Consumer Safety

Protect Yourself – Customer Safety

We are all at risk for potential fraud, account hijacking and unauthorized funds transfers. However, there are many ways you can help protect yourself and your computer with these resources.

Catskill Hudson Bank Customer Education & Protection

Identity theft is one of the fastest-growing types of financial fraud. Without stealing your wallet, a crook can steal your financial identity with as little information as your Social Security Number. The practice is also known as "account-takeover fraud" or "true-name fraud," and it involves crooks' assuming your identity by applying for credit, running up huge bills and not paying the creditors - all in your name.

POSSIBLE SIGNS
  • Monthly bank and credit card statements, and other regular documents stop arriving in the mail.
  • You start receiving bills from companies you don’t recognize.
  • Credit collection agencies try to collect on debts that do not belong to you.

    How Do I Protect Myself From Identity Theft

    • Order copies of your credit report once a year to ensure they are accurate. You can call each of the three national credit reporting agencies because each may contain different aspects of your credit history, or you can contact AnnualCreditReport.com for one free credit report each year.
    • If you have been denied credit in the past 60 days, the credit reporting agency that sent the report to your prospective creditor must provide you with a copy of the report for free. However, it will not be sent automatically so you have to request a copy from the credit reporting agency.
       
    • Keep an eye on your accounts throughout the year by reading your monthly/periodic statements thoroughly. That's an easy way for you to be sure that all of the activity in your accounts was initiated by you.
    • Tear up or shred pre-approved credit offers, receipts and other personal information that link your name to account numbers. Don't leave your ATM, debit or credit card receipt in public trash cans. Crooks (a.k.a dumpster divers) are known to go through trash to get account numbers and other items that will give them just enough information to get credit in your name.
    • If your credit card or other bills are more than two weeks late, you should do the following:
      • Contact the US Postal Service to see if someone has forwarded your mail to another address.
      • Contact your bank to ask if the statement or card has been mailed.
      • Contact the businesses that send you bills.
    • When paying your bills, don't put them in your mailbox with the red flag up. That's a quick way to have someone steal your mail. Use a locked mailbox, the post office or pay them online.
  • Protect your account information. Don't write your PIN on your ATM or debit card. Don't write your Social Security Number or credit card account number on a check. Cover your hand when you are entering your PIN number at an ATM or point of sale machine.
    • Don't carry your Social Security card, passport or birth certificate unless you need it that day. Take all but one or two credit cards out of your wallet, and keep a secured list at home of your account information and customer service telephone numbers.
    • Never provide personal and/or confidential information over the phone, unless you initiated the call.
    • Do not use simple passwords or PINs (e.e., your last name, 12345, mother’s maiden name, etc.). Mix capital letters, numbers, and characters to create your passwords/PINs and make sure to change them frequently.

      Thinking your identity has been stolen?
                         Here's what to do.

    • Call your local police department and report the theft. Identity theft and financial fraud is a crime.
    • Contact Catskill Hudson Bank at (845) 794-9203 as soon as possible. We can help you obtain new account numbers for all of your Catskill Hudson Bank accounts.
    • Close all of your credit card accounts and open with new account numbers.
    • Contact the fraud units of all three credit bureaus. Ask them to flag your account, which tells creditors that you are a victim of identity theft. Also, add a victim's statement to each of your credit bureau reports that asks creditors to contact you in person to verify all applications made in your name. You can reach the fraud units of the credit bureaus at: 

    • Call the Federal Trade Commission's ID Theft hotline at (877) IDTHEFT. The hotline is staffed by counselors trained to help identity theft victims.
    • If you suspect mail theft, notify the US Postal Inspector through the the United States Postal Inspection Service website
    • If you suspect your Social Security Number was taken, contact the Social Security Administration at (800) 772-1213
    • You also may want to contact your telephone, long distance, water, gas and electrical companies to alert them that someone may try to open an account in your name.
    • Maintain a log of all the contacts you make with authorities regarding the matter. Write down each person's name, title, and phone number in case you need to contact them again or refer to them in future correspondence. 

Elder Financial Abuse

What is Elder Financial Abuse?

Elder financial abuse is the illegal or improper use of an older adult’s funds, property, or resources by another individual. 

It’s a crime that deprives older adults of their resources.  Anyone who sees signs of theft, fraud, misuse of a person’s assets or credit, or use of undue influence to gain control of an older person’s money or property should be on the alert and report it to the local authorities.

Perpetrators are generally those who have a close relationship with an older person (for ex: family members, caretakers, or fiduciaries) but can also be strangers who target the elderly.

Victims of elder financial abuse are commonly 60+ years of age, live alone, and may require assistance with their home or health care. Dementia, disability, and decline can make it even easier for criminals to con older adults out of their money.  Advances in technology can also make it difficult for seniors to know who to trust and what's safe.

You, or someone you know, could become the victim of financial abuse.  Elderly financial abuse costs victims billions of dollars every year.

Tips for Seniors:

What should you do to protect yourself?

  • Ignore calls from phone numbers you don’t recognize.
  • Never provide personal or financial info to someone calling, ex: Social Security Numbers or Bank info. 
  • Plan ahead to protect your assets and indicate wishes.
  • Shred receipts, bank statements and unused credit card offers.
  • Lock up sensitive bank info that may be at home, such as debit/credit cards, checkbooks, and statements.
  • Order copies of your credit report once a year to ensure accuracy (www.annualcreditreport.com)
  • Never pay a fee or taxes to collect sweepstakes or lottery “winnings”.
  • Consult with a financial advisor or attorney before signing any document you don’t understand.
  • Check references and credentials before hiring anyone. Don’t allow workers to have access to information about your finances.
  • Feel free to say “no.” After all, it’s your money.
  • You have the right not to be threatened or intimidated. If you think someone close to you is trying to take control of your finances, call your local Adult Protective Services or tell someone at your bank.
  • Trust your instincts. Exploiters and abusers often are very skilled. They can be charming and forceful in their effort to convince you to give up control of your finances. If something doesn’t feel right, it may not be right.
  • If it sounds too good to be true, then it usually is.

What are Examples of Elder Abuse?

  • Breach of trust

    The vast majority of elder financial abuse (up to 90%, according to the National Adult Protective Services Association) is committed by close family members or caregivers. Maybe a son is added to a checking account to help manage Mom’s bills and then starts using the account to pay off gambling debts. Or Grandpa gives valuables to the housekeeper and eventually suggest he add her to the will.
  • Phone scams

    The phone rings and the caller says he is from the IRS and states that an individual has a tax bill that is going to rise with interest/fees unless paid immediately. Or someone calls with news that there is a problem with a credit card and they need a Social and birth date to clear things up. Unless you are certain of the identity of the call, never provide information to someone calling you. Or a caller states they are your granddaughter and are stuck out of state or in jail, and need you to send money to her or her ‘lawyer’ to help. This could be a con-artist pretending to be your granddaughter.  Contact your granddaughter yourself before sending any money.
  • Phishing scams

    As more seniors head online, they grow more susceptible to phishing scams. Phishing emails look like they come from legitimate sources, such as banks or credit card issuers. They ask seniors to click on a link to enter account information in order to verify recent transactions or to rectify problems with accounts. Unfortunately, the links are fake, and criminals use them to gather personal account information, which they use to drain accounts or steal identities.

What should you do if you are a victim of financial abuse?

  • Talk to a trusted family member who has your best interests at heart, or to your clergy.
  • Talk to your attorney, doctor or an officer at your bank.
  • Contact Adult Protective Services in your state or your local police for help.

    Tips for Family and Friends:

    What are potential signs of financial abuse?

    • Unusual activity in bank accounts, including large, frequent or unexplained withdrawals.
    • ATM withdrawals by an older person who doesn’t normally use a debit or ATM card.
    • Changing/adding accounts that offer more complicated services the customer may not understand or need.
    • Closing CDs or accounts without regard to penalties.
    • Withdrawals from bank accounts or transfers between accounts the customer cannot explain.
    • New “friends” accompanying an older person to the bank.
    • Sudden non-sufficient fund activity or unpaid bills.
    • Uncharacteristic attempts to wire large sums of money.
    • Suspicious signatures on checks, or outright forgery.
    • Confusion, fear or lack of awareness on the part of an older customer.
    • Refusal to make eye contact, shame or reluctance to talk about the problem.
    • Checks written as “loans” or “gifts.”
    • Bank statements that no longer go to the customer’s home.
    • New powers of attorney the older person does not understand.
    • A caretaker, relative or friend who suddenly begins trying to conduct financial transactions on behalf of an older person without proper documentation.
    • Altered wills and trusts.
    • Loss of property.

    What should you do if you suspect financial abuse?

    • Talk to them.  See if you recognize any of the signs mentioned here. Try to determine what specifically is happening with their financial situation, such as a new person “helping” them with money management, or a relative using cards or credit without their permission.
    • Report the elder financial abuse to their bank, and enlist their banker’s help to stop it and prevent its recurrence.
    • Contact Adult Protective Services in your town or state for help.
    • Report it to local law enforcement.

    Additional Resources:

    https://www.consumerfinance.gov/consumer-tools/educator-tools/resources-for-older-adults/protecting-against-fraud/

    https://www.fdic.gov/consumers/consumer/news/april2019.html

    https://www.fdic.gov/resources/consumers/money-smart/teach-money-smart/money-smart-for-older-adults.html

    https://www.consumer.ftc.gov/blog/2015/08/spotting-elder-financial-abuse

    https://www.aba.com/advocacy/community-programs/safe-banking-for-seniors 

Scammers have entered the online dating world and chat rooms, in the hopes of sweet-talking you out of your money.  These scammers are scattered all over the world and often hide behind a computer while they try to build ‘fake’ relationships with people, even proposing to them, and then ask for money or steal their personal information.  According to statistics from the Federal Trade Commission losses in Romance scams have increased extremely rapidly since 2016, and now total over $200 million a year in losses to victims.

This has only gotten worse with the COVID-19 pandemic, where people may be feeling especially lonely due to isolation, leading people to seek connections online.

How to Spot a Romance Scam:

Although almost any age group can be lured into this scam, however the number one target of Romance scams is usually men and women over age 40.  Seniors, especially widows, widowers and recent divorcees, are particularly vulnerable to this kind of manipulation.  However, it’s important to recognize that scammers will target anyone they think they can exploit.

Scammers will go to great lengths to create the illusion of someone you would be attracted to and trust. They often use pictures from the internet for their profile and may disguise their voice on the phone. To build trust with their victims, scammers will want to talk or message several times a day and may even send small gifts to express their deep affection towards to their victims.  Romance scammers often get information from social media profiles so they can fake similar interests, hobbies, and values.

A frequent tactic is for scammers to claim to live a long distance from their victim, often an American abroad or a deployed soldier. This allows the scammer to draw out the relationship without having to meet in person. Some scammers may eventually propose an in-person meeting, claiming they will travel to see you.  They may even actually meet you once or twice to enhance that ‘trust’, however more commonly there will be a last-minute emergency preventing in-person meetings from happening.

Eventually, the scammers will request money, sometimes they start small and then ask for larger.  When they request money, usually as a loan, and usually requested to be wired to them for things ranging from business investments, property, debts, illness, and more.  They also may ask for gift cards, which are harder to trace.  They may even ask for money for airfare so they can visit you.  Once they receive the money, the scammer will often ask for more or create a new reason they need to borrow money.

Warning Signs:

Look for Warning signs, romance scammers are financial predators and are smart. They play to your affection to gain your trust and access to your money. Here are some warning signs of a new friend or love interest:

  • Overly complimentary and flirtatious
  • Showers you with affection and overwhelms you with texts, emails, and phone calls
  • Suggests or insists that you keep the “relationship” a secret
  • Pressures or hurries you to share your private financial info or seem pushy or nosy about your finances
  • Says they can’t visit you in person because they are living or traveling outside of the country, working on an oil rig, in the military, a doctor with an international organization
  • Claims to need money for an emergency surgery or other medical bills; asks for a loan or gift by wire transfer, gift cards or even cash; needs to pay customs fees or gambling debts; requests money for plane ticket or other travel expenses, a visa or other official travel documents

 Tips to protect yourself:

  • Never give or loan money to someone that you have not met in person, even then exercise caution.
  • Do not give out personal information to someone online or on the phone.
  • Use trusted online dating sites, but still exercise caution.
  • Be cautious of people you meet online who say they are an American abroad or a deployed soldier.
  • Schedule a video-chat early in the relationship to ensure they are the person they are presenting in their profile.
  • Do a reverse image searchof the person’s profile picture. If it is linked to another name or details that don’t line up, it’s likely a scam.
  • Avoid people online who ask for money, even if it’s due to an emergency or a traumatic life incident. They are almost always scammers.

What if I Become a Victim: 

  • If you think you are being scammed or have given, or sent, money to a scammer take the following steps:
  • Stop communicating with them.
  • Notify your financial institution immediately if you sent money or gave someone your bank information.
  • Talk to someone you trust (a family member, friends, clergy, or banking representative) to get their opinion.
  • Report it!

Reporting Romance Scams:

You can report local in-person romance scams to local law enforcement and Adult Protective Services (APS).

If you have fallen victim to a romance scam, we encourage you to file a complaint with the Division of Consumer Protection at www.dos.ny.gov/consumerprotection.

You are also encouraged to report all fraud to the Federal Trade Commission at https://www.ftc.gov/faq/consumer-protection/submit-consumer-complaint-ftc and FBI’s Internet Crime Complaint Center at https://www.ic3.gov/Home/ComplaintChoice/default.aspx/.



Additional Resources:

https://www.fdic.gov/resources/consumers/money-smart/teach-money-smart/money-smart-for-older-adults.html

https://dos.ny.gov/news/consumer-alert-new-york-state-division-consumer-protection-alerts-new-yorkers-about-online


Online banking for both Consumer and Business customers makes it easy to attend to financial matters while traveling or during nontraditional bank hours. Catskill Hudson Bank uses state-of-the-art technology that encrypts data traveling between your computer and the Bank. We also utilize layered security so there are different controls at different points in a transaction. This technology is important because a weakness in one control is generally compensated for by the strength of another. This allows us to authenticate our customers upon login and detect and respond to any suspicious activity related to that login.

Catskill Hudson Bank also conducts ongoing internal assessments regarding the risks associated with online banking. These assessments include, but are not limited, the assessment of changes in our customer base over time, changes in the functionality of our products, changes in the internal and external threat environment, and any actual events experienced by the Bank or in our industry.

You can also help protect yourself by following these security tips:
  • Make sure the anti-virus software on your computer is up-to-date.
  • Install and update anti-spyware and malware software.
  • Use a strong password – not one that can be easily figured out by a hacker. A strong password contains a combination of letters, numbers and characters. Make sure to change your passwords often.
  • Do not open or respond to email from people you don’t know and never send your personal or account information via email.
  • Always “exit” or “log off” after you are finished with your online business.
  • Use your own computer to conduct business online. Never use a public computer or wireless “hot spot” to make online purchases or to send personal information.
  • If you receive an email from your financial institution relating to an “urgent problem” or other matter pertaining to your account, call your bank to ask if it’s legitimate.
  • Properly erase your data before disposing of an old computer.
A good way to protect yourself from hackers and their reconnaissance is to use a personal firewall. A personal firewall is a device or software package that can actively monitor Internet traffic to and from your computer, provide detailed logs of hacking attempts against your computer, and can be configured to block traffic that you don't want to receive. Firewalls can significantly hinder a hacker's ability to acquire information about your computer and subsequently hinder their ability to wreak their havoc.

FIREWALLS CAN:
  • Block ports that viruses, worms, and Trojans use to communicate with other machines on the Internet.
  • Prevent unwanted sharing of your files and computer resources such as printers.
  • Prevent applications on your computer from connecting to the Internet if they don't need to.
  • Block illegitimate traffic sent by your computer or illegitimate traffic sent to your computer.
  • Significantly increase the difficulty for hackers to access and subsequently exploit un-patched network applications and services on your computer.
FIREWALLS CAN'T:
  • Detect or disable computer viruses and worms if they are already on your computer.
  • Stop you from opening e-mail with dangerous attachments.
  • Block spam or unsolicited e-mail from appearing in your inbox.
Malware, short for malicious software, is software written for ill-intended purposes. The term malware is used to describe viruses, worms, Trojan horses, adware, spyware, ransomware, crimeware, rootkits, and other unwanted and potentially dangerous software.

HOW DO I HELP PROTECT MYSELF FROM MALWARE?
  • Install good quality anti-malware software from a reputable vendor. If you are unsure as to what software to obtain, contact a professional computer services company.
  • Keep your computer’s and device's operating systems (OS) up to date with the latest security patches. You should also keep all software that resides on your devices up to date with the latest security patches.
  • Visit only websites by reputable companies. Browsing questionable websites will increase your risk of being infected with malware.
  • Ensure you are using a firewall and that it’s configured to allow access only to needed ports and applications.

Phishing is a combination social engineering and high-tech tactic that uses fake e-mail, fraudulent Internet addresses, imposter websites, and "pop-ups" to impersonate a financial institution. Identity thieves send mass e-mails purported to be from a reputable institution. These e-mails direct you to a site where you are asked to divulge information such as usernames, passwords, account numbers, etc. While fraudulent e-mails vary in content, they generally carry a common theme essential to their success; i.e. you must take action immediately or risk losing access to your account. Criminals will try to make their site look exactly like that of your bank.

HOW DO I HELP PROTECT MYSELF FROM PHISHING?
  • Do not respond to e-mails that ask for confidential information. Catskill Hudson Bank will never request personal information such as usernames, passwords, etc. through an e-mail.
  • Install good quality anti-malware software from a reputable vendor. If unsure what software to obtain, contact a professional computer services company.
  • When on Catskill Hudson Bank’s website, you can help insure you’re on the correct site by verifying that web address is correct and in a secure session (https).
HOW DO I REPORT PHISHING ACTIVITY?
If you can answer “yes” to any of the following questions involving a check you have received, please contact a Catskill Hudson Bank customer service representative immediately. You could have a counterfeit check.
  • Are the check proceeds for an item you sold on the internet such as a car, boat, jewelry, etc.?
  • Is the amount of the check more than the selling price of the item?
  • Have you been instructed to send funds to another person as soon as possible?
  • Is the check from an individual you have communicated with via e-mail?
  • Is the check drawn on a business or individual different from the person buying your item or product?
  • Have you been informed that you were the winner in a lottery that you did not enter?
  • Have you been asked to assist in the distribution of money from another country?
HOW FAKE CHECK SCAMS WORK
Fraudsters may claim that it’s too difficult to pay you direct because they are out of the country so they’ll tell you that they have someone in the U.S. who owes them money to send you a check or a money order.
When you receive the check or money order, it may be for more than you are owed. You’ll be instructed to deposit the item and then to wire the extra money back to the scammer, or to someone else. In the case of an “advance” or “sweepstakes,” the scammer will send you a check and ask you to wire part of it back to pay a fee to claim your “winnings.”

Sometimes, the scammer will tell you they will transfer the money direct to your account. They’ll ask you to provide your bank account information and they’ll send a ‘fake’ transfer to your bank (it looks real). When you check your balance, the fake money looks like it is there and you’ll be asked to wire money back to the scammer.

THE UNFORTUNATE CONSEQUENCES OF FAKE CHECK SCAMS
Whether a scammer sends you a check or transfers money direct to your account, the outcome is often the same. After you wire the money back to the scammer, the check or transfer is found to be a fake. In the end, it is the victim (you) that pays for the money lost.

HOW CAN I PROTECT MYSELF?
One of the best ways to protect yourself is to use your common sense. It does not make sense for someone to send you ‘too much’ money and ask for you to wire some of it back. This is clearly a scam!

Forgeries can sometimes take weeks to discover. If you think you have a potential fake-check scam situation, do not deposit the check given to you and never wire out money or give out your account information. You should immediately contact your bank for assistance or questions.

Do not fall victim to these clever schemes, learn more at FTC about the most common fake check scams and watch interviews with actual victims.
Fraudsters still use some of the "old tricks of the trade," including calling you up on the telephone to get your information. Think about these points next time you are in doubt of a telemarketer:
  • Always ask for more information (in writing) about the organization calling or the offer being presented.
  • Never feel obligated to provide your credit/debit card number over the phone.
  • Educate yourself about the cost of "900" calls and how you can block such calls from getting through.
  • Get as many details as you can. The fewer the questions the caller can answer, the less likely he or she is legitimate.
  • Get a call-back number so you can initiate the call yourself, or because you may need to report it later.
  • If you get a call from someone posing as a representative from your financial institution and asking for your account or personal information, hang up immediately and call your bank to verify any claims. Remember, they will NEVER ask for your personal or account information - they already have it.
  • If a telemarketer offers you a "get-rich-quick" opportunity, the best response is to hang up.
  • Avoid offers informing you that you've won a prize. Typically, respondents are asked to pay for "shipping", "an application fee", or a "deposit" for a prize that does not exist.
  • Be wary of calls soliciting contributions to charitable causes, particularly those regarding disaster relief. Many times these solicitors are not legitimate and you are better off choosing a worthy cause and contacting them yourself than to respond to a random request.
CELL PHONE SPYWARE
Did you know spy software can be installed on your cell phone? Imagine someone can actually tap into your cell phone and listen to your conversations, read text messages, and track your movements. While cell phone spyware is illegal in the U.S. and spying via cell phone is a federal crime, you should still be aware of ways to protect the information you pass through on your cell phone.
  • Always know the location of your cell phone so it cannot be removed from your possession in order to download damaging spyware onto it.
  • Install a security password on your cell phone to restrict others from using it.
  • If you do not need a phone that has internet access, do not get one. Typically phones that have internet capability are more vulnerable.
Banks follow very specific rules regarding electronic transactions issued by the Federal Reserve Board. These are known as Regulation E. Under this regulation certain protections are generally extended only to consumer customers and consumer accounts. The regulation says you can recover Internet banking losses based on how soon they are detected by the consumer and when they are reported. The Federal rules require the following:
  • If you report any losses within two days of receiving your statement you can only be liable for the first $50.00.
  • After two days the amount increases to $500.00.
  • After 60 days you could be legally liable for the full amount of the transaction(s) in question.
  • Please consult our CHB Account Products disclosure for more details.
If you notice any suspicious activity on your accounts, or experience any security-related events such as Phishing, follow these steps to start mitigation:
  1. Contact your financial institution immediately. We can be reached at (845) 794-9203.
  2. File a police report.
  3. Report suspicious contacts to the Federal Trade Commission or the
  4. Internet Fraud Complaint Center.
  5. Contact each of the three following credit bureaus and place a fraud alert statement on your credit information.
As defined in Regulation GG, unlawful gambling means to "place, receive or otherwise knowingly transmit a bet or wager by any means which involves the use, at least in part, of the internet where such bet or wager is unlawful under any applicable Federal or State law in the State or Tribal lands in which the bet or wager is initiated, received or otherwise made".

As a customer of Catskill Hudson Bank, these restricted transactions are prohibited from being processed through your account or banking relationship with us.
Use of Second Computer
The FBI is warning small business owners to use one computer to handle online banking activities and another entirely to surf the web and for email. This approach is the best way to prevent malicious software from infecting the computer and makes it much harder to manipulate electronic transfers. Catskill Hudson Bank strongly recommends this approach in an effort to reduce the chances of online theft, especially for higher risk transactions such as ACH and wire transfers.

Business Identity Theft and Enhanced Business Controls
Businesses fall victim to identity theft too. It’s important for you to protect key information, not only for your customers, but for your employees as well. Here are some proactive steps to help avoid fraud and identity theft.
  • There should be a reasonable separation of duties between employees granted privileges for authorizing transactions, recording transactions, and maintaining company bank accounts and computer systems. You should conduct a periodic assessment of your own operating environment and controls to ensure your controls are adequate based on the products you utilize at the Bank.
  • Develop a process to screen employees who have access to personal information, even if they are part-time. This also goes for cleaning services and temporary firms you use.
  • Encrypt all personal and confidential information on computers. Make sure your systems administrator checks on a regular basis that your system is hacker-proof.
  • Checkbooks, signature stamps and deposit slips should be kept in a secured place and checked on a regular unscheduled basis by owners. It should be in a place where others could witness if an employee is gaining access frequently.
  • Pay close attention to employee spending habits that seem out of the ordinary.
  • You can make your computers safer by installing and regularly updating anti-virus software, anti-malware programs, firewalls, and keeping operating patches and updates current.
  • Adopt secure methods for disposing of business and personal information, such as using shredders.
  • Consider doing your banking online so you can access or review your accounts immediately whenever you need to. You may also consider receiving your billing, account statements, and notices electronically versus waiting for them in the mail.
Identifying Counterfeit Money
Money counterfeiters can be just as clever as other fraudsters when producing fake money. If a business receives counterfeit bills - they are out that cash. Make sure you and your employees are aware of these tips from the U.S. Secret Service to identify potential counterfeit bills.
shows difference between counterfeit and real currency fiber appearances.

Paper
Genuine currency paper has tiny red and blue fibers embedded throughout. Often counterfeiters try to simulate these fibers by printing tiny red and blue lines on their paper. Close inspection reveals, however, that on the counterfeit note the lines are printed on the surface, not embedded in the paper. It is illegal to reproduce the distinctive paper used in the manufacturing of United States currency.

Raised Notes
Genuine paper currency is sometimes altered in an attempt to increase its face value. One common method is to glue numerals from higher denomination notes to the corners of lower denomination notes.

These bills are also considered counterfeit, and those who produce them are subject to the same penalties as other counterfeiters. If you suspect you are in possession of a raised note:
one dollar bill with numbers from a ten pasted onto the corners
  • Compare the denomination numerals on each corner with the denomination written out at the bottom of the note (front and back) and through the Treasury seal.
  • Compare the suspect note to a genuine note of the same denomination and series year, paying particular attention to the portrait, vignette and denomination numerals.
Watermark
Beginning with Series 1996, each denomination bears a watermark depicting the same historical figure as the portrait, positioned to the right of the portrait. Hold the bill to the light to see the watermark.
shows the inscribed security thread running vertically through a bill.

Inscribed Security Thread
A clear, inscribed polyester thread has been incorporated into the paper of genuine currency. The thread is embedded in the paper and runs vertically through the clear field to the left of the Federal Reserve Seal.

  • Printed on the thread is a denomination identifier. On $100 and $50 denominations, the security thread has "USA 100" or "USA 50" repeated along the entire length of the thread.
  • Lower denominations (i.e. $20, $10 and $5) have "USA" followed by the written denomination. For example, "USA TWENTY USA TWENTY" is repeated along the entire length of the thread.
  • The inscriptions are printed so that they can be read from either the face or the back of the note. The thread and the printing can only be seen by holding the note up to a light source.
*Note - the security thread indicating the bill's denomination is now located in a different position on each denomination. The inscribed security thread in the 1996 series $20 and $50 also includes a flag.

If You Fall Victim
The Better Business Bureau recommends small business owners take the following steps to avoid harm if your business identity has been stolen.
  • Immediately alert your financial institution. Catskill Hudson Bank can be reached at (845) 794-9203. If fraudsters are accessing the business’s credit or bank accounts, forging company checks or opening up new lines of credit, it’s important for a business owner to notify financial institutions involved in order to limit any further unauthorized transactions. Check with law enforcement first before closing any accounts so as not to foil any ongoing investigations.
  • File a police report.
  • Review your credit report (sole proprietor). If your business is a sole proprietorship, then the same consumer protections apply as if an individual’s ID were stolen – such as access to free credit reports and the ability to place a fraud alert on the report.