Advert.

Do NOT tell your scammer he is posted here, or report their accounts as it puts others at risk!

Thieves count on some habits to enable their fraud

Did you read about scams in the papers, or see it on TV? Let us know.

Thieves count on some habits to enable their fraud

Unread postby SlapHappy » Fri Apr 12, 2019 5:55 pm

https://www.eagletimes.com/opinion/thie ... e7b07.html

Thieves count on some habits and actions to enable their fraud
By ELLIOTT GREENBLOTT 10 hrs ago 0

With many scams today involving phone calls or the internet, we often forget to consider how our own everyday behavior opens us up to becoming victims of fraud. Today’s self-defense tips come from recent news headlines from around the country reflecting how criminals often rely on our own predictable behaviors and reactions.

The first example involves the theft of a handbag containing the usual items — wallet, credit card, drivers license, cell phone. Several minutes after discovering the loss, the victim called her husband, only to find out that he had just responded to her text message requesting the bank pin number. On checking with the bank, they discovered that the criminal used her bank debit card and PIN to make several withdrawals from their account. While we will never be certain of the way the theft occurred, law enforcement believes that the criminal used the “contact” list on the cell phone to text the woman’s husband for the ATM pin. Can this prevented? Hard to say, but there are some basic safety steps that can be applied:

• Avoid use of names or words that provide immediate identity such as husband, wife, son daughter on a cell phone contact list. You already know the relationship so don’t provide confirmation for others. (This same tip applies to all digital contact lists or address books.)

• When a text message requests any sensitive or personal information, verify or confirm the request before responding. (While this step may delay a response, it will ensure the security of the information.)

• When texted by friends or family to meet somewhere, confirm that the message came from them before going there.

The second example is commonly called the Grocery Cart Scam. The scammer steals a wallet from the purse left unattended in the child seat of a shopping cart. At some point later in the day, the victim receives a call from “store security” reporting that the purse was recovered, minus any cash that may have been in it. She is asked to return to the store immediately in order to retrieve her wallet and file a report. Of course, when arriving at the store, she discovers that there was no call from security and on returning home discovers that her home has been burglarized. The criminal lured her away with the fake phone call and used the opportunity to ransack the home. In this situation, the victim’s best action would have been to call the store to verify that her wallet was recovered. As with the first example, personal habits and actions by the victim worked to the advantage of the scammer.

The final example of how we assist fraud criminals through personal behavior is seen in the ways we dispose of personal information. We amass a large quantity of paper data; credit card, bank, brokerage statements as well as medical bills and benefits reports regularly swamp us. While best practice recommends review of these items for accuracy, little is said concerning what to do with the information after it has been verified. For some, the paperwork is simply saved, in many cases, for years, while for many others, the documents are dumped into paper recycling bins or discarded in the trash. While the usefulness for us may have passed, it has only begun for identity thieves and criminals. Discarded documents contain account numbers, purchasing behaviors, and other personally identifiable information, sometimes including Social Security numbers — the essentials for committing identity theft. Best practice in dealing with these items is to shred them prior to discarding. While a cross-cut or micro-shredder may cost more that you are willing to pay, look to other alternatives. A very pricey micro-shredder shared by neighbors or family members provides an inexpensive approach to security. Also, check with your bank or credit union and ask if they can allow you to “piggy back” on the shredding service they utilize on a regular basis. Additionally, some office supply stores and copy centers provide commercial shredding services. Don’t allow your approach to discarding information be the vehicle for enabling your losses.



Elliott Greenblott is a retired educator serving as the Vermont AARP Fraud Watch Network Coordinator and can be contacted at egreenblott@aarp.org.
If anyone asks you for money on the Internet they are always a scammer, 100% of the time.
Blackmail Scammed? Go here: https://www.scamsurvivors.com/blackmail/#/
FAQ viewtopic.php?f=3&t=19
Victim of a scam? Go here: https://scamsurvivors.com/forum/viewtop ... =3&t=26504
User avatar
SlapHappy
Retired admin/co creator
 
Posts: 44968
Joined: Tue Apr 17, 2012 5:18 am
Location: Just a face in a magazine, watching you post your scammer's details.

Return to Media reports.

Who is online

Users browsing this forum: No registered users and 24 guests