SlideShare una empresa de Scribd logo
1 de 27
Confidence Crimes and Scams

   Niles Police Department
   Crime Prevention Unit
        Chief of Police
      Dean H. Strzelecki
Crime Triangle



ABILITY             DESIRE
            CRIME
Con (CON-fidence) Crimes

   Gain people’s confidence
   Work on people’s traits
   Done quickly to avoid time to think
   Done for financial gain
Lessons from the Grandma Scam
 Get you to say the name
 Not how bonds are handled
 Why is this person where they said?
 Do not trust Caller ID
Lessons from Ruse Entry Scam
 Look for other indicators, such as vehicle
 Inquire who you can call to verify
 Never admit you are home alone
 IDs are good to check…If you know what to
  look for
Other takes on Ruse Entry
 Can my child use your restroom
     Why your house?
 I need water for….
     Use the hose outside
     Does the story make sense?
If Ruse Entry Fails
 Home Invasion?
     Remain as calm as possible
     Listen to what Offenders say

 Avoid opportunity to get in
 Start Help responding
Home Repair Scam

 Repairs not needed
 Work not performed or
  performed substandard
 Change price of work
Pigeon Drop




       =
Lottery Scam

 Lottery Scam Types
     Fake Ticket
     Pay taxes up front
Mystery Shopper Scam
 You may receive a letter from a company asking you to be
  a mystery shopper for them. They will send you a “very
  real looking check” in varying amounts—up to $4,995.

 They will ask you to fill out an acceptance form and send it
  back to them with your personal information.

 They want you to call them before you cash the check.


 Once you cash the check, they want you to wire transfer
  some of the money back.
Charity Scam
    Phone
    Door to Door
    Outside of Stores
Electronic Scams

  Telephone Scams
     Fraudulent Area Codes (809, 284, 876)
     Voice Mail Fraud (“push 1”)
     Calling Card Fraud – know your carrier
     Switching long distance companies
     Cellular phone “cloning”
Other Phone Scams
 Missed Jury Duty
 Didn’t pay for ticket –red light cameras


 Do not give information over the phone
        They should have the information
Electronic Scams continued
 Internet Fraud
     Financial
          Same Scams – updated technology
          Know who and how you provide information
          Fraudulent sites
             Pop up ads
             Links to other sites
E-mail Scams
 Types
     Hide Foreign Money
     Win Foreign Lottery


 Clues
     Always grammatical errors
     Of all the e-mails in the world – how did they
      pick yours??
     Story really does not make sense
Electronic Scams -email




                    E-MAIL SCAM
Avoiding Scams
 Take time to think and ask:
     “Why is this person doing this?”
     “What is in it for them?”
     “Does this really make sense?”
 Get a second opinion
 Check Internet
     Snopes.com
 Call the Police
Identity Theft
 Obtained through
     Theft
     Cons and Scams
     Electronic Means

 Review Credit History often
 Protect your information
ATM Fraud
 Protect your card
 Protect your PIN
 Skimmers and cameras
 Review your bank statements
Skimmers
Skimmer installed
Camera
Camera installed
Property Protection
 Purse Theft
    Watch Purse
    Put in vehicle 1st
    Do not carry everything you own with you
    Carry purse to avoid targeting
 Burglary to Vehicles
    Keep items out of view
 Locker Theft
    Only bring what you need
    Use locks and lockers
Summary
 If it is to good to be true it is
 Eliminate Opportunity
 SLOW DOWN and THINK


CALL THE POLICE !!!!
Thank You


If you would like to have a Presentation
     for your community group call us


   847-588-6500

Más contenido relacionado

La actualidad más candente

Computer Crimes - Identity Theft
Computer Crimes - Identity TheftComputer Crimes - Identity Theft
Computer Crimes - Identity TheftJlove Minguez
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation nickski51
 
4 Most Common Financial Crimes To Protect Against
4 Most Common Financial Crimes To Protect Against4 Most Common Financial Crimes To Protect Against
4 Most Common Financial Crimes To Protect AgainstVeriti Consulting LLC
 
5 scams you can avoid
5 scams you can avoid5 scams you can avoid
5 scams you can avoidTracey Krska
 
How to Save Yourself From SIM Swap Fraud | RBL Bank
How to Save Yourself From SIM Swap Fraud | RBL BankHow to Save Yourself From SIM Swap Fraud | RBL Bank
How to Save Yourself From SIM Swap Fraud | RBL Bankrajeevshukhla
 
Be Scam Smart College
Be Scam Smart CollegeBe Scam Smart College
Be Scam Smart CollegeLaura Mael
 
How to Spot Scams - It's a Money Thing
How to Spot Scams - It's a Money ThingHow to Spot Scams - It's a Money Thing
How to Spot Scams - It's a Money ThingTim McAlpine
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftDolf Dunn
 
Fraud in Ecommerce
Fraud in EcommerceFraud in Ecommerce
Fraud in EcommerceMartyn Sukys
 
Understanding identity theft
Understanding identity theftUnderstanding identity theft
Understanding identity theftPage-1-Solutions
 
Trust and safety in the vacation rental industry
Trust and safety in the vacation rental industryTrust and safety in the vacation rental industry
Trust and safety in the vacation rental industryKasturi Nina Mudulodu
 
Scamandspamtechniques
ScamandspamtechniquesScamandspamtechniques
Scamandspamtechniquesscamtools
 
How Organisation Can Fight Scam | CIO Advisor Apac
How Organisation Can Fight Scam | CIO Advisor Apac How Organisation Can Fight Scam | CIO Advisor Apac
How Organisation Can Fight Scam | CIO Advisor Apac JackMathew4
 
Credit card scams
Credit card scamsCredit card scams
Credit card scamsscamtools
 
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber CrimMy #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber CrimAnthony Semadeni
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft TestLisa Sosebee
 

La actualidad más candente (20)

Computer Crimes - Identity Theft
Computer Crimes - Identity TheftComputer Crimes - Identity Theft
Computer Crimes - Identity Theft
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation
 
4 Most Common Financial Crimes To Protect Against
4 Most Common Financial Crimes To Protect Against4 Most Common Financial Crimes To Protect Against
4 Most Common Financial Crimes To Protect Against
 
5 scams you can avoid
5 scams you can avoid5 scams you can avoid
5 scams you can avoid
 
How to Save Yourself From SIM Swap Fraud | RBL Bank
How to Save Yourself From SIM Swap Fraud | RBL BankHow to Save Yourself From SIM Swap Fraud | RBL Bank
How to Save Yourself From SIM Swap Fraud | RBL Bank
 
Frauds and Seniors
Frauds and SeniorsFrauds and Seniors
Frauds and Seniors
 
Be Scam Smart College
Be Scam Smart CollegeBe Scam Smart College
Be Scam Smart College
 
How to Spot Scams - It's a Money Thing
How to Spot Scams - It's a Money ThingHow to Spot Scams - It's a Money Thing
How to Spot Scams - It's a Money Thing
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
 
Fraud in Ecommerce
Fraud in EcommerceFraud in Ecommerce
Fraud in Ecommerce
 
Understanding identity theft
Understanding identity theftUnderstanding identity theft
Understanding identity theft
 
Trust and safety in the vacation rental industry
Trust and safety in the vacation rental industryTrust and safety in the vacation rental industry
Trust and safety in the vacation rental industry
 
Scamandspamtechniques
ScamandspamtechniquesScamandspamtechniques
Scamandspamtechniques
 
How Organisation Can Fight Scam | CIO Advisor Apac
How Organisation Can Fight Scam | CIO Advisor Apac How Organisation Can Fight Scam | CIO Advisor Apac
How Organisation Can Fight Scam | CIO Advisor Apac
 
Credit card scams
Credit card scamsCredit card scams
Credit card scams
 
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber CrimMy #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Phishing
PhishingPhishing
Phishing
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
 

Similar a Senior Citizen Crime Prevention

Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsShred Station
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxssuserb73103
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft PresentationLisa Sosebee
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 
Internet Scams, Identity Theft And
Internet Scams, Identity Theft AndInternet Scams, Identity Theft And
Internet Scams, Identity Theft AndCorey Quinn
 
Identity Theft Overview
Identity Theft OverviewIdentity Theft Overview
Identity Theft Overviewgaby350
 
Id Theft
Id TheftId Theft
Id Theftmojo_5
 
Elder Care: Fraud Protection
Elder Care: Fraud ProtectionElder Care: Fraud Protection
Elder Care: Fraud Protectioncaretocontinue
 
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docx
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docxTorts, Crimes and BusinessChapter 7 & 8Intent vs.docx
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docxedwardmarivel
 
cian A lottery scam
cian A lottery scamcian A lottery scam
cian A lottery scampussyclaat
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudMatt Smith
 
Scam and Fraud Alerts
Scam and Fraud AlertsScam and Fraud Alerts
Scam and Fraud Alertsparkminho2
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft PreventionOremDPS
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 

Similar a Senior Citizen Crime Prevention (20)

Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptx
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Identity Theft 101
Identity Theft 101Identity Theft 101
Identity Theft 101
 
Identity Theft Overview Webinar
Identity Theft Overview WebinarIdentity Theft Overview Webinar
Identity Theft Overview Webinar
 
Internet Scams, Identity Theft And
Internet Scams, Identity Theft AndInternet Scams, Identity Theft And
Internet Scams, Identity Theft And
 
Identity Theft Overview
Identity Theft OverviewIdentity Theft Overview
Identity Theft Overview
 
Id Theft
Id TheftId Theft
Id Theft
 
Elder Care: Fraud Protection
Elder Care: Fraud ProtectionElder Care: Fraud Protection
Elder Care: Fraud Protection
 
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docx
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docxTorts, Crimes and BusinessChapter 7 & 8Intent vs.docx
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docx
 
cian A lottery scam
cian A lottery scamcian A lottery scam
cian A lottery scam
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
 
Scam and Fraud Alerts
Scam and Fraud AlertsScam and Fraud Alerts
Scam and Fraud Alerts
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
 
Operation of scam
Operation of scamOperation of scam
Operation of scam
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 

Último (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

Senior Citizen Crime Prevention

  • 1. Confidence Crimes and Scams Niles Police Department Crime Prevention Unit Chief of Police Dean H. Strzelecki
  • 2. Crime Triangle ABILITY DESIRE CRIME
  • 3. Con (CON-fidence) Crimes  Gain people’s confidence  Work on people’s traits  Done quickly to avoid time to think  Done for financial gain
  • 4. Lessons from the Grandma Scam  Get you to say the name  Not how bonds are handled  Why is this person where they said?  Do not trust Caller ID
  • 5. Lessons from Ruse Entry Scam  Look for other indicators, such as vehicle  Inquire who you can call to verify  Never admit you are home alone  IDs are good to check…If you know what to look for
  • 6. Other takes on Ruse Entry  Can my child use your restroom  Why your house?  I need water for….  Use the hose outside  Does the story make sense?
  • 7. If Ruse Entry Fails  Home Invasion?  Remain as calm as possible  Listen to what Offenders say  Avoid opportunity to get in  Start Help responding
  • 8. Home Repair Scam  Repairs not needed  Work not performed or performed substandard  Change price of work
  • 10. Lottery Scam  Lottery Scam Types  Fake Ticket  Pay taxes up front
  • 11. Mystery Shopper Scam  You may receive a letter from a company asking you to be a mystery shopper for them. They will send you a “very real looking check” in varying amounts—up to $4,995.  They will ask you to fill out an acceptance form and send it back to them with your personal information.  They want you to call them before you cash the check.  Once you cash the check, they want you to wire transfer some of the money back.
  • 12. Charity Scam  Phone  Door to Door  Outside of Stores
  • 13. Electronic Scams  Telephone Scams  Fraudulent Area Codes (809, 284, 876)  Voice Mail Fraud (“push 1”)  Calling Card Fraud – know your carrier  Switching long distance companies  Cellular phone “cloning”
  • 14. Other Phone Scams  Missed Jury Duty  Didn’t pay for ticket –red light cameras  Do not give information over the phone  They should have the information
  • 15. Electronic Scams continued  Internet Fraud  Financial  Same Scams – updated technology  Know who and how you provide information  Fraudulent sites  Pop up ads  Links to other sites
  • 16. E-mail Scams  Types  Hide Foreign Money  Win Foreign Lottery  Clues  Always grammatical errors  Of all the e-mails in the world – how did they pick yours??  Story really does not make sense
  • 17. Electronic Scams -email E-MAIL SCAM
  • 18. Avoiding Scams  Take time to think and ask:  “Why is this person doing this?”  “What is in it for them?”  “Does this really make sense?”  Get a second opinion  Check Internet  Snopes.com  Call the Police
  • 19. Identity Theft  Obtained through  Theft  Cons and Scams  Electronic Means  Review Credit History often  Protect your information
  • 20. ATM Fraud  Protect your card  Protect your PIN  Skimmers and cameras  Review your bank statements
  • 25. Property Protection  Purse Theft  Watch Purse  Put in vehicle 1st  Do not carry everything you own with you  Carry purse to avoid targeting  Burglary to Vehicles  Keep items out of view  Locker Theft  Only bring what you need  Use locks and lockers
  • 26. Summary  If it is to good to be true it is  Eliminate Opportunity  SLOW DOWN and THINK CALL THE POLICE !!!!
  • 27. Thank You If you would like to have a Presentation for your community group call us 847-588-6500