Click on the green box to choose your current situation

Disclaimer: We are not attorneys and don't pretend to be.

In our experience, the solutions offered in this section have proven to be effective; however, we always recommend that you consult with an attorney.

If you have doubts about Fraud Aid, do not hesitate to contact federal (FBI, Secret Service, RCMP) Scotland Yard, or local law enforcement to check us out.


Stay out of debt and stay out of jail:

The legal truth about work-at-home money, package, and check forwarding jobs


How to really verify a check

Your ID Theft Prevention To-Do List

What to do about threats from scammers


Attorneys: You and your attorney

Bill of Rights for victims of crime

Budget Worksheet

Burden of Proof

Catching the Bad Guys


Debt Management

Debtor's Rights

Glossary: Explanations & Definitions

How to Read an Agreement

How to Really Verify a Check or Money Order

How to Write a Budget Packet Cover Letter to Creditors

How to Write a Narrative of Events: Telling your story

Identity Theft Prevention To-Do List

Know your Miranda Rights and how to use them

Police: You and Law Enforcement

Threats from scammers

You and Your Attorney


Catching the Bad Guys:

Nigerian-style Internet scammers

Printable format


The very first thing to understand about your communications with a scam network is that nothing they have told you is true. 


The names, phone numbers, titles, addresses, documents, and stories are all lies.  The scammer is seldom even in the same location or country as he or she claims.


You are led to believe you are corresponding with only one person when the emails may come from 2 or 3 scammers all pretending to be the same person


The reverse is also true - one scammer may pose as several people (attorney, government official, minister, etc.) when in fact the emails are all from the same scammer using different email addresses.


It is not the an email address, the text of an email by itself, or the phony documents sent in any one single scam committed by the criminal network that leads to an arrest.


It is a painstakingly gathered body of evidence and hours of following leads that provide information information to obtain an arrest warrant.  The investigation can take weeks, months, or even years before sufficient evidence is gathered to indict the scammer or scammers. 

The chances of arresting your specific scammer are very slim; however, that is not true of all scammers in an organized crime network to which your scammer belongs.

NOTE: Unlike the Mafia system, depending on his level of expertise and business abilities plus associations and influences, a Nigerian-style scammer* may belong to multiple organized scam networks.

*Nigerian scammers have developed, and continue to develop, scam networks worldwide, teaching local criminals how to perpetrate Internet fraud.  Local criminals may put their own twist on a scam, but the basics remain the same, hence "Nigerian-style."

To understand the full scope of what is required to make their scams work, please read Scammer Group Activities: Methodology of the [Nigerian-style] scam.

^ Back to top


Yes, scammers do get caught by law enforcement and if your scammer contacted you by email you have one of the most potent tools available for tracking down the criminal: the email itself.


For your report to be effective, a Scam Email Report must include the Full Header, which is the path the email followed across the Internet from your scammer's computer to your computer.


Emails travel from server to server across cyberspace, and each time a server forwards an email to the next server it's called a 'hop'. 


Each hop is stamped, just like the post marks on the mail you get from the Post Office. 


Think of a letter that travels from Post Office to Post Office from South Africa to Seattle, with each Post Office placing its postmark on the envelope and you have what we read when we look at the Full Header. 

But even better than that, the first stamp can sometimes lead us to a specific address and a specific computer.

^ Back to top


Scammers have learned to play a lot of electronic games with email headers to cloak their location, so volume is important - the more emails we have in our analysis system the better. 


Please go here to learn how easy it is to file Scam Email Reports:


The steps for many email services are accompanied by screen shots.


Recruitment to join the scam group: In some instances, scammers have been known to make attempts at recruiting those they cannot turn into victims or those they have engaged in a long-standing relationship such as a romance scam. 


Should you receive emails with offers of enlisting you into the fraud ring, please contact our Law Enforcement Support Unit using . Do not write this address for any other purpose.


Reshipper Scam victims sometimes have excellent information when they have been 'hired' to forward envelopes or find themselves performing multiple tasks for their 'boss'. 


If you are a Reshipper Scam victim, please contact our Law Enforcement Support Unit using Do not write this address for any other purpose.


^ Back to top


Solid information about scammers: This is a short list of what we look for:


·         Bank account numbers listed in the body of a scam email.

·         US, UK, and Canadian-based land lines.  Go here to make the determination:

·         Web site addresses listed in the body of a scam email.

·         A situation in which you personally met with the scammer within the 12 months prior to contacting us. 


WARNING!  If you have been targeted by a Nigerian or Eastern European scam, DO NOT seek out or try to arrange a face to face meeting with the scammer to provide information to law enforcement!


Scammers are well-trained criminals and will very quickly realize you are a fake.


This is dangerous to you because they are unpredictable criminals who can turn violent in heartbeat.  On top of that, without a visceral understanding of the rules of evidence you will not know what to do correctly.


^ Back to top

Baiting a criminal can be a dangerous plan so please do not play games with your scammer.  Each time you correspond with him and others in his network you risk opening your hard drive to Zero Day malware or a root kit. At the very least, you will wind up on additional scam and spam lists now that you have confirmed your email account is active. 


Zero Day malware is a piece of malicious code that has not yet been identified by your anti-virus or anti-spy ware program developers, meaning you do not have an update to cover it and your hard drive is not protected from it.


Rarely (but it does happen) a root kit is embedded in emails and is activated by your action of opening the email.  A root kits downloads directly through your firewall and security software onto your hard drive where it can wreak havoc with your information and files.


These criminals are very nasty and far, far more experienced than you at conning people.  It's what they do all day, every day.  They will rapidly recognize your attempts at gaining information, will cease all correspondence, and may target you with malware.


^ Back to top



Did your bank freeze your account and report you to ChexSystems?


Account Now®

accepts automatic deposits and features Bill Pay!









Reporting, crime-fighting, and victim resource links

Copyright ©2000 - Fraud Aid, Inc.  -  All Rights Reserved

Privacy Policy Disclaimer • Spam Policy