FRAUD PREVENTION SDPD Crime Prevention October 6, 2017

Total Page:16

File Type:pdf, Size:1020Kb

FRAUD PREVENTION SDPD Crime Prevention October 6, 2017 FRAUD PREVENTION SDPD Crime Prevention October 6, 2017 CONTENTS TELEMARKETING AND OTHER PHONE FRAUD INTERNET FRAUD E-mail Scams Online Shopping Frauds OTHER SCAMS Additional Veterans Benefits Appeals for Help Auto Loan Modification Bankruptcy Foreclosure Rescue Cash-Back Scams Charity Scams Checks from Unknown Parties Check Washing Chimney Sweeps Counterfeit Checks Credit Card Fraud Credit Repair Debt Collection Debt Settlement Dishonest Tax Return Preparers and Related Tax Scams Door-to-Door Solicitors Door-to-Door Solicitations by Unscrupulous Contractors Door-to-Door Solicitations by Unscrupulous Contractors after a Disaster Door-to-Door Sales of Home Security Systems Duct Cleaning Earned Income Tax Credit Ecclesiastical Crime Empty Box Bargains Energy Saving Upgrades Fake Festivals Fake Insurance Tax Form Fraudulent Locksmiths Free Airline Tickets “Free” Trial Offers Gift Card Draining Government Grants Green Dot MoneyPak Cards Green Energy Conservation Health-care Credit Cards 1 Health Insurance Fraud High-Pressure Sales of Financial Products at Free-Meal Seminars High School Diploma HVAC Tune-ups Immigration Services Investment Opportunities IRS Impersonation Scams IRS PCA Impersonation IRS Visits Job Scams Land Investment Fraud Landlord Impersonation Mail Fraud Marijuana Stocks Medicare Enrollment Fraud Medicare and Medi-Cal Services Fraud Moving Scams Obamacare Pension Advances Post-Foreclosure Solicitations Predatory Insurance Sales Practices Predatory Scams Targeted against Military Personnel Prepaid Rental Listing Service Prize Notification and Lotteries Property Tax Relief Psychics Rental Housing Reverse Mortgages Short Sales of Homes Staged Crashes Surprise Gift Sweepstakes Sweetheart or Romance Scams and Online Dating Tax Debt Relief Tax Return and Refund Fraud Tech Support for Computers Third-Party Telephone Bill Charges Timeshare Transactions Travel Reservations Unclaimed Funds Unlicensed Payday Lenders Virtual Kidnapping Weight-Loss Products Wiring Mortgage Closing Costs This paper contains tips for preventing telemarketing and other phone fraud, Internet fraud, and other scams. If you live in San Diego and lose money in any of these scams, report it to the SDPD on its non- emergency number, (619) 531-2000 or (858) 484-3154. Otherwise report it to your local law enforcement agency. Links to additional tips on cybersecurity, identity theft prevention, and cybersecurity for businesses are on the prevention tips page of the SDPD website at ww.sandiego.gov/police/services/prevention/tips. 2 TELEMARKETING AND OTHER PHONE FRAUD Callers claiming to represent everyone from police officers to the disabled take advantage of the public’s sympathy and generosity to the tune of billions of dollars each year. They also offer miracle cures for everything from baldness to cancer, vacation time shares, sweepstakes prizes, chances to earn enormous profits from no-risk, high-yield business and investment opportunities, etc. You can be sure it’s a scam if they ask for money or personal information, especially if they use scare tactics. And you should be suspicious of all solicitors. Here are some examples of phone scam calls. You’ve won a prize or lottery and that you need to send money first or provide bank account information to get your winnings. You’ve won a gift card at a local store and have to come in a pick it up right away. When you leave your home it is burglarized. Call the store to verify the prize. And make sure your home is secure whenever you leave it. You have to act right away. Remember, if it’s a good deal today it will still be a good deal tomorrow. Don’t let anyone rush you into signing anything. He or she is calling on behalf of a charity that has a variation of an official or nationally-recognized name, e.g., Salvation League instead of Salvation Army. He or she is a law enforcement officer and threatens to arrest you if you don’t pay a fine for a bogus charge, e.g., a speeding violation caught on a camera or a failure to appear for jury duty. Payments are usually requested by prepaid debit card or money order. The scammer might also use the name of a real officer, use some of your personal information that can be obtained on the Internet, and make the department’s phone number appear on your Caller ID, all to make the call convincing. No law enforcement employee will ever contact you to demand money or any other form of payment. Hang up immediately if you get this kind of call. If you think you may have missed jury duty, you can call the Superior Court at (619) 450-5757 and press 0 to talk to a person. If you are threatened about an outstanding warrant you can go to www.sdsheriff.net/courts to see if there is one outstanding. You need to attend a sales meeting to take advantage of this limited offer. You need to dial a pay-per-call 900 number. You need to call a number in a strange area code, e.g., 876 which in Jamaica. In addition to soliciting money and personal information, these calls can be expensive with the cost being split between the phone company and the number owner. So the longer you talk, the more money the number owner gets. So never call back a number with an area code you don’t recognize. You can get area-code locations online, e.g., at www.areacodelocations.info/areacodelist.html. He or she is calling from the security or fraud department of your credit- or debit-card company and asks you for the 3-digit security number on the back of your credit card to verify your possession of the card to aid it in a fraud investigation. Medicare now requires a National ID Card and offers to provide one for a fee. Or the caller says a card is being mailed but he needs your bank information. Call the Health Insurance Counseling and Advocacy Program (HICAP) at (800) 434-0222 to report any solicitations regarding Medicare. He or she is a U.S. Food and Drug Administration (FDA) agent or official and that you must pay a fine because you have bought or attempted to buy discounted prescription drugs from a foreign pharmacy. Report such calls to the FDA Office of Criminal Investigations at (800) 521-5783. He or she is calling from Microsoft or some legitimate company to warn you that your computer has a security problem and offers a free security check. You may then be tricked into buying some software or services that you don’t need, giving out credit card information, and allowing access to your computer so malware can be downloaded. If you fall for this scam you should change your computer and financial institution passwords, scan your computer for malware, and contact you bank and credit card providers. He or she is calling from the San Diego County Registrar of Voters and asks for your Social Security Number (SSN) to confirm that you are registered. He or she is calling from the Social Security Administration (SSA) and offers to help you apply for disability benefits. The scammers will try to get you to give or confirm your SSN. You can tell it’s a scam because 3 SSA representatives will not make unsolicited calls and request personal information. If you have questions about disability benefits, or get calls offering help with them, call the SSA (800) 772-1213. You should also report the fraud attempt to the SSA Office of the Inspector General at https://oig.ssa.gov/report. You need to call an unfamiliar phone number because you are the respondent in a lawsuit and have 48 hours to respond. The caller also says that a restraining order had been issued as part of the proceeding. Don’t call the number. Google it to see if it is a legitimate business or the source of threatening phone calls. In the former, the most likely search result would be the website of the business or possibly a website describing that business. In the latter, you might find websites where individuals post harassing, threatening and scamming phone calls that they receive. While the results may not be definitive, you will likely get some idea as to the legitimacy of the source. He or she is calling to enroll you in a health insurance plan under the Affordable Care Act (ACA), commonly called Obamacare, or to sell you an insurance card that is “required” to obtain the insurance. Nobody from the federal or state government will contact you about this, much less ask you to wire money, load money onto a prepaid debit card, or provide your bank account routing number or any other personal information. Hang up on any of these callers. And don’t press any key to talk to an operator or get your name taken off their list. Visit www.HealthCare.gov if you want information about health insurance in your state. He or she is from San Diego Gas & Electric (SDG&E), says that you are late on a payment and if you don’t pay immediately your gas and electricity will be cut off. You are told to buy a prepaid debit card and call back with its number. SDG&E says it does not contact customers by phone and ask for credit card information. Furthermore, under rules mandated by the California Public Utilities Commission (PUC), power companies must tell customers who are behind on their payments that they can set up a bill- payment plan giving them at least three months to get accounts up to date. Call SDG&E at (800) 411-7343 if you have any concerns about being contacted or have any billing-related questions. He or she is from the Department of Motor Vehicles (DMV) and threatens to suspend your driver license if you don’t pay your registration fee now.
Recommended publications
  • Schwab's Fraud Encyclopedia
    Fraud Encyclopedia Updated June 2018 Contents Introduction . 3 Scams . 26 How to use this Fraud Encyclopedia . 3 1 . Properties . 28 2. Romance/marriage/sweetheart/catfishing . 28 Email account takeover . 4 3 . Investments/goods/services . .. 29 1 . Emotion . 7 4 . Prizes/lotteries . 29 2 . Unavailability . 7 5 . IRS . 30 3 . Fee inquiries . 8 6 . Payments . 30 4 . Attachments . 9 Other cybercrime techniques . 31 5 . International wires . 10 1 . Malware . 33 6 . Language cues . 10 2 . Wi-Fi connection interception . 34 7 . Business email compromise . 11 3 . Data breaches . 35 Client impersonation and identity theft . 12 4 . Credential replay incident (CRI) . 37 1 . Social engineering . 14 5 . Account online compromise/takeover . 37 2. Shoulder surfing . 14 6 . Distributed denial of service (DDoS) attack . 38 3. Spoofing . 15 Your fraud checklist . 39 4 . Call forwarding and porting . 16 Email scrutiny . 39 5 . New account fraud . 16 Verbally confirming client requests . 40 Identical or first-party disbursements . 17 Safe cyber practices . 41 1 . MoneyLink fraud . 19 What to do if fraud is suspected . 42 2 . Wire fraud . .. 19 Schwab Advisor Center® alerts . 43 3 . Check fraud . 20 4 . Transfer of account (TOA) fraud . 20 Phishing . 21 1 . Spear phishing . 23 2 . Whaling . .. 24 3 . Clone phishing . 24 4 . Social media phishing . 25 CONTENTS | 2 Introduction With advances in technology, we are more interconnected than ever . But we’re also more vulnerable . Criminals can exploit the connectivity of our world and use it to their advantage—acting anonymously How to use this to perpetrate fraud in a variety of ways . Fraud Encyclopedia Knowledge and awareness can help you protect your firm and clients and guard against cybercrime.
    [Show full text]
  • Office of the Attorney General 940 Cmr 25.00
    940 CMR: OFFICE OF THE ATTORNEY GENERAL 940 CMR 25.00: FORECLOSURE RESCUE TRANSACTIONS AND FORECLOSURE-RELATED SERVICES Section 25.01: Definitions 25.02: Prohibition on Foreclosure Rescue Transactions and Advance Fees for Foreclosure-related Services 25.03: Marketing of Foreclosure-related Services 25.01: Definitions (1) Foreclosure Rescue Transaction shall mean a transaction: (a) by which residential property is conveyed where the person conveying the property (homeowner) maintains a legal or equitable interest in the property conveyed, including, without limitation, a lease interest, an option to acquire the property, or other interest in the property conveyed; and (b) that is designed or intended by the parties to avoid or delay actual or anticipated foreclosure proceedings against a homeowner’s residential property. (2) Foreclosure-related Services shall mean any goods or services related to, or promising assistance in connection with: (a) avoiding or delaying actual or anticipated foreclosure proceedings concerning residential property; or (b) curing or otherwise addressing a default or failure to timely pay, with respect to a residential mortgage loan obligation. Foreclosure-related Services shall include the offer, arrangement or placement of a residential mortgage loan, or other loan, when those goods or services are advertised, offered or promoted in the context described in 940 CMR 25.01(2)(a) and/or (b). 25.02: Prohibition on Foreclosure Rescue Transactions and Advance Fees for Foreclosure-related Services (1) It is an unfair or deceptive act in violation of M.G.L. c. 93A, § 2(a) to, for compensation or gain or for potential or contingent compensation or gain, whether at the time of the transaction or in the future, engage in, arrange, offer, promote, promise, solicit participation in, or carry out a Foreclosure Rescue Transaction in the Commonwealth or concerning residential property in the Commonwealth.
    [Show full text]
  • Fraud Is Fun Or How a Foreclosure Rescue Scam Changed My Life
    Fraud Is Fun or How a Foreclosure Rescue Scam Changed My Life Peter A. Holland We are an association of trial lawyers seeking justice were raised there. Her mother died there. Mary told me that for our clients and for society. As such, we study diligently she earned $50,000 a year, and that the house was mostly paid “how” to try a case. Get the documents. Note the depositions. for – she had over $100,000 in equity in that house. Subpoena the witnesses. Anticipate the objections. Know the Now my stomach is grumbling, but I have to ask: “How judge. Prepare the Opening Statement. did you get into this mess which I cannot get you out of?” But before we can learn “how” to try a client’s case, we Although she was working part time at the time that I met her, should ask the big question: “why?” Specifically, we should previously she was being treated for a very aggressive breast ask at a very deep level: “Why should anyone care about this cancer. Although Mary’s employer was great to her, after her client and this case”? If we cannot articulate the answer this surgery, rehabilitation, chemotherapy and brief relapse, she question, then we can never truly “win” the case. Why we care about a cause can – and should – direct how we try the case. got laid off from work. She fell behind in her mortgage. Getting in touch with the why instead of obsessing on With nowhere to move to, and with the looming the how can restore the creative juices and the passion to your foreclosure sale of the family homestead, Mary turned to a practice.
    [Show full text]
  • Scamming Grandma: Financial Fraud and the Impact on Households Samantha Nielsen
    The Institute for Behavioral and Household Finance White Paper Series Scamming Grandma: Financial Fraud and the Impact on Households Samantha Nielsen Cornell University © 2019 All rights reserved. White Paper No. 7-2019 May 2019 The Institute for Behavioral and Household Finance Cornell University ꞏ The Charles H. Dyson School of Applied Economics and Management ꞏ Warren Hall, Ithaca, NY 14853 ꞏ E-mail: [email protected] ꞏ http://ibhf.cornell.edu Institute of Behavioral and Household Finance – White Paper Series White Paper: 07-2019 Overview more by scammers, are more educated on where to file a complaint, are more interested in Many Americans have experienced or know of a combatting fraud, or a combination of these or person who has fallen victim to a financial scam, other factors. and as social media platforms, online databases, and internet services expand, reports of these Figure 1: Historical Household Financial Fraud Reports scams become more widespread. While word-of- 1,800,000 mouth stories and news vehicles raise awareness, 1,600,000 there is limited existing research analyzing the 1,400,000 financial impact of these scams on households. 1,200,000 1,000,000 Figure 1 illustrates the total number of annual 800,000 600,000 fraud reports in the United States. From 2007 to 400,000 2016, an increase of 157% was seen in the 200,000 number of reported financial scams. More 0 recently, in 2018, there were 1,427,563 fraud reports, which is up 25% from 2017. The amount Source: Consumer Sentinel Network, 2007-2016 of 2018 reports with a monetary loss increased 48% to 358,755 from the year prior, and the Figure 2: Fraud Reports by Age Group median monetary loss for all fraud reports was down $375 in 2018, 13% less than the year prior.1 140,000 120,000 100,000 When we look at fraud reports by age group, a 80,000 significant increase in frauds reported by older 60,000 40,000 age cohorts is identified.
    [Show full text]
  • Cellular Phone Cloning
    Cellular Telephone Cloning Final Report Economic Crimes Policy Team United States Sentencing Commission January 25, 2000 Paula Biderman Anne Blanchard Tom Brown Paula Desio Jean Gabriel Greg Gilmore Christine Kitchens Linda Maxfield Rachel Pierce Mary Rushen Courtney Semisch Andy Purdy, Chair Executive Summary The Economic Crimes Policy Team was chartered to advance the Commission’s work in several areas, including the development of options for implementing the directives contained in the Wireless Telephone Protection Act (Pub. L. No. 105-172; April 24, 1998). Specifically, this act amended 18 U.S.C. § 1029 (Fraud and related activity in connection with access devices) with regard to the cloning of cellular telephones. The report details the background, analysis, findings and policy options identified by the team. Wireless Telephone Protection Act Because of increasing financial losses to the telecommunications industry and the growing use of cloned phones in connection with other criminal activity, Congress passed the Wireless Telephone Protection Act (WTPA) in April 1998. The legislative history indicates that, in amending 18 U.S.C. § 1029, Congress was attempting to address two primary concerns presented by law enforcement and the wireless telecommunications industry.1 First, law enforcement officials testified at congressional hearings that they were having difficulty proving the “intent to defraud” element of the pre-amendment provision regarding some equipment used to clone phones.2 Although there is no legitimate reason to possess the equipment unless an individual is employed in the telecommunications industry, the prosecution often could not prove that the equipment was possessed with the intent to defraud. Second, law enforcement officials often discovered cloning equipment and cloned cellular telephones in the course of investigating other criminal activities, such as drug trafficking and other fraud.
    [Show full text]
  • Prevent Deed Theft and Foreclosure Rescue Scams
    One West Main Street, Suite 200 Rochester, NY 14614 Phone 585.454.4060 Fax 585.454.2518 www.empirejustice.org Memorandum of Support A.1408/S.6171 Protects New York Homeowners by Preventing Deed Theft Scams and Foreclosure Rescue Scams Empire Justice Center strongly supports A.1408(Weinstein)/S.6171(Hamilton) which would amend the real property law, the civil practice law and rules, and the criminal procedure law, in relation to distressed home loans. By updating multiple provisions of law, the bill comprehensively addresses ever evolving deed theft and foreclosure prevention scams. The Home Equity Theft Prevention Act (RPL sec. 265-a) was passed in 2006 to address an early version of “deed theft” scams, where distressed homeowners were being targeted to sign over their deeds with the promise of assistance to get them out of default or foreclosure and buy back their home in a year’s time. While the law has been effective in keeping out a certain kind of transaction in New York State, in recent years newer versions of the scam have emerged. The bill addresses variations of these scams by broadening the type of transaction that is covered under the law. In addition, the bill extends a right of rescission for homeowners who may unwittingly sign a contract for “assistance,” and the deed of their home, from five days to fourteen days. The extended right of rescission is critical because often homeowners are not even aware that they have signed over their deed. The second law amended under this bill is the “Distressed Property Consultant Law” (RPL sec.
    [Show full text]
  • North East Multi-Regional Training Instructors Library
    North East Multi-Regional Training Instructors Library 355 Smoke Tree Business Park j North Aurora, IL 60542-1723 (630) 896-8860, x 108 j Fax (630) 896-4422 j WWW.NEMRT.COM j [email protected] The North East Multi-Regional Training Instructors Library In-Service Training Tape collection are available for loan to sworn law enforcement agencies in Illinois. Out-of-state law enforcement agencies may contact the Instructors Library about the possibility of arranging a loan. How to Borrow North East Multi-Regional Training In-Service Training Tapes How to Borrow Tapes: Call, write, or Fax NEMRT's librarian (that's Sarah Cole). Calling is probably the most effective way to contact her, because you can get immediate feedback on what tapes are available. In order to insure that borrowers are authorized through their law enforcement agency to borrow videos, please submit the initial lending request on agency letterhead (not a fax cover sheet or internal memo form). Also provide the name of the department’s training officer. If a requested tape is in the library at the time of the request, it will be sent to the borrower’s agency immediately. If the tape is not in, the borrower's name will be put on the tape's waiting list, and it will be sent as soon as possible. The due date--the date by which the tape must be back at NEMRT--is indicated on the loan receipt included with each loan. Since a lot of the tapes have long waiting lists, prompt return is appreciated not only by the Instructors' Library, but the other departments using the video collection.
    [Show full text]
  • 2020 Identity Theft Statistics | Consumeraffairs
    2020 Identity Theft Statistics | ConsumerAffairs Trending Home / Finance / Identity Theft Protection / Identity theft statistics Buyers Guides Last Updated 01/16/2020 News Write a review 2020Write a review Identity theft statistics Trends and statistics about identity theft Learn about identity theft protection by Rob Douglas Identity Theft Protection Contributing Editor In 2018, the Federal Trade Commission processed 1.4 million fraud reports totaling $1.48 billion in losses. According to the FTC’s “Consumer Sentinel Network Data Book,” the most common categories for fraud complaints were imposter scams, debt collection and identity theft. Credit card fraud was most prevalent in identity theft cases — more than 167,000 people reported a fraudulent credit card account was opened with their information. Identity theft trends in 2019 In the next year, the Identity Theft Resource Center (ITRC) predicts identity theft protection services will primarily focus on data breaches, data abuse and data privacy. ITRC also predicts that https://www.consumeraffairs.com/finance/identity-theft-statistics.html 2020 Identity Theft Statistics | ConsumerAffairs consumers will become more knowledgeable about how data breaches work and expect companies to provide more information about the specific types of data breached and demand more transparency in general in data breach reports. Cyber attacks are more ambitious According to a 2019 Internet Security Threat Report by Symantec, cybercriminals are diversifying their targets and using stealthier methods to commit identity theft and fraud. Cybercrime groups like Mealybug, Gallmaker and Necurs are opting for off-the-shelf tools and operating system features such as PowerShell to attack targets. Supply chain attacks are up 78% Malicious PowerShell scripts have increased by 1,000% Microsoft Office files make up 48% of malicious email attachments Internet of Things threats on the rise Cybercriminals attack IoT devices an average of 5,233 times per month.
    [Show full text]
  • This Booklet Is Published by the South Pasadena Police Department Crime Prevention Unit 1422 Mission Street South Pasadena, CA 91030 626-403-7270
    This booklet is published by the South Pasadena Police Department Crime Prevention Unit 1422 Mission Street South Pasadena, CA 91030 626-403-7270 www.southpasadenaca.gov/police Scams and Cons INTRODUCTION Most people think they are too smart to A Residents Guide to Prevention fall for a scam or a con. However, according to the Federal Trade Commission in 2011, scam and con Table of Contents artists were able to swindle over 25 million US adults. Introduction 1 Defining Scams and Cons 2 Scam and con artists don’t discriminate, regardless of race or age. They History 2 look for the old and young, male and female. Seniors are often targeted because they are usually lonely and compassionate. Scam and con artists Myths 3 use this to their advantage by trying to befriend them. They offer promises Types of Scams and Cons of quick wealth to seniors who are on a fixed income and are out to steal - Home Repair 4 their savings. People in their 20s are more often victims to scams than - Fake Accidents 5 seniors, but lose less money than seniors. - Distraction Thefts - Residential Burglary 6 Unlike other types of crimes, scams and cons are non-violent crimes and - While Shopping 6 involve the suspect being friendly. Because scam and con artists work by - Foreign Lottery 8 deception, they have excellent communication skills to try to gain one’s - Advance Fee (Nigerian Letter) 9 confidence. - Sweepstakes 10 This booklet was developed to help residents know the various types of - Fake Charities 11 scams and cons that are being used today.
    [Show full text]
  • The Truth About Voter Fraud 7 Clerical Or Typographical Errors 7 Bad “Matching” 8 Jumping to Conclusions 9 Voter Mistakes 11 VI
    Brennan Center for Justice at New York University School of Law ABOUT THE BRENNAN CENTER FOR JUSTICE The Brennan Center for Justice at New York University School of Law is a non-partisan public policy and law institute that focuses on fundamental issues of democracy and justice. Our work ranges from voting rights to redistricting reform, from access to the courts to presidential power in the fight against terrorism. A sin- gular institution—part think tank, part public interest law firm, part advocacy group—the Brennan Center combines scholarship, legislative and legal advocacy, and communications to win meaningful, measurable change in the public sector. ABOUT THE BRENNAN CENTER’S VOTING RIGHTS AND ELECTIONS PROJECT The Voting Rights and Elections Project works to expand the franchise, to make it as simple as possible for every eligible American to vote, and to ensure that every vote cast is accurately recorded and counted. The Center’s staff provides top-flight legal and policy assistance on a broad range of election administration issues, including voter registration systems, voting technology, voter identification, statewide voter registration list maintenance, and provisional ballots. © 2007. This paper is covered by the Creative Commons “Attribution-No Derivs-NonCommercial” license (see http://creativecommons.org). It may be reproduced in its entirety as long as the Brennan Center for Justice at NYU School of Law is credited, a link to the Center’s web page is provided, and no charge is imposed. The paper may not be reproduced in part or in altered form, or if a fee is charged, without the Center’s permission.
    [Show full text]
  • Internet Fraud
    internet fraud Internet Fraud The term ‘internet fraud’ refers to any type of fraud scheme that uses email, web sites, chat rooms or message boards to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. internet fraud may include spam, scams, spyware, identity theft, phishing or internet banking fraud. spam scams Spam is a generic term used to describe The power of the internet and email electronic ‘junk mail’ or unwanted messages communication has made it all too easy sent to your email account or mobile phone. for email scams to flourish. These schemes These messages vary, but are essentially often arrive uninvited by email. Many are commercial and often annoying in their sheer related to the well documented Nigerian volume. They may try to persuade you to Scam or Lotto Scams and use similar buy a product or service, or visit a website tactics in one form or another. where you can make purchases; or they may attempt to trick you into divulging your bank More information about scams is available account or credit card details. from the Australian Competition and Consumer Commission (ACCC) SCAMwatch More information about spam is available website (www.scamwatch.gov.au) from the Australian Communications and the Australian Securities and and Media Authority (ACMA) website Investments Commission FIDO website (www.acma.gov.au). (www.fido.gov.au). Bizsafety | www.afp.gov.au 1 internet fraud Bizsafety suggestions to prevent spyware Phishing loss from Online fraud Spyware is generally considered to be Phishing is a technique used to gain • Consideration of using a low-limit software that is secretly installed on a personal information for the purpose of separate credit card for online computer and takes things from it without identity theft.
    [Show full text]
  • Twitter and Millennial Participation in Voting During Nigeria's 2015 Presidential Elections
    Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2021 Twitter and Millennial Participation in Voting During Nigeria's 2015 Presidential Elections Deborah Zoaka Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Public Administration Commons, and the Public Policy Commons Walden University College of Social and Behavioral Sciences This is to certify that the doctoral dissertation by Deborah Zoaka has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. Lisa Saye, Committee Chairperson, Public Policy and Administration Faculty Dr. Raj Singh, Committee Member, Public Policy and Administration Faculty Dr. Christopher Jones, University Reviewer, Public Policy and Administration Faculty Chief Academic Officer and Provost Sue Subocz, Ph.D. Walden University 2021 Abstract Twitter and Millennial Participation in Voting during Nigeria’s 2015 Presidential Elections by Deborah Zoaka MPA Walden University, 2013 B.Sc. Maiduguri University, 1989 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Public Policy and Administration Walden University May, 2021 Abstract This qualitative phenomenological research explored the significance of Twitter in Nigeria’s media ecology within the context of its capabilities to influence the millennial generation to participate in voting during the 2015 presidential election. Millennial participation in voting has been abysmally low since 1999, when democratic governance was restored in Nigeria after 26 years of military rule, constituting a grave threat to democratic consolidation and electoral legitimacy. The study was sited within the theoretical framework of Democratic participant theory and the uses and gratifications theory.
    [Show full text]