In a growing wave of fraudulent activity, U.S. Customs and Border Protection (CBP) is alerting the public to an alarming rise in scam phone calls targeting individuals across the country. These sophisticated scams exploit fear, aiming to deceive people into sharing sensitive personal and financial information.
The scam typically unfolds with a chilling claim. CBP has allegedly intercepted a shipment of drugs linked to the victim’s name and address. The caller, posing as a CBP officer, insists that immediate cooperation is essential to resolve the situation. The pressure escalates as the scammer threatens police intervention if the victim refuses to comply.
Adding to the scam’s credibility, the caller often provides details such as a real CBP employee’s name, fake case numbers, or badge identifiers. This information can be easily harvested from public sources. In some cases, automated messages warn about intercepted shipments and instruct recipients to press a number to speak with a supposed CBP agent. Once connected, the scammer’s primary goal is to extract sensitive details like banking information or Social Security numbers.
CBP has emphasized that these calls are fraudulent. The agency does not demand personal information or money over the phone, nor does it issue threats involving law enforcement or promises of financial rewards for cooperation. Legitimate communications from CBP will never involve requests for payment via gift cards, cryptocurrency, or wire transfers.
Fraudsters are becoming increasingly skilled at making their calls appear legitimate, even manipulating caller ID to display authentic-looking numbers. If there is any doubt about the legitimacy of a call, CBP advises contacting the agency directly through its official website. Additionally, victims or those targeted by these scams should report the incident to the Federal Trade Commission.
Protecting personal information requires skepticism of unsolicited calls, especially those that demand immediate action under the guise of authority. Always verify before you trust, and report any suspicious activity to help combat this pervasive threat.
As the holiday travel season approaches, millions of people are preparing for flights to visit loved ones or enjoy a vacation. Unfortunately, scammers are also gearing up to take advantage of the increased demand for TSA PreCheck enrollments and renewals. These fraudulent schemes are designed to steal your money and personal information by mimicking official government websites. Here’s what you need to know to protect yourself during this busy time.
TSA PreCheck is a trusted traveler program designed to streamline security screening for low-risk passengers at U.S. airports. Enrolling in the program allows you to enjoy a faster, more convenient airport experience. With TSA PreCheck, you can pass through security without removing your shoes, belts, or light jackets, and your electronics and liquids can stay in your carry-on bag.
The program is available at more than 200 airports and works with over 85 participating airlines. Enrollment involves a straightforward application process, including an online form, an in-person appointment for fingerprinting and identity verification, and a fee. Once approved, your PreCheck status is valid for five years.
Scammers create fake TSA PreCheck sites that look alarmingly similar to the real thing. These fraudulent pages often appear in emails or online ads, urging users to enroll or renew their TSA PreCheck membership. They may even claim to simplify the process for a fee. However, these sites are nothing more than elaborate traps to steal your money and sensitive information.
The scam often starts with an email or ad directing you to a website that looks like the official TSA PreCheck site. The key difference is that the URL is slightly off, often a cleverly disguised misspelling or a domain ending that isn’t ‘.gov’. Once on the site, users are prompted to pay for enrollment or renewal. But instead of providing a legitimate service, the scammers pocket your payment and potentially misuse your personal data.
The TSA emphasizes that the only official place to begin your PreCheck enrollment is on their website, which ends in ‘.gov’. Any other domain, no matter how convincing it appears, is not legitimate. Additionally, the initial payment for TSA PreCheck is made in person, not online, during your in-person appointment at an enrollment center.
Be wary of third-party ‘facilitators’ offering to handle the enrollment process for you. Not only do they charge exorbitant fees, but they also compromise your personal data, leaving it vulnerable to misuse.
Before entering any personal or payment information online, double-check the website’s URL. If you’re unsure, reach out directly to the TSA or consult trusted resources like the Better Business Bureau’s Scam Tracker. By taking a moment to verify, you can avoid falling into the trap of these sophisticated scams.
With holiday travel just around the corner, now is the time to ensure all your travel documents, including TSA PreCheck, are in order. Double-check every website, and only trust official government sources. A little caution now can save you from a major headache later, helping you focus on what really matters this season, enjoying time with family and friends.
In a quiet Massachusetts town, a Vietnam Veteran found himself facing an unexpected and devastating challenge. What began as an ordinary day of browsing the internet spiraled into a financial catastrophe. A seemingly routine virus notification appeared on his computer screen, warning of urgent threats to his device. Trusting its legitimacy, he called the hotline provided, unknowingly stepping into a carefully crafted trap.
On the other end of the line was someone posing as a representative from Microsoft. What followed was an elaborate scheme, involving a transfer to a supposed US Treasury Department agent who warned him of a fabricated money laundering investigation tied to his name. The veteran was coerced into withdrawing large sums of cash, believing it was necessary to protect himself and assist in the investigation.
This tragic series of events left him not only without his savings but also burdened with debt, as the perpetrators convinced him to take out a substantial home equity loan. Throughout the ordeal, he was sworn to secrecy, further isolating him from those who could have offered guidance or intervention.
Despite the financial devastation, the local community has stepped in to support him. Neighbors and friends, moved by his plight, organized a fundraising effort to help him regain some of what was lost. Although the funds raised cannot fully replace his savings, they serve as a powerful reminder of the compassion and solidarity that can emerge in times of crisis.
The investigation has led to the indictment of one individual connected to the scheme, but the majority of the stolen funds remain unrecovered. While authorities continue their pursuit of justice, the veteran’s focus now shifts to rebuilding his financial stability and finding solace in the support of those around him.
This incident highlights the pervasive threat of cyber fraud and the sophisticated tactics used by scammers. Unsolicited pop-ups or urgent messages should always be treated with caution. Verifying claims through official channels and seeking advice from trusted individuals can act as critical safeguards.
The veteran’s experience serves as a poignant reminder of the vulnerabilities that exist in an increasingly connected world. Yet, it also showcases the resilience of the human spirit and the strength found in community support during even the darkest of times.
A recent ruling underscores the complex legal landscape surrounding tech giants, gift cards, and consumer fraud. In a case reported by Ars Technica, a federal judge granted Google’s motion to dismiss a proposed class-action suit brought by Judy May, a consumer who fell victim to a prevalent form of fraud involving Google Play gift cards. Despite losing $1,000 to scammers in 2021, May’s claims were largely dismissed as the court found Google had no duty to refund her.
The details of the case highlight how scammers manipulate consumers, often using gift cards as a primary ‘currency’. Victims like May are typically tricked into purchasing these cards with promises of a prize or urgent financial need. In May’s case, scammers convinced her to purchase Google Play gift cards as an upfront cost to unlock a government grant. Upon realizing she’d been defrauded, May reached out to Google, only to be informed that refunds were not possible under Google’s terms of service, terms that she felt were ‘unconscionable’.
May’s complaint argued that Google is aware of the use of its gift cards in scams, pointing to data showing Google Play gift cards comprised a significant portion of reported scams from 2018 to 2021, with the Federal Trade Commission noting losses of over $17 million. She suggested that Google could take steps to warn customers, such as placing warnings on gift cards, but no such warning was provided.
In court, Google contended that it did not encourage or induce May to make the purchase; rather, the scammers did. The judge agreed, ruling that Google bore no liability since the economic harm May experienced stemmed directly from the scammers, not from any action by Google itself. May argued that Google indirectly profits from these scams by taking a 15 to 30 percent commission on gift card purchases within the Play Store, but this claim did not sway the court.
The judge noted that May had not used the gift cards “in their designed way” and that Google had no obligation to issue a refund, as May’s funds weren’t considered “stolen” when she made the purchase.
May also claimed that Google’s technology could potentially track and prevent transactions associated with scams. However, the court found that May failed to show any duty on Google’s part to investigate or prevent such activity, particularly in her case.
For victims like May, the ruling is a reminder of the limitations in pursuing refunds for gift card scams through legal channels. In cases where these cards are used fraudulently, it’s not uncommon for large companies to point to refund policies similar to those upheld by major retailers. Google, in this case, referenced policies from Target and Walmart, which also do not issue refunds in similar situations.
Often, gift card scam victims are left without recourse when companies decline to reimburse fraudulent transactions. While this case reinforces Google’s lack of liability, it also spotlights the vulnerability of consumers to scams exploiting loopholes in refund policies.
Consumers should be aware that gift cards are intended for personal use within the brand’s ecosystem, not as a payment method for debts, fines, or grants. Until systemic changes are made, consumers must stay vigilant, as tech companies may not be required to intervene or compensate for losses in these situations.
Imagine the terror of receiving a phone call with a familiar voice in distress, only to realize it was a cruel, high-tech scam. This harrowing experience recently befell a mother in Grand Rapids, Michigan, who nearly lost $50,000 over a weekend due to a sophisticated AI-driven scam. This scam, called ‘voice cloning’ mimicked the voice of her daughter so convincingly that it bypassed her natural skepticism and sent her scrambling to respond to what seemed like an emergency.
It started with a phone call from an unknown number, coming from a town her daughter often frequented. With her daughter’s faint, panicked voice on the other end, she felt an instant urgency and fear that something was gravely wrong. Then, as she listened, the tone shifted; a stranger seized control of the call, asserting himself as a captor and demanding an immediate ransom. Her daughter’s supposed voice—distorted, mumbled, and terrified—amplified the mother’s fears. Desperation began to cloud her judgment as she debated how to produce such a vast sum on short notice.
In her fear and confusion, she was prepared to do whatever it took to ensure her daughter’s safety. She was ready to withdraw cash, find neighbors who might accompany her, and meet the caller, who had directed her to a local hardware store for the exchange. But her instincts were seconded by her husband, who, while she negotiated, placed a call to the local police department. They advised him to contact their daughter directly, which they did, only to find she was safe and sound, unaware of the horrifying call her mother had just endured.
This unsettling experience highlights a chilling reality of today’s world: the power of artificial intelligence to manipulate emotions, creating distressing scenarios with fabricated voices. These AI scams work by exploiting easily accessible samples of people’s voices, often found in social media videos or recordings. Voice cloning technology, once a futuristic concept, is now accessible and advanced enough to replicate a person’s voice with unsettling accuracy from just a brief clip.
The Better Business Bureau advises those targeted by similar scams to resist the urge to act immediately. The shock of hearing a loved one’s voice in peril can push us to respond without question, but taking a pause, verifying the caller’s claims, and contacting the loved one directly are critical steps to prevent falling victim.
Protecting yourself from AI-driven voice cloning scams requires both awareness and a proactive approach. Start by being mindful of what you share online, especially voice recordings, as even brief audio clips on social media can provide the material needed for cloning. Reducing the number of public posts containing your voice limits potential exposure, making it harder for scammers to replicate.
Establishing a safe word with family members is also an effective precaution. A unique, shared phrase can act as a verification tool in emergency calls. If you ever receive a call claiming a loved one is in distress, use this word to confirm their identity. By doing so, you create a reliable check against scams, especially when emotions run high.
It’s essential to take a moment to verify information before reacting. Scammers count on people’s tendency to act on instinct, especially when fear and urgency are involved. If you receive an alarming call, try to reach the person directly using a familiar number. Verifying information before sending money or following instructions can prevent falling victim to such fraud.
In the end, a calm, measured approach, grounded in verification and pre-established safety measures, can make all the difference in staying protected against AI-driven threats.
In the wake of Hurricane Helene, a devastating blow has left Rod Ashby grappling not only with the tragic disappearance of his wife, Kim, but also with an unexpected financial nightmare. As he continues his desperate search for Kim in the rugged mountains of western North Carolina, a scam has stripped him of nearly $40,000, money that was meant to buy him the necessary vehicle to aid in his search.
Rod and Kim, who lived in Sanford, North Carolina, were at their mountain cabin near Banner Elk when the hurricane struck. When floodwaters overtook their home, the couple clung to each other, fighting against the relentless force of the water. Tragically, their grip was broken as they struck a tree, and Rod, though able to make it to safety, hasn’t seen Kim since. More than a month has passed, and Rod’s hope for closure remains as fierce as ever. In these weeks, with family by his side, Rod has returned to the mountains, joined by search crews in his unwavering pursuit of his missing wife.
However, the search has not been without obstacles. The hurricane destroyed Rod’s truck, leaving him without a reliable means to navigate the steep, muddy mountain roads. Staying with family in Pittsboro, he resolved to find a replacement, a four-wheel drive vehicle capable of tackling the treacherous terrain where he believes he may still find Kim. In his search, he found what he thought was an ideal solution, a 2020 Ford F-350 listed online at $38,900, advertised by a Colorado-based business specializing in repossessed vehicles. Although Rod’s daughter was initially skeptical, the transaction seemed legitimate. The phone calls, emails, and even a formal bill of sale all appeared authentic. But soon after wiring the money, they began to suspect the deal was not what it seemed. The truck remained listed on the website, and their follow-up inquiries began to go unanswered.
The heartbreaking reality soon became clear: the truck did not exist, and the business was nothing more than an elaborate imitation of a legitimate dealership. Rod and his family contacted the banks involved and filed a fraud report, only to face an agonizing wait, potentially 90 days, to see if they might recover any of the lost funds. This setback, another blow in an already unimaginable situation, struck a deep nerve. For Rod, time is crucial; each day that passes is another without the closure he seeks, another day he cannot be out on the mountain, hoping to bring Kim home.
The legitimate business that the scammer had copied reported that they had been flooded with similar cases, with people across the country falling victim to the same deceptive tactics. The scammer’s scheme of underpricing vehicles preyed on those seeking a good deal, especially people in urgent situations like Rod. The business owner, aware of the far-reaching effects of these scams, is now working with law enforcement to prevent further victims. The Ashby family, however, is left grappling with the emotional and financial consequences of this betrayal.
Rod’s story serves as a sobering reminder of the risks of online transactions, especially when urgency and emotional stakes are high. Scammers prey on those who might let their guard down due to stress, grief, or pressing need, and, as Rod’s experience highlights, they can convincingly replicate legitimate businesses to the unsuspecting eye. While law enforcement investigates, the Ashby family and their supporters are forced to wait, their lives altered by a combination of natural disaster and human deceit.
Avoiding online scams, especially when buying high-value items like vehicles, requires vigilance and careful verification. Here are some essential steps to safeguard against falling victim to such schemes.
First, thoroughly research the seller. Start by searching for the dealership or business name online. Legitimate businesses often have an established presence with a verifiable website, social media profiles, and customer reviews. Be wary of any dealership that lacks a history or only has a recently created website or social media page, as scammers frequently create ‘shell’ sites to impersonate legitimate businesses.
Verify contact information on official channels. Instead of relying on phone numbers or emails provided on a specific site, cross-check them with official listings or other trusted sources. A simple call to the real business can often confirm whether they are associated with the listing. If possible, visit the dealership in person or ask a trusted contact nearby to confirm the vehicle’s availability and condition.
Avoid paying via wire transfer whenever possible. Wire transfers offer little protection for buyers, as once funds are sent, they are challenging to recover. Reputable dealerships typically accept other, safer forms of payment that offer some level of recourse, such as credit cards or certified checks. If a seller insists on a wire transfer, especially to a personal account or a different name than the business, this is a major red flag.
Use a vehicle history report service to verify the vehicle’s existence and ownership records. Services like Carfax or AutoCheck allow you to input the vehicle identification number (VIN) and receive detailed information about the car’s history, including its ownership, accident history, and maintenance records. Scammers may avoid providing a VIN, or give a fake one, so this step can help confirm a vehicle’s legitimacy.
Carefully review documents and be skeptical of underpriced deals. Deals that appear too good to be true often are, as scammers tend to price vehicles attractively to bypass buyers’ usual caution. Examine all documentation for inconsistencies, such as misspellings, unusual formatting, or unfamiliar terms in contracts or sales agreements.
If possible, work with your bank to escrow funds or use a secure payment platform that can hold funds in trust until the vehicle is confirmed. Some banks and online services offer escrow accounts that protect funds until both parties are satisfied with the transaction, ensuring a level of security in case something goes awry.
Lastly, don’t hesitate to seek advice from others, especially friends or family with experience in buying vehicles online. A second set of eyes can often spot red flags that might be overlooked. And if a purchase ever feels off, listen to that instinct. Taking time to verify details can be the best defense against the heartache and financial loss of falling victim to a scam.
By taking these precautions, buyers can greatly reduce the risk of being scammed, even in high-stakes, emotionally charged situations like Rod Ashby’s. Scammers thrive on desperation and urgency, so maintaining a level of caution, even in challenging times, can protect you from becoming a victim.
Connecting to free Wi-Fi has become second nature for many of us. Airports, coffee shops, and even auto repair shops offer Wi-Fi as a convenience. But beneath the convenience, cyber experts are issuing warnings. These open networks may be prime hunting grounds for hackers. In fact, the State of Florida has, once again, recently spotlighted a particularly insidious type of cyber scam known as the ‘evil twin’ attack, bringing to light just how easily criminals can turn public Wi-Fi networks against users.
The allure of free Wi-Fi is clear, but as more places provide it, cybercriminals are getting creative in exploiting it. Hackers can create evil twin networks, which are Wi-Fi connections that look like familiar and trusted networks but are impostors set up to deceive unsuspecting users. Hackers will make their phony network names to match those of common public spaces. As soon as users connect to one of these evil twin networks, they open the door for attackers to access their devices and data.
Many people’s smartphones and laptops remember networks they’ve previously connected to and will automatically reconnect to them. When a device sees a network with a familiar name, it connects without asking the user, assuming it’s safe. Hackers exploit this feature, setting up networks with identical names to those commonly found in airports or popular venues, tricking devices into connecting automatically. Once connected, the hacker has a direct line to the user’s device, allowing them to redirect traffic to fraudulent sites, install spyware, or even steal passwords and other personal information.
With incidents of this scam occurring globally, law enforcement agencies and cybersecurity experts are urging the public to exercise extreme caution when connecting to public Wi-Fi networks. For those who need internet access on the go, using a personal mobile hotspot or a trusted VPN connection is a safer alternative. As tempting as it may be to tap into that free Wi-Fi, it’s important to weigh the risks. Accessing a network without verifying its authenticity could lead to significant compromises in privacy and data security.
Leave a Reply