SCARS Institute's Encyclopedia of Scams™ RomanceScamsNOW.com Published Continuously for 25 Years

SCARS Institute’s Encyclopedia of Scams™ Published Continuously for 25 Years

SCARS Institute - 12 Years of Service to Scam Victims/Survivors
SCARS Institute Scam Survivor's Community portal banner
Cannibal Scams - The Intersection of Violent Predators and Scamming Techniques - 2026

Cannibal Scams – The Intersection of Violent Predators and Scamming Techniques

When Violent Predators Use Online Grooming and Fake Personas to Target Victims

Catalog of Scams – A SCARS Institute Insight

Author:
•  Tim McGuinness, Ph.D., DFin, MCPO, MAnth – Anthropologist, Scientist, Director of the Society of Citizens Against Relationship Scams Inc.
See Author Biographies Below

Abstract

Violent predators have, in rare but documented cases, used online grooming, false identities, and relationship-style interaction to locate and approach potential victims. These behaviors closely resemble the early stages of relationship scams, including rapid trust-building, emotional manipulation, secrecy, and gradual escalation toward an in-person meeting. The objective differs, as the intent is physical access rather than financial gain. Offenders may observe online behavior to identify vulnerability and use pretexting to create believable reasons for contact. Warning signs include avoidance of identity verification, pressure to meet, and increasing emotional intensity. Protective strategies include slowing interactions, verifying identities, maintaining an outside perspective, and involving law enforcement when necessary.

Cannibal Scams - The Intersection of Violent Predators and Scamming Techniques - 2026

Cannibal Scams and More: When Violent Predators Use Online Grooming and Fake Personas to Target Victims

Cannibal Scams

“Cannibal scams” is a descriptive term used to explain a rare but real pattern where individuals with violent cannibalistic intent use online grooming and false identities (just like with scams) to locate, assess, and approach potential victims.

The term does not describe a financial scam. It describes a form of targeted victimization that uses deception that borrows the same psychological tools used in relationship scams but applies them to violent outcomes.

Note: There have been very few documented cases of this, though many more cases where non-cannibalistic violence was the result. We have extracted such information as is available to explain the techniques and the dangers of violent predators using these techniques.

In these cases, the offender typically begins with anonymity. Online platforms provide distance, access, and the ability to experiment with identity. The individual can create a false persona or present a controlled version of themselves. This can include appearing as a romantic partner, a friend, or someone with shared interests.

Contact often begins in spaces where connection feels normal. These can include dating platforms, social media, or niche forums. The offender can initiate conversation in a casual and non-threatening way. Over time, the interaction becomes more personal.

Gradual escalation is a key feature. The offender can introduce unusual topics slowly, testing how the other person responds. Boundaries are explored, and reactions are observed. If the target shows discomfort, the offender can retreat, reframe the discussion, or abandon the target altogether. If the target shows curiosity, compliance, or emotional openness, the interaction can deepen.

Secrecy is always encouraged. The offender can suggest that others would not understand the connection. This creates a sense of exclusivity and reduces outside input. The target can begin to rely more heavily on the offender for validation and communication.

In the most dangerous cases, the interaction moves toward a real-world meeting. At this stage, the grooming process has shifted from communication to access. This is where risk becomes immediate and physical.

Psychological Structure

The psychological structure of these interactions can feel familiar because they mirror the early stages of relationship scams. Human connection is a powerful driver of trust. When someone appears attentive, interested, and emotionally engaged, it is natural to respond.

The brain often prioritizes connection over risk detection in early interactions, as we have written about extensively. This is especially true when the interaction feels rewarding or meaningful. Over time, repeated contact can normalize behavior that would otherwise feel unusual.

Isolation increases vulnerability. When a person begins to rely on a single source of validation, outside perspectives can feel less relevant. This makes it harder to recognize warning signs.

In some cases, offenders seek individuals who appear vulnerable, isolated, or open to unconventional ideas. This does not reflect weakness. It reflects normal human needs for connection and understanding.

Other Violent Predators Adopting Scammer Techniques

Evidence from criminal investigations shows that some violent offenders, including serial offenders, have used deception, social engineering, and identity manipulation to access victims. While this is not new, the internet has expanded both reach and efficiency. Scamming has shown the way forward to better, faster, and more complete grooming, manipulation, and control.

These individuals can use techniques that closely resemble those used in relationship scams. This can include building rapport quickly, mirroring interests, and creating a sense of emotional connection. The goal is not financial extraction, but reduced resistance and increased access that would result in a violent result.

Fake personas are a central tool. An offender can present themselves as trustworthy, attractive, or relatable in order to lower defenses, but if you met them in person would never happen. In some cases, this includes adopting professional roles, shared identities, or emotionally supportive positions.

Pretexting is also common. This involves creating a believable story to justify contact or a meeting. The scenario can appear ordinary, which reduces suspicion. Over time, repeated interaction can create familiarity, making risk harder to detect.

Target selection can involve observing online behavior. Individuals who express loneliness, distress, or a desire for connection can receive more attention. This is not a judgment of the person. It reflects how offenders identify opportunity.

The overlap with scammer techniques is structural. Both rely on trust-building, emotional influence, and controlled information. The difference is intent. In these cases, the objective is physical access and control rather than money.

Red Flags and What to Watch For

Several patterns appear consistently across known cases involving online targeting with violent intent.

  • A new contact moves quickly toward emotional closeness in some cases. The communication becomes intense early in the interaction, but not always. Some predators have patiences and will wait for an appropriate moment.
  • The person introduces unusual or extreme topics in a gradual way. Each step is framed to seem slightly more acceptable than the last.
  • There is a focus on secrecy or privacy. The person can suggest keeping the relationship hidden or avoiding input from others.
  • The individual avoids verifiable identity details. Information can be vague, inconsistent, or difficult to confirm.
  • There is pressure to meet in person before a stable, verified relationship has been established.
  • The interaction creates a sense of exclusivity, as if the connection is unique or not understandable to others.

What To Do Next – How To Disengage

It is important to remember that these can be violent predators. They probably know who you are, where you live, and where you work. If you end the communications online, it does not mean the danger is gone.

  • Pause when something feels unusual, even if it does not feel immediately dangerous. Discomfort is an important signal.
  • Slow the pace of the interaction. Healthy connections can tolerate time and verification.
  • Verify identity through independent means. This can include video calls, reverse image searches, and confirming real-world details.
  • Do not agree to meet in person with someone whose identity and intentions are unclear.
  • Share the interaction with a trusted third party. Outside perspective often restores balance and clarity.
  • If there are signs of threat or coercion, disengage and report the interaction to your local police or law enforcement. This is actually the most important.

How to Seek a Protection Order if You Feel at Risk

If an online interaction begins to feel threatening, coercive, or unsafe, a protection order can be one option to increase your safety, and it is usually easy to obtain.

A protection order is a court order that can restrict another person from contacting you, approaching you, or coming near your home or workplace. The process typically begins by contacting your local police department or visiting your county courthouse. Law enforcement can help you document the situation and explain your options, while court staff can provide the required forms. You will usually be asked to describe the behavior that caused concern and provide any evidence, such as messages, screenshots, or call records. In urgent situations, courts can issue a temporary order quickly, sometimes the same day, until a full hearing is held.

To strengthen your request, keep a clear record of all interactions. Save messages, usernames, dates, and any identifying details. Avoid further engagement with the person once you feel unsafe – block them, as continued communication can complicate the situation. Many areas also offer victim advocacy services that can guide you through each step and may accompany you to court. If the person violates a protection order after it is issued, that violation is a separate offense (crime) and should be reported immediately. Laws and procedures vary by state, so local police or court personnel can provide the most accurate guidance for your area. Protection orders are there to help victims and potential victims.

Review

Understanding these patterns can reduce fear and increase clarity. These cases are extremely rare, but they demonstrate how deception can be used for different purposes. Violent predators’ use of the internet is becoming more common. Be sure you talk to your family and friends about this.

The same skills used to recover from relationship scams are protective here. These include slowing down decisions, verifying information, and maintaining your connection with trusted people.

It is important to remain grounded in reality. Most online deception is still financial in nature. Violent targeting of this type is not common, but awareness supports safety.

  • Online grooming techniques can be used for both financial scams and rare forms of violent targeting.
  • Fake identities and emotional manipulation are common tools across different types of exploitation.
  • Gradual escalation and secrecy are critical warning signs that should not be ignored.
  • Verification and outside perspective are among the most effective protective strategies.
  • These cases are rare (in the case of cannibals, but not in the case of violent predators), but understanding the pattern strengthens awareness and personal safety.

Conclusion

Awareness is one of the most effective forms of protection when facing any type of deception, whether financial risk or physical risk. The pattern described here shows that the same psychological tools used in relationship scammers are being adapted for far more dangerous purposes. Trust-building, emotional connection, and identity manipulation are not inherently harmful. They become dangerous when they are used deliberately by real, dangerous, and violent predators to reduce your awareness and gain access to you.

Understanding this pattern helps you stay grounded in reality. Most online interactions are safe physically, but not all, and most deception is still financial. However, recognizing how grooming, manipulation, and control work gives you the ability to pause, evaluate, and make decisions that protect your safety. When something feels unusual, slowing down and seeking outside perspective can interrupt the process before it escalates.

Connection should never require secrecy, pressure, or the abandonment of your own judgment. Healthy relationships allow for verification, time, and transparency. When those elements are missing, it is appropriate to run away.

Staying connected to trusted people, maintaining awareness of how manipulation works, and taking early action when concerns arise can significantly reduce risk. These are not signs of fear. They are signs of informed, practical self-protection in a digital world where identity is easy to disguise, and intent is not always visible.

Cannibal Scams - The Intersection of Violent Predators and Scamming Techniques - 2026

Glossary

  • Access Shift — Access shift refers to the critical transition point where an online interaction moves from conversation into real-world proximity. This stage represents the highest level of risk, as the offender’s objective changes from influence to physical access. Recognition of this shift allows you to pause and reassess before exposure increases.
  • Anonymity Advantage — Anonymity advantage describes how offenders use the internet to conceal identity and experiment with different personas. This distance reduces accountability and allows manipulation without immediate consequences. Understanding this helps you remain cautious when identity cannot be independently verified.
  • Behavioral Normalization — Behavioral normalization occurs when repeated exposure to unusual ideas makes them feel increasingly acceptable over time. This gradual adjustment can reduce your ability to recognize danger. Awareness of this process helps you question changes in your own comfort level.
  • Boundary Testing — Boundary testing is the process by which an offender introduces small challenges to your comfort zone to observe your reactions. Each response helps them decide whether to continue, escalate, or withdraw. Recognizing this pattern allows you to stop engagement early.
  • Cannibal Scams — Cannibal scams refer to a rare pattern where individuals with violent intent use grooming and deception similar to relationship scams to target victims. The focus is not financial gain, but physical access and control. Understanding this term helps you recognize how familiar tactics can be repurposed for different threats.
  • Casual Entry Contact — Casual entry contact describes how an offender begins interaction in a non-threatening and ordinary way. This approach lowers suspicion and makes engagement feel safe. Awareness helps you remain mindful even in seemingly harmless conversations.
  • Communication Intensification — Communication intensification occurs when interaction quickly becomes frequent, emotional, or consuming. This can create a sense of closeness that has not been earned over time. Recognizing this helps you slow the pace and maintain perspective.
  • Compliance Signaling — Compliance signaling refers to behaviors that indicate openness, curiosity, or willingness to continue interaction. Offenders monitor these signals to decide whether to deepen engagement. Awareness helps you understand how your responses may be interpreted.
  • Controlled Persona Presentation — Controlled persona presentation involves carefully shaping an identity to appear trustworthy, attractive, or relatable. This persona is designed to lower your defenses and build rapport. Recognizing this helps you seek independent verification rather than relying on impressions.
  • Curated Identity — Curated identity refers to selectively presenting information to create a specific impression while hiding inconsistencies or risks. This allows the offender to maintain control over how they are perceived. Awareness helps you question incomplete or overly polished profiles.
  • Emotional Dependency Formation — Emotional dependency formation occurs when you begin to rely on a single person for validation, support, or connection. This reliance can reduce your ability to evaluate risk objectively. Recognizing this helps you maintain balanced relationships.
  • Emotional Mirroring — Emotional mirroring is the technique of reflecting your feelings, interests, or values to create rapid rapport. This can create the illusion of deep compatibility. Awareness helps you distinguish genuine connection from strategic imitation.
  • Exclusivity Framing — Exclusivity framing involves presenting the interaction as unique or special in a way that discourages outside input. This can increase emotional investment and reduce critical thinking. Recognizing this helps you maintain openness to other perspectives.
  • Exposure Escalation — Exposure escalation refers to the gradual increase in risk through deeper communication, personal disclosure, and eventual meeting. Each step builds on the previous one, making withdrawal more difficult. Awareness helps you interrupt the process early.
  • Familiarity Illusion — Familiarity illusion occurs when repeated interaction creates a false sense of knowing or trusting someone. This can happen even without real-world verification. Recognizing this helps you avoid confusing contact frequency with genuine safety.
  • False Relationship Framing — False relationship framing involves presenting the interaction as a meaningful connection to increase trust and emotional investment. This framing can lead you to overlook inconsistencies. Awareness helps you evaluate actions rather than labels.
  • Gradual Topic Introduction — Gradual topic introduction is the method of introducing unusual or extreme subjects slowly to test acceptance. Each step is designed to feel only slightly different from the last. Recognizing this helps you identify manipulation before it escalates.
  • Identity Avoidance Behavior — Identity avoidance behavior occurs when a person resists verification or provides vague, inconsistent details. This prevents you from confirming who they are. Awareness helps you treat a lack of verification as a significant warning sign.
  • Independent Verification — Independent verification is the process of confirming identity through sources outside the interaction. This can include video calls, image searches, or cross-checking details. Practicing this reduces reliance on unverified claims.
  • Information Control — Information control refers to limiting what you know while shaping what you believe. This allows the offender to guide your perception and decisions. Awareness helps you seek complete and balanced information.
  • Intent Concealment — Intent concealment involves hiding true motives behind normal or appealing behavior. This prevents you from recognizing risk early. Understanding this helps you evaluate patterns rather than stated intentions.
  • Isolation Reinforcement — Isolation reinforcement occurs when you are encouraged to rely on the offender while reducing contact with others. This weakens external support and feedback. Recognizing this helps you stay connected to trusted people.
  • Loneliness Targeting — Loneliness targeting refers to identifying individuals who express a desire for connection and focusing attention on them. This is based on opportunity rather than judgment. Awareness helps you protect yourself during vulnerable periods.
  • Non-Threatening Presentation — Non-threatening presentation involves appearing calm, friendly, and ordinary to reduce suspicion. This helps the offender gain initial trust. Recognizing this reminds you that appearance does not equal safety.
  • Online Grooming for Access — Online grooming for access describes the process of building trust and influence with the goal of arranging a real-world meeting. The focus is on reducing resistance and increasing compliance. Awareness helps you recognize when an interaction is moving toward risk.
  • Pattern Familiarity Effect — Pattern familiarity effect occurs when an interaction feels safe because it resembles common social experiences. This familiarity can mask underlying risk. Recognizing this helps you evaluate each situation independently.
  • Pretexting Scenario — Pretexting scenario refers to creating a believable reason for contact or a meeting. This story is designed to appear normal and reduce suspicion. Awareness helps you question the purpose behind requests.
  • Rapid Rapport Construction — Rapid rapport construction is the process of building a sense of connection quickly through shared interests and emotional engagement. This can create premature trust. Recognizing this helps you slow down the interaction.
  • Reaction Monitoring — Reaction monitoring involves observing your responses to adjust strategy. The offender uses your reactions to guide escalation or withdrawal. Awareness helps you understand how your behavior is being evaluated.
  • Real-World Transition Pressure — Real-world transition pressure occurs when there is encouragement to meet before sufficient verification has occurred. This increases risk significantly. Recognizing this helps you delay or refuse unsafe meetings.
  • Risk Detection Suppression — Risk detection suppression happens when emotional engagement reduces your ability to notice warning signs. This is a natural cognitive response. Awareness helps you intentionally re-engage critical thinking.
  • Role Adoption Strategy — Role adoption strategy involves presenting as a specific type of person, such as a professional or supportive partner, to gain trust. This role is designed to meet your expectations. Recognizing this helps you verify beyond appearance.
  • Secrecy Conditioning — Secrecy conditioning is the process of encouraging you to keep the interaction private. This reduces external feedback and increases dependence. Awareness helps you resist isolation and seek support.
  • Selective Target Engagement — Selective target engagement refers to focusing effort on individuals who respond positively to initial contact. This increases efficiency for the offender. Recognizing this helps you understand why engagement may intensify.
  • Social Engineering Overlap — Social engineering overlap describes how techniques used in scams are also used in violent targeting. These include manipulation, trust-building, and information control. Awareness helps you apply scam prevention skills broadly.
  • Target Assessment Phase — The target assessment phase is the stage where the offender evaluates your responses, vulnerabilities, and boundaries. This determines whether to continue engagement. Recognizing this helps you disengage early.
  • Targeted Victimization Pattern — Targeted victimization pattern refers to the deliberate selection and grooming of a specific individual rather than random interaction. This approach increases the likelihood of success for the offender. Awareness helps you identify focused attention as a warning sign.
  • Trust Acceleration — Trust acceleration occurs when emotional closeness develops faster than is typical in healthy relationships. This can reduce caution and increase vulnerability. Recognizing this helps you slow the interaction.
  • Unverified Identity Risk — Unverified identity risk refers to the danger associated with interacting with someone whose identity cannot be confirmed. This uncertainty allows deception to continue. Awareness helps you prioritize verification before trust.
  • Unusual Topic Framing — Unusual topic framing involves presenting extreme ideas in a way that makes them seem acceptable or interesting. This can shift your perception over time. Recognizing this helps you question content rather than accept gradual change.
  • Vulnerability Identification — Vulnerability identification is the process of recognizing emotional or situational factors that may increase openness to connection. Offenders use this to guide targeting. Awareness helps you protect yourself during difficult periods.
  • Vulnerability Exploitation Pathway — Vulnerability exploitation pathway describes how identified vulnerabilities are gradually used to deepen influence and reduce resistance. This pathway develops over time through interaction. Recognizing this helps you interrupt the process.
  • Warning Signal Awareness — Warning signal awareness is the ability to notice and respond to early signs of manipulation or risk. These signals often appear subtle at first. Strengthening this awareness supports timely protective action.
  • Withdrawal Resistance Pattern — Withdrawal resistance pattern occurs when emotional investment makes it difficult to disengage even when concerns arise. This can prolong exposure to risk. Recognizing this helps you prioritize safety over attachment.
  • Verification Delay Tactic — Verification delay tactic involves postponing or avoiding identity confirmation to maintain control of the interaction. This extends the period of influence. Awareness helps you insist on timely verification.
  • Violent Outcome Objective — Violent outcome objective refers to the end goal of gaining physical access and control rather than financial benefit. This objective changes the risk profile significantly. Understanding this helps you treat certain behaviors with greater urgency.

Reference

The following cases are not provided as a comprehensive list of all such predators. They are just a few examples.

Cases Involving Cannibals

There are documented cases where individuals with cannibalistic intent used the internet, deception, or relationship-style interaction to locate or approach victims. However, the evidence shows these are isolated cases, and the level of deception varies from explicit fake identities to more subtle misrepresentations of intent.

Below are the clearest, well-documented examples that fit:

1. Armin Meiwes (Germany, 2001)

  • Armin Meiwes

What happened:

  • Meiwes used internet forums and chat platforms to post ads seeking a person for “slaughter and consumption.”
  • He successfully recruited a victim online and arranged a meeting that led to murder and cannibalism.

Relevance:

  • This is the clearest example of online targeting for cannibalistic intent.
  • While not a “romance scam,” it involved intentional online identity presentation and recruitment of a victim.
  • Earlier interactions with others online show he was actively probing and cultivating potential targets before finding one.

2. Gilberto Valle (“Cannibal Cop,” United States, 2012–2013)

  • Gilberto Valle

What happened:

  • Valle participated in online chatrooms discussing kidnapping, killing, and cannibalizing women.
  • He researched real women he knew, compiled dossiers, and accessed databases to locate them.
  • Investigators found online communications suggesting targeting of specific victims and coordination with others.

Relevance:

  • This case shows online interaction combined with real-world targeting and surveillance.
  • Although the conviction was overturned because the court ruled the chats could be fantasy, the case demonstrates:
    • Use of online personas and communities
    • Selection of real victims
    • Movement toward actionable planning

3. Berlin Teacher Case (“Stefan R,” Germany, 2020)

  • Name not available

What happened:

  • The offender met the victim through an online dating platform.
  • He had a documented history of cannibalism-related online activity and fantasies.
  • The victim did not expect violence and was killed after the meeting.

Relevance:

  • This case is important because it shows use of a conventional dating identity to gain access to a victim.
  • The deception here is closer to what you are describing:
    • Presenting as a normal partner
    • Concealing violent intent

4. German Police Officer Case (2015)

  • Name not available

What happened:

  • A German police officer met a victim in an internet chat forum focused on cannibalism fantasies.
  • The meeting led to murder.

Relevance:

  • Demonstrates online targeting within niche communities.
  • Even when victims had related fantasies, the offender still used online interaction to locate and secure access.

5. Matej Čurko (Slovakia, 2011)

  • Matej Čurko

What happened:

  • Čurko contacted individuals online, including on suicide-related forums.
  • He initiated contact with a potential victim and attempted to lure him to a meeting.
  • The target eventually alerted authorities after realizing the threat.

Relevance:

  • This is a strong example of targeting vulnerable individuals online under false or incomplete pretenses.
  • It shows overlap with grooming behavior:
    • Identifying vulnerability
    • Initiating contact
    • Gradually escalating toward a meeting

What these cases show collectively

Across these examples, several consistent patterns emerge:

  1. Online environments are used for targeting
    • Forums, chatrooms, and dating platforms are common entry points
    • Offenders often test multiple individuals before selecting a target
  1. Deception is often present, but varies
    • Sometimes explicit (ads, aliases, hidden intent)
    • Sometimes implicit (posing as a normal partner or friend)
  1. Victim awareness varies widely
    • Some victims believed they were consenting
    • Others had no awareness of danger at all
  1. The structure resembles grooming more than scams
    • Emotional or psychological engagement
    • Gradual escalation
    • Movement toward a real-world meeting

Summary

  • Yes, there are real, documented cases where individuals with cannibalistic intent used online identities and interaction to locate or approach victims.
  • These cases show clear overlap with online grooming tactics, including deception and relationship-building.
  • However, they remain rare, isolated, and not part of any organized or repeatable “model” like financial scams.

Cases Involving Violent Predators

Here are documented examples and evidence that support the assessment that violent predators use deception, fake identities, and relationship-style approaches to access victims.

Documented cases of violent predators using deception and online targeting

1. Israel Keyes

Method:

  • Keyes used anonymity, fake identities, and indirect approaches to avoid detection
  • He researched victims and locations in advance, often selecting targets who appeared isolated
  • He used normal social interaction and situational pretexts to lower suspicion

Relevance:

  • While not exclusively online, his approach shows structured targeting, identity control, and pretexting, which are core scammer techniques
  • Demonstrates how methodical offenders think in terms of access, not impulse

2. John Edward Robinson

Method:

  • Used early internet chat rooms and forums to meet women
  • Created false identities, including posing as an employer offering opportunities
  • Built trust over time before arranging in-person meetings

Relevance:

  • One of the earliest clear examples of a killer using the internet for relationship-style grooming and deception
  • Direct overlap with scam structure: false persona → trust-building → real-world meeting

3. Mark Twitchell

Method:

  • Created fake online profiles to lure victims
  • Used dating-style communication to arrange meetings
  • Constructed a controlled environment for the attack

Relevance:

  • Clear example of romance-style pretexting used for violent intent
  • Demonstrates how offenders can script interactions like scammers do

4. Peter Sutcliffe (pre-internet but structurally relevant)

Method:

  • Used deception and false pretenses to approach victims
  • Presented himself as non-threatening to gain proximity

Relevance:

  • Shows that grooming and deception predate the internet
  • Modern online tools simply scale and accelerate these same tactics

5. Derrick Todd Lee

Method:

  • Used social familiarity and non-threatening behavior to approach victims
  • Blended into normal environments to reduce suspicion

Relevance:

  • Illustrates behavioral masking and trust manipulation, which are also used in scams
  • Reinforces that perceived normalcy is often engineered

What this evidence shows

Across these cases, several consistent, evidence-based patterns emerge:

  1. Fake or controlled identity presentation
    Offenders frequently:
  • Use aliases or curated personas
  • Present as trustworthy, attractive, or helpful
  • Conceal intent until access is secured
  1. Relationship-style grooming
    Many cases involve:
  • Building rapport
  • Creating emotional or situational trust
  • Gradually moving toward a meeting
  1. Pretexting and normalization
    Offenders often:
  • Create believable reasons to meet
  • Frame interactions as ordinary
  • Reduce suspicion through familiarity
  1. Target selection based on vulnerability or access
    Some offenders:
  • Identify isolated individuals
  • Monitor behavior or responses
  • Adjust approach based on compliance
  1. Transition from online to physical access
    The critical shift is always:
  • Digital contact → real-world meeting

Summary

  • There is clear, documented evidence that violent offenders, including serial killers and cannibalistic offenders, have used:
    • Fake identities
    • Online interaction
    • Relationship-style grooming
  • These methods closely mirror scammer techniques, especially in the early stages of contact.
  • The key difference is intent:
    • Scammers seek financial extraction
    • Violent predators seek physical access and control
  • While these cases are rare, they demonstrate that the same psychological tools used in scams can be adapted for far more dangerous purposes.

Author Biographies

Dr. Tim McGuinness is a co-founder, Managing Director, and Board Member of the SCARS Institute (Society of Citizens Against Relationship Scams Inc.), where he serves as an unsalaried volunteer officer dedicated to supporting scam victims and survivors around the world. With over 34 years of experience in scam education and awareness, he is perhaps the longest-serving advocate in the field.

Dr. McGuinness has an extensive background as a business pioneer, having co-founded several technology-driven enterprises, including the former e-commerce giant TigerDirect.com. Beyond his corporate achievements, he is actively engaged with multiple global think tanks where he helps develop forward-looking policy strategies that address the intersection of technology, ethics, and societal well-being. He is also a computer industry pioneer (he was an Assistant Director of Corporate Research Engineering at Atari Inc. in the early 1980s) and invented core technologies still in use today.

His professional identity spans a wide range of disciplines. He is a scientist, strategic analyst, solution architect, advisor, public speaker, published author, roboticist, Navy veteran, and recognized polymath. He holds numerous certifications, including those in cybersecurity from the United States Department of Defense under DITSCAP & DIACAP, continuous process improvement and engineering and quality assurance, trauma-informed care, grief counseling, crisis intervention, and related disciplines that support his work with crime victims.

Dr. McGuinness was instrumental in developing U.S. regulatory standards for medical data privacy called HIPAA and financial industry cybersecurity called GLBA. His professional contributions include authoring more than 1,000 papers and publications in fields ranging from scam victim psychology and neuroscience to cybercrime prevention and behavioral science.

“I have dedicated my career to advancing and communicating the impact of emerging technologies, with a strong focus on both their transformative potential and the risks they create for individuals, businesses, and society. My background combines global experience in business process innovation, strategic technology development, and operational efficiency across diverse industries.”

“Throughout my work, I have engaged with enterprise leaders, governments, and think tanks to address the intersection of technology, business, and global risk. I have served as an advisor and board member for numerous organizations shaping strategy in digital transformation and responsible innovation at scale.”

“In addition to my corporate and advisory roles, I remain deeply committed to addressing the rising human cost of cybercrime. As a global advocate for victim support and scam awareness, I have helped educate millions of individuals, protect vulnerable populations, and guide international collaborations aimed at reducing online fraud and digital exploitation.”

“With a unique combination of technical insight, business acumen, and humanitarian drive, I continue to focus on solutions that not only fuel innovation but also safeguard the people and communities impacted by today’s evolving digital landscape.”

Dr. McGuinness brings a rare depth of knowledge, compassion, and leadership to scam victim advocacy. His ongoing mission is to help victims not only survive their experiences but transform through recovery, education, and empowerment.

-/ 30 /-

What do you think about this?
Please share your thoughts in a comment below!

Table of Contents

ARTICLE CATEGORIES

Rapid Report Scammers

SCARS-CDN-REPORT-SCAMEMRS-HERE

Visit SCARS www.Anyscam.com

Quick Reporting

  • Valid Emails Only

  • This field is hidden when viewing the form
    Valid Phone Numbers Only

Subscribe & New Item Updates

In the U.S. & Canada

U.S. & Canada Suicide Lifeline 988

U.S. & Canada Suicide Lifeline 988

LEAVE A COMMENT?

Your comments help the SCARS Institute better understand all scam victim/survivor experiences and improve our services and processes. Thank you

Thank you for your comment. You may receive an email to follow up. We never share your data with marketers.

Recent Comments
On Other Articles

Important Information for New Scam Victims

If you are looking for local trauma counselors please visit counseling.AgainstScams.org or join SCARS for our counseling/therapy benefit: membership.AgainstScams.org

If you need to speak with someone now, you can dial 988 or find phone numbers for crisis hotlines all around the world here: www.opencounseling.com/suicide-hotlines

A Note About Labeling!

We often use the term ‘scam victim’ in our articles, but this is a convenience to help those searching for information in search engines like Google. It is just a convenience and has no deeper meaning. If you have come through such an experience, YOU are a Survivor! It was not your fault. You are not alone! Axios!

A Question of Trust

At the SCARS Institute, we invite you to do your own research on the topics we speak about and publish, Our team investigates the subject being discussed, especially when it comes to understanding the scam victims-survivors experience. You can do Google searches but in many cases, you will have to wade through scientific papers and studies. However, remember that biases and perspectives matter and influence the outcome. Regardless, we encourage you to explore these topics as thoroughly as you can for your own awareness.

Statement About Victim Blaming

SCARS Institute articles examine different aspects of the scam victim experience, as well as those who may have been secondary victims. This work focuses on understanding victimization through the science of victimology, including common psychological and behavioral responses. The purpose is to help victims and survivors understand why these crimes occurred, reduce shame and self-blame, strengthen recovery programs and victim opportunities, and lower the risk of future victimization.

At times, these discussions may sound uncomfortable, overwhelming, or may be mistaken for blame. They are not. Scam victims are never blamed. Our goal is to explain the mechanisms of deception and the human responses that scammers exploit, and the processes that occur after the scam ends, so victims can better understand what happened to them and why it felt convincing at the time, and what the path looks like going forward.

Articles that address the psychology, neurology, physiology, and other characteristics of scams and the victim experience recognize that all people share cognitive and emotional traits that can be manipulated under the right conditions. These characteristics are not flaws. They are normal human functions that criminals deliberately exploit. Victims typically have little awareness of these mechanisms while a scam is unfolding and a very limited ability to control them. Awareness often comes only after the harm has occurred.

By explaining these processes, these articles help victims make sense of their experiences, understand common post-scam reactions, and identify ways to protect themselves moving forward. This knowledge supports recovery by replacing confusion and self-blame with clarity, context, and self-compassion.

Additional educational material on these topics is available at ScamPsychology.orgScamsNOW.com and other SCARS Institute websites.

Psychology Disclaimer:

All articles about psychology and the human brain on this website are for information & education only

The information provided in this article is intended for educational and self-help purposes only and should not be construed as a substitute for professional therapy or counseling.

While any self-help techniques outlined herein may be beneficial for scam victims seeking to recover from their experience and move towards recovery, it is important to consult with a qualified mental health professional before initiating any course of action. Each individual’s experience and needs are unique, and what works for one person may not be suitable for another.

Additionally, any approach may not be appropriate for individuals with certain pre-existing mental health conditions or trauma histories. It is advisable to seek guidance from a licensed therapist or counselor who can provide personalized support, guidance, and treatment tailored to your specific needs.

If you are experiencing significant distress or emotional difficulties related to a scam or other traumatic event, please consult your doctor or mental health provider for appropriate care and support.

Also read our SCARS Institute Statement about Professional Care for Scam Victims – click here to go to our ScamsNOW.com website.

If you are in crisis, feeling desperate, or in despair please call 988 or your local crisis hotline.