Today an unknown number of Legionnaires received an email similar to this- IT IS A SCAM!

Rick,
Are you available to assist? I am out of the State now and I’ve got credence in you to take care of this. I would have called your phone but I presently do not have access to my mobile phone. Department of California- The American Legion Post 156 needs some gift cards for donation to Veterans at Hospice and Palliative care units for preventive items for Corona Disease( COVID 19). I have decided to make it a personal duty. I will be responsible for the reimbursement.
Ed Grimsley,
Commander.

 

It’s a scam. We need to be vigilant and if or when you receive an email like this, take a close look at the email address of the person sending the email. If it does not match the email address you would normally expect to see, it is probably a scam.
However we are not experts on such issues, so we have included a link to the FBI information on Scams and Safety.
FBI Scams and Safety
We highly recommend you read and follow their professional advice. We also have included a link for you to file a complaint with the Internet Crime unit at the FBI.

However we are not experts on such issues, so we have included the advice of the FBI on Internet Fraud. We highly recommend you read and follow their professional advice. We also have included a link for you to report Internet Crime to the FBI.

Internet Fraud – FBI

Internet fraud is the use of Internet services or software with Internet access to defraud victims or to otherwise take advantage of them. Internet crime schemes steal millions of dollars each year from victims and continue to plague the Internet through various methods. Several high-profile methods include the following:

    • Business E-Mail Compromise (BEC): A sophisticated scam targeting businesses working with foreign suppliers and companies that regularly perform wire transfer payments. The scam is carried out by compromising legitimate business e-mail accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds.
    • Data Breach: A leak or spill of data which is released from a secure location to an untrusted environment. Data breaches can occur at the personal and corporate levels and involve sensitive, protected, or confidential information that is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
    • Denial of Service: An interruption of an authorized user’s access to any system or network, typically one caused with malicious intent.
    • E-Mail Account Compromise (EAC): Similar to BEC, this scam targets the general public and professionals associated with, but not limited to, financial and lending institutions, real estate companies, and law firms. Perpetrators of EAC use compromised e-mails to request payments to fraudulent locations.
    • Malware/Scareware: Malicious software that is intended to damage or disable computers and computer systems. Sometimes scare tactics are used by the perpetrators to solicit funds from victims.
    • Phishing/Spoofing: Both terms deal with forged or faked electronic documents. Spoofing generally refers to the dissemination of e-mail which is forged to appear as though it was sent by someone other than the actual source. Phishing, also referred to as vishing, smishing, or pharming, is often used in conjunction with a spoofed e-mail. It is the act of sending an e-mail falsely claiming to be an established legitimate business in an attempt to deceive the unsuspecting recipient into divulging personal, sensitive information such as passwords, credit card numbers, and bank account information after directing the user to visit a specified website. The website, however, is not genuine and was set up only as an attempt to steal the user’s information.
    • Ransomware: A form of malware targeting both human and technical weaknesses in organizations and individual networks in an effort to deny the availability of critical data and/or systems. Ransomware is frequently delivered through spear phishing emails to end users, resulting in the rapid encryption of sensitive files on a corporate network. When the victim organization determines they are no longer able to access their data, the cyber perpetrator demands the payment of a ransom, typically in virtual currency such as Bitcoin, at which time the actor will purportedly provide an avenue to the victim to regain access to their data.

Frequent instances of Internet fraud include business fraud, credit card fraud, internet auction fraud, investment schemes, Nigerian letter fraud, and non-delivery of merchandise. For information on the most common complaints and scams, see the annual reports of the Internet Crime Complaint Center (IC3), a partnership of the FBI and the National White Collar Crime Center. Also see its information on Internet Crime Schemes and its Internet Crime Prevention Tips.

Web Team
Author: Web Team

Rick is a veteran of the Marine Corps and served during the Vietnam War era. He serves as a Technical Advisor to the Media and Communications Commission. He is a member of the Department Web Team. Rick received the Otto Hasse Legionnaire of the Year Award in 2016, Department of California Award for work on the department website in 2019, and in 2023 Rick received The American Legion Medal of Merit from the Department of California.