SlideShare a Scribd company logo
Anatomy of a


  Scam
Common crime
2



    An Identity Theft 911
    employee recently posted
    an ad to sell furniture on
    the popular website
    Craigslist.
    Of the 13 inquiries, five
    were almost certainly from
    con artists looking for a
    free paycheck. One of them
    seemed plausible, so we
    decided to write back…
    © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
Harsh reality
3



    What follows is a real-world example of how
    fraudsters are trolling online classifieds,
    along with tips on what to look for so you’re
    not the next victim.




    © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
For sale
4



    The post
    was simple
    enough:




    © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
Friendly approach
5



    The scammer writes an email. Note the urgency:




    © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
Suspicious sender
6



    Notice the different reply-to addresses. Multiple email accounts
    is one way crooks try to cover their tracks.




    © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
A closer look
7



    Our agent wrote back, fully aware it was a scam and curious
      about the direction it would take.




      © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
More bad signs
8



    The scammer replies positively but:
    •   There is no negotiation of price.                                     •   Will pay without seeing product in person.
    •   Wants the product immediately.                                        •   Wants to pay through an online service.




    © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential                                           May 30, 2012
9             Don’t try this at home
              Next, our employee sent a PayPal request from a
              dummy account not linked to a bank or credit card. At
              this point, if you aren’t certain the buyer is legitimate,
              DO NOT send an e-invoice. You don’t want the bad guys
              to know you use online pay services and what email
              address they’re linked to.




© 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
Setup for fraud
10




     © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
Avoid transferring funds
11



     This is the nut of the scam: The crook tries to get you to use
     Western Union or PayPal to send them money.




     © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
Spot the scam
12



     What followed
     next was an
     email designed
     to look like an
     official PayPal
     communication.
     Note the “from”
     address isn’t
     paypal.com:



     © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
Bad information
13



     The item title is Ford F450, but the ad was for couches. Also, in
     a real transaction, you would never get the warning in the
     yellow box saying that you won’t see the transaction in your
     Account Overview.




     © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
More scam evidence
14



     The email uses a wordy explanation filled with bad grammar and
       typos on how to send money via a wire service. No online business,
       including PayPal, eBay or Amazon, will ask you to do this.




       © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
The final touch
15



     The crook closes by saying the only way to contact PayPal is to reply
       to this message via email. The fraudster doesn’t want you to
       contact the real PayPal since then the scam would be revealed.




       © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012
16             Not all bad
               Using Craigslist, PayPal and other sites is an excellent,
               modern means of doing business. (Our employee
               eventually sold his couches to a happy couple.) But like
               it or not, bad guys prowl these sites regularly.
               Stay sharp, and keep your identity and money out of
               the wrong hands. If it looks like a scam, it probably is.



 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   May 30, 2012

More Related Content

Viewers also liked

Strategies for Taking Charge of Your Life and Law Practice
Strategies for Taking Charge of Your Life and Law PracticeStrategies for Taking Charge of Your Life and Law Practice
Strategies for Taking Charge of Your Life and Law PracticeCynthia Sharp
 
Louisiana- Brady and Paul
Louisiana- Brady and PaulLouisiana- Brady and Paul
Louisiana- Brady and Paulklei8103
 
1-Day Service innovation Public Workshop
1-Day Service innovation Public Workshop 1-Day Service innovation Public Workshop
1-Day Service innovation Public Workshop
David Chung
 
La revolució científica!
La revolució científica!La revolució científica!
La revolució científica!Filosofosflorida
 
Prudential the great company
Prudential the great companyPrudential the great company
Prudential the great companyNnoffie Khaa
 
Aristotle
AristotleAristotle
Aristotle
gravitycat
 
Florida-Nicholas and Kenneth
Florida-Nicholas and KennethFlorida-Nicholas and Kenneth
Florida-Nicholas and Kennethklei8103
 
"Some New Results on the Estimation of Structural Budget Balance for Spain"; ...
"Some New Results on the Estimation of Structural Budget Balance for Spain"; ..."Some New Results on the Estimation of Structural Budget Balance for Spain"; ...
"Some New Results on the Estimation of Structural Budget Balance for Spain"; ...
Investigador Principal (IELAT_UAH)
 
The Movement Project 35-54
The Movement Project 35-54The Movement Project 35-54
The Movement Project 35-54kylelabrache
 
Art in Art,1... Music, Dance, Painting
Art in Art,1... Music, Dance, PaintingArt in Art,1... Music, Dance, Painting
Art in Art,1... Music, Dance, Painting
Makala (D)
 
Rahul network resume copy
Rahul  network resume   copyRahul  network resume   copy
Rahul network resume copy
Rahul patil
 
Books and art, I
Books and art, IBooks and art, I
Books and art, I
Makala (D)
 
Presentation 1
Presentation 1Presentation 1
Presentation 1
Stephen-T
 
Pictures
PicturesPictures
POPPER Asia - A Brief Introduction
POPPER Asia - A Brief IntroductionPOPPER Asia - A Brief Introduction
POPPER Asia - A Brief IntroductionKelvin Emmanuel Ng
 
Two sides of diversity
Two sides of diversityTwo sides of diversity
Two sides of diversityvinayak_cades
 
Ejemplo de ficha de trabajo
Ejemplo de ficha de trabajoEjemplo de ficha de trabajo
Ejemplo de ficha de trabajo
Alejandro Flores Ramos
 

Viewers also liked (20)

Strategies for Taking Charge of Your Life and Law Practice
Strategies for Taking Charge of Your Life and Law PracticeStrategies for Taking Charge of Your Life and Law Practice
Strategies for Taking Charge of Your Life and Law Practice
 
Louisiana- Brady and Paul
Louisiana- Brady and PaulLouisiana- Brady and Paul
Louisiana- Brady and Paul
 
1-Day Service innovation Public Workshop
1-Day Service innovation Public Workshop 1-Day Service innovation Public Workshop
1-Day Service innovation Public Workshop
 
La revolució científica!
La revolució científica!La revolució científica!
La revolució científica!
 
Prudential the great company
Prudential the great companyPrudential the great company
Prudential the great company
 
Aristotle
AristotleAristotle
Aristotle
 
Florida-Nicholas and Kenneth
Florida-Nicholas and KennethFlorida-Nicholas and Kenneth
Florida-Nicholas and Kenneth
 
"Some New Results on the Estimation of Structural Budget Balance for Spain"; ...
"Some New Results on the Estimation of Structural Budget Balance for Spain"; ..."Some New Results on the Estimation of Structural Budget Balance for Spain"; ...
"Some New Results on the Estimation of Structural Budget Balance for Spain"; ...
 
The Movement Project 35-54
The Movement Project 35-54The Movement Project 35-54
The Movement Project 35-54
 
Art in Art,1... Music, Dance, Painting
Art in Art,1... Music, Dance, PaintingArt in Art,1... Music, Dance, Painting
Art in Art,1... Music, Dance, Painting
 
Wp html5
Wp html5Wp html5
Wp html5
 
Rahul network resume copy
Rahul  network resume   copyRahul  network resume   copy
Rahul network resume copy
 
Books and art, I
Books and art, IBooks and art, I
Books and art, I
 
Presentation 1
Presentation 1Presentation 1
Presentation 1
 
Pictures
PicturesPictures
Pictures
 
POPPER Asia - A Brief Introduction
POPPER Asia - A Brief IntroductionPOPPER Asia - A Brief Introduction
POPPER Asia - A Brief Introduction
 
Two sides of diversity
Two sides of diversityTwo sides of diversity
Two sides of diversity
 
Clear purpose
Clear purposeClear purpose
Clear purpose
 
Ejemplo de ficha de trabajo
Ejemplo de ficha de trabajoEjemplo de ficha de trabajo
Ejemplo de ficha de trabajo
 
New direction in Economic Development
New direction in Economic DevelopmentNew direction in Economic Development
New direction in Economic Development
 

Similar to Anatomy of a Craigslist Scam

Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
Harold Stallard
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
N F
 
Scams
ScamsScams
Scams
dentonjo
 
Anatomy of a Scam
Anatomy of a ScamAnatomy of a Scam
Anatomy of a Scam
Christopher Veal
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked inPayza
 
Internet Scams, Identity Theft And
Internet Scams, Identity Theft AndInternet Scams, Identity Theft And
Internet Scams, Identity Theft And
Corey Quinn
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
Shred Station
 

Similar to Anatomy of a Craigslist Scam (8)

Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
 
Scams
ScamsScams
Scams
 
Anatomy of a Scam
Anatomy of a ScamAnatomy of a Scam
Anatomy of a Scam
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
 
Internet Scams, Identity Theft And
Internet Scams, Identity Theft AndInternet Scams, Identity Theft And
Internet Scams, Identity Theft And
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
 
Features of-scam
Features of-scamFeatures of-scam
Features of-scam
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 

Anatomy of a Craigslist Scam

  • 2. Common crime 2 An Identity Theft 911 employee recently posted an ad to sell furniture on the popular website Craigslist. Of the 13 inquiries, five were almost certainly from con artists looking for a free paycheck. One of them seemed plausible, so we decided to write back… © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 3. Harsh reality 3 What follows is a real-world example of how fraudsters are trolling online classifieds, along with tips on what to look for so you’re not the next victim. © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 4. For sale 4 The post was simple enough: © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 5. Friendly approach 5 The scammer writes an email. Note the urgency: © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 6. Suspicious sender 6 Notice the different reply-to addresses. Multiple email accounts is one way crooks try to cover their tracks. © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 7. A closer look 7 Our agent wrote back, fully aware it was a scam and curious about the direction it would take. © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 8. More bad signs 8 The scammer replies positively but: • There is no negotiation of price. • Will pay without seeing product in person. • Wants the product immediately. • Wants to pay through an online service. © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 9. 9 Don’t try this at home Next, our employee sent a PayPal request from a dummy account not linked to a bank or credit card. At this point, if you aren’t certain the buyer is legitimate, DO NOT send an e-invoice. You don’t want the bad guys to know you use online pay services and what email address they’re linked to. © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 10. Setup for fraud 10 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 11. Avoid transferring funds 11 This is the nut of the scam: The crook tries to get you to use Western Union or PayPal to send them money. © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 12. Spot the scam 12 What followed next was an email designed to look like an official PayPal communication. Note the “from” address isn’t paypal.com: © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 13. Bad information 13 The item title is Ford F450, but the ad was for couches. Also, in a real transaction, you would never get the warning in the yellow box saying that you won’t see the transaction in your Account Overview. © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 14. More scam evidence 14 The email uses a wordy explanation filled with bad grammar and typos on how to send money via a wire service. No online business, including PayPal, eBay or Amazon, will ask you to do this. © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 15. The final touch 15 The crook closes by saying the only way to contact PayPal is to reply to this message via email. The fraudster doesn’t want you to contact the real PayPal since then the scam would be revealed. © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012
  • 16. 16 Not all bad Using Craigslist, PayPal and other sites is an excellent, modern means of doing business. (Our employee eventually sold his couches to a happy couple.) But like it or not, bad guys prowl these sites regularly. Stay sharp, and keep your identity and money out of the wrong hands. If it looks like a scam, it probably is. © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential May 30, 2012