Origin o fscam

1,359 views
1,314 views

Published on

Published in: News & Politics
1 Comment
0 Likes
Statistics
Notes
  • Very useful data here. Particularly on Nigerian scams. And once you learn about one of them, they're easy to spot and avoid. Mostly, don't open email from anyone you don't know.

    If you had a soundtrack for this presentation, the additional information would be great.

    There are a ton more scams than just the Nigerians, which are not as easy to spot. Several are in Internet Marketing, more are on the infomercials, and several in Government and religion.

    But I'd suggest another book (my own - blatant pitch here...) 'Get Your Self Scam Free' http://robertworstell.com/get-your-self-scam-free/

    And here's a video for the Introduction: http://www.youtube.com/watch?v=MmujznPjygM
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Views
Total views
1,359
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
21
Comments
1
Likes
0
Embeds 0
No embeds

No notes for slide

Origin o fscam

  1. 1. Origin of Scam<br />Caroline,USA<br />
  2. 2. Top 10 Types of scams<br />Advance charge loans<br />Big Business opportunities <br />False Checks <br />Internet: Common Commodities <br />Internet: Auctions <br />Lotteries <br />Nigerian Funds Offers <br />Prize/free gifts <br />Phishing <br />Sweetheart Swindles <br />
  3. 3. Origin Of Scam-Overview: <br />Scam<br />Scammers location<br />Scammers goal<br />Password scam<br />Reporting scam<br />
  4. 4. Scam: <br />The word “scam” is a quite new addition to the modern English language. Its genesis is not completely clear, but researchers have traced its first recorded and use in a publication to an article that came in TIME magazine (1963). <br />419 scam origin is debated. Several critics believe that the scam first was introduced to Nigeria by Nigerian petroleum companies and some criminal gangs in 1970s or 1980s. There are others who assume that the scam was a combination of different frauds in the Igboland region, some hundreds of years old. <br />
  5. 5. Scammers location<br />
  6. 6. Scammers location:<br />The first“scam” involved profitable oil contracts and other interrelated frauds. Until about 2001, the scammers were to be found primarily in Aba, Owerri, Lagos, Port Harcourt and Nigeria. <br />The scammers have lately set up their base in many countries moreover Nigeria, including Togo, the Ivory Coast, the Netherlands, the United Kingdom, and Canada.<br />Nigerian money transfer fraud is the other name for Nigerian scam or 419 scam.<br />They are associated in the public mind with Nigeria due to the increase of such confidence tricks from Nigeria since the mid-eighties, although they are often carried out in other African nations, and increasingly from European cities with large Nigerian populations, notably London and Amsterdam. <br />
  7. 7. Scammers goal:<br />The goal of the scammers is to cheat the victim into thinking that he or she has been singled out to contribute in a very profitable although questionable -- arrangement. <br />The intended victim is at peace of the authenticity of the arrangement by fake or false documents bearing apparently official Nigerian government letterhead, seals, as well as phony letters of credit, payment schedules and bank drafts. <br />The scammer may even found the credibility of his contacts, and thereby his influence, by arranging a meeting between the victim and "government officials" in real or counterfeit government offices.<br />
  8. 8. Password scam:<br />At first the scammers obtain account addresses. Then they use computer scripts to make passwords using words commonly found in the dictionary and work with that passwords in the hope of finding one that lets them in. When a password (working) is found, they go about the nefarious business of grabbing your contacts from the host service and sending out the kind of messages that your contacts received. <br />Depending on the kinds of service, they can also forward messages to a different account.<br />There are different strategies for creating and recollecting passwords. People often substitute characters for letters @ for A, ! for L and $ for S etc. To overcome this, choose the password field, click and hold on the 1Password button that appears in your browser, and select Strong Password Generator. <br />
  9. 9. Reporting scam<br />
  10. 10. Reporting scam:<br />Originally, the scammers contacted heads of companies and church officials; however, the use of scam email and instant messaging for the initial contacts has led to many private citizens also being targeted, as the cost to the scammers to make initial contact was much lower. The process of reporting scams is actually quite simple. There are several government and independent organizations devoted to putting a stop to internet scams. They depend on people reporting scams in order to fight internet scammers.<br />If an email is received which proposes a business proposition from Nigeria or Wealthy Nigerian royalty in need of temporary cash, this is called a 419 scam. Start reporting fraud and scams pertinent to the 419 scams by contacting Fraudaid.com. <br />
  11. 11. Reporting scam:<br />The United States Federal Trade Commission has issued a Consumer Alert (http://www.ftc.gov/bcp/conline/pubs/alerts/nigeralrt.htm) about the Nigerian spam(scam). It states: "If you receive an offer via nigerian mail (email) from someone claiming to need your help getting money out of Nigeria — or any other country, for that matter — forward it to the FTC at spam@uce.gov.<br />
  12. 12. Scam Related Books:<br />Crimes Of Persuasion<br />Computer Idio’t Guide<br />FRAUD-How To Protect Oneself From Scam<br />Scam Proof-Your Life<br />
  13. 13. Crimes Of Persuasion:<br />Author:LesHenderson<br />Publication date: 2003-05-13 <br />Release Date: 2003-05-17 <br />Title:Schemes, Scams, Frauds<br />Description:The crimes of persuasion tells about how can Artists will steal your savings and inheritance through telemarketing fraud,Investment schemes and consumer scames.It effectively be taken to minimize the impact on its victims and ensure that adequate penalties are in place to deter the perpetrators. <br />
  14. 14. Computer Idio’t Guide:<br />Author:DuaneSwierczynski<br />Publication Date:ecember 17, 2002 by Alpha <br />Release Date:January 30,2003 <br />Title:Frauds,Scams,Cons<br />Description:Ithepls to avoid latest scams including identity theft and internet schemes and up-to-date advice on how you can protect yourself from unscrupulous cons of every conceivable stripe.It can be updated yearly, if necessary, to expose all the latest schemes.<br />
  15. 15. FRAUD-How To Protect From Scams :<br />Author:MarshaBertrand<br />Publication Date:December 10,2009 <br />Title:Scams,swindle,scams<br />Description:It describes how to protect yourself from schemes, scams and swindles.Phishing, Spoofing, ID Theft, Nigerian Advance Schemes Investment Frauds: How to Recognize And Avoid Rip-Offs In The Internet Age<br />
  16. 16. Scam Proof-Your Life:<br />Author:SidKirchheimer<br />Publication Date:Febrauary 2007<br />Title:Scamproofs,Ripoffs<br />Description:Smart Ways to Protect You & Your Family from Ripoffs, Bogus Deals & Other Consumer Headaches and your healthcare bills to shielding yourself from the growing number of international financial scams, this book is not just a reference: it's an education! <br />

×