Fraud and Scam
Alerts
The FTC Networks Security Department
investigates all Fraud, Scam and Abuse
complaints. To learn more about the FTC
Networks Security Department, visit our
Security Department page.
FTC Internet is
concerned about the safety of its
customers.
At FTC Internet, we see a wide range of scams
that can have a direct impact on you. We
have dedicated resources working to
investigate, track, and, where possible,
resolve issues that occur as a result of
scams. Through news releases, bill
inserts and now, this new page on our
corporate Web site, we can quickly alert
you to current scams and immediately
provide you with information on how to
avoid being victimized.
Here you'll find updated information on
the latest Internet and phone scams.
You'll also find reports on current
scams and tips on how to protect
yourself.
If you'd like to alert us to something
not listed or if you'd like more
information, visit our
Contact Us
page.
By working together, we can help reduce
the prevalence of scams that hurt our
customers and cost our industry billions
of dollars each year.
Telephone
Fraud Involving Jury Duty
How it works: Individuals
identifying themselves as U.S. Court
employees have been contacting citizens
by telephone and informing them that
they have been selected for jury duty.
The caller asks to verify names and
Social Security numbers and then asks
for credit card numbers. If the request
is refused, citizens are then threatened
with fines and prosecution for failing
to comply with jury duty.
Federal courts do not require anyone to
provide any sensitive information in a
telephone call, such as Social Security
numbers or credit card numbers. Most
contact between a federal court and a
prospective juror will be through the
U.S. Mail.
How to protect yourself: If you
receive one of these phone calls, do not
provide any personal or confidential
information to these individuals. This
is an attempt to steal or to use your
identity by obtaining your name, Social
Security number, and potentially to
apply for credit or credit cards or
other loans in your name.
If you have already been contacted and
have already given out your personal
information, please monitor your account
statements and credit reports, and
contact your local FBI office. It is a
crime for anyone to falsely represent
himself or herself as a federal court
official.
Back to Top
Collect
Calling
How it works: A simple scam, it
continues to pop up around the country.
What generally happens is you receive a
call from an operator asking you to
accept an urgent collect call. While
most customers won't accept a call if
they don't recognize the name, some do
because they worry it might be from a
friend or relative who is in trouble.
Once you agree to accept the call,
though, you will be billed for the
charges.
How to protect yourself: Never
accept a collect call from someone you
don't know. If you are unsure, request
that the operator ask the caller a few
questions to determine the identity of
the caller. Most of the time, these
additional questions will cause the
person making the call to hang up.
Back to Top
Calling Card
Number Theft
How it works: Someone uses your
calling card number to make their own
long distance calls while you pay the
bill. The theft happens in a number of
ways. Someone calls posing as a
representative of your phone company and
asks for your calling card number for
verification purposes. Another common
scenario is that someone watches or
listens as you punch in or read your
calling card number at any pay phone.
How to protect yourself: Protect
your calling card number the same way
you would protect your credit card
information. FTC Internet and other major
telecom companies never need to ask you
for calling card number; they already
have it. If this happens, ask questions
and ask for a callback number. In most
cases, the caller will hang up. When
dialing your card number into a pay
phone, cover your actions with your
body. If you suspect someone nearby is
eavesdropping or watching, stop until
they move away. Commit your PIN to
memory; don't carry the PIN for your
calling card in your wallet.
Be aware that if FTC Internet senses heavy
and unprecedented usage on your calling
card, we put a stop on the card and will
call you to verify the usage. We will
issue you another card number and you
can begin using it right away. You will
not be responsible for fraudulent
charges. If your calling card is ever
lost or stolen, report it immediately.
Back to Top
Third Number Billing
How it works: You receive a call
from an operator asking you if the
charges for a call being placed by
someone you know can be placed on your
phone bill. This is known as third-party
billing. Often, the operator will repeat
a persuasive argument from the
third-party and try to convince you the
person is in trouble. If you accept the
third-party charges, you will find the
charges on your bill.
How to protect yourself: Never
accept the charges unless you are
absolutely certain you know the person.
Ask questions and be suspicious. Most
phone companies will allow you to place
a "block" on your phone, preventing such
charges from being assessed.
Back to Top
Identity Theft
How it works: People will use a
variety of methods to convince you to
give up personal information such as
Social Security number, credit card
numbers, calling card numbers, bank
account numbers, etc. Using this
information, criminals can pose as you
and commit a number of crimes. This will
cost you a considerable amount of money
and time as you try to restore your
credit rating and damaged financial
situation. The attempt can occur by way
of a phone call from someone
masquerading as a legitimate business.
It might come in the form of a letter or
email from an allegedly legitimate
business or individual. It might even
happen when someone searches your trash
for mail containing personal information
and credit card receipts. In many cases,
a pre-approved credit card application
gives the criminal enough information to
set up a credit card in your name.
How to protect yourself: In
general, closely guard all of your
personal information. Unless you are
absolutely certain you know the person
or business you're talking or
corresponding with, be suspicious, ask
questions, and ask for callback
information. Be very careful with the
documents you place in your trash. Shred
or rip into tiny pieces any credit card
applications or credit cards you're not
interested in, before you put them in
the garbage. Another good idea is to
obtain a free credit report annually
through one or more of the major credit
bureaus.
Back to Top
Credit Card
Number Theft
How it works: Similar to other
schemes, this is a scam designed to
convince you to give up your credit card
number over the phone or via email. This
allows an unauthorized person to use
your card and run up illegal charges.
Usually, you will receive a phone call
or email from someone masquerading as a
representative from a legitimate company
you might normally do business with. The
person will try to convince you they
need your credit card number to check
your account.
How to protect yourself: Treat
your credit card and your credit card
numbers like they were cash. Be
suspicious and ask lots of questions;
just hang up or don't respond to the
email. Most legitimate companies do not
need your credit card number; they
already have it. The only time you
should provide your credit card number
is when you are actually buying
something from a trusted company. Also,
remember to check your credit annually
through one or more of the major credit
bureaus.
Back to Top
*72 Prison Scam
How it works: You receive a call
from an operator saying there is an
inmate from a correctional facility who
needs you to accept a collect call and
the associated charges. Once you accept
the call, the caller convinces you to
hang up your phone, dial in *72 and
another phone number. * 72 is the code
used to forward your incoming calls to
another number, if you have call
forwarding service or if it's available
on a per-use basis in your local
exchange. If you do this, the inmate
will then make additional collect calls
to your number, but the calls will be
forwarded to someone the inmate knows at
the number where you forwarded the
calls. That person accepts the charges,
but they are billed to you. Often you
don't realize this has happened until
you notice your phone not ringing or you
receive your bill with numerous
unexpected charges.
How to protect yourself: Never
accept collect calls unless you are
absolutely sure you know the person
calling. Never activate call forwarding
unless you need to do it for your own
reasons and to a number you know.
Back to Top
PBX/Voice Mail
Compromising
How it works: A PBX -- or Private
Branch Exchange -- is a piece of
equipment at a business which serves a
number of phone extensions within the
business, providing capabilities,
including in-house calling, call
transfers, call forwarding, and voice
mail. Often the equipment has the
capability for remote access to allow a
technician at an off-site location to
make changes or upgrades. A fraudster
will tap into the remote access function
through knowledge of a password or by
hacking. If they gain access, they could
give themselves the capability to make
long distance and other calls at your
expense. They could also gain access to
your voice mail system and create
mischief.
How to protect yourself: If you
do have a remote access feature on your
PBX, turn it off. Protect your passwords
for the PBX and/or voice mail systems,
and change them often. Always create a
new and unique password after activating
the equipment. It is also important to
regularly review all billing information
and block access to such numbers as
"900" services.
Back to Top
9-0 # Scam
How it works: This is a type of
fraud that preys on businesses that use
PBX systems or other types of
telecommunication systems where you have
to dial "9" to get an outside line to
make a call. The people attempting the
scam will call the main number at a
business and identify themselves as
working for the phone company. To
perform a system check, the person will
ask the receptionist to initiate a
conference call and then press 9 plus 0,
which accesses an outside line. The
receptionist is then asked to hang up.
Often, this leaves the scam artist with
access to the outside line. They then
make fraudulent long distance calls that
are billed to the business.
How to protect yourself:
Legitimate major telecom companies don't
have to dial into a PBX or phone system
to perform such a check. Just hang up or
ask pointed questions, including
requesting a callback number. Most of
the time, the scam artist hangs up and
moves on to someone else rather than
answering your question.
Back to Top
Slamming/Cramming
How it works: Slamming is an
industry term for an unauthorized change
in your choice of long distance company.
Often this is accomplished when someone
tries to sell you long distance service
or you sign a piece of paper for a
contest or other marketing promotion,
without checking the fine print. Often
your endorsement on a small prize check
serves as the authorizing signature. The
long distance company then tells your
local phone provider they have formal
authorization to switch you from your
current long distance company. Cramming
is similar but involves a company
placing an unauthorized miscellaneous
charge somewhere on your phone bill.
This could involve a charge for a voice
mail service, Internet access services,
or other service charges.
How to protect yourself: Be
careful about what you agree to in any
sales pitch or contest over the phone or
in person. Read the fine print. Perhaps
most important, check all details on
your phone bill regularly. If you see a
suspicious charge, be aware that the
company that placed the charge on your
bill is supposed to provide contact
information. Call and ask them about the
charge. If you cannot resolve the
situation and you didn't authorize the
charge, contact the business office for
your local phone company. Most local
companies allow you to place a "freeze"
on your long distance choice and overall
phone bill, requiring specific
authorization from you before a new
charge is added or the long distance
provider is changed.
Back to Top
Social Engineering
How it works: This is a general
term that involves someone trying to
convince you that they are someone
they're not, in order to collect
critical personal information from you.
A classic example is a scam FTC Internet saw
a few years ago, involving a person who
calls your home and claims to be a
FTC Internet representative. The person says
you overpaid your last phone bill and
they need some information from you --
which might include your Social Security
number -- to process a refund check.
How to protect yourself: Be
suspicious and ask questions. Ask for a
callback number. If you ever overpay
your local phone bill, major telecom
companies simply apply it automatically
to your next bill. There's no need to
call you and process a refund.
Back to Top
Phishing
How it works: You receive an
email that is made to look as though it
comes from a legitimate company you
normally do business with. The email,
for example, might tell you that some
sort of service normally provided to you
is due to expire soon. The email directs
you to a phony Web site made to look
like the site of the company you do
business with. Once there, you are asked
to provide personal information -- such
as a credit card or Social Security
number -- so that your service can be
continued.
How to protect yourself: First
clue: Check for misspelled words in the
email and closely examine the return
address. Unless you have pre-enrolled
with a company to do business via email,
be suspicious. Contact the company you
normally do business with -- via phone
or email -- and ask them to verify the
request. The scam can be tough to detect
since many of the criminals involved in
phishing design Web sites that are
nearly identical to a real company's Web
site.
Back to Top
Modem Hijacking
How it works: This is perhaps one
of the most prevalent scams on the
Internet today. When you visit a Web
site, you'll often see pop-up ads that
ask you various questions and offer you
a variety of services. To receive them,
all you have to do is select "yes" on
one or more ads. If you haven't read the
fine print, however, you can unwittingly
be agreeing to have software downloaded
to your modem, which then instructs your
modem to make long distance calls to
overseas pay-per-call services. These
calls can result in hundreds of dollars
in charges. This usually impacts dial-up
customers, rather than broadband
customers. Often you don't know this has
happened until you receive your next
phone bill.
How to protect yourself: If you
are interested in services offered by a
pop-up ad, read the fine print closely
before you select "yes". Unplug your
dial-up phone line from your modem when
you're not using it or place a long
distance or international call block
service on the line you use for dial-up
Internet access. If you do see
unexpected high charges to exotic
locations on your phone bill, call your
local or long distance phone company
immediately and ask them to investigate.
Back to Top
809 Scam
How it works: Under the scam, you
might receive an email, page, or
cell-phone text message urgently asking
you to call someone in the "809" area
code or some other area code that you
normally don't call. If you make the
call, you may be unwittingly dialing
into an expensive overseas pay-per-call
service resulting in large charges being
placed on your next phone bill.
How to protect yourself: If you
don't recognize the phone number or area
code, don't return the call. In general,
don't respond to such a message in any
situation unless you are absolutely sure
you know the person or the number you
are calling.
Back to Top
Overseas Money
Transfer Scam
How it works: This falls under
the heading of "if it's too good to be
true, it is." You receive an email from
someone claiming to represent a foreign
government or someone formerly involved
with a foreign government. The person
will claim that, through a change in
leadership or death, he or she has been
left with a large amount of money. They
will ask your help getting the money out
of the country, and if you help you can
receive a large share of the money. The
message will go on to ask you to respond
to the email with bank account
information and other personal
information to help set up the transfer.
How to protect yourself: Ignore
the email. Hit the delete button. It is
too good to be true.
Back to Top
|