COMMON FRAUD TACTICS
Email Account Takeover
A scammer gains access to a legitimate personal or business email or uses spoofing to imitate a trusted sender and then requests money or private information. Warning signs:
• Odd grammar, tone, or misspellings
• Sudden emotional requests such as medical emergencies
• Refusal to speak on the phone using a known number
• Email addresses or reply-to fields that look familiar but are slightly altered
Romance Scams
Romance scams occur when a fraudster builds a fake emotional relationship online, often over weeks or months, to gain trust and exploit feelings of companionship or affection. These scams frequently target older adults or individuals experiencing life transitions, and eventually involve requests for money, gifts, or participation in fraudulent “investment” opportunities framed as urgent or confidential.
Warning signs:
• A new relationship where you have never met or spoken in person
• Sudden requests to liquidate assets or send funds overseas
• Pressure to keep the request secret or extreme urgency
Government Imposters
Scammers pose as IRS, DEA, CDC, police, or charitable organizations demanding sensitive information or payment.
Warning signs:
• Calls, texts, or emails claiming urgent government action
• Requests for personal information
• Requests for payment through wire transfers, gift cards, or crypto
Grandparent Scams
A caller pretends to be a relative in trouble, often claiming to be abroad and begging for urgent financial help.
Warning signs:
• Calls at unusual hours
• Emotional pressure to act quickly
• Requests to purchase gift cards or send funds immediately
Tech Support Scams
Pop ups or phone calls claim your device has an issue and direct you to call support. The scammer then takes remote control, captures personal data, and attempts to access accounts.
Warning signs:
• Unexpected prompts asking you to allow remote access
• Requests for financial login information
• Claims that money needs to be moved to keep it safe
HOW CRIMINALS TRY TO MOVE MONEY
Fraud attempts often include:
• Introducing new phone numbers or payment instructions
• Requesting quick changes to email, banking, or account information
• Encouraging transfers to a personal bank account or cryptocurrency
Many scammers attempt to redirect assets into traditional retail bank accounts through same-name transfers, where funds are moved into accounts that appear to be held in the client’s own name. These transfers can feel routine or low risk, which is exactly why they are exploited. Retail banks often have fewer relationship-based safeguards and may not scrutinize the broader context of a transaction as closely as wealth management firms. This creates an opportunity for illicit funds to be moved, layered, or withdrawn more easily, reducing the likelihood of early detection. If a request does not match your normal financial activity, stop and verify
HOW WE PROTECT YOU AND HOW YOU CAN HELP
Protecting your accounts is a shared responsibility. We employ multiple safeguards to prevent unauthorized activity, and your awareness plays an important role in strengthening those protections. Together, these practices help reduce the risk of fraud and financial exploitation.
1. Knowing Our Clients and Their Financial Behavior
At Janney, our advisors truly know our clients. We build long-standing personal relationships and develop a deep understanding of your financial goals, habits, and typical transaction patterns. This familiarity allows us to quickly recognize activity that appears unusual or out of character and step in before a potential loss occurs.
2. Investigating Abnormal or High-Risk Requests
When a request does not align with your historical behavior, involves urgency, secrecy, or changes to standard instructions, our team treats it with heightened scrutiny. This may include delaying transactions, escalating reviews, or requesting additional confirmation to ensure your accounts remain secure.
3. Verifying Information on Every Transaction
Our advisors regularly verify instructions using outbound phone calls or video calls to confirm we are speaking directly with you and not an imposter. This verification process is a critical safeguard, especially for requests involving large transfers, changes to personal information, or new account destinations.
4. Using All Available Resources
We utilize firm-wide security tools, account monitoring systems, and internal controls to identify and address potential risks. When appropriate, we collaborate across teams to ensure every available resource is used to protect your assets.
How You Can Help
• Never give anyone remote access to your computer or phone unless you initiated the request
• Confirm any unusual or urgent requests directly with us using a phone number you already know
• Be cautious of unexpected changes to your email address, phone number, or banking details
• Use account alerts and digital notifications to stay informed of movement in your accounts
• Speak up if something feels wrong, even if it seems small
At Janney, our advisors truly know our clients. We build strong personal relationships and understanding of your financial habits, which allows us to quickly recognize when something looks out of character and intervene before a loss occurs. Our advisors regularly verify instructions through outbound phone calls or video calls to ensure we are speaking with you and not an imposter. It is an important safeguard to protect your wealth.
Our Commitment
Fraud remains one of the most common financial crimes in the United States, and no organization is completely immune. According to industry reports, millions of Americans are impacted by fraud-related financial losses every year. This is why our firm continuously updates our fraud prevention systems and why we emphasize careful verification on every transaction involving your assets. Protection is proactive, and by staying vigilant together, we prevent bad actors from compromising your financial security.