WaveRider

WaveRider

How do scammers deceive?

Fraudsters exploit information asymmetry to paint a beautiful picture, leading you to mistakenly believe that by completing a simple task, you can achieve this wonderful scenario. Often, low-probability events are packaged as high-probability occurrences, resulting in victims being deceived.

Common Scamming Techniques#

    1. Not mentioning prerequisites or bundled conditions: To accomplish event A, you must first complete or also complete B, C...
    1. Not mentioning that withdrawing midway will incur losses.
    1. Not mentioning that doing nothing after achieving results will also lead to losses: Generally, this is time-related; what they promote is only up to a certain point in time, but after this point, benefits will be severely diminished, or there will be no benefits at all, just costs.
    1. The achieved scenario may not be as they advertised: It may be significantly discounted or even completely unusable.
    1. Concealing other important information: For example, real estate agents may mislead you into buying properties near a prison because there is some distance, which you cannot see at the time.
    1. Providing false information about key matters: For instance, claiming to have a relationship with someone, but in reality, there is none, and this matter is the key to completion.
    1. Mentioning some famous people or people around you who have achieved success by doing this, embellished with linguistic techniques. Furthermore, they may hire someone to pose as such a person.
    1. Setting up two shops, one priced high and the other low. Using a stooge to direct people to the high-priced shop. When you leave, another stooge introduces you to the lower-priced one.
    1. Scene selection: Scamming while you are mentally impaired at a drinking table or indulging in pleasure yields the best results.
    1. Emotional manipulation: Often time-limited and limited in quantity, claiming that many people are waiting, preferably people you know or your competitors.
  • Special note:
    • 11. Using a certain event to create social panic or citing government stimulus policies as a reason to exaggerate impact and profit from it.
      1. Economic bubbles: When in such an environment, the fraudster may not believe they are scamming; instead, they see it as a rare opportunity. Whether this counts as fraud is subjective.

How Ordinary People Can Avoid Being Scammed#

  • Establish reliable channels for information acquisition: This can filter out the vast majority of fraudsters.
  • When someone claims to be in a certain profession, test them with knowledge required for that profession or their living environment.
  • If an intermediary is needed, rely on trustworthy, experienced friends or seek help from professional, qualified intermediary agencies or legal advisors.
  • Once you discover that someone has used one of these scams, be alert to whether they have employed others and check each one.
  • Develop a habit of trusting only data; only accept claims backed by statistical or probabilistic evidence (but also avoid various statistical scams). Fraudsters will only present prominent or nearby examples but cannot provide overall data.
  • Regularly pay attention to social dynamics to enhance your common sense and judgment, avoiding being misled by unrealistic promises.
  • Carefully read every item in places requiring signatures (of course, if you lack relevant knowledge, you may not discern anything), and do not feel like you are wasting others' time.
  • Do not be tempted by bargains; although they sound good, they are often of no real use.

Skills Fraudsters Should Learn#

  • Language skills
  • Acting skills
  • Psychology
  • Law
  • Understanding society, gray industries, and the processes and logic of police operations

How Fraudsters Evade Risks#

  • Initially concealing prerequisites or bundled conditions, then introducing them one by one, with increasing difficulty. It is the other party who cannot complete it, not that I have a problem with what I said.
  • Altering keywords in places where evidence can be left, such as WeChat or contracts. And exaggerating claims in places where evidence cannot be left.
  • Using linguistic techniques to create ambiguity, misleading people into thinking the product has a certain function, and when exposed, claiming it was merely a misunderstanding. However, this does not completely evade responsibility and is not reliable.
  • Exploiting legal loopholes: Setting traps through complex contract or agreement terms, blurring responsibilities.
  • Directly fleeing overseas (to countries that do not have extradition treaties with China), but this cannot involve direct cash transactions; it must be laundered first, with a typical commission of 10%.
Loading...
Ownership of this post data is guaranteed by blockchain and smart contracts to the creator alone.