SlideShare a Scribd company logo
1 of 14
To Catch a Tax Thief
Tax Fraud Season


      Taxpayers can encounter scams at any point in
      the year, but many schemes peak during filing
      season as people prepare their returns.




February 27, 2012   © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   2
IRS Warning


      “Taxpayers should be careful and avoid falling into a
      trap. Scam artists will tempt people
               • in person
               • online, and
               • by email
      with misleading promises about lost refunds and free
      money. Don’t be fooled.”
                       — IRS Commissioner Doug Shulman




February 27, 2012     © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   3
Protect Yourself


      Learn about the most common schemes and how
      to spot them so you don’t become a victim. Here
      are four scams and telltale signs you’ve been
      targeted by an identity thief.




February 27, 2012    © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   4
1. Tax Return Fraud

      What is it?
      Thieves use a legitimate taxpayer’s identity and
      personal information to file a tax return and claim a
      fraudulent refund.

      In 2011, the IRS protected more than $1.4 billion of
      taxpayer funds from getting into the wrong hands due
      to identity theft.




February 27, 2012     © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   5
Tip-off you’ve been targeted:

      If you receive an IRS notice saying that more than one tax
      return was filed in your name or that you received wages
      from an unknown employer.




February 27, 2012     © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   6
2. Phishing


      Scammers send fake emails that appear to come
      from legitimate sources and trick taxpayers into
      providing personal and financial information.

      Emails sometimes send users to fake websites
      as part of the scheme.

      Scammers often bait victims with
      promises of a tax refund or requests
      for updated information (such as a
      new W-2 form).


February 27, 2012     © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   7
Tip-off you’ve been targeted:

      The IRS does not initiate contact with taxpayers by email
      to request personal or financial information.

                    Unsolicited email from the IRS or a closely linked
                    organization, such as the Electronic Federal Tax
                    Payment System, is likely to be fake.




February 27, 2012         © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   8
3. Return Preparer Fraud


      Most people who prepare returns provide
      honest service, but there are some who
      prey on unsuspecting consumers.

      Such individuals might skim off a
      person’s refunds or charge extra,
      unnecessary fees.




February 27, 2012     © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   9
Tip-off you’ve been targeted: If the return preparer
      • Does not sign your return or place a Preparer Tax
        Identification Number on it.

      • Does not give you a copy of your tax return.

      • Promises larger than normal tax refunds, or charges a
        percentage of the refund amount as a preparation fee.

      • Adds forms to the return that you have never filed
        before.

      • Encourages you to put false information on your return.

February 27, 2012     © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   10
4. “Free Money”


      Scammers lure people with advertisements for free
      money from the IRS, suggesting taxpayers can file returns
      with little or no documentation.

      They go on to charge good money for
      bad advice; by the time claims are
      rejected, the scammers are gone.

      Scammers also lure victims with
      promises of nonexistent Social
      Security refunds or rebates.


February 27, 2012     © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   11
Fake fliers of this nature have been appearing in community
       churches, and the schemes often spread further by word of
       mouth.

      Low-income individuals and the
      elderly are particularly vulnerable.

      Be vigilant, and use common sense.
      If a promise seems too good to be
      true, it probably is.



February 27, 2012     © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   12
Remember: The best offense is a good defense.

       Learn how to protect your personal information.
       Learn how to recognize scams.
       If you encounter any suspicious activity, report it to the
       proper authorities.




February 27, 2012      © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   13
If you suspect your identity has been stolen, call your
      insurer or bank, which might provide LifeStages™ Identity
      Management Services from Identity Theft 911.

      Or contact us directly. One of our fraud investigators will
      provide practical support until your credit record is
      restored, and help you pursue criminal and civil legal
      action against the identity thief.




February 27, 2012      © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   14

More Related Content

Viewers also liked

AK - CERT - DCM DIPLOMA 15 FEB 1992
AK - CERT - DCM DIPLOMA 15 FEB 1992AK - CERT - DCM DIPLOMA 15 FEB 1992
AK - CERT - DCM DIPLOMA 15 FEB 1992
Anthony AK
 
Tecnico+en+sistemas+v1
Tecnico+en+sistemas+v1Tecnico+en+sistemas+v1
Tecnico+en+sistemas+v1
LauraManco
 
Smartare linjenät med gis
Smartare linjenät med gisSmartare linjenät med gis
Smartare linjenät med gis
schwitzen
 
The Movement Project 55+
The Movement Project 55+The Movement Project 55+
The Movement Project 55+
kylelabrache
 
Ok. rude hand gestures of the world
Ok. rude hand gestures of the worldOk. rude hand gestures of the world
Ok. rude hand gestures of the world
Gede Saputra
 
Qb's.duncan.calendar 2012 falcon football
Qb's.duncan.calendar 2012 falcon footballQb's.duncan.calendar 2012 falcon football
Qb's.duncan.calendar 2012 falcon football
Groves_mrduncan
 

Viewers also liked (16)

BLOG
BLOG BLOG
BLOG
 
AK - CERT - DCM DIPLOMA 15 FEB 1992
AK - CERT - DCM DIPLOMA 15 FEB 1992AK - CERT - DCM DIPLOMA 15 FEB 1992
AK - CERT - DCM DIPLOMA 15 FEB 1992
 
Tecnico+en+sistemas+v1
Tecnico+en+sistemas+v1Tecnico+en+sistemas+v1
Tecnico+en+sistemas+v1
 
Voting Trends in Lowell, MA
Voting Trends in Lowell, MAVoting Trends in Lowell, MA
Voting Trends in Lowell, MA
 
Smartare linjenät med gis
Smartare linjenät med gisSmartare linjenät med gis
Smartare linjenät med gis
 
Food Combining Diet
Food Combining DietFood Combining Diet
Food Combining Diet
 
situacion de aprendizaje
 situacion de aprendizaje situacion de aprendizaje
situacion de aprendizaje
 
Poppy
PoppyPoppy
Poppy
 
21st century skills
21st century skills21st century skills
21st century skills
 
Qué son los neurotransmisores
Qué son los neurotransmisoresQué son los neurotransmisores
Qué son los neurotransmisores
 
The Movement Project 55+
The Movement Project 55+The Movement Project 55+
The Movement Project 55+
 
P-Seminar_Ludwig Isert
P-Seminar_Ludwig IsertP-Seminar_Ludwig Isert
P-Seminar_Ludwig Isert
 
Perdoar Não é Preciso
Perdoar Não é PrecisoPerdoar Não é Preciso
Perdoar Não é Preciso
 
Ok. rude hand gestures of the world
Ok. rude hand gestures of the worldOk. rude hand gestures of the world
Ok. rude hand gestures of the world
 
Qb's.duncan.calendar 2012 falcon football
Qb's.duncan.calendar 2012 falcon footballQb's.duncan.calendar 2012 falcon football
Qb's.duncan.calendar 2012 falcon football
 
UKTI : Matter Of Form - Think local, Act Global - Anant Sharma (w:notes)
UKTI : Matter Of Form - Think local, Act Global - Anant Sharma (w:notes)UKTI : Matter Of Form - Think local, Act Global - Anant Sharma (w:notes)
UKTI : Matter Of Form - Think local, Act Global - Anant Sharma (w:notes)
 

More from IDT911

5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity Theft
IDT911
 
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012
IDT911
 
Anatomy of a Phishing Email
Anatomy of a Phishing EmailAnatomy of a Phishing Email
Anatomy of a Phishing Email
IDT911
 
LinkedIn Breach: How to Make Your Passwords Stronger
LinkedIn Breach: How to Make Your Passwords StrongerLinkedIn Breach: How to Make Your Passwords Stronger
LinkedIn Breach: How to Make Your Passwords Stronger
IDT911
 
Turn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn OneTurn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn One
IDT911
 
Anatomy of a Craigslist Scam
Anatomy of a Craigslist ScamAnatomy of a Craigslist Scam
Anatomy of a Craigslist Scam
IDT911
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
IDT911
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
IDT911
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
IDT911
 
When Data Loss Is An Inside Job
When Data Loss Is An Inside JobWhen Data Loss Is An Inside Job
When Data Loss Is An Inside Job
IDT911
 
5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity Theft
IDT911
 
Top 10 Security Trends of 2012
Top 10 Security Trends of 2012Top 10 Security Trends of 2012
Top 10 Security Trends of 2012
IDT911
 

More from IDT911 (12)

5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity Theft
 
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012
 
Anatomy of a Phishing Email
Anatomy of a Phishing EmailAnatomy of a Phishing Email
Anatomy of a Phishing Email
 
LinkedIn Breach: How to Make Your Passwords Stronger
LinkedIn Breach: How to Make Your Passwords StrongerLinkedIn Breach: How to Make Your Passwords Stronger
LinkedIn Breach: How to Make Your Passwords Stronger
 
Turn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn OneTurn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn One
 
Anatomy of a Craigslist Scam
Anatomy of a Craigslist ScamAnatomy of a Craigslist Scam
Anatomy of a Craigslist Scam
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
 
When Data Loss Is An Inside Job
When Data Loss Is An Inside JobWhen Data Loss Is An Inside Job
When Data Loss Is An Inside Job
 
5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity Theft
 
Top 10 Security Trends of 2012
Top 10 Security Trends of 2012Top 10 Security Trends of 2012
Top 10 Security Trends of 2012
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

To Catch a Tax Thief

  • 1. To Catch a Tax Thief
  • 2. Tax Fraud Season Taxpayers can encounter scams at any point in the year, but many schemes peak during filing season as people prepare their returns. February 27, 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 2
  • 3. IRS Warning “Taxpayers should be careful and avoid falling into a trap. Scam artists will tempt people • in person • online, and • by email with misleading promises about lost refunds and free money. Don’t be fooled.” — IRS Commissioner Doug Shulman February 27, 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 3
  • 4. Protect Yourself Learn about the most common schemes and how to spot them so you don’t become a victim. Here are four scams and telltale signs you’ve been targeted by an identity thief. February 27, 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 4
  • 5. 1. Tax Return Fraud What is it? Thieves use a legitimate taxpayer’s identity and personal information to file a tax return and claim a fraudulent refund. In 2011, the IRS protected more than $1.4 billion of taxpayer funds from getting into the wrong hands due to identity theft. February 27, 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 5
  • 6. Tip-off you’ve been targeted: If you receive an IRS notice saying that more than one tax return was filed in your name or that you received wages from an unknown employer. February 27, 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 6
  • 7. 2. Phishing Scammers send fake emails that appear to come from legitimate sources and trick taxpayers into providing personal and financial information. Emails sometimes send users to fake websites as part of the scheme. Scammers often bait victims with promises of a tax refund or requests for updated information (such as a new W-2 form). February 27, 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 7
  • 8. Tip-off you’ve been targeted: The IRS does not initiate contact with taxpayers by email to request personal or financial information. Unsolicited email from the IRS or a closely linked organization, such as the Electronic Federal Tax Payment System, is likely to be fake. February 27, 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 8
  • 9. 3. Return Preparer Fraud Most people who prepare returns provide honest service, but there are some who prey on unsuspecting consumers. Such individuals might skim off a person’s refunds or charge extra, unnecessary fees. February 27, 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 9
  • 10. Tip-off you’ve been targeted: If the return preparer • Does not sign your return or place a Preparer Tax Identification Number on it. • Does not give you a copy of your tax return. • Promises larger than normal tax refunds, or charges a percentage of the refund amount as a preparation fee. • Adds forms to the return that you have never filed before. • Encourages you to put false information on your return. February 27, 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 10
  • 11. 4. “Free Money” Scammers lure people with advertisements for free money from the IRS, suggesting taxpayers can file returns with little or no documentation. They go on to charge good money for bad advice; by the time claims are rejected, the scammers are gone. Scammers also lure victims with promises of nonexistent Social Security refunds or rebates. February 27, 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 11
  • 12. Fake fliers of this nature have been appearing in community churches, and the schemes often spread further by word of mouth. Low-income individuals and the elderly are particularly vulnerable. Be vigilant, and use common sense. If a promise seems too good to be true, it probably is. February 27, 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 12
  • 13. Remember: The best offense is a good defense. Learn how to protect your personal information. Learn how to recognize scams. If you encounter any suspicious activity, report it to the proper authorities. February 27, 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 13
  • 14. If you suspect your identity has been stolen, call your insurer or bank, which might provide LifeStages™ Identity Management Services from Identity Theft 911. Or contact us directly. One of our fraud investigators will provide practical support until your credit record is restored, and help you pursue criminal and civil legal action against the identity thief. February 27, 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 14