ID Theft scam targets Military families
Posted 31 May 2007 - 11:13 AM
May 31, 2007 ~ "The scammer calls a military spouse and tries to get personal information by telling him or her that a loved one was injured in Iraq.
A new identity theft scam, purporting to be from the American Red Cross calling about an injured soldier, is targeting military families. The Red Cross issued an alert* warning people that its representatives generally do not contact military members or their families directly, and almost always go through other channels such as a commander or first sergeant. Military family members are being urged to not give out any personal information over the phone if contacted by anyone who is unknown to them. The scam, according to the alert, starts by someone calling a military spouse and identifying herself as a representative of the Red Cross. The caller tells the victim that his or her spouse, who is not identified by name, was injured while on duty in Iraq and was evacuated to a hospital in Germany. The caller then says the medical unit can't start treatment until paperwork is filled out, and they need the victim to verify the spouse's Social Security number and date of birth. It is a federal crime, punishable by up to five years in prison, for someone to pretend to be a member or representative of the American Red Cross for the purpose of soliciting, collecting, or receiving money or material. The alert noted that Red Cross representatives will contact military members or their families directly only in response to an emergency message initiated by the family... Anyone receiving this kind of fraudulent call is being asked to report it to their local Family Readiness Group or Military Personnel Flight..."
"...The Red Cross does not report any type of casualty information to family members. The Department of Defense will contact families directly if their military member has been injured..."
.The machine has no brain.
......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...