The caller receives a letter from Vodafone regarding a mobile phone contract that has been taken out using the caller's details.
What is the fraud type?
Identity theft - Telecoms fraud.
Your caller has noticed a suspicious transaction on their bank account. The bank is investigating.
What report type is this?
Information report.
Your caller has received 3 letters for 3 different bank accounts that have been applied for using the caller's details.
How many reports should you take?
1 report.
What rule helps us to establish if a report is a crime or an information report?
The SIV rule.
Your caller has received an email from someone claiming they have access to the caller's device and will send explicit images to their contacts if they do not pay them money via cryptocurrency.
What is this commonly known as and do we take a report for this if the caller has not taken any action or paid the demand?
This is commonly known as a sextortion email and no report is required.
Your caller receives a letter claiming they have won the FIFA lottery for £100,000. The letter explains in order to claim their winnings, they need to pay a fee of £500.
What fraud type is this?
Mass marketing - Lottery scam
The callers social media accounts have been hacked into.
What report type is this?
Crime report.
Your caller is reporting for their business. The business has received 4 chargeback letters for orders made the week prior.
How many reports should you take?
4 reports - one for each chargeback letter received.
When dealing with chargeback fraud, what does the caller need to have in order for us to take a report?
The caller needs to have the chargeback in writing before we can take the report.
What are the other two sides to mandate fraud?
Identity theft or Hacking.
Your caller tells you they received an invoice and paid it, believing it was a company who recently did work on their property. They have since realised the email was not genuinely from the company and need to try to get the money back.
What fraud type is this?
Mandate fraud.
Your caller has received a phone call from someone pretending to be Microsoft. The suspect tells the caller hackers are trying to infiltrate her computer and they can help them to fix it if they allow them remote access. The caller knows it is a scam and does not give them remote access or confirm any personal information. The caller simply hangs up the call.
What report type is this?
Information report as no access was gained and the caller is not considered a SIV.
Your callers email account has been hacked into which has allowed them to take money from the caller's bank account. The caller's bank is currently investigating.
How many reports do you take?
1 report for hacking social media and email.
What rule helps us to establish whether a new report needs to be taken or the existing report can be updated?
The finished incident rule.
If a business calls us and wants to report a hacking of a business account, what do you do?
If they do not answer, fill out the enhanced cyber call back form and email to all TL's using the group email address including the OOH night shift leads.
Your caller received a call from someone claiming to be a network provider. They offered the caller a discount on their existing contract and took all of their personal details and banking information. The caller has since started to receive letters regarding a phone contract debt they have no knowledge of.
What fraud and report type is this?
Buying/Selling - Other consumer fraud.
Crime report
Your caller received an email claiming to be from a supplier they used with different bank details on. The caller is suspicious of the email and checked with the genuine company who advised they did not send the email. The caller does not send the suspect any money as they know it is a scam.
What report type is this?
Crime report. Attempted mandate fraud is still a crime regardless if no money was paid.
Your caller previously reported a dating scam. The suspect has been back in contact with the caller since they first reported and they now want to let us know this information before they block them on everything entirely and stop all contact.
Do you update the existing report or take a new one?
Take a new one, the previous report was classed as 'finished' once it was submitted.
What rule helps us to establish which fraud is the most serious to report under (in certain circumstances only)?
The principle crime rule.
Your caller tells you they have received a letter regarding an outstanding debt for a phone contract they do not recognise.
What one question could you ask to establish if this is telecoms fraud or other consumer (non investment) fraud report?
Your caller has received a call from someone offering an investment opportunity. The caller invests money and later realises it's a scam when they are unable to withdraw any funds.
What fraud type is this?
Shares and boiler room fraud.
Your caller has seen notifications that someone has attempted to hack into various online accounts. The hacker has not been able to yet gain access.
What report types will these reports be?
Crime reports. The attempted hacking is still a crime.
Your caller has checked their credit report and noticed an application for a loan linked to their account they did not apply for. Due to this, they've also checked their bank account and noticed 3 transactions for Amazon they do not recognise.
How many reports should you make and for what?
Two reports - one for cheque, plastic card and online banking and another for application fraud.
What 3 questions for the SIV rule should we ask ourselves or the caller to establish whether it is a crime or information report?
Are they at a financial loss?
Has the suspect contacted them more than once?
Have they taken any action? (clicked on a link, called the suspect number back etc.)
What criteria does a live cyber call type 1 have to meet in order to be classed as type 1 live cyber?
The cyber attack is being reported by a business, charity or organisation.
The attack is currently active.
The business can no longer operate.
There is a significant loss of funds or data.
It is cyber dependent (hacking, data breach etc.)