Postal Bulletin 22566. February 25, 2021. Protect Yourself from Money

Total Page:16

File Type:pdf, Size:1020Kb

Postal Bulletin 22566. February 25, 2021. Protect Yourself from Money Front Cover 2 postal bulletin 22566 (2-25-21) Contents COVER STORY Pictorial Postmarks Announcement . 35 Protect Yourself from Money Mule Scams . 3 How to Order the First-Day-of-Issue Digital Color or POLICIES, PROCEDURES, AND FORMS Traditional Postmarks . 37 UPDATES Supply Management USPS Headquarters Managers and Field Installation Manuals Heads: March 2021 Annual Capital Property Review. 39 DMM Revision: Permit Imprint Minimum Volumes . 4 ELM Revision: Combined Federal Campaign Program. 4 ELM Revision: Sex Discrimination Policy . 5 IMM Revision: First-Class Mail International Service . 5 PULL-OUT INFORMATION IMM Revision: Individual Country Listing for Australia . 6 Fraud IMM Revision: Individual Country Listing for Japan . 6 Invalid USPS Corporate Account Numbers. 11 IMM Revision: Individual Country Listing for Pakistan . 7 Missing, Lost, or Stolen U.S. Money Order Forms . 13 Handbooks Missing, Lost, or Stolen Canadian Money Order Forms . 19 Handbook AS-709 Revision: Purchase Card Local Verifying U.S. Postal Service Money Orders . 21 Buying Policies and Procedures . 7 Counterfeit Canadian Money Order Forms . 21 Publications Toll-Free Number Available to Verify Canadian Publication 431 Revision: Changes to Post Office Box Money Orders . 21 Service and Caller Service Fee Groups . 8 Other Information Forms Overseas Military/Diplomatic Mail . 23 PS Form 2181-D Revision: Disclosure and Authorization Thrift Savings Plan Fact Sheet. 28 for Consumer Reports and Investigative Consumer Freely Associated States Restrictions . 30 Reports . 8 ORGANIZATION INFORMATION Information Security POSTAL BULLETIN 2020 ANNUAL INDEX CyberSafe Training for Contractors: FY 21 Course is 2021 Annual Index . PB 22564 (1-28-21) Now Available . 9 Happening Now: Changes to the USPS Internet Landscape. 9 Find the latest in mail and delivery information Product Management Mailing Services and services offered by U.S. Postal® Share Mail . 10 in the Postal Bulletin at Small Business Sales about.usps.com/postal-bulletin Business Connect Kits are Coming . 31 Stamp Services Stamp Announcement 21-10: Espresso Drinks Stamps . 33 Stamp Stock Items Withdrawn from Regular Sale and from Sale at Philatelic Centers . 34 Cover Story postal bulletin 22566 (2-25-21) 3 Cover Story Protect Yourself from Money Mule Scams Money mules are people who receive and transfer orders, gift cards, or virtual currency at the direction money stolen from fraud victims. Some money mules know of others. Never give your personal information, such they’ve been recruited to assist criminal activity, but others as your Social Security number or bank account become money mules without realizing their activity is ben- number to someone else. efiting fraudsters. These criminal elements use several Don’t take a job that promises easy money or methods to recruit victims: involves sending or receiving money or packages. Work-from-home scams. A job posting offers easy If a job sounds too good to be true, it probably is — money for reshipping packages, buying gift cards or never take a job accepting or sending packages on postal money orders, or transferring money, which behalf of others. can be done at home. Check it out. Check any work-from-home opportu- Confidence scams. A person or business you don’t nity or money moving offer with a trusted family know offers a commission if you transfer money for member or friend. You can also contact the local them. Many of these scammers are active on social Better Business Bureau chapter, state corporation media sties, like Facebook and Instagram. directory, and state attorney general’s office to see if Lottery scams. A person informs you that you need the offer is legitimate. to transfer or accept money in order to collect a prize. Report it. Report money mule scams as soon as Romance scams. A person you’ve met online or on possible. Call the United States Postal Inspection ® an app who says they’re romantically interested in Service at 877-876-2455 or visit uspis.gov/report to you asks you to transfer money or packages. file a report. Also, report any suspected money mule email or social media scams to the platform provider. Transferring money or valuables on behalf of others only benefits criminals, and may lead to serious consequences For more information about money mule scams, visit for you. Here are some of the best ways to protect yourself uspis.gov/money-mule. from money mule scams: Don’t engage in financial transactions with — Communications, Governance, and Strategy, strangers. This includes transferring money into and U.S. Postal Inspection Service, 2-25-21 out of accounts you own or purchasing postal money 4 postal bulletin 22566 (2-25-21) Policies, Procedures, and Forms Updates Policies, Procedures, and Forms Updates Manuals DMM Revision: Permit Imprint Minimum Volumes Effective April 5, 2021, the Postal Service™ will revise 604 Postage Payment Methods and Refunds Mailing Standards of the United States Postal Service, ***** Domestic Mail Manual (DMM®), section 604.5.1.2, to clarify the minimum volume standards regarding single-piece 5.0 Permit Imprint (Indicia) price mailings. 5.1 General Standards Currently, section 604.5.1.2(d) specifies that single-piece price mailings submitted under the terms of an approved ***** manifest mailing system agreement with a minimum volume 5.1.2 Minimum Volume reduction provision, or single-piece mailings of First-Class Mail® letters when using electronic documentation, includ- ***** ing piece-level barcode information, are required to be [Revise the text of item d. to read as follows:] authorized by Business Acceptance Solutions. This revision d. Single-piece price mailings submitted under the will clarify that only single-piece price mailings submitted terms of an approved manifest mailing system agree- under the terms of an approved manifest mailing system ment with a minimum volume reduction provision as agreement with a minimum volume reduction provision authorized by Business Acceptance Solutions (see are required to be authorized by Business Acceptance 608.8.0 for address), or single-piece mailings of First- Solutions. Class Mail letters when using electronic documenta- Although this clarification will not be published in the tion, including piece-level barcode information. DMM until April 5, 2021, the revised standard is effective immediately. ***** The Postal Service will incorporate this revision into the Mailing Standards of the United States Postal next edition of the online DMM, which is available via Postal Service, Domestic Mail Manual (DMM) Explorer® at pe.usps.com. ***** — Product Classification, 600 Basic Standards for All Mailing Services Product Solutions, 2-25-21 ***** ELM Revision: Combined Federal Campaign Program Effective March 31, 2021, the Postal Service™ will The Postal Service will incorporate these revisions into revise the Employee and Labor Relations Manual (ELM), the next edition of the online ELM, which is available on the part 617, to update Combined Federal Campaign (CFC) PolicyNet website: program guidelines to reflect changes that the Office of Go to blue.usps.gov. Personnel Management (OPM) made to regulations and In the left-hand column, click Essential Links, and ethics rules governing the CFC. then click PolicyNet. The update addresses significant changes to the CFC Go to the right-hand side under “Published Forms structure, including methods of collecting and mailing and Directives.” pledges; procedures that campaign workers must follow Click Manuals. when managing, coordinating, and canvassing the cam- paign; and strategies for running a campaign under the new The direct URL for the Postal Service PolicyNet website ethics rules and OPM regulations. is blue.usps.gov/cpim. Although the Postal Service will not publish these revi- sions in the ELM until March 31, 2021, the updated guide- — National Human Resources, lines are effective immediately. Human Resources, 2-25-21 Policies, Procedures, and Forms Updates postal bulletin 22566 (2-25-21) 5 ELM Revision: Sex Discrimination Policy Effective February 25, 2021, the Postal Service™ is The Postal Service will incorporate these revisions into revising the Employee and Labor Relations Manual (ELM), the September 2021 edition of the online ELM, which is Chapters 3, 4, 6, 7, and 8, to update USPS® policy prohib- available on the PolicyNet website: iting sex discrimination in personnel hiring and placement, Go to blue.usps.gov. so that the ELM is consistent with a U.S. Supreme Court In the left-hand column, click Essential Links, and decision issued June 2020. then click PolicyNet. In the decision, the Court states that “an employer vio- Go to the right-hand side under “Published Forms lates Title VII when it intentionally fires an individual employee and Directives.” based in part on sex” and that “an individual’s homosexuality Click Manuals. or transgender status is not relevant to employment deci- sions. That’s because it is impossible to discriminate against The direct URL for the Postal Service PolicyNet website a person for being homosexual or transgender without dis- is blue.usps.gov/cpim. criminating against that individual based on sex.” Although the Postal Service will not publish these revi- — Equal Employment Opportunity Compliance sions in the ELM until September 2021, the standards are and Appeals, Labor Relations, 2-25-21 effective immediately. IMM Revision: First-Class Mail International Service Effective February 25, 2021, the Postal Service™ is 134.1 Service Options revising Mailing Standards
Recommended publications
  • Willing to Be Scammed: How Self-Control Impacts Internet Scam Compliance
    Running head: Willing to be scammed: how self-control impacts Internet scam compliance Willing to be scammed: How self-control impacts Internet scam compliance Submitted by David Modic to the University of Exeter as a thesis for the degree of Doctor of Philosophy in Psychology In September 2012 This thesis is available for Library use on the understanding that it is copyright material and that no quotation from the thesis may be published without proper acknowledgement. I certify that all material in this thesis which is not my own work has been identified and that no material has previously been submitted and approved for the award of a degree by this or any other University. Signature: ………………………………………………………….. 2 WILLING TO BE SCAMMED WILLING TO BE SCAMMED 3 Abstract At any given moment in time, there are people complying with fraudulent requests (i.e. scams) on the Internet. While the incidence rates are low (between five and ten percent of the population becoming victims on a yearly basis), the financial and emotional consequences can be high. In this Thesis we composed a unified theory of which factors made individuals more likely to comply with scams and what psychological mechanisms are unwittingly employed by con-men to make their (illegitimate marketing) offers more enticing. The strongest overall predictor of scam compliance (i.e. the extent to which an individual is likely to comply with fraudulent requests) was the level of self-control, regardless of the observed stage of a scam. On the basis of previous research, we postulated and have empirically shown that falling for a scam is a 3-stage process (i.e.
    [Show full text]
  • Important Safety Message Oakdale Police Department
    Safety Important Safety Message Oakdale Police Department Likely Perpetrators Dear• St rangersOakdale preying Residents: on older people who may be isolated,lonely, confused, or desperate for attention. • Caregivers and persons in a position of trust who use fear or guilt to take advantage of a senior. Too• Foften,amilym eresidentsmbers with a crigetminal hooked history and by/or cona artists and scammers whose intent is toh istoryfinancially of drug abuse, exploitaddiction, them. or unemployment. It isn’t just the elderly, as anyone who has received unsolicited and suspicious phone calls, mail or email spam can attest.Signs that an Older Adult Might Thebe Oakdalein Trouble Police Department urges you to review this information and discuss• Unusual it rewithcent changesloved to ones, a person's friends, account, and especially those who may need a littleincluding extra atyphelp.ical withdrawals,This bookletnew person(s) offers information on various scams, tips to avoidadded, being or sudden exploited, repeated use and of the resources seniors' ATM to help. or credit card. If• youA large work check in written a financial to someone youinstitution, don't know. money transfer company or retail • industryA change (which in their powersells of prepaid attorney or cards the or money orders), you are in a unique beneficiarieson their insurance or investment positionaccounts. to stop a scam in progress. In fact, you may be the last person who can• Unusualstop the or unnecessary customer purchases, from suchlosing as buying a large amount of his or her assets. new golf clubs or a diamond bracelet. By• stayingUnnecessary alert, home repairs.sharing concerns, and asking questions you can help protect • yourselfBecoming and close others with a muchavoid younger financial person or harm.
    [Show full text]
  • Sentry Magazine Vol 1 No 6 Fall 1988 Winter 1989
    For the Navy Security community Vol. 1, No. 6 Fall 1988/Wlnter 1989 Industrial Security It really exists , TEMPEST The lnvlslble thr_eal fS6:~.!~Y Vol. 1 No. 6 Fall 1988/Winter 1989 Security communitv Special features From the editor: Since last issue, I've received a lot Moving up·· MA and LDO Promotio11s ....................................... 4 of positive response from the Oeel Unique police duty at Navy's largest shipyard .................... & concerning the changes aod expansion of Sentry. This issue renects even more Security violations ...who's responsible ...............................22 changes, expanding into areas o( Jungle Patrol ........................................................................... 35 lndus1rial Security and Technical The Invisible Security threat·· TEMPEST............ ...............40 Security, and the growing Legal Issues, 'Alligator Muldoon' ·· SECSTA 's Sccuriry Officer .................... 46 Information Security and Personnel Finding fund$ for security .................................................... 50 Security sections. The command is also growing and The Navy Industrial SecUiity Program ............................... 54 changi11g. As of 1 October 1988, we are Defending against terrorism: Part 6: Mail Boml>s .................. 58 now the Naval Investigative Service Command (NISCOM), and have a new headquarters building 10 go with the News & Features new name. Our new loca1io.n is at the Washingto.11 Navy Yard, Building 111. Crime Prevention awards ....................................................
    [Show full text]
  • Online Scammers and Their Mules in Malaysia
    (2020) 26 JUUM 65 - 72 https://doi.org./10.17576/juum-2020-26-08 Online Scammers and Their Mules in Malaysia Mohamad Rizal Abd Rahman ABSTRACT Scammers have adopted various scam techniques in defrauding their victims. One of the most common ways is by engaging mules to assist them. This article discusses relevant legal provisions in Malaysia which are enforced against these illegal activities. The objectives are to highlight the significance of section 415 and 420 in dealing with online scammers, and section 414 and 424 in dealing with mules who assist them. Relevant cases are also cited to enable readers to understand the real scenario behind these scammers and their mules. The article ends with a scenario to be pondered in between human conscience and government intervention in order to prevent, if not eradicate, these illegal activities. Keywords: scam; mule; Malaysia; law INTRODUCTION testimony beforethe US Senate Governmental Affairs Committee on 2 March 2000: Humans are prone to be susceptible to matters which benefit them financially and emotionally. “The human side of computer security is easily exploited and Fake multilevel marketing or pyramid system, constantly overlooked. Companies spend millions of dollars on firewalls, encryption and secure access devices, and it’s money business opportunities, auctions, credit card offers, wasted, because none of these measures address the weakest loans, job vacancies, etc are the most common fake link in the security chain, the people who use, administer, “attractions” that scammers adopt in defrauding operate, and account for computer systems that contain others. Either by way of phishing, pharming, protected information..
    [Show full text]
  • GAO-14-213R, Financial Audit
    On December 23, 2013, the enclosure was replaced to reflect SEC’s correction of certain unaudited information in its agency financial report, as discussed on page 1 of the enclosure. 441 G St. N.W. Washington, DC 20548 December 16, 2013 The Honorable Mary Jo White Chair United States Securities and Exchange Commission Financial Audit: Securities and Exchange Commission’s Fiscal Years 2013 and 2012 Financial Statements Dear Ms. White: This report transmits the GAO auditor’s report on the results of our audits of the fiscal years 2013 and 2012 financial statements of the United States Securities and Exchange Commission (SEC) and its Investor Protection Fund (IPF),1 which is incorporated in the enclosed U.S. Securities and Exchange Commission Fiscal Year 2013 Agency Financial Report. As discussed more fully in the auditor’s report that begins on page 54 of the enclosed agency financial report, we found • the financial statements are presented fairly, in all material respects, in accordance with U.S. generally accepted accounting principles; • SEC maintained, in all material respects, effective internal control over financial reporting as of September 30, 2013, although internal control deficiencies regarding information security exist that merit attention by those charged with governance; and • no reportable noncompliance in fiscal year 2013 with provisions of applicable laws, regulations, contracts, and grant agreements we tested. The Accountability of Tax Dollars Act of 2002 requires that SEC annually prepare and submit audited financial statements to Congress and the Office of Management and Budget.2 The Securities Exchange Act of 1934, as amended in 2010 by the Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank Act), requires SEC to annually prepare and submit a complete set of audited financial statements for IPF to Congress.3 We agreed, under our audit authority, to audit SEC’s and IPF’s financial statements.
    [Show full text]
  • Scam Red Flags and Avoiding Fraud
    FRM-KM.002 Scam Red Flags and Avoiding Fraud By Kelly May Family Finance and Resource Management mericans lose billions of dollars each year to fraud. While most people know to beware of offers that sound too good to be true, it isA often difficult to tell which offers are truly good and which are bad deals in disguise. The best way to protect yourself from financial fraud and scams is to be aware of the tactics con artists use and learn to recognize red flags so you can avoid being tricked. Reporting agencies vary on the numbers of fraud victims and dollars lost each year. But they do agree that losses are in the billions per year and that fraud is underreported, which means those losses could be even higher. Furthermore, fraud can happen to anyone. According to June 2020 data from the Federal Trade Commission’s Consumer Sentinel Network, fraud is more often reported by those aged 20-49. However, median dollar losses are much higher for those older than 50, starting at $300 for ages 50-59, and increasing significantly with each age bracket up to $1,250 for age 80 and older. 1 CON ARTIST TACTICS You cannot tell if a person is a con artist by their appearance. Scam artists come in all ages, sizes, races, and genders. In fact, the “con” in con artist comes from the word “confidence.” The scammer inspires this confidence through their supposed credentials or experience. Also, they often play up their similarities to you to gain your trust. • SOURCE CREDIBILITY is a tactic in which the con artist claims to be with a reputable company.
    [Show full text]
  • Scams, Schemes & Swindles
    SCAMS, SCHEMES & SWINDLES A REVIEW OF CONSUMER FINANCIAL FRAUD RESEARCH Martha Deevy Shoshana Lucich Michaela Beals 2012 fraudresearchcenter.org “To the extent that people reach old age mentally sharp, physically fit, and financially secure, the problems of individual and societal aging fall away.” — Laura L. Carstensen Founding Director, Stanford Center on Longevity 2 Financial Fraud Research Center | fraudresearchcenter.org LETTER FROM THE DIRECTOR Dear Colleagues, DearIn November Colleagues, 2009, an expert group of academics, regulators, practitioners, and policy- makers gathered at the Stanford Center on Longevity to discuss the growing threat of Launched in August 2011, the Financial Fraud Research Center (FFRC) is a new partnership between the Stanford Centerfraud. on FromLongevity this and discussion the FINRA Investor arose Educationboth a renewed Foundation. understanding This initiative grew of out the of aurgency convening to at addthe ress Stanfordfinancial Center fraud, on Longevity as well of asan experta new group partnership of academics, between regulators, thepractitioners, Center and on policy-makers Longevity gatheredand the to discuss the devastating impact of financial fraud. From this discussion, supported by AARP, arose a renewed understandingFINRA Investor of the Education broad impact Foundation. of financial fraud, and acknowledgement that the field could benefit from greater collaboration. In August 2011, the independent Research Center on the Prevention of Financial Fraud Thecame FFRC to identified life. One three key initiatives goal ofnecessary this partn to successfullyership i sadvance to vitalize the fight and against catalyze financial interest fraud: in financial fraud prevention and detection, bridging innovative research to practical efforts. It is this • Consolidating research and information in accessible language.
    [Show full text]
  • Department of Justice Journal of Federal Law and Practice
    DEPARTMENT OF JUSTICE JOURNAL OF FEDERAL LAW AND PRACTICE Volume 66 December 2018 Number 7 Director James A. Crowell IV Editor-in-Chief K. Tate Chambers Law Clerks Joseph Garfunkel Emily Lary Brianna Morrison Carson Sadro Sara Smith United States The Department of Justice Journal of Department of Justice Federal Law and Practice is published by Executive Office for United States the Executive Office for United States Attorneys Attorneys Washington, DC 20530 Office of Legal Education 1620 Pendleton Street Contributors’ opinions and statements Columbia, SC 29201 should not be considered an endorsement by EOUSA for any policy, program, or Cite as: service. 66 DOJ J. FED. L. & PRAC., no. 7, 2018. The Department of Justice Journal of Internet Address: Federal Law and Practice is published https://www.justice.gov/usao/resources/ pursuant to 28 C.F.R. § 0.22(b). journal-of-federal-law-and-practice Page Intentionally Left Blank Elder Justice In This Issue Introduction ........................................................................................ 1 By Acting Attorney General Matthew G. Whitaker The United States Department of Justice’s Elder Abuse Initiatives ...................................................................... 3 By Laura Ivkovich, Andy Mao, and Dr. Carrie Mulford Elder Financial Fraud Schemes: The Case for Federal Investigation and Prosecution ............... 31 By Peter E. Deegan Jr. Stop the Bleeding: Using Civil Injunctions Under 18 U.S.C. § 1345 To Stop Fraud .......................................... 39 By Jacqueline Blaesi-Freed Asset Forfeiture in Elder Fraud Schemes ................................... 61 By Kyle T. Bateman Using Fraud and Scam Reports to Fight Fraud Affecting Older Consumers ............................................................ 79 By Lois C. Greisman Money Mules: Stopping Older Adults and Others from Participating in International Crime Schemes .................................................................................
    [Show full text]
  • The Check Is in the Mail: Monetization of Craigslist Buyer Scams
    The Check is in the Mail: Monetization of Craigslist Buyer Scams Jackie Jones Damon McCoy Information Technology Computer Science George Mason University George Mason University [email protected] [email protected] Abstract—Nigerian or advance fee fraud scams continue to fraudulent buyers. In 2013, a research measurement study was gain prevelance within the world of online classified advertise- conducted focusing on the fake payment scams targeting users ments. As law enforcement, user training, and website technolo- on Craigslist [4]. One result of the study was the identification gies improve to thwart known techniques, scammers continue to evolve their methods of targeting victims and monetizing of two primary payment methods, fake checks and fake Paypal their scam methods. As our understanding of the underground payments being utilized by scammer groups in furtherance of scammer community and their methods grows, we gain a greater their scam attempts. insight about the critical points of disruption to interrupt the This paper focuses on these two payment methods in order scammers ability to succeed. In this paper we extend on previous to gain insight into the scammer organizations and economy, works about fake payment scams targeting Craigslist. To grow our understanding of scammer methods and how they monetize their structure, methods and objectives with the aim to better these scams, we utilize a data collection system posting ”honeypot understand this niche of the Nigerian scam economy and advertisements” on Craigslist offering products for sale and seek intervention points. The questions addressed include: interact with scammers gathering information on their payment ”How do these organizations monetize their scams?”, ”What methods.
    [Show full text]
  • 2019 SAI Letter: Money for Nothing: Dire Straits in Valuations
    MONEY FOR NOTHING DIRE STRAITS IN VALUATIONS; STOCKS FOR FREE; THE IMPERATIVE OF NO; AND – THE BERKSHIRE FUMBLEROOSKIE, PLUS MORE! 2019 LETTER TO CLIENTS February 14, 2020 CONTENTS MONEY FOR NOTHING DIRE STRAITS IN VALUATIONS; STOCKS FOR FREE; THE IMPERATIVE OF NO; AND – THE BERKSHIRE FUMBLEROOSKIE, PLUS MORE! IN THE LETTER – INTRODUCTION 5 KUDOS 6 INTRINSIC VALUE UPDATE – ADVANTAGES ARE GREATEST AT MARKET HIGHS 8 Forward Expectations 10 Fundamentals Versus the Market 12 THE PETER PRINCIPLE 15 On a Mission 15 The Peter Principle 17 ESG 19 THE IMPERATIVE OF NO: THE LUXURY OF PATIENCE 21 The First Step is the Hardest 21 Understandability 22 Second Verse Same as the First – Business Quality 25 Leverage 26 Management Quality 28 Price Matters 32 THE RELUCTANT ACTIVIST 33 O’Sullivan Industries 34 Mercury General 36 AVX 38 Berkshire Hathaway 41 BLINDERS AT A PEAK 42 The Two-Year Two-Step 42 100 Years of Peaks and Troughs 43 DON’T FEAR THE REPO 47 History 48 Teledyne 48 The “Modern” Era 48 RSU’s Crash the Option Party 50 DEFANGING THE FAB 5 57 Microsoft 57 The Fab 5 59 When Perfection Meets Reality 60 The Nifty Fifty 61 Lower the Bar 62 2 ACTIVE V. PASSIVE UPDATE – Just Set the Table Please 67 READ AND LISTEN 68 BERKSHIRE HATHAWAY: THE SKY IS FALLING 69 Interval Training 70 Above the Fold 75 Bye-Bye Book Value 77 If a Tree Falls in the Forest 80 The Fumblerooskie 85 The Dual Yardsticks of Intrinsic Value 86 Book Value Receives a Complement 87 Oh, What a Night 91 Berkshire Hathaway: Ten-Year Expected Return 94 Estimating Fourth Quarter and Full-Year
    [Show full text]
  • Scattered Canary the Evolution and Inner Workings of a West African Cybercriminal Startup Turned BEC Enterprise
    AGARI CYBER INTELLIGENCE DIVISION THREAT ACTOR DOSSIER Scattered Canary The Evolution and Inner Workings of a West African Cybercriminal Startup Turned BEC Enterprise © 2019 Agari Data, Inc. Executive Summary In a first, Agari has cataloged the evolution of a Nigerian cybercriminal organization from its emergence as a one-man shop into a powerful business email compromise (BEC) enterprise employing dozens of threat actors. BEC has continued to grow, taking the number one spot for greatest financial losses from Internet crime. In a recent report, the FBI’s Internet Crime Complaint Center (IC3) reported that more than 20,000 businesses lost nearly $1.3 billion to BEC attacks in 2018. Globally, BEC attacks have cost more than $13 billion in losses over the past five years. But with the West African gang we’ve named Scattered Canary, we have a deeper look at how business email compromise is connected to the rest of the cybercrime. With over ten years of visibility into Scattered Canary’s operations, we have deep insight into how the group grew from a single cybercriminal working Craigslist scams into an entire organization that consists of dozens of criminals, each with specific tasks. When the first member of Scattered Canary, who, for the purposes of this report, we call Alpha, began his operations, he was a lone wolf—working mostly Craigslist scams as he learned the tricks of the trade from a mentor. However, within a few years, he had honed his craft enough to expand into romance scams, where he met his first “employee,” Beta. Once they had secured enough mules via their romance scams to launder their stolen money, they shifted from targeting individuals to targeting enterprises, and the group’s BEC operation was born.
    [Show full text]
  • Sweepstakes, Lottery and Prize Scams
    Sweepstakes, Lottery and Prize Scams A Better Business Bureau study of how “winners” lose millions through an evolving fraud BBB International Investigations Initiative BBB Chicago [email protected] BBB Dallas [email protected] BBB Omaha [email protected] BBB San Francisco [email protected] BBB St. Louis [email protected] BBB International Investigations Specialist C. Steven Baker [email protected] Issued: June 2018 Introduction weepstakes, lottery and prize scams are among the lottery fraud occur over social media. BBB receives most serious and pervasive frauds operating today. many complaints from victims who were contacted SWhile the scams’ roots go as far back in the culture through Facebook. as gambling, the fraud continues to evolve with the times. • Some fraudsters contact victims on their phones, The scheme currently involves scammers telling people using text messages or pop-ups on the phone they have won a large amount of money in a lottery or browser claiming people have won large gift cards sweepstakes, sometimes by misusing the established or new smartphones. The goal of this type of fraud name of Publishers Clearing House Sweepstakes. Victims is to gather information to sell to other scammers, send money, purportedly for taxes or other costs that and to get people enrolled in “free trial offers.” must be paid before receiving a prize. Unfortunately, the • Another major set of fraudulent actors send winners don’t receive mailings to victims the promised prizes. telling them they have Nearly 500,000 won a large sum of people have money and need to reported this fraud to send a small amount, enforcement agencies SCAM typically $20, to in the U.S.
    [Show full text]