SlideShare a Scribd company logo
Origin of Scam Caroline,USA
Top 10 Types of scams Advance charge loans Big Business opportunities  False Checks  Internet: Common Commodities  Internet: Auctions  Lotteries  Nigerian Funds Offers  Prize/free gifts  Phishing  Sweetheart Swindles
Origin Of Scam-Overview:  Scam Scammers location Scammers goal Password scam Reporting scam
Scam:  The word “scam” is a quite new addition to the modern English language. Its genesis is not completely clear, but researchers have traced its first recorded and use in a publication to an article that came in TIME magazine (1963).  419 scam origin is debated. Several critics believe that the scam first was introduced to Nigeria by Nigerian petroleum companies and some criminal gangs in 1970s or 1980s. There are others who assume that the scam was a combination of different frauds in the Igboland region, some hundreds of years old.
         Scammers location
Scammers location: The first“scam” involved profitable oil contracts and other interrelated frauds. Until about 2001, the scammers were to be found primarily in Aba, Owerri, Lagos, Port Harcourt and Nigeria.  The scammers have lately set up their base in many countries moreover Nigeria, including Togo, the Ivory Coast, the Netherlands, the United Kingdom, and Canada. Nigerian money transfer fraud is the other name for Nigerian scam or 419 scam. They are associated in the public mind with Nigeria due to the increase of such confidence tricks from Nigeria since the mid-eighties, although they are often carried out in other African nations, and increasingly from European cities with large Nigerian populations, notably London and Amsterdam.
Scammers goal: The goal of the scammers is to cheat the victim into thinking that he or she has been singled out to contribute in a very profitable although questionable -- arrangement.  The intended victim is at peace of the authenticity of the arrangement by fake or false documents bearing apparently official Nigerian government letterhead, seals, as well as phony letters of credit, payment schedules and bank drafts.  The scammer may even found the credibility of his contacts, and thereby his influence, by arranging a meeting between the victim and "government officials" in real or counterfeit government offices.
Password scam: At first the scammers obtain account addresses. Then they use computer scripts to make passwords using words commonly found in the dictionary and work with that passwords in the hope of finding one that lets them in. When a password (working) is found, they go about the nefarious business of grabbing your contacts from the host service and sending out the kind of messages that your contacts received.  Depending on the kinds of service, they can also forward messages to a different account. There are different strategies for creating and recollecting passwords. People often substitute characters for letters @ for A, ! for L and $ for S etc. To overcome this, choose the password field, click and hold on the 1Password button that appears in your browser, and select Strong Password Generator.
Reporting scam
Reporting scam: Originally, the scammers contacted heads of companies and church officials; however, the use of scam email and instant messaging for the initial contacts has led to many private citizens also being targeted, as the cost to the scammers to make initial contact was much lower. The process of reporting scams is actually quite simple. There are several government and independent organizations devoted to putting a stop to internet scams. They depend on people reporting scams in order to fight internet scammers. If an email is received which proposes a business proposition from Nigeria or Wealthy Nigerian royalty in need of temporary cash, this is called a 419 scam. Start reporting fraud and scams pertinent to the 419 scams by contacting Fraudaid.com.
Reporting scam: The United States Federal Trade Commission has issued a Consumer Alert (http://www.ftc.gov/bcp/conline/pubs/alerts/nigeralrt.htm) about the Nigerian spam(scam). It states: "If you receive an offer via nigerian mail (email) from someone claiming to need your help getting money out of Nigeria — or any other country, for that matter — forward it to the FTC at spam@uce.gov.
Scam Related Books: Crimes Of Persuasion Computer Idio’t Guide FRAUD-How To Protect Oneself From Scam Scam Proof-Your Life
Crimes Of Persuasion: Author:LesHenderson Publication date: 2003-05-13  Release Date: 2003-05-17  Title:Schemes, Scams, Frauds Description:The crimes of persuasion tells about how can Artists will steal your savings and inheritance through telemarketing fraud,Investment schemes and consumer scames.It effectively be taken to minimize the impact on its victims and ensure that adequate penalties are in place to deter the perpetrators.
Computer Idio’t Guide: Author:DuaneSwierczynski Publication Date:ecember 17, 2002 by Alpha  Release Date:January 30,2003  Title:Frauds,Scams,Cons Description:Ithepls to avoid latest scams including identity theft and internet schemes and up-to-date advice on how you can protect yourself from unscrupulous cons of every conceivable stripe.It can be updated yearly, if necessary, to expose all the latest schemes.
FRAUD-How To Protect From Scams : Author:MarshaBertrand Publication Date:December 10,2009  Title:Scams,swindle,scams Description:It describes how to protect yourself from schemes, scams and swindles.Phishing, Spoofing, ID Theft, Nigerian Advance Schemes Investment Frauds: How to Recognize And Avoid Rip-Offs In The Internet Age
Scam Proof-Your Life: Author:SidKirchheimer Publication Date:Febrauary 2007 Title:Scamproofs,Ripoffs Description:Smart Ways to Protect You & Your Family from Ripoffs, Bogus Deals & Other Consumer Headaches and your healthcare bills to shielding yourself from the growing number of international financial scams, this book is not just a reference: it's an education!

More Related Content

What's hot

Sim swapping
Sim swappingSim swapping
Sim swapping
lalakis2001
 
What is sim swipe fraud
What is sim swipe fraudWhat is sim swipe fraud
What is sim swipe fraud
CyberSangam
 
4 Most Common Financial Crimes To Protect Against
4 Most Common Financial Crimes To Protect Against4 Most Common Financial Crimes To Protect Against
4 Most Common Financial Crimes To Protect Against
Veriti Consulting LLC
 
Digital Banking Fraud
Digital Banking FraudDigital Banking Fraud
Digital Banking Fraud
Victoria Cao
 
Be Careful - Prevent Your Sim Card from Getting Cloned
Be Careful - Prevent Your Sim Card from Getting ClonedBe Careful - Prevent Your Sim Card from Getting Cloned
Be Careful - Prevent Your Sim Card from Getting Cloned
David Stoffel
 
The Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudThe Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire Fraud
Michael Holden
 
Troam business proposal
Troam business proposal Troam business proposal
Troam business proposal
Remo Correya
 
Fraudulent bank wiring
Fraudulent bank wiringFraudulent bank wiring
Abc of hoax site investigation
Abc of hoax site investigationAbc of hoax site investigation
Abc of hoax site investigation
FrankSobotka
 

What's hot (9)

Sim swapping
Sim swappingSim swapping
Sim swapping
 
What is sim swipe fraud
What is sim swipe fraudWhat is sim swipe fraud
What is sim swipe fraud
 
4 Most Common Financial Crimes To Protect Against
4 Most Common Financial Crimes To Protect Against4 Most Common Financial Crimes To Protect Against
4 Most Common Financial Crimes To Protect Against
 
Digital Banking Fraud
Digital Banking FraudDigital Banking Fraud
Digital Banking Fraud
 
Be Careful - Prevent Your Sim Card from Getting Cloned
Be Careful - Prevent Your Sim Card from Getting ClonedBe Careful - Prevent Your Sim Card from Getting Cloned
Be Careful - Prevent Your Sim Card from Getting Cloned
 
The Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire FraudThe Ramblings of a Title Man - Wire Fraud
The Ramblings of a Title Man - Wire Fraud
 
Troam business proposal
Troam business proposal Troam business proposal
Troam business proposal
 
Fraudulent bank wiring
Fraudulent bank wiringFraudulent bank wiring
Fraudulent bank wiring
 
Abc of hoax site investigation
Abc of hoax site investigationAbc of hoax site investigation
Abc of hoax site investigation
 

Similar to Origin o fscam

Features of-scam
Features of-scamFeatures of-scam
Features of-scam
Caroline Rose
 
cot-2022.pptx
cot-2022.pptxcot-2022.pptx
cot-2022.pptx
angelosoriano12
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
Shred Station
 
Unveiling the Threat How to Recognize and Report Crypto Scams
Unveiling the Threat  How to Recognize and Report Crypto ScamsUnveiling the Threat  How to Recognize and Report Crypto Scams
Unveiling the Threat How to Recognize and Report Crypto Scams
Mike Bike
 
Internet Scams, Identity Theft And
Internet Scams, Identity Theft AndInternet Scams, Identity Theft And
Internet Scams, Identity Theft And
Corey Quinn
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
Harold Stallard
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
Dixita S
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
N F
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
srishtig993
 
Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communication
Rosetta
 
Abusing the Internet of Things.pdf
Abusing the Internet of Things.pdfAbusing the Internet of Things.pdf
Abusing the Internet of Things.pdf
M. R.
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
- Mark - Fullbright
 
Identity Theft 101
Identity Theft 101Identity Theft 101
Identity Theft 101
BestIDTheftCompanys.com
 
Understanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsUnderstanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminals
SARON MESSEMBE OBIA
 
Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
Quicken Loans Zing Blog
 

Similar to Origin o fscam (16)

Features of-scam
Features of-scamFeatures of-scam
Features of-scam
 
cot-2022.pptx
cot-2022.pptxcot-2022.pptx
cot-2022.pptx
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
 
Unveiling the Threat How to Recognize and Report Crypto Scams
Unveiling the Threat  How to Recognize and Report Crypto ScamsUnveiling the Threat  How to Recognize and Report Crypto Scams
Unveiling the Threat How to Recognize and Report Crypto Scams
 
Internet Scams, Identity Theft And
Internet Scams, Identity Theft AndInternet Scams, Identity Theft And
Internet Scams, Identity Theft And
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communication
 
Abusing the Internet of Things.pdf
Abusing the Internet of Things.pdfAbusing the Internet of Things.pdf
Abusing the Internet of Things.pdf
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Identity Theft 101
Identity Theft 101Identity Theft 101
Identity Theft 101
 
Understanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsUnderstanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminals
 
Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 

Recently uploaded

Acolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdfAcolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdf
46adnanshahzad
 
What Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s InvasionWhat Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s Invasion
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
MAGNA CARTA (minimum 40 characters required)
MAGNA CARTA (minimum 40 characters required)MAGNA CARTA (minimum 40 characters required)
MAGNA CARTA (minimum 40 characters required)
Filippo64
 
Gabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary JudgmentGabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary Judgment
Abdul-Hakim Shabazz
 
EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023
El Estrecho Digital
 
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
CIkumparan
 
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdfLetter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
bhavenpr
 
Essential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptxEssential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptx
Pragencyuk
 
Hindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release nowHindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release now
hindustaninsider22
 

Recently uploaded (9)

Acolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdfAcolyte Episodes review (TV series)..pdf
Acolyte Episodes review (TV series)..pdf
 
What Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s InvasionWhat Ukraine Has Lost During Russia’s Invasion
What Ukraine Has Lost During Russia’s Invasion
 
MAGNA CARTA (minimum 40 characters required)
MAGNA CARTA (minimum 40 characters required)MAGNA CARTA (minimum 40 characters required)
MAGNA CARTA (minimum 40 characters required)
 
Gabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary JudgmentGabriel Whitley's Motion Summary Judgment
Gabriel Whitley's Motion Summary Judgment
 
EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023EED - The Container Port PERFORMANCE INDEX 2023
EED - The Container Port PERFORMANCE INDEX 2023
 
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf 2015pmkemenhub163.pdf
 
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdfLetter-from-ECI-to-MeiTY-21st-march-2024.pdf
Letter-from-ECI-to-MeiTY-21st-march-2024.pdf
 
Essential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptxEssential Tools for Modern PR Business .pptx
Essential Tools for Modern PR Business .pptx
 
Hindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release nowHindustan Insider 2nd edition release now
Hindustan Insider 2nd edition release now
 

Origin o fscam

  • 1. Origin of Scam Caroline,USA
  • 2. Top 10 Types of scams Advance charge loans Big Business opportunities False Checks Internet: Common Commodities Internet: Auctions Lotteries Nigerian Funds Offers Prize/free gifts Phishing Sweetheart Swindles
  • 3. Origin Of Scam-Overview: Scam Scammers location Scammers goal Password scam Reporting scam
  • 4. Scam: The word “scam” is a quite new addition to the modern English language. Its genesis is not completely clear, but researchers have traced its first recorded and use in a publication to an article that came in TIME magazine (1963). 419 scam origin is debated. Several critics believe that the scam first was introduced to Nigeria by Nigerian petroleum companies and some criminal gangs in 1970s or 1980s. There are others who assume that the scam was a combination of different frauds in the Igboland region, some hundreds of years old.
  • 5. Scammers location
  • 6. Scammers location: The first“scam” involved profitable oil contracts and other interrelated frauds. Until about 2001, the scammers were to be found primarily in Aba, Owerri, Lagos, Port Harcourt and Nigeria. The scammers have lately set up their base in many countries moreover Nigeria, including Togo, the Ivory Coast, the Netherlands, the United Kingdom, and Canada. Nigerian money transfer fraud is the other name for Nigerian scam or 419 scam. They are associated in the public mind with Nigeria due to the increase of such confidence tricks from Nigeria since the mid-eighties, although they are often carried out in other African nations, and increasingly from European cities with large Nigerian populations, notably London and Amsterdam.
  • 7. Scammers goal: The goal of the scammers is to cheat the victim into thinking that he or she has been singled out to contribute in a very profitable although questionable -- arrangement. The intended victim is at peace of the authenticity of the arrangement by fake or false documents bearing apparently official Nigerian government letterhead, seals, as well as phony letters of credit, payment schedules and bank drafts. The scammer may even found the credibility of his contacts, and thereby his influence, by arranging a meeting between the victim and "government officials" in real or counterfeit government offices.
  • 8. Password scam: At first the scammers obtain account addresses. Then they use computer scripts to make passwords using words commonly found in the dictionary and work with that passwords in the hope of finding one that lets them in. When a password (working) is found, they go about the nefarious business of grabbing your contacts from the host service and sending out the kind of messages that your contacts received. Depending on the kinds of service, they can also forward messages to a different account. There are different strategies for creating and recollecting passwords. People often substitute characters for letters @ for A, ! for L and $ for S etc. To overcome this, choose the password field, click and hold on the 1Password button that appears in your browser, and select Strong Password Generator.
  • 10. Reporting scam: Originally, the scammers contacted heads of companies and church officials; however, the use of scam email and instant messaging for the initial contacts has led to many private citizens also being targeted, as the cost to the scammers to make initial contact was much lower. The process of reporting scams is actually quite simple. There are several government and independent organizations devoted to putting a stop to internet scams. They depend on people reporting scams in order to fight internet scammers. If an email is received which proposes a business proposition from Nigeria or Wealthy Nigerian royalty in need of temporary cash, this is called a 419 scam. Start reporting fraud and scams pertinent to the 419 scams by contacting Fraudaid.com.
  • 11. Reporting scam: The United States Federal Trade Commission has issued a Consumer Alert (http://www.ftc.gov/bcp/conline/pubs/alerts/nigeralrt.htm) about the Nigerian spam(scam). It states: "If you receive an offer via nigerian mail (email) from someone claiming to need your help getting money out of Nigeria — or any other country, for that matter — forward it to the FTC at spam@uce.gov.
  • 12. Scam Related Books: Crimes Of Persuasion Computer Idio’t Guide FRAUD-How To Protect Oneself From Scam Scam Proof-Your Life
  • 13. Crimes Of Persuasion: Author:LesHenderson Publication date: 2003-05-13 Release Date: 2003-05-17 Title:Schemes, Scams, Frauds Description:The crimes of persuasion tells about how can Artists will steal your savings and inheritance through telemarketing fraud,Investment schemes and consumer scames.It effectively be taken to minimize the impact on its victims and ensure that adequate penalties are in place to deter the perpetrators.
  • 14. Computer Idio’t Guide: Author:DuaneSwierczynski Publication Date:ecember 17, 2002 by Alpha Release Date:January 30,2003 Title:Frauds,Scams,Cons Description:Ithepls to avoid latest scams including identity theft and internet schemes and up-to-date advice on how you can protect yourself from unscrupulous cons of every conceivable stripe.It can be updated yearly, if necessary, to expose all the latest schemes.
  • 15. FRAUD-How To Protect From Scams : Author:MarshaBertrand Publication Date:December 10,2009 Title:Scams,swindle,scams Description:It describes how to protect yourself from schemes, scams and swindles.Phishing, Spoofing, ID Theft, Nigerian Advance Schemes Investment Frauds: How to Recognize And Avoid Rip-Offs In The Internet Age
  • 16. Scam Proof-Your Life: Author:SidKirchheimer Publication Date:Febrauary 2007 Title:Scamproofs,Ripoffs Description:Smart Ways to Protect You & Your Family from Ripoffs, Bogus Deals & Other Consumer Headaches and your healthcare bills to shielding yourself from the growing number of international financial scams, this book is not just a reference: it's an education!