Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php

 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php

 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php

 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php Bookmark and Share
 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php Bookmark and Share
 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php Bookmark and Share
 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php Bookmark and Share
 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php Bookmark and Share
 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php Bookmark and Share
 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php Bookmark and Share
 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php Bookmark and Share
 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php Bookmark and Share
 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php Bookmark and Share
 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php Bookmark and Share
 

Recommended:
books


Recommended
AV product:

Consumer Fraud Reporting

Reporting on the Latest Frauds, Scams, Fake Lotteries, Spams and Hoaxes

index.php emailpageform.php governments.php Bookmark and Share
 

Recommended:
books


Recommended
AV product:

Scam transferts d'argent
Exemple

Avez-vous reçu un courriel ou une lettre à quelqu'un en Afrique? Est-ce que cette personne disent que leur mari ou leur père est mort et a laissé une grosse somme d'argent? Maintenant, cette personne est en train de mourir d'un cancer et a besoin de votre aide pour récupérer l'argent. Ils veulent que vous preniez une grande partie de l'argent pour vous-même ou de l'utiliser pour la charité.

Mais vous devez les aider à récupérer l'argent de la "société de sécurité". Et il peut y avoir des "honoraires", de taxes ou autres coûts impliqués que vous devez payer. Vous êtes priés d'envoyer de l'argent par l'Union occidentale.

Il s'agit d'une escroquerie. Voir ci-dessous pour un exemple et détails:

Bien sûr, il s'agit d'une escroquerie.  Ne répondez pas à celui-ci.

Si vous souhaitez une explication pas à pas de la façon dont ce type de "Advance Fee Fraud", cliquez ici!


Scam e-mail de "Rindra HENINTSOA"

Antananarivo, le 23 Fevrier 2008 

Monsieur / Madame 

Salutation,  

J'ai l'honneur de solliciter de votre bien veillance de bien vouloir m'accorder quelques instants. 

J'ai vu par hasard sur le Net votre adresse et j'aimerai vous poser quelques questions sur le fraude sur le web. 

Voilà: j'ai reçu recemment un mail venant d'une femme qui est philippienne , elle m'a offert un bien de famille qui est déposé dans une compagnie en Cote d'Ivoire qui se nomme: "Compagnie Ivoirienne de Sécurité Privée"ou CISP. 

J'ai déjà fait quelques recherches sur la Compagnie et il se trouve qu'elle existe sur le Net, les numeros de telephone, fax et le site web correspondent parfaitement à l'adresse que la femme m'a envoyé dans ses dossiers. 

Mais , en ce moment , j'ai quelques doutes; pour que ce bien soit transféré à mon nom et livré dans mon Pays,je dois payer avant une somme de 750USD

Est-ce que vous pouvez me dire si la Compagnie existe  vraiment,ou  si c'est un arnaque. 

Quels sont les procedures que je devrais suivre dans ce cas là

 Dans l'attente d'une reponse de votre part , je vous remercie déjà.J'ai vraiment besoin de votre aide pour illucider cet affaire.  


Répondre:

S'il vous plaît le pardon des erreurs grammaticales, car il s'agit d'une traduction générée par ordinateur:

Oui, c'est vraiment une arnaque. Il est très fréquent. Une personne écrit, en disant la posséder une grosse somme d'argent d'un héritage. L'argent est détenu par une "entreprise de sécurité". L'escroc a besoin de vous pour recevoir les fonds dans un pays étranger. Mais vous devez payer certains frais de libérer l'argent. Il vous sera demandé d'envoyer de l'argent par Western Union ».

Vous envoyer de l'argent. Vous n'aurez jamais le voir à nouveau. Mais vous pouvez l'entendre à nouveau l'escroc. L'escroc va maintenant demander plus d'argent, pour d'autres frais, les taxes ou pots-de-vin à un fonctionnaire.

Il n'est rien d'autre qu'une arnaque.

 



 


Copyright CFR 2005, 2006, 2007, 2008, 2009, 2010  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005, 2006, 2007, 2008, 2009, 2010  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005, 2006, 2007, 2008, 2009, 2010  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005, 2006, 2007, 2008, 2009, 2010  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005, 2006, 2007, 2008, 2009, 2010  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005-2013  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005-2013  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005-2013  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005-2013  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005-2013  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005-2013  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005-2013  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005-2013  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005-2013  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at:

 

 


Copyright CFR 2005-2013  - Definition of scam, fraud, etc.Legal disclaimer / corrections / complaints  -  Privacy Policy
Names used by scammers in the examples on this page and others often belong to real people and businesses who often have no knowledge of nor connection to the scammer's use of their name and information.  Sample scam emails and other documents are copies of the scam to help potential victims recognize and avoid it.  You should presume that any names used and presented here in a scam are either fictitious or used without their legitimate owner's permission.
Email us at: