If you have any questions about whether a call is legitimate or not, please call our business line at (781) 395-1212.
Scammers will often “spoof” phone numbers to appear to be local and they will also create fake Caller ID tags that identify them as local police, sheriff’s department or other law enforcement agency. Some even use the name of real officers currently working at the department in attempt to sound more legitimate. The scammer states that there is a warrant for your arrest, but that you can pay a fine in order to avoid criminal charges. Law enforcement agencies will never call you and demand payment, especially through a wire or gift cards.
Police charity scams are a type of fraud where scammers pose as police officers or representatives of law enforcement charities to solicit donations from unsuspecting victims. These scams can take many forms, including phone calls, emails, and door-to-door solicitations.
The scammers often use high-pressure tactics to convince victims to donate quickly, without giving them time to research the organization or confirm that it is legitimate. They may also use emotional appeals, such as claiming that the donations will help support families of fallen officers or provide resources for local police departments.
In reality, the money collected by these scammers rarely goes to support law enforcement charities or their beneficiaries. Instead, it is often pocketed by the scammers themselves or used to fund other illegal activities.
To avoid falling victim to police (or other charity) scams, it is important to do your research before making any donations. Verify that the organization is legitimate by checking its website or contacting the charity or department directly. You can also check with your local police department or Better Business Bureau to see if they are aware of any scams operating in your area.
If you believe you have been targeted by a charity scam, report it to your local police department or the Federal Trade Commission.
Computer tech scams are a type of scam where fraudsters pose as technical support representatives, sometimes from reputable companies such as Microsoft of Apple, and contact computer users to offer help with their computer issues. The scammer will typically claim that the computer has been infected with a virus or malware and will offer to fix the problem for a fee.
The scammer may use various tactics to gain access to the victim’s computer, such as asking them to download and install remote access software or directing them to a fake website that looks like a legitimate tech support site. Once they have access to the computer, they may show fake error messages or run fake virus scans to convince the victim that their computer is infected.
The scammer will then demand payment for their services, often requiring payment through wire transfers or gift cards, and may even try to sell additional services or products. In some cases, the scammer may install actual malware on the victim’s computer, allowing them to steal personal information or use the computer for malicious purposes.
The computer tech scam can be difficult to detect, as the scammer may use convincing language and appear knowledgeable about technical issues. It’s important for computer users to be wary of unsolicited calls, emails or pop ups from tech support representatives and to always verify the legitimacy of the company before providing any personal or financial information.
The Grandparent Scam is a type of scam where fraudsters target elderly people, pretending to be their grandchild or representative of their grandchild. The scammer will typically call the elderly person, claiming to be there grandchild in distress and in need of immediate financial assistance. They may say that they have been arrested, involved in an accident or stranded in a foreign country and need money wired to them urgently.
The scammer will often ask the elderly person not to tell anyone about the situation, to keep it a secret from other family members who might interfere or cause more trouble. They may also pretend to be a lawyer or a police officer, adding credibility to their story.
The goal of the grandparent scam is to trick the elderly person into sending money, either through wire transfer or gift cards, before they have a chance to verify the story with other family members or authorities. The scam can be devastating, as the elderly person may lose a significant amount of money and feel embarrassed and ashamed.
Home improvement scammers will knock on your door claiming to be in the area working on a neighbor’s property. They will tell you they noticed the need for repairs on your steps/roof/driveway/etc., and they have extra materials they could use for your property. Typically the scammers will ask for a cash or check in advance and will either not complete the work at all or do an unsatisfactory job. Please read the tips below to avoid falling victim to a scam contractor:
- Consider only contractors who are licensed and insured
- Get recommendations for contractors from people you know and trust
- Research the contractor on bbb.org or through OCABR on mass.gov and always read reviews closely
- Get multiple estimates in writing that include a description of the work, materials needed, completion date and price
- Read contracts carefully and do not sign if there are blank spaces or details you don’t understand
If you believe that you are a victim of a contracting scam, please report it to the Medford Police Department and/or the Massachusetts Attorney General’s Office (AGO) Consumer Hotline at (617) 727-8400.
Identity theft is a type of fraud where an individual’s personal and financial information is stolen and used without their permission, often for financial gain. The stolen information can include the victim’s name, address, Social Security number, bank account numbers, credit card information, and other sensitive data.
Identity theft can occur through various methods, including hacking into databases, stealing mail or wallets, phishing scams, and skimming devices. Once the fraudster has obtained the victim’s information, they may use it to open new credit cards, apply for loans, or make purchases in the victim’s name.
Identity theft can have serious consequences for the victim, including damage to their credit score, financial losses, and even legal problems if the fraudster commits crimes in their name. It can also be difficult to recover from identity theft, as victims may need to spend considerable time and money to correct their credit reports and restore their reputation.
To protect against identity theft, individuals should be cautious with their personal information and take steps to secure their accounts and devices. This can include using strong passwords, avoiding sharing personal information online or over the phone, monitoring bank and credit card statements regularly, and using credit monitoring services to detect any suspicious activity. If identity theft is suspected, victims should report it to the authorities and take immediate steps to protect their financial accounts and credit.
If you believe that you are a victim of identity theft/fraud, report it to the Federal Trade Commission Identity Theft Center.
- Consider only contractors who are licensed and insured
- Get recommendations for contractors from people you know and trust
- Research the contractor on bbb.org or through OCABR on mass.gov and always read reviews closely
- Get multiple estimates in writing that include a description of the work, materials needed, completion date and price
- Read contracts carefully and do not sign if there are blank spaces or details you don’t understand
If you believe that you are a victim of a contracting scam, please report it to the Medford Police Department and/or the Massachusetts Attorney General’s Office (AGO) Consumer Hotline at (617) 727-8400.
Image-based abuse, also known as “revenge porn” or non-consensual pornography, is the distribution of sexually explicit images or videos without the consent of the person depicted. This can include images or videos that were taken with the person’s consent, but were shared without their knowledge or permission.
Image-based abuse is a form of online harassment and can have serious consequences for the victim, including emotional distress, damage to personal and professional reputation, and even physical harm. It is also an extreme violation of one’s privacy.
Many countries have laws in place to address this kind of abuse, but enforcement and prosecution can be difficult. Prevention is key, and victims are advised to take steps to protect their privacy, such as not sharing intimate images or videos with others and using strong passwords and security settings on social media accounts.
Resources for victims of image-based abuse:
- Take It Down is for people who have images or videos of themselves nude, partially nude, or in sexually explicit situations taken when they were under the age of 18 that they believe have been or will be shared online. This site is run through the National Center for Missing and Exploited Children.
- StopNCII.org is a free tool designed to support victims of Non-Consensual Intimate Image (NCII) abuse. This website is for adults over 18 years old who think an intimate image of them may be shared, or has already been shared, without their consent.
IRS/Government scams involve criminals posing as IRS or government officials to trick individuals into giving them money or personal information. These scams can take many forms, including phone calls, text messages, and even social media messages.
Some common tactics used by scammers include threatening legal action or arrest if payment is not made immediately, offering to settle tax debts for a reduced amount, and requesting personal information such as Social Security numbers or bank account information.
It is important to remember that the IRS and government agencies will never ask for payment over the phone or via email, nor will they threaten arrest or legal action without first contacting you by mail. If you receive a suspicious call or email, do not provide any personal information or payment and immediately report the incident to the IRS and/or the Federal Trade Commission.