page 2.6.4 protecting yourself from fraud - personal...
TRANSCRIPT
Page | 1 2.6.4
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
RECOMMENDED GRADE
LEVELS AVERAGE TIME TO COMPLETE
EACH LESSON PLAN IS DESIGNED AND CONTINUALLY
EVALUATED “BY EDUCATORS, FOR EDUCATORS.” THANK YOU
TO THE FOLLOWING EDUCATORS FOR DEVELOPING
COMPONENTS OF THIS LESSON PLAN.
10‐12
Anticipatory Set & Facilitation: 130 minutes
Conclusion/Assessment Options: 20‐60 minutes
Time does not include the vocabulary activity or potential modifications.
Tracey Newman, Family and Consumer Sciences Educator, Ste. Genevieve, Missouri
NATIONAL STANDARDS LESSON PLAN OBJECTIVES
The curriculum is aligned to the following national standards: National Standards for Financial Literacy American Association of Family and Consumer
Sciences Council for Economic Education National Business Education National Jump$tart Coalition Common Core English Language Arts
Upon completion of this lesson, participants will be able to: Explain the risks associated with fraud Summarize the main types of fraud Identify how fraud occurs Describe how government agencies help protect
consumers from fraud Apply guidelines for fraud protection Recommend steps for fraud victims to take
MATERIALS
MATERIALS PROVIDED IN THIS LESSON PLAN
MATERIALS SPECIFIC TO THIS LESSON PLAN
BUT AVAILABLE AS A SEPARATE DOWNLOAD MATERIALS TO ACQUIRE SEPARATELY
DEPENDING ON OPTIONS TAUGHT
My Fraud Risk 2.6.4.A1 Don’t Let it Happen To You 2.6.4.A2 Protecting Yourself From Fraud
2.6.4.A3 Fraud Interview 2.6.4.A4 Fraud Interview Rubric 2.6.4.B1 Protecting Yourself From Fraud
Vocabulary List 2.6.4.E1 The Fraud Mystery Acts 1 & 2 2.6.4.H1 The Fraud Mystery Act 3 2.6.4.H2 Solve the Mystery for Lucy Clue Cards
2.6.4.H3 What Should They Do? 2.6.4.H4 Solve the Mystery for Lucy Activity
2.6.4.J1 Protecting Yourself from Fraud Note
Taking Guide 2.6.4.L1
Protecting Yourself from Fraud Information Sheet 2.6.4.F1
Protecting Yourself from Fraud PowerPoint Presentation 2.6.4.G1
Sticky Notes Scratch paper
PROTECTING YOURSELF FROM FRAUD INCLUDING IDENTITY THEFT
Advanced Level www.takechargetoday.arizona.edu
Page | 2 2.6.4
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
RESOURCES
EXTERNAL RESOURCES
External resources referenced in this lesson plan: Federal Trade Commission: www.ftc.gov/bcp/index.shtml
o Videos and games: www.consumer.ftc.gov/media
Federal Bureau of Investigation (FBI): www.fbi.gov/scams‐safety/fraud
National Association of Attorneys General: www.naag.org/
Stop Fraud – Financial Fraud Enforcement Task Force: www.stopfraud.gov
Consumer Financial Protection Bureau: www.consumerfinance.gov
Consumer Jungle Fraud of the Month: http://consumerjungle.org/fraud
OptOutPrescreen: www.optoutprescreen.com
TAKE CHARGE TODAY RESOURCES
Similar lesson plan at a different level: None available
Optional lesson plan resources: Technology Integration Options Active Learning Tool
3.0.50 News Interview Active Learning Tool 3.0.32 Honk if You Like Bumper Stickers Active Learning Tool
3.0.8 Catch Me If You Can Active Learning Tool 3.0.40
CONTENT
EDUCATOR MATERIALS PARTICIPANT READING
Materials to support educators when preparing to teach this lesson plan are available on the Take Charge Today website.
Protecting Yourself from Fraud Information Sheet 2.6.4.F1
OPTIONAL ADVANCE INSTRUCTION
This lesson is designed to be taught as a stand‐alone lesson. However, background content knowledge from the following lesson plans is directly related to this lesson and may be helpful for participants.
Introduction to Depository Institutions 2.2.1 Credit Reports and Scores 2.6.1 Understanding Credit Cards 2.6.3
LESSON FACILITATION
PREPARE
Visual indicators to help prepare the lesson INSTRUCT
Instructions to conduct the lesson facilitation CUSTOMIZE
Potential modifications to lesson facilitation
VOCABULARY ACTIVITY
What is Fraud? Approximate time: 5 minutes Materials to prepare: Sticky Notes Optional: Protecting Yourself from Fraud PowerPoint Presentation 2.6.4.G1 1. Provide each participant with a sticky note.
Page | 3 2.6.4
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
2. Write the definition of fraud on the board or use slide 2 of the Protecting Yourself from Fraud PowerPoint Presentation 2.6.4.G1
3. Ask participants to write what the word fraud means to them on their sticky note. This may include:
a. An example of when they have heard the word used in the past. b. A type of fraud. c. The impact fraud may have on an individual’s well‐being.
4. Group similar responses together and review as a class.
ANTICIPATORY SET
My Fraud Risk Approximate time: 10 minutes at the beginning of instruction and 5 minutes at the end of instruction Materials to prepare: 1 My Fraud Risk 2.6.4.A1 per participant Scratch paper Before instruction: 1. Distribute 1 My Fraud Risk 2.6.4.A1 per participant. 2. Nearly every day, individuals conduct financial activities and correspond with
others in ways that could make them susceptible to fraud. This quiz is designed to identify common activities that, if not conducted properly, increase an individual’s risk of fraud.
3. Instruct participants to answer the questions individually. If a question does not apply to them, N/A (not applicable) is an option.
4. Add the totals. Discuss potential risk. a. Yes to 10‐13 questions – low risk
i. Great job! You are taking steps in your daily activities to minimize your risk of fraud. Keep up the good work!
b. Yes to 6‐9 questions – medium risk i. You may be susceptible to fraud. It is essential for you to
identify potentially harmful behaviors and make changes immediately.
c. Yes to 5 or fewer questions – high risk i. You are highly susceptible to fraud. It you aren’t a victim of
fraud already, you may be soon! It is critical that you examine your current behaviors and reduce your vulnerability.
5. Indicate that this lesson is designed to teach them about the different types of fraud and ways they can protect themselves.
After instruction: 6. Have participants identify three things they can begin doing immediately to
address any potentially risky behaviors. a. This may be completed on a piece of scratch paper or electronic
device. b. This is also the last question on the Protecting Yourself from Fraud
Note Taking Guide 2.6.4.L1.
RECOMMENDED FACILITATION
Conduct this activity electronically using a brainstorming / discussion tool. Refer to Technology Integration Options Active Learning Tool 3.0.50 for assistance.
Page | 4 2.6.4
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
The Fraud Mystery Skit and PowerPoint Approximate time: 120 minutes Materials to prepare: Protecting Yourself from Fraud PowerPoint Presentation 2.6.4.G1 1 Protecting Yourself from Fraud Note Taking Guide 2.6.4.L1 per participant 1 Solve the Mystery for Lucy Activity 2.6.4.J1 1 The Fraud Mystery 2.6.4.H1 and H2 1 set of Solve the Mystery for Lucy Clue Cards 2.6.4.H3 cut apart Preparing The Fraud Mystery 2.6.4.H1 skit: 8 copies of The Fraud Mystery 2.6.4.H1 skit
o Act 1 and 2 of the skit present information about fraud and provide information to solve the crime. Act 3, 2.6.4.H2 reveals the identity of the scammer and should be kept a secret until the end of the lesson.
Identify and prepare eight actors. Provide them with Acts 1 and 2 of the skit in advance of the lesson. Actors may be class participants, community members, parents, other educators, etc.
Optional: Costumes (suggestions provided in the script) Part 1: The Fraud Mystery – Act 1 1. Provide each participant with a Protecting Yourself from Fraud Note Taking
Guide 2.6.4.L1. 2. Conduct Act 1 of The Fraud Mystery 2.6.4.H1 skit. Part 2: Common Types of Fraud 3. Present the Protecting Yourself from Fraud PowerPoint Presentation 2.6.4.G1. 4. Slide 2: Fraud
a. Describe fraud and the ways it can wreak havoc on an individual’s life. 5. Slides 3‐4: Common Types of Fraud
a. Credit fraud may involve mortgages including deceitful foreclosure assistance firms or false advertisement to help a consumer by reducing their APR or monthly payments.
b. Ask participants if they know anyone that has been a victim of fraud and how it affected them.
6. Slide 5: How Does Fraud Negatively Impact Financial Well‐Being a. Fraud negatively impacts an individual’s well‐being by costing them
money and other resources (such as time) as well as creating stress and anxiety.
Part 3: The Fraud Mystery Act 2 7. Slide 6: Conduct Act 2 of The Fraud Mystery 2.6.4.H1 skit.
a. Remind participants to take detailed notes on their Protecting Yourself from Fraud Note Taking Guide 2.6.4.L1. This includes how the scammer accessed Lucy’s information, how she could minimize her risk in the future and evidence for or against each suspect’s innocence.
Part 4: How Fraud Occurs and Steps to Protect Yourself 8. Slide 7: Four Suspects…
a. Review the four suspects.
Have participants find a current example of fraud in the media.
Rather than conducting the skit: ‐ Have participants
work in small groups to read the skit at designated times
‐ Use the note‐taking guide and information sheet to facilitate the lesson.
Encourage participants to volunteer to be the actors.
Video record the skit for use in future classes.
Page | 5 2.6.4
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
b. Ask participants what type of fraud has been committed against Lucy? i. Identify that Lucy is a victim of Identity Theft because her
personal information is being used to access her credit account without her permission.
9. Slide 8: How Does Fraud Occur? a. Ask participants to brainstorm what a scammer can do if they gain
access to a person’s personal information. Answers may include: i. Apply for a new driver’s license ii. Open new bank accounts iii. Apply for credit accounts iv. Get a job v. Rent an apartment vi. File for bankruptcy
10. Slide 9: Personal Information a. Ask participants to search their wallets, purses, and backpacks for all
personal information they are carrying with them. b. Common items with person information that individuals carry include:
i. Driver’s license (name, address, birthday) ii. Debit and credit cards
1. Important to keep information for using these cards, such as a PIN number, in a separate location.
iii. Electronic devices (Smart phones, tablets, etc) 1. Depending on settings and applications used, thieves
may gain access to bank accounts, credit accounts, social media accounts and all personal information)
iv. Identification cards (such as Social Security card, insurance cards)
1. It is recommended that Social Security cards are stored only in a secure location.
c. Stress the importance of minimizing the amount of information accessible by others, even if the information is used on a daily basis.
11. Slide 10: How Thieves Access Personal Information a. Thieves may steal personal information that is carelessly discarded
(not shredded) in the trash. b. By completing a change of address form, thieves may divert mail to a
new location. c. Ask participants how the scammer may have accessed Lucy’s personal
information. All methods are possible, but especially: i. Steal her mail (she did not mail her bills from a secure
location) ii. Divert her mail (she does not monitor her accounts) iii. Phishing (she responded to a company requesting personal
information) 12. Slide 11: Protecting Yourself From Fraud
a. By being a part of the United States community, individuals benefit from government agencies that protect consumers from both intentional deception and things out of their control.
b. While government agencies are able to do a lot, individuals are still their own best advocates and may take steps to protect themselves.
Page | 6 2.6.4
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
13. Slide 12: Protect Your Personal Information a. PIN numbers should be difficult to remember; not easily accessible
such as date of birth, address, phone number, etc. b. All documents containing any personal information should be
shredded in a cross‐cut shredder before being discarded. c. Individuals should be extremely careful of information posted on
social networking site and not post information such as their Social Security number, address, phone number, financial information, etc.
14. Slide 13: Additional Tips a. Individuals should request a free credit report each year from each of
the three credit reporting agencies. They should do so by using the government sponsored website www.annualcreditreport.com.
b. If a company contacts an individual asking for personal information, they should verify the source and contact the company themselves to ensure the contact was legitimate.
15. Slide 14: Be Careful When Using the Internet a. Only secure and trusted websites should be used for making online
purchases and/or entering personal information. b. Safe passwords include a combination of letters, numbers and
symbols that cannot be easily identified. Different passwords should be used for different websites and changed regularly.
c. If asked security questions when setting up a password, choose questions that cannot be easily researched such as your mother’s maiden name.
d. Even if information is deleted online, it may still be accessible by others.
16. Slide 15: Practice Electronic Device Safety a. Only download software from trusted websites. b. Strange computer actions may include pop‐up ads, unexpected
toolbars or icons on the computer screen, random error messages. 17. Slide 16: Credit and Debit Cards
a. Credit cards are better for making online purchases because they have additional fraud protections.
18. Slide 17: What Could Lucy Have Done? a. Ask participants to identify things Lucy could have done to minimize
her risk. Examples are provided in the PowerPoint. 19. Slide 18: Fraud Protection Services
a. Before considering one of these services, research it closely and know that you are your own best advocate, for free, to protect yourself from fraud.
20. Slide 19: Recognize Fraud Early a. The key to minimizing fraud is to recognize it and act early. b. Ask participants if Lucy could have recognized the theft earlier.
i. She was probably not monitoring her accounts closely, may have been missing bills/statements and had not authorized some charges.
21. Slide 20: If You Are a Victim a. Ask participants what steps Lucy should take.
i. She acted immediately and has filed a report with local law
The Federal Trade Commission has a variety of short videos about a variety of topics including fraud protection and what to do if you are a victim of fraud.
Have participants play the Federal Trade Commission’s online games Online Lineup, Invest Quest, Follywood Squares or Cyber Criminal to apply fraud concepts.
Page | 7 2.6.4
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
enforcement. She must also keep detailed records and file a report with the appropriate federal agency.
22. Slides 21‐22: Most Common Government Protection Agencies a. These are the most common agencies. b. Individuals should review the Stop Fraud website for a detailed list of
where to report each type of fraud and additional tips. Specific frauds per agency include:
i. FTC – identity theft, communication credit ii. CFPB – credit iii. FDA – health/medical iv. FCC – communications v. SEC – investment vi. IRS – tax vii. FBI ‐ credit
Part 5: Solve the Mystery 23. Slide 23: Solve the Mystery
a. Conduct the activity as outlined on the Solve the Mystery for Lucy Activity 2.6.4.J1 document.
b. Each time a group answers a question correctly, they will earn a Solve the Mystery for Lucy Clue Cards 2.6.4.H3.
24. Slide 24: Who is Lucy’s Scammer? Act 3 a. Have groups identify who they think the scammer is. b. Conduct Act 3 of The Fraud Mystery 2.6.4.H2 skit to reveal the
scammer.
CONCLUSION OPTIONS There are three conclusion options provided for this lesson. 1. Option 1: What Should They Do? 2. Option 2: Depository Institution Advertisement 3. Option 3: Catch Me If You Can
Option 1: What Should They Do? Approximate time: 20 minutes Materials to prepare: 1 set of What Should They Do? 2.6.4.H4 cards
1. Divide participants into groups of 2‐3. 2. Provide each group with a What Should They Do? 2.6.4.H4 card. 3. In small groups, have participant’s identify the following:
a. What advice they would give each person to address the challenge presented.
b. The government agency that provides protection and/or additional information.
4. Ask small groups to pick a representative to share their challenge and advice. a. Instruct the class to add any additional pieces of advice they would
add.
Option 2: Don’t Let it Happen to You Approximate time: 30 minutes
In small groups, have participants explore a government protection agency website and report 3 interesting facts about that website to their peers.
Page | 8 2.6.4
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Materials to prepare: 1 Don’t Let it Happen to You 2.6.4.A2 per participant 1 Consumer Jungle website – Fraud of the Month article per participant
o Printed in advance or have the participants access the Consumer Jungle website during class
Optional: butcher paper and markers Part One ‐ Research: 1. Provide each student with a Fraud of the Month article from the Consumer
Jungle website and a Don’t Let it Happen to You 2.6.4.A2 worksheet. a. Use articles representing a variety of types of frauds. b. If Internet access is available; have participant go to the Consumer
Jungle website and pick a Fraud of the Month article that interests them.
2. Independently, have participants read their article and complete the Don’t Let it Happen to You 2.6.4.A2 worksheet.
Part Two – Group Sharing: 3. Break participants into groups of 4‐5. 4. Within each group, have the participants share the three things they would
teach others about their fraud article. 5. Have groups then work together to summarize from all of the articles in their
small group, 3 pieces of information they feel the entire class should know about fraud.
a. Optional: provide each group with butcher paper and markers to record their important information.
6. Have each group select a spokesperson to share with the entire class the most important lessons they learned about fraud from the articles.
Option 3: Catch Me If You Can Approximate time: 150 minutes Materials to prepare: 1 Catch Me if You Can Active Learning Tool 3.0.40 1. Refer to the Catch Me if You Can Active Learning Tool 3.0.40 for instructions
and materials. a. This movie is based on the life of Frank Abagnale, who, before his
19th birthday, successfully performed cons worth millions of dollars by posing as a Pan American World Airways pilot, a Georgia doctor, and a Louisiana parish prosecutor. His primary crime was check fraud; he became so skillful that the FBI eventually turned to him for help in catching other check forgers.
ASSESSMENT OPTIONS There are two assessment options provided for this lesson. 1. Option 1: Reinforcement Worksheet 2. Option 2: Fraud Interview
Option 1: Reinforcement Worksheet Approximate time: 20 minutes
Use Fraud of the Month articles from the Consumer Jungle website to conduct the News Interview Active Learning Tool 3.0.32.
Have groups share what they would teach others by creating bumper stickers. Use the Honk if You Like Bumper Stickers Active Learning Tool 3.0.8.
Page | 9 2.6.4
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Materials to prepare: 1 Protecting Yourself From Fraud 2.6.4.A3 per participant 1. Complete the Protecting Yourself From Fraud 2.6.4.A3 reinforcement
worksheet.
Option 2: Fraud Interview Approximate time: 60 minutes Materials to prepare: 1 Fraud Interview 2.6.4.A4 per participant 1 Fraud Interview Rubric 2.6.4.B1 per participant 1. Provide each participant with a Fraud Interview 2.6.4.A4 handout. Instruct
them to interview an adult about their experiences with fraud. 2. Upon completion of the interview, write a one‐page reflection. The Fraud
Interview Rubric 2.6.4.B1 is provided as an evaluation tool.
Page | 10 2.6.4.E1
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Protecting Yourself from Fraud Vocabulary List
TERM DEFINITION
1 Fraud An intentional effort to deceive another individual for personal gain.
Page | 11 2.6.4.A1
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
My Fraud Risk
Total Points Earned
Name
13 Total Points Possible
Date
Percentage
Class
Directions: Which of the following questions apply to you?
□ Yes □ No □ N/A My PIN (personal identification number) is unique (it is not similar to my address, birthdate or other recognizable information).
□ Yes □ No □ N/A I do not carry identification with my Social Security Number on it.
□ Yes □ No □ N/A I never respond to or click on links in emails from individuals or organizations I do not know.
□ Yes □ No □ N/A I have anti‐virus and anti‐spyware software installed on my computer and updated regularly.
□ Yes □ No □ N/A I do not post personal information (address, birthday, etc) on my social media sites such as Facebook, Twitter, etc.
□ Yes □ No □ N/A I use privacy settings on my social media accounts.
□ Yes □ No □ N/A I always read contracts closely (including the fine print) and never sign for anything I don’t want or don’t understand.
□ Yes □ No □ N/A Before throwing them away, I shred documents that include personal information.
□ Yes □ No □ N/A I never respond to requests to update my account information online.
□ Yes □ No □ N/A I review my financial statements (credit statement, depository institution, etc) at least monthly.
□ Yes □ No □ N/A My security questions for any accounts are things only I would know. They are not questions others could research such as my mother’s maiden name or school I attend.
□ Yes □ No □ N/A I use passcode and other security measures on my electronic devices (Smart Phone, Tablet, etc.)
□ Yes □ No □ N/A When selecting a company from which to make an online purchase, I always research their reliability from places like the Better Business Bureau.
Total your responses. Yes:_______________________ No:_______________________ N/A:_______________________
Page | 12 2.6.4.L1
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Protecting Yourself from Fraud Note Taking Guide
Total Points Earned
Name
Total Points Possible
Date
Percentage
Class
Describe the common types of fraud:
How does fraud negatively impact an
What is fraud?
Identity
Theft
Commu‐
nications
Credit
Invest‐
ment
Tax
How does fraud negatively impact
an individual’s financial well‐
being?
Four types of personal information are...
Page | 13 2.6.4.L1
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
The Fraud Mystery Notes
How did the scammer access Lucy’s
information?
What could Lucy have done to minimize her risk
of fraud?
What evidence has the inspector gather for and against
each suspect?
Suspect #1: Colonel Mustard
Suspect #2: Mrs. Peacock
Suspect #3: Mrs. White
Suspect #4: Professor Plum
Eviden
ce:
Eviden
ce:
Eviden
ce:
Eviden
ce:
Page | 14 2.6.4.L1
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Three ways thieves access personal information are...
What are four ways to be careful online?
Four ways to protect your personal information include:
Why should a person monitor their credit reports and financial information?
Page | 15 2.6.4.L1
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
If you are a victim of fraud, what steps should you take?
What are signs of fraud?
Describe four goverment agencies and what fraud(s) they protect against
Why is it recommended to use a credit card instead of a debit card when making online purchases?
Page | 16 2.6.4.H1
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
The Fraud Mystery Acts 1 and 2
Cast:
Inspector—dressed as a detective and holding a notebook
Miss Scarlet—dressed in a bright red evening gown; very glamorous
Mrs. White—wearing white
Mrs. Peacock—wearing blue; work in a peacock feather into her hat
Mr. Green—wearing a green shirt
Col. Mustard—wearing military looking clothing and a shirt that is golden in color
Professor Plum—looking a bit nerdy and wearing a purple shirt
Unlucky Lucy—the guest of the group; dressed in pink: she is clueless and very frail
Setting:
A 20 year class reunion is taking place at a luxurious mansion located in Yonkers.
Act 1:
(Inspector opens the skit by addressing the audience) (Lucy stands beside the Inspector looking distraught)
Inspector: Welcome and thank you for coming to assist me. It is my wish that we had been able to meet under
happier circumstances. You see, there has been a crime committed. As this day progresses you will learn all of the
terrible details of this incident, and you will also meet some of the suspects. Please make sure to take very
accurate notes in your Protecting Yourself from Fraud Note Taking Guide about the victim, the suspects, and the
witnesses to solve the mystery about fraud.
Let me begin with a brief overview of the case, and let you meet our victim. Her name is Lucy, although around
the station she has gained the nickname of “Unlucky Lucy” since she has been through this terrible ordeal. Lucy
has been a victim of fraud. I know, I know, many of you are thinking that this is a victimless crime—that really,
nobody is hurt, since organizations such as depository institutions, credit card companies and insurance
companies simply absorb the losses, but that is a terrible inaccuracy. Not only is it frightening and horribly
inconvenient for the victims, tax dollars are lost investigating and prosecuting this crime, and ultimately,
consumers pay the price for these losses through higher fees at retailers and banks. Fraud also negatively affects a
person’s well‐being and creates negative feelings such as stress and anxiety. But I digress; you must want to meet
Lucy.
Lucy: Oh, inspector! Thank you so much for your hard work to help solve the crime! I’ve been simply ill since the
whole ordeal started and I just want to see justice done! That evil, awful, vile creature who has committed fraud
against me must be caught and punished! But, inspector, I am not quite sure I understand what fraud is.
Page | 17 2.6.4.H1
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Inspector: Lucy! Fraud is such an issue that there are several government agencies working to protect consumer
fraud. There are many types of fraud including identity theft, health/medical, communications, credit, investment
and tax. Regardless of the type of fraud, this deceit often costs the consumer money and creates unnecessary
stress. Audience, can you help explain to Lucy what fraud is and the impact it has on consumers?
Act 2:
Part 2 opens with Lucy in a panic.
Lucy: Oh, Inspector, I had no idea! I am afraid that I have not been protecting myself very well!
Inspector: Now, now, Lucy, pull yourself together so that we can get to the bottom of this! Explain to the
audience exactly what has happened to you these past few days.
Lucy: Now, let’s see…it all began when I first arrived at the mansion on Wednesday. I was so happy to see my
friends from school! It had been ages since we’d all been together. Colonel Mustard was so good to pick me up at
the airport in his giant truck, although his driving habits were a little scary.
Col. Mustard: (enters) Did I hear someone mention my name? Did you want to go hunting and ride in my brand
new 4x4? We could trap some giant bears and kill our dinner! Ahh, I certainly do miss those days in the army
when we were out in the field and depended on nobody but ourselves to find dinner! None of these
conveniences, like running water or electricity! No sirreee! Those were the good old days!
Inspector: Yes, Colonel. I do remember hearing some of those stories the first time that we talked. Those exact
same stories, as a matter of fact…..It’s a good thing you are here, as Lucy and I were just discussing the
unfortunate fraud that has occurred. It seems that someone has taken her personal information and used it to
benefit themselves in many illegal ways…..Lucy, how was it you told me you first realized the problem?
Lucy: Well, inspector, if you must know, I was shopping at the mall when my credit card was declined! Can you
imagine my humiliation? I had finally found the perfect dress for the class reunion, along with shoes, handbag,
and jewelry. When I gave the clerk my credit card, she made a phone call, then cut it up into pieces, right in front
of me! Oh, I feel faint!!!
Colonel Mustard: Look here, Inspector. I don’t know what your problem is, but look how upset you’ve made poor
Lucy. Do you have any leads in the crime yet? Any suspects? Just what are you doing to rectify this situation?
Inspector: Well, it appears that someone has been using Lucy’s credit card to make their own purchases. This is a
form of identity theft. First, let me say that Lucy should be commended for her swift action in reporting the
situation. I always tell citizens that if you are a victim of fraud, act immediately, report the fraud to your local law
enforcement office and keep a detailed record of all correspondence regarding the fraud and your efforts to
repair the fraud.
Colonel, you asked about suspects, and I do have a few in mind. Since you brought up the topic, can you account
for your whereabouts since Lucy has arrived?
Page | 18 2.6.4.H1
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Colonel: YOU have the audacity to question ME as a suspect? What nerve! There is a criminal lurking among us
who is taking personal information from innocent civilians and you are wasting your time asking where I was
during the crime?
Inspector: Um, yep. That about sums it up. So, where were you?
Colonel: I AM INSULTED! I DON’T HAVE TO TAKE THIS FROM YOU!!
Inspector: You still haven’t answered my question, Colonel. If you are innocent, you really don’t have anything to
hide, do you? I do have here in my notes that Lucy had asked you to drop off some outgoing mail for her on
Thursday morning. Can you confirm that?
Colonel: Of course! When we were in the conservatory, Lucy told me she had some bills she needed to mail and
as I was headed to town to purchase hunting supplies, I offered to drop those off.
Inspector: Yes, bills…..bills which had checks in the envelopes?
Lucy: Yes, why?
Inspector: And bills with your account numbers for credit cards?
Lucy: Yes, why?
Inspector: My dear Lucy, one way a criminal accesses your information is by stealing your mail. Think about it,
companies mail a statement to you, you send a check back with a portion of the statement. The check has your
bank account number; the statement has your credit card number. Before long, some thieves even will visit the
post office and fill out a change of address form and have your account information sent to another address!
Lucy: So how do I mail my bills? I have to pay them!
Inspector: Simply put your mail in a secure post office collection box or pay them online using proper security
measures including a secure electronic device with the proper software updates, a safe username and password
and a reliable website. As for you, Colonel, do not leave town until we have cleared up this matter.
Colonel: HOW CAN YOU POSSIBLY SUSPECT ME! (storms off to the side)
Inspector: Ahh, that went well (writes notes in notebook) Ahh, so far we have placed Col. Mustard in the
conservatory, possibly with mail fraud….
Lucy: Oh, inspector, you don’t think my friend the Colonel had anything to do with this?
Inspector: The scammer can easily be someone close to the victim who has access to the personal information
needed to commit the crime. I worked a case last year where a woman opened a credit card using her brother’s
personal information. He had no idea there was an account in his name until she fell behind on the payments and
the collectors began calling him for payments!
Lucy: Oh, my, this is worse than I thought. I feel faint!
Inspector; Now, now, pull yourself together! We’ll get to the bottom of this!
Page | 19 2.6.4.H1
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
(Mrs. Peacock and Mrs. White enter the room gossiping. They stop talking and giggling when they see Lucy and
the inspector)
Lucy: Oh, hello, Mrs. Peacock and Mrs. White. How are you today?
Mrs. Peacock: Oh, dear, hello! We’re just fine. How are you holding up? We heard the terrible news. It’s tragic,
just tragic!
Mrs. White: Yes, terribly tragic! Just remember that if there is anything we can do to help, just let us know.
Mrs. Peacock: Yes, dear, anything at all, don’t hesitate to tell us. I don’t care what those people say about you, we
are here to help you if we can at all…
Lucy: What people? What are they saying? What are you talking about? Oh, I feel faint…
Inspector: Ladies, ladies, thank you for stopping by….do you have a moment for a few questions?
Mrs. White: Oh, well, not really, we are late for Bunco…You know, I’m the regional champ and have been
undefeated this year! Gotta run!
Inspector: Not so fast. We have some serious questions that must be answered in order to solve this case! Can
the two of you tell me about your activities for the last two days?
Mrs. Peacock: Certainly, inspector. Anything we can do to help. Let’s see, I remember when Colonel Mustard and
Lucy returned from the airport. We were so happy to see her again…it’s been too long, dear. You can’t stay away
so long next time. We spent quite a bit of time in the hall, reminiscing. My, that was a wonderful time!
Lucy: Oh, yes, that was grand. I had such a wonderful time I spent half the night posting old photos and memories
on my Facebook account. Remember my old dog, Spot? I posted several stories about the good times we had
together.
Mrs. Peacock: Oh, yes, Spot. He was a good dog.
Inspector: Spot, eh? Lucy, can I ask you an important question now? Most accounts require a four digit PIN
number for security. You didn’t by chance use the digits 7768 to correspond with a telephone keypad so that
SPOT helped you remember your PIN number?
Lucy (shocked): OMG Inspector! How did you know that?
Inspector: One of the most common security mistakes is to use one’s pet’s name, phone number, street number,
date of birth, child’s name, or mother’s maiden name as security questions or PIN numbers on accounts. People
do it all the time because it’s easy for them to remember, but it’s also easy for the criminals to figure out the PIN
number when they steal your debit or credit card or access your account online.
Lucy: Oh, no, MORE of my friends that I can’t trust?
Inspector: I would trust no one, at this point, Lucy. Mrs. White, you don’t seem to have much to say. Can you tell
us about your schedule since Wednesday when Lucy came to town?
Page | 20 2.6.4.H1
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Mrs. White: Well, there isn’t much to tell. I have spent most of my time the past few days preparing meals and
cleaning up so that we could all enjoy some of the excellent dishes I’ve learned how to cook since I’ve become an
avid Rachael Ray fan…she has some of the best recipes!!!
Inspector: So, you’ve spent a lot of time in the kitchen? Has anyone been helping you?
Mrs. White: Oh, no, Inspector. I just love trying out the new recipes and everyone was having such a great time
catching up. It was just simply easier to do it myself. No worries!
Inspector: Thank you, ladies, good luck at Bunco. You are free to go.
Mrs. White & Mrs. Peacock: Thank you, Inspector. Have a fine day!
Inspector: And you as well (as they are leaving he writes more in his notebook) so, now we have placed Mrs.
Peacock in the hall, and Mrs. White in the kitchen.
Lucy: Whatever do you mean? These are my friends, inspector! They would not betray me!
Inspector: You are welcome to think delusional thoughts if you like, Lucy, but my job is to solve the crime and
everyone in my handy dandy notebook is guilty until proven innocent!
Lucy: Oh, my, I feel faint…what can you want with Mrs. White? She was so busy preparing our wonderful
meals….you really should try her Chicken Parmesan, it is to die for!
Inspector: That’s all I need next, a murder! Lucy, think about it, where did you throw away the remains of the mail
you sent? Do you still have them or did you throw the statements into the trash in the kitchen? Where Mrs. White
has been all week?
Lucy: Oh, my, I never thought of that before….
Inspector: And if you are anything like so many of the rest of us, you’ll receive 2‐3 pre‐approved credit
applications each week. Where do you think those will end up?
Lucy: In…..the…….trash?
Inspector: You bet and if the information is not shredded before you throw it away, thieves can steal from your
trash and bingo, they have all the information they need to open a new account for their use with your name right
on it! That’s why it is so important to use a shredder when you have any papers containing personal information.
Lucy, while we are better off being in a community because our government creates and manages agencies that
are designed to protect consumers from fraud, we are really our own best advocates when it comes to protection
from fraud.
Lucy: Oh, Inspector. This is horribly distressing…….
(Professor Plum walks in)
Professor: Inspector, Lucy, good day to all. Has there been any progress in the case?
Inspector: Actually, we are right now interviewing suspects and witnesses and organizing our information.
Page | 21 2.6.4.H1
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Professor: You, sir, are in luck! I am extremely organized and happy to help resolve this case! What can I do to
help?
Inspector: Could you account for your whereabouts since Wednesday?
Professor: Whatever do you mean? Are you seriously considering me as a suspect?
Inspector: At this point we are questioning many people. So, your whereabouts?
Professor: If you must know, I have been in the library, working feverishly on a new research project! By this time
next week, I will have disproven Einstein’s theory of relativity!
Lucy: Oh, my, that is wonderful, professor! I had no idea that is what you were up to! I recalled seeing you in the
library as I was checking my email, checking my depository institution accounts and talking to my friends…
Inspector: Yes, so, you were in the library. Did you use a computer?
Professor: Of course I did.
Inspector: And would that be the same computer Lucy had used earlier in the day to check her accounts?
Professor: Well, there is only the one computer in the library, we all must share it, even if it means waiting for
Lucy to finish doing her banking, posting on Facebook, and all her other mindless activities!
Inspector: I see.
Lucy: I see…
Professor: I must be off to check on my experiments!! Please, do contact me if I can help with this terrible ordeal!
Inspector and Lucy: Have a great day, Professor.
Inspector: (marking in notebook) That puts Professor Plum at the library, with a computer.
Lucy: OH NO! NOT HIM TOO!!
Inspector: Lucy, are you kidding? Technology is wonderful, but is also one more avenue for identity theft. Did you
close the browser after you checked your accounts? Have you used privacy settings on social networking sites to
restrict who can view your information?
Lucy: Ummm, IDK.
Inspector: Of course you don’t. If you have not used privacy settings on your social networking sites it is easy for
thieves to gather lots of personal information from you including your birthdate, address, telephone number and
much more! If the browser isn’t closed, the next person on the computer can simply go back to where you were
and they have access to all your account information. Don’t forget about phishing and other fraudulent emails!
Lucy: Fishing? Sounds like something the Colonel would love!
Page | 22 2.6.4.H1
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Inspector: Not fishing with an “f”, Lucy, phishing with a “ph”. Phishing is when emails are sent requesting personal
information or account numbers. Thieves are “fishing” for any information they can get in order to steal your
identity.
Lucy: Oh, this is terrible…. What is this world coming to, Inspector?
Inspector: Oh, Lucy, whatever will we do with you?
(Miss Scarlet walks in)
Miss Scarlet: Oh, hello, darlings. Lucy, I was so sorry to hear of your terrible incident. If there is anything at all I
can do, please don’t hesitate to let me know.
Lucy: Oh, thank you, Miss Scarlet. That is so very kind of you.
Inspector: As a matter of fact, we do have a few questions you could answer. What have your activities been since
Wednesday?
Miss Scarlet: Of course, darling. Yes, well, when Lucy came to the mansion, the rest of the classmates welcomed
her back with a reception in the billiards room, but unfortunately I had a horrible migraine and was ill in my room.
Inspector: So you never attended the reception?
Miss Scarlet: Yes, that is correct darling. I was unable to attend. So very ill I was.
Lucy: Yes, I remember that…you had a headache. The rest of us missed you. Are you feeling better yet?
Miss Scarlet: Why yes, darling, I am much better now. Although the doctor did tell me to be sure to rest, so I must
be going now.
Inspector: Of course you will.
Lucy: Goodbye, Miss Scarlet!
(Miss Scarlet leaves the stage)
Inspector: Clearly, Miss Scarlet cannot be ruled out. She has no witnesses to substantiate her alibi. She could
easily be the culprit!
Lucy: Surely not, Inspector!
Inspector: Don’t be so naïve, Lucy! She wasn’t at the reception and has no one to back up her story that she was
sick in her room. According to my notes, here, (look through notepad) you were using your smart phone during
the reception and responded to an email from your bank, is that correct?
Lucy: Yes, it is but I don’t see where you are…
Inspector (interrupting): And what did your bank want, Lucy? Why were they contacting you?
Page | 23 2.6.4.H1
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Lucy: Oh, that was nothing, inspector. They just wanted to verify my PIN number and account number. The email
was very kind and had to confirm my information due to some sort of computer problem they’d had recently….
Inspector: Oh, Lucy, you didn’t submit your information, did you?
Lucy: Um, well, yes, of course I did.
Inspector: Of course you did (rolls his eyes). Lucy, really, don’t you know that your bank will not call or email you
to obtain that information! You should never give that information out over the telephone or an email! How do
you know who exactly was contacting you? There is no way to know who you gave that information to!
Lucy: Oh, no, you don’t think that……
Mr. Green (walks in): Lucy, Inspector, good day. How is the investigation coming along?
Lucy: Oh, Mr. Green. This day just keeps getting more and more complicated. Is there no one I can trust?
Mr. Green: That is horrible to hear, Lucy. What can I do to help?
Inspector: I do have a few questions, if you have time to answer them, Mr. Green.
Mr. Green: Of course I can answer some questions. Anything to help find and punish the criminal in this case.
Inspector: Excellent. Now, can you tell me where you were and what you did Wednesday evening?
Mr. Green: Well, of course I attended the reception in Lucy’s honor, and afterwards I well, I met a friend in the
ballroom, if you must know.
Inspector: A friend, you say?
Lucy: Oooh, Mr. Green....that sounds so very romantic...is it anyone I know?
Mr. Green: Well, yes, I mean no. I mean...
Inspector: Which is it? Yes or no?
Lucy: Oh, no, not you, too. All of my friends have betrayed me, it seems....whatever will I do!!!
Mr. Green: ITS NOT WHAT YOU THINK! STOP JUMPING TO CONCLUSIONS!!! Oh, if you must know, I was in the
ballroom
Inspector and Lucy: Yes, go on
Mr. Green: With....
Inspector and Lucy: Yes, go on
Mr. Green: Miss Scarlet was giving me dancing lessons in the ballroom! There, now, are you happy? The surprise
is ruined!!
Inspector: What surprise?
Page | 24 2.6.4.H1
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Lucy: Yes, what surprise?
Mr. Green: Lucy, I was trying to learn some salsa moves to impress you. I know that back in school you never
really noticed me but spent all of your time following around Professor Plum like he had discovered plutonium or
something....this was finally my chance to get your attention, and now look at how it has all turned out.
Lucy: Oh, my, Mr. Green, I had no idea how you felt.... (bats her eyes and rubs Mr. Green's arm)
Inspector: Oh, my, salsa lessons? Really? Now that is awkward....
Mr. Green: Yes, it’s true. You can ask Miss Scarlet even, she can confirm my presence there with her.
Inspector: Now then, that will remove two of the potential suspects...leaving us with
Colonel Mustard, in the conservatory;
Mrs. Peacock, in the hall;
Mrs. White, in the kitchen, or
Professor Plum, in the library.
Lucy: Inspector, I just don’t know what to say! I can’t believe one of my friends would betray me in this way!
Inspector: Lucy, there is no need to dwell on what has already occurred. Look on the bright side, we are very close
to determining which of these suspects was the true scammer and in the future you will know how to prevent
fraud and determine when it is occurring.
Lucy: Well, Inspector, that is what I am worried about. I understand what fraud is and steps that I can take to
prevent it from happening, what I don’t understand is how I could have known that it was happening to me
before I was humiliated in the mall by having my credit card denied? Because after all, it was not like my purse
was stolen from me. I think I would have noticed if my designer bag as well as my wallet was missing!
Inspector: Well, Lucy, being denied credit when you do not believe there is a reason to be is usually a clear sign
that something is wrong. Other ways to recognize fraud include receiving calls from collection agencies, being
denied credit when you do not believe there is a reason to be, not receiving or noticing incorrect information on
bills or depository institution statements, or finding incorrect information on your credit report.
Lucy: So, what should I do if this happens to me again?
Inspector: Lucy, you did the right thing by acting immediately and filing a report with the local police, but there
are other steps that should be taken if you suspect your identity has been stolen. You should keep very accurate
records of all the correspondence between you and all of the other parties involved. You should also report fraud
to the appropriate federal agency which may provide additional instructions depending on the type of fraud.
Lucy: Thank you Inspector! I feel so much more knowledgeable regarding fraud. I’m shocked to learn the many
ways that these vile thieves can wreak havoc in the lives of people who are just minding their own business!
Page | 25 2.6.4.H1
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Inspector: Actually, Lucy, there are many other ways besides what we have discussed today, that thieves can
commit fraud and inflict pain on their victims.
Lucy: Oh, no! Inspector! What else do I need to know to protect myself?
Inspector: Well, Lucy, I don’t want to alarm you, but there are many types of fraud. Just a few examples include
communication fraud, credit fraud, investment fraud and tax fraud. There are several government agencies, such
as the Consumer Financial Protection Bureau who work to protect consumers and have informative websites
where you can learn more.
Lucy: Oh, Inspector, there is simply so much to know to protect yourself! Thank you so much for sharing your
knowledge with us today! Now, we have to discover who the true scammer is!
(Inspector addresses the audience)
Inspector: Distinguished guests, you must increase your knowledge of fraud and help Lucy and I solve this terrible
crime. Listen carefully during the rest of this lesson, because later, you will have a chance to receive more clues
regarding this crime and the suspects involved by playing Solve the Mystery for Lucy and testing your knowledge.
Make sure to play close attention, so that we can solve the case once the additional clues have been gathered.
Page | 26 2.6.4.H2
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
The Fraud Mystery Act 3
Act 3:
(Inspector and Lucy on stage) (Inspector is addressing the audience)
Inspector: Thank you, kind friends, for learning more about this fraud, identity theft, in order to help us
resolve this matter. With your help gathering additional clues, we now know that there is only one true
scammer in the case of the stolen identity. It was someone who claimed to be an avid cook, but was really
cooking up a scheme for some easy money. Mrs. White is guilty of identity theft in the kitchen, by doing a
little digging in the trash and getting Lucy's account information from discarded statements and mail. We
caught Mrs. White through the lies she told during her interview. She claimed to be a champion at Bunco and
professed her love for cooking and the cooking diva, Rachel Ray, while in reality, she was using these lies to
cover her theft. Also, her persistence to retrieve the mail everyday was a sure fire clue to her guiltiness.
Lucy: Thank you very much for all of your help inspector, and I thank all of you for helping me solve this crime
and regain my identity. I will make sure to protect myself more closely in the future!
Page | 27 2.6.4.J1
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Solve the Mystery for Lucy Activity
Directions:
1. Divide participants into four total groups (the number of participants in each group does not have to be equal).
2. Each group will take turns verbally answering a question about fraud. 3. Group members are allowed to discuss the answer to the question. 4. If the question is answered correctly, the group will receive a Solve the Mystery for Lucy Clue
Card 2.6.4.H3 clue that will help reveal Lucy’s scammer. 5. If the question is answered incorrectly, the group will not receive a clue card. 6. Play will continue until all 12 clues have been won. Each group will have at least 3 chances to
receive a clue.
Questions and Answers:
1. Describe two types of fraud. a. Identity theft (personal information used without permission) b. Communication (occurs via mass marketing to deceitfully receive money from people) c. Credit (often mortgages) d. Investment (deception of investors) e. Tax (false claims to exempt people from paying taxes)
2. Identify three types of personal information. a. Name, address, telephone number, social security number, driver’s license number, birth
date, credit card numbers, bank account numbers 3. Where should outgoing mail be deposited?
a. In a secure post office collection box. 4. What are three ways personal information can be used fraudulently?
a. Information identity thieves acquire can be used in numerous ways including to apply for new driver’s license, to open new bank and credit accounts, to apply for credit cards or store credit accounts, to obtain cash with bank cards, to get a job, to take out student loans, to rent an apartment, to make retail purchases, to get a phone or other utilities, to file bankruptcy, or to give a person’s name during an arrest
5. Describe two methods that thieves use to acquire personal information? a. Stealing, diverting mail, skimming, phishing, hacking
6. What is phishing? a. When email is use to pretend to be a company or depository institution requesting
personal information from an individual. 7. How often should a person request their credit report?
a. A credit report should be requested from each of the three credit reporting agencies annually.
8. What should a person do if he/she receives a pre‐approved credit card and does not want to use it?
a. Pre‐approved credit card offers should be shredded using a cross‐cut shredder. 9. What are two steps a consumer should take if they are a victim of fraud?
Page | 28 2.6.4.J1
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
a. Act immediately, keep a detailed record or correspondence, report fraudulent activities to the local law enforcement, report to the appropriate federal agency (the Stop Fraud website provides this information)
10. Should a credit card or debit card be used when making online purchases? a. Credit card
11. What are two warning signs of fraud? a. A business has taken your money but not fulfilled their promises/obligations or won’t
return your attempts to contact them, charges that you did not make are on your financial accounts, you are denied credit when you do not believe you should be, you are missing bills or mailed statements, there are errors in your credit report
12. What is the Stop Fraud website? a. A website sponsored by the government that includes a detailed list of where each type
of fraud should be reported. 13. What does “You are better off being a part of a community than by yourself” mean in relation to
fraud? a. Individuals benefit from protections that government agencies provide.
14. Name two information sources that should NOT be used as a password, PIN number, or security question.
a. Birthdates, mother’s maiden name, addresses, anniversaries, and phone numbers. 15. What are two ways a person protect themselves when using social media sites?
a. Use privacy settings to restrict who may view your information, remember that once information is posted online, it can be viewed by anybody, keep usernames and passwords safe, do not post personal information such as your Social Security number, phone number, address, and financial information
16. What are two ways fraud can negatively impact an individual’s financial well‐being? a. Cost money, other resources such as time, create stress and anxiety
17. What should an individual sign on the back of debit and credit cards? a. Their signature and “Please See ID”
18. What are two ways an individual may protect themselves when using the Internet? a. Look for https or a picture of a lock to be sure sites are secure when providing personal
information, keep usernames and passwords safe, use credit, not debit, cards for purchases, make sure your computers anti‐virus and anti‐spyware software is up‐to‐date
19. If considering a fraud protection service, what should a consumer research? a. The exact fees, if the company is legitimate and what will be covered.
20. Identify one consumer protection agency and the fraud protection it provides a. FTC – identity theft, communication credit, cfpb – credit, FDA – health/medical, FCC –
communications, SEC – investment, IRS – tax, FBI ‐ credit
Page | 29 2.6.4.H3
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Solve the Mystery for Lucy Clue Cards
Solve the Mystery for
Lucy Clue Card
Solve the Mystery for
Lucy Clue Card
Colonel Mustard’s room was searched
turning up three brand new books of
stamps and hunting supplies.
Mr. Green accompanied Colonel
Mustard to the post office where he
dropped Lucy’s bills into the secure
mail collection box and purchased
three books of stamps.
Solve the Mystery for
Lucy Clue Card
Solve the Mystery for
Lucy Clue Card
Colonel Mustard received the Most
Honest Officer while serving in the
Army.
Mr. Green overheard Mrs. White
saying that “Rachel Ray has nothing
on Julia Child.”
Solve the Mystery for
Lucy Clue Card
Solve the Mystery for
Lucy Clue Card
Mrs. White always loses at Bunco but
is champion at Wii Bowling.
Mrs. White has been seen recently
enjoying her new iPad.
2.6.4.H3 2.6.4.H3
2.6.4.H3 2.6.4.H3
2.6.4.H3 2.6.4.H3
Page | 30 2.6.4.H3
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Solve the Mystery for
Lucy Clue Card
Solve the Mystery for
Lucy Clue Card
Mrs. White insists on being the first to
get the mail out of the mailbox.
Mrs. Peacock’s profile on Facebook
has recently added photos of the old
gang. Spot is not tagged in any of
them.
Solve the Mystery for
Lucy Clue Card
Solve the Mystery for
Lucy Clue Card
Mrs. Peacock is going on a cruise to
Jamaica next month.
Mrs. Peacock refuses to purchase
items with anything but cash or
check. She does not use debit or
credit cards.
Solve the Mystery for
Lucy Clue Card
Solve the Mystery for
Lucy Clue Card
Professor Plum has a full‐time
assistant at the university. Her only
job is to complete all of his computer
research.
Professor Plum just received a huge
shipment of lab rats and
microscopes for his new project.
2.6.4.H3 2.6.4.H3
2.6.4.H3 2.6.4.H3
2.6.4.H3 2.6.4.H3
Page | 31 2.6.4.H4
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
What Should They Do?
Spencer wants to purchase a pair of new shoes from
the internet. What steps should he take to prevent
fraud while making the purchase?
Xavier is paying his bills. What steps should he take to
protect himself from fraud for the bills that he mailed,
as well as the bills that he paid online?
Landon went out to eat and left his debit card at the
restaurant. The next day he called the restaurant and
they said they didn’t have the card.
What steps should he take?
Kieran was reviewing his credit card statement. He
noticed several charges he did not make.
What should he do?
Bryce received an email from his credit card company
asking for online verification of his personal
information.
What should he do?
Cameron received a pre‐approved credit card offer in
the mail. She does not want to use this card.
What should she do?
Noelle is leaving for a two‐week vacation. All of her
mail is delivered to an unsecured mailbox in front of
her house.
What should she do?
Ava recently bought a new computer. What should she
do to ensure her computer is safe and secure?
Zarah recently became a member of a social
networking website. What information can she safely
post vs. information she should not post?
Kimani was approached by an individual from the
“Make All of Your Financial Dreams Come True”
organization promising her a high return on any
investment she makes with them.
What should she do?
Isaiah wants to lose five pounds. His friend told him
about an herbal supplement guaranteed to help him
lose weight. What should Isaiah do before taking the
supplement?
Avery is buying a new cell phone. When purchasing the
phone, she was asked to sign a contract that included
several additional options. What should she do before
signing the contract?
2.6.4.H4 2.6.4.H4
2.6.4.H4 2.6.4.H4
2.6.4.H4 2.6.4.H4
2.6.4.H4 2.6.4.H4
2.6.4.H4 2.6.4.H4
2.6.4.H4 2.6.4.H4
Page | 32 2.6.4.A2
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Don’t Let it Happen To You
Total Points Earned
Name
9 Total Points Possible
Date
Percentage
Class
Directions: Use a Fraud of the Month article from the Consumer Jungle website (www.consumerjungle.org)
to answer the following questions.
What are three things you could teach others about this type of fraud? Examples include how they can
protect themselves, what to watch for, or how to learn more information. (3 points)
What type of fraud is your article about? How do you know? (2 points)
Describe the fraud in your own words. (1 point)
What are two ways or reasons why consumers
make themselves susceptible to this type of fraud? (2 points)
1.
2.
If someone was a victim of this type of fraud, which government protection agency should they report to? (1 point)
Page | 33 2.6.4.A3
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
A. Tax
B. Investment
C. Identity Theft
D. Communications
E. Credit
Protecting Yourself From Fraud
Total Points Earned
Name
24 Total Points Possible
Date
Percentage
Class
Directions: Match the type of fraud with the correct example by placing the letter on the appropriate blank. (1 point each)
1. ________ Kyler learned her identity had been used during an arrest, but she hadn’t been arrested.
2. ________ Zander received an email asking him to pay money to rescue individuals in a foreign country. After further research, he discovered this organization did not exist.
3. ________ Derek has been approached by a company making claims that he does not owe taxes this year even though he has been working for pay.
4. ________ Jada is considering re‐financing her home and received an ad from a company offering staggeringly low interest rates.
5. ________ Brielle is researching tools to invest her money into and has found
one with guaranteed returns.
Directions: Answer the following questions by writing a short answer.
6. Xavier is considering purchasing a new tablet online; what are three steps he should take to protect
himself from fraud? (3 points)
7. Neema has joined several social networking websites. What are three things she should do to protect
herself from fraud? (3 points)
Page | 34 2.6.4.A3
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
A. Computer
B. Skimming
C. Phishing
D. Stealing
E. Diverting mail
8. If you were to advise someone about the warning signs of fraud, what are two pieces of advice you
would provide to them? (2 points)
9. How does the federal government work to protect consumers? (1 points)
Directions: Match the way fraud may occur with the correct example by placing the letter on the appropriate blank. (1 point each)
10. _______ A scammer uses information that was carelessly discarded in the
trash.
11. _______ A scammer is using email to pretend to be your depository
institution.
12. _______ A scammer has attached a device to a gas pump to access credit
card information.
13. _______ A scammer has completed a change of address form for an
individual’s financial statements.
14. _______ A scammer has hacked into a computer to access their
information.
Directions: Indicate if each statement is True or False by writing a T or F on the line. (1 point each)
15. _______ A debit card should be used when making online purchases.
16. _______ Consumers should access each of their three credit reports at least once per year.
17. _______ Once information is posted online, it can be easily deleted.
18. _______ Individuals should always purchase fraud protection if available.
19. _______ Constantly monitor financial information to reduce your risk of fraud.
Page | 35 2.6.4.A4
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Fraud Interview
Total Points Earned
Name
10 Total Points Possible (10 points for completion)
Date
Percentage
Class
Directions: Interview an adult about their experiences with fraud.
1. Have you ever been a victim of fraud? If so, explain what happened and how it affected you.
2. What are five actions you take to protect yourself against fraud?
3. What are warning signs individuals should be aware of that would indicate they may be a victim of fraud.
4. Do you have any fraud protection services? If so, describe the service and why you have it.
5. If you were to share one piece of advice about fraud, what would it be?
Page | 36 2.6.4.B1
© Take Charge Today – August 2013 – Protecting Yourself From Fraud Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Institute at The University of Arizona
Fraud Interview Rubric
Total Points Earned Name
18 Total Points Possible Date
Percentage Class
Directions: Write a reflection on your fraud interview. Your reflection should include responses to the following questions: What are two things you learned about fraud? Based upon your interview, what are three things you could teach the interviewee about fraud that they
might not already know and why?
Exemplary Satisfactory Unsatisfactory No Performance
Score
Content Both required questions are
answered with thoughtful responses
12‐9 8‐5 4‐1 0
Quality of Essay Easy to understand Accurate (no errors in content
or grammar) Well‐organized with an
introduction, body and conclusion
Presented as a one‐page letter, typed, double‐spaced, 12‐font and 1‐inch margins
6‐5 4‐3 2‐1 0
Total Points Earned
Total Points Available 18
Percentage
2.6.4.F1
© Take Charge Today – August 2013 – Protec ng Yourself From Fraud – Page 1 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Ins tute at The University of Arizona
Protec ng Yourself from Fraud Including Iden ty The
Advanced Level
Fraud is an inten onal effort to deceive another individual for personal gain. Fraudulent the of your iden ty can
wreak havoc on your life resul ng in arrests for crimes you did not commit, damage to your financial security, tarnished
credit reports. In some cases it can even compromise your health. Other types of fraud involve decep on in an effort to
sell over‐valued or ineffec ve products. Some of the most common types of fraud include:
Iden ty the :
○ This type of fraud occurs when your personal and financial informa on is used without your permission. Iden ty
thieves may use your personal informa on to apply for credit or employment, make purchases for goods or
services, acquire new bank or credit accounts, or apply for a driver’s license. If a person using your iden ty is
halted for a traffic viola on or arrested, it goes on your record.
Communica ons:
○ This fraud strikes when thieves fraudulently use mass marke ng, mailings, telephone solicita ons and other forms
of communica ons to try and extract money directly from you, or to trick you into giving them your personal
informa on, account numbers, personal iden fica on numbers and passwords.
Credit:
○ Credit card fraud occurs when a thief uses your credit card number to make purchases. Another common example
of credit fraud involves foreclosure assistance firms that claim they can help struggling homeowners save their
home from foreclosure or lower their mortgage payments in exchange for an advance or monthly fee.
Investment:
○ In this type of fraud, investors are deceived by people
claiming to be financial advisors or claiming to have an
investment that is guaranteed to make you money.
Tax:
○ Tax fraud involves scammers making claims that
you might be exempt from filing tax returns and/or
offering to file your tax return in exchange for your
personal informa on.
There are many common sense, no‐
cost measures you can take to protect
yourself against iden ty the and
fraud, but you have to take control and
responsibility to protect yourself.
Do you know anyone who has been a vic m of fraud? How did it
affect them?
2.6.4.F1
© Take Charge Today – August 2013 – Protec ng Yourself From Fraud – Page 2 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Ins tute at The University of Arizona
How Does Fraud Occur?
Scammers are people who take advantage of your willingness to trust others. Most scammers start by building a level of
trust with you. They may make a promise to deliver a product or service in exchange for money they will ask you to pay
upfront. Some scammers are so good at what they do that you feel very comfortable giving away your personal
informa on. Next thing you know the scammer has your name, address, phone number, and maybe even your social
security number and other financial informa on. Scammers are professional thieves. Being aware of their techniques and
opera ons will help ensure your financial well‐being and security
These thieves can access your personal informa on in a variety of ways. The thief
might:
○ Steal a purse/wallet, personal records from a workplace, mail, including
informa on carelessly discarded in the trash or recycling bin.
○ Divert mail by comple ng a change of address form at the Post Office to
have all of your mail delivered to them. By doing this they raise the chance
of obtaining bank statements, credit card informa on and other personal
details that can be used for the thief’s benefit.
○ Skim your credit and debit card informa on, including your personal iden fica on
number (PIN), by a aching a device to card processors or ATM machines.
○ Phish for personal informa on by pretending to be a company or depository ins tu on reques ng sensi ve
informa on from you via email.
○ Hack your computer or install spyware to monitor your internet use, send you pop‐up ads, and redirect your
computer to other sites.
Protec ng Yourself from Fraud
You are be er off being in a community than by yourself. The government creates and manages agencies that are
designed to protect you from fraud. The Federal Trade Commission (FTC) is the na on’s consumer protec on agency. It
collects complaints filed by consumers regarding iden ty the and many types of unsavory business prac ces. In addi on,
to protect consumers from unfair, decep ve or abusive financial transac ons, the Consumer Financial Protec on Bureau
(CFPB) was created by Congress in 2010. The CFPB wants to hear consumers’ viewpoints on ways to provide effec ve, safe
and affordable access to consumer financial products. It also invites consumers to submit a complaint about a consumer
financial product or service, at which point the agency will forward the complaint to the company and work to get a
response (www.consumerfinance.gov/complaint).
But, you are also responsible for yourself. Government agencies can do a lot to protect you from fraud, but the best way
to avoid fraud is to be alert to the risk and protect yourself. Here are a few basic guidelines to help protect you and your
personal informa on:
Evaluate a situa on before giving away money or personal informa on ○ Don't give out personal informa on over the phone, through the
mail or on the Internet unless you've ini ated the contact and are
sure you know with whom you are communica ng.
○ Before providing any personal informa on requested in an email
or on a phone call verify the source.
○ If you are unsure of a company reques ng money or personal
informa on check that company’s history with the Be er
Business Bureau.
What are three things you can begin doing
today to protect yourself from fraud?
Bank Account Numbers
Name
Address & Telephone Number
Credit Card
Numbers
Birthdate Driver’s License Number
Social Security Number
Personal Informa on
2.6.4.F1
© Take Charge Today – August 2013 – Protec ng Yourself From Fraud – Page 3 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Ins tute at The University of Arizona
Protec ng Yourself From Fraud Con nued…
Protect your personal informa on
○ Don’t carry your Social Security card with you. Store it in a secure loca on.
○ Sign the back of your credit and debit cards with signature and “Please See Picture ID.”
○ Memorize your debit card PIN number. Think of an unusual combina on of numbers to use for your PIN and not a
familiar combina on such as your birthdate or street number.
○ Shred all personal documents before discarding them.
○ Use a fireproof safe to keep personal records.
○ Use your local post office to mail your bills and other documents. Your personal mailbox is not very secure.
○ The internet, including all the social network sites, offers easy venues on which to share personal informa on. Be
careful never to post your Social Security number, address, phone number, birth date, or any financial informa on.
Check your credit reports for errors
○ You can request a free credit report from a na onal
credit repor ng agency once every 12 months. If
you get the reports at the same me, you can
determine whether there are any errors across the
bureaus. By reques ng the reports separately, you
can monitor your credit file at no cost more
frequently throughout the year. Immediately file a
dispute if inaccurate informa on is reported.
Monitor your financial informa on
○ To minimize fraud and lessen damages caused by iden ty
thieves monitor your financial informa on (credit
statements, bills, and depository ins tu on statements)
on a regular basis. No cing suspicious ac vity or pos ngs
early can help you catch fraud quickly.
Be careful when using the Internet
○ Before giving out any personal or financial informa on on
a website, look for the le ers “h ps” or a picture of a lock
either a er the URL or in the bo om right hand corner of
the page. These two indicators signify the site is secure.
Only give out personal informa on when purchasing from
a secure site.
○ Use a credit card instead of a debit card when making
online purchases. Credit cards have addi onal fraud
protec on.
○ Keep usernames and passwords safe. Choose a
combina on of le ers, numbers, and symbols not easily
iden fied. Use different usernames and passwords for
different sites and change them regularly. Select security
check ques ons with answers only you would know or
items that cannot be easily researched such as your
mother’s maiden name, school name, etc.
○ Do regular searches of yourself checking to see if your
name, picture or other personal informa on is being used
by someone else.
○ Remember that once informa on is posted online, it
cannot be taken back. Even when informa on is deleted,
older versions may s ll exist on other computers and can
be circulated online.
○ Use privacy se ngs on social networking sites, blogs, and
other sites to restrict who is able to view your informa on.
Prac ce electronic device safety
○ Use an ‐virus and an ‐spyware so ware and
update these security programs regularly.
○ Do not click on links found in pop‐up
adver sements or in suspicious email. Only
download so ware from trusted websites.
○ Watch for strange ac ons that might indicate a
computer is infected with spyware. You might see
a stream of pop‐up ads, unexpected toolbars or
icons on the computer screen and random error
messages.
Credit and debit cards are protected from fraud:
○ Credit cards: A credit card cardholder’s maximum liability for
unauthorized use of a credit card is $50. If loss of a credit card
is reported before the credit card is fraudulently used, the
cardholder has no personal liability for unauthorized charges.
If the credit card number is used fraudulently, but the credit
card itself is not used, the cardholder has no personal liability.
○ Debit card: Personal liability for unauthorized use of a debit card
depends on how quickly the loss is reported as well as the
policies of each depository ins tu on. Personal liability can
be $0, $50 (with 2 days), $500 (within 60 days), or unlimited
(a er 60 days). Monitor your informa on and report any
fraudulent uses or suspicions immediately.
2.6.4.F1
© Take Charge Today – August 2013 – Protec ng Yourself From Fraud – Page 4 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Ins tute at The University of Arizona
Fraud Protec on Services
Depository ins tu ons, credit card companies and other businesses offer various types of fraud protec on. Fraud
protec on may be included in a purchase, offered as an addi on to a purchase or purchased independently. Services may
include:
○ Fraud monitoring and detec on
○ Cost recovery if fraud occurs
○ Legal counsel if fraud occurs
You are your best advocate. You can perform many of the services provided by
fraud protec on services at no cost if you educate yourself on what to look for and
who to contact should a problem arise.
If you are considering purchasing fraud protec on, research exactly what is
covered and your total cost. Even if the service is free, conduct research to ensure
the company’s legi macy.
Would you purchase a fraud protec on service? Why or why not?
What to do if you are a Vic m of Fraud
If you think you are a vic m of fraud it is of utmost importance to immediately report it to the authori es. This
minimizes any damages to your financial stability and well‐being. Learn to recognize fraud by watching for signs such as:
○ A business that has taken your money but hasn’t fulfilled their promises/obliga ons or won’t return your a empts
to contact them
○ Unfamiliar or unrecognizable charges on your financial accounts
○ Being denied credit when all requirements say you should qualify
○ An cipated mail (such as bills or account statements) is not being delivered to
your personal mailbox
○ Your credit report contains incorrect informa on If you are a vic m of fraud,
act immediately and keep a detailed record of all correspondence regarding
the fraud and your efforts to repair the fraud.
If you are a vic m of fraud, act immediately and keep a detailed record of all correspondence regarding the fraud and
your efforts to repair it.
Fraudulent ac vi es should be reported to your local law enforcement office. Fraud should also be reported to the
appropriate federal agency depending on the type of fraud. The Stop Fraud website is sponsored by the government
and includes a detailed list of where each
type of fraud should be reported
(h p://www.stopfraud.gov/report.html).
Depending on the type of fraud, the
government agency may provide
addi onal ps or ac ons for helping
repair the specific type of fraud.
The Stop Fraud website will tell
you which agency to report to and
provide specific ps depending on
the type of fraud.
Act Immediately
Keep detailed records
File a report with your local law
enforcement
Report to the appropriate federal agency
2.6.4.F1
© Take Charge Today – August 2013 – Protec ng Yourself From Fraud – Page 5 Funded by a grant from Take Charge America, Inc. to the Norton School of Family and Consumer Sciences Take Charge America Ins tute at The University of Arizona
The following table iden fies a few of the most common government agencies and how each agency protects you:
Government agency How the agency protects
consumers
Types of fraud to report to
this agency
*Review the Stop Fraud
website to determine which
agency to report your
par cular fraud to
Website
Federal Trade
Commission (FTC)
○ Prevent business
prac ces that are
an compe ve,
decep ve or unfair to
consumers
○ Enhance informed
consumer choice
○ Iden ty The
○ Communica on
○ Credit
www. c.org
Consumer Financial
Protec on Bureau (cfpb)
○ Make markets for
consumer financial
products and services
work for Americans —
whether applying for a
mortgage, choosing
among credit cards, or
using any number of
other consumer financial
products.
○ Credit www.consumerfinance.gov
Federal Drug
Administra on (FDA)
○ Protect the public health ○ Health/Medical www.fda.org
Federal
Communica ons
Commission (FCC)
○ Regulate interstate and
interna onal
communica ons by radio,
television, wire, satellite
and cable
○ Communica ons www.fcc.gov
US. Securi es and
Exchange Commission
(SEC)
○ Protect investors and
maintain fair, orderly, and
efficient financial markets
○ Investment www.sec.gov/
Internal Revenue Service
(IRS)
○ Enforce tax laws ○ Tax www.irs.gov
Federal Bureau of
Inves ga on (FBI)
○ Protect the United States
and its ci zens
○ Credit www. i.gov
Government agencies work to protect you from fraud. However, you are responsible for yourself. You
are your best advocate. The best way to avoid fraud is to educate and protect yourself.