A recent presentation I conducted on common Fraud Schemes, at the municipal level. Some great content within, however keep in mind these are just the overarching themes.
Fraud Identity Theft Skimming Police Law Enforcement
2. OVERVIEW
• Commonly seen fraud/scams
• Case studies relevant to you
• How to protect yourself
• When and how to report
• Local, State, Federal
3. COMMON SCHEMES
• Card skimming
• Late 2016; Local Banking Institutions,
• Monroe, Matthews, West Jefferson, Carmel Commons, Valdese,
Wilkesboro
• Located on ATM
• I-77, I-85
• Consider our proximity to main corridors
• March-November 2015; Skimming “crews”
• Installed on pumps with factory standard receipt paper doors
• Use of universal keys
• Ease of access to card readers
4. COMMON SCHEMES
• Card skimming
• March-November 2015; Skimming “crews”
• 46 skimmers
• EMV chip readers
• April 2016
• Long-time practice; however now engaging in practice outside of
Kentucky
5. HOW TO PROTECT YOURSELF
• Card Skimming
• Local banking
• Location of ATM
• Business hours
• Use of Credit vs Debit
• Fraud protection
• Gas Pumps
• Location of receipt and scanner door
• EMV chip reader
• Liability Shift - October 2017
6. COMMON SCHEMES
• Phone Spoofing
• March 2016; Spoofed FBI telephone numbers on caller ID
• What is spoofing?
• Charlotte Field Office spoofed
• Resident agency office
• Direct extensions
• Scammers utilize
• Fear, intimidation, threats
• Similar in nature to “Jury Duty” or “Warrant” scam
7. HOW TO PROTECT YOURSELF
• Phone Spoofing
• FBI, or LEO agencies do not contact private citizens requesting money
• Personal information when you did not initiate contact
• Requesting payment via third party
• MoneyGram, GreenDot, Western Union
• Citizen’s lack of knowledge
8. COMMON SCHEMES
• Virtual Kidnapping
• Does not include physical detainment
• Deception, intimidation, fear
• Generally involves loved one, or relative
• March 2016; Tennessee
• Mother and daughter victims, simultaneously
• Unknown male demanding damages
• Gives ultimatum
• Both mother and daughter wire money to PR bank account
9. HOW TO PROTECT YOURSELF
• Virtual Kidnapping
• Victim avoidance
• Keeping you on the line
• Victim’s phone number?
• Prevented from contacting others
• Multiple calls
• Area code?
• Ransom via wire transfer vs in person
• Can you contact the “victim” by other means while on call?
10. COMMON SCHEMES
• Ransomware
• Form of Malware commonly enters via email
• Employ trickery or attachments
• Fastest growing malware threat
• Targeted for purpose of extortion
• Malicious software, blocks access to computer systems or files
until ransom is paid
• Commonly seen prompts online
• “Your computer was used to visit websites with illegal content. To
unlock your computer, you must pay a $100 fine.”
• “You only have 96 hours to submit the payment. If you do not
send money within provided time, all your files will be
permanently encrypted and no one will be able to recover them.”
12. HOW TO PROTECT YOURSELF
• Ransomware
• Spam filters
• Anti-virus & anti-malware programs
• Back-up data and restoring
• Change all online account & network passwords
• Isolate
• Microsoft, similar companies will never call
• Initially will never know details of your computer
13. WHEN AND HOW TO REPORT
• Local/State
• Gather information
• Credit Card Information
• Bank name, Credit Card Type: (Visa/MasterCard) 16 digit account
number on the card.
• Checks:
• Bank name, Account number, Routing number. (Copy of the check if
possible)
• Billing Statement Outlining the Unauthorized Charges/Transactions.
• Authorization to Release Information form
14. DOCUMENTATION NEEDED
• Local/State
• When in doubt, hang up
• Call originating organization directly
• Has your information been compromised?
• Did it occur in Cary?
• Within driving distance
• Internet
15. WHEN AND HOW TO REPORT
• Federal
• IC3 – Internet Crime Complaint Center
• www.ic3.gov
• FTC – Federal Trade Commission
• www.ftccomplaintassistant.gov
• US Secret Service – Electronic Crimes Task Force
• www.secretservice.gov/investigation/#field
• Scam Alerts
• www.consumer.ftc.gov/scam-alerts
16. SUMMARY
• Commonly seen fraud/scams
• Case studies relevant to you
• How to protect yourself
• When and how to report
• Local, State, Federal