Telemarketing fraud

Last updated

Telemarketing fraud is fraudulent selling conducted over the telephone. The term is also used for telephone fraud not involving selling.

Contents

Telemarketing fraud is one of the most persuasive deceptions identified by the Federal Trade Commission (FTC). [1] Telemarketing fraud often involves some sort of victim compliance whether it involves the victim initiating contact with the perpetrator or voluntarily providing their private information to the offender; thus, fraud victims may experience feelings of shame and embarrassment that may prevent them from reporting their victimization. [2]

Older people are disproportionately targeted by fraudulent telemarketers and make up 80% of victims affected by telemarketing scams alone. Older people may be targeted more because the scammer assumes they may be more trusting, too polite to hang up, or have a nest egg. [3] Many older people have money to invest and are in need of profit. Also, they are less likely to report the fraud because they don't believe that consumer complaints would be solved. [4]

Types of fraud

Telemarketing fraud tools

Scam Identification and blocking software

Scam Likely [26] is a term used for scam call identification, the term was originally coined by T-Mobile for the scam ID technology created by First Orion. [27] First Orion's scam blocking technology uses a combination of known bad actors, AI powered blocking including neighborhood spoofing and unusual calling pattern. Scam Identification is a feature of the T-Mobile and Metro carrier network which can be controlled by the app Scam Shield, [28] customer care or dialing the short code #664 to turn on or off scam blocking. [29]

There are a number of phone apps which try to identify, screen, send to voicemail or otherwise deter telemarketing calls with most major carriers providing some level of free scam call screening. "Call Blocking". Federal Trade Commission. Retrieved 2021-08-04. Additionally both iOS [30] and Android [31] operating systems offer scam screening options. In addition phone carriers may provide caller authentication using STIR/SHAKEN a caller authentication protocol designed to stop caller id spoofing by exchanging tokens between cellular carriers. [32]

Grandparent scam

A telephone call is made to an elderly person with a family member who is supposedly in some kind of trouble, usually claiming to be a grandson or granddaughter. These calls are often placed late at night or early in the morning when most people are not thinking as clearly. Callers assume that their targets have grandchildren and will usually have several other people in on the scam, such as a bail bondsman, the arresting police officer, a lawyer, a doctor at a hospital, or some other person. [33] The first voice on the phone is usually by the scammer pretending to be the grandchild sounding upset and typically stating that there are only a few moments to talk. The caller may say that they have a cold if the victim does not recognize their voice. Their story generally follows a familiar line: they were traveling in another country with a friend, and after a car accident or legal infraction, they are in jail and need bail money wired to a Western Union account as soon as possible for their quick release. [34] The caller does not want anyone told about the incident, especially not family. Before the victim can ask too much about the situation the phony child will hand the phone over to the accomplice who will then request money to be transferred to release the grandchild from jail. While this is commonly called the grandparent scam, criminals may also claim to be a family friend, a niece or nephew, or another family member. [33]

Microsoft scam

A telephone call is made saying typically that virus activity has been detected on the victim's computer; the overseas caller then states they are from Microsoft or a Microsoft certified technician. Callers assume that the victim has a computer running a Microsoft Windows operating system (users of other operating systems, such as Linux, are a minority and are likely to be technically knowledgeable). They will get the computer owner to give the caller remote access using a genuine networking service or website like ammyy.com or TeamViewer. They will use the ‘Event Viewer’ tool on the computer to highlight the Red-X Errors and Yellow Warnings which are supposedly signs of an infection, [9] when in fact these are normal and harmless logs [35] They also encrypt the owner's password database, preventing access to the computer without the scammers' password, essentially locking the victim out of their own computer and ensuring that they themselves will be paid. At this stage the caller then has complete control over the computer, and can display further alarming displays, as well as installing malware. The cold caller will then offer to remove the viruses and malicious malware (some of which they have installed themselves) and install security software and provide an ongoing support service costing up to $500. [36] The Federal Trade Commission (FTC) has reported a huge crackdown on tech support scams and ordered a halt to several alleged tech support scams. [37]

Related Research Articles

<span class="mw-page-title-main">Advance-fee scam</span> Type of confidence trick fraud

An advance-fee scam is a form of fraud and is one of the most common types of confidence tricks. The scam typically involves promising the victim a significant share of a large sum of money, in return for a small up-front payment, which the fraudster claims will be used to obtain the large sum. If a victim makes the payment, the fraudster either invents a series of further fees for the victim to pay or simply disappears.

<span class="mw-page-title-main">Telemarketing</span> Method of direct marketing

Telemarketing is a method of direct marketing in which a salesperson solicits prospective customers to buy products, subscriptions or services, either over the phone or through a subsequent face to face or web conferencing appointment scheduled during the call. Telemarketing can also include recorded sales pitches programmed to be played over the phone via automatic dialing.

Caller identification is a telephone service, available in analog and digital telephone systems, including voice over IP (VoIP), that transmits a caller's telephone number to the called party's telephone equipment when the call is being set up. The caller ID service may include the transmission of a name associated with the calling telephone number, in a service called Calling Name Presentation (CNAM). The service was first defined in 1993 in International Telecommunication Union – Telecommunication Standardization Sector (ITU-T) Recommendation Q.731.3.

The National Do Not Call Registry is a database maintained by the United States federal government, listing the telephone numbers of individuals and families who have requested that telemarketers not contact them. Certain callers are required by federal law to respect this request. Separate laws and regulations apply to robocalls in the United States.

Phone fraud, or more generally communications fraud, is the use of telecommunications products or services with the intention of illegally acquiring money from, or failing to pay, a telecommunication company or its customers.

Email fraud is intentional deception for either personal gain or to damage another individual using email as the vehicle. Almost as soon as email became widely used, it began to be used as a means to defraud people, just as telephony and paper mail were used by previous generations.

<span class="mw-page-title-main">Lottery scam</span> Fraud pretending to be a lottery

A lottery scam is a type of advance-fee fraud which begins with an unexpected email notification, phone call, or mailing explaining that "You have won!" a large sum of money in a lottery. The recipient of the message—the target of the scam—is usually told to keep the notice secret, "due to a mix-up in some of the names and numbers," and to contact a "claims agent." After contacting the agent, the target of the scam will be asked to pay "processing fees" or "transfer charges" so that the winnings can be distributed, but will never receive any lottery payment. Many email lottery scams use the names of legitimate lottery organizations or other legitimate corporations/companies, but this does not mean the legitimate organizations are in any way involved with the scams.

<span class="mw-page-title-main">Cold calling</span> Form of business solicitation

Cold calling is the solicitation of business from potential customers who have had no prior contact with the salesperson conducting the call. It is an attempt to convince potential customers to purchase either the salesperson's product or service. Generally, it is referred as an over-the-phone process, making it a source of telemarketing, but can also be done in-person by door-to-door salespeople. Though cold calling can be used as a legitimate business tool, scammers can use cold calling as well.

<span class="mw-page-title-main">Caller ID spoofing</span> Phone caller faking the phone number sent to the recipient of a phone call

Caller ID spoofing is a spoofing attack which causes the telephone network's Caller ID to indicate to the receiver of a call that the originator of the call is a station other than the true originating station. This can lead to a display showing a phone number different from that of the telephone from which the call was placed.

Voice phishing, or vishing, is the use of telephony to conduct phishing attacks.

In a reloading scam, a victim is repeatedly approached by con artists, often until "sucked dry". This form of fraud is perpetrated on those more susceptible to pressure after the first losses, perhaps because of hopes to recover money previously invested, perhaps because of inability to say "no" to a con man.

A sucker list is a list of people who have previously fallen for a scam such as a telemarketing fraud, lottery scam, high-yield investment program, get-rich-quick scheme, or work-at-home schemes, or, as used by charities, someone who made a donation. The lists are usually sold to scammers or charities.

A robocall is a phone call that uses a computerized autodialer to deliver a pre-recorded message, as if from a robot. Robocalls are often associated with political and telemarketing phone campaigns, but can also be used for public service, emergency announcements, or scammers. Multiple businesses and telemarketing companies use auto-dialing software to deliver prerecorded messages to millions of users. Some robocalls use personalized audio messages to simulate an actual personal phone call. The service is also viewed as prone to association with scams.

<span class="mw-page-title-main">Work-at-home scheme</span> Scams focused on businesses run from ones home

A work-at-home scheme is a get-rich-quick scam in which a victim is lured by an offer to be employed at home, very often doing some simple task in a minimal amount of time with a large amount of income that far exceeds the market rate for the type of work. The true purpose of such an offer is for the perpetrator to extort money from the victim, either by charging a fee to join the scheme, or requiring the victim to invest in products whose resale value is misrepresented.

<span class="mw-page-title-main">Technical support scam</span> Type of fraud and confidence trick

A technical support scam, or tech support scam, is a type of scam in which a scammer claims to offer a legitimate technical support service. Victims contact scammers in a variety of ways, often through fake pop-ups resembling error messages or via fake "help lines" advertised on websites owned by the scammers. Technical support scammers use social engineering and a variety of confidence tricks to persuade their victim of the presence of problems on their computer or mobile device, such as a malware infection, when there are no issues with the victim's device. The scammer will then persuade the victim to pay to fix the fictitious "problems" that they claim to have found. Payment is made to the scammer through ways which are hard to trace and have fewer consumer protections in place which could allow the victim to claim their money back, usually through gift cards.

Utility scams are fraudulent acts where a perpetrator calls or arrives unannounced at a utility customer's house in an attempt to take money or sell unnecessary energy accessories through misrepresentation. Often, the fraud involves telling the victim that he or she owes the utility company money and that their power, gas, or water will be shut off immediately unless payment is made.

Lenny is a chatbot designed to scam bait telemarketers, scammers, and other unwanted incoming calls using messages.

An SSA impersonation scam, or SSA scam, is a class of telecommunications fraud and scam which targets citizens of the United States by impersonating personnel of the Social Security Administration. SSA scams are typically initiated by pre-recorded messages, or robocalls, which are designed to panic the victim so that they follow the scammer's instructions. In 2018, over 35,000 incidences of SSA scam robocalls were reported to the Better Business Bureau, and the total losses of victims added up to over $10 million. It is believed that approximately 47% of Americans were subject to an SSA impersonation scam robocall during a three-month period in mid- to late 2020, and that 21% of seniors were targeted by at least three SSA scam robocalls in the same time period.

RealCall is a US-based AI caller identification and call blocking smartphone application, used to detect, engage and block call and SMS scamming and spamming. It has AI algorithms with built-in free reverse phone lookup service and customized answer bots for detection, engagement and blocking of unwanted calls and messages. The app is available for Android and iOS devices.

References

  1. Varney, Christine (3 March 1998). "Prepared Remarks of Federal Trade Commissioner Christine A. Varney" (PDF). FTC. Retrieved 30 March 2016.
  2. "Roles, Rights, and Responsibilities: Introduction". www.ncjrs.gov. Retrieved 2021-09-05.
  3. Reed, Tim (March 25, 2013). "Elder Abuse: Financial Scams Against Our Seniors". brigantinepolice. Retrieved March 30, 2016.
  4. Alves, Linda; Wilson, Steve (2008-02-22). "The Effects of Loneliness on Telemarketing Fraud Vulnerability Among Older Adults". Journal of Elder Abuse & Neglect. 20 (1): 63–85. doi:10.1300/j084v20n01_04. ISSN   0894-6566. PMID   18551907. S2CID   6749119.
  5. "Tips To Avoid Scholarship Scams". weirdscholarships. 2012. Retrieved March 30, 2016.
  6. "Lottery Scams" . Retrieved March 30, 2016.
  7. Grabosky, Duffield, Peter, Grace (March 2001). "Red Flags Of Fraud" (PDF). Trends & Issues in Crime and Criminal Justice. No. 200. Australian Institute of Criminology.{{cite magazine}}: CS1 maint: multiple names: authors list (link)
  8. "Pyramid Scheme". Investopedia. Retrieved March 30, 2016.
  9. 1 2 3 Wall, David S. (October 2010). "Micro-Frauds: Virtual Robberies, Stings and Scams in the Information Age". Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications.
  10. Rupnow, C (April 23, 2003). "Not "made of money"". Wisconsin Leader-Telegram. Retrieved March 30, 2016.
  11. "Overpayment Scams". Scam Watch. 14 May 2015. Retrieved March 30, 2016.
  12. "Charity Scams". NCDOJ. Retrieved March 30, 2016.
  13. "Cramming Fraud Targets Consumers Credit Cards". ABC. Youtube. Archived from the original on 2021-12-13. Retrieved March 30, 2016.
  14. 1 2 "16 Ways You Can be Phone Scammed". 800notes. November 18, 2008. Retrieved March 30, 2016.
  15. Henderson, Les. "Schemes, Scams, Frauds". Crimes-of-persuasion. Retrieved March 30, 2016.
  16. "FTC Continues Crackdown on Office Supply Scams". Federal Trade Commission. September 29, 2000. Retrieved March 30, 2016.
  17. "Office Supply Scams". Action Fraud. Retrieved March 30, 2016.
  18. Harris, Sheryl (September 12, 2009). "Magazine sales calls likely to be scams; Telemarketing Sales Rule can help you tell real calls from fake". Cleveland. Retrieved March 30, 2016.
  19. Keith (27 September 2007). "Scammer can now use fake Caller ID". Scambusters. Retrieved March 30, 2016.
  20. "What are Robocalls". Verizon. Retrieved March 30, 2016.
  21. Saltzman, Aaron (November 25, 2015). "Endless telemarketing calls, scams and how the big telcos could stop them". CBC. Retrieved March 30, 2016.
  22. Miller, Jason, C (May 28, 2009). "Regulating Robocalls: Are Automated Calls the Sound of, or a Threat to, Democracy?". Michigan Telecommunications and Technology Law Review. 16: 1.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  23. Lane, Amy (June 25, 2015). "The startling facts about Telemarketing Fraud". Dialed in - Phone Lookup Blog. Retrieved March 30, 2016.
  24. Elson, Erica (November 3, 2014). "I'm a Telemarketer. Here's how to get rid of me". Lifehacker. Retrieved March 30, 2016.
  25. "Telemarketing Fraud". Georgia Department of Law. Retrieved March 30, 2016.
  26. "Screen your calls before you answer them". USA Today. January 21, 2019.
  27. "Who is Scam Likely and why are they calling me". 24 June 2019.
  28. "T-Mobile's Scam Shield app will cut down on those 'scam likely' calls. Here's how". CNET.
  29. "Self Service short codes".
  30. "Apple Support".
  31. "Screen your calls before you answer them".
  32. "Combating Spoofed Robocalls with Caller ID Authentication". 13 February 2019.
  33. 1 2 "The Grandparent Scam Don't Let It Happen to You". FBI.gov. 2 April 2012. Retrieved March 30, 2016.
  34. Schneider, Alex (December 2015). "How Could They Know That? Behind the Data that Facilitates Scams Against Vulnerable Americans". Virginia Journal of Law and Technology.
  35. "Event View Scam". Microsoft. June 11, 2012. Retrieved March 30, 2016.
  36. "Microsoft NZ and NetSafe issue warning about phone scammers". Microsoft. September 14, 2015. Retrieved March 30, 2016.
  37. "FTC Halts Massive Tech Support Scams". Federal Trade Commission. 2012-10-03. Retrieved 2018-07-10.

Additional sources