Browse Definitions:
Definition

scam-baiting

Scam-baiting is the practice of eliciting attention from the perpetrator of a scam by feigning interest in whatever bogus deal is offered. The scam-baiter pretends to be duped, with the intention of making the perpetrators waste their own time and/or money, and exposing them to public ridicule if at all possible. Scam-baiters may involve the scammers in a long correspondence or encourage them to travel seeking a pay-off.

A surprising number of e-mail recipients fall prey to scams. One common example is the "Nigerian advance fee" message, which asks for advance fees that will somehow make it possible for the senders to access a large sum of money that they will share with the recipient. According to a December 2002 article in The Guardian, such e-mail frauds garner over a million British pounds (about one and a half million dollars in U.S. currency) a year from victims in Britain and the U.S.

There are a number of Web sites devoted to scam-baiting. The owners of one such site (at www.geocities.com/a_kerenx/), who sometimes refer to themselves collectively as Alexander Kerensky, explain: "The basic idea is to be the biggest pest to the scammer and waste as much of their time as possible and have a bit of fun along the way as well!" To this end, the site owners established a hotmail address and simply waited for a scammer's message to arrive. When they received a message about a "Nigerian advance fee", they responded as if duped. A long, albeit fruitless, correspondence ensued. The site owners have sometimes asked scammers to meet them by a public webcam and posted images of the culprits to the Internet while they waited in vain.

This was last updated in August 2005

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

SearchSecurity

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

  • Web application firewall (WAF)

    A Web application firewall (WAF) is a firewall that monitors, filters or blocks traffic to and from a Web application. WAFs are ...

  • MD5

    The MD5 hashing algorithm is a one-way cryptographic function that accepts a message of any length as input and returns as output...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • compact disc (CD)

    A compact disc is a portable storage medium that can be used for recording, storing and playing back audio, video and other data ...

  • secondary storage

    Secondary storage is used to protect inactive data written from a primary storage array to a nonvolatile tier of disk, flash or ...

  • VRAM (video ram)

    VRAM (video RAM) is a reference to any type of random access memory (RAM) used to store image data for a computer display.

SearchSolidStateStorage

  • SSD RAID (solid-state drive RAID)

    SSD RAID (solid-state drive RAID) is a methodology commonly used to protect data by distributing redundant data blocks across ...

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close