Username:   Remember Me

Uber Articles {Über (ger) adj. above, beyond }

- Above and Beyond a Mere Article Directory


Bomb Attack Scams

By Odesi Desko

The threat of a bomb is one of the worst things that can happen to a store or a company. No one wishes their employees, customers, or selves to be killed in an explosion so this usually means evacuating the store. Bomb scammers prey on this fear.

Bomb scams typically happen at places of business or in large areas like a mall. This is so that the threat is taken seriously due to the amount of people that would be involved. In most cases, the scammers tell the business that they should not inform the authorities but most people won’t listen to this. What is most terrible is that bombings have actually happened after a threat. People have gotten killed or hurt badly because of this. Because the scammer knows that no one wants to have to deal with something so tragic, they play upon it.

There are several types of bomb scams. One of the more popular ones involves the claim that the bomb is already in the facility and the caller has a remote triggering device to detonate the bomb. They threaten that if they are not paid a certain amount of money by a set time, they will set off the bomb. The truth is that this is rarely the truth and it is a rare occasion when there is actually a bomb on the premises.

Most bomb scares are nothing more than bomb scams designed to extort money. The fear of bombs is real, and the mere threat of a bomb is often enough for the plan to succeed. Fear is a truly powerful motivator and scam artists know that many people will assume the threat is real and the bomb exists rather than take a chance on being wrong and having a bomb explode.

When the scammer is having a sum of money wired, it is possible to use telephone look up services such as to verify who he or she is. When picking up a wire a person must show personal identification and, while it can be forged, some are dumb enough to use real identification papers.

Bomb scams become a personal issue when an employee, in a bank for instance, is contacted and told that a family member is captive and there is a bomb set to go off if the demands are not met. Unfortunately, this has occurred in the past, and although many times the family is fine, there have been a few instances where disastrous results occurred.

The fact is that police records of this type of bomb scam shows that most of these claims are scams being carried out by people who are actually in another country or state altogether. The significance of this information is that it shows that the targets have probably been chosen at random. To carry out the scam, thieves hack into the company’s computer system to acquire the names and personal information they will need.

A newer bomb scam is the logic bomb where the threat is not against a person or group of people, but rather against all the data found in a person’s computer if the ransom is not paid. The scam artists specifically target companies where all the business records history would be compromised, or a home computer where there is probably not a backup. When the victims consider the potential loss of their data against the money that is being demanded, many people decide to pay the ransom. While there are government agencies actively working to put a stop to these threats, the fact is that there is very little that can be done to track these particular criminals.

To learn more about telephone look ups that allow to track scammers, go to

Article kindly provided by

Topics: Computers and Technology | Comments Off

Tags: , , , , , , , , , , ,

Article Citation
MLA Style Citation:
Desko, Odesi "Bomb Attack Scams." Bomb Attack Scams. 3 Jul. 2010. 23 Aug 2014 <>.

APA Style Citation:
Desko, O (2010, July 3). Bomb Attack Scams. Retrieved August 23, 2014, from

Chicago Style Citation:
Desko, Odesi "Bomb Attack Scams"

Reprint Rights

Creative Commons License
This article is subject to a revocable license under a Creative Commons Attribution-No Derivative Works 3.0 Unported License, which means you may freely reprint it, in its entirety, provided you include the author's resource box along with LIVE VISIBLE links (without "nofollow" tags). We may revoke the license at any time with or without cause. You must also include the credit to

Comments are closed.

Uber Articles and its partner sites cannot be held responsible for either the content nor the originality of any articles. If you believe the article has been stolen from you without your permission, please contact us and we will remove it immediately. If you have a problem with the accuracy or otherwise of the content of an article, please contact the author, not us! Also, please remember that any opinions and ideas presented in any of the articles are those of the author and cannot be taken to represent the opinions of Uber Articles. All articles are provided for informational purposes only. None of them should be relied upon for medical, psychological, financial, legal, or other professional advice. If you need professional advice, see a professional. We cannot be held responsible for any use or misuse you make of the articles, nor can we be held responsible for any claims for earnings, cures, or other results that the article might make.
  • RSS Feed

    RSS for Computers and Technology