Telemarketing fraud is fraudulent selling conducted over the telephone. The term is also used for telephone fraud not involving selling.

Telemarketing fraud is one of the most persuasive deceptions identified by the Federal Trade Commission (FTC).[1] Telemarketing fraud often involves some sort of victim compliance whether it involves the victim initiating contact with the perpetrator or voluntarily providing their private information to the offender; thus, fraud victims may experience feelings of shame and embarrassment that may prevent them from reporting their victimization.[2]

Older people are disproportionately targeted by fraudulent telemarketers and make up 80% of victims affected by telemarketing scams alone. Older people may be targeted more because the scammer assumes they may be more trusting, too polite to hang up, or have a nest egg.[3] Many of older people usually have large amount of money to invest and desire of receiving unexpected profit from the investing. Also, they are less likely to report the fraud because they don't believe that consumer complaints would be solved.[4]

Types of fraud

  • Advance fee fraud – They will typically require upfront payments in exchange for goods and services. This is also a popular technique used in lottery and student scholarships scams.[5] Once the target has provided their personal information, the fraudsters will ask them to pay various fees – for example: taxes, legal fees, banking fees, etc. – so that they can release their non-existent winnings.[6]
  • Pyramid schemes – Work by recruiting “members” to invest into a scheme. Most of the money is made by recruiting new members and a prime characteristic of the scam is the product is of little value. The people at the bottom of the pyramid pay the people at the top. Inevitably they will run out of new recruits and the scheme will collapse.[7] Some individuals may profit from pyramid schemes, but the vast majority of those who join later on in the scheme will not.[8]
  • Credit card fraud – Fraudsters will call with promises to repair their credit ratings, provide credit options or credit facilities, credit cards with zero or very low interest, or instant and unlimited loans without credit checks or security. Such offers, if followed up, tend to come at a considerable cost to victims in terms of high interest rates or exorbitant fees. It is common for scammers to target people who have bad credit and are therefore more susceptible to take the offer in hopes to pay off debts or to increase their credit rating.[9]
  • Overpayment fraud – One of the most popular scams making the rounds. A generous overpayment is made to the victim typically using a fake cheque. This can vary in goods but is popular among online auctions or classifieds. But before the cheque has been cleared by a bank and the victim discovers that the cheque has bounced, the scammer will request to have the difference refunded [10] Usually through an online banking transfer, pre-loaded money card, or a wire transfer such as Western Union. Therefore, victims lose the money they send along with the item itself.[11]
  • Charity fraud – Telemarketers claiming to represent charities call asking the target for a donation. Fake charities try to take advantage of people's generosity and compassion for others in need. Scammers will steal the money by posing as a genuine charity; they may try to use recent events, such as natural disasters, to make their phony pleas for donations sound more believable.[12] These scammers use aggressive high pressure techniques made to make the victim feel guilty or selfish if they do not want to donate.
  • Cramming – Small charges that are secretly inserted into customers' credit card bills for services they did not order, buried so deep in credit card bills that many do not notice,[13] usually with fake fees by vague financial services. Sometimes a one-time charge for entertainment services will be crammed onto phone bills. Other times it may be a recurring monthly charge. Cramming of recurring charges falls into two general categories: club memberships, such as psychic clubs, personal clubs, or travel clubs; and telecommunications products or service programs, such as voice mail, paging, and calling cards.[14]
  • Summer jobs fraud – Much like an advance fee fraud, these scams are aimed at teenagers or young adults looking for work over the summer period. Telemarketers seek out the victims by scanning student job searches. The telemarketer will then claim the victim has been singled out and specially selected to be hired for a particular job. Before they can start work, however, they are told that they have to pay various fees to cover training, materials and insurance. When they eventually realize the job is a scam, it is already too late; they have lost the money they paid for in fees as well as the time it would take to find a new job.[15]
  • Office supply scam – A very common scam where a telemarketer will target business managers responsible for purchasing office supplies,[9] falsely representing their identity and the cost of office supplies – the most popular being toner.[16] The caller might mislead a company's employees into thinking that an order for office supplies has already been placed, either by an existing or former colleague, and that they are calling to chase up a signature for the order form to help them keep complete records. The company is then invoiced for unwanted, and overpriced, stationery and office supplies.[17]
  • Magazine subscriptions scam - Scammers call victims with an intriguing offer and that for a small payment they can get a yearly subscription to their favorite magazine, even though they have no affiliation with the magazine's publisher. When victims agree, the scammers will send random magazines with grossly inflated prices. Another way they extract money is by falsely telling callers it is time to renew their magazine subscriptions in an attempt to get their credit or bank account information.[18]
  • Harassing/Stalking

Telemarketing fraud tools

  • Caller I.D. spoofing - Allows the caller to present any number they want to put up on the screen including existing numbers while keeping the real number they call from private. Caller I.D. spoofing is a low cost option to help ensure anonymity.[14] The same devices can also change voices to sound like a male or female.[19]
  • Robocalls - Technology has made it cheap and easy for robocallers to make calls from anywhere in the world.[20] Most of these calls originate overseas, many in boiler rooms in India, and they are surprisingly effective.[21] Robocalls have been used for legitimate campaigning and public opinion polling, but have also been used for voter suppression, false endorsements, and negative campaigning that borders on fraud. The federal regulatory regime currently excludes political robocalls from most telemarketing regulations. Presidential campaigns and national interest groups have accidentally violated state laws in trying to communicate with voters by using robocalls.[22]
  • Crawler devices - A majority of fraudulent calls originate from Nigerian phone scammers, who claim $12.7 billion a year off phone scams.[23] Some callers have to make up to 1000 calls per day. To help with speeding things up, they will sometimes use crawler devices which is computerized to go through every area code calling each number. If the caller does not reach, they mark the lead as "no answer" and the system programs it so they get called again a few days later. If the company does not have a large lead pool, they may get called as soon as 12 hours later. As with email spammers, they know that a certain proportion of their hits will score.[24]
  • False identity – Fraudulent telemarketers use aliases to cover their tracks and prevent detection from the law. Some fraudulent telemarketers are deliberately located in other countries, as it is more difficult for law enforcement agencies to pursue them. Typically, scammers will use common western names in a bid to reassure callers they are calling from the same country.[25]

Scam Identification and blocking software

Scam Likely[26] is a term used for scam call identification, the term was originally coined by T-Mobile for the scam ID technology created by First Orion.[27] First Orion's scam blocking technology uses a combination of known bad actors, AI powered blocking including neighborhood spoofing and unusual calling pattern. Scam Identification is a feature of the T-Mobile and Metro carrier network which can be controlled by the app Scam Shield,[28] customer care or dialing the short code #664 to turn on or off scam blocking.[29]

There are a number of phone apps which try to identify, screen, send to voicemail or otherwise deter telemarketing calls with most major carriers providing some level of free scam call screening."Call Blocking". Federal Trade Commission. Retrieved 2021-08-04. Additionally both iOS [30] and Android[31] operating systems offer scam screening options. In addition phone carriers may provide caller authentication using STIR/SHAKEN a caller authentication protocol designed to stop caller id spoofing by exchanging tokens between cellular carriers.[32]

Grandparent scam

A telephone call is made to an elderly person with a family member who is supposedly in some kind of trouble, usually claiming to be a grandson or granddaughter. These calls are often placed late at night or early in the morning when most people are not thinking as clearly. Callers assume that their targets have grandchildren and will usually have several other people in on the scam, such as a bail bondsman, the arresting police officer, a lawyer, a doctor at a hospital, or some other person.[33] The first voice on the phone is usually by the scammer pretending to be the grandchild sounding upset and typically stating that there are only a few moments to talk. The caller may say that they have a cold if the victim does not recognize their voice. Their story generally follows a familiar line: they were traveling in another country with a friend, and after a car accident or legal infraction, they are in jail and need bail money wired to a Western Union account as soon as possible for their quick release.[34] The caller does not want anyone told about the incident, especially not family. Before the victim can ask too much about the situation the phony child will hand the phone over to the accomplice who will then request money to be transferred to release the grandchild from jail. While this is commonly called the grandparent scam, criminals may also claim to be a family friend, a niece or nephew, or another family member.[33]

Microsoft scam

A telephone call is made saying typically that virus activity has been detected on the victim's computer; the overseas caller then states they are from Microsoft or a Microsoft certified technician. Callers assume that the victim has a computer running a Microsoft Windows operating system (users of other operating systems, such as Linux, are a minority and are likely to be technically knowledgeable). They will get the computer owner to give the caller remote access using a genuine networking service or website like ammyy.com or TeamViewer. They will use the ‘Event Viewer’ tool on the computer to highlight the Red-X Errors and Yellow Warnings which are supposedly signs of an infection,[9] when in fact these are normal and harmless logs[35] They also encrypt the owner's password database, preventing access to the computer without the scammers' password, essentially locking the victim out of their own computer and ensuring that they themselves will be paid. At this stage the caller then has complete control over the computer, and can display further alarming displays, as well as installing malware. The cold caller will then offer to remove the viruses and malicious malware (some of which they have installed themselves) and install security software and provide an ongoing support service costing up to $500.[36] The Federal Trade Commission (FTC) has reported a huge crackdown on tech support scams and ordered a halt to several alleged tech support scams.[37]

References

  1. Varney, Christine (3 March 1998). "Prepared Remarks of Federal Trade Commissioner Christine A. Varney" (PDF). FTC. Retrieved 30 March 2016.
  2. "Roles, Rights, and Responsibilities: Introduction". www.ncjrs.gov. Retrieved 2021-09-05.
  3. Reed, Tim (March 25, 2013). "Elder Abuse: Financial Scams Against Our Seniors". brigantinepolice. Retrieved March 30, 2016.
  4. Alves, Linda; Wilson, Steve (2008-02-22). "The Effects of Loneliness on Telemarketing Fraud Vulnerability Among Older Adults". Journal of Elder Abuse & Neglect. 20 (1): 63–85. doi:10.1300/j084v20n01_04. ISSN 0894-6566. PMID 18551907. S2CID 6749119.
  5. "Tips To Avoid Scholarship Scams". weirdscholarships. 2012. Retrieved March 30, 2016.
  6. "Lottery Scams". Retrieved March 30, 2016.
  7. Grabosky, Duffield, Peter, Grace (March 2001). "Red Flags Of Fraud" (PDF). Trends & Issues in Crime and Criminal Justice. No. 200. Australian Institute of Criminology.{{cite magazine}}: CS1 maint: multiple names: authors list (link)
  8. "Pyramid Scheme". Investopedia. Retrieved March 30, 2016.
  9. 1 2 3 Wall, David S. (October 2010). "Micro-Frauds: Virtual Robberies, Stings and Scams in the Information Age". Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications.
  10. Rupnow, C (April 23, 2003). "Not "made of money"". Wisconsin Leader-Telegram. Retrieved March 30, 2016.
  11. "Overpayment Scams". Scam Watch. 14 May 2015. Retrieved March 30, 2016.
  12. "Charity Scams". NCDOJ. Retrieved March 30, 2016.
  13. "Cramming Fraud Targets Consumers Credit Cards". ABC. Youtube. Archived from the original on 2021-12-13. Retrieved March 30, 2016.
  14. 1 2 "16 Ways You Can be Phone Scammed". 800notes. November 18, 2008. Retrieved March 30, 2016.
  15. Henderson, Les. "Schemes, Scams, Frauds". Crimes-of-persuasion. Retrieved March 30, 2016.
  16. "FTC Continues Crackdown on Office Supply Scams". Federal Trade Commission. September 29, 2000. Retrieved March 30, 2016.
  17. "Office Supply Scams". Action Fraud. Retrieved March 30, 2016.
  18. Harris, Sheryl (September 12, 2009). "Magazine sales calls likely to be scams; Telemarketing Sales Rule can help you tell real calls from fake". Cleveland. Retrieved March 30, 2016.
  19. Keith (27 September 2007). "Scammer can now use fake Caller ID". Scambusters. Retrieved March 30, 2016.
  20. "What are Robocalls". Verizon. Retrieved March 30, 2016.
  21. Saltzman, Aaron (November 25, 2015). "Endless telemarketing calls, scams and how the big telcos could stop them". CBC. Retrieved March 30, 2016.
  22. Miller, Jason, C (May 28, 2009). "Regulating Robocalls: Are Automated Calls the Sound of, or a Threat to, Democracy?". Michigan Telecommunications and Technology Law Review. 16: 1.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  23. Lane, Amy (June 25, 2015). "The startling facts about Telemarketing Fraud". Dialed in - Phone Lookup Blog. Retrieved March 30, 2016.
  24. Elson, Erica (November 3, 2014). "I'm a Telemarketer. Here's how to get rid of me". Lifehacker. Retrieved March 30, 2016.
  25. "Telemarketing Fraud". Georgia Department of Law. Retrieved March 30, 2016.
  26. "Screen your calls before you answer them". USA Today. January 21, 2019.
  27. "Who is Scam Likely and why are they calling me". 24 June 2019.
  28. "T-Mobile's Scam Shield app will cut down on those 'scam likely' calls. Here's how". CNET.
  29. "Self Service short codes".
  30. "Apple Support".
  31. "Screen your calls before you answer them".
  32. "Combating Spoofed Robocalls with Caller ID Authentication". 13 February 2019.
  33. 1 2 "The Grandparent Scam Don't Let It Happen to You". FBI.gov. 2 April 2012. Retrieved March 30, 2016.
  34. Schneider, Alex (December 2015). "How Could They Know That? Behind the Data that Facilitates Scams Against Vulnerable Americans". Virginia Journal of Law and Technology.
  35. "Event View Scam". Microsoft. June 11, 2012. Retrieved March 30, 2016.
  36. "Microsoft NZ and NetSafe issue warning about phone scammers". Microsoft. September 14, 2015. Retrieved March 30, 2016.
  37. "FTC Halts Massive Tech Support Scams". Federal Trade Commission. 2012-10-03. Retrieved 2018-07-10.

Additional sources

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.