“Sucker List” and the Evolution of American Business Fraud

Total Page:16

File Type:pdf, Size:1020Kb

“Sucker List” and the Evolution of American Business Fraud Edward J. Balleisen The “Sucker List” and the Evolution of American Business Fraud in the early 1950s, mickey mantle burst onto the american sporting scene as a power-hitting outfielder for the New York Yankees. After a bumpy first year in the majors in 1951, this young man from rural Oklahoma soon became a star, attracting close attention from fans, the press, and promoters of all kinds. As a 1957 article in the Saturday Evening Post recounted, Mantle proved especially willing to listen to the pitchmen who promised to multiply his new sources of income. Within a mere week of arriving in New York City, he had signed a contract with a predatory agent who generously promised to secure all manner of endorsement and business deals, modestly reserving a full 50 percent of Mantle’s earnings. Over the next few years, the Yankee phenom periodically took flyers on a series of ill-advised investments, includ- ing $3500 ($1000 paid in cash, the rest through a promissory note) for shares in a fake Oklahoma insurance company, hawked by a notorious sharper “who had served three prison terms and had an ‘FBI file an inch thick.’” Mantle’s remarkable lack of financial acumen meant that he “led the sucker list.” And yet, the Saturday Evening Post profile also noted that Mantle learned from his mistakes rather quickly. By 1957, he had employed a reputable agent who identified excellent endorse- ment opportunities, which dramatically increased his income (Povich 1957, 19–20). This vignette incorporates several key features of the broader history of deception and misrepresentation in American marketplaces. social research Vol. 85 : No. 4 : Winter 2018 699 A SONG OF SAFETY In the young Mantle, one can see sever- My morning mail is a penance to me. al stock figures: the country bumpkin, Long, fat envelopes meet my eyes, the callow youth, and the credulous Filled with advice that is proffered free, celebrity, but also the savvy pupil who Telling of many a wondrous prize. became “more wise” through instruc- Old hooks baited with new disguise, Bundles of bunkum, a daily grist, tion in the school of wily charades. In New revamping of same old lies— the brief depiction of those who eager- PLEASE take my name off the ly sized up Mantle and took advantage Sucker List! of him, one gets a sense of the omni- Hawkers from Maine to the western sea, present American snake-oil salesmen Selling unsalable merchandise. who have found fertile ground in a Proffer me many a golden key— society that has often celebrated entre- Me, who’ve been bitten in too many buys. Towers with no roof but the bright blue preneurial innovation and aggressive skies, marketing. That same discussion hints You and my earnings good-by I’ve kissed! at the steady growth of anti-fraud in- I have sought plums in poor fruitless stitutions that took aim at duplicitous pies— economic actors, shared intelligence Please take MY name off the Sucker List! about them across government agen- cies and jurisdictions, and at least Booms in oil? (bring my snickersnee!) Rising industrials? Let ’em rise! sometimes curtailed their capacity to All my visions of Araby operate. Taken as a whole, the Satur- Are gone where the last year’s bird’s nest day Evening Post article contributed to lies. a longstanding public discourse about I’m a year older—I hope more wise! all the lies lurking throughout Ameri- Dreams of Golconda? I can resist. Buy for a fall? Then watch things rise! can commerce, a dialogue that sought Please take my name OFF the to caution consumers and investors sucker list! but simultaneously offered pointers to ENVOI those who would deceive. Prints and pamphlets, circulars free, The Mantle profile also refer- That paper the nation so lavishly. enced, without comment, a specific Let me alone. You’ll never be missed! tool of duplicitous marketing: the PLEASE TAKE MY NAME OFF THE SUCKER LIST! “sucker list.” Rosters of easy marks, —Anonymous, Logansport Pharos-Tribune, compiled by and circulated among Jan. 13, 1926 the purveyors of consumer fraud and 700 social research get-rich-quick schemes, have been around for at least a century and a half, and have become a mainstay of commercial duplicity in the United States. The emergence and evolution of the sucker list illu- minate some key themes in the long history of American cons and scams: close connections between fraud and capitalist innovation; the persistent cut and thrust between fraudulent promoters and an ever-growing corps of anti-fraud professionals; and the ambivalence that Americans have often expressed toward the victims of consum- er rip-offs and investment swindles, as cultural depictions of them swing between ridicule and sympathy. INGENUITY AND INNOVATION IN THE WORLD OF CONS AND SCAMS American perpetrators of fraud have consistently updated and refined their business practices, deploying, as the anonymous author of the 1926 poem “A Song of Safety” described them, “old hooks baited with new disguise.” Almost immediately, the most inventive con artists and fraudulent promoters recognized the value of novel modes of communication, and so became early adopters of mail-order business, telephone selling, and Internet marketing. From generation to gener- ation, fraudsters seized on the openings presented by emerging tech- nologies, like electricity in the late nineteenth-century, automobiles in the early twentieth-century, or cryptocurrencies in the last decade. They similarly took advantage of novel financial services, like the late nineteenth-century stock or commodity pool, or new modes of orga- nizing business activity, like the mid-twentieth-century franchising agreement. Vendors of fake investments saw that popular fascination with such transformational inventions tempered skepticism, while the uncertainties surrounding their evolution complicated the task of distinguishing enthusiastic but ill-founded optimism in sales talk from downright deceit. The savviest operators also proved adept at sidestepping any investigations of wrongdoing, either by paying off victims who voiced complaints, convincing the authorities that their actions did not rise to the level of illegality, deferentially promising to The Evolution of American Business Fraud 701 cease and desist from prohibited practices, or moving beyond jurisdic- tional boundaries (Balleisen 2017, 142–73). The development of the sucker list exemplifies this pattern of clever adaptation. In the decades after the US Civil War, the relentless extension of the postbellum railroad, telegraph, and then telephone networks allowed American business-owners to dream of reaching much larger numbers of consumers and investors. But like all firms that wished to tap a national marketplace, the perpetrators of fraud faced daunting obstacles. Amid a late nineteenth-century society of a hundred million people spread out across thousands of miles, busi- nesses had to spend considerable amounts to get their products or services before the public (Strasser 1989; Kreshel 1989; Ward 1996). For those duplicitous firms that wished to reach far-flung dupes, ex- penses for advertising, printing and mailing circulars, and hiring clerical and sales staff could quickly mount into the tens of thousands of dollars. John Hill, a long-time fraud investigator with the Chicago Board of Trade, estimated in the first decade of the twentieth cen- tury that stock swindlers spent $40 million a year on such overhead. Samuel Hopkins Adams, a muckraking journalist who heaped scorn upon the patent medicine industry in the early twentieth century, calculated that drug manufacturers expended a similar sum on news- paper advertising alone (Hill 1904, 93–94; Adams 1905, 124). Early developers of consumer brands, such as the Pittsburgh Heinz family, which concentrated on processed foods, and the Cin- cinnati firm Procter & Gamble, which produced soaps and other fat- based household products, confronted even more substantial costs as they pushed their wares. To reach retailers, manufacturers employed growing armies of traveling agents, who brought samples and mar- keting ideas across store thresholds. To reach consumers directly, enterprises mounted large-scale public demonstrations of their of- ferings, widely distributed circulars and pamphlets, and, especially after the 1880s, advertised aggressively. These undertakings required significant capital. By the turn of the twentieth century, national mar- keting campaigns cost hundreds of thousands of dollars, the equiva- 702 social research lent, as a share of the overall economy, of several hundred million dollars a century later1 (Sherman 1900; Koehn 1999; Dyar, Dalzell, and Olegario 2004). So long as advertisements and other marketing initiatives elic- ited a sufficient number of sales or enticed a sufficient number of suckers, enterprises could easily justify such enormous investments. But the efficacy of specific advertising campaigns proved difficult to predict, a problem that consumed manufacturers and consultants within the emerging advertising industry. Business journals and how- to guides around the turn of the twentieth century were filled with grousing about “wasteful” expenditures on commercial publicity, which usually prompted pleas for systematic assessments of particu- lar selling techniques and attempts to improve the understanding of consumer preferences and tastes (Wilson’s Photographic Magazine 1898; Sheafer 1903; Moorehead 1916). The “sign posts to advertising suc- cess,” the head of one advertising agency argued in 1910, called for reaching “the right quality
Recommended publications
  • Cyber Frauds, Scams and Their Victims 1St Edition Pdf, Epub, Ebook
    CYBER FRAUDS, SCAMS AND THEIR VICTIMS 1ST EDITION PDF, EPUB, EBOOK Mark Button | 9781138931206 | | | | | Cyber Frauds, Scams and their Victims 1st edition PDF Book Defamation Invasion of privacy Intrusion on Seclusion False light Breach of confidence Abuse of process Malicious prosecution Alienation of affections Criminal conversation Seduction Breach of promise. Big Data Saswat Sarangi author Apart from fraud, there are several related categories of intentional deceptions that may or may not include the elements of personal gain or damage to another individual:. While the precise definitions and requirements of proof vary among jurisdictions, the requisite elements of fraud as a tort generally are the intentional misrepresentation or concealment of an important fact upon which the victim is meant to rely, and in fact does rely, to the harm of the victim. Given the international nature of the web and ease with which users can hide their location, obstacles to checking identity and legitimacy online, and the variety of hacker techniques available to gain access to PII have all contributed to the very rapid growth of Internet fraud. April Cyber security officials in the UK begin to worry as the BBC demonstrates how easy it is to purchase fraudulent rail tickets via the dark web. A year-old-boy was arrested in Northern Ireland for attempting to purchase a Soviet era submachine gun on the dark web. Retrieved 18 September Compounding Malfeasance in office Miscarriage of justice Misprision Obstruction Perjury Perverting the course of justice. Beyond laws that aim at prevention of fraud, there are also governmental and non-governmental organizations that aim to fight fraud.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • MF2228 Be a Winner, Avoid Consumer Fraud-Fact Sheet
    Outdated Publication, for historical use. CAUTION: Recommendations in this publication may be obsolete. HEALTHIER FUTURES FOR OUR FAMILIES FACT SHEET Be a Winner Avoid Consumer Fraud “...alert con- “You Definitely Have Won .....!” says the • Learn about the agencies, regulations and postcard in your mail box or the caller on the laws that have jurisdiction over fraudulent sumers are telephone. activities. Many frauds and deceptions use the mail their own and telephone, as well as newspaper, Reasons Consumers Fall best protec- magazine, and television advertisements, to Victim to Schemes reach unwary consumers. Frauds and deceptions continue to exist in Others use personal contacts, such as sales tion against the marketplace because of talks, either in a rented space or a regular fraud.” store, or through door-to-door sales. • Consumers’ vulnerability. Whatever the method, alert consumers are • Tactics of unscrupulous sellers. their own best protection against fraud. • Problems in proving deception and enforc- Remember the saying: “If it sounds too good ing laws and regulations against fraud. to be true, it probably is.” Why Consumers are Vulnerable Consumer fraud is a continuing problem in In deceptive situations, greed is perhaps our society. Some con games and swindles the most common motivation on the part of have been around for many years, while consumers. others have developed as telemarketing, The feeling that you can get a lot for a little computerized information, and advertising or even something for nothing has great methods have expanded. appeal. This can be described as the It is harder than ever to distinguish “sweepstakes mentality,” the feeling that “it’s between somewhat exaggerated claims my turn to win, to get a good deal.” (known as puffery), deception, persuasive Other reasons are advertising, and actual fraud.
    [Show full text]
  • Research on Sentencing Online Fraud Offences
    Research on Sentencing Online Fraud Offences Jane Kerr, Rachael Owen, Carol McNaughton Nicholls NatCen Social Research Mark Button Centre for Counter Fraud Studies, University of Portsmouth June 2013 Research on Sentencing Online Fraud Offences Jane Kerr, Rachael Owen, Carol McNaughton Nicholls NatCen Social Research Mark Button Centre for Counter Fraud Studies, University of Portsmouth This information is available on the Sentencing Council website at: www.sentencingcouncil.org.uk Disclaimer The views expressed are those of the authors and are not necessarily shared by the Sentencing Council (nor do they represent Sentencing Council or government policy). © Crown Copyright 2013 You may re-use this information (not including logos) free of charge in any format or medium, under the terms of the Open Government Licence. To view this licence, visit http://www.nationalarchives.gov.uk/doc/open-government-licence/ or e-mail: [email protected] Where we have identified any third-party copyright material you will need to obtain permission from the copyright holders concerned. Any enquiries regarding this publication and to request alternative format versions of this report, should be sent to us at [email protected] Acknowledgements We are grateful to Emma Marshall and Trevor Steeples from the Office of the Sentencing Council for their advice, support and assistance for the duration of this research. Thank you also to Mehul Kotecha, Steven Coutinho, Jasmin Keeble and Sarah Dickens for their input to the project. We would like to thank the key stakeholders and the participants in this research for sharing their views, and we would like to thank the staff of organisations that provided their time to assist with the recruitment of participants, especially Rebecca Lambot at Action Fraud.
    [Show full text]
  • Exploring How, Why and in What Contexts Older Adults Are at Risk of Financial Cybercrime Victimisation: a Realist Review
    Exploring how, why and in what contexts older adults are at risk of financial cybercrime victimisation: a realist review *Alexandra Burton1 *Claudia Cooper (corresponding author)2,3 Ayesha Dar2 Lucy Matthews2 Kartikeya Tripathi4 *joint first authors 1Research Department of Behavioural Science and Health, Institute of Epidemiology & Health Care, UCL 2UCL Division of Psychiatry, 6th Floor Wing A Maple House, 149-150 Tottenham Court Road, London W1T 7BN, UK, [email protected] 3Camden and Islington NHS Foundation Trust 4Department of Security and Crime Science, University College London 1 Abstract Although older people rarely report being victims of financial cybercrime, there is evidence that older online users are at increased risk. This realist review identified factors leading to older adults’ victimisation and reviewed the theory and evidence for interventions to reduce victimisation risks. We developed an initial programme theory from a scoping review and expert stakeholder consultations. We searched electronic databases, references and websites for literature meeting inclusion criteria. We analysed 52 primary and secondary data sources, seeking stakeholder views to develop and refine the programme theory and generate Context-Mechanism-Outcome Configurations (CMOCs) explaining how, why and in what circumstances older adults become financial cybercrime victims; and extrapolated this to consider rational intervention strategies. Our programme theory comprised 16 CMOCs describing how: social isolation, cognitive, physical and mental health problems; wealth status, limited cyber security skills or awareness, societal attitudes and content of scams led to victimisation. Only interventions to enhance older internet users’ awareness and skills have been trialled to date. Other theoretically plausible interventions include: offender management programmes, tailored security measures, society-wide stigma reduction and awareness-raising with groups who support older people.
    [Show full text]
  • Seniors Phone Scams
    Seniors Phone Scams During a visit with your mother, you notice a stack of wire transfer receipts totaling thousands of dollars. When you ask what they are for, she says she is paying taxes on a prize she has won. After you investigate further, you think she is being scammed by fraudulent telemarketers. What can you do? Robocalls are most commonly associated with phishing scams. Consumers lose more than $40 billion a year to telemarketing fraud. People over 65 years of age are especially vulnerable. Scam artists often target older before you have had a chance to consider the offer people, knowing they tend to be trusting, polite toward carefully. strangers, are likely to be home, and are likely to have time to talk with callers. • It is not necessary to check out the company with anyone – including your family lawyer, accountant, You can help empower your parents and others who local Better Business Bureau, or the Bureau of may be targets of fraudulent telemarketers by Consumer Protection. describing some tips about rip-off scams, letting them know their rights, and suggesting ways they can protect • You do not need written information about the themselves. company or its references. • You cannot afford to miss this “high-profit, no-risk” Tip-offs to phone fraud offer. Many scams involve bogus prize offers, phony travel packages, get-rich-quick investments, and fake charities. • If the calls come from Jamaica, be suspicious. Con artists are skilled liars who spend a lot of time Jamaican phone scams are on the rise. Calls polishing their sales pitches.
    [Show full text]
  • Priority Development Assistance Fund Scam
    Priority Development Assistance Fund scam From Wikipedia, the free encyclopedia The Priority Development Assistance Fund scam, also called the PDAF scam or the pork barrel scam, is a political scandal involving the alleged misuse by several members of the Congress of the Philippines of their Priority Development Assistance Fund (PDAF, popularly called "pork barrel"), a lump-sum discretionary fund granted to each member of Congress for spending on priority development projects of the Philippine government, mostly on the local level. The scam was first exposed in the Philippine Daily Inquirer on July 12, 2013,[1] with the six-part exposé of the Inquireron the scam pointing to businesswoman Janet Lim-Napoles as the scam's mastermind after Benhur K. Luy, her second cousin and former personal assistant, was rescued by agents of theNational Bureau of Investigation on March 22, 2013, four months after he was detained by Napoles at her unit at the Pacific Plaza Towers in Fort Bonifacio.[2] Initially centering on Napoles' involvement in the 2004 Fertilizer Fund scam, the government investigation on Luy's testimony has since expanded to cover Napoles' involvement in a wider scam involving the misuse of PDAF funds from 2003 to 2013. It is estimated that the Philippine government was defrauded of some ₱10 billion in the course of the scam,[1] having been diverted to Napoles, participating members of Congress and other government officials. Aside from the PDAF and the fertilizer fund maintained by the Department of Agriculture, around ₱900 million
    [Show full text]
  • 419 Free Download
    419 FREE DOWNLOAD Will Ferguson | 416 pages | 27 Feb 2014 | Head of Zeus | 9781781855072 | English | London, United Kingdom Nigerian (419) Scam Need help!! Overall I think that this is an interesting book, it shares stories from a part of the world many are not very familiar with and it reveals more details about the "Nigerian Prince" email 419 than most of us are likely to know. I am surprised this work garnered the Giller 419 this year as 419 of the most fundamental rules, that of maintaining the 419 line, was broken. Later the check is not honoured 419 the bank debits the victim's account. Have you sold an item and are asked to accept a payment larger than the item amount? Examples of in a Sentence John Rumsfeld : It's unprecedented to enrollpatients in 419 short amount 419 time, we talk about not being able to get people into research studies. Confidence trick Error account Shill Shyster Sucker list. 419 the seething heat of Lagos A startlingly original tale of heartbreak and suspense 419 car tumbles down a snowy ravine. Recipient addresses and email content are copied and pasted into a webmail interface using 419 stand-alone storage medium, such 419 a memory card [ citation needed ]. Her skill at recognizing patterns in spelling errors is the exact skill needed to crack the scam that 419 her father! According to Cormac Herley, a Microsoft researcher, "By sending an email that repels all but the 419 gullible, the scammer gets the most promising marks to self-select. San Diego 419 Tribune.
    [Show full text]
  • Preventing Senior Fraud
    Preventing Senior Fraud NEBRASKA ATTORNEY GENERAL’S OFFICE Nebraska Attorney General’s Office Consumer Protection Division 2115 State Capitol Building Lincoln, NE 68509 (402) 471-2682 ProtectTheGoodLife.Nebraska.gov 2 Dear Fellow Nebraskans, We enjoy a wonderful state with strong roots and hard-working citizens who are surrounded by plentiful resources. One of our greatest gifts is the neighbor we know next door. We wish that everyone were truly “Nebraska Nice” and treated their neighbors with the respect they deserve; however, sadly, scam artists from across the country and around the world attempt to defraud Nebraskans every day. Thisis especially true within our state’s senior population. This fact is well-documented by fraud reports. We know seniors are exploited. Seniors tell us their stories of annoyance, frustration, and pressure exerted by scammers. These expe iences take their toll. Elder fraud and abuse are more than a frustration and nuisance; they are a real threat and one that is impacting not only quality of life but the length of life as well. For the sake of our families, we must push back. Education is the best weapon we have in preparing people to protect themselves. This guide includes information on how to spot, stop, and avoid potential loss if you or someone you know is a target of fraud. Should you experience uncertainty, have feelings of fear or concern, or just wish to pose a question, please call our Consumer Specialists and let us be of service. We are here to protect and help you. In the meantime, trust your instincts.
    [Show full text]
  • Your Guide to Protecting Your Money in Today's Consumer
    CONSUMER UNIVERSITY Your Guide to Protecting your Money in Today’s Consumer Marketplace Finances Charitable Donations Shopping Rights Automobile Lemon Law Credit Cards Fraud Safety at Home and Away Protecting Your Health Debt Management Refunds Scams Personal Data Security Created by the Massachusetts Office of Consumer Affairs Barbara Anthony and Business Regulation Undersecretary CONSUMER UNIVERSITY Table of Contents Page # PROTECTING YOUR MONEY 05 Consumer Rights and Responsibilities 06 Finances – Savings and Checking Accounts 06 18/65 law 06 Low Cost Banking 06 Reverse Mortgages 07 New Consumer Protections in Debt Collection 13 Spending Your Money Wisely 16 Charitable Donations 16 Shopping Rights 18 Sales 18 Item Pricing 19 Mismarked Merchandise 19 Bait and Switch 19 Rain Checks 19 Layaway Plans 20 Restocking Fees 21 Warranties 22 Refund, Return and Cancellation Rights 22 Telemarketing Sales 23 Mail Order 24 Door-to-Door Sales 26 FTC’s Cooling Off Rule 27 Billing Errors 27 Unsolicited Merchandise 28 Reducing Unsolicited Offers 29 Contracting for Goods or Services 30 Three-Day Cancellation Rights 30 Service Calls 30 Auto Repairs 31 New and Leased Car Lemon Law 32 Used Vehicle Warranty Law 37 Lemon Aid Law 44 Shopping for Auto Insurance Step by Step 47 Home Improvement Contracting 49 The Written Contract 51 Additional Considerations When Paying for Goods & Services 54 PROTECTING YOURSELF FROM IDENTITY THEFT 57 Tips to Protect Your Credit Cards 58 Pre-paid Value Cards/Gift Cards 60 Sample 30-Day Demand Letter 64 Fraud 66 Three Elements
    [Show full text]
  • Journal of Forensic and Investigative Accounting Volume 12: Issue 1, January–June 2020
    Journal of Forensic and Investigative Accounting Volume 12: Issue 1, January–June 2020 Profiling HMRC and IRS Scammers by Utilizing Trolling Videos: Offender Characteristics Calli Tzani-Pepelasi Mirjana Gavrilovic Nilsson David Lester Ntaniella Roumpini Pylarinou Maria Ioannou* 1. Introduction For centuries fraudsters have been putting great thought into developing fraudulent systems, stories, and techniques to scam consumers and victimize individuals who fall into the scammer’s traps (e.g., see the Spanish Prisoner) (Barnes, 2017; Croall, 2008; 2009; Mears, Reisig, Scaggs, and Holtfreter, 2016). Today’s interconnected world and cheap methods of communication such as e-mail, telephone, and the Internet have become useful tools for offenders to execute various types of fraudulent activities such as scams. The OFT (2006) defines scams as a misleading or deceptive business practice, where individuals receive an unsolicited or uninvited contact (e.g., by e-mail, letter, phone, or advertisement) and false promises. Such practices allow scammers to swindle targeted individuals out of money or other valuable objects (p. 12). 1.1. Scam Types and Scammers’ Motivation There are many types of scams, and the modus operandi (MO) of offenders can vary significantly (Gordon and Buchanan, 2013). Action Fraud (2018), the UK’s National Reporting Center for Fraud and Cybercrime, have an A- Z directory containing over 50 types of scams, which include identity theft, romance fraud, miracle cure and slimming cure scams, tax fraud, phishing, online scams (e.g., 419 scams), spam e-mails, and even fraud recovery fraud. Other common scams are sweepstakes and prize draws, doorstep crime and government agency scams, such as IRS/HMRC scams, on which this research focuses (Button, Lewis and Tapley, 2009; Lister and Wall, 2006).
    [Show full text]
  • The Four Cornerstones of Financial Literacy Curriculum
    FOUR CORNERSTONES OF FINANCIAL LITERACY Acknowledgements The Four Cornerstones of Financial Literacy program was written and developed by Darryl Dahlheimer through a federal grant administered by the Minnesota Department of Human Services, Office of Economic Opportunity and in partnership with the Minnesota Community Action Partnership. The curriculum was developed for use by agencies that serve low-income individuals and families, to teach economic empowerment skills and financial knowledge using a learning-circle group method. It is not intended to provide any specific legal, tax, or investment advice for individual situations, but is a road map and resource to help people find their way into financial well-being. Table of Contents PART ONE: BUDGETING TO CREATE SAVINGS Income and Savings Plans: First Steps to Making a Workable Budget ............................................................ 1 The Put-and-Take Account: saving for periodic expenses ............................. 3 Cash Flow Chart: for when you have to live check-to-check .......................... 4 Weekly Spending Tracker ............................................................................... 5 Categories for Tracking in a Spending Plan .................................................... 6 Debt Tracker Worksheet ................................................................................ 7 Spending Plan Monthly Tracker ...................................................................... 8 Thriftiness Tip Sheet.....................................................................................
    [Show full text]