From: Ms. Helen Papi [mailto:email@example.com]
Sent: Monday 4 March 2013 07:02
To: firstname.lastname@example.org Cc: email@example.com
Hello Antonio Ieranò
Greetings and sincere apologies if this letter is against your moral ethics. I know you will be surprise to read my email. I got your contact from online business directory which prompted me to contact you in confidence. Apart from being surprise, you may be skeptical to reply back to me because based on what is going on in the internet world which has made it very difficult for people to believe anything that comes through the internet but this is a different case as proof would show as we proceed.
My name is Ms. Helen Papi. I am proposing a very high profiled business transaction to you with returns very lucrative. I need a partner from your country who I can work with on this investment project and I want to ask for your partnership to re-profile funds valued over $13 million Dollars for investment in your country.
If you feel you can have this handled, please let me know, so that I can send you a comprehensive details on the source of fund for this proposed investment so we can discuss how to move forward.
Spam Comments (aitechupdate.wordpress.com)
FW SPAM: Important Notice!!! (aitechupdate.wordpress.com)
FW SPAM: hello, i see your profile at (linkedin.com) (aitechupdate.wordpress.com)
I am a Security Manager and architect, CSO, BDM, marketing specialist, and tech evangelist with over 20 years of experience serving as a community liaison, subject matter expert, and high-profile trainer for key technologies and solutions. My experience includes acting as the public face of Huawei technology and before Cisco security technologies; leading pan-European technical teams in development of new Cisco security products; and serving as a key public speaker and trainer on behalf of new high-tech products. My expertise spans IT development and implementation, marketing strategy, legal issues, and budget / financial management.
Specialties and Executive Expertise
IT Strategy, Technical Audits, Enterprise Architecture & Applications, Technical Sales Liaison, Solution Architecture, Network Design, Architecture, & Security, Vulnerability Assessment & Management, Systems Engineering, Data Privacy, Cloud Computing, Marketing Strategy, Budget Management, Social Media Marketing, High-Impact Presentations,incident handling, Forensics, Italian companies, Authentication, Infrastructure security, Security manager, Security issues, Attacks, Security infrastructure, Data encryption
Security and Technical Advisoring
Business Development and Marketing