How fraudster operate

Fraudsters, scammers, hackers are out there and all we can do is protect ourselves with proactive methods.
With this blog( and the entire fraud series it is my hope that at least one person and of course the more the better will benefit and not be scammed or become a victim of iden- tity theft. Fraudsters and hackers constantly change their techniques and tactics keeping individuals, corporations and law enforcement on the defense try- ing to stay ahead of them.
By acquiring, a better understanding how the fraudsters and hackers uses adopted way to scam and fraud.

Adoption Fraud: Adoption fraud usually occurs when a phony unlicensed domestic adop- tion agency or facilitator are used in the adoption process. The potential parents are shown pictures of a healthy baby or child, sign an adoption agreement and unfortunately, the adoption never happens and potential parents in addition to the heartbreak are out any funds paid to the scammers and any costs associated with home preparation for the adopted child.

Advance Fee Scheme:
This scheme occurs when customers advance funds with an expectation for receipt of products or services with a higher value than the amount of money paid. Examples might include inferior quality products, lottery win- nings, found money, a loan, investments, or gifts. There are so many variations of the advance fee scheme, as schemers are always looking for ways to steal money.

Art Student Swindle:
Typically, in this swindle young peo- ple pose as Art students attempting to raise money by selling inexpensive mass-produced prints or paintings as original works of art. There have been instances of the swindle in Australia, Canada, China, Ireland, New Zealand and the United States since around 2000. The imitation original artwork is often for sale on street corners, ex- hibitions or art galleries.

ATM Skimming Scam:
The skimming devices attached to ATM’s, gas pumps and other point- of-sale locations usually blend in and are inconspicuous to ATM users. The makers of this equipment have be- come masters at creating them so the device used appears as an authentic card reader placed over the factory- installed card reader. The customers’ account information is swiped and stored on a laptop, cell phone or sent wireless to criminals waiting nearby upon inserting their ATM card into the phony device In addition, skimming typically in- volves a hidden camera, installed on or near an ATM, to record customers’ entry of their PIN into the ATM’s key- pad. Alternately, instead of a hidden camera, a phony keypad on top of the real keypad records every keystroke as customers punch in their PIN. The skimming devices usually in-stalled for a few hours collect stolen account information to download and encode onto blank cards. The encoded cards next used to make withdrawals from the victims’ accounts at other ATM's.

Auction (Internet Fraud):
When products or services purchased from online auction sites are either never received, of an inferior quality or the value is misrepresented auction internet fraud occurred.


Share your thoughts :