Scam Alert: Anatomy Of A Scam | Business

A recent headline in the Berkshire Eagle (Pittsfield, MA) read “Police: Man took 120-mile Uber ride to rob Lenox woman.” Break-ins, robberies, and abductions sadly are crimes we see on the increase throughout the region, but most do not evolve out of telephone scams. This time it did. The situation developed over a matter of months from a routine telephone scam. The victim, an elderly woman in Lenox, Massachusetts, received a number of calls from a New York man living outside New York City. In trying to scam $1500, his calls began with a promised payment of $3 million but over time turned into a frightening threat. In late February, the alleged criminal hired an Uber driver to take him to Lenox where he forced his way into her home and had her drive to her Pittsfield, MA, bank for money. Alert bank employees notified police and the man was arrested before he could do further harm.

The incident raises a number of questions – does this scenario occur frequently? Aren’t scamming telephone calls “one shot” efforts? Do con artists have access to my personal information? What can I do if I think someone is trying to scam me?

There is a generally false impression that telephone scams are “one shot” efforts? That is probably the result of the most frequently reported scamming call – the IRS Scam. Here, the call is usually initiated by a computer program generating random telephone numbers; the calls usually originate from overseas as single blind or shotgun calling. Some of the more serious telephone scamming is a form of what can be called “Spear Phishing” where the criminal has a specific victim or type of victim in mind. This was most likely the case in Lenox. This scenario is not the most frequently used technique as it requires time to “condition” the victim. Often the con artist will make multiple calls over a period of weeks or months in order to collect bits of information inadvertently given out by the intended victim such as age, marital status, community involvement, personal health and much more. These volunteered facts then become the basis for the con artist to endear himself or herself to the victim. It is no surprise that the female victim in Lenox could become a target without providing much information. Con artists are able to collect personal details on intended victims from publicly accessible data files on the internet. All that is really needed is a name and a town of residence to retrieve demographic and financial data from public records free of charge or for a nominal price. In addition to using the readily available information, successful scammers apply a series of psychological techniques to manipulate their targets: profiling – collection and use of information detailing the intended victim; phantom riches – describing a…

Read the full article at the Original Source..

Back to Top