Scambaiting
   HOME

TheInfoList



OR:

Scam baiting (or scambaiting) is a form of
internet vigilantism Internet vigilantism is the act of carrying out vigilante activities through the Internet. The term encompasses vigilantism against alleged scams, crimes, and non-Internet related behavior. The expanding scope of media savvy and online interactio ...
primarily used towards
advance-fee fraud An advance-fee scam is a form of fraud and is one of the most common types of confidence tricks. The scam typically involves promising the victim a significant share of a large sum of money, in return for a small up-front payment, which the frauds ...
,
IRS impersonation scam An IRS impersonation scam is a class of telecommunications fraud and scam which targets American taxpayers by pretending to be Internal Revenue Service (IRS) collection officers. The scammers operate by placing disturbing official-sounding calls ...
,
technical support scam A technical support scam, or tech support scam, is a type of fraud in which a scammer claims to offer a legitimate technical support service. Victims contact scammers in a variety of ways, often through fake pop-ups resembling error messages or ...
s, pension scams, and consumer financial fraud. Scambaiters pose as potential victims to waste the time and resources of
scammers A confidence trick is an attempt to defraud a person or group after first gaining their trust. Confidence tricks exploit victims using their credulity, naïveté, compassion, vanity, confidence, irresponsibility, and greed. Researchers have def ...
, gather information useful to authorities, and publicly expose scammers. They may document scammers' tools and methods, warn potential victims, provide discussion forums, disrupt scammers' devices and systems using
remote access trojan In computing, the term remote desktop refers to a software- or operating system feature that allows a personal computer's desktop environment to be run remotely off of one system (usually a PC, but the concept applies equally to a server or a ...
s and computer viruses, or take down fraudulent webpages. Some scambaiters are motivated by a sense of civic duty, some simply engage for their own
amusement Amusement is the state of experiencing humorous and entertaining events or situations while the person or animal actively maintains the experience, and is associated with enjoyment, happiness, laughter and pleasure. It is an emotion with posi ...
, or a combination of both.


Methodology

For scams conducted via written communication, baiters may answer
scam A confidence trick is an attempt to defraud a person or group after first gaining their trust. Confidence tricks exploit victims using their credulity, naïveté, compassion, vanity, confidence, irresponsibility, and greed. Researchers have def ...
email Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices. Email was thus conceived as the electronic ( digital) version of, or counterpart to, mail, at a time when "mail" meant ...
s using throwaway email accounts, pretending to be receptive to scammers' offers. Popular methods of accomplishing the first objective are to ask scammers to fill out lengthy questionnaires; to bait scammers into taking long trips; to encourage the use of poorly made props or inappropriate English-language idioms that surreptitiously cast doubt upon their scams. Baiters may deceive scammers with claims as ludicrous as the ones they have used to defraud their victims; or they may entrap them with
Trojan horse The Trojan Horse was a wooden horse said to have been used by the Greeks during the Trojan War to enter the city of Troy and win the war. The Trojan Horse is not mentioned in Homer's ''Iliad'', with the poem ending before the war is concluded, ...
s, such as
remote administration tool In computing, the term remote desktop refers to a software- or operating system feature that allows a personal computer's desktop environment to be run remotely off of one system (usually a PC, but the concept applies equally to a server or a ...
s, that enable baiters to gain sensitive information from or damage scammers' computers. Baiters may publicly humiliate scammers by
live stream Livestreaming is streaming media simultaneously recorded and broadcast in real-time over the internet. It is often referred to simply as streaming. Non-live media such as video-on-demand, vlogs, and YouTube videos are technically streamed, but no ...
ing their sessions or persuading them to produce humiliating images colloquially known as "trophies". Some of the images that were uploaded to early scam baiting websites have been described as reinforcing racist stereotypes.Various sources: * * * * However, modern day scam baiting content is primarily centred around education on how the scams work and how to prevent falling victim to scams.


Examples

In May 2004, a
Something Awful ''Something Awful'' (SA) is an American comedy website hosting content including blog entries, forums, feature articles, digitally edited pictures, and humorous media reviews. It was created by Richard "Lowtax" Kyanka in 1999 as a largely per ...
forum poster asked for advice on how to deal with a
bogus escrow The bogus escrow scam is a straightforward confidence trick in which a scammer operates a bogus escrow service. Escrow services are intended to ensure security by acting as a middleman in transactions where the two parties do not trust each other. ...
scam from a buyer on
eBay eBay Inc. ( ) is an American multinational e-commerce company based in San Jose, California, that facilitates consumer-to-consumer and business-to-consumer sales through its website. eBay was founded by Pierre Omidyar in 1995 and became a ...
. Since the eBay auction was for an
Apple An apple is an edible fruit produced by an apple tree (''Malus domestica''). Apple fruit tree, trees are agriculture, cultivated worldwide and are the most widely grown species in the genus ''Malus''. The tree originated in Central Asia, wh ...
PowerBook G4 The PowerBook G4 is a series of notebook computers manufactured, marketed, and sold by Apple Computer between 2001 and 2006 as part of its PowerBook line of notebooks. The PowerBook G4 runs on the RISC-based PowerPC G4 processor, designed by the ...
, the poster sent a three-ring binder crudely dressed as a PowerBook and declared it to customs at the value of a real product. The buyer, who lived overseas, paid several hundred dollars in import duties to claim the fake laptop. A member of the scambaiting website 419eater.com was able to convince a scammer to send him a wooden replica of a
Commodore 64 The Commodore 64, also known as the C64, is an 8-bit home computer introduced in January 1982 by Commodore International (first shown at the Consumer Electronics Show, January 7–10, 1982, in Las Vegas). It has been listed in the Guinness ...
. In February 2011, the Belgian television show '' Basta'' portrayed, with
hidden camera A hidden camera or spy camera is a camera used to photograph or record subjects, often people, without their knowledge. The camera may be considered "hidden" because it is not visible to the subject being filmed, or is disguised as another obje ...
s, how a scammer was fooled during a meeting with baiters, raising the stakes by involving a one-armed man, two dwarves and a
pony A pony is a type of small horse ('' Equus ferus caballus''). Depending on the context, a pony may be a horse that is under an approximate or exact height at the withers, or a small horse with a specific conformation and temperament. Compared ...
. Eventually, a
police raid A police raid is an unexpected visit by police or other law-enforcement officers with the aim of using the element of surprise in order to seize evidence or arrest suspects believed to be likely to hide evidence, resist arrest, be politicall ...
was faked, during which the baiters were arrested and the scammer went free, abandoning the money, and without any suspicion. In January 2014, members of 419eater.com appeared in two segments of the
Channel 4 Channel 4 is a British free-to-air public broadcast television network operated by the state-owned enterprise, state-owned Channel Four Television Corporation. It began its transmission on 2 November 1982 and was established to provide a four ...
show ''Secrets of the Scammers''. In the first segment scambaiters persuaded a scammer to travel from
London London is the capital and largest city of England and the United Kingdom, with a population of just under 9 million. It stands on the River Thames in south-east England at the head of a estuary down to the North Sea, and has been a majo ...
to a remote location in
Cornwall Cornwall (; kw, Kernow ) is a historic county and ceremonial county in South West England. It is recognised as one of the Celtic nations, and is the homeland of the Cornish people. Cornwall is bordered to the north and west by the Atlantic ...
by train and taxi to meet a victim (played by a baiter) and collect payment for a gold deal. In the second segment a female scammer met with two scambaiters posing as victims in Trafalgar Square to pass them a fake check. This scammer was subsequently questioned by the police. In 2015 and 2016, James Veitch hosted three
TED TED may refer to: Economics and finance * TED spread between U.S. Treasuries and Eurodollar Education * ''Türk Eğitim Derneği'', the Turkish Education Association ** TED Ankara College Foundation Schools, Turkey ** Transvaal Education Depa ...
talks about scambaiting. Veitch also presented the
Mashable Mashable is a digital media platform, news website and entertainment company founded by Pete Cashmore in 2005. History Mashable was founded by Pete Cashmore while living in Aberdeen, Scotland, in July 2005. Early iterations of the site were a ...
video series "Scamalot" on
YouTube YouTube is a global online video platform, online video sharing and social media, social media platform headquartered in San Bruno, California. It was launched on February 14, 2005, by Steve Chen, Chad Hurley, and Jawed Karim. It is owned by ...
. In March 2020, an anonymous YouTuber and
grey hat hacker A grey hat (greyhat or gray hat) is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but usually does not have the malicious intent typical of a black hat hacker. The term came into use ...
under the alias " Jim Browning" infiltrated and gathered
drone Drone most commonly refers to: * Drone (bee), a male bee, from an unfertilized egg * Unmanned aerial vehicle * Unmanned surface vehicle, watercraft * Unmanned underwater vehicle or underwater drone Drone, drones or The Drones may also refer to: ...
and
CCTV Closed-circuit television (CCTV), also known as video surveillance, is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly t ...
footage of a fraudulent call centre scam operation in India with the help of fellow YouTube personality
Karl Rock Karl Edward Rice, known online as Karl Rock, is a New Zealand blogger and YouTuber based in India. He is best known for his vlogs, which are centred around his travels in the Indian subcontinent, and his book ''How to Travel in India.'' Early a ...
. Through the aid of the British documentary programme ''
Panorama A panorama (formed from Greek πᾶν "all" + ὅραμα "view") is any wide-angle view or representation of a physical space, whether in painting, drawing, photography, film, seismic images, or 3D modeling. The word was originally coined in ...
'', a police raid was carried out when the documentary was brought to the attention of assistant police commissioner Karan Goel, leading to the arrest of call centre operator Amit Chauhan, who also operated a fraudulent
travel agency A travel agency is a private retailer or public service that provides travel and tourism-related services to the general public on behalf of accommodation or travel suppliers to offer different kinds of travelling packages for each destinatio ...
under the name "Faremart Travels". YouTube and Twitch are popular sources scambaiters use to educate and/or entertain their audience about various types of scams.


See also

*
Internet vigilantism Internet vigilantism is the act of carrying out vigilante activities through the Internet. The term encompasses vigilantism against alleged scams, crimes, and non-Internet related behavior. The expanding scope of media savvy and online interactio ...
*
Lenny (bot) Lenny is a chatbot designed to scam bait telemarketers using messages. Background Telemarketers are perceived as annoying and wasting people's time, and some deliberately attempt to scam or defraud people. In April 2018, a survey estimated the U ...
*
Prank call A prank call (also known as a crank call) is a telephone call intended by the caller as a practical joke played on the person answering. It is often a type of nuisance call. It can be illegal under certain circumstances. Recordings of prank ph ...
*
Sting operation In law enforcement, a sting operation is a deceptive operation designed to catch a person attempting to commit a crime. A typical sting will have an undercover law enforcement officer, detective, or co-operative member of the public play a role a ...


References


External links

* * {{DEFAULTSORT:Scambaiting Social engineering (computer security) Prank calling Internet vigilantism Types of cyberattacks