Law Enforcement Phone Scams

Police ScamsPolice officers warrant respect and obedience. Parents teach children to respect and obey the police. When a police officer calls and asks for a donation or informs you of an outstanding warrant, the impulse to comply is immediate. Unfortunately, the person calling may not be a member of law enforcement. The scammers posing as police, call and prey upon the victim’s fear. There are three common scams relating to law enforcement:

Bench Warrants

A bench warrant is a “go to jail, do not pass go” document. If you have a warrant against you, police will arrive at your door and cart you off to jail. The police do not call. Have you ever seen a cop show where the police ring up a dangerous felon?

Typically, the caller will order you to purchase a pre-paid card or arrange to send money via Western Union or MoneyGram. Don’t do it! If you suspect the call may be legitimate, call your local police station immediately.

Relative in Jail

Another common scam is the relative in jail scam. Senior citizens are usually the targets of this scam. The caller pretends to be a family member, saying he is in jail. The caller says a bondsman will be calling shortly. The target is expected to give out credit card information or to send money through Western Union or using a pre-paid card.

This is a scam. Like the kidnapping scheme, the target is not offered any proof that the story is true. The scammer plays upon the target’s fear that a family member is in distress. If you receive such a call, find out the name of the jail and call it directly. If a bondsman is required, meet him at his office or the jail.

Police Charity

Citizens may receive an annual phone call asking for donations to the policeman’s ball or to support the Fraternal Order of Police. Police do solicit funds for these and other charities, but will not ask for a credit card or wire transfer over the phone. If you receive this call, do your research and contact the organization directly for verification.

Detecting a Law Enforcement Phone Scam

It may be difficult to identify a false request asking for money, although it is not impossible. Scammers often use fake identities and use a spoofed caller ID to hide their real phone numbers. Scammers may be able to tap into phone numbers used by police to appear legitimate.

Ask for more information

If the caller asks for a donation, ask questions. Ask the representative for information about the organization. Callers should supply their full names and the organization’s legal name and address. You can require the caller to explain how donations are allocated. If the caller states that the request is coming from a specific chapter or precinct, call that location to verify before opening your wallet. Scammers faced with questions may be unable to give an answer, get defensive and hang up. You can also use an iPhone app to do a reverse look up a phone number to check if it’s related to scams.

Cyberstalkers and Their Victims

Cyberstalking

Cyberstalking is the use of social media, phone calls, text messages, email, and other forms of technology to threaten, harass, pursue, intimidate or steal a person’s information for personal gain. For that reason, anyone who uses the Internet can be a target. Cyberstalkers are often driven by jealousy, anger, hatred, infatuation, revenge, and lust or obsession. Some might suffer from mental illness. Some cyberstalkers, known as Internet Trolls, will harass Internet users for no good reason. A cyberstalker could be a stranger, but most likely is someone the victim knows. The stalker could be an ex, someone from school, co-worker, someone with whom you’ve had an argument or fight, or even a fan or potential love interest.

The Four Types of Cyberstalkers

Cyberstalkers cause a lot of trouble for their victims with rumors, false allegations, lies, harassment, or even identity theft. Cyberstalking can include cyberbullying, which takes place between kids. Cyberstalking may also include inappropriate actions, including those of a sexual nature. Research has shown that there are four basic types of cyberstalkers. They are:

  • Vindictive: Cyberstalkers who want to get revenge or harm another person. They often engage in personal attacks;
  • Composed: Those whose want to annoy the victim;
  • Intimate: One who wants to have a relationship (friendship or love) with the victim. Therefore, cyberstalkers can turn violent if turned away;
  • Collective: A group of cyberstalkers who attack an individual or group for a specific cause.

The Harmful Result

Stalking causes a great deal of harm to the victim. It can ruin marriages, self-esteem, careers, or someone’s credit. Cyberbullies have been the cause of many children committing suicide. Obsessions can move from cyberspace to real-world stalking. Cyberstalkers may claim that they mean no harm, although what is being done may be extremely harmful and often illegal. Victims may not know they are being stalked. The stalker could use spyware or other means of tracking Internet use behind the scenes. You should increase your security if you think that you are being tracked in some way. Take extra precautions.

Precautions

Protect yourself by taking simple precautions. Regardless of how careful you are, it’s possible to become a target. However, you can avoid becoming a victim of cyberstalking, despite the method used to target you.

  • Restrict access to your computer, smartphone, and other devices. Leaving your computer open can allow hackers to alter the system and add software for tracking purposes.
  • Password protection. You should protect all devices with unique passwords to keep from being stalked. Use a web-based password vault to store passwords and change passwords often. Never use the same password for more than one program. Above all, avoid using passwords such as children’s or pets’ names or birthdays.
  • Sign out of computer programs when finished, especially on social media accounts.
  • Search your name online to see what information is available to the public. Do the same for family members.
  • Tell friends and family that you do not want your personal information on their social media accounts. Remove such info wherever possible.
  • Keep online calendars and plans private.
  • Post with care. If you post something, it is nearly impossible to take it back. This includes photographs.
  • Don’t announce travel plans or sharing where you will be on a certain date and time.
  • Use anti-virus, spyware, malware and anti-tracking software on all devices.
  • Teach children how to be smart about Internet use and to report any strange behavior immediately.
  • Don’t give out personal information such as your address, social security number, or bank information.
  • Hackers can obtain all information provided online.
  • Don’t get involved in online arguments.
  • Never open attachments from unknown sources.
  • Use screen names that are age and gender neutral.
  • Check the status of bank and credit card accounts on a regular basis.
  • Set up new emails for dating websites and social media accounts.

Cyberstalked? Now What?

If you see signs of cyberstalking, act right away. Police and other agencies often have cyber divisions that can help with the legal aspects of the crime and how to protect yourself.

  • Take suspicions seriously.
  • Report any possible illegal activity.
  • Avoid any contact with suspected cyberstalkers.
  • Record and block any email or phone numbers used to contact you with harassing messages. Use an iPhone cell phone trace app to check unknown numbers.
  • Change your account passwords.
  • Change email accounts.
  • Remove personal information on social media profiles and dating websites.
  • Reset privacy settings on all accounts and programs.
  • Delete online accounts if necessary.
  • Inform family and friends of the event.
  • Be aware of any real-life stalking activity.

In conclusion, it seems that cyberstalking is here to stay. However, if you are mindful, you can stay safe.

Online Romance Scams

Online romance continues to grow as a money-making opportunity; not only for the companies charging would-be daters, but the scammers that lie, cheat, and steal money as well as hearts. As technology grows, singles are more likely to pursue romantic liaisons online. It’s much easier to meet a wide variety of people with similar interests and you never have to leave home. The prospects are exciting, and some have found their soulmates online. Sadly, many seeking romance have been hoodwinked, robbed, and blackmailed.

Online Dating Scams

The Sob Story

The first conversations typically start out well. The scammer comments on how attractive you are and how many things you have in common. Invariably, a sob story develops to gain pity and, perhaps, access to your bank account. Some common stories:

  • Spouse and/or children killed in an accident
  • Significant other dies from disease
  • Lonely military personnel on deployment
  • Sad retiree
  • Stranded overseas
  • Was robbed and needs help

The potential romantic interest is often very good at garnering sympathy and playing upon the target’s ego with phrases like, “with you I think I can live again” or “you’re the one I’ve been waiting for.” Highly sensitive people tend to be more susceptible to this line of trickery because they genuinely feel bad for the scammer.

Online Scams

The Giveaway

It was once much easier to determine if someone was a scammer by doing a reverse look up on their phone. A cell phone number app lookup for iPhone can identify the region from which someone is calling. Common regions for scammers include Nigeria and Jamaica. Those tools are still valuable, but scammers are making it harder by employing local numbers or ones that will not send up any red flags. Still, if an online dating prospect gives his (or her) phone number, reverse search it immediately to verify the information you’ve been given.

Another giveaway is the time zone. If your romantic interest is only online in the middle of the night or at some other illogical time, take note. You may ask on occasion what time it is if you suspect the person is not located in the U.S.

Language is another telltale sign that someone isn’t being up front about his or her nationality. If the person claims to be American or from some other English-speaking country, it’s easy to tell by the way they write or talk. Bad English, typos, and poorly written sentences are a dead giveaway that the person does not speak the language.

Identity Theft

Protect Yourself

There are many ways to protect yourself in an online romance situation from using a nom de plum to using an anonymous email or phone number, if in fact you give out that information at all. Others may include:

  • Never give out your social security number, bank, or credit card information
  • Refuse to transfer money or make a financial transaction on behalf of the love interest
  • Do not reveal your street address
  • Don’t pay up front for a promise
  • Do not post any compromising photos or videos
  • Report any suspicious activity to the website and local police.

How to Make Your Phone Safer

It’s more important than ever to protect your personal and financial information from hackers and phishing scams. We’ll go over the best ways to make your phone safer.

Install a VPN

Safely browse the internet while on public Wi-Fi with the use of a VPN. We like to use TunnelBear. It’s simple interface allows you to choose which IP location you would like to use with the toggle of a button.

Make Sure You Have a Passcode Set

This may be obvious and you might already have one set up, but make sure that you have a passcode on your phone. If it’s ever lost or stolen this will ensure that any sensitive information on your phone will be protected.

Turn on Find My Phone

With iPhones you can turn on Find My iPhone which will allow you to remotely track your iPhone if it’s ever lost or stolen. Also, and most importantly, if a phone can’t be recovered this feature allows you to wipe the phone completely. If your phone ever gets stolen, this will protect you!

Use Stronger Passwords

After so many breaches, you’d think that people would start using stronger passwords. Unfortunately, we don’t because having too many different passwords can be too difficult to remember. In 2018 it’s important for you to start using unique, strong passwords for each of your many online accounts. We recommend using a password vault app, like LastPass, to generate all of your passwords and keep them safe.

Password vaults will create and then guard and pre-populate the sign-in fields whenever you go to a site that requires you to log in.

Block Spam on Your Phone

Lastly, make your phone safer by using a white pages iPhone caller ID app. These apps run in the background of your phone and will block calls from numbers that have been reported as spam.

Never deal with an annoying telemarketer or potential phone scammer ever again.  There are many different options and some carriers even provide their customers with free spam blocking.

How To Find Out Where A Call Is From

You probably get calls from random phone numbers all the time. Some might look familiar, while others might be completely unknown. The best way to identify these calls and where they’re coming from is by using a reverse phone lookup.

How Do They Get Your Number?

There are a lot of ways in which companies and scammers get your phone number. The most common way is via you giving it away to them. Whenever you sign up for something and are asked to give your phone number be sure to read the privacy policy first.

Many survey companies and realtors will often sell your information to third-party marketing companies that will then add your phone number or email to call and email lists.

Another way you may be giving it away is via your social media. Make sure that your profile information is public only to people who you know and trust. Many times we’ll unintentionally provide information in our social media profiles because we’re not aware of the privacy settings. Be sure to double check what’s visible to strangers on your social media profiles.

How To Find Where The Call Is Coming From

The easiest way to find out where a call is coming from is by looking at its area code. However, this isn’t always reliable do to caller ID spoofing. This technique allows a caller to disguise their caller ID as any number they wish.

This technique can sometimes result in you receiving calls from your own number!

The best way to identify an unknown call is by using a phone tracer app for the iPhone. These apps will allow you to look up any phone number, identify where it’s from, and even see other people’s experiences with the phone number. This means you can avoid all of those annoying robocalls.

Caller ID Apps and Online Dating

Love and marriage, love and marriage, go together like a horse and carriage! You know the song, well now it’s time to update it for 2017 and caller ID apps and online dating go together like a horse and carriage.

If you’re single and you haven’t at least tried online dating then you’re putting yourself at a disadvantage. We’ll go over why you should try out online dating and what you need to know to keep you safe.

Why Online Dating?

Nowadays, many couples meet on online dating sites and apps. Some of the most well-known ones are Tinder, Match.com, Bumble, and eHarmony. There are so many options for online dating that it’s important that you do your research and pick the one that’s best for you!

What You Need To Know

Some people like dating and other people dread it. It’s important that you think about what you’d like out of your dating experience. Do you only want the opportunity to meet new and interesting people in your area? Do you want to find “the one”?

We recommend going with the first option. Relax, take your time, and most importantly enjoy yourself. Not every date will be perfect, but that’s okay.

In addition to this, it’s also important that you be safe with online dating. After all you are meeting strangers off of the internet!

Caller ID Apps And Public Meeting Spaces

If you’ve met someone that you like and you want to invite them out on a date the first piece of information you’ll probably share with each other is your phone number. You can use an app for unknown number look ups to verify that the person is who they say they are.

If you don’t feel comfortable giving out your real phone number to someone you’ve just met you can also download an app that gives you a second number, like Burner. This is a good app to have whenever you’re dealing with people you’re unsure of.

The number one rule with online dating is to always meet in a public place and don’t have your date pick you up from your house.

How To Protect Yourself From Data Breaches

There was a major hack at Equifax, one of the three major credit reporting companies in the U.S. This hack has exposed the information of 143 million Americans, nearly half the population. We’ll go over how you can protect yourself by using iPhone caller ID, avoiding phishing email scams, and freezing your credit.

Is Your Information At Risk?

You can find out whether or not your information may have been exposed by going to Equifax’s Cybersecurity Incident & Important Consumer Information site. Equifax is also offering a free credit monitoring service. However, it’s important to note that by joining this you waive your right to sue the company in the future.

What To Watch Out For

Beware of phishing scams and keep an eye on your credit report. Here are the top things to watch out for:

  • Impostor phone scams: Don’t trust callers who are requesting that you confirm your Social Security Number or asking for other sensitive pieces of information. Scammers will often pretend to be calling from credit card companies or other organizations in order to trick you into giving them information.
  • Phishing email scams: Almost more common than phone scams are email scams that are phishing (or requesting) personal information. Look for spelling mistakes in the emails, this is a sign that the email isn’t legitimate.
  • Changes in credit score: If you notice changes in your credit score, report it immediately to the the three credit reporting agencies and put a freeze on your credit. You can learn more about this here at the FTC.

Using iPhone Caller ID And Other Tools To Protect Yourself

If you’re an iPhone user, download an iPhone number tracer app to allow you to identify unknown calls. This will help you identify whether an incoming call is trustworthy. If you have an Android phone you should check out Truecaller.

Secondly, you should also check emails to verify the address. Don’t click on links that seem suspicious, and if you have doubts go directly to the company’s website and contact them directly.

What’s most important though, in cases like these, is to keep an eye on your credit report. Any fluctuations are a red flag.

Mental Pollution: How to Stop Automated Calls

At SequentiaEnvironics we want to focus on ways to reduce the mental pollution that is everywhere around us. This has gotten to be quite difficult especially today. We are bombarded with psychological toxins on a daily basis via television, the internet, aggressive marketing tactics and more. One of the most annoying of these mental pollutants are automated phone calls. In this article we’ll go over how to stop automated calls.

What Is an Automated Call?

Have you ever gotten a call from what looks like a local number? You pick it up, and instead of an actual person a recording of someone saying you’ve won a cruise plays. They instructs you to call back (XXX) XXX-XXXX to claim your prize. Annoying. And a waste of your time.

There are different variations of this too. Sometimes the recording might say that you’re going to be arrested by the IRS, that you’re eligible for a free medical alert system, or that you can refinance your home. Most of the time these claims are fraudulent and you shouldn’t pay attention to them.

If you’re receiving automated calls on your cell phone this is illegal and you should report it.

Stopping Automated Calls

Unfortunately, not much has been done to try and stop these annoying calls, but there are a few things that you can do. If you’re a T-Mobile customer you can use their automatic scam call block, other phone carriers are also working on different ways to help their customers avoid these types of calls. In addition, there are apps like Nomorobo and an iPhone caller ID app that have incorporated automatic spam call blocking features.

Having an app on your phone will help reduce the amount of unwanted automated calls you receive, but there is still more that you can do. Whenever you pick up an automated call, do not press any buttons to be removed from the calling list. Pressing buttons on these types of calls will alert scammers to the fact that your phone number is an active number and they will inundate you with even more calls.

Lastly, make sure you report automated calls to the FTC. They are working to put a stop to these types of scams and your help brings them closer to achieving this!

White Pages Reverse Phone Lookup App Can Help You Stop Stalkers

No one wants to deal with unwanted phone calls. In some cases, repeat phone calls from an anonymous source could be the result of a harmless accident. The person calling just may have an incorrect number. In other situations, the calls could be from a telemarketer or annoying spammer. While bothersome, these calls still fall under the category of being harmless. Unwanted phone calls from a scammer or stalker, however, have danger associated with them. Read more below to learn about different white pages reverse phone lookup apps and how they can protect you from unwanted callers.

Receiving Unwanted Calls

The appearance of a strange phone number calling you time and time again can be distressing. If the calls are combined with strange messages or other odd behavior, then it makes sense you might have some fear surrounding these calls. The vast majority of the anxiety surrounding fear derives from the unknown. When you do not know who the person calling is, then you end up being very understandably on edge over the constant unwanted calls. To assume you have a stalker on the other end of the phone is not paranoia. Stalkers do like to abuse their phone privileges.

Why Do These Calls Happen?

Why would someone constantly call, but not leave any real identifying messages or other indicators of identity? Sometimes, a scammer or stalker may be trying to hide who he or she is. The repeated calls are not always about trying to initiate a conversation with someone. In the case of a stalker, the calls could be about trying to determine whether or not you are home.

A jealous stalker could be keeping tabs on you. Knowing that your whereabouts is always going to be a high priority of an obsessional stalker. Keep in mind, such a person is very troubled. Even if he or she does not wish to cause any harm, the behavior of the person is very delusional and self-absorbed. The person is going to objectify the subject of his/her phone calls. So, repeated, mysterious calls for seemingly no purpose fit the modus operandi of the individual.

Anyone who is receiving phone calls that are disturbing in nature either due to their content or frequency should take some action. Determining who the person is who is making the calls should be the logical first step to take. Finding out who is placing these mysterious calls might end up being easier than initially thought.

White Pages Reverse Phone Lookup App

With an iPhone white pages reverse phone lookup app, the name, address, and other contact information associated with a mysterious call can be revealed. Once you know who is calling you, you can take appropriate legal steps to deal with any harassment.

iPhone Caller ID Apps and Other Ways to Make Your iPhone Safer

iPhone caller ID app

In this day and age, our cellphones our not just gadgets that we simply own, but an important part of our daily lives. It’s not only a device for communication, but we store almost all our personal and sensitive information in it. This is why making our phones more secure is a must. In this article, we’ll share with you our top tips for keeping your info safe, including iPhone caller ID apps.

Don’t Lose Your Phone

There are many apps that help mobile phone users locate the exact location of their devices. To locate a cell phone, it must emit a roaming signal which can be detected by a nearby antenna tower. This process does not require an active call. Nearby antennas locate the phone based off of it’s signal strength.

iPhone users can use Find My iPhone to track where their lost or stolen iPhone is. You will see where your iPhone is with this feature. This program allows you to erase all the contents of your iPhone and lock it remotely so that if you can’t retrieve it others won’t be able to use your phone or steal your information. Android phones have a similar application that they can download and use called Where’s My Droid.

Safety Apps

  • iPhone Caller ID Apps
  • VPN Apps
    • A VPN will allow you to safely browse the internet on coffee-shop and other public Wi-Fi networks. When your phone is connected to the Wi-Fi hackers can infiltrate your phone. A good VPN will block such attacks.
  • Password Vault Apps
    • Chances are that your passwords aren’t strong enough to prevent hackers from breaking into your accounts. You can use a password vault to safe-guard all of your passwords and keep them unique. A good password vault will randomly generate strong passwords for you and remember them for you.
« Previous PageNext Page »