Term
Name a few types of common Internet Scams. |
|
Definition
Grandchild trapped in foreign country
Mystery shopper
Hitman
Overpayment
EBay
Craig's list |
|
|
Term
Name a few type of common lottery scams. |
|
Definition
Canadian
Nigerian
El Gordo (Spanish)
Great Britain
US Sweepstakes |
|
|
Term
What does the "419 Lottery Scam" refer to? |
|
Definition
Nigerian lottery scam
419 = Nigerian Criminal Code |
|
|
Term
T/F Some scams operate by telling the victim they won a prize/lottery and need to pay a small processing fee to acquire the winnings. |
|
Definition
True
Another common scam is asking the victim to write a check to cover the fees or transfer of funds when there was no "prize" |
|
|
Term
T/F Lottery scams that ask for a check to cover fees are successful (according to the slides) because it often takes over 21 days for a check to clear. By the time the victim realizes the issue it's already too late. |
|
Definition
|
|
Term
Identity theft is when:
a) a fake name is used to purchase goods and defraud a company
b) a real person's name and personal info are used without their knowledge for a criminal purpose
c) a real person's name is used to defraud a companyu
d) a fake name is used for criminal purposes |
|
Definition
a real person's name and personal info are used without their knowledge for a criminal purpose |
|
|
Term
Identity theft is usually first noticed when:
a) the bank sends the victim a letter about their account
b) credit card applications appear in the mail on a more frequent basis than before
c) credit is denied or foreclosure is initiated
d) it's rarely noticed which is why it's so successful |
|
Definition
credit is denied or foreclosure is initiated |
|
|
Term
At least seven reasons were listed for Identity Theft during the class presentation. Name four of the reasons someone would steal another person's identity. |
|
Definition
Take over financial accounts
Open new bank accounts
Apply for loans
Apply for credit cards then max them out and dump the accounts
Apply for health/welfare benefits
Establish utility services
Rent apartments |
|
|
Term
Several 'Points of Compromise' were listed during our class presentation. A 'Point of Compromise' is an avenue used by a criminal to obtain personal information from someone else without their knowledge. Name a few 'Points of Compromise'. |
|
Definition
The criminal is employed in a position that allows them access to other employee's personal information
The criminal finds employees that are in a position with access to personal info and they recruit them with money/drugs/promises; the employee gives the criminal the info requested
Pretext calling (false representation) and asking the victim directly for their info
Dumpster Diving
Hacking into company servers (electronic stealing)
Reading public records
Theft / Burglary (purses, cars, houses)
US Mail Theft |
|
|
Term
What does 'Phishing' mean?
a) a computer crime that taps into phone lines
b) use of a spoofed email or fake website to deceive users
c) a network of computers used in a denial-of-service attack
d) using computer viruses to steal information from a network computer |
|
Definition
Phishing is the use of a spoofed email or website to deceive internet users into disclosing their financial and personal info for criminal purposes, such as ID theft and fraud |
|
|
Term
Related to 'phishing' scams, what does 'Dragnet' refer to:
a) spam to wide distribution
b) intentionally trying to catch a particular group
c) putting out traps and seeing what you catch
d) targeting big corporations into releasing info on clients, patients, sources |
|
Definition
spam to wide distribution |
|
|
Term
Related to 'phishing' scams, what does 'Guided' refer to:
a) spam to wide distribution
b) intentionally trying to catch a particular group
c) putting out traps and seeing what you catch
d) targeting big corporations into releasing info on clients, patients, sources |
|
Definition
intentionally trying to catch a particular group |
|
|
Term
Related to 'phishing' scams, what does 'Whaler' refer to:
a) spam to wide distribution
b) intentionally trying to catch a particular group
c) putting out traps and seeing what you catch
d) targeting big corporations into releasing info on clients, patients, sources |
|
Definition
targeting big corporations into releasing info on clients, patients, sources |
|
|
Term
Related to 'phishing' scams, what does 'Lobster Pot' refer to:
a) spam to wide distribution
b) intentionally trying to catch a particular group
c) putting out traps and seeing what you catch
d) targeting big corporations into releasing info on clients, patients, sources |
|
Definition
putting out traps and seeing what you catch |
|
|
Term
According to the class presentation, what type of ID theft accounts for half of the incidents?
a) credit cards
b) medical
c) fake IDs
d) fraudulent checks |
|
Definition
Medical ID Theft accounts for half of the incidents |
|
|
Term
When did identity theft become a crime (Class 4 Felony, up to six years in prison)?
a) 1996
b) 1984
c) 2000
d) 2006 |
|
Definition
In 2006 House Bill 1326 passed making identity theft a crime. |
|
|
Term
T/F In 2005 a senate bill was passed allowing customers to freeze their credit accounts as part of a protective measure against identity theft. |
|
Definition
True
senate bill 05-137 was passed in 2005 (Credit Freeze Protection). There is NO FEE for the 1st freeze but a $10 fee for a second freeze. It costs $10 to lift the freeze. There's also a special temporary lift for one creditor that costs $12. |
|
|
Term
Which of the following is not an identity theft warning sign:
a) credit denied
b) new or renewed credit cards don't arrive
c) routine financial statements stop arriving
d) creditors stop calling |
|
Definition
D) creditors stop calling
In reality there would be an influx of calls from creditors. |
|
|
Term
Which of the following best describes the actions someone should take if they are a victim of ID Theft:
a) contact the credit bureau fraud dept, the account issuer in question, and the local PD for a report
b) call the FBI
c) open a help ticket on www.consumer.gov/IDTheft
d) Contact the bank and freeze all accounts |
|
Definition
contact the credit bureau fraud dept, the account issuer in question, and the local PD for a report |
|
|
Term
T/F Data breaches and employee theft can be prevented by implementing a robust physical security program including annual ethics training. |
|
Definition
|
|
Term
Which of the following most closely matches the elements of the crime of FORGERY:
a) intent to defraud; alters a check
b) intent to defraud; uses a fake ID
c) signs spouses signature on a check
d) with intent to harass writes a check knowing there are insufficient funds in the account |
|
Definition
a) intent to defraud; alters a check
18-5-102, FORGERY, Class 5 Felony
Intent to defraud
Falsely makes, completes, alters, or utters a written instrument |
|
|
Term
Which of the following most closely matches the elements of the crime of CRIMINAL POSSESSION OF A FORGED INSTRUMENT:
a) issues a check with insufficient funds
b) uses an ATM card knowing it was revoked
c) knowing it's forged, possesses a check, intending to defraud
d) knowing it's fake, keeps a fake ATM card in their wallet |
|
Definition
c) knowing it's forged, possesses a check, intending to defraud
18-5-105, Criminal Possession of Forged Instrument, Class 6 Felony
Knowledge its forged
With intent to defraud
Possesses forged instrument |
|
|
Term
Which of the following most closely matches the elements of the crime of CRIMINAL IMPERSONATION
a) pretends to be spouse on phone call with cable company
b) knowingly gives a fake name to a telemarketer
c) gives a fake ID to a state trooper
d) uses stolen credit card to pay for gas |
|
Definition
c) gives a fake ID to a state trooper
CRIMINAL IMPERSONATION (18-5-113) Class 6 Felony
Knowingly assume a fake identity with intent to gain a benefit OR with intent to injure/defraud |
|
|
Term
Which of the following most closely matches the elements of the crime of FRAUD BY CHECK
a) accidentally writing a check that bounces
b) writing a check and post dating it so you have time to add money to the account
c) issuing a check knowing there's insufficient funds
d) not balancing your check book and spending more than you have in the account |
|
Definition
issuing a check knowing there's insufficient funds
WITH INTENT TO DEFRAUD
|
|
|