REACTION AND ACTION RESPONDING TO FRAUD 1. THE VICTIMS THE CON IS TAILORED TO THE PROSPECTIVE VICTIMS. 2.

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Operational Risks Task 13. What is CNP? CNP stands for Card Not Present and is when you order or pay for something online as you are not in front of the.
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
A Public Service of the Better Business Bureau Education Foundation Educating Older Adults about Fraudulent Activity in the Marketplace Protecting Older.
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
IDENTITY THEFT AND FRAUD CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Oklahoma’s Personal Financial Literacy Passport © Oklahoma State Department of Education. All rights reserved. 1 Teacher Presentation Series 9 Standard.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Modules 9.1.  When someone knowingly deceives you for their own personal gain.  They convince you that something is true when it isn’t.  They make.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
What is identity theft, and how can you protect yourself from it?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
INTERNET SAFETY FOR STUDENTS
What you don’t know CAN hurt you!
What do I need to know?.   Instant Messages  Social Networking.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Internet Fraud By Jessica Habermehl &Ally Erwine Period 9.
INTERNET SAFETY FOR STUDENTS
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
A ID Theft & ACCOUNT FRAUD Welcome to MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP Prevention & Clean Up © 2011.
REACTION AND ACTION Responding to Fraud 1. LifeSmarts is a program of the National Consumers League.
Teenangel Gabriella. AIM is an instant messaging system. You have to be thirteen years old to use AIM. Besides sending messages, AIM is also used to tell.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
SACHIN DEDHIA Cyber Crime Investigator Cert. Ethical Hacker(USA)
Personal Finance Unit 2.02 Understand Threats to Financial Security.
Identity theft: Real or Virtual? By: Alex Metzler.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Common Scams Lewis Collantine & Clare Cunningham Thurrock Trading Standards 8 th September 2015.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Hertfordshire Trading Standards Scams Susie Helliwell Trading Standards Officer.
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Cyber Safety Jamie Salazar.
How Con Artists Will Steal Your Savings and Inheritance Through Telemarketing Fraud, Investment Schemes and Consumer Scams.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Outline of this module By the end of this module, you will be able to: Understand what is meant by the term “advanced fee fraud”; Understand what is.
Protecting Your Assets By Preventing Identity Theft
Identity Theft It’s a crime!
Fraud Protection.
Fraud protection.
Digital Citizenship Middle School
Internet Fraud By (NAMES).
Protecting Yourself from Fraud including Identity Theft
It’s a Scam Prepared by Lamanda Weston
Presentation transcript:

REACTION AND ACTION RESPONDING TO FRAUD 1

THE VICTIMS THE CON IS TAILORED TO THE PROSPECTIVE VICTIMS. 2

YOUNG ADULT VICTIMS  Young educated adults are targeted because they-  Lack the maturity or the experience that would help them recognize fraud  Desire to increase their standard of living quickly  Lack information about personal finance 3

ADULTS  Adults are targeted because-  While most adults have a grasp of finances they may not be Internet savvy  They may not be aware of the many types of 419 and advance fee frauds 4

SENIORS  Seniors are targeted because-  They did not grow up in the digital age and are vulnerable to spam and phishing  They were raised to be polite to strangers  They may have a diminished capacity to protect themselves and their assets 5

EMOTIONAL REACTIONS HOW DOES IT FEEL TO BE A VICTIM OF FRAUD? 6

REACTIONS Fraud affects the victim in more ways than removing money from their bank account. 7

EMOTIONS The emotional consequences of fraud crimes are costly.  Fraud victims often suffer:  Self-blame  Shame  Guilt 8

IT’S PERSONAL  They may also react with:  Self-doubt  Shock  Embarrassment  Disbelief 9

A LACK OF UNDERSTANDING There may be an attitude that victims of fraud deserve what they get. The consequences are a result of their own greed and stupidity. 10

Victims may isolate themselves, afraid to tell their family. They may find it hard to identify their emotions. 11

INTELLECTUAL REACTIONS HOW DO I HANDLE THIS SITUATION? 12

THE QUESTIONS…  What do I do now?  Where do I report fraud?  Who can help me?  How could this happen to me? 13

WHAT DO I DO NOW?  REPORT IT! Scammers cannot be caught, charged, prosecuted, and convicted if authorities are not aware of the crime. 14

WHERE DO I REPORT FRAUD? CHECK FRAUD Suspicious checks are reported to the U.S. Secret Service. Report checks received by mail to U.S. Postal Inspection Service. E-SCAMS Report through FBI 15

HELP FOR 419 AND ADVANCE FEE SCHEMES  Contact local & state agencies for help-  File a Police Report  Better Business Bureau  State Office of Consumer Affairs or  State Attorney General 16

ALSO REPORT TO  Your Internet Service Provider  Business or Agency implicated in the fraud  National Agencies  Federal Trade Commission  National Fraud Center  IC3-Internet Crime Complaint Center 17

IDENTITY THEFT Victims also need to be aware that that their personal information might have been compromised. Banks, credit card companies, and credit reporting agencies may need to be contacted. 18

PREVENTION HOW CAN I PREVENT BECOMING A VICTIM OF FRAUD? 19

THROW IT AWAY  Shred those offers that ask you to pay for a prize  Only shipping and handling? Think about it, are you really buying the product?  Free is Free 20

CHECK THE CHECK  If you receive a check from an unknown source:  Remember anyone can buy or print checks  Verify the name and address on the check by using Web resources  Look for the nine-digit bank routing number on the check And finally, remember banks can’t always identify counterfeit check until they pass through the system. 21

CELL CONTROL  Control your cell phone:  Sign up for the Do Not Call Registry  Limit the downloads you install  Give your number only to people you know  Never open unwanted texts—delete them 22

COMPUTER SAFETY CHECK  You have heard it all before, but let’s review. To keep your computer safe:  Use a private password  Install an anti-virus program that scans your computer on a regular basis  Limit pop-ups and downloads  Don’t open from people you don’t know  Don’t open spam  Never click on a Web address inside spam 23

DELETE, DELETE, DELETE The delete button on your computer is your friend. Delete:  Spam  Unsolicited  with unidentified attachments 24

AND…  Use a separate address for social networking, mailing lists, not your personal  Use a firewall  Activate a junk filter on your account And then- Take the Boulder Pledge 25

THE BOULDER PLEDGE "Under no circumstances will I ever purchase anything offered to me as the result of an unsolicited message. Nor will I forward chain letters, petitions, mass mailings, or virus warnings to large numbers of others. This is my contribution to the survival of the online community." 26

TRUST YOURSELF Trust yourself and your instincts. If you feel uneasy, you are probably right –STOP. Resist the pressure to act “now,” if the deal isn’t there tomorrow you don’t want it. 27

GOOGLE IT 28 Many sites catalog advance fee fraud and fake check scams. Enter the information into a search engine and chances are someone has already complained.

SPEND SAFELY When buying online or by telephone:  Use a credit card  Use an escrow service you have checked  Ask for the physical address of the seller 29

SPEND WISELY  Never “help” a stranger with a financial transaction  Know whom you are dealing with. Ask for a name, phone number and specific contact information. Call them back  Never, ever wire money to a stranger 30

SELL CAREFULLY  Don’t send merchandise before receiving valid payment  Use an escrow service  Don’t accept checks, but if you must, make sure the check is real  Never accept a check for more than the agreed purchase price 31

RESOURCES  NCL’s Fraud Center - Collects and posts information about current frauds and scams NCL’s Fraud Center  FTC - Report unsolicited offers including advance fee fraud and lottery scams by forwarding the message to  Secret Service - To file a complaint, look up your local Secret Service field office Secret Service  United States Postal Inspection Service - If you receive fraudulent materials through the postal mail, give it to your local postmaster United States Postal Inspection Service 32

MORE RESOURCE  Internet Crime Complaint Center (IC3) - Accepts online Internet crime complaints  Western Union - Additional information on scams and fraud  FakeChecks.org - Watch scam artists at work 33