet unless you initiated the call. Never provide your credit card information on a website that is not a secure site. Shred all credit card applications you receive. Memorize your PIN. NEVER write it down.
  • 39. TO PREVENT CREDIT CARD FRAUD Don’t let your card out of your sight if at all possible when it is being used.
  • 40. TO PREVENT CREDIT CARD FRAUD Shield your credit card number so that others around you can't copy it. Keep a list in a secure place with all of your account numbers, expiration dates, phone number, and address of each bank that has issued you a credit card. Never sign a blank credit card receipt. Draw a line through blanks on the receipt where additional charges could be fraudulently added.
  • 41. IF YOU SUSPECT CREDIT CARD FRAUD: If your credit cards are lost or stolen, contact the issuer(s) immediately. Most credit card companies have toll-free numbers and 24-hour service to deal with these emergencies. By US law, once you have reported the loss or theft of your credit card, you have no more responsibility for unauthorized charges. Your maximum liability under federal US law is $50 per credit card
  • 51. WHAT IS IDENTITY THEFT? Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported in 2004 according to a Federal Trade Commission survey. Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.
  • 52. HOW DO THIEVES STEAL AN IDENTITY? Dumpster Diving… They rummage through trash looking for bills or other paper with your personal information on it.
  • 53. HOW DO THIEVES STEAL AN IDENTITY? Skimming… They steal credit/debit card numbers by using a special storage device when processing your card.
  • 54. HOW DO THIEVES STEAL AN IDENTITY? Phishing… They pretend to be financial institutions or companies and send spam or pop-up messages to get you to reveal your personal information.
  • 55. HOW DO THIEVES STEAL AN IDENTITY? Changing your address… They divert your billing statements to another location by completing a change of address form.
  • 56. HOW DO THIEVES STEAL AN IDENTITY? Old-Fashioned Stealing… They steal wallets and purses; mail, including bank and credit card statements; preapproved credit offers; and new checks or tax information. They steal personnel records, or bribe employees who have access.
  • 57. HOW CAN YOU FIND OUT IF YOUR IDENTITY WAS STOLEN? The best way to find out is to monitor your accounts and bank statements each month, and check your credit report on a regular basis.
  • 58. HOW CAN YOU FIND OUT IF YOUR IDENTITY WAS STOLEN? You may find out when… Bill collection agencies contact you for overdue debts you never incurred. You apply for a mortgage or car loan and learn that problems with your credit history are holding up the loan. You get something in the mail about an apartment you never rented, a house you never bought, or a job you never held.
  • 59. What are the steps I should take if I'm a victim of identity theft? 1. Place a fraud alert on your credit reports, and review your credit reports. (see hand out) 2. Close the accounts that you know, or believe, have been tampered with or opened fraudulently. 3. File a complaint with the Federal Trade Commission. (see hand out) 4. File a report with your local police or the police in the community where the identity theft took place.
  • 60. REMEMBER…THEY ARE OUT THERE WAITING FOR YOU
  • 61. • COEBURN POLICE DEPARTMENT • 114 FRONT STREET • 395-2111 • CHIEF SCOTT BROOKS • sbrooks@townofcoeburn.com