Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Pause Icon A two-lined pause icon for stopping interactions. Quote Mark A opening quote mark. Quote Mark A closing quote mark. Arrow An icon of an arrow. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Comments An icon of a speech bubble, denoting user comments. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. LinkedIn An icon of the LinkedIn logo. Magnifying Glass An icon of a magnifying glass. Search Icon A magnifying glass icon that is used to represent the function of searching. Menu An icon of 3 horizontal lines. Hamburger Menu Icon An icon used to represent a collapsed menu. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Information An icon of an information logo. Plus A mathematical 'plus' symbol. Duration An icon indicating Time. Success Tick An icon of a green tick. Success Tick Timeout An icon of a greyed out success tick. Loading Spinner An icon of a loading spinner.

On the Beat: Be wary of scammers out to get your personal details

Constable Richard Russell, North East Crime Reduction Officer.
Constable Richard Russell, North East Crime Reduction Officer.

North-east constable Richard Russell of the Crime Reduction Unit highlights what to look out for when it comes to identity fraud and scammers out to get your details.

As a crime reduction officer, I regularly see crimes involving identity frauds and scams, which have a significant impact on victims.

Identity fraud involves the misuse of an individual’s personal details to commit crime. Your details are valuable to criminals and can be exploited by them, or sold on to others.

Although money can often be recovered from financial institutions this type of crime can cause victims a lot of stress and cost whilst trying to clear up the fraudulent use of their name.

If your data is obtained by criminals it may be used to obtain credit cards or bank accounts in your name, as well as numerous other financial products.

Criminals can also use your stolen information to gain access to the funds in your bank accounts, savings accounts or pension. It might never become apparent how your personal details were obtained in the first instance.

Look out for items you have not ordered

Fraudsters operate by obtaining your details in a number of ways, from letters or bank statements thrown into your recycling bins to targeting flats with shared mailboxes.

As technology has changed they can also steal information from your computer or mobile device so it’s important to think about how you manage the security of personal information you hold in-person and online.

It might not always be clear straight away that someone has stolen your identity so look out for bills or invoices for goods you have not ordered.  It is not always for high-value goods, so check for smaller amounts and check-in queries with your bank.

If you start receiving information from a company or organisation you don’t deal with, find out why. The first you know of such a crime might be when a creditor makes contact with you.

Be on the lookout for online identity fraud, say police.

Fraudsters took control of victim’s phone

To give you some idea of how conniving scammers can be and the ways in which it can impact upon a person, I want to share the story of a 57-year-old man from Aberdeenshire, who wants others to be aware of what happened so they don’t fall foul.

On Christmas day 2019, the victim received a text from his phone provider saying the number was being moved to a different provider.

Thinking this was a scam text, he initially ignored it, only to find that he no longer could use his phone. After querying with his provider, it was established that his own details, which had been fraudulently obtained, had been used to carry out this action.

Not only had the fraudsters stolen control of the man’s phone electronically, but they had also gained access to all the data on the phone. This included bank details, cryptocurrency exchanges, Amazon, Facebook and PayPal accounts and seemingly all other phone apps. He also could no longer get access to his emails.

After checking his bank account, several transactions that were not made by the victim were found, resulting in him cancelling bank cards and changing details for all accounts. It led to the theft of £1,000 worth of cryptocurrency and, to date, no one responsible has been apprehended.

Protect documents and update passwords

There are a number of things I would suggest you can do to help protect yourself.

Consider signing up to a reputable credit rating agency that will notify you should a credit check be completed using your details. Never discard or recycle bank statements, bills or personal documents without shredding them.

If you start to receive post from a company or organisation you don’t know, find out why it is being sent to you.  Be extremely wary of unsolicited phone calls, emails or text messages purporting to be from your bank or your phone provider – particularly if they are requesting personal information such as dates of birth or passwords.

Always ensure you have security software installed on your computer and mobile devices to prevent malicious software being downloaded. Make sure the software is kept up to date as prompted.

Always keep the most recent security programme on your phone, use passwords and two layers of authentication, and try to avoid storing passwords and PIN numbers on it.

Phishing websites mimic banking and other sensitive sites in the hope that you enter your username and password.

If you get an email from what appears to be your bank, don’t click any links.  Instead, log onto the bank site directly and look for a secure HTTPS or lock icon.  Remember, if in doubt, contact your bank to check.

Think about what personal information you share on social media like your birthday or the name of your pets.

Look at your privacy settings and consider who can actually see your posts.

Check your security settings regularly as often social media sites make changes.

REMEMBER – Your personal information is valuable and needs protecting

CAUTION – Be wary of anyone asking you for private information

THINK – Why am I being asked to give this information?  Is it necessary?

For all the latest court cases in Aberdeen and the latest crime and breaking incidents, join our new Facebook group HERE. 

Already a subscriber? Sign in

[[title]]

[[text]]