THE ULTIMATE Method of Scammer PAYBACK

SHUT DOWN ANY SCAMMER!

You can shut down ANY scammer with ONLY
60 seconds of your time!

1. Who is providing the scammer their phone service?  Use this carrier-lookup tool here to see what phone service the scammer is using.
2. Email the carrier (see email list below)!   Include what type of scammer you are reporting.  Indicate “IRS Scammer”, or other.
3. LAUGH!  Likely the scammer has multiple phones on a single account you will end up shutting down THEIR ENTIRE ACCOUNT!

REPORT SCAMMER PHONE ABUSE TO CARRIERS, IN ALPHABETICAL ORDER:

 

“Aerialink/Geneseo (SVR)” report abuse
Note: This service does not include phone services, only texting services, but some Carrier Lookup tools may mistakenly list this agency as the carrier for the phone number.

 “Blitz Telecom” report abuse:
Email: investigate@blitztelecomservices.com
Results: Timing results.  Thanks “drwat” for the contribution.

 “Enflick” report abuse:
Email: abuse@enflick.com, abuse@textnow.com
Results: Scammer phone system shut down within 2-3 days, typically

“Google/Bandwidth” report abuse:
Email: support@mybwc.zendesk.com
Web Form: https://www.bandwidth.com/report-a-phone-number/
Results: Scammer phone system shut down in 2 hours, typically.

“Level3 SMSEnabled – Sybase365” report abuse:
Email: sap_spam_reporting@sap.com
Results: Scammer phone system shut down in 2 days, typically.

“Level 3 Communications” report abuse:
Email: security.feedback@level3.com, abuse@level3.com
Results: Scammer phone system shut down in 2 days, typically.

“Localphone 360 Networks SVR” report abuse:
Email: dids@voxbeam.com
Results: Scammer phone system shut down in 24 hours, typically.

“Local Access LLC” report abuse:
Email: subpoena@localaccessllc.com, sales@localaccessllc.com, report@peerlessnetwork.com, CourtOrders@subsentio.com, LELiaison@subsentio.com, Abuse@subsentio.com, abuse@peerlessnetwork.com, trouble@peerlessnetwork.com
Results: Scammer phone system shut down in 2 hours, typically.

“MCImetro” (which is actually “Verizon”) report abuse:
Email: abuse@verizon.com, security.issues@verizon.com, ResearchandCompliance@one.verizon.com, abuse@abuse.verizon.com, researchandcompliance@verizon.com, robert.chirino@verizon.com
Results: Scammer phone system shut down in 24 hours, typically.

“Neutral Tandem” (which is actually “Inteliquent”, “Onvoy” and also “Broadvox”) report abuse:
Email:  regina.echols@inteliquent.com, abuse@onvoy.com
Results: Scammer phone system shut down in 24 hours, typically.

“Onvoy” (a division of Inteliquent) report abuse:
Email:  regina.echols@inteliquent.com, abuse@onvoy.com
Web Form: https://www.inteliquent.com/contact-us/report-abuse
Results: Scammer phone system shut down in 4-6 hours, typically.

“Peerless Network” report abuse:
Email: report@peerlessnetwork.com, CourtOrders@subsentio.com, LELiaison@subsentio.com, Abuse@subsentio.com, abuse@peerlessnetwork.com, trouble@peerlessnetwork.com
Results: Scammer phone system shut down in 30 minutes, typically.  WOW!

“T-Mobile” report abuse:
Note: If T-Mobile is listed, then the carrier is actually Tracfone.
Email: KeLevine@tracfone.com, Abuse@t-mobile.com
Results: Scammer phone system shut down in 1-2 days, typically.

“Twilio/Broadvox (Sybase)” –OR–“Twilio/Inteliquent (SMS-Sybase) (MMS-SVR)” report abuse:
Email: support@twilio.zendesk.com, stopspam@twilio.com
Results: Scammer phone system shut down in 1 hour.  WOW!

“Vail Lab (Sybase)” report abuse:
Email: sap_spam_reporting@sap.com
Results: Scammer phone system shut down in 2 days, typically.

“Verizon” report abuse:
Email:  c-christal.blair@berizon,com,  robert.chirino@verizon.com, researchandcompliance@verizon.com, ResearchandCompliance@one.verizon.com, security.issues@verizon.com, abuse@verizon.com
Results: Scammer phone system shut down in 2 days, typically.

“VoxBeam” report abuse:
Email: dids@voxbeam.com, support@voxbeam.com
Results: Scammer phone system shut down within 2 hours

For “YMAX” or “MagicJack” report abuse:
Email: ReportAbuse@magicjack.com
Results: Scammer phone system shut down within 4 hours.

PLEASE NOTE:  In ALL YOUR CORRESPONDENCES be sure to include potentialviolation@usac.org in the Carbon Copy of your emails. If the scammer is an IRS scammer ALSO include phishing@irs.gov

Why do I say this is the BEST way of shutting down a scammer?

  • All other methods only affect a single phone number at a scammer’s location. This method will shut down their entire phone system.
  • While scambaiting and Call Flooding is REALLY fun, this method only takes 60 seconds of your time, and you see results very quickly, usually within a day!

More points of contact coming soon.

MouseRecorder

Many of you have asked me how you can get MouseRecorder. The original developer places their program on a SoftPedia page filled with Malware, Grayware and a million click-bait options. That’s just a bunch of CRAP!

We are now hosting his program on our own server. You can download it here.

Is it illegal for us to distribute someone else’s program? Yep! So, while we are in the fighting mood come and get us GUNNER BARTELS!

What is MouseRecorder? You will read some references below regarding it. Quite simply, it is a slick program (with many bugs) for recording keyboard and mouse movements. When you are done recording, simply click “Play” and the program will ‘loop’ the recorded keyboard and mouse movements. This makes it possible for you to do your own call flooding while you are away from your computer. For the most part it will do what you need, but there are certain limitations and bugs that the developer has no interest in resolving. As a result, we have part of our crew making a BETTER mouse recorder program. Once it is completed we will post the article here.

Email, SMS, Social Media Flooding – THE WORK IS DONE

Ok, since we finished the call flooding tool I put “all hands on deck” to finalize this secondary tool.

It’s official…. we can completely DESTROY ANY SCAMMER COMPANY WE DESIRE with the click of a button!

Side note: Our call flooding tool is now capable of doing about 210 calls per minute from random phone numbers and random caller ID names. The gateway ID information is also now randomized. It CANNOT BE STOPPED.

I am pleased to announce that the tool works FAR BETTER than expected!!!

Email flooding – This was not only fun, but very easy. We can now flood any single email account with over 1,500 emails from random email addresses, “From” names, and IP addresses. The emails are guaranteed to go to the Inbox and they cannot be blocked.

Social Media Flooding – We can flood a social media account with a little over 1,200 postings per minute from random factitious social media accounts. This includes Facebook, Twitter, and so forth. We are still working on LinkedIn and Google+, but likely by March 1st 2018 those features will be completed.

SMS Flooding – The results of this is….. oh my! We can flood a phone with over 3,000 SMS PER MINUTE!!! WOW!!!! Each SMS is from a random phone number and caller ID name. IT CANNOT BE STOPPED. I made the mistake of testing on my own phone. Gee what a mess. However, something very interesting happened. After 2 minutes the memory of the phone was completely filled up. Essentially, my phone was just a useless paperweight thereafter. Manually deleting all SMS’s would have taken days… and that was just with 2 minutes of flooding!!!!

CALL FLOODING – The Work Is Finished!

The tool we have created is unbelievably amazing and powerful. We have now deployed it across multiple systems across the USA to severely cripple scammer phone networks. Our current rate of shutting down scammers is 8 per day. With a few more systems added soon we hope to increase those numbers exponentially.

So, the project is finished for internal usage.

The next task is to make this distributable. However, to do so we need to ensure that this tool isn’t used against non-scammers, like an Ex-wife, Ex-boss, or a neighbor you don’t like. Our solution is that all phone numbers entered into the tool will be properly vetted by an administrator. Once the number is approved the tool will automatically begin to destroy the scammer’s phone network.

Email Flooding, SMS Flooding, Social Media Flooding

Phone are naturally just ONE WAY to really hurt scammers.

EMAIL FLOODING: A few months ago it was brought to our attention that we should also consider flooding scammer’s email accounts with hundreds of emails per minute. This will bury any necessary emails for running day-to-day operations. The solution is to flood the scammer with hundreds of emails from random email addresses, from random IP addresses, with random names (like John Adams, Mary Poppins…. but less obvious, of course). The objective will be to shut down the scammer’s email accounts within a few hours since it will be physically impossible to review and delete hundreds of emails per minute, by our current estimation.

SMS Flooding: Surprisingly, we have been able to get the cell numbers of scammers!! How they could be so stupid to give that information out is beyond us, but if they think they have a likely victim, they will do anything to “close the sale” so-to-speak. In addition to call flooding, a separate tool will also do SMS flooding from RANDOM caller ID’s. It will be unstoppable!

Social Media Flooding: It has come to our attention that scammers use social media to recruit new trainees. By flooding these supposedly “secure” areas we can bring down scammers by flooding them with fake “I want to make money and work for you” style messages. This can easily be accomplished, by our estimation, at the rate of 200 postings per minute from random fictitious social media accounts.

PHONE NUMBER RESOURCES FOR SCAM BAITING AND CALL FLOODING

There are numerous resources to get phone numbers for scam baiting and call flooding.  Here are a few of our favorites:

 

CALL FLOODING A SCAMMER – HOW TO DO IT YOURSELF

Whether the scammer can or cannot block your calls there are some things you can do to harass them non-stop, even while you sleep!!

  1.  Set up a FireRTC account.  Use a functional throw-away email account to create it.  You can watch these basic instructions on YouTube for setting up a FireRTC account.
  2. Once you have setup your FireRTC account have fun manually calling scammers.  When they block your call simply go into the settings and change your Caller ID phone number.  Next, you will get greedy and realize you can double your efforts by having 2 browser tabs going at the same time.  Then it is follows you will get even more greedy and open 3 tabs.  You will keep getting greedy pasting in and calling the scammer on many tabs until you realize that your browser/computer/WiFi connection can only handle so much.  Then you will close a tab or 2 to stay safely under the wire.
  3. It is important to note here that FireRTC supports the Scam Baiting community.  They are interested in hearing your ideas.  Also, if you get shut off by FireRTC for overuse of their program (hasn’t happened to us yet, but we have seen a throttle-back), then you can ask them to unlock your account so that you can resume your work.
  4. Remember, the fake number can’t be blocked for long since you can easily change it in the “Settings” in FireRTC.  NOTE:  For us, using Chrome seems to be best.  When you change your phone number you need to reload all your browsers.  Since Chrome doesn’t have a hotkey for reloading all tabs in a browser you can install a plugin that will do it with a single hotkey-command or point/click action (whichever you prefer).  But, if you don’t refresh all your tabs the old FireRTC number will persist.
  5. As time goes by, your greed will increase (don’t be offended, it happened to us).  You will eventually want to automate the process for you.  You can use a program like MouseRecorder to record your keyboard and mouse movements.  Then you can loop those movements over and over again.  This means you can continue to Call Flood a scammer using FireRTC on multiple Chrome Tabs with MouseRecorder.  It is a POWERFUL combination.
  6. Once you understand the syntax of MouseRecorder you can go in and edit the values and slowly tweak the values until you are hitting a single scammer a good 20-30 times per minute easily.  Be patient, it takes time to get up to that speed and a good knowledge of MouseRecorder.  I would be happy to assist you if you need help.
  7. Repeat the same steps above on a second machine and with a second (different) FireRTC account.  You are now hitting the scammer with at least 40 times per minute, but likely close to 60 times per minute.  If you have dedicated computers and high-speed internet you can hit them with 80 calls per minute easily.

PROS – It’s free, it’s fun, you get scammers REALLY mad.

CONS – It takes some time to set up, but worth it.  You get some instant gratification as you build up to a professional level of hitting them.  Also, eventually SOME scammers will block the Caller ID “NAME” instead of just the Caller ID “PHONE NUMBER”.  Once the scammer blocks the ID name, then it doesn’t matter what phone number you change your Caller ID phone number to.  Not all scammers can block a name, but you will encounter some.

BETTER method for Call Flooding Scammers:

If you have a RingCentral account you can use it to call flood scammers.   If you don’t have one, stop here.  Instead use the steps outlined above.  It is very expensive to have a RingCentral (RC) account.  However, if you do have an RC account you can easily use the RC desktop app to call flood scammers.

  1. Install the RC desktop app.
  2. Install MouseRecorder.
  3. Program MouseRecorder to call the scammer.
  4. USE THE PARK feature in RingCentral.  This “parks the call”, essentially freeing up your line while you hold their line open with whatever annoying song or message you want played during that time.
  5. Lather, rinse, repeat.  When the scammer blocks your caller ID you can change it from within your RC account.  You can also change your Caller ID NAME, just in case the scammer blocks your name, instead of your number.   It is fun to have a name like “FBI” or “Donald Trump” or whatever.  Oftentimes scammers will acknowledge the funny name.

PROS:  It is the best way to change your caller ID name and number, since you can only change your caller ID number with FireRTC.  If you already have RC then it is also free!

CONS:   If you don’t have RingCentral then it probably isn’t worth it for you to set up an account just to nail scammers.  Also, you can’t open multiple browser tabs and make calls to scammers to flood them.  You can only call from one application on each machine.  This will slow down the call flooding fun, but not by much.

CALL FLOODING THE SCAMMERS – THE WORK BEGINS

We are excited to announce that the work has begun for developing the ultimate call flooding tool.  The first step is to open a SIP/ Gateway so that we become essentially a “Phone Company”.  Your landline and cell phone are owned by someone, like Sprint, Verizon, AT&T, MagicJack, etc.  With our Scammer Blaster application we need our own Gateway so that we do not have to answer to Sprint, Verizon and others.  This is necessary to make each phone call ‘free’.  Granted, nothing is truly free.  We need to set up a server and make sure it can handle the traffic load.  Servers cost money, and so does internet traffic (which is needed with working with SIPs and Gateways).  But it will be VIRTUALLY free, which is good enough for us, for now.  Cloud services are too finicky, and there is no such thing as a true Cloud server, in the way people generally think of such.

Anyways, we are now setting up the SIP / Gateway, and if all goes well we should have an early version of Scammer Blaster within the next month.  Standby for upcoming updates….

CALL FLOODING – “THINK TANKING” THE SOLUTION

The solution is to hit a scammer with a flood of phone calls, as many calls as their phone systems can handle.  In our testing, we have found that about 30 calls per minute is sufficient for clogging a scam agency’s phone lines.  In our tests we call, leave the line open so that the scammer can yell whatever it is they want to yell at us, while we “Park” the call and continue to flood their other lines.  This is all done with a single computer, using VOIP, multiple browser windows and a “keyboard mouse recorder” program to automate repetitive keyboard and mouse movements.  So far so good.  We can hit them pretty hard.

However, scammers aren’t stupid….. except for the horrible things they do.  They know how to block caller ID’s.  DUH!  Who doesn’t?  They aren’t going to make hundreds of millions of dollars a year only to be stopped by a call flooder!  No!  They simply block the number and away they go.  So, the solution is to call from different caller ID’s and to call flood them from random Caller ID’s.  Ok, that’s the solution, how do we implement such a method?  Working on it……