Term 
        
        | Name a few types of common Internet Scams. |  
          | 
        
        
        Definition 
        
        Grandchild trapped in foreign country 
Mystery shopper 
Hitman 
Overpayment 
EBay 
Craig's list  |  
          | 
        
        
         | 
        
        
        Term 
        
        | Name a few type of common lottery scams. |  
          | 
        
        
        Definition 
        
        Canadian 
Nigerian 
El Gordo (Spanish) 
Great Britain 
  
US Sweepstakes  |  
          | 
        
        
         | 
        
        
        Term 
        
        | What does the "419 Lottery Scam" refer to? |  
          | 
        
        
        Definition 
        
        Nigerian lottery scam 
  
419 = Nigerian Criminal Code  |  
          | 
        
        
         | 
        
        
        Term 
        
        | T/F Some scams operate by telling the victim they won a prize/lottery and need to pay a small processing fee to acquire the winnings. |  
          | 
        
        
        Definition 
        
        True 
  
Another common scam is asking the victim to write a check to cover the fees or transfer of funds when there was no "prize"  |  
          | 
        
        
         | 
        
        
        Term 
        
        | T/F Lottery scams that ask for a check to cover fees are successful (according to the slides) because it often takes over 21 days for a check to clear. By the time the victim realizes the issue it's already too late. |  
          | 
        
        
        Definition 
         | 
        
        
         | 
        
        
        Term 
        
        Identity theft is when: 
  
a) a fake name is used to purchase goods and defraud a company 
b) a real person's name and personal info are used without their knowledge for a criminal purpose 
c) a real person's name is used to defraud a companyu 
d) a fake name is used for criminal purposes  |  
          | 
        
        
        Definition 
        
        | a real person's name and personal info are used without their knowledge for a criminal purpose |  
          | 
        
        
         | 
        
        
        Term 
        
        Identity theft is usually first noticed when: 
  
a) the bank sends the victim a letter about their account 
b) credit card applications appear in the mail on a more frequent basis than before 
c) credit is denied or foreclosure is initiated 
d) it's rarely noticed which is why it's so successful   |  
          | 
        
        
        Definition 
        
        | credit is denied or foreclosure is initiated |  
          | 
        
        
         | 
        
        
        Term 
        
        | At least seven reasons were listed for Identity Theft during the class presentation.  Name four of the reasons someone would steal another person's identity. |  
          | 
        
        
        Definition 
        
        Take over financial accounts 
Open new bank accounts 
Apply for loans 
Apply for credit cards then max them out and dump the accounts 
Apply for health/welfare benefits 
Establish utility services 
Rent apartments  |  
          | 
        
        
         | 
        
        
        Term 
        
        | Several 'Points of Compromise' were listed during our class presentation.  A 'Point of Compromise' is an avenue used by a criminal to obtain personal information from someone else without their knowledge.  Name a few 'Points of Compromise'. |  
          | 
        
        
        Definition 
        
        The criminal is employed in a position that allows them access to other employee's personal information 
  
The criminal finds employees that are in a position with access to personal info and they recruit them with money/drugs/promises; the employee gives the criminal the info requested 
  
Pretext calling (false representation) and asking the victim directly for their info 
  
Dumpster Diving 
  
Hacking into company servers (electronic stealing) 
  
Reading public records 
  
Theft / Burglary (purses, cars, houses) 
  
US Mail Theft  |  
          | 
        
        
         | 
        
        
        Term 
        
        What does 'Phishing' mean? 
  
a) a computer crime that taps into phone lines 
b) use of a spoofed email or fake website to deceive users 
c) a network of computers used in a denial-of-service attack 
d) using computer viruses to steal information from a network computer  |  
          | 
        
        
        Definition 
        
        | Phishing is the use of a spoofed email or website to deceive internet users into disclosing their financial and personal info for criminal purposes, such as ID theft and fraud |  
          | 
        
        
         | 
        
        
        Term 
        
        Related to 'phishing' scams, what does 'Dragnet' refer to: 
  
a) spam to wide distribution 
b) intentionally trying to catch a particular group 
c) putting out traps and seeing what you catch 
d) targeting big corporations into releasing info on clients, patients, sources  |  
          | 
        
        
        Definition 
        
        | spam to wide distribution |  
          | 
        
        
         | 
        
        
        Term 
        
        Related to 'phishing' scams, what does 'Guided' refer to: 
  
a) spam to wide distribution 
b) intentionally trying to catch a particular group 
c) putting out traps and seeing what you catch 
d) targeting big corporations into releasing info on clients, patients, sources  |  
          | 
        
        
        Definition 
        
        | intentionally trying to catch a particular group |  
          | 
        
        
         | 
        
        
        Term 
        
        Related to 'phishing' scams, what does 'Whaler' refer to: 
  
a) spam to wide distribution 
b) intentionally trying to catch a particular group 
c) putting out traps and seeing what you catch 
d) targeting big corporations into releasing info on clients, patients, sources  |  
          | 
        
        
        Definition 
        
        | targeting big corporations into releasing info on clients, patients, sources |  
          | 
        
        
         | 
        
        
        Term 
        
        Related to 'phishing' scams, what does 'Lobster Pot' refer to: 
  
a) spam to wide distribution 
b) intentionally trying to catch a particular group 
c) putting out traps and seeing what you catch 
d) targeting big corporations into releasing info on clients, patients, sources  |  
          | 
        
        
        Definition 
        
        | putting out traps and seeing what you catch |  
          | 
        
        
         | 
        
        
        Term 
        
        According to the class presentation, what type of ID theft accounts for half of the incidents? 
  
a) credit cards 
b) medical 
c) fake IDs 
d) fraudulent checks  |  
          | 
        
        
        Definition 
        
        | Medical ID Theft accounts for half of the incidents |  
          | 
        
        
         | 
        
        
        Term 
        
        When did identity theft become a crime (Class 4 Felony, up to six years in prison)? 
  
a) 1996 
b) 1984 
c) 2000 
d) 2006  |  
          | 
        
        
        Definition 
        
        | In 2006 House Bill 1326 passed making identity theft a crime. |  
          | 
        
        
         | 
        
        
        Term 
        
        | T/F In 2005 a senate bill was passed allowing customers to freeze their credit accounts as part of a protective measure against identity theft. |  
          | 
        
        
        Definition 
        
        True 
  
senate bill 05-137 was passed in 2005 (Credit Freeze Protection).  There is NO FEE for the 1st freeze but a $10 fee for a second freeze.  It costs $10 to lift the freeze.  There's also a special temporary lift for one creditor that costs $12.   |  
          | 
        
        
         | 
        
        
        Term 
        
        Which of the following is not an identity theft warning sign: 
  
a) credit denied 
b) new or renewed credit cards don't arrive 
c) routine financial statements stop arriving 
d) creditors stop calling  |  
          | 
        
        
        Definition 
        
        D) creditors stop calling 
  
In reality there would be an influx of calls from creditors.   |  
          | 
        
        
         | 
        
        
        Term 
        
        Which of the following best describes the actions someone should take if they are a victim of ID Theft: 
  
a) contact the credit bureau fraud dept, the account issuer in question, and the local PD for a report 
b) call the FBI 
c) open a help ticket on www.consumer.gov/IDTheft 
d) Contact the bank and freeze all accounts  |  
          | 
        
        
        Definition 
        
        | contact the credit bureau fraud dept, the account issuer in question, and the local PD for a report |  
          | 
        
        
         | 
        
        
        Term 
        
        | T/F Data breaches and employee theft can be prevented by implementing a robust physical security program including annual ethics training. |  
          | 
        
        
        Definition 
         | 
        
        
         | 
        
        
        Term 
        
        Which of the following most closely matches the elements of the crime of FORGERY: 
  
a) intent to defraud; alters a check 
b) intent to defraud; uses a fake ID 
c) signs spouses signature on a check 
d) with intent to harass writes a check knowing there are insufficient funds in the account  |  
          | 
        
        
        Definition 
        
        a) intent to defraud; alters a check 
  
18-5-102, FORGERY, Class 5 Felony 
  
Intent to defraud 
  
Falsely makes, completes, alters, or utters a written instrument  |  
          | 
        
        
         | 
        
        
        Term 
        
        Which of the following most closely matches the elements of the crime of CRIMINAL POSSESSION OF A FORGED INSTRUMENT: 
  
a) issues a check with insufficient funds 
b) uses an ATM card knowing it was revoked 
c) knowing it's forged, possesses a check, intending to defraud 
d) knowing it's fake, keeps a fake ATM card in their wallet  |  
          | 
        
        
        Definition 
        
        c) knowing it's forged, possesses a check, intending to defraud 
  
18-5-105, Criminal Possession of Forged Instrument, Class 6 Felony 
  
Knowledge its forged 
With intent to defraud 
Possesses forged instrument  |  
          | 
        
        
         | 
        
        
        Term 
        
        Which of the following most closely matches the elements of the crime of CRIMINAL IMPERSONATION 
  
a) pretends to be spouse on phone call with cable company 
b) knowingly gives a fake name to a telemarketer 
c) gives a fake ID to a state trooper 
d) uses stolen credit card to pay for gas  |  
          | 
        
        
        Definition 
        
        c) gives a fake ID to a state trooper 
  
CRIMINAL IMPERSONATION (18-5-113) Class 6 Felony 
  
Knowingly assume a fake identity with intent to gain a benefit OR with intent to injure/defraud  |  
          | 
        
        
         | 
        
        
        Term 
        
        Which of the following most closely matches the elements of the crime of FRAUD BY CHECK 
  
a) accidentally writing a check that bounces 
b) writing a check and post dating it so you have time to add money to the account 
c) issuing a check knowing there's insufficient funds 
d) not balancing your check book and spending more than you have in the account  |  
          | 
        
        
        Definition 
        
        issuing a check knowing there's insufficient funds 
  
WITH INTENT TO DEFRAUD 
  
   |  
          | 
        
        
         |