Examples of using Fraudster in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
But when a fraudster switches your number to another device, that will also do the trick.
A fraudster perfectly packages cheap imitation wine into the bottle of an expensive wine with all the packaging and labeling intact.
He's eccentric- no doubt about that- but he's not a fraudster, at least according to those who know him best.
The fraudster tells the victims they are under investigation and, in order to assist Chinese law enforcement, they must speak to an investigator.
Fraudster travel agent who gave discounts to friends told to pay back employers or face jail.
Fyre Festival founder sentenced to 6 years in prison, judge calls him"serial fraudster".
But it's even worse than that: Many security experts often don't know whether a"user" is a hacker, spy, or fraudster.
Either this person didn't care about taking the time to make sure they were putting their best foot forward, or it could be a fraudster.
Illustration 8-3: The fraudster may claim that information used in promoting the investment is proprietary, secret, or confidential, and cannot be shared with independent sources for due diligence.
Illustration 8-2: The fraudster promotes an investment to the potential victim but tells the potential victim that the investment and promised returns are only possible if absolute secrecy is maintained.
Illustration 8-4: The fraudster insists that there is only a" short window of opportunity", or a" last chance" to invest before the opportunity is lost forever.
A fraudster will often persuade a victim of the need for quick decisions in an attempt to thwart due diligence or to effect an irrevocable transfer of funds in the fraudster' s favour.
However, the fraudster warns the potential victim that if he or she contacts that body to ask about the transaction, the entity will be forced to deny the legitimacy of the transaction.
A fraudster may request information to be supplied in a manner not typically used to supply such information, or technology may be used to inappropriately access confidential information.
For example, the fraudster may request customer lists, internal telephone directories, and the like, which the fraudster may use to contact potential victims or to impersonate the entity' s employees.
Illustration 18-7: Fraudster requests that a bank teller issue a letter indicating that the fraudster has deposited with the bank" good, clean funds of a non-criminal origin".
Illustration 21-6: A fraudster contracts with a buyer to sell the buyer certain goods and both agree that the seller will accept a letter of credit as payment.
The fraudster presents conforming documents to the bank to receive payment, based upon delivery of the containers before the buyer discovers that the containers have been packed with scrap metal instead of the contracted goods.
Illustration 23-6: A fraudster files false claims against an insolvent entity and sells the claims at a discount to victims who, believing the claims to be valid, attempts to collect from the insolvent entity.
Illustration 23-4: Fraudster may overvalue assets of an insolvent entity, knowing that victims will believe the fraudster' s valuations have been reviewed by or verified by the court or insolvency representative.