Month: August 2019

Con Artists Look for People Who Have Been Scammed Before

Precautions to Help You Avoid Becoming a Victim

Be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about you, your family, your employees, your colleagues or any other internal information.  If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the company.
  • Do not provide personal information or information about your organization, including its structure or networks, unless you are certain of a person’s authority to have the information.
  • Do not reveal personal or financial information in email, and do not respond to email solicitations for this information. This includes following links sent in email.
  • Do not send sensitive information over the Internet before checking a website’s security (for more information, see Protecting Your Privacy,).
  • Pay attention to the URL of a website.  Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (e.g., .com vs. .net).
  • If you are unsure whether an email request is legitimate, try to verify it by contacting the company directly.  Do not use contact information provided on a website connected to the request; instead, check previous statements for contact information.  Information about known phishing attacks is also available online from groups such as the Anti-Phishing Working Group.
  • Install and maintain anti-virus software, firewalls, and email filters to reduce some of this traffic (for more information, see Understanding Firewalls,  Understanding Anti-Virus Software, and Reducing Spam.
  • Take advantage of any anti-phishing features offered by your email client and web browser.
  • Employees should take steps to monitor their personally identifiable information and report any suspected instances of identity theft to the FBI’s Internet Crime Complaint Center or go to www.ic3.gov.
  • Additional information about preventative steps is available by consulting the Federal Trade Commission’s website, www.consumer.gov/idtheft. The FTC also encourages those who discover that their information has been misused to file a complaint with the commission using the contact information below.
IDENTITY THEFT CLEARINGHOUSE
FEDERAL TRADE COMMISSION
600 PENNSYLVANIA AVENUE, NW
WASHINGTON, DC 20580
HTTPS://WWW.IDENTITYTHEFT.GOV/
1-877-IDTHEFT (438-4338)
TDD: 1-202-326-2502

Con Artists Look for People Who Have Been Scammed Before

For con artists the best list to get is the list of people who have already been taken.  Financial criminals go to great lengths to hunt down and size-up their prey.   They will buy the lists of people who attended investment seminars; they mail postcards and then spam investors with emails and phone calls.  For the con artists nothing can top the “sucker list.”

A “sucker list” is a list of people who have already been scammed.  Attempts have been made to get the list of people who were scammed by Jordan Belfort, the felon depicted in the movie “The Wolf of Wall Street.”  Con artists also have targeted victims of the Bernie Madoff Ponzi scheme.  In 2010, a Nigerian website claimed to have found $1.3 billion of Madoff’s assets and would distribute it back to the victims if they supplied their claim numbers from the legal filing and copies of recent account statements.

Continue reading “Con Artists Look for People Who Have Been Scammed Before”