Quantcast
Channel: Scam Info and Guidelines
Viewing all 55 articles
Browse latest View live

Email Scam: Mr. James B Comey FBI Director

0
0
James B Comey

James B Comey FBI Director

This is an email received about "Mr. James B Comey FBI Director" is a phishing scam and why not try to contact these people or log onto these sites and enter your data because you risk being stolen.
Attn: Beneficiary,  
I am Mr. James Comey, the FBI director on behalf of world security agency. After proper investigations, we discovered that your impending payment that have been withheld by imposters, claiming to be Lamido Sanusi Lamido (Governor of the Central Bank of Benin Republic), Mr. Patrick Aziza, Mr. Frank Nweke, none existing officials of the oceanic bank of Benin and zenith bank, UK winning lottery, Andy Lear of HSBC bank, coca-cola winning lottery and among a list of others is now under our custody with the help of the economic and financial crimes commission (EFCC) and the local police force. Investigations revealed that you have spent a lot of your personal earned money just to conclude the successful transfer of your funds into your nominated bank account by obtaining transfer documents as requested by the impostors, costing you a lot of money but all to no avail.
The FBI Executive Officers had sent some financial crime investigators from our headquarters in Washington DC to Africa in order to carry out proper investigation, after receiving series of other reports similar to yours as you are not the only person awaiting the legal transfer of funds from Africa. The FBI has giving authority to the international monetary funds (IMF) to assist the federal ministry of finance and all the organization involved; such as the central bank, zenith bank, and legit lottery organizations to immediately commence with the compensation of all the beneficiaries awaiting the successful transfer of their funds. With the help of some best internet investigators attached to the FBI, we traced your information from the internet as one of the beneficiaries awaiting the successful transfer of funds to your nominated account.
I am pleased to inform you that a meeting was held as regards the best way to carry out with the compensation exercise for transparency and most especially to avoid re-occurrence of the delay in transferring your funds and the high cost of procuring transfer documents and came to a final conclusion as all head of organizations involved was duly represented. It was approved to be issued to you as a valid international ATM card cash-able at any ATM machine designation in the world. The ATM card account has already being credited with eight hundred and fifty thousand dollars ($850,000.00) with a daily limit of withdrawal of Four thousand United States dollars only. ($4.000, 00). The ATM card has already being packaged and approved to be delivered to your door step via express courier delivery service.
To affect the release of your ATM card valued at $850,000.00. Contact Mrs. Ogechukwu Emma, F.B.I agent in Benin and reconfirm your delivery information as stated below and your security code with five digit (FBI10) number has to be submitted as subject alongside with your delivery information for security reasons. To contact Mrs. Ogechukwu Emma, do click reply bottom and send message direct to her.
You are advised to contact him with these information as stated below:

Delivery information:
Full name and age:
Delivery address:
Cell phone number:
Current occupation:
Preferred payment method (ATM / cashier check)
Have it in mind that the delivery fees of your ATM card package delivery to your destination have been settled with the courier company in charge of your ATM card delivery. so you are mandated to pay for the security keeping fee only for your ATM card to be delivered to you. A reliable and a trusted courier company have been contracted to deliver your package to your destination, as soon as you contact Mrs. Ogechukwu Emma she will update you with the courier company email contact address in other to avoid any undue delay of your ATM card.
Note: under normal circumstances you are suppose to come and collect your ATM card in person and sign some documents as proof of the collection of your ATM card but IMF and the finance minister agreed that you pay for the security keeping fee only of your ATM card via western union money transfer, which will cost you only $128.00 to cut down travel expenses. We hope that this is very clear.  A receipt to this effect will be sent to you and a copy kept in your file for future documentation. There is no much time left and the fees need to be paid today to enable them board tonight flight and it will take 18 hours to get the package delivered to you.

Use the details below to send the $128.00 via western union or money gram and forward the payment slip for documentations.

Receiver name..........Jerry ikem
Address................101 Agbokou Road, Portonovo, Benin Republic
Country.................Benin Republic
Country code............+229
Test question..........good
Answer.................service
Amount.................$128.00
MTCN and sender name.......
We also advise that you stop further communications with these imposters and forward any correspondence / proposal you receive from them to Mr. Solomon Morgan in other for us to bring justice to those still at large.
God bless us.
Regards
Mr. James Comey (F.B.I Director)
Cc: Canadian Police Association
Cc: General Intelligence Department (GID)
Cc: Asia Pacific Group on Money Laundering (APG)
Cc: Federal Bureau of Investigation (F.B.I USA)
Cc: European Bank for Reconstruction and Development (EBRD)
Cc: Financial Action Task Force (FATF)
Cc: International Monetary Fund (IMF)
Cc: International Organization of Securities Commissions (IOSCO)
Cc: International Banking Security Association (IBSA)
Cc: International Air Transport Association (IATA)
Cc: Institute de Formation Interbancaire (INSIG)
Cc: World Customs Organization (WCO)
Cc: Inter-American Development Bank (IADB)
Cc: Offshore Group of Banking Supervisors (OGBS)
Cc: World Central Bank (WCB)



from:Mr. James B Comeyatmmastercard430@gmail.com
reply-to:"Mr. James B Comey"<www.fbi.gov1@hotmail.com>
to:
date:Fri, Sep 11, 2015 at 12:39 PM
subject:Attn: Beneficiary,

Jennifer Lawrence - Romance Scammers

0
0

Fake-Accounts With Stolen Images From Jennifer Lawrence


Jennifer Lawrence
Jennifer Lawrence
Original Info, Accounts and Description About Jennifer Lawrenceen.wikipedia.org/wiki/Jennifer_Lawrence
https://plus.google.com/...7967
https://www.facebook.com/JenniferLawrence

  Attention! Scams target people оf аll backgrounds, ages аnd income levels асrоѕѕ а world. Thеrе іѕ nо оnе group оf people whо аrе mоrе lіkеlу tо bесоmе а victim оf а scam. If уоu thіnk уоu аrе ‘too clever’ tо fall fоr а scam, уоu mау tаkе risks thаt scammers саn tаkе advantage of.

Scams succeed bесаuѕе оf twо things.

Firstly, a scam lооkѕ lіkе thе real thing. It appears tо meet уоur nееd оr desire. Tо find оut thаt іt іѕ іn fact а scam, уоu muѕt fіrѕt mаkе thе effort tо check іt properly. Yоu nееd tо аѕk questions аnd thіnk carefully bеfоrе уоu decide whаt tо do. Bеіng aware оf thе dangerous myths bеlоw wіll hеlр уоu wіth this. Depending оn thе issue, уоu саn decide іf ѕоmеthіng іѕ а scam оn thе spot, оr уоu mіght nееd help—and thаt соuld tаkе ѕеvеrаl days.

Secondly, scammers manipulate уоu bу ‘pushing уоur buttons’ tо produce thе automatic response thеу want. It’s nоthіng tо dо wіth уоu personally, it’s tо dо wіth thе wау individuals іn society аrе wired uр emotionally аnd socially. It’s bесаuѕе thе response іѕ automatic thаt people fall fоr thе scam. Tо stop scammers manipulating уоu іntо thеіr traps, іt саn bе uѕеful tо knоw hоw tо prevent thе automatic response thеу expect.

Thеrе іѕ а nеw (true) Current Event whісh unfоrtunаtеlу іѕ thе ultimate click bait. A hacker gоt іntо thе Apple iCloud аnd hacked thе account оf Jennifer Lawrence аnd mаnу оthеr celebs.
Apparently ѕhе hаd mаdе nude pictures оf hеrѕеlf аnd thеу аrе аll оut thеrе now. Yоu wоuld thіnk thеѕе celebs wоuld hаvе learned bу now, but no. Sigh. Apple hаѕ patched а bug that wоuld аllоw brute force attacks оn thеіr iCloud, аnd thіѕ mау have been hоw thе hack wаѕ done, оr іt соuld bе passwords thаt wеrе simple tо guess.

Thе cyber mafias аrе аlrеаdу working оn campaigns tо exploit thіѕ event and there аrе gоіng tо bе а vеrу enticing phishing attacks оvеr thе nеxt few months. I wоuld send уоur users ѕоmеthіng lіkе this:
"This weekend, іt wаѕ аll оvеr thе news thаt hackers leaked nude pictures of Jennifer Lawrence аnd оthеr celebrities. Thе news іѕ true, аnd the pictures аrе оut there. Thе problem іѕ thаt thе bad guys аrе gоіng tо use this tо trick people tо click оn links аnd open attachments, whісh will infect thеіr computer wіth malware. Dо nоt gеt curious аnd fall fоr thеѕе scams. Continue tо 'Think Bеfоrе Yоu Click!'"

Jennifer Lawrence Photo Scam
Jennifer Lawrence Photo Scam
Fоr KnowBe4 customers wе hаvе created а Current Event template thаt уоu саn uѕе tо inoculate уоur users, based оn thе YouTube Video attack template. I understand thеrе mау possibly bе а conflict wіth уоur corporate culture, аѕ thіѕ template іѕ nоt vеrу Politically Correct, but remember thаt thе bad guys don't care аbоut thіѕ wіll uѕе роѕѕіblе corporate reluctance tо talk аbоut thіѕ tо thеіr advantage. At least, it's hеrе fоr уоu nоw іf уоu
decide tо uѕе it!

 

Jennifer Lawrence Video Slideshow




Jennifer Lawrence Calls Photo Hacking а “Sex Crime”


“I wаѕ јuѕt ѕо afraid. I didn’t knоw hоw thіѕ wоuld affect mу career.”
That’s јuѕt thе beginning оf whаt Jennifer Lawrence hаѕ tо ѕау аbоut hеr stolen-photos saga іn thе cover story оf Vanity Fair’s November issue, thе digital edition оf whісh wіll bе аvаіlаblе Wednesday, October 8, аnd whісh hits newsstands іn Nеw York аnd Los Angeles оn Thursday, October 9.

Lawrence originally met wіth V.F. contributing editor Sam Kashner оn August 13. News broke thаt hackers hаd stolen personal photos оf hеr аnd posted thеm online оn August 31—two weeks аftеr thе interview аnd а month аftеr hеr July 29 cover shoot wіth Patrick Demarchelier. Sо Kashner fоllоwеd uр wіth Lawrence’s team іn hopes оf giving thе actress “a chance tо hаvе thе lаѕt word.”

“I соuld јuѕt sense аftеr hаvіng spent а lіttlе time wіth hеr thаt ѕhе wоuld соmе оut swinging,” Kashner tells VF.com.

Thе 24-year-old actress hаd nоt previously commented оn thе incident, but ѕhе spoke tо Kashner аt length аbоut thе anger ѕhе felt. “Just bесаuѕе I’m а public figure, јuѕt bесаuѕе I’m аn actress, dоеѕ nоt mеаn thаt I asked fоr this,” ѕhе says. “It dоеѕ nоt mеаn thаt іt соmеѕ wіth thе territory. It’s mу body, аnd іt ѕhоuld bе mу choice, аnd thе fact thаt іt іѕ nоt mу choice іѕ absolutely disgusting. I can’t bеlіеvе thаt wе еvеn live іn thаt kind оf world. ”

Shе hаd bееn tempted tо write а statement whеn news оf thе privacy violation broke, ѕhе says, but “every single thіng thаt I trіеd tо write mаdе mе cry оr gеt angry. I started tо write аn apology, but I don’t hаvе аnуthіng tо ѕау I’m ѕоrrу for. I wаѕ іn а loving, healthy, great relationship fоr fоur years. It wаѕ long distance, аnd еіthеr уоur boyfriend іѕ gоіng tо lооk аt porn оr he’s gоіng tо lооk аt you.”

Lawrence аlѕо addresses thе legal ramifications оf thе hack. “It іѕ nоt а scandal. It іѕ а sex crime,” ѕhе tells Kashner. “It іѕ а sexual violation. It’s disgusting. Thе law nееdѕ tо bе changed, аnd wе nееd tо change. That’s whу thеѕе Web sites аrе responsible. Juѕt thе fact thаt ѕоmеbоdу саn bе sexually exploited аnd violated, аnd thе fіrѕt thought thаt crosses somebody’s mind іѕ tо mаkе а profit frоm it. It’s ѕо bеуоnd me. I јuѕt can’t imagine bеіng thаt detached frоm humanity. I can’t imagine bеіng thаt thoughtless аnd careless аnd ѕо empty inside.”

thе cover story, thе Hunger Games star vents hеr frustration nоt јuѕt wіth thе offending hackers but аlѕо wіth those—including people ѕhе knows—who viewed thе images online. “Anybody whо looked аt thоѕе pictures, you’re perpetuating а sexual offense. Yоu ѕhоuld cower wіth shame. Evеn people whо I knоw аnd love say, ‘Oh, yeah, I looked аt thе pictures.’ I don’t wаnt tо gеt mad, but аt thе ѕаmе time I’m thinking, I didn’t tеll уоu thаt уоu соuld lооk аt mу naked body.”

Lawrence аlѕо shares а message fоr thе tabloid community: “You hаvе а choice. Yоu don’t hаvе tо bе а person whо spreads negativity аnd lies fоr а living. Yоu саn dо ѕоmеthіng good. Yоu саn bе good. Let’s јuѕt mаkе thаt choice and—it feels better.”

Lawrence speaks оf thе wrenching moment whеn ѕhе hаd tо call hеr father аbоut thе hack. “When I hаvе tо mаkе thаt phone call tо mу dad аnd tеll hіm what’s happened … I don’t care hоw muсh money I gеt forThe Hunger Games,” ѕhе says. “I promise you, аnуbоdу gіvеn thе choice оf thаt kind оf money оr hаvіng tо mаkе а phone call tо tеll уоur dad thаt ѕоmеthіng lіkе thаt hаѕ happened, it’s nоt worth it.” Shе аllоwѕ hеrѕеlf tо joke а lіttlе аbоut thаt terrible moment: “Fortunately, hе wаѕ playing golf, ѕо hе wаѕ іn а good mood.”

Wіth hеr words nоw оut іn thе open, thе F.B.I. оn thе case, аnd а billion-dollar franchise tо carry оvеr thе finish line, Lawrence ѕееmѕ tо bе regaining hеr footing.

“Time dоеѕ heal, уоu know,” ѕhе tells Kashner. “I’m nоt crying аbоut іt anymore. I can’t bе angry anymore. I can’t hаvе mу happiness rest оn thеѕе people bеіng caught, bесаuѕе thеу mіght nоt be. I nееd tо јuѕt find mу оwn peace.”

In Kashner’s mоrе thаn 3,000-word piece, Lawrence speaks extensively аbоut а variety оf subjects, including whаt ѕhе nееdѕ іn а relationship (“I wоuld ѕо muсh rаthеr bе bored thаn excited аnd hаvе passion”), hеr adoration fоr thе Real Housewives franchise, аnd hеr love fоr comedian Larry David. Kashner аlѕо speaks tо Hunger Games director Francis Lawrence, Serena director Susanne Bier, аnd actor Woody Harrelson, whо ѕауѕ оf Lawrence, “You know, it’s nоt terrible, people telling уоu you’re great; what’s terrible іѕ whеn уоu start believing it. Shе nеvеr gоt fucked up.”

Dating Site and Email Account With Stolen Images From Jennifer Lawrence

Dating Site and Social Fake Account:

Image Uѕе Bу Scammer From Jennifer Lawrence 


Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Jennifer Lawrence

Email Scam: Federal Bureau of Investigation (FBI)

0
0

This is an email received about "Federal Bureau of Investigation (FBI)" is a phishing scam and why not try to contact these people or log onto these sites and enter your data because you risk being stolen.

Letter 1:


Federal Bureau of Investigation (FBI)

Federal Bureau of Investigation (FBI)

Federal Bureau of Investigation (FBI)

Anti-Terrorist And Monetary Crime Division.

Federal Bureau of Investigation.

J.Edgar.Hoover Building Washington Dc

Dear Beneficiary;
Series of meetings have been held over the past 7 months with the secretary general of the UnitedNations Organization. This ended 3 days ago. It is obvious that you have not received your fund which is to the tune of $2,500,000.00 due to past corrupt Governmental Officials who almost held the fund to themselves for their selfish reason and some individuals who have taken advantage of your fund all in an attempt to swindle your fund which has led to so many losses from your end and unnecessary delay in the receipt of your fund. 
The National Central Bureau of Interpol enhanced by the United Nations and Federal Bureau ofInvestigation have successfully passed a mandate to the current president of Nigeria his Excellency President Muhammadu Buhari to boost the exercise of clearing all foreign debts owed to you and other individuals and organizations who have been found not to have receive their Contract Sum, Lottery/Gambling, Inheritance and the likes. Now how would you like to receive your payment? Because we have two method of payment which is by Cheque or by ATM card? 
ATM Card: We will be issuing you a custom pin based ATM card which you will use to withdraw up to $3,000 per day from any ATM machine that has the Master Card Logo on it and the card have to be renewed in 3 years time which is 2018. Also with the ATM card you will be able to transfer your funds to your local bank account. The ATM card comes with a handbook or manual to enlighten you about how to use it, even if you do not have a bank account. 
Cheque: To be deposited in your bank for it to be cleared within three working days. Your payment would be sent to you via any of your preferred option and would be mailed to you via FedEx, because we have signed a contract with FedEx which should expire by September 18th 2015, you will only need to pay $155 instead of $440 saving you $285 so if you pay before September 18th 2015 you save $285. Take note that anyone asking you for some kind of money above the usual fee is definitely a fraudster and you will have to stop communication with every other person if you have been in contact with any. Also remember that all you will ever have to spend is $155 nothing more! Nothing less! And we guarantee the receipt of your fund to be successfully delivered to you within the next 24hrs after the receipt of payment has been confirmed. 
Note: Everything has been taken care of by the Federal Government of Nigeria, the United Nation and also the FBI and including taxes, custom paper and clearance duty so all you will ever need to pay is $155. 
DO NOT SEND MONEY TO ANYONE UNTIL YOU READ THIS: The actual fees for shipping your ATM card is $440 but because FedEx have temporarily discontinued the C.O.D which gives you the chance to pay when package is delivered for international shipping, We had to sign contract with them for bulk shipping which makes the fees reduce from the actual fee of $440 to $155 nothing more and no hidden fees of any sort. 
To effect the release of your fund valued at $2,500,000.00 you are advised to contact our correspondent in Africa the delivery officer Mr. Udo Di with the information below,
Mr. Udo Di
Email: udodi123@163.com
Tel: +234 810 410 4257
You are advised to contact him with the information as stated below:
Your full Name: ............
Your Address: ..............
Home/Cell Phone: ..............
Preferred Payment Method (ATM / Cashier Check)
Upon receipt of payment the delivery officer will ensure that your package is sent within 24 working
hours.
Yours Sincerely,
Mrs. Cassandra Chandler
Tel: +1 (209) 729 7604
FEDERAL BUREAU OF INVESTIGATION 
UNITED STATES DEPARTMENT OF JUSTICE 
WASHINGTON, D.C. 20535 
Note: Do disregard any email you get from any impostors or offices claiming to be in possession of your ATM CARD, you are hereby advice only to be in contact with Mr. Udo Di of the ATM CARD CENTRE who is the rightful person to deal with in regards to your ATM CARD PAYMENT and forward any emails you get from impostors to this office so we could act upon and commence investigation.

Letter 2:

from:James B. Comey Jr.jamescomey355@gmail.com
reply-to:jamescomey355@gmail.com
to:
date:Mon, Sep 14, 2015 at 9:18 PM
subject:FEDERAL BUREAU OF INVESTIGATION SEEKING TO WIRETAP THE INTERNET
EXECUTIVE DIRECTOR FBI
FEDERAL BUREAU OF INVESTIGATION FBI.WASHINGTON DC.
FBI SEEKING TO WIRETAP INTERNET
FEDERAL BUREAU OF INVESTIGATION SEEKING TO WIRETAP THE INTERNET.
Dear Beneficiary

We wish to notify you that the FBI Washington, DC in conjunction with some other relevant investigation agencies here in the United STATES of America have recently been informed through our Global intelligence monitoring network that you have an over-due payment in tone of ten million, three hundred thousand US dollars.(USD 10.3Million) in Citibank. This is as a result of excess cash flow disbursed by the IRS in which only few lucky people would benefit from this excercise. After a random email selection, You happen to be amongst the lucky individuals to benefit from this excercise this year so you are advice to contact Citibank with immediate effect to begin with the transfer process.
It might interest you to know that we have taken our time in screening through this project as stipulated in our protocol of operation and have finally confirmed that your payment/transaction with Citibank is 100% genuine and hitch free from all facets and of which you have the lawful right to claim your fund without any further delay. Having said all this, we will further advise you to go ahead in dealing with the Citibank accordingly as we will be monitoring all their activities with you as well as your correspondence at all levels.
NOTE: There are numerous scam on the internet so we advice you to be very careful with the people you deal with on the internet. If you have been dealing with anybody or any financial organization aside from Citibank, you are advice to stop immediately and contact Citibank for the transfer of your funds. You are to contact Mr. Lambert Huddles the remittance director of Citibank via this email address.
E-mail: lamber_huddles1@aol.com
website: www.citibank.com
Contact the bank today and furnish them with these information below for processing of your payment/funds accordingly.
FULL NAME:
CURRENT ADDRESS:
CITY:
STATE:
ZIP CODE:
DIRECT CONTACT NUMBER:
You must follow all directives from Citibank as this will further help hasten up the whole transfer process. You should bare in mind that the Citibank equally have their own protocol of operation as stipulated on their banking terms.
Thank you very much for your anticipated co-operation.
BEST REGARDS,
James Comey
Federal Bureau of Investigation.
J. Edgar Hoover Building
601,4th Street,
935 Pennsylvania Avenue,
NW Washington, D.C.
20535-0001, USA

Google Corporation® - Email Scam Examples

0
0
This is an email received about “Google Corporation®” is a phishing scam and why not try to contact these people or log onto these sites and enter your data because you risk being stolen.
Good day Sir/Madam.
You have successfully been picked as one of our 12 Lucky Winners in this months Lottery Draw, Please see attached file for more details.
Best regards
MD. Matt Brittin
Chairman of Board and Managing Director
Google United Kingdom.
gpa-team@outlook.com

Google Corporation®

<noreply@googlemail.com>
<training@mrith.com>
reply-to:gpateam@163.com
to:
date:Sun, Sep 13, 2015 at 7:12 AM
subject:

Powered by Google

Google Corporations
Google Corporation®
123 Buckingham Palace Road
Batch: GFSP/977/GPWIN/UK
Ref No: GFSP/ 4877/7782/2015 London SW1W 9SH United Kingdom
Notification Date: September 13, 2015
RE: OFFICIAL NOTIFICATION LETTER.
It is obvious that this notification will come to you as a surprise but please find time to read carefully as we congratulate you over your success in the following official publication of result of the E-mail Electronic Online Sweepstakes Organized by Google in conjunction with the foundation for the Promotion of Software Products, (F.P.S) held on September 12, 2015 here in London, United Kingdom. Google earns its profit mainly from advertising its products and services, using their very own Google Search Engine, Gmail, Gala-mail, Sify E-mail service, Google Maps, Google Apps, Orkut social networking and You Tube video sharing, which are all offered to the public for free.
We wish to congratulate you once again, for being among the Twelve (12) selected winners in the ongoing E-mail Electronic Online Sweepstakes. Hence we do believe with your prize, you will continue to be active in your patronage to Google and its products. A Bank Cheque has been issued in your favor, hence you have won for yourself the sum of £950,000.00 (Nine Hundred and Fifty Thousand Great British Pounds Sterling), One Google Nexus 10 Tablet and also you have been enlisted as one of the Google Ambassadors for one whole Year.
To claim your reward, please contact our Foreign Payment officer below by neatly filling the verification and funds release form below, as your payment will be released and arranged by our United Kingdom Office.
MANADATORY FOREIGN PAYMENT RELEASE FORM
1. Your Contact Address:
2. Your Contact telephone/Mobile Number: 3. Your Nationality/Country: 4. Your full Names: 5. Your Occupation:
6. Your Age & Gender: 7. Your Marital Status:
8. Your Private E-mail Address (es):
9. Have You Ever Won An Online Lottery? 10. How Do You Feel As A Winner?
11. Your Preferred Mode of Prize Remittance from the options below:
© 2015 Google Corporation®
(a). Cash Pick-Up (You as the Beneficiary coming Down to UK to Receive your Award Personally, this option is available only to British Citizens and residents).
(b). Courier Delivery of your certified winning cheque in your name and other Winning Documents safely to you.

Contact our Foreign Payment Bureau officer with the details below.Laszlo Bock
Senior Vice President, People Operations
E-mail: jeffdean.sf@gmail.com
E-mail: gpa-team@outlook.com

Note: You can either fill your claims verification form by printing and manually filling out the requested details or you can fill directly on e-mail or provide the details on Microsoft Word.
NOTE!!! For Security reasons, you are advised to keep your winning information confidential till your claims are processed and your money remitted to you. This is part of our precautionary measures to avoid double claiming and unwarranted abuse of this Program by some unscrupulous elements. Please be WARNED!!!!
Congratulations from the Staffs & Members of Google Board Commission.
Google4MD.Matt Brittin
Chairman of Board and Managing Director
Google United Kingdom

Google2

Google5Larry Page
Co-Founder & CEO
Google Incorporation®

Google3

This email and any attachments are confidential and may also be privileged. If you are not the addressee, do not disclose, copy, circulate or in any other way use or rely on the information contained in this email or any attachments. If received in error, notify the sender immediately and delete this email and any attachments from your system. Emails cannot be guaranteed to be secure or error free as the message and any attachments could be intercepted, corrupted, lost, delayed, incomplete or amended. Google Corporation and its subsidiaries do not accept liability for damage caused by this email or any attachments and may monitor email traffic.
©2015Google Corporation®

Original Email Scam From Google:

Google Corporations

Abigaile Johnson - Romance Scammers

0
0

Info Real Person Abigaile Johnson

Abigaile Johnson

Associasions:ATM Adult Talent Managers Woodman Entertainment, Video Art Holland, Hush Hush Entertainment, New Climax, Evil Angel, Mile High, Hustler Video, Pure Play Media, Digital Playground, Immoral Productions, Daring, Sexsense, Soft On Demand, Rocco Siffredi, Juicy Entertainment, Angel Perverse, Bachelor Party Orgy, Barely Legal, College Girls, Cum Fury, Fast Times at Naughty America University, Gangbang Her Little White Thang, I Do Privates, My Private Tutor, My Sexy Kittens, New Girl in Town, Passionate Love, Pornstar Wannabes, Roccos Abbondanza: Big Natural Boobs, Roccos POV, Seventeen Collected Lesbian, Seventeen Collected Solo, Slumber Party, Slutty Girls Love Rocco, Sweethearts from Europe, Teen Fidelity, Woodman Casting X, 1By-Day, Blacks on Blondes, Club Seventeen, Cruelty Party, Czech Streets, Desk Babes, Digital Desire, Digital Playground, Foot Fetish Dreams, Funny BDSM, Girl Guru, Gyno-X, Heavy on Hotties, Help my Wife, His Mommy, Hot Legs and Feet, Joymii, Karups PC, Milfs like it black, My sons Gf, Nubiles, Nylon Females, Oldje, Passion-HD, Real Ex-Girlfriends, Rychly Prachy, Sapphic Erotica, Sell your gf, Seventeen Video, Spunky Bee, Teenburg, Teen Dreams, Teens Leg Show, Twistys, Virtua Girl HD, X-art,



FAKE-ACCOUNTS WITH STOLEN IMAGES FROM Abigaile Johnson

Attention! Scams target people оf аll backgrounds, ages аnd income levels асrоѕѕ а world. Thеrе іѕ nо оnе group оf people whо аrе mоrе lіkеlу tо bесоmе а victim оf а scam. If уоu thіnk уоu аrе ‘too clever’ tо fall fоr а scam, уоu mау tаkе risks thаt scammers саn tаkе advantage of.

Scams succeed bесаuѕе оf twо things.

Firstly, a scam lооkѕ lіkе thе real thing. It appears tо meet уоur nееd оr desire. Tо find оut thаt іt іѕ іn fact а scam, уоu muѕt fіrѕt mаkе thе effort tо check іt properly. Yоu nееd tо аѕk questions аnd thіnk carefully bеfоrе уоu decide whаt tо do. Bеіng aware оf thе dangerous myths bеlоw wіll hеlр уоu wіth this. Depending оn thе issue, уоu саn decide іf ѕоmеthіng іѕ а scam оn thе spot, оr уоu mіght nееd help—and thаt соuld tаkе ѕеvеrаl days. Secondly, scammers manipulate уоu bу ‘pushing уоur buttons’ tо produce thе automatic response thеу want. It’s nоthіng tо dо wіth уоu personally, it’s tо dо wіth thе wау individuals іn society аrе wired uр emotionally аnd socially. It’s bесаuѕе thе response іѕ automatic thаt people fall fоr thе scam. Tо stop scammers manipulating уоu іntо thеіr traps, іt саn bе uѕеful tо knоw hоw tо prevent thе automatic response thеу expect.
  If уоu can, block thе SCAMMER. Yоu wіll live muсh safer wіth that. Report Scammer Hеrе If уоu nееd furthеr help, gеt іn touch.

PLEASE NOTE! IT IS DIFFICULT TO FIND ALL EMAILADRESSES, NAMES AND FAKE-ACCOUNTS USED FROM SCAMMERS, WITH STOLEN IMAGES FROM Melissa Harrington

Abigaile Johnson Video Slideshow


   Disclaimer: рlеаѕе understand thаt уоu аrе NOT lооkіng аt thе pictures оf people whо аrе асtuаllу scamming you! Thе people portrayed оn thеѕе photos аrе innocent men аnd women, NOT involved іn scamming іn аnу wау аnd hаvе nоthіng tо dо wіth scammers! Thе scammers аrе uѕіng thеіr images wіthоut thеіr knowledge аnd permission tо deceive thеіr victims аnd scam thеm оut оf money.


  

Dating Site аnd Email Account Wіth Stolen Images Frоm Abigaile Johnson 

Dating Site аnd Social Fake Account:


https://plus.google.com/u/0/101507672068630824746
https://plus.google.com/u/0/105634501014945068473
https://plus.google.com/u/0/117310984243270237626
https://plus.google.com/u/0/108350289734297197457
https://plus.google.com/u/0/107972815819745273750
https://plus.google.com/u/0/101406849064071986329
https://plus.google.com/u/0/107818803459064408660
https://plus.google.com/u/0/100710871953519043180
https://plus.google.com/u/0/110620660022511356161
https://plus.google.com/u/0/106999822671890531527
https://www.facebook.com/abigaile.johnson.94
https://www.facebook.com/abigaile.johnson.568
https://www.facebook.com/profile.php?id=100009105320473
https://www.facebook.com/profile.php?id=100009624570677
https://www.facebook.com/profile.php?id=100009384464585


Abigaile Johnson Alѕо Nоw :

Abagail Johnson, Abigail Johnson, Spunky Bee. Woman, Alice Okamura, Petty, Abigaile, Abby, Abigail, Abigaile, Veronika

Images Uѕе Bу Scammer Frоm Abigaile Johnson :








Most Image Stolen Use By Scammers

0
0

The scammers are evolving and they, like any other thing on this earth. They are trying to take advantage of the kindness and ignorant people to steal their money or identity.

 In this article we will give information about the used photos and fake accounts, they propose people and who also have success, that's why we want to help you learn how they act to fraud and how to beware not your turn to be stolen.

  The most used by scammers photos, on dating websites, emails or social network accounts:

Abigaile Johnson - Scam Report

Abigaile Johnson

 
Born:
November 11, 1989 ( age 25 )
Sign:
Scorpio
Real Name:
Abigaile Johnson
Known / Aliases:
Abigaile Johnson, Spunky Bee, Abigail Johnson, Abigaile Johnson, Abagail Johnson, AbigaileXxx,
Born Place / Hometown:
Praha
Raised:
Praha
Country:
 Czech Republic
Nationality:
 Czech
Gender:
Female
Ethnicity:
Caucasian
Hair Length:
Long
Hair Color:
Blond
Eye Color:
Blue
Skin Color:
White
Height:
5' 5" ( 65 inches) / 165 cm
Weight:
110 lbs / 50 kg
Shoe Size:
6.0 US / 3.5 UK / 36 Euro
Measurements:
34B-23-35 [ Bust (Cup Size) / Waist / Hips ]
                 





















 

More Info about scam from Abigaile Johnson


Jennifer Lawrence - Scam Report

Jennifer Lawrence

 
Born:
August 15, 1990
Real Name:
Jennifer Shrader Lawrence
Known / Aliases:
Jennifer Lawrence
Born Place / Hometown:
Louisville, Kentucky
Raised:
Louisville, Kentucky
Nationality:
 American
Country:
 United States
Gender:   Female









More Info about scam from Jennifer Lawrence


 [next]

Tori Black - Scam Report

Tori Black


 
Born:
August 26, 1988 ( age 27 )
Sign:
Virgo
Real Name:
Shellie Chapman
Known / Aliases:
Tori Black, Shellie Chapman, Michelle Chapman, Miss Tori Black, Tori, Tori B., Ms. Tori Black, Beth, Tory Black,
Born Place / Hometown:
Seattle, Washington
Raised:
Seattle, Washington
Country:
 United States
Nationality:
American
Gender:
Female
Ethnicity:
Caucasian
Hair Length:
Long
Hair Color:
Brown
Eye Color:
Brown
Skin Color:
White
Height:
5' 10" ( 70 inches) / 178 cm
Weight:
141 lbs / 64 kg
Dress Size:
2
Shoe Size:
8.5 US / 6.0 UK / 39 Euro
Measurements:
34B-27-38 [ Bust (Cup Size) / Waist / Hips ]
 





















 

More Info about scam from Tori Black


 

Sunny Leone - Scam Report

Sunny Leone

 
Born:
May 13, 1981 ( age 34 )
Sign:
Taurus
Real Name:
Karenjit Kaur Vohra
Known / Aliases:
Sunny Leone, Karen, Karen Malhotra,
Born Place / Hometown:
Sarnia, Ontario
Raised:
Sarnia, Ontario
Country:
 Canada
Nationality:
 Canadian
Gender:
Female
Ethnicity:
Indian
Hair Length:
Long
Hair Color:
Black
Eye Color:
Brown
Skin Color:
Light Brown
Height:
5' 4" ( 64 inches) / 163 cm
Weight:
110 lbs / 50 kg
Dress Size:
2
Shoe Size:
7.5 US / 5.0 UK / 38 Euro
Measurements:
34DD-24-34 [ Bust (Cup Size) / Waist / Hips ]
 



















              

 

More Info about scam from Sunny Leone


 [next]

Ann Angel - Scam Report

Ann Angel

 
Born:
June 9, 1985 ( age 30 )
Sign:
Gemini
Real Name:
Anna Angel
Known / Aliases:
Anna Angel, Ann Angel, Annabelle Angel,
Born Place / Hometown:
Warsaw
Raised:
Warsaw
Country:
 Poland
Nationality:
 Polish
Gender:
Female
Ethnicity:
Caucasian
Hair Length:
Long
Hair Color:
Brown
Eye Color:
Blue
Skin Color:
White
Height:
5' 6" ( 66 inches) / 168 cm
Weight:
124 lbs / 56 kg
Measurements:
34C-24-34 [ Bust (Cup Size) / Waist / Hips ]

















                      

More Info about scam from Ann Angel


 

Uwe Hubertus Knoedlseder - Scam Report

Uwe Hubertus Knoedlseder

 

More Info about scam from Uwe Hubertus Knoedlseder



Selena Gomez - Celebrities Scammed

0
0

Fake-Accounts With Stolen Images From Selena Gomez

Original Info and Description About Selena Gomez

Known (alias): Selena Gomez, Selena, Sel, Selly, Selenita, Conchita, Selena Maria
Attention! Scams target people оf аll backgrounds, ages аnd income levels асrоѕѕ а world. Thеrе іѕ nо оnе group оf people whо аrе mоrе lіkеlу tо bесоmе а victim оf а scam. If уоu thіnk уоu аrе ‘too clever’ tо fall fоr а scam, уоu mау tаkе risks thаt scammers саn tаkе advantage of.

Scams succeed bесаuѕе оf twо things.

Firstly, a scam lооkѕ lіkе thе real thing. It appears tо meet уоur nееd оr desire. Tо find оut thаt іt іѕ іn fact а scam, уоu muѕt fіrѕt mаkе thе effort tо check іt properly. Yоu nееd tо аѕk questions аnd thіnk carefully bеfоrе уоu decide whаt tо do. Bеіng aware оf thе dangerous myths bеlоw wіll hеlр уоu wіth this. Depending оn thе issue, уоu саn decide іf ѕоmеthіng іѕ а scam оn thе spot, оr уоu mіght nееd help—and thаt соuld tаkе ѕеvеrаl days. Secondly, scammers manipulate уоu bу ‘pushing уоur buttons’ tо produce thе automatic response thеу want. It’s nоthіng tо dо wіth уоu personally, it’s tо dо wіth thе wау individuals іn society аrе wired uр emotionally аnd socially. It’s bесаuѕе thе response іѕ automatic thаt people fall fоr thе scam. Tо stop scammers manipulating уоu іntо thеіr traps, іt саn bе uѕеful tо knоw hоw tо prevent thе automatic response thеу expect.

  If уоu can, block thе SCAMMER. Yоu wіll live muсh safer wіth that. Report Scammer Hеrе

If уоu nееd furthеr help, gеt іn touch.

  PLEASE NOTE! IT IS DIFFICULT TO FIND ALL EMAILADRESSES, NAMES AND FAKE-ACCOUNTS USED FROM SCAMMERS, WITH STOLEN IMAGES FROM Selena Gomez

Source Content https://www.fraudswatch.com/celebrities-scammed-selena-gomez

Selena Gomez Video Slideshow





Selena Gomez

Selena Gomez

Disclaimer: рlеаѕе understand thаt уоu аrе NOT lооkіng аt thе pictures оf people whо аrе асtuаllу scamming you! Thе people portrayed оn thеѕе photos аrе innocent men аnd women, NOT involved іn scamming іn аnу wау аnd hаvе nоthіng tо dо wіth scammers! Thе scammers аrе uѕіng thеіr images wіthоut thеіr knowledge аnd permission tо deceive thеіr victims аnd scam thеm оut оf money.





    

 

Dating Site and Email Account With Stolen Images From Selena Gomez

Dating Site and Social Fake Account:
 

Image Uѕе Bу Scammer From Selena Gomez
























































FBI Mortgage/Loans Fraud Report And Publications 2010

0
0
FBI Mortgage/Loans Fraud Report And Publications 2010

The purpose of this study is to provide insight into the breadth and depth of mortgage fraud crimes perpetrated against the United States and its citizens during 2010. This report updates the 2009 Mortgage Fraud Report and addresses current mortgage fraud projections, issues, and the identification of mortgage fraud “hot spots.” The objective of this study is to provide FBI program managers and the general public with relevant data to better understand the threat posed by mortgage fraud. The report was requested by the Financial Crimes Section, Criminal Investigative Division (CID), and prepared by the Financial Crimes Intelligence Unit (FCIU), Directorate of Intelligence (DI).

This report is based on FBI; federal, state, and local law enforcement; mortgage industry; and open-source reporting. Information was also provided by other government agencies, including the U.S. Department of Housing and Urban Development-Office of Inspector General (HUD-OIG), the Federal Housing Administration (FHA), the Federal National Mortgage Association (Fannie Mae), the Federal Home Loan Mortgage Corporation (Freddie Mac), and the U.S. Treasury Department’s Financial Crimes Enforcement Network (FinCEN). Industry reporting was obtained from LexisNexis, Mortgage Asset Research Institute (MARI), RealtyTrac, Inc., Mortgage Bankers Association (MBA), Interthinx, and CoreLogic. Some industry reporting was acquired through open sources.

While the FBI has high confidence in all of these sources, some inconsistencies relative to the cataloging of statistics by some organizations are noted. For example, suspicious activity reports (SARs) are cataloged according to the year in which they are submitted, but the information contained within them may describe activity that occurred in previous months or years. The geographic specificity of industry reporting varies, as some companies report at the ZIP code level and others by city, region, or state. Many of the statistics provided by the external sources, including FinCEN, FHA, and HUD-OIG, are captured by fiscal year (FY); however, this report focuses on the calendar year findings as reported by mortgage industry and economic data sources. Additionally, there are also variances in the reporting of fraud depending on who the victim is (either a financial institution or a homeowner). While these discrepancies have minimal impact on the overall findings stated in this report, we have noted specific instances in the text where they may affect conclusions.

See Appendix A for additional information for these sources.Geospatial maps were provided by the Crime Analysis Research and Development Unit, Criminal Justice Information Services Division.

Key Findings 
  • Mortgage fraud continued at elevated levels in 2010, consistent with levels seen in 2009. Mortgage fraud schemes are particularly resilient, and they readily adapt to economic changes and modifications in lending practices. 
  • Mortgage fraud perpetrators include licensed/registered and non-licensed/registered mortgage brokers, lenders, appraisers, underwriters, accountants, real estate agents, settlement attorneys, land developers, investors, builders, bank account representatives, and trust account representatives.
  • Total dollar losses directly attributed to mortgage fraud are unknown.
  • A continued decrease in loan originations from 2009 to 2010 (and expected through 2012), high levels of unemployment and housing inventory, lower housing prices, and an increase in defaults and foreclosures dominated the housing market in 2010. RealtyTrac reported 2.9 million foreclosures in 2010, representing a 2 percent increase in foreclosures since 2009 and a 23 percent increase since 2008.
  • Analysis of available law enforcement and industry data indicates the top states for known or suspected mortgage fraud activity during 2010 were California, Florida, New York, Illinois, Nevada, Arizona, Michigan, Texas, Georgia, Maryland, and New Jersey; reflecting the same demographic market affected by mortgage fraud in 2009.
  • Prevalent mortgage fraud schemes reported by law enforcement and industry in FY 2010 included loan origination, foreclosure rescue, real estate investment, equity skimming, short sale, illegal property flipping, title/escrow/settlement, commercial loan, and builder bailout schemes. Home equity line of credit (HELOC), reverse mortgage fraud, and fraud involving loan modifications are still a concern for law enforcement and industry.
  • With elevated levels of mortgage fraud, the FBI has continued to dedicate significant resources to the threat. In June 2010, the Department of Justice (DOJ), to include the FBI, announced a mortgage fraud takedown referred to as Operation Stolen Dreams. The takedown targeted mortgage fraudsters throughout the country and was the largest collective enforcement effort ever brought to bear in combating mortgage fraud.
  • The current and continuing depressed housing market will likely remain an attractive environment for mortgage fraud perpetrators who will continue to seek new methods to circumvent loopholes and gaps in the mortgage lending market. These methods will likely remain effective in the near term, as the housing market is anticipated to remain stagnant through 2011.
Introduction




Mortgage Fraud
Mortgage fraud is a material misstatement, misrepresentation, or omission relied on by an underwriter or lender to fund, purchase, or insure a loan. This type of fraud is usually defined as loan origination fraud.  Mortgage fraud also includes schemes targeting consumers, such as foreclosure rescue, short sale, and loan modification.


Mortgage fraud remained elevated in 2010 despite modest improvements in various economic sectors and increased vigilance by financial institutions to mitigate it. Although recent economic indicators report improvements in various sectors, overall indicators associated with mortgage fraud––such as foreclosures, housing prices, contracting financial markets, and tighter lending practices by financial institutions––indicate that the housing market is still in distress and provide ample opportunities for fraud. National unemployment remains high, and housing inventory is at the same level it was in 2008 in the midst of the housing crisis. Mortgage delinquency rates and new foreclosures continued to increase in prime and subprime markets.

Mortgage Fraud Perpetrators



Mortgage fraud enables perpetrators to earn high profits through illicit activity that poses a relative low risk for discovery. Mortgage fraud perpetrators include licensed/registered and non-licensed/registered mortgage brokers, lenders, appraisers, underwriters, accountants, real estate agents, settlement attorneys, land developers, investors, builders, bank account representatives, and trust account representatives. There have been numerous instances in which various organized criminal groups were involved in mortgage fraud activity. Asian, Balkan, Armenian, La Cosa Nostra,2 Russian, and Eurasian3 organized crime groups have been linked to various mortgage fraud schemes, such as short sale fraud and loan origination schemes.

Mortgage fraud perpetrators using their experience in the banking and mortgage-related industries—including construction, finance, appraisal, brokerage, sales, law, and business—exploit vulnerabilities in the mortgage and banking sectors to conduct multifaceted mortgage fraud schemes. Mortgage fraud perpetrators have a high level of access to financial documents, systems, mortgage origination software, notary seals, and professional licensure information necessary to commit mortgage fraud and have demonstrated their ability to adapt to changes in legislation and mortgage lending regulations to modify existing schemes or create new ones.

Mortgage fraud perpetrators target victims from across a demographic range, with perpetrators identifying common characteristics such as ethnicity, nationality, age, and socioeconomic variables, to include occupation, education, and income. They recruit people who have access to tools that enable them to falsify bank statements, produce deposit verifications on bank letterhead, originate loans by falsifying income levels, engage in the illegal transfer of property, produce fraudulent tax return documents, and engage in various other forms of fraudulent activities. Mortgage fraud perpetrators have been known to recruit ethnic community members as co-conspirators and victims to participate in mortgage loan origination fraud.

[next]
image011



Financial Impact of Mortgage Fraud


LossesTotal dollar losses attributed to mortgage fraud are unknown; however, law enforcement and mortgage industry participants have attempted to quantify them in recent years. According to CoreLogic (see Appendix A for source description) more than $10 billion in loans originated with fraudulent application data in 2010 (see Figure 1).


Economic & Mortgage Market Conditions



Mortgage fraud both impacts and is impacted by various economic conditions such as mortgage loan originations; unemployment; mortgage loan delinquencies, defaults, and foreclosures; negative equity; loan modifications; housing prices and inventory; real estate sales; housing construction; and bank failures. As of December 2010, activity in the housing market remained very weak as new construction and permits declined, demand for housing remained depressed, home sales declined, and home prices decreased.
  • According to the Federal Reserve Board, as of December 2010, real estate markets remained weak, sales declined, obtaining credit was reported as a constraint on demand for homes, existing home inventories remained at high levels, and home prices generally declined across most Federal Reserve Districts.5
  • The National League of Cities reported that the fiscal condition of U.S. cities continued to weaken in 2010 as cities were confronted by the economic downturn.6
  • A study by the Federal Reserve Bank of Philadelphia reported that low-income households still struggle to access credit.7 Organizations providing services to these households have seen an increase in demand for their services while trying to meet those demands with cuts in funding. The top three factors contributing to a lack of access to credit include lack of financial knowledge, underwriting standards/credit ratings, and lack of cash flow.
Mortgage Loan OriginationsAccording to the MBA, mortgage loan originations for one to four units exceeded $1.6 trillion in 2010; however, this is a decrease from 2009, which reported $2 trillion in originations.

UnemploymentUnemployment is a factor that is expected to influence the number of foreclosures in the years to come. The unemployment rate as of December 2010 was 9.4 percent, an improvement from 9.9 percent as of December 2009. The Federal Reserve Board indicates that the jobless rate is anticipated to remain elevated at the end of 2012. According to the most recent report by the National Foreclosure Mitigation Counseling program established by Congress, 58 percent of homeowners receiving foreclosure counseling listed unemployment as the main reason for default.

Mortgage Loan Delinquencies, Defaults, & Foreclosures

DelinquenciesIn addition to unemployment, mortgage loan delinquencies, defaults, and foreclosures are also contributing factors to an increasing pool of homeowners vulnerable to mortgage fraud. The MBA National Delinquency Survey (NDS) reported 43.6 million first-lien mortgages on one- to four-unit residential properties in 2010.
  • According to the MBA NDS, 8.2 percent (or 3.6 million) of all residential mortgage loans (seasonally adjusted) in 2010 were past due, excluding those already in the foreclosure process. In 2010, 8.8 percent of mortgage loans were seriously delinquent (more than 90 days past due per MBA NDS, to include those in the process of foreclosure). The NDS continues to report an increase in foreclosure rates for all loan types (prime, subprime, FHA, and Veteran’s Administration (VA)) from 2008 to 2010. States with the highest overall delinquency rates were Mississippi (13.3 percent), Nevada (12 percent), and Georgia (11.9 percent).
  • Map of Suprime Loans 2010
  • The number of commercial mortgage loan delinquencies increased 79 percent in 2010, from 4.9 percent in December 2009 to 8.79 percent in December 2010. Nevada (28.2 percent) and Alabama (16 percent) have the highest delinquency rates in the United States.
  • The MBA NDS 2010 data indicate that while the seriously delinquent rate for subprime loans was 28.5 percent in 2010, the rate was 38.9 for subprime Adjustable Rate Mortgages (ARMs). States with the most seriously delinquent subprime ARMs in 2010 were Florida (56.8 percent), New Jersey (52.7 percent), New York (51 percent), Nevada (46.2 percent), and Hawaii (43.3 percent)
DefaultsFitch rating agency anticipates a re-default rate on loan modifications between 60 and 70 percent for subprime and Alt-A loans, and 50 to 60 percent for prime loans. Defects in servicer foreclosure procedures have stalled the process throughout the country thereby lengthening the process further. Fitch states that it will take four years to remove the backlog of properties and return the market to balance.

ForeclosuresAccording to RealtyTrac, a record 2.9 million homes received foreclosure filings in 2010 (up from 2.8 million in 2009) as the problem became more widespread due to high unemployment.  The number of foreclosures continues to outpace the number of loan modifications (see Figure 3).
  • The Office of the Comptroller of the Currency (OCC) and the Office of Thrift Supervision (OTS) report that completed foreclosures in the fourth quarter of 2010 decreased by nearly 50 percent and newly initiated foreclosures decreased by almost 8 percent as a result of the moratorium on foreclosure actions by the largest mortgage service providers brought on by the robo-signing issue.   
  • According to the MBA, foreclosure inventory is highly concentrated geographically, with more than 50 percent of foreclosed properties located in five states: Florida, California, Illinois, New York, and New Jersey.  
Negative Equity/Underwater MortgagesAccording to CoreLogic, homeowners in negative equity positions add to the number of homeowners vulnerable to short sale fraud schemes. CoreLogic reported that negative equity was concentrated in five states at the close of 2010. Nevada had the highest percentage of mortgages with negative equity at 65 percent, followed by Arizona (51 percent), Florida (47 percent), Michigan (36 percent), and California (32 percent).
  • CoreLogic reporting indicates that 11.1 million, or 23.1 percent, of all residential properties with a mortgage were in negative equity ($750 billion) at the end of the fourth quarter 2010, up from 10.8 million, or 22.5 percent, in the previous quarter.
Loan ModificationsHistoric increases in delinquencies and foreclosures continue to burden the mortgage servicing system. According to the Home Affordable Modification Program (HAMP), of the 2.9 million eligible delinquent loans (60 or more days delinquent as reported by servicers through December 2010, but excluding FHA and VA loans), only 521,630 have been granted permanent modifications, while 1.5 million are in trial modifications.
 The OCC/OTS reported that 25.5 percent of loan modifications were re-defaulting in 2010, falling 60 or more days past due nine months after modification.

While their position in rankings may change slightly, the top 10 states reporting active trial and permanent mortgage loan modifications in 2009 were also the top 10 states in 2010 and through March 2011 

State
Total Active Trial and Permanent Mortgage Loan Modifications as of 31 Dec. 2009
Total Active Trial and Permanent Mortgage Loan Modifications as of 31 Dec. 2010
Total Active Trial and Permanent Mortgage Loan Modifications as of March 2011
CA
172,288
158,021
172,728
FL
105,108
80,732
87,060
IL
44,942
36,246
38,915
AZ
43,126
31,947
33,083
NY
38,282
30,435
32,988
GA
33,774
24,563
26,483
MI
29,103
22,481
23,817
NJ
28,517
21,782
23,348
MD
28,117
21,702
23,118
TX
28,577
17,757
19,075
Figure 3: Top 10 States Reporting Active Trial and Permanent Mortgage Loan Modifications, 2009 to March 2011.
Source: U.S. Treasury Making Home Affordable Program: Servicer Performance Reports, 31 December 2009 through March 2011.

  • Interthinx reports that property owners are fraudulently decreasing their income and property values to get their debt reduced for their loan modifications. They are fabricating hardships and filing false tax returns to this end. Also, individuals who first perpetrated fraud in loan origination are now attempting to defraud again during their loan modification.
  • Freddie Mac reports that 2010 loan modification fraud trends include strategic defaults, which are accompanied by false statements about income, assets, or the homeowner’s inability to pay.  Loan modification perpetrators are misrepresenting occupancy and income (by stating it is lower), altering pay stubs, and seeking modifications without an actual financial hardship.
  •  HUD reported 2010 loan modification scams in the form of principal reduction scams, rent-to-own-leaseback, bankruptcy fraud, and false reconveyance. In addition, HUD reported that fraudsters are trolling unemployment offices, churches, and public foreclosure rescue fairs targeting vulnerable homeowners. 
City
% Change 2009-2010
% Change 2004-2010
U.S.
-1.4
-18.5
Phoenix, AZ
-8.3
-32.3
Atlanta, GA
-7.9
-19.0
Portland, OR
-7.8
2.4
Chicago, IL
-7.4
-20.8
Detroit, MI
-6.4
-44.9
Seattle, WA
-6.0
0.1
Tampa, FL
-5.9
-24.9
Minneapolis, MN
-5.1
-26.9
Las Vegas, NV
-4.7
-52.1
Charlotte, NC
-4.3
-1.3
Figure 4: Top 10 Cities by Percent Change in Home Prices, through December 2010
Source: S & P/Case-Shiller Home Price Index & FiServe Data

Housing Prices & InventoryHousing prices continued to weaken and trends in sales continued to decrease in 2010 . The economic downturn has resulted in home prices 1.6 percent lower than a year ago, slightly worse than industry predictions of 1.5 percent.  Metropolitan statistical areas of Detroit, Atlanta, Cleveland, and Las Vegas each have home prices below their 2000 levels.

Housing inventory was reported to be at levels witnessed in 2008 during the financial crisis. Home values are expected to fall in 2011.

According to the National Association of Realtors, pending home sales decreased 6 percent from 2009 to 2010, and existing home sales decreased 5.7 percent for the same period.


Top Geographical Areas for Mortgage Fraud

MethodologyData from law enforcement and industry sources were compared and mapped to determine those areas of the country most affected by mortgage fraud during 2010. This was accomplished by compiling the state rankings by each data source, collating by state, and then mapping the information.

Combining information from states reporting fraud with those reporting significant vulnerability for fraud indicate the top states in 2010 were Florida, California, Arizona, Nevada, Illinois, Michigan, New York, Georgia, New Jersey, and Maryland.

   image015


[next]

Detailed Look at Fraud Indicators by Source Entity

Various data sources, to include the FBI, HUD-OIG, FinCEN, MARI, Interthinx, Fannie Mae, Radian Guaranty, CoreLogic, the U.S. Census, and the U.S. Department of Labor were used in this report to identify geographic fraud trends. This report also takes a more detailed look at information reported by law enforcement and industry to identify additional fraud patterns and trends. 

FBIFBI mortgage fraud pending investigations totaled 3,129 in FY 2010, a 12 percent increase from FY 2009 and a 90 percent increase from FY 2008. According to FBI data, 71 percent (2,222) of all pending FBI mortgage fraud investigations during FY 2010 (3,129) involved dollar losses totaling more than $1 million.

image017.png


FBI field divisions that ranked in the top 10 for pending investigations during FY 2010 were Las Vegas, Los Angeles, New York, Tampa, Detroit, Washington Field, Miami, San Francisco, Chicago, and Salt Lake City, respectively.

image019


The FBI assesses that the majority of mortgage fraud cases opened in FY 2010 involved criminal activity that occurred in either 2009 or 2010.

image021


Financial Institution Reporting of Suspicious Mortgage Fraud Related Activity Increases - FinCEN 
 SARs filed by financial institutions indicate that there were 70,533 mortgage fraud-related SARs filed with FinCEN in FY 2010a 5 percent increase from FY 2009 and an 11 percent increase from FY 2008 filings. 

image023


SARs reported in FY 2010 revealed $3.2 billion in losses, a 16 percent increase from FY 2009 and a 117 percent increase from FY 2008. Only 25 percent of SARs in FY 2010 reported a loss, compared with 22 percent reporting a loss ($2.8 billion) in FY 2009 and also compared with 11 percent reporting a loss ($1.5 billion) in FY 2008.

image025

The Los Angeles, Miami, Chicago, Tampa, San Francisco, New York, Phoenix, Sacramento, Atlanta, and Las Vegas FBI Field Offices reported the largest number of SARs filed in FY 2010. Eight of the top 10 (Los Angeles, Miami, Tampa, San Francisco, Chicago, Sacramento, New York, and Atlanta) were consistently ranked in the top 10 for the last three years.

image023

U.S. Department of Housing and Urban Development-Office of Inspector General

In FY 2010, HUD-OIG had 765 pending single-family residential loan investigations, a 29 percent increase from the 591 pending during FY 2009.  This also represented a 70 percent increase from the 451 pending during FY 2008 (see Figure 12 on page 15). Fraud schemes reported by HUD in ongoing investigations include flopping, reverse mortgages, builder bailout schemes, short sales, and robo-signing.

image029

According to HUD, the preventloanscams.org website has received more than 11,416 complaints as of December 31, 2010, with associated losses of more than $23 million.

LexisNexis - Mortgage Asset Research InstituteDuring 2010, Florida, New York, California, New Jersey, Maryland, Michigan, Virginia, Ohio, Colorado, and Illinois were MARI’s top 10 states for reports of mortgage fraud across all originations. While half of the states in the top 10 are located in the Northeast, Florida has continued to rank first in fraud reporting since 2006, and its fraud rate was more than three times the expected amount of reported mortgage fraud for its origination volume in 2010. Additionally, MARI reports that 27 percent of all reported loans with fraud investigated (post-funding) in 2010 were for Florida properties.

MARI reports that misrepresentation on loan applications and verifications of deposit along with appraisal and valuation issues, presented the most egregious problems in 2010 originations.

InterthinxThe top 10 states for possible fraudulent activity based on 2010 loan application submissions to Interthinx were Nevada, Arizona, California, Michigan, Florida, Colorado, Minnesota, Georgia, Rhode Island, and Massachusetts. According to Interthinx’s 2010 Annual Mortgage Fraud Risk Report, the states with the highest overall levels of mortgage fraud risk correlate closely to the states with the highest levels of foreclosure activity and underwater borrowers. Additionally, they report a strong correlation between mortgage fraud risk and foreclosure activity that is consistent with fraud schemes such as flopping and foreclosure-rescue-related schemes.

Fannie MaeFannie Mae’s top 10 mortgage fraud states based on significant misrepresentations discovered by the loan review process through the end of December 2010 were California, New York, Florida, Illinois, Texas, New Jersey, Arizona, Georgia, Alabama, and Michigan.

According to Fannie Mae, short sale, foreclosure rescue, and real estate owned (REO) sales fraud continue to thrive as a result of the opportunities created by defaulting markets. For example, Fannie Mae is investigating fraud schemes perpetrated by real estate agents who manipulate Multiple Listing Services (MLS) data to bolster sagging sales prices. Fannie Mae continues to investigate REO flipping involving real estate agents who withhold competitive offers on REO properties so that they can control the acquisition and subsequent flip.

In 2010 Fannie Mae reported the occurrence of loan origination fraud in the form of affinity fraud, reverse mortgages, condo conversion, and multi-family fraud schemes and stated that Fannie Mae is witnessing a shift in loan origination fraud from the Southeast to the Northeast.42 Servicing fraud reported by Fannie Mae includes short sale fraud, fraud involving REOs, and loan modifications. Current reverse mortgage fraud schemes reported by Fannie Mae include the use of asset misrepresentation, occupancy fraud, and identity theft. Condo conversions currently represent 14 percent of Fannie Mae's mortgage fraud investigations. Fraudsters are using payment abatements to delay defaults, inflated property values, and failure to disclose debt. In a majority of these schemes, the fraudsters made 15-18 payments before defaulting. Fraud involving ulti-family properties includes valuation fraud, in which fraudsters misrepresent the condition of the rehabilitated units or factor in incomplete renovations—perpetrators divert funds to their own companies but do not complete the renovations. Perpetrators are also falsifying occupancy rates on their rent rolls and flipping properties to non-arms-length purchasers.

CoreLogicimage032

CoreLogic reported a 20 percent increase in mortgage fraud and approximately $12 billion in originated fraud loan amounts in 2010 (which is flat due to declining origination volumes). While the majority of fraud reported by lenders involves income misrepresentation, there has been an 8 percent decrease in this fraud type from 2009 to 2010, while there were increased occurrences of occupancy, employment, and undisclosed debt for the same period.

CoreLogic also reports that mortgage fraud is becoming increasingly well-hidden and that lenders are reporting increases in hidden frauds such as short sale fraud, REO flipping fraud, and closing agent embezzlement. They are also seeing an increased frequency of flipping and straw buyer schemes in FHA loans.

RealtyTracAccording to RealtyTrac, a record 2.9 million homes received foreclosure filings in 2010 (up from 2.8 million in 2009) as the problem became more widespread due to high unemployment (see Figure 13). As in previous years, California, Florida, Nevada, and Arizona top the list of states with the highest rates of foreclosure.

[next]


Current Schemes & Techniques

An analysis of FBI reporting revealed that the most prevalent mortgage fraud schemes identified in FY 2010 included loan origination schemes (to include property flipping), followed by settlement-related schemes (to include kickbacks), real estate investment schemes, short sale schemes, commercial real estate loan frauds, foreclosure rescue schemes, advance fee schemes, builder bailout schemes, equity skimming schemes, and bankruptcy fraud.

image036.png




Loan Origination SchemesMortgage loan origination fraud is divided into two categories: fraud for property/housing and fraud for profit. Fraud for property/housing entails misrepresentations by the applicant for the purpose of purchasing a property for a primary residence. This scheme usually involves a single loan. Although applicants may embellish income and conceal debt, their intent is to repay the loan. Fraud for profit, however, often involves multiple loans and elaborate schemes perpetrated to gain illicit proceeds from property sales. Gross misrepresentations concerning appraisals and loan documents are common in fraud for profit schemes, and participants are frequently paid for their participation.

Loan origination fraud schemes remain a constant fraud scheme. These schemes involve falsifying a borrower’s financial information––such as income, assets, liabilities, employment, rent, and occupancy status––to qualify the buyer, who otherwise would be ineligible, for a mortgage loan. This is done by supplying fictitious bank statements, W-2 forms, and tax return documents to the borrower’s favor. Perpetrators may also employ the use of stolen identities. Specific schemes used to falsify information include asset rental, backwards application, and credit enhancement schemes.

Freddie Mac is reporting that the loan origination frauds they are witnessing include false documents, property flips with phantom rehabilitation, fictitious assets, and fabricated payroll documents. Fraudsters are also using phantom rehabilitations to increase the property values. However, Freddie Mac has been interviewing borrowers and their neighbors to determine if the rehabilitations are actually occurring. Also, Freddie Mac is reporting that fraudsters continue to use transactional “lenders” such as the “dough for a day” businesses that “loan” potential borrowers money so that underwriters will see they have assets when conducting their “proof of funds” due diligence risk assessment on the loan application.

Backwards Application SchemeIn a backwards application scheme, the mortgage fraud perpetrator fabricates the unqualified borrower’s income and assets to meet the loan’s minimum application requirements. Incomes are inflated or falsified, assets are created, credit reports are altered, and previous residences are altered to qualify the borrower for the loan.

Fraudulently Inflated AppraisalsMortgage fraud perpetrators fraudulently inflate property appraisals during the mortgage loan origination process to generate false equity that they will later abscond. Perpetrators will either falsify the appraisal document or employ a rogue appraiser as a conspirator in the scheme who will create and attest to the inflated value of the property. Fraudulent appraisals often include overstated comparable properties to increase the value of the subject property.  

Illegal Property FlippingIllegal property flipping is a complex fraud that involves the purchase and subsequent resale of property at greatly inflated prices. The key to this scheme is the fraudulent appraisal, which occurs prior to selling the property. The artificially inflated property value enables the purchaser to obtain a greater loan than would otherwise be possible. Subsequently, a buyer purchases the property at the inflated rate. The difference between what the perpetrator paid for the property and the final purchase price of the home is the perpetrator’s profit.

Traditionally, any exchange of property occurring twice on the same day is considered highly suspect for illegal property flipping and often is accompanied by back-to-back closings where there is a purchase contract and a sales contract that are both presented to the same title company. FBI combined intelligence and case reporting for FY 2010 indicates that property flipping is occurring in 47 out of 56 field office territories. The fraud continues to involve the use of fraudulent bank statements, W-2s, and pay stubs; the use of straw buyer investors to purchase distressed properties for alleged rehabilitation; perpetrators receiving cash-back at closing; and the failure to make the first mortgage payment. This type of fraud often results in foreclosure. FBI information indicates the top 10 states reporting same-day property flips (as recorded by county clerk’s offices throughout the United States) in 2010 were Florida, Ohio, Georgia, Minnesota, Hawaii, Michigan, Tennessee, New York, Maryland, and Washington.

Among other industry sources reporting significant property flipping, Interthinx reports that it is still prevalent and trending upward. Current property flipping schemes reported by Interthinx involve fraud against servicers; piggybacking on bank accounts to qualify for mortgages; and forgeries. HUD reporting indicates the use of limited liability companies (LLCs) to perpetrate fraudulent property flipping.

Title/Escrow/Settlement Fraud/Non-Satisfaction of MortgageA review of FBI cases opened in 2010 indicates that 38 percent of FBI field offices are reporting some form of title/escrow/settlement fraud. The majority of these frauds involve the diversion or embezzlement of funds for uses other than those specified in the lender’s closing instructions. Associated schemes include the failure to satisfy/pay off mortgage loans after closings for refinances; the reconveyance or transfer of property without the homeowner’s knowledge or consent; the failure to record closing documents such as property deeds; the recording of deeds without title insurance but charging the homeowner and absconding with the money; the use of settlement funds intended to pay subcontractors by general contractors to pay debts on previous projects; the use of dry closings; the delayed recording of loans; the filing of fraudulent liens to receive cash at closing; and the distribution of settlement funds among co-conspirators.

According to a review of FBI investigations opened in FY 2010, title agents and settlement attorneys in at least 21 investigations in 14 field office territories are involved in non-satisfaction of mortgage schemes. They are engaged in misappropriating and embezzling more than $27 million in settlement funds for their own personal use rather than using those escrowed funds to satisfy/pay off mortgages as directed per lender instructions provided at closing. Perpetrators diverted escrow monies intended for lenders to themselves or to entities that they controlled. In addition to embezzling escrow funds, perpetrators are also falsifying deeds, recording deeds without title insurance, and failing to record deeds and taxes.

Real Estate Investment SchemesIn a real estate investment scheme, mortgage fraud perpetrators persuade investors or borrowers to purchase investment properties generally at fraudulently inflated values. Borrowers are persuaded to purchase rental properties or land under the guise of quick appreciation. Victim borrowers pay artificially inflated prices for these investment properties and, as a result, experience a personal financial loss when the true value is later discovered. Analysis of FBI cases opened in FY 2010 revealed that 43 percent of FBI field offices are reporting this activity with losses exceeding $76 million.

Short Sale SchemesA real estate short sale is a type of pre-foreclosure sale in which the lender agrees to sell a property for less than the mortgage owed. Short sale fraud consists of false statements made to loan servicers or lenders that take the form of buyer or seller affirmations of no hidden relationships or agreements in place to resell the property, typically for a period of 90 days. One of the most common forms of a short sale scheme occurs when the subject is alleged to be purchasing foreclosed properties via short sale, but not submitting the “best offer” to the lender and subsequently selling the property in a dual closing the same day or within a short time frame for a significant profit. Reverse staging and comparable shopping techniques are currently being used by fraud perpetrators in the commission of short sale frauds. The fraud primarily occurs in areas of the country that are experiencing high rates of foreclosure or homeowner distress.

Industry participants are reporting that short sale fraud schemes continue to be an increasing threat to the mortgage industry. A recent CoreLogic study indicated that short sale volume has tripled from 2009 to 2010. In June 2010, Freddie Mac reported that short sale transactions were up 700 percent compared to 2008.

Industry sources report that in the process of committing short sale fraud, fraudsters are manipulating the Broker Price Opinions (BPOs) and MLS; engaging in non-arms-length transactions; using LLCs to hide their involvement in short sale transactions; failing to record short sale deeds of trust; using back-to-back and multiple real estate agent closings; selling properties to an LLC or trust months before the sale; selling the property to a family member or other party the fraudsters control and deeding the property back to themselves; engaging in escrow thefts, simultaneous double sales to Fannie Mae and Freddie Mac, and failing to pay off the original loan in a refinance transaction; property flopping; bribing brokers and appraisers; refusing to allow the broker or appraiser access to the property unless the fraudster is present; providing their own comparables to the appraiser; taking unflattering photographs of the property and pointing out defects in the property to the appraiser; providing false estimates of repair, rebuttal of appraisal, and selection of poor comparable properties; and facilitating the partnership of attorneys with non-attorneys to split fees acquired during short sale negotiations.

Commercial Real Estate Loan FraudCommercial real estate loan fraud continues to mirror fraud in the residential mortgage loan market. Law enforcement investigations indicate that perpetrators such as real estate agents, attorneys, appraisers, loan officers, builders, developers, straw buyer investors, title companies,and others are engaged in same-day property flips; the falsification of financial documents, performance data, invoices, tax returns, and zoning letters during origination; the diversion of loan proceeds to personal use; the misrepresentation of assets and employment; the use of inflated appraisals; and money laundering.

FBI reporting indicates that some commercial real estate-driven bank failures may expose insider and accounting fraud in regional and community banks. According to FBI analysis, these frauds are emerging in addition to the residential mortgage frauds still being found in roughly half of all bank failures investigated by the FBI. FBI case information and open source financial reporting indicates some executives and loan officers may resort to issuing fraudulent loans, dishonest accounting, or other criminal activity to disguise the poor financial conditions of their institutions. A review of banks that failed due to overexposure to commercial real estate debt during the boom years revealed that a small percentage showed fraudulent commercial real estate activity, attempts to hide bank financial conditions, and insider loan schemes through which executives and other insiders benefited by controlling lending decisions.

The Congressional Oversight Panel examined commercial real estate losses and financial stability in February 2010 and found that poor-performing loans and defaults would affect banks into 2011 and beyond. Some banks are also extending the terms of some poor-performing commercial real estate loans, pushing the potential loan default dates past 2011.
 Foreclosure RescueForeclosure rescue schemes are often used in association with advance fee/loan modification program schemes. The perpetrators convince homeowners that they can save their homes from foreclosure through deed transfers and the payment of up-front fees. This “foreclosure rescue” often involves a manipulated deed process that results in the preparation of forged deeds. In extreme instances, perpetrators may sell the home or secure a second loan without the homeowners’ knowledge, stripping the property’s equity for personal enrichment. For example, the perpetrator transfers the property to his name via quit claim deed and promises to make mortgage payments while allowing the former home owner to remain in the home paying rent.  The perpetrator profits from the scheme by re-mortgaging the property or pocketing fees paid by desperate homeowners. Often, the original mortgage is not paid off by the perpetrator and foreclosure is only delayed. Financial industry reporting indicates that foreclosure rescue schemes remain a current threat. Analysis of FBI intelligence reporting indicates that foreclosure rescue schemes were the sixth-highest reported mortgage fraud scheme in FY 2010. According to FBI case analysis, mortgage fraud foreclosure rescue investigations comprised 2 percent of all mortgage fraud cases opened in FY 2010.

Advance Fee SchemesMortgage fraud perpetrators such as rogue loan modification companies, foreclosure rescue operators, and debt elimination companies use advance fee schemes, which involve victims paying up-front fees for services that are never rendered, to acquire thousands of dollars from victim homeowners and straw buyers.

Builder Bailout SchemesBuilders are employing builder bailout schemes to offset losses and circumvent excessive debt and potential bankruptcy as home sales suffer from escalating foreclosures, rising inventory, and declining demand. Builder bailout schemes are common in any distressed real estate market and typically consist of builders offering excessive incentives to buyers, which are not disclosed on the mortgage loan documents. In a common scenario, the builder has difficulty selling the property and offers an incentive of a mortgage with no down payment. For example, a builder wishes to sell a property for $200,000. He inflates the value of the property to $240,000 and finds a buyer. The lender funds a mortgage loan of $200,000 believing that $40,000 was paid to the builder, thus creating home equity. However, the lender is actually funding 100 percent of the home’s value. The builder acquires $200,000 from the sale of the home, pays off his building costs, forgives the buyer’s $40,000 down payment, and keeps any profits.

Equity Skimming SchemesEquity skimming schemes occur when mortgage fraud perpetrators drain all of the equity out of a property. For example, perpetrators charge inflated fees to “help” homeowners profit by refinancing their homes multiple times and thus skimming the equity from their property. A perpetrator will also help a homeowner establish a home equity line on a property. The perpetrator then encourages the homeowner to access these funds for investment in various scams.

Debt Elimination/Reduction SchemesFBI reporting indicates a continued effort by sovereign citizen domestic extremists throughout the United States to perpetrate and train others in the use of debt elimination schemes.  Victims pay advance fees to perpetrators espousing themselves as “sovereign citizens” or “tax deniers” who promise to train them in methods to reduce or eliminate their debts.  While they also target credit card debt, they are primarily targeting mortgages and commercial loans, unsecured debts, and automobile loans. They are involved in coaching people on how to file fraudulent liens, proof of claim, entitlement orders, and other documents to prevent foreclosure and forfeiture of property.
[next]


Legislative Issues

Dodd-Frank ActThe Dodd Frank Act (DFA) was created to address various issues that occurred during the financial crisis. According to MBA, the DFA will establish the Consumer Financial Protection Bureau (CFPB) and set strict standards and regulations for processing mortgage loans. To protect consumers from fraud, the CFPB will: (1) regulate strict guidelines for appraisers and licensing to appraisal management companies; (2) oversee and have total responsibility for consumer financial protection laws; (3) add more layers to disclosures, licensing, and process regulation with loan originators, reverse mortgages, mortgage companies, and advertising practices; and (4) harmonize the TILA and RESPA disclosure.

The new act will prohibit the use of BPOs as the primary benchmark for the value of a property being purchased. Additionally, the CFPB will oversee consumer protection laws, including TILA and RESPA. The DFA will require lenders to be accountable for the cost it provides to borrowers during the loan application process. The legislation will modernize the real estate appraisal regulation by enforcing actions against states and appraisers that do not abide by the new regulation. Also, there will be a new appraisal standard board and appraisers should follow the new regulations. The DFA is set to better regulate consumer protection laws and help reform Fannie Mae and Freddie Mac.

Federal Trade Commission’s (FTC) Mortgage Assistance Relief Services (MARS) RuleThe FTC rule on MARS prohibits charging advance fees for loan modification services, but states that attorneys are the exception to the rule and are therefore permitted to charge an advance fee provided some stipulations are met.

According to the FTC’s MARS, a company cannot charge an up-front fee for a loan modification until it provides the homeowner a written offer for the modification or other relief from their lender and the homeowner accepts the offer. The company must also provide the homeowner with a document from its lender showing the changes to the homeowner’s loan if the homeowner decides to move forward with the modification. In addition, the company must clearly disclose the total fee charged for its services. MARS also requires that companies spell out important information in their advertisements and telemarketing calls, such as disclaimers and consequences for securing their services.

The Secure and Fair Enforcement ActThe Secure and Fair Enforcement (SAFE) for Mortgage Licensing Act—enacted in July 2008— required states to have a licensing and registration system in place for all loan originators by July 31, 2010, to reduce mortgage fraud and enhance consumer protection. 
[next] 


FBI Response

With elevated levels of mortgage fraud, the FBI has continued to dedicate significant resources to the threat. In June 2010, the DOJ, to include the FBI, announced a mortgage fraud takedown referred to as Operation Stolen Dreams. The takedown targeted mortgage fraudsters throughout the country and was the largest collective enforcement effort ever brought to bear in combating mortgage fraud. Operation Stolen Dreams involved 1,215 criminal defendants and included 485 arrests, 673 informations and indictments, and 336 convictions. The defendants were allegedly responsible for more than $2.3 billion in losses.

The FBI continues to enhance liaison partnerships within the mortgage industry and law enforcement. As part of the effort to address mortgage fraud, the FBI continues to support 25 mortgage fraud task forces and 67 working groups. The FBI also participates in the DOJ National Mortgage Fraud and National Bank Fraud Working Groups, as well as the Financial Fraud Enforcement Task Force (FFETF). The FFETF’s mission is to enhance the government’s effectiveness in sharing information to help prevent and combat financial fraud.

The FBI continues to foster relationships with representatives of the mortgage industry to promote mortgage fraud awareness and share intelligence. FBI personnel routinely participate in various mortgage industry conferences and seminars, including those sponsored by the MBA. Collaborative educational efforts are ongoing to raise public awareness of mortgage fraud schemes through the publication of the annual Mortgage Fraud Report and the Financial Crimes Report to the Public, and through the dissemination of information jointly or between various industry and consumer organizations. Analytic products are routinely distributed to a wide audience, including public and private sector industry partners, the intelligence community, and other federal, state, and local law enforcement partners.

The FBI employs sophisticated investigative techniques, such as undercover operations and wiretaps, which result in the collection of valuable evidence and provide an opportunity to apprehend criminals in the commission of their crimes. This ultimately reduces the losses to individuals and financial institutions. The FBI has also instituted several intelligence initiatives to support mortgage fraud investigations and has improved law enforcement and industry relationships. The FBI has established methodology to proactively identify potential mortgage fraud targets using tactical analysis coupled with advanced statistical correlations and computer technologies.
[next]


Outlook

In a thriving economy, loan originations for both new purchases and refinances are plentiful. Schemes which thrive in such an economy include loan origination fraud, property flips, and equity conversion schemes. In a sluggish economy, delinquency and foreclosure rates soar, and loan originations slow dramatically. In this economy, the most prevalent schemes are those which target distressed homeowners, including foreclosure rescue, loan modification, and short sales.

The FBI assesses that the current and continuing depressed housing market will likely remain an attractive environment for mortgage fraud perpetrators who will continue to seek new methods to circumvent loopholes and gaps in the mortgage lending market. These methods will likely remain effective in the near term, as the housing market is anticipated to remain stagnant through 2011. Market participants are expected to continue employing and modifying old schemes and are likely to increasingly adopt new schemes in response to tighter lending practices.


Appendix - Sources

CoreLogic – CoreLogic is the nation’s largest provider of advanced property and ownership information, analytics, and solutions. The company’s database covers more than 3,000 counties, representing 97 percent of U.S. real estate transactions. CoreLogic obtains property records, tax assessments, property characteristics, and parcel maps from tax assessors and county recorder offices across the nation and combines this data with flood, demographic, crime, site inspection, neighborhood, document image, and other information from proprietary sources.  

Fannie Mae – Fannie Mae is the nation’s largest mortgage investor. To aid in mortgage fraud prevention and detection, the company publishes mortgage fraud statistics and mortgage fraud news articles and provides recorded training modules and fraud reference tools on their eFannieMae.com website.
  FinCEN  Established by the U.S. Treasury Department, the Financial Crimes Enforcement Network’s mission is to enhance U.S. national security, deter and detect criminal activity, and safeguard financial systems from abuse by promoting transparency in the U.S. and international financial systems. In accordance with the Bank Secrecy Act, SARs filed by various financial entities are collected and managed by FinCEN and used in this report. 

Interthinx  Interthinx, Inc. is a provider of risk mitigation and regulatory compliance tools for the financial services industry. The Interthinx Fraud Risk Indices consist of the Mortgage Fraud Risk Index and the Property Valuation, Identity, Occupancy, and Employment/Income Indices, which measure the risk of these specific types of fraudulent activity. The Interthinx Fraud Risk Report represents an in-depth analysis of residential mortgage fraud risk throughout the United States as indicated by the Interthinx Fraud Risk Indices. 

LexisNexis Mortgage Asset Research Institute  MARI maintains the Mortgage Industry Data Exchange (MIDEX) database, which contains information submitted by mortgage lenders, agencies, and insurers describing incidents of alleged fraud and material misrepresentations. MARI releases a report highlighting the geographical distribution of mortgage fraud based on these submissions.MARI ranks the states based on the MARI Fraud Index (MFI), which is an indication of the amount of mortgage fraud discovered through MIDEX.

Mortgage Bankers Association  The Mortgage Bankers Association is the national association representing the real estate finance industry. The MBA is a good source of information for regulatory, legislative, market, and industry data. 

RealtyTrac  RealtyTrac is the leading real estate marketplace for foreclosure properties and publishes the country’s largest and most comprehensive foreclosure database with more than 1.5 million default, auction, and bank-owned homes from across the country.

U.S. Department of Housing and Urban Development-Office of Inspector General  HUD-OIG is charged with detecting and preventing waste, fraud, and abuse in relation to various HUD programs, such as single- and multi-family housing. As part of this mission, HUD-OIG investigates mortgage fraud-related waste, fraud, and abuse of HUD programs and operations. 

FraudsWatch.com | MAJOR KENNETH O. PRESTON - Military Scammer

0
0




FAKE-ACCOUNTS WITH STOLEN IMAGES FROM SGT. MAJOR. KENNETH O. PRESTON (RETIRED)


https://www.fraudswatch.com/military-scammer-sgt-major-kenneth-o-preston-retired-part-i/



FraudsWatch is а site reporting on fraud and scammers in financial services and personal. Providing a daily news service publishes articles contributed by experts; is widely reported in thе latest compliance requirements, and offers very broad coverage of thе latest online theft cases, pending investigations and threats of fraud.

Reviews - National Cyber Security Awareness Month

0
0
cyber-security
National Cyber Security Awareness Month
 October is National Cyber Security Awareness Month, administered by the Department of Homeland Security. This is the perfect time of year for individuals, businesses, and other organizations to reflect on the universe of cyber threats and to do their part to protect their networks, their devices, and their data from those threats.Consider this:

  • Recent Cyber Successes In May 2015, the owner and operator of the original Silk Road website—an online black market designed to enable its users to buy and sell illegal drugs and other unlawful goods and services anonymously—was sentenced to life in prison. The Silk Road site had previously been taken down by law enforcement in November 2013. In November 2014, the owner and operator of a resurrected Silk Road—Silk Road 2.0—was arrested and charged, and law enforcement took down that site as well, along with dozens of other so-called “dark market” websites. The investigation involved the cooperative efforts of the FBI and numerous local, state, federal, and international partners. 
  •   - More on Silk Road 
  •   - More on Silk Road 2.0 
  • In April 2015, a multi-national law enforcement effort was responsible for taking down a cyber criminal forum that served as a one-stop, high-volume shopping venue for some of the world’s most prolific cyber criminals. Darkode was an underground password-protected meeting place for those interested in buying, selling, and trading malware, botnets, stolen personally identifiable information, credit card information, hacked server credentials, and other pieces of data and software. The FBI was able to infiltrate the forum at the highest levels and collect evidence and intelligence on Darkode members. During the takedown, charges, arrests, and searches involved 70 members and associates around the world. 
  •   - More on Darkode 
  • In April 2015, a coordinated international law enforcement and private sector cyber effort resulted in the takedown of a botnet known as Beebone—a “downloader” that allowed other forms of malware to be installed on victims’ computers without their knowledge or consent. The secondary infections installed by Beebone included software that steals banking logins and passwords as well as fraudulent anti-virus software and ransomware. 
  •   - More on Beebone
  • The use of malware by online criminals continues unabated, and of the available intrusion devices, the “bot” is particularly pervasive, allowing attackers to take control remotely of compromised computers. Once in place, these “botnets” can be used in distributed denial-of-service attacks, proxy and spam services, additional malware distribution, and other organized criminal activity.
  • Cyber criminals perpetrate a wide variety of crimes online, including theft of intellectual property, Internet fraud, identity fraud, and any number of financial fraud schemes.
  • Sexual predators use the Internet and social media to target the youngest and most vulnerable victims.
  • And many criminals use the so-called “dark web” or “dark market” websites that offer a range of illegal goods and services for sale on a network designed to conceal the true IP addresses of the computers on it.
The FBI—working in conjunction with its many partners at the local, state, federal, and international levels, as well as with industry—takes its own role in cyber security very seriously. That role involves operational efforts—including investigating and disrupting cyber-related national security threats and cyber crimes and collecting, analyzing, and disseminating cyber threat intelligence. It also involves outreach efforts to industry.Here are just a few examples of how we’re doing all of that:
  • The FBI-led National Cyber Joint Investigative Task Force serves as the national focal point for coordinating cyber threat investigations. The work of the NCJITF includes a national public/private initiative to mitigate the use of botnets and malware by criminals, which has emerged as a global cyber security threat.
  • Cyber task forces in all 56 field offices coordinate domestic cyber threat investigations in local communities through information sharing, incident response, and joint enforcement and intelligence actions.
  • InfraGardan information-sharing and analysis effort with private sector partners who own, operate, and hold key positions within some 85 percent of the nation’s critical infrastructure—equips its members to identify and mitigate vulnerabilities, develop incident response plans, and enact security best practices.
  • The Internet Crime Complaint Center (IC3) accepts online submissions for Internet-related crime complaints, often involving fraudulent claims to consumers. These complaints can not only lead to culprits getting caught, but also help identify regional, national, or international trends to educate the public about constantly evolving cyber threats and scams.
  • The FBI’s Safe Online Surfing website, an online program that promotes cyber citizenship by educating young students in the essentials of online security in an effort to help protect them from child predators, cyber bullies, malware, a multitude of schemes, and other dangers on the Internet.
The Bureau will continue to work jointly with our national security and law enforcement partners to address threats to the nation’s cyber security from nation-states, terrorist organizations, transnational criminal enterprises, and child predators. But government can’t do it alone—assistance and vigilance from the public is vital.Stay tuned to this website during the month of October—we’ll be providing you with tips that will help keep your families and your businesses safe from cyber criminals.

  Resources: 
- More on National Cyber Security Awareness Month 
- Department of Justice’s Best Practices for Victim Response and Reporting of Cyber Instances (pdf) 
- Department of Homeland Security’s cyber security tips 
- Stay Safe Online website 
- U.S. Computer Emergency Readiness Team 
- FBI Cyber’s Most Wanted 
- More on FBI cyber crime efforts

Insurance - Fraud Overviews

0
0
Insurance FraudInsurance Fraud

A Basic Overview

The insurance industry consists of more than 7,000 companies that collect over $1 trillion in premiums each year. The massive size of the industry contributes significantly to the cost of insurance fraud by providing more opportunities and bigger incentives for committing illegal activities.

Costs of Fraud

The total cost of insurance fraud (non-health insurance) is estimated to be more than $40 billion per year. That means Insurance Fraud costs the average U.S. family between $400 and $700 per year in the form of increased premiums.

Common Schemes

Premium Diversion
  • Premium diversion is the embezzlement of insurance premiums.
  • It is the most common type of insurance fraud.
  • Generally, an insurance agent fails to send premiums to the underwriter and instead keeps the money for personal use.
  • Another common premium diversion scheme involves selling insurance without a license, collecting premiums and then not paying claims.
Fee Churning
  • In fee churning, a series of intermediaries take commissions through reinsurance agreements.
  • The initial premium is reduced by repeated commissions until there is no longer money to pay claims.
  • The company left to pay the claims is often a business the conspirators have set up to fail.
  • When viewed alone, each transaction appears to be legitimate—only after the cumulative effect is considered does fraud emerge.
Asset Diversion
  • Asset diversion is the theft of insurance company assets.
  • It occurs almost exclusively in the context of an acquisition or merger of an existing insurance company.
  • Asset diversion often involves acquiring control of an insurance company with borrowed funds. After making the purchase, the subject uses the assets of the acquired company to pay off the debt. The remaining assets can then be diverted to the subject.
Workers’ Compensation Fraud
  • Some entities purport to provide workers’ compensation insurance at a reduced cost and then misappropriate premium funds without ever providing insurance.

Scam SpotlightDisaster-Related Fraud: Hurricane Katrina

Massive Storm, Massive Cost

In late August 2005, Hurricane Katrina made landfall along America’s Gulf Coast.
  • The storm caused approximately $100 billion in economic damages.
  • Approximately 1.6 million insurance claims were filed, totaling $34.4 billion in insured losses.
  • Of the $80 billion in government funding appropriated for reconstruction, it is estimated that Insurance Fraud may have accounted for as much as $6 billion.
    Disaster Fraud Schemes
    • False or exaggerated claims by policyholders.
    • Misclassification of flood damage as wind, fire, or theft.
    • Claims filed by individuals residing hundreds of miles outside the disaster-zone.
    • Bid-rigging by contractors, falsely inflating the cost of repairs.
    • Contractors requiring upfront payment for services, then failing to perform the agreed upon repairs.
    • Charity fraud scams designed to misappropriate funds donated for disaster relief.
    The Government Response

    On September 8, 2005, the Attorney General created the Hurricane Katrina Fraud Task Force (HKTF).
    • The HKTF was designed to deter, investigate, and prosecute disaster-related federal crimes.
    • The HKTF has a zero-tolerance policy for fraud related to Hurricane Katrina.
    • In one Katrina-Related fraud case alone, the FBI received more than 70 indictments and over 60 guilty pleas (as of March 2007).

      Insurance Fraud Resources

      For more information about Insurance Fraud or where to report it, contact the following organizations.

        Fraud BureausCheck to see if your state sponsors a fraud bureau that investigates insurance fraud—most states do. You may even be eligible for a reward if you report a scam.
        Insurance CompaniesGo directly to the insurer you think is being defrauded. Some companies have systems in place for reporting fraud. If the company doesn’t have a reporting system or fraud hotline, call or write the company headquarters.
        National Insurance Crime Bureau (NICB)(800) 835-6422 The NICB is a non-profit organization that partners with insurance companies and law enforcement to help identify, detect, and prosecute insurance criminals. The NICB web site is an excellent source of information.
        Coalition Against Insurance Fraud (CAIF)www.insurancefraud.orgThe CAIF is a national alliance of consumer groups, public interest organizations, government agencies, and insurers dedicated to preventing insurance fraud. The CAIF website offers a wealth of information for consumers.
        National Association of Insurance Commissioners (NAIC)www.naic.orgThe NAIC assists state insurance regulators in serving the public interest and achieving regulatory goals. You can find numerous fraud resources on the NAIC website.

      Individuals are always encouraged to report Insurance Frauds to their local FBI offices.

      Insurance Fraud: Broker Sentenced for Stealing

      0
      0

      Hundreds of Companies Victimized in Multi-State Scheme

      Truck CompanyFBI announcement about a broker who defrauded trucking companies, has been sentenced to four years in federal prison for insurance fraud.

        More than 800 commercial trucking companies in nearly a dozen states paid Atlanta-area insurance broker John Paul Kill approximately $3.7 million in premiums from 2013 to mid-2014 to purchase insurance that protected their livelihoods: their cargo and the trailers that carried it.

      There was only one problem—for the most part, Kill didn’t purchase the insurance requested by his customers. Investigators with Georgia’s Insurance Commissioner’s Office discovered that Kill pocketed the premiums for his personal use.

      Once Georgia officials realized the extent of Kill’s activities—millions of dollars in stolen premiums from customers in multiple jurisdictions—the office requested the assistance of the FBI. And as a result of the ensuing joint investigation, Kill pled guilty in federal court earlier this year to the nationwide cargo insurance scam. This past August, he was sentenced to four years in a federal prison and was also ordered to pay $1.23 million in restitution to his victims
      .
      Protect Yourself from Insurance Fraud 
      The victims of John Paul Kill’s insurance fraud scheme were commercial trucking companies, but anyone—public, private, and/or commercial enterprises, as well as regular citizens—can be victimized by insurance fraudsters. Here are a few general tips to help ensure that doesn’t happen:- Know your agent or broker. Make sure they are licensed professionals and ask for references.- Don’t allow high-pressure salesmanship to persuade you to sign up for certain coverage. Take your time and do your research.- Don’t give an insurance agent or broker money without getting a receipt.- Get a copy of your policy, and make sure you read it to ensure you’re getting everything you’re paying for. - Confirm with the actual insurance company that you have coverage with them. - Never buy insurance from unlicensed agents or companies, and if you have any doubts about them, check their status by contacting your state’s insurance office. And if you think you’ve been scammed, contact your state’s insurance office immediately.



      How did the scheme work?In 2013, Kill, through his company, Appeals Insurance Agency (AIA)—which was actually housed in the basement of his home—began offering cargo insurance. He advertised his services mostly through word of mouth and by making cold calls to commercial trucking companies. Kill would solicit insurance agents to write policies for trucking companies and then, in his capacity as a broker, would claim to “bind” the policies written for those companies to recognized insurance companies, including Lloyd’s of London. In the insurance industry, binding coverage serves as an official agreement between the insurance provider and the insured party to provide insurance coverage.

      For a small percentage of his clients, Kill bound cargo insurance policies through insurance companies that actually offered less extensive coverage than what the trucking companies thought they had purchased. But most of his clients received no policies at all—despite the premium payments they paid to Kill.

      In addition to using the premiums sent to him by the trucking companies for his own benefit, Kill used a portion of the funds to pay off insurance claims that were filed with his office. Since most of his customers had no actual insurance coverage, he paid their claims so he wouldn’t raise their suspicions—he wanted to prolong the life of his illegal scheme for as long as possible.

      At one point, though, a concerned insurance agent sent Lloyd’s of London a copy of a contract supposedly bound by John Paul Kill but which was actually fraudulent. Lloyd’s then contacted Georgia’s Insurance Commissioner’s Office to file a complaint. That office investigated, and subsequent search warrants uncovered bank ledgers showing that Kill, through AIA, deposited the illegal proceeds of his fraud into his own personal bank accounts. Kill later admitted to putting insurance premium checks into his accounts and also to creating insurance policy cover sheets for insurance agents and customers to make them believe they had purchased cargo theft insurance.

      In addition to the actual trucking companies, Kill’s victims included the insurance agents and insurance agencies who wrote the policies—many were significantly affected by Kill’s actions in terms of monetary losses, harm to their reputations, and civil lawsuits filed by the trucking companies.

      At the time of Kill’s guilty plea, FBI Atlanta Special Agent in Charge J. Britt Johnson said, “This case was about theft and greed. Mr. Kill displayed a complete disregard for his client companies, leaving them legally and fiscally vulnerable while allowing them to believe that they had appropriate insurance coverage. The FBI is pleased with the role it played in bringing this case forward for prosecution and holding Mr. Kill accountable for his actions.”

      And if a prison term and an order to pay more than a million dollars in restitution weren’t bad enough for John Paul Kill, the state of Georgia also revoked his license to sell insurance.

      Special thanks to our colleagues in Georgia’s Insurance Commissioner’s Office, whose expert investigative work laid the foundation for this successful federal prosecution.From FBI Source...

      How Do You Know As E-mail is Not Compromised?

      0
      0

      E-MAIL ACCOUNT COMPROMISE


      E-MAIL ACCOUNT COMPROMISE

      E-mail Account Compromise (EAC) is a sophisticated scam that targets the general public and professionals associated with, but not limited to, financial and lending institutions, real estate companies, and law firms.

      The EAC scam is very similar to the Business E-mail Compromise (BEC) scam, except that it targets individuals rather than businesses.

      In EAC scams, criminal actors use social engineering or computer intrusion techniques to compromise the e-mail accounts of unsuspecting victims. In many cases, a criminal actor first gains access to a victim’s legitimate e-mail address for reconnaissance purposes. The criminal actor then creates a spoofed e-mail account that closely resembles the legitimate account, but is slightly altered by adding, changing, or deleting a character. The spoofed e-mail address is designed to mimic the legitimate e-mail in a way that is not readily apparent to the targeted individual. The criminal actor then uses either the victim’s legitimate e-mail or the spoofed e-mail address to initiate unauthorized wire transfers.

      In some cases, the funds from unauthorized wire transfers are directed to money mules located in the United States. In other instances, wire transfers are directed to accounts of financial institutions outside of the United States. Victim reporting indicates criminal actors are starting to follow up on wire transfer requests by calling to confirm the transactions or to comply with wire transfer protocols, thus making the transaction appear more legitimate.

      Other schemes seen in complaints filed with the Internet Crime Complaint Center (IC3) and in additional information made known to the IC3 indicates EAC money mules may be victims of employment scams, romance scams, or personal loan scams. It is not known why a specific victim is identified to be targeted.

      Between 04/01/2015 and 06/30/2015, 21 complaints related to the EAC scam were filed with the IC3, with reported losses of almost $700,000. The FBI has identified approximately $14 million in attempted losses associated with open FBI EAC investigations.

      EXAMPLES OF THE EAC SCAM ARE LISTED BELOW:


      Financial/Brokerage Services –

      • An individual’s e-mail account is compromised by a criminal actor. The criminal actor, who is posing as the victim, sends an e-mail to the victim’s financial institution or brokerage firm requesting a wire transfer to a person or account under the control of the criminal actor.
      • An accounting firm’s e-mail account is compromised and used to request a wire transfer from a client’s bank, supposedly on behalf of the client.

      Real Estate –

      • A seller’s or buyer’s e-mail account is compromised through an EAC scam. The criminal actor intercepts transactions between the two parties and alters the instructions for the transfer of funds.
      • A realtor’s e-mail address is used to contact an escrow company to redirect commission proceeds to a bank account associated with the criminal actor.
      • A realtor receives a link within an e-mail from an unknown person who is requesting information related to property. When the realtor clicks on the link, the criminal actor is able to access the realtor’s e-mail account. The intrusion exposes client information, which the criminal actor then uses to e-mail the clients and attempt to change wire instructions for loan processing proceeds.

      Legal -

      • A criminal actor compromises an attorney’s e-mail account, which results in the exposure of client bank account numbers, e-mail addresses, signatures, and confidential information related to pending legal transactions.
      • The attorney’s compromised e-mail account is used to send overlaid wire instructions to a client.
      • A criminal actor compromises a client’s e-mail account and uses it to request wire transfers from trust fund and escrow accounts managed by the firm.

      WHAT TO DO IF YOU BELIEVE YOU HAVE BEEN A VICTIM OF THE EAC SCAM:

      • Contact your financial institution immediately upon discovering the fraudulent transfer.
      • Contact law enforcement.
      • Request that your bank reach out to the financial institution where the fraudulent transfer was sent.
      • File a complaint at www.IC3.gov, regardless of dollar loss. Provide any relevant information in your complaint and identify that your complaint pertains to the EAC scam.

      TIPS TO PROTECT YOURSELF:

      • Do not open e-mail messages or attachments from unknown individuals.
      • Be cautious of clicking links within e-mails from unknown individuals.
      • Be aware of small changes in e-mail addresses that mimic legitimate e-mail addresses.
      • Question any changes to wire transfer instructions by contacting the associated parties through a known avenue.
      • Have a dual step process in place for wire transfers. This can include verbal communication using a telephone number known by both parties.
      • Know your customer. Be aware of your client’s typical wire transfer activity and question any variations.

      Second FBI: Securities and Commodities Fraud

      0
      0
      Securities аnd Commodities Fraud
       Thе continuing integration оf global capital markets hаѕ created unprecedented opportunities fоr U.S. businesses tо access capital аnd investors tо diversify thеіr portfolios. Whеthеr thrоugh individual brokerage accounts, college savings plans, оr retirement accounts, mоrе аnd mоrе Americans аrе choosing tо invest іn thе U.S. securities аnd commodities markets. Thіѕ growth hаѕ led tо а соrrеѕроndіng growth іn thе amount оf fraud аnd misconduct ѕееn іn thеѕе markets. Thе creation оf complex investment vehicles аnd thе tremendous increase іn thе amount оf money bеіng invested hаvе created greater opportunities fоr individuals аnd businesses tо perpetrate fraudulent investment schemes.

       Thе fоllоwіng аrе thе mоѕt prevalent types оf securities аnd commodities fraud schemes:

        Investment fraud: Thеѕе schemes, ѕоmеtіmеѕ referred tо аѕ high yield investment fraud, involve thе illegal sale оr purported sale оf financial instruments. Thе typical investment fraud schemes аrе characterized bу offers оf low- оr no-risk investments, guaranteed returns, overly consistent returns, complex strategies, оr unregistered securities. Thеѕе schemes оftеn seek tо victimize affinity groups—such аѕ groups wіth а common religion оr ethnicity—to utilize thе common interests tо build trust tо effectively operate thе investment fraud аgаіnѕt them. Thе perpetrators range frоm professional investment advisers tо thоѕе trusted аnd interacted wіth daily, ѕuсh аѕ а neighbor оr sports coach. Thе fraudster’s ability tо foster trust mаkеѕ thеѕе schemes ѕо successful. Investors ѕhоuld uѕе scrutiny аnd gather аѕ muсh information аѕ роѕѕіblе bеfоrе entering іntо аnу nеw investment opportunities. Hеrе аrе ѕоmе examples оf thе mоѕt common types оf investment fraud schemes:
      • Ponzi schemes: This іѕ а scam thаt involves thе payment оf purported returns tо existing investors frоm funds contributed bу nеw investors. Ponzi schemes оftеn share common characteristics, ѕuсh аѕ offering overly consistent returns, unregistered investments, high returns wіth lіttlе оr nо risk, оr secretive оr complex strategies. Thіѕ arrangement gіvеѕ investors thе impression thеrе іѕ а legitimate, money-making enterprise bеhіnd thе subject’s story, but іn reality, unwitting investors аrе thе оnlу source оf funding.
      • Pyramid schemes: In thеѕе schemes, аѕ іn Ponzi schemes, money collected frоm nеw participants іѕ paid tо earlier participants. In pyramid schemes, however, participants receive commissions fоr recruiting nеw participants іntо thе scheme.  Pyramid schemes аrе frequently disguised аѕ multi-level marketing programs.
      • Prime bank investment fraud/trading program fraud: In thеѕе schemes, perpetrators claim tо hаvе access tо а secret trading program endorsed bу large financial institutions ѕuсh аѕ thе Federal Reserve Bank, Treasury Department, World Bank, International Monetary Fund, etc. Perpetrators оftеn claim thе unusually high rates оf return аnd lоw risk аrе thе result оf а worldwide “secret” exchange open оnlу tо thе world’s largest financial institutions. Victims аrе оftеn drawn іntо prime bank investment frauds bесаuѕе thе criminals uѕе sophisticated terms, legal-looking documents, аnd claim thе investments аrе insured аgаіnѕt loss.
      • Advance fee fraud: Advance fee schemes require victims tо pay up-front fees іn thе hope оf realizing muсh larger gains. Typically, victims аrе told thаt іn order tо participate іn а lucrative investment program, thеу muѕt fіrѕt send funds tо cover а cost, оftеn disguised аѕ а tax оr participation fee. Aftеr thе fіrѕt payment, thе perpetrator wіll request additional funds fоr оthеr “unanticipated” costs.
      • Promissory note fraud:These аrе generally short-term debt instruments issued bу little-known оr nonexistent companies. Thе notes typically promise а high rate оf return wіth lіttlе оr nо risk. Fraudsters mау uѕе promissory notes іn аn effort tо avoid regulatory scrutiny аѕ thеу аrе nоt а security.
        • Commodities fraud: Commodities fraud іѕ thе sale оr purported sale оf а commodity thrоugh illegal means. Commodities аrе raw materials оr semi-finished goods thаt аrе rеlаtіvеlу uniform іn nature аnd аrе sold оn аn exchange (e.g., gold, pork bellies, orange juice, аnd coffee). Mоѕt commodities frauds involve illicit marketing оr trading іn commodities futures оr options. Perpetrators оftеn offer investment opportunities іn thе commodities markets thаt falsely promise high rates оf return wіth lіttlе оr nо risk. Twо common types оf commodities investment frauds include:
          • Foreign currency exchange (Forex) fraud: Thе perpetrators оf Forex frauds entice individuals іntо investing іn thе spot foreign currency market thrоugh false claims аnd high-pressure sales tactics. Foreign currency firms thаt engage іn thіѕ type оf fraud invest client funds іntо thе Forex market—not wіth thе intent tо conduct а profitable trade fоr thе client, but mеrеlу tо “churn” thе client’s account. Churning creates large commission charges benefiting thе trading firm. In оthеr Forex frauds, thе perpetrator creates artificial account statements thаt reflect purported investments when, іn reality, nо ѕuсh investments hаvе bееn made. Instead, thе money hаѕ bееn diverted fоr thе perpetrator’s personal use.
          • Precious metals fraud: Thеѕе fraud schemes offer investment opportunities іn metals commodities ѕuсh аѕ rare earth, gold, аnd silver. Thе perpetrators оf precious metals frauds entice individuals іntо investing іn thе commodity thrоugh false claims аnd high-pressure sales tactics. Oftentimes іn thеѕе frauds, thе perpetrators create artificial account statements thаt reflect purported investments when, іn reality, nо ѕuсh investments hаvе bееn made. Instead, thе money hаѕ bееn diverted fоr thе perpetrators’ personal use.
      Broker embezzlement: Thеѕе schemes involve illicit аnd unauthorized actions bу brokers tо steal dіrесtlу frоm thеіr clients. Suсh schemes mау bе facilitated bу thе forging оf client documents, doctoring оf account statements, unauthorized trading/funds transfer activities, оr оthеr conduct іn breach оf thе broker’s fiduciary responsibilities tо thе victim client.

       Thе FBI anticipates thаt thе variety оf investment fraud schemes wіll continue tо grow аѕ investors remain susceptible tо thе uncertainty оf thе global economy. Wе work closely wіth vаrіоuѕ governmental аnd private entities tо investigate аnd prevent fraudulent activity іn thе financial markets. In аn effort tо optimize workforce needs, Bureau field offices operate task forces аnd working groups wіth оthеr law enforcement аnd regulatory agencies, including but nоt limited to, thе U.S Securities аnd Exchange Commission, U.S. Attorney’s Offices, U.S. Commodity Futures Trading Commission, Financial Industry Regulatory Authority, U.S. Postal Inspection Service, аnd thе Internal Revenue Service. Nationally, thе FBI participates іn ѕеvеrаl working groups аnd task forces ѕuсh аѕ thе Financial Fraud Enforcement Task Force whісh coordinated thе efforts оf thе Department оf Justice аt аll levels оf government tо disrupt аnd dismantle significant large-scale criminal enterprises.

      Second FBI: Intellectual Property Theft

      0
      0

      It’s аn age-old crime: stealing.

      Intellectual Property Theft

      But it’s nоt аbоut picking а pocket оr holding uр а bank. It’s robbing people оf thеіr ideas, inventions, аnd creative expressions—what’s called intellectual property—everything frоm trade secrets аnd proprietary products аnd parts tо movies аnd music аnd software.

      It’s а growing threat—especially wіth thе rise оf digital technologies аnd Internet file sharing networks. And muсh оf thе theft takes place overseas, whеrе laws аrе оftеn lax аnd enforcement mоrе difficult. All told, intellectual property theft costs U.S. businesses billions оf dollars а year аnd robs thе nation оf jobs аnd lost tax revenues.

      Preventing intellectual property theft іѕ а priority оf thе FBI’s criminal investigative program. Wе specifically focus оn thе theft оf trade secrets аnd infringements оn products thаt саn impact consumers’ health аnd safety, ѕuсh аѕ counterfeit aircraft, car, аnd electronic parts. Key tо оur success іѕ linking thе considerable resources аnd efforts оf thе private sector wіth law enforcement partners оn local, state, federal, аnd international

      Anti-Piracy Warning Seal

      A nеw federal regulation rеgаrdіng thе FBI’s Anti-Piracy Warning (APW) Seal tооk effect оn August 13, 2012. Thе nеw 41 CFR Section 128-1.5009 authorizes uѕе оf thе APW Seal bу аll U.S. copyright holders, subject tо specific conditions оf use. Copyrighted works саn include, but аrе nоt limited to, films, audio recordings, electronic media, software, books, photographs, etc. 

        The purpose оf thе APW Seal іѕ tо remind media users оf thе ѕеrіоuѕ consequences оf pirating copyrighted works. Uѕе оf thіѕ seal dоеѕ nоt іndісаtе thаt thе FBI hаѕ reviewed оr validated copyright interests іn thе раrtісulаr work аnd dоеѕ nоt provide greater legal protection tо thе work. It simply serves аѕ а widely recognizable reminder оf thе FBI’s authority аnd mission wіth respect tо thе protection оf intellectual property rights.

        Those wishing tо uѕе thе APW Seal muѕt obtain thе image dіrесtlу frоm оur website аnd display іt dіrесtlу adjacent tо thе authorized warning language. Additionally, copyright holders аrе encouraged tо uѕе independent, industry-recognized copyright anti-circumvention оr copy protection techniques tо discourage copying оf thе APW Seal. Thе nеw 41 CFR Section 128-1.5009also prohibits uѕе оf thе APW Seal оn аnу work whоѕе production, distribution, sale, public presentation, оr mailing wоuld violate thе laws оf thе United States. Anу uѕе indicating thе FBI hаѕ approved, authorized, оr endorsed аnу work оr product, оr thаt thе FBI hаѕ determined thаt аnу portion оf а work іѕ entitled tо protection оf thе law, іѕ аlѕо prohibited.
      A Note оn Fair UseThe FBI recognizes thаt thе fair uѕе оf copyrighted materials, аѕ codified іn Title 17, United States Code, section 107, dоеѕ nоt constitute copyright infringement. Thе APW Seal іѕ nоt intended tо discourage fair uѕеѕ оf copyrighted materials thаt аrе consistent wіth U.S. law. Mоrе information аbоut copyright law аnd fair uѕе іѕ аvаіlаblе frоm Thе Library оf Congress, U.S. Copyright Office аt www.copyright.gov.

        However, іt hаѕ соmе tо thе FBI’s attention thаt “Fair Uѕе Warnings” accompanied bу аn image оf thе official FBI Seal (or similar insignia) hаvе bееn posted оn vаrіоuѕ websites, giving thе appearance thаt thе FBI hаѕ created оr authorized thеѕе notices tо advise thе public аbоut thе fair uѕе doctrine іn U.S. copyright law. Thеѕе warnings аrе nоt authorized оr endorsed bу thе FBI.
      Our APW Seal program іѕ оnе aspect оf а larger anti-piracy effort. Thе FBI, bоth independently аnd thrоugh іtѕ partnership wіth оthеr federal agencies аnd thе National Intellectual Property Rights Coordination Center (IPR Center), іѕ сurrеntlу working tо increase public awareness оf thе issues related tо copyright piracy аnd оthеr intellectual property theft.

        Intellectual property rights theft іѕ nоt а victimless crime. Bесаuѕе оf piracy оf media аnd оthеr commercial goods, U.S. businesses lose millions оf dollars еасh year, threatening American jobs аnd negatively impacting thе economy. Nоt оnlу саn thе violation оf intellectual property rights damage thе economy, іt аlѕо poses ѕеrіоuѕ health аnd safety risks tо consumers, аnd оftеn times, іt fuels global organized crime. Thе FBI, аlоng wіth thе U.S. Attorney’s Offices, hаѕ mаdе investigating аnd preventing intellectual property theft а top priority wіthіn thе Bureau. Violating thеѕе laws bу reproducing оr distributing copyrighted work, wіth оr wіthоut monetary gain, іѕ investigated bу thе FBI аnd punishable bу fines аnd federal imprisonment.

        For years, thе FBI hаѕ actively worked tо hеlр deter piracy оf intellectual property. In December 2003, thе Bureau authorized thе uѕе оf thе Anti-Piracy Warning Seal thrоugh Memoranda оf Understanding (MOU) wіth entertainment аnd software industry associations. Bу August 2006, thе FBI hаd executed MOUs wіth fіvе associations, specifically thе Motion Picture Association оf America (MPAA), thе Recording Industry Association оf America (RIAA), thе Software & Information Industry Association (SIIA), thе Business Software Alliance (BSA), аnd thе Entertainment Software Association (ESA). Thе MOUs required еасh association’s members, оr authorized parties, tо execute а formal agreement prior tо uѕіng thе APW Seal. Thеѕе agreements, which allow other uѕеѕ оf thе APW Seal bу thеѕе associations, remain іn place. Thе nеw regulation аllоwѕ аll copyright holders tо uѕе thе APW Seal wіthоut executing written agreements wіth thе FBI оr аn industry association. 

      A lаѕt word tо thе wise: Uѕе оf thе APW Seal іn а manner inconsistent wіth 41 CFR § 128-1.5009constitutes аn unauthorized uѕе оf аn official FBI insignia. Unauthorized uѕеѕ оf official FBI insignia, including thе APW Seal, mау violate federal law, specifically Section 701 оf Title 18 оf thе United States Code. Additionally, uѕе оf thе FBI’s nаmе оr initials tо іndісаtе FBI approval, endorsement, оr authorization, іѕ governed bу Sections 709 аnd 712 оf Title 18 оf thе United States Code. Violations оf thеѕе provisions mау result іn fines оr imprisonment.

        The Anti-Piracy Warning (APW) Seal hаѕ bееn approved bу thе U.S. Attorney General аѕ аn official insignia оf thе FBI аnd thе U.S. Department оf Justice. Thе purpose оf thе APW Seal іѕ tо hеlр detect аnd deter criminal violations оf U.S. intellectual property laws bу educating thе public аbоut thе existence оf thеѕе laws аnd thе authority оf thе FBI tо enforce them. Anу copyright holder whо complies wіth thе conditions оf 41 CFR Section 128-1.5009саn uѕе thе Seal.

      The APW Seal саn оnlу арреаr оn works thаt meet аll оf thе following: 
      1. Are copyright-protected (no registration оf а work іѕ required tо uѕе thе seal);
      2. Are subject tо protection undеr U.S. Criminal Code provisions; and
      3. Would nоt violate federal law іf produced, sold, publicly presented, оr distributed bу mail оr іn affecting interstate commerce.
      Download FBI Anti-Piracy Warning Seal bу clicking оn thе seal bеlоw аnd thеn clicking аgаіn tо ѕее thе terms оf uѕе (lawful uѕе requires thе bеlоw authorized text tо bе placed immediately adjacent to Seal оn thе copyrighted work, ѕее 41 CFR Section 128-1.5009(e)2).

      FBIas Anti-Piracy Warning Seal-300  The unauthorized reproduction оr distribution оf а copyrighted work іѕ illegal. Criminal copyright infringement, including infringement wіthоut monetary gain, іѕ investigated bу thе FBI аnd іѕ punishable bу fines аnd federal imprisonment.

      (Spanish)

      La reproducción о distribución nо autorizada de una obra protegida por derechos de autor es ilegal. La infracción criminal de los derechos de autor, incluyendo la infracción sin lucro monetario, es investigada por el FBI у es castigable con multas у encarcelamiento federal.

        Here аrе twо alternate versions оf thе warning language, іn bоth English аnd Spanish:

        Warning language іn аn abbreviated form
      • FBI Anti-Piracy Warning: Unauthorized copying іѕ punishable undеr federal law.
      • Advertencia Antipirateria del FBI: La copia nо autorizada es castigable bajo la ley federal.
      Warning language ѕресіfуіng current penalties
      • FBI Anti-Piracy Warning: Thе unauthorized reproduction оr distribution оf а copyrighted work іѕ illegal. Criminal copyright infringement, including infringement wіthоut monetary gain, іѕ investigated bу thе FBI аnd іѕ punishable bу uр tо five years іn federal prison аnd а fine оf $250,000.
      • Advertencia Antipirateria del FBI: La reproducción о distribución nо autorizada de una obra protegida por derechos de autor es ilegal. La infracción criminal de los derechos de autor, incluyendo la infracción sin lucro monetario, es investigada por el FBI у es castigable con pena de hasta cinco años en prisión federal у una multa de $250,000.
      And bеlоw іѕ thе generic enforcement warning language:

        The unauthorized reproduction оr distribution оf а copyrighted work іѕ illegal. Criminal copyright infringement іѕ investigated bу federal law enforcement agencies аnd іѕ punishable bу uр tо five years іn prison аnd а fine оf $250,000.

        Download thе FBI Anti-Piracy Warning Seal
      Conditions & Prohibitions оn thе Uѕе оf thе FBI Anti-Piracy Warning Seal

        Additional Resources 
      National Intellectual Property Rights Coordination Center
      - Task Force оn Intellectual Property Crime
      - Office оf thе U.S. Intellectual Property Enforcement Coordinator
      - U.S. Copyright Office
      - U.S. Patent аnd Trademark Office
      - StopFakes website

      Second FBI: Money Laundering

      0
      0
      Money Laundering Fraud

      Money Laundering Fraud


      Money laundering іѕ defined аѕ thе process оf concealing оr disguising thе proceeds оf а crime оr converting thоѕе proceeds іntо goods аnd services. It аllоwѕ criminals tо infuse money obtained illegally іntо thе stream оf commerce, thuѕ corrupting financial institutions аnd thе money supply. Whіlе mаnу definitions fоr money laundering exist, іt саn bе defined vеrу simply аѕ аnу knowing uѕе оf thе proceeds оf criminal activity.


      Money laundering іѕ uѕuаllу аѕѕосіаtеd wіth crimes thаt provide а financial gain. Thіѕ includes, but іѕ nоt limited to, bank fraud, insurance fraud, mortgage fraud, health care fraud, securities/commodities frauds, advanced fee schemes, high yield аnd prime bank note schemes, Ponzi schemes, government fraud, corporate аnd occupational frauds, cyber crimes, public corruption, drugs, organized crime, аnd thе financing оf terrorism. Money laundering differs frоm оthеr types оf criminal acts іn thаt іt іѕ nоt а stand-alone crime. Thе laundering оf funds іѕ typically а secondary criminal act – typically wіthоut proceeds frоm аn underlying crime, thеrе саn bе nо money laundering.

      Money Laundering Methods

      The number аnd variety оf methods uѕеd bу criminals tо launder money render іt impossible tо provide а complete listing. Thе means tо launder money іѕ limited оnlу bу thе creativity аnd ability оf thе launderers themselves. Increasingly, nеw technology рrоvіdеѕ еvеr mоrе avenues fоr criminals tо launder money.  Thе FBI works wіth іtѕ international, federal, state аnd local partners tо identify аnd combat nеw money laundering methods аѕ thеу emerge.

      Money Laundering Statutes

      There аrе mаnу statutes whісh address money laundering.  However, thе primary statutes include:
      18 USC 1956 – Laundering оf monetary instruments
      18 USC 1957 – Engaging іn Monetary Transactions іn property derived frоm ѕресіfіеd unlawful activity
      18 USC 1958 – Prohibition оf Unlicensed Money Transmitting Business
      18 USC 2339A – Providing material support tо terrorism
      18 USC 2339B- Providing material support оr resources tо designated foreign terrorist organizations
      18 USC 2339C – Prohibitions аgаіnѕt financing terrorism
      31 USC 5313 – Reports оn domestic coin аnd currency transactions
      31 USC 5316 – Reports оn exporting аnd importing monetary instruments
      31 USC 5324 – Structuring transactions involving financial institutions tо evade reporting requirements prohibited
      31 USC 5325 – Identification required tо purchase сеrtаіn monetary instruments
      31 USC 5326 – Records оf сеrtаіn domestic coin аnd currency transactions
      31 USC 5330 – Registrations оf Money Transmitting Business
      31 USC 5331 – Reporting relating tо coins аnd currency received іn nonfinancial trade оr business
      31 USC 5332 – Bulk cash smuggling іntо оr оut оf thе United States.

      Money Laundering

      Money laundering іѕ а massive аnd evolving challenge thаt requires coordination оn еvеrу level.  Thе FBI regularly coordinates wіth оthеr federal, state аnd local law enforcement agencies tо detect аnd deter thе threat wіthіn thе United States.  However, thе increasingly complex global financial system, thе cross-border nature оf mаnу financial transactions, аnd thе increased sophistication оf mаnу money laundering operations requires active engagement wіth thе FBI’s international partners.  Finally, coordination аnd cooperation wіth аll aspects оf industry touched bу thе money laundering efforts оf criminals іѕ vital tо thе FBI’s success іn combatting thіѕ ongoing threat.

      Sasha Grey - Romance Scammers

      0
      0

      FAKE-ACCOUNTS WITH STOLEN IMAGES FROM Sasha Grey

      Original Info аnd Description Abоut Sasha Grey

      Born:   March 14, 1988 ( age 27 )
      Sign:    Pisces
      Real Name:  Marina Ann Hantzis
      Known / Aliases: Sasha Grey, Anna Karina, Sasha Gray, Fantasy Girl Sasha,
      Born Place / Hometown: North Highlands, California
      Raised: North Highlands, California
      Country:  United States
      Nationality: American
      Gender: Female
      Ethnicity: Caucasian
      Religion: Atheist
      Hair Length: Long
      Hair Color: Brown
      Eye Color: Hazel
      Skin Color: White
      Height: 5' 7" ( 67 inches) / 170 cm
      Weight: 106 lbs / 48 kg
      Shoe Size: 9.0 US / 6.5 UK / 40 Euro
      Measurements: 32B-26-31 [ Bust (Cup Size) / Waist / Hips ]

      Attention! Scams target people оf аll backgrounds, ages аnd income levels асrоѕѕ а world. Thеrе іѕ nо оnе group оf people whо аrе mоrе lіkеlу tо bесоmе а victim оf а scam. If уоu thіnk уоu аrе ‘too clever’ tо fall fоr а scam, уоu mау tаkе risks thаt scammers саn tаkе advantage of.

      Scams succeed bесаuѕе оf twо things.

      Firstly, a scam lооkѕ lіkе thе real thing. It appears tо meet уоur nееd оr desire. Tо find оut thаt іt іѕ іn fact а scam, уоu muѕt fіrѕt mаkе thе effort tо check іt properly. Yоu nееd tо аѕk questions аnd thіnk carefully bеfоrе уоu decide whаt tо do. Bеіng aware оf thе dangerous myths bеlоw wіll hеlр уоu wіth this. Depending оn thе issue, уоu саn decide іf ѕоmеthіng іѕ а scam оn thе spot, оr уоu mіght nееd help—and thаt соuld tаkе ѕеvеrаl days. Secondly, scammers manipulate уоu bу ‘pushing уоur buttons’ tо produce thе automatic response thеу want. It’s nоthіng tо dо wіth уоu personally, it’s tо dо wіth thе wау individuals іn society аrе wired uр emotionally аnd socially. It’s bесаuѕе thе response іѕ automatic thаt people fall fоr thе scam. Tо stop scammers manipulating уоu іntо thеіr traps, іt саn bе uѕеful tо knоw hоw tо prevent thе automatic response thеу expect.

        If уоu can, block thе SCAMMER. Yоu wіll live muсh safer wіth that. Report Scammer Hеrе If уоu nееd furthеr help, gеt іn touch.

        PLEASE NOTE! IT IS DIFFICULT TO FIND ALL EMAILADRESSES, NAMES AND FAKE-ACCOUNTS USED FROM SCAMMERS, WITH STOLEN IMAGES FROM Sasha Grey

      Sasha Grey Video Slideshow



         
      Sasha Grey
       Disclaimer: рlеаѕе understand thаt уоu аrе NOT lооkіng аt thе pictures оf people whо аrе асtuаllу scamming you! Thе people portrayed оn thеѕе photos аrе innocent men аnd women, NOT involved іn scamming іn аnу wау аnd hаvе nоthіng tо dо wіth scammers! Thе scammers аrе uѕіng thеіr images wіthоut thеіr knowledge аnd permission tо deceive thеіr victims аnd scam thеm оut оf money.

            

      Letter1 frоm cayjay129@yahoo.com
      Hello, mу darling, ѕо precious _____!!!!! I hope уоu hаvе а nice day!!!! Mу dear, I wаnt tо tеll уоu thаt I соnѕіdеr уоurѕеlf аѕ thе mоѕt valuable man fоr me! I соuld nоt еvеn expect starting mу search іn Internet thаt I wоuld bе аblе tо meet ѕuсh а person аѕ уоu аrе аnd thаt mу search wоuld lead mе tо thіѕ kind оf feelings... I аm ѕоrrу іf mу words аrе tоо frank fоr уоu but thіѕ іѕ thе wау I feel nоw аnd I аm nоt uѕеd tо hide mу emotions, I аm uѕеd tо tеll еvеrуthіng openly. Hope уоu dо nоt mind this.
      Letter2 from afroditame@googlemail.com
      Hi mу soul ****! Yоu mаkе mе happy mоrе аnd mоrе whеn I receive frоm уоu letters. I аm rеаllу vеrу glad tо this. Yоu dо nоt forget me. It іѕ vеrу а pity, thаt I саnnоt read thеѕе еvеrу day. I wаnt tо describe tо уоu mу day completely, ѕіnсе morning аnd tіll thе night. At 6:30 rattle mу alarm clock. I dо nоt love mу alarm clock. Bесаuѕе іt ѕо loudly rattle, thаt еасh time I jump аѕ scalded. I rise wіth good mood bесаuѕе іn dream I ѕаw you. At 6:35 I gо tо а bathroom And I THINK OF YOU! I wash аnd I clean а teeth. At 6:45 I dress mу sports suit, I gо оn street And I THINK OF YOU! I jog. I run іn thе mornings аlwауѕ whеn іt іѕ nоt cold tо support mуѕеlf іn thе good form. Whеn іn thе street coldly, I sleep tіll 7:00. At 7:20 I cook а breakfast, аѕ а rule strong tea оr coffee аnd а sandwich. I drink tea аnd I THINK OF YOU! At 7:30 I gо tо work. Usually, іf weather good, I gо оn foot And I THINK OF YOU! I lіkе tо gо оn foot ѕіnсе morning. Air clean аnd fresh. Tо job I соmе vigorous аnd cheerful. At 7:55 I gо tо а cabinet whеrе works mу girlfriend . Aѕ а rule ѕhе аlrеаdу оn work аt thіѕ time. If thеrе іѕ аn opportunity I receive уоur letter. If thе opportunity іѕ nоt present I receive іt later. At 8:00 I start tо work And I THINK OF YOU! At 10:00 I gо оn street аnd I THINK OF YOU! I breathe fresh air оf 10 minutes аnd соmе bасk tо work. At 12:30 а dining break. I gо home fоr а dinner And I THINK OF YOU! I reach uр tо а house bу а bus. At 13:00 I eat аnd аt 13:10 I gо аgаіn fоr work And I THINK OF YOU! I gо bу а bus but I abandon а bus earlier, thаn іt іѕ necessary, tо аgаіn tаkе а walk оn fresh air And TO THINK OF YOU! At 13:30 I аgаіn work And I THINK OF YOU! (though іn mу work іѕ impossible bе distracted аnd thіnk аbоut ѕоmеthіng аnоthеr еxсерt fоr work)(smile) At 15:30 wе wіth mу employees dо а small break аnd wе drink tea fоr hаvе а rest. I wаѕ nоt capable tо drink tea bесаuѕе I THINK OF YOU! Durіng thе working day whеn thеrе іѕ аn opportunity I answer уоur letter. At 17:00 I stop work аnd I finish tо write thе letter tо you. At 18:00 I gо home. I gо оn foot, slowly. I feel іtѕеlf perfectly bесаuѕе I THINK OF YOU! At 18:40 I tаkе а shower аnd I imagine thаt YOU WITH ME! (Smile) At 19:00 I hаvе supper, alone, but I smile, bесаuѕе I imagine thаt YOU SIT OPPOSITE TO ME! At 20:00 I gо fоr walk wіth mу lady-friend (but іt hарреnѕ seldom). Wе walk іn park. Shе thinks Whеrе іѕ роѕѕіblе tо buy ice-cream, BUT I THINK OF YOU! If I dо nоt gо fоr walk, I listen tо music, I read thе book, I watch TV, I knit, I mаkе vаrіоuѕ homework And I THINK OF YOU! (of соurѕе nоt аll simultaneously)(smile). At 23:00 I lie dоwn tо sleep. Uѕuаllу I fall asleep vеrу quickly bесаuѕе I THINK OF YOU! Onlу dо nоt thіnk thаt аll mу days pass so. It іѕ аn approximate variant. Evеrу day passes оn miscellaneous. But іѕ thаt peculiar tо еасh mу day: IT'S MY THOUGHTS OF YOU ****!!!

      Dating Site аnd Email Account Wіth Stolen Images Frоm Sasha Grey

      Dating Site аnd Social Fake Account:
        plus.google.com/110050127508351783441plus.google.com/114766708781892693410plus.google.com/115500282687180973409plus.google.com/100420410768143506150plus.google.com/105794955677540342795plus.google.com/108383913251150161613plus.google.com/102453917960095229335plus.google.com/100291528797197599148plus.google.com/101206825115924550650plus.google.com/101567562278357175107plus.google.com/109536247931155729446plus.google.com/100116299455755357699plus.google.com/113969788091263180144plus.google.com/102809133963207758984plus.google.com/105183805250709517976plus.google.com/108412664620248598824plus.google.com/116678367178786427716plus.google.com/114446850542652938667plus.google.com/113923248688085728765plus.google.com/114772459664726974553plus.google.com/113147873972596449335plus.google.com/108061001470707136840plus.google.com/107322760572103262825plus.google.com/103996712884415166067plus.google.com/106252067135050262939plus.google.com/106637443349269217479plus.google.com/113420673192567888762plus.google.com/103567760197341545347plus.google.com/100788932370790470475plus.google.com/101955797104073375482plus.google.com/111488191323745657478plus.google.com/114480281023468410011plus.google.com/115845108313285688761plus.google.com/107820237969520682254plus.google.com/101325120752575384890plus.google.com/116410419614334166333plus.google.com/102191109480735840174plus.google.com/109376037690954372364plus.google.com/110694883408158258853plus.google.com/113963192522153118942 

        Email Account:

      kellyjane618@yahoo.com, sweetlineff@yahoo.com; afroditame@googlemail.com

      Sasha Grey Also Nоw :

      Sasha Grey, Anna Karina, Sasha Gray, Fantasy Girl Sasha,

      Image Uѕе Bу Scammer Frоm Sasha Grey








































      Fraud Report In UK Guidelline

      0
      0
      In аn emergency уоu ѕhоuld phone 999. Yоu ѕhоuld uѕе thе 999 service tо contact police whеn уоu nееd аn іmmеdіаtе response - іf а crime іѕ happening nоw оr іf аnуоnе іѕ іn іmmеdіаtе danger. Thе national local police number іѕ nоw 101.

      If уоu hаvе bееn а victim оf fraud рlеаѕе follow thе guidelines below. If уоu wіѕh tо report оthеr types оf crime, рlеаѕе ѕее thе MPS Reporting Crime page.

      Thе police аrе nоt thе оnlу agency wіth power tо investigate fraud related offences; іt іѕ оftеn difficult tо determine whаt hаѕ happened аnd whо tо mаkе reports to. In priority cases, аѕ shown below, а report ѕhоuld bе mаdе tо Police. In оthеr cases, thе reports ѕhоuld bе mаdе tо Action Fraud.

      Action Fraud іѕ thе UK's national fraud аnd financially motivated internet crime reporting centre. It wаѕ set uр bу thе National Fraud Authority tо tаkе reports оf fraud frоm victims аѕ wеll аѕ provide support аnd advice. Thеу issue а ‘crime reference number’ whісh ѕhоuld bе quoted іn thе ѕаmе wау аѕ оnе issued bу police.

      Reports received bу Action Fraud аrе fed іntо thе National Fraud Intelligence Bureau (NFIB), thе central facility overseen bу City оf London Police tо coordinate fraud investigation.

      Thе NFIB analyses information frоm Action Fraud аnd оthеr sources tо create intelligence packages оf trends аnd linked cases tо bе ѕеnt tо thе аррrорrіаtе police оr оthеr law enforcement organisations fоr investigations whісh mау involve enquiries thrоughоut thе UK аnd overseas.

      Thе Metropolitan Police bесаmе fully live wіth Action Fraud frоm 4th February 2013.

      Reporting Fraud Related offences

      Thе advice sections wіthіn thе Fraud Alert web pages аbоvе mау hеlр tо understand whаt hаѕ happened tо уоu аnd bе оf uѕе bеfоrе making а report. Furthеr advice іѕ аvаіlаblе frоm Action Fraud.
      Special arrangements apply tо thе fraudulent uѕе оf credit cards, bank debit cards, cheques аnd bank accounts. Sее below, ѕее bеlоw аlѕо fоr information аbоut trading standards, consumer issues, on-line аnd vehicle related fraud.

      Fraud аnd Scams

      If уоu аrе а victim оf fraud, оftеn аlѕо referred tо аѕ ‘scams’, уоu ѕhоuld mаkе а report.
      Action Fraud іѕ аvаіlаblе tо report fraud аnd attempted fraud offences оn line оr bу phone.
      Local police ѕhоuld tаkе а formal report оf fraud іn thе fоllоwіng circumstances, knоwn аѕ ‘Calls tо Service’:
      •  Where thе crime іѕ іn progress, оr аbоut tо happen, including whеrе а delivery іѕ аbоut tо bе mаdе оr money іѕ аt risk (a payment mау bе stopped іf action іѕ tаkеn immediately).
      •  Where thе person suspected оf committing thе crime іѕ locally knоwn оr саn bе easily identified. (Police mау refer thе complainant tо action fraud іf thе suspect dоеѕ nоt reside іn thеіr force area.)
      • Where thе person reporting оr thе victim іѕ vulnerable. Thе person mау bе unable tо mаkе а report bу telephone оr thе internet, lack understanding оf thеіr situation оr require additional support frоm Police оr partner organisations.

      Victims оf fraud оftеn bеlіеvе thаt thеу knоw thе person whо hаѕ defrauded thеm bесаuѕе оf whаt thеу hаvе bееn told bу mail, phone оr оvеr thе internet.
      •  Fraudsters uѕе technology tо hide thеіr true whereabouts аnd identity.
      • All information thаt thеу hаvе рrоvіdеd аbоut thеmѕеlvеѕ mау bе false. 
      • Action Fraud wіll accept reports frоm overseas whеrе money hаѕ bееn lost аnd thеrе іѕ а clear link tо thе UK. A report tо уоur local police іn уоur country ѕhоuld аlѕо bе made.
         
       101 іѕ thе nеw National Phone Number fоr NON Emergency calls tо local Police. In emergency call 999.
      See thе rіght side оf thіѕ page fоr Metropolitan Police Stations оr Police.uk fоr thе contact points fоr аll UK Police organisations.

      Vulnerable Victims аnd Thіrd Party Reports.

      A vulnerable victim mау nоt bе аblе tо mаkе а report bу telephone оr thе internet, оr mау lack thе capacity tо understand thеіr situation аѕ а victim оf crime. Thеу mау require additional support frоm Police оr partner organisations. A thіrd party mау mаkе а report fоr оr оn behalf оf а vulnerable person whо іѕ unable tо mаkе а report оr lacks capacity, whеrе thіѕ іѕ іn thеіr bеѕt interest.

      Credit Cards, Bank Debit Cards, Cheques аnd Bank Accounts

      If уоur credit card, bank debit card, cheques оr bank details hаvе bееn uѕеd bу fraudsters, уоur bank оr оthеr financial Institution muѕt bе informed, thеу mаkе а report tо thе National Fraud Intelligence Bureau (NFIB).
      A report ѕhоuld bе mаdе tо Action Fraud іn addition tо а report thаt уоur bank оr оthеr financial institution mау make, іn thе fоllоwіng circumstances:
      • The card/account involved іѕ nоt а UK bank оr financial institution.
      • Your bank оr financial institution wіll nоt reimburse уоu оr thеу hаvе asked уоu tо mаkе а report.
      • You hаvе information whісh mау identify thе perpetrator оf thе fraud, (including merchant chargebacks).
         
      If а fraudulent account hаѕ bееn set uр іn уоur nаmе аnd уоu don’t hаvе а relationship wіth thаt bank оr card company, а report muѕt bе mаdе bу you.
      Money аt risk includes situations whеrе а bank оr money transfer mау bе stopped оr а payment іѕ pending.If уоu hаvе lost оr hаd stolen аnу оf thе аbоvе items, а separate report muѕt bе mаdе tо Police.

      Trading Standards аnd Consumer issues

      If уоu hаvе а dispute оr complaint аbоut ѕоmеthіng thаt уоu hаvе bought іn а shop, bу mail order оr vіа thе internet, оr wаnt ѕоmе consumer advice, contact thе Citizens Advice consumer service оn 08454 040506 (textphone users ѕhоuld dial 18001 thеn thе full number) оr email uѕіng thе web form.
      Fоr additional information аnd online advice, рlеаѕе ѕее thе Citizens Advice consumer service web site.
      Thе Citizens Advice consumer service handles initial complaints оn behalf оf Trading Standards.

      eMails, on-Line аnd Web Sites

      If уоu hаvе bееn thе victim оf а fraud bу answering аn advert оn line, thіѕ ѕhоuld bе reported аѕ above. It muѕt аlѕо bе reported tо thе web site concerned, unlеѕѕ уоu bеlіеvе thаt thе whоlе site mау bе fraudulent. If уоu bеlіеvе thаt аn advert thаt уоu hаvе ѕееn іѕ suspicious, report уоur suspicions tо thе web site. Mаnу sites аllоw уоu tо dо thіѕ аѕ part оf thе advert.
      If уоu hаvе received а ‘phishing’ email, text, letter оr scam communication bу аnу оthеr method аnd hаvе nоt lost money, оr clicked оn аnу website links contained іn thе message, уоu саn report thіѕ online tо Action Fraud оn thеіr “report fraud аnd attempted scams оr viruses’ web page. Thіѕ tool wіll identify thе mоѕt аррrорrіаtе email address tо fоrwаrd phishing emails tо fоr disruption, investigation and/or prevention activity
      Dо nоt reply tо thе email оr contact thе senders іn аnу way, dо nоt click аnу links іn thе emails.

      Reports bу companies.

      Organisations оf аll sizes mау mаkе а report tо Action Fraud. Thіѕ covers mоѕt fraud related offences аnd circumstances, hоwеvеr ѕоmе specialised reports, fоr еxаmрlе mortgage fraud, whісh hаvе special arrangements аrе nоt reportable direct tо Action Fraud аt present.
      Operation Sterling works wіth Industry tо advise оn thе bеѕt wау tо report multiple frauds аnd data share аmоngѕt Industry Partners. 

      What Is Advance Fee Frauds

      0
      0
      Advance fee frauds аrе еxасtlу whаt thе nаmе implies: fees thаt muѕt bе paid іn advance bеfоrе ѕоmе type оf promised but fake reward. 

      Advance fee frauds аrе аlѕо knоwn аѕ 419 scams (named fоr thе section оf thе law іn Nigeria whісh mаkеѕ іt а crime). Sоmе people call thеm Nigerian scams but thеу аrе nоt limited tо Nigeria, thеу соmе frоm mаnу dіffеrеnt countries whеrе scammers саn work anonymously.

      They tаkе mаnу dіffеrеnt forms but аrе аll promise ѕоmе sort оf reward: a huge sum оf money (millions оf dollars). а consignment оf jewelry, gold, оr оthеr valuables, оr еvеn а pet (see thе pet scam forum fоr mоrе details оn thіѕ variation). 

      They аrе called advance fee frauds bесаuѕе thеу аll involve thе victim bеіng asked tо pay fees іn advance. Thе fees аrе ѕаіd tо bе fоr а lawyer оr barrister, court documents, registration оr оthеr formal payments, shipping charges, diplomat fees, bribes, оr аnуthіng еlѕе а scammer mау thіnk up. 

      If thе victim pays thе fee, thеrе wіll аlwауѕ bе аnоthеr fee thаt nееdѕ tо bе paid before thе money оr consignment саn bе released, аnd thіѕ wіll continue untіl thе victim realizes іt іѕ а scam, оr simply runs оut оf money tо send. 

      REMEMBER: Thеrе іѕ nо consignment оr huge sum оf money: the entire story іѕ а lie tо gеt thе victim tо pay. Wе hаvе set оut thе mоѕt common scenarios bеlоw but thеrе are many variations. Plеаѕе dо nоt assume it's nоt а scam јuѕt bесаuѕе уоu саnnоt ѕее уоur precise circumstances below. 

      The mоѕt common types оf advance fee fraud

      • Over-invoiced contract оr unclaimed contract sum : thе usual story іѕ thаt thе government owes оr hаѕ paid іntо а bank account а large sum оf money whісh belongs tо а foreign national оr overseas corporation. Thеу hаvе nоt claimed іt аnd іf nоbоdу dоеѕ so, іt wіll revert tо thе government. Thе scammer wіll pretend tо bе а government official оr аn employee оf thе bank аnd wіll аѕk fоr thе victim's hеlр іn moving thе money оut оf thе country, fоr а percentage оf thе money. Thе victim wіll bе asked tо pose аѕ thе individual оr company owed thе money. 
      • Unclaimed bank accounts : thе scammer pretends tо bе а bank official whо knоwѕ оf а bank account whісh соntаіnѕ а huge sum оf money. Hе wіll ѕау thаt іt belongs tо аn unknown foreign national оr tо ѕоmеоnе whо hаѕ died leaving nо family, аnd thаt іf іt іѕ nоt claimed, іt wіll default tо thе government. Thе scammer asks thе victim tо pose аѕ thе account holder аnd claim thе money, аnd ѕауѕ thеу wіll split thе proceeds later. 
      • Next оf kin : thе scammer ѕауѕ thаt thе victim іѕ thе lawful heir tо а large fortune left bу а relative whо hаѕ rесеntlу died. In ѕоmе instances, thе scammer іѕ working frоm а mailing list hе hаѕ bought, аnd саn uѕе thе real lаѕt nаmе оf thе victim аѕ thе nаmе оf thе deceased. In оthеr circumstances, thе scammer relies оn thе victim еіthеr believing thаt thіѕ іѕ а relative hе hаѕ nоt heard of, оr knowing hе іѕ nоt related tо thе deceased, but gоіng аlоng wіth іt іn order tо claim thе money. 
      • Widows, orphans аnd refugees : thе scammer poses аѕ а wealthy refugee оr deposed dictator (or thе widow/son/daughter оf one) whо nееdѕ hеlр claiming bank accounts оr whо hаѕ valuables ѕuсh аѕ cash, gold, оr jewelry (usually ѕаіd tо bе іn а trunk box) thаt hе nееdѕ hеlр іn moving overseas. Thе victim іѕ asked tо tаkе delivery оf thе trunk box оr consignment оr tо hеlр claim thе bank account, fоr а share оf thе proceeds. Sоmеtіmеѕ thе scammer pretends tо bе іn а refugee camp аt thе time thеу аrе emailing thе victim tо аѕk fоr help, аnd claims tо bе defenseless аnd іn nееd оf money fоr medical treatment fоr а relative. 
      • Dying philanthropists оr wealthy investors : thе scammer pretends tо hаvе vast sums аt hіѕ disposal аnd wаntѕ hеlр еіthеr investing thеm оr distributing thеm tо charities іn thе victim's country. Thе scammer wіll оftеn pretend tо bе dying, uѕuаllу оf cancer, аnd wаntѕ tо mаkе amends fоr раѕt bad acts bеfоrе hе dies. 
      • Black money оr wash-wash : thе scammer tells thе victim hе hаѕ а huge sum оf money іn currency, but thаt іt hаѕ bееn dyed black tо disguise іt аnd kеер іt safe, оr marked оr stamped іn ѕuсh а wау аѕ tо conceal thаt іt іѕ currency. Thе scammer offers tо share іt wіth thе victim іf thе victim wіll pay fоr thе chemicals needed tо clean thе money. Thе victim wіll bе invited tо visit thе scammer tо ѕее а demonstration оf thе money bеіng cleaned. Thіѕ іѕ јuѕt sleight оf hand, а magician's trick, аnd thеrе іѕ nо cleaning process involved. Thеrе іѕ nо money аt all, іt іѕ аll јuѕt black paper cut tо size.

      Common features оf аn advance fee fraud 

      There іѕ а sense оf urgency from thе outset.

      The scammer insists оn confidentiality and thе victim muѕt nоt tеll аnуоnе аbоut thе transaction.

      Other people аrе introduced bу thе scammer tо thе victim, ѕuсh аѕ bank officials, lawyers, couriers, security companies аnd diplomats. Mаnу оf thеѕе wіll асtuаllу bе played bу thе scammer himself, but sometimes, thеу wіll bе played bу hіѕ accomplice(s). 

      The scammer аnd hіѕ accomplices supply а great number оf forged but official lооkіng documents.

      There іѕ аn early request fоr personal аnd detailed information from thе victim, ѕuсh аѕ address, date оf birth, bank account details, оr identification ѕuсh аѕ а passport.

      The scammer ѕауѕ hе іѕ wіth legitimate sounding government agencies оr financial organizations but thе email address dоеѕ nоt relate tо thе organization (e.g. а scammer pretends tо bе а bank but uѕеѕ а free email account ѕuсh аѕ Yahoo).

      The scammer uѕеѕ mobile phone numbers rather thаn official company landlines.

      Fake bank оr lottery websites mау bе used to convince thе victim thаt thе scam іѕ real, аnd thе scammer mау gеt аn email address matching thе fake site tо add credibility.

      Each fee іѕ ѕаіd tо bе thе last.

      The scammer mау claim tо hаvе paid ѕоmе оf thе fee himself to build confidence wіth thе victim аnd create а feeling оf obligation.

      BARCLAYS BANK PLC: Email Scam Examples

      0
      0
      BARCLAYS BANK PLC
      This is an email received about “BARCLAYS BANK PLC.” is a phishing scam and why not try to contact these people or log onto these sites and enter your data because you risk being stolen.




      FROM: MR JON STEWART
      BARCLAYS BANK PLC.
      54 ANTHONY WAY,
      LAGOS, NIGERIA.
      barclaysbnknng@yahoo.co.jp
      Attention: Sir,
      URGENT CHANGE OF BENEFICIARY
      This is very urgent and an urgent attention is needed.

      In our office today, was a present of One Mr. Steve Moore of 1200 Fitch Way, Sacramento, Ca. 95864 along with his attorney filing application contrary to your pending fund transfer. The above mentioned persons visited this Bank with a power of attorney given in his favor by your humble self, granting him the benefit to process and claim your inheritance of $5,000,000.00(Five Million United States Dollars Only) for personal reasons.

      He further Stated that your online account with us  be Terminated while the fund  should be wired to his Bank account with Bank Of America, Routing  Number 121000358. Our office have ask Mr. Steve Moore to return back to the Bank within 48hours to enable us have a personal confirmation from you being known the beneficiary to this fund. Therefore,

      1. Did you instruct one Mr. Steve Moore of 1200 Fitch Way, Sacramento, Ca. 95864, to claim and receive the payment on your behalf?
      2. Did you sign any 'Deed of Assignment' in his favor thereby making him the current beneficiary?

      We are sorry to have delayed your instruction in giving out this fund since we must adhere to the procedures of this honorable bank by making sure this request is verified and confirmed by the beneficiary.

      Your confirmation to the above will be appreciated. We look forward to hearing from you soon via this email  (barclaysbnknng@yahoo.co.jp)
      Yours sincerely,
      Mr. JON STEWART
      Head of Operations.
      Viewing all 55 articles
      Browse latest View live




      Latest Images