.action_button.action_button:active.action_button:hover.action_button:focus.action_button:hover.action_button:focus .count.action_button:hover .count.action_button:focus .count:before.action_button:hover .count:before.u-margin-top--lg.u-margin-left--sm.u-flex.u-flex-auto.u-flex-none.bullet. Content Wrapper:after.hidden.normal.grid_page.grid_page:before,.grid_page:after.grid_page:after.grid_page h3.grid_page h3 a.grid_page h3 a:hover.grid_page h3 a.action_button.grid_page h3 a.action_button:active.grid_page h3 a.action_button:hover.grid_page h3 a.action_button:not(.fake_disabled):hover.grid_page h3 a.action_button:not(.fake_disabled):focus.grid_pagediv. The documents are often sold for small amounts of money, but the price barrier, the need to pay with Bitcoin, and the fact that they're only available on the deep web prevents the guides from being circulated widely.The document, titled Adhrann's Updated Dating Scam 2014, lays out a method for creating fake dating site profiles, ensnaring men in conversation, and then pressuring them to send money.This screenshot shows a user of a hacker forum being advised that a quick way to find sets of photos is to automatically download them from Facebook: Even before a scammer messages you, you can spot they're fake by checking their photos.Performing a Google image search for an account's profile picture will show you where on the internet the image appears — sometimes you'll see it attached to Facebook, Instagram and Twitter accounts with various different names.So how do you know if someone is trying to scam you?Well, first of all, Adhrann suggests that readers look for certain types of men: "40-60, technical or financial formation (IT, analyst, accountant, consultant, engineer, etc); lonely, or still living with parents, poor social/conversational skills, shy, a bit weird, nerd type, etc." So if that sounds like you, stay alert.
That's the final step, as the scammers leave with thousands of dollars, and the storyline has finished.
They are then instructed to take the information learned, and then create the "perfect woman" for the target.
Adhrann says that scammers should "emphasize on you being in a difficult financial situation, yet DO NOT insist on that, but treat this subject like you have been much better in the past, and really ashamed now, [as you are] not used to being poor." Step three is where things start getting really interesting.
They should have a burner phone, he says (a disposable phone that can be used for temporary tasks and then discarded).
Potential scammers are also advised to use virtual private networks and proxy services, both of which can help hide the scammer's real IP address and location in case law enforcement get involved.
That's a sure sign that the account is fake, as the photo must have been circulating on the internet.