{"id":268,"date":"2018-05-16T11:19:53","date_gmt":"2018-05-16T15:19:53","guid":{"rendered":"http:\/\/blogs.uml.edu\/information-security\/?p=268"},"modified":"2018-05-16T11:19:53","modified_gmt":"2018-05-16T15:19:53","slug":"irs-warns-of-variation-to-form-w-8ben-scam","status":"publish","type":"post","link":"https:\/\/blogs.uml.edu\/information-security\/2018\/05\/16\/irs-warns-of-variation-to-form-w-8ben-scam\/","title":{"rendered":"IRS Warns of Variation to Form W-8BEN Scam"},"content":{"rendered":"<p>Washington \u2013 The Internal Revenue Service today warned of a new twist tied to an old scam aimed at international taxpayers and non-resident aliens. In this scam, criminals use a fake IRS Form W-8BEN to solicit detailed personal identification and bank account information from victims.<\/p>\n<p>Here\u2019s how the scam works. Criminals mail or fax a letter indicating that although individuals are exempt from withholding and reporting income tax, they need to authenticate their information by filling out a phony version of Form W-8BEN, Certificate of Foreign Status of Beneficial Owner for United States Tax Withholding and Reporting. Recipients are requested to fax the information back<\/p>\n<p><a href=\"https:\/\/www.irs.gov\/newsroom\/irs-warns-of-variation-of-form-w-8ben-scam-crooks-impersonate-irs-to-get-banking-and-other-information\">Click here for the complete story.<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Washington \u2013 The Internal Revenue Service today warned of a new twist tied to an old scam aimed at international taxpayers and non-resident aliens. In this scam, criminals use a fake IRS Form W-8BEN to solicit detailed personal identification and &hellip; <a href=\"https:\/\/blogs.uml.edu\/information-security\/2018\/05\/16\/irs-warns-of-variation-to-form-w-8ben-scam\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":273,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/268"}],"collection":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/users\/273"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/comments?post=268"}],"version-history":[{"count":2,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/268\/revisions"}],"predecessor-version":[{"id":270,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/268\/revisions\/270"}],"wp:attachment":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/media?parent=268"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/categories?post=268"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/tags?post=268"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}