Implementation
Scam letter posted within South Africa This scam usually begins with the perpetrator contacting the victim via email, instant messaging or social media using a fake email address or a fake social media account and making an offer that would allegedly result in a large payoff for the victim. An email subject line may say something like " From the desk of barrister [Name]", " Your assistance is needed", and so on. The details vary, but the usual story is that a person, often a government or bank employee, knows of a large amount of unclaimed money or gold which they cannot access directly, usually because they have no right to it. Such people, who may be real but impersonated people or fictitious characters played by the con artist, could include, for example, the wife or son of a deposed African leader who has amassed a stolen fortune, a bank employee who knows of a terminally ill wealthy person with no relatives, or a wealthy foreigner who deposited money in the bank just before dying in a plane crash (leaving no will or known next of kin), a US soldier who has stumbled upon a hidden cache of gold in Iraq, a business being audited by the government, a disgruntled worker or corrupt government official who has embezzled funds, a refugee, and similar characters. The money could be in the form of gold bullion, gold dust, money in a bank account, blood diamonds, a series of checks or bank drafts, and so forth. The sums involved are usually in the millions of dollars, and the investor is promised a large share, typically ten to forty percent, in return for assisting the fraudster to retrieve or expatriate the money. Although the vast majority of recipients do not respond to these emails, a very small percentage do, enough to make the fraud worthwhile, as many millions of messages can be sent daily. To help persuade the victim to agree to the deal, the scammer often sends one or more false documents which bear official government stamps, and seals. 419 scammers often mention false addresses and use photographs taken from the Internet or from magazines to falsely represent themselves. Often a photograph used by a scammer is not a picture of any person involved in the scheme. Multiple " people" may write or be involved in schemes as they continue, but they are often fictitious; in many cases, one person controls many fictitious personae all used in scams. Once the victim's confidence has been gained, the scammer then introduces a delay or monetary hurdle that prevents the deal from occurring as planned, such as " To transmit the money, we need to bribe a bank official. Could you help us with a loan? " or " For you to be a party to the transaction, you must have holdings at a Nigerian bank of $100, 000 or more" or similar. This is the money being stolen from the victim; the victim willingly transfers the money, usually through some irreversible channel such as a wire transfer, and the scammer receives and pockets it.
More delays and additional costs are added, always keeping the promise of an imminent large transfer alive, convincing the victim that the money the victim is currently paying is covered several times over by the payoff. The implication that these payments will be used for " white-collar" crime such as bribery, and even that the money they are being promised is being stolen from a government or royal/wealthy family, often prevents the victim from telling others about the " transaction", as it would involve admitting that they intended to be complicit in an international crime. Sometimes psychological pressure is added by claiming that the Nigerian side, to pay certain fees, had to sell belongings and borrow money on a house, or by comparing the salary scale and living conditions in Africa to those in the West. Much of the time, however, the needed psychological pressure is self-applied; once the victims have provided money toward the payoff, they feel they have a vested interest in seeing the " deal" through. Some victims even believe they can cheat the other party, and walk away with all the money instead of just the percentage they were promised. The essential fact in all advance-fee fraud operations is the promised money transfer to the victim never happens, because the money does not exist. The perpetrators rely on the fact that, by the time the victim realizes this (often only after being confronted by a third party who has noticed the transactions or conversation and recognized the scam), the victim may have sent thousands of dollars of their own money, and sometimes thousands more that has been borrowed or stolen, to the scammer via an untraceable and/or irreversible means such as wire transfer. The scammer disappears, and the victim is left on the hook for the money sent to the scammer. During the course of many schemes, scammers ask victims to supply bank account information. Usually this is a " test" devised by the scammer to gauge the victim's gullibility; the bank account information isn't used directly by the scammer, because a fraudulent withdrawal from the account is more easily detected, reversed, and traced. Scammers instead usually request that payments be made using a wire transfer service like Western Union and MoneyGram. The reason given by the scammer usually relates to the speed at which the payment can be received and processed, allowing quick release of the supposed payoff. The real reason is that wire transfers and similar methods of payment are irreversible, untraceable and, because identification beyond knowledge of the details of the transaction is often not required, completely anonymous. However, bank account information obtained by scammers is sometimes sold in bulk to other fraudsters, who wait a few months for the victim to repair the damage caused by the initial scam, before raiding any accounts which the victim didn't close. Telephone numbers used by scammers tend to come from burner phones. In Ivory Coast a scammer may purchase an inexpensive mobile phone and a pre-paid SIM card without submitting any identifying information. If the scammers believe they are being traced, they discard their mobile phones and purchase new ones. The spam emails used in these scams are often sent from Internet café s equipped with satellite internet connection. Recipient addresses and email content are copied and pasted into a webmail interface using a stand-alone storage medium, such as a memory card. Certain areas of Lagos, such as Festac, contain many cyber café s that serve scammers; cyber café s often seal their doors outside hours, such as from 10: 30pm to 7: 00am, so that scammers inside may work without fear of discovery.
Nigeria also contains many businesses that provide false documents used in scams; after a scam involving a forged signature of Nigerian President Olusegun Obasanjo in summer 2005, Nigerian authorities raided a market in the Oluwole section of Lagos. The police seized thousands of Nigerian and non-Nigerian passports, 10, 000 blank British Airways boarding passes, 10, 000 United States Postal money orders, customs documents, false university certificates, 500 printing plates, and 500 computers. The " success rate" of the scammers is also hard to gauge, since they are operating illegally and do not keep track of specific numbers. One individual estimated he sent 500 emails per day and received about seven replies, citing that when he received a reply, he was 70 percent certain he would get the money. If tens of thousands of emails are sent every day by thousands of individuals, it doesn't take a very high success rate to be worthwhile.
Воспользуйтесь поиском по сайту: ©2015 - 2024 megalektsii.ru Все авторские права принадлежат авторам лекционных материалов. Обратная связь с нами...
|