SlideShare a Scribd company logo
1 of 16
Anatomy of a


  Scam
Common crime
2



    An Identity Theft 911
    employee recently posted
    an ad to sell furniture on
    the popular website
    Craigslist.
    Of the 13 inquiries, five
    were almost certainly from
    con artists looking for a
    free paycheck. One of them
    seemed plausible, so we
    decided to write back…
    © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
Harsh reality
3



    What follows is a real-world example of how
    fraudsters are trolling online classifieds,
    along with tips on what to look for so you’re
    not the next victim.




    © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
For sale
4



    The post
    was simple
    enough:




    © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
Friendly approach
5



    The scammer writes an email. Note the urgency:




    © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
Suspicious sender
6



    Notice the different reply-to addresses. Multiple email accounts
    is one way crooks try to cover their tracks.




    © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
A closer look
7



    Our agent wrote back, fully aware it was a scam and curious
      about the direction it would take.




      © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
More bad signs
8



    The scammer replies positively but:
    •   There is no negotiation of price.                                     •   Will pay without seeing product in person.
    •   Wants the product immediately.                                        •   Wants to pay through an online service.




    © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential                                           May 30, 2012
9             Don’t try this at home
              Next, our employee sent a PayPal request from a
              dummy account not linked to a bank or credit card. At
              this point, if you aren’t certain the buyer is legitimate,
              DO NOT send an e-invoice. You don’t want the bad guys
              to know you use online pay services and what email
              address they’re linked to.




© 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
Setup for fraud
10




     © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
Avoid transferring funds
11



     This is the nut of the scam: The crook tries to get you to use
     Western Union or PayPal to send them money.




     © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
Spot the scam
12



     What followed
     next was an
     email designed
     to look like an
     official PayPal
     communication.
     Note the “from”
     address isn’t
     paypal.com:



     © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
Bad information
13



     The item title is Ford F450, but the ad was for couches. Also, in
     a real transaction, you would never get the warning in the
     yellow box saying that you won’t see the transaction in your
     Account Overview.




     © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
More scam evidence
14



     The email uses a wordy explanation filled with bad grammar and
       typos on how to send money via a wire service. No online business,
       including PayPal, eBay or Amazon, will ask you to do this.




       © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
The final touch
15



     The crook closes by saying the only way to contact PayPal is to reply
       to this message via email. The fraudster doesn’t want you to
       contact the real PayPal since then the scam would be revealed.




       © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
16             Not all bad
               Using Craigslist, PayPal and other sites is an excellent,
               modern means of doing business. (Our employee
               eventually sold his couches to a happy couple.) But like
               it or not, bad guys prowl these sites regularly.
               Stay sharp, and keep your identity and money out of
               the wrong hands. If it looks like a scam, it probably is.



 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012

More Related Content

Viewers also liked

Strategies for Taking Charge of Your Life and Law Practice
Strategies for Taking Charge of Your Life and Law PracticeStrategies for Taking Charge of Your Life and Law Practice
Strategies for Taking Charge of Your Life and Law PracticeCynthia Sharp
 
Louisiana- Brady and Paul
Louisiana- Brady and PaulLouisiana- Brady and Paul
Louisiana- Brady and Paulklei8103
 
1-Day Service innovation Public Workshop
1-Day Service innovation Public Workshop 1-Day Service innovation Public Workshop
1-Day Service innovation Public Workshop David Chung
 
La revolució científica!
La revolució científica!La revolució científica!
La revolució científica!Filosofosflorida
 
Prudential the great company
Prudential the great companyPrudential the great company
Prudential the great companyNnoffie Khaa
 
Florida-Nicholas and Kenneth
Florida-Nicholas and KennethFlorida-Nicholas and Kenneth
Florida-Nicholas and Kennethklei8103
 
"Some New Results on the Estimation of Structural Budget Balance for Spain"; ...
"Some New Results on the Estimation of Structural Budget Balance for Spain"; ..."Some New Results on the Estimation of Structural Budget Balance for Spain"; ...
"Some New Results on the Estimation of Structural Budget Balance for Spain"; ...Investigador Principal (IELAT_UAH)
 
The Movement Project 35-54
The Movement Project 35-54The Movement Project 35-54
The Movement Project 35-54kylelabrache
 
Art in Art,1... Music, Dance, Painting
Art in Art,1... Music, Dance, PaintingArt in Art,1... Music, Dance, Painting
Art in Art,1... Music, Dance, PaintingMakala (D)
 
Rahul network resume copy
Rahul  network resume   copyRahul  network resume   copy
Rahul network resume copyRahul patil
 
Books and art, I
Books and art, IBooks and art, I
Books and art, IMakala (D)
 
Presentation 1
Presentation 1Presentation 1
Presentation 1Stephen-T
 
POPPER Asia - A Brief Introduction
POPPER Asia - A Brief IntroductionPOPPER Asia - A Brief Introduction
POPPER Asia - A Brief IntroductionKelvin Emmanuel Ng
 
Two sides of diversity
Two sides of diversityTwo sides of diversity
Two sides of diversityvinayak_cades
 

Viewers also liked (20)

Strategies for Taking Charge of Your Life and Law Practice
Strategies for Taking Charge of Your Life and Law PracticeStrategies for Taking Charge of Your Life and Law Practice
Strategies for Taking Charge of Your Life and Law Practice
 
Louisiana- Brady and Paul
Louisiana- Brady and PaulLouisiana- Brady and Paul
Louisiana- Brady and Paul
 
1-Day Service innovation Public Workshop
1-Day Service innovation Public Workshop 1-Day Service innovation Public Workshop
1-Day Service innovation Public Workshop
 
La revolució científica!
La revolució científica!La revolució científica!
La revolució científica!
 
Prudential the great company
Prudential the great companyPrudential the great company
Prudential the great company
 
Aristotle
AristotleAristotle
Aristotle
 
Florida-Nicholas and Kenneth
Florida-Nicholas and KennethFlorida-Nicholas and Kenneth
Florida-Nicholas and Kenneth
 
"Some New Results on the Estimation of Structural Budget Balance for Spain"; ...
"Some New Results on the Estimation of Structural Budget Balance for Spain"; ..."Some New Results on the Estimation of Structural Budget Balance for Spain"; ...
"Some New Results on the Estimation of Structural Budget Balance for Spain"; ...
 
The Movement Project 35-54
The Movement Project 35-54The Movement Project 35-54
The Movement Project 35-54
 
Art in Art,1... Music, Dance, Painting
Art in Art,1... Music, Dance, PaintingArt in Art,1... Music, Dance, Painting
Art in Art,1... Music, Dance, Painting
 
Wp html5
Wp html5Wp html5
Wp html5
 
Rahul network resume copy
Rahul  network resume   copyRahul  network resume   copy
Rahul network resume copy
 
Books and art, I
Books and art, IBooks and art, I
Books and art, I
 
Presentation 1
Presentation 1Presentation 1
Presentation 1
 
Pictures
PicturesPictures
Pictures
 
POPPER Asia - A Brief Introduction
POPPER Asia - A Brief IntroductionPOPPER Asia - A Brief Introduction
POPPER Asia - A Brief Introduction
 
Two sides of diversity
Two sides of diversityTwo sides of diversity
Two sides of diversity
 
Clear purpose
Clear purposeClear purpose
Clear purpose
 
Ejemplo de ficha de trabajo
Ejemplo de ficha de trabajoEjemplo de ficha de trabajo
Ejemplo de ficha de trabajo
 
New direction in Economic Development
New direction in Economic DevelopmentNew direction in Economic Development
New direction in Economic Development
 

Similar to Anatomy of a Craigslist Scam

Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017N F
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked inPayza
 
Internet Scams, Identity Theft And
Internet Scams, Identity Theft AndInternet Scams, Identity Theft And
Internet Scams, Identity Theft AndCorey Quinn
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsShred Station
 

Similar to Anatomy of a Craigslist Scam (8)

Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
 
Scams
ScamsScams
Scams
 
Anatomy of a Scam
Anatomy of a ScamAnatomy of a Scam
Anatomy of a Scam
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
 
Internet Scams, Identity Theft And
Internet Scams, Identity Theft AndInternet Scams, Identity Theft And
Internet Scams, Identity Theft And
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
 
Features of-scam
Features of-scamFeatures of-scam
Features of-scam
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Anatomy of a Craigslist Scam

  • 2. Common crime 2 An Identity Theft 911 employee recently posted an ad to sell furniture on the popular website Craigslist. Of the 13 inquiries, five were almost certainly from con artists looking for a free paycheck. One of them seemed plausible, so we decided to write back… © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 3. Harsh reality 3 What follows is a real-world example of how fraudsters are trolling online classifieds, along with tips on what to look for so you’re not the next victim. © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 4. For sale 4 The post was simple enough: © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 5. Friendly approach 5 The scammer writes an email. Note the urgency: © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 6. Suspicious sender 6 Notice the different reply-to addresses. Multiple email accounts is one way crooks try to cover their tracks. © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 7. A closer look 7 Our agent wrote back, fully aware it was a scam and curious about the direction it would take. © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 8. More bad signs 8 The scammer replies positively but: • There is no negotiation of price. • Will pay without seeing product in person. • Wants the product immediately. • Wants to pay through an online service. © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 9. 9 Don’t try this at home Next, our employee sent a PayPal request from a dummy account not linked to a bank or credit card. At this point, if you aren’t certain the buyer is legitimate, DO NOT send an e-invoice. You don’t want the bad guys to know you use online pay services and what email address they’re linked to. © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 10. Setup for fraud 10 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 11. Avoid transferring funds 11 This is the nut of the scam: The crook tries to get you to use Western Union or PayPal to send them money. © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 12. Spot the scam 12 What followed next was an email designed to look like an official PayPal communication. Note the “from” address isn’t paypal.com: © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 13. Bad information 13 The item title is Ford F450, but the ad was for couches. Also, in a real transaction, you would never get the warning in the yellow box saying that you won’t see the transaction in your Account Overview. © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 14. More scam evidence 14 The email uses a wordy explanation filled with bad grammar and typos on how to send money via a wire service. No online business, including PayPal, eBay or Amazon, will ask you to do this. © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 15. The final touch 15 The crook closes by saying the only way to contact PayPal is to reply to this message via email. The fraudster doesn’t want you to contact the real PayPal since then the scam would be revealed. © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 16. 16 Not all bad Using Craigslist, PayPal and other sites is an excellent, modern means of doing business. (Our employee eventually sold his couches to a happy couple.) But like it or not, bad guys prowl these sites regularly. Stay sharp, and keep your identity and money out of the wrong hands. If it looks like a scam, it probably is. © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012