Tagged: Scams Toggle Comment Threads | Keyboard Shortcuts

  • Geebo 9:00 am on December 19, 2025 Permalink | Reply
    Tags: , , , , Scams,   

    How Scammers Are Using AI “Proof of Life” to Extort Families 

    AI Voice Fuels Virtual Kidnap Plot

    By Greg Collier

    This is not the old “your loved one has been kidnapped” scam.

    Federal authorities are warning about a new evolution of virtual kidnapping, one that uses altered photos, manipulated videos, and AI-assisted media pulled straight from social media to create convincing “proof of life” and trigger immediate panic.

    According to the FBI, criminals are now fabricating images and videos that make it appear as though a family member or friend has been abducted, injured, or being held hostage—complete with urgent ransom demands and threats of violence.

    And unlike earlier versions of the scam, this one doesn’t rely on imagination alone. It relies on visual evidence.

    What’s New About This Scam

    Traditional virtual kidnapping scams depended on fear, confusion, and vague threats. The victim was pressured to act quickly before thinking things through.

    This new version adds something far more dangerous: manufactured realism.

    Scammers now:

    • Pull photos and videos from social media profiles
    • Alter them using AI tools or digital manipulation
    • Send them as “proof of life” during ransom demands
    • Use timed or disappearing messages to limit scrutiny

    The result is a moment where logic collapses under shock. Victims aren’t just told their loved one is in danger; they’re shown what looks like evidence.

    How the Scam Typically Unfolds

    The FBI says the pattern is disturbingly consistent:

    A text message arrives claiming a loved one has been kidnapped. The message demands immediate payment for their release. Violence is threatened if the victim delays or contacts authorities.

    Then comes the hook.

    The scammer sends a photo or video that appears to show the kidnapped person. In many cases, it looks real enough to override rational doubt, at least at first glance.

    Only later, if the victim has time to examine it closely, do the cracks appear.

    The Red Flags Inside the “Proof”

    According to federal investigators, the fabricated media often contains subtle but important errors, including:

    • Missing or incorrect tattoos
    • Absent scars or identifying marks
    • Incorrect body proportions
    • Inconsistencies with known photos
    • Visual details that don’t quite line up

    Scammers frequently counter this by using timed messages, giving victims only seconds to view the image before it disappears—just long enough to scare, not long enough to analyze.

    Why This Scam Works So Well

    This scam is effective because it exploits three things at once:

    1. Public social media footprints: Criminals no longer need insider access. Public photos are enough.
    2. AI-assisted manipulation: Creating fake but believable images is faster and cheaper than ever.
    3. Urgency engineering: Fear plus time pressure shuts down critical thinking.

    Once panic sets in, scammers push victims toward immediate payment—often before they attempt the most important step of all.

    Verification.

    How to Protect Yourself and Your Family

    The FBI recommends several concrete steps to reduce risk:

    • Be cautious about what you post publicly, especially travel details and personal identifiers
    • Avoid sharing personal information with strangers while traveling
    • Establish a family code word that only trusted loved ones would know
    • Be wary of urgent threats designed to rush your decision-making
    • Screenshot or record any images or videos sent as “proof”
    • Always attempt to directly contact the loved one before paying any ransom

    That last step is critical. Many victims discover the truth within minutes—if they pause long enough to check.

    If You’re Targeted

    If you believe you’ve encountered a virtual kidnapping scam, the FBI urges victims to report it to the Internet Crime Complaint Center (IC3). Preserve all messages, images, phone numbers, and payment requests.

    Even if no money was sent, reporting helps investigators track patterns and warn others.

    Final Thoughts

    This isn’t just another scam; it’s a technological escalation.

    Virtual kidnapping is no longer purely psychological. It’s visual. It’s manipulated. And it’s designed to exploit the trust we place in images and video.

    The safest response is not panic, but pause.

    Because in this new version of the scam, what looks real may be anything but.

    Further Reading

     
  • Geebo 9:00 am on December 18, 2025 Permalink | Reply
    Tags: , free wifi, Scams, ,   

    Holiday Travel Warning: The “Evil Twin” Wi-Fi Scam Explained 

    Holiday Travel Warning: The “Evil Twin” Wi-Fi Scam Explained

    By Greg Collier

    As millions of people travel for the holidays, airports, hotels, coffee shops, and convention centers are packed with travelers looking for one thing the moment they sit down: free Wi-Fi.

    That demand creates the perfect opening for a lesser-known but highly effective cyber scam known as the “evil twin” Wi-Fi attack—and travelers are among the most common victims.

    This scam doesn’t rely on fake prizes, urgent phone calls, or phishing emails. Instead, it quietly exploits trust, convenience, and public networks.

    What Is an “Evil Twin” Wi-Fi Network?

    An evil twin is a fake Wi-Fi network that looks legitimate but is actually controlled by a scammer.

    It’s called an “evil twin” because it is designed to closely mimic a real network you already trust.

    Examples include:

    • Airport_Free_WiFi
    • Hotel Guest Network
    • Starbucks_WiFi
    • ConventionCenter_Public

    To a traveler in a hurry, these names look normal, and that’s exactly the point.

    Once connected, the attacker can:

    • Monitor your internet traffic
    • Capture login credentials
    • Intercept emails or messages
    • Redirect you to fake login pages
    • Install malware in some cases

    You don’t need to click a suspicious link. Simply connecting can be enough.

    Why Travelers Are Prime Targets

    Holiday travelers are uniquely vulnerable to this scam for several reasons:

    • Constant movement between unfamiliar locations
    • High reliance on public Wi-Fi to avoid roaming charges
    • Urgency to check flights, reservations, rideshares, or work email
    • Distraction and fatigue, especially during delays

    Airports and hotels are particularly attractive to scammers because:

    • They host large volumes of short-term users
    • People expect multiple similarly named networks
    • Security announcements about Wi-Fi are rare or unclear

    How the Scam Typically Works

    1. A scammer sets up a portable Wi-Fi hotspot using a laptop or small device.
    2. They name it to closely resemble a legitimate network nearby.
    3. The fake network often has a stronger signal, making it appear first on your device.
    4. When you connect, one of two things happens:
      • You are silently monitored while browsing
      • You’re redirected to a fake “sign-in” page asking for email, social media, or even payment details

    In many cases, victims never realize anything went wrong until accounts are compromised later.

    What Information Can Be Stolen?

    Depending on the setup, an evil twin network can expose:

    • Email usernames and passwords
    • Social media logins
    • Online banking credentials
    • Corporate VPN access
    • Travel rewards accounts
    • Session cookies that allow account takeover without a password

    Even encrypted websites (HTTPS) don’t fully protect against every version of this attack, especially if users ignore browser warnings or log into insecure pages.

    Red Flags

    While evil twin networks are designed to look legitimate, warning signs may include:

    • Multiple Wi-Fi networks with nearly identical names
    • A login page that looks generic or unbranded
    • Requests for unnecessary personal information
    • A network that suddenly disconnects and reconnects repeatedly
    • Browser warnings about security certificates

    If anything feels off, disconnect immediately.

    How Travelers Can Protect Themselves

    A few simple precautions can dramatically reduce risk:

    • Avoid public Wi-Fi for sensitive activities like banking or work logins
    • Confirm the exact network name with airport signage or hotel staff
    • Turn off auto-connect for open Wi-Fi networks
    • Use a trusted VPN when connecting on the road
    • Enable two-factor authentication on important accounts
    • Forget networks after use so your device doesn’t reconnect automatically

    When in doubt, using your phone’s cellular hotspot is often safer than unknown public Wi-Fi.

    Final Thoughts

    The evil twin Wi-Fi scam highlights an uncomfortable reality. Not all scams announce themselves.

    Some of the most effective modern fraud relies on blending into everyday infrastructure, airports, hotels, cafés, and other public spaces we assume are safe.

    As travel increases during the holiday season, awareness becomes the most effective defense.

    If you wouldn’t hand your phone unlocked to a stranger in an airport, don’t hand over your internet traffic either.

    Free Wi-Fi is convenient, but when it comes to unknown networks, convenience can be costly.

    Staying connected shouldn’t mean staying exposed.

    Further Reading

     
  • Geebo 9:00 am on December 17, 2025 Permalink | Reply
    Tags: , , , Scams,   

    Scam Alert: Fake “Mega Millions Special Drawing” Impersonation 

    By Greg Collier

    Mega Millions officials are warning players about a new lottery scam in which criminals are impersonating the brand online and promoting a fake “special drawing.” Using the game’s familiar logo, colors, and language, these scams are designed to look legitimate while steering victims toward fraudulent websites, phone numbers, or direct messages.

    The warning underscores a broader pattern of lottery-related fraud in which well-known brands are used to create a false sense of authenticity and urgency.

    What’s Happening

    According to Mega Millions, scammers are circulating online content that claims to offer:

    • Entry into a special or exclusive Mega Millions drawing
    • Notification of a prize win despite the recipient never purchasing a ticket
    • Instructions to “verify” or “claim” winnings through links or phone calls

    The lead director of Mega Millions said these schemes rely on visual familiarity and persuasive language to appear credible. Despite their variations, they all share a common goal: obtaining money or personal information from unsuspecting consumers.

    How the Scam Typically Works

    These impersonation scams often follow a predictable structure:

    1. Use of official branding: Logos and graphics resembling Mega Millions materials are copied to appear authentic.
    2. Unsolicited prize claims or promotions: Targets are told they have won or been selected for a special drawing they did not enter.
    3. Requests for action: Victims are directed to click links, respond to messages, or call phone numbers to confirm details.
    4. Financial or data demands: The scam escalates with requests for fees, taxes, or sensitive personal and banking information.

    Once money or personal data is provided, it is typically unrecoverable.

    Red Flags

    Mega Millions advises consumers to be alert for the following red flags:

    • Claims that you won a lottery you never played
    • Social media posts advertising “special drawings” or surprise promotions
    • Requests to click unfamiliar links or call unknown numbers
    • Instructions to send money in order to collect winnings
    • Messages with poor grammar or spelling
    • Phone calls or texts from unfamiliar or unexpected area codes

    Quick Tip: Legitimate lotteries never require winners to pay to receive a prize.

    How to Protect Yourself

    To reduce the risk of falling victim to lottery scams, Mega Millions recommends:

    • Verifying promotions only through official lottery websites
    • Avoiding links, phone numbers, or messages from unsolicited contacts
    • Never sharing sensitive personal or financial information
    • Hanging up on and blocking suspected scammers

    Consumers who believe they have encountered a scam may contact the Federal Trade Commission at (877) 382-4357 or report the incident to local law enforcement.

    Final Thoughts

    If you did not purchase a ticket or enter a drawing, there is no legitimate prize to claim. Authentic lotteries do not operate through unsolicited messages, social media direct outreach, or upfront payment requests.

    Scams that misuse trusted brands rely on familiarity to lower skepticism. Staying cautious, verifying information through official sources, and refusing unsolicited requests are the most effective ways to protect yourself and others from lottery fraud.

    Further Reading

     
  • Geebo 9:00 am on December 16, 2025 Permalink | Reply
    Tags: , contactless payment, , ghost tapping, Scams   

    “Ghost Tapping” Scams: How Tap-to-Pay Can Turn Into Tap-to-Steal 

    By Greg Collier

    Tap-to-pay cards and mobile wallets are everywhere now. They’re fast, convenient, and generally secure.

    But scammers are finding ways to abuse that convenience, and the Better Business Bureau is now warning about a growing scam they call “ghost tapping.”

    This isn’t a hack. It’s a confidence trick that relies on distraction, social pressure, and people assuming tap-to-pay is always safe.

    What’s Going On

    According to the BBB, scammers are targeting people who use tap-to-pay cards or mobile wallets in crowded or distracting environments.

    The idea is simple. Scammers get you to tap quickly without clearly seeing the amount and walk away with far more money than you expected to pay.

    Several victims have already reported losing hundreds or even thousands of dollars.

    How the “Ghost Tapping” Scam Works

    Scammers typically rely on social engineering, not technology.

    Common tactics include:

    • Getting physically close in public places
    • Pretending to be a legitimate vendor
    • Running fake charity or fundraising pitches
    • Rushing the transaction so you don’t stop to think

    One reported case involved a man going door-to-door selling chocolate, claiming the money supported special-needs students. He told residents he could only accept tap-to-pay.

    Once the victim tapped their card or phone, the scammer allegedly charged large amounts without clearly showing the total.

    Reported losses included:

    • One woman’s mother losing $537.
    • Another victim lost $1,100.

    By the time the charge was noticed, the scammer was long gone.

    Why This Works

    Tap-to-pay trains people to move fast.

    Scammers exploit that by:

    • Creating urgency
    • Avoiding receipts
    • Keeping screens angled away
    • Using emotional hooks like charity appeals
    • Operating where people are distracted (festivals, markets, busy sidewalks)

    The technology isn’t broken, but human attention is.

    Red Flags

    The BBB says you should be suspicious if:

    • You’re asked to tap without seeing the total
    • No receipt is offered
    • The seller insists on tap-to-pay only
    • You receive small “test” charges on your account
    • You notice strange charges after being in crowded areas

    If someone won’t slow down or show you the amount clearly, that’s your cue to stop.

    How to Protect Yourself

    The BBB recommends several practical steps:

    • Use an RFID-blocking wallet or sleeve
    • Always confirm the payment amount before tapping
    • Set up transaction alerts with your bank
    • Regularly review your statements
    • Limit tap-to-pay use in high-risk or crowded areas

    Convenience should never override verification.

    What to Do If You’re a Victim

    If you think you’ve been hit by a ghost-tapping scam:

    1. Contact your bank or card issuer immediately
    2. Freeze or cancel the affected card
    3. Dispute the charges
    4. Report the scam to the BBB’s Scam Tracker

    The faster you act, the better your chances of limiting the damage.

    Final Thoughts

    Tap-to-pay is generally safe, but it’s not magic.

    Scammers don’t need to break encryption if they can rush you, distract you, or manipulate your trust.

    If you didn’t clearly see the amount, didn’t get a receipt, or felt pressured to tap quickly, assume the worst and check your account immediately.

    When it comes to tap-to-pay, slow beats stolen.

    Further Reading

     
  • Geebo 9:00 am on December 15, 2025 Permalink | Reply
    Tags: , Scams, , ,   

    When “Hollywood” Texts You Out of Nowhere 

    By Greg Collier

    You’re minding your business, and your phone buzzes.

    “Hey! I’m a talent scout. Are you available tomorrow for a virtual open call for Ted Lasso?”

    And for half a second, your brain does the whole wait… is this my moment?

    That’s the hook.

    According to an FTC consumer alert, this “virtual casting call” text is showing up as a new-ish phishing/sales-scam hybrid: unsolicited message → fake audition → pressure tactics → you paying money or handing over bank info.

    What’s going on

    The script is pretty consistent:

    1. You get an unexpected text from a supposed “talent scout” or casting person, often name-dropping big, recognizable titles (the FTC uses examples like “The Devil Wears Prada 2” and “Ted Lasso”).
    2. They ask if you’re available immediately (“tomorrow” is a favorite) for a “virtual open call” you never signed up for.
    3. If you respond, you wind up in a video “audition” that’s actually a sales pitch for junk: overpriced/bogus headshots, fake acting classes, “portfolio packages,” etc.
    4. The “plot twist” is always the same: you must pay something first or provide bank/payment information “to secure your spot.”

    Red flags

    If you see any of these, treat it like you just spotted the boom mic in frame:

    • Unsolicited contact (especially a text) offering a “casting call” you didn’t pursue.
    • Artificial urgency: “tomorrow,” “last chance,” “limited slots,” “secure your spot.”
    • Money before anything else: fees for headshots, “test shoots,” registration, background checks, “membership,” or “booking deposits.”
    • Bank info talk early: anything nudging you toward routing/account numbers, debit card details, or payment links before there’s a legitimate agreement.
    • A “virtual audition” that turns into sales pressure, not casting.

    How to protect yourself

    • Don’t respond. Not “stop,” not “who is this,” not anything. Engagement tells them your number is live.
    • Research the names. Search the “casting call” or the “casting director” name plus words like scam / review / complaint.
    • Never pay to get paid. Legitimate agencies get paid from the work—after the client pays—rather than charging you to “unlock” a job.
    • Report the text. Forward suspicious texts to 7726 (SPAM) or use your phone’s “report junk” feature, then delete it.
    • Report it to the FTC at ReportFraud.ftc.gov

    Quick Tip: If a legitimate opportunity shows up, it can survive verification. A real casting process won’t collapse because you asked for a real company email, a verifiable listing, or time to confirm details. A scam can’t survive daylight. That’s why it lives in surprise texts, urgency, and payment demands.

    Final Thoughts

    If “Hollywood” finds you via a random text and wants money or bank info before you can even “audition,” you’re not being discovered.

    You’re being harvested.

    Further Reading

     
  • Geebo 9:00 am on December 12, 2025 Permalink | Reply
    Tags: , , , , Scams   

    The Gift Card Drain Scam: How Thieves Empty Holiday Balances Before You Even Use Them 

    The Gift Card Drain Scam: How Thieves Empty Holiday Balances Before You Even Use Them

    By Greg Collier

    It’s December, which means two things are guaranteed:
    (1) America is collectively stress-shopping.
    (2) Scammers are licking their chops because nothing moves faster than a holiday gift card.

    This year’s big scam making the rounds? Gift card draining, a fraud so simple and so widespread that major retailers are quietly scrambling behind the scenes. And yes, your unopened card is at risk before you even wrap it.

    Below we’ll discuss how the scam works, what the red flags look like, and how to avoid being the unlucky person giving someone a $0 stocking stuffer.

    What’s Going On

    Criminals are draining the balances of gift cards before the legitimate buyer even activates them.

    They do it by physically tampering with cards on the rack, copying the numbers, resealing the packaging, and then waiting for you to pick up the sabotaged card and load money onto it. The moment it’s activated at the register, thieves pounce with automated scripts that vacuum the balance.

    Some variants don’t even require touching the card. Scammers buy bot-scraped card numbers on platforms like Telegram and continuously test combinations against retailer websites or compromise the retailer’s own app. No matter the method, the result is the same. You think you bought a gift. The scammer thinks you made a donation.

    How the Scam Works

    1. The Physical Swap

    • Scammers hit major retailers that stock racks of gift cards (Target, Walmart, Best Buy, grocery chains).
    • They peel open or slice the packaging, record the card number and security code, then reseal it with glue or shrink wrap.
    • You buy it, activate it, and within seconds the balance is transferred or spent online.

    2. The Barcode Replacement Trick

    • Thieves print fake barcodes and stick them over the real ones.
    • When you buy it, you think you’re loading money onto the card you picked, but the cash goes straight to the scammer’s card instead.

    3. Automated Draining Bots

    • After numbers are stolen, they’re fed into scripts that check activation status every few seconds.
    • As soon as your card goes live, the bot fires off a purchase at the linked retailer (usually digital goods so they can flip them instantly).

    4. Account Compromise Variant

    • If you store gift cards in a retailer account (looking at you, app-based Starbucks, Target, and Amazon users), scammers use credential-stuffing attacks to hijack your login.
    • Once inside, draining balances takes seconds, often before you even get a push notification.

    Why It Spikes During the Holidays

    • Volume: Retailers move tens of millions of gift cards in December. More cards = more camouflage.
    • Rushed shoppers: People grab cards quickly without inspecting the packaging.
    • Delayed discovery: The recipient typically doesn’t check the balance until Christmas, weeks after the theft, killing any chance of reimbursement.
    • Bots scale effortlessly: Fraud rings can test, drain, and flip thousands of cards in minutes.

    Scammers love anonymity, and nothing is more anonymous than a prepaid product with no buyer identity and no protection.

    Red Flags

    • Packaging looks resealed, wrinkled, or has extra glue.
    • Scratch-off panel already scratched or replaced.
    • Barcode sticker layered on top of another barcode.
    • Numbers visible through tampered cardboard.
    • The cashier has trouble scanning it.
    • The balance reads $0 the first time the recipient checks it.

    If your “gift” is suddenly worthless, that’s the scam hitting its final stage.

    Quick Tip: If you see a gift card on an open rack that already has its silver scratch-off panel revealed, put it down like it’s radioactive. That card isn’t a gift; it’s a trap set for the next unwitting shopper.

    How to Protect Yourself

    When Buying:

    • Choose cards stored behind the register, not from open racks.
    • Inspect packaging—anything loose, torn, or resealed is a no-go.
    • Pick cards with different designs behind them; scammers often tamper with batches at once.
    • Avoid cards with visible PINs or scratched panels.

    When Gifting:

    • Keep the receipt—it proves activation and helps if you need reimbursement.
    • Have the recipient check the balance immediately, not weeks later.
    • Register the card online if possible; some retailers let you lock or freeze the balance.

    When Storing Gift Cards in Retail Apps:

    • Use unique passwords and multi-factor authentication.
    • Watch for notifications about transfers or purchases you didn’t make.
    • Delete old saved cards or disable auto-reload if you don’t need it.

    Final Thoughts

    Gift card draining works because it weaponizes three things retailers can’t fix with a patch:

    1. Human holiday rush
    2. Physical access to merchandise
    3. Consumers who don’t check balances until it’s too late

    Scammers know this and exploit it at scale.

    So if you’re buying gift cards this season, slow down, inspect your cards, keep your receipts, and assume that anything in an open rack might already have been touched by someone with a glue bottle and a Telegram bot.

    Happy holidays, and may your gift cards remain yours.

    Further Reading

     
  • Geebo 9:00 am on December 11, 2025 Permalink | Reply
    Tags: , , , Scams   

    The $150 Couch That Never Existed: How Marketplace Scammers Are Targeting Holiday Shoppers 

    The $150 Couch That Never Existed: How Marketplace Scammers Are Targeting Holiday Shoppers

    By Greg Collier

    Every holiday season sparks a frenzy of buying and selling—and scammers know exactly how to slip into that chaos.

    A Cozy Deal You Wanted… and a Lie You Never Saw Coming:

    You’re scrolling through your favorite buy-and-sell app when you spot it: a clean, modern sectional at a steal of a price. It looks perfect. It’s available now. And the seller is friendly, helpful, and ready to deliver. What could go wrong?

    Plenty, as one Missouri buyer found out the hard way.

    She paid a deposit. The seller promised delivery. The messages were polite, reassuring, and downright helpful. Then the delivery time came… and went. And the “seller” vanished. The couch never existed.

    It’s a textbook example of a growing holiday scam, one built not on AI images or fake charities this time, but on trust, pressure, and buyers who want to believe a good deal really is a good deal.

    What’s Going On:

    • A desirable item appears on a marketplace app, priced low enough to feel urgent but not suspiciously cheap.
    • The seller offers delivery—solving the buyer’s transportation problem and seeming generous.
    • A deposit is requested. Usually $50–$150. “Just to hold it.” “Just to confirm delivery.”
    • The buyer pays. The communication stays friendly to keep doubts at bay.
    • The scheduled meetup arrives… and no one shows.
    • Reverse image searches reveal the photos came from somewhere else entirely.
    • The seller’s profile? Brand new. No history. No real identity.
    • By then, the money has already vanished.

    Scammers rely on the fact that many buyers, especially during the holidays, are eager to secure items quickly and will pay a small deposit without thinking twice.

    Why It Works:

    • Convenience manipulation: The offer to deliver makes the scam feel helpful, not predatory.
    • Trust-building: Scammers respond politely, promptly, and sympathetically. They mimic “good seller energy.”
    • Deposit psychology: A small upfront payment doesn’t feel risky, especially if the item seems in high demand.
    • Profile gaps go unnoticed: Many shoppers don’t check seller histories or reverse-image search photos.
    • Seasonal urgency: People want to finish holiday shopping fast, and scammers know it.

    This is how honest people get fooled, not because they’re careless, but because scammers are shockingly good at pretending to be human.

    Red Flags:

    • Profiles with little or no history: no posts, no reviews, no community presence.
    • Requests for deposits before meeting, regardless of the amount.
    • Offers to solve your problem (“I can deliver!”) that seem almost too convenient.
    • Photos that look polished or generic—reverse image search exposes them instantly.
    • Sellers who avoid video calls or refuse to show the item in real time.

    Quick Tip: If you haven’t physically seen the item, touched it, tested it, or met the seller, you shouldn’t send a cent. Deposits are a scammer’s favorite door into your wallet.

    What You Can Do:

    • Only exchange money in person once you have the item in front of you.
    • Examine seller profiles for history, reviews, and real activity.
    • Reverse-image search every suspiciously good photo—one click can save you hundreds.
    • Ask sellers to send a real-time photo or short video of the item.
    • If something feels off, trust your instincts and walk away.

    If You’ve Been Targeted:

    • Contact your bank or payment app immediately—some platforms can freeze or reverse transfers.
    • Report the fraud to your state’s Attorney General’s office, the Better Business Bureau, and the marketplace platform.
    • Warn your local community groups so the same scammer doesn’t hit someone else.
    • Keep screenshots, receipts, and timestamps—these help investigators trace patterns.

    Final Thoughts:

    Marketplace scams aren’t always glamorous or high-tech. Sometimes they’re built on nothing more than a fake couch, a friendly message, and a well-timed request for a deposit. But the damage feels just as real.

    In the rush of the holiday season, the smartest move you can make is slowing down. Real deals don’t demand deposits from strangers. Real sellers meet you in person. Real items exist in the real world, not just in stolen photos.

    Pause. Check. Verify. That’s how you keep the Grinches from stealing your money this year.

    Further Reading:

     
  • Geebo 9:00 am on December 10, 2025 Permalink | Reply
    Tags: , bomb threat, , Scams   

    Scam Alert: When a Scam Goes Sideways, Scammers Will Burn You Without a Second Thought 

    By Greg Collier

    This week in Reno, Nevada, a financial scam didn’t just steal money; it nearly turned an innocent victim into the center of a police bomb response.

    And that’s the part people need to understand. When scammers lose control of a situation, they don’t retreat; they escalate.

    They do not pause. They do not care. And they absolutely do not care what happens to you.

    What Happened

    On the afternoon of December 8, Reno police were dispatched to a Wells Fargo branch after reports that a person inside might be carrying a bomb. Officers secured the scene, evacuated customers and employees, and detained the individual involved.

    What police later discovered is far more disturbing than a routine false threat.

    The detained person wasn’t a suspect. They were a victim.

    According to authorities, the victim had been targeted by a scammer impersonating a Wells Fargo employee. The scammer instructed the victim to physically go to the bank and withdraw money, a classic move used to keep victims isolated and compliant.

    Crucially, the scammer stayed on the phone the entire time.

    When the victim tried to verify the caller’s identity by handing the phone to a real Wells Fargo employee, the scammer instantly pivoted.

    Instead of backing off, the scammer told the employee that the person standing in front of them was carrying a bomb.

    That single lie triggered a full emergency response.

    The Scam Escalation Playbook

    This incident perfectly illustrates how modern scams work and how quickly scammers adapt when threatened.

    Scammers rely on:

    • Constant contact (staying on the phone so victims can’t think clearly)
    • Authority impersonation (bank employees, law enforcement, government agencies)
    • Urgency and fear (withdraw money now, or else)

    But when verification threatens the scam, the mask comes off.

    The scammer didn’t argue. They didn’t hang up. They didn’t retreat.

    Instead, they weaponized the victim.

    A single sentence of “That person has a bomb” protected the scammer and pushed the victim directly into danger.

    The Part No One Likes to Talk About

    This could have gone much worse.

    Police responding to an active bomb threat have seconds to make decisions. Officers train for worst-case scenarios. In countless prior incidents nationwide, false reports, misunderstandings, or poor communication have ended with innocent people injured or killed.

    This scam didn’t just risk the victim’s finances. It risked their life.

    And that’s the point worth underlining:

    • Scammers do not care if you get arrested.
    • They do not care if police draw guns on you.
    • They do not care if you get hurt or killed.

    Once the scam is in jeopardy, your safety is irrelevant.

    Why “Just Go to the Bank” Isn’t Always Safe Advice

    We often tell scam victims: Hang up and contact the bank directly.

    That advice is still correct, but this case shows why scammers fight so hard to prevent it.

    By staying on the phone, scammers:

    • Control the narrative
    • Prevent independent verification
    • Can instantly escalate with threats if exposed

    The moment the victim sought confirmation, the scammer detonated the situation, figuratively speaking, to escape accountability.

    The Only Safe Move

    If you’re told:

    • to withdraw money immediately
    • to stay on the phone
    • not to hang up
    • that something terrible will happen if you don’t comply

    Hang up anyway.

    End the call. Put the phone down. Then contact the business using a number you find yourself, or involve local police before the scammer forces the situation.

    Final Thoughts

    This wasn’t just a financial scam or a bomb hoax. It was a real-world demonstration of how scammers turn victims into disposable shields.

    The victim in Reno was lucky. Next time, someone might not be.

    Further Reading

     
  • Geebo 9:00 am on December 9, 2025 Permalink | Reply
    Tags: , , , Scams,   

    The “Work-From-Home” Job That Turns You Into the Mule 

    The “Work-From-Home” Job That Turns You Into the Mule

    By Greg Collier

    Every economic slowdown creates opportunity, not just for job seekers but for scammers.

    This time, the bait isn’t a fake investment or a romance pitch. It’s a “work-from-home” job that promises easy money, fast onboarding, and a professional-sounding title while quietly turning you into the middleman of a retail theft operation.

    A Job That Sounds Legitimate and a Role You Never Signed Up For:

    When remote work feels scarce and bills are due, a job offer with no interview, no experience requirements, and minimal effort can feel like a lifeline. Titles like delivery operations specialist or quality control manager sound corporate enough to be real and flexible enough to be believable.

    Federal investigators say that’s exactly the point.

    According to the Federal Trade Commission, these offers are part of reshipping scams that use stolen credit cards and bank accounts to buy high-value merchandise, then pass the legal risk downstream to unsuspecting workers.

    What’s Going On:

    Recruiters reach out claiming to represent a logistics company or recognizable brand like Amazon or FedEx. Soon after, packages begin arriving at your home. They’re often expensive electronics or brand-new consumer goods.

    You’re instructed to open the boxes, discard the original packaging and receipts, and forward the merchandise to a new address, frequently an international one. The work is framed as inspection, quality control, or shipping support.

    Then payday comes. And goes.

    Communication slows, emails stop arriving, and the company disappears. Only later do many victims learn the items were purchased with stolen financial information, and that any personal details shared during “onboarding” may now be compromised as well.

    By then, the scammer is gone. The paper trail leads to you.

    Why It Works:

    Reshipping scams rely on familiarity and routine. Receiving packages feels normal. Printing labels feels harmless. The tasks don’t register as criminal, especially when wrapped in corporate branding and professional language.

    The fraud also thrives on urgency. Victims are nudged to act quickly, discouraged from asking questions, and reassured that everything is standard procedure. The delay between the work and the realization gives scammers time to vanish.

    This isn’t about stealing money directly. It’s about outsourcing exposure.

    Red Flags:

    • Any job where the primary responsibility is forwarding packages from your home.
    • No formal interview, offer letter, or verifiable company presence.
    • Requests for copies of IDs, banking details, or Social Security numbers during onboarding.
    • Vague pay schedules or explanations like “processing periods.”
    • Warnings not to discuss the job with others or pressure to act immediately.

    There’s a reason legitimate employers don’t operate this way.

    Quick Tip: Search the company or recruiter’s name along with words like “scam,” “complaint,” or “review.” If you see reports about missing pay or reshipping goods, walk away. That pause can save months of cleanup.

    What You Can Do:

    • Verify employers independently using official websites and contact information.
    • Talk through job offers with someone you trust before accepting.
    • Never share sensitive personal or financial information unless the employer is unquestionably real.
    • Be skeptical of roles that sound operationally important but offer no transparency.

    Real companies ship from warehouses, not spare bedrooms.

    If You’ve Been Targeted:

    • Visit IdentityTheft.gov to protect your information immediately.
    • Monitor credit reports and financial accounts for unusual activity.
    • Report the scam at ReportFraud.ftc.gov.
    • Notify the U.S. Postal Inspection Service at uspis.gov/report.
    • Save emails, shipping labels, and instructions as documentation.

    Even if you never got paid, the harm may already be in motion.

    Final Thoughts:

    Reshipping scams are effective because they don’t feel like scams. They feel like work. They arrive neatly boxed, labeled, and framed as opportunity.

    But no legitimate job requires you to forward stolen goods through your home. If a work-from-home offer turns your living space into a shipping hub, you weren’t hired; you were used.

    Further Reading:

     
  • Geebo 9:00 am on December 8, 2025 Permalink | Reply
    Tags: , , , , Scams   

    “Pig Butchering” Scams: When Online Romance Becomes a Financial Extraction 

    By Greg Collier

    Loneliness creates vulnerability—and online scammers know exactly how to exploit it.

    A growing fraud scheme known as “pig butchering” combines fake romantic relationships with fabricated cryptocurrency investments, slowly guiding victims toward catastrophic financial loss. One recent San Francisco Bay Area case shows just how sophisticated—and devastating—this scam has become.

    A Relationship You Trust and an Investment You Never Verified

    The connection starts innocently.

    A stranger appears through social media, often introduced by a mutual contact or friendly message request. He’s polite. Attentive. Consistent. Daily messages turn into emotional support, shared routines, and private affection.

    Good-morning texts become a habit.
    Affection fills a quiet life.

    Then money enters the conversation.

    Not all at once—just enough to seem harmless.

    What’s Going On

    This is not casual fraud. It’s a structured, step-by-step operation.

    • Emotional grooming: Scammers spend weeks or months building trust before mentioning money.
    • Isolation tactics: Victims are encouraged to keep the relationship private “for now.”
    • Fake investment platforms: Targets are directed to polished crypto apps that only display profits.
    • Escalating deposits: Small “wins” lead to larger requests, often draining retirement accounts.
    • Borrowing pressure: When savings run out, victims are urged to take loans or second mortgages.
    • Account freeze scams: Attempts to withdraw funds trigger a demand for even more money or fees.
    • Threat escalation: Fake lawyers and legal threats are introduced to intimidate compliance.

    Behind the scenes, money is wired overseas and disappears immediately.

    Why It Works

    Pig-butchering scams succeed because they don’t feel like scams.

    • Emotional manipulation: Romance disarms skepticism more effectively than urgency alone.
    • Fake profit dashboards: Victims believe they’re reinvesting earnings rather than losing capital.
    • Gradual escalation: Each financial step feels justified by the one before it.
    • Technological trust: Professional-looking apps create the illusion of legitimacy.
    • Shame and secrecy: Victims hesitate to ask friends or family, reinforcing isolation.

    By the time doubts appear, losses are already irreversible.

    Red Flags

    • Online partners who refuse in-person meetings
    • Requests to keep the relationship secret
    • Guaranteed or instant investment “profits”
    • Requests for wire transfers or crypto payments
    • Pressure to borrow money to “unlock” funds
    • Claims that your account is frozen unless you pay more

    Any one of these is a warning. Together, they are conclusive.

    The Aftermath

    Victims often lose more than money.

    • Retirement accounts emptied
    • Homes put at risk
    • Massive tax liabilities from early withdrawals
    • Emotional trauma and depression
    • Long-term financial instability

    The scammers move on to the next target.

    The damage remains.

    What You Can Do

    • Never invest money with someone you’ve never met in person
    • Avoid crypto investments introduced through romantic relationships
    • Verify trading platforms independently—not through links you’re given
    • Talk to a trusted person before moving large sums of money
    • If funds are demanded to “unfreeze” an account, stop immediately

    If something feels off, pause. That pause can save everything.

    If You’ve Been Targeted

    • Contact your bank immediately—wire recalls are time-sensitive
    • Report the incident to local police and the FBI’s IC3 portal
    • Preserve all messages, apps, and transaction records
    • Warn others in your community—silence enables repeat victims

    Fraud thrives when people feel ashamed. Awareness shuts it down.

    Final Thoughts

    Pig-butchering scams aren’t about greed.

    They’re about weaponized trust.

    In a digital world where affection can be fabricated and profits simulated, skepticism isn’t cynicism—it’s protection.

    If love leads straight to a wire transfer, it isn’t love.

    Further Reading

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel