SCARSSCARSSCARS - Society of Citizens Against Relationship Scams Inc.
A government registered crime victims' assistance & crime prevention nonprofit organization based in Miami, Florida, U.S.A. SCARS supports the victims of scams worldwide and through its partners in more than 60 countries around the world. Incorporated in 2015, its team has 30 years of continuous experience educating and supporting scam victims.
Visit www.AgainstScams.org to learn more about SCARS.|RSN Search
A ScamScamA Scam is a confidence trick - a crime - is an attempt to defraud a person or group after first gaining their trust through deception. Scams or confidence tricks exploit victims using their credulity, naïveté, compassion, vanity, irresponsibility, or greed and exploiting that. Researchers have defined confidence tricks as "a distinctive species of fraudulent conduct ... intending to further voluntary exchanges that are not mutually beneficial", as they "benefit con operators ('con men' - criminals) at the expense of their victims (the 'marks')". A scam is a crime even if no money was lost. Victim's Checklist - Interacting With The Police Here is a checklist of what to do before speaking with the police! This will help you get what is possible from the police and help you consider your options SCARS Webinar: Telling Your Story Part [...]
Holiday 2021 - Types Of ScamsScamsA Scam is a confidence trick - a crime - is an attempt to defraud a person or group after first gaining their trust through deception. Scams or confidence tricks exploit victims using their credulity, naïveté, compassion, vanity, irresponsibility, or greed and exploiting that. Researchers have defined confidence tricks as "a distinctive species of fraudulent conduct ... intending to further voluntary exchanges that are not mutually beneficial", as they "benefit con operators ('con men' - criminals) at the expense of their victims (the 'marks')". A scam is a crime even if no money was lost. & Cyber Attacks To Be Alert For What To Avoid & Watch Out For! A SCARS Special report Remember That Everyone Can Be Scammed! So Be Careful! Are you scam smart and cyber conscious? Scammers ramp things up during [...]
INTERPOL Report Identifies Top Cyberthreats in Africa An Analysis of Cyber Trends Presented by SCARS New INTERPOL Report Findings Will Support Coordinated Action In Africa Against CybercrimeCybercrimeCybercrime is a crime related to technology, computers, and the Internet. Typical cybercrime are performed by a computer against a computer, or by a hacker using software to attack computers or networks. A new report published by INTERPOL (see below) gives key insights into cybercrime in Africa. The result of [...]
Spam and Phishing Identity TheftIdentity TheftIdentity theft is when someone uses another person's personal identifying information, without their permission, to commit fraud or other crimes. In both the U.K. and the United States it is the theft of personally identifiable information. Identity theft deliberately uses someone else's identity as a method to gain financial advantages or obtain credit and other benefits, and perhaps to cause other person's loss. The person whose identity has been stolen may suffer adverse consequences, especially if they are falsely held responsible for the perpetrator's actions. Personally identifiable information generally includes a person's name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, passwords, or any other information that can be used to access a person's financial resources., FraudFraudIn law, fraud is intentional deception to secure unfair or unlawful gain (money or other assets), or to deprive a victim of a legal right. Fraud can violate civil law (e.g., a fraud victim may sue the fraud perpetrator to avoid the fraud or recover monetary compensation) or criminal law (e.g., a fraud perpetrator may be prosecuted and imprisoned by governmental authorities), or it may cause no loss of money, property, or legal right but still be an element of another civil or criminal wrong. The purpose of fraud may be monetary gain or other benefits, for example by obtaining a passport, travel document, or driver's license, or mortgage fraud, where the perpetrator may attempt to qualify for a mortgage by way of false statements.
A fraud can also be a hoax, which is a distinct concept that involves deliberate deception without the intention of gain or of materially damaging or depriving a victim., And Cybercrime Alert A SCARS Insight Spam and Phishing Cybercriminals have become quite savvy in their attempts to lure people in and get you to click on a link or open an attachment. More than half of all cyber-attacks [...]
Choices: A Cybersecurity Learning Lesson Guest EditorialGuest EditorialA Guest Editorial is an article written by an outside contributor or author who is not a part of the SCARS Management or SCARS Editorial Team.
We allow scam victims and stakeholders to contribute articles, commentary, or editorials for publication on RomanceScamsNOW.com for review and publishing. To submit an article please send it to contact@AgainstScams.org by Brett JohnsonBrett JohnsonHe is a Cybersecurity, Cybercrime, Fraud, and Identity Theft Expert. Keynote Speaker, Consultant, Writer, Podcast Personality. Former USA Most Wanted Cybercriminal, Identity Thief, Hacker, and Original Internet Godfather. He is also an Advisor to SCARS.
Brett is one of the top experts in the world on cybercrime, identity theft, fraud, and cybersecurity. His knowledge is unique. His education in cybercrime does not come from a book, he has hands-on training. His knowledge is from the criminal side of things and has an understanding of cybercrime that the majority of people on the planet will never possess., SCARS Advisor on Cybercrime Presented by SCARS Good Choices / Bad Choices Every Victim Understands The Role Choices Play In Their Safety & Security - Sadly Governments Do Not Understand This Still To This [...]
Crime Pays by Brett Johnson An Ex-Cybercriminal Kingpin Turned Good Guy! Guest Commentary Presented By SCARS Criminals Do What They Do Because It Pays! SCARS NOTE: From time to time we will publish important information to help victims & the public understand that cybercrime [...]
United States Financial Fraud Victims A SCARS Overview Financial Fraud Crime Victims This article is intended for Fraud & Scam Victims in the United States. However, there is equivalent information for most western countries - look on your Department or Ministry of Justice for [...]
How Scams Work? ImpersonationImpersonationAn impersonator is someone who imitates or copies the behavior or actions of another. There are many reasons for impersonating someone, such as: part of a criminal act such as identity theft, online impersonation scam, or other fraud. This is usually where the criminal is trying to assume the identity of another, in order to commit fraud, such as accessing confidential information or to gain property not belonging to them. Also known as social engineering and impostors. Romance Scams African Style Impersonation Scams A SCARS Series How Scams Work? The Impersonation Romance Scam Almost all scams, frauds, or confidence tricks or schemes work along similar flows or have characteristics in common. Common Traits Almost all socially [...]
Nigeria's EFCCEFCCEconomic and Financial Crimes Commission
The Economic and Financial Crimes Commission (EFCC) is a Nigerian law enforcement agency that investigates financial crimes such as advance fee fraud (419 fraud), scams, and money laundering. The EFCC was established in 2003, partially in response to pressure from the Financial Action Task Force on Money Laundering (FATF), which named Nigeria as one of 23 countries non-cooperative in the international community's efforts to fight money laundering. The agency has its head office in Abuja, Nigeria. Will Pay Million Bounty On Yahoo Boys! Fake NewsFake newsFake news is false or misleading information presented as news. It often has the aim of damaging the reputation of a person or entity, or making money through advertising revenue. However, the term does not have a fixed definition and has been applied more broadly to include any type of false information, including unintentional and unconscious mechanisms, and also by high-profile individuals to apply to any news unfavourable to his/her personal perspectives. / Urban LegendUrban LegendUrban Legend
An urban legend, urban myth, urban tale, or contemporary legend is a genre of modern folklore comprising stories circulated as true, especially on social media. These legends can be entertaining but often concern serious topics. They may also be confirmation of moral standards, or reflect prejudices, or be a way to make sense of societal anxieties.
Urban legends are most often circulated orally but can be spread by any media, including newspapers, mobile news apps, e-mail, and social media. Some urban legends have passed through the years with only minor changes and seem impervious to exposure as untrue.! Sorry, it is NOT True - a SCARS Insight FAKE NEWS: For The First Time, Nigerian Declares All Our War Against Yahoo Boy Scammers! The Nigerians Are Not Willing [...]
Lost Pet Scam - Going For Your Heart Owners Of Pets Who Post About Their Lost Pets Are Being Scammed A SCARS Special Report New scam targets owners of lost pets THIS IS AN IDENTITY THEFT & IMPERSONATION ATTACK What To Watch Out [...]
Doxing is the willful disclosure of personal information with the intent to cause harm to the person DOXED. Doxing is a form of cyber harassment.
Personal information online is common, however, with the Internet being so prevalent. Many records are found online, such as, voting, property ownership, even bankruptcies, and new business filings. - A Kind of Terrorism or CyberbullyingCyberbullyingCyberbullying or cyberharassment is a form of bullying or harassment using electronic means. Cyberbullying and cyber harassment are also known as online bullying. It has become increasingly common, especially among teenagers, as the digital universe has expanded and technology has advanced. Cyberbullying is when someone bullies or harasses others on the internet and other digital spaces, particularly on social media sites. Harmful bullying behavior can include posting rumors, threats, sexual remarks, a victims' personal information (Doxing), or pejorative labels (i.e. hate speech). Bullying or harassment can be identified by repeated behavior and an intent to emotional harm. Victims of cyberbullying may experience lower self-esteem, increased suicidal ideation, and various negative emotional responses, including being scared, frustrated, angry, depressed, or PTSD.? Having Private Information Exposed By Someone To Hurt You! A SCARS Special Report There Are A Lot Of Despicable Things Done Online Many Are Intended Just To Hurt You Some are [...]
The Challenges In Supporting Impersonation Scam Victims The Responsibility To Help Victims Understand The Mechanics Of Scams Many times this will conflict with their beliefs Our Responsibility Is Sometimes To Deliver Hard Truths A Discussion About Impersonation Scams And Accepting The Reality Of [...]
Scam Victim Debt Part 4: IRSIRSThe Internal Revenue Service (IRS) is the revenue & tax service of the United States federal government responsible for collecting taxes and administering the Internal Revenue Code (the main body of federal statutory tax law.) It is part of the Department of the Treasury and led by the Commissioner of Internal Revenue, who is appointed to a five-year term by the President of the United States. The duties of the IRS include providing tax assistance to taxpayers; pursuing and resolving instances of erroneous or fraudulent tax filings; and overseeing various benefits programs.
Visit www.IRS.gov to learn more./Tax Debt Most Western Countries Have Mechanism To ForgiveForgivenessWhat Is Forgiveness?
Psychologists generally define forgiveness as a conscious, deliberate decision to release feelings of resentment or vengeance toward a person or group who has harmed you, regardless of whether they actually deserve your forgiveness. Tax Debt The Following Applies To U.S. Residents But Check With A Tax Attorney Or Certified Accountant For Further Advice Scam Victim Tax Debt Many romance or other kinds [...]
Why Police Try To Avoid Taking Reports For Scams? A SCARS Insight We Have Been Looking At This Problem For Years ... And We Believe The Answer Is Actually Simple! CLOSURE RATES! In all the English Speaking Countries (U.S., Canada, U.K., Australia, New [...]
Real Fake - A Graphic Novel from CISACybersecurity and Infrastructure Security AgencyThe Cybersecurity and Infrastructure Security Agency (CISA) is a standalone United States federal agency, an operational component under Department of Homeland Security (DHS) oversight. Its activities are a continuation of the National Protection and Programs Directorate (NPPD). CISA was established on November 16, 2018 when President Donald Trump signed into law the Cybersecurity and Infrastructure Security Agency Act of 2018. "Deep Fakes" and advanced technology Impersonations Developed by the United States Cybercrime & Infrastructure Security Agency SCARS is an official crime victims' assistance partner of CISA Real Fake The first graphic novel in US DHSDepartment of Homeland SecurityThe United States Department of Homeland Security (DHS) is the U.S. federal executive department (under the President) responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-terrorism, border security, immigration and customs, cybersecurity, and disaster prevention and management.[...]
The Silent Threat - The Impact of Fraud on UK National Security By Helena Wood, Tom Keatinge, Keith Ditcham, and Ardi Janjeva A SCARS Special Report A U.K. Government Think Tank Research Paper Presented by SCARS for Public Discussion FRAUD AGAINST UK citizens, [...]
FluBotFlubotFlubot is a new Android & iPhone malware/spyware that aims to steal financial login and password data from your device. Flubot malware uses smishing (or SMS/Text phishing) to attack you & your device. You will receive an SMS that informs you about a package delivery or something else. The SMS will include a link to trigger the malware attack.: Package Delivery Text Message Shipping Scam The ‘FluBot’ spywareSpywareA type of malware installed on computers or cellphones to track your actions and/or collect information without your knowledge. Some spyware can change computer settings for pharming redirection., sent via package delivery text messages, affects Android phones and devices No, you are never safe online anymore! Governments around the world are aware that a new malicious piece of spyware – known [...]
For Scam Victims: Debt Collections - Your Rights Debt Management For Scams Victims - Part 3 Romance Scam Victim Support Debt Collection FAQs - Maintaining Control When a debt collector calls, it’s important to know your rights and what you need to do. The [...]
SCARS Position Statement Against ScambaitingScam BaitingA foolish activity where a victim or nonvictim engages in deception and fraud to lead on a scammer into revealing information or for the sport of it. Deliberate deception online, regardless of the reason, is both unethical and in many places may also be illegal. While not prosecuted, Scambaiting has no legitimate benefit and should never be performed by victims since it is an act of revenge and only amplifies trauma. It is a reprehensible practice that is popularized by amateur anti-scam groups driven by their hate for fraudsters.
Learn more: SCARS Position Statement Against Scambaiting A Commentary On False Solutions April 2021 Regarding Recent Studies Of Scambaiting By Noted Academics Recently, two studies attempted to understand the phenomena of Scambaiting by vigilante anti-scam hater groups on Facebook and elsewhere. While [...]
5 Steps For Rebuilding Trust In A Marriage Following A Romance Scam Information For Married Relationship ScamRelationship ScamA Relationship Scam is a one-to-one criminal act that involves a trust relationship and uses deception & manipulation to get a victim to give to the criminal something of value, such as money!
Click here to learn more: What Is A Relationship Scam? Victims If You Are Married And Lured In Your Whole Marriage Is In Doubt Ironically, most married scam victims were not looking for an internet affair! They were manipulated into it! [...]
Debt Collection Scams & Managing Real Collections A SCARS Guide After a scam, a victim may have significant real debt and collections becomes a reality! Many Scam Victims Have Significant Debt After A Scam Ends In many cases, this means having to face [...]
Authorized Push Payment FraudAuthorized Push Payment FraudAuthorized Push Payment Fraud (Scams) occurs when a fraudster manipulates a genuine customer into making a payment to an account they control. There are a variety of types of authorized push payment fraud, including romance scams, invoice scams and a handful of others. (APP Fraud) The Fastest Form Of Payment Scams Convenience & Instant Criminality! What Is Authorized Push Payment Fraud (APP Fraud)? Essentially, This Is When Scammers Convince A Customer To Transfer Money To Them Via An Instant Payment It is [...]
Scam Victim Debt - Recognize It, Confront It, Control It, Survive It! After a Scam, Many Victims Have Debt That Must Be Addressed Unfortunately, avoiding the truth not only makes it harder to resolve later and also keeps you trapped in denialDenialDenial is a refusal or unwillingness to accept something or to accept reality. Refusal to admit the truth or reality of something, refusal to acknowledge something unpleasant; And as a term of Psychology: denial is a defense mechanism in which confrontation with a personal problem or with reality is avoided by denying the existence of the problem or reality. After [...]
Social Media Is Selling Fake Vaccine Cards! According To U.S. State Attorneys General! In A Letter Sent To Social Media ... Sent to Twitter, Shopify, and eBay: See the actual signed letter below Re: Deceptive marketing and sales of fake COVID vaccine cards [...]
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.