.
Home News Scam Alerts
Scam Alerts
MILLARD COUNTY RESIDENTS RECEIVING SCAM PHONE CALLS - FEBRUARY 14, 2011
Monday, 14 February 2011 16:05

Some of our Millard County residents have been receiving phone calls from people who are claiming to be either bail bondsmen or a representative of a resident’s grandchild.  The caller will know the name of the child.  During the call the suspect tells the resident the grandchild has been arrested and they need bail money sent to them.  The caller begs the resident to tell no one of their arrest.  They will tell you the child is afraid of getting into trouble if the parents find out.  The resident is then instructed to send the bail money to them using Western Union.  The most recent callers have claimed to be in jail in the Houston, Texas area.  Although, the suspects’ current tactic is claiming to be in jail, there have been other scams in the country where the suspects claim to be stranded in foreign countries or to have lost all their possessions while on vacation.

Sheriff Dekker encourages all resident to be very mindful and cautious of sending any money via money wire services for any reason.  If you need to send money, verify the person you are sending the money to is the person they are claiming to be.  Please share this information with the elderly in our communities as they are the ones who are being targeted at this time.

 
NEW EMAIL SCAM - JULY 9, 2010
Friday, 09 July 2010 21:09

The Millard County Sheriff’s Office has been made aware of yet another scam to get the money of unsuspecting residents.  There is an email circulating that states the resident has won some money but a relative has claimed the money in Malaysia and the company has now contacted the FBI to see if in fact the subject who picked up the money is a relative.  The email comes through and looks very official and even has a copy of a passport on it.  The email asks the recipient to look at the passport and identify the person as a relative and if they are unable to do that it asks for some personal information to be emailed to them.  See the attached for further information about the email.  Sheriff Robert Dekker urges anyone who receives a message like this to contact the Millard County Sheriff’s Office and advises them to not give out any personal information.

 

 

 

 

 
PUBLISHERS CLEARING HOUSE SCAM - OCTOBER 8, 2009
Thursday, 08 October 2009 13:22

In recent weeks the Millard County Sheriff’s Office has received several complaints from citizens stating they have been contacted by someone posing to be from Publishers Clearing House.  The callers posing to be from Publishers Clearing House been advising Millard County residents that they have won a large sum of money.  They then ask the residents to wire them a percentage of the winnings through Western Union.  They assure the residents that they will then bring them their winnings in a Publishers Clearing House van.  .

 

Many of our residents are receiving this type of call and Sheriff Dekker reminds you to NEVER give out personal information over the phone to anyone and use extra caution if wiring money to individuals you don’t know.   If you have questions please call us at 435-743-5302 or 435-864-2755.

 
SCAM ALERT - 800 TRANSFER AND 809/876 AREA CODE CALLS
Friday, 27 March 2009 08:37
The Federal Communications Commission (FCC) has become aware of a long distance phone scam that may lead consumers to inadvertently incur high charges on their phone bills.  For further information on this scam please refer to the following link http://www.fcc.gov/cgb/consumerfacts/809.html.
 
Jury Duty Scam
Saturday, 07 June 2008 04:57

Most of us take summons for jury duty seriously, but enough people skip out on their civic duty, that a new and ominous kind of scam has surfaced where the caller claims to be a jury coordinator. If you protest that you never received a summons for jury duty, the scammer asks you for your Social Security number and date of birth so he or she can verify the information and cancel the arrest warrant. The scam has been reported so far in 11 states, including Oklahoma, Illinois, and Colorado.  The scam is particularly insidious because they use intimidation over the phone to try to bully people into giving information by pretending they're with the court system. Simply tell the caller NO, hang up the phone, and report the call to us immediately.

The FBI and the federal court system have issued nationwide alerts on their web sites, warning consumers about the fraud.

 
IRS Tax Refund Scam
Saturday, 07 June 2008 04:56

The Millard County Sheriff’s Office has received local documentation of a well-known fraud involving entities falsely representing themselves through an e-mail as the Internal Revenue Service (IRS). The e-mail suggests eligibility for a tax refund and then directs the reader to a web page where personal information is requested and compromised. Many of the current IRS scams involve e-mail solicitation or “phishing” for crucial and dangerous personal information. The IRS and Sheriff Dekker suggest that if you receive an unsolicited e-mail purporting to be from the IRS, you take the following steps:

  • Do not open any attachments to the e-mail, in case they contain malicious code that will infect your computer.
  • Contact the IRS at 1-800-829-1040 to determine whether the IRS is trying to contact you about a tax refund.

For more on the IRS Tax Refund Scam, please visit the IRS bulletin here.

 



Safe Tip

It's a crime to threaten or hit another person. If you are the victim of domestic violence, you have the right to protect yourself and to expect help from others. Don't stay in your home. Go to a friend, neighbor, or relative. Contact us immediately to report the incident. Temporary shelter is available for domestic abuse persons and their children.

PhoneServices


© 2024 Millard County Sheriff's Office

Profile Information

Application afterLoad: 0.000 seconds, 0.88 MB
Application afterInitialise: 0.028 seconds, 6.67 MB
Application afterRoute: 0.087 seconds, 7.79 MB
Application afterDispatch: 0.130 seconds, 13.11 MB
Application afterRender: 0.148 seconds, 14.19 MB

Memory Usage

14993624

25 queries logged

  1. SELECT *
      FROM nu0vk_session
      WHERE session_id = 'mc0u03dcg8ictkhgqd9q4guso5'
  2. DELETE
      FROM nu0vk_session
      WHERE ( TIME < '1710824898' )
  3. SELECT *
      FROM nu0vk_session
      WHERE session_id = 'mc0u03dcg8ictkhgqd9q4guso5'
  4. INSERT INTO `nu0vk_session` ( `session_id`,`time`,`username`,`gid`,`guest`,`client_id` )
      VALUES ( 'mc0u03dcg8ictkhgqd9q4guso5','1710828498','','0','1','0' )
  5. SELECT *
      FROM nu0vk_components
      WHERE parent = 0
  6. SELECT folder AS TYPE, element AS name, params
      FROM nu0vk_plugins
      WHERE published >= 1
      AND access <= 0
      ORDER BY ordering
  7. SELECT `value`

      FROM `nu0vk_admintools_storage`

      WHERE `key` = 'cparams'
  8. SELECT `query`
      FROM `nu0vk_admintools_wafexceptions`
      WHERE (`option` IS NULL OR `option` = '')
      AND (`view` IS NULL OR `view` = '')
      GROUP BY `query`
      ORDER BY `query` ASC
  9. SELECT *
      FROM `nu0vk_admintools_ipautoban`
      WHERE `ip` = '44.222.149.13'
  10. SELECT `value`

      FROM `nu0vk_admintools_storage`

      WHERE `key` = 'cparams'
  11. SELECT `ip`
      FROM `nu0vk_admintools_ipblock`
  12. SELECT `word`
      FROM `nu0vk_admintools_badwords`
      GROUP BY `word`
  13. SELECT `source`
      FROM `nu0vk_admintools_redirects`
      WHERE (`dest` = 'news/scam-alerts' OR `dest` = 'news/scam-alerts')
      AND `published` = 1
      ORDER BY `ordering`
      LIMIT 0, 1
  14. SELECT *

      FROM `nu0vk_admintools_storage`

      WHERE `key` LIKE 'timestamp_%'
  15. SHOW COLUMNS
      FROM nu0vk_content
  16. SELECT template
      FROM nu0vk_templates_menu
      WHERE client_id = 0
      AND (menuid = 0 OR menuid = 115)
      ORDER BY menuid DESC
      LIMIT 0, 1
  17. SELECT c.*, s.id AS sectionid, s.title AS sectiontitle, CASE WHEN CHAR_LENGTH(c.alias) THEN CONCAT_WS(":", c.id, c.alias) ELSE c.id END AS slug
      FROM nu0vk_categories AS c
      INNER JOIN nu0vk_sections AS s
      ON s.id = c.SECTION
      WHERE c.id = 23
      LIMIT 0, 1
  18. SELECT cc.title AS category, a.id, a.title, a.alias, a.title_alias, a.introtext, a.fulltext, a.sectionid, a.state, a.catid, a.created, a.created_by, a.created_by_alias, a.modified, a.modified_by, a.checked_out, a.checked_out_time, a.publish_up, a.publish_down, a.attribs, a.hits, a.images, a.urls, a.ordering, a.metakey, a.metadesc, a.access, CASE WHEN CHAR_LENGTH(a.alias) THEN CONCAT_WS(":", a.id, a.alias) ELSE a.id END AS slug, CASE WHEN CHAR_LENGTH(cc.alias) THEN CONCAT_WS(":", cc.id, cc.alias) ELSE cc.id END AS catslug, CHAR_LENGTH( a.`fulltext` ) AS readmore, u.name AS author, u.usertype, g.name AS `groups`, u.email AS author_email
      FROM nu0vk_content AS a
      LEFT JOIN nu0vk_categories AS cc
      ON a.catid = cc.id
      LEFT JOIN nu0vk_users AS u
      ON u.id = a.created_by
      LEFT JOIN nu0vk_groups AS g
      ON a.access = g.id
      WHERE 1
      AND a.access <= 0
      AND a.catid = 23
      AND a.state = 1
      AND ( publish_up = '2006-06-01 00:00:00' OR publish_up <= '2024-03-19 06:08:18' )
      AND ( publish_down = '2006-06-01 00:00:00' OR publish_down >= '2024-03-19 06:08:18' )
      ORDER BY  a.created DESC,  a.created DESC
      LIMIT 0, 12
  19. SELECT cc.title AS category, a.id, a.title, a.alias, a.title_alias, a.introtext, a.fulltext, a.sectionid, a.state, a.catid, a.created, a.created_by, a.created_by_alias, a.modified, a.modified_by, a.checked_out, a.checked_out_time, a.publish_up, a.publish_down, a.attribs, a.hits, a.images, a.urls, a.ordering, a.metakey, a.metadesc, a.access, CASE WHEN CHAR_LENGTH(a.alias) THEN CONCAT_WS(":", a.id, a.alias) ELSE a.id END AS slug, CASE WHEN CHAR_LENGTH(cc.alias) THEN CONCAT_WS(":", cc.id, cc.alias) ELSE cc.id END AS catslug, CHAR_LENGTH( a.`fulltext` ) AS readmore, u.name AS author, u.usertype, g.name AS `groups`, u.email AS author_email
      FROM nu0vk_content AS a
      LEFT JOIN nu0vk_categories AS cc
      ON a.catid = cc.id
      LEFT JOIN nu0vk_users AS u
      ON u.id = a.created_by
      LEFT JOIN nu0vk_groups AS g
      ON a.access = g.id
      WHERE 1
      AND a.access <= 0
      AND a.catid = 23
      AND a.state = 1
      AND ( publish_up = '2006-06-01 00:00:00' OR publish_up <= '2024-03-19 06:08:18' )
      AND ( publish_down = '2006-06-01 00:00:00' OR publish_down >= '2024-03-19 06:08:18' )
      ORDER BY  a.created DESC,  a.created DESC
  20. SELECT g.*
      FROM nu0vk_core_acl_aro_groups AS g
      INNER JOIN nu0vk_core_acl_groups_aro_map AS gm
      ON gm.group_id = g.id
      INNER JOIN nu0vk_core_acl_aro AS ao
      ON ao.id = gm.aro_id
      WHERE ao.VALUE='63'
      ORDER BY g.id
  21. SELECT g.*
      FROM nu0vk_core_acl_aro_groups AS g
      INNER JOIN nu0vk_core_acl_groups_aro_map AS gm
      ON gm.group_id = g.id
      INNER JOIN nu0vk_core_acl_aro AS ao
      ON ao.id = gm.aro_id
      WHERE ao.VALUE='62'
      ORDER BY g.id
  22. SELECT m.*
      FROM nu0vk_modules AS m
      LEFT JOIN nu0vk_modules_menu AS mm
      ON mm.moduleid = m.id
      WHERE m.published = 1
      AND m.access <= 0
      AND m.client_id = 0
      AND ( mm.menuid = 115 OR mm.menuid = 0 )
      ORDER BY m.POSITION, m.ordering
  23. SELECT a.*, CASE WHEN CHAR_LENGTH(a.alias) THEN CONCAT_WS(":", a.id, a.alias) ELSE a.id END AS slug, CASE WHEN CHAR_LENGTH(cc.alias) THEN CONCAT_WS(":", cc.id, cc.alias) ELSE cc.id END AS catslug
      FROM nu0vk_content AS a
      INNER JOIN nu0vk_categories AS cc
      ON cc.id = a.catid
      INNER JOIN nu0vk_sections AS s
      ON s.id = a.sectionid
      WHERE a.state = 1  
      AND a.access <= 0
      AND cc.access <= 0
      AND s.access <= 0
      AND (a.publish_up = '2006-06-01 00:00:00' OR a.publish_up <= '2024-03-19 06:08:18' )  
      AND (a.publish_down = '2006-06-01 00:00:00' OR a.publish_down >= '2024-03-19 06:08:18' )
      AND cc.id = 30
      AND cc.SECTION = s.id
      AND cc.published = 1
      AND s.published = 1
      ORDER BY a.ordering
  24. SELECT `enabled`
      FROM `nu0vk_components`
      WHERE `link` = "option=com_admintools"
  25. SELECT `params`
      FROM `nu0vk_components`
      WHERE `option` = 'com_admintools'
      AND `parent` = 0
      AND `menuid` = 0

Language Files Loaded

Untranslated Strings Diagnostic

None

Untranslated Strings Designer

None