ࡱ>  ` bjbj 8{ (((((|tTL)***:+Q-v-$- t"t"t"t"t"t"t$vh]ytFt 0-@Q- 0 0Ft*:+[t666 0R*L:+ t6 0 t66Npm"o:+@) U7(1o0 tqt0tHoy6Fy`ooyrd-vu.T6.D /---FtFt6---t 0 0 0 0dl l ACCOUNT FRAUD - WHAT CAN YOU DO? A SELF HELP GUIDE FROM P.C. FEDERAL CREDIT UNION Are you informed enough to protect yourself from what many are calling Americas fastest growing type of robbery. Or are you lulling yourself into compla-cency by convincing yourself that its not really a problem? Your credit union has safeguards in place to help prevent & detect account fraud, but it is your knowl-edge, awareness & alertness that are the most important first lines of defense. Our goal is to help STOP these thieves by providing this Account Fraud packet that not only gives information about the many types of Account Fraud it also gives you a resource list that contains phone #s and/or website addresses on who to contact if youve been a victim of Account Fraud so KEEP THIS LIST IN A HANDY PLACE! To combat cyber outlaws, the LooksTooGoodToBeTrue initiative (an Internet fraud prevention campaign being jointly undertaken by federal law enforcement agencies and major corporations) was formed. The Merchant Risk Council, Monster Worldwide, Inc. and Target Corp. have joined the U.S. Postal Inspection Service, the FBI and the Natl White Collar Crime Centers Internet Crime Complaint Center (IC3) in this education awareness campaign. The cornerstone of this Internet fraud prevention campaign is the website  HYPERLINK "http://www.LooksTooGoodToBeTrue.com" www.LooksTooGoodToBeTrue.com. This site offers consumers in-depth information on all types of Internet scams. Consumers can also file complaints via the site CHECK IT OUT! A GOOD RULE OF THUMB TO REMBER IS: IF IT LOOKS TOO GOOD TO BE TRUE, IT PROBABLY IS! Information in this guide was obtained from several resources including the FBI, the U.S. Postal Inspection Service, the U.S. Secret Service, the LooksTooGoodToBeTrue initiative, the Federal Trade Commission, NCUA, FDIC, financial and retail industries, and other members of the Financial Industry Mail Security Initiative (FIMSI). Account fraud can come in many forms, todays interconnected, electronic and high-tech environment make it possible for perpetrators of account fraud to develop elaborate and sophisticated schemes to rob unsuspecting people of their money. The first, and most important step in preventing account fraud is through CAREFUL & DILIGENT SAFEGUARDING OF YOUR ACCOUNT INFORMATION. You can play a big part in this effort: Do not treat your confidential information casually or provide it to unknown parties, especially to solicitations received by phone. Be extra vigi-lent in protecting all of your confidential information. Without boring you to tears we will try and give you a brief description on each type of account fraud and preventative measures you can take. First, check your knowledge of account fraud/identity theft against these five common myths. 1. It only happens to stupid or careless people. Account fraud can happen to anyone. In fact, many thieves are so technologically and criminally savvy, they can snatch your identity through a variety of methods such as hacking into your computer systems, posing as an authority figure or even filling out false change-of-address forms. No one is immune to identity theft. Account fraud is only committed by serious, and anonymous criminals. It may surprise you to learn that many fraud cases are committed by those closest to you; such as friends, family members, neighbors, and coworkers. I only need to worry about account fraud if my wallet/purse has been stolen. While stolen wallets and purses are still one way criminals can gain access to your information, there are countless other methods identity thieves use to steal your identity. For instance, straightforward methods such as burglary, auto theft, check theft and mail theft are still big contributors. So is computer hacking, online & e-mail scams like phishing and computer and computer hard drive rebuilding (which is when a seemingly reputable source upgrades or clears your computer for you while stealing personal information from it) Identity theft can be easily remedied. The price of clearing up the nightmare caused by losing your identity is hun-dreds of hours not to memtion your credibility and hard-earned money. Sometimes, the issues created by identity theft can never be remedied. Thats why its vital to do everything in your power to protect yourself from the crime. It will never happen to me. Okay, so you understand that it happens you just think that it wont. WRONG! Thousands of people are victimized each year and many cases could have been avoided. According to an April 2004 study by the research firm Insight Express, 15% of Americans have been a victim of account fraud/identity theft and only 59% of Americans are actively taking precautions to protect themselves. ACCOUNT FRAUD TYPES  Identity Fraud is when crooks use your name, social security number or that blank, pre-approved credit application you tossed out.  HYPERLINK "http://www.lookstoogoodtobetrue.com/fraud/hacking.html" Hacking  HYPERLINK "http://www.lookstoogoodtobetrue.com/fraud/idtheft.html" Identity Theft   HYPERLINK "http://www.lookstoogoodtobetrue.com/fraud/phishing.html" Phishing/Spoofing  HYPERLINK "http://www.lookstoogoodtobetrue.com/fraud/spam.html" Spam  HYPERLINK "http://www.lookstoogoodtobetrue.com/fraud/spyware.html" Spyware Financial Fraud is any non-violent offense that is committed by or against an individual or corporation and which results in a financial loss.  HYPERLINK "http://www.lookstoogoodtobetrue.com/fraud/advancefee.html" Advanced Fee Scams  HYPERLINK "http://www.lookstoogoodtobetrue.com/fraud/charity.html" Charities Fraud   HYPERLINK "http://www.lookstoogoodtobetrue.com/fraud/debtelimination.html" Debt Elimination  HYPERLINK "http://www.lookstoogoodtobetrue.com/fraud/investmentfraud.html" Investment Frauds Sweepstakes/Lottery Fraud Thousands of American consumers receive sweepstakes promotions but if you have to pay to play or pay to receive your winnings, the promotion is more than likely a scam.  HYPERLINK "http://www.lookstoogoodtobetrue.com/fraud/sweepstakes.html" Sweepstakes/Prizes Scam  Counterfeit Payments Fraud The latest scam to hit American consumers involves counterfeit financial instruments.  HYPERLINK "http://www.lookstoogoodtobetrue.com/fraud/counterfeitcheck.html" Counterfeit Cashier's Checks  HYPERLINK "http://www.lookstoogoodtobetrue.com/fraud/counterfeitmoneyorder.html" Counterfeit Money Orders For example, inexpensive computer technology and improved printers make it easier than ever for thieves to set-up a fraudulent check operation. HACKING Hacking is illegal access by unknown and unauthorized party(s) to a computer system to destroy or disrupt the system or to use it to carry out illegal activities. Run Firewall Protection Software Using a computer without a firewall is like going on vacation and leaving the front door to your home wide open. A firewall creates a protective barrier between your computer and the Internet, essentially making your connection invisible to Internet hackers. A firewall keeps others from seeing that important confidential information. This barrier helps prevent others from being able to intrude into your computer or home network and retrieve important information like credit card numbers or passwords. IDENTITY THEFT Identity theft is a criminal offense. It occurs when a person knowingly transfers or uses, without lawful authority, a means of identification of another person with the intent to commit or to aid or abet any unlawful activity that constitutes a violation of federal law or that constitutes a felony under any applicable state or local law.* Identity Theft and Assumption Deterrence Act, 18 USC 1028[a][7 Identity theft occurs when a crook steals key pieces of personal identifying information, which may include a name, address, date of birth, Social Security number, and mothers maiden name, to gain access to a persons financial accounts. Armed with this information, an identity thief may open new credit or financial accounts, buy cars, apply for loans or Social Security benefits, rent an apartment, or set up utility and phone service in someone elses name. Crooks are working without the usual tools of the trade. Forget sawed-off shotguns & ski masks: your name and social security number will do the trick, or that blank, pre-approved credit application you tossed out with the coffee grounds. Even talking on your phone or surfing the Internet can allow someone you may never meet to rob you of the one thing you may have thought safe from attack: your identity. Identity fraud is digging deep into consumers' pockets -- more than $48 billion was lost last year by financial institutions & businesses individuals lost an estimated $5 billion. The number of ID theft victims and their total losses are probably much higher than reported. It's hard to pin down, because law enforcement agencies may classify ID theft differently--it can involve credit card fraud, Internet fraud, or mail theft, among others Identity theft is the fastest growing crime in America learn how to protect yourself. The perpetrator may use a variety of tactics to obtain your personal information and drain your finances: posing as a loan officer and ordering your credit report (which lists lines of credit); "shoulder surfing" at the ATM or phone booth to get your PIN code; "dumpster diving" in trash bins behind businesses or apartments for unshredded credit applications, canceled checks, bank records or any documents containing personal information; or, stealing mail right out of your own mailbox. It may take months before you realize you're a victim of identity theft. But, when you get turned down for credit, a car loan, or a mortgage on your dream house because you've got a bad credit rating and you know you've paid your bills, beware: The ID thief may have struck again. Do you carry your social security number in your wallet? Consider this: That nine-digit code gives crooks access to your medical, financial, credit, and educational records. There are no legal restrictions on private company use of social security numbers. In fact, a database of names with associated social security numbers was recently found published on the Internet. What's worse, some states still use your social security number for your driver's license number -- a policy that is, fortunately, changing. If you think you're safe because you canceled your credit cards and put a "stop" on your checking account after your wallet was stolen, think again. Once identity thieves have your information, they may open new accounts or lines of credit - under your name, for their use. Last year alone, an estimated ten million Americans were victims of identity theft. The culprits may be employees (or patrons) of mailrooms, airlines, hotels, or personnel offices -- anyone who has access to financial information. Thieves may use your credit card or encoding equipment (sold by business-supply companies) and blank cards with magnetic strips to record your account number onto a counterfeit card with a different name. Crooks sometimes seek jobs that will give them access to financial information, or they may bribe employees in such positions to supply them with the data they want. Need a phony ID to "prove" you're the person whose name is on the credit card? Try surfing the Web. There are scores of sites with instructions on how to create a "new you." If you've got your own computer, scanner, and color printer or copier, you can create your own false IDs. Safeguard your personal information Most identity theft involves the U. S. Mail, thats why the U.S. Postal Inspection Service is a lead agency in investigating incidents of identity theft. They are the federal law enforcement branch of the U.S. Postal Service, with primary jurisdiction in all matters infringing on the integrity of the U.S. Mail. According to the Postal Service Transformation Plan, the mission of the Postal Inspection Service is to protect the U.S. Postal Service, its employees and its customers from criminal attack, and protect the nations mail system from criminal misuse. The Postal Inspection Service has a long, proud, and successful history of fighting the criminals who attack our nations postal system and those who misuse it to defraud, endanger, or otherwise threaten the American public. Keep your personal information safe from online prowlers. Heres how: The Internet offers a convenient way to conduct business. To ensure you use it safely, never input your credit card or other account #s at a Web site unless it has a secure transaction. A secure (or encrypted) transaction will have these two features: An icon of a lock appears in the bottom strip of the Web browser page. The URL address for the Web page changes from http to https for the page at which you input the personal data. Add these tips to your must do list to protect your identity: Don't leave mail in your mailbox overnight on weekends; deposit outgoing mail at the post office and promptly remove mail from your mailbox after delivery. Shred or tear up unwanted documents that contain personal information before discarding them in the trash. Every year, order and thoroughly review copies of your credit report from each of the three major credit reporting agencies. Never give personal identifying information over the telephone or the Internet unless you initiated the contact. PHISHING AND SPOOFING Phishing and spoofing are somewhat synonymous in that they refer to forged or faked electronic documents. Phishing This is a high-tech scam that uses spam or pop-up messages to deceive consumers into disclosing their card numbers, bank account information, social security numbers, passwords, or other personal information. Phishers send an email or pop-up message that claims to be from a business or organization that you deal with for example, your Internet service provider (ISP), bank, online payment service, or even a government agency. The message usually says that you need to update or validate your personal information, such as user names, passwords, credit cards, social security numbers, and bank accounts. The email might threaten some dire consequence if you dont respond. The email often directs you to visit a spoofed or fake website that looks just like a legitimate organizations site, but it isnt. The purpose of the bogus site? To trick you into divulging your personal information so the operators can steal your identity and run up bills or commit crimes in your name. Spoofing In this scam, the spoofer creates a false or shadow copy of a real website or email in a way that misleads the recipient. All network traffic between the victims browser and the shadow page are sent through the spoofers machine. It allows the spoofer to acquire personal information, such as passwords, credit card numbers, and account numbers. Even though the email looks like the real thing, complete with authentic logos and working Web links, it's a fake. The website where you're told to enter your account information is also fake. In some instances, really slick phishers and spoofers direct you to the genuine website, then pop up a window over the site that captures your personal information. The information entered does not go to the legitimate site, but rather to the spoofers account. The information you entered will most likely be sold to criminals, who'll use it to ruin your credit and drain your account. SPAM Spam is a term for the sending of unsolicited bulk email. Unsolicited means the recipient has not granted verifiable permission for the message to be sent. Bulk means the message is sent as part of a larger collection of messages, all having substantively identical content. With improved technology and world-wide Internet access, spam is now a widely used medium for committing traditional white collar crimes including financial institution fraud, credit card fraud, and identity theft, among others. Those sending spam are violating the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN SPAM) Act, Title 18, U.S.C., Section 1037. Violators are also accessing computers and servers without authorization, transmitting viruses, and deploying malicious codes which compromises the computer. Spam email traffic is estimated to account for approximately 80 percent of all email traffic. The distribution of spam is facilitated through the use of open and/or misconfigured proxies. Subjects often provide hosting services, sell open proxy information, credit card information, and email lists illegally. Online SPAM Resources:  HYPERLINK "http://www.ftc.gov/bcp/conline/edcams/spam/resources.htm" \t "_blank" http://www.ftc.gov/bcp/conline/edcams/spam/resources.htm Spyware Spyware is software that collects personal information from your computer without your knowledge. It can look at which sites you're visiting or access information like usernames and passwords. What's worse, it can send this information to a third party without you knowing it. The software may also perform several different unwanted functions, including the delivery of pop-up ads or harvesting private information. It can serve up inappropriate ads to you and your children, and can seriously slow your computer down, as it attempts to run spyware processes instead of the programs you are trying to use. Spyware is downloaded to your computer from the websites you visit, or invites itself in unannounced when you agree to download another program. In some cases it is mentioned in the fine text of a user agreement that you accept before downloading a program, when you agree to download the program, you inadvertently agree to host spyware. Clues that spyware is on a computer include: a barrage of pop-up ads a hijacked browser that is, a browser that takes you to sites other than those you type into the address box a sudden or repeated change in your computers Internet home page new and unexpected toolbars new and unexpected icons on the system tray at the bottom of your screen keys that dont work (for example, the Tab key that might not work when you try to move to the next field in a Web form) random error messages sluggish or downright slow performance when opening programs or saving files VIRUS & WORMS A virus is a program that can cause minor to extreme damage to your compu-ter and use your Internet connection to spread itself to other computers-usually those of your friends & family. A worm is similar to a virus; however, a worm is self-contained and does not need to be part of another program to circulate itself. Learn about Computer Protection:  HYPERLINK "http://www.ftc.gov/bcp/conline/pubs/alerts/dialupalt.htm" www.ftc.gov/bcp/conline/pubs/alerts/dialupalt.htm ADVANCE FEE SCHEMES Have you had difficulty obtaining a loan through normal sources? If so, you may become the target of an advance fee loan scheme. In such a scheme, a con artist offers you a "guaranteed" loan for a fee paid in advance. The advance fee swindler claims to be able to obtain a loan for you with ease from a legitimate lending institution, such as a bank or a savings and loan association. However, the swindler has no ability to secure a loan for you. Instead, he either steals your fee and disappears or remains in the area to bilk other unsuspecting victims while stalling you with various excuses as to why your loan has not been funded. Advance fee swindlers frequently ask for a percentage of the gross loan amount as their fee. For example, if a five percent fee is requested, you would have to pay $500 to obtain a loan of $10,000. There is much to lose if you lower your guard. Remember: Ask yourself why the promoter can obtain a loan for you from a legitimate lender when you yourself have been turned down for a loan. Take care of your precious assets by exercising caution when asked to pay a loan fee in advance. CHARITIES FRAUD Charities fraud happens when an individual or group deliberately misrepresents its fundraising intentions or solicits charitable funds for phony causes. Throughout the year, and especially during the holiday season, you probably get appeals over the Internet, in the mail, or by telephone urging you to contribute financially to a good cause. And when disasters hit whether natural or man-made fraudulent websites pop up, supposedly collecting funds for victims. There are plenty of fraud operators out there who are scheming for your money--and the last thing on their mind is charity. Not only do such come-ons bilk you of your money, but they also put money you intended for the needy into the hands of con artists. But just how do you know who is legit and who isn't? The Salvation Army and the American Cancer Society--those are among the obviously worthy organizations. But what if you receive a charitable solicitation from an organization you've never heard of? Make sure that the organization youre giving to is a legitimate charity, and not one that was set up for the sole purpose of bilking the public. DEBT ELIMINATION SCAMS Debt elimination schemes generally involve websites advertising a legal way to dispose of mortgage loans and credit card debts. Most often, all that is required of the participant is to send $1,500 to $2,000 to the subject, along with all the particulars of the participants loan information and a special power of attorney, authorizing the subject to enter into transactions regarding the title of the participants homes on their behalf. The subject then issues bonds and promissory notes to the lenders that purport to legally satisfy the debts of the participant. In the exchange, the participant is then required to pay a certain percentage of the value of the satisfied debts to the subject. The potential risk of identity theft related crimes associated with debt elimination schemes is very high because the participants provide all of their personal information to the subject. INVESTMENT FRAUD Investment fraud is an offer using false or fraudulent claims to solicit investments or loans, or providing for the purchase, use, or trade of forged or counterfeit securities. The offer may come by phone, mail, or computer, but the message is the same: Youll get rich quick, receive high returns with a low risk, and should invest right now. Investment opportunities, or get rich quick schemes, are a favorite of fraudsters. Whatever investment theyre selling, fraudsters will try to get you to invest your money - lots of it. The one thing you can rely on - YOU WONT GET ANYTHING BACK. Phony investment brokers market to a specific consumer base--older Americans--who want to secure their financial future. Americans lose more than $40 billion a year to telemarketing fraud. And the scams show no signs of slowing down. Older Americans are seeing their nest eggs and retirement funds shrink. With low returns on income-generating investments and rising costs for medical insurance, prescription drugs, and general expenses, theyre even more vulnerable to scams. Every year, thousands of people lose anywhere from a few dollars to their life savings to swindlers. Phony investment firms might try several different avenues to reach you. Often they send enticing or official-looking mailings that urge you to call. More recently, theyve gone to emails, which make it even easier to reach millions of potential victims. SWEEPSTAKES / PRIZE SCAMS Every day, thousands of American consumers receive sweepstakes promotions by phone, over the Internet or in the mail. Legitimate sweepstakes are advertising and marketing techniques that offer participating consumers a chance to win a prize or money with no purchase or entry fee required. But if you have to pay to play or pay to receive your winnings, the promotion is a scam. You should never have to pay to enter a sweepstakes. That includes paying shipping and handling fees, taxes, or buying a product to receive your prize. Those sweepstakes that notify you by a postcard that youve won a free prize are run by con artists whose sole purpose is to rip you off. And that free prize could end up costing you hundreds of dollars. Ask these questions to evaluate the legitimacy of sweepstakes/promotions: Are the rules and entry instructions for the promotion easy to find and understand? If you can't understand what you must do to be eligible, think twice about responding. Does the advertising copy state that no purchase is necessary to win? Remember, you never have to pay to play when the contest is legitimate. Are the prizes worth winning? Make sure the prizes you are trying for are desirable and worth the effort. Do you really want to win them? Is there a cash option? Does the prize company ask for your credit card number, bank account information or social security number? No legitimate prize company asks for this information to declare you a winner. Counterfeit Check and Money Order Scams You think cashier's checks & money orders are as good as cash theyre only as good as the person sending it to you, whether its an online acquaintance or a buyer. Its costing victims millions of dollars each month. Counterfeit checks and money orders (including postal money orders) are used in scams, which often start with what appears to be an innocent contact via an Internet chatroom or by email. Con artists posing as students, tourists, and overseas military personnel ask for help in cashing checks and money orders, or target people looking for love or companionship, in order to exploit their vulnerability. Online auctioneers are also at risk. Scammers buy goods or services on the Web and offer payment by check or money orderoften in excess of the actual value of the goods or services. In most cases, con artists ship the check or money order and ask the victim to cash it, keep a portion as a gift, and wire back the rest, usually to an overseas address. Bank customers are responsible for the checks they deposit, and victims must repay the bank for bad checks. Consumers often believe, incorrectly, that postal money orders and cashiers checks are good if theyre cashed by a bank and are not subject to recourse. This is not true. Federal law requires banks to make the funds you deposit available quickly so its important for consumers to remember that, just because you can withdraw the money, it doesnt mean the check is good. There are also non-victims. Anyone who agrees to cash the instruments on behalf of a foreign citizen and keep a portion for themselves are not victims THEY ARE ACCOMPLICES! These fake cashiers checks and money orders appear to be authentic -- including the name of a legitimate United States bank and even containing the magnetic routing codes that appear along the bottom of the check. Postal Money Order Security Features Similar to U.S. currency, postal money orders are designed with colored inks, watermarks, and security threads. Become familiar with the security features of genuine postal money orders: Watermarks of Benjamin Franklin, visible when held to the light, run through the white oval on the left front side of the money order. Watermarks are also visible from the reverse side. A dark security thread runs from top to bottom to the right of the Franklin watermarks. When held to the light, the thread reveals the microprinted letters USPS alternating right-side up and upside down throughout the thread. The letters are not visible if not held to the light. Warning instructions are printed on the reverse of postal money orders. Denominations are displayed in two locations, on the front, with no discoloration around the dollar amounts (discoloration may indicate alteration). Maximum value of $1,000 on domestic/$700 on international postal money orders. For additional information and resources on fraudulent money orders, call the Money Order Fraud Hot Line at (800) 372-8347. Read More About Counterfeit Check Schemes at these links:  HYPERLINK "http://www.usps.com/missingmoneyorders/security.htm" \t "_blank" http://www.usps.com/missingmoneyorders/security.htm  HYPERLINK "http://www.fraud.org/tips/internet/fakecheck.htm" \t "_blank" http://www.fraud.org/tips/internet/fakecheck.htm  HYPERLINK "http://www.ftc.gov/opa/2004/12/checkoverpayment.htm" \t "_blank" http://www.ftc.gov/opa/2004/12/checkoverpayment.htm Read these tips to help protect yourself from Identity Theft Report lost or stolen credit cards immediately. If you applied for a credit card and didn't receive it when expected, call the financial institution. Sign new credit cards immediately--before someone else does. Memorize your Social Security number and passwords. Don't use your date of birth as your password and don't record passwords on papers you carry with you. Never leave transaction receipts at ATM machines, on counters at financial institutions, or at gasoline pumps. Don't carry your Social Security card or birth certificate--leave them in a secure location. Don't disclose credit card or other financial account numbers on a Web site unless the site offers a  HYPERLINK "http://www.usps.com/postalinspectors/securetrans.htm" secure transaction. Closely monitor the expiration dates on your credit cards and contact the issuer if you don't receive a replacement prior to the expiration date. Beware of mail or telephone solicitations that offer prizes or awards--especially if the offeror asks you for personal information or financial account numbers. Match your credit card receipts against your monthly bills and check your monthly financial statements for accuracy. Watch for your monthly financial statements and bills. If you don't get them when expected, contact the sender. If you think youre a victim of Identity Theft Heres what you should do: If the crime involved the U.S. Mail, contact your nearest  HYPERLINK "http://www.usps.com/ncsc/locators/find-is.html" U.S. Postal Inspection Service office and report it. Call the fraud units of the  HYPERLINK "http://www.usps.com/postalinspectors/creditbureaus.htm" three major credit bureaus and request a "fraud alert" be placed on your credit file. Check your monthly financial statements for accuracy. Order copies of your credit report from the  HYPERLINK "http://www.usps.com/postalinspectors/creditbureaus.htm" credit bureaus to check whether any fraudulent accounts were opened without your knowledge or consent. Contact your banks and creditors, by phone and in writing, and report the crime. You may be advised to close some or all of your accounts. At the least, change your PIN codes and passwords immediately. Record the names and phone numbers of people with whom you discussed your case and retain all original reports and supporting documents. Keeping accurate and complete records are a big step toward helping you resolve your problem. Contact your financial institutions and request they flag your accounts. Instruct them to contact you immediately if there is unusual activity on your accounts. File a complaint online with the  HYPERLINK "http://www.usps.com/common/exit_page.htm?url=https://www.ftc.gov/ftc/complaint.htm" Federal Trade Commission, or call their Identity Theft Hotline at 1-877-IDTHEFT (1-877-438-4338). The FTC has counselors to assist identity theft victims with resolving financial and other problems that can result from this crime.  HYPERLINK "http://www.usps.com/postalinspectors/welcome.htm"  HYPERLINK "http://www.usps.com/postalinspectors/welcome.htm"   HYPERLINK "http://www.usps.com/postalinspectors/welcome.htm"  HYPERLINK "http://www.usps.com/postalinspectors/welcome.htm"  ST- g l  rrbRDhchG//CJ\^JaJhchox5CJ\^JaJhch"5CJ\^JaJ!hc5B*CJ\^JaJph'hch"5B*CJ\^JaJphhch"CJ\^JaJhchcCJ\^JaJhchmCJ\^JaJh|hmCJ\^JaJ/hch"5B*CJ;OJQJ\^JaJ;ph3f/hchox5B*CJ;OJQJ\^JaJ;ph3f"9S / :k0vv+dh-D@&M ^+`gd! $+^+a$gd!$(dh^(a$gd!dhgd!$+dh-D@&M ^+`a$gdox$+dh-D@&M ^+a$gdox$(-D@&M ^(a$gdox   / 0 M a l m n    8 9 }     3 4 e f g øuhhchN50JCJaJ#jhchN5CJUaJjhchN5CJUaJhchiCJaJhchN5CJaJhch]6CJaJhch]CJaJhch]5CJaJhchNCJ\^JaJhchG//CJ\^JaJ'hchG//5B*CJ\^JaJph( :@DYZjkиraPaP?.a? h|hox5B*CJaJph3f h|hi5B*CJaJph3f h|hN55B*CJaJph3f h|hN5B*CJaJph3f+h8dghox56B*CJ OJQJaJ&ph3f. *h8dghN556B*CJ OJQJaJ&ph3f. *h8dgh356B*CJ OJQJaJ&ph3f. *h8dgh{h56B*CJ OJQJaJ&ph3f(h8dgh!5B*CJ OJQJaJ&ph3fhchoxCJaJhchiB*CJaJphH0'x￱~jWI;Ih/h{CJ\^JaJh/h!CJ\^JaJ$h/hNB*CJ\^JaJph'h/hN5B*CJ\^JaJphh/hYMZCJ\^JaJ!hc5B*CJ\^JaJph'h/h]5B*CJ\^JaJphh/h]CJ\^JaJh/hNCJ\^JaJ h|h35B*CJaJph3f h|hi5B*CJaJph3f h|hN5B*CJaJph3f0&Jj2Nu(-D@&M ^(gdG//-D@&M ^gd! & F-D@&M gd!-D@&M ^gd!(-D@&M ^(gd!+dh-D@&M ^+`gd!dh-D@&M gd] JijGH2MNt|01aӿӿ㿜㿋zdQ$h/56B*CJ\^JaJph*h/h!56B*CJ\^JaJph!h/6B*CJ\^JaJph!hL96B*CJ\^JaJphh/h!6CJ\^JaJ$h/h!B*CJ\^JaJph'h/h!6B*CJ\^JaJphh/h!5CJ\^JaJh/h!CJ\^JaJh/h{CJ\^JaJaohijk{i[OD9D*D*jh|hG//CJUaJh|h{hCJaJh|hG//CJaJh|h{hCJ\aJh|h{h5CJ\aJ#h|hG//5B*CJ\aJphh|h{5CJ\aJhXlIhG//CJOJQJaJ%jhXlIhG//CJOJQJUaJ+h{hhG//5B*CJ OJQJ\^Jph3f+h{hh{h5B*CJ OJQJ\^Jph3f'h/h!6B*CJ\^JaJph'h/h]6B*CJ\^JaJphjlM= > !!" "gdG// dh`gd{hdhgd{h$-DM a$gdG//WXijlm:;KLMN *+ǵժǵh|hG//5CJ\aJh|h{hCJaJ#h|hG//5B*CJ\aJphh|h{5CJ\aJh|hG//CJaJjh|hG//CJUaJ h|hG//>*B*CJaJph;+-7" # ; < = > X Y !!!!q!r!!!!"" "³۳۔s۳۳۳۳e]hG//CJaJh|h]CJ\^JaJh|hG//B*CJaJph#h|hG//5B*CJ\aJphh|h{5CJ\aJ h|hG//>*B*CJaJphjh|hG//CJUaJh|hG//5CJ\aJh|h{hCJaJh|hG//CJaJh|h{hCJ\aJh|h{h5CJ\aJ "!"4"5""$%&x(**',.*/+1yyyy$0dh-DM ]^`0a$gd/dh]^`gd/dh]^`gd/ -DM gdJg$dh-DM ]`a$gd/(-D@&M ^(gdJg "!"("3"4"5"""$%%%3%4%&x(ɴznbPB7,h/h+-,CJaJh/hJgCJaJh/hJg5CJ\aJ#h/hJg5B*CJ\aJphh whJg6>*CJ h wh w6>*CJ h wh>J6>*CJ 'h/hJg5B*CJ\^JaJphh/hJgCJ^JaJhchcCJ^JaJ)h whJg56>*B*CJ \^Jph3f#h w56>*B*CJ \^Jph3f)h why56>*B*CJ \^Jph3fh|h"5CJ\^JaJx(y(((**L*k*****+++&,5556.6v6809199杌vvdYNh/h{CJaJh/h/CJaJ#h/h{5>*B*CJaJphh/hafCJaJh/h <CJaJ h/haf>*B*CJaJph&h/haf5>*B*CJ\aJphh/h <CJ^JaJh/h"CJ^JaJ!hL9hJgB*CJ^JaJphhL9CJ^JaJh/hJgCJ^JaJh/hYMZCJ^JaJ+1=245580919/:v::*;;3<< & Fgd1gd1 & F H8^8`gdL9 dh`gd{gd{2dh]^`2gd/dh]^gd/$0dh-DM ]^`0a$gd/9999:(;*;<<= =#=8=@=A=B===ս福xk^F/hh{56>*B*CJ OJQJ\^JaJph3fh/hJgCJ^JaJhchcCJ^JaJ-h whJg56>*B*CJ \^JaJph3f-h wh w56>*B*CJ \^JaJph3f-h wh)P56>*B*CJ \^JaJph3f/h/h{5>*B*CJOJQJ^JaJph#h/h{5>*B*CJaJphh/h{CJaJh/h{6CJ]aJ<#=A=B====@AAB}^$2dh-DM ]^`2a$gdc+dh-D@&M ^+gdc$2dh-DM ]^`2a$gdv$^+-D@&M ^+gd/$2dh-DM ]^`2a$gd/(-D@&M ^(gdJg & Fgd1 ===AAAA=E>EAEMENEIIIʯʀiUE5h/h)P5CJ\^JaJh/hJg5CJ\^JaJ'h156>*B*CJ \^JaJph3f-h1h*B*CJ \^JaJph3f-h1hJg56>*B*CJ \^JaJph3f/h)P56>*B*CJ OJQJ\^JaJph3f5h*B*CJ OJQJ\^JaJph3fh/hJgCJ^JaJhv$^hv$^CJ^JaJ5h*B*CJ OJQJ\^JaJph3fB=ENEGG}HIYJmJlY(-D@&M ^(gd.Gdh-DM ]^gd3H#$0dh-DM ]^`0a$gd3H$2dh-DM ]^`2a$gdc+dh-D@&M ^+gdc$2dh-DM ]^`2a$gdv$^IIJJWJXJYJ`JlJmJMM N"NMN:O=OaPnPxPyPPP*Q+QQṧ}g]PFPFPhv$^CJ^JaJhv$^h.GCJ^JaJh/CJ^JaJ*h/h.G5>*B*CJ\^JaJph$hL95>*B*CJ\^JaJphhL9CJ^JaJh/h.GCJ^JaJ#h3H56>*B*CJ \^Jph3f)h3Hh.G56>*B*CJ \^Jph3f$h/hJg>*B*CJ^JaJphh/hJgCJ^JaJ!jh/hJgCJU^JaJmJLMNfNNO6OOOPaPyP+-D@&M ^+gd.G & Fdd-DM [$\$gd.G & Fd-DM \$gd w$dh-DM ]`a$gd3H$dh-DM ]`a$gd3H QQQQQQR!R"R#RTRURVRiRqRrRƶzmVB+-h3HhJg56>*B*CJ \^JaJph3f'hv$^56>*B*CJ \^JaJph3f-h3Hh*B*CJ \^JaJph3fhv$^h.GCJ^JaJh>\hv$^0JCJ^JaJ3jh>\hv$^>*B*CJU^JaJph$hv$^hv$^>*B*CJ^JaJphhv$^>*B*CJ^JaJph'jhv$^>*B*CJU^JaJph'hv$^h.G5B*CJ\^JaJph!hv$^5B*CJ\^JaJphyPVRrRMSTUVVYZQ[o[ggg#$2dh-DM ]^`2a$gd3H$dh-DM ]^a$gd3H#$0dh-DM ]^`0a$gd3H(-D@&M ^(gdJg 2dh-DM ]^`2gdv$^ rRUUVVVVQ[g[n[o[^^^^^^__``ȴȴyeNAhv$^h1BCJ^JaJ-h*^4hJg56>*B*CJ \^JaJph3f'hv$^56>*B*CJ \^JaJph3f-h*^4h)P56>*B*CJ \^JaJph3fhv$^h*^4CJ^JaJ-h3HhJg56>*B*CJ \^JaJph3f'h3H56>*B*CJ \^JaJph3f-h3Hh*B*CJ \^JaJph3f'hv$^hJg5B*CJ\^JaJphhv$^hJgCJ^JaJo[)]^_^`Yacddd*B*CJ \^JaJph3f-h*^4h)P56>*B*CJ \^JaJph3f'hv$^56>*B*CJ \^JaJph3fhv$^h)PCJ^JaJ!hv$^h1BB*CJ^JaJph!hv$^hJgB*CJ^JaJphhv$^h1BCJ^JaJhv$^hkCJ^JaJhv$^hJgCJ^JaJhv$^h)P6CJ^JaJhv$^h1B6CJ^JaJhv$^hJg6CJ^JaJdgggggggjjjjjjjjjjjjYkkkkkJlKlnߺߩ󔂔pcYcLcLcLYLYLcLhXtBh*^4CJ^JaJhXtBCJ^JaJhXtBh wCJ^JaJ#hv$^56>*B*CJ \^Jph3f#h*^456>*B*CJ \^Jph3f)h*^4h w56>*B*CJ \^Jph3f!hv$^hJgB*CJ^JaJph!hXtB5B*CJ\^JaJph'hv$^hh{5B*CJ\^JaJph'hv$^hJg5B*CJ\^JaJphhv$^hJgCJ^JaJgh)iijjKlmqqxY$2dh-DM ]^`2a$gdv$^$dh-DM ]^`a$gdv$^$dh-DM ]^`a$gdXtB$0dh-DM ]^`0a$gdXtB+dh-D@&M ^+gdXtB & Fd-DM \$gd*^4 nnnnoooppjplpqq$qqqqr#vBvVvvvȷȖȉuhXHhXtBh}Q5CJ\^JaJhXtBh w5CJ\^JaJhXtBh$YCJ^JaJ'hXtBh}Q5B*CJ\^JaJphhXtBh}QCJ^JaJhXtBh wCJ^JaJ'hXtBhr56B*CJ^JaJph!hXtBhrB*CJ^JaJphhXtBhrCJ^JaJhXtBh*^4CJ^JaJ!hXtBh*^4B*CJ^JaJphhXtBhjlCJ^JaJqrrstuuVvvwmR$dh-DM ]^a$gdXtB$-DM ]^a$gd$Y$dh-DM ]^a$gd}Q & Fd-DM [$gd}Q & F-DM gd}Q$-DM ]^`a$gdXtB$-DM ]^a$gdXtB vvvvwwww_w`wwwwwwwxxxxxx+x0xFxGxUxVxľlZKhXL5B* CJH\^Jph3#h'whXL5B* CJH\^Jph3/hJghXL5B* CJOJQJ\^JaJph3hXL5B*CJ\^Jph#h'whXL5B*CJ\^Jph$jhXL5U\^JmHnHu hXLCJ h*B*CJ^JaJphhXtBh wCJ^JaJ!jhXtBh wCJU^JaJwwxxxVxxx)yy3zzN{{|| & Fdd[$\$gd1( & Fgd1($dh-DM ]a$gdXL$dh-DM ]a$gd*B*CJ^JaJph!jhXLh1(CJU^JaJhXLh1(6CJ]^JaJhXLh1(CJ^JaJ|f}g}h}i}}}d~S.dh-DM ]gd1( & Fdd[$\$gd1( & Fgd1($dh-DM ]a$gd1($-DM ]a$gd1($dh-DM ]a$gd1(gd1( & Fd[$gd1(}}}},~-~R~S~~~~~~~Ih123qɶɶɶڬɶɬ~r~jfhXLj$.hXLUhJghXL5\^JjhJghXL5U\^J h1(CJ h;CJ^JaJh1(B*CJ^JaJphh1(CJ^JaJ$hXLh1(>*B*CJ^JaJph!jhXLh1(CJU^JaJhXLh1(CJ^JaJ/h1(h1(5B* CJOJQJ\^JaJph3%qrstuvxy h1(CJ h~$j,Mh1(UjYLh1(Uh1(j$.h1(UhJgh1(5\^JjhJgh1(5U\^JhXLjhJghXL5U\^JjhXLUj$.hXLUjhXLUwxdh-DM ]gd1(gd1(6&P1h:pc/ =!"#`$`% DyK www.LooksTooGoodToBeTrue.comyK Jhttp://www.lookstoogoodtobetrue.com/DdX)\  3 3fS" X)88KDyK 2www.ftc.gov/bcp/conline/pubs/alerts/dialupalt.htmyK rhttp://www.ftc.gov/bcp/conline/pubs/alerts/dialupalt.htmDyK yK bhttp://www.usps.com/postalinspectors/welcome.htmHDd  |A:seal7878Inspection Service Home PageC"`RG88 ySbGrFZG88 ySJFIFHH.ExifMM*bj(1r2iHHAdobe Photoshop 7.02002:10:08 15:11:47NN(&HH"Photoshop 3.08BIM%8BIMxHH(FG(HH(d'`8BIMHH8BIM&?8BIM 8BIM8BIM 8BIM 8BIM' 8BIMH/fflff/ff2Z5-8BIMp8BIM@@8BIM8BIMENNGoldSealNNnullboundsObjcRct1Top longLeftlongBtomlongNRghtlongNslicesVlLsObjcslicesliceIDlonggroupIDlongoriginenum ESliceOrigin autoGeneratedTypeenum ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlongNRghtlongNurlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT horzAlignenumESliceHorzAligndefault vertAlignenumESliceVertAligndefault bgColorTypeenumESliceBGColorTypeNone topOutsetlong leftOutsetlong bottomOutsetlong rightOutsetlong8BIM8BIM8BIM!UAdobe PhotoshopAdobe Photoshop 7.08BIMHhttp://ns.adobe.com/xap/1.0/ adobe:docid:photoshop:b4944ec4-dc54-11d6-bbbb-d80a64eab5bc Adobed@NN      u!"1A2# QBa$3Rqb%C&4r 5'S6DTsEF7Gc(UVWdte)8fu*9:HIJXYZghijvwxyzm!1"AQ2aqB#Rb3 $Cr4%ScD&5T6Ed' sFtUeuV7)(GWf8vgwHXhx9IYiy*:JZjz ?ߺ^:|t>(f7X2~u]7vSњ Mt[BfWelÄdF,XsVm^ƶ'.Q~p>,jDƄuRK tD~9H"#J`E @ܾxl纆o^v.#~l>Ŷ榫l|q;hPl~bqr52 D{׽یD;*rשng{ۈvs-b"Y?9uS #ᓦ!ֺYJIQJƣ"~&K?(mOǯ{_)W7P|gvq;#pUf &<4tZ)]71/?{.~p[#HGKUH q@OPWn͖`Mb4Y*L0#"r/zu͝M0M]W_gRGa^lo_RqmU[籹_GQ <ٶϺ+t9i){΍m ⴐ{Gvp'Y!9Rnysg}8usȽ SIԕ 6H5^wS¶җzv/fJ.ժX1"pk׻hSn]oֻw|?3q;i)~<6˚Xc&)..oW.]=%xeҥ4R#U'(-Db4eyu 8T,ՠHJPGO挛kKuxl HW'wm K4]Ri7)߫m Sm~at幍A$EN {[gHbC!{K^(h)uR@O~{ߺ_ߺZ4棹wc>4|Oݽލp|Y, &{ #~9r֭=Yr[҈ɲQna{zvǴ{~#]67OG_MW$<v۶}ck ic]];ݸ__D0f6N_g:tlݗCg~:0o㻏z|9p>=*yړ϶͇3Ϲ2Or)4M~ڷYPq䨹d/o0DaiCo6]XHV?*f hgj6nۣ{[tdL=˲zO:_;Ju"רsy|}sZ\58cK;g1Gw=0$q쾥e 눤EbHmmЮɼ[eCj7ӳ]ZZEO_8Ӫ"#v :zmH퀥M2I`T:DTv;CnN`glu_S%>6,li uu^6("y 8"گ93qN_,o-#c9`yʻd|3!9Q;.gTJ8a+NCu{.P|J?:҃r;zw/dv^ʗ#;{Go,dr8h},9]ۚ6pc."Hod3%nD|8Vn)3NU>%Z:Hd,Hb ] T2(KrG[ڝrg1"3ݻ{K{u 9g^–+CY7hsse,QD18|oXy,ZOHd:T +RA.Ȝ\Ym/ pŽpFTXumom6LY%5 k' ^뾠t_Nw^Wa}+zuO9ݛ+"S"`-s<̳E=Ȍ[n$]1H"PJĥ*+#mMkvz5Qҍ©?1ɥGJ^"4wqt9Ӕic>tYɻ f7n௞pb3"X1QӃKVRgHē^*#kc@%miemVD_5 aJ˰vPTE,M'Ā <Fp:\NL,\]Rz 9{G 0k"q`Eׇ7 mucʤ>ШM[{oeSbmC֛mvNB97DxK 6} -gVgE儲$>2akicxD`I떖j{7`/ FAHCC +Alڿ[`9][eu*}r1eC߮GrGi۬~0H͗?SSO.\{+^o_WS]:(5hU5bxwR0ͷ,~g~0O~t/cd6mv?+!OU͹eh*2Tm4H9?|y˗6^cyz8.7{*9ش{{"IvFMT eq5㳬 T\sCE<:$vȾ~~ 7Hea27r썵mo؎+[GSZzS"S}2c2CoM{HђK9QH"]:aS[`cw7qZP85,)á6e1dZC"5d4o?Ndy|0m|Ihm8j Z9 y"l9fy~̗O"{gZ^YnW2 r+4b= H: Jp$r$Q Z_:cAM?V\gCum4ァ; 7 IM]wNͯ=C4Ll1[gm.w)w &FvYKYI#h\T69ܙ Z8ҝWΟgUg;{zuaԻ{ g/KuR%n>V YskbXʴk)` N5ɤ[4f 28!մdyn.ĶJX*?zwkHM ~=Z Mykp@cI(k\|J KȔJAN'5]O9\in9i6j\G){{S'[{4#%kAF 6#w y_ ,$~ mnJfz K9k]u7^ۛ|vgwN{O*j]HEB.T7pw]MFܙE$%p5ZWA/XyZ߹!4BEhł@Js6b62_{dzwegGbORv}jo{nI۬a[7t dx-2eyoϒou[-Oh s}9缁}Gln`.dА4))ۖۜD&C/SAD!؊i+'4 o^tNNg>g{m-Iޝbl=݈MS:d9:QO"⟽|<Ͱn[emi A$1+EygURG"_O.ݰY (,ŋSA@]ᾶfovA*|?&f1=`\3b_x뻪O˶];Ta%ԌVYDRq= Oԓ% M(iu7n29noUS9cl^5 OZz`{EͶnةIcc59hIFHG. deSR~/jqM&䡦[joޙ}LձRET_L?ɺZ[ER+*k> p8:%乆Hd6 (?:~CPjO$q=^G:zV p.O܏$Rv)>Q'qk?޺ ;r}~AR4{碫Ivfڎ:r.$* {m>+HqSR%MKB=m}dΰSZ$ ]@>d*Vf4 ="E!j '?}UۛwhmχT,S#+{);f |~?%Ӽ<7wgw.֊|"9-gݒ^p*gS24QŸxrNBYZ7Owu0՛RjYeaR %ՍGV6`9wꎧ:L^Ш :'wz.LkKF!{*D(kFg-,lV?.m~v--reiXP Y˹-VX E#=?8ƜWa76=6r|lYڤuWN)כoW8L:+m̾BWTEkܬwm~3rk%cE%;+ȩ<]b XիA)q_ٛosa+vqO)c]-ޱd_*4m$SC>&,~ a/4 Kk׹$wrF}EC=!ckE g,74p!9esTh VEPX\[die iJEPԟ^ ;_2S9g:oeUQɞWWSGqj:!س?xڶN7hN{i7t (iT8)^C4P\Ƿ[ۥfn^Gy?HYd20 c&b5 >RI M<YwGy<$QQG5TX΃lg5ENV -Zeњk\ˮFmd {kl5+zH,Kw QoAןy8[}=،։fGOoGH {vnk+7`|[wvf7/꿕e@Y*60P6k!jOzǜnYo\{*Q'lӰnn,W :n$=ζ E5VQi^+XM]lVӨ%&ꏑU9纺p*ngrCLO茬-۽tw^| Qx\0_n!c,fH#^K#?z b]JΙ 4@Y=moX| 9Laoaf߻hv䖆(0{s1snc,>%$禛-`nvݷaض$)ongED@g꼳\dਣ zf'Wߺ_ߺ^o3l9CO&/Ke)Gm~}?^׏'}Wxu<~\3yQkWFtwiT3C񇨩B-W{⧬zcOTbiɿ6`ǟXM嘱,qWV;7W=Ǘf7rؙ)D'h.KSx _JYdyd gSPz= 85j̖\'f|lq|>rlm[Ftu>(,= e4>9>}-NDhvjj,UE &q`ԫUX]7awfؘ4w &u-+垌ؽ|}n.{7&}& ~ub O^5_~.v6!zX8MPe97ٓ2O{Eddkٖ(Yd<Ӛ>m ӒHUpU^auw~sz'ltG\GǪ1:{cN~ R$ݧ T |'=, nSorJF͢k>Km B?@";C̓K-O6T/?W?מ#?y~>^^OQĮ՚i-4ӊtQᏧkk\ֵCG׺DyK yK bhttp://www.usps.com/postalinspectors/welcome.htmHDd  |A:seal7878Inspection Service Home PageC"`RG88 ySbGpMrFZG88 ySJFIFHH.ExifMM*bj(1r2iHHAdobe Photoshop 7.02002:10:08 15:11:47NN(&HH"Photoshop 3.08BIM%8BIMxHH(FG(HH(d'`8BIMHH8BIM&?8BIM 8BIM8BIM 8BIM 8BIM' 8BIMH/fflff/ff2Z5-8BIMp8BIM@@8BIM8BIMENNGoldSealNNnullboundsObjcRct1Top longLeftlongBtomlongNRghtlongNslicesVlLsObjcslicesliceIDlonggroupIDlongoriginenum ESliceOrigin autoGeneratedTypeenum ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlongNRghtlongNurlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT horzAlignenumESliceHorzAligndefault vertAlignenumESliceVertAligndefault bgColorTypeenumESliceBGColorTypeNone topOutsetlong leftOutsetlong bottomOutsetlong rightOutsetlong8BIM8BIM8BIM!UAdobe PhotoshopAdobe Photoshop 7.08BIMHhttp://ns.adobe.com/xap/1.0/ adobe:docid:photoshop:b4944ec4-dc54-11d6-bbbb-d80a64eab5bc Adobed@NN      u!"1A2# QBa$3Rqb%C&4r 5'S6DTsEF7Gc(UVWdte)8fu*9:HIJXYZghijvwxyzm!1"AQ2aqB#Rb3 $Cr4%ScD&5T6Ed' sFtUeuV7)(GWf8vgwHXhx9IYiy*:JZjz ?ߺ^:|t>(f7X2~u]7vSњ Mt[BfWelÄdF,XsVm^ƶ'.Q~p>,jDƄuRK tD~9H"#J`E @ܾxl纆o^v.#~l>Ŷ榫l|q;hPl~bqr52 D{׽یD;*rשng{ۈvs-b"Y?9uS #ᓦ!ֺYJIQJƣ"~&K?(mOǯ{_)W7P|gvq;#pUf &<4tZ)]71/?{.~p[#HGKUH q@OPWn͖`Mb4Y*L0#"r/zu͝M0M]W_gRGa^lo_RqmU[籹_GQ <ٶϺ+t9i){΍m ⴐ{Gvp'Y!9Rnysg}8usȽ SIԕ 6H5^wS¶җzv/fJ.ժX1"pk׻hSn]oֻw|?3q;i)~<6˚Xc&)..oW.]=%xeҥ4R#U'(-Db4eyu 8T,ՠHJPGO挛kKuxl HW'wm K4]Ri7)߫m Sm~at幍A$EN {[gHbC!{K^(h)uR@O~{ߺ_ߺZ4棹wc>4|Oݽލp|Y, &{ #~9r֭=Yr[҈ɲQna{zvǴ{~#]67OG_MW$<v۶}ck ic]];ݸ__D0f6N_g:tlݗCg~:0o㻏z|9p>=*yړ϶͇3Ϲ2Or)4M~ڷYPq䨹d/o0DaiCo6]XHV?*f hgj6nۣ{[tdL=˲zO:_;Ju"רsy|}sZ\58cK;g1Gw=0$q쾥e 눤EbHmmЮɼ[eCj7ӳ]ZZEO_8Ӫ"#v :zmH퀥M2I`T:DTv;CnN`glu_S%>6,li uu^6("y 8"گ93qN_,o-#c9`yʻd|3!9Q;.gTJ8a+NCu{.P|J?:҃r;zw/dv^ʗ#;{Go,dr8h},9]ۚ6pc."Hod3%nD|8Vn)3NU>%Z:Hd,Hb ] T2(KrG[ڝrg1"3ݻ{K{u 9g^–+CY7hsse,QD18|oXy,ZOHd:T +RA.Ȝ\Ym/ pŽpFTXumom6LY%5 k' ^뾠t_Nw^Wa}+zuO9ݛ+"S"`-s<̳E=Ȍ[n$]1H"PJĥ*+#mMkvz5Qҍ©?1ɥGJ^"4wqt9Ӕic>tYɻ f7n௞pb3"X1QӃKVRgHē^*#kc@%miemVD_5 aJ˰vPTE,M'Ā <Fp:\NL,\]Rz 9{G 0k"q`Eׇ7 mucʤ>ШM[{oeSbmC֛mvNB97DxK 6} -gVgE儲$>2akicxD`I떖j{7`/ FAHCC +Alڿ[`9][eu*}r1eC߮GrGi۬~0H͗?SSO.\{+^o_WS]:(5hU5bxwR0ͷ,~g~0O~t/cd6mv?+!OU͹eh*2Tm4H9?|y˗6^cyz8.7{*9ش{{"IvFMT eq5㳬 T\sCE<:$vȾ~~ 7Hea27r썵mo؎+[GSZzS"S}2c2CoM{HђK9QH"]:aS[`cw7qZP85,)á6e1dZC"5d4o?Ndy|0m|Ihm8j Z9 y"l9fy~̗O"{gZ^YnW2 r+4b= H: Jp$r$Q Z_:cAM?V\gCum4ァ; 7 IM]wNͯ=C4Ll1[gm.w)w &FvYKYI#h\T69ܙ Z8ҝWΟgUg;{zuaԻ{ g/KuR%n>V YskbXʴk)` N5ɤ[4f 28!մdyn.ĶJX*?zwkHM ~=Z Mykp@cI(k\|J KȔJAN'5]O9\in9i6j\G){{S'[{4#%kAF 6#w y_ ,$~ mnJfz K9k]u7^ۛ|vgwN{O*j]HEB.T7pw]MFܙE$%p5ZWA/XyZ߹!4BEhł@Js6b62_{dzwegGbORv}jo{nI۬a[7t dx-2eyoϒou[-Oh s}9缁}Gln`.dА4))ۖۜD&C/SAD!؊i+'4 o^tNNg>g{m-Iޝbl=݈MS:d9:QO"⟽|<Ͱn[emi A$1+EygURG"_O.ݰY (,ŋSA@]ᾶfovA*|?&f1=`\3b_x뻪O˶];Ta%ԌVYDRq= Oԓ% M(iu7n29noUS9cl^5 OZz`{EͶnةIcc59hIFHG. deSR~/jqM&䡦[joޙ}LձRET_L?ɺZ[ER+*k> p8:%乆Hd6 (?:~CPjO$q=^G:zV p.O܏$Rv)>Q'qk?޺ ;r}~AR4{碫Ivfڎ:r.$* {m>+HqSR%MKB=m}dΰSZ$ ]@>d*Vf4 ="E!j '?}UۛwhmχT,S#+{);f |~?%Ӽ<7wgw.֊|"9-gݒ^p*gS24QŸxrNBYZ7Owu0՛RjYeaR %ՍGV6`9wꎧ:L^Ш :'wz.LkKF!{*D(kFg-,lV?.m~v--reiXP Y˹-VX E#=?8ƜWa76=6r|lYڤuWN)כoW8L:+m̾BWTEkܬwm~3rk%cE%;+ȩ<]b XիA)q_ٛosa+vqO)c]-ޱd_*4m$SC>&,~ a/4 Kk׹$wrF}EC=!ckE g,74p!9esTh VEPX\[die iJEPԟ^ ;_2S9g:oeUQɞWWSGqj:!س?xڶN7hN{i7t (iT8)^C4P\Ƿ[ۥfn^Gy?HYd20 c&b5 >RI M<YwGy<$QQG5TX΃lg5ENV -Zeњk\ˮFmd {kl5+zH,Kw QoAןy8[}=،։fGOoGH {vnk+7`|[wvf7/꿕e@Y*60P6k!jOzǜnYo\{*Q'lӰnn,W :n$=ζ E5VQi^+XM]lVӨ%&ꏑU9纺p*ngrCLO茬-۽tw^| Qx\0_n!c,fH#^K#?z b]JΙ 4@Y=moX| 9Laoaf߻hv䖆(0{s1snc,>%$禛-`nvݷaض$)ongED@g꼳\dਣ zf'Wߺ_ߺ^o3l9CO&/Ke)Gm~}?^׏'}Wxu<~\3yQkWFtwiT3C񇨩B-W{⧬zcOTbiɿ6`ǟXM嘱,qWV;7W=Ǘf7rؙ)D'h.KSx _JYdyd gSPz= 85j̖\'f|lq|>rlm[Ftu>(,= e4>9>}-NDhvjj,UE &q`ԫUX]7awfؘ4w &u-+垌ؽ|}n.{7&}& ~ub O^5_~.v6!zX8MPe97ٓ2O{Eddkٖ(Yd<Ӛ>m ӒHUpU^auw~sz'ltG\GǪ1:{cN~ R$ݧ T |'=, nSorJF͢k>Km B?@";C̓K-O6T/?W?מ#?y~>^^OQĮ՚i-4ӊtQᏧkk\ֵCG׺H@H rNormal CJOJQJ_HaJmH sH tH N@BN Jg Heading 4 (@&^(5B*\^Jph3fDA@D Default Paragraph FontVi@V  Table Normal :V 44 la (k@(No List 4U@4 Jg Hyperlink >*ph\^@\ Jg Normal (Web)&$d]^a$^J*W@* JgStrong5\.X@!. JgEmphasis6]H@2H )6[ Balloon TextCJOJQJ^JaJFV@AF vIFollowedHyperlink >*B* ph } }"9S/:k0 &  J j 2NjlM=> !45x ""'$&*'+)=*,--00111/2v22*33344#5A5B5555899:==N=G?}@AYBmBDMFfFFG6GGGHaHyHVJrJMKLMNNQRQSoS)UVW^XYY[\\\<^__`)aabbKdeiijjklmmVnnoopppVppp)qq3rrNssttfuguhuiuuudvSw.xxyz{{w|x|||}80808080808000008080808080808 0808 0808 0808 080800000000000000000000000080800!0!0!800000000000000000 0 00 0 0 0 0800#50#580050505800909800==0==0==0==800YB0YB 0YB 0YB 0YB 0YB 0YB 0YB 0YB 0YB800aH800VJ0VJ0VJ0VJ800N0N0N800QS0QS800V0V0V0V80800\0\0\ 0\ 0\ 0\ 0\800b0b0b0b0b0b 0b 0b 0b 0b0b0b0b0b0b000 0 0 0 0 0 0 0 0 0 0 000000 0 0 0 0 0 0 00000@0y00jlM=4""&*'+)=*,A555899:G?}@AYBmBDMFfFFG6GGGHaHyHVJMKLMNQRQSoS)UVWYY\`)aabbKdeiijkmVnoopp)qq3rrNssttuxy}@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0{0:0%{0:0${0T0{0T0{0T0{0T0{0T0{0X0YL{0X0{0X0 0@0{00{00{00{00{00{00{00{00{00{00@0{00{0\0]{0\0{0\0 0{0`0{0`0 0{0d0e{0d0 0{0h0i {0h0 0{0l0m|{0l0{0l0 0@0@0@0@0@0@0@0@0@0@0@0{00q{00q{00q{00q{00q{00q{00q{00q{00{00@0{0E0E{0E00 a+ "x(9=IQrR`dnvVx}qCFGHJKMNPQSUWY[]^`bdfg0 "+1<BmJyPo[gqw|DILORTVXZ\_acehE3fjWil:KM ";qABWBI"JTJnnoo_oooopr8sKsu,vRvvvvwwwz{{}XXXXXXXXXXXXXXXXXXXXXXX?@ XXXXl ,R$88 ySbG@Z(  \  3 "` \  3 "` B S  ?piu}tht _Hlt126644403 _Hlt126644404 _Hlt128192570 _Hlt128192571}@@@@}]^5_`ϤabTc|dLz##'j'jkk}$$+j+jkk}B*urn:schemas-microsoft-com:office:smarttagscountry-region9*urn:schemas-microsoft-com:office:smarttagsplace8*urn:schemas-microsoft-com:office:smarttagsCity 섺Ma  DM`gX`p%z%B5J5556699r:{:::;;;;<<"A/AYB`BmBtBDDDDFF+F2FHH5d=dl%l9t@t{}.= C  fdh5$(##'$&7&=&Z&]&p((((8)>),,H-R-..$1*1*3/344\5o555Q8V88889x9~999]:e:_;c;~;;;;= ===>>~>>W@b@@@AABB.C4CnEzEJJLLqMsMTNiNGPJPPQQQ`RcRRRxUUXXYYZZ[[B\I\i]t]]]^^_`_c_I`N`bb[c_cccUg\gggi iJjVjAlKlll)m/mmm`nen9pAppp]qbq3r8rrrss4u9uquvuuuvww xxx{{{}33333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333pppp{v|w|w|x||}{}iG$Gԝ 3Jpz]vSNd{8Z=1z#̄kC1N=N:>Jp9sR? WoLEotRdU-;*WHtX?#i^BSqJ z;{ip\~`{|;0,b^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`CJOJQJo(^`.pp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(h^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hH^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`CJOJQJo(^`.pp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(z^`zo(. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(h^`.h ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.^`CJOJQJo(^`CJOJQJo(pp^p`CJOJQJo(@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(;*WBSq otR{N:|;3;{iGLE#i^tX1z#z]C1ip\~>z9sR?S                          /wce6qM{z p./ I[2p 5W 12UrLB(ilUf=x=%@nAVKaewG8Blw[IME0} N&QilUam112UrL/V2p 5WI[{-g>G$\L|^WN!VKa[IAanzgppe9ce6q=%@dszgpEs%:8BlwUx}xV/;+&Qw8SRaNi")'k~$,%1(+-,G//i/*^4<8L9JXL)P$YYMZgZ)6[X\v$^&gJg8dg(+k5v'wox({h{ ~!m\y/^1afc^=N51"3c]5f r|n w$@ssss@{}p@Unknown Gz Times New Roman5Symbol3& z ArialG Bodoni MT BlackO  Rockwell Extra BoldS&Arial Rounded MT Bold?5 : Courier New5& zaTahoma;Wingdings"qh̪F̪FFsi?si?#`x24d{{ 2QHX)?Jg2 Fraud Types AUDREY L LANE AUDREY L LANE`                Oh+'0 ( H T ` lx Fraud TypesAUDREY L LANE Normal.dotAUDREY L LANE2Microsoft Office Word@ @Z6@Hh7@Hh7si՜.+,D՜.+,P  hp  P. C. FEDERAL CREDIT UNION?{  Fraud Types Title 8@ _PID_HLINKSA\bLBShttp://www.usps.com/common/exit_page.htm?url=https://www.ftc.gov/ftc/complaint.htm 7>?7http://www.usps.com/postalinspectors/creditbureaus.htm 7><7http://www.usps.com/postalinspectors/creditbureaus.htm -49/http://www.usps.com/ncsc/locators/find-is.html YW65http://www.usps.com/postalinspectors/securetrans.htm ~34http://www.ftc.gov/opa/2004/12/checkoverpayment.htm N01http://www.fraud.org/tips/internet/fakecheck.htm zf-4http://www.usps.com/missingmoneyorders/security.htm ^*9http://www.ftc.gov/bcp/conline/pubs/alerts/dialupalt.htm H'9http://www.ftc.gov/bcp/conline/edcams/spam/resources.htm C]$Ehttp://www.lookstoogoodtobetrue.com/fraud/counterfeitmoneyorder.html dn!@http://www.lookstoogoodtobetrue.com/fraud/counterfeitcheck.html ;>;http://www.lookstoogoodtobetrue.com/fraud/sweepstakes.html =2?http://www.lookstoogoodtobetrue.com/fraud/investmentfraud.html 4>?http://www.lookstoogoodtobetrue.com/fraud/debtelimination.html #57http://www.lookstoogoodtobetrue.com/fraud/charity.html  :http://www.lookstoogoodtobetrue.com/fraud/advancefee.html ?.7http://www.lookstoogoodtobetrue.com/fraud/spyware.html |u 4http://www.lookstoogoodtobetrue.com/fraud/spam.html q} 8http://www.lookstoogoodtobetrue.com/fraud/phishing.html =17http://www.lookstoogoodtobetrue.com/fraud/idtheft.html 4?7http://www.lookstoogoodtobetrue.com/fraud/hacking.html WE%http://www.lookstoogoodtobetrue.com/ [B1http://www.usps.com/postalinspectors/welcome.htm [B1http://www.usps.com/postalinspectors/welcome.htm [B1http://www.usps.com/postalinspectors/welcome.htm [B1http://www.usps.com/postalinspectors/welcome.htm   !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghiklmnopqrstuvwxyz{|}~ Root Entry FHr7 Data jƕ1Table1zWordDocument8SummaryInformation(DocumentSummaryInformation8CompObjq  FMicrosoft Office Word Document MSWordDocWord.Document.89q