
Grandparent Scams/Emergency Scams
A Manipulated Extortion
Crime Typology Overview / Victim Impact Analysis
CRIMINOLOGY & VICTIMOLOGY – A SCARS Institute Insight
Author:
• Tim McGuinness, Ph.D., DFin, MCPO, MAnth – Anthropologist, Scientist, Director of the Society of Citizens Against Relationship Scams Inc.
See Author Biographies Below
Article Abstract
Grandparent scams exploit love, urgency, and secrecy, yet families can counter them with calm routines and simple checks. Offenders research targets on social media and in public records, spoof local numbers, script pleas like “Grandma, it is me”, and push fast payments via wires, gift cards, cash shipments, or crypto. Red flags include secrecy demands, time pressure, and requests for “one-time codes.” Verification may include a call back to a saved number, a family code word, three-way calls, and independent confirmation with jails or hospitals. Prevention plans, spending alerts, and late-night call screening may reduce risk, and prompt reporting can support recovery.

Grandparent Scams – Manipulated Extortion: How They Work, Why They Succeed, and How Families Can Prevent Them
Grandparent scams target older adults by exploiting love, fear, and urgency. In a typical call, a voice claims to be a grandchild in trouble, asks for secrecy, and requests fast payment through hard-to-recover channels. With careful preparation, families can reduce risk, verify claims in real time, and respond with calm steps that protect both money and dignity. This article explains the common playbook, the tools criminals use, practical red flags, and a family plan that may stop a scam before any money moves.
How the Scam Typically Works
Before the first call, many scammers research potential victims. Public social media posts, online address directories, and leaked data from breaches provide names, ages, and family relationships. A profile that lists grandchildren by name, school, or sports team creates a ready script. Even casual details, such as recent travel or a new phone number, may appear in a post and then appear again during the call. With enough fragments, an imposter can sound convincing within seconds.
Leaked databases expose phone numbers, email addresses, and sometimes partial Social Security numbers. Scammers combine breach data with social posts to refine targeting. Since no one can prevent all breaches, layered defenses such as call-screening, verification routines, and family code words may absorb some of the risk.
Most calls arrive late at night or very early in the morning, when older adults may be tired, alone, and less likely to reach other family members. Caller ID often shows a local or familiar area code, since spoofing technology can display almost any number. Some scams arrive by text or email, although the phone call remains common because a frightened voice can push for action quickly. The caller often asks questions designed to harvest names, then repeats those names back to build credibility.
The imposter typically opens with a plea such as, “Grandma, it is me. I am in trouble. Please do not tell anyone.” The voice may sound muffled or distant, which provides cover if the impersonation is weak. Many callers ask, “Do you know who this is?” If the victim volunteers a grandchild’s name, the scammer accepts it and continues. Stories usually involve a car accident, an arrest, a lost phone, or a stolen wallet in another city. Each detail supports the request for secrecy and rapid payment.
After the reveal, the caller turns to a tight deadline. Lines often include, “There is a hearing in two hours,” or “The hospital needs payment right now.” Urgency blocks the normal habit of calling another relative to check. Silence is presented as loyalty, and delay is framed as harm. This pressure can overwhelm good judgment, especially when the story feels emotionally real.
Requests usually involve wire transfers, gift cards, cash sent by overnight courier, or cryptocurrency. These channels settle quickly, leave limited recourse, and give criminals speed. Instructions may be highly specific, including exact amounts, store locations for gift cards, and wording to use if a cashier asks questions. Some callers escalate to in-person pickups by a fake “courier,” which puts personal safety at risk along with money.
To prevent verification, the caller insists on secrecy, often saying, “Please do not tell Mom or Dad. They will be angry,” or, “The judge said no one else can know.” Isolation reduces the chance that a quick three-way call will expose the lie. When isolation succeeds, the scammer can stretch the story into multiple payments, each framed as a necessary next step.
How Grandparent Scams Work
Many scammers read from prepared scripts that anticipate questions and guide emotions. Scripts include common reassurances such as, “Please do not panic, it is almost handled,” and common threats such as, “If you tell anyone, I may go to jail.” Recognizing the rhythm of a script, especially the shift from pleading to commanding, can help a listener pause and verify.
Some operations send links to realistic websites that mimic law-enforcement agencies, hospitals, or courts. Others email documents that include official-looking seals or case numbers. A domain that is off by one letter, a link that redirects to an unrelated site, or a request for payment through gift cards are signs that the page is staged.
Digital wallets allow fast transfers that are hard to reverse. A caller may claim that crypto is required to pay a bond, a fine, or a “court fee.” No legitimate court requires payment in cryptocurrency, and any such request should be treated as a scam indicator.
Recognizing Red Flags in Real Time
Repeated language shows up across cases. Phrases such as, “Please do not tell anyone,” “I only trust you,” “Time is running out,” and “Use gift cards because the court cannot take cash,” often point to a con. A request for secrecy paired with an immediate demand for money should trigger verification.
A caller who refuses to answer simple questions, who cannot provide a known family detail, or who resists a brief hold while the listener calls another relative is signaling risk. Frequent background noise, a claim that the phone battery is at one percent, or a refusal to switch to video may be part of the script rather than circumstances.
A caller ID that does not match the story’s location, a number that changes mid-conversation, or a link that arrives from an unrelated email address should prompt caution. Scammers also send “one-time codes” and ask the victim to read them aloud, which can give access to bank or email accounts. Any code received during an unexpected call should be treated as private and never shared.
Verification Steps That Reduce Risk
After an alarming call, a short pause and a call back to a saved number can stop a scam. A family rule that says, “End unexpected calls and return the call using the number stored in the phone,” may save both money and stress. If no saved number exists, a second relative may be called first to help verify.
A simple, shared code word known only to close relatives can expose an imposter quickly. The caller is asked for the family word, and the conversation ends if the answer is wrong. The word should change if it ever appears in a text or email.
Adding a parent or caregiver to the line may calm emotions and surface discrepancies in the story. Three-way calls also make isolation less effective, which shortens the script and increases the chance that the imposter will hang up.
When a caller claims to be in jail, a direct call to the local jail’s publicly listed number may confirm that no such person is in custody. When the story involves a hospital, a call to that hospital’s main switchboard can verify whether a patient exists. No legitimate agency will object to independent checks.
Prevention and Family Planning
Limiting public social posts about children and older relatives reduces free research material. Family members can avoid naming schools, listing travel plans, or posting real-time location tags. A periodic review of privacy settings provides added protection.
Call-screening tools, voicemail first policies, and Do Not Disturb settings during late-night hours reduce exposure to high-pressure calls. Favorites lists that allow only known numbers through at night may protect sleep and minimize startled decisions.
Spending alerts on bank and credit accounts, daily withdrawal limits, and dual-approval rules for large transfers can slow losses. Clear instructions at home about where debit cards, checkbooks, and gift cards are stored can prevent hurried trips to stores at odd hours.
Clear plans among adult children, caregivers, and trusted friends create a support net. The plan can include who to call first, where key documents are stored, and what steps to take if an alarming call arrives. Coordination turns a surprise into a rehearsed routine.
If Money Was Sent
Immediate contact with the sending bank or money transfer company may stop a wire if it has not yet been claimed. Staff may place a hold, open a fraud investigation, and notify receiving institutions. Acting within minutes offers the best chance of recovery.
Store receipts and card numbers should be saved and photographed. Some issuers can freeze balances if contacted quickly, although success varies. If the numbers were read aloud to a scammer, the balance may have been drained within minutes.
Banks can review transactions and may initiate a dispute for unauthorized or mistaken transfers. Account passwords, online banking credentials, and email logins should be changed immediately in case access was compromised.
Law-enforcement reports may still help even when recovery is unlikely. Exchanges sometimes flag wallets connected to known scams, and tracing tools may connect cases across jurisdictions. Documentation remains important for any later action.
If cash or valuables were shipped, the carrier’s intercept service may be able to stop delivery if contacted early. A police report can support the request. Package tracking numbers, addresses, and photos of contents will assist investigators.
Reports to local police, the state attorney general, and federal agencies build patterns that support larger investigations. In the United States, many victims submit complaints to the FBI’s Internet Crime Complaint Center at https://www.ic3.gov and the Federal Trade Commission at https://reportfraud.ftc.gov. Documentation that includes phone numbers, links, emails, and payment details strengthens any report.
Support and Recovery
Alarming calls create fear, shame, and anger. Gentle debriefs with family, a therapist, or a moderated support group may reduce isolation and restore confidence. Simple scripts such as, “A scammer called pretending to be a grandchild. Verification stopped the payment,” keep the focus on steps taken rather than on blame.
Regular check-ins that review the plan, refresh the password, and practice a short verification script can build shared readiness. A printed page near the phone that reads, “End the call. Call back on saved number. Do not share codes. Do not buy gift cards,” can serve as a visible reminder in stressful moments.
Keeping a small folder or digital note with dates, times, numbers, and screenshots supports reporting and learning. Over time, the record may show how preparation improved responses. Clear documentation also helps caregivers spot patterns and adjust safeguards.
A Short Script to Post
After an unexpected distress call, a simple script may help: “I cannot talk right now. I will call you back on your regular number.” If the caller protests, a second line keeps control: “Family rules require a call back. This is for everyone’s safety.” Calm repetition paired with a quick call to a saved contact often ends the scam within minutes.
Grandparent scams succeed because they exploit love, urgency, and secrecy. Preparation can turn those same forces toward protection. Families that agree on verification routines, reduce public exposure of personal details, and practice calm responses may stop most attempts before money moves. When losses occur, fast action and thorough reporting still matter. With steady habits, older adults and their families can keep connections strong while keeping imposters out.
Glossary
- ACH dispute — A bank review that looks at money pulled from a checking account through an electronic transfer. Fast contact with the bank may trigger a hold, an investigation, and an attempt to reverse the transfer. Acting within minutes gives the best chance to reduce loss and to secure the account.
- Alarm phrases — Common lines that scammers repeat to create fear and speed. Examples include “Please do not tell anyone,” “Time is running out,” and “Only gift cards will work.” Hearing these lines may prompt a pause, a breath, and a move to verification.
- Call-back routine — A family rule that ends surprise calls, then returns the call using a saved, known number. This habit removes control from the imposter, and gives control back to the household. Even a short pause to call back can stop a payment before it starts.
- Caller ID spoofing — A trick that makes the number on the screen look local or familiar. Spoofed numbers increase the chance that a call is answered and trusted. Caller ID does not prove identity, so a return call to a stored contact remains the safer test.
- Cash courier pickup — A request for a cash handoff to a person who claims to be a “courier” or an “officer.” Meeting strangers creates safety risks and removes any chance of recall. Declining in-person pickup, then reporting the request, may prevent both harm and loss.
- Code word (family password) — A simple word or phrase shared only among close relatives. Asking for the code can expose an imposter quickly, since scripted callers rarely know it. Changing the word after any leak keeps the system reliable.
- Cryptocurrency wallet — A digital address used to receive and hold cryptocurrency. Payments sent to these wallets move fast and are hard to reverse. Any demand for crypto to pay a “bond” or a “court fee” signals a scam and calls for verification.
- Data breach — A leak of personal information from a company or service. Breaches expose phone numbers, emails, and other details that can power impersonation. Layered defenses, such as call screening and family code words, may reduce the damage.
- Documentation kit — A small folder or phone note that holds dates, times, numbers, screenshots, and receipts. Keeping records strengthens police and agency reports, and helps memory under stress. A ready kit also speeds action if losses occur.
- Do Not Disturb (DND) — A phone setting that silences calls during late-night or early-morning hours. Limiting access during those windows removes a common entry point for urgent scams. Favorites lists can still allow known contacts to ring through.
- Fake website — A page that imitates a hospital, a police department, or a court to add false proof. Slight spelling changes, odd web addresses, or payment requests through gift cards reveal the trick. Independent calls to official numbers can confirm the truth.
- Favorites list — A phone feature that marks numbers as trusted. Allowing only favorites to ring at night may reduce startled decisions and protect sleep. Adding relatives, doctors, and caregivers to this list creates a safer filter.
- Gift card payment — A request to buy cards, then share the numbers by phone, text, or photos. Retail staff often ask questions, since scams use this method again and again. Refusing gift card payments and keeping receipts protects finances and helps reporting.
- Grandparent scam — A scheme that pretends a grandchild is in danger and needs urgent money, with a strong push for secrecy. The caller uses personal details found online to sound convincing. Verification routines and calm pauses can disrupt the script.
- Impersonation — A false claim to be a grandchild, a friend, a lawyer, or an officer in order to gain trust. Callers often ask, “Do you know who this is?” to make the target say a name first. Refusing to supply names, then insisting on a call back, can expose the lie.
- Independent confirmation — A direct call to a jail, a hospital, or an agency using a publicly listed number. This step checks whether a person is in custody, or admitted as a patient. Legitimate institutions welcome verification and do not require secrecy.
- Initial contact — The first call, text, or email that sets the trap. Many calls arrive late at night, when targets are tired and alone. A calm voice, a short pause, and a plan to call back may stop the rush.
- Internet Crime Complaint Center (IC3) — The FBI portal where many victims file online fraud reports. Submitting a detailed complaint can connect cases across states, and support investigations. Phone numbers, links, emails, and payment details make the report stronger.
- Isolation tactic — A demand for silence that blocks quick checks with family. Lines such as “Please do not tell Mom or Dad” try to cut off help. Looping in a second relative, or a caregiver, ends isolation and weakens the scam.
- Law-enforcement report — A local police report that documents the event, even when money is not recovered. Reports create a record for banks, carriers, and insurers, and may aid future cases. Calm detail helps officers see patterns and act.
- One-time code — A security code sent by text or email that unlocks an account. Scammers ask for the code while on the phone, claiming a need to verify identity. Treating all codes as private and never reading them aloud protects access.
- Package intercept — A carrier service that stops delivery of a shipped envelope or box. Fast requests, tracking numbers, and a police report may improve results. Early action gives the best chance to recover cash or valuables.
- Payment channel — The route scammers prefer, such as a wire transfer, a gift card, a cash shipment, or cryptocurrency. These methods move fast and are hard to reverse. Delaying any payment, then switching to verification, may prevent loss.
- Phishing email or text — A message that pretends to be from an official source to push clicks or downloads. Links may lead to fake sites or install malware. Deleting unknown messages and visiting official sites by typing addresses directly keeps devices safe.
- Privacy settings — Controls on social media that limit who can see posts, friends, and photos. Tighter settings reduce free research material for impostors. A quick review after life events, such as a move or a new phone, can close gaps.
- Public records — Open documents, including obituaries, property records, and court listings, that reveal names and relationships. Scammers combine these details with social posts to build scripts. Sharing less online limits the power of public data.
- Red flags — Signals that a call is risky, including secrecy demands, rushed deadlines, and requests for nonstandard payments. Recognizing patterns reduces shock, and helps the brain choose verification. A printed list near the phone can aid memory under stress.
- Reporting — Notices sent to police, state attorneys general, the IC3, and the Federal Trade Commission. Reports build patterns that support larger investigations and may help others. Copies of receipts, screenshots, and texts improve the quality of reports.
- Scripted dialogue — Prewritten lines that guide emotions and answers. Many scripts shift from pleading to commanding, which can feel jarring. Hearing that rhythm may help a listener pause, breathe, and move to a callback.
- Secrecy request — A plea to keep the situation quiet, framed as protection or loyalty. Secrecy blocks quick checks with family, which is the caller’s goal. A family rule that says all emergencies get verified breaks this tactic.
- Social media research — The scan of profiles for names, schools, trips, and tagged photos. Even small details can fuel a convincing story. Limiting public posts, and friend lists, may reduce exposure.
- Spending alert — A bank or card notice that arrives when a transaction occurs. Alerts add a layer of defense and may reveal fraud quickly. Setting low thresholds keeps notices useful without becoming noise.
- Three-way call — A quick addition of a parent, a caregiver, or another relative to the line. Extra ears calm emotions, add facts, and expose gaps in the caller’s story. This simple step often shortens the scam and prompts the imposter to hang up.
- Time pressure — A claim that action must happen within minutes or hours. Pressure aims to crowd out judgment and to stop calls to relatives. Turning to a set routine, such as a call back and a code word, resets the pace.
- Verification routine — A short, repeatable process that confirms identity and facts. Common steps include hanging up, calling back on a saved number, asking for the family code word, and checking with a second relative. Routines remove guesswork when stress is high.
- Voicemail-first policy — A household rule that sends unknown numbers to voicemail. Listening to the message with a clear head reduces pressure and mistakes. Returning only calls that make sense keeps control with the family.
- Wire transfer — A bank-to-bank payment that moves fast, and is hard to reverse. Immediate contact with the bank may stop a wire if it has not been claimed. Acting within minutes, then filing reports, gives the best chance to limit loss.
- Withdrawal limit — A cap set by a bank on daily cash withdrawals. Limits slow losses and create time for a family check. Pairing limits with alerts adds another layer of protection.
-/ 30 /-
What do you think about this?
Please share your thoughts in a comment below!
Article Rating
Table of Contents
- Crime Typology Overview / Victim Impact Analysis
- Grandparent Scams – Manipulated Extortion: How They Work, Why They Succeed, and How Families Can Prevent Them
- How the Scam Typically Works
- How Grandparent Scams Work
- Recognizing Red Flags in Real Time
- Verification Steps That Reduce Risk
- Prevention and Family Planning
- If Money Was Sent
- Support and Recovery
- A Short Script to Post
- Glossary
RATE THIS ARTICLE?
LEAVE A COMMENT?
Recent Comments
On Other Articles
- Taci Fernuik on How You Think & Talk About Your Scam Affects Your Recovery: “I have hung on to the scams for far too long. With the intervention of an all-merciful God, I have…” Nov 6, 22:13
- on Disengaging From A Fake Scam Relationship: “Taci, you may want to join our new support community at www.SCARScommunity.org” Nov 6, 03:01
- on Disengaging From A Fake Scam Relationship: “This particular article helped me discover the many things I did wrong the first time I was scammed. I should…” Nov 5, 22:49
- on About the SCARS RomanceScamsNOW.com Website – 24 Years Published: “It was unavailable for a few days, but it is available again. If he would be interested, he is welcome…” Nov 5, 00:59
- on About the SCARS RomanceScamsNOW.com Website – 24 Years Published: “My husband has been scammed and your classes have been helping him but now he can’t seem to access them.…” Oct 26, 14:57
- on Talia Shepard – Impersonation Victim – Stolen Photos – 2024: “Hi, I’m Patrick from Belgium and I found this site by chance, so I just got to know it, and…” Oct 17, 23:46
- on Talia Shepard – Impersonation Victim – Stolen Photos – 2024: “Hallo ik ben Patrick uit Belgie en het is in verband over PayPal. Ik heb het dit jaar spijtig genoeg…” Oct 17, 23:08
- on Debt Relief Scams – Catalog of Scams – 2024 UPDATED 2025: “Before you make any decision, stop, think, and ask someone you trust for advice. No matter how difficult your situation…” Oct 9, 07:06
- on Shemar Moore – Stolen Photos – Impersonation Victim – 2024: “KM, sadly, this was available 5 years ago. The is a 25 year old website. Of course, new content is…” Oct 6, 13:27
- on Shemar Moore – Stolen Photos – Impersonation Victim – 2024: “Me too, since 2020. I’ve dealt with a lot of them till now. They’ve completely manipulated me and put me…” Oct 6, 00:48
ARTICLE META
Important Information for New Scam Victims
- Please visit www.ScamVictimsSupport.org – a SCARS Website for New Scam Victims & Sextortion Victims
- Enroll in FREE SCARS Scam Survivor’s School now at www.SCARSeducation.org
- Please visit www.ScamPsychology.org – to more fully understand the psychological concepts involved in scams and scam victim recovery
If you are looking for local trauma counselors please visit counseling.AgainstScams.org or join SCARS for our counseling/therapy benefit: membership.AgainstScams.org
If you need to speak with someone now, you can dial 988 or find phone numbers for crisis hotlines all around the world here: www.opencounseling.com/suicide-hotlines
A Note About Labeling!
We often use the term ‘scam victim’ in our articles, but this is a convenience to help those searching for information in search engines like Google. It is just a convenience and has no deeper meaning. If you have come through such an experience, YOU are a Survivor! It was not your fault. You are not alone! Axios!
A Question of Trust
At the SCARS Institute, we invite you to do your own research on the topics we speak about and publish, Our team investigates the subject being discussed, especially when it comes to understanding the scam victims-survivors experience. You can do Google searches but in many cases, you will have to wade through scientific papers and studies. However, remember that biases and perspectives matter and influence the outcome. Regardless, we encourage you to explore these topics as thoroughly as you can for your own awareness.
Statement About Victim Blaming
Some of our articles discuss various aspects of victims. This is both about better understanding victims (the science of victimology) and their behaviors and psychology. This helps us to educate victims/survivors about why these crimes happened and to not blame themselves, better develop recovery programs, and to help victims avoid scams in the future. At times this may sound like blaming the victim, but it does not blame scam victims, we are simply explaining the hows and whys of the experience victims have.
These articles, about the Psychology of Scams or Victim Psychology – meaning that all humans have psychological or cognitive characteristics in common that can either be exploited or work against us – help us all to understand the unique challenges victims face before, during, and after scams, fraud, or cybercrimes. These sometimes talk about some of the vulnerabilities the scammers exploit. Victims rarely have control of them or are even aware of them, until something like a scam happens and then they can learn how their mind works and how to overcome these mechanisms.
Articles like these help victims and others understand these processes and how to help prevent them from being exploited again or to help them recover more easily by understanding their post-scam behaviors. Learn more about the Psychology of Scams at www.ScamPsychology.org
Psychology Disclaimer:
All articles about psychology and the human brain on this website are for information & education only
The information provided in this article is intended for educational and self-help purposes only and should not be construed as a substitute for professional therapy or counseling.
While any self-help techniques outlined herein may be beneficial for scam victims seeking to recover from their experience and move towards recovery, it is important to consult with a qualified mental health professional before initiating any course of action. Each individual’s experience and needs are unique, and what works for one person may not be suitable for another.
Additionally, any approach may not be appropriate for individuals with certain pre-existing mental health conditions or trauma histories. It is advisable to seek guidance from a licensed therapist or counselor who can provide personalized support, guidance, and treatment tailored to your specific needs.
If you are experiencing significant distress or emotional difficulties related to a scam or other traumatic event, please consult your doctor or mental health provider for appropriate care and support.
Also read our SCARS Institute Statement about Professional Care for Scam Victims – click here to go to our ScamsNOW.com website.










Thank you for your comment. You may receive an email to follow up. We never share your data with marketers.