Fraud Warning: Protecting Your Interests

Introduction

REM is committed to maintaining the trust and security of its members and the general public. Unfortunately, instances of fraud involving counterfeit documents and impersonation of officials are becoming increasingly frequent. This page serves as an essential guide to help you recognize, prevent, and respond to potential fraudulent schemes.

Common Types of Fraud
  1. Counterfeit Documents Fraudsters often produce fake CIS certificates, SCO, FCO, ICPO, licenses or other official documents to mislead individuals or organizations.
  2. Impersonation of REM Officials scammers may claim to represent REM or affiliated organizations to extract money, information, or other services.
  3. Phishing and Online Scams Fraudulent emails, websites, or messages designed to steal sensitive information, such as personal data, financial details, or login credentials.
  4. Fake Recruitment Schemes Offers of non-existent jobs requiring payment for training, visas, or other services.
How to Identify Fraudulent Activities
  1. Unverified Sources
    • Always verify the origin of emails, documents, or messages claiming to be from CIS.
    • Pay attention to official REM email domains or contact details.
  2. Suspicious Payment Requests
    • Genuine REM transactions or processes do not require payment through unofficial channels.
  3. Inconsistent Document Formatting
    • Fake documents often contain grammatical errors, incorrect logos, or unusual formatting.
  4. Pressure Tactics
    • Fraudsters may create a sense of urgency to force decisions without verification.

Steps to Protect Yourself

  1. Verify Authenticity
    • Use official REM channels to confirm the legitimacy of documents, requests, or communications.
  2. Do Not Share Sensitive Information
    • Avoid disclosing personal or financial details to unverified parties.
  3. Check Website URLs
    • Ensure the website you visit begins with “https://” and matches the official REM domain https://www.rem-brokerage.com/.
  4. Report Suspicious Activity
    • Immediately report any suspicious activity to the REM.

What to Do If You Are Targeted

  1. Do Not Engage Further
    • Cease all communication with the suspected fraudster.
  2. Gather Evidence
    • Save emails, messages, documents, or transaction details as proof.
  3. Report the Incident
    • Contact the REM or submit a report through the official REM website.
  4. Notify Relevant Authorities
    • Inform local authorities, financial institutions, or cybercrime units about the incident.

Stay Vigilant

Fraudulent activities pose a significant threat to the safety of individuals and organizations. By staying informed and taking proactive measures, you can protect yourself and others from becoming victims of fraud. REM is here to help you maintain trust and integrity within our community.

Submit a report

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.