• Unit 9: Financial scams

    TOPIC 1 Sustainable Development: Ethics

    Key unit competence: To be able to protect oneself against financial scams and identity fraud

    Activity

    Explain different ways in which people are conned of their money by fraudsters or criminals worldwide. Describe ways people can use to protect themselves from such people.

    9.1 Concept of financial scams


    Activ ity 1
    Answer the following questions.
    1. Research and find out examples of financial scams that are on the rise in the country since the introduction of mobile and online banking.

    2. Visit a bank near your school. Ask a resource person at the bank the following questions.
         a) Have they witnessed cases of financial scams at the bank?
         b) What methods were used by fraudsters to steal money from innocent people?
         c) How can individuals protect themselves from fraudsters?

    Financial scams are deceptive schemes used by fraudsters to rob people and business organisations off their money. Fraudsters are also called financial scammers. Financial scams do not involve documentation since most of the information they provide is falsified. Financial scams are treated as serious crimes and a violation of civil law. Financial scamming is also called white collar crime because of the non-violent means used to rob victims off their money.

    In the world, there are numerous financial fraudsters who have robbed people and organisations off billions of dollars’ worth of money. Financial scams characterise every economy in the world today. World governments are increasingly concerned about the catastrophic effects of fraudulent activities carried out by numerous financial scammers and fraudsters.

    9.2 Types offinancial scams in the world today


    Financial scams have been characterised according to the methods or ways used by scammers. Some of the common types of financial scams include the following:

    9.2.1 Advance fee scams

    Scammers communicate with their target victims informing them that they have won prize money from a lottery, sweep stake or other competitions in which the target victims did not participate. They inform their intended victims that they need to pay some advance fees to a specified account before the prize money is released. Once the money is deposited in the specified account, the prize money is not released. The scammers then vanish by switching off their communication channels. The victims end up losing their money to the scammers.

                               

    Alternatively, scammers call their target victims and trick them into entering a non-existent lottery or sweep stake competition. They are lured into buying fake lottery, sweep stake or gambling competition tickets. The victims are then informed that they have won huge sums of money in the lottery or sweep stake competition they entered. The victims will then be told that they need to pay a prize fee to a specific account before the money is released to them. Once the prize fee paid, scammers switch off communication, having conned the victims.

    Activity 1
    Discuss examples of advance fee scams that are prevalent in Rwanda. Propose measures individuals may use to protect themselves from advance fee scams.

    9.2.2 Investment scams

    Scammers use investment scams to con people who want to invest their money in highly profitable ventures. Some of the investment scams that scammers use to con their victims are:

    a) Ponzi investment scams or pyramid schemes

    Scammers establish fake companies to target wealthy investors. These companies trick their victims by offering very high rates of return on investors’ money in the form of share capital. The victims invest in buying shares in fake companies and become 'shareholders'.
                                          

    The scheme collapses when money from new investors is not enough to pay the original initial investors. The new and initial investors lose their money once the scheme collapses. Investors are also tricked into marketing schemes that appear to be real, for example, marketing of products. Investors are promised large profits based on the number of people they recruit in the marketing scheme. Profits are not based on the actual sale of products but rather the number of recruits.
    (Sources: The Little Book of Big Scams (Third Edition) (2014) pages 1-40, and The Little Black Book on Scams (2012), pages 4 –30)

    Activity 2
    1. Discuss an example of a pyramid scheme that has happened in Rwanda.
    2. Identify how the victims became prey to the fraud.
    3. How does the government deal with investment scammers in Rwanda?

    b) Pump and dump stock scam

    This is where the price of stocks in a specific company are promoted based on false and misleading information. The stock prices rise to high levels on the stock exchange markets. This overvalues the actual price of the stocks in the market. Promoters sell their stock at an overvalued price and stop promoting the stock. The stock prices then fall to low levels. Investors end up losing the value of their capital.

    c) Off shore investment scams

    Financial scammers promote non-existent off shore investments. These are investments made in fake foreign companies and sold to investors. The scammers benefit from high rates of return and avoid paying government taxes. These fake companies will then vanish making it impossible for investors to trace or recover their money in the foreign company.

    d) Foreign exchange (forex) scams

    Scammers lure investors into trading in foreign currencies in a forex market. An unsuspecting investor is lured into wiring money to an off shore account as a requirement before being accepted to trade in foreign currencies. Financial scammers then disappear with the investor’s money.

    Activity 3
    With the help of your teacher, visit a police station near your school. Find out if there is a financial crimes unit at the station. Ask officers from the unit how they fight investment scams in Rwanda. Also ask the officers if there are other types of investment scams other than the ones mentioned in this book. After the visit, write a report informing other students about investment scams and how they can protect themselves from scammers.

    e) Purchase of precious minerals scams

    Financial scammers target victims promising them a sale of precious minerals, for example, diamonds. They persuade their victims that the sale of precious minerals is a lifetime opportunity to grow wealthy. The unsuspecting victims then buy these precious minerals only to realise later that they are not worth the money invested. By this time, the financial scammers have vanished.

    f) Door- to- door sale scams

    Door-to-door sales scammers use this method to scam their target victims by selling them poor quality products at high prices. Such scammers pretend to sell or promote goods of very high quality. Financial scammers carry out a survey in advance to obtain personal details of their intended victims. They use this information to scam their victims. They also con people out of their household goods.

    Activity 4
    Role-play a scenario of a door-to-door sales scam. Use examples of cases that have actually happened in Rwanda. After the role-play, explain why the victims were gullible to the fraudsters. Discuss what targeted victims can do to avoid such scammers.

    9.2.3 Dating and romance scams

    Many people, especially the young, use online dating websites and applications such as Facebook in search of companions. Financial scammers take advantage of these online dating sites to scam innocent people. Scammers use fictitious names to conceal their identities and target people. They play with the emotions of the target victims by establishing close relationships. They also send the victims gifts, personal photos and greeting cards. Scammers then ask for personal information which may be used to scam a victim. After the victims have sent information or money, the scammers vanish and block their communication channels.
                                                     

    Activity 5
    Discuss cases of dating and romance scams that you have heard of. Identify ways in which one can avoid being a victim of such a scam.

    9.2.4 Banking and online payment scams

    Internet and mobile banking are the latest business technologies in today’s electronic age. Electronic commerce (e-commerce) is revolutionising the way people do business across the globe. Financial scammers have encroached on the new banking technologies to steal money. There are three main categories of banking and online payment scams. They include the following:

    a) Phishing

    Scammers email their victims pretending they are from the victims’ banks. They inform the victim that they want to rectify a problem that has occurred in the victims’ accounts. They ask their victims to give them their bank account details such as account name and number. If the victims respond, scammers use the details to send information electronically to manipulate personal identification details such as passwords and fraudulently transact business on the victims’ behalf.
          


    b) Vishing

    This is similar to phishing. However, instead of emailing, scammers call the victims purporting to be working for a bank, police unit or fraud investigation agency. They inform their intended victims that they need their bank account details such as account name and number, passwords or debit/credit card details. They inform victims that their accounts are at risk and that they are likely to lose their money. The victims may respond by giving out their account details. Scammers then use the details to access funds from victim accounts and transfer them to another or other accounts. The victims may lose their money through this method.

    c) Card skimming

    Scammers steal information from credit cards and ATM cards during a legitimate transaction. They use skimming devices to store information on a magnetic strip. This information is used to access victims’ accounts and steal money from them.

    d) Card fraud

    Scammers use stolen credit or debit cards to make unauthorised transactions from the victims' accounts. They can also use information from unsuspecting victims to make fake cards. The fake cards are then used to make transactions and steal money from a victim.

    Activity 6
    1. Visit a bank near your school. Ask to talk to a resource person from the security and fraud department to explain to you how to spot card skimming.
    2. Identify ways in which people can prevent banking and online payment scams.

    9.2.5 Online shopping scams

    E-commerce involves buying and selling of goods and services online. Many online businesses are legitimate. However, financial scammers use e-commerce to con unsuspecting shoppers. They use the following financial scams:

    a) Online-classified scams

    Financial scammers create online-classified websites that provide an opportunity for would-be sellers and buyers of online goods to transact business. Scammers also use genuine websites pretending to be genuine sellers or buyers of goods to con unsuspecting members of the public. Thus, they create an opportunity to scam their victims, for example, by giving out bouncing cheques.

    b) Online auction scams

    Financial scammers take advantage of websites that auction products online. They send messages to their targets claiming that they are winners in an auction for a specified product. They ask for advance payment as commitment to buy the product. The excited victim promptly pays the advance payment. After receiving the advance payment, the financial scammers vanish from the auction sites. The victims end up losing their money.

    c) Fake retailer’s scams

    Financial scammers create fake retailer websites. They ask unsuspecting buyers to pay for items through online money transfers. Once the victims pay, the scammers vanish and never communicate again.

    9.2.6 Job and employment scams

    With the high rates of unemployment, financial scammers promise unemployed persons job placements with high salaries. This scam is promoted by advertisements on fake websites or the use of the Short Message Service (SMS). Th e scammers lure their victims to pay a certain amount of money to a specified account for processing of documentation and a commission fee. Once unsuspecting victims have paid the money, the websites are closed and scammers cut off all communication.

    9.2.7 Charity scams

    Scammers create fake websites where they target victims of charity scams. They are most prevalent when there are national disasters in certain countries. Victims are requested to make donations to assist the people affected by the disaster. Once the victims deposit money in the scammers' account, the scammers disappear and the websites are closed down.
                                  

    Activity 7
    Answer the following questions.
    1. Identify other types of online financial scams prevalent in the world.
    2. Discuss how people lose their money to financial scammers through the seven types of financial scams identified above.
    3. Explain reasons why people in Rwanda are vulnerable to the types of financial scams identified in question (1) above.


    9.3 Identity fraud


    Activity 1
    Identify ways in which a person may obtain your personal information without your permission or knowledge.

    Identity fraud is the unauthorised use of another person’s identity to deceive or defraud someone else. Identify fraudsters use other people's personal details to operate bank accounts, order goods and services, take over bank accounts, use mobile phone contacts and obtain personal identification documents to commit crimes.

    The victims, whose identities are used, may receive loan statements, service bills, invoices or statement of accounts for transactions they did not carry out. Identity fraud is a growing problem in the world today. Most of the organised crimes witnessed such as illegal immigration, drug trafficking, money laundering, terrorism and human trafficking are linked to identity fraud.

    Activity 2
    Discuss and answer the following questions.

    1. Discuss examples of identity fraud carried out worldwide.
    2. Explain how the scammers were able to obtain personal information of the victims’ discussed in question (1) above.
    3. Were the scammers caught in the cases discussed in question (1)?

    9.3.1 Types of identity fraud

    1. Identity theft

    This is the fraudulent use of another person’s identity or information to commit fraud without his or her knowledge. Imposters (identity fraudsters) create new accounts and obtain new debit or credit cards using the personal details of the victims. The new card that carries similar information to an original one is used to transact illegal transactions. The Internet is used to facilitate fraudulent activities of identity thieves.

    Activity 3
    Read the story below and answer the questions that follow:Your friend Kamanzi recently lost his identity card. After two days, he receives a letter supposedly from the revenue authority. In the letter, Kamanzi is requested to provide his personal identification number and bank account details. The letter claims the information is required to update tax payers' details.

    1. What should Kamanzi do once he reads the letter?

    2. If Kamanzi was to reply to the letter giving out his personal details, what do you think could happen to his identity?

    3. Have you heard of cases where people innocently provide information to fraudsters and money is stolen from them?

    4. What steps have the government, police, banks and telecommunication companies done to protect the people of Rwanda from identity theft?

    2. Phishing

    Fraudsters create fake bank websites that look like genuine websites of known banks. The fraudsters then send emails to bank customers and lure them to the fake bank websites where they provide personal details. With such information, they access the customers' bank accounts to withdraw money without their knowledge. This type of identity fraud usually affects customers who use online banking.

    3. Hacking

    Fraudsters may hack into the website of a financial institution and access details of customers’ e-banking transactions. They steal the password or PIN to access the bank’s computerised software system. They may then lure the bank’s customers into fake websites that look similar to the bank’s real websites. The fraudsters then use such information to steal money from the unsuspecting customers’ accounts.

    4. Identity documents fraud

    Fraudsters use personal information stolen from innocent people to process licenses, identity cards and passports to carry out fraudulent business transactions.

    5. ATMs and credit cards skimming

    The credit and ATM cards' information are captured or copied using electronic means when customers are carrying out genuine transactions. Fraudsters can steal vital information by looking over the shoulder of a customer when he or she is performing business transactions.

                                     

    Activity 4
    Identify the type of identity fraud described in each case below.

    1. Your neighbour purchased goods online from a fake website without knowing. The website looked similar to a genuine one. After a week, he failed to receive the goods he had purchased online. Upon enquiry from the genuine website, he realised that fraudsters had used his identity to acquire his personal information and purchase goods online without his knowledge.

    2. Your desk mate is very good with computers. However, she recently was able to access your teacher’s computer without his or her permission. She was able to access your teachers personal documents stored in the computer. Which type of identity fraud did she use to access your teacher’s personal computer?

    3. Your uncle informs you of a scam that he experienced. He explains that it started after he received an email supposedly from his bank. When he clicked on the link, he was asked to confirm his personal information and account details. He did not confirm the legitimacy of the email but he provided the details anyway. After one week, he went to the ATM to withdraw some money and realised his PIN was blocked. Upon enquiring from the bank, he was informed that he had changed his PIN and withdrawn all the money from his account. Which type of identity theft was used to steal money from your uncle?

    4. Research and analyse other cases of identity fraud. Discuss how fraudsters steal from unsuspecting people.

    9.4 Impact of financial scams on individuals and families


    Some of the major impacts of financial scams on individuals and their families include the following:

    1. Financial loss

    Financial loss harms individuals and their families. Many people lose large sums of money to scammers. As a result, victims find it difficult to fulfil their financial obligations, as they may be bankrupt. They have trouble providing for their basic needs such as food, clothing, shelter and health. Some of the affected persons may be too old to start building wealth afresh.

    2.Loss of employment

    If individuals affected by financial scams are self-employed and experience bankruptcy, their businesses may close down. Similarly, if the organisations where individuals are employed are victims of financial scams, it also leads to loss of employment. This happens when the organisations become bankrupt and are forced to close down or lay off workers. Their families also suffer as there is no money to satisfy their needs.

    3.Mental health problems

    Victims who are scammed by fraudsters become shocked, anxious, embarrassed, worried, upset and angry. This may lead to depression among individuals and family members. A prolonged period of depression results in health problems that make it difficult for them to carry out their day-to-day activities.

    4. Psychological, sociological and emotional problems

    Victims blame themselves for being scammed. They feel ashamed and embarrassed to report incidences of financial fraud to their spouses, close friends, family members and colleagues because they fear being criticised. There is a tendency for relationships to break down between the affected victims and their friends, relatives and family members.

    A large number of victims lose their self-esteem because of feelings of guilt, embarrassment and shame. Some victims suffer in silence and may develop undesirable temperamental behaviour. Other victims may resort to substance use and abuse or attempt suicide. Victims who are in business develop an extreme fear of transacting business or trusting people. Victims of online dating scams develop a fear of other potential partners.

    Activity 1
    Carry out a survey on the impact of financial scams on individuals and families in Rwanda.


    9.5 Steps to take when you are a victim of financial scams


    Activity 1
    With the help of your teacher, visit the nearest bank or mobile banking customer service agent. Ask the relevant person to provide you with information on what to do to avoid being a victim of financial scam.

    It is not easy for victims of financial scams and identity fraud to recover from the impact of such fraudulent schemes. Th ere are steps that one should take if scammed by fraudsters. Th e steps to be taken include the following:

    1. The first step a victim should take to is report to the respective authorities. Detailed information should be provided about how one has been scammed. This will help to prevent and warn others of such scams. For fake online scams, one should report to the genuine online websites.

    2. Most victims blame themselves for being scammed. However, we should not blame ourselves. Victims should accept the reality and stop brooding over it. One should recover as quickly as possible in order to lead a normal life.

    3. Care should be taken not to fall victim of financial scams. You should always be extra careful and cautious of people who might be attempting to lure you into financial scams.

    4. If you realise that you are being scammed, stop contact immediately with the scammers. You should not respond to further communication from the scammers and contact the relevant authorities.

    5. You should educate yourself comprehensively about financial literacy and knowledge of financial scams and identify frauds. Knowledge prepares you to protect yourself from future possible scams and frauds.

    6. If the financial scam involves your banking transactions, report immediately to the bank. Cancel all other pending transactions. Get new ATM and credit or debit cards and change your PIN number.

    7. Be on the lookout for possible scams such as miracle cures, fake weight-loss pills, deceptive lotteries, fake charities, gambling or sweep stake tickets and pyramid schemes.

    8. Never provide personal identification details or information to suspicious people. If one calls or emails asking for personal information, always confirm with the relevant agencies that the caller is genuine.


    Activity 2
    Design a poster educating the public about measures they can take to avoid being victims of financial scams and identity fraud.

    9.6 Methods of protecting one self from financial scams and identity fraud


    1. One should remember that prize money is not won in a sweepstake, gambling or lottery that one did not enter or participate in. Even if they present documents that look genuine, do not respond or be lured into believing that you have won.

    2. You should not pay any fee to collect a prize or when applying for a job. Should scammers insist on calling or texting you, do not call or text them back.

    3. Do not give your personal details such as your bank account and PIN number to anyone.

    Activity 1
    Supposing your friend receives a short message service (SMS) or email from an unknown number and has the following message:You have won Rwf 250,000 in the National Lottery Draw. Call +255012345 for further details on how to get your cash prize.

    i) How would you treat such a text message or email?

    ii) Supposing your friend is excited and would like to call that number to enquire how they can get the prize money, what recommendations would you give him or her?

    iii) Supposing your friend called the number and was asked to send Rwf 20,000 for processing the prize money and they sent the money, suggest ways in which you will assist him or her.

    4. You should do a thorough investigation of investment companies that off er huge returns on invested capital. You should check whether the company is real, registered and licensed to do business.

    5. Do not rush to invest in shares or stocks of companies which unprecedentedly rise one day. You may lose your investment if the stock or share prices of these companies tumble to very low levels.

    Activity 2
    Conduct research on the USA’s worst financial crisis of 2007/2008. Discuss the impact of the financial crisis on investors. Identify the type of financial scam used to defraud people.

    6. If you operate an e-banking account and receive suspicious emails, you should not open them. They may contain a virus which corrupts files in your computer. You should always update your anti-virus or have the latest anti-virus for your computer. Remember to change your email password regularly.

    7. Do not be lured into wiring money into an off shore account or assist a stranger to buy foreign currencies. Always buy foreign currencies from a reputable foreign exchange dealer. Scammers may lure an innocent person into money laundering schemes.

    8. Do not give your personal details or photographs to strangers you meet online. Neither should you send money to them.

    9. Your personal identification documents should be kept secure. If such documents are stolen or misplaced, report immediately to the relevant authorities.

    10. If you are withdrawing money from an ATM machine, be conscious of people around you. You should shield your transactions in the ATM keypad from those who may be checking your transactions over your shoulder.

    11. After making transactions, safely keep your personal identification documents. Do not leave behind your receipts, mini statements or balance enquiries. If your card is retained in the ATM machine, report immediately to your bank or the issuing company.

    Activity 3
    Assume an illiterate old man you know from your village approaches you to help him withdraw some money from an ATM. He hands over to you his ATM card and a small piece of paper on which his ATM PIN is written. After helping him, suggest five ways in which you would educate the old man so that in future he does not become a victim of financial fraud.

    12. Do not buy goods online from unfamiliar websites. Always buy goods from genuine websites.

    13. When accessing social media sites such as Facebook and Twitter using public computers, ensure you log out after you are through.

    14. Before doing anything online, stop, think and click.

    Activity 4
    Answer the questions below.

    1. Describe measures you would use to ensure you do not fall victim to online identity theft on social media networks such as Facebook, WhatsApp, Instagram or Twitter.

    2. Hold a talk on the importance of protecting oneself against financial scams.

    Assessment Exercise 9.0

    1. Distinguish the meaning of the terms financial fraud and identity theft.

    2. Identity financial scams and identity frauds most common in Rwanda.

    3. Explain common types of identity theft found in the digital world today.

    4. Discuss reasons why victims of financial scams and identity frauds rarely report incidents to state security agents or their relatives.

    5. Examine reasons why security agents in your country may not fully contain the activities of financial scams and identity frauds.

    6. State reasons why pyramid schemes usually go on for a very long time before being uncovered.

    7. Suggest steps that can be used in helping victims of financial scams and identity fraud to recover quickly.

    8. Assess strategies one may use to protect oneself against financial scams and identity fraud.

    9. Describe how you would help someone if you witnessed an act of identify fraud happening.

    10. Is it possible to recognise persuasive messages of scamming intent in the current era of sophisticated information and communication technology?

    Project
    1. Research the impact of financial scams in the world today.
    2. Propose strategies that can be used to protect individuals against the scams identified in questions (1) above.
    Unit 8: International financial institutions, cooperation and developmentUnit 10: Environmentfriendly farming for sustainable food production