Silence is fraud's best friend.  Word of mouth is fraud's worst enemy.  Pass the word!


About Us



Site Map

Contact us Report Email Fraud Scam Solution Center Volunteers

Custom Search

ScamSpeak Home page





Dictionary of Financial Scam Terms


List of scams (partial)


Payment Processing & other Counterfeit Draft Scams / Work at home jobs: processing payments, collections, donations, investments, forwarding checks and money orders, forwarding packages, forwarding money received by Western Union, writing and signing checks, Secret shopper jobs, forwarding cash received in packages and envelopes


Lottery Scams


Green Card Lottery Scam: Truth and Lies in simple words


FDIC Special Alerts List of Counterfeit Checks




The Fraud Victim's Manual


The Backstage Tour

Fraud secrets con artists don't want you to know!








Catching the Bad Guys:

Nigerian-style Internet scammers

Printable format


The very first thing to understand about your communications with a scam network is that nothing they have told you is true. 


The names, phone numbers, titles, addresses, documents, and stories are all lies.  The scammer is seldom even in the same location or country as he or she claims.


You are led to believe you are corresponding with only one person when the emails may come from 2 or 3 scammers all pretending to be the same person


The reverse is also true - one scammer may pose as several people (attorney, government official, minister, etc.) when in fact the emails are all from the same scammer using different email addresses.


It is not the an email address, the text of an email by itself, or the phony documents sent in any one single scam committed by the criminal network that leads to an arrest.


It is a painstakingly gathered body of evidence and hours of following leads that provide information information to obtain an arrest warrant.  The investigation can take weeks, months, or even years before sufficient evidence is gathered to indict the scammer or scammers. 

The chances of arresting your specific scammer are very slim; however, that is not true of all scammers in an organized crime network to which your scammer belongs.

NOTE: Unlike the Mafia system, depending on his level of expertise and business abilities plus associations and influences, a Nigerian-style scammer* may belong to multiple organized scam networks.

*Nigerian scammers have developed, and continue to develop, scam networks worldwide, teaching local criminals how to perpetrate Internet fraud.  Local criminals may put their own twist on a scam, but the basics remain the same, hence "Nigerian-style."

To understand the full scope of what is required to make their scams work, please read Scammer Group Activities: Methodology of the [Nigerian-style] scam.

^ Back to top


Yes, scammers do get caught by law enforcement and if your scammer contacted you by email you have one of the most potent tools available for tracking down the criminal: the email itself.


For your report to be effective, a Scam Email Report must include the Full Header, which is the path the email followed across the Internet from your scammer's computer to your computer.


Emails travel from server to server across cyberspace, and each time a server forwards an email to the next server it's called a 'hop'. 


Each hop is stamped, just like the post marks on the mail you get from the Post Office. 


Think of a letter that travels from Post Office to Post Office from South Africa to Seattle, with each Post Office placing its postmark on the envelope and you have what we read when we look at the Full Header. 

But even better than that, the first stamp can sometimes lead us to a specific address and a specific computer.

^ Back to top


Scammers have learned to play a lot of electronic games with email headers to cloak their location, so volume is important - the more emails we have in our analysis system the better. 


Please go here to learn how easy it is to file Scam Email Reports:


The steps for many email services are accompanied by screen shots.


Recruitment to join the scam group: In some instances, scammers have been known to make attempts at recruiting those they cannot turn into victims or those they have engaged in a long-standing relationship such as a romance scam. 


Should you receive emails with offers of enlisting you into the fraud ring, please contact our Law Enforcement Support Unit using not write this address for any other purpose.


Reshipper Scam victims sometimes have excellent information when they have been 'hired' to forward envelopes or find themselves performing multiple tasks for their 'boss'. 


If you are a Reshipper Scam victim, please contact our Law Enforcement Support Unit using cso@fraudaid.comDo not write this address for any other purpose.


^ Back to top


Solid information about scammers: This is a short list of what we look for:


?         Bank account numbers listed in the body of a scam email.

?         US, UK, and Canadian-based land lines.  Go here to make the determination:

?         Web site addresses listed in the body of a scam email.

?         A situation in which you personally met with the scammer within the 12 months prior to contacting us. 


WARNING!  If you have been targeted by a Nigerian or Eastern European scam, DO NOT seek out or try to arrange a face to face meeting with the scammer to provide information to law enforcement!


Scammers are well-trained criminals and will very quickly realize you are a fake.


This is dangerous to you because they are unpredictable criminals who can turn violent in heartbeat.  On top of that, without a visceral understanding of the rules of evidence you will not know what to do correctly.


^ Back to top

Baiting a criminal can be a dangerous plan so please do not play games with your scammer.  Each time you correspond with him and others in his network you risk opening your hard drive to zero hour malware or a root kit. 


Zero hour malware is a piece of malicious code that has not yet been identified by your anti-virus or anti-spy ware program developers, meaning you do not have an update to cover it and your hard drive is not protected from it.


Rarely (but it does happen) a root kit is embedded in emails and is activated by your action of opening the email.  A root kits downloads directly through your firewall and security software onto your hard drive where it can wreak havoc with your information and files.


These criminals are very nasty and far, far more experienced than you at conning people.  It's what they do all day, every day.  They will rapidly recognize your attempts at gaining information, will cease all correspondence, and may target you with malware.


^ Back to top




We are not attorneys and don't pretend to be.  In our experience, the information and guidance offered on this site have proven to be effective; however, we always recommend that you consult with an attorney.

If you have doubts about Fraud Aid, Inc. do not hesitate to contact federal (FBI, Secret Service, RCMP) Scotland Yard, or local law enforcement to check us out.

Information provided about lotteries and lottery scam: Fraud Aid, Inc. is not affiliated with any pay-to-play or free online lottery or Sweepstakes games and derives no income from any pay-to-play or free online lotteries or Sweepstakes or any of their participating sponsors with the possible exception of a sponsor's independent advertising unassociated with any drawings promotion; nor does Fraud Aid promote or sponsor any lotteries or Sweepstakes or numbers drawing of any kind.

Reporting, crime-fighting, and victim resource links

Copyright 2000 - Fraud Aid, Inc.  -  All Rights Reserved

Privacy Policy Disclaimer  Spam Policy