Ken, a former "fed" (of some description) on the group blog Popehat, received a "toner-scam" (a scam whereby someone sends you an invoice for a service you never ordered or received in the hopes that you'll pay it without noticing) solicitation in the mail at his business. This pissed him off, so he decided to track down the scammers and document, in lavish detail, the process by which he ran them to ground. The series of posts is up to part four now, and it's fascinating reading.
For some reason, this one seriously pisses me off. Maybe its because the fraud is so blatant. Maybe it’s because the weasel-worded disclaimer designed to give them a defense to fraud claims is so perfunctory and lame. Maybe it’s because after I sent an email to the scammer’s lawyer, the scammer himself called me and tried to run a con on me. Like I’m a fucking rube.
Anatomy of a Scam Investigation: Chapter One
So. I’ve decided to dedicate some time and money to investigating this scam and the people and companies responsible for it. I’ve also decided to write about the investigation, and use it as an opportunity to discuss con man culture and how anyone with an internet connection, a few bucks, and some time can investigate an attempted scam — or, preferably, conduct due diligence on a suspected scammer before they can even try to con you.
I’m going to discuss using Google, using PACER (which allows access to federal court records), using state court records, and taking effective action against scammers.
Anatomy of a Scam Investigation: Chapter Two
Anatomy of A Scam Investigation, Chapter Three
Anatomy of A Scam Investigation, Chapter Four
Claude Shannon is one of the great, heroic titans of the computer science revolution, a brilliant scientist and Feynman-grade eccentric whose accomplishments fill several excellent books.
Your Roomba vacuum cleaner collects data about the size and geometry of your home as it cleans and transmits that data back to Irobot, Roomba’s parent company — and now the company says it wants to sell that data to companies like Apple and Google.
The American “productivity paradox”: technology keeps marching, but the amount of profit generated by the average worker’s average hour is stagnant.
Between election hacks, ransomware, and Devil’s Ivy, the cybersecurity space is booming as malware and hackers become more sophisticated. If you’re interested in pursuing a career in ethical hacking, or just want to secure your own devices, The Super-Sized Ethical Hacking Bundle is a great resource.In this bundle, you’ll learn the fundamental skills of ethical hacking, prepare […]
The TREBLAB X11 Earphones are versatile, offer great sound, and are currently $32.99 in the Boing Boing Store.These Bluetooth earbuds are a great workout companion. They’re totally sweat proof and their ear-fins keep them snugly in place during high activity — something that Apple’s AirPods can only do if you were blessed with precisely the […]
Whether you’re a seasoned entertainment industry veteran or a student working on your first spec script, having the right tool for the job will make a huge difference in your focus and productivity.Final Draft 10 is far and away the world’s best screenwriting software, used extensively by professional film and TV writers at top production […]