SlideShare uma empresa Scribd logo
1 de 81
Baixar para ler offline
Welcome to the 

Military Families Learning Network Webinar:

Common Consumer Frauds !
& How to Avoid Them
This material is based upon work supported by the National Institute of Food and Agriculture, U.S. Department of Agriculture,
and the Office of Family Policy, Children and Youth, U.S. Department of Defense under Award No. 2010-48869-20685.
A few days after the presentation, we will send an evaluation and links to an
archive and resources.
"
We appreciate your feedback. To receive these emails, please enter your
email address in the chat box before we start the recording.
"
Once we start the recording, all chat will be recorded and archived.
This material is based upon work supported by the National Institute of Food and Agriculture, U.S. Department of Agriculture,
and the Office of Family Policy, Children and Youth, U.S. Department of Defense under Award No. 2010-48869-20685.
www.eXtension.org/militaryfamilies facebook.com/militaryfamilies
To receive notifications of future webinars and other learning opportunities
from the Military Families Learning Network, sign up for the Military Families
Learning Network Email Mailing list at: http://bit.ly/MFLNlist
bit.ly/MFLNwebinars
blogs.eXtension.org/militaryfamilies twitter.com/MilFamLN
Welcome to the 

Military Families Learning Network Webinar:

Common Consumer Frauds!
& How to Avoid Them
Additional Resources Available "
https://learn.extension.org/events/1500
Today’s Speakers
Dr. Barbara O’Neill, financial resource management specialist for
Rutgers Cooperative Extension, has been a professor, financial
educator, and author for 35 years. She has written over 1,500
consumer newspaper articles and over 125 articles for academic
journals, conference proceedings, and other professional
publications.  She is a certified financial planner (CFPÒ), chartered
retirement planning counselor (CRPCÒ), accredited financial
counselor (AFC), certified housing counselor (CHC), and certified
financial educator (CFEd). 
Carol Kando-Pineda is Counsel in the FTC’s Division of Consumer and
Business Education where she leads teams to create and distribute free
resources to help people spot, stop and avoid fraud, manage their money
and make wise buys. Those resources include print materials, websites,
social media posts, interactive content, audio, and video. She also builds
outreach partnerships with large organizations, like the military community
and library systems. Carol began her FTC career as a staff attorney
bringing false advertising cases; she then became the agency’s Legislative
Counsel, serving as a liaison between the Commission and Congress. She
earned her A.B. from Harvard College and her J.D. from Suffolk University
School of Law.
Common Consumer Frauds
and How to Avoid Them

Barbara O’Neill, Ph.D., CFP®, AFC, CHC
Rutgers Cooperative Extension
oneill@aesop.rutgers.edu
Webinar Objectives
• Describe identity theft: types, risks, risk
reduction strategies
• Describe phishing
• Describe common investment frauds
• Describe tax refund identity theft
• Provide links to online fraud resources
Back in the Day 

(1920s & 1930s)…
….What did people do when they
wanted to steal a lot of money?
"
They robbed banks!
Some Famous Bank Robbers
• Bonnie and Clyde
• John Dillinger
• Willie Sutton
Today Much Financial Theft is
Through Identity Theft
• Fastest growing U.S. white collar crime
• Thief may not know victim
• No need to use physical violence
• Less risk of being caught
• Technology and carelessness with data (by
consumers and businesses) help thieves
What is Identity Theft?
Identity Theft
Identity theft is a crime of stealing key pieces of someone’s
identifying information and using it to commit a crime:
• Name
• Address
• Social Security number
• Birth date
• Mother’s maiden name
• Driver’s license number
• Military ID number
• Passwords
Common Forms of Identity Theft
• Credit card fraud
• Communications services fraud
• Bank fraud
• Fraudulent loans
• Fraudulent tax returns
• Internet fraud (e.g., phishing)
• Medical identity theft
Does Anyone have a Personal
Identity Theft Experience?
Please share your story to help others:
•Cause (if known)
•How you found out your identity was stolen?
•What happened next?
•Was the issue resolved?
Are YOU at Risk For Identity
Theft?
Take this 15-question quiz adapted from
Experian to find out
"
The lower your score, the better
1. You receive offers of pre-approved credit and, if
you decide not to accept them, you do not shred
them (10 points)
2. You carry your Social Security card (or other
document with your SS number on it) in your wallet
(10 points)
3. You do not have a post office box or a locked,
secured mailbox (5 points)
4. You drop off your outgoing mail at an open,
unlocked box or basket (10 points)
5. You have sensitive personal data posted online
(e.g., a blog or social media) (10 points)
6. You do not shred or tear banking and credit
information when you throw it in the trash (10
points)
7. You provide your Social Security number (SSN)
whenever asked (20 points)
– Add 5 points if you provide it orally without checking
to see who might be listening
8. You are required to use your SSN as an
employee or student ID number (5 points)
9. Your SSN is printed on an employee badge
that you wear (10 points)
10. Your SSN or driver’s license number is printed
on your personal checks (20 points)
11. You are listed in a Who’s Who Guide (5 points)
12. You carry an insurance card in your wallet and it
contains your SSN or your spouse’s SSN (20 points)
13. You have not ordered a copy of your credit report for
at least two years (10 points)
14. You write checks with a “regular” pen instead of a gel
pen with ink that cannot be “washed” (5 points)
15. You do not believe that people would root around in
your trash looking for credit or financial information (10
points)
What Your Identity Theft
Risk Score Means
• 100+ Points: You are at HIGH RISK. You should purchase a
paper shredder and become more security aware in document
handling.
"
• 50-100 points: Your odds of being victimized are about
average; higher if you have good credit.
"
• 0-50 points: Congratulations! You have a high security IQ.
Keep up the good work.
So How Did You Do?
FTC Identity Theft Video #1:
How Identity Theft Happens
http://www.youtube.com/watch?v=-IEBVIh7bzc
FTC Identity Theft Video #2:
Case Stories of Real People
http://www.youtube.com/watch?v=OoPJImjP1ZQ
How Identity Theft Occurs
Identity thieves…
• steal wallets and purses containing your ID
• steal your mail
• complete false “change of address” forms
• rummage through trash (“dumpster diving”)
• pose fraudulently as someone else to get your information
• obtain data online: e-mail spam, social media, chats, etc.
More Ways Identity Theft Occurs
Identity thieves…
• steal business or personnel records at your workplace
• find personal info in your home
• use info you put on the Internet
• buy personal info from “inside sources”
• “shoulder surf” at ATMs and telephones
• get data from your computer at public Internet sites
• hack into data bases and steal PII
Scams Often Follow 

Current Events
• Natural disasters
• New government programs
– Medicare Part D
– Affordable Care Act
– Tax law changes
• Other current events (e.g., 9/11, recession)
Reducing the Risk of
Identity Theft
• Destroy credit card applications and unnecessary bank
and billing statements
• Avoid giving your SSN unless it’s absolutely necessary
-- use other identifiers
• Pay attention to billing cycles
• Guard your mail from theft
• Don’t hand credit card to anyone out of sight
• Put passwords on cell phone
More Ways to Reduce the 

Risk of Identity Theft
• Carry as little identification information as possible
• Limit the number of credit cards you carry
• Don’t give personal identification on the phone
unless you initiate the call
• Be cautious with personal info in your home
• Check on who has access to your personal info at
work
Still More Ways to Reduce the
Risk of Identity Theft
• Don’t carry your SS card or SS number
• Save ATM and credit card receipts to check
against statements
• Reconcile your checkbook balance monthly
• Alert family members to dangers of pretexting
• Make sure your credit reports are accurate
Any Other Identity Theft Risk Reduction
Strategies?
How to Get Your Credit Report
www.annualcreditreport.com
"
Report can be ordered
• Online
• By mail
• By telephone: 877-322-8228
Medical Identity Theft Video
http://www.youtube.com/watch?v=EePx7STsnOI
Children’s Identity Theft Video
http://today.msnbc.msn.com/id/42997608/ns/today-
parenting_and_family/t/stop-id-thieves-stealing-your-
kids-credit/
What is Phishing?
• The act of sending e-mails falsely claiming to be an established
enterprise in an attempt to scam the user into surrendering
private information that will be used to commit identity theft
"
• The e-mail directs users to visit a fake Web site where they are
asked to update personal information, such as passwords and
Social Security, credit card, and bank account numbers, that the
legitimate organization already has
Whiteboard Phishing Video
http://www.youtube.com/watch?v=K8lWLwuiDwk
Red Flags of a Phishing Scam
• E-mails that direct users to a Web site to “validate” or
“verify” or “update” personal info
• E-mails warning that accounts will be closed
• Grammatical errors and typos
• References to current events in the news
• Words Like “Urgent” and “Important”
• Requests for PII from people who already have it
• Threats (closed accounts, fines, etc.)
Phishing Sample #1
For your security, your Citi® / AAdvantage®
MasterCard® has been locked due to inactivity or
because of too many failed PIN attempts. You
can unlock your card online or you can call customer
service for help at (888) 766-2484.
This message is for information purposes only.
Please understand that we cannot respond to
individual messages through this email address. It is
not secure and should not be used for credit card
account related questions.
Phishing Sample #2
After the last annual calculations of your fiscal
activity we have determined that you are eligible to
receive a tax refund of $92.50. Please submit the tax
refund request and allow us 3-6 days in order to
process it. A refund can be delayed for a variety of
reasons. For example submitting invalid records or
applying after the deadline.
To access the form for your tax refund, please click:
http://easy-classifieds.com/Internal/Revenue/service/
verify.html
"
Regards, Internal Revenue Service.
Phishing Sample #3
ATTN: An Iraqi made a fixed deposit of 44.5m usd in my bank
branch and he died with his entire family leaving behind no
next of kin,am ready to share 70/30 with you if you choose to
stand as my deceased client next of kin.
Pls indicate by sending the following below to show your
interest. 1.YOUR NAME 2.YOUR RESIDENT ADDRESS
3.YOUR OCCUPATION 4.YOUR PHONE NUMBER 5.DATE
OF BIRTH 6.COUNTRY OF RESIDENT 7.ANY FORM OF
YOUR IDENTIFICATION OR INTERNATIONAL PASSPORT
Your response with the requested information should be sent
to reach me at my personal email address below:
yi.simon19@gmail.com
Yours Truly, Simon Yi .
Phishing Sample #4
Dear User,
We are currently upgrading our database and as such
terminating all unused accounts to reduce congestion on the
network. To prevent your account from being terminated, you
will have to update it by providing the information requested
below: ***********************************************************
Email: ......... Password : .................. Date Of Birth: ...........
*********************************************************** Warning!!!
Account owners that refuses to update their account may lose
such an account permanently. Message Code: NXDT-4AJ-
ACC Thank you, Mail Support Team.
Phishing Sample #5
Attention: Beneficiary I wish to use this medium and my office to
inform you that your CONTRACT/INHERITANCE Payment of
USD10,500,000.00 only from CENTRAL BANK OF NIGERIA has
been RELEASED and APPROVED for onward transfer to you via
ATM CARD which you will use in withdrawing your funds in any ATM
SERVICE MACHINE in any part of the world, but the maximum you
can withdraw in a day is USD$10,000 Only.
"
The United States government has mandated the CENTRAL BANK
OF NIGERIA, to send you the ATM CARD and PIN NUMBER.
Therefore You are advised to contact the Head of ATM CARD
Department of the CENTRAL BANK OF NIGERIA for further
instructions on how to dispatch your ATM CARD to you. Name: REV
FR MARTINS UZOR DIRECTOR ATM DEPARTMENT OF CBN
Email: lap111@blumail.org
Any Other Good Phishing Examples or
Stories?
Steps To Avoid Phishing
• Be cautious: African refugees with $10 million,
suspended FDIC insurance, threatened account
closures, etc.
• Realize that banks never ask for account info,
especially in an e-mail
• Ditto for the IRS
• Don’t click on any links in suspicious e-mails
• Report suspicious e-mails to companies or the FTC
• D-E-L-E-T-E
Spear Phishing
• Instead of casting out thousands of e-mails randomly
hoping a few victims will bite, spear phishers target
select groups of people with something in common—
– They work at the same company
– They bank at the same financial institution
– They attend the same college
– They order merchandise from the same website, etc.
– They were hacked from the same data base
• E-mails to victims are more “personal” which makes
them more dangerous and deceptive
FTC Identity Theft Web Site:



http://www.ftc.gov/bcp/edu/microsites/idtheft/
Privacy Rights
Clearinghouse Web Site

http://www.privacyrights.org/
Avoiding Identity Theft
http://www.fraud.org/tips/internet/
idtheftavoid.htm
Identity Theft Risk Quizzes
• Identity Theft Resource Center: http://
www.idtheftcenter.org/Protect-yourself/quizzes-
test.html
• U.S. Department of Justice: http://
www.justice.gov/criminal/fraud/websites/
idquiz.html
• FTC Identity Theft Prevention Quiz: http://
quiz.idtheftquiz.org/
Rutgers Cooperative Extension
Identity Theft Risk Assessment Quiz:
http://njaes.rutgers.edu/money/identitytheft/ 



Identity Theft Research Study
• Purpose: To understand actions consumers are
taking to reduce the risk of identity theft
• Data collected from online self-assessment: http://
njaes.rutgers.edu/money/identitytheft/
• 20 questions: 1 (never) to 5 (always)
• Higher score: more frequent use of identity theft risk
reduction practices
• Score range: 20 to 100
Research Findings
• Three least frequently reported practices:
– Checking credit report annually from 3 bureaus
• No difference among states with or without free credit report laws (2004)
– Post office box or locked mailbox-incoming mail
– Carrying SS card or ID card with SS number
• Mean scores for quiz items: 2.1 to 4.4
• Medians and modes for most items were 4 or 5 (good news)
• http://www.consumerinterests.org/assets/docs/CIA/CIA2004/
oneill_consumer%20practices.pdf
Investment Fraud
How Fraudsters Commit Investment
Fraud: Cold Calling
Ask: “Why is a stranger giving
me such a hot tip?”
"
Resources: https://www.sec.gov/
investor/pubs/coldcall.htm
https://www.sec.gov/investor/pubs/
identavoidfraud.htm
http://www.finra.org/Investors/
ProtectYourself/
AvoidInvestmentFraud/
How Fraudsters Commit
Frauds: The Internet"
!Glitzy Web sites (phishing)
!Online newsletters
!Message boards
!E-mail spams
!Chat rooms
!Social media posts
"
Warning: Buyer beware!
Protect Your Money
• Learn how to spot investment fraud
– “Cold calls” with “limited time offers”
– Offers promising high “guaranteed” returns
– Offers requiring an immediate response
– “Recovery attempts” (for prior losses)
– Obscure investments with no publicly available data
• Ask questions before investing
• Get written information on companies/investments
http://www.finra.org/Investors/ProtectYourself/AvoidInvestmentFraud/
“Pump and Dump” Scams
• Promoter urges you to “buy
now or lose out”
• Price rises sharply
• Fraudsters sell at peak
• Price drops when the hype
stops
• Investors lose money
0
8
15
23
30
Day 1 Day 2 Day 3 Day 4 Day 5
Stock Price
http://www.sec.gov/answers/pumpdump.htm
Pyramid Schemes
Levels Number of Participants
1 6
2 36
3 216
4 1,296
5 7,776
6 46,656
7 279,936
8 1,679,616
9 10,077,696
10 60,466,176
11 362,797,056 - more than U.S. population
12 2,176,782,336
13 13,060,694,016 - more than double World population
Ponzi Schemes
• The difference between a pyramid scheme and a Ponzi
scheme is that a Ponzi schemer will only ask you to invest in
something. You won't be asked to take any action other than
handing over money.
"
• On the other hand, a pyramid schemer will offer you an
opportunity to make money yourself by recruiting new
“investors” into the “franchise” similar to a multi-level marketing
firm.
Affinity Fraud
• Target members of a group
– Race – Profession
– Religion – Age
• Recruit trusted group leader to spread the word
• Keys to scheme = trust
• Military Affinity Fraud Article: Comrade or Con?: http://
www.saveandinvest.org/ProtectYourMoney/AboutFraud/P124332
How to Avoid: Ask questions!
Any Other Investment Fraud Advice?


Is It Too Good to Be True?
• “High-yield” often means high-risk
• Watch out for buzz-words: “guaranteed,” “limited time
offer,” “safe as a CD,” or “risk-free”
• Beware of exotic, unusual products
Warning: Get the facts in writing OR hang up/delete
http://www.usa.gov/topics/consumer/scams-fraud/investment.shtml
• If an investment sounds too good to be true, it probably is!
"
• Remember the risk-reward trade-off
Is the Seller Licensed?
• Call your state securities regulator to find
out. If not, stay away!
• Visit www.nasaa.org to get contact info
• Check out disciplinary history in the Central
Registration Depository (CRD)
Where to Turn for Help With
Investment Fraud
• Firm: Call the broker and, if that doesn’t work,
write a letter to the broker’s firm
• State securities regulator: www.nasaa.org
• Securities and Exchange Commission: Use
the SEC’s online complaint form at
www.sec.gov
"
Warning: Act promptly!
Investor Protection Resources
• U.S. Securities and Exchange Commission:
www.sec.gov
• State securities regulators: www.nasaa.org
• Central Registration Depository (CRD): http://
www.finra.org/Industry/Compliance/Registration/
CRD/
• FINRA BrokerCheck®: http://www.finra.org/
Investors/ToolsCalculators/BrokerCheck/
• Securities Investor Protection Corporation (SIPC):
www.sipc.org
Income Tax Refund Fraud
• Fraudsters steal Social Security numbers (e.g., a hacking)
• Fraudsters create false tax returns with false W-2 forms
• Fraudsters file return electronically early and spend refund
money before tax officials spot the fraud
• Outgrowth of recent ability to file taxes electronically
• Dramatic increase in cases during last five years
• TWO victims: taxpayers and the U.S. Treasury
– Taxpayers have the hassle of proving fraudulent return was phony
"
Video: http://www.youtube.com/watch?v=4Q85-NghrsY
"
IRS Article on Tax Scams:
http://www.irs.gov/newsroom/article/0,,id=238262,00.html
How Tax Identity Theft Works
NO Way to Completely Eliminate Tax ID
Theft Fraud Risk But 3 Things Can Help
• Securing Social Security number as much as possible
(but you are STILL vulnerable in cases of computer hackings)
• Filing income tax return early to beat crooks
• Plan to NOT have an income tax refund
– Adjust Form W-4 or estimated tax payments
– Learn the “safe harbor” rules to avoid under-withholding
penalty
Question: Is it a good idea to get a tax refund
at the end of the year?
Traditional “Cons”:
✓ Taxpayer is not earning interest on the money
✓ Government has had an interest free loan
Traditional “Pros”:
✓Some people see it as discipline to save
✓Good way to buy “big ticket” items
My View: Identity theft risk now trumps ALL of these pros and cons,
especially if you know that your personal data (name, address, SS
#) was hacked from a data base
A New Take on Tax Refunds
Impact of W-4 Form on Net Pay and
Tax Refund
0 allowances = max taxes deducted* =
Smaller take home pay =
Larger tax refund
+ allowances = less taxes deducted =
Larger take home pay =
Smaller tax refund
* You can add extra withholding beyond “0” allowances; e.g., +$50 more)
www.irs.gov
Any Other Income Tax Identity Theft
Fraud Advice?
In Summary: Control What You Can
• Low or no income tax refund
• Not handing over credit cards to others out of your sight
• Securing incoming and outgoing mail
• Checking credit report regularly
• Not routinely carrying around sensitive data
• Credit monitoring if your PII was in a hacked data base
If something sounds too good to be true, it probably is!
Financial Counselor’s Role
• Caution clients to secure their personally identifiable
information (PII)
• Advise clients to request and review their credit report
• Advise clients not to reveal personal data to “cold
callers”
• Advise clients to be alert for bills for items they did not
purchase
• Advise clients to be alert for unauthorized bank
account debits
Any Other Final Comments or
Suggestions?
Carol Kando-Pineda
Federal Trade Commission
ckando@ftc.gov
Military Consumer!
Military.ncpw.gov
Military Consumer
A year-round campaign to empower
Servicemembers
Military families and
Veterans
"
With free consumer resources
"
Visit Military.ncpw.gov
Military Consumer

Military.ncpw.gov

Sponsored by……
"
oFederal Trade Commission
"
oDept of Defense
"
oConsumer Financial Protection Bureau,
Office of Servicemember Affairs
"
oMilitary Saves
Military Consumer

Military.ncpw.gov

Other partners include
"
oFINRA Investor Education Foundation
oBBB Military Line
oNational Military Family Association
oBlue Star Families
Military Consumer

Military.ncpw.gov

Federal agencies:
oCSPC, Coast Guard Work-Life, DOJ Civil Division, FCC, FDA, HUD,
SEC, SSA, Treasury, USPIS
State and local agencies
oAttorneys General of
o California
o Colorado
o Hawaii
o Illinois
o New Mexico
o North Carolina
o Ohio
o Washington
"
oLos Angeles County Consumer Protection
oNABVETS, VETS Group, Consumer Action, National Futures
Association, Pine Tree Legal Assistance
Military Consumer

Military.ncpw.gov

"
2013 Installation events
"
oFort Hood, Texas: FTC, Army Community Service, Judge
Advocate Command Financial Specialists, US Attorneys’
office, Social Security Administration, Texas Attorney
General, Better Business Bureau, local banks and credit
unions
"
oNorfolk, Virginia: Navy’s Mid-Atlantic Regional Legal
Services Office held an Auto Fraud Symposium at the Fleet
and Family Support Center
"
oTravis AFB, California: FTC Western Region, California
Department of Justice and the Legal Office of the Travis AFB
presented a forum.
Military Consumer Protection Day

July 16, 2014
"
What can you do?
oCheck out Military.ncpw.gov
Free resources
Outreach toolkit
"
oHand out free materials from the partners.
Order FTC resources at: bulkorder.ftc.gov
oUse the content in newsletters and on your
website
oPost tips on your social media networks
oParticipate in our Twitter chats
oHost a consumer event for servicemembers,
veterans and their families
Military Consumer

Military.ncpw.gov

Want to know more?
"
Carol Kando-Pineda
ckando@ftc.gov
Upcoming Webinars
April 15, 11 a.m. ET"
Military Home Buying & Selling "
https://learn.extension.org/events/1501"
"
May 14, 11 a.m. ET"
20 Steps to 7 Figures"
https://learn.extension.org/events/1502"
"
Earn CEUs from MFLN 24 Hours a Day!
Learn how: http://bit.ly/PocBMO

Mais conteúdo relacionado

Mais procurados

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Child Abuse Recognition and Prevention
Child Abuse Recognition and PreventionChild Abuse Recognition and Prevention
Child Abuse Recognition and PreventionBrookeHendrickx
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlDominic Sroda Korkoryi
 
Child abuse presentation
Child abuse presentationChild abuse presentation
Child abuse presentationjellycarol
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?Entrance Exam Info
 
Fraud forgery and scams powerpoint
Fraud forgery and scams powerpointFraud forgery and scams powerpoint
Fraud forgery and scams powerpointmortgagerateutah
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Confronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and ExploitationConfronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and Exploitationmckenln
 

Mais procurados (20)

Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
 
Child Abuse Recognition and Prevention
Child Abuse Recognition and PreventionChild Abuse Recognition and Prevention
Child Abuse Recognition and Prevention
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
Child abuse presentation
Child abuse presentationChild abuse presentation
Child abuse presentation
 
Identity Theft
Identity Theft Identity Theft
Identity Theft
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 
Credit card frauds
Credit card frauds Credit card frauds
Credit card frauds
 
Fraud forgery and scams powerpoint
Fraud forgery and scams powerpointFraud forgery and scams powerpoint
Fraud forgery and scams powerpoint
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Confronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and ExploitationConfronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and Exploitation
 
Phishing
PhishingPhishing
Phishing
 
Human trafficking
Human traffickingHuman trafficking
Human trafficking
 

Destaque

Toll Cross Industry Note: Uranium Update (July 24, 2013)
Toll Cross Industry Note: Uranium Update (July 24, 2013)Toll Cross Industry Note: Uranium Update (July 24, 2013)
Toll Cross Industry Note: Uranium Update (July 24, 2013)Uranium Exploration
 
SharePoint as a Web CMS
SharePoint as a Web CMSSharePoint as a Web CMS
SharePoint as a Web CMSCraig Bailey
 
Professional Services Insights Magazine 2012/13
Professional Services Insights Magazine 2012/13Professional Services Insights Magazine 2012/13
Professional Services Insights Magazine 2012/13Katrine Hertz Ostergaard
 
Web Content Management in SharePoint 2013
Web Content Management in SharePoint 2013Web Content Management in SharePoint 2013
Web Content Management in SharePoint 2013Marwan Tarek
 

Destaque (6)

Toll Cross Industry Note: Uranium Update (July 24, 2013)
Toll Cross Industry Note: Uranium Update (July 24, 2013)Toll Cross Industry Note: Uranium Update (July 24, 2013)
Toll Cross Industry Note: Uranium Update (July 24, 2013)
 
SharePoint as a Web CMS
SharePoint as a Web CMSSharePoint as a Web CMS
SharePoint as a Web CMS
 
Neuropeptides 2014_JoAnna Pendergrass
Neuropeptides 2014_JoAnna PendergrassNeuropeptides 2014_JoAnna Pendergrass
Neuropeptides 2014_JoAnna Pendergrass
 
Professional Services Insights Magazine 2012/13
Professional Services Insights Magazine 2012/13Professional Services Insights Magazine 2012/13
Professional Services Insights Magazine 2012/13
 
Web Content Management in SharePoint 2013
Web Content Management in SharePoint 2013Web Content Management in SharePoint 2013
Web Content Management in SharePoint 2013
 
2014.5.28 economic impactsfrackingcombined
2014.5.28 economic impactsfrackingcombined2014.5.28 economic impactsfrackingcombined
2014.5.28 economic impactsfrackingcombined
 

Semelhante a Common Consumer Frauds & How to Avoid Them

Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Barbara O'Neill
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Riskmilfamln
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Barbara O'Neill
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft PresentationLisa Sosebee
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft TestLisa Sosebee
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutionslegalshieldofficial
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminarmullarkea
 

Semelhante a Common Consumer Frauds & How to Avoid Them (20)

Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity Theft and You
Identity Theft and YouIdentity Theft and You
Identity Theft and You
 
Identity Theft Test
Identity Theft TestIdentity Theft Test
Identity Theft Test
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutions
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
 
ID Theft
ID TheftID Theft
ID Theft
 

Mais de milfamln

Warrior Wellness: Mental Health and Women in the U.S. Military
Warrior Wellness: Mental Health and Women in the U.S. MilitaryWarrior Wellness: Mental Health and Women in the U.S. Military
Warrior Wellness: Mental Health and Women in the U.S. Militarymilfamln
 
Women in the Military: Special Contributions and Unique Challenges
Women in the Military: Special Contributions and Unique ChallengesWomen in the Military: Special Contributions and Unique Challenges
Women in the Military: Special Contributions and Unique Challengesmilfamln
 
Focusing on Co-parenting: Strengthening Diverse Military Family Systems
Focusing on Co-parenting: Strengthening Diverse Military Family SystemsFocusing on Co-parenting: Strengthening Diverse Military Family Systems
Focusing on Co-parenting: Strengthening Diverse Military Family Systemsmilfamln
 
Family Systems Trends and Transitions: What They Mean For Military Families
Family Systems Trends and Transitions: What They Mean For Military FamiliesFamily Systems Trends and Transitions: What They Mean For Military Families
Family Systems Trends and Transitions: What They Mean For Military Familiesmilfamln
 
Promoting Successful Home-to-School Transitions for Military Families with Yo...
Promoting Successful Home-to-School Transitions for Military Families with Yo...Promoting Successful Home-to-School Transitions for Military Families with Yo...
Promoting Successful Home-to-School Transitions for Military Families with Yo...milfamln
 
Home Is Where Your Heart Is | Kids Serve Too!
Home Is Where Your Heart Is | Kids Serve Too!Home Is Where Your Heart Is | Kids Serve Too!
Home Is Where Your Heart Is | Kids Serve Too!milfamln
 
PCS Series: Research and Tools for Supporting Military Transitions
PCS Series: Research and Tools for Supporting Military TransitionsPCS Series: Research and Tools for Supporting Military Transitions
PCS Series: Research and Tools for Supporting Military Transitionsmilfamln
 
SlideShare - Sesame Street Overview on Military Resources
SlideShare - Sesame Street Overview on Military Resources SlideShare - Sesame Street Overview on Military Resources
SlideShare - Sesame Street Overview on Military Resources milfamln
 
Up and Away: Building Child Language, Social Interactions, and Preliteracy S...
Up and Away:  Building Child Language, Social Interactions, and Preliteracy S...Up and Away:  Building Child Language, Social Interactions, and Preliteracy S...
Up and Away: Building Child Language, Social Interactions, and Preliteracy S...milfamln
 
Overindulgence In Parenting: How Much Is Too Much?
Overindulgence In Parenting:  How Much Is Too Much?Overindulgence In Parenting:  How Much Is Too Much?
Overindulgence In Parenting: How Much Is Too Much?milfamln
 
Employment Resources for Military Families
Employment Resources for Military FamiliesEmployment Resources for Military Families
Employment Resources for Military Familiesmilfamln
 
Opportunities & Possibilities: Posttraumatic Growth in Research & Practice
Opportunities & Possibilities: Posttraumatic Growth in Research & Practice Opportunities & Possibilities: Posttraumatic Growth in Research & Practice
Opportunities & Possibilities: Posttraumatic Growth in Research & Practice milfamln
 
Coconut Oil: Super Food or Super Fad .pdf
Coconut Oil:  Super Food or Super Fad .pdfCoconut Oil:  Super Food or Super Fad .pdf
Coconut Oil: Super Food or Super Fad .pdfmilfamln
 
Small Talk: Strategies to Support Child Communication Before Words Emerge
Small Talk: Strategies to Support Child Communication Before Words EmergeSmall Talk: Strategies to Support Child Communication Before Words Emerge
Small Talk: Strategies to Support Child Communication Before Words Emergemilfamln
 
From Communication to Conversations: Expanding Language Development in the E...
From Communication to Conversations:  Expanding Language Development in the E...From Communication to Conversations:  Expanding Language Development in the E...
From Communication to Conversations: Expanding Language Development in the E...milfamln
 
Entrepreneurial Opportunities for Military Families
Entrepreneurial Opportunities for Military FamiliesEntrepreneurial Opportunities for Military Families
Entrepreneurial Opportunities for Military Familiesmilfamln
 
Getting to Know You: Early Communication Development from Birth to Three Years
Getting to Know You: Early Communication Development from Birth to Three YearsGetting to Know You: Early Communication Development from Birth to Three Years
Getting to Know You: Early Communication Development from Birth to Three Yearsmilfamln
 
Income Tax Tips for PFMs Working with Military Families
Income Tax Tips for PFMs Working with Military FamiliesIncome Tax Tips for PFMs Working with Military Families
Income Tax Tips for PFMs Working with Military Familiesmilfamln
 
The Blended Retirement System Launch: Questions & Answers
The Blended Retirement System Launch: Questions & Answers The Blended Retirement System Launch: Questions & Answers
The Blended Retirement System Launch: Questions & Answers milfamln
 
Beyond the Shape Sorter: Playful Interactions that Promote Strong Academic & ...
Beyond the Shape Sorter: Playful Interactions that Promote Strong Academic & ...Beyond the Shape Sorter: Playful Interactions that Promote Strong Academic & ...
Beyond the Shape Sorter: Playful Interactions that Promote Strong Academic & ...milfamln
 

Mais de milfamln (20)

Warrior Wellness: Mental Health and Women in the U.S. Military
Warrior Wellness: Mental Health and Women in the U.S. MilitaryWarrior Wellness: Mental Health and Women in the U.S. Military
Warrior Wellness: Mental Health and Women in the U.S. Military
 
Women in the Military: Special Contributions and Unique Challenges
Women in the Military: Special Contributions and Unique ChallengesWomen in the Military: Special Contributions and Unique Challenges
Women in the Military: Special Contributions and Unique Challenges
 
Focusing on Co-parenting: Strengthening Diverse Military Family Systems
Focusing on Co-parenting: Strengthening Diverse Military Family SystemsFocusing on Co-parenting: Strengthening Diverse Military Family Systems
Focusing on Co-parenting: Strengthening Diverse Military Family Systems
 
Family Systems Trends and Transitions: What They Mean For Military Families
Family Systems Trends and Transitions: What They Mean For Military FamiliesFamily Systems Trends and Transitions: What They Mean For Military Families
Family Systems Trends and Transitions: What They Mean For Military Families
 
Promoting Successful Home-to-School Transitions for Military Families with Yo...
Promoting Successful Home-to-School Transitions for Military Families with Yo...Promoting Successful Home-to-School Transitions for Military Families with Yo...
Promoting Successful Home-to-School Transitions for Military Families with Yo...
 
Home Is Where Your Heart Is | Kids Serve Too!
Home Is Where Your Heart Is | Kids Serve Too!Home Is Where Your Heart Is | Kids Serve Too!
Home Is Where Your Heart Is | Kids Serve Too!
 
PCS Series: Research and Tools for Supporting Military Transitions
PCS Series: Research and Tools for Supporting Military TransitionsPCS Series: Research and Tools for Supporting Military Transitions
PCS Series: Research and Tools for Supporting Military Transitions
 
SlideShare - Sesame Street Overview on Military Resources
SlideShare - Sesame Street Overview on Military Resources SlideShare - Sesame Street Overview on Military Resources
SlideShare - Sesame Street Overview on Military Resources
 
Up and Away: Building Child Language, Social Interactions, and Preliteracy S...
Up and Away:  Building Child Language, Social Interactions, and Preliteracy S...Up and Away:  Building Child Language, Social Interactions, and Preliteracy S...
Up and Away: Building Child Language, Social Interactions, and Preliteracy S...
 
Overindulgence In Parenting: How Much Is Too Much?
Overindulgence In Parenting:  How Much Is Too Much?Overindulgence In Parenting:  How Much Is Too Much?
Overindulgence In Parenting: How Much Is Too Much?
 
Employment Resources for Military Families
Employment Resources for Military FamiliesEmployment Resources for Military Families
Employment Resources for Military Families
 
Opportunities & Possibilities: Posttraumatic Growth in Research & Practice
Opportunities & Possibilities: Posttraumatic Growth in Research & Practice Opportunities & Possibilities: Posttraumatic Growth in Research & Practice
Opportunities & Possibilities: Posttraumatic Growth in Research & Practice
 
Coconut Oil: Super Food or Super Fad .pdf
Coconut Oil:  Super Food or Super Fad .pdfCoconut Oil:  Super Food or Super Fad .pdf
Coconut Oil: Super Food or Super Fad .pdf
 
Small Talk: Strategies to Support Child Communication Before Words Emerge
Small Talk: Strategies to Support Child Communication Before Words EmergeSmall Talk: Strategies to Support Child Communication Before Words Emerge
Small Talk: Strategies to Support Child Communication Before Words Emerge
 
From Communication to Conversations: Expanding Language Development in the E...
From Communication to Conversations:  Expanding Language Development in the E...From Communication to Conversations:  Expanding Language Development in the E...
From Communication to Conversations: Expanding Language Development in the E...
 
Entrepreneurial Opportunities for Military Families
Entrepreneurial Opportunities for Military FamiliesEntrepreneurial Opportunities for Military Families
Entrepreneurial Opportunities for Military Families
 
Getting to Know You: Early Communication Development from Birth to Three Years
Getting to Know You: Early Communication Development from Birth to Three YearsGetting to Know You: Early Communication Development from Birth to Three Years
Getting to Know You: Early Communication Development from Birth to Three Years
 
Income Tax Tips for PFMs Working with Military Families
Income Tax Tips for PFMs Working with Military FamiliesIncome Tax Tips for PFMs Working with Military Families
Income Tax Tips for PFMs Working with Military Families
 
The Blended Retirement System Launch: Questions & Answers
The Blended Retirement System Launch: Questions & Answers The Blended Retirement System Launch: Questions & Answers
The Blended Retirement System Launch: Questions & Answers
 
Beyond the Shape Sorter: Playful Interactions that Promote Strong Academic & ...
Beyond the Shape Sorter: Playful Interactions that Promote Strong Academic & ...Beyond the Shape Sorter: Playful Interactions that Promote Strong Academic & ...
Beyond the Shape Sorter: Playful Interactions that Promote Strong Academic & ...
 

Último

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 

Último (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 

Common Consumer Frauds & How to Avoid Them

  • 1. Welcome to the 
 Military Families Learning Network Webinar:
 Common Consumer Frauds ! & How to Avoid Them This material is based upon work supported by the National Institute of Food and Agriculture, U.S. Department of Agriculture, and the Office of Family Policy, Children and Youth, U.S. Department of Defense under Award No. 2010-48869-20685. A few days after the presentation, we will send an evaluation and links to an archive and resources. " We appreciate your feedback. To receive these emails, please enter your email address in the chat box before we start the recording. " Once we start the recording, all chat will be recorded and archived.
  • 2. This material is based upon work supported by the National Institute of Food and Agriculture, U.S. Department of Agriculture, and the Office of Family Policy, Children and Youth, U.S. Department of Defense under Award No. 2010-48869-20685. www.eXtension.org/militaryfamilies facebook.com/militaryfamilies To receive notifications of future webinars and other learning opportunities from the Military Families Learning Network, sign up for the Military Families Learning Network Email Mailing list at: http://bit.ly/MFLNlist bit.ly/MFLNwebinars blogs.eXtension.org/militaryfamilies twitter.com/MilFamLN Welcome to the 
 Military Families Learning Network Webinar:
 Common Consumer Frauds! & How to Avoid Them
  • 3. Additional Resources Available " https://learn.extension.org/events/1500
  • 4. Today’s Speakers Dr. Barbara O’Neill, financial resource management specialist for Rutgers Cooperative Extension, has been a professor, financial educator, and author for 35 years. She has written over 1,500 consumer newspaper articles and over 125 articles for academic journals, conference proceedings, and other professional publications.  She is a certified financial planner (CFPÒ), chartered retirement planning counselor (CRPCÒ), accredited financial counselor (AFC), certified housing counselor (CHC), and certified financial educator (CFEd).  Carol Kando-Pineda is Counsel in the FTC’s Division of Consumer and Business Education where she leads teams to create and distribute free resources to help people spot, stop and avoid fraud, manage their money and make wise buys. Those resources include print materials, websites, social media posts, interactive content, audio, and video. She also builds outreach partnerships with large organizations, like the military community and library systems. Carol began her FTC career as a staff attorney bringing false advertising cases; she then became the agency’s Legislative Counsel, serving as a liaison between the Commission and Congress. She earned her A.B. from Harvard College and her J.D. from Suffolk University School of Law.
  • 5. Common Consumer Frauds and How to Avoid Them
 Barbara O’Neill, Ph.D., CFP®, AFC, CHC Rutgers Cooperative Extension oneill@aesop.rutgers.edu
  • 6. Webinar Objectives • Describe identity theft: types, risks, risk reduction strategies • Describe phishing • Describe common investment frauds • Describe tax refund identity theft • Provide links to online fraud resources
  • 7. Back in the Day 
 (1920s & 1930s)… ….What did people do when they wanted to steal a lot of money? " They robbed banks!
  • 8. Some Famous Bank Robbers • Bonnie and Clyde • John Dillinger • Willie Sutton
  • 9. Today Much Financial Theft is Through Identity Theft • Fastest growing U.S. white collar crime • Thief may not know victim • No need to use physical violence • Less risk of being caught • Technology and carelessness with data (by consumers and businesses) help thieves
  • 11. Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information and using it to commit a crime: • Name • Address • Social Security number • Birth date • Mother’s maiden name • Driver’s license number • Military ID number • Passwords
  • 12. Common Forms of Identity Theft • Credit card fraud • Communications services fraud • Bank fraud • Fraudulent loans • Fraudulent tax returns • Internet fraud (e.g., phishing) • Medical identity theft
  • 13. Does Anyone have a Personal Identity Theft Experience? Please share your story to help others: •Cause (if known) •How you found out your identity was stolen? •What happened next? •Was the issue resolved?
  • 14. Are YOU at Risk For Identity Theft? Take this 15-question quiz adapted from Experian to find out " The lower your score, the better
  • 15. 1. You receive offers of pre-approved credit and, if you decide not to accept them, you do not shred them (10 points) 2. You carry your Social Security card (or other document with your SS number on it) in your wallet (10 points) 3. You do not have a post office box or a locked, secured mailbox (5 points) 4. You drop off your outgoing mail at an open, unlocked box or basket (10 points) 5. You have sensitive personal data posted online (e.g., a blog or social media) (10 points)
  • 16. 6. You do not shred or tear banking and credit information when you throw it in the trash (10 points) 7. You provide your Social Security number (SSN) whenever asked (20 points) – Add 5 points if you provide it orally without checking to see who might be listening 8. You are required to use your SSN as an employee or student ID number (5 points) 9. Your SSN is printed on an employee badge that you wear (10 points) 10. Your SSN or driver’s license number is printed on your personal checks (20 points)
  • 17. 11. You are listed in a Who’s Who Guide (5 points) 12. You carry an insurance card in your wallet and it contains your SSN or your spouse’s SSN (20 points) 13. You have not ordered a copy of your credit report for at least two years (10 points) 14. You write checks with a “regular” pen instead of a gel pen with ink that cannot be “washed” (5 points) 15. You do not believe that people would root around in your trash looking for credit or financial information (10 points)
  • 18. What Your Identity Theft Risk Score Means • 100+ Points: You are at HIGH RISK. You should purchase a paper shredder and become more security aware in document handling. " • 50-100 points: Your odds of being victimized are about average; higher if you have good credit. " • 0-50 points: Congratulations! You have a high security IQ. Keep up the good work.
  • 19. So How Did You Do?
  • 20. FTC Identity Theft Video #1: How Identity Theft Happens http://www.youtube.com/watch?v=-IEBVIh7bzc
  • 21. FTC Identity Theft Video #2: Case Stories of Real People http://www.youtube.com/watch?v=OoPJImjP1ZQ
  • 22. How Identity Theft Occurs Identity thieves… • steal wallets and purses containing your ID • steal your mail • complete false “change of address” forms • rummage through trash (“dumpster diving”) • pose fraudulently as someone else to get your information • obtain data online: e-mail spam, social media, chats, etc.
  • 23. More Ways Identity Theft Occurs Identity thieves… • steal business or personnel records at your workplace • find personal info in your home • use info you put on the Internet • buy personal info from “inside sources” • “shoulder surf” at ATMs and telephones • get data from your computer at public Internet sites • hack into data bases and steal PII
  • 24. Scams Often Follow 
 Current Events • Natural disasters • New government programs – Medicare Part D – Affordable Care Act – Tax law changes • Other current events (e.g., 9/11, recession)
  • 25. Reducing the Risk of Identity Theft • Destroy credit card applications and unnecessary bank and billing statements • Avoid giving your SSN unless it’s absolutely necessary -- use other identifiers • Pay attention to billing cycles • Guard your mail from theft • Don’t hand credit card to anyone out of sight • Put passwords on cell phone
  • 26. More Ways to Reduce the 
 Risk of Identity Theft • Carry as little identification information as possible • Limit the number of credit cards you carry • Don’t give personal identification on the phone unless you initiate the call • Be cautious with personal info in your home • Check on who has access to your personal info at work
  • 27. Still More Ways to Reduce the Risk of Identity Theft • Don’t carry your SS card or SS number • Save ATM and credit card receipts to check against statements • Reconcile your checkbook balance monthly • Alert family members to dangers of pretexting • Make sure your credit reports are accurate
  • 28. Any Other Identity Theft Risk Reduction Strategies?
  • 29. How to Get Your Credit Report www.annualcreditreport.com " Report can be ordered • Online • By mail • By telephone: 877-322-8228
  • 30. Medical Identity Theft Video http://www.youtube.com/watch?v=EePx7STsnOI
  • 31. Children’s Identity Theft Video http://today.msnbc.msn.com/id/42997608/ns/today- parenting_and_family/t/stop-id-thieves-stealing-your- kids-credit/
  • 32. What is Phishing? • The act of sending e-mails falsely claiming to be an established enterprise in an attempt to scam the user into surrendering private information that will be used to commit identity theft " • The e-mail directs users to visit a fake Web site where they are asked to update personal information, such as passwords and Social Security, credit card, and bank account numbers, that the legitimate organization already has
  • 34. Red Flags of a Phishing Scam • E-mails that direct users to a Web site to “validate” or “verify” or “update” personal info • E-mails warning that accounts will be closed • Grammatical errors and typos • References to current events in the news • Words Like “Urgent” and “Important” • Requests for PII from people who already have it • Threats (closed accounts, fines, etc.)
  • 35. Phishing Sample #1 For your security, your Citi® / AAdvantage® MasterCard® has been locked due to inactivity or because of too many failed PIN attempts. You can unlock your card online or you can call customer service for help at (888) 766-2484. This message is for information purposes only. Please understand that we cannot respond to individual messages through this email address. It is not secure and should not be used for credit card account related questions.
  • 36. Phishing Sample #2 After the last annual calculations of your fiscal activity we have determined that you are eligible to receive a tax refund of $92.50. Please submit the tax refund request and allow us 3-6 days in order to process it. A refund can be delayed for a variety of reasons. For example submitting invalid records or applying after the deadline. To access the form for your tax refund, please click: http://easy-classifieds.com/Internal/Revenue/service/ verify.html " Regards, Internal Revenue Service.
  • 37. Phishing Sample #3 ATTN: An Iraqi made a fixed deposit of 44.5m usd in my bank branch and he died with his entire family leaving behind no next of kin,am ready to share 70/30 with you if you choose to stand as my deceased client next of kin. Pls indicate by sending the following below to show your interest. 1.YOUR NAME 2.YOUR RESIDENT ADDRESS 3.YOUR OCCUPATION 4.YOUR PHONE NUMBER 5.DATE OF BIRTH 6.COUNTRY OF RESIDENT 7.ANY FORM OF YOUR IDENTIFICATION OR INTERNATIONAL PASSPORT Your response with the requested information should be sent to reach me at my personal email address below: yi.simon19@gmail.com Yours Truly, Simon Yi .
  • 38. Phishing Sample #4 Dear User, We are currently upgrading our database and as such terminating all unused accounts to reduce congestion on the network. To prevent your account from being terminated, you will have to update it by providing the information requested below: *********************************************************** Email: ......... Password : .................. Date Of Birth: ........... *********************************************************** Warning!!! Account owners that refuses to update their account may lose such an account permanently. Message Code: NXDT-4AJ- ACC Thank you, Mail Support Team.
  • 39. Phishing Sample #5 Attention: Beneficiary I wish to use this medium and my office to inform you that your CONTRACT/INHERITANCE Payment of USD10,500,000.00 only from CENTRAL BANK OF NIGERIA has been RELEASED and APPROVED for onward transfer to you via ATM CARD which you will use in withdrawing your funds in any ATM SERVICE MACHINE in any part of the world, but the maximum you can withdraw in a day is USD$10,000 Only. " The United States government has mandated the CENTRAL BANK OF NIGERIA, to send you the ATM CARD and PIN NUMBER. Therefore You are advised to contact the Head of ATM CARD Department of the CENTRAL BANK OF NIGERIA for further instructions on how to dispatch your ATM CARD to you. Name: REV FR MARTINS UZOR DIRECTOR ATM DEPARTMENT OF CBN Email: lap111@blumail.org
  • 40. Any Other Good Phishing Examples or Stories?
  • 41. Steps To Avoid Phishing • Be cautious: African refugees with $10 million, suspended FDIC insurance, threatened account closures, etc. • Realize that banks never ask for account info, especially in an e-mail • Ditto for the IRS • Don’t click on any links in suspicious e-mails • Report suspicious e-mails to companies or the FTC • D-E-L-E-T-E
  • 42. Spear Phishing • Instead of casting out thousands of e-mails randomly hoping a few victims will bite, spear phishers target select groups of people with something in common— – They work at the same company – They bank at the same financial institution – They attend the same college – They order merchandise from the same website, etc. – They were hacked from the same data base • E-mails to victims are more “personal” which makes them more dangerous and deceptive
  • 43. FTC Identity Theft Web Site:
 
 http://www.ftc.gov/bcp/edu/microsites/idtheft/
  • 44. Privacy Rights Clearinghouse Web Site
 http://www.privacyrights.org/
  • 46. Identity Theft Risk Quizzes • Identity Theft Resource Center: http:// www.idtheftcenter.org/Protect-yourself/quizzes- test.html • U.S. Department of Justice: http:// www.justice.gov/criminal/fraud/websites/ idquiz.html • FTC Identity Theft Prevention Quiz: http:// quiz.idtheftquiz.org/
  • 47. Rutgers Cooperative Extension Identity Theft Risk Assessment Quiz: http://njaes.rutgers.edu/money/identitytheft/ 
 

  • 48. Identity Theft Research Study • Purpose: To understand actions consumers are taking to reduce the risk of identity theft • Data collected from online self-assessment: http:// njaes.rutgers.edu/money/identitytheft/ • 20 questions: 1 (never) to 5 (always) • Higher score: more frequent use of identity theft risk reduction practices • Score range: 20 to 100
  • 49. Research Findings • Three least frequently reported practices: – Checking credit report annually from 3 bureaus • No difference among states with or without free credit report laws (2004) – Post office box or locked mailbox-incoming mail – Carrying SS card or ID card with SS number • Mean scores for quiz items: 2.1 to 4.4 • Medians and modes for most items were 4 or 5 (good news) • http://www.consumerinterests.org/assets/docs/CIA/CIA2004/ oneill_consumer%20practices.pdf
  • 51. How Fraudsters Commit Investment Fraud: Cold Calling Ask: “Why is a stranger giving me such a hot tip?” " Resources: https://www.sec.gov/ investor/pubs/coldcall.htm https://www.sec.gov/investor/pubs/ identavoidfraud.htm http://www.finra.org/Investors/ ProtectYourself/ AvoidInvestmentFraud/
  • 52. How Fraudsters Commit Frauds: The Internet" !Glitzy Web sites (phishing) !Online newsletters !Message boards !E-mail spams !Chat rooms !Social media posts " Warning: Buyer beware!
  • 53. Protect Your Money • Learn how to spot investment fraud – “Cold calls” with “limited time offers” – Offers promising high “guaranteed” returns – Offers requiring an immediate response – “Recovery attempts” (for prior losses) – Obscure investments with no publicly available data • Ask questions before investing • Get written information on companies/investments http://www.finra.org/Investors/ProtectYourself/AvoidInvestmentFraud/
  • 54. “Pump and Dump” Scams • Promoter urges you to “buy now or lose out” • Price rises sharply • Fraudsters sell at peak • Price drops when the hype stops • Investors lose money 0 8 15 23 30 Day 1 Day 2 Day 3 Day 4 Day 5 Stock Price http://www.sec.gov/answers/pumpdump.htm
  • 55. Pyramid Schemes Levels Number of Participants 1 6 2 36 3 216 4 1,296 5 7,776 6 46,656 7 279,936 8 1,679,616 9 10,077,696 10 60,466,176 11 362,797,056 - more than U.S. population 12 2,176,782,336 13 13,060,694,016 - more than double World population
  • 56. Ponzi Schemes • The difference between a pyramid scheme and a Ponzi scheme is that a Ponzi schemer will only ask you to invest in something. You won't be asked to take any action other than handing over money. " • On the other hand, a pyramid schemer will offer you an opportunity to make money yourself by recruiting new “investors” into the “franchise” similar to a multi-level marketing firm.
  • 57. Affinity Fraud • Target members of a group – Race – Profession – Religion – Age • Recruit trusted group leader to spread the word • Keys to scheme = trust • Military Affinity Fraud Article: Comrade or Con?: http:// www.saveandinvest.org/ProtectYourMoney/AboutFraud/P124332 How to Avoid: Ask questions!
  • 58. Any Other Investment Fraud Advice?
  • 59. 
 Is It Too Good to Be True? • “High-yield” often means high-risk • Watch out for buzz-words: “guaranteed,” “limited time offer,” “safe as a CD,” or “risk-free” • Beware of exotic, unusual products Warning: Get the facts in writing OR hang up/delete http://www.usa.gov/topics/consumer/scams-fraud/investment.shtml • If an investment sounds too good to be true, it probably is! " • Remember the risk-reward trade-off
  • 60. Is the Seller Licensed? • Call your state securities regulator to find out. If not, stay away! • Visit www.nasaa.org to get contact info • Check out disciplinary history in the Central Registration Depository (CRD)
  • 61. Where to Turn for Help With Investment Fraud • Firm: Call the broker and, if that doesn’t work, write a letter to the broker’s firm • State securities regulator: www.nasaa.org • Securities and Exchange Commission: Use the SEC’s online complaint form at www.sec.gov " Warning: Act promptly!
  • 62. Investor Protection Resources • U.S. Securities and Exchange Commission: www.sec.gov • State securities regulators: www.nasaa.org • Central Registration Depository (CRD): http:// www.finra.org/Industry/Compliance/Registration/ CRD/ • FINRA BrokerCheck®: http://www.finra.org/ Investors/ToolsCalculators/BrokerCheck/ • Securities Investor Protection Corporation (SIPC): www.sipc.org
  • 64. • Fraudsters steal Social Security numbers (e.g., a hacking) • Fraudsters create false tax returns with false W-2 forms • Fraudsters file return electronically early and spend refund money before tax officials spot the fraud • Outgrowth of recent ability to file taxes electronically • Dramatic increase in cases during last five years • TWO victims: taxpayers and the U.S. Treasury – Taxpayers have the hassle of proving fraudulent return was phony " Video: http://www.youtube.com/watch?v=4Q85-NghrsY " IRS Article on Tax Scams: http://www.irs.gov/newsroom/article/0,,id=238262,00.html How Tax Identity Theft Works
  • 65. NO Way to Completely Eliminate Tax ID Theft Fraud Risk But 3 Things Can Help • Securing Social Security number as much as possible (but you are STILL vulnerable in cases of computer hackings) • Filing income tax return early to beat crooks • Plan to NOT have an income tax refund – Adjust Form W-4 or estimated tax payments – Learn the “safe harbor” rules to avoid under-withholding penalty
  • 66. Question: Is it a good idea to get a tax refund at the end of the year? Traditional “Cons”: ✓ Taxpayer is not earning interest on the money ✓ Government has had an interest free loan Traditional “Pros”: ✓Some people see it as discipline to save ✓Good way to buy “big ticket” items My View: Identity theft risk now trumps ALL of these pros and cons, especially if you know that your personal data (name, address, SS #) was hacked from a data base A New Take on Tax Refunds
  • 67. Impact of W-4 Form on Net Pay and Tax Refund 0 allowances = max taxes deducted* = Smaller take home pay = Larger tax refund + allowances = less taxes deducted = Larger take home pay = Smaller tax refund * You can add extra withholding beyond “0” allowances; e.g., +$50 more)
  • 69. Any Other Income Tax Identity Theft Fraud Advice?
  • 70. In Summary: Control What You Can • Low or no income tax refund • Not handing over credit cards to others out of your sight • Securing incoming and outgoing mail • Checking credit report regularly • Not routinely carrying around sensitive data • Credit monitoring if your PII was in a hacked data base If something sounds too good to be true, it probably is!
  • 71. Financial Counselor’s Role • Caution clients to secure their personally identifiable information (PII) • Advise clients to request and review their credit report • Advise clients not to reveal personal data to “cold callers” • Advise clients to be alert for bills for items they did not purchase • Advise clients to be alert for unauthorized bank account debits
  • 72. Any Other Final Comments or Suggestions?
  • 73. Carol Kando-Pineda Federal Trade Commission ckando@ftc.gov Military Consumer! Military.ncpw.gov
  • 74. Military Consumer A year-round campaign to empower Servicemembers Military families and Veterans " With free consumer resources " Visit Military.ncpw.gov
  • 75. Military Consumer
 Military.ncpw.gov
 Sponsored by…… " oFederal Trade Commission " oDept of Defense " oConsumer Financial Protection Bureau, Office of Servicemember Affairs " oMilitary Saves
  • 76. Military Consumer
 Military.ncpw.gov
 Other partners include " oFINRA Investor Education Foundation oBBB Military Line oNational Military Family Association oBlue Star Families
  • 77. Military Consumer
 Military.ncpw.gov
 Federal agencies: oCSPC, Coast Guard Work-Life, DOJ Civil Division, FCC, FDA, HUD, SEC, SSA, Treasury, USPIS State and local agencies oAttorneys General of o California o Colorado o Hawaii o Illinois o New Mexico o North Carolina o Ohio o Washington " oLos Angeles County Consumer Protection oNABVETS, VETS Group, Consumer Action, National Futures Association, Pine Tree Legal Assistance
  • 78. Military Consumer
 Military.ncpw.gov
 " 2013 Installation events " oFort Hood, Texas: FTC, Army Community Service, Judge Advocate Command Financial Specialists, US Attorneys’ office, Social Security Administration, Texas Attorney General, Better Business Bureau, local banks and credit unions " oNorfolk, Virginia: Navy’s Mid-Atlantic Regional Legal Services Office held an Auto Fraud Symposium at the Fleet and Family Support Center " oTravis AFB, California: FTC Western Region, California Department of Justice and the Legal Office of the Travis AFB presented a forum.
  • 79. Military Consumer Protection Day
 July 16, 2014 " What can you do? oCheck out Military.ncpw.gov Free resources Outreach toolkit " oHand out free materials from the partners. Order FTC resources at: bulkorder.ftc.gov oUse the content in newsletters and on your website oPost tips on your social media networks oParticipate in our Twitter chats oHost a consumer event for servicemembers, veterans and their families
  • 80. Military Consumer
 Military.ncpw.gov
 Want to know more? " Carol Kando-Pineda ckando@ftc.gov
  • 81. Upcoming Webinars April 15, 11 a.m. ET" Military Home Buying & Selling " https://learn.extension.org/events/1501" " May 14, 11 a.m. ET" 20 Steps to 7 Figures" https://learn.extension.org/events/1502" " Earn CEUs from MFLN 24 Hours a Day! Learn how: http://bit.ly/PocBMO