Вы находитесь на странице: 1из 61

The A to Z Crime Guide

With Definitions and Solutions

Jonathan Greenstein

The A to Z Crime Guide With Definitions and Solutions (Second Edition)


By: Jonathan Greenstein
A comprehensive guide to common crimes, scams and swindles, with simple steps to identify and prevent them.

Disclaimer: While the Author has made every effort to verify the accuracy and durability of information provided, he assumes no liability for the application and/or failure of the information to perform as desired. Appropriate legal advice or professional consultation is strongly advised before implementing any method or measure identified herein. NOTICE: When used; brand and trade names are for reference purposes only and remain the property of their respective owners. No connection or participation by copyrights holders in or with criminal acts is intended nor implied.

Copyright 2009 by Jonathan Greenstein All rights reserved. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without the express written permission from the Author. _____________________________________________________________________________ Printed in the United States of America

Preface and Acknowledgements

Over the better part of the last decade I have devoted my career in law enforcement and investigations to the investigation of various crimes; these crimes have ranged from the mundane traffic violation to complex swindles and frauds. In the course of my investigations I learned over and over that the majority of these crimes could have been prevented. While there are volumes of topical sources about specific crimes, there existed no consolidated all-inone reference that could be referenced; this guide is my endeavor to provide such a tool. Through my experience and training, I present the second edition of the A to Z Crime Guide; what I feel is the definitive listing of crimes and the tools that can be used to not only identify them but prevent them. I would like to extend my sincere gratitude to the various instructors that have guided by career over the years; from the basic academy to advanced training. Most importantly I would like to thank Captain Michael Hancock (Ret.), who is by far one of the most exemplary law enforcement officers the field has seen. He was not only my partner for several years but also my mentor in learning the ropes at a new department.

The A to Z Crime Guide

A
Adoption Scams-Occur when a family seeks out an agency or individual to facilitate the adoption of a child. This is perhaps the cruelest scam I have come across as it exploits the hopes and dreams of sincere couples who want to adopt a child. In some cases the couple is unable to bear a child or they want to provide a home for an unwanted child, criminals exploit this and leave ruin and pain in their wake. There are numerous adoption groups and websites that highlight the problem of scams in adoptions, most of which highlight the following tips: -Deal only with licensed and established adoption agencies. -Be wary of classified ads, either posting one of your own or responding to one. -Do not agree to any payments that are outside the legal limits established. -Be aware that paying a fee to search for children is no guarantee. -Avoid rushing into the first opportunity to adopt. This is an important decision. -Check with the US Department of State on international adoptions before you start the process of adopting overseas. -Review your states adoption laws before starting the process. -Check with RESOLVE, which provides extensive information, also check with local adoption support groups before starting the search. Advance Fee Fraud-Also known as 419 Scams, is a scheme in which a criminal will contact you by email or post, informing you of a sudden windfall. While most of these scams revolve around moving money from say Nigeria to a friendly country, they also use other modalities such as: A rich person who died with no heirs and the person managing the Estate happens to find you to assume the identity of a long lost relative, of course they will soon ask for money to cover taxes and fees, to bribe an official or to cover shipping of this money; in the end you will be out your hard earned money and there is little, if any chance of ever seeing it again. Another method is to approach you with a proposal to help some Soldiers ship a box of Saddam Husseins money back to the States. Seems that these dedicated Soldiers found a box of cash in a remote area of Iraq and want to ship it home; all they need is for you to help and for your effort they will give you 1/3 the loot. In the end, the result is the same; you wire them money to cover this or that and end up with nothing.

The most comical one is the black money scam, in this one, they have a box of money that was soiled and they need to buy special chemicals to clean it, for your effort they will give you a third. Guess what, in the end the result is the same. They are now richer and you are poorer. Some Tips: If you ever receive an e-mail or fax from someone you do not know requesting your assistance in a financial transaction, such as the transfer of a large sum of money into an account, or claiming you are the next of kin to an wealthy person who has died, or the winner of some obscure lottery, DO NOT respond. These requests are typically sent through public servers via a generic "spammed" email message. Usually, the sender does not yet know your personal e-mail address and is depending on you to respond. Once you reply, whether you intend to string them along or tell them you are not interested, they will often continue to e-mail you in an attempt to harass or intimidate you. If you receive an unsolicited e-mail of this nature, the best course is to simply delete the message. Due to a number of aggravating circumstances, such as the use of false names, addresses, stolen/cloned/prepaid cell phones and remote email addresses, verifying the location of and subsequent prosecution of these persons or groups is difficult. The act of sending an email soliciting strangers' assistance in a financial transaction is not, in itself, a crime. The installation of a credible spam filter and contacting your Internet Service Provider (ISP) may help deter these unsolicited emails. However, there is currently no available program to completely block these types of messages. The best defense is to recognize a scam when you see it. Several websites are dedicated to fighting advanced fee schemes; some are quite serious in their endeavors, while others take a more comical approach. Some of these efforts are known as scam baiting; in which the computer vigilantes will toil for weeks or months to waste the time, energy and efforts of advance fee scammers. While this type of scam is most frequently associated with Nigeria, the scam has spread to various other locations such as Canada, where the criminals are exploiting the similar appearance of Canadian postage stamps to American ones and the advantage of there being no international or overseas country code dialing requirement to call them as is often directed in their letters. Arson-Is the intentional or negligent setting of fires. The motives range from greed to rage. The art of cause and origin investigation (the course of investigating how and where a fire started) is a well developed science and can provide investigators with valuable clues as to what caused the fire and lead to the identification of those responsible. Some schemes related to arson: -Intentional burning of property by the owner to receive insurance payouts. -The burning of automobiles when the owner falls behind on payments. -Burning of a business by the owner so they can claim a loss of inventory that did not exist.

ATM Scams-In this nifty scam, a resourceful criminal will obtain your banking details in one of several ways: -They will install a skimmer, which fits over top of the ATM slot where you insert your card; as you do so, the skimmer will read the card and transmit the details to a nearby criminal or store it in the device for later download. To get your PIN number, they will hide a micro camera in a brochure box that is mounted on the ATM. -They will place their own ATM in a public location, once you insert your card and entry the PIN, the machine will display an error message; thereafter returning your card. Later, the criminals will return and carry off the entire machine to download the card details and PINs, after which they will make copies of all the cards entered and empty the accounts of the victims in a matter of hours. -Skimming by employees-in this scheme, you hand over your card to an employee at the local Bistro or Gas Station, while concealed from your view; they will swipe the card twice, once on the business terminal and a second time on their handheld device. Auction Fraud-This can occur when a successful bidder on your auction sends you a counterfeit check that bounces after you ship the item, when the winner sends you a counterfeit check that is for more than the auction costs; then requests you use the overage to cover shipping costs and then wire the balance back, in both cases you are out the amount of the check and likely the item up for auction. Tips to prevent auction frauds: -Deal only with reputable auction sites. -Wait for checks to clear before shipping items out. -Check the winners profile/feedback, though this information can be faked. -Be wary of overseas bidders. Auto Theft-On average, an auto is stolen every 21 minutes in the United States; by taking some simple steps, you can help ensure your vehicle will be where you left it. Not only does auto theft costs the victim time and money, but it costs society, because it drives insurance premiums up and many times stolen vehicles are used to commit other crimes. Car thefts seem to occur with greater frequency where large groups of cars are parked for extended periods of time in places such as shopping centers, colleges, sporting events, movie complexes, and large apartment complexes.

I once watched a well dressed businessman park at an establishment that served libations to go; being a bit chilly, he opted to leave his new BMW running and no sooner had he entered the establishment did a local consumer of illicit substances dash from a doorway and drive off in the import. As the fellow was obviously unfamiliar with the power of this fine German auto, he applied entirely too much gas and promptly crashed into a telephone pole. Now, I was just as surprised as Mr. Businessman was as I watched $40,000 of car become scrap metal in less than 60 seconds, but in the end it was the businessman who got the harsh end of several citations and a hefty insurance deductible. Moral of the story; dont leave the car running, even for a second. Auto Theft Prevention: Taking precautionary measures can minimize your chances of becoming the victim of auto theft. Here are some tips you can use to avoid being the victim of a car thief: -Never leave your car running unattended, even to second to dash into a business, daycare, etc. -Never leave any keys in the car or ignition, inside a locked garage, or in hide-a-key boxes. -Always roll up your windows and lock the car, even if it is parked in front of your home. -Never leave valuables in plain view, even if your car is locked. Put them in the trunk out of sight. -Always park in high-traffic, well-lighted areas, when possible. -Install a mechanical device that locks the steering wheel, column, or brakes. These devices will deter some criminals. Mind you that one popular wheel lock can be disabled in a few seconds with minimal effort, but something is often better than nothing. -Investigate the purchase of a vehicle theft tracking/security system, especially if you own one of the frequently stolen model vehicles. -Never leave personal identification documents, vehicle ownership title, or credit cards in your vehicle. -If you must leave your key with a valet, attendant, or mechanic leave only the ignition key. Make sure you are dealing with a reputable firm. -In high theft areas the Vehicle Identification Number (VIN) should be etched on windows, doors, fenders and trunk lid. This makes it difficult for a thief to market your stolen car parts through chopshops. -Copy your license plate and vehicle information (VIN) numbers onto a card and keep them with you. If your vehicle is stolen, the police will need this information to take a report and may expedite recovery. -Many vehicles today come with some type of security system from the factory. Normally there are upgraded systems available if you ask. The best choice is a system that shuts off the fuel supply so that a car can't be started or driven.

Other Scams related to Automobiles: Owner Give-up- In this scheme, the vehicle owner orchestrates the destruction of the vehicle to collect insurance money. The stolen vehicle is often found burned in a secluded area, submerged in a lake or, in some extreme cases, buried underground. 30-Day Special-The 30-day special is often perpetrated by owners whose vehicles need extensive repairs. They will report the vehicle stolen and hide it for 30 days--just long enough for the insurance company to settle the claim. Once the claim is paid, the vehicle is often found abandoned. Export Fraud- In this scheme, the insurance fraud perpetrator purchases or rents a vehicle, insures it, and then ships it to an overseas conspirator. Once the conspirator sells the vehicle, the perpetrator reports it stolen. The insurance company covers the loss, while the fraud ring profits from the sale of the vehicle. Phantom Vehicles-This scheme occurs when an individual creates a phony title or registration to secure insurance on a non-existent vehicle. The insured will later report the vehicle stolen before filing a fraudulent insurance claim. Often antique or luxury vehicles will be used, since the more valuable the vehicle, the larger the settlement. Scapegoat Theft-Sometimes an individual will claim to be a vehicle theft victim to avoid criminal prosecution for another crime. For example, a vehicle owner who hit a parked car or telephone pole may abandon the vehicle and report it stolen to avoid paying for the damages.

B
Background Checks-Have been used by employers and families to screen out potential criminals before hiring. While an internet search will reveal thousands of firms offering such services, a cautious approach should be taken before retaining any of them to do this important work. In most states, you can request or have the applicant request a criminal history check for a fee, while some location require them for certain positions. Commercial checks are of dubious value and they provide no more information than you could obtain albeit by doing your own legwork. As part of the hiring process and after you have consulted with an attorney, you should inform applicants that they will be subject to or be required to supply a background check. Note that absence of a criminal record does not mean the person will not lie, cheat or steal from you; it just means they have never been convicted of these acts.

Bank Examiner Swindle-In this scam, a person pretends to be a Bank Examiner or Police Detective. They approach the victim and inform you that a bank employee is suspected of theft or misappropriation and he needs to see how they will react when a customer removes a substantial amount from their account. They ask you to remove a set amount from a specific teller and then meet them afterwards at a nearby location. While stressing that secrecy is a must, they give you an official receipt for your money which is to be taken in for examination and the recording of serial numbers so that it can be used as marked money. You are assured that it will be returned to you in a few days after the apprehension of the dishonest employee. They then indicate their thanks for your cooperation and say there may even be a small reward after the investigation is over. You experience the excitement of playing detective and being "in" on something official, almost like working with the police on an investigation. In the end, they never show-up at the meeting place and you soon realize that your money is gone. Beauty Pageant Scams-From babies to adults, pageant scams abound. There are plenty of legitimate pageants across the county and some lead to the ones we all know, but there are likely more scams than true opportunities. Some pageants have pre-determined winners while others charge huge entry fees and offer nothing in return aside from a cheap statuette. Avoid falling victim to these scams by knowing some of the clues: -While some contestants are approached by Scouts, most enter on their own and follow the circuit of legitimate pageants. -Be wary of promises to move to the Nationals. In cases of sham pageants, the entire contest is a fabrication. -Review entry forms and fees before signing. -Check online to verify claimed associations. -Trust your instincts. Bicycle Theft-Some people will steal it if they are presented with the opportunity. As already discussed, if you present the chance, they will steal it. Some tips to protect your two-wheeled conveyance: -Get a U-lock. Most stolen bikes are either locked with a cheap cable or chain, or weren't locked at all. The cheapest U-lock is better than the best chain. How to use your U-lock: Put the U-lock through the frame, not just through a wheel. If you lock just a wheel, a thief will simply remove the wheel and walk away with your bike frame. For best protection, put the lock through BOTH the frame and the front wheel when locking your bike to something.

Tips to prevent or reduce the chances of being a victim of bike theft: -Be careful about the ends of bike racks. Some bike parking racks are constructed with easily removed bolts on the ends. If you park your bike on the end of one of these racks, a thief could disassemble the end of the bike rack with a wrench, and slide your bike off it. -Don't park on traffic signs overnight. A determined thief can take the sign off the top of the pole, and then slide your bike over the pole. - Don't park your bike overnight in public if you can avoid it. - If your bike is expensive and you have to leave your bike parked in public overnight or for a long time, consider getting a second, less expensive "beater bike" for those times. -Get the "insurance" and register with a national registry. Most U-locks that cost $30 or more come with a guarantee that works like insurance. If your bike is locked properly and gets stolen anyway, the lock company may reimburse you for the loss of your bike. There's also a fee-based national bike registry which is advertised in the materials that come with many U-locks. Recovering a Stolen Bike: -Call the police and file a report. If your bike didn't have your ID # on it, it's extremely unlikely that they're going to find your bike. But if you're going to try to collect on a U-lock maker's guarantee, they'll require that you filed a report with the police. - If your bike was stolen from a college campus, call the campus police and file a report. Campus police are sometimes a lot more actively involved in recovering stolen bikes than the local police. - Go to pawn shops in your area and let them know your bike has been stolen. Give them the registration # and a copy of the photo. - Notify local bike shops who buy used bikes. - If you got the insurance that came with your U-lock, file a claim with the lock company. -Report the theft to the Stolen Bicycle Registry. This is a database of stolen bikes maintained by a private entity not the police/ - When buying a used bike, check the bottom bracket to see if it's registered, and if so, make sure it matches the ID of the person trying to sell you the bike. If you suspect the bike may be stolen, notify the police.

Boat Theft-As with auto theft; the theft of boats is an ongoing crime of concern. It matters not where you moor, dock or store your boat, it can be taken from almost anywhere. Keeping your boat in a well maintained marina may add a layer of protection, but on a busy weekend, the staff may not notice your boat in a crowd of hundreds. Some simple steps you can use to protect your aquatic investment: -Record the vessels details: type and model number, length and description, colors (hull and deck), hull identification number, state registration numbers, engine details (make, model and serial number), electronics (make, model and serial numbers) trailer details (make, model, size, serial number and tags if present) -Ensure you have recent photographs of the vessel showing all sides. -If it is stored at home on a trailer, use lock on the hitch and consider keeping it behind a locked fence. -Think about removing the batteries if it is to be stored for an extended period. -Consider installing a GPS tracking device. -Inform Marina staff if you will be away for an extended period of time or if you are permitting someone else to use your craft. -If you beach the boat to picnic, ensure you switch off the batteries; provided the bilge is not filled with water. -Think about a vessel alarm system. -When cruising in areas with known boat theft issues, consider staying aboard for the night or providing rotating shifts to secure the vessel. -Keep the registration and insurance current. In the event your craft is stolen, immediately notify the local authorities and post notices in area marinas. Bump Keys- Is a lock defeating technique for opening a pin tumbler lock using a specially crafted bump key. One bump key will work for all locks of the same type. The bump-key is made by filing down the key to a certain level, it is then inserted into the lock and force is applied; causing the lock to open. In most cases, there will be no evidence of this technique visible on the lock. While there are limited measures to protect against the use of bump-keys, some measure that have show success include: - Locks having security pins (spool or mushroom pins, etc.)even when combined with a regular tumbler mechanismgenerally make bumping somewhat more difficult but not impossible.

-Electronic locks, magnetic locks, and locks using rotating disks are not vulnerable to this attack. -Restricted or registered key profiles are much safer from bumping, since the correct key blanks cannot be obtained legally without permission or registration with relevant locksmith. Burglary- statistics show that 3 out of 4 homes will be broken into, can we eliminate the threat? I say yes, by taking a few simple steps, you can significantly reduce the risk posed by burglars who are frequently jumping on targets of opportunity. First and foremost, get insurance; be it homeowners or renters insurance, if a break-in occurs, at least you can be watching TV on your new plasma by next week, versus heading down to the local department store to catch the game or daily soaps. There are generally three different types of burglars: the professional, the semiprofessional and the amateur. Although the average homeowner will probably not have to face a professional thief who focuses on extremely valuable items, you need to be aware of semi-professional and amateur burglars. Residential burglars are often male teenagers who live near your home. They are opportunists who look for easy targets. If the risk of detection is too high, the average burglar will not attempt to enter your home. Burglars know that the key to success is planning. The semi-professional burglar may scout a neighborhood for up to a week, while the amateur burglar will spend only a few hours "casing" a residence. After determining his target, the average burglar spends just a few minutes burglarizing it. Regardless of whether you leave your home for five minutes or five weeks, recognize that it's vulnerable whenever it's unoccupied. While you cannot be home all of the time, you can implement and effective a home security program that works for you around the clock. Current Security Measures- The first step in making your home secure is to evaluate your current security measures. Contact your local police department to determine if it will provide a free security inspection. You can also ask your family and friends to pretend to be burglars and make their best attempts at entering your home. The objective of this exercise is to identify every vulnerable area of your home, so be thorough. If it is not difficult to find the key hidden under the flower pot, a burglar could locate it, too. Can you climb your oak tree and gain access to a second floor window? A limber thief could do the same. Darkness and shadows offer additional opportunities for burglars, so perform this exercise at night as well. Does your landscaping cover or cast a shadow on doors and windows? It could also conceal a thief at work. If you feel that your home is too bare without landscaping near your walls, consider growing low, thorny bushes near windows and doors. After your inspection, make a list of all potential trouble spots. Fortunately, there are simple, inexpensive solutions to most of your problems. Your first instinct might be to purchase an alarm system. For the average homeowner, this is not the ideal solution. A good system is very expensive and requires monthly fees. In fact, no single device, including a home security system, will make your residence completely safe. Most importantly, you do not want a thief to get close enough to your home

to determine if you have a burglar alarm. The most effective home security program is one that deters burglars as soon as they view your residence. Home Design-Whether you are searching for a new home or have been living in the same house for many years, there are several things that you should know about your residence's design and how it affects your security. Two-story, single-family homes are usually not a burglar's first choice. If the master bedroom (usually the first stop) is on the second floor, he could be trapped. But a two-story home does not guarantee your security. The first floor is the typical entry point, and you need reliable locks on all windows and doors. If you have a two-story home or live on a higher floor of an apartment or condominium building, easily climbed tree limbs or an unlocked fire escape could provide easy access for a burglar. Single-family homes in the middle of a block are much more likely to be burglarized than corner homes. Thieves tend to bypass corner houses because they are highly visible, making it more likely that they'll be spotted. So, if you live in the middle of a block, invest in outdoor lighting that increases your homes visibility and decreases a burglar's chances of success. Most townhouses have common features, such as sliding glass doors and small, discreetly fenced back yards, which make them easier to burglarize. In an attempt to provide privacy for each unit, their design also provides privacy for a thief. If you live in a townhouse, reinforce your sliding glass doors and consider using a motion-sensitive light in order to protect the vulnerable rear area of your residence. Cul-de-sacs require special precautions as well. Police drive through these neighborhoods less frequently than others, and cul-de-sacs often have wooded areas nearby, which create an ideal hiding place for an escaping thief. Homeowners on these types of blocks should ask their local police department for more frequent police patrols. If you live in an apartment building, the most important security precaution is to change your locks immediately after you move in. Only authorized persons, such as the superintendent or a maintenance person should have access to your keys. No matter where you live, ground floor windows need secure locks. Also make sure that balcony, patio and fire exits are equipped with sturdy doors and secure locks. Just as you performed a security check on your home, perform one on your neighborhood by exploring it. Is it well lighted? Does your community have a neighborhood watch program? Call your local police department and ask how many burglaries have occurred in your area. Determine from the police how the burglars usually operate.

Your neighbors play an important part in your overall burglary prevention program. Burglars tend to avoid neighborhoods that are collectively security conscious. If your community doesn't have a neighborhood watch program, consider establishing one. An aware neighborhood is a safer neighborhood. Neighborhood watch groups and similar programs are often established in response to a specific problem, such as a string of burglaries or drug activity. Communities may also have an informal program that develops as neighbors become friends. When an unfamiliar person is lurking about, these neighbors take notice. All neighborhoods benefit from announcing their vigilance with signs posted throughout the area or placed in the windows of homes. Criminals tend to notice when neighbors look out for each other, and may decide that your neighborhood is not worth the risk of detection. Remember that your community could also work against you. Those who live near you are in the best position to know your schedule and whether or not you have valuables in your home. While you can't treat every neighbor with suspicion, do not provide the temptation or opportunity by announcing trips or vacations to everyone you encounter. Entrust that information only to close neighbors and friends. Home Entry Points: The average burglar has only two options for entering your residence: doors and windows. Examine your entry points and see how well they would stand up to a thief. Doors and windows can be fashionably secured with ornate, yet sturdy, door handles and locks. Quality lock sets can be a good way to add beauty and security. Doors are an important part of a successful security program. Hollow-core doors are easily kicked in. For external doors and door frames, opt for solid wood or steel. Avoid leaving gaps around the door frame, as this provides leverage for removing the door from its frame. Hinges should be positioned on the inside of the door so that a thief with a screwdriver will be unable to remove the entire door. Sliding glass doors are a common entry point. Many of these doors can be lifted off their tracks. For maximum security, use vertical bolts. Also place a metal or solid wood rod on the inside track to hold the door closed. These measures will help prevent burglars from forcing the door open or lifting it off the track. Garage doors are another frequent entry point. The door that connects your garage to your home should have solid wood or solid-core construction. Secure it with a deadbolt lock. Don't rely on the electric garage door opener as your only security measure. Also, when you are pulling out of your garage, take a few seconds to watch the door close completely. You do not want a thief to slip under the door before it closes and have easy access to your home. Back doors are a popular target because they are often hidden from the street and many homeowners leave them unlocked. It's important to keep your back door well lighted and install a deadbolt. These doors should have a solid-core as well. If your doors have decorative sidelight panels on the side, beware! Burglars can smash these panels to open the door. If you have sidelight panels, make sure to use a break-resistant material or replace them.

A burglar is usually too big to fit through a pet entrance, but children can be bribed to crawl in and open the door for him. Only install pet doors that can be securely locked when you are away from your home. When you move into a new house, apartment or condominium, change all of the locks immediately. Because keys have a tendency to multiply, you don't know who will have access to your home if you do not change the locks. Doors with single-cylinder deadbolt locks are opened on the outside with a key and on the inside with a turn of the hand. Double-cylinder deadbolts require a key on either side if the door. If you have windows near your door, install a double cylinder deadbolt lock because burglars could smash the glass and unlock a single-cylinder deadbolt from the inside. Look for a deadbolt with a 1" throw and a reinforced strike plate with 3" screws. The extended throw makes it extremely difficult for an intruder to dislodge the lock from the frame. The longer screws attach the strike plate deeply into the framework of the home, making it harder to break into your residence. One of the most common entry points for burglars is a ground level window at the rear side of a home. That's why you should use the same security measures on your windows as you would on your doors. Screen on windows do not guarantee the security of the window. While they may slow a burglar's progress, they are easily cut or removed. Window locks are an inexpensive way to keep intruders out. On double-hung windows (which side up and down), center locks are only effective when the window is completely closed. Locks on the corners or mounted on the sides will allow you to secure windows in a partially open position. Replace the handle catches on casement windows with keyed locking handles and remove the crank when it is not in use. Keep the key away from the windows, but make sure that it's easily accessible in case of an emergency. Louvered windows, which open outward like awnings, can be very difficult to secure. Consider replacing them with safer double-hung windows. Burglar bars are another way to keep thieves out. Attached to windows, they make it almost impossible to enter your home. But remember that this works both ways: bars can keep you inside when you need to get out. Consequently, keep the key near the bars. Remember that none of these measures will help you if you leave your doors and windows unlocked. It only takes a few minutes for a thief to rob you of your most valued possessions. Always lock your doors, no matter how soon you plan to return.

Protecting your possessions To make your possessions less attractive, more easily identifiable and harder to sell: -Engrave your social security or driver's license number on valuables. Thieves find it harder to sell marked merchandise. You can borrow an engraving pen free of charge from many police departments. -When you make large purchases, do not leave the empty boxes on the curb. Break them down and place them on the bottom of your trash pile on the day of pickup. -You never know what you got until it's gone, so take an inventory of your possessions now. Don't rely on a panicked memory to give police or insurance agents a description. A written inventory is satisfactory, but other methods of documentation, such as videotaping or still photographs, are also effective. Make two copies of your inventory, keeping one copy in your home and another in a safe location outside of the home. It will do you no good if the burglar inadvertently takes the inventory along with him. -Should a thief enter your home, he will probably be in a hurry to leave. Chances are, he will not take the time to evaluate his loot. If you provide a few decoys, he might not look deeper to discover your real treasures. -Keep inexpensive jewelry in the jewelry box on your dresser and put your irreplaceable pearls in a plain paper box. A thief might take the obvious jewelry box and overlook the real one. -An inexpensive safe in the master bedroom could serve as a decoy. A burglar will assume that your valuables are inside and probably won't spend time trying to open it in your home. Instead, he'll just take it with him. -In case he opens the safe immediately, make him think that he hit the jackpot. Fill it with convincing fake jewelry and important looking papers.

Caller ID Spoofing-Is part of many frauds and scam in which the caller will utilize any one of the many devices and online services to change the Caller ID information displayed. There have been numerous cases where the victim falls prey to a scam because the caller spoofed or faked the displayed number or caller information. -When in doubt, call them back via the published number; dont rely on them to give you the number. Carjacking-Is the taking of a vehicle by force or threat of violence. The problem was such an epidemic that the Feds made a law specific to this crime. Tips: -Always keep the doors locked and windows up. -Avoid traveling in high crime areas. -If you are lost, drive to a police or fire station for directions. If you cannot find one, go to a well lit service station. -If you are approached by a potential carjacker and can safely do so, drive off. -Do not resist an attempt to take your vehicle, get out of the car and get away. Career Training-In todays economy having a job skill is essential. Those without a degree will often seek out any one of the numerous career training centers in hopes of gaining desired skills. Training can range from business office tasks to truck driving and everything in-between. Before you enroll, check the schools credentials and if any additional training or licensing is required to entry the career field. Check Fraud- Is fraud related to established and legitimate checking accounts. The approach varies as much as the victims do, but the element of this crime is the criminal gaining access to your money. How can I protect myself against check fraud? -Don't give your checking account number to people you don't know, even if they claim they are from your bank. -Reveal checking account information only to businesses you know to be reputable. -Report lost or stolen checks immediately.

-Properly store or dispose of canceled checks and guard new checks. -Report any inquiries or suspicious behavior to your bank, who will take measures to protect your account and notify proper authorities. -Do not leave your automated teller machine receipt at the ATM; it may contain account information. -Check your bank statements carefully and often. -Use direct deposit Tips for Businesses - Internal Procedures: -Review your bank statements regularly to ensure that the authorized signers are not the same people who reconcile the account. -Review all hiring procedures. Know your employees. -Make sure two people are responsible for accounts payable and ensure that mailroom personnel and procedures are sound. -Keep all check stock or cash equivalents in a secure and locked facility. -Consider surprise audits. -Consider moving check disbursement activity to electronic payment. Tips for Businesses - External Procedures: -Maintain contact with other businesses in your area so you can receive timely information on fraud occurrences. Keep a record of when, what and how a fraud may have hurt your business so you can prevent it the next time. -Purchase blank check stock from well-established vendors. Use safety paper. -Reconcile your check disbursements and deposits regularly. -If a payment account is fraudulently used, close the account as soon as possible. -Be cautious when using refund accounts, such as rebates for subscriptions. This is another target for check fraud. The checks are relatively easy to obtain and can be used for counterfeits. -Evaluate the use of negative check file databases, especially if you accept a large number of payments by check. -Find ways to replace paper documents with electronic payment devices. Know your customers.

Counterfeit Goods-Anyone who has frequented a major city has seen the street vendors hawking designer goods of every sort and brand. Some of these fakes are close to the genuine article but, but there is a distinct difference; counterfeit goods infringe on the rights of the original maker. Some may ask why paying better than price for a designer product would be a problem; I point out that counterfeit goods are inferior to the genuine article, likely do not conform to consumer safety standards, are not inspected for safety and have been shown to have a direct link to terrorist organizations. Counterfeit software can introduce spyware and Trojans into your system; in addition, copies of licensed software can be detected by various firms who use a variety of means to see if the same program is running on multiple machines. If you get caught, you can be subject to severe civil penalties. Counterfeit Autographs-Be it a sports or historic figure, there are collectors of autographs of every sort. The difficulty in verifying a legitimate signature lends to the problem of counterfeits. -Deal only with recognized dealers. -Research your subject before buying. -Learn the value ranges for autographs; be wary of great deals -Request third party verification and ask for a return guarantee. Counterfeit Coins-Genuine coins are struck (stamped out) by special machinery. Most counterfeit coins are made by pouring liquid metal into molds or dies. This procedure often leaves die marks, such as cracks or pimples of metal on the counterfeit coin. Today counterfeit coins are made primarily to simulate rare coins which are of value to collectors. Sometimes this is done by altering genuine coins to increase their numismatic value. The most common changes are the removal, addition or alteration of the coin's date or mint marks. If you suspect you are in possession of a counterfeit or altered coin, compare it with a genuine one of the same value. If you are interested in collecting coins for investment or hobby purposes, deal only with reputable sources and consider only buying graded coins. Graded coins are not an absolute guarantee, but the experts who grade coins are adept at identifying faked coins. Counterfeit Currency-Every year the public is victimized by the counterfeiting of United States currency, with advances in technology and the availability of high quality printers for home use the prevalence of funny money continues to plague America. Look at the money you receive. Compare a suspect note with a genuine note of the same denomination and series, paying attention to the quality of printing and paper characteristics. Look for differences, not similarities. Each denomination has special security features that are designed to aid in detecting counterfeits. Some areas to focus on to detect counterfeit money:

-Portrait-The genuine portrait appears lifelike and stands out distinctly from the background. The counterfeit portrait is usually lifeless and flat. Details merge into the background which is often too dark or mottled. -Federal Reserve and Treasury Seals-On a genuine bill, the saw-tooth points of the Federal Reserve and Treasury seals are clear, distinct, and sharp. The counterfeit seals may have uneven, blunt, or broken saw-tooth points. -Border-The fine lines in the border of a genuine bill are clear and unbroken. On the counterfeit, the lines in the outer margin and scrollwork may be blurred and indistinct. -Serial Numbers-Genuine serial numbers have a distinctive style and are evenly spaced. The serial numbers are printed in the same ink color as the Treasury Seal. On a counterfeit, the serial numbers may differ in color or shade of ink from the Treasury seal. The numbers may not be uniformly spaced or aligned. Obviously, if someone hands you a wad of bills and they all have the same serial number; something is amiss. -Paper-Genuine currency paper has tiny red and blue fibers embedded throughout. Often counterfeiters try to simulate these fibers by printing tiny red and blue lines on their paper. Close inspection reveals, however, that on the counterfeit note the lines are printed on the surface, not embedded in the paper. Credit Card Fraud-Credit Card Fraud presents itself in any number of ways; it can be executed by a waiter or sales clerk double swiping your card, someone can intercept your new card from the mailbox, a criminal can overhear you reading off the number and security code or a few other ways. So you are asking yourself how can I protect myself against credit card fraud? -It is critical that you notify your bank or Credit Card Company immediately if you lose your card. It may prevent someone else from using it illegally. Remember to get your card back after purchasing goods or services. Do not leave the card in hotel rooms or unnecessarily exposed for long periods of time. The number can be copied even if the card is not taken. -Retain copies of your receipts when making a purchase and retain receipts from ATM withdrawals. -Check billing statements carefully upon receipt to make sure all charges are yours. Errors or changes that don't belong should be reported as soon as possible. -Do not put your credit card account number on checks used to pay your monthly bills. -Retain copies of receipts to check against billing statement. -Be careful when disposing of materials and correspondence relating to your finances. Shred all receipts to make sure your credit card number is unrecognizable. -Promptly destroy all old cards or cards you no longer use. Dispose of them in a manner ensuring the card number is unrecognizable.

-Secure your mailbox. Obtain a lock, if necessary. -When applying for a credit card, check the return address. If there is a sticker with a return address placed on the application, contact the card issuing company to verify the correct address. -Do not give your card number to anyone calling on the telephone offering you prizes or gifts. -Do not write your card number on a postcard notifying you that you have won a prize or gift and requesting the number as part of the award arrangements. -Do not provide your credit card number to unsolicited e-mail messages or on suspicious Internet web sites.

Deadbeat Parents-Is the term used to describe parents who fail to make court ordered or agreed upon child support payments. The problem is so endemic that most states will suspend the drivers license of these dead beats. While most jurisdictions have an office or entity thats mission is to enforce child support payments, they are often overworked and understaffed. There are issues with enforcement across state lines and overseas. Criminals exploit custodial parents by claiming to be able to guarantee the location of deadbeats and satisfaction of past due payments. Dont fall victim. Work with local and state agencies before even thinking about paying a private party to track down a deadbeat. Deaf Lottery-This scam exploits the text communication devices utilized by the deaf and hard of hearing community. A scammer will send out a mass message claiming to have won the Deaf Lottery and that another winner is about to be announced. Shortly thereafter, another mass message goes out, trying to trick the recipient into providing their details to collect the prize. Some points to note: -There is no such thing as the Deaf Lottery -This scam is just like other lottery scams Debit Card Scams-Exploiting a persons credit issues and their need for a convenient form of payment, scammers will offer a pre-approved credit/debit card. In some cases these cards are only good at a specific vendor, who sells goods at a substantially higher price than elsewhere. Usually these details are in the fine print, which is often overlooked in the haste to get a credit card.

Another scam related to Debit Cards is the 110% of your deposit; in which you send in upwards of $5,000.00 with the promise to get a credit line in excess of your deposit. If not an outright rip-off they usually charge exorbitant interest and processing fees. Yet another scam is the Offshore Debit Card, aimed at folks who want to hide money from their significant other or the IRS. As with other Offshore Scams, the banks are in the Caribbean or other locations and are not subject to the same rules and regulations as American banks; but in the end, you will frequently lose your money and have no recourse. Debt Consolidation-Be wary of any claims that you can settle outstanding debts for pennies on the dollar. While some creditors may be willing to accept partial payments on overdue accounts, each company sets their own standards and in most cases you have to deal directly with them. -Do not provide your personal information to solicitors claiming to be able to erase debt. -Be aware that even if completely paid off, overdue status and charge-offs will stay on your credit report. -There is no way to erase bad debt from your credit files, only time will cause adverse information to go away; usually 7 years. Door-to-Door Scams-These scams come in the form of magazine, art, charity, or other pitches. A well spoken person will visit your home and offer any number of things for sale or ask for donations. Frequently they will have official looking badges and forms, but in some cases, they are just scammers. Sometimes they just want to bilk you out of your money; while other times they are distracting you while a cohort sneaks through a back door. Because some legitimate groups conduct door-to-door sales and solicitations, your best defense is recognizing legitimate groups who may be in your neighborhood and trusting your instincts. Driveway Resurfacing Scam-While not as common as it once was, this scam exploits the great deal instinct in people. A paving company appears at your home and offers to resurface your driveway at a much lower price than normal. They may explain that they just did another job and have extra tar, thus the savings, but you have to act now. They use a perceived savings and urgency to pressure you into paying. Some tips to help you avoid becoming a victim include knowing that frequently the tar is watered down and does not set. By the time you realize the shoddy work, they are long gone. -Deal only with reputable companies. -Never get rushed into anything. -Never pay 100% up-front.

E
Education Scams-One of the most notable scam related to education is bogus degrees. These are degrees that are obtained with little or no study and are not worth the paper they are printed on. There are a few different types of schemes and scams but the primary sources of fake degrees are Diploma Mills and Fake Degree Printers. Diploma mill customers are attracted by the ease and allure of life experience degrees, in which they write a short paper on what they have learned in life and are awarded a degree. They often are seeking career advancement and need one or more college degrees. They are mislead by terms such as accredited and are persuaded to believe that their past work experiences are as measurable as college course credits. Fake degree buyers are those folks who just need a fake document that is foolproof to employers and other officials. The only purpose of these degrees is to deceive. Before seeking out a new school or one that spasm your inbox, check them out. The US Department of Education maintains the best reference list of accredited US Schools at: http://www.ed.gov/admins/finaid/accred/index.html Another scam related to education is where bogus finance companies solicit perspective students with the promise of loans and grants. In this scam, the student will supply their personal details and that information will be used to commit identity theft. Another variation is where they require a fee to research available programs; fact is that the US Department of Education and most colleges will provide this information for free.

Empty Box Scam-Along the same line as the issues faced when dealing with street vendors, you can be victimized by this scam through sleight of hand and the great deal instinct. What happens is there is a friendly street vendor selling high value items such as electronics, cameras and the like; the deal is too good to be true. They have one or two of the items out for you to see and play with; once you decide to buy they bag up a sealed box from the product. By the time you realize it has no product aside from a brick, the vendor is long gone. -Avoid buying expensive items from street vendors. -Open the package before you pay, if they refuse to let you inspect the item, walk away.

F
Fake Charities-These characters will get you every time, unless you exercise some discretion before sending off your money. The Federal Trade Commission (FTC) hosts an extensive resource to identify fake charities: http://www2.ftc.gov/bcp/pubs/consumer/alerts/alt114.shtm You can also call the FTC: 1-877-FTC-HELP (1-877-382-4357) for assistance and to report these scams.

Tips to avoid falling victim: -Be wary of appeals that tug at your heart strings, especially pleas involving patriotism and current events. -Ask for the name of the charity if the telemarketer does not provide it promptly. -Ask what percentage of the donation is used to support the causes described in the solicitation, and what percentage is used for administrative costs. -Call the charity to find out if it's aware of the solicitation and has authorized the use of its name. -If the telemarketer claims that the charity will support local organizations, call the local groups to verify. -Discuss the donation with a trusted family member or friend before committing the funds. -Don't provide any credit card or bank account information until you have reviewed all information from the charity and made the decision to donate. -Ask for a receipt showing the amount of the contribution and stating that it is tax deductible. -Understand that contributions made to a "tax exempt" organization are not necessarily tax deductible and having tax exempt status is not an indicator of legitimacy. -Avoid cash gifts. They can be lost or stolen. For security and tax record purposes, it's best to pay by check made payable to the beneficiary, not the solicitor. Fraternal Organization Scams-At any given time, phones across America are ringing, the voice on the other end says something along the lines of My name is Joe and I am with the local police, we are calling to see if you can help support the important work we do. In most cases, these are known as Decal Sales, they are collecting donations in exchange for one of those nifty Police Supporter stickers that you may see on cars. While there are some legitimate groups that solicit for fraternal groups, the majority you will encounter are solicitation businesses that keep the lions share of the donations, while sending the particular group the absolute minimum. -Police Booster Decals will not keep you from getting a ticket. -If you want to support the local police, call them and ask if they accept direct donations or if you can donate to the city/town with a request on how the money is used. Free Credit Report Scam-This one exploits the FTC program that provides free annual credit reports from the three major credit bureaus. They use the same terms and the word free to trick you into logging into their sites and paying for services. -Ensure you only use: http://www.ftc.gov/freereports to access this service.

-Be aware that the FTC does not email consumers about this program; such emails are bogus and will lead you to a scam site. -While some of the services offered by commercial sites may be something you want, you do not need to pay for the free annual reports.

G
Gangs-Criminal Street Gangs remain a constant threat in nearly every city and town. While some communities may turn a blind eye to the problem of gangs, there is likely a gang in every one of them. How can you protect yourself from the issues presented by gangs? In most cases, if you do not involve yourself in criminal activities or seek a gang to join, you should be fine, though you should avoid areas with known gang problems. How do you know if there is a gang problem in your community? -Pay attention to the news, stories about random shootings are a clue. -Check with the local police, ask to take to their Gang Unit and inquire with them. -Talk to local School administrators. -Has there been a recent surge or graffiti, while there is a distinct difference between gang graffiti and tagging; this may be a clue. -Talk to your children, do they know of gangs in their school or in the community. If you have a gang problem, get involved in community projects that are aimed at reducing gang violence and providing alternatives to youths. Gas Leak Scam-In this scheme, a workman, frequently in a uniform, complete with hardhat, clipboard and some testing device will appear at your door and claim to be from the Gas Company. Their goal is to be let into your house to search for a gas leak, sometimes working in teams, one will distract you while the other pockets wallets, jewelry and cash. -Ask for Company ID. -Telephone the company to confirm identities. -As discussed in other sections; keep valuable locked away. Gift Card Scams-Criminals will copy the account number from gift cards while they are in a local establishment, once purchased and activated they can go online, shop and empty the card in minutes. Another spin-off is along the same lines but when they call the 800-number and see there is a balance, they will report it lost (claiming to be the possessor) and get another card with the balance, leaving your legitimate card empty.

Some tips: -Dont buy a card that has been opened or if the scratch off covering the serial number has been removed. -Purchase your card from a customer service person -Record the account and customer service numbers Government Grant Scams-With this scam, criminals exploit the fact that the government will give just about anyone money for just about anything. Scammers will offer to research grants and funding sources for a fee, when you can simply go online and search for free; but they dont tell you that. -There are no secret government grants, they are all listed. -Use http://www.grants.gov/ to search for grants, its free.

H
Hacking-This is a term used to describe unauthorized entry into a computer system or network. There are millions of hackers around the globe, some of whom have succeeded in breaking into government and business computers that were once thought to be immune from such attacks. How can you prevent hackers from breaking into your computer? -Ensure you have a virus protection program installed and that it is current. -Apply firewall settings and check them periodically. -Set administrator rights for yourself and limit download privileges for other users. -Ensure you have security settings enabled on wireless routers. -Avoid downloading attachments from unknown senders. -Be very careful about what internet sites you visit and from which you open links or execute downloads. Health Care Fraud-Some unscrupulous providers will exploit the insurance companies and the government by charging for services not provided or double bill for those you receive. To defend against these schemes, carefully review invoices and bills for any suspicious charges.

Holiday Crimes-While crimes occur 365 days a year, some are more common during the busy holiday shopping times. Most frequently you will see an increase of car break-ins and burglaries, because criminals know where the loot is. -Keep purchases, purses, backpacks and other bags out of view by locking them in your trunk. - At home, keep gifts locked in a room if possible. Avoid leaving high-value items out. -After opening gifts, be sure to break down boxes from expensive electronics and consider bringing them to the recycling center versus laying them out like an advertisement that there is a new plasma TV in the house. -When out shopping, before you have too much to carry at once, make a trip to the car and lock items in the trunk. Home Based Business Scams-While a few opportunities exist to work from home and make a respectable income, there also numerous scams that exploit the desire to work from home. Something I have heard time and time again and agree with is that there are very few legitimate work at home job opportunities available, despite what internet ads may say. Nearly every one of these is a scam. -Before you even respond to an offer to work from home, do your research; try Google and the company name, you will likely find complaints and warnings about the opportunity or even the company name. -Check with the local Better Business Bureau to check the company record of complaints. Home Repair Scams-These scams start when a salesman or contractor approaches you at home with an offer to perform needed repairs for a lower cost than is the norm. Quite frequently the services provided are substandard; the company is not licensed or bonded and has been known to leave after payment is received; frequently upfront. -Deal only with licensed and bonded companies. -Avoid paying in advance of work being completed. - Request an estimate and possibly a contract before hiring. -Check licenses, insurance and permits with the local authorities. Hotel Crimes-Staying in a hotel is often a necessity when on vacation or when traveling for business, but the risk of theft and exploitation is higher because you are often in an unfamiliar city and distracted by the travel and activities. While most modern hotels have recognized the need to enhance security measures for guests, there remains the risk of thefts, scams and violent crime. When traveling and staying in hotels, follow these simple steps to reduce your risks: -Avoid carrying large amounts of cash; opt for a single credit card.

-Leave valuable jewelry at home, locked in the safe you installed. -Inquire with the local police about crimes in and around the hotel property. -Request a room on the second or higher floor to lower the risk of entry through balcony doors and windows. -Always confirm who is at the door before opening it. Call the front desk or room service to verify the identity. -Store valuables with the front desk if they have a proper safe. -Frequently in-room safes are inferior in quality and hotels will not be responsible for losses from them. -Be wary of new friends who inquire as to your room number and itinerary. Hotspot Schemes-With the popularity of free Wi-Fi Hotspots, criminals are seizing the opportunity to obtain your banking information, credit card numbers and passwords. -Avoid sending passwords over a public Wi-Fi Network -Be wary of sending personal information over a public Wi-Fi Network. -Do not supply credit card or personal information to free Wi-Fi Networks for verification. -Pay attention to any automatically executing files that pop-up when you are on a Wi-Fi Network. Hit-Man Scam-You receive an email or sometimes a call, in which the person claims to be a hit-man with a contract out on you, but in a moment of reflection they decided to not kill you; provided you pay the contract off. The scary part is that they frequently have done some research on you before the initial contact or they get details through social engineering. These scams seek to exploit money from you through fear, to date, there has not been one documented case of an actual hit-man calling their mark after a change of heart; they were all scams.

I
Identity Theft-Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes. The FTC estimates that as many as 9 million Americans have their identities stolen each year. In fact, you or someone you know may have experienced some form of identity theft. The crime takes many forms. Identity thieves may rent an apartment, obtain a credit card, or establish a telephone account in your name. You may not find out about the theft until you review your credit report or a credit card statement and notice charges you didnt makeor until youre contacted by a

debt collector. Identity theft is serious. While some identity theft victims can resolve their problems quickly, others spend hundreds of dollars and many days repairing damage to their good name and credit record. Some consumers victimized by identity theft may lose out on job opportunities, or be denied loans for education, housing or cars because of negative information on their credit reports. In rare cases, they may even be arrested for crimes they did not commit. How do criminals get your information? -Dumpster Diving. They rummage through trash looking for bills or other papers with your personal information on it. -Skimming. They steal credit/debit card numbers by using a special storage device when processing your card. -Phishing. They pretend to be financial institutions or companies and send spam or pop-up messages to get you to reveal your personal information. -By fraudulently changing Your Address. They divert your billing statements to another location by completing a change of address form. -Old-Fashioned Stealing. They steal wallets and purses; mail, including bank and credit card statements; pre-approved credit offers; and new checks or tax information. They steal personnel records, or bribe employees who have access. -Pretexting. They use false pretenses to obtain your personal information from financial institutions, telephone companies, and other sources. What if someone steals your identity? Place a "Fraud Alert" on your credit reports, and review the reports carefully. The alert tells creditors to follow certain procedures before they open new accounts in your name or make changes to your existing accounts. The three nationwide consumer reporting companies have toll-free numbers for placing an initial 90-day fraud alert; a call to one company is sufficient: Equifax: 1-800-525-6285 Experian: 1-888-EXPERIAN (397-3742) Trans Union: 1-800-680-7289 -Placing a fraud alert entitles you to free copies of your credit reports. Look for inquiries from companies you haven't contacted, accounts you didn't open, and debts on your accounts that you can't explain. -Close accounts. Close any accounts that have been tampered with or established fraudulently. -Call the security or fraud departments of each company where an account was opened or changed without your okay. Follow up in writing, with copies of supporting documents.

-Use the ID Theft Affidavit in the appendix to support your written statement. -Ask for verification that the disputed account has been closed and the fraudulent debts discharged. -Keep copies of documents and records of your conversations about the theft. -File a police report. File a report with law enforcement officials to help you with creditors who may want proof of the crime. -Report the theft to the Federal Trade Commission. Your report helps law enforcement officials in their investigations. Online: www.ftc.gov/idtheft By phone: 1-877-ID-THEFT (438-4338) or TTY, 1-866-653-4261. By mail: Identity Theft Clearinghouse, Federal Trade Commission, Washington, DC 20580 Immigration Lottery-The U.S. Department of State does run a visa lottery, but it is nothing like a regular lottery; the prize here is the ability to come to the United States to live and work; something cherished by millions of non-Americans. Criminals will exploit language barriers and the hopes of immigrants to their own benefit. Subject to potential program changes; each year, the Diversity Lottery (DV) Program makes 55,000 immigrant visas available through a lottery to people who come from countries with low rates of immigration to the United States. Of such visas, 5,000 are allocated for use under NACARA beginning with DV '99. The State Department (DOS) holds the lottery every year, and randomly selects approximately 110,000 applicants from all qualified entries. The DOS selects the approximately 110,000 applications since many will not complete the visa process. However once 55,000 are issued or the fiscal year ends, the DV program is closed. If you receive a visa through the Diversity Visa Lottery Program you will be authorized to live and work permanently in the United States. You will also be allowed to bring your spouse and any unmarried children under the age of 21 to the United States. Some important things to note: - You cannot enter the Diversity Visa Lottery through commercial websites. The program is managed by the U.S. Department of State and they process applications. -There have been instances of fraudulent websites posing as official U.S. Government sites. Some companies posing as the U.S. Government have sought money in order to "complete" lottery entry forms. -There is no charge to download and complete the Electronic Diversity Visa Entry Form. The Department of State notifies successful Diversity Visa applicants by letter, and NOT be electronic mail.

IRS Emails-As outlined in the section covering tax scams, the IRS will not email you for refund routing, banking or personal information. While the majority of these attempts crop up around tax time, others come at random times and are fishing attempts to get your money.

J
Jewelry Scams-A diamond may be a girls best friend but it is a thiefs target too. Scams can come in any number of ways. One popular scam is the fake gold scheme, in this one a person approaches you and offers to sell an expensive gold chain for a few bucks to pay for gas, it will have the luster and shine of a gold chain, even bears the 14K stamp on the clasp. The deal of a lifetime instinct hits and you fork over a third of the value, problem is that the chain is either polished brass or gold plated. Anyone can stamp 14K on anything, but the shimmer of gold distracts you. Another scam uses diamond jewelry; same scheme but its glass and not a diamond. -Buy only from reputable dealers. -Avoid the deal of a lifetime urge. - Along the same lines, you visit any one of the popular online auction sites and find that Rolex you have eyed for years, but now its only a fraction of the price. There are some counterfeit watches that have fooled experienced experts, avoid that deal of a lifetime urge. -Arrange for an independent inspection before paying. You can also get scammed when you visit a jeweler to have a piece resized or repaired; some scammers have switched stones or complete items with less expensive copies. -Again, deal only with established Jewelers. -Inspect your item before you pay and leave.

K
Kidnapping- is a rare event. Despite sensational news stories, the frequency of a stranger prowling parks to snatch children is rare; while I in no way discount the risk, it is not as severe as some would tend to believe. Leading crime prevention specialists offer the following tips when talking with your children: - Clearly and honestly explain the danger. Parents often tell children, "Don't go with strangers." This is vague and doesnt help children protect themselves. Most abduction events are by relatives (noncustodial and in cases of separation cases) The best advice would be, "If you are lost or need help, sometimes its okay to ask strangers for assistance, but strangers shouldnt be asking you for help or to go with them. You should not go somewhere with strangers unless you need their help in an emergency." -Who is a stranger? A stranger is anyone you dont know. Make an agreement regarding who is safe to go with, and that they must say "NO!" to anyone else, no matter what! Teach your child to stay at least arms length away from a stranger who approaches them. -While we repeat the importance of respecting adults, impart that in cases of fear; kids need not be polite. -Remind your child not to open the door to strangers except in a real emergency. Explain what an emergency might be, such as a medical problem or a fire. Tell them not to answer probing questions from strangers. Tell them to come get you, or to call you instead. Make sure they know how to reach you wherever you might be. -Teach them how and when to call 9-1-1. -Make a code word. Teach the child a code word. If a visitor comes to get them, the visitor must know the code word, or the child should not go with them. -Pick their routes and stay in groups. Avoid alleys, wooded areas, parking lots and spontaneous shortcuts. Choose areas where anything out of the ordinary would be noticed by neighbors, business owners, pedestrians, etc. Most importantly, help them avoid isolation. Arrange for them to walk with trusted friends. Consider providing them with a cell phone so that they can call for help. -Identify trusted adults. Pick stores, schools, churches, and homes of safe neighbors. Make sure your child knows these "safe places" that they should go if they need help. - NOGOTELL. If approached by somebody who is scary, or who asks them to do something that seems wrong, a child should yell "NO!" then GO immediately to a trusted adult and TELL what happened. -Teach what to do in an actual kidnap attempt. If a child is screaming, a passerby may think it's a child having a tantrum, and fail to recognize an actual abduction. Children who are victims of attempted

abduction should repeatedly yell "HELP! I DONT KNOW THIS PERSON! IM BEING KIDNAPPED!" Children have been saved by doing this! Be sure your child knows that resistanceyelling, kicking, scratching, bitingis acceptable under these circumstances. Depending on the age of your child, encourage them to remember details: vehicle description or model, appearance of the person involved, what was said, etc. Call the police immediately. Kidnapping Scams (AKA Virtual Kidnappings)-In this scam a criminal will contact you by phone and claim to have kidnapped a friend or loved one. Before they call they have done their homework; they know details about the supposed victim and enough about you to pull off these scams at an alarming rate. Frequently they will exploit a persons overseas travels to call family and friends stateside. In any case, you will almost always want to notify the authorities. Given the complexities of actual cases, you should consult with an expert.

L
Liar Loans-Are mortgages that are based on self declared income and assets. These were quite prevalent in the years leading up to the housing market crash and some argue were the genesis for the problems we are now facing. Home buyers were allowed to say they made as much money as was needed to justify huge loans, only to later learn that with adjustable rate mortgages, they were unable to make the payments. While prevention relies on providing accurate information when applying for loans, sellers can protect themselves by following these tips: -Work with a licensed real estate professional and an attorney. -Ensure applications are submitted and approved before closing. -Avoid allowing potential buyers to move-in before closing unless a lease is drawn up. Lock Picking- Lock picking is the art of unlocking a lock by analyzing and manipulating the components of the lock device, without the original key. Although lock picking can be associated with criminal intent, it is an essential skill for a locksmith. Burglary through lock picking is quite rare, though bumping is becoming somewhat more common.

M
Medical Cure Scams-Since the days of the Old West, folks have roamed the country hawking everything from snake oil to mysterious devices that claim to cure anything from cancer to a headache. One of the worst of the worst preys on cancer patients and promises to cure them; recently the Food and Drug Administration (FDA) issued an alert regarding these bogus products: http://www.fda.gov/cder/news/fakecancercures.htm Some examples of claims that should raise red flags: -Treats all forms of cancer -80% more effective than the number one cancer drug. -Skin cancers disappear -Targets cancer cells while leaving healthy cells alone -Shrinks malignant tumors While new products and treatments are being developed every day, you should only deal with reputable Physicians and Pharmacies. Medical ID Theft-This is a new scam in which criminals will dumpster dive to find patient records at Doctors offices or troll through your trash to find discarded prescription bottles. With the patient and doctor names, prescription number and drug details, they will attempt to get refills in your name and later use or sell the drugs. A spin-off of this scam is where they will sell these details to organizations to use in insurance billing scams. Some tips to prevent this scam: -Before discarding prescriptions, remove the labels -Ensure your Doctor is properly destroying documents and records by shredding -Check you insurance statements for refills or treatments you didnt receive Muggings-As with any physical attack; do not resist. Nothing is worth your life. While muggings are often random acts, the perpetrator often looks for an easy mark. Avoid the look of an easy mark by: -Paying attention to your surroundings -Know your route and follow it with confidence -Avoid isolated areas, especially at night

N
Nanny Cameras-Numerous incidents of abuse have been documented through the use of Nanny Cams; several news stories have shown shocking conduct on the part of nannies and baby sitters, the decision to use one should be made after reviewing local laws and ordnances. In my opinion, they are a sound investment. Nigerian Advance Fee Scams-This is another area where I have gained a depth of knowledge. Simply put, there is no long lost relative who left you millions from an oil venture and despite the convincing arguments; there is not a pile of cash waiting for you. These scammers are so adept at their craft that they have conned doctors, lawyers, mothers and everyone in-between. Regardless of the origin, the scam is the same: something for nothing. NME Prize Disbursement Checks-Due to the number of cases I have investigated, these folks get their own listing. While a marketing ploy, the manner in which they conduct business has caused more reports of suspected fraud than any in recent memory. What happens is you receive an official looking mailing that alludes to your sudden windfall; all you have to do is call them. What they are is a magazine subscription firm. While they are running a contest, you are better off buying a lotto ticket and magazine at the same time; saving a bit of money in the end.

O
Offshore Investments-These scams exploit the desire of some folks to hide money from their spouse, the IRS or profits from crimes they commit. While there are legal methods to invest and bank in other countries, be wary of sending your nest-egg to some far away land; chances are it is a scam. -Deal with recognized and established investment firms -Ensure you have consulted an attorney before sending your money overseas, you must comply with all federal laws related to trade with certain nations. Overseas Lottery-Simply put, it is illegal and a scam. Unless you travel to the country in question, buy a ticket and the number is picked; you cant win. While there have been actual cases of folks winning the Irish Lottery in the 1800s, it is now 2011 and the likelihood that you are the one is slim to none. If you receive an email or letter saying you won the Spanish, Indian, English or any other foreign lottery; report it to the FTC and local authorities.

P
Phishing Scams- Phishing is a scam where Internet fraudsters send spam or pop-up messages to lure personal and financial information from unsuspecting victims. To avoid getting hooked: -Don't reply to email or pop-up messages that ask for personal or financial information, and don't click on links in the message. Don't cut and paste a link from the message into your Web browser scammers can make links look like they go one place, but that actually send you to a different site. -Some scammers send an email that appears to be from a legitimate business and ask you to call a phone number to update your account or get your "refund." Because they use VOIP and numberspoofing, they are able to disguise the number and caller-id information. If you need to reach an organization you do business with, call the number on your financial statements or on the back of your credit card. Police Impersonators-For me art the worst of the worst, even if they are only dressing up to play police. Police Impersonators erode the public trust and make it more difficult for the real police to do their job. Imposters have gone as far as getting a surplus police car and all the equipment, then go out and conduct bogus traffic stops; robbing and assaulting numerous victims. If you are driving along and the police signal you to pull over, look to see that it is a marked police vehicle, while the police do use unmarked vehicles for traffic enforcement, a fully marked car is usually a guarantee. If you suspect the person may be a police impersonator or imposter, do the following: -Slow down and activate your 4-way flashers -Drive to a well lit/populated area, avoid stopping on isolated roadways -Call 911 and let them know that you are being signaled to pull over and are concerned the car may be an imposter. Dispatch will verify if it is the real police. You will need to let them know what road you are on and your vehicle make and model. -If the officer is not in uniform, ask to see their police identification, do not rely on a t-shirt and badge that says police. -When stopped, roll your window down just enough to communicate and pass your license out, explain your concerns. -Request that a marked unit come to the scene. -Police officers understand the publics concern and will endeavor to alleviate your fears, an imposter will frequently flee. If the latter is the case, record the details of the imposter and their vehicle then call 911.

Pickpockets-I have watched some of the most skilled pickpockets at work; they prowl the busy Metro station, malls, and concerts, and anywhere people are about with their favored prey: wallets full of cash and credit cards. I remember the commercial for a major credit card, in this display about their fraud prevention and replacement guarantee, they demonstrated what is known as the school of bells, this school was not one that granted degrees or held classes in ivy covered buildings; it was a college of crooks. The depictions showed an adept pickpocket approach a dummy adorned with thousands of little brass bells; the object was to lift the wallet and not ring a bell. First, lets dismiss some common misconceptions about pickpockets. An experienced pickpocket is not necessarily the sleazy person lurking in dark doorways we expect to see. He (or she!) appears as an average person in both appearance and manner. Because of their chosen "line of work," they spend a great deal of time studying how to blend into a crowd, therefore eliminating the possibility of detection before they can get away. Pickpockets dont have a regular schedule; they operate just as well at night as they do during the day. They operate in crowds just as easily as "accidentally" bumping into an unsuspecting victim alone on a sidewalk. In fact, about the only "known" fact about pickpockets is that they generally focus on the public during times when they may be carrying more money than usual, such as during the holidays, at store sales, at fairs or carnivals, at casinos, or near bank entrances, etc. Many times, pickpockets work alone; however, there are also teams of two or three, which sometimes will involve a female accomplice. The first team member removes the valuables from the unsuspecting victims pockets. He then passes them on to the next member who disappears quickly from the area. When a female member is used in this team effort, her role is generally to engage the victim in conversation to distract his or her attention. Contrary to what most of us believe, experienced pickpockets do not put their hands all the way into your pocket to steal your belongings. The expert pickpocket reaches into the top of the pocket, takes up a bit of the lining, and continually folds the lining up until the bottom of the pocket. Tips for Men: The target areas are back trouser pockets, and suit coat and sports jacket pockets, located both inside and out. A pickpocket generally avoids front trouser pockets, and especially buttoned or zippered pockets. If you have to carry your wallet in an unbuttoned jacket, coat or pants pocket, be sure it holds only what you can afford to lose. Keep large sums of money, credit cards, IDs, in your front pocket or any buttoned or zippered pocket. Some people even place a rubber band around their wallet, because the rubber band creates friction and rubs against the fabric of your pocket if someone is attempting to remove it without your knowledge. Avoid patting your pocket to see if your wallet is still there; this lets a criminal know the exact location of your valuables. -Larger-size pocket secretaries are particularly inviting to pickpockets, and relatively easy to steal.

Tips for Women: Do not carry your wallet in your purse. Conceal it in a buttoned or zippered pocket where it doesnt show a bulge. -Use a purse that is difficult to open. A purse with a zipper or snaps is best. If you are carrying a shoulder bag, place the strap(s) diagonally across your body, as opposed to carrying it on one shoulder. This keeps the purse in front of you, instead of at your side or behind you, which sometimes happens with purses with long straps. If you are carrying a hand bag, then make sure to hold it close to the front of your body, instead of holding it on your wrist or loosely in your hand. -Never leave your purse unattended on a store counter or in a grocery shopping cart. Tips for Travelers: No one ever expects to have their vacation or business trip interrupted by a criminal act, but there are additional precautions that you can take to help ensure a safe, enjoyable trip: -Pack a photocopy of your airline tickets, passport, credit cards and any other documents that would be impossible or inconvenient to replace if stolen. Keep a list, separate from your wallet, of contact numbers to report lost credit cards. -Dont wander into risky areas alone or at night, and try to avoid buses that are standing room only. -Its always a good idea to carry your valuables in a money belt and leave your expensive jewelry at home. Ponzi Schemes-The Ponzi scheme entices new investors by offering returns other investments cannot guarantee, in the form of short-term returns that are very high. Usually, these schemes are interrupted by legal authorities before they collapse because a scam is suspected or because the promoter is selling unregistered securities. As more investors become involved, the likelihood of the scheme coming to the attention of authorities increases. -Deal only with registered securities dealers -Be cautious of guaranteed returns.

Q
I have yet to encounter a crime, scam or otherwise that started with the letter Q. Perhaps some clever criminal will create one, thereby making me work on a third-edition of this book.

R
Rape-Is forced sexual contact, it crosses all bounds and effects women, men and children. The perpetrators are men, women and young adults. While the driving force behind rape is control and dominance, the defense against it covers awareness of your surroundings, avoiding isolated locations and a degree of caution when dating. This is one crime in which most will advocate resistance, be it yelling or physically fighting back; the decision rests with the potential victim and their ability. For protection against stranger attacks, the same tips and advice I give for other crimes would apply. Royal Titles-Who wouldnt want to be King, while it may sound silly to most, the sale of fake titles continues to be an issue today. One leading example is the sale of purported titles from England. The problem is such that the UK Embassy has a site dedicated to the subject: http://ukinusa.fco.gov.uk/en/faqs/knighthood-honours/buy-british-title Scammers will claim that they can convey a proper Royal title to you upon purchase of a piece of land or by registering certain papers with certain offices. In short, the only way to get a royal title is to be a royal. Another angle in these scams is that the scammers will claim that you can change tour name by Deed Poll, which is just a piece of paper that documents what you want to be called. While you are free to change your name to anything you want; provided it is done without criminal intent, having the title Sir John of Mc Duck will mean nothing to anyone aside from you for self affirmation or possibly a gullible date.

S
Salvaged Auto Scam-Unscrupulous car dealers will buy a wrecked car at auction, perform repairs and retitle the vehicle to conceal the fact that it was a total loss and written off by an insurance company. Often the repairs are substandard and present safety risks; seatbelts may be damaged, the frame may be out of kilter, welds may not hold, the breaking system could fail or worse. -Get a car history report from a commercial firm -Have your own mechanic inspect the vehicle. -Deal only with reputable dealers.

Second Passports-The pitch is that you can get a second passport (for a fee) in any name you want, which will provide you visa free travel, banking opportunities and a way to change your name. They are all scams. While some countries do convey citizenship and later a passport through economic investment, the cost is upwards of half a million dollars and requires a lengthy process. If you engage one of these scammers, they will have you supply your personal information and pay a substantial processing fee, which is nonrefundable of course. They will string you along for months before disappearing. If you are interested in trying for economic citizenship or residency programs, contact the Embassy of the country in question. Another scheme is when a scammer will claim that you can get a second passport by way of where Grandma or Grandpa may have been born, yes there is a way to do this through Ireland, Israel and Germany to cite a few; but the process requires presenting an application to the Embassy of the respective county, with proof such as birth certificates, old passports and the like. While some firms can help with the process, with time and effort, you can do it for the cost of a few stamps and the application fee. Sex Offenders-Under current Federal Laws, the public can search a national database for registered sex offenders. The site: http://www.nsopr.gov/ allows you to search by name of offender or in the advanced mode; by location. You can report suspected violators of the registration laws to the local police. Social Engineering- Is the act of manipulating people into performing actions or divulging confidential information. While similar to a confidence tricks or simple scams, the term typically applies to trickery or deception for the purpose of information gathering, fraud or computer system access; in most cases the attacker never comes face-to-face with the victim. Social Engineering is almost an art form, with numerous groups devoted to the practice, learning from previous mistakes and working through them. -Be wary of any request for personal information, passwords or other details. -If a company calls you for personal details, call them back on a published number, do not call back the number they give. -Just because your Caller ID says it is XYZ Company does not make it so, there are devices to spoof Caller ID. Sports Betting-Following a recent crackdown by the feds, the popularity of offshore betting has gone down somewhat but it remains a constant. It is important to remember that it is illegal to engage in this type of activity and at any moment these operators can close their doors and be off with your money, leaving you with no recourse. In addition to the legal implications and the chance that they will never pay out on a big-win, there is also the potential for identify theft. Should you use an offshore operation and your information is compromised, you may be 100% liable for the charges. -Deal only with legal operators and operations.

Star Naming-How romantic is it to name a Star after a loved one, nice gesture but you are only buying a piece of paper. It is entirely up to you if you want to invest the $49.00 to be able to say I named a Star but you have no rights to the celestial body and twenty other people likely have named the same Star. Official sounding agencies can be created with ease, but even NASA has no claim to anything in space aside from their own equipment. Stranded Relatives Scam-You get a frantic email or telephone call from someone claiming to be or trying to help a relative; be it a cousin, grandchild or whomever. They seem to know a bit about you and them; they seem desperate and need you to wire them money to pay for a tow, bail or whatever. As outlandish as it sounds, it happens quite a bit and quite a few people fall prey to this one. They get your family member details from places like MySpace and other social networking sites, from obituaries and through social engineering. As with the trend seen in kidnapping scams, you will need to use your best judgment before taking action. Street Vendors- As pointed out in discussion about counterfeit goods and the empty box scam, some street vendors are less than scrupulous. While some are honest folk trying to make a buck, some are just scammers looking to get over on anyone they can. -Check for a permit, deal only with licensed vendors and use your best judgment. Sweepstakes and Lotto Scams- Recently I investigated over a dozen cases of sweepstakes and lotto scams, in these cases the potential victim received a letter and a check; the letter directed them to dial a telephone number, whereupon a friendly gent would direct them to deposit the check (usually about $5,000) into their bank and wire over a few hundred dollars to cover taxes and fees. The way sweepstakes scam works is that you are contacted by someone who claims that you won their sweepstake or contest, and that all you have to do to receive your prize is to wire them money to cover taxes (or service fees, or shipping, or any number of other illegitimate excuses). They are usually in a big hurry to get you to give them your information, and don't want to give you time to think it over. How to Recognize the Sweepstakes Scam: -Legitimate sweepstakes do not place strings on their prizes. -You won't have to pay taxes to anyone but the IRS and in some cases, the state you reside in. Another way to steal from you using sweepstakes scams is to convince you to turn over your bank account or credit card information. The thieves can then wipe out your accounts. Here is their Modus Operandi (MO): You are contacted and told that you have won a prize, but you need to give out your bank account and/or credit card numbers before you can receive your winnings. Usually they say that they need that information to verify your age, your identity, or that you can afford the taxes. They get this information and proceed to loot your accounts and steal your identity.

How to Recognize the Sweepstakes Scam: -Legitimate sweepstakes do collect payment to verify your identity. They may ask for identification, but will not charge you to give you your prize. - They are not required to check your income. -While sweepstakes sponsors may require your social security number for IRS purposes, this should be put onto an actual IRS form. Sweepstakes Scams and Identity Theft. A very subtle type of sweepstakes scam leads to identity theft, where criminals attempt to trick you into giving them enough of your personal information for them to be able to pose as you and to open credit cards, take out loans, and even perpetrate crimes in your name. Find out more about Sweepstakes Scams and Identity Theft. Some people are so concerned about sweepstakes scams that they hesitate to enter contests at all. But here's the thing - most of the time, scammers don't know whether you're a sweeper or not. They'll contact people randomly, sending out hundreds of thousands of letters or emails, hoping to hit the few people who will fall for their tricks. Sweetheart Scams-These cons involve a potential love interest who contacts you through any one of the popular dating sites, while your motive is to find true love; their motive is to get your money. These criminals are quite adept at their craft and will string victims along for months; even years while they drain back accounts. Given the complexities of these types of crimes, I will simply give you this advice: if a potential love interest is asking for money, its likely a scam. Perhaps my next book will just cover this terrible crime. Swoop and Squat Accident Scams- It works like this: Youre driving along when a car suddenly pulls in front of you. Immediately, another car pulls in front of both of you, and slams the brakes. The car directly in front of you slams the breaks and you end up rear ending that car. As soon as that happens, the car in front leaves the scene, never to be seen again. The result is that you and your insurance company end up paying bogus medical claims and outrageous repair bills. Aside from reinforcing what your Drivers Education Instructor said time and time again, and maintaining a safe following distance, there is not much that can be done to identify these crimes before they happen.

Talent Scout Scams-Everyone wants to be a Star, but the cost of not researching the company you write a check to can result in nothing more than grief. Most states require Talent Scouts to be licensed and in some cases bonded. This is to protect the consumer and prevent frauds. Bear in mind that just because someone is an established Scout and has all the proper papers does not mean they will make you famous. Frequently the scammer will have some business cards made up and claim to represent major players in the game, they will allude to have discovered any number of famous names and tell you that they have a project in the works that you are perfect for. The scary part is that some of these criminals are deviant predators seeking out victims, while others are just looking to take your money. Most scammers will ask for up-front fees to cover the cost of your portfolio, they may even be in cahoots with a photographer, but in the end you will have nothing more than a few head shots and a thinner wallet. -Deal only with established Scouts. -Check references. -Dont get rushed into a contract or payment plan. Tax Scams-Come tax time, the scams come rolling in. Most are clumsy attempts to get you to provide your personal information, which will be used by criminals to empty your bank accounts. The most important thing to remember around tax time, or any other time of the year is that the Internal Revenue Service (IRS) will not contact you by email or cold call you for any reason. You can report suspicious contacts to the IRS via www.irs.gov or by telephone: 1-800-829-1040 Some tips to avoid falling victim to tax scams: -Avoid giving out your social security number over the phone -Do not respond to emails claiming to be from the IRS -Deal only with reputable tax professionals

Telemarketing Frauds and Scams-Fast takers free money from gullible consumers. That is the line I use when I discuss telemarketers. While some are legitimate businesses using the phone to sell their wares and services, others are scams. Ways to avoid becoming a victim: -Don't allow yourself to be pushed into a hurried decision. -Always request written information, by mail, about the product, service, investment or charity and about the organization that's offering it. -Don't make any investment or purchase you don't fully understand. -Ask with what state or federal agencies the firm is registered. Check their references. -Check out the company or organization before you buy or invest. -If an investment or major purchase is involved, request that information also be sent to your accountant, financial adviser, banker or attorney for evaluation and an opinion. -Ask what recourse you would have if you make a purchase and aren't satisfied. -Beware of testimonials that you may have no way of verifying. -Never provide personal financial information over the phone unless you are absolutely certain the caller has a bona fide need to know. -If necessary, hang up the phone. Tips for Identifying potential cases of telemarketing fraud: -High-pressure sales tactics. -Insistence on an immediate decision. -The offer sounds too good to be true. -A request for your credit card number for any purpose other than to make a purchase. -An offer to send someone to your home or office to pick up the money or some other method such as overnight mail to get your funds more quickly. -A statement that something is "free," followed by a requirement that you pay for something. -Claims that the investment that is "without risk." -Unwillingness to provide written information or references (such as a bank or names of satisfied customers in your area) that you can contact.

Theft from Auto- One of the most common types of theft is theft of valuables from your automobile. Theft from auto is strictly a crime of opportunity that can be prevented if you take away the opportunity. Thieves generally wont waste their time breaking into autos that dont have valuables in plain sight. I have worked cases on car prowlers and car clouts (friendly terms for folks who rob autos) and learned one distinct trait; they want easy pickings. Rarely, if ever, would a car prowler break into a vehicle unless something good was in plain view. -The best way to prevent theft from your auto is to always keep valuables out of view. -Never leave cell phones, briefcases, purses, suitcases, or small electronic devices in plain view. Take these items with you, or secure themall the time, every time. -If your car has a trunk, use it. Put valuables in there or in a locked glove compartment. -During the holiday season especially, or any time youre shopping, place packages in the trunk, not on the passenger seats or floors. -If you can unfasten your navigation system and take it with you, do it or lock it in your trunk, do so. -If you have a cellular phone, GPS, satellite radio or other powered electronics in use, when you stash them away, take the time to stash the power cord too. A good car prowler can tell me what cord goes to what. -Keep your car doors and windows lockedall the time! Ticket Scams-With the average concert ticket going for upwards of $50.00 and often selling-out before we can get a seat, scammers are turning to scams to satisfy our desires. They counterfeit tickets to soldout events and you end up out the money paid and embarrassed at the door. -Deal with reputable ticket sellers. -Avoid buying tickets through online classifieds or on the street. Travel Agent Card Scam-Everyone wants to fly for less, this scam exploits the misconception that Travel Agents get free travel and accommodations under the pitch of familiarization tours. While some high volume agents do get perks like a free trip or stay at a resort that they book a lot of business with, most agents pay the same fare as regular consumers. Some of these scammers will also claim that you can earn commissions on travel you book for yourself; this is usually not the case either. The American Society of Travel Agents (ASTA) has published numerous advisories about these scams, referring to them as Card Mills, which like Diploma Mills, will sell you a Travel Agent Card based on payment of a fee and regular dues.

Travel Scams-In the same category as telemarketing fraud, you are solicited by phone or email to jump on a once in a lifetime travel deal. Frequently these are pitches from Time-Shares, and while you may get a free trip and possibly a stay at their resort, you will be required to attend an orientation; which is a high pressure sales meeting, where some consumers have reported being accosted for not buying, have been told they would have to pay exorbitant fees to cover the trip and worse. Yet another spin-off of Travel Scams is where you are contacted with a similarly sounding great deal but you have to put a deposit down to reserve or hold your space. In many cases, the scammer will make off with your money and the trip never occurs; in some cases the trip is overbooked by 500%. -Deal only with reputable travel agents. -Check with the Better Business Bureau for complaints about the perspective firm.

U
I have yet to encounter a crime, scam or otherwise that started with the letter U.

V
Vacation Scams- See Travel Scams

W
Water testing Scam-Here a scammer shows up at your door and claims to be testing the local water for possible contamination. You want to be safe and let them do their bit, turns out your water is polluted but if you buy a special filter, the water will be safe to drink. Be it know that all municipalities test their water at the source and at various points down the line, while not perfect, they usually know when there is a problem. There is always the chance that your pipes are bad, but if you have a concern, there are numerous commercial testing firms that will perform detailed analysis of your water.

Wireless Network Hacking- A now common crime involved criminals illegally accessing your wireless network in order to hack your computer or even worse, use your IP address for some very nasty things. In a few recent cases of network hacking, criminals actually used a victims system to host illegal pornography on an unsuspecting victims home computer. Follow the security guidance from your network router instructions. General tips include: -Changing default user names and passwords to obscure names and difficult to guess passwords. -Engage network encryption. -Enable firewalls on devices using the network. -Periodically check the system and computers for signs of hacking.

X
I have yet to encounter a crime, scam or otherwise that started with the letter X

Y
I have yet to encounter a crime, scam or otherwise that started with the letter Y

Z
I have yet to encounter a crime, scam or otherwise that started with the letter Z

Appendix and Checklists

The following forms and reference items are provided for the readers use. Please check with local authorities to ensure they will accept the forms.

ID Theft Affidavit Name: __________________________________________ Phone Number: ________________ 1: My full legal name is: __________________________________________________________ (First) (Middle) (Last) (Jr, Sr. III) 2: (If different from above) When the events described in this affidavit took place, I was known as: ______________________________________________________________________________ (First) (Middle) (Last) (Jr, Sr. III) 3: My date of birth is: ________________________ (day/month/year) 4. My Social Security number is: ______________________ 5. My drivers license or state identification number(s) are:________________________________ 6. My current address is:____________________________________________________________ City: __________________________ State: __________________ Zip Code: __________________ 7. I have lived at this address since: ___________________ (month/year) 8. (If different from above) when the events described in this affidavit took place, my address was: _________________________________________________________ City: __________________________ State: __________________ Zip Code: __________________ 9. I lived at the address in Item 8 from __________________ until __________________________ 10. My daytime telephone number is: (_____) ______________________ My evening telephone number is: (_____) ______________________

ID Theft Affidavit (Continuation) Check all that apply I did not authorize anyone to use my name or personal information to seek money, credit, loans, goods or services described in this affidavit. I did not receive any benefit, money, goods or the services described in this affidavit. My identification document(s) ________________________________________ were (describe: i.e. license, birth certificate, social security card) Lost Stolen on or about: ____________________ (day/month/year) To the best of my knowledge and belief, the following person (s) used my personal information to get money, credit, loans, goods or services, without my knowledge or authorization. ____________________________ _______________________________ Name (if known) ____________________________ _______________________________ Address (if known) ____________________________ _______________________________ Phone number (if known) ____________________________________________________________ I do NOT know who used my personal information to get money, credit, loans, goods or services. Additional information: _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________

ID Theft Affidavit (Continuation) Check one: I am am NOT willing to assist in the prosecution of this fraud Check one: I am am NOT authorizing the release of this information to law enforcement for the purpose of assisting them in the investigation of this fraud. Check all that applies: I have have NOT reported the events described in this affidavit to the police or other law enforcement agency. If you DID notify the police or other law enforcement agency, they did did NOT write a report. If you have reported this to the police or other law enforcement agency, provide the following information: ___________________________ _____________________________ Agency #1 Reporting Officer ___________________________ _____________________________ Date of Report Case Number, if available ___________________________ Telephone Number ___________________________ _____________________________ Agency #2 Reporting Officer ___________________________ _____________________________ Date of Report Case Number, if available ___________________________ Telephone Number Additional information: _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________

ID Theft Affidavit (Continuation) I declare the described accounts(s) was/were opened in my name, without my knowledge, permission or authorization, using my personal information and/or identification documents: Creditor Name/Address (Name of company that opened the account or provided the services) Account Number Type of unauthorized credit/goods/services (if known) Amount/Value (The amount charged, received or costs) EXAMPLE ABC Bank 123 Main Street New York, NY 12345 12345-6789-01 Mortgage $75,000.00 At the time of this fraud, I did have the following accounts open with the same bank/company, that I opened or authorized: Company/Bank Account Number(s): ____________________________________________________________________________________ ____________________________________________________________________________________ ____________________________________________________________________________________ ____________________________________________________________________________________

HOME SECURITY CHECKLIST


This checklist can be used to assess the security of your home or apartment. A regular review of these key items will ensure that nothing is missed. Exterior Starting at the property line, look around the exterior; does your home provide an attractive target? Are there items that can be carried off? The property should be well maintained. Ensure bushes are trimmed and do not provide a place for prowlers to hide. Install exterior lighting and motion activated lights. Doors should be illuminated. The house number is clearly posted. The garage and any sheds should be locked when not in use. Barbeque grills, bikes, mowers and other items should be stored in a shed or locked to a fixed object. (Observe proper safety practices with gas powered items and grills) Entrances All locks should be changed when you move in. Locks should also be changed if a tenant moves out, if you fire a housekeeper, nanny or other person with access to keys. Exterior doors should be of solid construction with quality deadbolt locks. Install wide-angle viewers on doors. Doors that lead from the garage into the house should be locked when not in use. The garage door is closed and locked when not in use. Sliding glass doors should have a pin or dowel to prevent jimmying. Do not leave keys in planters or under mats. Windows All windows should close and lock properly. Install latch pins on basement windows to prevent jimmying.

Alarms Consider installing a total coverage alarm system. The cost may be offset by some Insurance policies. If you have an alarm, use it. Alarms should be tested monthly. Faults or issues with your alarm should be corrected immediately. If you buy a home with an alarm already installed, change the codes. Valuables in the Home Keep a current inventory of all valuables; photograph them, record make, model and serial numbers. Store the inventory in a safety deposit box out of the home. In the event of most losses, Homeowners and Renters insurance will require proof of ownership for reimbursement. Store heirlooms and other irreplaceable items in a bank safety deposit box. Vacation Security If you will be away for an extended period of time, ask a trusted friend or neighbor to look after your home. Ensure mail service is put on-hold or collected by the friend/neighbor. Newspaper delivery is put on hold until you return. Request the local police conduct a vacation check Install times on lights and televisions. VEHICLE SECURITY CHECKLIST Install and use an anti-theft alarm. Use a quality steering wheel lock. Keep your vehicle in good condition. Always lock your vehicle, even if you will be right back. Store valuables out of sight, better yet, take them with you. If you use a GPS or radar detector, lock it in the trunk and replace the outlet plug. Leave only the ignition key with parking attendants and mechanics, unless access to the trunk is required. .

Never get out of the vehicle before you look for suspicious persons. If in doubt, drive away. Know the locations of safe havens along routes of routine travel. Plan your route before you depart. Keep the doors locked and windows rolled up. Think about enrolling in the local police departments auto theft program Have the VIN Number applied to the windows.

About the Author

Jonathan Greenstein has served in a variety of positions in law enforcement, from patrol to criminal investigations. As an experienced investigator he has conducted long term investigations of complex frauds and swindles, narcotics violations, abductions and deaths. He is a graduate of advanced training in criminal investigations and has lectured on the modalities of criminal operations. He has published numerous articles and manuals related to crime prevention, awareness and guidelines for investigators conducing inquiries into a wide range of criminal offenses.

The A-Z Crime Guide (Second Edition)

2009, 2011 Jonathan D. Greenstein

Вам также может понравиться