SlideShare a Scribd company logo
Identifying translator scams
LYING THROUGH THEIR TEETH
UNITED BANK AFRICA
• Statistics
• Freelancers
• Identifying scammers
• Tactics scammers use
• Ensuring you don’t fall prey
• LSPs
• Tactics scammers use
• Identifying scammers
• Ensuring you don’t fall prey
• Fighting Back
• Samples
OVERVIEW
• September 11, 2015: 3,822 scammers
using 10,024 different e-mail
addresses
• Translator Scammers Directory
• 2014 LSP Survey by J.R. Dias – 315
respondents
• 86% knew of the distribution of fake
CVs, 14% were not aware a CV scam
existed
• Reporting fake CVs: 18% yes, 32%
sometimes, 50% of respondents
never reported the receipt of a fake
CV
STATISTICS
• Posing as an agency, using public
domain
• Mismatching name and e-mail
username
• Different “Reply-to” than “From” line
• Originally sent to “Bcc”
• CV Marketers or promoters
• “Independent Project Manager”
• Falsely identifying source of contact
information
• Use of improper grammar
• Requesting Language Pair Information
• Lack of multiple means of contact
• Lack addressing the recipient directly
• No project specifications
FOR THE FREELANCER – IDENTIFYING
• CV Theft
• Request proof of Identification
• No payment
• Overpayment (more elaborate)
FOR THE FREELANCER – TACTICS USED
Relating to practices Other scams to be cognizant of
• No grammatical or typographical errors
• Consistent contact information on
Networking and websites
• Post CV in secured PDF format
• Verify the IP Address
• Responding to a suspected scammer
• “I don't believe I've ever heard from
your company before -- did
someone refer you to me?”
• Check
http://translationethics.blogspot.se/p/blog
-page.html
• Check http://www.translator-
scammers.com/
FOR THE FREELANCER
Ensuring you don’t fall prey Ensuring you don’t get confused for a scammer
• Deliver nothing
• Deliver poor quality
• Modify contact information on CVs of
qualified, legitimate translators
• Offer bottom-of-the-barrel rates
• Unsuspecting PMs verify credentials
on the legitimate translator’s profile or
website and use the contact
information on the fraudulent CV.
• The scammer accepts the project, runs
it through a public Machine Translator
to translate it without post-editing.
• The scammer is paid for invoiced work
and disappears before his fraud is
revealed.
FOR LANGUAGE SERVICE PROVIDERS - TACTICS
• To and From language pairs
• Language pairs that do not match their
geographic location
• (don’t buy English to Norwegian
from Bangladesh)
• Missing contact information / e-mail
only
• Incorrect spelling / grammar /
language register
• Check document properties and make
sure names match
• Look for consistent contact information
• Translator’s Café
• Proz
• ATA Directory
• Regional Chapter Directory
• Personal website
FOR THE LSP - IDENTIFYING
• No grammatical or typographical errors
• Contact individual translators directly
and no mass Bcc e-mails
• Project specifics - subject matter and
language pairs match the abilities of
the provider.
• Verify the IP Address
• Contact the translator you would like to
work with via contact information from a
different source.
• Responding to a suspected scammer
• “I received your CV and I’m
wondering if you’re available to…”
• Check http://www.translator-
scammers.com/
FOR THE LSP
Ensuring you don’t fall prey Ensuring you don’t get confused for a scammer
FIGHTING BACK
• Reply to their e-mails
FIGHTING BACK
• Reply to their e-mails
FIGHTING BACK
• Get pro-active: flood the scammers’ inboxes
• http://www.translator-scammers.com/translator-scammers-fightback.htm
• Share the email and fraudulent CV on social media – no need to redact, they are crooks.
• Forward the fraudulent email and CV to translator.scammers@gmail.com or
mail@translator-scammers.com
FREELANCE TRANSLATOR SCAMMERS
Samples
Alberto Jones
Public domain e-mail address
Lack of direct address to the recipient
No project specifications
Language Pairs
Errant grammar
IP Address: 209.85.218.68
Mountain View, CA – Google
Mark Edels
Only one method of contact
Bcc
From address vs. Reply-to address
Public Domain in Reply-to
IP Address: 173.201.193.184
Scottsdale, AZ – GoDaddy.com
Language Pairs
Errant grammar
http://www.comfortinghome.com/
Jimmy Mapp
Errant spelling / grammar
Bcc
Undisclosed source of contact information
Unknown language pairs
“Translator and Editor Needed”
“If can you edit or proofread…”
Mismatched name and username
Public domain
LANGUAGE SERVICE PROVIDER SCAMMERS
Samples
Zahrawi
Bottom-of-the-barrel rate
Translator in Morocco for SWE>ENG
Improper spelling / grammar
Allen
Superfluous fluff
Bi-directional translation services
Errant grammar
No last name
Verified scammer from
http://www.translator-scammers.com/
CHRISTINA ZHAO
CHRISTINA ZHAO
LILIANA SILVA
LILIANA SILVA
• http://atanet.org/business_practices/bp
_listserv.php
• http://www.translator-scammers.com/
• http://www.paymentpractices.net/
• http://translationethics.blogspot.se/p/bl
og-page.html
• http://www.jrdias.com/PDF/JRD_The_T
ranslator_Scammers_Plague_Survey_
Report.pdf
• Twitter: @tsdirectory
• http://www.proz.com/about/translator-
scam-alerts/
• https://www.linkedin.com/grps/Translati
on-agencies-business-practices-
1536857/about
• https://www.linkedin.com/groups/Unac
ceptable-Translation-Rates-Naming-
Shaming-3415770/about
RESOURCES AND REFERENCES
THANK YOU
• Website: josephwojowski.com
• Translation Technology Blog: josephwojowski.wordpress.com
• Twitter: @ferluc666

More Related Content

Similar to Lying through their teeth: Identifying Translator Scammers

Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
GrittyCC
 
Phishing
PhishingPhishing
Phishing
Sagar Rai
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
ShreyaKushwaha28
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
Rajesh Soundararajan
 
phishing technique.pptx
phishing technique.pptxphishing technique.pptx
phishing technique.pptx
ECE6054PRIYADHARSHIN
 
Customer Relationship Management (CRM) and The Real Estate Professional
Customer Relationship Management (CRM) and The Real Estate ProfessionalCustomer Relationship Management (CRM) and The Real Estate Professional
Customer Relationship Management (CRM) and The Real Estate Professional
IXACT Contact
 
Bad Email-Final_1_2_14.pptx
Bad Email-Final_1_2_14.pptxBad Email-Final_1_2_14.pptx
Bad Email-Final_1_2_14.pptx
GEETHA LATHA
 
Contact Center Authentication
Contact Center AuthenticationContact Center Authentication
Contact Center Authentication
Kelley Robinson
 
phishing.pptx
phishing.pptxphishing.pptx
phishing.pptx
ReenuMariaBinoy1
 
Information security training Phishing
Information security training PhishingInformation security training Phishing
Information security training Phishing
Atl Edu
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Steve Poole
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
aleeya91
 
Fraud Awareness NC
Fraud Awareness NCFraud Awareness NC
Fraud Awareness NC
EmilyMoar
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
ConnectSafely
 
Email phishing and its effect on your marketing campaign
Email phishing and its effect on your marketing campaignEmail phishing and its effect on your marketing campaign
Email phishing and its effect on your marketing campaign
Sherin Thomas
 
Fraud Awareness for NC Students
Fraud Awareness for NC StudentsFraud Awareness for NC Students
Fraud Awareness for NC Students
EmilyMoar
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
Michele Chubirka
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
harpinderkaur123
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
Avishek Datta
 
Phis
PhisPhis

Similar to Lying through their teeth: Identifying Translator Scammers (20)

Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
 
Phishing
PhishingPhishing
Phishing
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
phishing technique.pptx
phishing technique.pptxphishing technique.pptx
phishing technique.pptx
 
Customer Relationship Management (CRM) and The Real Estate Professional
Customer Relationship Management (CRM) and The Real Estate ProfessionalCustomer Relationship Management (CRM) and The Real Estate Professional
Customer Relationship Management (CRM) and The Real Estate Professional
 
Bad Email-Final_1_2_14.pptx
Bad Email-Final_1_2_14.pptxBad Email-Final_1_2_14.pptx
Bad Email-Final_1_2_14.pptx
 
Contact Center Authentication
Contact Center AuthenticationContact Center Authentication
Contact Center Authentication
 
phishing.pptx
phishing.pptxphishing.pptx
phishing.pptx
 
Information security training Phishing
Information security training PhishingInformation security training Phishing
Information security training Phishing
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Fraud Awareness NC
Fraud Awareness NCFraud Awareness NC
Fraud Awareness NC
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
Email phishing and its effect on your marketing campaign
Email phishing and its effect on your marketing campaignEmail phishing and its effect on your marketing campaign
Email phishing and its effect on your marketing campaign
 
Fraud Awareness for NC Students
Fraud Awareness for NC StudentsFraud Awareness for NC Students
Fraud Awareness for NC Students
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
Phis
PhisPhis
Phis
 

Recently uploaded

Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
Mydbops
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
manji sharman06
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 

Recently uploaded (20)

Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 

Lying through their teeth: Identifying Translator Scammers

  • 3. • Statistics • Freelancers • Identifying scammers • Tactics scammers use • Ensuring you don’t fall prey • LSPs • Tactics scammers use • Identifying scammers • Ensuring you don’t fall prey • Fighting Back • Samples OVERVIEW
  • 4. • September 11, 2015: 3,822 scammers using 10,024 different e-mail addresses • Translator Scammers Directory • 2014 LSP Survey by J.R. Dias – 315 respondents • 86% knew of the distribution of fake CVs, 14% were not aware a CV scam existed • Reporting fake CVs: 18% yes, 32% sometimes, 50% of respondents never reported the receipt of a fake CV STATISTICS
  • 5. • Posing as an agency, using public domain • Mismatching name and e-mail username • Different “Reply-to” than “From” line • Originally sent to “Bcc” • CV Marketers or promoters • “Independent Project Manager” • Falsely identifying source of contact information • Use of improper grammar • Requesting Language Pair Information • Lack of multiple means of contact • Lack addressing the recipient directly • No project specifications FOR THE FREELANCER – IDENTIFYING
  • 6. • CV Theft • Request proof of Identification • No payment • Overpayment (more elaborate) FOR THE FREELANCER – TACTICS USED Relating to practices Other scams to be cognizant of
  • 7. • No grammatical or typographical errors • Consistent contact information on Networking and websites • Post CV in secured PDF format • Verify the IP Address • Responding to a suspected scammer • “I don't believe I've ever heard from your company before -- did someone refer you to me?” • Check http://translationethics.blogspot.se/p/blog -page.html • Check http://www.translator- scammers.com/ FOR THE FREELANCER Ensuring you don’t fall prey Ensuring you don’t get confused for a scammer
  • 8. • Deliver nothing • Deliver poor quality • Modify contact information on CVs of qualified, legitimate translators • Offer bottom-of-the-barrel rates • Unsuspecting PMs verify credentials on the legitimate translator’s profile or website and use the contact information on the fraudulent CV. • The scammer accepts the project, runs it through a public Machine Translator to translate it without post-editing. • The scammer is paid for invoiced work and disappears before his fraud is revealed. FOR LANGUAGE SERVICE PROVIDERS - TACTICS
  • 9. • To and From language pairs • Language pairs that do not match their geographic location • (don’t buy English to Norwegian from Bangladesh) • Missing contact information / e-mail only • Incorrect spelling / grammar / language register • Check document properties and make sure names match • Look for consistent contact information • Translator’s Café • Proz • ATA Directory • Regional Chapter Directory • Personal website FOR THE LSP - IDENTIFYING
  • 10. • No grammatical or typographical errors • Contact individual translators directly and no mass Bcc e-mails • Project specifics - subject matter and language pairs match the abilities of the provider. • Verify the IP Address • Contact the translator you would like to work with via contact information from a different source. • Responding to a suspected scammer • “I received your CV and I’m wondering if you’re available to…” • Check http://www.translator- scammers.com/ FOR THE LSP Ensuring you don’t fall prey Ensuring you don’t get confused for a scammer
  • 11. FIGHTING BACK • Reply to their e-mails
  • 12. FIGHTING BACK • Reply to their e-mails
  • 13. FIGHTING BACK • Get pro-active: flood the scammers’ inboxes • http://www.translator-scammers.com/translator-scammers-fightback.htm • Share the email and fraudulent CV on social media – no need to redact, they are crooks. • Forward the fraudulent email and CV to translator.scammers@gmail.com or mail@translator-scammers.com
  • 15. Alberto Jones Public domain e-mail address Lack of direct address to the recipient No project specifications Language Pairs Errant grammar IP Address: 209.85.218.68 Mountain View, CA – Google
  • 16. Mark Edels Only one method of contact Bcc From address vs. Reply-to address Public Domain in Reply-to IP Address: 173.201.193.184 Scottsdale, AZ – GoDaddy.com Language Pairs Errant grammar http://www.comfortinghome.com/
  • 17. Jimmy Mapp Errant spelling / grammar Bcc Undisclosed source of contact information Unknown language pairs “Translator and Editor Needed” “If can you edit or proofread…” Mismatched name and username Public domain
  • 18. LANGUAGE SERVICE PROVIDER SCAMMERS Samples
  • 19. Zahrawi Bottom-of-the-barrel rate Translator in Morocco for SWE>ENG Improper spelling / grammar
  • 20. Allen Superfluous fluff Bi-directional translation services Errant grammar No last name Verified scammer from http://www.translator-scammers.com/
  • 25. • http://atanet.org/business_practices/bp _listserv.php • http://www.translator-scammers.com/ • http://www.paymentpractices.net/ • http://translationethics.blogspot.se/p/bl og-page.html • http://www.jrdias.com/PDF/JRD_The_T ranslator_Scammers_Plague_Survey_ Report.pdf • Twitter: @tsdirectory • http://www.proz.com/about/translator- scam-alerts/ • https://www.linkedin.com/grps/Translati on-agencies-business-practices- 1536857/about • https://www.linkedin.com/groups/Unac ceptable-Translation-Rates-Naming- Shaming-3415770/about RESOURCES AND REFERENCES
  • 26. THANK YOU • Website: josephwojowski.com • Translation Technology Blog: josephwojowski.wordpress.com • Twitter: @ferluc666