Current NIU Safety Bulletins


Spring 2015

Incident: Attempted Assault
Date Occurred: January 25, 2015
Location:

Neptune East Residence Hall, DeKalb

Details:

At approximately 4:57 a.m. Sunday, January 25, 2015 NIU Police responded to the third floor of Neptune East residence hall for a report of an attempted assault of a female student.  The victim reported to police that she was in the shower of a third floor bathroom when a person approached the shower stall and grabbed her arm.  The victim yelped upon being grabbed, and the suspect immediately fled the area. 

The victim described the suspect as being approximately 5’6” tall with a medium build and wearing black clothing and a ski mask.  NIU Police continue to investigate the incident and report that there is no imminent threat to the campus and local community.  Police are providing additional foot patrols in the area of the Neptune Hall residential complex.  Police ask that the community be aware and report any suspicious behavior directly to the NIU Police at 815-753-1212, DeKalb Police at (815) 748-8400 or anonymously at 815-753-TIPS (8477).

Update:

1-26-2015: A suspect in Sunday morning's incident at Neptune East has been identified and is being interviewed by NIU Police. The investigation is ongoing, and police emphasize that there is no imminent threat to the campus or local community.



Incident: Fraudulent human resources emails
Date Occurred: January 21, 2015
Location: Online
Details:

University employees may receive fraudulent e-mails indicating a change in their human resource status. The e-mails contain a link directing the employee to login to what appears to be the human resources website to identify this change but is actually an effort to steal employee credentials.

Once the employee enters his/her login information, the scammer can take that information to sign into the employee’s official human resources account to change the employee’s direct deposit information to redirect the employee’s paycheck to the bank account of another individual involved in the scam.

The scam can result in big problems for both the employee and the university, including the following:

  • The employee’s paycheck can be stolen.
  • The money may not be returned in full to the employee.
  • The scammers can take the employee’s log-in credentials and attempt to log into other accounts that belong to the employee.

Prevention:

  • Look for poor use of the English language in e-mails such as incorrect grammar, capitalization, and tenses. Many of the scammers who send these messages are not native English speakers.
  • Roll your cursor over the links received via e-mail and look for inconsistencies. If it is not the website the e-mail claims to be directing you to then the link is to a fraudulent site.
  • Never provide credentials of any sort via e-mail. This includes after clicking on links sent via e-mail. Always go to an official website rather than from a link sent to via e-mail.

Contact Human Resources and DoIT if a suspicious e-mail is received. Victims of this scam may file a complaint with the FBI’s Internet Crime Complaint Center at www.IC3.gov



Incident: Work-from-home scams
Date Occurred: January 21, 2015
Location: Online
Details:

Students throughout the country have been receiving e-mails to their school accounts recruiting them for payroll and/or human resource positions with fictitious companies.

The so-called position simply requires the student to provide his/her bank account number to receive a deposit and then transfer a portion of the funds to another bank account. Unbeknownst to the student, the other account is involved in the scam that the student has now helped perpetrate. The funds the student is to receive is directed elsewhere and stolen by cyber criminals. Participating in the scam is a crime and could lead to the student’s bank account being closed due to fraudulent activity or federal charges.

Here’s how the scam works:

  • The student is asked to provide his/her bank account credentials under the guise of setting up direct deposit for his/her pay.
  • The scammers will add the student’s bank account to a victim employee’s direct deposit information to redirect the victim’s payroll deposit to the student’s account.
  • The student will receive the payroll deposit from the victim’s employer in the victim’s name.
  • The student will be directed to withdraw funds from the account and send a portion of the deposit, via wire transfer, to other individuals involved in the scam.

Consequences of Participating in the Scam:

  • The student’s bank account will be identified by law enforcement as being involved in the fraud.
  • The victim employee has his/her pay stolen by the scammers utilizing the student’s bank account.
  • Without the student’s participation, the scam could not be perpetrated, so he/she facilitated the theft of the paycheck.
  • The student could be arrested and prosecuted in federal court. A criminal record will stay with the student for the rest of his/her life and will have to be divulged on future job applications, which could prevent the student from beomg hired.
  • The student’s bank account may be closed due to fraudulent activity and a report could be filed by the bank.
  • This could adversely affect the student’s credit record.

Tips to Protect Yourself from this Scam:

  • If a job offer sounds too good to be true, it probably is.
  • Never accept a job that requires the depositing of funds into your account and wiring them to different accounts.
  • Look for poor use of the English language in e-mails such as incorrect grammar, capitalization, and tenses. Many of the scammers who send these messages are not native English speakers.
  • Never provide credentials of any kind such as bank account information, login names, passwords, or anyother identifying information in response to a recruitment e-mail.
  • Forward these e-mails to the university’s IT personnel and tell your friends to be on the lookout for the scam.

Victims of this scam may file a complaint with the FBI’s Internet Crime Complaint Center at www.ic3.gov. Please reference the following PSA number: 01132015a-PSA




Archived Safety Bulletins