SlideShare une entreprise Scribd logo
1  sur  15
Internet News Hass Associates
Warning Article Code
85258083266-HA: Don't Be
Fooled By
Phishers, Fraudsters, and
Scammershttp://www.huffingtonpost.ca/romeo-vitelli/how-fraudsters-
scam-people-psychology_b_3299701.html#slide=754167
"Every year, Americans lose about 40 billion
dollars in telemarketing fraud and they lose
another 100 billion dollars a year in fraud in
general."
In his talk at the Committee for Skeptical
Inquiry convention held in
Nashville, Tennessee last October, Anthony
Pratkanis had no problem getting his
audience's attention. Pratkanis, a professor of
psychology at the University of California in
Santa Cruz, is a well-known expert on
economic fraud crimes, marketing
behaviour, and subliminal persuasion. Along
The consequences of these schemes can be
devastating. In a recent court decision, a
British judge sentenced three members of a
phishing gang to heavy prison time after a
British woman lost her entire life savings
(US$1.6-million) through a phishing scam.
The woman's bank account was siphoned
off using an elaborate system of "mules" to
withdraw the money without the bank
noticing. The gang members then spent the
money in an elaborate shopping spree that
left little for police to recover. Though the
judge ordered the money to be repaid, there
The con artists can interact with their
intended target in any number of
ways, whether through spam
email, telemarketing, investment seminars, or
television commercials. Some of the scams
that Pratkanis mentioned in his talk include:
charity frauds, investment scams (such as
gas and oil development schemes), lottery
frauds, etc.
One thing victims share is that they are often
too afraid to come forward for fear of being
seen as "too gullible." However, Pratkanis
and his colleagues' research found that there
were no other real pattern to the targets.
Among the things that can make older
people more vulnerable is loss of a spouse.
Often after a death, potential "saviours"
come forward offering solutions that can
lead to grieving seniors taking unsafe risks.
Part of the danger again comes from what
Pratkanis calls the "Disneyland influence,"
with scam artists using tactics familiar to
social psychologists to gain a potential
victim's trust.
Some of the most common strategies used
by scam artists are:
• Social proof - if everyone agrees, it must
be a good deal
• Door in the face - asking a potential
victim for a large commitment which, when
rejected, is followed by a request for a
smaller commitment more likely to be
accepted
• Authority - the person or company
pitching to you is someone to be trusted
• Scarcity - if you don't take this deal
now, you'll lose out and never get another
chance
Sweepstakes prizes are one example of a
phantom fixation suggesting that purchasing
magazines, etc. can make you eligible for
winning a fabulous prize that never
materializes. Making one purchase often
leads to requests for more money to
"increase the chances of winning" the big
prize. The prospect of winning millions can
be overwhelming for people with modest
nest eggs.
Many older adults also feel they have few
years remaining and can see the big prize as
their "last chance" at becoming wealthy.
Then there is authority. Scam artists usually
present themselves as being, or
representing, high-status figures or
celebrities who command instant respect.
One convicted con-man in an educational
video described how he successfully called
potential victims posing as bank
presidents, branch managers, or FBI agents.
Authority also plays a role in mail and
internet scams with "official" stamps of
government or corporate agencies to
command respect. Use of celebrities is
another example of authority to help promote
scams.
Other familiar scam tactics include:
• Reciprocity - providing a free gift to the
potential victims which then makes them feel
obligated to buy something
• Similarity - the scam artist will pretend
to share your values and experiences. People
are more likely to be taken by someone with
whom they can identify
• Consistency - trapping the intended victims
with their own words. If the proposed
victims report a specific need, such as a
good investment, the scam artist will
promptly play on that by insisting that the
No scam artist will rely on only one tactic and
the intended victim will usually be subjected to
a barrage of different tactics to wear down
resistance. During any direct contact, whether
in person or on the phone, a good scam artist
will essentially interview intended victims to
learn their weak spots. The first sale is usually
just a "foot in the door" which makes the
victim more likely to make further purchases.
And not just from one scam artist, either. Since
scam artists often share customer
lists, accepting one scam can lead to being
subjected to numerous other scam artists
since you have been identified as a "live one."
Using "mooch lists" that police agencies
have seized from known scam artists, names
and telephone numbers of potential victims of
fraud are collected. Volunteers from the
National Telemarketing Victim Call Center
(NTVCC) call these victims and warn them
that they are potential targets for fraud. In
operation since 2006, NTVCC maintains a
"Reverse Boiler Room" for contacting
potential victims. Fraud Fighters warn these
potential victims of high-pressure telephone
tactics and also provide referrals to local
agencies.
Drawing on social psychological research
into scam techniques, the Outsmarting
Investment Fraud campaign combines
moderated presentations, educational
videos, and group exercises to increase
consumer awareness. The campaign is
designed to teach consumers to ask the right
questions and to check the credentials of
brokers selling the investments. Educational
videos include interviews with victims, scam
artists, and securities regulators as well as
showing the right and wrong way to respond
While information seminars and online
resources can be effective in teaching
potential victims to be more
cautious, curbing a multi-billion dollar
industry will take time and effort.
As new cases of people being cheated out
of their life savings come to light, staying
vigilant and asking more questions about
those "too good to be true" deals is more
critical than ever.
Related Video:
Related Articles:
http://www.shelfari.com/groups/101845/dis
cussions/487576/Hass-and-Associates-
Online-Crime-Ware-Warning-and-Online-
Fraud-W
http://hassausooke.wordpress.com/
http://hassbiggerprice.wordpress.com/tag/
hass-associates-online-cyber-review-
scam-du-jour-theyre-creative/

Contenu connexe

En vedette (9)

Fixed Deposit Accounts
Fixed Deposit AccountsFixed Deposit Accounts
Fixed Deposit Accounts
 
Deposits
DepositsDeposits
Deposits
 
Rights & Duties of Customers - Banking Operations
Rights & Duties of Customers - Banking OperationsRights & Duties of Customers - Banking Operations
Rights & Duties of Customers - Banking Operations
 
documentation on bank management system
documentation on bank management systemdocumentation on bank management system
documentation on bank management system
 
Business Intelligence Presentation (1/2)
Business Intelligence Presentation (1/2)Business Intelligence Presentation (1/2)
Business Intelligence Presentation (1/2)
 
Bank Management System
Bank Management SystemBank Management System
Bank Management System
 
Banking system ppt
Banking system pptBanking system ppt
Banking system ppt
 
Fraude presentacion 2010
Fraude presentacion 2010Fraude presentacion 2010
Fraude presentacion 2010
 
Banking ppt
Banking pptBanking ppt
Banking ppt
 

Dernier

Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Dernier (20)

Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Internet News Hass Associates Warning Article Code 85258083266-HA: Don't Be Fooled By Phishers, Fraudsters, and Scammers

  • 1. Internet News Hass Associates Warning Article Code 85258083266-HA: Don't Be Fooled By Phishers, Fraudsters, and Scammershttp://www.huffingtonpost.ca/romeo-vitelli/how-fraudsters- scam-people-psychology_b_3299701.html#slide=754167
  • 2.
  • 3. "Every year, Americans lose about 40 billion dollars in telemarketing fraud and they lose another 100 billion dollars a year in fraud in general." In his talk at the Committee for Skeptical Inquiry convention held in Nashville, Tennessee last October, Anthony Pratkanis had no problem getting his audience's attention. Pratkanis, a professor of psychology at the University of California in Santa Cruz, is a well-known expert on economic fraud crimes, marketing behaviour, and subliminal persuasion. Along
  • 4. The consequences of these schemes can be devastating. In a recent court decision, a British judge sentenced three members of a phishing gang to heavy prison time after a British woman lost her entire life savings (US$1.6-million) through a phishing scam. The woman's bank account was siphoned off using an elaborate system of "mules" to withdraw the money without the bank noticing. The gang members then spent the money in an elaborate shopping spree that left little for police to recover. Though the judge ordered the money to be repaid, there
  • 5. The con artists can interact with their intended target in any number of ways, whether through spam email, telemarketing, investment seminars, or television commercials. Some of the scams that Pratkanis mentioned in his talk include: charity frauds, investment scams (such as gas and oil development schemes), lottery frauds, etc. One thing victims share is that they are often too afraid to come forward for fear of being seen as "too gullible." However, Pratkanis and his colleagues' research found that there were no other real pattern to the targets.
  • 6. Among the things that can make older people more vulnerable is loss of a spouse. Often after a death, potential "saviours" come forward offering solutions that can lead to grieving seniors taking unsafe risks. Part of the danger again comes from what Pratkanis calls the "Disneyland influence," with scam artists using tactics familiar to social psychologists to gain a potential victim's trust. Some of the most common strategies used by scam artists are:
  • 7. • Social proof - if everyone agrees, it must be a good deal • Door in the face - asking a potential victim for a large commitment which, when rejected, is followed by a request for a smaller commitment more likely to be accepted • Authority - the person or company pitching to you is someone to be trusted • Scarcity - if you don't take this deal now, you'll lose out and never get another chance
  • 8. Sweepstakes prizes are one example of a phantom fixation suggesting that purchasing magazines, etc. can make you eligible for winning a fabulous prize that never materializes. Making one purchase often leads to requests for more money to "increase the chances of winning" the big prize. The prospect of winning millions can be overwhelming for people with modest nest eggs. Many older adults also feel they have few years remaining and can see the big prize as their "last chance" at becoming wealthy.
  • 9. Then there is authority. Scam artists usually present themselves as being, or representing, high-status figures or celebrities who command instant respect. One convicted con-man in an educational video described how he successfully called potential victims posing as bank presidents, branch managers, or FBI agents. Authority also plays a role in mail and internet scams with "official" stamps of government or corporate agencies to command respect. Use of celebrities is another example of authority to help promote scams.
  • 10. Other familiar scam tactics include: • Reciprocity - providing a free gift to the potential victims which then makes them feel obligated to buy something • Similarity - the scam artist will pretend to share your values and experiences. People are more likely to be taken by someone with whom they can identify • Consistency - trapping the intended victims with their own words. If the proposed victims report a specific need, such as a good investment, the scam artist will promptly play on that by insisting that the
  • 11. No scam artist will rely on only one tactic and the intended victim will usually be subjected to a barrage of different tactics to wear down resistance. During any direct contact, whether in person or on the phone, a good scam artist will essentially interview intended victims to learn their weak spots. The first sale is usually just a "foot in the door" which makes the victim more likely to make further purchases. And not just from one scam artist, either. Since scam artists often share customer lists, accepting one scam can lead to being subjected to numerous other scam artists since you have been identified as a "live one."
  • 12. Using "mooch lists" that police agencies have seized from known scam artists, names and telephone numbers of potential victims of fraud are collected. Volunteers from the National Telemarketing Victim Call Center (NTVCC) call these victims and warn them that they are potential targets for fraud. In operation since 2006, NTVCC maintains a "Reverse Boiler Room" for contacting potential victims. Fraud Fighters warn these potential victims of high-pressure telephone tactics and also provide referrals to local agencies.
  • 13. Drawing on social psychological research into scam techniques, the Outsmarting Investment Fraud campaign combines moderated presentations, educational videos, and group exercises to increase consumer awareness. The campaign is designed to teach consumers to ask the right questions and to check the credentials of brokers selling the investments. Educational videos include interviews with victims, scam artists, and securities regulators as well as showing the right and wrong way to respond
  • 14. While information seminars and online resources can be effective in teaching potential victims to be more cautious, curbing a multi-billion dollar industry will take time and effort. As new cases of people being cheated out of their life savings come to light, staying vigilant and asking more questions about those "too good to be true" deals is more critical than ever. Related Video: