ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

The Anatomy of an Internet Scam

Updated on June 29, 2014

Have you ever received a message telling you than you’ve won thousands of kina and have to pay a certain fee to have it released? It sounds too good to be true – and it most certainly is!

The world of the internet has now opened up our doors to all sorts of scams and the format mentioned is a favourite among con artists trying to scam some money from poor unsuspecting individuals

Please Take the Poll before Reading Further

Have you ever been the victim of an internet scam?

See results

Ali's Case

Unfortunately, a lot of people have become victims of these kinds of scams. Last year a 32 year old Dubai man, who we shall call Ali, lost US$500, 000 to three Nigerian conmen who contacted him via email and pretended to be the daughter-in-law of the late Libyan dictator, Muammar Gaddafi.

In their emails they told Ali that she (the daughter in law) had inherited millions from her husband who was killed in the Libyan revolution but the money was kept at the United Nations (UN) office in Egypt.

It went to say that she was hiding from rebels and needed a trustworthy person she could authorise to collect the money, and promised him 20% of the total sum. The man, however, needed further convincing and asked for some sort of proof that she was not lying.

The con artists replied with a scanned fake passport stating that she was married to one of the former dictator’s son. Ali fell into the trap like fly in honey.

In the effort to seem genuine and gather more information, the conmen asked him to send them a passport copy of himself to ensure that he was ‘sincere’ about helping her.

Ali then organized a trip to Egypt where he was met with a man he presumed to be from the UN who took him on a tour of their ‘office’ and then handed him two large briefcases. He was then advised to contact the ‘daughter-in-law’ to get the security access codes.

When he finally opened the suitcases, he found what appeared to be large amounts of US legal bills painted with black ink. There were two chemical containers next to them with a UN stamp and instructions to contact offices in London or Saudi Arabia.

When Ali contact the numbers provided, he was instructed to pay US$200, 000 to the office and they would help him mix the chemicals which would be used to dissolve the black in. He was also asked to pay another US$362, 000 to receive a certificate for the money.

Ali paid both amounts between June and September, 2013, by electronically wiring the funds. However, he became suspicious when more money was asked of him and he contacted the local police.

The Dubai police then arranged a sting operation and nabbed two suspects. However, the third managed to get away.

Sadly, Ali’s case is one of so many all over the world. It is unfortunate that while the internet has made communication so much easier, it has also made it relatively easy and cheap for criminals to commit crimes. However, understanding how the scammers operate could give potential victims the knowledge needed to make sound judgement.


The Common Stages of a Scam

Scammers or con artists usually go through 4 common of stages, according to Hubpages writer kschang, to trap unwary victims; The Tease, The Please, The Seize and The Squeeze.

The Tease – the first stage involves some sort of attention grabber and usually includes a sad or complicated back story.

In Ali’s case they used the ‘maiden in distress’ tactic seeking help from a ‘knight in shining armour.’

The Please – the next stage includes ‘pleasing’ the mark by letting him or her know that they will be rewarded for their help. In most cases it involves monetary rewards. However, other forms of rewards have been recorded

This was the case when the ‘daughter-in-law’ offered Ali 20% of her million dollar inheritance. The promise of riches has always been a strong point of reference for scammers.

The Seize – this stage involves scammers putting potential victims at a point where they commit to the con. It also longest and probably most complicated stage of the process.

I believe this happened when Ali tried to verify if the ‘daughter-in-law’ was for real and asked for proof. It was a confirmation that he was buying into the con. They then reemphasized this when he flew out of his comfort zone and into Egypt.

The suitcase filled with what appeared to be US money was also a primer to get Ali to go all the way. The seize stage ended when he finally made payments to the scammers.

It is often at the stage that victims become wary of what is happening and usually stop communication with the scammers or contact and report the matter to local authorities.

The Squeeze – this is an optional stage but it’s when scammers become greedy and try to get more money from their victims as was the case with Ali.

The second payment he made of US$362, 000 was a squeeze. This is also the stage when most scammers are caught.

When Ali reported the matter to Dubai police, they encouraged him to keep in contact with the scammers knowing they would still try to squeeze him. It worked.

Triggers to Indicate a Scam

As scams come in myriad forms, it is best to keep in mind that there will always be something off with scam emails or messages. Here are some triggers that you should be on the lookout for:

  • Unsolicited. If you receive unsolicited messages asking for some sort of help in return for large financial rewards then most likely it’s a scam.
  • Informal contacts. I’ve noticed a number of scams that claim to be from Multinational Corporations but use free internet mail or the address is located in a country where the headquarters shouldn’t be.
  • Personal information. Whenever an email comes asking for your personal information, red flags should go up. The commercial banks in PNG recently announced scammers were email their clients asking for personal details.

The banks explicitly noted that they would never ask for personal banking details. Why should they? They are already privy to that information.

Who You Gonna Call? Scam Busters!

Now, if you ever receive a message that sounds a bit dodgy then forwarding it to the local authorities is the best thing to do.

If you are at the initial stages of the con then the best thing is to terminate all communication with the scammers. And if you partially swallowed the bait and already sent some money they keep in contact with the scammer and immediately contact local authorities.

I hope these tips help you be more aware of a con and please leave comment before you go.


This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

Show Details
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)