Translation(s): Crimes Financeiros Contra Idosos (Portuguese) PDF
This guide addresses the problem of financial crimes against the elderly. It begins by describing the problem and reviewing risk factors. It then identifies a series of questions to help you analyze your local problem. Finally, it reviews responses to the problem and describes the conditions under which they are most effective.
Financial crimes against the elderly fall under two general categories: fraud committed by strangers, and financial exploitation by relatives and caregivers. These categories sometimes overlap in terms of target selection and the means used to commit the crime. However, the differences in the offender-victim relationships suggest different methods for analyzing and responding to the problem.
Fraud generally involves deliberately deceiving the victim with the promise of goods, services, or other benefits that are nonexistent, unnecessary, never intended to be provided, or grossly misrepresented. 1 There are hundreds of frauds, but offenders generally use a small subset of these against the elderly. The frauds typically occur within a few interactions.
† Harshbarger (1993) commented on this problem as having "all of the factors which create an environment for fraud and exploitation.the need is great, the cost is high, even legitimate policies are complex and confusing, and the population is vulnerable and living in fear of the day the bill comes due." [Abstract only]
† See Whitlock (1994) for detailed descriptions of numerous confidence games.
In addition to variations in the type of product or service offered, frauds vary widely in the means used to commit them.
† See Schulte (1995) for detailed descriptions of a variety of telemarketing scams.
Successful frauds share common elements. The offenders gain trust and confidence through their charisma, by using a business name similar to that of a well-established organization, or by communicating a concern for the elder's well-being. They create the impression that the elder has been "chosen" or is "lucky" to receive the offer, and that such offers are rare. They encourage their victims to make an immediate decision or commitment to purchase products or services, which effectively limits the opportunity for consultation with others. Further, since the "special" offers are available to only a select group of customers, the offenders ask the victims to be discreet and not discuss the details, shrouding the transaction in secrecy and decreasing the chance of discovery by a family member, neighbor, or other concerned party. The frauds occur quickly, with little risk of exposure.
Unlike strangers, relatives and caregivers often have a position of trust and an ongoing relationship with the elderly. Financial exploitation occurs when the offender steals, withholds, or otherwise misuses their elderly victims' money, property, or valuables for personal advantage or profit, to the disadvantage of the elder. Their methods can include the following:
The tactics offenders use include deceit, coercion, intimidation, emotional abuse, or empty promises of lifelong care. Further, they usually try to isolate the victim from friends, family, and other concerned parties. By doing so, they prevent others from asking about the elder's well-being or relationship with the offender, prevent the elder from consulting with others on important financial decisions, and, perhaps most tragically, give the elder the impression that no one else cares about him or her.
In addition, relatives and caregivers sometimes exploit the following financial and legal arrangements:
Distinguishing between an unwise, but legitimate, financial transaction and an exploitative transaction resulting from undue influence, duress, fraud, or lack of informed consent can be difficult. 4 Suspicious transactions may be well-intentioned but guided by poor advice. Generally, financial exploitation involves a pattern of behaviors, rather than single incidents.
Financial crimes against the elderly share some characteristics with other crimes. Related problems requiring separate analysis and responses include
Financial exploitation of the elderly may also occur in concert with other types of elder abuse, including:
Understanding the factors that contribute to your problem will help you frame your own local analysis questions, determine good effectiveness measures, recognize key intervention points, and select appropriate responses.
As discussed above, there are many types of fraud and financial exploitation. In addition, states vary in terms of the age at which one is considered "elderly." These factors make it very difficult to estimate national prevalence. Typically, crime rates are listed in sources of official statistics, such as the FBI's Uniform Crime Reports and the Justice Department's National Crime Victimization Survey. However, neither of these sources provides information on victimization by fraud. Furthermore, studies relying on reports of victimization are particularly limited given the widespread agreement that fraud is dramatically underreported.
However, several national organizations have completed studies offering various ways to quantify the rate of financial crimes against the elderly. Some of these focus on consumer fraud, estimating that somewhere between 20 and 60 percent of adult Americans have reported being the victim, or attempted victim, of it. 5 These studies do not separate prevalence estimates across age. Within the general category of consumer fraud are estimates of losses due to telemarketing fraud. In 2000, the U.S. Senate Special Committee on Aging reported that, each year, consumers lose approximately $40 billion to telemarketing fraud, and estimated that approximately 10 percent of the nation's 14,000 telemarketing firms were fraudulent. 6 Some researchers estimate that only one in 10,000 fraud victims reports the crime to the authorities. 7
Other studies focus on the extent of financial exploitation by relatives or caregivers. In 1998, the National Center on Elder Abuse reported an estimated 21,427 substantiated cases of financial or material exploitation of an elder, accounting for approximately one-third of all substantiated elder abuse cases, including physical and sexual abuse and neglect. 8 In 1998, using data from 24 states, the National Aging Resource Center on Elder Abuse estimated that 20 percent of elder abuse victims were victims of financial exploitation. 9 State-level surveys have identified higher proportions of financial exploitation within reported elder abuse cases, with over 40 percent of elder abuse cases in California and North Carolina involving financial exploitation. 10
The usefulness of these studies in determining the scope of your local problem is rather limited. However, they show that the problem affects a large proportion of the population, regardless of age, and is likely to be underreported by victims and underrepresented in official statistics.
Researchers agree that elder fraud is dramatically underreported, which is problematic for several reasons. First, the failure to report means that the assistance of police, adult protective services, family members and others is not mobilized to stop the abuse. Second, even if intervention is not necessary, the underreporting of these crimes makes it very difficult for problem-oriented efforts to proceed because of a lack of information on the targets, methods and perpetrators. Finally, the lack of reporting may encourage the offenders to victimize others.
Many elderly victims do not report fraud because they feel ashamed, or they fear others will think they cannot care for themselves, which may trigger placement in a nursing home or long-term care facility. Significantly, many victims are not aware of support resources or do not know how to access them. In the case of financial exploitation, many victims have close ties to the offender and may feel protective. They may want to stop the exploitation and recover their assets, but not want the offender punished. In addition, many victims believe they are at least partially to blame.
Professionals (e.g., bankers, attorneys, accountants, and doctors) are also often slow to report suspected abuse. 11 Their brief, episodic interactions with the elderly and their lack of expertise in undue influence and criminal conduct serve as barriers to reporting. Even if they suspect abuse, there often is no specific protocol for reporting it.
When elderly victims do report losses by fraud or financial exploitation, the report quality often makes investigation difficult. 12 If cognitively impaired, the victim may not remember important details or may not be able to recount the sequence of events. Victim interviewers should put victims at ease and provide sufficient time and cues for accurate recall, or else the reports may lack important details. (These issues are discussed more thoroughly in the "Responses" section of this guide). Finally, cognitively and physically impaired seniors may feel overwhelmed at the prospect of traveling to the police station, district attorney's office, or court. Given that complicated cases of fraud and financial exploitation may take years to go to trial, it is possible that a particularly frail victim's cognitive or physical health will decline to the point that he or she cannot testify.
Not only do these barriers to intervention make prevention that much more critical, but they also highlight the importance of developing investigative techniques that account for both the complexity of the crimes and the unique personal challenges of the victims.
The prevailing stereotype of elderly fraud victims is that they are poorly informed, socially isolated individuals-potentially suffering from mental deterioration-who cling to old-fashioned ideas of politeness and manners that interfere with their ability to detect fraud. It is true that dementia and other cognitive impairments sometimes play a role in elder fraud and financial exploitation. For seniors with advanced impairments, responses requiring their participation may have limited effectiveness. However, recent research has refuted prevailing stereotypes, characterizing the majority of potential victims as more educated, informed, and socially active than previously supposed. A major AARP (formerly known as the American Association of Retired Persons) survey identified fraud victims as relatively affluent and well-educated, with extensive networks of family and friends. 13 This survey identified several key points:
There has been significant debate about the extent to which age affects the likelihood of consumer fraud victimization. That debate is beyond the scope of this guide. However, it is important to recognize that old age alone is not a reliable predictor of fraud victimization. Understanding the role of other risk factors can help you analyze your local problem and devise appropriately targeted responses. A number of researchers have noted that the following personal factors affect the extent to which people are likely to be victimized:
The research implies that a lack of knowledge and of certain consumer skills creates a susceptibility to fraud.
Victimization studies have found that seniors who have active social lives and experience a broad array of consumer situations may be vulnerable to fraud simply because of increased exposure. 15 On the other hand, those who are socially isolated may also be vulnerable because they are less likely to seek advice before a purchase, and because the sales pitch itself addresses an unmet need for social interaction, resulting in their feeling obligated to be friendly or compliant in return. 16
Although similar to elderly fraud victims in many respects, seniors exploited by relatives and caregivers differ in significant ways. There is no aspiration for monetary gain. They may fear what the offender may do if they do not comply with his or her demands. They may also have long-term emotional ties to the offender that create conflict about reporting abuse, and may cause them to feel protective of the offender once the abuse is discovered.
Although not studied empirically, there are abundant references in the literature to various lifestyle characteristics of the elderly believed to be linked to fraud victimization. Although many seniors live in poverty, home ownership is high among this group, and many have savings, pensions, and social security income. In addition, seniors are more likely than other demographic groups to be home during the day, and therefore available to telephone and in-person marketing efforts. These factors, combined with an assortment of anxieties specific to the elderly-the fear of outliving one's savings, of losing one's financial independence, of failing health-create fertile ground for all types of fraud and financial exploitation.
In contrast to victims of most other forms of crime, consumer fraud victims have a participatory role that is critical to a successful transaction. Victim compliance can fall along a continuum. 17 At one end is the completely uninvolved victim, as in the case of identity theft or credit card fraud. Toward the middle is the victim who makes a purchase or financial arrangement that is not well-informed or well-researched. At the far end is the repeat victim. Even after victimization, many people repeat high-risk behaviors.
The following are key moments that put the victim at risk in the typical fraud transaction. They have clear relevance to points of intervention: 18
In addition, certain traits might make people prone to fraud or financial exploitation. 19 Some of these are considered positive, such as good citizenship, compassion, generosity, respect for authority, and a trusting nature. Others are less desirable, such as being careless, susceptible to flattery, or easily intimidated. Some factors that seem irrelevant on the surface may also contribute to the likelihood of fraud victimization, such as being on "junk mail" lists; belonging to organizations; making purchases over the phone or Internet; moving; buying a house, car, or appliance; investing; and donating to charity.
You should be aware of the various ways fraud and financial exploitation victims may unwittingly help offenders and, when possible, assign them an active role in responding to the problem.
It is a well-documented fact that fraudulent operations compile the names of fraud victims on "mooch" or "sucker" lists and sell them to one another. These lists offer a shortcut to the typical approach of "cold calling" or random-number dialing, as the people listed have already shown themselves susceptible to fraud.
Researchers have found that the strongest predictor of future victimization is past victimization. 20 Not only are past victims retargeted, as described above, but they also can fall prey to scammers offering to help them recoup their losses from previous frauds. Fraudulent operations called "recovery rooms" approach past victims and offer to investigate the original fraud and to return the lost funds-for a fee. Naturally, once victims pay the recovery fee, they never hear from the secondary scammer again.
The very nature of financial exploitation by relatives and caregivers implies a pattern of revictimization. Seldom are the perpetrators satisfied with a single bank withdrawal or forged check. Instead, the pattern is more likely to begin with small-value transactions, which escalate over time and, if undeterred, conclude with the transfer or expenditure of all the elder's assets, leaving the victim with no means of financial support.
Consumer fraud relies on the manipulation of victims' emotions to get them to agree to a transaction. Emotional ploys include making the consumer feel he or she is part of a special group receiving VIP services, and creating a sense of urgency that prevents further research into the transaction. In addition, offenders may refuse to accept "no" for an answer, have an endless supply of rebuttals for any excuse the victim offers, and have an aggressive style that intimidates the victim into complying. These tactics are essential components of fraud and are effective primarily because of their appeal to the natural human desires to feel special, to find a bargain, and to please.
Particularly when investigating financial exploitation, vexing questions often arise as to whether the victim understood the transaction, appreciated the value of what he or she gave away or signed over, and comprehended the implications of the transaction. Three concepts are particularly critical when analyzing the range of frauds and associated crimes: 21
Experts in this area note that vulnerability to undue influence is unrelated to intelligence. However, if an elder is cognitively impaired, has sensory deficits (e.g., vision or hearing loss), or has nutritional deficits, he or she may be more easily manipulated because of a lack of faith in his or her own memories and perceptions. 22
The influence used to perpetrate financial crimes falls along a continuum. 23 On one end, the influence is rather benign, as the victim is not actually tricked or forced into doing something against his or her will. On the other end is the rather clear-cut case of theft in which the perpetrator takes something without the victim's consent. One step past benign, coercion involves undue influence using domination, intimidation, and threats. Further still, fraud involves swindling by deception, trickery, or misrepresentation.
Understanding the victim's mental status and the types of influence used is essential for devising appropriate responses to the problem.
The offender-victim relationship is the main criterion used to distinguish the major categories of financial crime in this guide.
Strangers. Consumer fraud offenders are usually strangers to their victims, although they may observe victims' patterns (e.g., times in or out of the house, spending habits, etc.) to identify them as a potential "mark." Telemarketers have no face-to-face contact with victims and may call from thousands of miles away. Given the attention that elder fraud has received in recent years, there are surprisingly few empirical studies of offenders, particularly in light of the extensive literature on victim characteristics. 24
Offenders vary greatly in terms of age, race, socioeconomic status, and education level. Most elder fraud offenders are male. They may be motivated by profit or a need to feel powerful and important. The challenge of the fraud itself may provide a "high," particularly when it is pulled off against wealthy or well-educated victims. In general, offenders are not bound by conventional norms or business ethics, and rationalize their behavior. In clinical studies, criminologists have found offenders to have all types of psychological dysfunctions, revealed in their distorted thinking processes and lack of regard for others. 25
In terms of behavior, those who perpetrate fraud against the elderly often present themselves as self-assured, friendly, and sophisticated. They are persistent, yet can often avoid raising suspicion. "What the con man does is an extreme expression of normal business dealings-salesmanship based on the ability to persuade others.the promise of gain is central to society.and it is not abnormal to offer opportunities to make money or improve one's health." 26
Fraudulent telemarketers frequently work out of "boiler rooms"-temporary, highly mobile operations that can be disassembled and reassembled quickly. Boiler-room operations typically have six stages: 27
Understanding boiler-room mobility and structure is essential to intervention efforts targeting the operations themselves.
Relatives and caregivers. Financial exploiters of the elderly rely on the nature of their relationships with them to support the abuse. The victim has often formed a close bond with the offender, and may be unaware of or deny the abuse. In addition, the victim may fear being alone or being placed in a nursing home if the offender is removed. These dynamics are important to understand in addressing the emotional impact on the victim.
A national survey found that offenders tend to be significantly younger than their victims, with 40 percent age 40 or younger, and another 40 percent age 41 to 59. Nearly 60 percent are male, and nearly 60 percent are relatives. 28
There are three general categories of offenders: †
† Sklar's (2000) typology actually includes a fourth category-professional crime groups, which are not discussed here. [Abstract only]
Questions of consent or voluntary gift-giving make the investigation of potential abuse cases difficult. Gift-giving habits vary across families, as do cultural expectations regarding elderly care; thus it is essential that you examine each situation within the appropriate context. 29 Further, you should examine any business relationship an elder may have in terms of the nature of the arrangement. 30 For example, a relationship with a gardener or housekeeper may be based on a "good faith" exchange in which each party negotiates in his or her own self-interest (barring deception and misrepresentation). However, some business relationships, such as those with financial planners, bankers, or health care workers, require the professional to act in the elder's best interest. Sometimes, a "good faith" relationship evolves beyond the original intent (e.g., the housekeeper begins to help the elder with finances). These relationships become abusive when the perpetrator continues to act in a self-serving way, rather than make decisions based on the elder's best interest. 31
Regardless of the category of offender, there are two basic types. 32 The first type includes dysfunctional people with low self-esteem who may be abusing substances, feeling stressed, or feeling the weight of their caregiver responsibilities. They do not generally seek out victims, but instead passively take advantage of opportunities that arise. The second type includes those who methodically target vulnerable seniors, establish power, and obtain control over their assets.
Crime prevention efforts have identified a number of warning signs and indicators of both consumer fraud and financial exploitation of the elderly. Because the means of committing the two types of crime are different, the signs and indicators are listed separately here.
Warning signs of consumer fraud. 33 These include the following:
Indicators of financial abuse. 34 These include the following:
A recent acquaintance expresses an interest in finances, promises to provide care, or ingratiates him- or herself with the elder.
These warning signs and indicators have been incorporated into a variety of education tools targeting family members, banks, attorneys, and other concerned parties. These are discussed in the "Responses" section of this guide.
Given that legal documents such as trusts, joint bank accounts, and powers of attorney give a third party such enormous decision-making power, it is surprising that the preparation and execution of these documents is not more closely regulated. With regard to powers of attorney, very few states require them to be registered, few require a lawyer's involvement in drafting the document, and witnesses are not required to ensure the elder's signature is voluntary. 35 Although most states require notaries, they are not trained to assess mental capacity and therefore cannot protect an impaired elder from abuse. No record of ongoing use is provided to the elder, so even fully competent seniors are not able to monitor transactions made on their accounts. Finally, few states have formal procedures for revoking the authority granted under power of attorney, which allows the offender to continue abusing this power even after intervention.
Every state has adopted laws to prohibit particular types of fraud and, often, to enhance penalties for fraud against the elderly. Older consumers are, of course, protected by general consumer protection laws, telemarketing laws, and other statutes governing theft, embezzlement, fraud, etc. However, given that each state crafts its own laws, there are significant differences that make a description of national legislation concerning elder financial abuse impossible. These differences tend to apply in the following six areas: 36
Not only do these differences make it difficult to describe the various legislative approaches, but they also make it difficult to investigate and prosecute fraud offenders who may have victimized people in several states, all of which have different statutory requirements.
Further, fraud and financial abuse cases come under the jurisdiction of several agencies. Federal agencies such as the FBI, Postal Inspection Service, and Secret Service, as well as state and local police, may be involved in investigating large-scale consumer fraud operations. The lack of information-sharing across these agencies has been identified as a significant barrier to effective intervention. 37
When a financial crime involves the misuse or abuse of legal documents, the case may also be classified as a civil matter, requiring additional cooperation with the prosecutor and court of jurisdiction. Banks and phone companies are also critical partners in investigating fraud or financial exploitation. Finally, given that the senior's welfare is paramount, social service agencies, such as adult protective services and medical and mental health services, must also be included in a coordinated effort to protect the senior from further harm.
Fraud and financial exploitation cases present a complicated web of behavior, intent, and consequences. The scope of jurisdiction and various areas of expertise required are unlikely to be found in any one agency, requiring cooperation across traditional jurisdictions and professional boundaries.
The information provided above is only a generalized description of financial crimes against the elderly. You must combine the basic facts with a more specific understanding of your local problem. Analyzing the local problem carefully will help you design a more effective response strategy.
Most likely, there will be a combination of frauds committed by strangers and financial exploitation by relatives and caregivers. You should analyze the factors surrounding these two crimes separately, since they are different in nature. Further, although developing profiles or combined data on the crimes (e.g., average amount of money lost, average age of victim, etc.) can be useful, these averages can mask important variations and may lead to generalized responses that fail to combat a particular type of fraud or exploitation.
In the case of consumer fraud, it is likely that a few different types will be occurring in your community at any given time. It is important to identify the types of fraud currently operating, the likely targets, the means used to commit the fraud, and the factors that may prevent victims from reporting it. Given that a significant number of seniors have likely resisted a variety of fraudulent sales pitches, it will be useful to identify the strategies they used to avoid being victimized.
In the case of financial exploitation, it is important to understand how offenders gain access to the victims' funds, what the nature of the offender-victim relationship is, and what resources are available to support and protect the elderly. Interviews with professionals who have observed various financial transactions will help to identify areas in which procedural safeguards could be employed.
Although fraud and financial exploitation cases have some similarities, the situations facilitating the crime will vary considerably. In addition, the fact that many cases go unreported means that official police and prosecutor records will not include the details necessary for a comprehensive problem analysis. Therefore, it is important to gather information about the local problem from multiple sources and perspectives, including:
The following are some critical questions you should ask when analyzing your particular problem of financial crimes against the elderly, even if the answers are not readily available. The questions are listed separately for fraud and for financial exploitation. Your answers to these and other questions will help you choose the most appropriate set of responses later on.
Measurement allows you to determine to what degree your efforts have succeeded, and suggests how you might modify your responses if they are not producing the intended results. You should take measures of your problem before you implement responses, to determine how serious the problem is, and after you implement them, to determine whether they have been effective. All measures should be taken in both the target area and the surrounding area. (For more detailed guidance on measuring effectiveness, see the companion guide to this series, Assessing Responses to Problems: An Introductory Guide for Police Problem-Solvers. )
The following are potentially useful measures of the effectiveness of responses to financial crimes against the elderly. As with the previous sections, the two main types, fraud and financial exploitation, are discussed separately. Further, distinctions are made between "process" measures, which indicate the extent to which responses are being implemented as designed, and "outcome" measures, which indicate the impact the responses have on the level of the problem.
You can use the following "process" measures to identify the extent to which selected responses have been implemented as designed. Given the extent of underreporting and its impact on understanding the scope of the problem, a corollary evaluation goal may be to assess the success with which reporting mechanisms are used:
You can use the following "outcome" measures to determine the impact of your responses on the level of the problem:
You can use the following "process" measures to identify the extent to which selected responses have been implemented as designed:
You can use the following "outcome" measures to determine the impact of your responses on the level of the problem:
Your analysis of your local problem should give you a better understanding of the factors contributing to it. Once you have analyzed your local problem and established a baseline for measuring effectiveness, you should consider possible responses to address the problem.
The following response strategies provide a foundation of ideas for addressing your particular problem. These strategies are drawn from a variety of research studies and police reports. Several of these strategies may apply to your community's problem. It is critical that you tailor responses to local circumstances, and that you can justify each response based on reliable analysis. In most cases, an effective strategy will involve implementing several different responses. Law enforcement responses alone are seldom effective in reducing or solving the problem. Do not limit yourself to considering what police can do: give careful consideration to who else in your community shares responsibility for the problem and can help police better respond to it.
The responses that follow are useful for addressing the problems of both fraud and financial exploitation. Strategies targeting the specific elements of each type of financial crime are discussed separately below.
Creating multiagency task forces. Elder fraud and financial exploitation cases are complex and require expertise in multiple areas, including
It is unlikely that a single agency will have the necessary skills and resources for a multidisciplinary approach. Thus, multiagency efforts are required, should include agencies and individuals with knowledge in the key areas, and should be tailored to the characteristics of the local problem. †
† In Canada , the Deceptive Telemarketing Prevention Forum included representatives from government, private, and nonprofit organizations to gather and share intelligence, formulate response strategies, and develop public education efforts. Participants included credit card companies, telephone companies, retired persons associations, marketing associations, police, bankers, the postal service, consumer groups, and the Better Business Bureau. For more information, see the Royal Canadian Mounted Police web site, www.phonebusters.com .
In the United States , many state and local jurisdictions have developed area TRIADs, which are partnerships between local and state police agencies, sheriffs associations, and retired persons associations, such as the AARP. Some jurisdictions also include agencies on aging, senior centers, health departments, and adult protective services.
A number of jurisdictions (e.g., Los Angeles ; Orange County , Calif. ; Ventura , Calif. ) have also developed multiagency teams of specialists to investigate and intervene in elder fraud and financial exploitation cases. For example, Fiduciary Abuse Specialist Teams (FASTs) often include police, the district attorney, the city attorney, private conservatorship agencies, health and mental health providers, probate judges, trust attorneys, insurance agents, real estate agents, escrow officers, stockbrokers, and estate planners. The National Committee for the Prevention of Elder Abuse has created specific guidelines for establishing and coordinating a local FAST, which can be accessed at www.preventelderabuse.org/communities/fast.html . For more information, see also Allen (2000)Abstract only]; Aziz (2000)Abstract only]; and Velasco (2000). Abstract only]
Creating easy-to-access reporting mechanisms for victims, concerned family and friends, and professionals will help not only with identifying problems, but also with developing effective responses. Perhaps most importantly, improved reporting mechanisms will help in prosecuting offenders and providing needed victim services. Education campaigns should provide telephone numbers for reporting incidents of victimization. It is also useful to include a short description of what the elder can expect to be asked, what the typical response time is, and what the procedures are.
Once a multiagency effort is established, it is important to create clear and efficient pathways for cross-agency reporting for police, adult protective services, and other agencies. Because each agency serves a different need, it is critical that each agency be deployed to offer relevant services to victims. Cross-agency reporting procedures should ensure that each agency mobilizes its resources without impeding other agencies' work.
First, although certainly not the case for all seniors, many elderly victims have physical, sensory, memory, or other cognitive impairments that can interfere with an officer's attempt to gather information. It is therefore critical that officers are trained to identify such impairments and to respond with effective interviewing techniques. † Improving officers' skills with elderly victims has been shown to improve the quality of investigations and to positively affect victims' subsequent attitudes, behaviors, and perceptions toward the police. 38
† The Office for Victims of Crime published a handbook for law enforcement officers that includes specific techniques for interviewing elderly victims and witnesses. It is available at [Full text]; see also National White Collar Crime Center (1998); Shibley (1995) Full text]; Kohl, Brensilber, and Holmes (1995); and Forst (2000).
Second, given the complexity of fraud and financial exploitation cases, investigators need to cover all of the relevant domains of inquiry. These should include victim characteristics (e.g., relationship to the offender, mental capacity, etc.), offense characteristics (e.g., telemarketing scam versus financial exploitation by a caregiver), and offender characteristics (e.g., relationship, frequency of contact), as well as detailed information about the elder's estate, financial arrangements, and relevant legal documents. Several investigation checklists are available to guide the development of a comprehensive inquiry. 39
† The list is available at www.usps.com/postalinspectors/fraud/seniorwk.htm.
Live-in caregivers who exploit seniors often isolate them to avoid being detected. Periodic contact by family, friends, and other concerned parties improves the likelihood of early detection.
Adopt-a-Senior programs-in which volunteers regularly check on the well-being of seniors in their neighborhoods and inquire about unusual mail, phone calls, and financial transactions-have been effective in combating the isolation that places the elderly at risk, and in identifying potentially abusive situations. 41
The strategies above apply broadly to both fraud and financial exploitation of the elderly. However, given that these two types of crime are different in several important ways, there are several responses that are more relevant to one type of crime than to the other.
† The Direct Marketing Association provides clear procedures for removing personal information from national and state marketing lists, available at www.dmaconsumers.org/consumerassistance.html#mail and www.the-dma.org/government/donotcalllists.shtml .
† The AARP provides a concise list of "Do's and Don'ts," a review of relevant statutes, and tactics for preventing fraud, available at www.aarp.org/fraud/home.htm.
Source: National Fraud Information Center (n.d.).
Some jurisdictions have found it useful to present these topics in concert with financial planning workshops. In addition, television stations can be useful partners in this endeavor. Many local stations assign reporters to consumer fraud issues and regularly air segments on the problem. Reports about local scams and general prevention measures have the potential to reach a large audience.
|The Pitch and the Law: Typical Offers by Telemarketers, and How They Violate the Law|
"You are eligible to win a valuable prize!"
"You can win a car worth $35,000; $10,000 in cash; a European vacation; or a diamond necklace worth $2,000. Your purchase today of our fabulous vitamins will automatically enter you into this amazing sweepstakes."
A prize is free . You need not pay any money or buy anything to enter a sweepstakes or win a prize. The caller must tell you the "no-payment, no-purchase" method of entering. If the caller says you have already won a prize, the caller must also tell you all the costs associated with claiming it. This is important because the costs may be high and may substantially reduce the prize's value.
"We can get your money back!"
"I was sorry to hear that you lost money in a telemarketing scam. It's really a shame that people will call you offering you a great deal and then steal your money. But my company will get your money back for you. All you have to do is give me your credit card number to cover our low service charge."
You do not have to pay in advance . These so-called "recovery rooms" are just a way to take advantage of you a second time. A caller who promises to recover or help you get back money you lost, or to obtain an item of value you were promised in a prior telemarketing call, cannot ask for or receive money from you until seven business days after you actually receive the promised money or item.
"Great loans at great rates. Bad credit, no problem!"
"Today is your lucky day. I'm going to help you qualify for the loan you never thought you'd get. For only a small fee, I will get those late payments removed from your credit records. I'll send a courier to pick up your payment, because the sooner you pay the fee, the sooner I can get started."
You need not pay until you see proof that your credit record has been fixed. A caller is prohibited from asking for payment to remove negative information, or otherwise improve your credit report, until after 1) the period for providing you with all promised goods and services has expired; and 2) you receive documentation that the promised results have been achieved, in the form of a report from a credit reporting agency issued more than six months after the promised results were achieved. Remember that you can, on your own and at no cost, get inaccurate negative information removed from your credit report.
"Magazines at fantastic low prices. Give me your bank account number, and they're in the mail!"
"We've extended this amazing offer one more day, and we have to receive your money by midnight tonight. But don't worry-you can meet the deadline. Just give me your bank account number, and I can process your order right away."
Callers must get specific authorization from you to take money from your bank account. The caller must get your written authorization or tape record your verbal authorization to withdraw a specified amount from your account, or send you a written confirmation of the transaction before attempting to withdraw money from your account. The caller must provide the written or taped authorization to the bank upon request.
|Source: American Association of Retired Persons (n.d.), "Telemarketing Fraud."|
Escape Mechanisms for Unwanted Sales Calls
|Source: Adapted from Friedman (1998).|
† For more information, see Kaye and Darling (2000). Abstract only]
† The FBI's Operation Disconnect, Operation Senior Sentinel, and Operation Double Barrel have resulted in thousands of indictments and the recovery of thousands of dollars. See also U.S. Department of Justice, Office of Justice Programs (2000). [Full text]
†† For more information, see Slotter (1998). [Full text]
As discussed previously, the characteristics, warning signs, and perpetrators of financial exploitation differ significantly from those of fraud. While some of the methods may be similar, preventing financial exploitation by relatives and caregivers requires specific responses.
Because of their ongoing involvement in elders' financial affairs, banks and other financial institutions are uniquely positioned to help prevent and detect financial exploitation, and are therefore an essential partner in combating the problem. Several states have developed and implemented training curricula for bank tellers to recognize the warning signs of abuse, and these curricula are widely available for replication or adaptation. 45
Similarly, attorneys and certified public accountants who prepare wills, tax returns, estate planning documents, and other legal documents are uniquely suited to serve as an early warning system to prevent financial exploitation. Particularly if trained to identify the warning signs of undue influence and diminished mental capacity, attorneys and accountants can work with a multidisciplinary team to make sure that all legal documents are executed with the elder's voluntary and informed consent, and will serve the elder's best interest. 46
Focused training can encourage doctors to ask specific questions when assessing elders' physical and emotional well-being. During private consultations, doctors can explore the quality of elders' interactions with caregivers, increasing the likelihood of detecting financial exploitation. 47
The table below summarizes the responses to financial crimes against the elderly, the mechanism by which they are intended to work, the conditions under which they ought to work best, and some factors you should consider before implementing a particular response. It is critical that you tailor responses to local circumstances, and that you can justify each response based on reliable analysis. In most cases, an effective strategy will involve implementing several different responses. Law enforcement responses alone are seldom effective in reducing or solving the problem.
|#||Response||How It Works||Works Best If...||Considerations|
|1||Creating multiagency task forces||Provides a range of expertise in critical areas||…formed as a collaborative partnership between public, private, and nonprofit agencies||As a stand-alone strategy, not likely to directly impact the scope or level of the problem|
|2||Working across jurisdictions||Creates the ability to build cases against highly mobile offenders; incorporates expertise in areas of co-occurring crimes||…created through formal interagency agreements with clear and specific protocols for line-level officers||Relationships require maintenance; need clear indications of the lead agency in specific cases; potential for "turf" issues to reduce efficacy|
|3||Improving reporting mechanisms||Improves the quality of the data available to assess the scope of the local problem; creates the ability to provide services to avoid repeat victimization||…clear directions for reporting are widely publicized; specific protocols for agency cross-reporting are developed||Rate of reported crimes will increase; potential for one agency to interfere with the activities of another working the same case|
|4||Training police to interview elderly victims of financial crimes||Increases the quality of investigations; increases sensitivity to victims' needs||…ongoing training is available; barriers to accessing information held by other agencies are removed up front||Requires long-term commitment to training; requires obtaining access to information that is traditionally not quickly available to police|
|5||Decreasing victims' isolation||Improves the ability to support and monitor financial decisions by at-risk seniors; improves the chances of early detection||…contact is ongoing and in person; contacts are knowledgeable about warning signs||Requires long-term commitment|
|Specific Responses: Fraud|
|#||Response||How It Works||Works Best If...||Considerations|
|6||Educating seniors and other concerned parties||Makes it more difficult for frauds to succeed||…the curriculum includes specific strategies for identifying frauds as they are occurring, and techniques for ending unwanted interactions||Difficult to access seniors who are isolated, are disabled, or have diminished mental capacity (high-risk groups); requires practice and ongoing compliance from the recipient|
|7||Identifying high-risk seniors||Decreases the likelihood of repeat victimization||…services include individualized attention to high-risk behaviors||Individualized nature of the intervention can be time- and cost-intensive|
|8||Reversing the "boiler room"||Effectively identifies those likely to be open to fraudulent sales pitches||…prevention information is delivered in a way that meets elders' need for interaction, rather than relying on recordings||Expensive; less effective without personal interaction and without individualized, concrete strategies for minimizing high-risk behaviors|
|9||Making it easier for victims to hang up on telephone scams||Decreases exposure to fraudulent pitches; reduces temptation||…exposure is primarily via telemarketing calls||Expensive; does not address other sales approaches (mail, in person)|
|10||Launching undercover operations||Increases offenders' risk of arrest and prosecution||…launched as a multiagency effort; undercover victim strategy is coupled with infiltration of the organization itself||Expensive; requires long-term commitment; complex and competing interests|
|Specific Responses: Financial Exploitation|
|#||Response||How It Works||Works Best If...||Considerations|
|11||Enacting proactive health care, legal, and financial planning||Makes it more difficult to access elders' assets||…done early, before any cognitive deterioration; attorneys and financial experts guide the arrangements||Does not guarantee long-term security of assets|
|12||Assessing statutes related to power of attorney||Decreases vulnerability to abuse||…the review is accompanied by new procedural safeguards||Legislative changes require long-term commitment; impact limited to attempts to abuse power of attorney|
|13||Screening caregivers||Prevents those with criminal records of abusing the elderly from continuing to do so||…criminal records in multiple jurisdictions can be accessed||Effectiveness is limited to those situations in which caregivers are hired through an agency; will not impact informal arrangements|
|14||Training police and professionals involved in elders' affairs||Increases possibilities for early detection||…there are ongoing working relationships between police and the professionals; a specific officer is identified for future inquiries||May still require a mental health professional to determine the capacity for consent; assessments are expensive|
|Responses With Limited Effectiveness|
|#||Response||How It Works||Works Best If...||Considerations|
|15||Disseminating information as a stand-alone strategy||Provides access to information on current frauds and methods to decrease personal risk||…recipients follow the advice||Difficult to target elders at highest risk; fails to meet needs for interaction; cannot be individualized|
|16||Enacting mandatory reporting laws||Increases the likelihood that crimes will be reported||…mandated reporters know how to detect abuse and understand the protocol for reporting; investigating agencies are sufficiently funded to respond to all reports||Lack of follow-through tends to erode confidence in the system|
|17||Bonding or registering telemarketers||Requires telemarketing operations to provide assurance of legitimacy and good-faith intentions||…telemarketers agree to follow all rules and regulations||Requires buy-in from offenders; provides false sense of good intentions; most consumers do not know to ask about bonding or registration|
|18||Expanding existing statutes||Provides enhanced penalties for crimes targeting the elderly; reduces rewards||…offenders are caught; restitution is ordered and enforced||No general deterrence effect; does not help prevention efforts|
 Titus (1999).
 Rosenfield (1994).
 Ward-Hall (1999); Hafemeister (2003).
 Hafemesiter (2003).
 American Association of Retired Persons (1999); Titus, Heinzelmann, and Boyle (1995).
 U.S. Senate (2000).
 O'Hanlon (1997).
 National Center on Elder Abuse (1998).
 Tueth (2000).
 California County Welfare Director's Association (1988); Shiferaw et al. (1994).
 Hafemeister (2003); Tueth (2000).
 American Association of Retired Persons (1996).
 Van Wyk and Mason (2001).
 Lee and Geistfeld (1999).
 Titus (1999).
 National Committee for the Prevention of Elder Abuse (n.d.), " Mental Capacity, Consent, and Undue Influence" ; National Committee for the Prevention of Elder Abuse (n.d.)[Full text], " An Interview With Margaret Singer on Undue Influence" [Full text]; Quinn (2000). [Abstract only]
 Whitlock (1994); Doocy et al. (2001); Blum (1972).
 Blum (1972).
 Blum (1972), p.14.
 National Center on Elder Abuse (1998).
 Tueth (2000).
 U.S. Postal Service (n.d.).
 Stiegel (1995), as cited in Payne (2000).
 Zevitz and Gurnack (1991).
 Payne (2002).
 National Fraud Information Center (n.d.); American Association of Retired Persons (n.d.).
 Friedman (1998).
 Tueth (2000).
 Doocy et al. (2001).
 Hafemeister (2003).
Allen, J. (2000). "Financial Abuse of Elders and Dependent Adults: The FAST (Financial Abuse Specialist Team) Approach." Journal of Elder Abuse & Neglect 12(2):85-91. [Abstract only]
American Association of Retired Persons (n.d.). " Frauds."
--- (1999). AARP Poll: Nearly One in Five Americans Report They've Been Victimized by Fraud. Washington , D.C. :AARP.
--- (1996). Telemarketing Fraud and Older Americans: An AARP Survey. Washington , D.C. : AARP.
Aziz, S. (2000). " Los Angeles County Fiduciary Abuse Specialist Team: A Model for Collaboration." Journal of Elder Abuse & Neglect 12(2):79-83. [Abstract only]
Aziz, S., D. Bolick, M. Kleinman, and D. Shadel (2000). "The National Telemarketing Victim Call Center: Combating Telemarketing Fraud in the United States." Journal of Elder Abuse & Neglect 12(2):93-98. [Abstract only]
Blum, R. (1972). Deceivers and Deceived: Observations on Confidence Men and Their Victims, Informants and Their Quarry, Political and Industrial Spies, and Ordinary Citizens. Springfield , Ill. : Charles C. Thomas.
County Welfare Director's Association of California (1988). Protecting the Silent Population: Remedying Elderly and Dependent-Adult Abuse. Sacramento , Calif. : CWDA.
Chatelin, C. (1994). "Mail Fraud: Don't Get Fooled Again." Consumers' Research Magazine 77(6):20-23.
Choi, N., D. Kulick, and J. Mayer (1999). "Financial Exploitation of Elders: Analysis of Risk Factors Based on County Adult Protective Services Data." Journal of Elder Abuse & Neglect 10(3/4):39-62. [Abstract only]
Coker, J., and B. Little (1997). "Investing in the Future: Protecting the Elderly From Financial Abuse." FBI Law Enforcement Bulletin 66(12):1-5. [Full text]
Daniels, R., L. Baumhover, W. Formby, and C. Clark-Daniels (1999). "Police Discretion and Elder Mistreatment: A Nested Model of Observation, Reporting, and Satisfaction." Journal of Criminal Justice 27(3):209-225.
Deem, D. (2000). "Notes From the Field: Observations in Working With the Forgotten Victims of Personal Financial Crimes." Journal of Elder Abuse & Neglect 12(2):33-48. [Abstract only]
Direct Marketing Association (n.d.). " Consumer Assistance." www.dmaconsumers.org/consumerassistance.html
--- (n.d.). " State No Call List Laws Through June 1, 2003." www.the-dma.org/government/donotcalllists.shtml
Doocy, J., D. Shichor, D. Sechrest, and G. Geis (2001). "Telemarketing Fraud: Who Are the Tricksters and What Makes Them Tick?" Security Journal 14(3):7-26.
Forst, L. (ed.) (2000). The Aging of America -A Handbook for Police Officers. Springfield , Ill. : Charles C. Thomas.
Friedman, M. (1998). "Coping With Consumer Fraud: The Need for a Paradigm Shift." Journal of Consumer Affairs 32(1):1-12.
Hafemeister, T. (2003). "Financial Abuse of the Elderly in Domestic Settings." In R. Bonnie and R. Wallace (eds.), Elder Mistreatment: Abuse, Neglect, and Exploitation in an Aging America. Washington , D.C. : National Academies Press.
Harshbarger, S. (1993). "From Protection to Prevention: A Proactive Approach." Journal of Elder Abuse & Neglect 5(1):41-56. [Abstract only]
Harshbarger, S., and F. Ollivierre (eds.) (1993). Financial Exploitation of Elders & People With Disabilities: Prevention & Intervention. Boston : Massachusetts Office of the Attorney General.
Illinois State Triad (1998). Responding to Elderly Crime Victims: Model Protocol for Law Enforcement. Springfield , Ill. : Illinois State Triad. [Full text]
Kaye, A., and G. Darling (2000). " Oregon 's Efforts to Reduce Elder Financial Exploitation." Journal of Elder Abuse & Neglect 12(2):99-102. [Abstract only]
Kohl, R., D. Brensilber, and W. Holmes (1995). Elderly Protection Project: Final Project Report. Boston : Massachusetts Statistical Analysis Center.
Langenderfer, J., and T. Shimp (2001). "Consumer Vulnerability to Scams, Swindles, and Fraud: A New Theory of Visceral Influences on Persuasion." Psychology & Marketing 18(7):763-783.
Lee, J., and L. Geistfeld (1999). "Elderly Consumers' Receptiveness to Telemarketing Fraud." Journal of Public Policy & Marketing 18(2):208-217.
Nassau County (N.Y.) Police Department (1998). "Fifth Precinct Problem-Oriented Policing Team." Submission for the 1998 Herman Goldstein Award for Excellence in Problem-Oriented Policing. [Full text]
National Center on Elder Abuse (1998). The National Elder Abuse Incidence Study: Final Report. Washington , D.C. : National Aging Information Center.
National Committee for the Prevention of Elder Abuse (n.d.). "Guidelines for Establishing and Coordinating a Fiduciary Abuse Specialist Team." www.preventelderabuse.org/communities/fast.html
--- (n.d.). "An Interview With Margaret Singer on Undue Influence." www.preventelderabuse.org/nexus/singer.html
--- (n.d.). "An Interview With Martin Plone." www.preventelderabuse.org/nexus/plone.html
--- (n.d.). " Mental Capacity, Consent, and Undue Influence."
--- (n.d.). "Restitution." www.preventelderabuse.org/issues/restitution.html
National Fraud Information Center (n.d.). " Fighting Fraud Against Older Consumers."
National White Collar Crime Center (1998). Law Enforcement and Crimes Against Older People. Washington , D.C. : American Association of Retired Persons.
Nerenberg, L. (2000). "Forgotten Victims of Financial Crime and Abuse: Facing the Challenge." Journal of Elder Abuse & Neglect 12(2):49-73. [Abstract only]
--- (1999). Forgotten Victims of Elder Financial Crime and Abuse: A Report and Recommendations. Washington , D.C. : National Center on Elder Abuse. [Full text ]
--- (1996). Financial Abuse of the Elderly. Washington , D.C. : National Center on Elder Abuse. [Full text]
O'Hanlon, K. (1997). "Let the Pesky Telemarketers Down Easy." Los Angeles Times , Oct. 6, p. ED7.
Oregon Department of Health Services (n.d.). " Governor's Task Force on the Future of Services to Seniors and People With Disabilities." www.dhs.state.or.us/spd/publications/gtf.htm
Payne, B. (2002). "An Integrated Understanding of Elder Abuse and Neglect." Journal of Criminal Justice 30(6):535-547.
--- (2000). Crime and Elder Abuse: An Integrated Perspective. Springfield , Ill. : Charles C. Thomas.
Price, G., and C. Fox (1997). "The Massachusetts Bank Reporting Project: An Edge Against Elder Financial Exploitation." Journal of Elder Abuse & Neglect 8(4):59-71. [Abstract only]
Quinn, M. (2000). "Undoing Undue Influence." Journal of Elder Abuse & Neglect 12(2):9-17. [Abstract only]
Rosenfield, J. (1994). "In the Mail." Direct Marketing 57(8):32-35.
Royal Canadian Mounted Police (n.d.). "Frauds, Scams Alerts."
Rush, R., and R. Lank (2000). "How to Thwart Financial Fraud of the Elderly Client or Parent." The Wisconsin CPA (June):12-13.
Sanchez, Y. (1996). "Distinguishing Cultural Expectations in Assessment of Financial Exploitation." Journal of Elder Abuse & Neglect 8(2):49-59. [Abstract only]
Schulte, F. (1995). Fleeced! Telemarketing Rip-Offs and How to Avoid Them. Amherst , N.Y. : Prometheus Books.
Shibley, G. (1995). "Teaching Officers to Serve Seniors." FBI Law Enforcement Bulletin 64(1):23-26. [Full text]
Shiferaw, B., M. Mittelmark, J. Wofford, R. Anderson, P. Walls, and B. Rohrer. (1994). "The Investigation and Outcome of Reported Cases of Elder Abuse: The Forsyth County Aging Study." Gerontologist 34:123-125.
Sklar, J. (2000). "Elder and Dependent Adult Fraud: A Sampler of Actual Cases to Profile the Offenders and the Crimes They Perpetrate." Journal of Elder Abuse & Neglect 12(2):19-32. [Abstract only]
Slotter, K. (1998). "Combating Telemarketing Fraud." FBI Law Enforcement Bulletin 67(3):9-17. [Full text]
Titus, R. (1999). "The Victimology of Fraud." Paper presented at the Restoration for Victims of Crime Conference. Melbourne , September.
Titus, R., and A. Gover (2001). "Personal Fraud: The Victims and the Scams." In G. Farrell and K. Pease (eds.), Repeat Victimization , Crime Prevention Studies, Vol. 12. Monsey , N.Y. : Criminal Justice Press. [Full text]
Titus, R., F. Heinzelmann, and J. Boyle (1995). "Victimization of Persons by Fraud." Crime and Delinquency 41(1):54-72.
Tueth, M. (2000). "Exposing Financial Exploitation of Impaired Elderly Persons." American Journal of Geriatric Psychiatry 8(2):104-111.
U.S. Department of Justice, Office for Victims of Crime (2001). First Response to Victims of Crime. Washington , D.C. : Office for Victims of Crime. [Full text]
U.S. Department of Justice, Office of Justice Programs (2000). Our Aging Population: Promoting Empowerment, Preventing Victimization, and Implementing Coordinated Interventions. Washington , D.C. : Office of Justice Programs. [Full text]
U.S. General Accounting Office (1991). Elder Abuse: Effectiveness of Reporting Laws and Other Factors. Washington , D.C. : General Accounting Office. [Full text]
U.S. Postal Service (n.d.). " Senior Week." www.usps.com/postalinspectors/fraud/seniorwk.htm
U.S. Senate (2000). Special Committee on Aging. Elder Fraud and Abuse: New Challenges in the Digital Economy. 106 th Cong., 2 nd Sess. March 15.
Van Wyk, J., and K. Mason (2001). "Investigating Vulnerability and Reporting Behavior for Consumer Fraud Victimization: Opportunity as a Social Aspect of Age." Journal of Contemporary Criminal Justice 17(4):328-345.
Velasco, J. (2000). "Ventura County District Attorney's Senior Crime Prevention Program." Journal of Elder Abuse & Neglect 12(2):103-106. [Abstract only]
Ward-Hall, C. (1999). "Financial Abuse of Seniors: A Growing Concern: Seniors in British Columbia , Canada 'Taking Action Against Financial Abuse.'" In J. Pritchard (ed.), Elder Abuse Work: Best Practice in Britain and Canada. London , Philadelphia : Jessica Kingsley.
Whitlock, C. (1994). Easy Money: The Truth Behind the Billion-Dollar Confidence Industry and How to Protect Yourself and Your Money. New York : Kensington Books.
Wilber, K., and S. Reynolds (1996). "Introducing a Framework for Defining Financial Abuse of the Elderly." Journal of Elder Abuse & Neglect 8(2):61-80. [Abstract only]
Zevitz, R., and A. Gurnack (1991). "Factors Related to Elderly Crime Victims' Satisfaction With Police Services: The Impact of Milwaukee's 'Gray Squad.'" The Gerontologist 31(1):92-101.
The quality and focus of these submissions vary considerably. With the exception of those submissions selected as winners or finalists, these documents are unedited and are reproduced in the condition in which they were submitted. They may nevertheless contain useful information or may report innovative projects.
Crimes Against Senior Citizens [Goldstein Award Finalist], Nassau County Police Department (NY, US), 1998
Operation Strongbow: Tackling Bogus Offending, Cleveland Police Department (Middlesbrough, UK), 2004
Operation TANCRED: Organised Offences Against the Elderly, Lancashire Constabulary, 2009
Over 50's Event, South Yorkshire Police (South Yorkshire, UK), 2009
Project Phonebusters [Goldstein Award Finalist], Ontario Provincial Police, 1995
Targeting Home Improvement Fraud, St. Paul Police (St. Paul, MN, US), 2007
You may order free bound copies in any of three ways:
Phone: 800-421-6770 or 202-307-1480
Allow several days for delivery.
Send an e-mail with a link to this guide.
Error sending email. Please review your enteries below.