Ken, a former "fed" (of some description) on the group blog Popehat, received a "toner-scam" (a scam whereby someone sends you an invoice for a service you never ordered or received in the hopes that you'll pay it without noticing) solicitation in the mail at his business. This pissed him off, so he decided to track down the scammers and document, in lavish detail, the process by which he ran them to ground. The series of posts is up to part four now, and it's fascinating reading.
For some reason, this one seriously pisses me off. Maybe its because the fraud is so blatant. Maybe it’s because the weasel-worded disclaimer designed to give them a defense to fraud claims is so perfunctory and lame. Maybe it’s because after I sent an email to the scammer’s lawyer, the scammer himself called me and tried to run a con on me. Like I’m a fucking rube.
Anatomy of a Scam Investigation: Chapter One
So. I’ve decided to dedicate some time and money to investigating this scam and the people and companies responsible for it. I’ve also decided to write about the investigation, and use it as an opportunity to discuss con man culture and how anyone with an internet connection, a few bucks, and some time can investigate an attempted scam — or, preferably, conduct due diligence on a suspected scammer before they can even try to con you.
I’m going to discuss using Google, using PACER (which allows access to federal court records), using state court records, and taking effective action against scammers.
Anatomy of a Scam Investigation: Chapter Two
Anatomy of A Scam Investigation, Chapter Three
Anatomy of A Scam Investigation, Chapter Four
Many insurers offer breaks to people who wear activity trackers that gather data on them; as Cathy “Mathbabe” O’Neil points out, the allegedly “anonymized’ data-collection is trivial to re-identify (so this data might be used against you), and, more broadly, the real business model for this data isn’t improving your health outcomes — it’s dividing […]
As the US government ramps up its insistence that visitors (and US citizens) unlock their devices and provide their social media accounts, the solution have run the gamut from extreme technological caution, abandoning mobile devices while traveling, or asking the government to rethink its policy. But Maciej Cegłowski has another solution: a “travel mode” for […]
In the age of Internet, discussions about the federal government and its functions are informed by and rely on our unprecedented access to federal documents. Anyone can freely view public records online, such as proposed Congressional legislation and presidential executive orders. Accessing public court documents, however, is a bit trickier. As Katherine Mangu-Ward wrote for the Wall Street Journal in 2011, “no aspect of government remains more locked down than the secretive, hierarchical judicial branch.”
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]
Having a luxurious bed isn’t just a fairy tale from a catalog; it is a real, affordable possibility with offerings like this Olive+Owen bedroom set. If you’re thinking of doing some “spring cleaning”, this bed set is an easy way to completely upgrade your room in one purchase.This 20-piece collection has all of the expected slumberland elements, […]
Python is immensely popular in the data science world for the same reason it is in most other areas of computing—it has highly readable syntax and is suitable for anything from short scripts to massive web services. One of its most exciting, newest applications, however, is in machine learning. You can dive into this booming […]