HOW SCAMMERS COMMIT CHECK FRAUD🚨👮🏻♂️
TLDRThe video discusses various methods scammers use to commit check fraud, including stealing personal information, creating fake checks, and using 'open up' accounts for fraudulent activities. It highlights the ease of obtaining personal data through illegal means and the risks involved in cashing fake checks. The video emphasizes the consequences of check fraud and urges potential scammers to reconsider their actions, highlighting the negative impact on individuals and the potential for getting caught.
Takeaways
- 🚨 Check fraud is a common method used by scammers to steal money but is also easily traceable and punishable by law.
- 💸 The first step in check fraud is obtaining personal information, often through illegal means such as stealing mail or working inside banks.
- 📬 Fraudsters may use platforms like Telegram to purchase personal information for as little as $25 to facilitate their schemes.
- 🖋 Check washing is a technique where scammers alter legitimate checks by using chemicals like isopropyl alcohol and acetone to change the check's details.
- 🏦 'Open ups' are bank accounts opened with stolen identities specifically for committing fraud, which can be aged and sold at high prices.
- 🎭 Scammers may recruit elderly people to cash fake checks to avoid suspicion, as they are less likely to be questioned by banks.
- 💳 Advanced scammers create shell business accounts to mirror legitimate businesses, making it easier to cash large checks without raising suspicion.
- 🌐 The internet has simplified the process of check fraud, making it easier for scammers to connect and cash out without extensive networks.
- 🕵️♂️ Surveillance is a significant risk for scammers, with cameras everywhere, including ATMs, which can lead to their capture and prosecution.
- 🌍 Scammers in some communities are seen as heroes for taking money from first-world countries, but this behavior is still illegal and unethical.
Q & A
What is the first method of check fraud discussed in the video?
-The first method discussed is obtaining personal information through stealing, often targeting mail carriers.
What is the risk involved in stealing information from mail carriers?
-The risk involved is that fraudsters move from white-collar crimes into physically robbing people, which carries a different set of charges.
What is the 'Inside Job' method?
-The 'Inside Job' method involves getting employment at a bank branch to gain access to personal information that can be used for check fraud.
How do scammers obtain information through Telegram?
-Scammers can obtain personal information on Telegram by paying a small fee, which gives them access to a plethora of data from various sources.
What is an 'open up' account?
-An 'open up' account is a bank account opened with the sole intention of committing various types of fraud, such as check fraud or credit card fraud.
How do scammers use the 'acetone and Irish Purple alcohol' method?
-Scammers use this method to alter legitimate checks by removing the original ink and adding their own information and custom amount.
What is the significance of surveillance in check fraud cases?
-Surveillance is significant because cameras are everywhere, including ATMs, which can capture the fraudster's face and provide evidence for prosecution.
Why are scammers in Nigeria viewed differently than those in First World countries?
-In Nigeria, scammers are sometimes seen as heroes for taking money from First World countries, whereas in the US, UK, and Canada, they are frowned upon and disrespected.
What is the speaker's stance on scamming individuals who have less money?
-The speaker views scamming individuals with less money as petty and despicable, as it affects those who can least afford it.
What advice does the speaker give to scammers listening to the video?
-The speaker advises scammers to reconsider their actions, as they are ruining lives and causing unnecessary stress, and hopes that they will be caught and face justice.
How does the speaker describe the reality of being a scammer?
-The speaker describes the reality as filled with sleepless nights, paranoia, and the constant fear of being caught, especially when scamming individuals rather than large institutions.
Outlines
🚨 Check Fraud: Methods and Risks
This paragraph discusses the various methods scammers use to commit check fraud, including obtaining personal information through theft or working in banks to gain access to sensitive data. It highlights the ease of check fraud but also warns about the significant risks involved, such as being indicted and facing multiple charges. The paragraph emphasizes the importance of not using this information to engage in illegal activities and the need for awareness about the consequences of check fraud.
🔍 Advanced Check Fraud Techniques
The second paragraph delves into more sophisticated check fraud techniques, such as stealing legitimate checks and altering them with chemicals like isopropyl alcohol and acetone. It discusses the use of mobile banking apps to cash fake checks and the recruitment of elderly individuals to avoid suspicion. The paragraph also touches on the use of money orders and cryptocurrency to launder illicit gains, and the critical importance of appearing inconspicuous when attempting to cash out.
🙏 A Message to Scammers: Reconsider Your Actions
In the final paragraph, the speaker directly addresses scammers worldwide, urging them to reconsider their actions due to the harm they cause. The paragraph emphasizes the negative impact of scamming on people's lives and the stress it brings. It also highlights the inevitability of getting caught and the potential for severe legal consequences. The message concludes with a plea for scammers to stop their activities, especially targeting vulnerable individuals, and a warning that such actions do not make them appear intelligent or successful.
Mindmap
Keywords
💡Check Fraud
💡Fake Checks
💡Inside Job
💡Telegram
💡Open Up
💡Shell Accounts
💡Recruitment
💡Money Laundering
💡Surveillance
💡Consequences
💡Moral Dilemma
Highlights
Check fraud is one of the easiest financial crimes to commit but also one of the easiest to get indicted for.
The initial step in check fraud involves obtaining personal information, often through theft or extortion.
Mail carriers are sometimes targeted by fraudsters, highlighting the risks they face in their daily duties.
Inside job methods involve fraudsters getting employment at banking institutions to gain access to sensitive information.
Telegram is used by scammers as a platform to buy and sell personal information for fraudulent activities.
Check fraud can involve creating 'open-ups', bank accounts opened with the sole intention of committing fraud.
Shell accounts are business bank accounts created to mimic legitimate businesses, often for fraudulent purposes.
Fraudsters may recruit elderly people to cash fake checks to avoid suspicion.
A more recent method of check fraud involves stealing legitimate checks and altering them with chemicals.
Mobile banking apps have made it easier for fraudsters to cash fake checks without visiting a bank branch.
Cryptocurrency offers a potential avenue for scammers to launder illicit gains.
Scammers must be aware of the surveillance systems in place that can capture their fraudulent activities.
The consequences of check fraud can be severe, including legal repercussions and societal condemnation.
In some communities, scammers are seen as heroes for acquiring wealth from first-world countries.
Targeting individuals rather than institutions is seen as petty and morally reprehensible.
Scammers should reconsider their actions as they are causing harm and stress to innocent people.
The speaker expresses a strong desire for scammers to be caught and face justice.