What Is Elder Financial Exploitation?
Elder financial exploitation (EFE) is the illegal or improper use of an older person’s funds, property, or assets. It is the fastest-growing form of elder abuse, as perpetrators may be family members, friends, neighbors, caregivers, health care providers, business associates, or strangers. Elder financial exploitation crimes usually fall into two categories:
Elder Theft
Trusted individuals steal money or belongings from seniors. Elder theft comprises two-thirds of EFE cases. Some examples include:
- Forging checks
- Stealing retirement or Social Security benefits
- Using credit cards or bank accounts without permission
- Changing names on wills, bank accounts, life insurance policies, or real estate titles without permission
Elder Scams
Strangers deceive older adults into transferring money to them for promised goods, services, or financial benefits which do no exist or were misrepresented. Some examples include:
- Tech Support Scams: Scammers pose as tech repair agents to access victims’ computers and finances.
- Investment Scams: Perpetrators induce investors to make purchases based on false information and promises of large returns with minimal risk.
- Romance Scams: Criminals seek money from victims on dating apps and social media.
- Government or Family Imposter Scams: Fraudsters impersonate government officials or family members to demand money.
- Lottery Scams: Criminals claim victims must pay taxes or fees to access winnings from a lottery or raffle.
- Virtual Kidnapping Scams: Fraudsters place anonymous calls to family members claiming a loved one has been kidnapped and demand ransom money be paid. Criminals are now using technology such as artificial intelligence to make hyper-realistic audio recordings using the voice of a loved one to make the ransom call seem very real.
Why Are Older Adults Targeted?
Seniors generally have more accumulated wealth, thanks to a lifetime of working, investing, and saving. Older adults who are most vulnerable to exploitation may:
- Have previously been a victim of fraud or scams.
- Suffer from mild cognitive impairment or dementia
- Be dependent on others to meet daily needs
- Experience social isolation
- Lack information about scams and fraud
- Be unfamiliar with technology, online services, and safe online behavior
It is important to note that any age demographic can be victimized, not just older adults.
Spot the Red Flags of Elder Financial Exploitation
Recognize the signs of elder financial exploitation, such as changes in behavior or unusual account activity. Watch out for elders who:
- Make sudden and unusual changes to accounts, such as altering contact information or adding new contacts who are located overseas.
- Cannot explain unusual account activity or appear confused about financial transactions.
- Appear distressed, fearful, and anxious to follow directions provided by others (e.g., they’ve received instructions from an unknown third party).
- Seem fearful of, or submissive to, a caregiver.
- Indicate a transaction is for, or on behalf of, an online friend or romantic partner.
- Urgently want to send money to a loved one because of an emergency, but the recipient is an unconnected individual or third-party business.
- Indicate an interest in purchasing large numbers of gift cards or prepaid access cards.
- Send multiple checks or wire transfers with memos such as “tech support services,” “winnings,” “taxes,” “home improvement,” “investment,” or “crypto investment.”
- Close CDs or accounts without regard for penalties.
- Suddenly discuss buying cryptocurrency.
Recognize, Respond, and Report
Help protect older adults by recognizing, responding, and reporting elder financial exploitation. For more information on elder financial exploitation, you can access the following resources:
- ABA Foundation's Older Americans Resource Page
- Federal Bureau of Investigation
- Department of Justice
- Internet Crime Complaint Center
- Consumer Financial Protection Bureau
- Federal Trade Commission
- National Center on Elder Abuse
- National Adult Protective Services Assocation
Stay Informed! Learn More About Recent Scams and Alerts!
Phishing, vishing, and smishing all involve spoofed communication that appears to be from a legitimate business urging you to “act immediately” or your account might be closed. Phishing uses fraudulent email messages, smishing employs text messages, and vishing combines both spam phone calls and fraudulent emails. Hackers use this information to access your accounts to withdraw money or make purchases.
Here is an example of a common email phishing scam.
Ways to Avoid Phishing, Vishing, and Smishing
- When purchasing a product or service, go directly to a company's website. Pay close attention to the URL in the browser window and watch for the padlock symbol that indicates you are visiting a secure site.
- Verify messages by contacting the company or financial institution that supposedly sent them.
- Confirm the sender’s identity before replying to email requests and before opening attachments or clicking on links, even if they appear to come from a legitimate source.
- Look up email addresses, website URLs, and phone numbers of reputable companies. Do not automatically use those provided in the messages or over the phone before doing your research and homework.
- Whether it’s a phone call, suspicious email, or an unsolicited text, always be cautious.
- The email typically contains a convincing phishing message, like a fraudulent charge, designed to alarm the user into calling the number provided.
- These phishing emails are usually composed of a single unclickable picture, displaying the phone number multiple times to encourage a call back.
- When victims call, they are often directed to an overseas call center where operators are handling multiple call back scams.
- In cases linked to ransomware groups, the fraudulent call center is specifically prepared for the scam, aiming to install ransomware or other malicious software on the victim's computer.
Ways to Avoid Phishing
- Do not call the number in the suspicious email. Go directly to a company's website.
- Look up email addresses, links, and phone numbers. Do not use those provided in the messages or over the phone.
The FBI is warning financial institutions and investors about cyber criminals creating fraudulent cryptocurrency investment applications (apps) to defraud cryptocurrency investors. Read more.
The FBI Criminal Investigative Division and the United States Securities and Exchange Commission’s Office of Investor Education and Advocacy (OIEA) warn of fraudsters swindling investors while pretending to be registered brokers or investment advisers. Read more.
It’s no secret that scams and fraudulent activity are at an all-time high. Fraudsters will stop at nothing to gain access to valuable personal information, access account numbers, and/or find ways to illegally receive payment from you in any manner. Read more.
Ransomware is a type of malware that is unwittingly downloaded when you click on a tainted link, open an infected attachment, or even click on a phony advertisement. If your computer freezes, and a message on your screen tells you that your computer will remain frozen until you pay a ransom or a fee, you have become a victim of ransomware. The criminals often ask for a minimal amount of money to give you access to your computer again. They believe that you are comfortable paying them to avoid the frustration of the situation. Sometimes the denominations are very small and the accepted method of payment transmission might include wiring money through a common wire service. Thieves also may ask you to make a payment via a premium text message or send them money as a type of online cash.
Protect Your Devices Against Ransomware
- Install current firewall, anti-virus software, and anti-malware software on your computer, tablet, and other mobile devices.
- Back up everything on your devices to a cloud service or a USB drive.
- Never click on a link or download an attachment unless you have independently confirmed that the communication or advertisement is legitimate. Emails that contain links to businesses sent from friends may have been hacked by scammers. Go directly to a company’s website instead of clicking on a link in an email.
- Create different passwords for all of your accounts.
- Change your passwords regularly.