5
(2)

Relationship Scams Represent a Corporate Cybersecurity and National Security Threat Because of Compromised Scam Victims

How Relationship Scam Victims Pose a National Security Threat: Manipulation, Blackmail, and Cybersecurity Risks

How Scammers Operate – A SCARS Institute Insight

Author:
•  Tim McGuinness, Ph.D., DFin, MCPO, MAnth – Anthropologist, Scientist, Director of the Society of Citizens Against Relationship Scams Inc.

Article Abstract

Scammers who engage in relationship fraud, including romance scams and cryptocurrency investment schemes, pose a significant national security risk by manipulating victims into revealing sensitive information. This risk is particularly severe for government employees, military personnel, law enforcement officers, and corporate executives who have access to classified or proprietary data. Through psychological tactics such as emotional bonding, feigning shared interests, and exploiting empathy, scammers gain victims’ trust and extract confidential details over time. In many cases, these scams are linked to state-sponsored actors from countries like China, North Korea, Iran, and Russia, who use manipulated individuals as unwitting informants.

Even after a scam is exposed, victims remain vulnerable to blackmail, where scammers threaten to reveal compromising personal or financial details unless further information is provided. This can lead to operational compromise, cybersecurity breaches, and financial exploitation, making these scams more than just personal losses—they become matters of national security. Cases have shown that individuals working in intelligence, defense, and finance have been tricked into leaking classified data, bypassing security protocols, or granting unauthorized access to networks, with devastating consequences. Preventing these risks requires stringent cybersecurity measures, awareness training, and policies that encourage victims to report without fear of professional repercussions. Recognizing the broader implications of relationship scams is essential to safeguarding both individuals and national interests.

Relationship Scams Represent a Corporate Cybersecurity and National Security Threat Because of Compromised Scam Victims - 2025

How Relationship Scam Victims Pose a National Security Threat: Manipulation, Blackmail, and Cybersecurity Risks

Relationship scams, encompassing tactics like romance frauds and cryptocurrency investment schemes, can profoundly affect victims, leading them to divulge sensitive information.

This vulnerability poses significant national security risks, particularly when targeting government employees in sectors such as the military, law enforcement, security, and finance.

Manipulation Techniques Employed by Scammers

Scammers adeptly exploit psychological tactics to extract desired information from victims. By fostering trust and emotional connections, they create environments where victims feel safe sharing confidential details. This manipulation often involves:

Emotional Bonding: Manipulating Trust to Extract Sensitive Information

Scammers understand that deep emotional connections lower a person’s natural defenses, making them more willing to share personal and professional details they would otherwise keep private. The emotional manipulation employed in relationship scams is deliberate, systematic, and highly effective. Scammers invest time in crafting a narrative that makes the victim feel valued, loved, and uniquely understood. This process can take weeks or even months, with the scammer gradually becoming an indispensable part of the victim’s life.

One of the most common tactics scammers use is the illusion of long-term commitment. They make promises about a future together, discussing marriage, family, and a life built on shared dreams. By fostering this sense of intimacy, the victim begins to trust the scammer completely, often ignoring inconsistencies or warning signs. This emotional dependency creates a strong psychological bond, making the victim more susceptible to requests for personal and professional favors.

In cases where the victim works in a sensitive profession, such as cybersecurity, military intelligence, or corporate finance, the scammer subtly steers conversations toward work-related topics. At first, this may seem like innocent curiosity—asking about work routines, general responsibilities, or frustrations with colleagues. Over time, the questions become more targeted, with scammers coaxing out specific details under the guise of casual conversation. The victim, eager to maintain their emotional connection, often does not recognize the incremental loss of sensitive information.

There have been numerous cases where intelligence agencies have linked online relationship scams to state-sponsored espionage efforts. For example, in 2018, a series of romance scams targeting Australian defense officials was traced back to foreign intelligence operatives. Victims, believing they were in long-distance relationships, unknowingly disclosed sensitive military details that compromised national security. By the time authorities intervened, the damage had already been done.

Scammers exploit the fact that humans are wired to trust those they feel emotionally connected to. Once trust is established, the victim is far more likely to comply with requests that, under normal circumstances, would seem suspicious or inappropriate.

Feigning Shared Interests: Creating a False Sense of Camaraderie

One of the most effective ways scammers manipulate victims is by pretending to have similar backgrounds, careers, or passions. This tactic, known as mirroring, creates an artificial sense of shared identity, making the victim believe they have found someone who truly understands them. The more a victim identifies with the scammer, the more likely they are to let their guard down and share personal or professional information.

Scammers conduct extensive research before engaging with a potential victim. They may analyze social media profiles, professional networking sites, or past interactions to gather data on the victim’s interests, work history, and personal beliefs. Armed with this information, they fabricate a persona that aligns closely with the victim’s world.

For example, if the victim is an engineer working on cybersecurity, the scammer might claim to be a tech entrepreneur or an ethical hacker. They discuss industry trends, share articles, and engage in technical conversations to gain credibility. Over time, the victim begins to see the scammer as a knowledgeable and trustworthy figure within their field. Once this trust is established, the scammer can start extracting valuable information under the pretense of professional curiosity or collaboration.

One high-profile case involved a British intelligence analyst who was deceived by an online scammer posing as a fellow security expert. Over several months, the scammer—allegedly linked to a foreign state actor—engaged in discussions about encryption methods, emerging cyber threats, and internal government cybersecurity strategies. The victim, believing they were exchanging harmless professional insights, inadvertently exposed vulnerabilities in national defense systems.

This technique is not limited to intelligence circles. In the corporate world, scammers pose as investors, potential business partners, or consultants to infiltrate companies and gain insider knowledge. By presenting themselves as industry experts, they gain access to trade secrets, proprietary algorithms, and corporate strategies, which can then be exploited for financial gain or competitive advantage.

Mirroring is particularly effective because it plays into the victim’s desire for validation and connection. When someone appears to share your professional struggles, ambitions, and interests, it creates a sense of camaraderie that overrides natural skepticism. The victim becomes emotionally invested in the relationship, making them more likely to disclose confidential details without recognizing the risks.

Exploiting Empathy: Using Fabricated Hardships to Manipulate Victims

Empathy is one of the most powerful human emotions, and scammers exploit it ruthlessly. By presenting themselves as victims of hardship, they trigger a deep emotional response in their targets, prompting them to take actions they might otherwise resist. Whether it is a fabricated medical emergency, a legal problem, or a tragic family loss, these false narratives serve a dual purpose—eliciting financial support and extracting sensitive information.

Scammers often introduce hardship stories early in the relationship to test the victim’s willingness to help. At first, the requests are minor, such as emotional support or assistance with an insignificant task. As the relationship progresses, the scammer escalates their claims, creating a sense of urgency and desperation. By this stage, the victim is emotionally invested and feels compelled to act.

For victims in government, law enforcement, or corporate positions, this emotional manipulation can have serious security implications. Consider the case of a U.S. Department of Defense contractor who was targeted by a scammer posing as a war refugee. The scammer claimed to be trapped in a conflict zone, needing assistance to escape. As trust deepened, the scammer convinced the victim to provide classified flight schedules and troop movement details under the pretense of helping coordinate an escape plan. The victim believed they were acting out of compassion, unaware that they were endangering national security.

Similarly, in the financial sector, scammers manipulate employees into bypassing security protocols under the guise of assisting someone in distress. A common tactic is to fabricate an emergency where the scammer needs urgent access to funds. By leveraging the victim’s empathy, they convince them to override standard verification procedures, leading to unauthorized transfers or security breaches.

One notable case involved a European banking executive who was manipulated into approving fraudulent wire transfers. The scammer, posing as a distant relative, claimed to be facing imminent deportation and needed financial assistance to secure legal representation. The victim, moved by the story, bypassed standard approval channels and authorized the transfer, only to later realize they had fallen for a well-orchestrated scam.

This form of manipulation is especially dangerous because it bypasses logical reasoning. Scammers do not directly demand sensitive information or financial favors—they create scenarios that make the victim feel morally obligated to help. The emotional pressure can be so intense that even experienced professionals fail to recognize the deception until it is too late.

Recognizing and Preventing Manipulation

Understanding how scammers exploit emotional bonding, shared interests, and empathy is the first step in preventing manipulation. Individuals working in sensitive fields must be especially cautious in online relationships, particularly when interacting with strangers who quickly form deep emotional connections.

Security protocols should emphasize the importance of verifying identities before sharing any information, regardless of how genuine a person seems. Organizations should conduct regular training on social engineering tactics, helping employees recognize the psychological techniques scammers use to gain trust.

Individuals must also be aware of their own vulnerabilities. Emotional manipulation thrives on a victim’s need for connection, validation, and purpose. By maintaining a healthy level of skepticism and setting firm boundaries in personal and professional interactions, people can protect themselves from becoming targets.

While scammers rely on deception, their success ultimately depends on the willingness of victims to trust them. By understanding the warning signs, questioning unusual requests, and prioritizing security over emotional impulses, individuals can safeguard both their personal lives and the institutions they serve.

For instance, in a notable case, an Australian couple lost their $48,000 house deposit to scammers who impersonated their solicitor’s office. The fraudsters manipulated the couple into transferring funds to a fraudulent account, showcasing the sophisticated methods employed to exploit victims’ trust.

Scammers as State Actors

In certain instances, scammers operate on behalf of state actors, including nations like North Korea, China, Iran, or Russia. These state-sponsored operations aim to gather intelligence, disrupt adversaries, or fund governmental initiatives. For example, reports have indicated that cybercriminals associated with these countries have targeted individuals to extract information or financial resources, which are then utilized to support state agendas.

Post-Scam Blackmail Tactics

After successfully executing a scam, perpetrators may resort to blackmail to extract further information or resources. Armed with compromising data or sensitive communications, scammers threaten to expose victims unless additional demands are met. This coercion can lead to:

Disclosure of Classified Information

Victims of relationship scams often find themselves in emotionally vulnerable positions, manipulated into revealing information they would typically guard closely. When the victim is a government employee, a military officer, or someone working in a sensitive industry such as cybersecurity or finance, the consequences of such disclosure can be severe. Scammers, particularly those working on behalf of state actors, use emotional manipulation, social engineering, and coercion to extract classified or restricted data.

A common tactic is to establish an intense emotional connection with the victim, making them believe they are in a genuine romantic relationship. Scammers create scenarios that require secrecy—such as an overseas lover in distress, an emergency that necessitates immediate action, or a fabricated legal problem that demands inside knowledge to resolve. In these situations, the victim, feeling responsible for their supposed partner’s well-being, may disclose restricted information in an attempt to help.

For example, in 2018, a British Ministry of Defence employee was tricked into revealing classified details about troop movements to an online persona claiming to be a U.S. military officer stationed abroad. The scammer, later linked to a foreign intelligence agency, built trust over several months before asking for seemingly innocuous but sensitive data. The victim, believing they were assisting a military ally, unknowingly compromised national security.

Scammers can also manipulate victims into sending documents, passwords, or access credentials under the pretense of verifying identity or assisting in a fabricated emergency. If the scam is linked to a state-sponsored actor, this information can be passed directly to intelligence agencies of hostile nations, further exacerbating security risks.

Financial Exploitation

Beyond the emotional and psychological toll, financial exploitation is a significant concern for victims ensnared in these scams. Scammers working for personal gain or as part of an organized group frequently exploit victims by demanding continuous financial support. In cases involving blackmail or threats of exposure, victims may feel they have no choice but to comply with these financial demands to avoid professional and personal ruin.

Financial exploitation often starts subtly, with small requests for money that escalate over time. In many cases, scammers introduce fabricated emergencies that require immediate financial assistance. Victims working in government or high-level corporate positions may divert funds from their own finances to meet these demands, leading to personal financial collapse. In extreme situations, they may misappropriate company or government funds to satisfy the scammer’s relentless financial demands, creating legal and ethical violations.

One notable example is the case of a high-ranking financial executive in Singapore who fell for an online romance scam in 2021. The scammer, posing as an affluent investor, manipulated the victim into sending large sums of money under the guise of business investments. Over time, the victim was coerced into siphoning company funds to sustain the relationship, ultimately resulting in their termination and criminal charges.

In situations involving government employees, financial coercion can also serve as a pathway to espionage. Scammers who realize their victim is in a sensitive role may demand insider information in exchange for financial relief. This is particularly dangerous when the scammer is affiliated with foreign intelligence agencies seeking economic or military intelligence.

Operational Compromise

When victims hold positions of influence in government, law enforcement, military, or corporate settings, they may be coerced into actions that undermine security. Scammers can exploit their influence to facilitate unauthorized access, sabotage operations, or enable cybersecurity breaches.

Operational compromise often occurs when a victim, desperate to prevent exposure, agrees to actions they would typically resist. This may include granting system access, bypassing security protocols, or intentionally overlooking suspicious activity. When state-sponsored actors are involved, these compromises can serve broader intelligence-gathering missions, allowing hostile nations to gain access to confidential data, disrupt operations, or weaken national security defenses.

One case illustrating operational compromise is that of a U.S. defense contractor who, in 2020, was manipulated into providing access credentials to a supposed online lover. The scammer, later linked to an Eastern European cybercrime syndicate, convinced the victim that they needed remote access to classified project data. Under emotional pressure and blackmail, the victim provided login credentials, leading to a data breach affecting sensitive military technology.

Another example involves law enforcement personnel who, under the influence of a scammer, may unknowingly obstruct investigations or provide information on ongoing cases. Scammers targeting police officers or security officials often pose as distressed individuals needing protection. Through emotional manipulation, they persuade their victims to reveal internal protocols or details about investigations, which can be used to evade capture or obstruct justice.

The risk of operational compromise extends beyond government roles. Corporate executives, particularly those in finance and technology sectors, are frequently targeted for insider access. A 2022 study on cybersecurity breaches revealed that 15% of corporate data leaks originated from employees manipulated through social engineering tactics, including relationship scams. Once compromised, these individuals may feel trapped, unable to report the breach for fear of professional repercussions.

Addressing the Threat

To mitigate the risks associated with scams that lead to classified disclosure, financial exploitation, and operational compromise, institutions must implement stringent awareness programs and cybersecurity protocols. Regular training on social engineering tactics, mandatory reporting mechanisms for suspected scams, and psychological support for victims can help prevent these breaches from occurring.

Government agencies and corporations must also adopt a proactive approach to digital security by monitoring employees for unusual financial transactions, sudden behavioral shifts, and potential online vulnerabilities. Early intervention can prevent minor incidents from escalating into full-scale breaches.

Ultimately, relationship scams are not just financial crimes—they represent a profound national security risk when victims in strategic positions are manipulated into acts that threaten security, economic stability, and confidential operations. By recognizing the tactics scammers use and strengthening protective measures, both individuals and institutions can reduce vulnerabilities and protect critical information from falling into the wrong hands.

In a recent incident, an elderly couple from Ohio lost $45,000 of their retirement savings to scammers posing as bank officials. The fraudsters manipulated the couple into withdrawing their funds and delivering them to a supposed bank executive, highlighting the lengths to which scammers will go to exploit victims.

Facilitating Cybersecurity Breaches

Scammers often manipulate victims into actions that compromise cybersecurity, such as:

  • Installing Malware: Convincing victims to download attachments or click links that introduce malicious software into secure systems.

  • Sharing Credentials: Deceiving victims into providing login information, granting unauthorized access to sensitive networks.

  • Bypassing Security Protocols: Persuading victims to disable security measures, leaving systems vulnerable to attacks.

For example, a sophisticated scam operation based in Tbilisi, Georgia, known as the “skameri,” used deepfakes and high-pressure sales tactics to defraud over 6,000 individuals, resulting in losses totaling £27 million. The scammers lured victims into investing in fraudulent schemes, demonstrating the advanced methods employed to breach cybersecurity defenses.

Conclusion

The intersection of relationship scams and national security is a growing concern. Scammers’ ability to manipulate victims into divulging sensitive information poses significant risks, especially when state actors are involved. Awareness and proactive measures are essential to mitigate these threats and protect both individuals and national interests.

Corporate and Institutional Support

The SCARS Institute team of world-case experts in the Psychology of Scams and in understanding scam victims, having helped more than 11 million scam victims, can help corporations, organizations, and institutions to harden their teams against scams and scam victimization. If you would like to explore this in more detail contact Dr. McGuinness at drtim@AgainstScams.org to explore your needs and potential SCARS Institute solutions.

Please Rate This Article

How useful was this post?

Click on a star to rate it!

Average rating 5 / 5. Vote count: 2

No votes so far! Be the first to rate this post.

As you found this post useful...

Follow us on social media!

We are sorry that this post was not useful for you!

Let us improve this post!

Tell us how we can improve this post?

Please Leave Us Your Comment
Also, tell us of any topics we might have missed.

Leave a Reply

Your comments help the SCARS Institute better understand all scam victim/survivor experiences and improve our services and processes. Thank you

Your email address will not be published. Required fields are marked *

Thank you for your comment. You may receive an email to follow up. We never share your data with marketers.

We Also Recommend These Articles

Recent Reader Comments

Important Information for New Scam Victims

If you are looking for local trauma counselors please visit counseling.AgainstScams.org or join SCARS for our counseling/therapy benefit: membership.AgainstScams.org

If you need to speak with someone now, you can dial 988 or find phone numbers for crisis hotlines all around the world here: www.opencounseling.com/suicide-hotlines

A Question of Trust

At the SCARS Institute, we invite you to do your own research on the topics we speak about and publish, Our team investigates the subject being discussed, especially when it comes to understanding the scam victims-survivors experience. You can do Google searches but in many cases, you will have to wade through scientific papers and studies. However, remember that biases and perspectives matter and influence the outcome. Regardless, we encourage you to explore these topics as thoroughly as you can for your own awareness.

SCARS Resources:

-/ 30 /-

What do you think about this?
Please share your thoughts in a comment below!

Legal Disclaimer:

The content provided on this platform regarding psychological topics is intended solely for educational and entertainment purposes. The publisher makes no representations or warranties regarding the accuracy or completeness of the information presented. The content is designed to raise awareness about various psychological subjects, and readers are strongly encouraged to conduct their own research and verify information independently.

The information presented does not constitute professional advice, diagnosis, or treatment of any psychological disorder or disease. It is not a substitute for professional medical or mental health advice, diagnosis, or treatment. Readers are advised to seek the guidance of a licensed medical professional for any questions or concerns related to their mental health.

The publisher disclaims any responsibility for actions taken or not taken based on the content provided. The treatment of psychological issues is a serious matter, and readers should consult with qualified professionals to address their specific circumstances. The content on this platform is not intended to create, and receipt of it does not constitute, a therapist-client relationship.

Interpretation and Definitions

Definitions

For the purposes of this Disclaimer:

  • Company (referred to as either “the Company”, “We”, “Us” or “Our” in this Disclaimer) refers to Society of Citizens Against Relationship Scams Inc. (registered d.b.a. “SCARS”,) 9561 Fountainbleau Blvd., Suit 602, Miami FL 33172.
  • Service refers to the Website.
  • You means the individual accessing this website, or the company, or other legal entity on behalf of which such individual is accessing or using the Service, as applicable.
  • Website refers to RomanceScamsNOW.com, accessible from https://romancescamsnow.com

Website Disclaimer

The information contained on this website is for general information purposes only.

The Company assumes no responsibility for errors or omissions in the contents of the Service.

In no event shall the Company be liable for any special, direct, indirect, consequential, or incidental damages or any damages whatsoever, whether in an action of contract, negligence or other tort, arising out of or in connection with the use of the Service or the contents of the Service. The Company reserves the right to make additions, deletions, or modifications to the contents on the Service at any time without prior notice.

The Company does not warrant this website in any way.

External Links Disclaimer

This website may contain links to external websites that are not provided or maintained by or in any way affiliated with the Company.

Please note that the Company does not guarantee the accuracy, relevance, timeliness, or completeness of any information on these external websites.

Errors and Omissions Disclaimer

The information given by SCARS is for general guidance on matters of interest only. Even if the Company takes every precaution to ensure that the content of this website is both current and accurate, errors can occur. Plus, given the changing nature of laws, rules, and regulations, there may be delays, omissions, or inaccuracies in the information contained on this website.

SCARS is not responsible for any errors or omissions, or for the results obtained from the use of this information.

Fair Use Disclaimer

SCARS may use copyrighted material that has not always been specifically authorized by the copyright owner. The Company is making such material available for criticism, comment, news reporting, teaching, scholarship, or research.

The Company believes this constitutes a “fair use” of any such copyrighted material as provided for in section 107 of the United States Copyright law.

If You wish to use copyrighted material from this website for your own purposes that go beyond fair use, You must obtain permission from the copyright owner.

Views Expressed Disclaimer

The Service may contain views and opinions which are those of the authors and do not necessarily reflect the official policy or position of any other author, agency, organization, employer, or company, including SCARS.

Comments published by users are their sole responsibility and the users will take full responsibility, liability, and blame for any libel or litigation that results from something written in or as a direct result of something written in a comment. The Company is not liable for any comment published by users and reserves the right to delete any comment for any reason whatsoever.

No Responsibility Disclaimer

The information on the Service is provided with the understanding that the Company is not herein engaged in rendering legal, accounting, tax, medical or mental health, or other professional advice and services. As such, it should not be used as a substitute for consultation with professional accounting, tax, legal, medical or mental health, or other competent advisers.

In no event shall the Company, its team, board of directors, volunteers, or its suppliers be liable for any special, incidental, indirect, or consequential damages whatsoever arising out of or in connection with your access or use or inability to access or use the Service.

“Use at Your Own Risk” Disclaimer

All information on this website is provided “as is”, with no guarantee of completeness, accuracy, timeliness or of the results obtained from the use of this information, and without warranty of any kind, express or implied, including, but not limited to warranties of performance, merchantability, and fitness for a particular purpose.

SCARS will not be liable to You or anyone else for any decision made or action taken in reliance on the information given by the Service or for any consequential, special, or similar damages, even if advised of the possibility of such damages.

Contact Us

If you have any questions about this Disclaimer, You can contact Us:

  • By email: contact@AgainstScams.org

PLEASE NOTE: Psychology Clarification

The following specific modalities within the practice of psychology are restricted to psychologists appropriately trained in the use of such modalities:

  • Diagnosis: The diagnosis of mental, emotional, or brain disorders and related behaviors.
  • Psychoanalysis: Psychoanalysis is a type of therapy that focuses on helping individuals to understand and resolve unconscious conflicts.
  • Hypnosis: Hypnosis is a state of trance in which individuals are more susceptible to suggestion. It can be used to treat a variety of conditions, including anxiety, depression, and pain.
  • Biofeedback: Biofeedback is a type of therapy that teaches individuals to control their bodily functions, such as heart rate and blood pressure. It can be used to treat a variety of conditions, including stress, anxiety, and pain.
  • Behavioral analysis: Behavioral analysis is a type of therapy that focuses on changing individuals’ behaviors. It is often used to treat conditions such as autism and ADHD.
    Neuropsychology: Neuropsychology is a type of psychology that focuses on the relationship between the brain and behavior. It is often used to assess and treat cognitive impairments caused by brain injuries or diseases.

SCARS and the members of the SCARS Team do not engage in any of the above modalities in relationship to scam victims. SCARS is not a mental healthcare provider and recognizes the importance of professionalism and separation between its work and that of the licensed practice of psychology.

SCARS is an educational provider of generalized self-help information that individuals can use for their own benefit to achieve their own goals related to emotional trauma. SCARS recommends that all scam victims see professional counselors or therapists to help them determine the suitability of any specific information or practices that may help them.

SCARS cannot diagnose or treat any individuals, nor can it state the effectiveness of any educational information that it may provide, regardless of its experience in interacting with traumatized scam victims over time. All information that SCARS provides is purely for general educational purposes to help scam victims become aware of and better understand the topics and to be able to dialog with their counselors or therapists.

It is important that all readers understand these distinctions and that they apply the information that SCARS may publish at their own risk, and should do so only after consulting a licensed psychologist or mental healthcare provider.

SCARS IS A DIGITAL PUBLISHER AND DOES NOT OFFER HEALTH OR MEDICAL ADVICE, LEGAL ADVICE, FINANCIAL ADVICE, OR SERVICES THAT SCARS IS NOT LICENSED OR REGISTERED TO PERFORM.

IF YOU’RE FACING A MEDICAL EMERGENCY, CALL YOUR LOCAL EMERGENCY SERVICES IMMEDIATELY, OR VISIT THE NEAREST EMERGENCY ROOM OR URGENT CARE CENTER. YOU SHOULD CONSULT YOUR HEALTHCARE PROVIDER BEFORE FOLLOWING ANY MEDICALLY RELATED INFORMATION PRESENTED ON OUR PAGES.

ALWAYS CONSULT A LICENSED ATTORNEY FOR ANY ADVICE REGARDING LEGAL MATTERS.

A LICENSED FINANCIAL OR TAX PROFESSIONAL SHOULD BE CONSULTED BEFORE ACTING ON ANY INFORMATION RELATING TO YOUR PERSONAL FINANCES OR TAX RELATED ISSUES AND INFORMATION.

SCARS IS NOT A PRIVATE INVESTIGATOR – WE DO NOT PROVIDE INVESTIGATIVE SERVICES FOR INDIVIDUALS OR BUSINESSES. ANY INVESTIGATIONS THAT SCARS MAY PERFORM IS NOT A SERVICE PROVIDED TO THIRD-PARTIES. INFORMATION REPORTED TO SCARS MAY BE FORWARDED TO LAW ENFORCEMENT AS SCARS SEE FIT AND APPROPRIATE.

This content and other material contained on the website, apps, newsletter, and products (“Content”), is general in nature and for informational purposes only and does not constitute medical, legal, or financial advice; the Content is not intended to be a substitute for licensed or regulated professional advice. Always consult your doctor or other qualified healthcare provider, lawyer, financial, or tax professional with any questions you may have regarding the educational information contained herein. SCARS makes no guarantees about the efficacy of information described on or in SCARS’ Content. The information contained is subject to change and is not intended to cover all possible situations or effects. SCARS does not recommend or endorse any specific professional or care provider, product, service, or other information that may be mentioned in SCARS’ websites, apps, and Content unless explicitly identified as such.

The disclaimers herein are provided on this page for ease of reference. These disclaimers supplement and are a part of SCARS’ website’s Terms of Use. 

All original content is Copyright © 1991 – 2023 Society of Citizens Against Relationship Scams Inc. (Registered D.B.A SCARS) All Rights Reserved Worldwide & Webwide. Third-party copyrights acknowledge.

U.S. State of Florida Registration Nonprofit (Not for Profit) #N20000011978 [SCARS DBA Registered #G20000137918] – Learn more at www.AgainstScams.org

View the claimed and or registered indicia, service marks, and trademarks of Society of Citizens Against Relationship Scams Inc., All Rights Reserved Worldwide

Contact the law firm for the Society of Citizens Against Relationship Scams Incorporated by email at legal@AgainstScams.org

How useful was this post?

Click on a star to rate it!

Average rating 5 / 5. Vote count: 2

No votes so far! Be the first to rate this post.

As you found this post useful...

Follow us on social media!

We are sorry that this post was not useful for you!

Let us improve this post!

Tell us how we can improve this post?