SlideShare a Scribd company logo
1 of 23
Chapter 15
Consumer Fraud
Learning Objectives
• Define what consumer fraud is and understand its seriousness
• Understand identity theft
• Classify the various types of investment and consumer frauds
Consumer Fraud
• Any fraud that targets a consumer or an individual as its victim.
(Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
• Two types of consumer fraud
• Identity Theft
• Consumer Scams
• With advancements in technology consumer fraud has become much more common
than it used to be.
Identity Theft
• Identity theft is using the identity information of another
person to pretend to be them.
(Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
Identity Crime in New Zealand
Identity Crime in New Zealand
•Costs the New Zealand economy approximately $209 million every year.
•133,000 New Zealanders are victims of identity theft annually.
New Zealanders tend to be trusting people which makes New Zealand appear to
be an easy target.
(Department of Internal Affairs, 2013)
Identity Theft Cycle
Stage 1: Discovery
1. Gain Information
2. Verify
Information
Stage 2: Action
1. Accumulating
Documentation
2. Cover-up Actions
Stage 3: Trial
1. 1st Dimensional
2. 2nd
Dimensional
3. 3rd
Dimensional
(Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
Methods of Identity Theft
• Posing as an employee or representative of an organisation
• Shoulder surfing
• Dumpster diving
• Skimming
• Phishing
• Stealing wallets
• Theft of mail
• Social engineering
(Department of Internal Affairs, 2013) & (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
Identity Theft – RFID
Scanning
How Fraudsters Benefit from Identity Theft
• Buy large ticket items
• Take out car, home or other loans
• Establish phone or wireless service in the victims name
• Opening a new bank account
• Filing for bankruptcy under the victims name
• Reporting a victim’s name to the police in lieu of their own
• Opening new credit card accounts
• Changing victim’s mailing address
(Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
How to Minimise the Risks of Identity Theft
• Keep key documents (e.g. birth certificate and passport) in a safe place
• Shred or burn mail with your name and address on it.
• Be careful when publishing information in public places
• Do not log onto internet banking from a shared or public computers.
• Remove all personal information from computers before you dispose of them.
• Be suspicious of any unexpected events
• Request an access register report from Births, Deaths and Marriages
• Request a credit report from Dun & Bradstreet or Veda.
(Department of Internal Affairs, 2011)
Recent NZ Examples of Identity Theft
Other Types of Consumer Scams
• Fraudsters use various schemes to earn a
consumer’s confidence and then use that
confidence to get the consumer to pay or invest
money or provide personal information.
(Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
Other Consumer Scams
Foreign Advance-Fee Scams
•Nigerian money offers
•Clearinghouse scam
•Purchase of real estate scam
•Sale of crude oil at below market price
•Disbursement of money from wills
Other Consumer Scams
Work-at-Home Schemes
•Multilevel marketing
•Chain letters, mail stuffing, product testing, craft assembly
Bogus Mystery Shopping Scams
Telemarketing Fraud
Scams in New Zealand
• Increasing number of people being ripped off through simple scams in New
Zealand
• Complaints are being made almost daily
• Scams would continue until public became more savvy about how the frauds
work
(Leask, 2013)
• New Zealanders reported $4 million lost in scams last year, although the
government estimates that scams could cost the country up to half a billion
dollars every year.
(Wannan, 2013)
How to Detect Scams
• it's addressed to 'My Dear' or something generic
• there are many grammatical or spelling errors in the email
• the email address is a public service domain like Gmail / Yahoo / Livemail
• a bank that you don't have an account with contacts you
• you are urged to visit a website to update your account information or fill in a form with personal information
• you're advised to act fast to claim money or some other prize in a lottery or competition that you never entered
• you inherit money or possessions from someone you've never heard of
• you receive a request from a stranger who needs your help (usually to send money)
• someone on a social networking site asks you to send them money so they can pay debts or so that they can visit you.
(The Department of Internal Affairs, 2013)
Example Consumer Scam
Dear Alsemgeest ,
Please forgive my using this means to reach you but I can't think of any other
way of letting you know of this urgent matter at hand. I am Barrister Davidson
Paul Kingsley ,an Attorney at law and the Personal lawyer to(late)Engineer D.
Alsemgeest , who dwelt and worked here for more than twenty years as a major
contractor and businessman.
On the 21st of june 2005, my client,his wife and their only daugther were
involved in an automobile accident and It was unfortunate my client and his
family all lost their lives and leaving some huge amount of money, Eight
Million Five hundred thousand united state dollars ($8.5 )in a security finance
firm.
I shall detail you on the confirmation of your genuinty to work this out with
me. use your personal email address and contact me directly through this my
private email address davidson-atg@terra.com for more details.
Thanks
Davidson Paul Kingsley  (Esq)
Email: davidson-atg@terra.com
Scams Targeting the Elderly and Uneducated
• Those who are the most susceptible to consumer fraud are the elderly and the
uneducated.
• Elderly are more susceptible to telemarketing fraud than any other type of fraud.
(Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
• “old folk are being targeted by scammers”
• “People in the senior age group might have more money to invest or be seeking
online business opportunities”
• Grey Power Wanganui President seniors would probably be too embarrassed to say
they had been conned.
(Karauria, 2013)
Five Worst Scams in NZ
• Dating and romance scams
• Investment Scams
• Upfront money scams
• Online auction and trading scams
• Online products, advertising and computer hacking
(Ministry of Business Innovation and Employment’s Consumer Affairs Team, 2013)
Recent NZ Consumer Fraud Examples
Investment Scams
• Any fraud which is related to stocks, bonds, commodities, limited
partnerships, real estate, or other types of investments.
(Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
• Perpetrators usually make fraudulent promises or mis-statements
to induce people to make investments
Example
• Ponzi Scheme
Investment Fraud – Red Flags
• Unreasonably high or guaranteed rates of return
• Investments that do not make sound business sense or lack detail
• Pressure to make the investment early
• A business with a history of scandals
• Unaudited financial reports or adverse opinions
• Luxurious lifestyles of principals
• Investment success that is dependent on someone’s “unique expertise”
• Inability to pull out or liquidate the investment
(Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
Conclusion
• Consumer fraud is any type of fraud that targets consumers as its victims.
• Any offer that sounds too good to be true probably is.
• Scams operate in a manner which aim to gain an individual’s confidence and
then use that confidence to defraud the consumer.
• Advances in technology have made consumer fraud much easier for
perpetrators to commit.

More Related Content

What's hot

Securities Regulation Code of the Philippines
Securities Regulation Code of the PhilippinesSecurities Regulation Code of the Philippines
Securities Regulation Code of the PhilippinesPaola Dawn Guerra
 
History of Central Banking from 1791 to the 21st century - The Federal Reserv...
History of Central Banking from 1791 to the 21st century - The Federal Reserv...History of Central Banking from 1791 to the 21st century - The Federal Reserv...
History of Central Banking from 1791 to the 21st century - The Federal Reserv...ANUOLUWAPOADULOJU
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Themmilfamln
 
Anti Money Laundering Framework
Anti Money Laundering FrameworkAnti Money Laundering Framework
Anti Money Laundering Frameworknikatmalik
 
Data Privacy - Rights of the Data Subject
Data Privacy - Rights of the Data SubjectData Privacy - Rights of the Data Subject
Data Privacy - Rights of the Data SubjectJDP Consulting
 
03 chapter 4 deductions from gross estate part 01
03 chapter 4 deductions from gross estate part 0103 chapter 4 deductions from gross estate part 01
03 chapter 4 deductions from gross estate part 01Flab Villasencio
 
Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security Nada G.Youssef
 
Application of blockchain in law
Application of blockchain in lawApplication of blockchain in law
Application of blockchain in lawAashima Johur
 
What is a de facto relationship?
What is a de facto relationship?What is a de facto relationship?
What is a de facto relationship?Jesica Martin
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyThoughtworks
 
Introduction to Transaction Processing Chapter No. 2
Introduction to Transaction Processing   Chapter No. 2Introduction to Transaction Processing   Chapter No. 2
Introduction to Transaction Processing Chapter No. 2Qamar Farooq
 
Right to be forgotten presentation
Right to be forgotten presentationRight to be forgotten presentation
Right to be forgotten presentationreporter1120
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) Kimberly Simon MBA
 

What's hot (20)

Securities Regulation Code of the Philippines
Securities Regulation Code of the PhilippinesSecurities Regulation Code of the Philippines
Securities Regulation Code of the Philippines
 
History of Central Banking from 1791 to the 21st century - The Federal Reserv...
History of Central Banking from 1791 to the 21st century - The Federal Reserv...History of Central Banking from 1791 to the 21st century - The Federal Reserv...
History of Central Banking from 1791 to the 21st century - The Federal Reserv...
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Them
 
Consumer Fraud
Consumer FraudConsumer Fraud
Consumer Fraud
 
Anti Money Laundering Framework
Anti Money Laundering FrameworkAnti Money Laundering Framework
Anti Money Laundering Framework
 
Credit card frauds
Credit card fraudsCredit card frauds
Credit card frauds
 
Data Privacy - Rights of the Data Subject
Data Privacy - Rights of the Data SubjectData Privacy - Rights of the Data Subject
Data Privacy - Rights of the Data Subject
 
03 chapter 4 deductions from gross estate part 01
03 chapter 4 deductions from gross estate part 0103 chapter 4 deductions from gross estate part 01
03 chapter 4 deductions from gross estate part 01
 
Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security
 
Application of blockchain in law
Application of blockchain in lawApplication of blockchain in law
Application of blockchain in law
 
Concepts of Taxation
Concepts of TaxationConcepts of Taxation
Concepts of Taxation
 
Topic 2 BSP.pptx
Topic 2 BSP.pptxTopic 2 BSP.pptx
Topic 2 BSP.pptx
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
What is a de facto relationship?
What is a de facto relationship?What is a de facto relationship?
What is a de facto relationship?
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
 
Introduction to Transaction Processing Chapter No. 2
Introduction to Transaction Processing   Chapter No. 2Introduction to Transaction Processing   Chapter No. 2
Introduction to Transaction Processing Chapter No. 2
 
Resume format
Resume formatResume format
Resume format
 
Right to be forgotten presentation
Right to be forgotten presentationRight to be forgotten presentation
Right to be forgotten presentation
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 

Viewers also liked

Respite Now's Senior Scam Alert presentation
Respite Now's Senior Scam Alert presentationRespite Now's Senior Scam Alert presentation
Respite Now's Senior Scam Alert presentationRespiteNowGreg
 
Elder Care: Fraud Protection
Elder Care: Fraud ProtectionElder Care: Fraud Protection
Elder Care: Fraud Protectioncaretocontinue
 
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015Age Action
 
Protect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the ElderlyProtect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the ElderlyGlass Jacobson
 
Fraud Committed Against the Elderly in N.C.
Fraud Committed Against the Elderly in N.C.Fraud Committed Against the Elderly in N.C.
Fraud Committed Against the Elderly in N.C.NCCPPR
 
Neuroeconomics Evidence for Decision-making Theory
Neuroeconomics Evidence for Decision-making TheoryNeuroeconomics Evidence for Decision-making Theory
Neuroeconomics Evidence for Decision-making TheoryMeiling XU
 
Navigating Elder Financial Abuse
Navigating Elder Financial AbuseNavigating Elder Financial Abuse
Navigating Elder Financial AbuseMegan Yip
 
5.4 whose laws rule the web
5.4 whose laws rule the web 5.4 whose laws rule the web
5.4 whose laws rule the web Hasan Dang
 
Scammin Elderly PP
Scammin Elderly PPScammin Elderly PP
Scammin Elderly PPKatelyn Lutz
 
HCS 420 Elderly Scams Presentation FINAL
HCS 420 Elderly Scams Presentation FINALHCS 420 Elderly Scams Presentation FINAL
HCS 420 Elderly Scams Presentation FINALGina Leymeister
 
Elder Abuse: A Concern For Social Work Practice ...Lloyd Dsouza
Elder Abuse: A Concern For Social Work Practice ...Lloyd DsouzaElder Abuse: A Concern For Social Work Practice ...Lloyd Dsouza
Elder Abuse: A Concern For Social Work Practice ...Lloyd Dsouzadyutirajagiri
 
Overview of Neuroeconomics
Overview of NeuroeconomicsOverview of Neuroeconomics
Overview of Neuroeconomicsdpirouz
 
Elder financial exploitation gov conf presentation
Elder financial exploitation gov conf presentation Elder financial exploitation gov conf presentation
Elder financial exploitation gov conf presentation rexnayee
 
EC4024 Financial Economics Lecture 19L Neurofinance
EC4024 Financial Economics Lecture 19L NeurofinanceEC4024 Financial Economics Lecture 19L Neurofinance
EC4024 Financial Economics Lecture 19L NeurofinanceStephen Kinsella
 
Utility and neuroscience: a mechanistic approach of decision-making and ratio...
Utility and neuroscience: a mechanistic approach of decision-making and ratio...Utility and neuroscience: a mechanistic approach of decision-making and ratio...
Utility and neuroscience: a mechanistic approach of decision-making and ratio...Benoit Hardy-Vallée, Ph.D.
 

Viewers also liked (20)

Respite Now's Senior Scam Alert presentation
Respite Now's Senior Scam Alert presentationRespite Now's Senior Scam Alert presentation
Respite Now's Senior Scam Alert presentation
 
Elder Care: Fraud Protection
Elder Care: Fraud ProtectionElder Care: Fraud Protection
Elder Care: Fraud Protection
 
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
Ulster Bank - Financial Elder Abuse Project in Ireland, 2015
 
Protect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the ElderlyProtect Your Parents- Avoiding Scams that Target the Elderly
Protect Your Parents- Avoiding Scams that Target the Elderly
 
Fraud Committed Against the Elderly in N.C.
Fraud Committed Against the Elderly in N.C.Fraud Committed Against the Elderly in N.C.
Fraud Committed Against the Elderly in N.C.
 
Neuroeconomics Evidence for Decision-making Theory
Neuroeconomics Evidence for Decision-making TheoryNeuroeconomics Evidence for Decision-making Theory
Neuroeconomics Evidence for Decision-making Theory
 
Navigating Elder Financial Abuse
Navigating Elder Financial AbuseNavigating Elder Financial Abuse
Navigating Elder Financial Abuse
 
5.4 whose laws rule the web
5.4 whose laws rule the web 5.4 whose laws rule the web
5.4 whose laws rule the web
 
Scammin Elderly PP
Scammin Elderly PPScammin Elderly PP
Scammin Elderly PP
 
Senior scams
Senior scamsSenior scams
Senior scams
 
Elder Abuse on the Front Lines
Elder Abuse on the Front LinesElder Abuse on the Front Lines
Elder Abuse on the Front Lines
 
HCS 420 Elderly Scams Presentation FINAL
HCS 420 Elderly Scams Presentation FINALHCS 420 Elderly Scams Presentation FINAL
HCS 420 Elderly Scams Presentation FINAL
 
Keeping The Elderly Safe In The 21st Century
Keeping The Elderly Safe In The 21st CenturyKeeping The Elderly Safe In The 21st Century
Keeping The Elderly Safe In The 21st Century
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
What is neuroeconomics
What is neuroeconomicsWhat is neuroeconomics
What is neuroeconomics
 
Elder Abuse: A Concern For Social Work Practice ...Lloyd Dsouza
Elder Abuse: A Concern For Social Work Practice ...Lloyd DsouzaElder Abuse: A Concern For Social Work Practice ...Lloyd Dsouza
Elder Abuse: A Concern For Social Work Practice ...Lloyd Dsouza
 
Overview of Neuroeconomics
Overview of NeuroeconomicsOverview of Neuroeconomics
Overview of Neuroeconomics
 
Elder financial exploitation gov conf presentation
Elder financial exploitation gov conf presentation Elder financial exploitation gov conf presentation
Elder financial exploitation gov conf presentation
 
EC4024 Financial Economics Lecture 19L Neurofinance
EC4024 Financial Economics Lecture 19L NeurofinanceEC4024 Financial Economics Lecture 19L Neurofinance
EC4024 Financial Economics Lecture 19L Neurofinance
 
Utility and neuroscience: a mechanistic approach of decision-making and ratio...
Utility and neuroscience: a mechanistic approach of decision-making and ratio...Utility and neuroscience: a mechanistic approach of decision-making and ratio...
Utility and neuroscience: a mechanistic approach of decision-making and ratio...
 

Similar to Chapter 15Consumer Fraud by Rachel

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudMatt Smith
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Barbara O'Neill
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Trainingswalton4
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentationpat7777
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud Dixita S
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada- Mark - Fullbright
 

Similar to Chapter 15Consumer Fraud by Rachel (20)

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft Overview Webinar
Identity Theft Overview WebinarIdentity Theft Overview Webinar
Identity Theft Overview Webinar
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
ONLINE FRAUD GUIDE
ONLINE FRAUD GUIDEONLINE FRAUD GUIDE
ONLINE FRAUD GUIDE
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Idt workshop group benefits
Idt workshop group benefitsIdt workshop group benefits
Idt workshop group benefits
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 

More from VidaB

E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedVidaB
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce JenVidaB
 
Chapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by EmmaChapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by EmmaVidaB
 
Chapter 16 B Artika
Chapter 16 B ArtikaChapter 16 B Artika
Chapter 16 B ArtikaVidaB
 
Chapter 14 by Svetlana
Chapter 14 by SvetlanaChapter 14 by Svetlana
Chapter 14 by SvetlanaVidaB
 
Chapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosuresChapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosuresVidaB
 
Chapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory FraudChapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory FraudVidaB
 
Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet VidaB
 
Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud VidaB
 
Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud  Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud VidaB
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methodsVidaB
 
Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen VidaB
 
Chapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudChapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudVidaB
 
Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud VidaB
 
Chapter 1 the nature of fraud
Chapter 1 the nature of fraudChapter 1 the nature of fraud
Chapter 1 the nature of fraudVidaB
 
Week 1 audit and assurance services
Week 1 audit  and assurance servicesWeek 1 audit  and assurance services
Week 1 audit and assurance servicesVidaB
 

More from VidaB (16)

E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
Chapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by EmmaChapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by Emma
 
Chapter 16 B Artika
Chapter 16 B ArtikaChapter 16 B Artika
Chapter 16 B Artika
 
Chapter 14 by Svetlana
Chapter 14 by SvetlanaChapter 14 by Svetlana
Chapter 14 by Svetlana
 
Chapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosuresChapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosures
 
Chapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory FraudChapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory Fraud
 
Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet
 
Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud
 
Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud  Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
 
Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen
 
Chapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudChapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraud
 
Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud
 
Chapter 1 the nature of fraud
Chapter 1 the nature of fraudChapter 1 the nature of fraud
Chapter 1 the nature of fraud
 
Week 1 audit and assurance services
Week 1 audit  and assurance servicesWeek 1 audit  and assurance services
Week 1 audit and assurance services
 

Recently uploaded

Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 

Recently uploaded (20)

Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 

Chapter 15Consumer Fraud by Rachel

  • 2. Learning Objectives • Define what consumer fraud is and understand its seriousness • Understand identity theft • Classify the various types of investment and consumer frauds
  • 3. Consumer Fraud • Any fraud that targets a consumer or an individual as its victim. (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012) • Two types of consumer fraud • Identity Theft • Consumer Scams • With advancements in technology consumer fraud has become much more common than it used to be.
  • 4. Identity Theft • Identity theft is using the identity information of another person to pretend to be them. (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
  • 5. Identity Crime in New Zealand Identity Crime in New Zealand •Costs the New Zealand economy approximately $209 million every year. •133,000 New Zealanders are victims of identity theft annually. New Zealanders tend to be trusting people which makes New Zealand appear to be an easy target. (Department of Internal Affairs, 2013)
  • 6. Identity Theft Cycle Stage 1: Discovery 1. Gain Information 2. Verify Information Stage 2: Action 1. Accumulating Documentation 2. Cover-up Actions Stage 3: Trial 1. 1st Dimensional 2. 2nd Dimensional 3. 3rd Dimensional (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
  • 7. Methods of Identity Theft • Posing as an employee or representative of an organisation • Shoulder surfing • Dumpster diving • Skimming • Phishing • Stealing wallets • Theft of mail • Social engineering (Department of Internal Affairs, 2013) & (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
  • 8. Identity Theft – RFID Scanning
  • 9. How Fraudsters Benefit from Identity Theft • Buy large ticket items • Take out car, home or other loans • Establish phone or wireless service in the victims name • Opening a new bank account • Filing for bankruptcy under the victims name • Reporting a victim’s name to the police in lieu of their own • Opening new credit card accounts • Changing victim’s mailing address (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
  • 10. How to Minimise the Risks of Identity Theft • Keep key documents (e.g. birth certificate and passport) in a safe place • Shred or burn mail with your name and address on it. • Be careful when publishing information in public places • Do not log onto internet banking from a shared or public computers. • Remove all personal information from computers before you dispose of them. • Be suspicious of any unexpected events • Request an access register report from Births, Deaths and Marriages • Request a credit report from Dun & Bradstreet or Veda. (Department of Internal Affairs, 2011)
  • 11. Recent NZ Examples of Identity Theft
  • 12. Other Types of Consumer Scams • Fraudsters use various schemes to earn a consumer’s confidence and then use that confidence to get the consumer to pay or invest money or provide personal information. (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
  • 13. Other Consumer Scams Foreign Advance-Fee Scams •Nigerian money offers •Clearinghouse scam •Purchase of real estate scam •Sale of crude oil at below market price •Disbursement of money from wills
  • 14. Other Consumer Scams Work-at-Home Schemes •Multilevel marketing •Chain letters, mail stuffing, product testing, craft assembly Bogus Mystery Shopping Scams Telemarketing Fraud
  • 15. Scams in New Zealand • Increasing number of people being ripped off through simple scams in New Zealand • Complaints are being made almost daily • Scams would continue until public became more savvy about how the frauds work (Leask, 2013) • New Zealanders reported $4 million lost in scams last year, although the government estimates that scams could cost the country up to half a billion dollars every year. (Wannan, 2013)
  • 16. How to Detect Scams • it's addressed to 'My Dear' or something generic • there are many grammatical or spelling errors in the email • the email address is a public service domain like Gmail / Yahoo / Livemail • a bank that you don't have an account with contacts you • you are urged to visit a website to update your account information or fill in a form with personal information • you're advised to act fast to claim money or some other prize in a lottery or competition that you never entered • you inherit money or possessions from someone you've never heard of • you receive a request from a stranger who needs your help (usually to send money) • someone on a social networking site asks you to send them money so they can pay debts or so that they can visit you. (The Department of Internal Affairs, 2013)
  • 17. Example Consumer Scam Dear Alsemgeest , Please forgive my using this means to reach you but I can't think of any other way of letting you know of this urgent matter at hand. I am Barrister Davidson Paul Kingsley ,an Attorney at law and the Personal lawyer to(late)Engineer D. Alsemgeest , who dwelt and worked here for more than twenty years as a major contractor and businessman. On the 21st of june 2005, my client,his wife and their only daugther were involved in an automobile accident and It was unfortunate my client and his family all lost their lives and leaving some huge amount of money, Eight Million Five hundred thousand united state dollars ($8.5 )in a security finance firm. I shall detail you on the confirmation of your genuinty to work this out with me. use your personal email address and contact me directly through this my private email address davidson-atg@terra.com for more details. Thanks Davidson Paul Kingsley  (Esq) Email: davidson-atg@terra.com
  • 18. Scams Targeting the Elderly and Uneducated • Those who are the most susceptible to consumer fraud are the elderly and the uneducated. • Elderly are more susceptible to telemarketing fraud than any other type of fraud. (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012) • “old folk are being targeted by scammers” • “People in the senior age group might have more money to invest or be seeking online business opportunities” • Grey Power Wanganui President seniors would probably be too embarrassed to say they had been conned. (Karauria, 2013)
  • 19. Five Worst Scams in NZ • Dating and romance scams • Investment Scams • Upfront money scams • Online auction and trading scams • Online products, advertising and computer hacking (Ministry of Business Innovation and Employment’s Consumer Affairs Team, 2013)
  • 20. Recent NZ Consumer Fraud Examples
  • 21. Investment Scams • Any fraud which is related to stocks, bonds, commodities, limited partnerships, real estate, or other types of investments. (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012) • Perpetrators usually make fraudulent promises or mis-statements to induce people to make investments Example • Ponzi Scheme
  • 22. Investment Fraud – Red Flags • Unreasonably high or guaranteed rates of return • Investments that do not make sound business sense or lack detail • Pressure to make the investment early • A business with a history of scandals • Unaudited financial reports or adverse opinions • Luxurious lifestyles of principals • Investment success that is dependent on someone’s “unique expertise” • Inability to pull out or liquidate the investment (Albrecht, Albrecht, Albrecht, & Zimbleman, 2012)
  • 23. Conclusion • Consumer fraud is any type of fraud that targets consumers as its victims. • Any offer that sounds too good to be true probably is. • Scams operate in a manner which aim to gain an individual’s confidence and then use that confidence to defraud the consumer. • Advances in technology have made consumer fraud much easier for perpetrators to commit.

Editor's Notes

  1. <object width="425" height="344"><param name="movie" value="http://swf.tubechop.com/tubechop.swf?vurl=lLAFhTjsQHw&start=30&end=249&cid=1484417"></param><embed src="http://swf.tubechop.com/tubechop.swf?vurl=lLAFhTjsQHw&start=30&end=249&cid=1484417" type="application/x-shockwave-flash" allowfullscreen="true" width="425" height="344"></embed></object> http://www.youtube.com/watch?v=lLAFhTjsQHw 0:30 – 4:09