Hawaii's Fraud Prevention and Resource Guide, 3Rd Edition

Total Page:16

File Type:pdf, Size:1020Kb

Hawaii's Fraud Prevention and Resource Guide, 3Rd Edition HAWAII’S FRAUD PREVENTION AND RESOURCE GUIDE 3RD EDITION LETTER FROM GOVERNOR DAVID IGE Aloha! I am proud to introduce the third edition of Hawaii’s Special Message from Fraud Prevention and Resource Guide. Special Message from Governor David Y. Ige Fraud activity continues to grow at an alarming rate. Governor David Y. Ige In Recognition of In 2018, nearly $1.5 billion was lost nationally, and in In Recognition of Group Builders, Inc. Hawaii $6 million. Local families are devastated by the Group Builders, Inc.40th Anniversary depletion of their savings, retirement, and investments. Fraud is a major concern for the elderly, but ultimately th 40 Anniversary anyone can be victimized. ͹ǡʹͲͳͻ ǡ ǤͶͲAs Governor,Ǥ I continue to support the efforts of the Department of the ͹ǡʹͲͳͻcompany’s foundͳͻ͹ͻǡacieto “Lito”Attorney Alcantra, General, Charlie Cook Crime and other Prevention and Justice Assistance Division; ǦǡǤ Department of Commerce and Consumer Affairs, Office of the Securities ǡ ǤͶͲ ǡ ǤCommissioner; the Department of Health, Executive Office on Aging who company’s foundͳͻ͹ͻǡʹͷ acieto “Lito” Alcantra,Hawai‘i Ǥ Charlie Cook and other collaborated to produce this guide on fraud awareness. Being informed, ǦǡǤ Ǥ ǡ Ǥis the best tool to prevent individuals from becoming victims of fraud and ǡ ǡ identity theft. We must practice preventative strategies and help our fellow ʹͷ Hawai‘i Ǥ Award from the Hawai‘i Carpenters Union and the Lifetime Achievement Award from the United Filipino Councilcommunity of Hawai‘i. members. Ǥ ǡ ǤǤ It is important to reportin Hawai‘i these and crimes to the proper authorities. ǡ Ǥ Award from the Hawai‘i Carpenters Union and the Lifetime Achievement Award from the United FilipinoǤ Council of Hawai‘i. Let’s continue to work together to protect our citizens. Ǥ Ǥ Ǥin Hawai‘i and With warmest regards, Ǥ ǡ Ǥ DAVID Y. IGE GDavidovernor, Y. State Ige of Hawai‘i Ǥ Ǥ Governor, State of Hawaii ǡ DAVID Y. IGE Governor, State of Hawai‘i Hawaii’s Fraud Prevention & Resource Guide | 3rd Edition 1 21164_Fraud Prevention Resource Guide.indd 1 5/1/20 11:04 AM Hawaii’s Fraud Prevention and Resource Guide, 3rd Edition This guide is provided by the Department of the Attorney General, Crime Prevention and Justice Assistance Division; Department of Commerce and Consumer Affairs, Office of the Securities Commissioner; and the Department of Health, Executive Office on Aging, Senior Medicare Patrol (SMP Hawaii). This guide was supported in part by grant number 90MPPG0053 from the U.S. Administration for Community Living, Department of Health and Human Services, Washington D.C. 20201. Grantees undertaking projects with government sponsorship are encouraged to express freely their findings and conclusions. Points of view or opinions do not, therefore, necessarily represent official ACL policy. This guide is provided as a public service. The information contained within is for general informational purposes and may not be applicable or relevant to every situation. Neither the State of Hawaii nor any agency, officer, or employee of the State of Hawaii makes any representations, guarantees, or warranties as to the accuracy, completeness, reliability, or suitability of the information provided in this guide. Accordingly, under no circumstances shall the State of Hawaii or any agency, officer, or employee of the State of Hawaii be liable for any special, consequential, or incidental damages that may result from the use of or reliance upon the information in this guide. ©2020 State of Hawaii, Department of the Attorney General, Crime Prevention and Justice Assistance Division; Department of Commerce and Consumer Affairs, Office of the Securities Commissioner; and the Department of Health, Executive Office on Aging, Senior Medicare Patrol (SMP Hawaii). For more information about reprint permission, contact the Department of the Attorney General, Crime Prevention and Justice Assistance Division, (808) 586-1444. May 2020 2 Hawaii’s Fraud Prevention & Resource Guide | 3rd Edition 21164_Fraud Prevention Resource Guide.indd 2 5/1/20 11:04 AM Table of Contents INTRODUCTION ......................................................................................................8 IDENTITY THEFT .................................................................................................... 9 How Do Thieves Get Your Information? ..................................................... 10 Internet Phishing ........................................................................................10 Social Networks .........................................................................................10 Mail .................................................................................................................11 Phone............................................................................................................. 11 Person-To-Person ........................................................................................11 Preventive Tips To Protect Yourself Against Identity Theft .....................12 HOW SCAMMERS ACCESS YOU ....................................................................13 Malware ...............................................................................................................14 Adware .................................................................................................................14 Ransomware ......................................................................................................14 Scammer Tactics ................................................................................................14 ONLINE COMMUNICATIONS: SOCIAL NETWORKS ...........................16 Top 5 Social Media Scams Hidden Urls ..................................................................................................17 Phishing Requests ......................................................................................18 Hidden Charges ..........................................................................................18 Cash Grabs .................................................................................................18 Chain Letters .............................................................................................. 19 Preventive Tips When Using Online Communications: Social Networks ...............................................19 MAIL .......................................................................................................................... 20 Common Mail Fraud and Scams .................................................................20 If You Suspect A Mail Scam ..........................................................................20 Preventive Tips For Mail Fraud .......................................................................21 PERSON TO PERSON ..........................................................................................22 Common Person-to-Person Scams .............................................................22 Preventive Tips For Person-to-Person Fraud .............................................22 PHONE .......................................................................................................................23 Common Phone Scams ..................................................................................23 Preventive Tips For Phone Scams ................................................................23 Hawaii’s Fraud Prevention & Resource Guide | 3rd Edition 3 21164_Fraud Prevention Resource Guide.indd 3 5/1/20 11:04 AM WHAT KINDS OF INFORMATION ARE MOST IMPORTANT TO PROTECT? .............................................................................24 WHAT SHOULD YOU DO IF YOU THINK YOUR INFORMATION HAS BEEN LOST OR STOLEN? ........................................................................24 WHERE TO GET HELP .........................................................................................25 If You Are A Victim Of Identity Theft ...........................................................25 If Your Child Is A Victim Of Identity Theft ................................................. 26 If You Are A Victim Of Tax Identity Theft ....................................................27 How To Get Your Free Credit Report ..........................................................28 Security Freeze ..................................................................................................28 PREVENTIVE TIPS WHEN USING YOUR ELECTRONIC DEVICES ....29 Be Alert To Impersonators ...............................................................................31 Safely Dispose Of Personal Information ......................................................31 Encrypt Your Data ..............................................................................................31 Keep Passwords Private ..................................................................................32 Don’t Overshare On Social Networking Sites ...........................................32 Securing Your Social Security Number ......................................................33 Keeping Your Devices Secure And Use Security Software .................. 33 Avoid Phishing Emails .....................................................................................33 Be Wise About Wi-Fi ......................................................................................34 Lock Up Your Laptop .....................................................................................
Recommended publications
  • Holiday Scams November 2020.Pptx
    Holiday SCAMS COMING TO YOU! MONTGOMERY COUNTY OFFICE OF CONSUMER PROTECTION CONSUMER@MONTGOMERYCOUNTYM D.GOV WHAT WE DO • Handle disputes between merchants and consumers • Provide consumer specialists by phone or in-person • Enforce the County’s consumer protec<on laws • Educaon and Outreach to the Community • License and Regulate certain businesses GENERAL STATISTICS • In 2019, es<mate 50% of all calls to cell phones are from robo- dialers. • In 2019, econsumer.gov had 40,432 reports of internaonal scams, with reported losses exceeding $151 million. •Also in 2019, the Consumer Sen<nel database revealed that 91,560 people reported losing more than $276.5 million to scams based outside the U.S. COVID SCAM STATISTICS • In June 2020, Hetherington Group reported that in NY and NJ alone, ~100 seniors paid over $1M for the grandparent scam (emergency funds to pay for a hospital bill or bail to avoid jail infested with COVID-19). • Per Checkphish, 180k fake IRS websites created to steal your smulus money. • FTC has issued over 200 warning leaers for bogus preven<on and cures. • KY reported fake drive-up COVID tes<ng for insurance data. • MD issued a warning on fake charity scams. • FTC issued warnings about popup websites selling PPE but never shipping. • WSSC issued alert about unnecessary water filters WHO’S TARGETED? Seniors have historically been targeted because: • Seniors have a “nest egg” • Seniors were raised to be polite and trus<ng • Seniors are less likely to report a fraud • Seniors are more likely to live alone “Millennials” are
    [Show full text]
  • Willing to Be Scammed: How Self-Control Impacts Internet Scam Compliance
    Running head: Willing to be scammed: how self-control impacts Internet scam compliance Willing to be scammed: How self-control impacts Internet scam compliance Submitted by David Modic to the University of Exeter as a thesis for the degree of Doctor of Philosophy in Psychology In September 2012 This thesis is available for Library use on the understanding that it is copyright material and that no quotation from the thesis may be published without proper acknowledgement. I certify that all material in this thesis which is not my own work has been identified and that no material has previously been submitted and approved for the award of a degree by this or any other University. Signature: ………………………………………………………….. 2 WILLING TO BE SCAMMED WILLING TO BE SCAMMED 3 Abstract At any given moment in time, there are people complying with fraudulent requests (i.e. scams) on the Internet. While the incidence rates are low (between five and ten percent of the population becoming victims on a yearly basis), the financial and emotional consequences can be high. In this Thesis we composed a unified theory of which factors made individuals more likely to comply with scams and what psychological mechanisms are unwittingly employed by con-men to make their (illegitimate marketing) offers more enticing. The strongest overall predictor of scam compliance (i.e. the extent to which an individual is likely to comply with fraudulent requests) was the level of self-control, regardless of the observed stage of a scam. On the basis of previous research, we postulated and have empirically shown that falling for a scam is a 3-stage process (i.e.
    [Show full text]
  • Important Safety Message Oakdale Police Department
    Safety Important Safety Message Oakdale Police Department Likely Perpetrators Dear• St rangersOakdale preying Residents: on older people who may be isolated,lonely, confused, or desperate for attention. • Caregivers and persons in a position of trust who use fear or guilt to take advantage of a senior. Too• Foften,amilym eresidentsmbers with a crigetminal hooked history and by/or cona artists and scammers whose intent is toh istoryfinancially of drug abuse, exploitaddiction, them. or unemployment. It isn’t just the elderly, as anyone who has received unsolicited and suspicious phone calls, mail or email spam can attest.Signs that an Older Adult Might Thebe Oakdalein Trouble Police Department urges you to review this information and discuss• Unusual it rewithcent changesloved to ones, a person's friends, account, and especially those who may need a littleincluding extra atyphelp.ical withdrawals,This bookletnew person(s) offers information on various scams, tips to avoidadded, being or sudden exploited, repeated use and of the resources seniors' ATM to help. or credit card. If• youA large work check in written a financial to someone youinstitution, don't know. money transfer company or retail • industryA change (which in their powersells of prepaid attorney or cards the or money orders), you are in a unique beneficiarieson their insurance or investment positionaccounts. to stop a scam in progress. In fact, you may be the last person who can• Unusualstop the or unnecessary customer purchases, from suchlosing as buying a large amount of his or her assets. new golf clubs or a diamond bracelet. By• stayingUnnecessary alert, home repairs.sharing concerns, and asking questions you can help protect • yourselfBecoming and close others with a muchavoid younger financial person or harm.
    [Show full text]
  • White Collar Crime by Health Care Providers Pamela H
    NORTH CAROLINA LAW REVIEW Volume 67 | Number 4 Article 7 4-1-1989 Fraud by Fright: White Collar Crime by Health Care Providers Pamela H. Bucy Follow this and additional works at: http://scholarship.law.unc.edu/nclr Part of the Law Commons Recommended Citation Pamela H. Bucy, Fraud by Fright: White Collar Crime by Health Care Providers, 67 N.C. L. Rev. 855 (1989). Available at: http://scholarship.law.unc.edu/nclr/vol67/iss4/7 This Article is brought to you for free and open access by Carolina Law Scholarship Repository. It has been accepted for inclusion in North Carolina Law Review by an authorized administrator of Carolina Law Scholarship Repository. For more information, please contact [email protected]. FRAUD BY FRIGHT: WHITE COLLAR CRIME BY HEALTH CARE PROVIDERSt PAMELA H. Bucyt Fraudby health care providers is one of the most deleterious of all white collar crimes. It is also one of the most difficult to prosecute. In her Article, ProfessorBucy comparesfraud by health care providers with other types of white collar crime and analyzes the theories offraud his- torically used to prosecute health careproviders. She concludes that the strongest theory--prosecutionfor providing unnecessary or substandard health care-is the theory that has been used the least. ProfessorBucy suggests ways for prosecutors to use this theory more often and more effectively in order to combat a problem that ravishes human dignity and personal health as well as the nationalpocketbook "I will apply measures for the benefit of the sick according to my ability and judgment; I will keep them from harm and injustice." Portion of Oath of Hippocrates, Sixth Century B.C.- First Century A.D.; currently administered by many medical schools to graduating medical students.1 "[I c]ould make a million dollars out of the suckers .....
    [Show full text]
  • Senior Scam Alert Guide: Reducing Risk
    Senior Scam Alert Guide: Reducing Risk © 2016 SYNERGY HomeCare, All Rights Reserved. If you are over 65, you probably grew up in an era when business was done with a firm handshake; unfortunately, crooks today are playing on that trust. The Federal Trade Commission says that fraud complaints to its offices by individuals 60 and older rose at least 47 percent between 2012 and 2014. Seniors are the predominant victims of impostor schemes, where criminals pose as authority figures and claim that money is owed. They also are hit hard by scams involving prizes, sweepstakes and gifts. This guide identifies eight of the most common scams that target seniors, along with the common warning signs of each scam and information on how you can avoid becoming a victim. The Attorney General in your State also assists with Consumer Fraud investigations impacting state residents. To find out who is the Attorney General in your own state visit this website: http://www.naag.org/naag/attorneys-general/whos-my-ag.php Senior Scam Alert Guide: Reducing Risk Contractor Fraud How It Works A handyman shows up at your home unsolicited and offers to do repairs at a very reasonable rate. No contracts are signed, and no references are checked. The so-called handyman asks you for money upfront to pay for supplies. He begins the work but then disappears with the money, leaving the job unfinished and you with more household problems than before. How to Avoid It ● Always ask for references. ● Ask to see their license and insurance documents. Contractors need to have a license and insurance to do work.
    [Show full text]
  • Fostering Innovation to Fight Waste, Fraud, and Abuse in Health Care
    FOSTERING INNOVATION TO FIGHT WASTE, FRAUD, AND ABUSE IN HEALTH CARE HEARING BEFORE THE SUBCOMMITTEE ON HEALTH OF THE COMMITTEE ON ENERGY AND COMMERCE HOUSE OF REPRESENTATIVES ONE HUNDRED THIRTEENTH CONGRESS FIRST SESSION FEBRUARY 27, 2013 Serial No. 113–10 ( Printed for the use of the Committee on Energy and Commerce energycommerce.house.gov U.S. GOVERNMENT PRINTING OFFICE 80–160 WASHINGTON : 2013 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Nov 24 2008 12:32 May 15, 2013 Jkt 037690 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 F:\MY DOCS\HEARINGS 113\113-10 CHRIS COMMITTEE ON ENERGY AND COMMERCE FRED UPTON, Michigan Chairman RALPH M. HALL, Texas HENRY A. WAXMAN, California JOE BARTON, Texas Ranking Member Chairman Emeritus JOHN D. DINGELL, Michigan ED WHITFIELD, Kentucky Chairman Emeritus JOHN SHIMKUS, Illinois EDWARD J. MARKEY, Massachusetts JOSEPH R. PITTS, Pennsylvania FRANK PALLONE, JR., New Jersey GREG WALDEN, Oregon BOBBY L. RUSH, Illinois LEE TERRY, Nebraska ANNA G. ESHOO, California MIKE ROGERS, Michigan ELIOT L. ENGEL, New York TIM MURPHY, Pennsylvania GENE GREEN, Texas MICHAEL C. BURGESS, Texas DIANA DEGETTE, Colorado MARSHA BLACKBURN, Tennessee LOIS CAPPS, California Vice Chairman MICHAEL F. DOYLE, Pennsylvania PHIL GINGREY, Georgia JANICE D. SCHAKOWSKY, Illinois STEVE SCALISE, Louisiana ANTHONY D. WEINER, New York ROBERT E. LATTA, Ohio JIM MATHESON, Utah CATHY MCMORRIS RODGERS, Washington G.K. BUTTERFIELD, North Carolina GREGG HARPER, Mississippi JOHN BARROW, Georgia LEONARD LANCE, New Jersey DORIS O.
    [Show full text]
  • Entire Issue (PDF)
    E PL UR UM IB N U U S Congressional Record United States th of America PROCEEDINGS AND DEBATES OF THE 114 CONGRESS, SECOND SESSION Vol. 162 WASHINGTON, THURSDAY, FEBRUARY 4, 2016 No. 21 House of Representatives The House met at 10 a.m. and was last day’s proceedings and announces Red, White, and Blue’s great work in called to order by the Speaker pro tem- to the House his approval thereof. enriching the lives of veterans in need. pore (Mr. MOONEY of West Virginia). Pursuant to clause 1, rule I, the Jour- I had the great privilege of knowing f nal stands approved. Ted personally and was inspired by his kindness, his humor, and his love for DESIGNATION OF THE SPEAKER f his family and country. Ted will al- PRO TEMPORE PLEDGE OF ALLEGIANCE ways be remembered as an honorable The SPEAKER pro tempore laid be- The SPEAKER pro tempore. Will the young man who touched many lives, fore the House the following commu- gentlewoman from New York (Ms. having a lasting positive impact on all nication from the Speaker: STEFANIK) come forward and lead the who knew and loved him. WASHINGTON, DC, House in the Pledge of Allegiance. May his name forever be remembered February 4, 2016. Ms. STEFANIK led the Pledge of Al- in the CONGRESSIONAL RECORD and in I hereby appoint the Honorable ALEXANDER legiance as follows: the great United States of America. X. MOONEY to act as Speaker pro tempore on this day. I pledge allegiance to the Flag of the United States of America, and to the Repub- f PAUL D.
    [Show full text]
  • Craigslist Money Order Scams
    Craigslist Money Order Scams Self-willed Patric foregathers ava while Mohammad always humor his sale metalling laggingly, he ventriloquially.paginates so by-and-by. Revisory VladAgley owe and biochemically. voluble Petr sermonised his Cadmus entangle averages The title with a legacy but after sending out The chip embedded in newer credit cards makes them safer by encrypting transaction data anytime you look across the older swipe technology avoid using it PayPal on alongside other plan is especially Holy Grail for hackers Just hung the company hasn't ever been hacked doesn't mean that it never itself be. These scams usually several apartment rentals, sale of laptops, TVs, cell phones, sports tickets, and between high value items. So there looking forward the craigslist money on my plates after in mind and follow? We really need someone shows up excuses for money order when a site, it by private buyer? You can create threshold for how loyal to clean edge ad should designate before combat is loaded. Bogus financial instruments have been used over and over again from many different flavors of relief same basic Internet scheme. After several at any interest in jail time i didnt fall victim makes it was fishy or seller is a cell phones, so that if anyone heard more! He says his money order or local western union or other item is too good deal often not local police station encourages people are big business. Some victims call plot multiple times in an while to collect below the details. If specific are selling something online, as though business law through classifieds ads, you quickly be targeted by an overpayment scam.
    [Show full text]
  • Medicare Fraud and Improper Billing
    Medicare Fraud and Improper Billing ISSUE BRIEF • July 2018 Part I. Medicare Fraud Prevention Micki Nozaki, Director, California Health Advocates, Senior Medicare Patrol California Health Advocates Founded in 1997, California Health Advocates (CHA) is the leading Medicare advocacy and education non-profit in California. We advocate on behalf of Medicare beneficiaries and their families; conduct public policy research to support improved rights and protections for Medicare beneficiaries; and provide accurate and up-to-date Medicare information for both Medicare beneficiaries and their families as well as the advocates and providers who serve them. Senior Medicare Patrol The California Senior Medicare Patrol (SMP) is a project under CHA. We empower and assist Medicare beneficiaries, their families, and caregivers to prevent, detect, and report healthcare fraud, errors and abuse through: (1) Education: SMPs give presentations to groups, exhibit at events and work one-on-one with Medicare beneficiaries; (2) Counseling: SMPs work to protect older adults’ health, finances and medical identity while saving precious Medicare dollars; and (3) Assisting Medicare beneficiaries, caregivers and family members when they bring their concerns or complaints to the SMP. We determine whether fraud, errors, or abuse are suspected. When fraud or abuse is assumed, we make referrals to the appropriate state and federal agencies for further investigation. There are 54 Senior Medicare Patrol (SMP) programs throughout the country. SMPs are grant-funded projects of the federal U.S. Department of Health and Human Services, Administration for Community Living. Key Lessons 1. The Medicare Trust Fund loses $60–$90 billion every year to fraud, errors, and abuse.Although the exact figure is impossible to measure, the U.S.
    [Show full text]
  • Healthcare Fraud & Abuse Review 2017
    HEALTHCARE FRAUD & ABUSE REVIEW 2017 i | BASS, BERRY & SIMS HEALTHCARE FRAUD & ABUSE REVIEW 2017 1. A LOOK BACK…A LOOK AHEAD 4. NOTEWORTHY SETTLEMENTS 7. ISSUES TO WATCH 12. FALSE CLAIMS ACT UPDATE 37. STARK LAW/ANTI-KICKBACK STATUTE 40. PHARMACEUTICAL AND MEDICAL DEVICE DEVELOPMENTS 42. APPENDIX – 2017 NOTABLE SETTLEMENTS Hospitals and Health Systems Managed Care/Insurance Hospice Laboratory, Pathology, Radiology and Diagnostics Home Health Specialty Care and Other Provider Entities SNFs and Nursing Homes Individual Providers Pharmaceutical and Device Miscellaneous/Non-Providers Pharmacy Services 70. ABOUT BASS, BERRY & SIMS General (HHS-OIG), along with federal and state law enforcement entities, including 30 Medicaid Fraud Control Units, charged more than 400 defendants, including 115 healthcare professionals, A LOOK BACK… in 41 federal districts for allegedly participating in fraudulent healthcare arrangements resulting in over $1.3 billion in false claims.6 A LOOK AHEAD Occurring in the context of combatting the opioid crisis, the takedown focused on individuals allegedly involved in fraudulent billing of Medicare, Medicaid and TRICARE for medically While the uncertainty associated with legislative efforts to repeal unnecessary prescription and compounded drugs that were not actually purchased or distributed to patients covered by a federal healthcare program. In total, more than 120 the Patient Protection and Affordable Care Act (PPACA) dominated defendants, including physicians, were charged in connection with prescribing and distributing most of the headlines for the healthcare industry last year, it was opioids and narcotics. Nearly 300 individuals—including physicians, nurses and pharmacists— mostly business as usual for the government’s healthcare fraud received exclusion notices from HHS-OIG barring future participation in federal healthcare 7 enforcement efforts.
    [Show full text]
  • Sentry Magazine Vol 1 No 6 Fall 1988 Winter 1989
    For the Navy Security community Vol. 1, No. 6 Fall 1988/Wlnter 1989 Industrial Security It really exists , TEMPEST The lnvlslble thr_eal fS6:~.!~Y Vol. 1 No. 6 Fall 1988/Winter 1989 Security communitv Special features From the editor: Since last issue, I've received a lot Moving up·· MA and LDO Promotio11s ....................................... 4 of positive response from the Oeel Unique police duty at Navy's largest shipyard .................... & concerning the changes aod expansion of Sentry. This issue renects even more Security violations ...who's responsible ...............................22 changes, expanding into areas o( Jungle Patrol ........................................................................... 35 lndus1rial Security and Technical The Invisible Security threat·· TEMPEST............ ...............40 Security, and the growing Legal Issues, 'Alligator Muldoon' ·· SECSTA 's Sccuriry Officer .................... 46 Information Security and Personnel Finding fund$ for security .................................................... 50 Security sections. The command is also growing and The Navy Industrial SecUiity Program ............................... 54 changi11g. As of 1 October 1988, we are Defending against terrorism: Part 6: Mail Boml>s .................. 58 now the Naval Investigative Service Command (NISCOM), and have a new headquarters building 10 go with the News & Features new name. Our new loca1io.n is at the Washingto.11 Navy Yard, Building 111. Crime Prevention awards ....................................................
    [Show full text]
  • Online Scammers and Their Mules in Malaysia
    (2020) 26 JUUM 65 - 72 https://doi.org./10.17576/juum-2020-26-08 Online Scammers and Their Mules in Malaysia Mohamad Rizal Abd Rahman ABSTRACT Scammers have adopted various scam techniques in defrauding their victims. One of the most common ways is by engaging mules to assist them. This article discusses relevant legal provisions in Malaysia which are enforced against these illegal activities. The objectives are to highlight the significance of section 415 and 420 in dealing with online scammers, and section 414 and 424 in dealing with mules who assist them. Relevant cases are also cited to enable readers to understand the real scenario behind these scammers and their mules. The article ends with a scenario to be pondered in between human conscience and government intervention in order to prevent, if not eradicate, these illegal activities. Keywords: scam; mule; Malaysia; law INTRODUCTION testimony beforethe US Senate Governmental Affairs Committee on 2 March 2000: Humans are prone to be susceptible to matters which benefit them financially and emotionally. “The human side of computer security is easily exploited and Fake multilevel marketing or pyramid system, constantly overlooked. Companies spend millions of dollars on firewalls, encryption and secure access devices, and it’s money business opportunities, auctions, credit card offers, wasted, because none of these measures address the weakest loans, job vacancies, etc are the most common fake link in the security chain, the people who use, administer, “attractions” that scammers adopt in defrauding operate, and account for computer systems that contain others. Either by way of phishing, pharming, protected information..
    [Show full text]