The Act of Scambaiting
(NEW RELEASE) https://www.amazon.com/dp/B07TW23ZLC
Why I wrote this book
As a certified forensic agent and longtime 419 fraud researcher, I found within myself the necessity to clarify certain issues that caught my attention on this scambaiting phenomenon. I decided to go further in thoughts and research associating with what I knew and had already about West African connection commonly known as 419 advance fee fraud. I also read a lot from those practicing scambaiting from the Western world since it`s more of Western invention than a Naija (Nigerian) fabric. Being someone living in the continent (Africa) that harbors the most dreaded scammers, I found the necessity to share with the world my understanding on the domain; and how it could be helpful to someone wanting to practice the art perfectly.
We should note that every game demands rules and regulation that permits the sited philosophy to be better demonstrated. This, because, not all scambaiting sectors can be practiced by everyone, seen, some people are good in some scams whereas others not; some demanding high intelligence and follow up making it very complex to a wider extent. In this book, we are going to see the different stages and how or where someone wanting to do the scambaiting game can fit in, followed by the imminent ramifications that could befall the scambaiter. Meanwhile, 419ers too, have not sat and watched some bunch of well-determined people in the name of scambaiters comes to thwart their business up; hence there have been some counter reactions to protect their business. As a result, giving me reasons to pen down a book on it.
Jules Fonba
Main topics
What is scambaiting-
Who`s a scambaiter- Is scambaiting legal-
419 philosophy- How do scambaiting take place-
How to become a perfect scambaiter- Why do scambaiting take place-
Merit and demerit of scambaiting-
Outstanding scambait methods-
Ten vital things to know about scambaiting-
419ers mind on their LIKES and DISLIKES-
Motivation
OUTSTANDING SCAMBAIT METHODS
https://www.amazon.com/dp/B07TW23ZLC
Scambaiting is not all about talking and winning without having an elaborate methodology in your ability. As time unfolds more tactics must be developed to suit time and space because that`s what scammers do on daily bases. To put to machinery the arts of scambaiting, one must be well versed in smart and foxy attitude. You must leran be a joke(big clown) too of another order, full of humor and subtlety. Scammers in their brains or mindsets already have for a fool or a donkey their victims. A thought so profound in them that, each time they play over their victim they go singing and chanting their prey`s foolishness and praising their (dupers) mighty wisdom. In this comprehension, the scambaiters must always dressed their spirit and thoughts like that of the 419ers. For it`s also a game of faith and spirit, a game of wit and wisdom, so much so that, the mind must be cooked to dish out such results. Foolishness and mockery spirit over the scammer must be where no space for mercy is given. Let evil befall the evil one and so be it. Since we`re in an organized game, we should make sure all sectors are well put in place to maximizes abilities, even the most looked down upon sectors will be revisited. We`re going to take this in a fragmentation power and spread out.
Infiltration
Scambait someone before anything else, is, first of all, an infiltration. Infiltration according to the online dictionary is the act of entering or gaining access to an organization or place surreptitiously, especially in order to acquire secret information or cause damage. Okay, taking from the theme “scambaiting”, the baiter deliberately plays the mock victim, in this regard, the infiltration is then placed at two stages, that in which the scammer forces his way into your life and finances, and stage two, which consist of you taking awareness of the foul game and deciding to play the victim of a falsehood or that one which you voluntarily know and have prepared yourself for the show. So, to be more broad on this topic, first stage infiltration is the coming in contact with the scammer, meaning, activating a communication deal with him, of-sent to me, I send you emails kind of ping ponging. Another form and rarest infiltration are by the usage of spyware. This is the dream level for all West African as we write; the rate at which West African scammers are investing in this domain is frightful and alarming. According to Google definitions, Spyware is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information. Spyware is classified as a type of malware — malicious software designed to gain access to or damage your computer, often without your knowledge. ... Spyware is used for many purposes. Its aim is usually to capture passwords, banking credentials, and credit card details - and send them over the internet to fraudsters. "Spyware" is mostly classified into four types: adware, system monitors, tracking cookies, and Trojans; examples of other notorious types include digital rights management capabilities that "phone home", key-loggers, rootkits, and web beacons. For the scambaiter who has the knowledge and capacity of this online technology, they start by making sure the computer's antivirus program, an anti-malware program, or firewall, has been uninstalled or disabled, an indication of a hacked computer. A scambaiter may disable these programs to help hide any warnings that would appear while they are on the 419ers machine. This level is the collection of data of the first brand that will very much interest security forces of the domain. Every information gathered here is concrete and has a reference plus a link.
Time
Time is a free gift of nature; it was given to man by God or nature herself. Time is measured by seconds, minutes, hours and indefinite continued progress of existence and events in the past, present, and future regarded as a whole, as read from Google definition likewise it`s also an indefinite period (usually marked by specific attributes or activities) culled from WordWeb. In this blight, man has learned to calculate time as money expressing value and such, an expensive commodity in human lives. Now putting yourself in a plan just to waste a person`s time can be one of the deadliest things to do, seen the vitality of it to man, not to talk of he that does it as hobby or occupation than being returned the spear. Honestly, this can be very deadly, as the doer won`t support being robbed with the same shit he has been robbing others with. Many ways go as per the desire to waste a scammer time. To waste a con artist time, one must be very organized and specified in nicety; that`s, make the scammer really look like a fool in a way that he will not immediately feel it. And this through most concocted and with pudding head-like stories. We should note here that all these are techniques to waste their(419ers) time. But first and foremost make sure you use the visual machine software(VM). In computing, a virtual machine is an emulation of a computer system. Virtual machines are based on computer architectures and provide functionality of a physical computer. Their implementations may involve specialized hardware, software, or a combination. Wikipedia. Again, from google definition, the role of a visual machine is a software computer that, like a physical computer, runs an operating system and applications. ... Every virtual machine has virtual devices that provide the same functionality as physical hardware and have additional benefits in terms of portability, manageability, and security. But be mindful of these option too, they`re less efficient and may slow down efficiencies due to their indirect connectivity to the main system. Here are some sample stories to make the scammer look ridicule with lacking or marked by lack of intellectual acuity.
I. Poor connection tactics. This is intentionally behaving as if the call line is dangling (waves in the background) with the inability to hear the caller from the other side. Often with “hello, hello hello” persistently from the scambaiter thus wasting his airtime and call time at the same moment, which might even lead to you dropping the call and forcing him to call back insistently.
II. Poor comprehension tactics. This case is pertaining to language barrier problem and or hearing defects. The scambaiter intentionally and again pretend not to understand him well on his accent. When the 419er speaks, the scambaiter says things like “yes, yes, yes okay, that`s good, I will talk with my bank” at the end again, you go to the initial point and say, “can you repeat all that you`ve just said, I can`t understand your language clearly, don`t worry the money is there already”. All these make the time-wasting systematic and truly effective.
III. Stammering tactics. Still, with the pudden-head style, become a stammer; speaking haltingly really makes the bandit`s work very difficult for him. This method uses all his patience and time in a way he becomes very disturbed because each time he feels like coming close to you, thinking starts setting in. This is because he sees a big toad in your throat to deal with before having the con deal going; a serious headache. According to http://www.speechdisorder.co.uk/stammering.html there are three main types of stammers that exist and which keep individuals from speaking most efficiently. One type of stammering occurs when specific sounds are repeated, such as the “s”. This often makes a word such as “sweet” be pronounced as “s-s-s-sweet”. Another type of stammering occurs when a specific sound is prolonged before the rest of the word is pronounced, such as “sssssssweet”. The third type of stammering occurs when some speech is blocked so that there is a short period of silence in the middle of a word, such as “s……weet”. From here the scambaiter can choose which one best suits them.
Accusations.
This is one of the easier ways of getting around the scammer from West Africa. Generally, it`s known that the white men world is always a world with a twisted timetable. The way things are scheduled does often guarantee free time space due to sudden overtime cases. Here are ten selected excuses that go with accusation model; we emphasize that this be done with a lot of subtlety.
i. Story one: The scambaiter may say, “my computer got bad mindless whether you`ve never told him you were doing your transactions with it”.
ii. Story two: There`s no network in your area and in a cunny style ask him if he heard about the news on the television, that even CNN had to talk about it, begging him to go check also on the TV.
iii. Story three: That there was a fight in the office and you were the only one man commando to separate the fight and it lasted the whole day. And now, you`re still under shock and don`t know how you made it. iv. Story four: That your girlfriend seized your Android tablet and you had to follow her the whole day in the neighborhood. Making it practically difficult to attend to him, and at the end of the conversation beg for forgiveness and make sure to promise him you`re really interested in the ongoing deal. v. Story five: That, you had to wait for hours as your parents were fighting and your mother decides to use one foot of your shoes to hit back your dad. So, it was practically difficult for you to be online because you had to wait and recuperate your one-foot shoe first. All these words in an acute subtlety and showing a sense of remorse over the inability to respect the rendezvous. But that, any way you spoke with the persons and/or had opted to do the deal with him, for it looks quite interesting.
vi. Story six. You suffered from a persistent running stomach for five hours which landed you into a clinic, insisting that it was a come-and-see issue as you were releasing watery waste in every part of the house, gush, thank God, you did not die. But nevertheless, the deal will continue and Satan is a liar to your wealth.
These stories can be developed to any flexibility, meaning you can modify each to suit the kind of end you want. The goal as we said is to make the scammer look like a deep fool in his own so-called art. whenever the excuse is given care must be taken to assure him(cyber bandit) that the deal is on the lane and nothing can stop it. No matter what happens, it will go on as planned.
https://www.amazon.com/dp/B07TW23ZLC