SlideShare a Scribd company logo
Identifying translator scams
LYING THROUGH THEIR TEETH
UNITED BANK AFRICA
• Statistics
• Freelancers
• Identifying scammers
• Tactics scammers use
• Ensuring you don’t fall prey
• LSPs
• Tactics scammers use
• Identifying scammers
• Ensuring you don’t fall prey
• Fighting Back
• Samples
OVERVIEW
• September 11, 2015: 3,822 scammers
using 10,024 different e-mail
addresses
• Translator Scammers Directory
• 2014 LSP Survey by J.R. Dias – 315
respondents
• 86% knew of the distribution of fake
CVs, 14% were not aware a CV scam
existed
• Reporting fake CVs: 18% yes, 32%
sometimes, 50% of respondents
never reported the receipt of a fake
CV
STATISTICS
• Posing as an agency, using public
domain
• Mismatching name and e-mail
username
• Different “Reply-to” than “From” line
• Originally sent to “Bcc”
• CV Marketers or promoters
• “Independent Project Manager”
• Falsely identifying source of contact
information
• Use of improper grammar
• Requesting Language Pair Information
• Lack of multiple means of contact
• Lack addressing the recipient directly
• No project specifications
FOR THE FREELANCER – IDENTIFYING
• CV Theft
• Request proof of Identification
• No payment
• Overpayment (more elaborate)
FOR THE FREELANCER – TACTICS USED
Relating to practices Other scams to be cognizant of
• No grammatical or typographical errors
• Consistent contact information on
Networking and websites
• Post CV in secured PDF format
• Verify the IP Address
• Responding to a suspected scammer
• “I don't believe I've ever heard from
your company before -- did
someone refer you to me?”
• Check
http://translationethics.blogspot.se/p/blog
-page.html
• Check http://www.translator-
scammers.com/
FOR THE FREELANCER
Ensuring you don’t fall prey Ensuring you don’t get confused for a scammer
• Deliver nothing
• Deliver poor quality
• Modify contact information on CVs of
qualified, legitimate translators
• Offer bottom-of-the-barrel rates
• Unsuspecting PMs verify credentials
on the legitimate translator’s profile or
website and use the contact
information on the fraudulent CV.
• The scammer accepts the project, runs
it through a public Machine Translator
to translate it without post-editing.
• The scammer is paid for invoiced work
and disappears before his fraud is
revealed.
FOR LANGUAGE SERVICE PROVIDERS - TACTICS
• To and From language pairs
• Language pairs that do not match their
geographic location
• (don’t buy English to Norwegian
from Bangladesh)
• Missing contact information / e-mail
only
• Incorrect spelling / grammar /
language register
• Check document properties and make
sure names match
• Look for consistent contact information
• Translator’s Café
• Proz
• ATA Directory
• Regional Chapter Directory
• Personal website
FOR THE LSP - IDENTIFYING
• No grammatical or typographical errors
• Contact individual translators directly
and no mass Bcc e-mails
• Project specifics - subject matter and
language pairs match the abilities of
the provider.
• Verify the IP Address
• Contact the translator you would like to
work with via contact information from a
different source.
• Responding to a suspected scammer
• “I received your CV and I’m
wondering if you’re available to…”
• Check http://www.translator-
scammers.com/
FOR THE LSP
Ensuring you don’t fall prey Ensuring you don’t get confused for a scammer
FIGHTING BACK
• Reply to their e-mails
FIGHTING BACK
• Reply to their e-mails
FIGHTING BACK
• Get pro-active: flood the scammers’ inboxes
• http://www.translator-scammers.com/translator-scammers-fightback.htm
• Share the email and fraudulent CV on social media – no need to redact, they are crooks.
• Forward the fraudulent email and CV to translator.scammers@gmail.com or
mail@translator-scammers.com
FREELANCE TRANSLATOR SCAMMERS
Samples
Alberto Jones
Public domain e-mail address
Lack of direct address to the recipient
No project specifications
Language Pairs
Errant grammar
IP Address: 209.85.218.68
Mountain View, CA – Google
Mark Edels
Only one method of contact
Bcc
From address vs. Reply-to address
Public Domain in Reply-to
IP Address: 173.201.193.184
Scottsdale, AZ – GoDaddy.com
Language Pairs
Errant grammar
http://www.comfortinghome.com/
Jimmy Mapp
Errant spelling / grammar
Bcc
Undisclosed source of contact information
Unknown language pairs
“Translator and Editor Needed”
“If can you edit or proofread…”
Mismatched name and username
Public domain
LANGUAGE SERVICE PROVIDER SCAMMERS
Samples
Zahrawi
Bottom-of-the-barrel rate
Translator in Morocco for SWE>ENG
Improper spelling / grammar
Allen
Superfluous fluff
Bi-directional translation services
Errant grammar
No last name
Verified scammer from
http://www.translator-scammers.com/
CHRISTINA ZHAO
CHRISTINA ZHAO
LILIANA SILVA
LILIANA SILVA
• http://atanet.org/business_practices/bp
_listserv.php
• http://www.translator-scammers.com/
• http://www.paymentpractices.net/
• http://translationethics.blogspot.se/p/bl
og-page.html
• http://www.jrdias.com/PDF/JRD_The_T
ranslator_Scammers_Plague_Survey_
Report.pdf
• Twitter: @tsdirectory
• http://www.proz.com/about/translator-
scam-alerts/
• https://www.linkedin.com/grps/Translati
on-agencies-business-practices-
1536857/about
• https://www.linkedin.com/groups/Unac
ceptable-Translation-Rates-Naming-
Shaming-3415770/about
RESOURCES AND REFERENCES
THANK YOU
• Website: josephwojowski.com
• Translation Technology Blog: josephwojowski.wordpress.com
• Twitter: @ferluc666

More Related Content

Similar to Lying through their teeth: Identifying Translator Scammers

Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
GrittyCC
 
Phishing
PhishingPhishing
Phishing
Sagar Rai
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
ShreyaKushwaha28
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
Rajesh Soundararajan
 
phishing technique.pptx
phishing technique.pptxphishing technique.pptx
phishing technique.pptx
ECE6054PRIYADHARSHIN
 
Customer Relationship Management (CRM) and The Real Estate Professional
Customer Relationship Management (CRM) and The Real Estate ProfessionalCustomer Relationship Management (CRM) and The Real Estate Professional
Customer Relationship Management (CRM) and The Real Estate Professional
IXACT Contact
 
Bad Email-Final_1_2_14.pptx
Bad Email-Final_1_2_14.pptxBad Email-Final_1_2_14.pptx
Bad Email-Final_1_2_14.pptx
GEETHA LATHA
 
Contact Center Authentication
Contact Center AuthenticationContact Center Authentication
Contact Center Authentication
Kelley Robinson
 
phishing.pptx
phishing.pptxphishing.pptx
phishing.pptx
ReenuMariaBinoy1
 
Information security training Phishing
Information security training PhishingInformation security training Phishing
Information security training Phishing
Atl Edu
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Steve Poole
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
aleeya91
 
Fraud Awareness NC
Fraud Awareness NCFraud Awareness NC
Fraud Awareness NC
EmilyMoar
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
ConnectSafely
 
Email phishing and its effect on your marketing campaign
Email phishing and its effect on your marketing campaignEmail phishing and its effect on your marketing campaign
Email phishing and its effect on your marketing campaign
Sherin Thomas
 
Fraud Awareness for NC Students
Fraud Awareness for NC StudentsFraud Awareness for NC Students
Fraud Awareness for NC Students
EmilyMoar
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
Michele Chubirka
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
harpinderkaur123
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
Avishek Datta
 
Phis
PhisPhis

Similar to Lying through their teeth: Identifying Translator Scammers (20)

Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
 
Phishing
PhishingPhishing
Phishing
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
phishing technique.pptx
phishing technique.pptxphishing technique.pptx
phishing technique.pptx
 
Customer Relationship Management (CRM) and The Real Estate Professional
Customer Relationship Management (CRM) and The Real Estate ProfessionalCustomer Relationship Management (CRM) and The Real Estate Professional
Customer Relationship Management (CRM) and The Real Estate Professional
 
Bad Email-Final_1_2_14.pptx
Bad Email-Final_1_2_14.pptxBad Email-Final_1_2_14.pptx
Bad Email-Final_1_2_14.pptx
 
Contact Center Authentication
Contact Center AuthenticationContact Center Authentication
Contact Center Authentication
 
phishing.pptx
phishing.pptxphishing.pptx
phishing.pptx
 
Information security training Phishing
Information security training PhishingInformation security training Phishing
Information security training Phishing
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Fraud Awareness NC
Fraud Awareness NCFraud Awareness NC
Fraud Awareness NC
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
Email phishing and its effect on your marketing campaign
Email phishing and its effect on your marketing campaignEmail phishing and its effect on your marketing campaign
Email phishing and its effect on your marketing campaign
 
Fraud Awareness for NC Students
Fraud Awareness for NC StudentsFraud Awareness for NC Students
Fraud Awareness for NC Students
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
Phis
PhisPhis
Phis
 

Recently uploaded

How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
Adam Dunkels
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
Lidia A.
 
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptxUse Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
SynapseIndia
 
Using LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and MilvusUsing LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and Milvus
Zilliz
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
HackersList
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
Tatiana Al-Chueyr
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
Eric D. Schabell
 
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Muhammad Ali
 
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and OllamaTirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Zilliz
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
Kief Morris
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
SynapseIndia
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
Bert Blevins
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 
Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024
aakash malhotra
 
July Patch Tuesday
July Patch TuesdayJuly Patch Tuesday
July Patch Tuesday
Ivanti
 
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
Torry Harris
 
Data Integration Basics: Merging & Joining Data
Data Integration Basics: Merging & Joining DataData Integration Basics: Merging & Joining Data
Data Integration Basics: Merging & Joining Data
Safe Software
 
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
Edge AI and Vision Alliance
 
The Role of IoT in Australian Mobile App Development - PDF Guide
The Role of IoT in Australian Mobile App Development - PDF GuideThe Role of IoT in Australian Mobile App Development - PDF Guide
The Role of IoT in Australian Mobile App Development - PDF Guide
Shiv Technolabs
 
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
Priyanka Aash
 

Recently uploaded (20)

How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
 
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptxUse Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
 
Using LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and MilvusUsing LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and Milvus
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
 
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
 
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and OllamaTirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 
Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024
 
July Patch Tuesday
July Patch TuesdayJuly Patch Tuesday
July Patch Tuesday
 
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
 
Data Integration Basics: Merging & Joining Data
Data Integration Basics: Merging & Joining DataData Integration Basics: Merging & Joining Data
Data Integration Basics: Merging & Joining Data
 
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
 
The Role of IoT in Australian Mobile App Development - PDF Guide
The Role of IoT in Australian Mobile App Development - PDF GuideThe Role of IoT in Australian Mobile App Development - PDF Guide
The Role of IoT in Australian Mobile App Development - PDF Guide
 
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
 

Lying through their teeth: Identifying Translator Scammers

  • 3. • Statistics • Freelancers • Identifying scammers • Tactics scammers use • Ensuring you don’t fall prey • LSPs • Tactics scammers use • Identifying scammers • Ensuring you don’t fall prey • Fighting Back • Samples OVERVIEW
  • 4. • September 11, 2015: 3,822 scammers using 10,024 different e-mail addresses • Translator Scammers Directory • 2014 LSP Survey by J.R. Dias – 315 respondents • 86% knew of the distribution of fake CVs, 14% were not aware a CV scam existed • Reporting fake CVs: 18% yes, 32% sometimes, 50% of respondents never reported the receipt of a fake CV STATISTICS
  • 5. • Posing as an agency, using public domain • Mismatching name and e-mail username • Different “Reply-to” than “From” line • Originally sent to “Bcc” • CV Marketers or promoters • “Independent Project Manager” • Falsely identifying source of contact information • Use of improper grammar • Requesting Language Pair Information • Lack of multiple means of contact • Lack addressing the recipient directly • No project specifications FOR THE FREELANCER – IDENTIFYING
  • 6. • CV Theft • Request proof of Identification • No payment • Overpayment (more elaborate) FOR THE FREELANCER – TACTICS USED Relating to practices Other scams to be cognizant of
  • 7. • No grammatical or typographical errors • Consistent contact information on Networking and websites • Post CV in secured PDF format • Verify the IP Address • Responding to a suspected scammer • “I don't believe I've ever heard from your company before -- did someone refer you to me?” • Check http://translationethics.blogspot.se/p/blog -page.html • Check http://www.translator- scammers.com/ FOR THE FREELANCER Ensuring you don’t fall prey Ensuring you don’t get confused for a scammer
  • 8. • Deliver nothing • Deliver poor quality • Modify contact information on CVs of qualified, legitimate translators • Offer bottom-of-the-barrel rates • Unsuspecting PMs verify credentials on the legitimate translator’s profile or website and use the contact information on the fraudulent CV. • The scammer accepts the project, runs it through a public Machine Translator to translate it without post-editing. • The scammer is paid for invoiced work and disappears before his fraud is revealed. FOR LANGUAGE SERVICE PROVIDERS - TACTICS
  • 9. • To and From language pairs • Language pairs that do not match their geographic location • (don’t buy English to Norwegian from Bangladesh) • Missing contact information / e-mail only • Incorrect spelling / grammar / language register • Check document properties and make sure names match • Look for consistent contact information • Translator’s Café • Proz • ATA Directory • Regional Chapter Directory • Personal website FOR THE LSP - IDENTIFYING
  • 10. • No grammatical or typographical errors • Contact individual translators directly and no mass Bcc e-mails • Project specifics - subject matter and language pairs match the abilities of the provider. • Verify the IP Address • Contact the translator you would like to work with via contact information from a different source. • Responding to a suspected scammer • “I received your CV and I’m wondering if you’re available to…” • Check http://www.translator- scammers.com/ FOR THE LSP Ensuring you don’t fall prey Ensuring you don’t get confused for a scammer
  • 11. FIGHTING BACK • Reply to their e-mails
  • 12. FIGHTING BACK • Reply to their e-mails
  • 13. FIGHTING BACK • Get pro-active: flood the scammers’ inboxes • http://www.translator-scammers.com/translator-scammers-fightback.htm • Share the email and fraudulent CV on social media – no need to redact, they are crooks. • Forward the fraudulent email and CV to translator.scammers@gmail.com or mail@translator-scammers.com
  • 15. Alberto Jones Public domain e-mail address Lack of direct address to the recipient No project specifications Language Pairs Errant grammar IP Address: 209.85.218.68 Mountain View, CA – Google
  • 16. Mark Edels Only one method of contact Bcc From address vs. Reply-to address Public Domain in Reply-to IP Address: 173.201.193.184 Scottsdale, AZ – GoDaddy.com Language Pairs Errant grammar http://www.comfortinghome.com/
  • 17. Jimmy Mapp Errant spelling / grammar Bcc Undisclosed source of contact information Unknown language pairs “Translator and Editor Needed” “If can you edit or proofread…” Mismatched name and username Public domain
  • 18. LANGUAGE SERVICE PROVIDER SCAMMERS Samples
  • 19. Zahrawi Bottom-of-the-barrel rate Translator in Morocco for SWE>ENG Improper spelling / grammar
  • 20. Allen Superfluous fluff Bi-directional translation services Errant grammar No last name Verified scammer from http://www.translator-scammers.com/
  • 25. • http://atanet.org/business_practices/bp _listserv.php • http://www.translator-scammers.com/ • http://www.paymentpractices.net/ • http://translationethics.blogspot.se/p/bl og-page.html • http://www.jrdias.com/PDF/JRD_The_T ranslator_Scammers_Plague_Survey_ Report.pdf • Twitter: @tsdirectory • http://www.proz.com/about/translator- scam-alerts/ • https://www.linkedin.com/grps/Translati on-agencies-business-practices- 1536857/about • https://www.linkedin.com/groups/Unac ceptable-Translation-Rates-Naming- Shaming-3415770/about RESOURCES AND REFERENCES
  • 26. THANK YOU • Website: josephwojowski.com • Translation Technology Blog: josephwojowski.wordpress.com • Twitter: @ferluc666