0% found this document useful (0 votes)
156 views

SCAM (Muet)

This document discusses scams and scammers. It defines a scam as a fraudulent business or scheme that takes money or goods from unsuspecting people. A scammer is the person who commits fraud. The document outlines the typical steps scammers use: 1) devising a deceptive plan, 2) targeting potential victims, 3) initiating contact with a sales pitch or "hook", 4) engaging potential victims, and 5) turning engaged targets into victims. It advises cutting off communications with suspicious people, asking questions, being aware of common scammer tactics, and keeping personal information secret to overcome scammers.

Uploaded by

Muhammad Fahmi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
156 views

SCAM (Muet)

This document discusses scams and scammers. It defines a scam as a fraudulent business or scheme that takes money or goods from unsuspecting people. A scammer is the person who commits fraud. The document outlines the typical steps scammers use: 1) devising a deceptive plan, 2) targeting potential victims, 3) initiating contact with a sales pitch or "hook", 4) engaging potential victims, and 5) turning engaged targets into victims. It advises cutting off communications with suspicious people, asking questions, being aware of common scammer tactics, and keeping personal information secret to overcome scammers.

Uploaded by

Muhammad Fahmi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

SCAM

FAHMI| MUET
WHAT IS SCAM/SCAMMER?
SCAM IS A TERM THAT DESCRIBES ANY FRAUDULENT
BUSINESS OR SCHEME THAT TAKES MONEY OR OTHER
GOODS FROM AN UNSUSPECTING PERSON. WITH THE WORLD
BECOMING MORE CONNECTED THANKS TO THE INTERNET,
ONLINE SCAMS HAVE INCREASED, AND IT'S OFTEN UP TO YOU
TO HELP STAY CAUTIOUS WITH PEOPLE ON THE INTERNET.

SCAMMER IS A PERSON WHO COMMITS FRAUD OR


PARTICIPATES IN A DISHONEST SCHEME

HOW SCAMMER SCAM?


1. It starts with a devious plan.

A scammer is a liar and a thief, make no mistake about it.

The scammers “tool” is trickery, deceit, lies, and a plan (a scheme). It


takes the form of a message, with the promise of something very
special that people want—money, a job, riches, love. Once he or she
has a scheme, they're ready to launch their fraud on the world.

PAGE 1
2. Add targets (potential victims).

A scam involves two people—the scammer and


a target, a potential victim. Almost anyone can be a target at any time
for fraud of some kind.

Consider yourself a target for a scammer right now. One day and
maybe soon, you’ll likely be talking to a scammer, getting a message
from one, or reading a fraudulent email or letter.

Just remember that being a target is not the same as being a victim. If
you can sniff out the scam while it’s unfolding, you can bring the con’s
plan to a quick halt.

3. There’s the sales pitch, the hook.

Fraudsters must initiate a conversation to the


target, to get their scheme underway. They contact people through
phone calls, emails and texts. They’ll sometimes post ads on websites
or on social media. To them, it’s a numbers game to them. That's why

PAGE 2
they’ll keep sending out messages, because they know a percentage of
people will respond.

4. The potential victims listen—they “engage”


with the scammer.

Scammers need the attention of their


targets to get their deceptive story going.

5. Scammers turn fully engaged listeners into


victims.

The targets who eventually become victims fall into a


wide variety of scams

PAGE 3
HOW TO OVERCOME SCAMMER?

1. Cut off communications.


Suspicious of a too-good-to-be-true offer or fundraising call?
Don’t take chances. Delete the email, recycle the fax or letter,
hang up the phone or say “no thank you” and shut the door.
You can even add a few barriers to the process — like call
display on your phone, a peephole in your door and a spam
filter for your email

2. Ask questions.
Sometimes it isn’t easy to tell if the request or company is
legitimate or not. Crooks have been known to adopt the names
of familiar organizations and pose as staff from financial
institutions. Phishing emails — meant to get you to enter your
financial details into an online form — are getting more
realistic looking too.

3. Know their tactics.


There are many different kinds of scams and methods to
deploy them, but you’ll notice some common threads.

4. Keep your information secret.


Losing money isn’t your only concern: your financial
information can be used to commit identity fraud, and crooks
find innovative ways to capture it

PAGE 4
PAGE 5

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy