SlideShare a Scribd company logo
1 of 18
OVERVIEW
• Commonly seen fraud/scams
• Case studies relevant to you
• How to protect yourself
• When and how to report
• Local, State, Federal
COMMON SCHEMES
• Card skimming
• Late 2016; Local Banking Institutions,
• Monroe, Matthews, West Jefferson, Carmel Commons, Valdese,
Wilkesboro
• Located on ATM
• I-77, I-85
• Consider our proximity to main corridors
• March-November 2015; Skimming “crews”
• Installed on pumps with factory standard receipt paper doors
• Use of universal keys
• Ease of access to card readers
COMMON SCHEMES
• Card skimming
• March-November 2015; Skimming “crews”
• 46 skimmers
• EMV chip readers
• April 2016
• Long-time practice; however now engaging in practice outside of
Kentucky
HOW TO PROTECT YOURSELF
• Card Skimming
• Local banking
• Location of ATM
• Business hours
• Use of Credit vs Debit
• Fraud protection
• Gas Pumps
• Location of receipt and scanner door
• EMV chip reader
• Liability Shift - October 2017
COMMON SCHEMES
• Phone Spoofing
• March 2016; Spoofed FBI telephone numbers on caller ID
• What is spoofing?
• Charlotte Field Office spoofed
• Resident agency office
• Direct extensions
• Scammers utilize
• Fear, intimidation, threats
• Similar in nature to “Jury Duty” or “Warrant” scam
HOW TO PROTECT YOURSELF
• Phone Spoofing
• FBI, or LEO agencies do not contact private citizens requesting money
• Personal information when you did not initiate contact
• Requesting payment via third party
• MoneyGram, GreenDot, Western Union
• Citizen’s lack of knowledge
COMMON SCHEMES
• Virtual Kidnapping
• Does not include physical detainment
• Deception, intimidation, fear
• Generally involves loved one, or relative
• March 2016; Tennessee
• Mother and daughter victims, simultaneously
• Unknown male demanding damages
• Gives ultimatum
• Both mother and daughter wire money to PR bank account
HOW TO PROTECT YOURSELF
• Virtual Kidnapping
• Victim avoidance
• Keeping you on the line
• Victim’s phone number?
• Prevented from contacting others
• Multiple calls
• Area code?
• Ransom via wire transfer vs in person
• Can you contact the “victim” by other means while on call?
COMMON SCHEMES
• Ransomware
• Form of Malware commonly enters via email
• Employ trickery or attachments
• Fastest growing malware threat
• Targeted for purpose of extortion
• Malicious software, blocks access to computer systems or files
until ransom is paid
• Commonly seen prompts online
• “Your computer was used to visit websites with illegal content. To
unlock your computer, you must pay a $100 fine.”
• “You only have 96 hours to submit the payment. If you do not
send money within provided time, all your files will be
permanently encrypted and no one will be able to recover them.”
COMMON SCHEMES
• Ransomware in Cary
• Microsoft Scam
• Utilizes Event viewer
• Remote access to computer
HOW TO PROTECT YOURSELF
• Ransomware
• Spam filters
• Anti-virus & anti-malware programs
• Back-up data and restoring
• Change all online account & network passwords
• Isolate
• Microsoft, similar companies will never call
• Initially will never know details of your computer
WHEN AND HOW TO REPORT
• Local/State
• Gather information
• Credit Card Information
• Bank name, Credit Card Type: (Visa/MasterCard) 16 digit account
number on the card.
• Checks:
• Bank name, Account number, Routing number. (Copy of the check if
possible)
• Billing Statement Outlining the Unauthorized Charges/Transactions.
• Authorization to Release Information form
DOCUMENTATION NEEDED
• Local/State
• When in doubt, hang up
• Call originating organization directly
• Has your information been compromised?
• Did it occur in Cary?
• Within driving distance
• Internet
WHEN AND HOW TO REPORT
• Federal
• IC3 – Internet Crime Complaint Center
• www.ic3.gov
• FTC – Federal Trade Commission
• www.ftccomplaintassistant.gov
• US Secret Service – Electronic Crimes Task Force
• www.secretservice.gov/investigation/#field
• Scam Alerts
• www.consumer.ftc.gov/scam-alerts
SUMMARY
• Commonly seen fraud/scams
• Case studies relevant to you
• How to protect yourself
• When and how to report
• Local, State, Federal
Common Fraud Schemes - Presentation
Common Fraud Schemes - Presentation

More Related Content

What's hot

Data theft
Data theftData theft
Data theftLaura
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayMichele Chubirka
 
7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theftnewsusa01
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftElizabeth Dimit
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftExperian_US
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Riskmilfamln
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS- Mark - Fullbright
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 
Preventing Human Trafficking Indicators
Preventing Human Trafficking IndicatorsPreventing Human Trafficking Indicators
Preventing Human Trafficking IndicatorsAdina Dediu, CFE, CFCS
 

What's hot (19)

Staying Secure Electronically
Staying Secure ElectronicallyStaying Secure Electronically
Staying Secure Electronically
 
Data theft
Data theftData theft
Data theft
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Not "If" but "When"
Not "If" but "When"Not "If" but "When"
Not "If" but "When"
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
What is fraud
What is fraudWhat is fraud
What is fraud
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Preventing Human Trafficking Indicators
Preventing Human Trafficking IndicatorsPreventing Human Trafficking Indicators
Preventing Human Trafficking Indicators
 
Identity Theft and You
Identity Theft and YouIdentity Theft and You
Identity Theft and You
 

Similar to Common Fraud Schemes - Presentation

Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudMatt Smith
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Preventionfmi_igf
 
A delightful way to teach kids about computers
A delightful way to teach kids about computersA delightful way to teach kids about computers
A delightful way to teach kids about computers806670
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal PrivacyDoubleXDS
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYDoubleXDS
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)Jermaine Smith
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Jermaine Smith
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfDigital EYE Media
 
Cyber security (2) (2)
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)ameyjakate
 
Identity theft and identity fraud
Identity theft and identity fraudIdentity theft and identity fraud
Identity theft and identity fraudmcadman
 
Identity Theft Lake Placid 2012
Identity Theft Lake Placid 2012Identity Theft Lake Placid 2012
Identity Theft Lake Placid 2012Mark Kotzin
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technicalStephen Cobb
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitysamina khan
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
18 computers and the law
18   computers and the law18   computers and the law
18 computers and the lawKhan Yousafzai
 

Similar to Common Fraud Schemes - Presentation (20)

Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Prevention
 
A delightful way to teach kids about computers
A delightful way to teach kids about computersA delightful way to teach kids about computers
A delightful way to teach kids about computers
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Public private partnership Identity Theft
Public private partnership Identity TheftPublic private partnership Identity Theft
Public private partnership Identity Theft
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect Yourself
 
Cyber security (2) (2)
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Scam-Alert-Mod.pptx
Scam-Alert-Mod.pptxScam-Alert-Mod.pptx
Scam-Alert-Mod.pptx
 
Identity theft and identity fraud
Identity theft and identity fraudIdentity theft and identity fraud
Identity theft and identity fraud
 
Identity Theft Lake Placid 2012
Identity Theft Lake Placid 2012Identity Theft Lake Placid 2012
Identity Theft Lake Placid 2012
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Protect Your Identity
Protect Your IdentityProtect Your Identity
Protect Your Identity
 
18 computers and the law
18   computers and the law18   computers and the law
18 computers and the law
 

Recently uploaded

如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxPKrishna18
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书FS LS
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书Fir L
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书Fir sss
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionNilamPadekar1
 

Recently uploaded (20)

如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptx
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to Service
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 sedition
 

Common Fraud Schemes - Presentation

  • 1.
  • 2. OVERVIEW • Commonly seen fraud/scams • Case studies relevant to you • How to protect yourself • When and how to report • Local, State, Federal
  • 3. COMMON SCHEMES • Card skimming • Late 2016; Local Banking Institutions, • Monroe, Matthews, West Jefferson, Carmel Commons, Valdese, Wilkesboro • Located on ATM • I-77, I-85 • Consider our proximity to main corridors • March-November 2015; Skimming “crews” • Installed on pumps with factory standard receipt paper doors • Use of universal keys • Ease of access to card readers
  • 4. COMMON SCHEMES • Card skimming • March-November 2015; Skimming “crews” • 46 skimmers • EMV chip readers • April 2016 • Long-time practice; however now engaging in practice outside of Kentucky
  • 5. HOW TO PROTECT YOURSELF • Card Skimming • Local banking • Location of ATM • Business hours • Use of Credit vs Debit • Fraud protection • Gas Pumps • Location of receipt and scanner door • EMV chip reader • Liability Shift - October 2017
  • 6. COMMON SCHEMES • Phone Spoofing • March 2016; Spoofed FBI telephone numbers on caller ID • What is spoofing? • Charlotte Field Office spoofed • Resident agency office • Direct extensions • Scammers utilize • Fear, intimidation, threats • Similar in nature to “Jury Duty” or “Warrant” scam
  • 7. HOW TO PROTECT YOURSELF • Phone Spoofing • FBI, or LEO agencies do not contact private citizens requesting money • Personal information when you did not initiate contact • Requesting payment via third party • MoneyGram, GreenDot, Western Union • Citizen’s lack of knowledge
  • 8. COMMON SCHEMES • Virtual Kidnapping • Does not include physical detainment • Deception, intimidation, fear • Generally involves loved one, or relative • March 2016; Tennessee • Mother and daughter victims, simultaneously • Unknown male demanding damages • Gives ultimatum • Both mother and daughter wire money to PR bank account
  • 9. HOW TO PROTECT YOURSELF • Virtual Kidnapping • Victim avoidance • Keeping you on the line • Victim’s phone number? • Prevented from contacting others • Multiple calls • Area code? • Ransom via wire transfer vs in person • Can you contact the “victim” by other means while on call?
  • 10. COMMON SCHEMES • Ransomware • Form of Malware commonly enters via email • Employ trickery or attachments • Fastest growing malware threat • Targeted for purpose of extortion • Malicious software, blocks access to computer systems or files until ransom is paid • Commonly seen prompts online • “Your computer was used to visit websites with illegal content. To unlock your computer, you must pay a $100 fine.” • “You only have 96 hours to submit the payment. If you do not send money within provided time, all your files will be permanently encrypted and no one will be able to recover them.”
  • 11. COMMON SCHEMES • Ransomware in Cary • Microsoft Scam • Utilizes Event viewer • Remote access to computer
  • 12. HOW TO PROTECT YOURSELF • Ransomware • Spam filters • Anti-virus & anti-malware programs • Back-up data and restoring • Change all online account & network passwords • Isolate • Microsoft, similar companies will never call • Initially will never know details of your computer
  • 13. WHEN AND HOW TO REPORT • Local/State • Gather information • Credit Card Information • Bank name, Credit Card Type: (Visa/MasterCard) 16 digit account number on the card. • Checks: • Bank name, Account number, Routing number. (Copy of the check if possible) • Billing Statement Outlining the Unauthorized Charges/Transactions. • Authorization to Release Information form
  • 14. DOCUMENTATION NEEDED • Local/State • When in doubt, hang up • Call originating organization directly • Has your information been compromised? • Did it occur in Cary? • Within driving distance • Internet
  • 15. WHEN AND HOW TO REPORT • Federal • IC3 – Internet Crime Complaint Center • www.ic3.gov • FTC – Federal Trade Commission • www.ftccomplaintassistant.gov • US Secret Service – Electronic Crimes Task Force • www.secretservice.gov/investigation/#field • Scam Alerts • www.consumer.ftc.gov/scam-alerts
  • 16. SUMMARY • Commonly seen fraud/scams • Case studies relevant to you • How to protect yourself • When and how to report • Local, State, Federal