The use of chemicals and solvents to remove or modify handwriting and information on the check. When specific items on the check are altered, such as the payee’s name or the amount, it is called spot alteration; when attempts are made to erase information from the entire check, it is called check washing.
The illegal act of opening accounts at two or more institutions and using “the float time” to make use of non-existent funds to create fraudulent balances. This fraud has become easier in recent years due to new regulations requiring banks to make funds available sooner, combined with increasingly competitive banking practices that strive to make funds available to customers as quickly as possible. Check kiting is a felony and when it occurs perpetrators are prosecuted to the fullest extent of the law.
The act of fabricating a check using readily available desktop publishing equipment consisting of a personal computer, scanner, sophisticated software and a high-grade laser printer usually with the intent to defraud. It can also mean simply duplicating a check with advanced color photocopiers.
An illegal modification or reproduction of a check, document, signature, or legal tender; an item is considered forged if it is claimed that it was made by someone who did not make it.
The use of personally identifiable information about another person, such as a Social Security Number or Cedula, without the authority to use that information and with the intent to defraud and attain the other person’s assets illegally and for the perpetrator’s personal gain.
One who writes bad checks against his own or others closed accounts and presents it to a victim for payment. This also occurs when someone reorders checks on closed accounts. If you suspect Paperhanging, verify that the issuing bank is still in operation and the check is valid.
The act of rummaging through another person’s garbage to steal personal information.
A fraudulent email that appears to be coming from “trustworthy” organization requesting your personal information.
The theft of credit/debit card information used in an otherwise legitimate transaction through the use of a small electronic, storage device (skimmer) when processing your card.
A fraudulent business scheme where internet fraudsters send junk e-mail, also known as e-mail spam, or pop-up messages to lure personal and financial information from unsuspecting victims.
Malicious computer software that interferes with normal computer functions or sends personal data about the user to unauthorized parties over the Internet in an attempt to commit fraud.
Any malicious software that is installed on a computer and designed to take partial or full control of a computer’s operation without the knowledge of its user.