Business Insider obtained a PDF guide that is sold online for just £2.59.
Scammers are told to use a female partner for the video call part of the process, but there are guidelines on what they should look like: If a scammer is successful here, and managed to con the target out of money for a webcam, or other small amounts, then they may attempt the riskiest part of the process, known as the "pause." Scammers are instructed to stage an altercation over webcam, and then cease contact.
After a week, scammers are told to call the target and claim that their "husband/father/pimp/whoever" got "drunk/high/whatever" and attacked them.
This screenshot shows a user of a hacker forum being advised that a quick way to find sets of photos is to automatically download them from Facebook: Even before a scammer messages you, you can spot they're fake by checking their photos.
Performing a Google image search for an account's profile picture will show you where on the internet the image appears — sometimes you'll see it attached to Facebook, Instagram and Twitter accounts with various different names.
They are then instructed to take the information learned, and then create the "perfect woman" for the target.
Adhrann says that scammers should "emphasize on you being in a difficult financial situation, yet DO NOT insist on that, but treat this subject like you have been much better in the past, and really ashamed now, [as you are] not used to being poor." Step three is where things start getting really interesting.You can, however, get unlimited free trials on those sites using a simple trick with your email address if you have a valid card number with expiration date and CSV.There's also an Android application for getting fake card numbers called Card Gen, available for free in the Play Store.Now, to be completely clear, these numbers cannot be used to purchase any item. The credit card number generator uses a system based off of the Luhn Algorithm, which has been used to validate numbers for decades.You can learn more about the algorithm on their webpage, or check out the Null Byte guide on how credit card algorithms work.They should have a burner phone, he says (a disposable phone that can be used for temporary tasks and then discarded).