Tagged: CIA Toggle Comment Threads | Keyboard Shortcuts

  • Geebo 9:06 am on January 25, 2024 Permalink | Reply
    Tags: CIA, , ,   

    The romance scammer who posed as a CIA agent 

    By Greg Collier

    We’ve consistently advised our readers that once you’ve been targeted by a scammer, the likelihood of further exploitation increases significantly. Take, for instance, falling victim to a sweepstakes scam – the scammer often concocts additional reasons for the victim to continue paying. Furthermore, scammers trade the information of their victims among themselves, leading to potential multiple scams on the same individual. In some instances, the same scammer may return with an entirely new scheme, using any means necessary to manipulate the victim’s trust, and they are doggedly persistent.

    A few years ago, a Massachusetts woman found herself ensnared in the web of a romance scam. Believing she was in a genuine relationship with a man purportedly working on an overseas oil pipeline, she unwittingly sent a staggering $150,000 over time to the scammer. Although she eventually became aware of the deception, the ordeal did not conclude there.

    After severing communication with the romance scammer, the victim found herself confronted with a new and alarming tactic. Months later, she began receiving emails allegedly originating from the CIA. These messages took an ominous turn, threatening her with arrest and asserting that the individual she had sent money to in the romance scam was now being labeled as a terrorist. The victim was explicitly warned against discussing the matter with anyone, including family, friends, or attorneys, under the ominous threat of immediate arrest.

    When pressed to identify himself, the scammer resorted to sending the victim a picture of a novelty CIA badge and ID, easily obtainable online. The deceptive tactics persisted until the victim asserted her boundaries, insisting that any meeting with the purported agent would only take place at her local police station. It was only at this point that the relentless harassment from the scammer finally ceased.

    Indeed, falling victim to a scam and suffering significant financial losses is distressing on its own. However, the added layer of enduring verbal abuse and facing threats of arrest exacerbates the trauma.

    In addition to the initial romance scam, the scammer tried to ensnare the victim in another layer of deception known as the police impersonation scam. Scammers frequently adopt the guise of law enforcement officers or agents, utilizing intimidation tactics to manipulate victims into complying with their demands. A common element of this scheme involves warning victims that they are prohibited from discussing the matter with anyone, threatening arrest for non-compliance. The underlying objective is to isolate the victim, preventing them from seeking assistance or confiding in others who might recognize the scam. This calculated tactic aims to maintain control and prolong the deception without external interference.

    In safeguarding against the unsettling threat of police impersonation scams, vigilance and skepticism are paramount. Authentic law enforcement agencies do not make unsolicited calls demanding immediate action or payments. Verify the legitimacy of any communication by independently contacting the supposed agency using official contact information. Never share personal or financial information over the phone unless certain of the caller’s authenticity. If faced with coercive demands and threats of arrest, remain calm and seek advice from trusted individuals or law enforcement directly. By staying informed, questioning unexpected communications, and maintaining open lines of communication with trusted contacts, individuals can fortify themselves against the manipulative tactics employed by police impersonators and other scammers.

     
  • Geebo 11:47 am on March 8, 2017 Permalink | Reply
    Tags: CIA, Vault 7, wikileaks   

    Wikileaks shares massive CIA hacking tricks. Does it affect you? 

    WIkileaks shares massive CIA hacking tricks. Does it affect you?

    Yesterday, whistle blowing website Wikileaks released a treasure trove of supposedly leaked information from the CIA dubbed Vault 7. Within the information are alleged plans the CIA uses to hack into virtually any internet connected device and use it as a monitoring device. Purportedly, the CIA can use malware to circumvent any operating system from Windows to MacOS to Linux and mobile OSes Android and iOS. iOs seems to be a favorite target of the CIA due to the number of high-ranking and powerful people who use iPhones.

    The good news is, if any good news can be taken from this, is that the CIA’s actions do not appear to be targeting every device held by everyday citizens. Instead, the CIA appears to be using their malware to target specific individuals rather than entire swaths of the population. So the average American citizen probably has nothing to worry about. However, with this supposed CIA code now in the open it potentially could be used by black hat hackers to compromise just about any device they may see fit.

    That’s not to say that there isn’t any protection against this malware. Usual defense tactics can go a long way in keeping you protected such as keeping your devices operating system up to date and patched, and not clicking on unknown attachments or downloading shady programs and apps.

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel