A Deep Look at the Company Blockstream & Their Bitcoin ...

Ultimate glossary of crypto currency terms, acronyms and abbreviations

I thought it would be really cool to have an ultimate guide for those new to crypto currencies and the terms used. I made this mostly for beginner’s and veterans alike. I’m not sure how much use you will get out of this. Stuff gets lost on Reddit quite easily so I hope this finds its way to you. Included in this list, I have included most of the terms used in crypto-communities. I have compiled this list from a multitude of sources. The list is in alphabetical order and may include some words/terms not exclusive to the crypto world but may be helpful regardless.
2FA
Two factor authentication. I highly advise that you use it.
51% Attack:
A situation where a single malicious individual or group gains control of more than half of a cryptocurrency network’s computing power. Theoretically, it could allow perpetrators to manipulate the system and spend the same coin multiple times, stop other users from completing blocks and make conflicting transactions to a chain that could harm the network.
Address (or Addy):
A unique string of numbers and letters (both upper and lower case) used to send, receive or store cryptocurrency on the network. It is also the public key in a pair of keys needed to sign a digital transaction. Addresses can be shared publicly as a text or in the form of a scannable QR code. They differ between cryptocurrencies. You can’t send Bitcoin to an Ethereum address, for example.
Altcoin (alternative coin): Any digital currency other than Bitcoin. These other currencies are alternatives to Bitcoin regarding features and functionalities (e.g. faster confirmation time, lower price, improved mining algorithm, higher total coin supply). There are hundreds of altcoins, including Ether, Ripple, Litecoin and many many others.
AIRDROP:
An event where the investors/participants are able to receive free tokens or coins into their digital wallet.
AML: Defines Anti-Money Laundering laws**.**
ARBITRAGE:
Getting risk-free profits by trading (simultaneous buying and selling of the cryptocurrency) on two different exchanges which have different prices for the same asset.
Ashdraked:
Being Ashdraked is essentially a more detailed version of being Zhoutonged. It is when you lose all of your invested capital, but you do so specifically by shorting Bitcoin. The expression “Ashdraked” comes from a story of a Romanian cryptocurrency investor who insisted upon shorting BTC, as he had done so successfully in the past. When the price of BTC rose from USD 300 to USD 500, the Romanian investor lost all of his money.
ATH (All Time High):
The highest price ever achieved by a cryptocurrency in its entire history. Alternatively, ATL is all time low
Bearish:
A tendency of prices to fall; a pessimistic expectation that the value of a coin is going to drop.
Bear trap:
A manipulation of a stock or commodity by investors.
Bitcoin:
The very first, and the highest ever valued, mass-market open source and decentralized cryptocurrency and digital payment system that runs on a worldwide peer to peer network. It operates independently of any centralized authorities
Bitconnect:
One of the biggest scams in the crypto world. it was made popular in the meme world by screaming idiot Carlos Matos, who infamously proclaimed," hey hey heeeey” and “what's a what's a what's up wasssssssssuuuuuuuuuuuuup, BitConneeeeeeeeeeeeeeeeeeeeeeeect!”. He is now in the mentally ill meme hall of fame.
Block:
A package of permanently recorded data about transactions occurring every time period (typically about 10 minutes) on the blockchain network. Once a record has been completed and verified, it goes into a blockchain and gives way to the next block. Each block also contains a complex mathematical puzzle with a unique answer, without which new blocks can’t be added to the chain.
Blockchain:
An unchangeable digital record of all transactions ever made in a particular cryptocurrency and shared across thousands of computers worldwide. It has no central authority governing it. Records, or blocks, are chained to each other using a cryptographic signature. They are stored publicly and chronologically, from the genesis block to the latest block, hence the term blockchain. Anyone can have access to the database and yet it remains incredibly difficult to hack.
Bullish:
A tendency of prices to rise; an optimistic expectation that a specific cryptocurrency will do well and its value is going to increase.
BTFD:
Buy the fucking dip. This advise was bestowed upon us by the gods themselves. It is the iron code to crypto enthusiasts.
Bull market:
A market that Cryptos are going up.
Consensus:
An agreement among blockchain participants on the validity of data. Consensus is reached when the majority of nodes on the network verify that the transaction is 100% valid.
Crypto bubble:
The instability of cryptocurrencies in terms of price value
Cryptocurrency:
A type of digital currency, secured by strong computer code (cryptography), that operates independently of any middlemen or central authoritie
Cryptography:
The art of converting sensitive data into a format unreadable for unauthorized users, which when decoded would result in a meaningful statement.
Cryptojacking:
The use of someone else’s device and profiting from its computational power to mine cryptocurrency without their knowledge and consent.
Crypto-Valhalla:
When HODLers(holders) eventually cash out they go to a place called crypto-Valhalla. The strong will be separated from the weak and the strong will then be given lambos.
DAO:
Decentralized Autonomous Organizations. It defines A blockchain technology inspired organization or corporation that exists and operates without human intervention.
Dapp (decentralized application):
An open-source application that runs and stores its data on a blockchain network (instead of a central server) to prevent a single failure point. This software is not controlled by the single body – information comes from people providing other people with data or computing power.
Decentralized:
A system with no fundamental control authority that governs the network. Instead, it is jointly managed by all users to the system.
Desktop wallet:
A wallet that stores the private keys on your computer, which allow the spending and management of your bitcoins.
DILDO:
Long red or green candles. This is a crypto signal that tells you that it is not favorable to trade at the moment. Found on candlestick charts.
Digital Signature:
An encrypted digital code attached to an electronic document to prove that the sender is who they say they are and confirm that a transaction is valid and should be accepted by the network.
Double Spending:
An attack on the blockchain where a malicious user manipulates the network by sending digital money to two different recipients at exactly the same time.
DYOR:
Means do your own research.
Encryption:
Converting data into code to protect it from unauthorized access, so that only the intended recipient(s) can decode it.
Eskrow:
the practice of having a third party act as an intermediary in a transaction. This third party holds the funds on and sends them off when the transaction is completed.
Ethereum:
Ethereum is an open source, public, blockchain-based platform that runs smart contracts and allows you to build dapps on it. Ethereum is fueled by the cryptocurrency Ether.
Exchange:
A platform (centralized or decentralized) for exchanging (trading) different forms of cryptocurrencies. These exchanges allow you to exchange cryptos for local currency. Some popular exchanges are Coinbase, Bittrex, Kraken and more.
Faucet:
A website which gives away free cryptocurrencies.
Fiat money:
Fiat currency is legal tender whose value is backed by the government that issued it, such as the US dollar or UK pound.
Fork:
A split in the blockchain, resulting in two separate branches, an original and a new alternate version of the cryptocurrency. As a single blockchain forks into two, they will both run simultaneously on different parts of the network. For example, Bitcoin Cash is a Bitcoin fork.
FOMO:
Fear of missing out.
Frictionless:
A system is frictionless when there are zero transaction costs or trading retraints.
FUD:
Fear, Uncertainty and Doubt regarding the crypto market.
Gas:
A fee paid to run transactions, dapps and smart contracts on Ethereum.
Halving:
A 50% decrease in block reward after the mining of a pre-specified number of blocks. Every 4 years, the “reward” for successfully mining a block of bitcoin is reduced by half. This is referred to as “Halving”.
Hardware wallet:
Physical wallet devices that can securely store cryptocurrency maximally. Some examples are Ledger Nano S**,** Digital Bitbox and more**.**
Hash:
The process that takes input data of varying sizes, performs an operation on it and converts it into a fixed size output. It cannot be reversed.
Hashing:
The process by which you mine bitcoin or similar cryptocurrency, by trying to solve the mathematical problem within it, using cryptographic hash functions.
HODL:
A Bitcoin enthusiast once accidentally misspelled the word HOLD and it is now part of the bitcoin legend. It can also mean hold on for dear life.
ICO (Initial Coin Offering):
A blockchain-based fundraising mechanism, or a public crowd sale of a new digital coin, used to raise capital from supporters for an early stage crypto venture. Beware of these as there have been quite a few scams in the past.
John mcAfee:
A man who will one day eat his balls on live television for falsely predicting bitcoin going to 100k. He has also become a small meme within the crypto community for his outlandish claims.
JOMO:
Joy of missing out. For those who are so depressed about missing out their sadness becomes joy.
KYC:
Know your customer(alternatively consumer).
Lambo:
This stands for Lamborghini. A small meme within the investing community where the moment someone gets rich they spend their earnings on a lambo. One day we will all have lambos in crypto-valhalla.
Ledger:
Away from Blockchain, it is a book of financial transactions and balances. In the world of crypto, the blockchain functions as a ledger. A digital currency’s ledger records all transactions which took place on a certain block chain network.
Leverage:
Trading with borrowed capital (margin) in order to increase the potential return of an investment.
Liquidity:
The availability of an asset to be bought and sold easily, without affecting its market price.
of the coins.
Margin trading:
The trading of assets or securities bought with borrowed money.
Market cap/MCAP:
A short-term for Market Capitalization. Market Capitalization refers to the market value of a particular cryptocurrency. It is computed by multiplying the Price of an individual unit of coins by the total circulating supply.
Miner:
A computer participating in any cryptocurrency network performing proof of work. This is usually done to receive block rewards.
Mining:
The act of solving a complex math equation to validate a blockchain transaction using computer processing power and specialized hardware.
Mining contract:
A method of investing in bitcoin mining hardware, allowing anyone to rent out a pre-specified amount of hashing power, for an agreed amount of time. The mining service takes care of hardware maintenance, hosting and electricity costs, making it simpler for investors.
Mining rig:
A computer specially designed for mining cryptocurrencies.
Mooning:
A situation the price of a coin rapidly increases in value. Can also be used as: “I hope bitcoin goes to the moon”
Node:
Any computing device that connects to the blockchain network.
Open source:
The practice of sharing the source code for a piece of computer software, allowing it to be distributed and altered by anyone.
OTC:
Over the counter. Trading is done directly between parties.
P2P (Peer to Peer):
A type of network connection where participants interact directly with each other rather than through a centralized third party. The system allows the exchange of resources from A to B, without having to go through a separate server.
Paper wallet:
A form of “cold storage” where the private keys are printed onto a piece of paper and stored offline. Considered as one of the safest crypto wallets, the truth is that it majors in sweeping coins from your wallets.
Pre mining:
The mining of a cryptocurrency by its developers before it is released to the public.
Proof of stake (POS):
A consensus distribution algorithm which essentially rewards you based upon the amount of the coin that you own. In other words, more investment in the coin will leads to more gain when you mine with this protocol In Proof of Stake, the resource held by the “miner” is their stake in the currency.
PROOF OF WORK (POW) :
The competition of computers competing to solve a tough crypto math problem. The first computer that does this is allowed to create new blocks and record information.” The miner is then usually rewarded via transaction fees.
Protocol:
A standardized set of rules for formatting and processing data.
Public key / private key:
A cryptographic code that allows a user to receive cryptocurrencies into an account. The public key is made available to everyone via a publicly accessible directory, and the private key remains confidential to its respective owner. Because the key pair is mathematically related, whatever is encrypted with a public key may only be decrypted by its corresponding private key.
Pump and dump:
Massive buying and selling activity of cryptocurrencies (sometimes organized and to one’s benefit) which essentially result in a phenomenon where the significant surge in the value of coin followed by a huge crash take place in a short time frame.
Recovery phrase:
A set of phrases you are given whereby you can regain or access your wallet should you lose the private key to your wallets — paper, mobile, desktop, and hardware wallet. These phrases are some random 12–24 words. A recovery Phrase can also be called as Recovery seed, Seed Key, Recovery Key, or Seed Phrase.
REKT:
Referring to the word “wrecked”. It defines a situation whereby an investor or trader who has been ruined utterly following the massive losses suffered in crypto industry.
Ripple:
An alternative payment network to Bitcoin based on similar cryptography. The ripple network uses XRP as currency and is capable of sending any asset type.
ROI:
Return on investment.
Safu:
A crypto term for safe popularized by the Bizonnaci YouTube channel after the CEO of Binance tweeted
“Funds are safe."
“the exchage I use got hacked!”“Oh no, are your funds safu?”
“My coins better be safu!”


Sats/Satoshi:
The smallest fraction of a bitcoin is called a “satoshi” or “sat”. It represents one hundred-millionth of a bitcoin and is named after Satoshi Nakamoto.
Satoshi Nakamoto:
This was the pseudonym for the mysterious creator of Bitcoin.
Scalability:
The ability of a cryptocurrency to contain the massive use of its Blockchain.
Sharding:
A scaling solution for the Blockchain. It is generally a method that allows nodes to have partial copies of the complete blockchain in order to increase overall network performance and consensus speeds.
Shitcoin:
Coin with little potential or future prospects.
Shill:
Spreading buzz by heavily promoting a particular coin in the community to create awareness.
Short position:
Selling of a specific cryptocurrency with an expectation that it will drop in value.
Silk road:
The online marketplace where drugs and other illicit items were traded for Bitcoin. This marketplace is using accessed through “TOR”, and VPNs. In October 2013, a Silk Road was shut down in by the FBI.
Smart Contract:
Certain computational benchmarks or barriers that have to be met in turn for money or data to be deposited or even be used to verify things such as land rights.
Software Wallet:
A crypto wallet that exists purely as software files on a computer. Usually, software wallets can be generated for free from a variety of sources.
Solidity:
A contract-oriented coding language for implementing smart contracts on Ethereum. Its syntax is similar to that of JavaScript.
Stable coin:
A cryptocoin with an extremely low volatility that can be used to trade against the overall market.
Staking:
Staking is the process of actively participating in transaction validation (similar to mining) on a proof-of-stake (PoS) blockchain. On these blockchains, anyone with a minimum-required balance of a specific cryptocurrency can validate transactions and earn Staking rewards.
Surge:
When a crypto currency appreciates or goes up in price.
Tank:
The opposite of mooning. When a coin tanks it can also be described as crashing.
Tendies
For traders , the chief prize is “tendies” (chicken tenders, the treat an overgrown man-child receives for being a “Good Boy”) .
Token:
A unit of value that represents a digital asset built on a blockchain system. A token is usually considered as a “coin” of a cryptocurrency, but it really has a wider functionality.
TOR: “The Onion Router” is a free web browser designed to protect users’ anonymity and resist censorship. Tor is usually used surfing the web anonymously and access sites on the “Darkweb”.
Transaction fee:
An amount of money users are charged from their transaction when sending cryptocurrencies.
Volatility:
A measure of fluctuations in the price of a financial instrument over time. High volatility in bitcoin is seen as risky since its shifting value discourages people from spending or accepting it.
Wallet:
A file that stores all your private keys and communicates with the blockchain to perform transactions. It allows you to send and receive bitcoins securely as well as view your balance and transaction history.
Whale:
An investor that holds a tremendous amount of cryptocurrency. Their extraordinary large holdings allow them to control prices and manipulate the market.
Whitepaper:

A comprehensive report or guide made to understand an issue or help decision making. It is also seen as a technical write up that most cryptocurrencies provide to take a deep look into the structure and plan of the cryptocurrency/Blockchain project. Satoshi Nakamoto was the first to release a whitepaper on Bitcoin, titled “Bitcoin: A Peer-to-Peer Electronic Cash System” in late 2008.
And with that I finally complete my odyssey. I sincerely hope that this helped you and if you are new, I welcome you to crypto. If you read all of that I hope it increased, you in knowledge.
my final definition:
Crypto-Family:
A collection of all the HODLers and crypto fanatics. A place where all people alike unite over a love for crypto.
We are all in this together as we pioneer the new world that is crypto currency. I wish you a great day and Happy HODLing.
-u/flacciduck
feel free to comment words or terms that you feel should be included or about any errors I made.
Edit1:some fixes were made and added words.
submitted by flacciduck to CryptoCurrency [link] [comments]

/r/Scams Common Scam Master Post

Hello visitors and subscribers of scams! Here you will find a master list of common (and uncommon) scams that you may encounter online or in real life. Thank you to the many contributors who helped create this thread!

If you know of a scam that is not covered here, write a comment and it will be added to the next edition.

Previous threads: https://old.reddit.com/Scams/search?q=common+scams+master+post&restrict_sr=on
Blackmail email scam thread: https://www.reddit.com/Scams/comments/jij7zf/the_blackmail_email_scam_part_6/
Some of these articles are from small, local publications and refer to the scam happening in a specific area. Do not think that this means that the scam won't happen in your area.

Spoofing

Caller ID spoofing
It is very easy for anyone to make a phone call while having any number show up on the caller ID of the person receiving the phone call. Receiving a phone call from a certain number does not mean that the person/company who owns that number has actually called you.
Email spoofing
The "from" field of an email can be set by the sender, meaning that you can receive scam emails that look like they are from legitimate addresses. It's important to never click links in emails unless absolutely necessary, for example a password reset link you requested or an account activation link for an account you created.
SMS spoofing
SMS messages can be spoofed, so be wary of messages that seem to be from your friends or other trusted people.

The most common scams

The fake check scam (Credit to nimble2 for this part)
The fake check scam arises from many different situations (for instance, you applied for a job, or you are selling something on a place like Craigslist, or someone wants to purchase goods or services from your business, or you were offered a job as a mystery shopper, you were asked to wrap your car with an advertisement, or you received a check in the mail for no reason), but the bottom line is always something like this:
General fraudulent funds scams If somebody is asking you to accept and send out money as a favour or as part of a job, it is a fraudulent funds scam. It does not matter how they pay you, any payment on any service can be fraudulent and will be reversed when it is discovered to be fraudulent.
Phone verification code scams Someone will ask you to receive a verification text and then tell you to give them the code. Usually the code will come from Google Voice, or from Craigslist. In the Google version of the scam, your phone number will be used to verify a Google Voice account that the scammer will use to scam people with. In the Craigslist version of the scam, your phone number will be used to verify a Craigslist posting that the scammer will use to scam people. There is also an account takeover version of this scam that will involve the scammer sending a password reset token to your phone number and asking you for it.
Bitcoin job scams
Bitcoin job scams involve some sort of fraudulent funds transfer, usually a fake check although a fraudulent bank transfer can be used as well. The scammer will send you the fraudulent money and ask you to purchase bitcoins. This is a scam, and you will have zero recourse after you send the scammer bitcoins.
Email flooding
If you suddenly receive hundreds or thousands of spam emails, usually subscription confirmations, it's very likely that one of your online accounts has been taken over and is being used fraudulently. You should check any of your accounts that has a credit card linked to it, preferably from a computer other than the one you normally use. You should change all of your passwords to unique passwords and you should start using two factor authentication everywhere.
Cartel scam
You will be threatened by scammers who claim to be affiliated with a cartel. They may send you gory pictures and threaten your life and the lives of your family. Usually the victim will have attempted to contact an escort prior to the scam, but sometimes the scammers target people randomly. If you are targeted by a cartel scam all you need to do is ignore the scammers as their threats are clearly empty.
Boss/CEO scam A scammer will impersonate your boss or someone who works at your company and will ask you to run an errand for them, which will usually be purchasing gift cards and sending them the code. Once the scammer has the code, you have no recourse.
Employment certification scams
You will receive a job offer that is dependent on you completing a course or receiving a certification from a company the scammer tells you about. The scammer operates both websites and the job does not exist.
Craigslist fake payment scams
Scammers will ask you about your item that you have listed for sale on a site like Craigslist, and will ask to pay you via Paypal. They are scamming you, and the payment in most cases does not actually exist, the email you received was sent by the scammers. In cases where you have received a payment, the scammer can dispute the payment or the payment may be entirely fraudulent. The scammer will then either try to get you to send money to them using the fake funds that they did not send to you, or will ask you to ship the item, usually to a re-shipping facility or a parcel mule.
Craigslist Carfax/vehicle history scam
You'll encounter a scammer on Craigslist who wants to buy the vehicle you have listed, but they will ask for a VIN report from a random site that they have created and they will expect you to pay for it.
Double dip/recovery scammers
This is a scam aimed at people who have already fallen for a scam previously. Scammers will reach out to the victim and claim to be able to help the victim recover funds they lost in the scam.
General fraudulent funds scams The fake check scam is not the only scam that involves accepting fraudulent/fake funds and purchasing items for scammers. If your job or opportunity involves accepting money and then using that money, it is almost certainly a frauduent funds scam. Even if the payment is through a bank transfer, Paypal, Venmo, Zelle, Interac e-Transfer, etc, it does not matter.
Credit card debt scam
Fraudsters will offer to pay off your bills, and will do so with fraudulent funds. Sometimes it will be your credit card bill, but it can be any bill that can be paid online. Once they pay it off, they will ask you to send them money or purchase items for them. The fraudulent transaction will be reversed in the future and you will never be able to keep the money. This scam happens on sites like Craigslist, Twitter, Instagram, and also some dating sites, including SeekingArrangement.
The parcel mule scam
A scammer will contact you with a job opportunity that involves accepting and reshipping packages. The packages are either stolen or fraudulently obtained items, and you will not be paid by the scammer. Here is a news article about a scam victim who fell for this scam and reshipped over 20 packages containing fraudulently acquired goods.
The Skype sex scam
You're on Facebook and you get a friend request from a cute girl you've never met. She wants to start sexting and trading nudes. She'll ask you to send pictures or videos or get on webcam where she can see you naked with your face in the picture. The scam: There's no girl. You've sent nudes to a guy pretending to be a girl. As soon as he has the pictures he'll demand money and threaten to send the pictures to your friends and family. Sometimes the scammer will upload the video to a porn site or Youtube to show that they are serious.
What to do if you are a victim of this scam: You cannot buy silence, you can only rent it. Paying the blackmailer will show them that the information they have is valuable and they will come after you for more money. Let your friends and family know that you were scammed and tell them to ignore friend requests or messages from people they don't know. Also, make sure your privacy settings are locked down and consider deactivating your account.
The underage girl scam
You're on a dating site or app and you get contacted by a cute girl. She wants to start sexting and trading nudes. Eventually she stops communicating and you get a call from a pissed off guy claiming to be the girl's father, or a police officer, or a private investigator, or something else along those lines. Turns out the girl you were sexting is underage, and her parents want some money for various reasons, such as to pay for a new phone, to pay for therapy, etc. There is, of course, no girl. You were communicating with a scammer.
What to do if you are a victim of this scam: Stop picking up the phone when the scammers call. Do not pay them, or they will be after you for more money.
Phishing
Phishing is when a scammer tries to trick you into giving information to them, such as your password or private financial information. Phishing messages will usually look very similar to official messages, and sometimes they are identical. If you are ever required to login to a different account in order to use a service, you should be incredibly cautious.
The blackmail email scam part 5: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5/
PSA: you did not win a giftcard: https://old.reddit.com/Scams/comments/fffmle/psa_you_did_not_win_a_gift_card/
Sugar scams
Sugar scammers operate all over the internet and usually come in two varieties: advance-fee scams where the scammer will ask for a payment from you before sending you lots of money, and fake check style scams where the scammer will either pull a classic fake check scam, or will do a "bill pay" style scam that involves them paying your bills, or them giving you banking information to pay your bills. If you encounter these scammers, report their accounts and move on.
Google Hangouts
Google Hangouts is a messaging platform used extensively by all kinds of scammers. If you are talking with someone online and they want you to switch to Hangouts, they are likely a scammer and you should proceed with caution.
Publishers Clearing House scams
PCH scams are often advance-fee scams, where you will be promised lots of money after you make an initial payment. You will never need to pay if you win money from the real PCH.
Pet scams
You are looking for a specific breed of puppy, bird, or other pet. You come across a nice-looking website that claims to be breeding them and has some available right now - they may even be on sale! The breeders are not local to your area (and may not even list a physical location) but they assure you they can safely ship the pet to you after a deposit or full payment. If you go through with the payment, you will likely be contacted by the "shipper" who will inform you about an unexpected shipping/customs/processing fee required to deliver your new pet. But there was never any pet, both the "breeder" and the "shipper" are scammers, typically operating out of Africa. These sites are rampant and account for a large percentage of online pet seller websites - they typically have a similar layout/template (screenshot - example)
If you are considering buying a pet online, some easy things to check are: (1) The registration date of the domain (if it was created recently it is likely a scam website) (2) Reverse image search the pictures of available pets - you will usually find other scam websites using the same photos. (3) Copy a sentence/section of the text from the "about us" page and put it into google (in quotes) - these scammers often copy large parts of their website's text from other places. (4) Search for the domain name and look for entries on petscams.com or other scam-tracking sites. (5) Strongly consider buying/adopting your pet from a local shelter or breeder where you can see the animal in person before putting any money down.
Thanks to djscsi for this entry.
Fake shipping company scams
These scams usually start when you try to buy something illegal online. You will be scammed for the initial payment, and then you will receive an email from the fake shipping company telling you that you need to pay them some sort of fee or bribe. If you pay this, they will keep trying to scam you with increasingly absurd stories until you stop paying, at which point they will blackmail you. If you are involved in this scam, all you can do is ignore the scammers and move on, and try to dispute your payments if possible.
Chinese Upwork scam
Someone will ask you to create an Upwork or other freelancer site account for them and will offer money in return. You will not be paid, and they want to use the accounts to scam people.
Quickbooks invoice scam
This is a fake check style scam that takes advantage of Quickbooks.
The blackmail email scam The exact wording of the emails varies, but there are generally four main parts. They claim to have placed software/malware on a porn/adult video site, they claim to have a video of you masturbating or watching porn, they threaten to release the video to your friends/family/loved ones/boss/dog, and they demand that you pay them in order for them to delete the video. Rest assured that this is a very common spam campaign and there is no truth behind the email or the threats. Here are some news articles about this scam.
The blackmail mail scam
This is very similar to the blackmail email scam, but you will receive a letter in the mail.
Rental scams Usually on local sites like Craigslist, scammers will steal photos from legitimate real estate listings and will list them for rent at or below market rate. They will generally be hesitant to tell you the address of the property for "safety reasons" and you will not be able to see the unit. They will then ask you to pay them a deposit and they claim they will ship you the keys. In reality, your money is gone and you will have no recourse.
Craigslist vehicle scams A scammer will list a vehicle on Craigslist and will offer to ship you the car. In many cases they will also falsely claim to sell you the car through eBay or Amazon. If you are looking for a car on Craigslist and the seller says anything about shipping the car, having an agent, gives you a long story about why they are selling the car, or the listing price is far too low, you are talking to a scammer and you should ignore and move on.
Advance-fee scam, also known as the 419 scam, or the Nigerian prince scam. You will receive a communication from someone who claims that you are entitled to a large sum of money, or you can help them obtain a large sum of money. However, they will need money from you before you receive the large sum.
Man in the middle scams
Man in the middle scams are very common and very hard to detect. The scammer will impersonate a company or person you are legitimately doing business with, and they will ask you to send the money to one of their own bank accounts or one controlled by a money mule. They have gained access to the legitimate persons email address, so there will be nothing suspicious about the email. To prevent this, make contact in a different way that lets you verify that the person you are talking to is the person you think you are talking to.
Digit wallet scam
A variation of the fake check scam, the scammer sends you money through a digital wallet (i.e. Venmo, Apple Pay, Zelle, Cash App) along with a message claiming they've sent the money to the wrong person and a request to send the money back. Customer service for these digital wallets may even suggest that you send the money back. However, the money sent is from a stolen credit card and will be removed from your account after a few days. Your transfer is not reversed since it came from your own funds.
Cam girl voting/viewer scam
You will encounter a "cam girl" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to go to their site and sign up with your credit card. They may offer a free show, or ask you to vote for them, or any number of other fake stories.
Amateur porn recruitment scam
You will encounter a "pornstar" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to create an adult film with hehim, but first you need to do something. The story here is usually something to do with verifying your age, or you needing to take an STD test that involves sending money to a site operated by the scammer.
Hot girl SMS spam
You receive a text from a random number with a message along the lines of "Hey babe I'm here in town again if you wanted to meet up this time, are you around?" accompanied by a NSFW picture of a hot girl. It's spam, and they'll direct you to their scam website that requires a credit card.
Identity verification scam
You will encounter someone on a dating/messaging/social media/whatever site/app, and the scammer will ask that you verify your identity as they are worried about catfishing. The scammer operates the site, and you are not talking to whoever you think you are talking to.
This type of scam teases you with something, then tries to make you sign up for something else that costs money. The company involved is often innocent, but they turn a blind eye to the practice as it helps their bottom line, even if they have to occasionally issue refunds. A common variation takes place on dating sites/dating apps, where you will match with someone who claims to be a camgirl who wants you to sign up for a site and vote for her. Another variation takes place on local sites like Craigslist, where the scammers setup fake rental scams and demand that you go through a specific service for a credit check. Once you go through with it, the scammer will stop talking to you. Another variation also takes place on local sites like Craigslist, where scammers will contact you while you are selling a car and will ask you to purchase a Carfax-like report from a specific website.
Multi Level Marketing or Affiliate Marketing
You apply for a vague job listing for 'sales' on craigslist. Or maybe an old friend from high school adds you on Facebook and says they have an amazing business opportunity for you. Or maybe the well dressed guy who's always interviewing people in the Starbucks that you work at asks if you really want to be slinging coffee the rest of your life. The scam: MLMs are little more than pyramid schemes. They involve buying some sort of product (usually snake oil health products like body wraps or supplements) and shilling them to your friends and family. They claim that the really money is recruiting people underneath you who give you a slice of whatever they sell. And if those people underneath you recruit more people, you get a piece of their sales. Ideally if you big enough pyramid underneath you the money will roll in without any work on your part. Failure to see any profit will be your fault for not "wanting it enough." The companies will claim that you need to buy their extra training modules or webinars to really start selling. But in reality, the vast majority of people who buy into a MLM won't see a cent. At the end of the day all you'll be doing is annoying your friends and family with your constant recruitment efforts. What to look out for: Recruiters love to be vague. They won't tell you the name of the company or what exactly the job will entail. They'll pump you up with promises of "self-generating income", "being your own boss", and "owning your own company." They might ask you to read books about success and entrepreneurs. They're hoping you buy into the dream first. If you get approached via social media, check their timelines. MLMs will often instruct their victims to pretend that they've already made it. They'll constantly post about how they're hustling and making the big bucks and linking to youtube videos about success. Again, all very vague about what their job actually entails. If you think you're being recruited: Ask them what exactly the job is. If they can't answer its probably a MLM. Just walk away.

Phone scams

You should generally avoid answering or engaging with random phone calls. Picking up and engaging with a scam call tells the scammers that your phone number is active, and will usually lead to more calls.
Tax Call
You get a call from somebody claiming to be from your countries tax agency. They say you have unpaid taxes that need to be paid immediately, and you may be arrested or have other legal action taken against you if it is not paid. This scam has caused the American IRS, Canadian CRA, British HMRC, and Australian Tax Office to issue warnings. This scam happens in a wide variety of countries all over the world.
Warrant Call
Very similar to the tax call. You'll get a phone call from an "agent", "officer", "sheriff", or other law enforcement officer claiming that there is a warrant out for your arrest and you will be arrested very soon. They will then offer to settle everything for a fee, usually paid in giftcards.
[Legal Documents/Process Server Calls]
Very similar to the warrant call. You'll get a phone call from a scammer claiming that they are going to serve you legal documents, and they will threaten you with legal consequences if you refuse to comply. They may call themselves "investigators", and will sometimes give you a fake case number.
Student Loan Forgiveness Scam
Scammers will call you and tell you about a student loan forgiveness program, but they are interested in obtaining private information about you or demanding money in order to join the fake program.
Tech Support Call You receive a call from someone with a heavy accent claiming to be a technician Microsoft or your ISP. They inform you that your PC has a virus and your online banking and other accounts may be compromised if the virus is not removed. They'll have you type in commands and view diagnostics on your PC which shows proof of the virus. Then they'll have you install remote support software so the technician can work on your PC, remove the virus, and install security software. The cost of the labor and software can be hundreds of dollars. The scam: There's no virus. The technician isn't a technician and does not work for Microsoft or your ISP. Scammers (primarily out of India) use autodialers to cold-call everyone in the US. Any file they point out to you or command they have you run is completely benign. The software they sell you is either freeware or ineffective. What to do you if you're involved with this scam: If the scammers are remotely on your computer as you read this, turn off your PC or laptop via the power button immediately, and then if possible unplug your internet connection. Some of the more vindictive tech scammers have been known to create boot passwords on your computer if they think you've become wise to them and aren't going to pay up. Hang up on the scammers, block the number, and ignore any threats about payment. Performing a system restore on your PC is usually all that is required to remove the scammer's common remote access software. Reports of identity theft from fake tech calls are uncommon, but it would still be a good idea to change your passwords for online banking and monitor your accounts for any possible fraud. How to avoid: Ignore any calls claiming that your PC has a virus. Microsoft will never contact you. If you're unsure if a call claiming to be from your ISP is legit, hang up, and then dial the customer support number listed on a recent bill. If you have elderly relatives or family that isn't tech savvy, take the time to fill them in on this scam.
Chinese government scam
This scam is aimed at Chinese people living in Europe and North America, and involves a voicemail from someone claiming to be associated with the Chinese government, usually through the Chinese consulate/embassy, who is threatening legal action or making general threats.
Chinese shipping scam
This scam is similar to the Chinese government scam, but involves a seized/suspicious package, and the scammers will connect the victim to other scammers posing as Chinese government investigators.
Social security suspension scam
You will receive a call from someone claiming to work for the government regarding suspicious activity, fraud, or serious crimes connected to your social security number. You'll be asked to speak to an operator and the operator will explain the steps you need to follow in order to fix the problems. It's all a scam, and will lead to you losing money and could lead to identity theft if you give them private financial information.
Utilities cutoff
You get a call from someone who claims that they are from your utility company, and they claim that your utilities will be shut off unless you immediately pay. The scammer will usually ask for payment via gift cards, although they may ask for payment in other ways, such as Western Union or bitcoin.
Relative in custody Scammer claims to be the police, and they have your son/daughtenephew/estranged twin in custody. You need to post bail (for some reason in iTunes gift cards or MoneyGram) immediately or the consequences will never be the same.
Mexican family scam
This scam comes in many different flavours, but always involves someone in your family and Mexico. Sometimes the scammer will claim that your family member has been detained, sometimes the scammer will claim that your family member has been kidnapped, and sometimes the scammer will claim that your family member is injured and needs help.
General family scams
Scammers will gather a large amount of information about you and target your family members using different stories with the goal of gettimg them to send money.
One ring scam
Scammers will call you from an international number with the goal of getting you to return their call, causing you to incur expensive calling fees.

Online shopping scams

THE GOLDEN RULE OF ONLINE SHOPPING: If it sounds too good to be true, it probably is.
Dropshipping
An ad on reddit or social media sites like Facebook and Instagram offers items at huge discounts or even free (sometimes requiring you to reblog or like their page). They just ask you to pay shipping. The scam: The item will turn out to be very low quality and will take weeks or even months to arrive. Sometimes the item never arrives, and the store disappears or stops responding. The seller drop-ships the item from China. The item may only cost a few dollars, and the Chinese government actually pays for the shipping. You end up paying $10-$15 dollars for a $4 item, with the scammer keeping the profit. If you find one of these scams but really have your heart set on the item, you can find it on AliExpress or another Chinese retailer.
Influencer scams
A user will reach out to you on a social media platform, usually Instagram, and offer you the chance to partner with them and receive a free/discounted product, as long as you pay shipping. This is a different version of the dropshipping scam, and is just a marketing technique to get you to buy their products.
Triangulation fraud
Triangulation fraud occurs when you make a purchase on a site like Amazon or eBay for an item at a lower than market price, and receive an item that was clearly purchased new at full price. The scammer uses a stolen credit card to order your item, while the money from the listing is almost all profit for the scammer.
Instagram influencer scams
Someone will message you on Instagram asking you to promote their products, and offering you a discount code. The items are Chinese junk, and the offer is made to many people at a time.
Cheap Items
Many websites pop up and offer expensive products, including electronics, clothes, watches, sunglasses, and shoes at very low prices. The scam: Some sites are selling cheap knock-offs. Some will just take your money and run. What to do if you think you're involved with this scam: Contact your bank or credit card and dispute the charge. How to avoid: The sites often have every brand-name shoe or fashion item (Air Jordan, Yeezy, Gucci, etc) in stock and often at a discounted price. The site will claim to be an outlet for a major brand or even a specific line or item. The site will have images at the bottom claiming to be Secured by Norton or various official payment processors but not actual links. The site will have poor grammar and a mish-mash of categories. Recently, established websites will get hacked or their domain name jacked and turned into scam stores, meaning the domain name of the store will be completely unrelated to the items they're selling. If the deal sounds too good to be true it probably is. Nobody is offering brand new iPhones or Beats or Nintendo Switches for 75% off.
Cheap Amazon 3rd Party Items
You're on Amazon or maybe just Googling for an item and you see it for an unbelievable price from a third-party seller. You know Amazon has your back so you order it. The scam: One of three things usually happen: 1) The seller marks the items as shipped and sends a fake tracking number. Amazon releases the funds to the seller, and the seller disappears. Amazon ultimately refunds your money. 2) The seller immediately cancels the order and instructs you to re-order the item directly from their website, usually with the guarantee that the order is still protected by Amazon. The seller takes your money and runs. Amazon informs you that they do not offer protection on items sold outside of Amazon and cannot help you. 2) The seller immediately cancels the order and instructs you to instead send payment via an unused Amazon gift card by sending the code on the back via email. Once the seller uses the code, the money on the card is gone and cannot be refunded. How to avoid: These scammers can be identified by looking at their Amazon storefronts. They'll be brand new sellers offering a wide range of items at unbelievable prices. Usually their Amazon names will be gibberish, or a variation on FIRSTNAME.LASTNAME. Occasionally however, established storefronts will be hacked. If the deal is too good to be true its most likely a scam.
Scams on eBay
There are scams on eBay targeting both buyers and sellers. As a seller, you should look out for people who privately message you regarding the order, especially if they ask you to ship to a different address or ask to negotiate via text/email/a messaging service. As a buyer you should look out for new accounts selling in-demand items, established accounts selling in-demand items that they have no previous connection to (you can check their feedback history for a general idea of what they bought/sold in the past), and lookout for people who ask you to go off eBay and use another service to complete the transaction. In many cases you will receive a fake tracking number and your money will be help up for up to a month.
Scams on Amazon
There are scams on Amazon targeting both buyers and sellers. As a seller, you should look out for people who message you about a listing. As a buyer you should look out for listings that have an email address for you to contact the person to complete the transaction, and you should look out for cheap listings of in-demand items.
Scams on Reddit
Reddit accounts are frequently purchased and sold by fraudsters who wish to use the high karma count + the age of the account to scam people on buy/sell subreddits. You need to take precautions and be safe whenever you are making a transaction online.
Computer scams
Virus scam
A popup or other ad will say that you have a virus and you need to follow their advice in order to remove it. They are lying, and either want you to install malware or pay for their software.

Assorted scams

Chinese Brushing / direct shipping
If you have ever received an unsolicited small package from China, your address was used to brush. Vendors place fake orders for their own products and send out the orders so that they can increase their ratings.
Money flipping
Scammer claims to be a banking insider who can double/triple/bazoople any amount of money you send them, with no consequences of any kind. Obviously, the money disappears into their wallet the moment you send it.

General resources

Site to report scams in the United Kingdom: http://www.actionfraud.police.uk/
Site to report scams in the United States: https://www.ic3.gov/default.aspx
Site to report scams in Canada: www.antifraudcentre-centreantifraude.ca/reportincident-signalerincident/index-eng.htm
Site to report scams in Europe: https://www.europol.europa.eu/report-a-crime/report-cybercrime-online
FTC scam alerts: https://www.consumer.ftc.gov/scam-alerts
Microsoft's anti-scam guide: https://www.microsoft.com/en-us/safety/online-privacy/avoid-phone-scams.aspx
https://www.usa.gov/common-scams-frauds
https://www.usa.gov/scams-and-frauds
https://www.consumer.ftc.gov/features/scam-alerts
https://www.fbi.gov/scams-and-safety/common-fraud-schemes
submitted by EugeneBYMCMB to Scams [link] [comments]

Flatten the Curve. #18. The current cold war between China and America explained. And how China was behind the 2008 Wall Street financial Crash. World War 3 is coming.

China, the USA, and the Afghanistan war are linked. And in order to get here, we will start there.
9-11 happened. Most of the planet mistakenly understood terrorists had struck a blow against Freedom and Capitalism and Democracy. It was time to invade Afghanistan. Yet all of the terrorists were linked to Saudi Arabia and not Afghanistan, that didn't make sense either. Yet they invaded to find Bin Laden, an ex CIA asset against the Soviet Union and it's subjugation of Afghanistan. The land in the middle of nowhere in relation to North America and the West. It was barren. A backwater without any strategic importance or natural resources.
Or was there?
The survey for rare earth elements was only made possible by the 2001 U.S. invasion, with work beginning in 2004. Mirzad says the Russians had already done significant surveying work during their military occupation of the country in the 1980s. Mirzad also toes the line for U.S. corporations, arguing, “The Afghan government should not touch the mining business. We have to give enough information to potential investors.”
Rare Earth Elements. The elements that make the information age possible. People could understand the First Gulf War and the Geopolitical importance of oil. That was easy, but it still didn't sound morally just to have a war for oil. It was too imperialist and so they fell in line and supported a war for Kuwaiti freedom instead, despite the obvious and public manipulation at the UN by Nayirah.
This is some of her testimony to the Human Rights Council.
While I was there, I saw the Iraqi soldiers come into the hospital with guns. They took the babies out of the incubators, took the incubators and left the children to die on the cold floor. It was horrifying. I could not help but think of my nephew who was born premature and might have died that day as well. After I left the hospital, some of my friends and I distributed flyers condemning the Iraqi invasion until we were warned we might be killed if the Iraqis saw us.
The Iraqis have destroyed everything in Kuwait. They stripped the supermarkets of food, the pharmacies of medicine, the factories of medical supplies, ransacked their houses and tortured neighbors and friends.
There was only one problem. She was the daughter of Saud Al-Sabah, the Kuwaiti ambassador to the United States. Furthermore, it was revealed that her testimony was organized as part of the Citizens for a Free Kuwait public relations campaign, which was run by the American public relations firm Hill & Knowlton for the Kuwaiti government (fun fact, Hill & Knowlton also have extensive ties with Bill Gates).
So the public was aghast at her testimony and supported the war against the mainly Soviet backed, but also American supported and Soviet backed Saddam Hussein, in his war against Iran, after the Iranians refused to Ally with American interests after the Islamic Revolution.
But that was oil, this was Rare Earth Elements. There was a reason the war was called, Operation Enduring Freedom. This natural resource was far more important in the long run. You couldn't have a security surveillance apparatus without it. And what was supposed to be a war on terror was in actuality a territorial occupation for resources.
Sleeping Dragon China is next, and where there's smoke, there's fire.
Let's go point form for clarity.
• China entered the rare earth market in the mid-1980s, at a time when the US was the major producer. But China soon caught up and became the production leader for rare earths. Its heavily state-supported strategy was aimed at dominating the global rare earth industry.
• 1989 Beijing’s Tiananmen Square spring. The U.S. government suspends military sales to Beijing and freezes relations.
• 1997. Clinton secures the release of Wei and Tiananmen Square protester Wang Dan. Beijing deports both dissidents to the United States. (If you don't understand these two were CIA assets working in China, you need to accept that not everything will be published. America wouldn't care about two political activists, but why would care about two intelligence operatives).
• March 1996. Taiwan’s First Free Presidential Vote.
• May 1999. America "accidently" bombs the Belgrade Chinese Embassy.
• 2002 Price competitiveness was hard for the USA to achieve due to low to non-existent Chinese environmental standards; as a result, the US finally stopped its rare earth production.
• October 2000. U.S. President Bill Clinton signs the U.S.-China Relations Act. China's take over of the market share in rare earth elements starts to increase.
• October 2001. Afghanistan war Enduring Freedom started to secure rare earth elements (Haven't you ever wondered how they could mobilize and invade so quickly? The military was already prepared).
• 2005. China establishes a monopoly on global production by keeping mineral prices low and then panics markets by introducing export quotas to raise prices by limiting supply.
• Rare Earth Elements. Prices go into the stratosphere (for example, dysprosium prices do a bitcoin, rocketing from $118/kg to $2,262/kg between 2008 and 2011).
• In a September 2005. Deputy Secretary of State Robert B. Zoellick initiates a strategic dialogue with China. This was presented as dialog to acknowledge China's emergence as a Superpower (which China probably insisted on), but it was about rare earth elements market price.
• October 2006. China allows North Korea to conduct its first nuclear test, China serves as a mediator to bring Pyongyang back to the negotiating table with the USA.
• September 2006. American housing prices start to fall.
(At some point after this, secret negotiations must have become increasingly hostile).
• March 2007. China Increases Military Spending. U.S. Vice President Dick Cheney says China’s military buildup is “not consistent” with the country’s stated goal of a “peaceful rise.”
• Mid-2005 and mid-2006. China bought between $100b and $250 billion of US housing debt between mid-2005 and mid-2006. This debt was bought using the same financial instruments that caused the financial collapse.
• 2006. Housing prices started to fall for the first time in decades.
• Mid-2006 and mid-2007. China likely added another $390b to its reserves. "At the same time, if China stopped buying -- especially now, when the private market is clogged up -- US financial markets would really seize up." Council on Foreign Relations-2007 August
• February 27, 2007. Stock markets in China and the U.S. fell by the most since 2003. Investors leave the money market and flock to Government backed Treasury Bills.
I've never seen it like this before,'' said Jim Galluzzo, who began trading short-maturity Treasuries 20 years ago and now trades bills at RBS Greenwich Capital in Greenwich, Connecticut.Bills right now are trading like dot-coms.''
We had clients asking to be pulled out of money market funds and wanting to get into Treasuries,'' said Henley Smith, fixed-income manager in New York at Castleton Partners, which oversees about $150 million in bonds.People are buying T-bills because you know exactly what's in it.''
• February 13, 2008. The Economic Stimulus Act of 2008 was enacted, which included a tax rebate. The total cost of this bill was projected at $152 billion for 2008. A December 2009 study found that only about one-third of the tax rebate was spent, providing only a modest amount of stimulus.
• September 2008. China Becomes Largest U.S. Foreign Creditor at 600 billion dollars.
• 2010. China’s market power peaked in when it reached a market share of around 97% of all rare earth mineral production. Outside of China, there were almost no other producers left.
Outside of China, the US is the second largest consumer of rare earths in the world behind Japan.
About 60% of US rare earth imports are used as catalysts for petroleum refining, making it the country’s major consumer of rare earths.
The US military also depends on rare earths. Many of the most advanced US weapon systems, including smart bombs, unmanned drones, cruise missiles, laser targeting, radar systems and the Joint Strike Fighter programme rely on rare earths. Against this background, the US Department of Defense (DoD) stated that “reliable access to the necessary material is a bedrock requirement for DOD”
• 2010. A trade dispute arose when the Chinese government reduced its export quotas by 40% in 2010, sending the rare earths prices in the markets outside China soaring. The government argued that the quotas were necessary to protect the environment.
• August 2010. China Becomes World’s Second-Largest Economy.
• November 2011. U.S. Secretary of State Hillary Clinton outlines a U.S. “pivot” to Asia. Clinton’s call for “increased investment—diplomatic, economic, strategic, and otherwise—in the Asia-Pacific region” is seen as a move to counter China’s growing clout.
• December 2011. U.S. President Barack Obama announces the United States and eight other nations have reached an agreement on the Trans-Pacific Partnership later announces plans to deploy 2,500 marines in Australia, prompting criticism from Beijing.
• November 2012. China’s New Leadership. Xi Jinping replaces Hu Jintao as president, Communist Party general secretary, and chairman of the Central Military Commission. Xi delivers a series of speeches on the “rejuvenation” of China.
• June 2013. U.S. President Barack Obama hosts Chinese President Xi Jinping for a “shirt-sleeves summit”
• May 19, 2014. A U.S. court indicts five Chinese hackers, allegedly with ties to China’s People’s Liberation Army, on charges of stealing trade technology from U.S. companies.
• November 12, 2014. Joint Climate Announcement. Barack Obama and Chinese President Xi Jinping issue a joint statement on climate change, pledging to reduce carbon emissions. (which very conveniently allows the quotas to fall and save pride for Xi).
• 2015. China drops the export quotas because in 2014, the WTO ruled against China.
• May 30, 2015 U.S. Warns China Over South China Sea. (China is trying to expand it's buffer zone to build a defense for the coming war).
• January 2016. The government to abolish the one-child policy, now allowing all families to have two children.
• February 9, 2017. Trump Affirms One China Policy After Raising Doubts.
• April 6 – 7, 2017. Trump Hosts Xi at Mar-a-Lago. Beijing and Washington to expand trade of products and services like beef, poultry, and electronic payments, though the countries do not address more contentious trade issues including aluminum, car parts, and steel.
• November 2017. President Xi meets with President Trump in another high profile summit.
• March 22, 2018. Trump Tariffs Target China. The White House alleges Chinese theft of U.S. technology and intellectual property. Coming on the heels of tariffs on steel and aluminum imports, the measures target goods including clothing, shoes, and electronics and restrict some Chinese investment in the United States.
• July 6, 2018 U.S.-China Trade War Escalates.
• September 2018. Modifications led to the exclusion of rare earths from the final list of products and they consequently were not subject to import tariffs imposed by the US government in September 2018.
• October 4, 2018. Pence Speech Signals Hard-Line Approach. He condemns what he calls growing Chinese military aggression, especially in the South China Sea, criticizes increased censorship and religious persecution by the Chinese government, and accuses China of stealing American intellectual property and interfering in U.S. elections.
• December 1, 2018. Canada Arrests Huawei Executive.
• March 6, 2019. Huawei Sues the United States.
• March 27 2019. India and the US signed an agreement to "strengthen bilateral security and civil nuclear cooperation" including the construction of six American nuclear reactors in India
• May 10, 2019. Trade War Intensifies.
• August 5, 2019. U.S. Labels China a Currency Manipulator.
• November 27, 2019. Trump Signs Bill Supporting Hong Kong Protesters. Chinese officials condemn the move, impose sanctions on several U.S.-based organizations, and suspend U.S. warship visits to Hong Kong.
• January 15, 2020. ‘Phase One’ Trade Deal Signed. But the agreement maintains most tariffs and does not mention the Chinese government’s extensive subsidies. Days before the signing, the United States dropped its designation of China as a currency manipulator.
• January 31, 2020. Tensions Soar Amid Coronavirus Pandemic.
• March 18, 2020. China Expels American Journalists. The Chinese government announces it will expel at least thirteen journalists from three U.S. newspapers—the New York Times, Wall Street Journal, and Washington Post—whose press credentials are set to expire in 2020. Beijing also demands that those outlets, as well as TIME and Voice of America, share information with the government about their operations in China. The Chinese Foreign Ministry says the moves are in response to the U.S. government’s decision earlier in the year to limit the number of Chinese journalists from five state-run media outlets in the United States to 100, down from 160, and designate those outlets as foreign missions.
And here we are. You may have noticed the Rare Earth Elements and the inclusion of Environmental Standards. Yes these are key to understanding the Geopolitical reality and importance of these events. There's a reason the one child policy stopped. Troop additions.
I believe our current political reality started at Tiananmen square. The protests were an American sponsored attempt at regime change after the failure to convince them to leave totalitarian communism and join a greater political framework.
Do I have proof? Yes.
China, as far as I'm concerned, was responsible for the 2008 economic crisis. The Rare Earth Elements were an attempt to weaken the States and strengthen themselves simultaneously. This stranglehold either forced America to trade with China, or the trade was an American Trojan horse to eventually collapse their economy and cause a revolution after Tiananmen Square failed. Does my second proposal sound far fetched? Didn't the economy just shut down in response to the epidemic? Aren't both sides blaming the other? At this POINT, the epidemic seems to be overstated doesn’t it? Don't the casualties tend to the elder demographic and those already weakened by a primary disease?
Exactly the kinds who wouldn't fight in a war.
Does this change some of my views on the possibility of upcoming catastrophes and reasons for certain events? No. This is Chess, and there are obvious moves in chess, hidden moves in chess, but the best moves involve peices which can be utilized in different ways if the board calls for it.
Is all what it seems? No.
I definitely changed a few previously held beliefs prior to today, and I would caution you in advance that you will find some previously held convictions challenged.
After uncovering what I did today, I would also strongly suggest reading information cautiously. This is all merely a culmination of ending the cold war, and once I have events laid out, you will see it as well.
At this moment, the end analysis is a war will start in the near future. This will be mainly for a few reasons, preemptive resource control for water and crops, population reduction can be achieved since we have too many people, not enough jobs, and upcoming resource scarcity.
Did you notice my omission of rare earth elements? This is because of Afghanistan. I would wager China or Russia is somehow supporting the continued resistance through Iran. But events are now accelerating with China because the western collation has already begun to build up their mines and start production.
Do you remember when Trump made a "joke" about buying Greenland? Yeah. It turns out that Greenland has one of the largest rare earth mineral deposits on the planet.
Take care. Be safe. Stay aware and be prepared.
This message not brought to you by the Bill and Melinda Gates Foundation, Microsoft, Google, Facebook, Elon Musk, Blackrock, Vangaurd, the Rockefeller Foundation, Rand Corporation, DARPA, Rothschilds, Agenda 21, Agenda 30, and ID 2020.
submitted by biggreekgeek to conspiracy [link] [comments]

Mega eTextbooks release thread (part-28)! Find your textbooks here between $5-$25 :)

Please find the list below:
  1. Disease Gene Identification: Methods and Protocols, 2nd Edition: Johanna K. DiStefano
  2. Statistical Aspects of the Microbiological Examination of Foods, 3rd Edition: Basil Jarvis
  3. Revel for Social Problems, 14th Edition: Stanley Eitzen & Maxine Baca Zinn & Kelly Ei Smith
  4. Fundamentals of Human Resource Management: Pearson New International Edition, 3rd Edition: Gary Dessler
  5. Economics Today: The Micro View, 18th Edition: Roger LeRoy Miller
  6. Employment Law for Business, 8th Edition: Dawn Bennett-Alexander & Laura Hartman
  7. Surgical Exposures in Orthopaedics: The Anatomic Approach, 5th Edition: Stanley Hoppenfeld & Piet de Boer & Richard Buckley
  8. Project Management in Construction, 7th Edition: Sidney Levy
  9. Financial and Managerial Accounting, 7th Edition: John Wild & Ken Shaw & Barbara Chiappetta
  10. Handbook of Plant Disease Identification and Management, 1st Edition: Balaji Aglave
  11. Ubuntu Unleashed 2019 Edition: Covering 18.04, 18.10, 19.04, 13th Edition: Matthew Helmke
  12. Handbook of Insulin Therapies, 1st Edition: Winston Crasto & Janet Jarvis & Melanie J. Davies
  13. Python for Programmers: with Big Data and Artificial Intelligence Case Studies, 1st Edition: Paul J. Deitel & Harvey Deitel
  14. Medical Ethics: Accounts of Ground-Breaking Cases, 7th Edition: Gregory Pence
  15. Human Resource Management, 13th Edition: Gary Dessler
  16. The Biology and Therapeutic Application of Mesenchymal Cells, 2 Volume Set, 1st Edition: Kerry Atkinson
  17. Computer Security Fundamentals, 3rd Edition: William Chuck Easttom
  18. Hendee's Radiation Therapy Physics, 4th Edition: Todd Pawlicki & Daniel J. Scanderbeg & George Starkschall
  19. Nutrient Delivery, 1st Edition: Alexandru Grumezescu
  20. Technology Entrepreneurship: Taking Innovation to the Marketplace, 2nd Edition: Thomas N. Duening & Robert A. Hisrich & Michael A. Lechter
  21. Chemistry of Metalloproteins: Problems and Solutions in Bioinorganic Chemistry, 1st Edition: Joseph J. Stephanos & Anthony W. Addison
  22. Mathematical Statistics with Applications in R, 2nd Edition: Kandethody M. Ramachandran & Chris P. Tsokos
  23. Diagnostic Imaging: Genitourinary, 3rd Edition: Mitchell E. Tublin
  24. Comprehensive Management of Arteriovenous Malformations of the Brain and Spine, 1st Edition: Robert F. Spetzler & Douglas S. Kondziolka & Randall T. Higashida & M. Yashar S. Kalani
  25. Digital Design: With an Introduction to the Verilog HDL, 5th Edition: M. Morris R. Mano & Michael D. Ciletti
  26. Plasmids: Biology and Impact in Biotechnology and Discovery, 1st Edition: Marcelo E. Tolmasky & Juan C. Alonso
  27. Consumer Behavior: Buying, Having, and Being, Global Edition, 12th Edition: Michael R. Solomon
  28. Project Management Case Studies, 5th Edition: Harold Kerzner
  29. Medical Phisiology: Principles for Clinical Medicine, 4th Edition: Rodney A. Rhoades & David R. Bell
  30. Essentials of Contemporary Management, 7th Edition: Gareth Jones & Jennifer George
  31. Harmony and Voice Leading, 4th Edition: Thomas E. Benjamin & Michael Horvit & Robert S. Nelson
  32. Principles of Economics, 2nd Edition: Lee Coppock & Dirk Mateer
  33. Oral Microbiology and Immunology, 2nd Edition: Richard J. Lamont & George N. Hajishengallis & Howard F. Jenkinson
  34. Magnetic Resonance Imaging of the Brain and Spine, 5th Edition: Scott W. Atlas
  35. Accounting Information Systems: Controls and Processes, 3rd Edition: Leslie Turner & Andrea B. Weickgenannt & Mary Kay Copeland
  36. Strategic Corporate Social Responsibility: Sustainable Value Creation, 5th Edition: David Chandler
  37. Julien's Primer of Drug Action: A Comprehensive Guide to the Actions, Uses, and Side Effects of Psychoactive Drugs, 14th Edition: Claire D. Advokat & Joseph Comaty & Robert Julien
  38. The Grand Chessboard: American Primacy And Its Geostrategic Imperatives, 1st Edition: Zbigniew Brzezinski
  39. The Cosmic Perspective: The Solar System, 8th Edition: Jeffrey O. Bennett & Megan O. Donahue & Nicholas Schneider & Mark Voit
  40. Ultrastructure Atlas of Human Tissues, 1st Edition: Fred Hossler
  41. Advances in the Biology and Management of Modern Bed Bugs, 1st Edition: Stephen L. Doggett & Dini M. Miller & Chow-Yang Lee
  42. Patterns of World History: Volume One: To 1600, 1st Edition: Peter von Sivers & Charles A. Desnoyers & George B. Stow
  43. Genitourinary Imaging: A Core Review, 1st Edition: Matthew Davenport
  44. Evidence-based Obstetrics and Gynecology, 1st Edition: Errol R. Norwitz & Carolyn M. Zelop & David A. Miller & David L. Keefe
  45. Zoology, 10th Edition: Stephen Miller & John Harley
  46. Radical and Reconstructive Gynecologic Cancer Surgery, 1st Edition: Robert Bristow & Dennis Chi
  47. Davis's Diseases & Disorders A Nursing Therapeutics Manual, 6th Edition: Marilyn Sawyer Sommers
  48. Management & Cost Accounting, 6th Edition: Alnoor Bhimani
  49. Elements of Modern Algebra, 8th Edition: Linda Gilbert
  50. Psychiatric & Mental Health Nursing, 4th Edition: Katie Evans & Debra Nizette & Anthony O'Brien
  51. Molecular Biology: Different Facets, 1st Edition: Anjali Priyadarshini & Prerna Pandey
  52. Elementary Number Theory, 7th Edition: David Burton
  53. Accounting Information Systems, 14th Edition: Marshall B. Romney & Paul J. Steinbart
  54. Microeconomics, Global Edition, 9th Edition: Robert Pindyck & Daniel Rubinfeld
  55. Psychiatric and Mental Health Nursing Demystified, 1st Edition: Jim Keogh
  56. Entrepreneurship, 10th Edition: Robert Hisrich & Michael Peters & Dean Shepherd
  57. Ganong's Review of Medical Physiology, 26th Edition: Kim E. Barrett & Susan M. Barman & Jason Yuan & Heddwen L. Brooks
  58. Textbook of Obstetrics and Gynaecology: A life course approach, 1st Edition: Eric A.P. Steegers & Bart C.J.M. Fauser & Carina G.J.M. Hilders
  59. Engineering Mechanics: Statics, 8th Edition: James L. Meriam & L. G. Kraige & J. N. Bolton
  60. Basic Concepts of Psychiatric-Mental Health Nursing, 8th Edition: Louise Rebraca Shives
  61. Beckmann and Ling's Obstetrics and Gynecology, 8th Edition: Robert Casanova
  62. Biology: Concepts and Applications, 10th Edition: Cecie Starr & Christine Evers & Lisa Starr
  63. Estimating in Building Construction, 9th Edition: Steven J. Peterson & Frank R. Dagostino
  64. The Big Back Book: Tips & Tricks for Therapists, 1st Edition: Jane Johnson
  65. University Physics with Modern Physics, 14th Edition: Hugh D. Young & Roger A. Freedman
  66. Poisoning and Drug Overdose, 7th Edition: Kent Olson & Ilene Anderson & Neal Benowitz & Paul Blanc
  67. Koneman's Color Atlas and Textbook of Diagnostic Microbiology, 7th Edition: Gary W. Procop
  68. Experimental Psychology, 7th Edition: Anne Myers & Christine H. Hansen
  69. Marketing: An Introduction, 13th Edition: Gary Armstrong & Philip Kotler
  70. Gray's Anatomy for Students: With Student Consult, 3rd Edition: Richard Drake & A. Wayne Vogl & Adam W. M. Mitchell
  71. Chestnut's Obstetric Anesthesia: Principles and Practice, 5th Edition: David H. Chestnut & Cynthia A Wong & Lawrence C Tsen & Warwick D Ngan Kee & Yaakov Beilin & Jill Mhyre
  72. Chemistry: The Molecular Science, 5th Edition: John W. Moore & Conrad L. Stanitski
  73. Head, Neck and Dental Emergencies, 2nd Edition: Mike Perry
  74. Wong's Nursing Care of Infants and Children, 10th Edition: Marilyn J. Hockenberry & David Wilson
  75. Sports Emergency Care: A Team Approach, 3rd Edition: Robb Rehberg & Jeff G. Konin
  76. New Venture Creation: Entrepreneurship for the 21st Century, 10th Edition: Stephen Spinelli & Rob Adams
  77. Caring for the Vulnerable: Perspectives in Nursing Theory, Practice, and Research, 5th Edition: Mary de Chesnay & Barbara Anderson
  78. Geometry: The Line and the Circle: Maureen T. Carroll & Elyn Rykken
  79. Histories of Human Engineering: Tact and Technology: Maarten Derksen
  80. Land Restoration: Reclaiming Landscapes for a Sustainable Future, 1st Edition: Ilan Chabay & Martin Frick & Jennifer Helgeson
  81. Yamada's Handbook of Gastroenterology, 3rd Edition: Tadataka Yamada & John M. Inadomi & Renuka Bhattacharya & Jason A. Dominitz & Joo Ha Hwang
  82. Theoretical Physics 9: Fundamentals of Many-body Physics, 2nd Edition: Wolfgang Nolting & William D. Brewer
  83. Introduction to Programming with C++, 3rd Edition: Y. Daniel Liang
  84. Dental Emergencies, 1st Edition: Mark Greenwood & Ian Corbett
  85. Fundamentals of Physics and Chemistry of the Atmosphere, 2nd Edition: Guido Visconti
  86. Calculus: Early Transcendentals, 3rd Edition: William L. Briggs & Lyle Cochran & Bernard Gillett & Eric Schulz
  87. Educating Physical Therapists, 1st Edition: Gail Jensen
  88. Strategic Developments in Eurasia After 11 September, 1st Edition: Shireen Hunter
  89. Contemporary Issues in Healthcare Law and Ethics, 4th Edition: Dean Harris
  90. Transitioning from RN to MSN: Principles of Professional Role Development: Brenda Scott & Mindy Thompson
  91. Principles and Practice of Public Health Surveillance, 3rd Edition: Lisa M. Lee & Steven M. Teutsch & Stephen B. Thacker & Michael E. St. Louis
  92. Elementary Statistics: Picturing the World, 6th Edition: Ron Larson & Betsy Farber
  93. Human Sexuality in a World of Diversity, 6th Canadian Edition: Spencer A. Rathus & Jeffrey S. Nevid & Lois Fichner-Rathus & Alex McKay & Robin Milhausen
  94. Becoming Your Own Banker, 6th Edition: R. Nelson Nash
  95. Murach's MySQL, 3rd Edition: Joel Murach
  96. Intermediate Algebra, 13th Edition: Marvin L. Bittinger & Judith A. Beecher & Barbara L. Johnson
  97. Planning Health Promotion Programs: An Intervention Mapping Approach, 4th Edition: L. Kay Bartholomew Eldredge & Christine M. Markham & Robert A. C. Ruiter & Maria E. Fernández & Gerjo Kok & Guy S. Parcel
  98. Human Factors in Simple and Complex Systems, 3rd Edition: Robert W. Proctor & Trisha Van Zandt
  99. The Irony of Democracy: An Uncommon Introduction to American Politics, 17th Edition: Louis Schubert & Thomas R. Dye & Harmon Zeigler
  100. Understanding Earth, 7th Edition: John Grotzinger
  101. Nursing Research in Canada: Methods, Critical Appraisal, and Utilization, 4th Edition: Geri LoBiondo-Wood & Judith Haber & Cherylyn Cameron & Mina Singh
  102. The Philosophy of Film, 1st Edition: Thomas E. Wartenberg & Angela Curran
  103. Disaster Nursing and Emergency Preparedness, 4th Edition: Tener Goodwin Veenema
  104. Language in Mind: An Introduction to Psycholinguistics, 2nd Edition: Julie Sedivy
  105. Medical Anthropology: A Biocultural Approach, 3rd Edition: Andrea S. Wiley & John S. Allen
  106. Exploring Biology in the Laboratory, 3rd Edition: Murray P. Pendarvis & John L. Crawley
  107. Guide to Networking Essentials, 8th Edition: Greg Tomsho
  108. Social Psychology: A Storytelling Approach, 2nd Edition: Leonard Newman & Ralph Erber
  109. Managing Conflict: An Introspective Journey to Negotiating Skills, 1st Edition: Dorothy Balancio
  110. Environmental Change and Challenge: A Canadian Perspective, 5th Edition: Philip Dearden & Bruce Mitchell
  111. Brain and Behavior: A Cognitive Neuroscience Perspective, 1st Edition: David Eagleman & Jonathan Downar
  112. Cardiac/Vascular Nurse Exam Secrets Study Guide: Cardiac/Vascular Nurse Test Review for the Cardiac/Vascular Nurse Exam: Mometrix Media & Cardiac Vascular Nurse Exam Secrets
  113. Keeping the Republic: Power and Citizenship in American Politics, The Essentials, 9th Edition: Christine Barbour & Gerald Wright
  114. Principles of Environmental Science, 9th Edition: William Cunningham & Mary Cunningham
  115. Thomas' Calculus, 14th Edition: Joel R. Hass & Christopher E. Heil & Maurice D. Weir
  116. Pharmacology for Canadian Pharmacy Technicians, 1st Edition: Leland Norman Holland & Michael P. Adams & Jeanine Lynn Brice & Heather V. LeBlanc
  117. Cellular and Molecular Immunology, 9th Edition: Abul K. Abbas & Andrew H. Lichtman & Shiv Pillai
  118. Operations Management: Processes and Supply Chains, 11th Edition: Lee J. Krajewski & Manoj K. Malhotra & Larry P. Ritzman
  119. Jews, Christians, Muslims: A Comparative Introduction to Monotheistic Religions, 2nd Edition: John Corrigan & Frederick Denny & Martin S Jaffee & Carlos Eire
  120. Professional Nursing: Concepts & Challenges, 9th Edition: Beth Black
  121. Practical Homicide Investigation: Tactics, Procedures, and Forensic Techniques, 4th Edition: Vernon J. Geberth
  122. Fundamentals of Modern Manufacturing: Materials, Processes and Systems, 7th Edition: Mikell P. Groover
  123. Genetics: A Conceptual Approach, 7th Edition: Benjamin A. Pierce
  124. Computer Science Illuminated, 7th Edition: Nell Dale & John Lewis
  125. The Globalization of World Politics: An Introduction to International Relations, 8th Edition: John Baylis & Steve Smith & Patricia Owens
  126. Behavioral Neuroscience, 9th Edition: S. Marc Breedlove & Neil V. Watson
  127. Canadian Human Resource Management: A Strategic Approach, 12th Edition: Hermann Schwind & Krista Uggerslev & Terry Wagar & Neil Fassina
  128. Brief Principles of Macroeconomics, 9th Edition: N. Gregory Mankiw
  129. Living in the Environment, 4th Canadian Edition: G. Miller & Dave Hackett & Carl Wolfe
  130. Principles of Economics, 9th Edition: N. Gregory Mankiw
  131. Principles of Microeconomics, 9th Edition: N. Gregory Mankiw
  132. Child Development, 9th Edition: Laura E. Berk
  133. Home, School, and Community Collaboration: Culturally Responsive Family Engagement, 4th Edition: Kathy Beth Grant & Julie A. Ray
  134. Set Lighting Technician's Handbook, 4th Edition: Harry Box
  135. Clinical Nurse Leader Certification Review, 2nd Edition: Cynthia R. King
  136. Basic Chemistry, 4th Edition: Karen C. Timberlake & William Timberlake
  137. Sparks & Taylor's Nursing Diagnosis Pocket Guide, 3rd Edition: Linda Phelps
  138. Family Theories: Foundations and Applications, 1st Edition: Katherine R. Allen & Angela C. Henderson
  139. The Earth and Its Peoples: A Global History, 7th Edition: Richard Bulliet & Pamela Crossley & Daniel Headrick & Steven Hirsch & Lyman Johnson
  140. Sociology in Action: A Canadian Perspective, 3rd Edition: Tami Bereska & Diane Symbaluk
  141. Operations Management: Processes and Supply Chains, 12th Edition: Lee J. Krajewski & Manoj K. Malhotra & Larry P. Ritzman
  142. Introduction to Food Science and Food Systems, 2nd Edition: Rick Parker & Miriah Pace
  143. Liaisons, Student Edition: An Introduction to French, 3rd Edition: Wynne Wong & Stacey Weber-Fève & Bill VanPatten
  144. Zuckerman Parker Handbook of Developmental and Behavioral Pediatrics for Primary Care, 4th Edition: Marilyn Augustyn & Barry Zuckerman
  145. Teaching in Today's Inclusive Classrooms: A Universal Design for Learning Approach, 3rd Edition: Richard M. Gargiulo & Debbie Metcalf
  146. The Biological Basis of Mental Health, 3rd Edition: William T. Blows
  147. Developing and Managing Electronic Collections: The Essentials: Peggy Johnson
  148. Western Civilization: Volume II: Since 1500, 10th Edition: Jackson J. Spielvogel
  149. Talking to Strangers: What We Should Know about the People We Don't Know, 1st Edition: Malcolm Gladwell
  150. Understanding Pathophysiology, 7th Edition: Sue E. Huether & Kathryn L. McCance
  151. Our Environment: A Canadian Perspective, 5th edition: Dianne Draper & Ann Zimmerman
  152. Criminal Law: Cases and Materials, 8th Edition: John Kaplan & Robert Weisberg & Guyora Binder
  153. A Photographic Atlas of Histology, 2nd Edition: Michael J Leboffe
  154. Dragons and Tigers: A Geography of South, East, and Southeast Asia, 3rd Edition: Barbara A. Weightman
  155. Climate Change Biology, 1st Edition: Jonathan A. Newman & Madhur Anand & Hugh A. L. Henry & Shelley L. Hunt & Ze'ev Gedalof
  156. The Power of Critical Thinking: 5th Canadian Edition: Chris MacDonald and Lewis Vaughn
  157. Principles of Fire Behavior and Combustion, 4th Edition: Richard Gann & Raymond Friedman
  158. Informatics Nurse Exam Secrets Study Guide: Informatics Test Review for the Informatics Nurse Certification Exam: Informatics Exam Secrets Test Prep Team
  159. General Chemistry, 10th Edition: Darrell Ebbing & Steven D. Gammon
  160. A Practical Guide to Computer Forensics Investigations, 1st Edition: Darren R. Hayes
  161. Basic Biomechanics, 8th Edition: Susan Hall
  162. Essay Writing for Canadian Students, 8th Edition: Roger Davis & Laura K. Davis
  163. Biology, 11th Edition: Peter Raven & George Johnson & Kenneth Mason & Jonathan Losos & Susan Singer
  164. Molecular Imaging, 1st Edition: Ralph Weissleder& Brian D. Ross & Alnawaz Rehemtulla & Sanjiv Sam Gambhir
  165. Criminology, 4th Edition: Frank Schmalleger
  166. A Theory of Truthmaking: Metaphysics, Ontology, and Reality: Jamin Asay
  167. The Routledge Handbook of Metaphysical Grounding, 1st Edition: Michael J. Raven
  168. Linear Algebra and Its Applications, 5th Edition: David C. Lay & Steven R. Lay & Judi J. McDonald
  169. Essentials of Human Communication, 9th Edition: Joseph A. DeVito
  170. Economics: Principles, Applications, and Tools, 9th Edition, Global Edition: Arthur O'Sullivan & Steven Sheffrin & Stephen Perez
  171. Global Health 101, 3rd Edition: Richard Skolnik
  172. Mathematical Proofs: A Transition to Advanced Mathematics, 4th Edition: Gary Chartrand & Albert D. Polimeni & Ping Zhang
  173. Concepts in Strategic Management and Business Policy: Globalization, Innovation and Sustainability, 15th Edition, Global Edition: Thomas L. Wheelen & J. David Hunger & Alan N. Hoffman & Charles E. Bamford
  174. Chemistry: The Central Science, 14th Edition, Global Edition: Theodore E. Brown & H. Eugene LeMay & Bruce E. Bursten & Catherine Murphy & Patrick Woodward & Matthew E. Stoltzfus
  175. Biopsychology, 10th Edition, Global Edition: John P. J. Pinel & Steven Barnes
  176. Electric Circuits, 11th Edition: James W. Nilsson & Susan Riedel
  177. Keeping the Republic; Power and Citizenship in American Politics, the Essentials, 8th Edition: Christine Barbour & Gerald C Wright
  178. Applied Behavior Analysis: Pearson New International Edition, 2nd Edition: John O. Cooper & Timothy E. Heron & William L. Heward
  179. Cryptography and Network Security: Principles and Practice, 7th Edition, Global Edition: William Stallings
  180. Operating Systems: Internals and Design Principles, 9th Edition, Global Edition: William Stallings
  181. Options, Futures, and Other Derivatives, 9th Edition, Global Edition: John C. Hull
  182. Invitation to the Psychology of Religion, 3rd Edition: Raymond F. Paloutzian
  183. Valuation: The Art and Science of Corporate Investment Decisions, 3rd Edition: Sheridan Titman
  184. Comprehensive Clinical Nephrology, 5th Edition: Richard J. Johnson & John Feehally & Jurgen Floege
  185. Miller & Freund's Probability and Statistics for Engineers, 9th Edition, Global Edition: Richard Johnson & Irwin Miller & John Freund
  186. Exploring Strategy: Text and Cases, 11th Edition: Gerry Johnson & Richard Whittington & Patrick Regnér & Kevan Scholes & Duncan Angwin
  187. Economics for Business, 7th Edition: John Sloman
  188. Essentials of Economics, 7th Edition: John Sloman & Dean Garratt
  189. Economics, 9th Edition: John Sloman & Dean Garratt & Alison Wride
  190. Essential Economics for Business, 5th Edition: Johnsloman & Jones Elizabeth
  191. Finite Mathematics, 7th Edition: Stefan Waner & Steven Costenoble
  192. The SAGE Encyclopedia of Surveillance, Security, and Privacy, 1st Edition: Bruce A. Arrigo
  193. Evolution, 4th Edition: Douglas J. Futuyma & Mark Kirkpatrick
  194. Adult Development and Aging, 7th Edition: John C. Cavanaugh & Fredda Blanchard-Fields
  195. Foundations of Finance, 9th Edition, Global Edition: Arthur J. Keown & John D Martin & J. William Petty
  196. Learning PHP, MySQL & JavaScript: With jQuery, CSS & HTML5, 4th Edition: Robin Nixon
  197. Head First Learn to Code: A Learner's Guide to Coding and Computational Thinking, 1st Edition: Eric Freeman
  198. Learning Swift: Building Apps for macOS, iOS, and Beyond, 3rd Edition: Jonathon Manning & Paris Buttfield-Addison & Tim Nugent
  199. Database Systems: Design, Implementation, & Management, 12th Edition: Carlos Coronel & Steven Morris
  200. Introduction to Solid Modeling Using SolidWorks, 13th Edition: William Howard & Joseph Musto
  201. Communications Receivers: Principles and Design, 4th Edition: Ulrich Rohde & Jerry Whitaker & Hans Zahnd
  202. Connect Core Concepts in Health, 15th Edition: Paul Insel & Walton Roth
  203. On Course: Strategies for Creating Success in College and in Life, 8th Edition: Skip Downing
  204. Vander's Human Physiology, 15th Edition: Eric Widmaier & Hershel Raff & Kevin Strang
  205. Biology, 4th Edition: Robert Brooker & Eric Widmaier & Linda Graham & Peter Stiling
  206. The Essentials of Statistics: A Tool for Social Research, 4th Edition: Joseph F. Healey
  207. Oracle 12c: SQL, 3rd Edition: Joan Casteel
  208. Global Business Today, 10th Edition: Charles Hill & G. Tomas M. Hult
  209. Project Management: The Managerial Process, 7th Edition: Erik Larson & Clifford Gray
  210. Organizational Behavior: A Practical, Problem-Solving Approach, 2nd Edition: Angelo Kinicki & Mel Fugate
  211. International Management: Culture, Strategy, and Behavior, 10th Edition: Fred Luthans & Jonathan Doh
  212. CorelDRAW X8: The Official Guide, 12th Edition: Gary David Bouton
  213. Physics for Scientists and Engineers: An Interactive Approach, 2nd Edition: Robert Hawkes & Javed Iqbal & Firas Mansour & Marina Milner-Bolotin & Peter Williams
  214. Programmable Logic Controllers, 5th Edition: Frank Petruzella
  215. Foundations in Microbiology, 10th Edition: Kathleen Park Talaro & Barry Chess
  216. Applied Numerical Methods with MATLAB for Engineers and Scientists, 4th Edition: Steven Chapra
  217. Tonal Harmony, 8th Edition: Stefan Kostka & Dorothy Payne & Byron Almén
  218. Discrete Mathematics, 8th Edition: Richard Johnsonbaugh
  219. Bates' Pocket Guide to Physical Examination and History Taking, 8th Edition: Lynn S. Bickley
  220. NANDA International Nursing Diagnoses: Definitions & Classification 2018-2020, 11th Edition: T. Heather Herdman & Shigemi Kamitsuru & Heather T. Herdman
  221. Biology: Concepts and Investigations, 4th Edition: Mariëlle Hoefnagels
  222. Biology: Concepts and Investigations, 3rd Edition: Mariëlle Hoefnagels
  223. Human Biology: Concepts and Current Issues, 8th Edition, Global Edition: Michael D. Johnson
  224. Messages: Building Interpersonal Communication Skills, 5th Canadian Edition: Joseph A. DeVito & Rena Shimoni & Dawne Clark
  225. The Interpersonal Communication Book, 14th Edition, Global Edition: Joseph A. DeVito
  226. Computational Systems Pharmacology and Toxicology, 1st Edition: Rudy J Richardson & Dale E Johnson & Noffisat Oki & David Faulkner
  227. Shelly Cashman Series Microsoft Office 365 & Office 2019 Introductory, 1st Edition: Sandra Cable & Steven M. Freund & Ellen Monk & Susan L. Sebok & Joy L. Starks
  228. The Practice of Emotionally Focused Couple Therapy: Creating Connection, 2nd Edition: Susan M. Johnson
  229. The Marriage Clinic: A Scientifically Based Marital Therapy, 1st Edition: John M. Gottman
  230. Cognitive-Behavioral Therapy with Couples and Families: A Comprehensive Guide for Clinicians, 1st Edition: Frank M. Dattilio & Aaron T. Beck
  231. International Marketing, 17th Edition: Philip R. Cateora & John Graham & Mary C Gilly
  232. Kaplan and Sadock's Concise Textbook of Clinical Psychiatry, 3rd Edition: Benjamin Sadock & Virginia Alcott Sadock
  233. Anthropology, 14th Edition: Carol R. Ember & Melvin Ember & Peter N. Peregrine
  234. The Men They Will Become: The Nature And Nurture Of Male Character: Eli Newberger
  235. Accounting, 27th Edition: Carl S. Warren & James M. Reeve & Jonathan Duchac
  236. ICD-10-CM 2019: The Complete Official Codebook, 1st Edition: American Medical Association
  237. Essentials of Human Anatomy & Physiology, 12th Edition, Global Edition: Elaine N. Marieb & Suzanne M. Keller
  238. Early Childhood Education Today, 14th Edition: George S Morrison
  239. Programming Bitcoin: Learn How to Program Bitcoin from Scratch, 1st Edition: Jimmy Song
  240. The Physiology and Biochemistry of Prokaryotes, 4th Edition: David White & James Drummond & Clay Fuqua
  241. Environmental Microbiology, 3rd Edition: Ian L. Pepper & Charles P. Gerba & Terry J. Gentry
  242. Industrial Microbiology: An Introduction, 1st Edition: Michael J. Waites & Neil L. Morgan & John S. Rockey & Gary Higton
  243. Introduction to Econometrics, Updated 3rd Edition, Global Edition: James H. Stock & Mark W. Watson
  244. Introduction to Econometrics, 3rd Edition: James H. Stock & Mark W. Watson
  245. Expert Oracle Application Express, 2nd Edition: Doug Gault & Dimitri Gielis & Martin DSouza & Roel Hartman
  246. The Art of Reasoning: An Introduction to Logic and Critical Thinking, 4th Edition: David Kelley
  247. Physics, 5th Edition: James S. Walker
  248. Applied Fluid Mechanics, 7th Edition: Robert L. Mott & Joseph A. Untener
  249. Applied Strength of Materials, SI Units Version, 6th Edition: Robert L. Mott & Joseph A. Untener
  250. Social Psychology, 12th Edition: David Myers & Jean Twenge
  251. Applied Strength of Materials, 6th Edition: Robert Mott & Joseph A. Untener
  252. Foundations of Nursing Research, 7th Edition: Rose Marie Nieswiadomy & Catherine Bailey
  253. Molecular Cell Biology, 8th Edition: Harvey Lodish & Arnold Berk & Chris A. Kaiser & Monty Krieger & Anthony Bretscher
  254. Machine Elements in Mechanical Design, 6th Edition: Robert L. Mott & Edward M. Vavrek & Jyhwen Wang
  255. DeVita, Hellman, and Rosenberg's Cancer, 11th Edition: Vincent T. DeVita & Steven A. Rosenberg & Theodore S. Lawrence
  256. Particle Image Velocimetry: A Practical Guide, 3rd Edition: Markus Raffel & Christian E. Willert & Fulvio Scarano & Christian J. Kähler
  257. Smith's Textbook of Endourology, 4th Edition: Arthur D. Smith & Glenn Preminger & Gopal H. Badlani & Louis R. Kavoussi
  258. College Algebra with Modeling & Visualization, 6th Edition: Gary K. Rockswold
  259. Financial Accounting Theory, 7th Edition: William R. Scott
  260. Biology Now, 2nd Edition: Anne Houtman & Megan Scudellari & Cindy Malone
  261. Psychological Science, 5th Edition: Michael Gazzaniga & Diane Halpern
  262. The Handbook of Technical Writing, 11th Edition: Gerald J. Alred & Charles T. Brusaw & Walter E. Oliu
  263. A Graphical Approach to College Algebra, 6th Edition: John Hornsby & Margaret L. Lial & Gary K. Rockswold
  264. Business Analytics, 4th Edition: Jeffrey D. Camm & James J. Cochran & Michael J. Fry & Jeffrey W. Ohlmann
  265. Biological Psychology, 13th Edition: James W. Kalat
  266. Business Communication Today, 14th Edition: Courtland L. Bovee & John V. Thill
  267. Geosystems Core, 1st Edition: Robert W. Christopherson & Stephen Cunha & Charles E. Thomsen & Ginger Birkeland
  268. Principles of Information Security, 6th Edition: Michael E. Whitman & Herbert J. Mattord
  269. Financial & Managerial Accounting, 14th Edition: Carl S. Warren & James M. Reeve & Jonathan Duchac
  270. Corporate Finance: Theory and Practice, 5th Edition: Pierre Vernimmen & Pascal Quiry & Maurizio Dallocchio & Yann Le Fur & Antonio Salvi
  271. Introductory Statistics, 10th Edition: Neil A. Weiss
  272. Introduction to Cryptography: Principles and Applications, 3rd Edition: Hans Delfs & Helmut Knebl
  273. Business Essentials, 8th Canadian Edition: Ronald J. Ebert & Ricky W. Griffin & Frederick A. Starke & George Dracopoulos
  274. Introduction to Mathematical Statistics, 8th Edition: Robert V. Hogg & Joseph W. McKean & Allen T. Craig
  275. The Routledge Companion to Business Ethics, 1st Edition: Eugene Heath & Byron Kaldis & Alexei Marcoux
  276. Geosystems An Introduction to Physical Geography, Global Edition, 9th Edition: Ginger H. Birkel & Robert W. Christopherson
  277. Scientific American Environmental Science for a Changing World, 2nd Edition: Jeneen InterlandI & Anne Houtman
  278. Precalculus, 10th Edition: Ron Larson
  279. The Human Brain Book: An Illustrated Guide to its Structure, Function, and Disorders, New Edition: Rita Carter
  280. Introduction to Materials Science for Engineers, 8th Edition: James F. Shackelford
  281. Adobe Dreamweaver CC Classroom in a Book, 1st Edition: Jim Maivald
  282. Trigonometry, 11th Edition: Margaret L. Lial & John Hornsby & David I. Schneider & Callie Daniels
  283. Investment Banks, Hedge Funds, and Private Equity, 3rd Edition: David P. Stowell
  284. Cognitive Neuroscience: The Biology of the Mind, 5th Edition: Michael Gazzaniga & Richard B. Ivry & George R. Mangun
  285. Cognitive Neuroscience: The Biology of the Mind, 5th Edition: Michael Gazzaniga & Richard B. Ivry (Author), George R. Mangun (Author)
  286. Project Management Theory and Practice, 3rd Edition: Gary L. Richardson & Brad M. Jackson
  287. Organic Chemistry: Structure and Function, 8th Edition: K. Peter C. Vollhardt & Neil E. Schore
  288. Read, Reason, Write: An Argument Text and Read, 11th Edition: Dorothy Seyler
  289. Fundamentals of Management: Management Myths Debunked!, Global Edition, 10th Edition: Stephen P Robbins & David A. De Cenzo & Mary Coulter
  290. Computer Networking: A Top-Down Approach, Global Edition, 7th Edition: James Kurose & Keith Ross
  291. An Introduction to Banking: Principles, Strategy and Risk Management, 2nd Edition: Moorad Choudhry
  292. The Immune System, 4th Edition: Peter Parham
  293. Biochemistry: Concepts and Connections, Global Edition, 1st Edition: Dean R. Appling & Spencer J. Anthony-Cahill & Christopher K. Mathews
  294. Writing about Writing, 3rd Edition: Elizabeth Wardle & Douglas Downs
  295. Data Wrangling with JavaScript, 1st Edition: Ashley Davis
  296. Experience Psychology, 4th Edition: Laura King
  297. An Introduction to Mathematical Statistics: Fetsje Bijma & Marianne Jonker & Aad van der Vaart & Reinie Erné
  298. Business Communication: Polishing Your Professional Presence, 3rd Edition: Barbara G. Shwom & Lisa Gueldenzoph Snyder
  299. Earth's Evolving Systems: The History of Planet Earth, 2nd Edition: Ronald E. Martin
  300. Business Ethics: Decision Making for Personal Integrity & Social Responsibility, 4th Edition: Laura Hartman & Joseph DesJardins & Chris MacDonald
  301. College Algebra and Trigonometry, Global Edition, 6th Edition: Margaret L. Lial & John Hornsby & David I. Schneider & Callie Daniels
  302. Essentials of MIS, 12th Edition: Kenneth C. Laudon & Jane P. Laudon
  303. Behavior Analysis and Learning: A Biobehavioral Approach, 6th Edition: W. David Pierce & Carl D. Cheney
  304. University Physics, 14th Edition: Hugh D. Young & Roger A. Freedman
  305. Earth System History, 4th Edition: Steven M. Stanley & John A. Luczaj
  306. Analytical Mechanics, 2nd Edition: Nivaldo A. Lemos
  307. Fundamentals of Management, 7th Canadian Edition: Stephen P. Robbins & David A. DeCenzo & Mary Coulter
  308. Computer Accounting with QuickBooks Online: A Cloud Based Approach, 2nd Edition: Carol Yacht & Susan Crosson
  309. Cost Accounting and Financial Management for Construction Project Managers, 1st Edition: Len Holm
  310. Business Continuity Management in Construction, 1st Edition: Leni Sagita Riantini Supriadi & Low Sui Pheng
  311. Contemporary Logistics, 12th Edition, Global Edition: Paul R. Murphy & A. Michael Knemeyer
  312. Mechanical Engineers' Handbook, Volume 1: Materials and Engineering Mechanics, 4th Edition: Myer Kutz
  313. Mechanical Engineers' Handbook, Volume 2: Design, Instrumentation, and Controls, 4th Edition: Myer Kutz
  314. Mechanical Engineers' Handbook, Volume 3: Manufacturing and Management, 4th Edition: Myer Kutz
  315. Mechanical Engineers' Handbook, Volume 4: Energy and Power, 4th Edition: Myer Kutz
  316. An Introduction to Mathematical Statistics and Its Applications, 6th Edition: Richard J. Larsen & Morris L. Marx
  317. Developmental Mathematics, 1st Edition: Robert F. Blitzer
  318. Thinking Mathematically, 7th Edition: Robert F. Blitzer
  319. Wardlaw's Contemporary Nutrition, 10th Edition: Anne Smith & Angela Collene
  320. Mathematical Statistics: An Introduction to Likelihood Based Inference, 1st Edition: Richard J. Rossi
  321. Asking the Right Questions, 11th Edition: M. Neil Browne & Stuart M. Keeley
  322. Asking the Right Questions, 11th Edition, Global Edition: M. Neil Browne & Stuart M. Keeley
  323. Crash Course Cardiology, 4th Edition: Antonia Churchhouse & Julian O. M. Ormerod & Michael Frenneaux
  324. A Graphical Approach to Precalculus with Limits, 7th Edition: John Hornsby & Margaret L. Lial & Gary K. Rockswold
  325. Unlocking Equity and Trusts, 5th Edition: Mohamed Ramjohn
  326. Public Speaking: The Evolving Art, 4th Edition: Stephanie J. Coopman & James Lull
  327. Social Psychology, 8th Edition: Michael Hogg & Graham Vaughan
  328. Human Resources Management in Canada, 12th Canadian Edition: Gary Dessler & Nita Chhinzer & Nina Cole
  329. Law Core Textbook Bundle: Equity and Trusts, 8th edition: Alastair Hudson
  330. Living Ethics: An Introduction with Readings: Russ Shafer-Landau
  331. Microsoft Project 2019 Step by Step, 1st Edition: Cindy Lewis & Carl Chatfield & Timothy Johnson
  332. Global Business Ethics: Responsible Decision Making in an International Context, 1st Edition: Ronald D Francis & Guy Murfey
  333. Construction Management: Theory and Practice, 1st Edition: Chris March
  334. Harrison's Endocrinology, 4th Edition: J. Larry Jameson
  335. Harrison's Neurology in Clinical Medicine, 4th Edition: Stephen Hauser & S. Andrew Josephson
  336. English Grammar Workbook For Dummies with Online Practice, 3rd Edition: Geraldine Woods
  337. Naked: The Dark Side of Shame and Moral Life, 1st Edition: Krista K. Thomason
  338. Ashcraft's Pediatric Surgery, 6th Edition: George W. Holcomb III & J. Patrick Murphy & Daniel J Ostlie
  339. Mobile Apps Engineering: Design, Development, Security, and Testing, 1st Edition: Ghita K. Mostefaoui & Faisal Tariq
  340. Lange Clinical Neurology, 10th Edition: Roger Simon & David Greenberg & Michael Aminoff
  341. International Textbook of Diabetes Mellitus, 2 Volume Set, 4th Edition: R. A. DeFronzo & E. Ferrannini & Paul Zimmet & George Alberti
  342. Java Programming, 9th Edition: Joyce Farrell
  343. Discovering Behavioral Neuroscience: An Introduction to Biological Psychology, 4th Edition: Laura Freberg
  344. How the Immune System Works, 5th Edition: Lauren M. Sompayrac
  345. Fundamentals of Electroceramics: Materials, Devices, and Applications, 1st Edition: R. K. Pandey
  346. Essentials of Hospital Neurology, 1st Edition: Karl E. Misulis & E. Lee Murray
  347. Biology of Humans: Concepts, Applications, and Issues, 6th Edition: Judith Goodenough & Betty A. McGuire
  348. Williams Textbook of Endocrinology, 13th Edition: Shlomo Melmed & Kenneth S. Polonsky & P. Reed Larsen & Henry M. Kronenberg
  349. Financial Management: Principles and Applications, Global Edition, 13th Edition: Sheridan Titman & Arthur J. Keown & John D Martin
  350. Case Studies in Immunology: A Clinical Companion, 7th Edition: Raif S. Geha & Luigi Notarangelo
  351. Handbook of MRI Technique, 4th Edition: Catherine Westbrook
  352. MRI: Basic Principles and Applications, 5th Edition: Brian M. Dale & Mark A. Brown & Richard C. Semelka
  353. Robbins Basic Pathology, 10th Edition: Vinay Kumar & Abul K. Abbas & Jon C. Aster & Vinay Kumar & Abul K. Abbas & Jon C. Aster
  354. Rosen's Emergency Medicine: Concepts and Clinical Practice: 2-Volume Set, 9th Edition: Ron Walls & Robert Hockberger & Marianne Gausche-Hill
  355. BNF for Children: 2018-2019, 1st Edition: Paediatric Formulary Committee
  356. Sitaraman and Friedman's Essentials of Gastroenterology, 2nd Edition: Shanthi Srinivasan & Lawrence S. Friedman
  357. Practical Gastroenterology and Hepatology Board Review Toolkit, 2nd Edition: Kenneth R. DeVault & Michael B. Wallace & Bashar A. Aqel & Keith D. Lindor
  358. Reinforcement Learning: An Introduction, 2nd edition: Richard S. Sutton & Andrew G. Barto
submitted by bookseller10 to Textbook_releases [link] [comments]

/r/Scams Common Scam Master Post

Hello visitors and subscribers of scams! Here you will find a master list of common (and uncommon) scams that you may encounter online or in real life. Thank you to the many contributors who helped create this thread!

If you know of a scam that is not covered here, write a comment and it will be added to the next edition.

Previous threads: https://old.reddit.com/Scams/search?q=common+scams+master+post&restrict_sr=on
Blackmail email scam thread: https://old.reddit.com/Scams/comments/g8jqnthe_blackmail_email_scam_part_5//
Some of these articles are from small, local publications and refer to the scam happening in a specific area. Do not think that this means that the scam won't happen in your area.

Spoofing

Caller ID spoofing
It is very easy for anyone to make a phone call while having any number show up on the caller ID of the person receiving the phone call. Receiving a phone call from a certain number does not mean that the person/company who owns that number has actually called you.
Email spoofing
The "from" field of an email can be set by the sender, meaning that you can receive scam emails that look like they are from legitimate addresses. It's important to never click links in emails unless absolutely necessary, for example a password reset link you requested or an account activation link for an account you created.
SMS spoofing
SMS messages can be spoofed, so be wary of messages that seem to be from your friends or other trusted people.

The most common scams

The fake check scam (Credit to nimble2 for this part)
The fake check scam arises from many different situations (for instance, you applied for a job, or you are selling something on a place like Craigslist, or someone wants to purchase goods or services from your business, or you were offered a job as a mystery shopper, you were asked to wrap your car with an advertisement, or you received a check in the mail for no reason), but the bottom line is always something like this:
General fraudulent funds scams If somebody is asking you to accept and send out money as a favour or as part of a job, it is a fraudulent funds scam. It does not matter how they pay you, any payment on any service can be fraudulent and will be reversed when it is discovered to be fraudulent.
Phone verification code scams Someone will ask you to receive a verification text and then tell you to give them the code. Usually the code will come from Google Voice, or from Craigslist. In the Google version of the scam, your phone number will be used to verify a Google Voice account that the scammer will use to scam people with. In the Craigslist version of the scam, your phone number will be used to verify a Craigslist posting that the scammer will use to scam people. There is also an account takeover version of this scam that will involve the scammer sending a password reset token to your phone number and asking you for it.
Bitcoin job scams
Bitcoin job scams involve some sort of fraudulent funds transfer, usually a fake check although a fraudulent bank transfer can be used as well. The scammer will send you the fraudulent money and ask you to purchase bitcoins. This is a scam, and you will have zero recourse after you send the scammer bitcoins.
Email flooding
If you suddenly receive hundreds or thousands of spam emails, usually subscription confirmations, it's very likely that one of your online accounts has been taken over and is being used fraudulently. You should check any of your accounts that has a credit card linked to it, preferably from a computer other than the one you normally use. You should change all of your passwords to unique passwords and you should start using two factor authentication everywhere.
Boss/CEO scam A scammer will impersonate your boss or someone who works at your company and will ask you to run an errand for them, which will usually be purchasing gift cards and sending them the code. Once the scammer has the code, you have no recourse.
Employment certification scams
You will receive a job offer that is dependent on you completing a course or receiving a certification from a company the scammer tells you about. The scammer operates both websites and the job does not exist.
Craigslist fake payment scams
Scammers will ask you about your item that you have listed for sale on a site like Craigslist, and will ask to pay you via Paypal. They are scamming you, and the payment in most cases does not actually exist, the email you received was sent by the scammers. In cases where you have received a payment, the scammer can dispute the payment or the payment may be entirely fraudulent. The scammer will then either try to get you to send money to them using the fake funds that they did not send to you, or will ask you to ship the item, usually to a re-shipping facility or a parcel mule.
General fraudulent funds scams The fake check scam is not the only scam that involves accepting fraudulent/fake funds and purchasing items for scammers. If your job or opportunity involves accepting money and then using that money, it is almost certainly a frauduent funds scam. Even if the payment is through a bank transfer, Paypal, Venmo, Zelle, Interac e-Transfer, etc, it does not matter.
Credit card debt scam
Fraudsters will offer to pay off your bills, and will do so with fraudulent funds. Sometimes it will be your credit card bill, but it can be any bill that can be paid online. Once they pay it off, they will ask you to send them money or purchase items for them. The fraudulent transaction will be reversed in the future and you will never be able to keep the money. This scam happens on sites like Craigslist, Twitter, Instagram, and also some dating sites, including SeekingArrangement.
The parcel mule scam
A scammer will contact you with a job opportunity that involves accepting and reshipping packages. The packages are either stolen or fraudulently obtained items, and you will not be paid by the scammer. Here is a news article about a scam victim who fell for this scam and reshipped over 20 packages containing fraudulently acquired goods.
The Skype sex scam
You're on Facebook and you get a friend request from a cute girl you've never met. She wants to start sexting and trading nudes. She'll ask you to send pictures or videos or get on webcam where she can see you naked with your face in the picture. The scam: There's no girl. You've sent nudes to a guy pretending to be a girl. As soon as he has the pictures he'll demand money and threaten to send the pictures to your friends and family. Sometimes the scammer will upload the video to a porn site or Youtube to show that they are serious.
What to do if you are a victim of this scam: You cannot buy silence, you can only rent it. Paying the blackmailer will show them that the information they have is valuable and they will come after you for more money. Let your friends and family know that you were scammed and tell them to ignore friend requests or messages from people they don't know. Also, make sure your privacy settings are locked down and consider deactivating your account.
The underage girl scam
You're on a dating site or app and you get contacted by a cute girl. She wants to start sexting and trading nudes. Eventually she stops communicating and you get a call from a pissed off guy claiming to be the girl's father, or a police officer, or a private investigator, or something else along those lines. Turns out the girl you were sexting is underage, and her parents want some money for various reasons, such as to pay for a new phone, to pay for therapy, etc. There is, of course, no girl. You were communicating with a scammer.
What to do if you are a victim of this scam: Stop picking up the phone when the scammers call. Do not pay them, or they will be after you for more money.
Phishing
Phishing is when a scammer tries to trick you into giving information to them, such as your password or private financial information. Phishing messages will usually look very similar to official messages, and sometimes they are identical. If you are ever required to login to a different account in order to use a service, you should be incredibly cautious.
The blackmail email scam The exact wording of the emails varies, but there are generally four main parts. They claim to have placed software/malware on a porn/adult video site, they claim to have a video of you masturbating or watching porn, they threaten to release the video to your friends/family/loved ones/boss/dog, and they demand that you pay them in order for them to delete the video. Rest assured that this is a very common spam campaign and there is no truth behind the email or the threats. Here are some news articles about this scam.
The blackmail mail scam
This is very similar to the blackmail email scam, but you will receive a letter in the mail.
Rental scams Usually on local sites like Craigslist, scammers will steal photos from legitimate real estate listings and will list them for rent at or below market rate. They will generally be hesitant to tell you the address of the property for "safety reasons" and you will not be able to see the unit. They will then ask you to pay them a deposit and they claim they will ship you the keys. In reality, your money is gone and you will have no recourse.
Craigslist vehicle scams A scammer will list a vehicle on Craigslist and will offer to ship you the car. In many cases they will also falsely claim to sell you the car through eBay or Amazon. If you are looking for a car on Craigslist and the seller says anything about shipping the car, having an agent, gives you a long story about why they are selling the car, or the listing price is far too low, you are talking to a scammer and you should ignore and move on.
Advance-fee scam, also known as the 419 scam, or the Nigerian prince scam. You will receive a communication from someone who claims that you are entitled to a large sum of money, or you can help them obtain a large sum of money. However, they will need money from you before you receive the large sum.
Man in the middle scams
Man in the middle scams are very common and very hard to detect. The scammer will impersonate a company or person you are legitimately doing business with, and they will ask you to send the money to one of their own bank accounts or one controlled by a money mule. They have gained access to the legitimate persons email address, so there will be nothing suspicious about the email. To prevent this, make contact in a different way that lets you verify that the person you are talking to is the person you think you are talking to.
Cam girl voting/viewer scam
You will encounter a "cam girl" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to go to their site and sign up with your credit card. They may offer a free show, or ask you to vote for them, or any number of other fake stories.
Amateur porn recruitment scam
You will encounter a "pornstar" on a dating/messaging/social media/whatever site/app, and the scammer will ask you to create an adult film with hehim, but first you need to do something. The story here is usually something to do with verifying your age, or you needing to take an STD test that involves sending money to a site operated by the scammer.
Hot girl SMS spam
You receive a text from a random number with a message along the lines of "Hey babe I'm here in town again if you wanted to meet up this time, are you around?" accompanied by a NSFW picture of a hot girl. It's spam, and they'll direct you to their scam website that requires a credit card.
Identity verification scam
You will encounter someone on a dating/messaging/social media/whatever site/app, and the scammer will ask that you verify your identity as they are worried about catfishing. The scammer operates the site, and you are not talking to whoever you think you are talking to.
This type of scam teases you with something, then tries to make you sign up for something else that costs money. The company involved is often innocent, but they turn a blind eye to the practice as it helps their bottom line, even if they have to occasionally issue refunds. A common variation takes place on dating sites/dating apps, where you will match with someone who claims to be a camgirl who wants you to sign up for a site and vote for her. Another variation takes place on local sites like Craigslist, where the scammers setup fake rental scams and demand that you go through a specific service for a credit check. Once you go through with it, the scammer will stop talking to you. Another variation also takes place on local sites like Craigslist, where scammers will contact you while you are selling a car and will ask you to purchase a Carfax-like report from a specific website.
Multi Level Marketing or Affiliate Marketing
You apply for a vague job listing for 'sales' on craigslist. Or maybe an old friend from high school adds you on Facebook and says they have an amazing business opportunity for you. Or maybe the well dressed guy who's always interviewing people in the Starbucks that you work at asks if you really want to be slinging coffee the rest of your life. The scam: MLMs are little more than pyramid schemes. They involve buying some sort of product (usually snake oil health products like body wraps or supplements) and shilling them to your friends and family. They claim that the really money is recruiting people underneath you who give you a slice of whatever they sell. And if those people underneath you recruit more people, you get a piece of their sales. Ideally if you big enough pyramid underneath you the money will roll in without any work on your part. Failure to see any profit will be your fault for not "wanting it enough." The companies will claim that you need to buy their extra training modules or webinars to really start selling. But in reality, the vast majority of people who buy into a MLM won't see a cent. At the end of the day all you'll be doing is annoying your friends and family with your constant recruitment efforts. What to look out for: Recruiters love to be vague. They won't tell you the name of the company or what exactly the job will entail. They'll pump you up with promises of "self-generating income", "being your own boss", and "owning your own company." They might ask you to read books about success and entrepreneurs. They're hoping you buy into the dream first. If you get approached via social media, check their timelines. MLMs will often instruct their victims to pretend that they've already made it. They'll constantly post about how they're hustling and making the big bucks and linking to youtube videos about success. Again, all very vague about what their job actually entails. If you think you're being recruited: Ask them what exactly the job is. If they can't answer its probably a MLM. Just walk away.

Phone scams

You should generally avoid answering or engaging with random phone calls. Picking up and engaging with a scam call tells the scammers that your phone number is active, and will usually lead to more calls.
Tax Call
You get a call from somebody claiming to be from your countries tax agency. They say you have unpaid taxes that need to be paid immediately, and you may be arrested or have other legal action taken against you if it is not paid. This scam has caused the American IRS, Canadian CRA, British HMRC, and Australian Tax Office to issue warnings. This scam happens in a wide variety of countries all over the world.
Warrant Call
Very similar to the tax call. You'll get a phone call from an "agent", "officer", "sheriff", or other law enforcement officer claiming that there is a warrant out for your arrest and you will be arrested very soon. They will then offer to settle everything for a fee, usually paid in giftcards.
[Legal Documents/Process Server Calls]
Very similar to the warrant call. You'll get a phone call from a scammer claiming that they are going to serve you legal documents, and they will threaten you with legal consequences if you refuse to comply. They may call themselves "investigators", and will sometimes give you a fake case number.
Student Loan Forgiveness Scam
Scammers will call you and tell you about a student loan forgiveness program, but they are interested in obtaining private information about you or demanding money in order to join the fake program.
Tech Support Call You receive a call from someone with a heavy accent claiming to be a technician Microsoft or your ISP. They inform you that your PC has a virus and your online banking and other accounts may be compromised if the virus is not removed. They'll have you type in commands and view diagnostics on your PC which shows proof of the virus. Then they'll have you install remote support software so the technician can work on your PC, remove the virus, and install security software. The cost of the labor and software can be hundreds of dollars. The scam: There's no virus. The technician isn't a technician and does not work for Microsoft or your ISP. Scammers (primarily out of India) use autodialers to cold-call everyone in the US. Any file they point out to you or command they have you run is completely benign. The software they sell you is either freeware or ineffective. What to do you if you're involved with this scam: If the scammers are remotely on your computer as you read this, turn off your PC or laptop via the power button immediately, and then if possible unplug your internet connection. Some of the more vindictive tech scammers have been known to create boot passwords on your computer if they think you've become wise to them and aren't going to pay up. Hang up on the scammers, block the number, and ignore any threats about payment. Performing a system restore on your PC is usually all that is required to remove the scammer's common remote access software. Reports of identity theft from fake tech calls are uncommon, but it would still be a good idea to change your passwords for online banking and monitor your accounts for any possible fraud. How to avoid: Ignore any calls claiming that your PC has a virus. Microsoft will never contact you. If you're unsure if a call claiming to be from your ISP is legit, hang up, and then dial the customer support number listed on a recent bill. If you have elderly relatives or family that isn't tech savvy, take the time to fill them in on this scam.
Chinese government scam
This scam is aimed at Chinese people living in Europe and North America, and involves a voicemail from someone claiming to be associated with the Chinese government, usually through the Chinese consulate/embassy, who is threatening legal action or making general threats.
Chinese shipping scam
This scam is similar to the Chinese government scam, but involves a seized/suspicious package, and the scammers will connect the victim to other scammers posing as Chinese government investigators.
Social security suspension scam
You will receive a call from someone claiming to work for the government regarding suspicious activity, fraud, or serious crimes connected to your social security number. You'll be asked to speak to an operator and the operator will explain the steps you need to follow in order to fix the problems. It's all a scam, and will lead to you losing money and could lead to identity theft if you give them private financial information.
Utilities cutoff
You get a call from someone who claims that they are from your utility company, and they claim that your utilities will be shut off unless you immediately pay. The scammer will usually ask for payment via gift cards, although they may ask for payment in other ways, such as Western Union or bitcoin.
Relative in custody Scammer claims to be the police, and they have your son/daughtenephew/estranged twin in custody. You need to post bail (for some reason in iTunes gift cards or MoneyGram) immediately or the consequences will never be the same.
Mexican family scam
This scam comes in many different flavours, but always involves someone in your family and Mexico. Sometimes the scammer will claim that your family member has been detained, sometimes the scammer will claim that your family member has been kidnapped, and sometimes the scammer will claim that your family member is injured and needs help.
General family scams
Scammers will gather a large amount of information about you and target your family members using different stories with the goal of gettimg them to send money.
One ring scam
Scammers will call you from an international number with the goal of getting you to return their call, causing you to incur expensive calling fees.

Online shopping scams

THE GOLDEN RULE OF ONLINE SHOPPING: If it sounds too good to be true, it probably is.
Dropshipping
An ad on reddit or social media sites like Facebook and Instagram offers items at huge discounts or even free (sometimes requiring you to reblog or like their page). They just ask you to pay shipping. The scam: The item will turn out to be very low quality and will take weeks or even months to arrive. Sometimes the item never arrives, and the store disappears or stops responding. The seller drop-ships the item from China. The item may only cost a few dollars, and the Chinese government actually pays for the shipping. You end up paying $10-$15 dollars for a $4 item, with the scammer keeping the profit. If you find one of these scams but really have your heart set on the item, you can find it on AliExpress or another Chinese retailer.
Influencer scams
A user will reach out to you on a social media platform, usually Instagram, and offer you the chance to partner with them and receive a free/discounted product, as long as you pay shipping. This is a different version of the dropshipping scam, and is just a marketing technique to get you to buy their products.
Triangulation fraud
Triangulation fraud occurs when you make a purchase on a site like Amazon or eBay for an item at a lower than market price, and receive an item that was clearly purchased new at full price. The scammer uses a stolen credit card to order your item, while the money from the listing is almost all profit for the scammer.
Instagram influencer scams
Someone will message you on Instagram asking you to promote their products, and offering you a discount code. The items are Chinese junk, and the offer is made to many people at a time.
Cheap Items
Many websites pop up and offer expensive products, including electronics, clothes, watches, sunglasses, and shoes at very low prices. The scam: Some sites are selling cheap knock-offs. Some will just take your money and run. What to do if you think you're involved with this scam: Contact your bank or credit card and dispute the charge. How to avoid: The sites often have every brand-name shoe or fashion item (Air Jordan, Yeezy, Gucci, etc) in stock and often at a discounted price. The site will claim to be an outlet for a major brand or even a specific line or item. The site will have images at the bottom claiming to be Secured by Norton or various official payment processors but not actual links. The site will have poor grammar and a mish-mash of categories. Recently, established websites will get hacked or their domain name jacked and turned into scam stores, meaning the domain name of the store will be completely unrelated to the items they're selling. If the deal sounds too good to be true it probably is. Nobody is offering brand new iPhones or Beats or Nintendo Switches for 75% off.
Cheap Amazon 3rd Party Items
You're on Amazon or maybe just Googling for an item and you see it for an unbelievable price from a third-party seller. You know Amazon has your back so you order it. The scam: One of three things usually happen: 1) The seller marks the items as shipped and sends a fake tracking number. Amazon releases the funds to the seller, and the seller disappears. Amazon ultimately refunds your money. 2) The seller immediately cancels the order and instructs you to re-order the item directly from their website, usually with the guarantee that the order is still protected by Amazon. The seller takes your money and runs. Amazon informs you that they do not offer protection on items sold outside of Amazon and cannot help you. 2) The seller immediately cancels the order and instructs you to instead send payment via an unused Amazon gift card by sending the code on the back via email. Once the seller uses the code, the money on the card is gone and cannot be refunded. How to avoid: These scammers can be identified by looking at their Amazon storefronts. They'll be brand new sellers offering a wide range of items at unbelievable prices. Usually their Amazon names will be gibberish, or a variation on FIRSTNAME.LASTNAME. Occasionally however, established storefronts will be hacked. If the deal is too good to be true its most likely a scam.
Scams on eBay
There are scams on eBay targeting both buyers and sellers. As a seller, you should look out for people who privately message you regarding the order, especially if they ask you to ship to a different address or ask to negotiate via text/email/a messaging service. As a buyer you should look out for new accounts selling in-demand items, established accounts selling in-demand items that they have no previous connection to (you can check their feedback history for a general idea of what they bought/sold in the past), and lookout for people who ask you to go off eBay and use another service to complete the transaction. In many cases you will receive a fake tracking number and your money will be help up for up to a month.
Scams on Amazon
There are scams on Amazon targeting both buyers and sellers. As a seller, you should look out for people who message you about a listing. As a buyer you should look out for listings that have an email address for you to contact the person to complete the transaction, and you should look out for cheap listings of in-demand items.
Scams on Reddit
Reddit accounts are frequently purchased and sold by fraudsters who wish to use the high karma count + the age of the account to scam people on buy/sell subreddits. You need to take precautions and be safe whenever you are making a transaction online.
Computer scams
Virus scam
A popup or other ad will say that you have a virus and you need to follow their advice in order to remove it. They are lying, and either want you to install malware or pay for their software.

Assorted scams

Chinese Brushing / direct shipping
If you have ever received an unsolicited small package from China, your address was used to brush. Vendors place fake orders for their own products and send out the orders so that they can increase their ratings.
Money flipping
Scammer claims to be a banking insider who can double/triple/bazoople any amount of money you send them, with no consequences of any kind. Obviously, the money disappears into their wallet the moment you send it.

Door to door scams

As a general rule, you should not engage with door to door salesmen. If you are interested in the product they are selling, check online first.
Selling Magazines
Someone or a group will come to your door and offer to sell a magazine subscription. Often the subscriptions are not for the duration or price you were told, and the magazines will often have tough or impossible cancellation policies.
Energy sales
Somebody will come to your door claiming to be from an energy company. They will ask to see your current energy bill so that they can see how much you pay. They will then offer you a discount if you sign up with them, and promise to handle everything with your old provider. Some of these scammers will "slam" you, by using your account number that they saw on your bill to switch you to their service without authorization, and some will scam you by charging higher prices than the ones you agreed on.
Security system scams
Scammers will come to your door and ask about your security system, and offer to sell you a new one. These scammers are either selling you overpriced low quality products, or are casing your home for a future burglary.
They ask to enter your home
While trying to sell you whatever, they suddenly need to use your bathroom, or they've been writing against the wall and ask to use your table instead. Or maybe they just moved into the neighborhood and want to see how you decorate for ideas.
They're scoping out you and your place. They want to see what valuables you have, how gullible you are, if you have a security system or dogs, etc.

Street scams

Begging With a Purpose
"I just need a few more dollars for the bus," at the bus station, or "I just need $5 to get some gas," at a gas station. There's also a variation where you will be presented with a reward: "I just need money for a cab to get uptown, but I'll give you sports tickets/money/a date/a priceless vase."
Three Card Monte, Also Known As The Shell Game
Unbeatable. The people you see winning are in on the scam.
Drop and Break
You bump into someone and they drop their phone/glasses/fancy bottle of wine/priceless vase and demand you pay them back. In reality, it's a $2 pair of reading glasses/bottle of three-buck-chuck/tasteful but affordable vase.
CD Sales
You're handed a free CD so you can check out the artist's music. They then ask for your name and immediately write it on the CD. Once they've signed your name, they ask you for money, saying they can't give it to someone else now. Often they use dry erase markers, or cheap CD sleeves. Never use any type of storage device given to you by a random person, as the device can contain malware.
White Van Speaker Scam
You're approached and offered speakers/leather jackets/other luxury goods at a discount. The scammer will have an excuse as to why the price is so low. After you buy them, you'll discover that they are worthless.
iPhone Street Sale
You're approached and shown an iPhone for sale, coming in the box, but it's open and you can see the phone. If you buy the phone, you'll get an iPhone box with no iPhone, just some stones or cheap metal in it to weigh it down.
Buddhist Monk Pendant
A monk in traditional garb approaches you, hands you a gold trinket, and asks for a donation. He holds either a notebook with names and amounts of donation (usually everyone else has donated $5+), or a leaflet with generic info. This is fairly common in NYC, and these guys get aggressive quickly.
Friendship Bracelet Scam More common in western Europe, you're approached by someone selling bracelets. They quickly wrap a loop of fabric around your finger and pull it tight, starting to quickly weave a bracelet. The only way to (easily) get it off your hand is to pay. Leftover sales
This scam involves many different items, but the idea is usually the same: you are approached by someone who claims to have a large amount of excess inventory and offers to sell it to you at a great price. The scammer actually has low quality items and will lie to you about the price/origin of the items.
Dent repair scams
Scammers will approach you in public about a dent in your car and offer to fix it for a low price. Often they will claim that they are mechanics. They will not fix the dent in your car, but they will apply large amounts of wax or other substances to hide the dent while they claim that the substance requires time to harden.
Gold ring/jewelry/valuable item scam
A scammer will "find" a gold ring or other valuable item and offers to sell it to you. The item is fake and you will never see the scammer again.
Distraction theft
One person will approach you and distract you, while their accomplice picks your pockets. The distraction can take many forms, but if you are a tourist and are approached in public, watch closely for people getting close to you.

General resources

Site to report scams in the United Kingdom: http://www.actionfraud.police.uk/
Site to report scams in the United States: https://www.ic3.gov/default.aspx
Site to report scams in Canada: www.antifraudcentre-centreantifraude.ca/reportincident-signalerincident/index-eng.htm
Site to report scams in Europe: https://www.europol.europa.eu/report-a-crime/report-cybercrime-online
FTC scam alerts: https://www.consumer.ftc.gov/scam-alerts
Microsoft's anti-scam guide: https://www.microsoft.com/en-us/safety/online-privacy/avoid-phone-scams.aspx
https://www.usa.gov/common-scams-frauds
https://www.usa.gov/scams-and-frauds
https://www.consumer.ftc.gov/features/scam-alerts
https://www.fbi.gov/scams-and-safety/common-fraud-schemes
submitted by EugeneBYMCMB to Scams [link] [comments]

Bitcoin Proof of Moon (MUST WATCH) Crypto PRICE Talk on Bitcoin, Ethereum, Litecoin, Stock Market & Chainlink Oracle Price Feeds Free Mining 1 Bitcoin Real Time Withdraw Proof Start Auto Earn Right Now Huge Bitcoin (BTC) Cryptocurrency Price News! Bit Butter - Bitcoin Cloud Mining

Lastest Payout Proof. crypto247stock - is a profesional platform, which is created within Bitcoin mining. This is a niche platform, which allows Bitcoin resource owners to investing online. our features. It's quite simple - we are the best in this field. Our team has years of experience in online investing: The highest rates of conversion and quality in our segment! Easy in use and ... On 18 August 2008, the domain name bitcoin.org was registered. Later that year on October 31st, a link to a paper authored by Satoshi Nakamoto titled Bitcoin: A Peer-to-Peer Electronic Cash System was posted to a cryptography mailing list.. On the 9th of November, the Bitcoin project was registered at the open-source-projects community resource, SourceForge.net. The model predicts a Bitcoin market value of $1 trillion after the next halving in May 2020, which translates to a Bitcoin price of $55,000. Long-term Bitcoin value. According to the stock-to-flow model, we could see Bitcoin’s price mooning after the next halving event (or just prior, depending on how people react to the news). Bitcoin wallets keep a secret piece of data called a private key or seed, which is used to sign transactions, providing a mathematical proof that they have come from the owner of the wallet. The signature also prevents the transaction from being altered by anybody once it has been issued. All transactions are broadcast between users and usually begin to be confirmed by the network in the ... For Hire . Post jobs, find pros, and collaborate commission-free in our professional marketplace.

[index] [23069] [13071] [41527] [4199] [1840] [2392] [50818] [27039] [48745] [43946]

Bitcoin Proof of Moon (MUST WATCH)

3 Stocks for February 2020! ... Proof Of Stake Alliance, Congress/XRP, 100 Days Left, Best Performing Asset & Japan LINK - Duration: 39:19. The Modern Investor 17,584 views. New; 39:19. I'm Not ... LIVE: Penny Stocks Small Cap Scanner (Trade-Ideas) Precision Day Trading 244 watching Live now Earn $1000 Dollar IN 24 HOURS Live Total withdrawal $7000 USD Video Proof - Duration: 5:01. This video is unavailable. Watch Queue Queue Bitcoin (BTC), Ethereum (ETH), and RIpple (XRP) Analysis. Cryptocurrency Technical Analysis and Cryptocurrency News. Cryptocurrency Technical Analysis and Cryptocurrency News. ** THIS IS NOT ... In this Bitcoin protocol tutorial video, the notion of Proof of Work is discussed. The idea of proof of work, normally, is to protect against spam and DoS attacks. With bitcoin, however, it is ...

#