ADVISORY: Detectives in local counties report that in several recent robberies, called bank jugging or jugging, suspects have watched their victims withdraw a significant amount of cash from a bank. Then the suspects follow the potential victim by car. When the victims in these robberies park their cars at another location, leaving the money they just withdrew in their car, the criminals strike. Typically, they'll break a car window and grab the money -- or worse, the person. Please use care and situational awareness to protect yourself and your money. Read additional tips at https://lnkd.in/eJu7RheB. #towerstrong
Tower Federal Credit Union’s Post
More Relevant Posts
-
CEO | Entrepreneur | National Security | Intelligence | Force Multiplier | Status Quo Disruptor | Northlake Town Council Member
Another excellent example of Texas Department of Public Safety keeping up the good work. I have long said that although money is laundered in multiple ways through #Chinese financiers or #Mexican financiers, drug and human trafficking is a cash business. #CashisKing, always has been and always will be. Although #Cartels make a lot of money, they also have to spend a lot of money. What does this tell us? #MAJOR amounts of #IllicitCash is headed #South to the #SouthernBorder. The American dollar in cash is still the #best way to #payoff the huge #payroll the cartels have in #Mexico, from #MexicanPoliticians to the low level soldier, cash is impossible to #Trace. #OperationLoneStar continues to bear fruit and as the weather turns cooler as we head into fall, expect activity to continually increase. Babel Street ShadowDragon PenLink World of Crime UPS FedEx FedEx Latin America and Caribbean Saia Inc. DHL DHL Supply Chain DHL Express Estes Express Lines Old Dominion Freight Line XPO Grant Rogers Robert A. Heber Jr. Robert A. Heber Jr. Gregory Roberts Andrew Bustamante, MBA Abel Flores Vincent Vargas Peter J. Forcelli Jesus Romero Thomas Homan Derek Maltz Jaeson Jones Michael Banks Governor Greg Abbott Texas Attorney General Texas Military Department Shawn Ryan Sarah Adams Scott Mann Joe Rogan Joe Rogan experience Ben Owen Derek France Rik Thrailkill Sheriff Thaddeus Cleveland
#OperationLoneStar: Traffic Stop Leads to Arrest and Money Laundering Charge Every day, DPS Troopers are working hard to take criminals off the street and protect Texas communities. Recently, a DPS Trooper stopped a commercial vehicle to conduct a safety inspection on US-281 in Brooks County. During the inspection, the driver, who was from Mexico, showed signs of deception, including a false logbook. Upon receiving verbal consent to search the vehicle, a DPS K-9 alerted Troopers to an orange juice box containing nearly $300,000 under the sleeper berth. The driver was arrested and charged with money laundering. #ProtectAndServe
To view or add a comment, sign in
-
Assistant Manager | Anti Financial Crime (AML/CTF, Sanctions,ABC and Anti-fraud) Risk Management and Crypto-enthusiast
Use this case study as a gentle reminder to consider all possible risk elements as part of your #fraudrisk assessment. You can also use The Australian Standard on Fraud and Corruption Control (AS 8001:2021) as a framework to assist with control assessment of applicable fraud risks across all aspects of your operational and administrative functions. #fraudprevention and #fraudresponse
A Sydney man has been sentenced to two years and six months imprisonment for swindling more than $66,000 from a dozen victims. The man used his role as an IT support worker with a third-party provider to the Australian National Maritime Museum (ANMM) to access their accounts payable system and illegally change bank account details to his own. The man also unlawfully obtained the financial details of several individuals and businesses recorded in ANMM’s systems, which he used to make fraudulent purchases. These included more than $15,000 on 4WD upgrades and mechanical work, and more than $20,000 on high-powered IT equipment. The ANMM detected irregularities in its financial records and reported the fraudulent activity to the AFP who arrested the man.
To view or add a comment, sign in
-
| CyberArk Certified Delivery Engineer PAM (CDE-PAM) & CPC (CDE-CPC) | Security Engineer | Cyber Security | Network Security | Data Security | Reverse Engineer by hobby |
A perfect example of Internal malicious attacks refer to security breaches perpetrated by individuals within an organization, such as employees, contractors or partners. These attacks can take various forms including insider threats, sabotage, data theft, or fraud. Common motives behind internal malicious attacks include financial gain, revenge, espionage, or negligence. Preventive measures typically involve implementing strict access controls, monitoring employee activities, conductings security audits, and providing cybersecurity awareness training to staff.
A Sydney man has been sentenced to two years and six months imprisonment for swindling more than $66,000 from a dozen victims. The man used his role as an IT support worker with a third-party provider to the Australian National Maritime Museum (ANMM) to access their accounts payable system and illegally change bank account details to his own. The man also unlawfully obtained the financial details of several individuals and businesses recorded in ANMM’s systems, which he used to make fraudulent purchases. These included more than $15,000 on 4WD upgrades and mechanical work, and more than $20,000 on high-powered IT equipment. The ANMM detected irregularities in its financial records and reported the fraudulent activity to the AFP who arrested the man.
To view or add a comment, sign in
-
I provide 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐭𝐢𝐩𝐬 that keep you, your family & your business secure. 𝐒𝐭𝐚𝐲 𝐀𝐥𝐞𝐫𝐭 & 𝐁𝐞 𝐒𝐚𝐟𝐞! #𝐒𝐀𝐁𝐒
If you want to keep your family safe, these are 2️⃣ terms you need to learn & know how to prevent. ⬇️⬇️⬇️ 🚨 A SLIDER: A criminal who typically targets women while fueling their vehicle. The perpetrator “slides” in & out of the victim's vehicle while taking their purse, other valuables and/or even driving off. 🚨 A JUGGER: A criminal who observes individuals withdraw large sums of money from a bank & then follows the victim, to eventually break into the vehicle after the victim makes a stop or sometimes even attempts an aggravated robbery. Please review the comment section now for some elementary yet helpful tips that can prevent these attacks from occurring & keep you & your family safe. Stay Alert & Be Safe! #SABS #CssOne #CredibleSecurity
To view or add a comment, sign in
-
The Nova Scotia Securities Commission continues to see an increase in reports of investment fraud. However, not all types of fraud should be reported to the Commission. If you become a victim of investment fraud or any type of fraud you should report it to the proper authorities. Learn more about what types of fraud should be reported to the Nova Scotia Securities Commission and how to report other types of fraud to law enforcement by reading our blog post on fraud complaint reporting
Our latest blog post is a primer on reporting fraud to the Nova Scotia Securities Commission, your local police service, such as Halifax Regional Police and Royal Canadian Mounted Police | Gendarmerie royale du Canada as well as to the Canadian Anti-Fraud Centre If you or a loved one were a victim of fraud would you know where to report it? NSSC investigates investment fraud, but not all types of fraud should be reported to us under our mandate.. Learn how and where to report fraud by reading our latest blog post. https://lnkd.in/eWFFE7zX
To view or add a comment, sign in
-
Risk and Audit Professional | Space Science Enthusiast | Cricket lover | Bridging numbers to IT and Cyber
Perfect examples how lack of oversight of an outsourced IT functions leaves a mark on financial statements.
A Sydney man has been sentenced to two years and six months imprisonment for swindling more than $66,000 from a dozen victims. The man used his role as an IT support worker with a third-party provider to the Australian National Maritime Museum (ANMM) to access their accounts payable system and illegally change bank account details to his own. The man also unlawfully obtained the financial details of several individuals and businesses recorded in ANMM’s systems, which he used to make fraudulent purchases. These included more than $15,000 on 4WD upgrades and mechanical work, and more than $20,000 on high-powered IT equipment. The ANMM detected irregularities in its financial records and reported the fraudulent activity to the AFP who arrested the man.
To view or add a comment, sign in
-
Defeating Financial Crime with Tech | General Manager | Compliance and Third-party Risk Management Solutions | Moody’s | KYC/KYS | Wharton MBA | Engineer & Global Innovator | Building Safer Financial Systems
It’s horrifying to discover that the most frequent victims of sextortion – a #Scam that involves soliciting explicit pictures or videos from victims and using them to extort money – are children? Teenage boys are most likely to be targeted by criminals, as shown by various data sources. For instance, according to FBI, from October 2021 to March 2023, sextortion involved at least 12,600 young male victims in the USA alone. 20 of these cases ended with the victim’s suicide. This underscores the need for everyone to do everything in their power to prevent this heinous crime and protect our children. Financial institutions in particular can play a vital role, as having robust and efficient #KYC and #AML systems in place can significantly help in detecting suspicious behavior, unearthing criminal organizations, and preventing them from laundering the money gained through sextortion. Do you agree? https://lnkd.in/etj8h-ec
To view or add a comment, sign in
-
SVP / Relationship Manager - Orange County Institutional Client Group at U.S. Bank - steven.krenik@usbank.com - (949) 863-2363
Fraudsters are relentless in their schemes to target businesses and exploit their cyber vulnerabilities. Learn some of the best ways to protect your organization.
Eighty percent of U.S. organizations were victims of payments fraud in 2023, studies show. Learn how companies can protect themselves against these crimes: https://bit.ly/3yDtnTf
To view or add a comment, sign in
-
Fraudsters are relentless in their schemes to target businesses and exploit their cyber vulnerabilities. Learn some of the best ways to protect your organization.
Eighty percent of U.S. organizations were victims of payments fraud in 2023, studies show. Learn how companies can protect themselves against these crimes: https://bit.ly/3yDtnTf
To view or add a comment, sign in
-
Fraudsters are relentless in their schemes to target businesses and exploit their cyber vulnerabilities. Learn some of the best ways to protect your organization.
Eighty percent of U.S. organizations were victims of payments fraud in 2023, studies show. Learn how companies can protect themselves against these crimes: https://bit.ly/3yDtnTf
To view or add a comment, sign in
5,025 followers