;
  • Report:  #1158496

Complaint Review: HINDU COMPUTER REPAIR CALLC ENTER SCAM - Nationwide

Reported By:
Holy Roller - Bothell, Washington,
Submitted:
Updated:

HINDU COMPUTER REPAIR CALLC ENTER SCAM
Nationwide, USA
Phone:
209 201 0157
Web:
N/A
Categories:
Tell us has your experience with this business or person been good? What's this?

Hindu call center scam, this is the classic one.  Its a simple scam with a simple premis.  The idea is to call as many people world wide as you can, get them through whatever spoken means to let them into their computer.  The methodologies used here are simple.  The goal is to fleece the individual for as much money as possible after convincing them that "half the programs in your computer arn't working correctly" and that "Your computer is sending messages that it is infected with a virus to the "universal server" (which does not exist) and that its telling Microsoft that it is not connecting to windows update.  Finaly the goal, as a fore mentioned is to get you to allow them access to the computer via remote administration so they can "fix" the problem that may or may not infact exist.  I will outline the exact steps below.  Its usually Hindus or people of "Indian" decent.  Many of them have training in english   They will lie and do anything they can.  Below is the exact outline of the psychology, methodology and modus oporendi of the scam.  They may sound like white people, but they arn't I can promise you.

1.  Find a Mark: 

Randomly or targetedly call phone numbers (from a spoofed phone number if possible) world wide targeting primarily english speaking countries.  (Because we as english speaking people happen to have the most developed and well maintained nations on the planet, making them a good target for Hindu rip off artists, also the saturation of computing devices is well known here).

2. Control the Mark: 

Once the individual answers, attempt to assert control verbally and physically over the individual based upon the idea of verbal command and control and or direction of physical actions.  This invovles giving simple commands or requests after using the persons "alarmed" state from the initial pitch of the call.  Try to get them to do something for you, something simple to start with.  It must be a physical action such as, get a piece of paper, turn on a computer, pick up a pencil or pen.  They then increase the complexity until the mental control state that is needed for the scam to work is reached.  You doing as they ask is assertions of there control over the conversation and control over your physical actions.  It also denotes that you are "open" enough to proceed foreward with the scam.

3.  Convince and control the Mark: 

Once they have asserted verbal physical control over the individual the next step is to further convince them that they are a legitimate individual who either works for microsoft or has information about there computer that you don't, about the virus, or errors anything at all so that the chain of verbal physical control is maintained.   This is done by direction the person about to be scamemd to look up things on the computer, that are the same on all computers, but, that the person the scammer is talking too has never seen.  That is then used to assert that its your computer and that the computer is "infected" with a virus that they either made or are about to spring on the person about to be scammed.

4.  Gain Access: 

Now that the Mark (person about to be scammed) is properly prepared and controled the next step is to gain direct access via remote administrative control over the computer.  This is usually done by directing the Mark to one of many free remote administration software web sites.  Here is a list of them the scammers like to use, because legitimate businesses also use them for legitimate purposes.  AmmyAdmin.com, TeamViewer.com or they will try to use the already built in remote administration that is available with all current new operating systems, inlcuding linux.  It usually involves a simple download and the handing over of the access password and loging into the Marks computer and taking control of the mouse and the desktop.  This will surprise most people, because most people have not seen someone do this, now things look real official, to the Mark.

5.  Further convince and control the Mark:

Now that the Mark is under control and is atleast somewhat convinced that there is something wrong with their computer and that the scammer is going to help them and the scammer now has access, the scammer now moves onto the next step.  This step is to further convince and control the mark until the mark's own will and arguments cease and are subdued and the mark becomes mentaly and physically complacent and controlled.  Now the Scammer will demonstrate to the mark that there are "viruses" in there computer, (weather or not its true is not of issue, its the control over the mind and physical actions and the affirmation of the correctness and truth of the lies the Scammer tells that is most important at this point).  This is done by showing the user things that most people never see, including massive logs of all actions of applications and security accounts within the computer.  These logs can sometimes truely indiciate or give hint to the existence of invalid, malicious or trojan based software or viruses on the computer.  But some dude in a call center in India is not going to be able to discern that in 20 or 40 seconds, that takes hours.  The Mark does not know this, so the Hindu Computer Repair Telemarketing Scammer can now proceed with the pitch while maintaining physical and mental control over the individual by the method of verbal commands, suggestions and affirmations of the information weather it be truth or lie.  This portion of the pitch usually runs for a few min to 10 or 20 min.  What it does is subdue the mind and will, to teather it, restrain it, null it, numb it and control it so that anything the scammer says will be taken as truth, weather it is or not.

6.  Install localised control software onto the computer: 

This step is simple, they install very quickly further remote control software onto the computer so they can can entry without the Marks consent in the future for future fleecing, this can happen in the back ground or with the concent of the Mark.  Now that all portions of the scam are in place its time for the money grab.

7.  Get the money:  Now that the scammer can run their trojans and their custom software which will always say there are viruses weahter or not there is any its time to get the money.  It usualy goes like this.  "you can see all the errors and viruses that our software has found, we will now remove them for you, for a charge of (REDICULOUS FEE GOES HERE)".  They will only accept a credit card, so they can then use it, run it to its limit and disapear into the back streets of Bangledesh.  Now, if the mark does not respond with the money requested, the next step is to damage the computer and call them back another time and continue doing so until the Mark pays.

 

Its easy to tell them out.  Ask simple questions.  If they refuse to answer a single one of these questions or do as you have requested, then hang up, if they call back, unplug the phone line and refuse to talk to them, ever again.

 

1.  What is the exact address, where you are sitting, right now?  The full address, from building number to street to city state province and zip code.

2.  What is the user name I am on, on my computer right now?

3.  What is the name of the virus that is on my computer?

4.  Lets conference call with Microsoft support directly ok?  Here I will call them for us both right now.  Do not let the scammer call it, you call.

5.  Why are you calling me using a cell phone number?

6.  Please send me your resume with your address and personal contact information so that I know I am dealing with a legitimate business person?

7.  What is your business license number, trade names and company name please?

If they refuse, to do any of those things or answer any of those questions, report them to the FCC, report the phone number they are using to every single web site you can, call their phone number service provider and complain and never, ever speak to them, or buy anything from India ever again.  Also call the police and file a report.  Me, I would rather do this to them though.

http://www.youtube.com/watch?v=m9LpMZuBEMk



Reports & Rebuttal
Respond to this report!
Also a victim?
Repair Your Reputation!
//