Preventing Senior Fraud

Total Page:16

File Type:pdf, Size:1020Kb

Preventing Senior Fraud Preventing Senior Fraud NEBRASKA ATTORNEY GENERAL’S OFFICE Nebraska Attorney General’s Office Consumer Protection Division 2115 State Capitol Building Lincoln, NE 68509 (402) 471-2682 ProtectTheGoodLife.Nebraska.gov 2 Dear Fellow Nebraskans, We enjoy a wonderful state with strong roots and hard-working citizens who are surrounded by plentiful resources. One of our greatest gifts is the neighbor we know next door. We wish that everyone were truly “Nebraska Nice” and treated their neighbors with the respect they deserve; however, sadly, scam artists from across the country and around the world attempt to defraud Nebraskans every day. Thisis especially true within our state’s senior population. This fact is well-documented by fraud reports. We know seniors are exploited. Seniors tell us their stories of annoyance, frustration, and pressure exerted by scammers. These expe iences take their toll. Elder fraud and abuse are more than a frustration and nuisance; they are a real threat and one that is impacting not only quality of life but the length of life as well. For the sake of our families, we must push back. Education is the best weapon we have in preparing people to protect themselves. This guide includes information on how to spot, stop, and avoid potential loss if you or someone you know is a target of fraud. Should you experience uncertainty, have feelings of fear or concern, or just wish to pose a question, please call our Consumer Specialists and let us be of service. We are here to protect and help you. In the meantime, trust your instincts. If something seems too good to be true, it probably is. Sincerely, Douglas J. Peterson Nebraska Attorney General 3 4 Table of Contents Imposter Scams..................................................................6 Identity The t.....................................................................10 Foreign Lottery..................................................................13 Charity Fraud....................................................................15 Home Repair Scams..........................................................18 Investment Fraud...............................................................21 Bogus Business & Job Opportunities.................................23 Reduce Junk Mail & Unwanted Telemarketing Calls........26 Top Consumer Tips...........................................................31 Important Phone Numbers................................................33 Important Websites & Email Addresses............................34 5 Imposter Scams 6 Scammers may create fake personas to get you to believe that their story is legitimate. Some pose as friends or relatives stranded in foreign countries If you suspect a without money; others claim to scam, hang up. be working for or affiliated with government agency. Look for the warning signs that may indicate a scam: • You receive a call or email alleging you’ve won a prize or that something is terribly wrong - taxes are unpaid, your government benefits wi l be lost, a family member is in trouble, or your computer has been compromised. • The aller asks you to send them money immediately - preferably by wire transfer or gift card. Credit cards or checks are discouraged. • The aller may ask for access to your computer or other confidential in ormation such as your Social Security number, date of birth, bank account, or credit card numbers. • The aller is insistent and offers to call you back or stays on the line while you do what they are asking you to do. 7 Types of Imposter Scams: Government Imposter Scams: You get a call or an officia Romance Scam: This ype of looking scam often entails an entire letter. The online persona carefully crafted, imposter frequently using pictures stolen claims to from social media sites to be the be from, or ideal person. These elationships affiliate can go on for quite some time with, a before the signs start appearing, government but they invariably lead to requests agency for money. such as the IRS, the Social Security Grandparent/Family Emergency Administration, or Medicare. Scam: A grandparent receives Th y threaten to arrest you, take a phone call (or sometimes an away your benefits or take you e-mail) from a “grandchild.” to court if you don’t pay the debt Usually, the person claims to be you supposedly owe. Th y may traveling, in trouble, and needs also trick you into providing money wired. confidential in ormation. Fake Debt Collector: These Computer Technical Support: scammers pretend to be a debt You receive a call from someone collection agency collecting on claiming to be a computer tech a loan you took out years ago. associated with a well-known Sometimes they create a ficti nal company like Microsoft. Th y say loan; sometimes, they use a real they’ve detected viruses or other loan that was either paid off or malware on your computer and discharged. Either way, they will trick you into giving them remote be aggressive and persistent. access or paying for software or a “fix” you don’t need. 8 What you should do if you for which you have to pay an suspect a scam: administration, registration, or shipping fee to get a prize or • Resist all pressure to make a gift. decision immediately. • Hang up. The l nger a scam artist is allowed to talk, the more likely it is you will be persuaded. • Unless you initiate the phone call or have a prior relationship with the caller, NEVER give personal information Don’t respond to over the phone, even • Don’t send cash by messenger, calls requesting if the caller overnight mail, wire transfer, your personal asks you to gift card, or prepaid card. information. “confi m” If you use cash or a money this transfer — rather than a credit information. card — you may lose your right It’s a trick. to dispute fraudulent charges. The m ney will be gone. • Get all information in writing before you agree to buy. • Don’t pay for something just because you’ll get a “free gift.” Don’t agree to any offer 9 Identity Theft Cases involving government Identity theft often documents and benefits — tops the list of including Medicare, Medicaid, unemployment insurance, and consumer complaints fraudulent tax returns — are reported nationally. rising fastest, followed by new account origination (bank accounts and credit cards), and utility bills, including those for cable TV and cell phones. 10 Look for the warning signs of • Mail The t. Identity thieves are identity theft: prone to stealing mail, looking specifi ally for pre-approved • You are denied credit. credit card and insurance offers. • You get a notice from the IRS • Family, Friend, or In-home about a tax debt that you do not Employee. More than half believe is yours. the time, the thief is a family member, friend, neighbor, in- • You find harges on your credit home employee, or someone at card or withdrawals from a business you frequent. your account that you don’t remember making. • Skimming Devices. Skimming is when the information on a • Personal information, credit credit card is copied then loaded cards, ATM cards, checks, or onto a fake card to be used IDs have been stolen from you. fraudulently. It most frequently occurs in restaurants and at the • You suspect someone has gas pump. fraudulently changed your mailing address. How they hook you: Never give • Phishing. Phishing is a form personal of misrepresentation designed information to trick you into revealing your over the phone. confidential information. It comes in a variety of forms, often appearing as messages from businesses you trust. 11 What you should do to prevent spyware, and fi ewall software identity theft: to guard against hackers that steal personal information. • Don’t carry your Social Security or Medicare card in your wallet. • Check your credit regularly. Request a free credit report at • Be wary of requests by phone www.annualcreditreport.com for your personal information. on a regular basis. You can Don’t respond to incoming request one free credit report phone calls from strangers per year from each of the three requesting your personal major credit reporting agencies, information. Be especially thereby allowing you to check wary of calls from alleged your credit three times per year government agencies. for free. • Secure your information. Keep • Consider placing a freeze on all of your sensitive personal your credit reports. This free documents, including financial tool lets you restrict access to documents, in a safe, secure, your credit report which makes locked place. it more difficult or identity thieves to open new accounts in • Shred it. Shred personal and your name. financial ecords with a micro- cut shredder before throwing them away. • Protect your computer. Consult with a computer professional to make sure your computer system is secure. Install antivirus software, anti- 12 Foreign Lottery Lottery scammers may pressure Be careful! Most you to send money immediately promotions for via wire transfer or prepaid card. Th y may even use your foreign lotteries are bank account numbers to make likely to be phony. unauthorized withdrawals or credit card numbers to run up additional charges. 13 Look for the warning signs that may indicate a scam: • Phantom Riches: News of an offer sounding too good to be true, but one with strings attached. • Urgency: You are pressured to make an immediate decision, Security number, date of birth, take immediate action. bank account information, etc. • Payment via Money Transfer: What you can do to protect yourself: Upfront payment by money transfer, gift card, prepaid • Ignore all mail and phone card, or other payment solicitations for foreign lottery method is required prior to promotions. You cannot win a receiving your “free prize.” contest you did not enter. • Screen your calls using Caller If you respond to ID and through your a foreign lottery answering machine or letter or call, you voicemail. may be placed on a “sucker list.” • Don’t give out your credit card and bank account numbers and never wire money to someone • Probes for Personal you haven’t met. Identifying Information: You are asked to reveal personal • Just hang up the phone.
Recommended publications
  • Office of the Attorney -General
    OFFICE- OF THE,, ATTORNEY- - ---- -GENERAL I -- ' . Department of Law , . - I - Fi~cal ,Year 1993 Annual Report Grant Woods - -A!torney Genera_} Grant Woods Attorney General Robert B. Carey J.M. Howard First Assistant Attorney General Special Counsel Civil Division · Criminal Division H. Leslie Hall Michael C. Cudahy Chief Counsel Chief Counsel Human Services Division Management Services Cecil B. Patterson Thomas G. Augherton Chief Counsel Chief of Administration TRANSMITTAL LETTER STATE OF ARIZONA OFFICE OF THE ATTORNEY GENERAL GRANT WOODS MAIN PHONE: 542-5025 ATTORNEY GENERAL 1275 WEST WASHINGTON, PHOENIX 85007-2926 TELECOPIER : 542-4085 November 5, 1993 The Honorable J. Fife Symington Governor of Arizona State Capitol, Executive Tower 1700 W. Washington Phoenix, Arizona 85007 Dear Governor Symington: I am pleased to submit to you the annual report of the Office of the Attorney General, as required by ARS § 41-194(B). During the past fiscal . year, this administration continued its focus of protecting Arizona's citizens through aggressive enforcement of state laws and providing quality legal representation to state agencies. We have vigorously defended Arizona's environment by prosecuting those that destroy our natural resources, pursued dozens of companies and individuals who prey on unsuspecting consumers, and convicted many notorious criminals for the heinous crimes they perpetrated. We concentrated our administrative efforts into implementing cost-saving measures that allow us to prioritize our resources into retaining and compensating top-quality \egal staff. Loss of well-trained, experienced attorneys from the Attorney General's Office to higher paying private and public sector positions continues to be a problem that requires close scrutiny by the Legislature.
    [Show full text]
  • Pizzagate / Pedogate, a No-Nonsense Fact-Filled Reader
    Pizzagate / Pedogate A No-nonsense Fact-filled reader Preface I therefore determine that serious human rights abuse and corruption around the world constitute an unusual and extraordinary threat to the national security, foreign policy, and economy of the United States, and I hereby declare a national emergency to deal with that threat. —Trump Executive Order 13818, Dec. 20, 2017 Pizzagate means many things to many people, the angle of the lens may be different, but the focus zeros in on a common body of incontestable facts. The fruit of top researchers collected in this reader allows you to compare, correlate and derive a flexible synthesis to suit your needs. An era of wild contradiction is upon us in the press. The psychopathic rumblings that pass for political discourse bring the artform of infotainment to a golden blossoming. A bookstore display table featuring The Fixers; The Bottom-Feeders, Crooked Lawyers, Gossipmongers, and Porn Stars Who Created the 45th President versus Witch Hunt; The Story of the Greatest Mass Delusion in American Political History are both talking about the same man, someone who paid for his campaign out of his own pocket. There were no big donors from China and the traditional bank of puppeteers. This created a HUGE problem, one whose solution threatened the money holders and influence peddlers. New leadership and a presidential order that threw down the gauntlet, a state of emergency, seeded the storm clouds. The starting gun was fired, all systems were go, the race had begun. FISAs and covert operations sprang into action. The envelopes are being delivered, the career decisions are being made, should I move on or stay the course.
    [Show full text]
  • Cyber Frauds, Scams and Their Victims 1St Edition Pdf, Epub, Ebook
    CYBER FRAUDS, SCAMS AND THEIR VICTIMS 1ST EDITION PDF, EPUB, EBOOK Mark Button | 9781138931206 | | | | | Cyber Frauds, Scams and their Victims 1st edition PDF Book Defamation Invasion of privacy Intrusion on Seclusion False light Breach of confidence Abuse of process Malicious prosecution Alienation of affections Criminal conversation Seduction Breach of promise. Big Data Saswat Sarangi author Apart from fraud, there are several related categories of intentional deceptions that may or may not include the elements of personal gain or damage to another individual:. While the precise definitions and requirements of proof vary among jurisdictions, the requisite elements of fraud as a tort generally are the intentional misrepresentation or concealment of an important fact upon which the victim is meant to rely, and in fact does rely, to the harm of the victim. Given the international nature of the web and ease with which users can hide their location, obstacles to checking identity and legitimacy online, and the variety of hacker techniques available to gain access to PII have all contributed to the very rapid growth of Internet fraud. April Cyber security officials in the UK begin to worry as the BBC demonstrates how easy it is to purchase fraudulent rail tickets via the dark web. A year-old-boy was arrested in Northern Ireland for attempting to purchase a Soviet era submachine gun on the dark web. Retrieved 18 September Compounding Malfeasance in office Miscarriage of justice Misprision Obstruction Perjury Perverting the course of justice. Beyond laws that aim at prevention of fraud, there are also governmental and non-governmental organizations that aim to fight fraud.
    [Show full text]
  • Office of the Attorney General
    OFFICE OF THE ATTORNEY GENERAL Department of La,w Fiscal Year 1992 Annual Report Grant Woods Attorney General Grant Woods Attorney General Robert B. Carey First Assistant Attorney General Civil Division Crimin al Divi sion J M. Howard Michael C. Cudahy Chi ef Counsel Chief Counsel Human Services Division Management Services Cecil B. Patterson, Jr. Thomas G. Augherton Chief Counsel Chief of Administration Transmittal Letter OFFICE OF THE ATTORNEY GENERAL GRANT WOOD S MAIN PHONE : 542-5025 ATTORNEY GENERAL 1275 WEST WASHINGTON, PHOENIX 85007 TELECOPIER : 542-4085 October 15, 1992 The Honorable J. Fife Symington Governor of Arizona State Capitol, Executive Tower 1700 W. Washington Phoenix, Arizona 85007 Dear Governor Symington: I am pleased to submit to you the annual report of the Office of the Arizona Attorney General, as required by ARS § 41-194.B. These are difficult financial times for Arizona Government, and I appreciate the support offered by your office and members of the Arizona Legislature to ensure thoughtful funding decisions regarding the Law Department's budget. · I can assure you the men and women of the Attorney General's Office, attorneys and support staff alike, are committed to serving the continuing needs of our state client agencies as well as the needs of all Arizonans. During the past fiscal year, this administration continued to focus on increased civil rights protection for the citizens of our state and continued aggressive education and protection of consumers. The Arizona Legislature's passage of the equivalent legislation to the federal Americans With Disabilities Act, following the previous session's passage of the federally equivalent Fair Housing Act, has proven Arizona to be a leader in enacting in1portant civil rights protections for its citizens.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • “Sucker List” and the Evolution of American Business Fraud
    Edward J. Balleisen The “Sucker List” and the Evolution of American Business Fraud in the early 1950s, mickey mantle burst onto the american sporting scene as a power-hitting outfielder for the New York Yankees. After a bumpy first year in the majors in 1951, this young man from rural Oklahoma soon became a star, attracting close attention from fans, the press, and promoters of all kinds. As a 1957 article in the Saturday Evening Post recounted, Mantle proved especially willing to listen to the pitchmen who promised to multiply his new sources of income. Within a mere week of arriving in New York City, he had signed a contract with a predatory agent who generously promised to secure all manner of endorsement and business deals, modestly reserving a full 50 percent of Mantle’s earnings. Over the next few years, the Yankee phenom periodically took flyers on a series of ill-advised investments, includ- ing $3500 ($1000 paid in cash, the rest through a promissory note) for shares in a fake Oklahoma insurance company, hawked by a notorious sharper “who had served three prison terms and had an ‘FBI file an inch thick.’” Mantle’s remarkable lack of financial acumen meant that he “led the sucker list.” And yet, the Saturday Evening Post profile also noted that Mantle learned from his mistakes rather quickly. By 1957, he had employed a reputable agent who identified excellent endorse- ment opportunities, which dramatically increased his income (Povich 1957, 19–20). This vignette incorporates several key features of the broader history of deception and misrepresentation in American marketplaces.
    [Show full text]
  • An Investigation of Fraud in Nonprofit Organizations: Occurrences and Deterrents
    An Investigation of Fraud in Nonprofit Organizations: Occurrences and Deterrents by Janet Greenlee, Mary Fischer Teresa Gordon,* and Elizabeth Keating The Hauser Center for Nonprofit Organizations Harvard University December 2006 Working Paper No. 35 * Corresponding author – Teresa Gordon, Professor of Accounting, University of Idaho, College of Business & Economics, P O Box 443161, Moscow, ID 83844-3161, Tel: (208) 885-8960, Fax: (208) 885-6296, E-mail: [email protected] Acknowledgements: We would like to thank the Association of Certified Fraud Examiners for permitting the use of their proprietary data in this paper. Brief Biographies for Authors (As of June 28, 2006 and subject to revision/up-dating: one author is out of country) Janet Greenlee, CPA, is Associate Professor of Accounting at the University of Dayton in Ohio. She received her PhD in Accounting from the University of Kentucky, her MBA from UCLA and her MSW from West Virginia University. Mary Fischer, CGFM, is professor of accounting at the University of Texas at Tyler. She received her PhD from the University of Connecticut. She is past-president of the Government and Nonprofit Section of the American Accounting Association. Teresa P. Gordon, CPA, is professor of accounting at the University of Idaho. She received her PhD from University of Houston. She is currently a member of the Accounting Principles Council of the National Association of College and University Business Officers. Elizabeth K. Keating, CPA, is the Eli Goldston Lecturer on Law at Harvard Law School and a Senior Research Fellow Assistant at the Hauser Center for Nonprofit Organizations. She received her PhD in management from the Sloan School of Management at MIT and her MBA from the Stern School of Business at New York University.
    [Show full text]
  • MF2228 Be a Winner, Avoid Consumer Fraud-Fact Sheet
    Outdated Publication, for historical use. CAUTION: Recommendations in this publication may be obsolete. HEALTHIER FUTURES FOR OUR FAMILIES FACT SHEET Be a Winner Avoid Consumer Fraud “...alert con- “You Definitely Have Won .....!” says the • Learn about the agencies, regulations and postcard in your mail box or the caller on the laws that have jurisdiction over fraudulent sumers are telephone. activities. Many frauds and deceptions use the mail their own and telephone, as well as newspaper, Reasons Consumers Fall best protec- magazine, and television advertisements, to Victim to Schemes reach unwary consumers. Frauds and deceptions continue to exist in Others use personal contacts, such as sales tion against the marketplace because of talks, either in a rented space or a regular fraud.” store, or through door-to-door sales. • Consumers’ vulnerability. Whatever the method, alert consumers are • Tactics of unscrupulous sellers. their own best protection against fraud. • Problems in proving deception and enforc- Remember the saying: “If it sounds too good ing laws and regulations against fraud. to be true, it probably is.” Why Consumers are Vulnerable Consumer fraud is a continuing problem in In deceptive situations, greed is perhaps our society. Some con games and swindles the most common motivation on the part of have been around for many years, while consumers. others have developed as telemarketing, The feeling that you can get a lot for a little computerized information, and advertising or even something for nothing has great methods have expanded. appeal. This can be described as the It is harder than ever to distinguish “sweepstakes mentality,” the feeling that “it’s between somewhat exaggerated claims my turn to win, to get a good deal.” (known as puffery), deception, persuasive Other reasons are advertising, and actual fraud.
    [Show full text]
  • Tackling Fraud in the Charity Sector a Summary of Conference Proceedings
    Tackling fraud in the charity sector A summary of conference proceedings Making your money count SUPPORTED BY This guide is for trustees and senior managers of charities in England and Wales as well as their professional advisors. It highlights the main learning points from the first national conference on charity fraud held in late 2015, and provides signposts to extra sources of information, support and best practice. It concludes with a summary of top tips for preventing, detecting and responding to fraud. ABOUT THE ORGANISERS Charity Commission The Charity Commission registers and regulates charities in England and Wales. It ensures that charities meet their legal requirements and provides guidance to help them run themselves as effectively as possible while preventing abuse (including fraud). gov.uk/government/organisations/charity-commission Fraud Advisory Panel The Fraud Advisory Panel is an independent voice of the anti- fraud community. It champions anti-fraud best practice and works to improve fraud awareness, understanding and resilience. fraudadvisorypanel.org Published February 2016 © Fraud Advisory Panel 2016 All rights reserved. If you want to reproduce or redistribute any of the material in this publication you should first get the Fraud Advisory Panel’s permission in writing. Laws and regulations referred to in this Fraud Advisory Panel publication are stated as at 1 February 2016. Every effort has been made to make sure the information it contains is accurate at the time of creation. The Fraud Advisory Panel cannot guarantee the completeness or accuracy of the information in this publication and shall not be responsible for errors or inaccuracies.
    [Show full text]
  • Editor in Chief: Nikos Passas
    VOL 67 Issue 1, 2017 ISSN 0925-4994 Editor in Chief: Nikos Passas Table of Contents Assessing the trends, scale and nature of economic cybercrimes: overview and Issues................................................................... 3 A typology of cybercriminal networks: from low-tech all-rounders to high-tech specialists................................................................ 21 Origin, growth and criminal capabilities of cyber criminal networks. An international empirical analysis................................................. 39 Do police crackdowns disrupt drug cryptomarkets? A longitudinal analysis of the effects of Operation Onymous........................................................................................................... 55 Cyberfraud and the implications for effective risk-based responses: themes from UK research................................................................ 77 Crime Law Soc Change (2017) 67:3–20 DOI 10.1007/s10611-016-9645-3 Assessing the trends, scale and nature of economic cybercrimes: overview and Issues In Cybercrimes, Cybercriminals and Their Policing, in Crime, Law and Social Change Michael Levi1 Published online: 11 October 2016 # Springer Science+Business Media Dordrecht 2016 Abstract Trends in police-recorded and (where they exist) household survey- measured cybercrimes for economic gain are reviewed in a range of developed countries – Australia, Canada, Germany, Hong Kong, the Netherlands, Sweden, the UK and the US - and their implications for criminal policy are considered.
    [Show full text]
  • Research on Sentencing Online Fraud Offences
    Research on Sentencing Online Fraud Offences Jane Kerr, Rachael Owen, Carol McNaughton Nicholls NatCen Social Research Mark Button Centre for Counter Fraud Studies, University of Portsmouth June 2013 Research on Sentencing Online Fraud Offences Jane Kerr, Rachael Owen, Carol McNaughton Nicholls NatCen Social Research Mark Button Centre for Counter Fraud Studies, University of Portsmouth This information is available on the Sentencing Council website at: www.sentencingcouncil.org.uk Disclaimer The views expressed are those of the authors and are not necessarily shared by the Sentencing Council (nor do they represent Sentencing Council or government policy). © Crown Copyright 2013 You may re-use this information (not including logos) free of charge in any format or medium, under the terms of the Open Government Licence. To view this licence, visit http://www.nationalarchives.gov.uk/doc/open-government-licence/ or e-mail: [email protected] Where we have identified any third-party copyright material you will need to obtain permission from the copyright holders concerned. Any enquiries regarding this publication and to request alternative format versions of this report, should be sent to us at [email protected] Acknowledgements We are grateful to Emma Marshall and Trevor Steeples from the Office of the Sentencing Council for their advice, support and assistance for the duration of this research. Thank you also to Mehul Kotecha, Steven Coutinho, Jasmin Keeble and Sarah Dickens for their input to the project. We would like to thank the key stakeholders and the participants in this research for sharing their views, and we would like to thank the staff of organisations that provided their time to assist with the recruitment of participants, especially Rebecca Lambot at Action Fraud.
    [Show full text]
  • Fraud and Financial Crime
    COMPLIANCE TOOLKIT: PROTECTING CHARITIES FROM HARM Chapter 3: Fraud and financial crime APRIL 2011 (REVISED OCTOBER 2017) Contents A Introduction 2 B Fraud and financial crime in the charitable sector 6 C What financial crimes do trustees need to be aware of? 13 D What are the various types of fraud, and how can trustees prevent them happening? 17 E What are the Warning Signs for Fraud? 31 F What practical steps can trustees take to deal with fraud? 33 G Practical advice on dealing with money laundering 38 H Fraud action and response plan 40 J Reporting fraud and money laundering 45 K What else do trustees need to do if the charity has lost money as a result of a crime? 53 L Other connected legislation 54 M Bribery and corruption 55 Chapter 3: Fraud and financial crime 1 A Introduction A1 What is the purpose of this Chapter? This guidance aims to highlight some of the types of fraud and financial crime to which charities are vulnerable and provide practical advice for trustees on how to tackle it. If trustees have an awareness of fraud and financial crime risks they will be better equipped to recognise them. This guidance will also help trustees to devise and implement measures to manage the risks. The guidance is aimed at the trustees and managers of all charities, though it will also be of interest to employees and volunteers. We recognise that smaller charities will not usually have access to the sort of resources and capabilities for managing risks that large organisations enjoy.
    [Show full text]