2021’s ‘Dirty Dozen’ Tax Scams

2021’s ‘Dirty Dozen’ Tax Scams

The Internal Revenue Service (IRS) recently released 2021’s ‘Dirty Dozen’ tax scams list.  The list comes with a warning for taxpayers, tax professionals, and financial institutions…

Be on the lookout for these 12 schemes and scams!
The list is broken down into 4 separate categories:
  1. Pandemic-related scams like Economic Impact theft
  2. Personal information cons including phishing, ransomware, and phone “fishing”
  3. Ploys focusing on unsuspecting victims like fake charities and senior/immigrant fraud
  4. Schemes that persuade taxpayers into unscrupulous actions such as Offer In Compromise mills and syndicated conservation easements.

The categories are based on who perpetrates the schemes and who they impact.

The IRS continues to see ruses by dishonest people who trick others into doing something illegal or causes them harm. Predators encourage otherwise honest people to do things they don’t realize are illegal or prey on their goodwill.

Several schemes involve fraudsters targeting groups like seniors or immigrants, posing as fake charities impersonating IRS authorities, charging excessive fees for Offers in Compromise, conducting unemployment insurance fraud, and unscrupulously preparing tax returns.

Here are five of this year’s “Dirty Dozen” scams.

Fake charities

The IRS advises taxpayers to be on the lookout for scammers who set up fake organizations to take advantage of the public’s generosity. They especially take advantage of tragedies and disasters, such as the COVID-19 pandemic.

Scams requesting donations for disaster relief efforts are especially common on the phone. Taxpayers should always check out a charity before they donate, and they should not feel pressured to give immediately.

Taxpayers who give money or goods to a charity may be able to claim a deduction on their federal tax return by reducing the amount of their taxable income. But taxpayers should remember that to receive a deduction, taxpayers must donate to a qualified charity. To check the status of a charity, use the IRS Tax Exempt Organization Search tool. (It’s also important for taxpayers to remember that they can’t deduct gifts to individuals or to political organizations and candidates.)

Here are some tips to remember about fake charity scams:

  • Individuals should never let any caller pressure them. A legitimate charity will be happy to get a donation at any time, so there’s no rush. Donors are encouraged to take the time to do the research.
  • Potential donors should confirm the charity’s exact name, web address, and mailing address. Some dishonest telemarketers use names that sound like large well-known charities to confuse people.
  • Be careful how a donation is paid. Donors should not work with charities that ask them to pay by gift cards or by wiring money. That’s how scammers ask people to pay. It’s safest to pay by credit card or check — and only after having done some research on the charity.

For more information about fake charities see the information on fake charity scams on the Federal Trade Commission website.

Immigrant/senior fraud

IRS impersonators and other scammers are known to target groups with limited English proficiency as well as senior citizens. These scams are often threatening in nature.

While it has diminished some recently, the IRS impersonation scam remains a common scam. This is where a taxpayer receives a telephone call threatening jail time, deportation, or revocation of a driver’s license from someone claiming to be with the IRS. Taxpayers who are recent immigrants often are the most vulnerable and should ignore these threats and not engage the scammers.

The IRS reminds taxpayers that the first contact with the IRS will usually be through mail, not over the phone. Legitimate IRS employees will not threaten to revoke licenses or have a person deported. These are scare tactics.

As phone scams pose a major threat to people with limited access to information, including individuals not entirely comfortable with the English language, the IRS has added new features to help those who are more comfortable in a language other than English. The Schedule LEP PDF allows a taxpayer to select in which language they wish to communicate. Once they complete and submit the schedule, they will receive future communications in that selected language preference.

Additionally, the IRS is providing tax information, forms, and publications in many languages other than English. IRS Publication 17, Your Federal Income Tax, is now available in Spanish, Chinese (simplified and traditional), Vietnamese, Korean and Russian.

Seniors beware

Senior citizens and those who care about them need to be on alert for tax scams targeting older Americans. The IRS recognizes the pervasiveness of fraud targeting older Americans, along with the Department of Justice and FBI, the Federal Trade Commission, and the Consumer Financial Protection Bureau (CFPB), among others.

In an effort to make filing taxes easier for seniors, the IRS reminds seniors born before Jan. 2, 1956, that the IRS has re-designed the Form 1040 and its instructions, and that they can use the Form 1040SR and related instructions.

The IRS reminds seniors that the best source for information about their federal taxes is the IRS website.

Offer in Compromise “mills”

Offer in Compromise mills contort the IRS program into something it’s not – misleading people with no chance of meeting the requirements while charging excessive fees, often thousands of dollars.

“We’re increasingly concerned that people having trouble paying their taxes are being duped into misleading claims about settling their tax debts for ‘pennies on the dollar’,” said IRS Commissioner Chuck Rettig. “The IRS urges people to take a few minutes to review information on IRS.gov to see if they might be a good candidate for the program – and avoiding costly promoters who advertise on radio and television.”

The IRS reminds taxpayers to beware of promoters claiming their services are needed to settle with the IRS.  And that their tax debts can be settled for “pennies on the dollar” or that there is a limited window of time to resolve tax debts through the Offer in Compromise (OIC) program.

OIC?

An “offer,” or OIC, is an agreement between a taxpayer and the IRS that resolves the taxpayer’s tax debt. The IRS has the authority to settle,  federal tax liabilities by accepting less than full payment under certain circumstances. However, some promoters are inappropriately advising indebted taxpayers to file an OIC application with the IRS, even though the promoters know the person won’t qualify. This costs honest taxpayers money and time.

Taxpayers should be especially wary of promoters who claim they can obtain larger offer settlements than others or who make misleading promises that the IRS will accept an offer for a small percentage. Companies advertising on TV or radio frequently can’t do anything for taxpayers that they can’t do for themselves by contacting the IRS directly.

Taxpayers can go to IRS.gov and review the Offer in Compromise Pre-Qualifier Tool to see if they qualify for an OIC. The IRS reminds taxpayers that under the First Time Penalty Abatement policy, taxpayers can go directly to the IRS for administrative relief from a penalty that would otherwise be added to their tax debt.

Unscrupulous tax return preparers

Although most tax preparers are ethical and trustworthy, taxpayers should be wary of preparers who won’t sign the tax returns they prepare. For e-filed returns, the “ghost” will prepare the return but refuse to digitally sign as the paid preparer.

By law, anyone who is paid to prepare, or assists in preparing federal tax returns, must have a valid Preparer Tax Identification Number (PTIN). Paid preparers must sign and include their PTIN on the return. Not signing a return is a red flag that the paid preparer may be looking to make a quick profit by promising a big refund or charging fees based on the size of the refund.

Unscrupulous tax return preparers may also:

  • Require payment in cash only and will not provide a receipt.
  • Invent income to qualify their clients for tax credits.
  • Claim fake deductions to boost the size of the refund.
  • Direct refunds into their bank account, not the taxpayer’s account.

It’s important for taxpayers to choose their tax return preparer wisely. The Choosing a Tax Professional page on IRS.gov has information about tax preparer credentials and qualifications. The IRS Directory of Federal Tax Return Preparers with Credentials and Select Qualifications can help identify many preparers by type of credential or qualification.

Taxpayers should that they are legally responsible for what is on their tax return regardless of who prepares it. Consumers can help protect themselves by choosing a reputable tax preparer.

Unemployment insurance fraud

Unemployment fraud often involves individuals acting in coordination with or against employers and financial institutions.  Their goal is to get state and local assistance to which they are not entitled. These scams can pose problems that can adversely affect taxpayers in the long run.

States, employers, and financial institutions need to be aware of the following scams related to unemployment insurance:

  • Identity-related fraud: Filers submit applications for unemployment payments using stolen or fake identification information to perpetrate an account takeover.
  • Employer-employee collusion fraud: The employee receives unemployment insurance payments while the employer continues to pay the employee reduced, unreported wages.
  • Misrepresentation of income fraud: An individual returns to work and fails to report the income to continue receiving unemployment insurance payments, or in an effort to receive higher unemployment payments, applicants claim higher wages than they actually earned.
  • Fictitious employer-employee fraud: Filers falsely claim they work for a legitimate company, or create a fictitious company, and supply fictitious employee and wage records to apply for unemployment insurance payments.
  • Insider fraud: State employees use credentials to inappropriately access or change unemployment claims, resulting in the approval of unqualified applications, improper payment amounts, or movement of unemployment funds to accounts that are not on the application.

Below is a shortlist of financial red flag indicators of unemployment fraud:

  • Unemployment payments are coming from a state other than the state in which the customer reportedly resides or works.
  • Multiple state unemployment payments are made within the same disbursement timeframe.
  • Unemployment payments are made in the name of a person other than the account holder or in the names of multiple unemployment payment recipients.
  • Numerous deposits or electronic funds transfers (EFTs) are made that indicate they are unemployment payments from one or more states to people other than the account holder(s).
  • Higher unemployment payments are seen in the same timeframe compared to similar customers and the amount they received.

Stay tuned for additional sections to come on the 2021’s ‘Dirty Dozen’ Tax Scams list.

What is a Credit Score?

What is a Credit Score?

Most of you have heard of it, but what is a credit score?

The most widely used scoring model in the United States and Canada is the FICO credit score. Developed in 1956 by a company called Fair, Isaac & Company (FICO), this model is designed to determine how likely you are to become 90 days late on any payment within the next twenty-four months. The model calculates the probability of loan delinquency.  It does so by comparing patterns in your credit history against the patterns of millions of other consumers.

FICO makes all these comparisons with software that uses complex equations and advanced analytics.  The comparison evaluates all the data in your credit report and distills it into a standardized, three-digit score.

But, let’s back up a minute. Where does all the credit report data come from?

Each financial choice you make – how much you spend on credit, how responsibly you pay down your debts, how many credit-related accounts you have, etc. – gets reported to three credit reporting agencies: Equifax, Experian, and TransUnion. When a lender orders a copy of your credit report, they also usually request the accompanying FICO credit score.  The report boils everything down into a single score based on that agency’s proprietary version of the FICO scoring model.

It’s important to note that while FICO works with the credit agencies, they do not control the information in your credit reports. Fico translates the data provided and returns a standardized score. So, to summarize:

  • You make financial choices.
  • The lending entities you interact with (banks, retailers, etc.) report your choices to the three credit reporting agencies.
  • The agencies use the FICO software to turn your data into a single credit score, which is then delivered to the lender reviewing your application for credit.

It may seem like there are a lot of moving parts, but because the choices you make drive the entire process, ultimately you’re the one in control. In fact, statistics show that, given thirty days, over 80% of loan applicants have the potential to improve credit scores.

 

ID Theft Protection Market Outlook

ID Theft Protection Market Outlook

The id theft protection market outlook is anticipated to achieve a Compound Annual Growth Rate (CAGR) of 13.06% during the period of 2020-2028.  The “Global Identity Theft Protection Services Market Outlook 2028” report from ResearchAndMarkets.com‘s is out.

Identity Theft Protection Services refers to varying services giving people protection and peace of mind against identity theft and fraud. Services can include credit monitoring, ID theft monitoring, and other services that help you if you been targeted.

Factors of growth.
Factors such as the increasing occurrences of cybercrime and identity thefts around the globe, backed by the growing utilization of electronic identity and other advanced technologies are anticipated to promote the growth of the identity theft protection services market.

Additionally, increasing concerns for cyber crimes and identity thefts that has increased significantly in recent years.  These, along with the fear of mishandling important data, is raising the need to increasingly adopt identity theft protection services.  All are anticipated to drive the growth of the global identity theft protection services market.

The global identity theft protection services market consists of various segments.  These segments include type, services, end-user, and region. The theft type segment is further divided into monitoring services and identity recovery & identity theft insurance services. Among these segments, the monitoring services registered the largest share along with a value of around USD 3000 million in the year 2019.

Additionally, the segment is anticipated to cross a value of around USD 8600 million by growing at a CAGR of around 13% during the forecast period. The monitoring services segment is further divided into credit monitoring and identity monitoring. Out of these, the identity monitoring segment registered the largest market share and is further anticipated to grow at a CAGR of around 12% during the forecast period.

Get involved

defend-id is an identity theft protection provider designed for the agency and wholesale channel.  Dedicated to the channel, defend-id, puts the power in the agent’s hands to protect employee groups of all sizes.  The ID Theft Protection Market Outlook is great!  Don’t miss out on this timely, relevant benefit, check out defend-id today!

defend-id Agency Partnership Opportunities: https://www.defend-id.com/opportunities

Agency Sign up Process: https://youtu.be/bOQ2VU1meW0

Relevant Articles: Breached Records Skyrocketed in 2020

Data Privacy Day, January 28th!

Data Privacy Day, January 28th!

Data Privacy Day, January 28th is a day that highlights what we can do in our personal and professional lives to ensure we are aware of the risks and doing our best to keep our data safe. 

We all feel an increased exposure of our personal data.  In fact, 79% of adults have concerns about how companies are using their information, according to a Pew Research Center study.   But if we are serious about safeguarding ourselves and our customers there are some things we can learn about the data we create, how it is collected and ultimately used.  

Here are a few simple but critical tips to consider when managing your personal data. 
  1. Our personal information is a currency.  We need to value and protect our personal information like money because it has a true value in the market.  This data is valuable to companies as well as bad actors who are buying and selling our information on the dark web for profit.  Our advice is to consider the benefits vs consequences of all the information you are providing online.  
  2. Passwords, Passwords, Passwords… have you ever seen one of these lists without the reference to passwords?  NO, and that is because we still have poor password habits.  Make your passwords long and complex.  Do not use the same password for multiple accounts and PLEASE do not use a post-it note with passwords stuck to your computer!  Consider using a password vault app.  
  3. 2-Factor Authentication.  Great passwords are a start but 2-factor authentication for key accounts should also be used.  Turn on these features for all of your financial accounts and any other account where it is available. 
  4. Apps and Privacy Settings!  Apps are more intrusive than you think!  Many ask for your location, contact information,  and access many other things before you can even use them.  We suggest you manage your privacy settings to adjust them to your comfort level, NOT what they suggest or want.  Every app you use has different privacy settings and features but the NCSA’ Manag Your Privacy Settings Page is very helpful in getting you started: https://staysafeonline.org/stay-safe-online/managing-your-privacy/manage-privacy-settings/ 
  5. Think before you CLICK!  One-click can do so much damage to your privacy, customer data or create opportunities for Breach.  If you are at home or at work, make sure you only click on links you are familiar with.  If you are unsure, ask your IT team or leave it alone. 

BONUS:  What you share on social media may last forever.  Think about what you are posting, who will see it, and how it could be used. 

Data Privacy Day, January 28th gives us an opportunity to consider how to view our data and how we use it.  More importantly, it gives us a chance to look at how we let others use it.  

More Tips HERE:

 

Internet of Things is Exposing You

Internet of Things is Exposing You

The Internet of Things (IoT) is exposing you more than you may think!  The IoT allows smart technology products such as gaming devices, home appliances, medical wearables, sports equipment, cars, and toys to send and receive data over the internet and to be controlled remotely

After hearing the phrase “uncertain times” for the last six months, I believe that it may be overused. Most consumers tune out the meaning of overused words and phrases relating to risk and danger.

Unfortunately, words such as cybersecurity, data breach, identity theft, personal privacy, and stolen credentials are still not understood by consumers.

Consumers continue to read that weak passwords and phishing emails as common access points for hackers and they are!.  But, the new access point is the IoT as hackers are taking advantage of unsecured access to smart technology.

Two IoT exposure examples:
  1. Two recent examples include Why the Garmin Data Breach Should Be a Wakeup Call for Every CEO (please see here)
  2. Amazon Ring Leaks Thousands of Customer Data (please see here).

According to Chief Executive Magazine, “Garmin confirmed it had been the victim of a cyberattack that caused a days-long outage in late July, during which users worldwide were unable to upload their fitness data from the company’s sports devices. Garmin reportedly paid a sizable ransom to get its data back.”

And according to Threatpost – which is a leading source for IT and business security – “2019 saw an explosion of privacy issues and scandals for Amazon-owned Ring.  Researchers found several flaws in the IoT device, including one that allowed attackers to spy on families, or one that exposed Wi-Fi network passwords.”

The good news is that smart technology has the potential to improve our lives from home security, energy conservation, to physical fitness.  The bad news is that it increases exposure with poor security features and places the responsibility of security on the consumer.

The fact is smart technology devices collect, store, process, and use personal information. For example, information such as names, addresses, phone numbers, email addresses, payment account information, GPS-based location, and activity patterns.

A new security report from Palo Alto Networks states that “57% of IoT devices are vulnerable to cyberattacks of medium to high severity.”

The Palo Alto report offered best practices to protect IoT devices from cyberattacks including:

So, yes, the Internet of Things is exposing you but as described above, there are ways to mitigate that risk.  Enjoy your smart technology devices, stay safe, change your default passwords, and stay up to date on the latest IoT updates.

By Mark Pribish
Vice President and ID Theft Practice Leader

An additional article about the Internet of things:  PERSONAL PRIVACY AND THE INTERNET OF THINGS (IOT)
or… How public Wifi is putting you at risk:  Public WiFi is Putting You at Risk

Online Students are Targeted

Online Students are Targeted

With colleges and universities beginning the new school year, online students are targeted in ID Theft and Fraud schemes!  Online Fraud Schemes that we did not have to worry about when I was in school.  I had the time of my life and made many lifetime friends when I attended the University of Dayton!  Student life was simple, no laptops, no smartphones, no social media, socializing at the library, and the music was fantastic. 

But what is happening now?

Now more than ever, Laptops, Smartphones, Social Media, and advanced schemes have increased the risk for students. Risks that now are more prevalent due to the majority of students studying online remotely, due to the COVID-19 pandemic,  creating higher risk.  And this May 27, 2020, Federal Trade Commission (FTC) article titled COVID-19 scams targeting college students confirms it. 

With a significant increase in phony LinkedIn, Facebook, and other social media friend requests placing many students at risk – as this August 12, 2020 article titled COVID-19 is shattering cyberattack records highlights – the daily inundation of misinformation has given cybercriminals an endless resource of information to implement their attacks. 

But college students are not the only targets
K-12 districts across the U.S. have become targets based on this July 1, 2020, article titled US schools leaked 24.5 million records in 1,327 data breaches since 2005.

California had the most educational data breaches accounting for 157 of the 1,328 breaches (11.8 percent).

The worst-hit states include:

  • New York with 89
  • Texas with 79
  • Illinois and Ohio each with 60
  • Florida with 58

Overall, Colleges account for 74% of education data breaches. 

Please see this July 14, 2020 article titled FBI warning-cybercrimes are up and school districts could be the target,  for more information. 

What students and parents to do mitigate risk?

Students and Parents can mitigate exposure to cyber scams and identity theft in the following ways.

  1. The COVID-19 pandemic has new email phishing attacks that try to trick parents working and students studying remotely into giving away credentials for access to their employers’ and college/university networks. You need to stay vigilant and be careful with every email.
  2. A new voice phishing scam uses a combination of one-on-one phone calls and custom phishing sites to steal VPN credentials from again – both parents and students.
  3. Limit what you share online, use, and regularly change strong passwords on devices.
  4. Know your rights.   “Student rights” under the Federal Educational Rights and Privacy Act (FERPA) protects the privacy of student records.

Online students are being targeted by ID theft criminals now more than ever.  As these criminals continue to use student information to obtain employment, rent an apartment, open a utility, cell phone, bank account, or to access government benefits be ever aware of new and emerging scams.

by Mark Pribish
VP and ID Theft Practice Leader

Related COVID-19 Fraud articles:

Fraud in the Midst of COVID-19
Telehealth Creates Cyber Risks
Coronavirus Fear and Anxiety Drives Phishing Scams

error

Enjoy this blog? Please spread the word :)