Feeds

419ers strip lonely heart mum of £80k

Handsome US soldier actually Lad from Lagos

Providing a secure and efficient Helpdesk

A divorced mother of three was taken for £80,000 by 419ers posing as a US soldier, the Daily Mail reports.

Kate Roberts, 47, of Melton Mowbray, Leicestershire, was hooked when she posted a profile on Friends Reunited Dating in October 2009.

She was soon "exchanging emails with a man calling himself Sergeant Ray Smith and chatting to him several times a day on MSN Messenger".

Smith claimed to be a US soldier serving in Iraq, sadly widowed with an 11-year-old daughter. The gang provided pictures of the apparently "muscle-bound" soldier and his "daughter" to bait the trap, and began to reel in their victim with an initial request for £225 for a phone line.

Then, "a man with an American accent calling himself Mark began ringing her almost every day," the Mail continues.

Roberts said: "I did have doubts, but everything he told me sounded reasonable and I was in love. He told me he couldn’t tell me much about his job for security reasons and I accepted that."

In a textbook operation, the scammers then ramped up the requests for cash, including one for £20,000 to buy the "leave passes" Smith needed to be united with his cyberlove.

In total, Roberts coughed up £80,000 in "regular payments of thousands via Western Union". She "even paid cash directly into what she believed was his bank account as he told her he had no money".

The sad truth was revealed when she organised £12,000 for "one of his friends to pay for his airfare to Britain and he suddenly stopped contacting her".

Roberts explained: "One day he just stopped emailing me and didn’t call me. I drove down to an army base in Cambridgeshire, which he’d told me he had been in for three years, but they had never heard of him. I called the police and my phone company traced the phone he had used back to a mobile number in Nigeria."

The victim was later forced to sell her home to pay off the debts she racked up at the hands of the Lads from Lagos.

She concluded: "Aside from losing the money I feel like I’ve lost the love of my life. I know he wasn’t real, but the feelings were real to me and that’s very difficult to come to terms with. Hundreds of other women must be getting conned right now." ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.