Scam Victim’s Guide on How To Guard Against Identity Theft After a Scam
How to Guard Against Identity Theft in the Context of Scams, Fraud, and Cybercrime – a Guide for Scam Victims & Survivors
Identity Theft – A SCARS Institute Guide
Author:
• Tim McGuinness, Ph.D., DFin, MCPO, MAnth – Anthropologist, Scientist, Director of the Society of Citizens Against Relationship Scams Inc.
Article Abstract
Scam victims face heightened risks of identity theft, as scammers often collect and exploit sensitive personal information to commit further fraud. Identity thieves use stolen data in various ways, including financial fraud, opening fraudulent accounts, impersonation, and selling information on the dark web. Recognizing common schemes such as phishing, fake job offers, or tech support scams, and taking preventive measures like monitoring financial accounts, securing documents, and enabling two-factor authentication, are essential steps to mitigate risks.
Additionally, responding proactively to data breaches and staying vigilant about personal information can help victims protect themselves from the lasting consequences of identity theft. Recovery is challenging, but with awareness and proper precautions, victims can regain control and safeguard their financial and personal well-being.
How to Guard Against Identity Theft in the Context of Scams, Fraud, and Cybercrime – a Guide for Scam Victims & Survivors
Identity theft is a pervasive threat, especially for individuals targeted by scams, fraud, and cybercrime. It can lead to devastating financial losses, reputational damage, and emotional distress. Protecting yourself requires a combination of vigilance, proactive measures, and an understanding of how identity thieves operate. Below is a thorough guide to help you safeguard against identity theft.
Why Scam Victims Should Be Concerned About Identity Theft
Falling victim to a scam is not just a one-time event—it can have lasting consequences, particularly when it comes to identity theft. Scammers often aim to collect sensitive personal information, such as Social Security numbers, bank account details, or passwords, which can be used or sold to commit further fraud. For scam victims, the risk of identity theft increases significantly because their data has already been exposed to individuals with malicious intent. This can lead to unauthorized financial transactions, the opening of fraudulent accounts, and damage to credit, all of which can take years to fully resolve. Understanding and addressing the potential for identity theft after a scam is crucial for mitigating these risks and protecting your financial and personal well-being.
Recognize Common Identity Theft Schemes
Identity thieves use various schemes to exploit victims. Among the most common are impersonation scams and fraudulent employment offers. Impersonation scams involve criminals posing as legitimate representatives from trusted organizations, such as banks, government agencies, or well-known companies, to trick individuals into sharing sensitive information like Social Security numbers, account details, or passwords. Fraudulent employment scams often entice victims with high-paying job offers or work-from-home opportunities, asking for personal information under the pretense of completing background checks or payroll forms. Recognizing these schemes is the first step in avoiding them—always verify the identity of the requester and the legitimacy of the communication.
25 Common Identity Theft Schemes that Target Previous Scam Victims
Here are 25 common identity theft schemes that specifically target scam victims. Some may be a repeat of the previous scam allowing the scammer to obtain more information or money.
- Phishing Scams: Victims are tricked into providing sensitive information through fake emails or websites.
- Fake Job Offers: Scammers pose as employers offering jobs and request Social Security numbers, bank details, or other personal data.
- Lottery or Prize Scams: Victims are told they’ve won a prize but must provide personal or financial information to claim it.
- Impersonation Scams: Fraudsters pretend to be government officials, banks, or tech support to extract sensitive information.
- Romance Scams: Scammers build trust in a fake relationship to persuade victims to share personal data or financial details.
- Charity Scams: Victims are asked to donate to fake charities and provide payment details that can be exploited.
- Overpayment Scams: Scammers overpay for an item or service and ask victims to refund the difference, often requiring personal banking details.
- Fake Debt Collection: Scammers claim victims owe money and demand payment with sensitive financial data.
- Online Marketplace Fraud: Scammers pose as buyers or sellers, requesting personal information to finalize fake transactions.
- Investment Scams: Victims are lured into fake investment opportunities and asked to provide personal and financial data.
- Tech Support Scams: Fraudsters claim the victim’s computer has a problem and request remote access or payment information.
- Identity Verification Scams: Victims are asked to verify their identity for a fake service or account recovery, leading to stolen details.
- Subscription Traps: Scammers offer free trials that require personal or credit card information, which they then misuse.
- Fake Utility Scams: Fraudsters claim the victim’s utilities will be shut off unless immediate payment is made, collecting personal and payment details.
- Online Dating Blackmail: Scammers threaten to share private information collected during fake online relationships unless paid.
- Imposter Family Member Scams: Victims are told a family member is in trouble and must provide personal information to “help.”
- Social Media Scams: Fraudsters impersonate friends or followers to extract personal information through direct messaging.
- Fake Charity GoFundMe Campaigns: Scammers create fraudulent fundraising campaigns to collect victims’ payment information.
- Scholarship Scams: Victims are asked for personal details to apply for fake scholarships or financial aid.
- Rental Scams: Fraudulent landlords request Social Security numbers and financial details for fake rental applications.
- Fake Check Scams: Victims deposit fake checks and provide personal banking information to “process refunds.”
- Cryptocurrency Scams: Victims are lured into fake crypto investments requiring sensitive account access.
- Loan Scams: Scammers offer low-interest loans and require victims to provide personal data for “approval.”
- Business Email Compromise (BEC): Victims working in businesses are targeted with fake emails requesting sensitive company or employee data.
- Utility Account Takeover: Scammers gain access to victims’ utility accounts to create new fraudulent accounts or reroute bills.
These schemes leverage the initial psychological impact of deception and betrayal of a scam to extract further personal information or commit additional fraud against victims.
How Do Scammers Exploit the Data They Obtain During a Scam?
Scammers exploit the data they obtain during a scam in numerous ways, often depending on the type of information they’ve collected. Here are the most common methods:
1. Financial Fraud
Scammers use stolen financial details like credit card numbers, bank account information, or online banking credentials to:
-
-
- Make unauthorized purchases: Buying goods or services online or in-person.
- Withdraw cash: Using bank accounts or ATMs if they have PINs or other account access details.
- Transfer funds: Moving money from victims’ accounts to their own or laundering it through mule accounts.
-
2. Opening Fraudulent Accounts
Using personal details such as names, addresses, Social Security numbers, and birthdates, scammers can:
-
-
- Open credit card accounts: Running up large balances in the victim’s name.
- Set up utility accounts: Establishing services like electricity, phone, or internet.
- Apply for loans: Taking out personal, payday, or student loans that victims are then liable for.
-
3. Identity Theft
With sufficient personal information, scammers can impersonate victims to:
-
-
- Commit tax fraud: Filing fraudulent tax returns to claim refunds.
- Obtain medical services: Using insurance details to access healthcare or purchase prescription drugs.
- Commit social security fraud: Stealing benefits or creating fake identities using real SSNs.
-
4. Selling Information on the Dark Web
Scammers often monetize stolen data by selling it to other criminals on the dark web. This includes:
-
-
- Personal information packages: Bundles containing names, addresses, SSNs, and credit card details.
- Login credentials: Usernames and passwords for online banking, email, or social media accounts.
-
5. Blackmail and Extortion
Scammers use sensitive or embarrassing information to:
-
-
- Demand money: Threatening to release private data unless a ransom is paid.
- Exploit victims further: Coercing victims into providing additional information or funds.
-
6. Account Takeovers
Scammers use login credentials to:
-
-
- Access email accounts: Intercepting personal or business communications.
- Hijack social media: Posting malicious content, contacting friends, or spreading further scams.
- Control e-commerce accounts: Ordering goods or accessing stored payment methods.
-
7. Fraudulent Employment
Scammers can use stolen personal details to:
-
-
- Pass background checks: Using victims’ identities to obtain jobs, especially in regulated industries.
- Commit payroll fraud: Redirecting wages to fraudulent accounts.
-
8. Facilitating Further Scams
The information obtained can be leveraged to make future scams more convincing, such as:
-
-
- Phishing campaigns: Using known details to create personalized, believable phishing messages.
- Pretexting: Pretending to know victims personally to gain additional trust and data.
-
9. Credit Score Damage
-
-
- Scammers open fraudulent accounts, rack up unpaid debts, or default on loans, which can severely damage the victim’s credit score and financial reputation.
-
10. Tax Identity Fraud
Scammers use stolen Social Security numbers and personal information to:
-
-
- Claim fraudulent tax refunds: Filing fake returns in the victim’s name.
- Receive government benefits: Accessing unemployment or social assistance programs.
-
11. Illegal Activities and Money Laundering
Scammers use stolen identities to:
-
-
- Set up fake businesses: Using victims’ details to establish entities for laundering money.
- Commit criminal acts: Ensuring their real identities are not tied to illegal activities.
-
12. Exploiting Medical Records
With access to medical information, scammers can:
-
-
- Commit insurance fraud: Filing fraudulent claims or creating fake insurance accounts.
- Steal prescription drugs: Using stolen data to order controlled substances.
-
13. Misusing Child Identities
Children’s information, especially Social Security numbers, is valuable for:
-
-
- Creating new identities: Opening accounts, obtaining loans, or committing fraud unnoticed for years.
-
14. Business Espionage
If scammers gain access to business-related data, they can:
-
-
- Steal trade secrets: Selling sensitive business information to competitors.
- Commit financial fraud: Embezzling funds or committing invoice fraud.
-
15. Facilitating Unauthorized Immigration
-
-
- Scammers may sell stolen identities to individuals seeking illegal entry into a country or for other purposes such as employment.
-
16. Harassment and Stalking
Personal information can be used to:
-
-
- Harass victims: Sending threatening messages or making unwanted calls.
- Track locations: Using stolen data to identify where victims live or work.
-
17. Social Engineering
Detailed personal data is valuable for:
-
-
- Building trust: Making social engineering attacks, such as pretending to be a trusted authority, more convincing.
- Exploiting relationships: Manipulating victims into providing further sensitive information.
-
Scammers are adept at exploiting the data they steal in multiple ways, often layering their methods to extract the maximum value from their victims. Understanding these risks emphasizes the importance of taking immediate action to protect yourself after a scam.
Implement Preventive Measures
Monitor Financial Accounts
Regularly review your financial accounts for unauthorized transactions. This simple habit can help you detect suspicious activity early and limit potential damage. Many banks and credit card providers offer free alerts for unusual transactions. Enrolling in these services can further enhance your vigilance.
Secure Personal Documents
Sensitive documents, such as birth certificates, Social Security cards, and passports, should always be stored securely. Avoid carrying these items unless absolutely necessary. Investing in a home safe or a safety deposit box can add an extra layer of security, ensuring these critical documents are not easily accessible to others.
Shred Sensitive Materials
Identity thieves often retrieve personal information from discarded documents. Shred old bills, bank statements, medical records, and other paperwork containing sensitive data before throwing them away. Cross-cut shredders are particularly effective, as they make it nearly impossible to reconstruct documents.
Use Strong, Unique Passwords
Strong passwords are a cornerstone of online security. Create passwords with a mix of upper and lowercase letters, numbers, and symbols, avoiding easily guessed words like birthdays or pet names. Additionally, never reuse passwords across multiple accounts. Using a password manager can simplify this process while keeping your credentials secure.
Enable Two-Factor Authentication (2FA)
Two-factor authentication (2FA) adds an extra layer of protection by requiring a second form of verification, such as a text message code or biometric scan, in addition to your password. Enable 2FA wherever possible, particularly for banking, email, and social media accounts, to reduce the likelihood of unauthorized access.
Be Cautious with Public Wi-Fi
Public Wi-Fi networks are convenient but often lack robust security measures. Avoid accessing sensitive accounts, such as online banking, when connected to public Wi-Fi. If necessary, use a virtual private network (VPN) to encrypt your data and protect it from hackers who may be monitoring the network.
Responding to Identity Theft
What to Do If Your Personal Information Is Involved in a Data Breach
Data breaches are increasingly common, exposing personal information to unauthorized access. If your personal information is compromised in a breach, immediate and strategic actions can help mitigate the damage. Below is a detailed guide on what steps to take if you are affected by a data breach.
1. Confirm the Breach and Understand Its Scope
The first step is to verify that your information has indeed been compromised. Breached organizations often notify affected individuals directly via email or letter. If you suspect a breach but haven’t been notified, check credible sources like Have I Been Pwned to confirm. Understand the type of information exposed, whether it’s email addresses, Social Security numbers, passwords, or financial data, as this will determine the necessary steps to protect yourself.
Once you’ve confirmed the breach, visit the organization’s website or contact their customer service to learn about any remedies they’re offering, such as free credit monitoring services. Understanding the scope of the breach is crucial to prioritizing your actions effectively.
2. Change and Strengthen Compromised Passwords
If passwords were part of the exposed data, immediately change them on the affected accounts. Use unique, strong passwords that combine uppercase and lowercase letters, numbers, and special characters. Avoid reusing passwords across multiple accounts. If the breached account shares a password with other services, update those as well to prevent hackers from exploiting reused credentials. Using a password manager can streamline the process of creating and storing secure passwords.
Additionally, enable two-factor authentication (2FA) on all accounts that offer it. This adds an extra layer of security, requiring a secondary form of verification beyond just a password.
3. Monitor Your Financial Accounts
If financial information, such as credit card numbers or bank account details, was compromised, carefully review your financial statements for unauthorized transactions. Report any suspicious activity to your bank or credit card provider immediately. Most financial institutions have fraud protection measures and can assist you in disputing charges or issuing replacement cards.
Consider placing alerts on your accounts to be notified of transactions over a specific amount. This proactive step ensures that you’re aware of potentially fraudulent activities as they occur.
4. Place a Fraud Alert or Credit Freeze
For breaches involving Social Security numbers or other sensitive identifiers, consider placing a fraud alert on your credit file. Fraud alerts notify creditors to take additional steps to verify your identity before opening new accounts in your name. You can request a fraud alert for free from any of the three major credit bureaus—Experian, TransUnion, or Equifax—and the alert will automatically extend to the other two.
Alternatively, you can implement a credit freeze, which restricts access to your credit file. This prevents creditors from pulling your report to approve new credit applications. A credit freeze can be lifted temporarily or permanently, giving you control over who accesses your credit.
5. File a Report with the Federal Trade Commission (FTC)
If you suspect identity theft as a result of the data breach, file a report with the FTC at IdentityTheft.gov. This provides you with an official report and a personalized recovery plan to help you navigate the process of resolving any fraudulent accounts or disputes. An FTC report is often required when dealing with creditors or law enforcement.
6. Use Free Credit Monitoring Services
Many organizations affected by data breaches offer free credit monitoring to impacted individuals. Take advantage of these services to monitor your credit report for unusual activity, such as hard inquiries or new accounts you didn’t authorize. Credit monitoring services provide alerts in real-time, enabling you to act quickly if suspicious activity occurs.
If the breached organization doesn’t provide this service, consider signing up for a reputable credit monitoring service on your own.
7. Be Alert for Phishing Scams
After a breach, scammers may attempt to exploit victims through phishing emails or calls that impersonate the breached organization. These fraudulent communications often aim to steal additional information or install malware. Be cautious of unsolicited messages asking for personal data or instructing you to click on links. Verify the legitimacy of all communications directly with the organization through official channels.
8. Regularly Review Credit Reports
Check your credit reports regularly for signs of unauthorized activity. By law, you are entitled to one free credit report annually from each of the three major credit bureaus. In response to COVID-19, credit reports are currently available for free weekly through AnnualCreditReport.com. Reviewing your credit report allows you to catch unfamiliar accounts, unauthorized hard inquiries, or inaccuracies in your personal information.
9. Replace Compromised IDs or Account Numbers
If critical identifiers like a driver’s license, passport, or account numbers are exposed, contact the issuing authorities to replace them. For Social Security numbers, while replacements are rarely granted, monitor your SSN for misuse and report any fraudulent activity to the Social Security Administration.
10. Stay Informed About Future Breaches
Data breaches often expose individuals to ongoing risks. Stay informed about new breaches by subscribing to alerts from credible sources, such as cybersecurity news outlets or credit monitoring services. Awareness is key to responding promptly if your information is compromised again in the future.
Taking swift and comprehensive action after a data breach can significantly reduce the risks of identity theft and financial harm. By following these steps, you can protect yourself and minimize the long-term impact of compromised personal information.
Even If You Are Not Yet a Victim of Identity Theft
Stay Informed and Vigilant
Educate Yourself
Staying informed about the latest scam tactics and identity theft trends is essential. Cybercriminals continually adapt their methods, so understanding common schemes can help you recognize red flags and avoid falling victim. Subscribe to alerts from reputable organizations, such as the FTC or cybersecurity firms, to stay updated.
Regularly Check Credit Reports
Your credit report is a valuable tool for detecting identity theft. By law, you are entitled to one free credit report annually from each of the three major credit bureaus. Review these reports for unfamiliar accounts, hard inquiries, or inaccurate personal information, and dispute any discrepancies immediately.
Exercise Caution with Personal Information
Be cautious when sharing personal information, whether online, over the phone, or in person. Verify the identity of anyone requesting sensitive data, and never provide such information through unsolicited communications. Social media platforms are also a common source of data for scammers; limit the amount of personal information you share publicly.
By implementing these strategies and remaining vigilant, you can significantly reduce your risk of falling victim to identity theft. Protecting your personal information is an ongoing process, but the peace of mind it provides is well worth the effort.
Conclusion
Guarding against identity theft is essential for scam victims and survivors, as the aftermath of scams often includes an elevated risk of further fraud. Scammers are adept at exploiting compromised data to perpetuate financial crimes, impersonations, and other forms of deception, leaving victims to bear the long-term consequences. By understanding the risks, recognizing common schemes, and implementing proactive security measures, you can regain control and protect yourself from additional harm.
Whether you’re responding to a recent scam or taking preventive steps for the future, vigilance is key. Monitor your accounts regularly, secure sensitive information, and stay informed about emerging threats. Additionally, take advantage of resources such as free credit reports, fraud alerts, and tools like two-factor authentication to strengthen your defenses.
While recovering from a scam can be challenging, knowing how to safeguard your personal information is a powerful step toward regaining confidence and peace of mind. By remaining proactive and aware, you can minimize the risk of identity theft and protect your financial and personal well-being.
Please Leave Us Your Comment
Also, tell us of any topics we might have missed.
Thank you for your comment. You may receive an email to follow up. We never share your data with marketers.
Recent Reader Comments
- on SCARS Position Statement Against Scambaiting: “It is important to stay informed and receive support from reliable sources such as SCARS.” Dec 11, 18:21
- on How To Know If You Are In Scam or Recovery Denial?: “Very useful information not just for us as crime victims but also to support those we care about.” Dec 11, 10:17
- on Scam Victim Recovery Fatigue: “The false sense of recovery is real. I had it way before I actually started my recovery journey. The physical…” Dec 10, 22:56
- on Chasing The Money After A Scam: “Dwelling on the money lost increased my stress and feelings of guilt and shame, preventing me from engaging in recovery.…” Dec 9, 23:12
- on Scam Victim Identity Crisis: “One of the things I realized through an identity crisis I had after the scam was that I am a…” Dec 3, 22:52
- on Major General John R. Evans, U.S. Army – Impersonation Victim: “This man also goes by the name of Evans McCoy and I was a victim.” Dec 1, 17:50
- on Airlords/Air Lords African Crime Group Organization – Violent Crime & Cybercrime Gang – 2024: “Peter, please visit www.ScamVictimsSupport.org to begin learning how to recover form this. We are here to help you.” Nov 28, 18:31
- on Report Scammers: “Did you get help after the scam? Please visit www.ScamVictimsSupport.org to get the right information to start your recovery.” Nov 28, 18:30
- on Report Scammers: “On May 9 2024 ENIOLA AKINOLA scam my email and took my money that was supposed to go into my…” Nov 28, 04:23
- on Airlords/Air Lords African Crime Group Organization – Violent Crime & Cybercrime Gang – 2024: “I too am currently a victim of a relationship scam” Nov 27, 16:15
Important Information for New Scam Victims
- Please visit www.ScamVictimsSupport.org – a SCARS Website for New Scam Victims & Sextortion Victims
- Enroll in FREE SCARS Scam Survivor’s School now at www.SCARSeducation.org
- Please visit www.ScamPsychology.org – to more fully understand the psychological concepts involved in scams and scam victim recovery
If you are looking for local trauma counselors please visit counseling.AgainstScams.org or join SCARS for our counseling/therapy benefit: membership.AgainstScams.org
If you need to speak with someone now, you can dial 988 or find phone numbers for crisis hotlines all around the world here: www.opencounseling.com/suicide-hotlines
A Question of Trust
At the SCARS Institute, we invite you to do your own research on the topics we speak about and publish, Our team investigates the subject being discussed, especially when it comes to understanding the scam victims-survivors experience. You can do Google searches but in many cases, you will have to wade through scientific papers and studies. However, remember that biases and perspectives matter and influence the outcome. Regardless, we encourage you to explore these topics as thoroughly as you can for your own awareness.
A Note About Labeling!
We often use the term ‘scam victim’ in our articles, but this is a convenience to help those searching for information in search engines like Google. It is just a convenience and has no deeper meaning. If you have come through such an experience, YOU are a Survivor! It was not your fault. You are not alone! Axios!
Statement About Victim Blaming
Some of our articles discuss various aspects of victims. This is both about better understanding victims (the science of victimology) and their behaviors and psychology. This helps us to educate victims/survivors about why these crimes happened and to not blame themselves, better develop recovery programs, and to help victims avoid scams in the future. At times this may sound like blaming the victim, but it does not blame scam victims, we are simply explaining the hows and whys of the experience victims have.
These articles, about the Psychology of Scams or Victim Psychology – meaning that all humans have psychological or cognitive characteristics in common that can either be exploited or work against us – help us all to understand the unique challenges victims face before, during, and after scams, fraud, or cybercrimes. These sometimes talk about some of the vulnerabilities the scammers exploit. Victims rarely have control of them or are even aware of them, until something like a scam happens and then they can learn how their mind works and how to overcome these mechanisms.
Articles like these help victims and others understand these processes and how to help prevent them from being exploited again or to help them recover more easily by understanding their post-scam behaviors. Learn more about the Psychology of Scams at www.ScamPsychology.org
SCARS Resources:
- Getting Started Right: ScamVictimsSupport.org
- Sextortion Scam Victims: Sextortion Victims Support – The Essentials (scamvictimssupport.org)
- For New Victims of Relationship Scams newvictim.AgainstScams.org
- Subscribe to SCARS Newsletter newsletter.againstscams.org
- Sign up for SCARS professional support & recovery groups, visit support.AgainstScams.org
- Join our Scam Survivors United Chat & Discussion Group facebook.com/groups/scam.survivors.united
- Find competent trauma counselors or therapists, visit counseling.AgainstScams.org
- Become a SCARS Member and get free counseling benefits, visit membership.AgainstScams.org
- Report each and every crime, learn how to at reporting.AgainstScams.org
- Learn more about Scams & Scammers at RomanceScamsNOW.com and ScamsNOW.com
- Scammer photos ScammerPhotos.com
- SCARS Videos youtube.AgainstScams.org
- Self-Help Books for Scam Victims are at shop.AgainstScams.org
- Worldwide Crisis Hotlines: https://blog.opencounseling.com/suicide-hotlines/
Other Cyber Resources
- Block Scam Domains: Quad9.net
- Global Cyber Alliance ACT Cybersecurity Tool Website: Actionable Cybersecurity Tools (ACT) (globalcyberalliance.org) https://act.globalcyberalliance.org/index.php/Actionable_Cybersecurity_Tools_(ACT)_-_Simplified_Cybersecurity_Protection
- Wizer Cybersecurity Training – Free Security Awareness Training, Phishing Simulation and Gamification (wizer-training.com)
Psychology Disclaimer:
All articles about psychology and the human brain on this website are for information & education only
The information provided in this article is intended for educational and self-help purposes only and should not be construed as a substitute for professional therapy or counseling.
While any self-help techniques outlined herein may be beneficial for scam victims seeking to recover from their experience and move towards recovery, it is important to consult with a qualified mental health professional before initiating any course of action. Each individual’s experience and needs are unique, and what works for one person may not be suitable for another.
Additionally, any approach may not be appropriate for individuals with certain pre-existing mental health conditions or trauma histories. It is advisable to seek guidance from a licensed therapist or counselor who can provide personalized support, guidance, and treatment tailored to your specific needs.
If you are experiencing significant distress or emotional difficulties related to a scam or other traumatic event, please consult your doctor or mental health provider for appropriate care and support.
Also read our SCARS Institute Statement about Professional Care for Scam Victims – click here to go to our ScamsNOW.com website.
If you are in crisis, feeling desperate, or in despair please call 988 or your local crisis hotline.
-/ 30 /-
What do you think about this?
Please share your thoughts in a comment below!
To Learn More Also Look At Our Article Catalogs
Scam & Crime Types
More SCARS
- ScamsNOW Magazine – ScamsNOW.com
- ContraEstafas.org
- ScammerPhotos.com
- AnyScam.com – reporting
- AgainstScams.org – SCARS Corporate Website
- SCARS YouTube Video Channel
Leave a Reply