Tagged: Scams Toggle Comment Threads | Keyboard Shortcuts

  • Geebo 9:00 am on January 23, 2026 Permalink | Reply
    Tags: , , , Scams,   

    The Face of Fraud Is Often Familiar 

    By Greg Collier

    When people picture a scammer, they often imagine someone halfway around the world, operating out of a shadowy call center or hiding behind a keyboard with a fake name and a fake accent. What they rarely picture is someone who looks like a neighbor. Or a retiree. Or someone’s grandfather.

    But that image is exactly why scams keep working.

    This week, police in Fort Myers, Florida announced the arrest of Benton M. Reynaert, a local man accused of playing a central role in a worldwide technology support scam that siphoned hundreds of thousands of dollars from victims in the United States, Canada, and Australia. According to investigators, Reynaert acted as a money mule, the person who receives stolen funds and moves them along, making the fraud possible.

    And by all accounts, he does not fit the stereotype most people expect.

    A Familiar Face in a Global Scam

    Police say Reynaert was involved in a classic Microsoft/IT technical support scam. Victims were confronted with alarming pop-up messages claiming their computers had been locked or compromised. Once panicked, they were pressured into paying money after being told a refund error had occurred or that immediate action was required to prevent further damage.

    This is a well-known scam model. What stands out here is not the script but the person alleged to be facilitating it.

    Reynaert, described as an older white man from Fort Myers, allegedly helped move stolen funds overseas using nearly every red-flag payment method law enforcement warns about:

    • cryptocurrency kiosks
    • gift cards
    • wire transfers
    • Western Union
    • checks

    These are not accidental choices. They are deliberate because they are difficult to trace and nearly impossible for victims to recover once sent.

    Why Appearances Matter

    Scammers rely on assumptions.

    Many victims hesitate to question instructions when the person on the other end of the transaction doesn’t look “suspicious.” A familiar face lowers defenses. A polite voice sounds trustworthy. Someone who looks like they could be your grandfather doesn’t trigger the mental alarm bells people associate with crime.

    That’s the point.

    Modern scams are structured like businesses. They use layers, callers, scripts, payment processors, and money mules, to distance the core operators from victims and law enforcement. People like Reynaert, police say, become essential links in that chain, whether they convince themselves they’re doing legitimate work or knowingly participate in criminal activity.

    Either way, the harm is the same.

    The Real Red Flags

    The Fort Myers Police Department emphasized a reminder that bears repeating:

    Legitimate companies and government agencies will never ask you to:

    • send cash
    • buy gift cards
    • use cryptocurrency kiosks
    • wire money
    • mail packages of cash or checks

    Not for refunds. Not for security issues. Not for “errors.”

    Urgency, fear, and secrecy are the real warning signs—not what the scammer looks like.

    Final Thoughts

    Scams don’t come with a uniform. They don’t wear hoodies or masks. They often look ordinary, respectable, and disarming.

    That’s why education and not appearance is the strongest defense.

    If you encounter a pop-up warning, a demand for unconventional payment, or pressure to act immediately, stop. Disconnect. Talk to a trusted family member. Contact law enforcement. The money you save could be your own or someone else’s.

    Because the next person behind the scam might not look like a criminal at all.

    Further Reading

     
  • Geebo 9:00 am on January 22, 2026 Permalink | Reply
    Tags: , , Scams, ,   

    DMV Text & Email Scams Are Spreading State by State Again 

    DMV Text & Email Scams Are Spreading State by State

    By Greg Collier

    Scammers posing as state Departments of Motor Vehicles are once again flooding phones and inboxes across the country, using fear, urgency, and official-sounding language to trick people into handing over money and personal information.

    Recent warnings from officials in North Carolina, Wisconsin, and Illinois all describe nearly identical schemes, and the red flags are remarkably consistent.

    This is not a coincidence. It’s a coordinated scam pattern.

    What’s Going On

    Residents in multiple states are receiving texts or emails claiming to be from their state DMV, warning of:

    • An unpaid parking ticket or vehicle fee
    • Impending license suspension
    • Loss of vehicle registration or driving privileges
    • Additional penalties, fees, or “enforcement” starting on a specific date

    The messages typically include a link and pressure recipients to act immediately.

    Officials in all three states are clear:
    These messages are scams.

    How the Scam Works

    The scam relies on a few predictable tactics:

    1. Authority impersonation
      Messages appear to come from a state DMV or Secretary of State’s office.
    2. Urgency and fear
      Threats of suspended licenses, revoked registrations, fines, or legal consequences are meant to override skepticism.
    3. Payment links
      Victims are directed to fraudulent websites designed to harvest:
      • Credit card numbers
      • Banking details
      • Personal identifying information
    4. Legal-sounding language
      Some messages falsely claim that “enforcement has begun” or cite made-up penalties to sound legitimate.

    Red Flags

    Across all three states, officials highlighted the same warning signs:

    • DMVs do not collect payments by text or email
    • DMVs do not send links demanding payment
    • Threats of immediate suspension are a classic scam tactic
    • Messages demanding action “today” or “before enforcement begins” are suspicious
    • Any request for payment or personal information via text is a red flag

    In North Carolina, officials also warned about scam links ending in “.cc,” which are not associated with state or local government websites.

    What Your State DMV Will Never Do

    According to officials in North Carolina, Wisconsin, and Illinois:

    • They will never:
      • Text or email demanding money
      • Send payment links
      • Threaten license suspension by text
      • Request personal or financial information electronically

    In Illinois, the Secretary of State emphasized that the only texts his office sends are appointment reminders and nothing else.

    If You’ve Been Targeted

    If you get a DMV-related text or email like this:

    1. Do not click any links
    2. Do not respond
    3. Do not provide personal or financial information
    4. Report the message as spam
    5. Delete it

    If you’re genuinely concerned about a ticket or fee, contact your state DMV directly using an official website or publicly listed phone number and never the contact information in the message itself.

    Illinois officials also recommend reporting these scams to the Federal Trade Commission (FTC).

    The Big Picture

    What’s happening here isn’t a one-off scam; it’s a template.

    Once scammers find a message that works, they replicate it across states, changing only the agency name and local details. The goal is volume: send enough messages, and someone will click.

    The good news is that the defenses are simple:

    • Slow down
    • Be skeptical
    • Verify independently

    No legitimate DMV business is conducted through threatening text messages.

    Final Thoughts

    If a message claims to be from the DMV and demands money by text or email, it’s a scam, full stop.

    When in doubt, ignore the message and go directly to your state’s official DMV website or phone number.

    Further Reading

     
  • Geebo 9:00 am on January 21, 2026 Permalink | Reply
    Tags: Davos, , Scams, VIP Access, World Economic Forum   

    Even the Ultra-Wealthy Can Be Scammed 

    By Greg Collier

    Scams are often portrayed as something that only affect the elderly, the financially desperate, or people unfamiliar with technology. That assumption was challenged at the 2026 World Economic Forum in Davos, Switzerland, where scammers successfully targeted some of the world’s wealthiest and most influential individuals. Fake “VIP access” passes were sold to elite attendees, proving that money, power, and sophistication do not provide immunity from fraud.

    This incident is a useful reminder that scams work because they exploit human psychology, not ignorance.

    What Is Davos and Why Access Matters

    The World Economic Forum’s annual meeting in Davos is one of the most exclusive gatherings in the world. Each January, global leaders in politics, finance, technology, and media descend on a small Swiss mountain town to discuss economic policy, geopolitics, climate change, and emerging technologies.

    While the event includes formal speeches and panels, much of Davos’ influence happens informally. Side meetings, private receptions, and invitation-only venues are often where relationships are built and deals are initiated. As a result, access itself becomes a form of currency. Being able to say you were “in the room” carries real professional and political weight.

    That exclusivity creates an ideal environment for scams.

    What Is USA House?

    USA House is one of the most prominent American-branded venues at Davos. Privately funded and housed in a historic church building, it is designed to showcase American leadership, innovation, and policy priorities. The venue hosts panel discussions, networking events, and appearances by senior U.S. officials and major business leaders.

    This year, USA House featured a high-profile roster of speakers, including Cabinet members, White House officials, and executives from major technology companies. President Donald Trump’s special address was livestreamed at the venue, further increasing its appeal. Entry to USA House is limited, and access is known to be difficult to obtain.

    That scarcity is central to what went wrong.

    How the Fake VIP Pass Scam Worked

    Ahead of the event, scammers began selling so-called “VIP access” packages that falsely claimed to guarantee entry to USA House. The organizers later issued a public warning stating that they do not work with external resellers and that anyone who purchased these packages would not be granted access.

    By the time the warning was issued, the damage had already been done. According to USA House, the number of inquiries they received suggested that the fake passes were selling quickly. Some wealthy attendees arrived in Davos believing they had secured exclusive access, only to discover that their expensive credentials were worthless.

    The scammers succeeded by mimicking the language and expectations of elite events. Promises of insider access, limited availability, and proximity to power are persuasive when exclusivity is the norm rather than the exception.

    Why Even Sophisticated People Fall for Scams

    It is tempting to assume that wealthy executives and political insiders should know better. But scams are not about intelligence. They are about pressure, trust, and context.

    At Davos, attendees expect complex credentialing systems, private invitations, and unofficial channels. The idea that access might be arranged through a third party does not immediately raise red flags in that environment. Scammers understand this and design their schemes to fit seamlessly into the setting they are exploiting.

    The broader political climate also matters. Concerns about transactional access to power, especially during President Trump’s second term, have been widely discussed. Against that backdrop, the idea that access could be bought may have felt plausible enough to suspend skepticism.

    A Familiar Pattern at a Higher Price Point

    Despite the luxury setting, this scam followed the same basic structure as many others. There was urgency, exclusivity, insider framing, and the implication that an opportunity would disappear if the buyer hesitated. The difference was not the method but the target audience.

    Instead of fake package deliveries or bank alerts, the hook was elite access at one of the world’s most influential gatherings. The psychology, however, was identical.

    The Broader Lesson

    The Davos VIP pass scam is a useful case study because it strips away a common misconception. Scams do not only work on people who lack resources or experience. They work on people who are human.

    Whether someone is checking their phone at home or navigating the high-pressure environment of Davos, the same vulnerabilities apply. Exclusivity, urgency, and perceived legitimacy can override caution at any income level.

    The takeaway is simple and universal. No one is too wealthy, too connected, or too important to be scammed.

    Further Reading

     
  • Geebo 9:00 am on January 20, 2026 Permalink | Reply
    Tags: credit, , Scams, ,   

    Verizon Outage Becomes the Latest Scam Opportunity 

    Verizon Outage Becomes the Latest Scam Opportunity

    By Greg Collier

    When a major company experiences a public failure, scammers are rarely far behind. The recent Verizon wireless outage, which affected over a million customers nationwide, has already become the basis for a new scam wave, demonstrating once again how criminals will use almost any story in the news as a fraud opportunity.

    What Happened With Verizon

    On January 14, Verizon experienced a widespread wireless service outage that left many customers stuck in “SOS only” mode for hours. According to reporting by USA Today, more than 1.5 million customers were affected, with full service not restored until roughly 10 hours after the disruption began.

    Verizon later said the outage was tied to a software issue and not a cyberattack. As part of its response, the company announced it would issue $20 credits to impacted customers.

    That legitimate corporate response quickly became the hook for scammers.

    How the Scam Emerged

    Shortly after Verizon announced the credits, the Jones County Sheriff’s Office in Georgia issued a warning that scammers were sending fake text messages and emails pretending to be from Verizon.

    These messages claim to offer customers their $20 credit, but in reality they are designed to:

    • Steal personal or account information
    • Capture login credentials
    • Redirect victims to fake websites
    • Or install malware

    The sheriff’s office emphasized that people should not click links in these messages and should instead verify any offers directly through Verizon’s official channels.

    Why This Scam Works

    Scammers thrive on timing and context, and this story gives them both.

    They benefit from:

    • A widely reported outage affecting large numbers of people
    • A promised financial credit
    • Customers actively expecting follow-up communication
    • Frustration and urgency surrounding service restoration

    This is not unique to Verizon. Scammers routinely exploit airline cancellations, tax refunds, student loan announcements, disaster relief programs, and product recalls. If a story is in the news and involves money or accounts, scammers will find a way to attach themselves to it.

    They do not invent narratives. They hijack real ones.

    The Added Complication: Verizon Is Texting Customers

    This case is especially tricky because Verizon has said it will notify customers of the $20 credit by text and that the credit can be redeemed through the myVerizon app.

    That overlap between legitimate communication and scam messages is exactly what criminals rely on.

    Scammers are not trying to outsmart Verizon’s systems. They are trying to blend into Verizon’s normal communication patterns and catch a small number of people off guard.

    Red Flags

    Even when you are expecting communication, certain warning signs remain consistent:

    • Messages with clickable links asking you to log in or verify details
    • Urgent language pressuring immediate action
    • Requests for passwords, PINs, or full account information
    • Slightly altered sender names or unfamiliar URLs
    • Poor grammar or formatting that does not match official messages

    The safest move is simple: do not use links in messages. Instead, go directly to the Verizon app or official website, or contact customer support through known, verified channels.

    Why Scammers Love Breaking News

    The Verizon credit scam is just the latest example of a broader pattern.

    Scammers will use almost any story in the news as a scam because news creates:

    • Attention
    • Confusion
    • Emotional responses
    • And large pools of potential victims

    Whether it is a corporate outage, a natural disaster, or a government program, criminals move quickly to insert themselves into legitimate conversations and transactions.

    Final Thoughts

    This incident is less about Verizon itself and more about how fraud now operates in a real-time media environment.

    Every outage, recall, refund, or relief effort now produces two parallel systems:

    • The real response
    • And the criminal imitation

    For consumers, that means even when a story is real, the messages you receive about it may not be.

    Outages and credits are no longer just customer service issues. They are part of the modern scam ecosystem.

    Further Reading

     
  • Geebo 9:00 am on January 19, 2026 Permalink | Reply
    Tags: , , neighborhood spoofing, , Scams,   

    How Scammers Weaponize Law Enforcement 

    By Greg Collier

    A scam spreading nationwide is now drawing warnings from both West Virginia and Connecticut, built around one of the most effective tools fraudsters have: the fear of arrest.

    Scammers are posing as the U.S. Marshals Service and other law enforcement agencies, calling or texting people out of the blue, accusing them of missing jury duty or court dates, and demanding immediate payment to avoid being taken into custody.

    It sounds official.
    It sounds urgent.
    That is exactly the point.

    Let’s break it down.

    What’s Going On

    According to law enforcement warnings issued in Kanawha County, WV and by the U.S. Marshals Service in Connecticut, scammers are:

    • Impersonating U.S. Marshals or other law enforcement officers
    • Claiming victims missed jury duty, court appearances, or legal paperwork
    • Threatening arrest unless payment is made immediately
    • Sending fake warrants, subpoenas, or court documents to look legitimate

    In Connecticut, officials say scammers are using a tactic known as “neighborhood spoofing,” manipulating caller ID so the number appears to come from a local courthouse or law enforcement office.

    They do not rely on fear alone. They layer in credibility:

    • Fake badge numbers
    • Names of real officials
    • Actual courthouse addresses

    By the time the victim is processing what is happening, the scammer has already framed the situation as urgent and shameful.

    How the Scam Works

    The pattern is consistent across states:

    1. You receive a call or text claiming to be from law enforcement
    2. You are told you failed to report for jury duty or missed a legal obligation
    3. You are informed there is a warrant or a fine “in lieu of arrest”
    4. You are pressured to act immediately
    5. You are told not to tell anyone because it would be “embarrassing”
    6. You are directed to pay using:
      • Wire transfers
      • Gift cards
      • Prepaid debit or credit cards
      • Or Bitcoin

    That payment method is the giveaway.

    Not the badge number.
    Not the courthouse name.
    The payment demand.

    Red Flags

    Watch for these warning signs:

    • Demands for money by phone or text—law enforcement does not collect fines this way
    • Urgency and secrecy—“pay now or be arrested” and “don’t tell anyone” are manipulation tactics
    • Unusual payment methods—gift cards, wire transfers, prepaid cards, or crypto—are never legitimate
    • “Official-looking” caller ID or documents—easily spoofed and commonly faked

    If any one of these appears, assume it’s a scam and verify independently.

    Why This Scam Works

    This scam does not rely on technical trickery. It relies on social engineering:

    • Fear of arrest
    • Fear of embarrassment
    • Respect for authority
    • Panic over legal trouble
    • The instinct to make the problem disappear quickly

    It exploits the public’s incomplete understanding of how courts and law enforcement actually operate—and it does so very effectively.

    What Real Authorities Say

    Both West Virginia and Connecticut officials were explicit:

    No law enforcement agency will call or text you demanding money to avoid arrest.

    In West Virginia, victims are advised to verify claims by calling 911, not the number provided by the caller.

    In Connecticut, residents are told to:

    • Verify court claims directly with the U.S. District Court
    • Never provide payment or personal information
    • Report scams through the FBI’s IC3 at ic3.gov

    The Bigger Picture

    What stands out here is not just the scam itself, but its scale and uniformity.

    Same story.
    Same methods.
    Same fake jury duty.
    Same payment channels.
    Different states.

    This is not a local hustle. It is a repeatable fraud model built to exploit:

    • Authority
    • Technology
    • Human psychology

    And it is not going away.

    Final Thoughts

    If someone claims to be law enforcement and asks you for money over the phone:

    It is a scam.
    Every time.
    No exceptions.

    Hang up.
    Verify independently.
    Report it.

    And most importantly, do not let fear rush you into a financial decision. Scammers thrive on panic, not evidence.

    Further Reading

     
  • Geebo 9:00 am on January 16, 2026 Permalink | Reply
    Tags: , , Scams, ,   

    How a Phone Scam Led to a Deadly Encounter 

    By Greg Collier

    In March 2024, a familiar financial scam escalated into a fatal act of violence in central Ohio, leaving an innocent bystander dead, an elderly man imprisoned, and the perpetrators of the fraud untouched by the justice system. The case illustrates how modern scams can produce real-world consequences far beyond financial loss and how those consequences often fall on people who were never the intended targets.

    The Scam

    Authorities say the incident began as a classic grandparent scam, in which fraudsters contact an older adult and falsely claim that a loved one has been arrested and urgently needs bail money. The callers allegedly pressured the victim with threats and urgency, convincing him that immediate payment was required.

    In this case, the scammers arranged for a rideshare driver to retrieve the money. Using Uber drivers as unwitting couriers has become a recurring tactic in such schemes, allowing scammers to distance themselves physically and legally from the transaction.

    The Encounter

    The rideshare driver, Lo‑Letha Toland‑Hall, a 61-year-old woman from a Columbus suburb, arrived at the home of William J. Brock, then 81 years old, to pick up a package. Investigators later determined that she was unaware of the scam call Brock had received and believed she was completing a routine delivery.

    According to prosecutors, Brock wrongly assumed the driver was involved in an attempt to rob him. The situation escalated rapidly. Brock confronted the driver, and during the encounter, he shot her multiple times. Dashcam footage and investigative findings indicated that the driver was unarmed and posed no immediate threat.

    Toland-Hall died from her injuries.

    The Legal Outcome

    Recently, a jury convicted Brock, now 83, of murder, felonious assault, and kidnapping. Jurors deliberated for approximately one hour before returning the verdict. Brock’s defense argued that he acted in self-defense, citing fear generated by the scammer’s threats. Prosecutors rejected that claim, emphasizing that the victim was an innocent third party.

    Following the verdict, Clark County Prosecutor Daniel Driscoll noted that the case produced multiple victims.

    “The really sad part about this is that we know there are still criminals out there,” Driscoll said. “We know that the scammers, the folks who started this, haven’t been brought to justice.”

    One year after Toland-Hall’s death, her estate filed a wrongful-death lawsuit seeking damages. Brock is scheduled for sentencing.

    The Larger Problem

    While Brock now faces prison, the individuals who orchestrated the scam remain unidentified and uncharged. This imbalance is common in fraud cases: scammers often operate anonymously, across jurisdictions, or from overseas, while the harm they cause unfolds locally and immediately.

    The Ohio case underscores several realities of modern fraud:

    • Scams can escalate into physical danger, not just financial loss.
    • Third parties, including rideshare drivers, delivery workers, and bank employees, may be placed in harm’s way without their knowledge.
    • Victims may act out of fear, especially when scammers use threats involving family members or law enforcement.
    • Scammers frequently avoid accountability, even when their actions directly contribute to injury or death.

    A Preventable Tragedy

    Law enforcement officials consistently advise that individuals who receive threatening or urgent demands for money should not attempt to resolve the situation themselves. Instead, they recommend contacting police or verifying claims through independent channels before taking action.

    This case offers a stark reminder that scams are not victimless crimes. Their ripple effects can be deadly, leaving families grieving, communities shaken, and justice only partially served. Meanwhile, the people who initiated the harm disappear back into anonymity.

    Further Reading

     
  • Geebo 9:00 am on January 15, 2026 Permalink | Reply
    Tags: , Scams, ,   

    Free Flight Phone Calls Aren’t Real 

    By Greg Collier

    A phone call promising free airline tickets may sound like a lucky break, but consumer advocates and airport officials say it’s the latest variation of a spoofing scam that’s being reported across the country.

    A recent warning issued by Huntsville International Airport underscores how the scheme works and why travelers everywhere should pay attention.

    How the Scam Works

    Scammers are spoofing legitimate airport phone numbers, making incoming calls appear as though they are coming directly from an airport’s main office. When someone answers, the caller falsely claims the recipient has won free airline tickets and must act quickly to secure them.

    Airport officials say the calls can sound polished and convincing, often using official-sounding language and urgent deadlines. That urgency is intentional, as it’s meant to pressure people into sharing information before they stop to question the offer.

    Common Tactics Used by the Scammers

    Reports describe a consistent pattern:

    • The caller ID shows an airport’s real phone number
    • The caller claims the recipient has “won” free flights
    • The offer is framed as time-sensitive
    • The caller asks for personal or financial information

    If the call goes unanswered, scammers may leave a voicemail with a different callback number, steering victims away from contacting the real airport.

    What Airports Are Making Clear

    Airports are emphasizing that these calls are not legitimate.

    Officials note:

    • Airports do not give away airline tickets over the phone
    • They never ask for financial or personal information by phone
    • Any legitimate promotions or giveaways come only from verified, official channels, most often social media

    A cold call offering free flights is not a promotion. It’s a warning sign.

    If You’ve Been Targeted

    Consumer protection agencies recommend the following steps:

    • Hang up immediately
    • Do not engage with the caller or follow instructions
    • Do not return calls to voicemail numbers left by unknown callers
    • Never provide personal or financial information over the phone

    Final Thoughts

    Airports do not randomly call people to hand out free flights.

    If an unexpected call claims to be from an airport, pressures you to act quickly, and asks for personal information, the safest response is to hang up and report it. What sounds like a travel perk is far more likely to be an attempt to exploit trust.

    Further Reading

     
  • Geebo 9:00 am on January 14, 2026 Permalink | Reply
    Tags: , Scams, ,   

    How SNAP Benefits Are Being Skimmed Away 

    By Greg Collier

    Across the country, families who rely on Supplemental Nutrition Assistance Program (SNAP) benefits are discovering that their food assistance can vanish overnight. Not because of overspending or lost cards, but because of skimming devices quietly harvesting EBT data at checkout counters.

    A recent investigation in Wichita, Kansas, illustrates how easily it happens. A skimming device was found attached to a store’s point-of-sale terminal, and within days nearly $9,800 in SNAP benefits were stolen from 46 families. The benefits were drained using captured card numbers and PINs. The families were left with empty accounts and no way to recover the money.

    What happened in Wichita is not unusual. It’s part of a growing pattern nationwide.

    How This Scam Works Everywhere

    Skimming devices are small, inexpensive, and easy to hide. Criminals attach them to card readers in grocery stores, convenience stores, and other retail locations that accept EBT cards. When a customer swipes or inserts their card, the device records the card information and PIN.

    Once that data is captured, benefits can be emptied quickly, often in out-of-state or online transactions before the cardholder realizes anything is wrong.

    Because SNAP benefits operate differently from credit or debit cards, victims usually discover the theft only when their card is declined at the register.

    The Part Few People Realize: There Is No Safety Net

    For years, a federal replacement program allowed states to reimburse stolen SNAP and TANF benefits. That funding has expired.

    Now, in many states, stolen benefits are gone for good.

    In the Wichita case, officials confirmed there was no state money available to reimburse victims and no longer any federally funded replacement mechanism. Similar situations have been reported across the country, leaving families without groceries, sometimes for the rest of the month.

    This is what makes SNAP skimming uniquely devastating: the people harmed have the least ability to absorb the loss.

    A Pattern Repeating Nationwide

    Just one week before the Wichita discovery, a separate skimming operation in the Kansas City metro area affected hundreds of recipients, draining tens of thousands of dollars in SNAP and TANF benefits.

    Those numbers mirror reports from other states, where EBT skimming rings have targeted benefit recipients because the payoff is immediate and the consequences for victims are permanent.

    As long as EBT cards rely on magnetic stripes and PINs, the system remains vulnerable.

    Why This Scam Hits Harder Than Credit Card Fraud

    When a credit card is skimmed, banks usually reverse fraudulent charges. When SNAP benefits are skimmed, families lose access to food.

    There is no automatic refund. There is no emergency replacement. And there is no national standard ensuring victims are made whole.

    The result is a quiet crisis: households arriving at grocery stores with approved benefits, only to be told their balance is zero.

    What SNAP Recipients Can Do Right Now

    State agencies are urging recipients nationwide to take preventive steps:

    • Monitor balances frequently using official EBT apps or portals
    • Block out-of-state and online transactions when possible
    • Freeze EBT cards when not in use
    • Change PINs regularly
    • Report suspicious activity immediately

    These steps won’t stop skimming altogether, but they may limit how much is stolen before it’s detected.

    Final Thoughts

    This isn’t just about criminals attaching devices to card readers. It’s about a national benefits system that places the risk of fraud almost entirely on the people least able to bear it.

    Until stronger protections or restored federal replacement funding are in place, SNAP skimming will remain one of the most damaging and least visible scams in the country.

    And for the families affected, the loss isn’t theoretical.

    It’s dinner.

    Further Reading

     
  • Geebo 9:00 am on January 13, 2026 Permalink | Reply
    Tags: , , , Scams,   

    Inside the Fake “Apple iCloud Investigator” Phone Scam 

    By Greg Collier

    A new phone scam is circulating that relies on shock, shame, and fake authority, and it’s designed to make people panic before they can think clearly.

    The call usually starts with someone claiming to be from Apple. They tell you that illegal and explicit material involving children has been found in your iCloud account. The accusation is deliberately extreme, meant to overwhelm you emotionally and put you on the defensive immediately.

    It’s a lie. And it’s a calculated one.

    What’s going on

    The caller insists that hackers placed illegal material into your iCloud storage without your knowledge. You’re told you’re not necessarily guilty, but you are in serious danger unless the issue is dealt with right now.

    That’s when the scammer positions themselves as your only way out.

    How the scam works

    Once fear takes hold, the caller offers a solution: they say they can remotely access your computer to locate and remove the illegal files. The service, they explain, will cost you several thousand dollars.

    Payment is typically demanded through Amazon gift cards. That alone should end the conversation. Gift cards are a preferred payment method for scammers because they’re difficult to trace and nearly impossible to recover.

    If you give them remote access, they aren’t fixing anything. Instead, they may install malware, steal personal information, or set you up for identity theft and future fraud.

    The fake authority angle

    To sound legitimate, callers often claim they work for Apple’s “Special Investigations Unit.”

    That unit does not exist.

    Even if your caller ID displays Apple’s name, don’t be fooled. Phone numbers can be spoofed to look authentic. A familiar name on your screen does not mean the call is real.

    Just as important: tech companies do not call people to accuse them of crimes or to demand money to “resolve” investigations. And law enforcement does not warn people by phone before taking action. If authorities believed illegal material was on your devices, they would show up in person with a warrant, not a payment request.

    Red Flags

    This scam checks multiple warning boxes at once:

    • An unsolicited call accusing you of a serious crime
    • Claims of secret or special investigative departments
    • Requests for remote access to your computer
    • Demands for payment via gift cards
    • Urgent pressure to act before you can verify anything

    Any one of these is suspicious. Together, they’re decisive.

    If You’ve Been Targeted

    Never give remote access to your computer to someone who contacts you unexpectedly. Legitimate tech support only happens when you initiate contact through official channels.

    If you receive a call like this, hang up immediately. Do not argue, explain, or try to prove your innocence. Then report the call to consumer protection agencies or your state attorney general.

    Final Thoughts

    This scam succeeds by weaponizing fear and stigma. The accusation is meant to silence you, rush you, and keep you from seeking outside confirmation.

    Remember: there is no “iCloud investigator,” no surprise phone call from Apple about crimes, and no legitimate situation that requires payment in gift cards.

    When a call begins with panic and ends with a demand for money, the conclusion is simple: it’s a scam.

    Further Reading

     
  • Geebo 9:00 am on January 12, 2026 Permalink | Reply
    Tags: , , , , Scams,   

    Tax Season 2026 Is Here, and So Are the Scammers 

    Tax Season 2026 Is Here, and So Are the Scammers

    By Greg Collier

    Tax season isn’t just busy for the IRS. It’s prime time for fraud.

    With the IRS set to begin accepting 2025 tax returns on January 26, 2026, and the filing deadline falling on April 15, scammers are already moving. Every year, thousands of taxpayers lose money and sometimes their identities to tax-related fraud that hits while people are distracted, rushed, or worried about penalties.

    The Better Business Bureau has issued warnings about what to watch for during the 2026 filing season.

    What’s Going On

    Tax scams aren’t accidental or sloppy. They’re deliberate and increasingly sophisticated.

    Scammers commonly use:

    • Stolen Social Security numbers
    • Fake tax preparers or “tax help” ads
    • Phony IRS emails, texts, and letters
    • Urgent claims that there’s a problem with your return or refund

    Once someone has your personal information, they can file a tax return in your name and collect the refund before you ever submit yours.

    The IRS PIN: An Extra Layer of Protection

    One of the strongest tools available to taxpayers is the IRS Identity Protection PIN, often called an IP PIN.

    This PIN:

    • Is six digits
    • Is known only to you and the IRS
    • Helps prevent someone else from filing a return using your Social Security number or taxpayer ID

    Once you enroll, you cannot opt out, and the PIN must be provided every year when you file your federal tax return.

    That requirement exists for a reason. Identity thieves are excellent at collecting personal data, and once they have it, they can commit tax fraud without the victim realizing it until much later.

    A Real-World Warning

    The BBB reports receiving calls from victims whose taxes were filed fraudulently even when they had not worked or filed taxes themselves. In these cases, scammers used stolen identities to submit false returns, leaving victims to untangle the mess afterward.

    This kind of fraud is precisely what the IP PIN is designed to stop.

    Red Flags

    The Internal Revenue Service does not initiate contact with taxpayers by:

    • Email
    • Text message
    • Social media

    Red flags that something isn’t legitimate include:

    • Poor grammar or awkward wording
    • Messages designed to scare or rush you
    • Requests for sensitive personal information
    • Links claiming there’s an urgent issue with your account or refund

    If you receive an unexpected message claiming to be from the IRS, assume it’s a scam until proven otherwise.

    Filing Safely in 2026

    When it’s time to file your taxes:

    • Work only with reputable, well-reviewed tax professionals
    • Be wary of anyone promising unusually large or “guaranteed” refunds
    • Avoid preparers who pressure you to act immediately or keep things secret
    • Take time to research before handing over personal documents

    Bottom Line

    Tax scams thrive on stress and deadlines. The closer it gets to April 15, the more aggressive these schemes become.

    Using an IRS Identity Protection PIN, staying alert for impersonation attempts, and choosing trustworthy tax help can dramatically reduce your risk. Filing your taxes is stressful enough. Don’t let scammers get there first.

    Further Reading

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel