Click on the green box to choose your current situation

Disclaimer: We are not attorneys and don't pretend to be.

In our experience, the solutions offered in this section have proven to be effective; however, we always recommend that you consult with an attorney.

If you have doubts about Fraud Aid, do not hesitate to contact federal (FBI, Secret Service, RCMP) Scotland Yard, or local law enforcement to check us out.

 

Stay out of debt and stay out of jail:

The legal truth about work-at-home money, package, and check forwarding jobs

 

How to really verify a check

Your ID Theft Prevention To-Do List

What to do about threats from scammers

   

Attorneys: You and your attorney

Bill of Rights for victims of crime

Budget Worksheet

Burden of Proof

Catching the Bad Guys

CheckSystems

Debt Management

Debtor's Rights

Glossary: Explanations & Definitions

How to Read an Agreement

How to Really Verify a Check or Money Order

How to Write a Budget Packet Cover Letter to Creditors

How to Write a Narrative of Events: Telling your story

Identity Theft Prevention To-Do List

Know your Miranda Rights and how to use them

Police: You and Law Enforcement

Threats from scammers

You and Your Attorney

 

Catching the Bad Guys:

Nigerian-style Internet scammers

Printable format

 

The very first thing to understand about your communications with a scam network is that nothing they have told you is true. 

 

The names, phone numbers, titles, addresses, documents, and stories are all lies.  The scammer is seldom even in the same location or country as he or she claims.

 

You are led to believe you are corresponding with only one person when the emails may come from 2 or 3 scammers all pretending to be the same person

 

The reverse is also true - one scammer may pose as several people (attorney, government official, minister, etc.) when in fact the emails are all from the same scammer using different email addresses.

 

It is not the an email address, the text of an email by itself, or the phony documents sent in any one single scam committed by the criminal network that leads to an arrest.

 

It is a painstakingly gathered body of evidence and hours of following leads that provide information information to obtain an arrest warrant.  The investigation can take weeks, months, or even years before sufficient evidence is gathered to indict the scammer or scammers. 

The chances of arresting your specific scammer are very slim; however, that is not true of all scammers in an organized crime network to which your scammer belongs.

NOTE: Unlike the Mafia system, depending on his level of expertise and business abilities plus associations and influences, a Nigerian-style scammer* may belong to multiple organized scam networks.

*Nigerian scammers have developed, and continue to develop, scam networks worldwide, teaching local criminals how to perpetrate Internet fraud.  Local criminals may put their own twist on a scam, but the basics remain the same, hence "Nigerian-style."

To understand the full scope of what is required to make their scams work, please read Scammer Group Activities: Methodology of the [Nigerian-style] scam.

^ Back to top

 

Yes, scammers do get caught by law enforcement and if your scammer contacted you by email you have one of the most potent tools available for tracking down the criminal: the email itself.

 

For your report to be effective, a Scam Email Report must include the Full Header, which is the path the email followed across the Internet from your scammer's computer to your computer.

 

Emails travel from server to server across cyberspace, and each time a server forwards an email to the next server it's called a 'hop'. 

 

Each hop is stamped, just like the post marks on the mail you get from the Post Office. 

 

Think of a letter that travels from Post Office to Post Office from South Africa to Seattle, with each Post Office placing its postmark on the envelope and you have what we read when we look at the Full Header. 

But even better than that, the first stamp can sometimes lead us to a specific address and a specific computer.

^ Back to top

 

Scammers have learned to play a lot of electronic games with email headers to cloak their location, so volume is important - the more emails we have in our analysis system the better. 

 

Please go here to learn how easy it is to file Scam Email Reports: www.fraudaid.com/find_headers

 

The steps for many email services are accompanied by screen shots.

 

Recruitment to join the scam group: In some instances, scammers have been known to make attempts at recruiting those they cannot turn into victims or those they have engaged in a long-standing relationship such as a romance scam. 

 

Should you receive emails with offers of enlisting you into the fraud ring, please contact our Law Enforcement Support Unit using cso@fraudaid.com.

 

Reshipper Scam victims sometimes have excellent information when they have been 'hired' to forward envelopes or find themselves performing multiple tasks for their 'boss'. 

 

If you are a Reshipper Scam victim, please contact our Law Enforcement Support Unit using cso@fraudaid.com.

 

^ Back to top

 

Solid information about scammers: This is a short list of what we look for:

 

·         Bank account numbers listed in the body of a scam email.

·         US, UK, and Canadian-based land lines.  Go here to make the determination: www.fonefinder.net.

·         Web site addresses listed in the body of a scam email.

·         A situation in which you personally met with the scammer within the 12 months prior to contacting us. 

 

WARNING!  If you have been targeted by a Nigerian or Eastern European scam, DO NOT seek out or try to arrange a face to face meeting with the scammer to provide information to law enforcement!

 

Scammers are well-trained criminals and will very quickly realize you are a fake.

 

This is dangerous to you because they are unpredictable criminals who can turn violent in heartbeat.  On top of that, without a visceral understanding of the rules of evidence you will not know what to do correctly.

 

^ Back to top


Baiting a criminal can be a dangerous plan so please do not play games with your scammer.  Each time you correspond with him and others in his network you risk opening your hard drive to zero hour malware or a root kit. 

 

Zero hour malware is a piece of malicious code that has not yet been identified by your anti-virus or anti-spy ware program developers, meaning you do not have an update to cover it and your hard drive is not protected from it.

 

Rarely (but it does happen) a root kit is embedded in emails and is activated by your action of opening the email.  A root kits downloads directly through your firewall and security software onto your hard drive where it can wreak havoc with your information and files.

 

These criminals are very nasty and far, far more experienced than you at conning people.  It's what they do all day, every day.  They will rapidly recognize your attempts at gaining information, will cease all correspondence, and may target you with malware.

 

^ Back to top

 

 

Did your bank freeze your account and report you to ChexSystems?

NO CREDIT CHECK

Account Now®

accepts automatic deposits and features Bill Pay!

 

 

 

 

 

 

 

 

Reporting, crime-fighting, and victim resource links

Copyright ©2000-2010 Fraud Aid, Inc.  -  All Rights Reserved

Privacy Policy Disclaimer • Spam Policy