Getting Revenge on Scammers

Using Answer Bot

 

Legitimate businesses have used automated systems for many years. The systems are designed to reduce or eliminate the need for human operators and tech support personnel. Many websites feature systems in the form of conversational bots, i.e., robots or “bots” that answer questions based on keywords and phrases. For example, if you log on to Microsoft and ask a question about making your computer faster, the bot will give you a list of links to follow that may answer your question. Businesses use it as a time saving device. One report shows that these bots can answer 29% of a customer’s questions, saving 44% of time that would be otherwise used with live support.

Calling Systems

Automated systems are a part of every day life. They are used when you call a company for information so that you are directed to the right department. They can be annoying for the caller but in other ways, efficient. Another automated system that is popular is the ability to block or blacklist certain phone numbers that call unsuspecting people. Most apps blacklist phone numbers based on the number of people they call. If a phone number is used to call 1000 people, it is obviously a robocaller and, therefore, should be blocked. These systems tend to be relatively effective.

Telemarketers and Scammers

Telemarketers and scammers waste our time and, in many cases, want to get our hard-earned money. You can download apps that will help you to trace unknown callers on your iPhone to ensure the caller is legitimate and will also block calls and texts. Users love the apps because they save time and prevent annoying people from calling. However, there is a new trend that takes it one step further. Robokiller has introduced a feature on their platform known as Answer Bot. Not only does it block unwanted calls, it plays a pre-recorded message to keep scammers and telemarketers on the phone.

Getting Revenge

We’ve all wanted to get revenge on scammers at one time. We learn to avoid saying “yes” and other things that can get us into trouble, but scammers are clever and relentless. Answer Bot blocks unwanted calls and allows users to play a pre-recorded message for the person being blocked. For example, a scammer calls your phone. Answer Bot blocks the number, so you are not disturbed. While you go on about your day, the scammer hears a recorded message that sounds like a regular conversation. The caller is engaged in the conversation, thereby wasting his or her time.

The Result

Many scammers and telemarketers are not permitted to hang up on a potential target, so they are forced to stay on the line. Robokiller reports that Answer Bot has prevented the scammers from making approximately 300 calls. The longest call recorded to date lasted 45 minutes. Users enjoy the app because many of the pre-recorded messages are hilarious and have gone viral. People have begun to compete to see who can get the best revenge, opening the doors to similar apps to protect consumers.

0COMMENTS

Can Social Security Be Suspended?

Social Security Scams

The Social Security Administration (SSA) shows a rise in phone scams relating to suspended accounts. Callers claim that citizens are having their social security numbers suspended due to criminal activity or taxes being owed to the government. Scammers target senior citizens and convince them to pay fines to correct the problem, while others ask for verification of personal information. The Federal Trade Commission states that the caller pretends to be an agent with the SSA trying to clear up a problem or to protect citizens from scams. The truth is that the call is the scam. People should know that the SSA does not call people, nor does it ever suspend social security numbers for any reason. The SSA doesn’t require people to reapply, either. Anyone requesting information or saying otherwise is a fraud.

If you get a call from someone claiming to be an SSA representative, hang up. You can use a free reverse phone search to verify the number before accepting another call or giving any information. Some scammers spoof the SSA’s main or customer service number — 1-800-772-1213 — to convince the person on the other end of the phone that the scam is real.

SSA Issues Warning

Gale Stallworth Stone, the Acting Inspector General of the Social Security Administration, says, “Unfortunately, scammers will try anything to mislead and harm innocent people, including scaring them into thinking that something is wrong with their Social Security account and they might be arrested. I encourage everyone to remain watchful of these schemes and to alert family members and friends of their prevalence.  We will continue to track these scams and warn citizens so that they can stay several steps ahead of these thieves.”

Protect Yourself

  • Know the way the SSA operates. The SSA rarely, if ever, calls people on the phone. Instead, they communicate only by mail.
  • The SSA will not make threats or demand payment.
  • Refuse to give out bank account or credit card information.
  • Don’t give out your Social Security number.
  • Ignore robocalls.
  • Never give or confirm any personal information.
  • Don’t assume the call, text, or email you receive is legitimate. Offer to call back.
  • Check all suspicious phone numbers using an iPhone reverse cell search app.
  • Do not engage in conversation with the person on the phone.

Staying Safe

  • Block phone numbers you suspect to be fake.
  • Contact government agencies in person, using verified phone numbers, or through their website.
  • Contact government agencies directly, in person or by using telephone numbers and website addresses you know to be legitimate.
  • If someone has tried to steal your private information by claiming to be from the government, report it to the FTC. Also, report any potential scams to the SSA’s Office of the Inspector General  online or call 1-800-269-0271.

 

0COMMENTS

Avoiding Common Phone Scams

Avoiding phone scams

Avoiding phone scams can be difficult. Scammers trick users so they can get access to your information. It is more difficult than ever to detect phone scams by the phone number. Criminals often use VoIP or Internet phone numbers to seem as if they are local. The numbers are untraceable. Cell phone users can avoid most scams by using caller ID or an iPhone reverse phone number lookup to check the numbers of unknown callers.

Types of Scams

The types of phone scams increase every day, making it harder to detect or avoid the scammers. Criminals find new ways of getting money and information from users. They may use intimidation, scare tactics or guilt to get what they want from the victims. A common scam involves the IRS calling about an overdue tax bill. You should know that the IRS NEVER calls anyone; they send letters in the mail.

Another common trick involves getting the victim to say “yes.” The scammer will ask questions trying to get an agreement. Don’t fall for it.

The following are popular scams:

Online Orders

A representative claims your company ordered a product and requires payment. The call works because the person ordering the products is not always the person that pays the bills.

Unpaid Utility Bill

The caller says your utilities will be cut off unless you make a payment immediately.

Medical Coverage

This scam usually targets seniors. Caller scares victims into thinking their coverage is insufficient or lapsed.

Jury Duty

Target is told he must appear for jury duty and is required to verify information.

Government Agency Impersonator

The caller claims to be from the Social Security Administration, IRS, or other agency.

Immigration Programs

Caller promises to help immigrants with documents or citizenship.

Credit Card Services

The caller claims to be from “card services.” He wants to explain offers, suspicious charges, or lower interest rates. The caller requests verification of information.

Tech Support

The scammer claims to be from Microsoft or Apple Tech Support. He reports a serious issue on your computer and offers to fix the problem for a fee. You should report the calls to the company the caller claims to represent.

Prize Winner

The caller tells the victim he has won a lottery, prize, or free vacation.

Reporting Scammers

Reporting calls can seem pointless yet it is important. Reports can cut down on activity and help other victims.

Internet-based scams, including government, dating and tech support scams, should be reported online at the FBI’s Internet Crime Complaint Center. Supply as much information as possible.

Consumer-related fraud should be reported online via the Federal Trade Commission’s Complaint Assistant. Consumer-related fraud includes a prize, vacation, lottery and sweepstakes scams, utility company scams, credit card scams, tech support scams, calls from debt collectors, fake charities, and telemarketers that violate the National Do Not Call Registry.

 

 

0COMMENTS

Cash Advances Can Spell Trouble

Cash Advance Request Form

A cash advance can help you in times in need, but can also be a way to get you into deeper trouble. This can easily happen if the person or company offering the cash advance isn’t honest. There are many ads and commercials for car title loans and payday loans, many of which are legal but charge big fees and interest. If you choose to go that way, be sure to read the fine print and understand exactly what you’re signing up for, what fees are involved, and the deadline for payment.

Is it Legal?

Some states, such as Georgia and North Carolina, have banned cash advance or payday loans. In some states, they are legal but cap high-interest rates. Others permit payday loans but have failed to close the loophole which prevents high interest rates. In other words, there is no cap on the interest you will pay for quick cash.

States Banning Loans

Arizona, Connecticut, Georgia, Maryland, Massachusetts, North Carolina, Pennsylvania, Vermont, and West Virginia have never permitted payday loans. The District of Columbia has reversed its payday law.

Interest Regulated States

  • Arkansas – 17%
  • New York – 25%
  • Maine – 30%
  • New Jersey – 30%
  • Montana – 36%
  • New Hampshire – 36%
  • Oregon – 36%
  • South Dakota – 36%
  • Colorado – 45%

States with No Interest Caps

  • Alabama
  • Alaska
  • California
  • Delaware
  • Florida
  • Hawaii
  • Idaho
  • Illinois
  • Indiana
  • Iowa
  • Kansas
  • Kentucky
  • Louisiana
  • Michigan
  • Minnesota
  • Mississippi
  • Missouri
  • Nebraska
  • Nevada
  • New Mexico
  • North Dakota
  • Ohio
  • Oklahoma
  • Rhode Island
  • South Carolina
  • Tennessee
  • Texas
  • Utah
  • Virginia
  • Washington
  • Wisconsin
  • Wyoming

Online Services

Caution

The following are six things that you should be aware of when applying for a cash advance loan, in person or online.

  1. The lender doesn’t request payment history, pay stubs or proof of creditworthiness.
  2. The lender isn’t registered in your state. The Federal Trade Commission (FTC) requires registration for all lenders and loan brokers in the state(s) they do business.
  3. The lender requires a prepaid debit card. Some sites will ask for a prepaid card as collateral or insurance. Prepaid cards can’t be traced. They are also nonrefundable, so the scammers keep the money free and clear.
  4.  Their website isn’t secure.
  5. The lender does not have an address or the address is out of the country.
  6. The lender demands action. Don’t fall for limited time offers.
  7. The lender’s phone number is not listed. Use a white pages iPhone app to find out if the number is legit.

If you think you have been scammed or want to report a lender, contact the FBI’s Internet Crime Complaint Center.

0COMMENTS

Is Sexting Really Dangerous?

app for unknown look ups

If we have learned anything about sexting, we know it’s fun but foolish and potentially dangerous. Politicians and celebrities are often in the news because of sexting. Some have experienced ruined careers and/or ruined relationships. They tell the media they were caught up in the moment or meant no harm. In the end, the fun was not worth the consequence.

The act is particularly dangerous for youths. Kids are often drawn into sexting with strangers; people who aren’t who they claim to be. The result may be dangerous or even fatal. Even the most diligent parents can’t be on alert 24/7. Educating children is vital to their safety.

What is Sexting?

Sexting is sending or receiving nude pictures or sexually suggestive text messages through a mobile phone. Teenagers engage in sexting to prove an attraction or to keep a mate. Statistics show that 1 in 7 teens sends sext messages; 1 in 4 receives messages. It’s common for a person to receive a message containing a nude photo or sexual suggestion. If that happens, the child should report it to a parent immediately. The parent can use an app for unknown number look ups to find out who owns the number and report it to authorities.


Sexting Statistics

Teens and politicians aren’t the only ones sending the messages:

  • 12% to 16% of youths ages 10 to 19 have sent nude or semi-nude images via their mobile phones.
  • 15% of teens have received a sexually explicit image through text or social media.
  • 40% of 18 to 34 year-olds admitted to sexting
  • 10% of people 55 years old and over admitted to sending sexts.
  • Sexts are sent almost equally between male and females.

Sextortion

It’s just like it sounds. Sextortion is a form of extortion or blackmail using sexually elated  messages or photos against the person that sent them. It is most common among teens or couples that have recently ended a relationship. It happens between friends who are fighting. Also referred to as “revenge porn,” sextortion can easily embarrass the persons joining in the conversation. It may cause animosity, embarrassment, or worse. Teens can be outcast, expelled or denied access into college. People put themselves at risk, including their future careers and relationships. People need to remember that once a photo or message is on the Internet, it is there forever. You can’t get it back.

Additionally, sexting carries legal issues. The person taking or sending the picture can face fines or even jail for distributing pornography, even if that person is a minor.

Protect Yourself

First, you need to educate yourself about sexting, including the dangers and consequences.

To avoid the embarrassment and possible legal problems from sexting, simply refuse. Do not take nude or compromising pictures. Do not engage in sexual conversations.

Lastly, avoid keeping inappropriate photos and videos on your computer. At the least, computers can be hacked and private photos can be leaked to social media sites.

0COMMENTS

Performing Background Checks

As technology moves forward, more people are using search engines and reverse phone lookups on iPhone apps to run background checks on family members, friends, possible love interests, and employees. People can search the internet for phone numbers, work history, criminal history, and relationship status. Employers take steps to gain information about hires if they are going to be placed in a job where security was important. Now anyone can dig into public and private information with just a few clicks of the mouse.

The Reason for Background Checks

Employers often do background checks on people as a part of the job screening process. This was common when someone applied for a job in a secure facility such as a courthouse, airport, financial institution, hospital, school, or government agency. Likewise, they are required for anyone getting a license for real estate, insurance, or another job where the employee must show credibility.

Originally, checks were usually conducted when someone applied for a job. Similarly, background checks are run on companies, politicians, and individuals for a variety of reasons. The information can be invaluable.

Current statistics show that background checks give employers a heads up on potential employees.

  • 57% of employers say background checks lead to better hires.
  • 85% of employers report finding inaccurate information on resumes and/or job applications.
  • 77% of employers have uncovered issues that would have gone unnoticed.

Types of Searches

Some jobs may require certain information, but most background searches are general. People can do searches for personal use on private individuals. Common types of screening include:

Criminal and Sex Offender Records

There are websites that show sex offender lists, but criminal checks may not be easy to come by. Some companies offer to research criminal history for a fee, but usually run a check of public records. Third party agencies can give more detailed information, but will not guarantee that the information is correct. The only way to get truly accurate information is to search county or state databases.

Citizenship Status

Employing undocumented workers is illegal and can spell trouble for the employer. Since the formation of the Immigration and Customs Enforcement (ICE) division of the Department of Homeland Security, employers are required to supply proof of citizenship for its workers.

Court Records

Getting information on court records is important for personal and employment reasons. It’s important to know if a future relationship or employee has been in court. It can attest to the person’s character.

Driving Records

Employees required to drive at their jobs must have clean records for insurance and safety reasons. Employers can contact their state’s Department of Motor Vehicles and/or the Department of Transportation for information.

Education records

Records verify educational qualifications including a high school diploma, college degree, graduate degree or license.

Employment records

Employers often check job history to check a person’s skill set, performance, attendance, and relationship with employers and coworkers.

Financial information

Reports may include a person’s credit history, civil judgments, tax information or bankruptcy. This is crucial information to have for a relationship or employer working in a financial space.

Social Security Number

A person’s social security number shows where a person has lived and worked. People who give out a false SSN may be guilty of identity theft or could be illegal.

Who Would Run a Background Check on Me?

The most common reason for a background check is employment screening. Now someone can run a background for creditworthiness or for personal reasons. While some information is public, digging deeper is going to cost. Deep checks can be expensive. The Fair Credit Reporting Act (FCRA) created rules regarding the information accessed by potential employers. Anyone using a third-party service must state the reason for the search.

Employers cannot refuse to hire someone based on the information of an unofficial search.

Incorrect Information

One important step many people miss is running their own background check. People found old information contained in databases. Running your own background check enables you to review information others can see about you. Incorrect information can cost you a job or a relationship. You can report incorrect information to the issuing agency. You can also learn how to remove information from your report.

0COMMENTS

Why Are Reverse Phone Searches So Expensive?

white pages iPhone app

Reverse phone searches continue to be difficult at best unless you have the inside scoop on how to track down numbers that may be important. Inevitably, each of us has received one or more calls from unknown numbers. It can drive you crazy if it happens day after day. The same can be said for finding a scrap of paper with a phone number scrawled on it but can’t remember when or why keeping that number was important. The most frustrating part is trying to find out who owns those numbers without spending a small fortune. Free caller ID programs rarely work – at least not accurately. Googling the number will give you page after page of nonsense that leaves you right back where you started. What you will get for your trouble is a multitude of sites that offer the service, often with a premium cost. So, the question remains – Why are reverse phone searches so expensive?

The Explanation

Many sites offer free reverse phone searches for numbers and names and usually deliver what they promise. They will look it up as advertised, but to see the information you must pay. Some simply redirect you to another website. It’s a way around the old bait and switch that keeps it legal, but not very nice. When asked why the searches are expensive, most will reply that it costs a lot of money to run and update databases, to maintain their servers and pay for lists. That may be true but the cost for such a small service is rarely worth it. Some will offer a one-time search for a price, but the real goal is to get you to subscribe to a monthly service which is almost never worth it unless you are planning on becoming a private investigator.

To test my theory about the worthiness of such a search, I signed up for a free three-day trial and searched my own phone number. What did I get? Well, they did track my name, but the address was one from two years ago, and, wait for it…my address from 12 years ago in a different state. They also had me related to my brother’s third ex-wife and my former boss of, again, 12 years ago. That is someone I certainly don’t want to be linked to any more. If I’m paying for a search, can I at least get a guarantee of its accuracy? Probably not.

white pages iPhone app

The Solution

All is not lost. There are good white pages iPhone apps and programs out there but finding them means wading through countless search engine pages and sites like the aforementioned. The best way to find that diamond in the rough is to seek out review sites that will give you the truth and the information you seek. If you do pay for a service, be sure that you are paying for what it’s worth and not some inflated cost that will encourage you to sign up for a monthly service that will likely remain unused.

0COMMENTS

What Is Pickleball?

I recently visited my grandma in her retirement community in Florida and she introduced me to this awesome new game. Imagine a mix between badminton, tennis, and ping pong. The game is called pickleball and it’s a fast-paced, outdoor/indoor sport that can be played in singles and doubles.

Origins of the Game

The game originated in the U.S. when a family wanted to play badminton, but they couldn’t find any shuttlecocks. So instead, they improvised and used wiffle balls and ping pong paddles with a lowered net.

This was the start of the game, which is now popular throughout the country and especially so in retirement communities.

How to Play Pickleball

Pickleball can be played in either singles or doubles and the first side to reach 11 points wins. There are a number of rules that are all pretty easy to learn.

There is a non-volley zone on each side of the net in which players can not volley or hit the ball back without it first bouncing. The player must make there play on the ball after the first bounce, and then the opposing team must let the return shot bounce before they play it.

There are several ways in which a team can be faulted. If the team doesn’t allow the ball to bounce once after it’s bounced on the other side of the net this is a fault. It’s also a fault if someone volleys the ball in the non-volley zone.

What You Need to Play

To play it you need balls (very similar to wiffle balls), a paddle, a net, a court (can be indoor or outdoor), a pickleball bag to carry all your gear in, and a friend! 🙂

Since it’s not likely that you’ll have your own court, you’ll need to travel. Nets can be costly, and not everyone has a tennis court or a yard big enough to play in. You can find local tournaments in your area to play with others. Be sure to invest in a colorful sports duffle to carry everything you need in.

0COMMENTS

Romance Scams: What You Need to Know About Them

Romance scams are a major problem during the winter months. As many singles start to look for relationship some might fall into the traps of overseas catfish. We’ll go over what you need to watch out for to protect your heart and your financials.

What Are Romance Scams?

A romance scam is when a criminal poses as someone they are not. They do this in order to defraud and solicit money from a person who they are in “love” with. These scammers are usually overseas and they will steal the photos of military personnel in order to create a believable story of being deployed and unable to meet in person.

Over weeks or months the scammer will build a relationship with the person that they are targeting. They will profess their love for the person and they will weave a tale of woe surrounding their current life circumstances. They scammer often poses as someone widowed, living overseas far from family and friends.

Once they feel that the person that they are trying to scam is in love, tragedy will strike. They will claim that they’ve had an accident or lost their paperwork. Whatever the excuse something will happen that will leave them stranded and their victim will be their only salvation.

They will ask for money to be wired to them and once they’ve taken the person for all they’re worth they will disappear and move on to another target.

How To Avoid Romance Scams

When meeting people online try to meet them somewhere public in person within the first few days or weeks of chatting with them. If someone is reluctant to meet in person or makes up lots of excuses as to why they can’t meet you in person it’s best to move on. Don’t get emotionally invested in someone who can’t be there for you!

You can also run a search on your new love interests using an iPhone cell phone number look up app. This isn’t to stalk them or anything like that, it’s just to verify that the person you’re talking to is who they say they are.

0COMMENTS

Virtual Kidnapping Phone Scams – How To Protect Your Family

There is a scary new phone scam that is happening around the United States. You now need to be more careful than ever with your social media and what you’re sharing online. The FBI has been warning people about virtual kidnapping phone scams.

What Is A Virtual Kidnapping Scam?

You receive a call and someone says that they have your loved one. It could be your brother or sister, or son or daughter. The caller will claim that they’ll hurt your family member if they don’t receive a ransom immediately. They will demand that you wire them large amounts of money.

The caller will often know personal information like your family member names and the area that you live in. These criminals will gain this information via social media. It’s very important that you limit what you share online publicly. Only post information about yourself to people that you know.

You can check your privacy settings to make sure that you’re not oversharing. The less you share the safer you’ll be!

What To Do If You Get A Call Like This

The first thing you should do is try to contact the loved one who the kidnapper claims to have. While on the line try to text the person they say they have or call them.

Also try to ask for personal information that only the “kidnapped” person would know. Ask to speak to them if possible to make sure that they are okay. Oftentimes, there will be screaming in the background, but it’s important to try and verify the person’s identity.

Lastly you should contact the police. The caller will tell you not to, but in the case of a real or fake kidnapping you should always contact the authorities. Alert them to the situation and if you’re not sure whether or not it is a scam.

You should always avoid picking up calls from unknown phone numbers. Try to look up calls from mysterious numbers via an app for unknown number look ups before answering.

0COMMENTS