LISTEN TO DETECTIVE MUGAN ON WHBL
THE SECOND AND FOURTH THURSDAY OF EACH MONTH
CLICK HERE FOR PAST TOPICS
On this page:
For Fraud Victims
Prevention Strategies
Fraud and Scam Examples
Other Helpful Links
For Fraud Victims
If you have been the victim of fraud or identity theft, consider these steps:
Step 1: Call the companies where you know the fraud occurred; ask them to close or freeze your accounts(s); change logins, passwords, and PINs for your account(s).
Step 2: Place a fraud alert and get your credit reports; consider a credit freeze.
Step 3: Report identity theft to the FTC.
Step 4: You may choose to file a report with your local police department; go to your local police department with:
- a copy of your FTC Identity Theft Report (from Step 3)
- a photo, government-issued ID
- proof of your address (mortgage statement, rental agreement, or utility bill)
- any other proof you have of the theft (bills, IRS notices, etc.)
Click here if you need to report fraud or identity theft to the Sheboygan Police Department.
Prevention Strategies
- Don’t click links in unexpected emails or texts — they’re likely phishing scams.
- Shop smart: Use trusted sites and look for “https” or a padlock in the browser.
- Avoid public Wi-Fi for banking or private browsing — use a VPN if needed.
- Never pay government agencies or charities with gift cards or money transfers.
- Overpayment scams are always fake — don’t deposit checks and send money back.
- Freeze your credit to block identity theft.
- Check your credit for free at annualcreditreport.com.
Fraud and Scam Examples
We have provided several examples below of fraudulent checks, currencies, and letters. These examples highlight common warning signs and elements to watch out for when considering whether something is fraudulent or a scam:
- Fraudulent Examples of Checks
- Fraudulent Examples of Currency
- Car Wrap Letter/Scam
- IRS Fake Login
- AT&T Phishing Scam
- Bank of America Phishing Email
- Chase Bank Phishing Email
- Costco Phishing Email
- Wells Fargo Phishing Email
Below are examples of legitimate documents and elements which show the user that they are coming from trustworthy sources: