Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

How Fraudsters Operate
How Fraudsters Operate
How Fraudsters Operate
Ebook132 pages51 minutes

How Fraudsters Operate

Rating: 4 out of 5 stars

4/5

()

Read preview

About this ebook

Some of the topics include ATM Skimming Scams, Auction Fraud, Foreclosure Fraud, Employment Schemes, and Ponzi Schemes.

Fraudsters and hackers constantly change their techniques and tactics keeping individuals, corporations and law enforcement on the defense trying to stay ahead of them.

They may also use methods to gain your trust, appear as credible and claim to be employed by a legitimate business but in actuality they are using a phony website, phone number and business cards in an effort to prove the business is real.

It is extremely easy to setup a phony website, unregistered cell phone with any area code, and automatic dialing services.

LanguageEnglish
PublisherMary Eckholdt
Release dateDec 29, 2014
ISBN9781311313195
How Fraudsters Operate
Author

Mary Eckholdt

Mary has accumulated over 30 years of experience in the mortgage industry, gaining a vast amount of knowledge and expertise in both front-end mortgage operations and back-end servicing procedures.With a specific focus on fraud investigation, quality control, compliance, and underwriting, she has spent over 10 years in mortgage operations.Additionally, Mary has written and developed training manuals, fraud prevention guidelines, compliance guidelines, and underwriting procedures.

Related to How Fraudsters Operate

Related ebooks

Personal & Practical Guides For You

View More

Related articles

Reviews for How Fraudsters Operate

Rating: 4 out of 5 stars
4/5

4 ratings1 review

What did you think?

Tap to rate

Review must be at least 10 words

  • Rating: 5 out of 5 stars
    5/5
    Hello guys
    I want to thank techspypro @gmail com
    For helping me remove negative stories that was posted about me online, I had a friend who wanted to tarnish my image by posting all sorts of rumors about me out of jealousy. techspypro @gmail com took all the links and photos down and I also got access to his phone without any notification and deleted all contents. I am grateful

Book preview

How Fraudsters Operate - Mary Eckholdt

How Fraudsters Operate

Fraud Series – Book I

By Mary Eckholdt

Smashwords Edition, License Notes

Copyright 2014 Mary Eckholdt

This e-book is licensed for your personal enjoyment only. This e-book may not be re-sold or given away to other people. If you would like to share this book with another person, please purchase an additional copy for each recipient. If you are reading this book and did not purchase it, or it was not purchased for your use only, please return to your favorite e-book retailer and purchase your own copy. Thank you for respecting the hard work of this author.

Table of Contents

Introduction

Chapter 1 Fraud Beginning with letters A-B

Adoption Fraud

Advance Fee Scheme

Art Student Swindle

ATM Skimming Scam

Auction (Internet Fraud)

Badger Game

Bait-and-Switch

Boiler Room (Business)

Broker Embezzlement

Chapter 2 Fraud Beginning with letters C-D

Charity Fraud

Click Fraud

Commodities Fraud

Computer Crimes

Corporate Fraud

Counterfeit Cashier’s Check

Cramming Fraud

Cyber Photo Sharing

Cyber Takeover of Corporate Accounts

Debt Elimination

Diploma Mill

Chapter 3 Fraud Beginning with letters E-F

Employment/Business Opportunity

Escrow Services Fraud

Fine Print

Firewall

Foreclosure Schemes

Foreign Exchange Fraud

Fortune Telling Scams

Funeral Prepaid Scams

Chapter 4 Fraud Beginning with letters G-K

Get-Rich-Quick

Grandparents Scam

Health Products Fraud

Health Care Billing and Services Fraud

Hedge Fund Fraud

Home Improvement

Identity Theft

Insurance Fraud

Internet Extortion (Corporate)

Internet Pharmacy Fraud

Internet Vigilantism

Chapter 5 Fraud Beginning with letters L-O

Late-Day Trading

Long Firm (consumer credit fraud)

Lottery Scams

Lottery or Sweepstakes Scams – Foreign

Malware

Malware Installed on Laptop via Public Internet

Mass Marketing Fraud

Money Laundering

Mortgage Fraud Schemes

Nigerian Letter - 419 Scam

Online Penny Auction

Online Sales

Chapter 6 Fraud Beginning with Letter P

Pay Up or Be Arrested

Pet Scams

Phishing

Ponzi-Scheme (High Yield Investment Fraud)

Prime Bank Note Fraud ((High Yield Investment Fraud)

Pump n Dump (Market Manipulation)

Pyramid Scheme

Chapter 7 Fraud Beginning with Letter R

Recovery Room

Redemption/Straw-man Bond Fraud

Reloading

Rental and Real Estate Scams

Requests for Help

Romance Scams

Chapter 8 Fraud Beginning with Letter S

Scareware

Senior Citizen Fraud

Sick Baby Hoax

Smart Phones

Staged Auto Accident

Stock Option Backdating Scam

Surrogacy Scam

Chapter 9 Fraud Beginning with letters T-W

Tech Support Scams

Telemarketing Scams

Telephone Collection Scam

Telephone Denial-of-Service (TDoS attack)

Trojan-Horse (Business)

Unclaimed Property Scam

Wedding Planner Scam

Work-at-Home Employment Schemes

Chapter 10 Reporting Fraud

Reporting complaints to Federal Trade Commission (FTC)

Reporting to FBI

About Mary Eckholdt

Other Titles by Mary Eckholdt

Introduction

Fraudsters, scammers, hackers are out there and all we can do is protect ourselves with proactive methods. With this book and the entire fraud series it is my hope that at least one person and of course the more the better will benefit and not be scammed or become a victim of identity theft.

Fraudsters and hackers constantly change their techniques and tactics keeping individuals, corporations and law enforcement on the defense trying to stay ahead of them.

By acquiring, a better understanding how the fraudsters and hackers operate this may help protect against the latest schemes.

Scammers attempt to build a relationship with an individual so you will not question their motivations. They often use social media to learn as much as possible about their prey’s personal and professional life. For example, they may learn that you are single, like to travel, have two children, etc., and then use that information for a sales pitch or to con you out of money.

They may also use methods to gain your trust, appear as credible and claim to be employed by a legitimate business but in actuality they are using a phony website, phone number and business cards in an effort to prove the business

Enjoying the preview?
Page 1 of 1