Six women thought they found love online. It was a married father of 2 scamming them out of millions
A Massachusetts woman believed she was in a committed relationship with 'Williams Moore.' So did a New Jersey woman, who fell head over heels for her boyfriend, 'Manuel Sykes.' A Florida woman met 'Edward Nowak' online and believed him when he told her worked in Cyprus.
Turns out, they were all 'dating' the same man—a married father of two young boys in Nigeria who worked in real estate and had a background in network marketing and sales.
His real name? Charles Uchenna Nwadavid. He pleaded guilty in Boston in June, admitting to charges of mail fraud, aiding and abetting money laundering, and money laundering.
According to court documents, Nwadavid was running a romance scam, in which criminals love-bomb lonely—often elderly—people on dating apps and social media to quickly gain their affections. The targets are often vulnerable women. Romance scams boomed during the pandemic and have since continued to haunt people over 60. According to the FBI, there were nearly 18,000 complaints about romance fraud in 2024, and some 7,600 victims were over age 60. The losses attributed to that age cohort totaled $389 million last year, with total losses among all age groups approximately $672 million.
A 66-year-old Montana woman involved in a different romance scam named Rita told authorities she lost more than $90,000 over nearly five months in 2024 after she fell for a 'celebrity' who started asking her for money. She said she was vulnerable as she went through a divorce and became almost addicted to the texts she would get from her purported romantic partner.
'For me, these texts were like a drug,' she said. 'Like, I needed them to live.'
Now, they make her sick and she said she feels like she lost her heart and soul by being scammed in the fake relationship.
'Hindsight is always 20-20,' Rita told the FBI, according to a June video. 'But I wasn't thinking with my brain, I was thinking with my heart.'
In addition to Nwadavid, authorities in June sentenced five people for running a $17 million romance and investment scam ring. Similarly, a Missouri woman admitted last month to aiding a Nigerian romance scam that netted $1 million and involved at least one victim in her early 70s.
Like in the other romance frauds, Nwadavid never met any of the six women involved in the romance scam in person, only communicating with them through email and text. As part of the scheme and to keep himself concealed, authorities said Nwadavid tricked his first victim, one of three women from Massachusetts, into opening a crypto account at Bitcoin of America. (Bitcoin of America was a crypto exchange headquartered in Chicago that has since ceased its operations.) Nwadavid then accessed her account and transferred the funds to Bitcoin wallets he controlled, authorities said.
From there, Nwadavid used the Massachusetts woman as a 'money mule' to collect illicit funds from other unsuspecting women. From Jan. 2019 to June 2019, the New Jersey woman sent $896,000 to the money mule on behalf of her boyfriend, 'Manuel Sykes.' The Florida woman sent $235,000; another Massachusetts woman sent about $276,000. A fifth woman sent $230,000 and the sixth sent $239,100.
Five of the women were told their 'boyfriend' had been seriously injured in an oil rig fire and needed Bitcoin to pay his medical bills. The sixth woman, who lived in Great Bend, Kansas, believed her boyfriend 'Clarence Manning' had inherited $2 million from his father but needed to travel to Spain to collect it. He then claimed to be hospitalized overseas.
At that point, Nwadavid allegedly tricked the first woman, his money mule, into transferring the $2.5 million she had collected from the other five women into her crypto account. Nwadavid then allegedly traversed 210 Bitcoin from her account through intermediary accounts and into two other accounts of his.
A lawyer for Nwadavid did not respond to Fortune's request for comment. Authorities declined to comment given the case is still pending.
His sentencing is scheduled for September.
This story was originally featured on Fortune.com

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
an hour ago
- Yahoo
Parrish pedestrian, 19, dies after being struck by pickup on U.S. 301
A 19-year-old Parrish man was killed when he was struck by a pickup after he entered the southbound lane of U.S. 301 on foot. The collision happened at 9:38 a.m. Saturday, July 5 south of Prosperity Lakes Boulevard, according to a Florida Highway Patrol report. The pickup was traveling south on U.S. 301 and the pedestrian was also in the southbound lane. The front right of the pickup hit the pedestrian, the report said. The driver of the pickup, a 31-year-old Wimauma man, was uninjured. The Parrish man was pronounced dead at the scene. The crash remains under investigation. This article originally appeared on Sarasota Herald-Tribune: Parrish, Florida man, 19, dies after being hit by pickup on U.S. 301
Yahoo
an hour ago
- Yahoo
Visa's 24/7 war room takes on global cybercriminals
In the heart of Data Center Alley -- a patch of suburban Washington where much of the world's internet traffic flows -- Visa operates its global fraud command center. The numbers that the payments giant grapples with are enormous. Every year, $15 trillion flows through Visa's networks, representing roughly 15 percent of the world's economy. And bad actors constantly try to syphon off some of that money. Modern fraudsters vary dramatically in sophistication. To stay ahead, Visa has invested $12 billion over the past five years building AI-powered cyber fraud detection capabilities, knowing that criminals are also spending big. "You have everybody from a single individual threat actor looking to make a quick buck all the way to really corporatized criminal organizations that generate tens or hundreds of millions of dollars annually from fraud and scam activities," Michael Jabbara, Visa's global head of fraud solutions, told AFP during a tour of the company's security campus. "These organizations are very structured in how they operate." The best-resourced criminal syndicates now focus on scams that directly target consumers, enticing them into purchases or transactions by manipulating their emotions. "Consumers are continuously vulnerable. They can be exploited, and that's where we've seen a much higher incidence of attacks recently," Jabbara said. - Scam centers - The warning signs are clear: anything that seems too good to be true online is suspicious, and romance opportunities with strangers from distant countries are especially dangerous. "What you don't realize is that the person you're chatting with is more likely than not in a place like Myanmar," Jabbara warned. He said human-trafficking victims are forced to work in multi-billion-dollar cyber scam centers built by Asian crime networks in Myanmar's lawless border regions. The most up-to-date fraud techniques are systematic and quietly devastating. Once criminals obtain your card information, they automatically distribute it across numerous merchant websites that generate small recurring charges -- amounts low enough that victims may not notice for months. Some of these operations increasingly resemble legitimate tech companies, offering services and digital products to fraudsters much like Google or Microsoft cater to businesses. On the dark web, criminals can purchase comprehensive fraud toolkits. "You can buy the software. You can buy a tutorial on how to use the software. You can get access to a mule network on the ground or you can get access to a bot network" to carry out denial-of-service attacks that overwhelm servers with traffic, effectively shutting them down. Just as cloud computing lowered barriers for startups by eliminating the need to build servers, "the same type of trend has happened in the cyber crime and fraud space," Jabbara explained. These off-the-shelf services can also enable bad actors to launch brute force attacks on an industrial scale -- using repeated payment attempts to crack a card's number, expiry date, and security code. The sophistication extends to corporate-style management, Jabbara said. Some criminal organizations now employ chief risk officers who determine operational risk appetite. They might decide that targeting government infrastructure and hospitals generates an excessive amount of attention from law enforcement and is too risky to pursue. - 'Millions of attacks' - To combat these unprecedented threats, Jabbara leads a payment scam disruption team focused on understanding criminal methodologies. From a small room called the Risk Operations Center in Virginia, employees analyze data streams on multiple screens, searching for patterns that distinguish fraudulent activity from legitimate credit card use. In the larger Cyber Fusion Center, staff monitor potential cyberattacks targeting Visa's own infrastructure around the clock. "We deal with millions of attacks across different parts of our network," Jabbara noted, emphasizing that most are handled automatically without human intervention. Visa maintains identical facilities in London and Singapore, ensuring 24-hour global vigilance. arp/dw Error while retrieving data Sign in to access your portfolio Error while retrieving data Error while retrieving data Error while retrieving data Error while retrieving data
Yahoo
3 hours ago
- Yahoo
Visa's 24/7 war room takes on global cybercriminals
In the heart of Data Center Alley -- a patch of suburban Washington where much of the world's internet traffic flows -- Visa operates its global fraud command center. The numbers that the payments giant grapples with are enormous. Every year, $15 trillion flows through Visa's networks, representing roughly 15 percent of the world's economy. And bad actors constantly try to syphon off some of that money. Modern fraudsters vary dramatically in sophistication. To stay ahead, Visa has invested $12 billion over the past five years building AI-powered cyber fraud detection capabilities, knowing that criminals are also spending big. "You have everybody from a single individual threat actor looking to make a quick buck all the way to really corporatized criminal organizations that generate tens or hundreds of millions of dollars annually from fraud and scam activities," Michael Jabbara, Visa's global head of fraud solutions, told AFP during a tour of the company's security campus. "These organizations are very structured in how they operate." The best-resourced criminal syndicates now focus on scams that directly target consumers, enticing them into purchases or transactions by manipulating their emotions. "Consumers are continuously vulnerable. They can be exploited, and that's where we've seen a much higher incidence of attacks recently," Jabbara said. - Scam centers - The warning signs are clear: anything that seems too good to be true online is suspicious, and romance opportunities with strangers from distant countries are especially dangerous. "What you don't realize is that the person you're chatting with is more likely than not in a place like Myanmar," Jabbara warned. He said human-trafficking victims are forced to work in multi-billion-dollar cyber scam centers built by Asian crime networks in Myanmar's lawless border regions. The most up-to-date fraud techniques are systematic and quietly devastating. Once criminals obtain your card information, they automatically distribute it across numerous merchant websites that generate small recurring charges -- amounts low enough that victims may not notice for months. Some of these operations increasingly resemble legitimate tech companies, offering services and digital products to fraudsters much like Google or Microsoft cater to businesses. On the dark web, criminals can purchase comprehensive fraud toolkits. "You can buy the software. You can buy a tutorial on how to use the software. You can get access to a mule network on the ground or you can get access to a bot network" to carry out denial-of-service attacks that overwhelm servers with traffic, effectively shutting them down. Just as cloud computing lowered barriers for startups by eliminating the need to build servers, "the same type of trend has happened in the cyber crime and fraud space," Jabbara explained. These off-the-shelf services can also enable bad actors to launch brute force attacks on an industrial scale -- using repeated payment attempts to crack a card's number, expiry date, and security code. The sophistication extends to corporate-style management, Jabbara said. Some criminal organizations now employ chief risk officers who determine operational risk appetite. They might decide that targeting government infrastructure and hospitals generates an excessive amount of attention from law enforcement and is too risky to pursue. - 'Millions of attacks' - To combat these unprecedented threats, Jabbara leads a payment scam disruption team focused on understanding criminal methodologies. From a small room called the Risk Operations Center in Virginia, employees analyze data streams on multiple screens, searching for patterns that distinguish fraudulent activity from legitimate credit card use. In the larger Cyber Fusion Center, staff monitor potential cyberattacks targeting Visa's own infrastructure around the clock. "We deal with millions of attacks across different parts of our network," Jabbara noted, emphasizing that most are handled automatically without human intervention. Visa maintains identical facilities in London and Singapore, ensuring 24-hour global vigilance. arp/dw Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data