Main Page | Make MyFTC Your Homepage

MyFTC | FTC Products | FTC Help Center | Photo Gallery | Email & Calendar


FTC Communities

FTC Corporate

FTC Products

Join FTC Chat

Radio B3

Free Wallpaper

Free Screen Savers

















Life & Style


Security Center




Security Center


Network security is handled by the FTC Security Department



If you are a law enforcement agency seeking information about how to obtain records from FTC Internet Services, please
CLICK HERE for instructions.


Fraud and Scam Alerts

The FTC Networks Security Department investigates all Fraud, Scam and Abuse complaints. To learn more about the FTC Networks Security Department, visit our Security Department page.


FTC Internet is concerned about the safety of its customers.

At FTC Internet, we see a wide range of scams that can have a direct impact on you. We have dedicated resources working to investigate, track, and, where possible, resolve issues that occur as a result of scams. Through news releases, bill inserts and now, this new page on our corporate Web site, we can quickly alert you to current scams and immediately provide you with information on how to avoid being victimized.

Here you'll find updated information on the latest Internet and phone scams. You'll also find reports on current scams and tips on how to protect yourself.

If you'd like to alert us to something not listed or if you'd like more information, visit our
Contact Us page.

By working together, we can help reduce the prevalence of scams that hurt our customers and cost our industry billions of dollars each year.

Phone Scams

Telephone Fraud Involving Jury Duty
How it works: Individuals identifying themselves as U.S. Court employees have been contacting citizens by telephone and informing them that they have been selected for jury duty. The caller asks to verify names and Social Security numbers and then asks for credit card numbers. If the request is refused, citizens are then threatened with fines and prosecution for failing to comply with jury duty.

Federal courts do not require anyone to provide any sensitive information in a telephone call, such as Social Security numbers or credit card numbers. Most contact between a federal court and a prospective juror will be through the U.S. Mail.

How to protect yourself: If you receive one of these phone calls, do not provide any personal or confidential information to these individuals. This is an attempt to steal or to use your identity by obtaining your name, Social Security number, and potentially to apply for credit or credit cards or other loans in your name.

If you have already been contacted and have already given out your personal information, please monitor your account statements and credit reports, and contact your local FBI office. It is a crime for anyone to falsely represent himself or herself as a federal court official.

Back to Top

Collect Calling
How it works: A simple scam, it continues to pop up around the country. What generally happens is you receive a call from an operator asking you to accept an urgent collect call. While most customers won't accept a call if they don't recognize the name, some do because they worry it might be from a friend or relative who is in trouble. Once you agree to accept the call, though, you will be billed for the charges.

How to protect yourself: Never accept a collect call from someone you don't know. If you are unsure, request that the operator ask the caller a few questions to determine the identity of the caller. Most of the time, these additional questions will cause the person making the call to hang up.

Back to Top

Calling Card Number Theft
How it works: Someone uses your calling card number to make their own long distance calls while you pay the bill. The theft happens in a number of ways. Someone calls posing as a representative of your phone company and asks for your calling card number for verification purposes. Another common scenario is that someone watches or listens as you punch in or read your calling card number at any pay phone.

How to protect yourself: Protect your calling card number the same way you would protect your credit card information. FTC Internet and other major telecom companies never need to ask you for calling card number; they already have it. If this happens, ask questions and ask for a callback number. In most cases, the caller will hang up. When dialing your card number into a pay phone, cover your actions with your body. If you suspect someone nearby is eavesdropping or watching, stop until they move away. Commit your PIN to memory; don't carry the PIN for your calling card in your wallet.

Be aware that if FTC Internet senses heavy and unprecedented usage on your calling card, we put a stop on the card and will call you to verify the usage. We will issue you another card number and you can begin using it right away. You will not be responsible for fraudulent charges. If your calling card is ever lost or stolen, report it immediately.

Back to Top

Third Number Billing
How it works: You receive a call from an operator asking you if the charges for a call being placed by someone you know can be placed on your phone bill. This is known as third-party billing. Often, the operator will repeat a persuasive argument from the third-party and try to convince you the person is in trouble. If you accept the third-party charges, you will find the charges on your bill.

How to protect yourself: Never accept the charges unless you are absolutely certain you know the person. Ask questions and be suspicious. Most phone companies will allow you to place a "block" on your phone, preventing such charges from being assessed.

Back to Top

Identity Theft
How it works: People will use a variety of methods to convince you to give up personal information such as Social Security number, credit card numbers, calling card numbers, bank account numbers, etc. Using this information, criminals can pose as you and commit a number of crimes. This will cost you a considerable amount of money and time as you try to restore your credit rating and damaged financial situation. The attempt can occur by way of a phone call from someone masquerading as a legitimate business. It might come in the form of a letter or email from an allegedly legitimate business or individual. It might even happen when someone searches your trash for mail containing personal information and credit card receipts. In many cases, a pre-approved credit card application gives the criminal enough information to set up a credit card in your name.

How to protect yourself: In general, closely guard all of your personal information. Unless you are absolutely certain you know the person or business you're talking or corresponding with, be suspicious, ask questions, and ask for callback information. Be very careful with the documents you place in your trash. Shred or rip into tiny pieces any credit card applications or credit cards you're not interested in, before you put them in the garbage. Another good idea is to obtain a free credit report annually through one or more of the major credit bureaus.

Back to Top

Credit Card Number Theft
How it works: Similar to other schemes, this is a scam designed to convince you to give up your credit card number over the phone or via email. This allows an unauthorized person to use your card and run up illegal charges. Usually, you will receive a phone call or email from someone masquerading as a representative from a legitimate company you might normally do business with. The person will try to convince you they need your credit card number to check your account.

How to protect yourself: Treat your credit card and your credit card numbers like they were cash. Be suspicious and ask lots of questions; just hang up or don't respond to the email. Most legitimate companies do not need your credit card number; they already have it. The only time you should provide your credit card number is when you are actually buying something from a trusted company. Also, remember to check your credit annually through one or more of the major credit bureaus.

Back to Top

*72 Prison Scam
How it works: You receive a call from an operator saying there is an inmate from a correctional facility who needs you to accept a collect call and the associated charges. Once you accept the call, the caller convinces you to hang up your phone, dial in *72 and another phone number. * 72 is the code used to forward your incoming calls to another number, if you have call forwarding service or if it's available on a per-use basis in your local exchange. If you do this, the inmate will then make additional collect calls to your number, but the calls will be forwarded to someone the inmate knows at the number where you forwarded the calls. That person accepts the charges, but they are billed to you. Often you don't realize this has happened until you notice your phone not ringing or you receive your bill with numerous unexpected charges.

How to protect yourself: Never accept collect calls unless you are absolutely sure you know the person calling. Never activate call forwarding unless you need to do it for your own reasons and to a number you know.

Back to Top

PBX/Voice Mail Compromising
How it works: A PBX -- or Private Branch Exchange -- is a piece of equipment at a business which serves a number of phone extensions within the business, providing capabilities, including in-house calling, call transfers, call forwarding, and voice mail. Often the equipment has the capability for remote access to allow a technician at an off-site location to make changes or upgrades. A fraudster will tap into the remote access function through knowledge of a password or by hacking. If they gain access, they could give themselves the capability to make long distance and other calls at your expense. They could also gain access to your voice mail system and create mischief.

How to protect yourself: If you do have a remote access feature on your PBX, turn it off. Protect your passwords for the PBX and/or voice mail systems, and change them often. Always create a new and unique password after activating the equipment. It is also important to regularly review all billing information and block access to such numbers as "900" services.

Back to Top

9-0 # Scam
How it works: This is a type of fraud that preys on businesses that use PBX systems or other types of telecommunication systems where you have to dial "9" to get an outside line to make a call. The people attempting the scam will call the main number at a business and identify themselves as working for the phone company. To perform a system check, the person will ask the receptionist to initiate a conference call and then press 9 plus 0, which accesses an outside line. The receptionist is then asked to hang up. Often, this leaves the scam artist with access to the outside line. They then make fraudulent long distance calls that are billed to the business.

How to protect yourself: Legitimate major telecom companies don't have to dial into a PBX or phone system to perform such a check. Just hang up or ask pointed questions, including requesting a callback number. Most of the time, the scam artist hangs up and moves on to someone else rather than answering your question.

Back to Top

How it works: Slamming is an industry term for an unauthorized change in your choice of long distance company. Often this is accomplished when someone tries to sell you long distance service or you sign a piece of paper for a contest or other marketing promotion, without checking the fine print. Often your endorsement on a small prize check serves as the authorizing signature. The long distance company then tells your local phone provider they have formal authorization to switch you from your current long distance company. Cramming is similar but involves a company placing an unauthorized miscellaneous charge somewhere on your phone bill. This could involve a charge for a voice mail service, Internet access services, or other service charges.

How to protect yourself: Be careful about what you agree to in any sales pitch or contest over the phone or in person. Read the fine print. Perhaps most important, check all details on your phone bill regularly. If you see a suspicious charge, be aware that the company that placed the charge on your bill is supposed to provide contact information. Call and ask them about the charge. If you cannot resolve the situation and you didn't authorize the charge, contact the business office for your local phone company. Most local companies allow you to place a "freeze" on your long distance choice and overall phone bill, requiring specific authorization from you before a new charge is added or the long distance provider is changed.

Back to Top

Social Engineering
How it works: This is a general term that involves someone trying to convince you that they are someone they're not, in order to collect critical personal information from you. A classic example is a scam FTC Internet saw a few years ago, involving a person who calls your home and claims to be a FTC Internet representative. The person says you overpaid your last phone bill and they need some information from you -- which might include your Social Security number -- to process a refund check.

How to protect yourself: Be suspicious and ask questions. Ask for a callback number. If you ever overpay your local phone bill, major telecom companies simply apply it automatically to your next bill. There's no need to call you and process a refund.

Back to Top

Internet/Email Scams

How it works: You receive an email that is made to look as though it comes from a legitimate company you normally do business with. The email, for example, might tell you that some sort of service normally provided to you is due to expire soon. The email directs you to a phony Web site made to look like the site of the company you do business with. Once there, you are asked to provide personal information -- such as a credit card or Social Security number -- so that your service can be continued.

How to protect yourself: First clue: Check for misspelled words in the email and closely examine the return address. Unless you have pre-enrolled with a company to do business via email, be suspicious. Contact the company you normally do business with -- via phone or email -- and ask them to verify the request. The scam can be tough to detect since many of the criminals involved in phishing design Web sites that are nearly identical to a real company's Web site.

Back to Top

Modem Hijacking
How it works: This is perhaps one of the most prevalent scams on the Internet today. When you visit a Web site, you'll often see pop-up ads that ask you various questions and offer you a variety of services. To receive them, all you have to do is select "yes" on one or more ads. If you haven't read the fine print, however, you can unwittingly be agreeing to have software downloaded to your modem, which then instructs your modem to make long distance calls to overseas pay-per-call services. These calls can result in hundreds of dollars in charges. This usually impacts dial-up customers, rather than broadband customers. Often you don't know this has happened until you receive your next phone bill.

How to protect yourself: If you are interested in services offered by a pop-up ad, read the fine print closely before you select "yes". Unplug your dial-up phone line from your modem when you're not using it or place a long distance or international call block service on the line you use for dial-up Internet access. If you do see unexpected high charges to exotic locations on your phone bill, call your local or long distance phone company immediately and ask them to investigate.

Back to Top

809 Scam
How it works: Under the scam, you might receive an email, page, or cell-phone text message urgently asking you to call someone in the "809" area code or some other area code that you normally don't call. If you make the call, you may be unwittingly dialing into an expensive overseas pay-per-call service resulting in large charges being placed on your next phone bill.

How to protect yourself: If you don't recognize the phone number or area code, don't return the call. In general, don't respond to such a message in any situation unless you are absolutely sure you know the person or the number you are calling.

Back to Top

Overseas Money Transfer Scam
How it works: This falls under the heading of "if it's too good to be true, it is." You receive an email from someone claiming to represent a foreign government or someone formerly involved with a foreign government. The person will claim that, through a change in leadership or death, he or she has been left with a large amount of money. They will ask your help getting the money out of the country, and if you help you can receive a large share of the money. The message will go on to ask you to respond to the email with bank account information and other personal information to help set up the transfer.

How to protect yourself: Ignore the email. Hit the delete button. It is too good to be true.

Back to Top




What's Happening at FTC Communities

Welcome to FTC Chat!

Four different platforms to access FTC Chat Service Network.


  FTC Friends Network

Sign up and begin adding friends to your network immediately.


RTUBE™ by FTC Communities

At the movies with RTUBE. Grab some popcorn, kick back and enjoy your movie!


  FTC Communities Forum

Welcome to FTC Communities Message Boards. Please post anything you like here.


FTC Communities Gallery

Here you can view members pictures, submit your own, edit, upload and more


  FTC Communities Blogs

Welcome to FTC Communities Blogs. Read hundreds of cool blogs here.



SecurityFocus Vulnerabilities & BugTraq
SecurityFocus is the most comprehensive and trusted source of security information on the Internet. We are a vendor-neutral site that provides objective, timely and comprehensive security information to all members of the security community, from end users, security hobbyists and network administrators to security consultants, IT Managers, CIOs and CSOs.

My Security IQ
The MySecurityIQ Blog Widget provides tips and tricks to help protect you from hackers, theives and online criminals.

Microsoft Lastest Security
Microsoft Security Advisories are a way for Microsoft to communicate security information to customers about issues that may not be classified as vulnerabilities and may not require a security bulletin. Each advisory will be accompanied with a unique Microsoft Knowledge Base Article number for reference to provide additional information about the changes.


 The FTC Network Tools Products & Services


   FTC Corporate | Privacy Statement | Terms of Service | Advertise With Us | Contact Us Security Center | Trademarks | DMCA/Copyright Complaints