SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Origin of Scam Caroline,USA
Top 10 Types of scams Advance charge loans Big Business opportunities  False Checks  Internet: Common Commodities  Internet: Auctions  Lotteries  Nigerian Funds Offers  Prize/free gifts  Phishing  Sweetheart Swindles
Origin Of Scam-Overview:  Scam Scammers location Scammers goal Password scam Reporting scam
Scam:  The word “scam” is a quite new addition to the modern English language. Its genesis is not completely clear, but researchers have traced its first recorded and use in a publication to an article that came in TIME magazine (1963).  419 scam origin is debated. Several critics believe that the scam first was introduced to Nigeria by Nigerian petroleum companies and some criminal gangs in 1970s or 1980s. There are others who assume that the scam was a combination of different frauds in the Igboland region, some hundreds of years old.
         Scammers location
Scammers location: The first“scam” involved profitable oil contracts and other interrelated frauds. Until about 2001, the scammers were to be found primarily in Aba, Owerri, Lagos, Port Harcourt and Nigeria.  The scammers have lately set up their base in many countries moreover Nigeria, including Togo, the Ivory Coast, the Netherlands, the United Kingdom, and Canada. Nigerian money transfer fraud is the other name for Nigerian scam or 419 scam. They are associated in the public mind with Nigeria due to the increase of such confidence tricks from Nigeria since the mid-eighties, although they are often carried out in other African nations, and increasingly from European cities with large Nigerian populations, notably London and Amsterdam.
Scammers goal: The goal of the scammers is to cheat the victim into thinking that he or she has been singled out to contribute in a very profitable although questionable -- arrangement.  The intended victim is at peace of the authenticity of the arrangement by fake or false documents bearing apparently official Nigerian government letterhead, seals, as well as phony letters of credit, payment schedules and bank drafts.  The scammer may even found the credibility of his contacts, and thereby his influence, by arranging a meeting between the victim and "government officials" in real or counterfeit government offices.
Password scam: At first the scammers obtain account addresses. Then they use computer scripts to make passwords using words commonly found in the dictionary and work with that passwords in the hope of finding one that lets them in. When a password (working) is found, they go about the nefarious business of grabbing your contacts from the host service and sending out the kind of messages that your contacts received.  Depending on the kinds of service, they can also forward messages to a different account. There are different strategies for creating and recollecting passwords. People often substitute characters for letters @ for A, ! for L and $ for S etc. To overcome this, choose the password field, click and hold on the 1Password button that appears in your browser, and select Strong Password Generator.
Reporting scam
Reporting scam: Originally, the scammers contacted heads of companies and church officials; however, the use of scam email and instant messaging for the initial contacts has led to many private citizens also being targeted, as the cost to the scammers to make initial contact was much lower. The process of reporting scams is actually quite simple. There are several government and independent organizations devoted to putting a stop to internet scams. They depend on people reporting scams in order to fight internet scammers. If an email is received which proposes a business proposition from Nigeria or Wealthy Nigerian royalty in need of temporary cash, this is called a 419 scam. Start reporting fraud and scams pertinent to the 419 scams by contacting Fraudaid.com.
Reporting scam: The United States Federal Trade Commission has issued a Consumer Alert (http://www.ftc.gov/bcp/conline/pubs/alerts/nigeralrt.htm) about the Nigerian spam(scam). It states: "If you receive an offer via nigerian mail (email) from someone claiming to need your help getting money out of Nigeria — or any other country, for that matter — forward it to the FTC at spam@uce.gov.
Scam Related Books: Crimes Of Persuasion Computer Idio’t Guide FRAUD-How To Protect Oneself From Scam Scam Proof-Your Life
Crimes Of Persuasion: Author:LesHenderson Publication date: 2003-05-13  Release Date: 2003-05-17  Title:Schemes, Scams, Frauds Description:The crimes of persuasion tells about how can Artists will steal your savings and inheritance through telemarketing fraud,Investment schemes and consumer scames.It effectively be taken to minimize the impact on its victims and ensure that adequate penalties are in place to deter the perpetrators.
Computer Idio’t Guide: Author:DuaneSwierczynski Publication Date:ecember 17, 2002 by Alpha  Release Date:January 30,2003  Title:Frauds,Scams,Cons Description:Ithepls to avoid latest scams including identity theft and internet schemes and up-to-date advice on how you can protect yourself from unscrupulous cons of every conceivable stripe.It can be updated yearly, if necessary, to expose all the latest schemes.
FRAUD-How To Protect From Scams : Author:MarshaBertrand Publication Date:December 10,2009  Title:Scams,swindle,scams Description:It describes how to protect yourself from schemes, scams and swindles.Phishing, Spoofing, ID Theft, Nigerian Advance Schemes Investment Frauds: How to Recognize And Avoid Rip-Offs In The Internet Age
Scam Proof-Your Life: Author:SidKirchheimer Publication Date:Febrauary 2007 Title:Scamproofs,Ripoffs Description:Smart Ways to Protect You & Your Family from Ripoffs, Bogus Deals & Other Consumer Headaches and your healthcare bills to shielding yourself from the growing number of international financial scams, this book is not just a reference: it's an education!

Weitere ähnliche Inhalte

Was ist angesagt?

What is sim swipe fraud
What is sim swipe fraudWhat is sim swipe fraud
What is sim swipe fraudCyberSangam
 
4 Most Common Financial Crimes To Protect Against
4 Most Common Financial Crimes To Protect Against4 Most Common Financial Crimes To Protect Against
4 Most Common Financial Crimes To Protect AgainstVeriti Consulting LLC
 
Digital Banking Fraud
Digital Banking FraudDigital Banking Fraud
Digital Banking FraudVictoria Cao
 
Be Careful - Prevent Your Sim Card from Getting Cloned
Be Careful - Prevent Your Sim Card from Getting ClonedBe Careful - Prevent Your Sim Card from Getting Cloned
Be Careful - Prevent Your Sim Card from Getting ClonedDavid Stoffel
 
The Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudThe Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudMichael Holden
 
Troam business proposal
Troam business proposal Troam business proposal
Troam business proposal Remo Correya
 
Abc of hoax site investigation
Abc of hoax site investigationAbc of hoax site investigation
Abc of hoax site investigationFrankSobotka
 

Was ist angesagt? (9)

Sim swapping
Sim swappingSim swapping
Sim swapping
 
What is sim swipe fraud
What is sim swipe fraudWhat is sim swipe fraud
What is sim swipe fraud
 
4 Most Common Financial Crimes To Protect Against
4 Most Common Financial Crimes To Protect Against4 Most Common Financial Crimes To Protect Against
4 Most Common Financial Crimes To Protect Against
 
Digital Banking Fraud
Digital Banking FraudDigital Banking Fraud
Digital Banking Fraud
 
Be Careful - Prevent Your Sim Card from Getting Cloned
Be Careful - Prevent Your Sim Card from Getting ClonedBe Careful - Prevent Your Sim Card from Getting Cloned
Be Careful - Prevent Your Sim Card from Getting Cloned
 
The Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudThe Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire Fraud
 
Troam business proposal
Troam business proposal Troam business proposal
Troam business proposal
 
Fraudulent bank wiring
Fraudulent bank wiringFraudulent bank wiring
Fraudulent bank wiring
 
Abc of hoax site investigation
Abc of hoax site investigationAbc of hoax site investigation
Abc of hoax site investigation
 

Ähnlich wie Top 10 Types of Scams and How to Report Them

Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsShred Station
 
Unveiling the Threat How to Recognize and Report Crypto Scams
Unveiling the Threat  How to Recognize and Report Crypto ScamsUnveiling the Threat  How to Recognize and Report Crypto Scams
Unveiling the Threat How to Recognize and Report Crypto ScamsMike Bike
 
Internet Scams, Identity Theft And
Internet Scams, Identity Theft AndInternet Scams, Identity Theft And
Internet Scams, Identity Theft AndCorey Quinn
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud Dixita S
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017N F
 
Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communicationRosetta
 
Abusing the Internet of Things.pdf
Abusing the Internet of Things.pdfAbusing the Internet of Things.pdf
Abusing the Internet of Things.pdfM. R.
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
Understanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsUnderstanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsSARON MESSEMBE OBIA
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 

Ähnlich wie Top 10 Types of Scams and How to Report Them (16)

Features of-scam
Features of-scamFeatures of-scam
Features of-scam
 
cot-2022.pptx
cot-2022.pptxcot-2022.pptx
cot-2022.pptx
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
 
Unveiling the Threat How to Recognize and Report Crypto Scams
Unveiling the Threat  How to Recognize and Report Crypto ScamsUnveiling the Threat  How to Recognize and Report Crypto Scams
Unveiling the Threat How to Recognize and Report Crypto Scams
 
Internet Scams, Identity Theft And
Internet Scams, Identity Theft AndInternet Scams, Identity Theft And
Internet Scams, Identity Theft And
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communication
 
Abusing the Internet of Things.pdf
Abusing the Internet of Things.pdfAbusing the Internet of Things.pdf
Abusing the Internet of Things.pdf
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Identity Theft 101
Identity Theft 101Identity Theft 101
Identity Theft 101
 
Understanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsUnderstanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminals
 
Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 

Kürzlich hochgeladen

2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docxkfjstone13
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadershipanjanibaddipudi1
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docxkfjstone13
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...AlexisTorres963861
 
Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxAwaiskhalid96
 
25042024_First India Newspaper Jaipur.pdf
25042024_First India Newspaper Jaipur.pdf25042024_First India Newspaper Jaipur.pdf
25042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKISHAN REDDY OFFICE
 
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct CommiteemenRoberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemenkfjstone13
 
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Axel Bruns
 
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书Fi L
 
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxKAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxjohnandrewcarlos
 
Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...
Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...
Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...Muhammad Shamsaddin Megalommatis
 
26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Ismail Fahmi
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...Axel Bruns
 
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docxkfjstone13
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfLorenzo Lemes
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoSABC News
 
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...narsireddynannuri1
 
29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdfFIRST INDIA
 

Kürzlich hochgeladen (20)

2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
 
Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptx
 
25042024_First India Newspaper Jaipur.pdf
25042024_First India Newspaper Jaipur.pdf25042024_First India Newspaper Jaipur.pdf
25042024_First India Newspaper Jaipur.pdf
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdf
 
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct CommiteemenRoberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
 
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
 
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
 
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxKAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
 
Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...
Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...
Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...
 
26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf
 
Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
 
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdf
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election Manifesto
 
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
 
29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf
 

Top 10 Types of Scams and How to Report Them

  • 1. Origin of Scam Caroline,USA
  • 2. Top 10 Types of scams Advance charge loans Big Business opportunities False Checks Internet: Common Commodities Internet: Auctions Lotteries Nigerian Funds Offers Prize/free gifts Phishing Sweetheart Swindles
  • 3. Origin Of Scam-Overview: Scam Scammers location Scammers goal Password scam Reporting scam
  • 4. Scam: The word “scam” is a quite new addition to the modern English language. Its genesis is not completely clear, but researchers have traced its first recorded and use in a publication to an article that came in TIME magazine (1963). 419 scam origin is debated. Several critics believe that the scam first was introduced to Nigeria by Nigerian petroleum companies and some criminal gangs in 1970s or 1980s. There are others who assume that the scam was a combination of different frauds in the Igboland region, some hundreds of years old.
  • 5. Scammers location
  • 6. Scammers location: The first“scam” involved profitable oil contracts and other interrelated frauds. Until about 2001, the scammers were to be found primarily in Aba, Owerri, Lagos, Port Harcourt and Nigeria. The scammers have lately set up their base in many countries moreover Nigeria, including Togo, the Ivory Coast, the Netherlands, the United Kingdom, and Canada. Nigerian money transfer fraud is the other name for Nigerian scam or 419 scam. They are associated in the public mind with Nigeria due to the increase of such confidence tricks from Nigeria since the mid-eighties, although they are often carried out in other African nations, and increasingly from European cities with large Nigerian populations, notably London and Amsterdam.
  • 7. Scammers goal: The goal of the scammers is to cheat the victim into thinking that he or she has been singled out to contribute in a very profitable although questionable -- arrangement. The intended victim is at peace of the authenticity of the arrangement by fake or false documents bearing apparently official Nigerian government letterhead, seals, as well as phony letters of credit, payment schedules and bank drafts. The scammer may even found the credibility of his contacts, and thereby his influence, by arranging a meeting between the victim and "government officials" in real or counterfeit government offices.
  • 8. Password scam: At first the scammers obtain account addresses. Then they use computer scripts to make passwords using words commonly found in the dictionary and work with that passwords in the hope of finding one that lets them in. When a password (working) is found, they go about the nefarious business of grabbing your contacts from the host service and sending out the kind of messages that your contacts received. Depending on the kinds of service, they can also forward messages to a different account. There are different strategies for creating and recollecting passwords. People often substitute characters for letters @ for A, ! for L and $ for S etc. To overcome this, choose the password field, click and hold on the 1Password button that appears in your browser, and select Strong Password Generator.
  • 10. Reporting scam: Originally, the scammers contacted heads of companies and church officials; however, the use of scam email and instant messaging for the initial contacts has led to many private citizens also being targeted, as the cost to the scammers to make initial contact was much lower. The process of reporting scams is actually quite simple. There are several government and independent organizations devoted to putting a stop to internet scams. They depend on people reporting scams in order to fight internet scammers. If an email is received which proposes a business proposition from Nigeria or Wealthy Nigerian royalty in need of temporary cash, this is called a 419 scam. Start reporting fraud and scams pertinent to the 419 scams by contacting Fraudaid.com.
  • 11. Reporting scam: The United States Federal Trade Commission has issued a Consumer Alert (http://www.ftc.gov/bcp/conline/pubs/alerts/nigeralrt.htm) about the Nigerian spam(scam). It states: "If you receive an offer via nigerian mail (email) from someone claiming to need your help getting money out of Nigeria — or any other country, for that matter — forward it to the FTC at spam@uce.gov.
  • 12. Scam Related Books: Crimes Of Persuasion Computer Idio’t Guide FRAUD-How To Protect Oneself From Scam Scam Proof-Your Life
  • 13. Crimes Of Persuasion: Author:LesHenderson Publication date: 2003-05-13 Release Date: 2003-05-17 Title:Schemes, Scams, Frauds Description:The crimes of persuasion tells about how can Artists will steal your savings and inheritance through telemarketing fraud,Investment schemes and consumer scames.It effectively be taken to minimize the impact on its victims and ensure that adequate penalties are in place to deter the perpetrators.
  • 14. Computer Idio’t Guide: Author:DuaneSwierczynski Publication Date:ecember 17, 2002 by Alpha Release Date:January 30,2003 Title:Frauds,Scams,Cons Description:Ithepls to avoid latest scams including identity theft and internet schemes and up-to-date advice on how you can protect yourself from unscrupulous cons of every conceivable stripe.It can be updated yearly, if necessary, to expose all the latest schemes.
  • 15. FRAUD-How To Protect From Scams : Author:MarshaBertrand Publication Date:December 10,2009 Title:Scams,swindle,scams Description:It describes how to protect yourself from schemes, scams and swindles.Phishing, Spoofing, ID Theft, Nigerian Advance Schemes Investment Frauds: How to Recognize And Avoid Rip-Offs In The Internet Age
  • 16. Scam Proof-Your Life: Author:SidKirchheimer Publication Date:Febrauary 2007 Title:Scamproofs,Ripoffs Description:Smart Ways to Protect You & Your Family from Ripoffs, Bogus Deals & Other Consumer Headaches and your healthcare bills to shielding yourself from the growing number of international financial scams, this book is not just a reference: it's an education!