A kid, a computer, and a clever scam that games the system—that’s all it takes to make big bucks, without leaving home.
For credit card fraudsters like the teenager who calls himself “d0g,” it’s simply online shopping.
Angela said she was lonely and enjoyed the personal connection that the scam provided her.
Schulman was shocked and humiliated, but he also described feeling sad for Wesselman.
Unfortunately the commission and money asked by the "security company" is more than available, so that an external money infusion is needed for clearance (of course, asked from the potential victim).
Personal attitude: Due to lack of information about what’s going on in this world around, lost quite a lot of time and put effort until realising who is in fact the communication partner.
The potential victims always come to Schulman with a similar list of questions for their online lovers: 'Why does he refuse to chat via web cam? '; and finally, 'Why does it just seem too good to be true?
Using this method, a scammer can trick you into believing he or she is a friend or family member, claiming to need money for an emergency, such as posting bail, paying a hospital bill, or being detained at an airport.
'We maintained what I thought to be an authentic relationship by communicating frequently online and on the phone, and I grew to care deeply about her.
To realize that I was the victim of what was apparently someone's sick joke and constant lies was, and is, painful and humiliating.'The person who met him at the door was Angela Wesselman, a middle-aged overweight mother who admitted to creating the profile for Megan - as well as orchestrating an entire network of friends and family members to make Megan seem more authentic.
The scammer may pressure you to wire money immediately via online banking or other money transfer services, such as Express Send A scammer posing as technical support representative calls to claim there is an issue with your computer – for example, that your software is outdated or that you need to confirm your identity – and asks for remote access to your computer to resolve the issue.
Typically, the scammer will ask you to type a specific command to enable remote access.