Scammers utilize social sites that use credit cards to purchase memberships by placing the fake profile details on the inside pages of the profile description and they place their true name or another fake name that is closely associated to their real name, perhaps shortened or a nickname and photo on the front page (they retain a part of their real name), they use the fake scam email address and fake scam name inside the profile. The fake name is never exposed to the public and the scammer can easily disassociate from the fake name by changing his (user)name in to a fake one if caught out by simply morphng in to another name or deleting the account. Current active scams are associated with a profile photo of the particular criminal's choice (his own), he uses this as a method of tracking his fake profiles, they are all placed individually under the one name, eg. Individual 1 has 19 profiles all the same name on Reunion.com, some with photos.
If you take for example Reunion.com which is full of personal profiles, many of which are not your old classmate and if you match the real names of the classmates for a particular school year from school roll history against the classmate profiles on Reunion.com or any of these type of social sites, you will find that many of these profiles are fake.
The possible comfort of these sites for scammers is anonmity as outside contacts are less likely to bother them on class reunion sites and their only friend would be Jeffery Tinsley (the creator of the site who can be automatically added as a friend), access to credit card keylogging because the sites use credit cards but the ideal reason would be for ONLINE STORAGE OF SCAM INFORMATION and is a safe online headquarters for the scammer and is probably used when going to the internet cafes. This method appears to have emerged from scammers who work solo or in groups of 2-10 people and have learned the ropes from their mentors at University who return to Lagos all their acquired knowledge and educate others.
On Reunion.com places lived are put down as eg. Philadelphia PA, Philadelphia, Philadelphia or Greenvile MS, Greenville, Greenville. Scammers have been storing their information online in to other providers such as MyLife.com. because they can remain relatively undisturbed by others on this social network due to payment required to contact others or read mail.
Family and friends are created on some profiles. Speculation is made that these family and friends are the ones who are involved in the scam and are assigned to that particular profile, the scammers going solo use their own location with no friends, they are noted to be in other scams on the Family and friends profiles area working with others as they all use their real name,some profiles show the identical name as a friend on the Family and friends area.
The real name, the photo of the real man, the scammers fake email address and the scammers fake profile name, all together in one location. This finding acknowledges that scammers can be traced, albeit difficult. If speculation is correct, scammers have female and males working in the groups as well as working solo and the ringleader takes centre stage. Combinations are: one woman working with one man, three women working together, two men working together, one man alone, one woman alone. This majority of this group makes up women and would most likely be a family working together. in 2011 scammers progressed to a more sophisticated method of online storage.
It is known that the majority of offenders are males impersonating females of all colours and races. Nigerian females do use internet cafes in Lagos and photos of females in these cafes can be found at www.cafepointe.com under Cafepointe Photos and Festac Town, Lagos where the majority of computer scams originated (Wiki) is introducing female only cybercafes. Detect profiles on Hi5 below, please insert an email address. Back