Social Engineering – An Updated Overview – 2024

Social Engineering – An Updated Overview – 2024

Social Engineering is an Approach to Psychological and Neurologic Manipulation that can be done for Good or Bad and is at the Heart of Marketing, Politics, and Crime – Especially Cybercrime, Scams, and Fraud!

Psychology of Scams – A SCARS Institute Insight

Authors:
•  Tim McGuinness, Ph.D., DFin, MCPO, MAnth – Anthropologist, Scientist, Director of the Society of Citizens Against Relationship Scams Inc.
•  Portions from Third-Party Sources

Article Abstract

Social engineering is a powerful tool of manipulation that leverages psychological, emotional, and social triggers to influence individuals or groups into specific actions, often bypassing logical reasoning and critical thinking.

While widely used ethically in marketing, sales, and advocacy, it is also the cornerstone of scams, fraud, and cybercrime, exploiting human vulnerabilities like trust, fear, and urgency. From phishing emails and romance scams to advance-fee fraud and phone scams, social engineers craft compelling narratives to manipulate victims before, during, and even after the scam, often for financial gain or sensitive information.

Understanding these techniques and their psychological foundations equips individuals and organizations to recognize red flags, defend against exploitation, and prioritize vigilance and education to mitigate risks.

Social Engineering - An Updated Overview - 2024

Social Engineering is an Approach to Psychological and Neurologic Manipulation that can be done for Good or Bad and is at the Heart of Marketing, Politics, and Crime – Especially Cybercrime, Scams, and Fraud!

What Is Social Engineering?

Social engineering is a psychological and neurological manipulative technique used to influence individuals or groups to take specific actions, respond in certain ways, or reveal information.

It operates by exploiting psychological, emotional, neurological, cultural, and social triggers rather than relying on technical or logical persuasion. While it is widely known for its use in scams and fraud, social engineering is an everyday tactic employed in marketing, sales, politics, public relations, and even personal interactions.

At its essence, social engineering leverages natural human tendencies—such as the desire to trust, fear, belong, or avoid conflict—to achieve a goal. For example, a marketer may use urgency to compel customers to buy a product (“Only 2 left in stock!”), while a scammer might exploit fear by pretending to be law enforcement demanding immediate payment. Both scenarios rely on bypassing critical thinking by appealing to emotions or ingrained social behaviors.

Everyday Applications of Social Engineering

Social engineering is not inherently malicious. It is a fundamental aspect of persuasion and influence, making it ubiquitous in areas like:

Marketing and Sales:

    • Advertisers appeal to emotions (joy, fear, nostalgia) to connect with consumers.
    • Salespeople use techniques like reciprocity (“free samples”) and scarcity (“limited offers”) to influence purchase decisions.

Politics and Advocacy:

    • Politicians and activists use messaging that evokes shared values, trust in authority, or fear of opposing outcomes to rally support.
    • Campaigns often create a sense of urgency to inspire action, such as registering to vote or donating to causes.

Scams and Fraud:

    • Criminals exploit trust, fear, or greed to manipulate victims into revealing sensitive information or transferring money.
    • Techniques include impersonation, false authority, and creating urgency.

Interpersonal Interactions:

    • People use social engineering in personal contexts, such as negotiating, persuading, or building relationships through flattery or empathy.

The Ethical Spectrum of Social Engineering

Social engineering techniques exist on a spectrum from ethical to exploitative:

  • Ethical Applications:
    • Encouraging charitable donations through emotional appeals.
    • Promoting public health initiatives by creating relatable narratives or urgency (e.g., vaccination campaigns).
  • Exploitative Applications:
    • Scammers leveraging fear of penalties to extort money.
    • Deceptive marketing that tricks consumers into unnecessary purchases or commitments.

Understanding the ethicality of social engineering lies in evaluating its intent, transparency, and impact on the individual being influenced.

How Social Engineering Is Used in Scams, Fraud, and Cybercrime

Social engineering plays a central role in many scams, fraudulent activities, and cybercrimes. It manipulates victims by exploiting psychological, social, and emotional triggers to bypass their critical thinking and gain access to valuable information, money, or systems. Unlike technical hacking, which targets systems, social engineering targets people—their trust, habits, and vulnerabilities.

Social Engineering Scams, Fraud, and Cybercrimes by Type

Below is a detailed breakdown of how social engineering is employed in various types of scams, fraud, and cybercrime:

Phishing

Definition: Phishing is the act of tricking individuals into revealing sensitive information, such as passwords, credit card numbers, or personal details, typically through fake emails, websites, or messages.

How It Works:

      • Psychological Tactics: Phishing emails often create a sense of urgency, fear, or authority (e.g., pretending to be a bank or government agency) to pressure victims into quick action.
      • Example: An email claims your account is compromised and asks you to click a link to “secure your account.” The link leads to a fake login page designed to steal your credentials.

Spear Phishing

Definition: A targeted form of phishing aimed at specific individuals or organizations, often based on detailed research about the victim.

How It Works:

      • Psychological Tactics: By personalizing messages using information from social media or other public sources, attackers make their communications appear legitimate and trustworthy.
      • Example: An employee receives an email from what appears to be their CEO, instructing them to transfer funds to a specific account.

Pretexting

Definition: Pretexting involves creating a fabricated scenario (or pretext) to obtain information or persuade a victim to act.

How It Works:

      • Psychological Tactics: The scammer assumes a fake identity, such as a government official, IT support technician, or law enforcement officer, to establish authority and legitimacy.
      • Example: A caller claims to be from the IRS, demanding immediate payment for overdue taxes under threat of arrest.

Baiting

Definition: Baiting entices victims with something desirable—such as free software, gift cards, or exclusive content—while hiding malicious intent.

How It Works:

      • Psychological Tactics: Plays on curiosity, greed, or the desire for free or exclusive offers.
      • Example: Victims download a “free” software program, which is actually malware designed to steal data or monitor activity.

Quid Pro Quo

Definition: Quid pro quo attacks promise a benefit in exchange for information or actions, similar to baiting but with direct interaction.

How It Works:

      • Psychological Tactics: Victims believe they are receiving legitimate help or benefits in return for compliance.
      • Example: An attacker impersonates an IT technician offering assistance in exchange for login credentials.

Vishing (Voice Phishing)

Definition: Vishing uses phone calls or voice messages to deceive victims into divulging personal or financial information.

How It Works:

      • Psychological Tactics: Exploits authority and urgency by pretending to be a bank, law enforcement, or healthcare provider.
      • Example: A caller claims your bank account has been compromised and asks you to verify your account details over the phone.

Smishing (SMS Phishing)

Definition: Smishing involves fraudulent text messages designed to lure victims into sharing sensitive information or clicking malicious links.

How It Works:

      • Psychological Tactics: Texts often mimic messages from trusted organizations, using urgency or rewards to prompt action.
      • Example: A text from “your bank” claims suspicious activity and asks you to click a link to secure your account.

Impersonation and Spoofing

Definition: Impersonation involves pretending to be a trusted individual or entity, while spoofing refers to forging email addresses, phone numbers, or websites to appear legitimate.

How It Works:

      • Psychological Tactics: Victims are more likely to comply with requests when they believe the source is genuine.
      • Example: A scammer impersonates a company executive and sends an urgent request for wire transfers to an employee.

Romance Scams

Definition: Romance scams manipulate victims by forming emotional relationships to exploit their trust for financial gain.

How It Works:

      • Psychological Tactics: Scammers build rapport and emotional bonds over time, creating a sense of trust and dependency. Once trust is established, they request money for emergencies or promises of future plans.
      • Example: A scammer posing as a distant romantic interest convinces the victim to send money for medical expenses or travel costs.

Investment and Business Opportunity Scams

Definition: These scams lure victims into fraudulent investments or business schemes by promising high returns or exclusive opportunities.

How It Works:

      • Psychological Tactics: Scammers use fear of missing out (FOMO), urgency, and trust to pressure victims into acting without thorough verification.
      • Example: Victims are promised significant returns on cryptocurrency investments but are directed to fake platforms that steal their funds.

Tech Support Scams

Definition: Tech support scams involve fraudsters pretending to be IT professionals offering help with nonexistent computer problems.

How It Works:

      • Psychological Tactics: Scammers create fear by claiming the victim’s computer is infected with malware or has been hacked.
      • Example: Victims are tricked into paying for unnecessary software or granting remote access to their computers.

Lottery and Prize Scams

Definition: Victims are told they’ve won a lottery or prize but must pay fees or provide information to claim their winnings.

How It Works:

      • Psychological Tactics: Plays on greed and excitement by creating a sense of opportunity and urgency.
      • Example: Victims receive emails stating they’ve won a foreign lottery and are asked to pay taxes or fees upfront.

Social Media and Impersonation Scams

Definition: Scammers use social media platforms to impersonate friends, colleagues, or public figures, often to solicit money or personal information.

How It Works:

      • Psychological Tactics: Scammers exploit familiarity and trust by using hacked or fake accounts to send personalized messages.
      • Example: Victims receive a message from a “friend” asking for financial help due to an emergency.

Tailgating and Physical Social Engineering

Definition: Tailgating involves following someone into a secure area without authorization, often exploiting politeness or assumed trust.

How It Works:

      • Psychological Tactics: Exploits social norms, such as holding doors open for others, to gain access to restricted spaces.
      • Example: An attacker dressed as a delivery person gains entry to an office building by following an employee.

Charity Scams

Definition: Fraudsters pretend to represent legitimate charities, especially after natural disasters or crises, to solicit donations.

How It Works:

      • Psychological Tactics: Appeals to empathy and urgency by leveraging current events to pressure victims into donating.
      • Example: Victims are asked to donate to disaster relief efforts via fake websites or payment methods.

Advance-Fee Fraud

Definition: Victims are promised large financial rewards in exchange for upfront fees.

How It Works:

      • Tactics: Exploits trust and hope, using convincing documents or emails.
      • Example: A victim is promised a share of a foreign inheritance but must pay legal or administrative fees first.

Phone Scams

Definition: Scammers use fraudulent phone calls to extract personal information or money.

How It Works:

      • Tactics: Impersonates trusted organizations or uses fear and urgency.
      • Example: A scammer posing as law enforcement claims you owe fines and threatens arrest unless immediate payment is made.

The Human Element in Security

Social engineering is an incredibly effective tool in scams, fraud, and cybercrime because it preys on human psychology, emotions, and social norms. By understanding the tactics and techniques used in these schemes, individuals and organizations can better protect themselves against exploitation. Education, vigilance, and skepticism are key defenses against these manipulative practices.

How Social Engineering Works in These Scams

Before the Scam: Pretext and Setup

    • Scammers gather information about targets from public records, social media, or previous scams.
    • Build fake personas or craft compelling narratives to gain trust.

During the Scam: Manipulation and Execution

    • Use psychological triggers like fear, urgency, or greed to push victims into compliance.
    • Exploit authority (e.g., impersonating a CEO, bank, or law enforcement).

After the Scam: Cover-Up and Exploitation

    • Maintain contact to extract more money (e.g., romance scams).
    • Sell stolen information on the dark web.
    • Use collected data for identity theft or further fraud.

Key Psychological Tactics in Social Engineering

  • Fear and Urgency: Pressuring victims to act quickly without thinking critically.
  • Authority and Trust: Impersonating trusted entities to bypass skepticism.
  • Reciprocity and Greed: Offering rewards or help in exchange for compliance.
  • Social Norms: Exploiting politeness, helpfulness, or empathy.

Social engineering is the foundation of many scams and cybercrimes, relying on psychological manipulation to deceive victims. Understanding how these tactics are used—whether through advance-fee fraud, phone scams, phishing, or social media exploits—empowers individuals to recognize red flags and protect themselves from exploitation. Education, awareness, and vigilance are critical tools in countering these sophisticated manipulative strategies.

Countermeasures and Prevention: Protecting Against Social Engineering Risks

Social engineering thrives on human vulnerabilities, making education, awareness, and proactive measures the cornerstone of effective prevention. To safeguard against these manipulative tactics, individuals and organizations must adopt a multifaceted approach that combines training, verification procedures, and technological solutions.

Educating and Training Individuals

    • The First Line of Defense: Against social engineering is knowledge. Comprehensive training programs can equip employees and individuals with the skills needed to identify and respond to potential threats.
    • Awareness Programs: Educate employees and the public about common social engineering tactics, such as phishing, pretexting, and impersonation. Highlight real-world examples to illustrate how these schemes operate.
    • Scenario-Based Training: Use role-playing or simulated attacks to teach individuals how to recognize and respond to suspicious requests in real time.
    • Recognizing Emotional Manipulation: Train individuals to identify emotional triggers like urgency, fear, or excessive flattery, which are often used to bypass critical thinking.

Establishing Verification Procedures

    • Strong Verification Protocols: Can significantly reduce the effectiveness of social engineering attacks.
    • Two-Factor Authentication (2FA): Require an additional layer of authentication, such as a code sent to a mobile device, for accessing sensitive systems or completing transactions.
    • Independent Verification Channels: Verify requests for financial transactions, sensitive information, or system access through a secondary channel, such as a direct phone call to the requester.
    • Access Controls: Limit employee access to sensitive systems or information based on their roles, minimizing the potential impact of compromised credentials.

Leveraging Technology to Detect and Prevent Attacks

    • Technology Plays a Vital Role:  In identifying and mitigating social engineering threats.
    • Behavioral Biometrics: Use tools that analyze user interaction patterns, such as typing speed or mouse movements, to distinguish between legitimate users and attackers attempting to mimic them.
    • Spam and Phishing Filters: Implement advanced email and SMS filtering systems to detect and block suspicious messages before they reach users.
    • AI-Powered Monitoring Systems: Employ artificial intelligence to detect anomalies in communication patterns or transaction requests, flagging potential social engineering attempts.

Fostering a Culture of Vigilance

    • Building an Organizational Culture: Values security awareness and skepticism is critical.
    • Encourage Reporting: Establish clear, non-punitive processes for reporting suspicious activity or communication, fostering an environment where employees feel safe to raise concerns.
    • Reinforce Security Policies: Regularly remind employees of organizational policies regarding information sharing, password management, and verifying requests.
    • Continuous Updates: Provide ongoing updates on emerging social engineering tactics and adjust training and policies accordingly.

Collaboration and Information Sharing

    • Combating social engineering: Requires collective effort across industries and communities.
    • Cross-Industry Partnerships: Share insights and threat intelligence with other organizations to stay ahead of evolving tactics.
    • Public Awareness Campaigns: Raise awareness at a societal level about the risks of social engineering and how to mitigate them.

Personal Prevention Tips for Individuals

    • Think Before You Click: Avoid clicking on unsolicited links or attachments, especially from unknown senders.
    • Verify Requests: Always double-check the identity of someone requesting sensitive information, even if they appear to represent a trusted entity.
    • Limit Personal Information Online: Be cautious about sharing personal details on social media, as scammers often use these to craft targeted attacks.

Conclusion

Preventing social engineering requires a proactive, layered defense combining education, verification, technology, and a vigilant mindset. By understanding the tactics used by attackers and implementing robust countermeasures, individuals and organizations can significantly reduce their risk of falling victim to these manipulative schemes. Social engineering will continue to evolve, but through constant vigilance and adaptive strategies, we can stay one step ahead of cybercriminals.

The Takeaway

Social engineering is a powerful and widespread method of influence, spanning from the benign and beneficial to the manipulative and harmful. While its use in scams and fraud highlights its dangers, social engineering also drives many positive societal outcomes when used responsibly. Recognizing its techniques—whether in everyday life, sales, or scams—empowers individuals to make informed decisions and avoid being exploited.

Please Leave Us Your Comment
Also, tell us of any topics we might have missed.

Leave a Reply

Your comments help the SCARS Institute better understand all scam victim/survivor experiences and improve our services and processes. Thank you

Your email address will not be published. Required fields are marked *

Thank you for your comment. You may receive an email to follow up. We never share your data with marketers.

Recent Reader Comments

Important Information for New Scam Victims

If you are looking for local trauma counselors please visit counseling.AgainstScams.org or join SCARS for our counseling/therapy benefit: membership.AgainstScams.org

If you need to speak with someone now, you can dial 988 or find phone numbers for crisis hotlines all around the world here: www.opencounseling.com/suicide-hotlines

A Question of Trust

At the SCARS Institute, we invite you to do your own research on the topics we speak about and publish, Our team investigates the subject being discussed, especially when it comes to understanding the scam victims-survivors experience. You can do Google searches but in many cases, you will have to wade through scientific papers and studies. However, remember that biases and perspectives matter and influence the outcome. Regardless, we encourage you to explore these topics as thoroughly as you can for your own awareness.

SCARS Resources:

Other Cyber Resources

-/ 30 /-

What do you think about this?
Please share your thoughts in a comment below!

Legal Disclaimer:

The content provided on this platform regarding psychological topics is intended solely for educational and entertainment purposes. The publisher makes no representations or warranties regarding the accuracy or completeness of the information presented. The content is designed to raise awareness about various psychological subjects, and readers are strongly encouraged to conduct their own research and verify information independently.

The information presented does not constitute professional advice, diagnosis, or treatment of any psychological disorder or disease. It is not a substitute for professional medical or mental health advice, diagnosis, or treatment. Readers are advised to seek the guidance of a licensed medical professional for any questions or concerns related to their mental health.

The publisher disclaims any responsibility for actions taken or not taken based on the content provided. The treatment of psychological issues is a serious matter, and readers should consult with qualified professionals to address their specific circumstances. The content on this platform is not intended to create, and receipt of it does not constitute, a therapist-client relationship.

Interpretation and Definitions

Definitions

For the purposes of this Disclaimer:

  • Company (referred to as either “the Company”, “We”, “Us” or “Our” in this Disclaimer) refers to Society of Citizens Against Relationship Scams Inc. (registered d.b.a. “SCARS”,) 9561 Fountainbleau Blvd., Suit 602, Miami FL 33172.
  • Service refers to the Website.
  • You means the individual accessing this website, or the company, or other legal entity on behalf of which such individual is accessing or using the Service, as applicable.
  • Website refers to RomanceScamsNOW.com, accessible from https://romancescamsnow.com

Website Disclaimer

The information contained on this website is for general information purposes only.

The Company assumes no responsibility for errors or omissions in the contents of the Service.

In no event shall the Company be liable for any special, direct, indirect, consequential, or incidental damages or any damages whatsoever, whether in an action of contract, negligence or other tort, arising out of or in connection with the use of the Service or the contents of the Service. The Company reserves the right to make additions, deletions, or modifications to the contents on the Service at any time without prior notice.

The Company does not warrant this website in any way.

External Links Disclaimer

This website may contain links to external websites that are not provided or maintained by or in any way affiliated with the Company.

Please note that the Company does not guarantee the accuracy, relevance, timeliness, or completeness of any information on these external websites.

Errors and Omissions Disclaimer

The information given by SCARS is for general guidance on matters of interest only. Even if the Company takes every precaution to ensure that the content of this website is both current and accurate, errors can occur. Plus, given the changing nature of laws, rules, and regulations, there may be delays, omissions, or inaccuracies in the information contained on this website.

SCARS is not responsible for any errors or omissions, or for the results obtained from the use of this information.

Fair Use Disclaimer

SCARS may use copyrighted material that has not always been specifically authorized by the copyright owner. The Company is making such material available for criticism, comment, news reporting, teaching, scholarship, or research.

The Company believes this constitutes a “fair use” of any such copyrighted material as provided for in section 107 of the United States Copyright law.

If You wish to use copyrighted material from this website for your own purposes that go beyond fair use, You must obtain permission from the copyright owner.

Views Expressed Disclaimer

The Service may contain views and opinions which are those of the authors and do not necessarily reflect the official policy or position of any other author, agency, organization, employer, or company, including SCARS.

Comments published by users are their sole responsibility and the users will take full responsibility, liability, and blame for any libel or litigation that results from something written in or as a direct result of something written in a comment. The Company is not liable for any comment published by users and reserves the right to delete any comment for any reason whatsoever.

No Responsibility Disclaimer

The information on the Service is provided with the understanding that the Company is not herein engaged in rendering legal, accounting, tax, medical or mental health, or other professional advice and services. As such, it should not be used as a substitute for consultation with professional accounting, tax, legal, medical or mental health, or other competent advisers.

In no event shall the Company, its team, board of directors, volunteers, or its suppliers be liable for any special, incidental, indirect, or consequential damages whatsoever arising out of or in connection with your access or use or inability to access or use the Service.

“Use at Your Own Risk” Disclaimer

All information on this website is provided “as is”, with no guarantee of completeness, accuracy, timeliness or of the results obtained from the use of this information, and without warranty of any kind, express or implied, including, but not limited to warranties of performance, merchantability, and fitness for a particular purpose.

SCARS will not be liable to You or anyone else for any decision made or action taken in reliance on the information given by the Service or for any consequential, special, or similar damages, even if advised of the possibility of such damages.

Contact Us

If you have any questions about this Disclaimer, You can contact Us:

  • By email: contact@AgainstScams.org

PLEASE NOTE: Psychology Clarification

The following specific modalities within the practice of psychology are restricted to psychologists appropriately trained in the use of such modalities:

  • Diagnosis: The diagnosis of mental, emotional, or brain disorders and related behaviors.
  • Psychoanalysis: Psychoanalysis is a type of therapy that focuses on helping individuals to understand and resolve unconscious conflicts.
  • Hypnosis: Hypnosis is a state of trance in which individuals are more susceptible to suggestion. It can be used to treat a variety of conditions, including anxiety, depression, and pain.
  • Biofeedback: Biofeedback is a type of therapy that teaches individuals to control their bodily functions, such as heart rate and blood pressure. It can be used to treat a variety of conditions, including stress, anxiety, and pain.
  • Behavioral analysis: Behavioral analysis is a type of therapy that focuses on changing individuals’ behaviors. It is often used to treat conditions such as autism and ADHD.
    Neuropsychology: Neuropsychology is a type of psychology that focuses on the relationship between the brain and behavior. It is often used to assess and treat cognitive impairments caused by brain injuries or diseases.

SCARS and the members of the SCARS Team do not engage in any of the above modalities in relationship to scam victims. SCARS is not a mental healthcare provider and recognizes the importance of professionalism and separation between its work and that of the licensed practice of psychology.

SCARS is an educational provider of generalized self-help information that individuals can use for their own benefit to achieve their own goals related to emotional trauma. SCARS recommends that all scam victims see professional counselors or therapists to help them determine the suitability of any specific information or practices that may help them.

SCARS cannot diagnose or treat any individuals, nor can it state the effectiveness of any educational information that it may provide, regardless of its experience in interacting with traumatized scam victims over time. All information that SCARS provides is purely for general educational purposes to help scam victims become aware of and better understand the topics and to be able to dialog with their counselors or therapists.

It is important that all readers understand these distinctions and that they apply the information that SCARS may publish at their own risk, and should do so only after consulting a licensed psychologist or mental healthcare provider.

SCARS IS A DIGITAL PUBLISHER AND DOES NOT OFFER HEALTH OR MEDICAL ADVICE, LEGAL ADVICE, FINANCIAL ADVICE, OR SERVICES THAT SCARS IS NOT LICENSED OR REGISTERED TO PERFORM.

IF YOU’RE FACING A MEDICAL EMERGENCY, CALL YOUR LOCAL EMERGENCY SERVICES IMMEDIATELY, OR VISIT THE NEAREST EMERGENCY ROOM OR URGENT CARE CENTER. YOU SHOULD CONSULT YOUR HEALTHCARE PROVIDER BEFORE FOLLOWING ANY MEDICALLY RELATED INFORMATION PRESENTED ON OUR PAGES.

ALWAYS CONSULT A LICENSED ATTORNEY FOR ANY ADVICE REGARDING LEGAL MATTERS.

A LICENSED FINANCIAL OR TAX PROFESSIONAL SHOULD BE CONSULTED BEFORE ACTING ON ANY INFORMATION RELATING TO YOUR PERSONAL FINANCES OR TAX RELATED ISSUES AND INFORMATION.

SCARS IS NOT A PRIVATE INVESTIGATOR – WE DO NOT PROVIDE INVESTIGATIVE SERVICES FOR INDIVIDUALS OR BUSINESSES. ANY INVESTIGATIONS THAT SCARS MAY PERFORM IS NOT A SERVICE PROVIDED TO THIRD-PARTIES. INFORMATION REPORTED TO SCARS MAY BE FORWARDED TO LAW ENFORCEMENT AS SCARS SEE FIT AND APPROPRIATE.

This content and other material contained on the website, apps, newsletter, and products (“Content”), is general in nature and for informational purposes only and does not constitute medical, legal, or financial advice; the Content is not intended to be a substitute for licensed or regulated professional advice. Always consult your doctor or other qualified healthcare provider, lawyer, financial, or tax professional with any questions you may have regarding the educational information contained herein. SCARS makes no guarantees about the efficacy of information described on or in SCARS’ Content. The information contained is subject to change and is not intended to cover all possible situations or effects. SCARS does not recommend or endorse any specific professional or care provider, product, service, or other information that may be mentioned in SCARS’ websites, apps, and Content unless explicitly identified as such.

The disclaimers herein are provided on this page for ease of reference. These disclaimers supplement and are a part of SCARS’ website’s Terms of Use. 

All original content is Copyright © 1991 – 2023 Society of Citizens Against Relationship Scams Inc. (Registered D.B.A SCARS) All Rights Reserved Worldwide & Webwide. Third-party copyrights acknowledge.

U.S. State of Florida Registration Nonprofit (Not for Profit) #N20000011978 [SCARS DBA Registered #G20000137918] – Learn more at www.AgainstScams.org

View the claimed and or registered indicia, service marks, and trademarks of Society of Citizens Against Relationship Scams Inc., All Rights Reserved Worldwide

Contact the law firm for the Society of Citizens Against Relationship Scams Incorporated by email at legal@AgainstScams.org

Share This Information - Choose Your Social Media!

Leave A Comment

Your comments help the SCARS Institute better understand all scam victim/survivor experiences and improve our services and processes. Thank you


Thank you for your comment. You may receive an email to follow up. We never share your data with marketers.