Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Discover millions of ebooks, audiobooks, and so much more with a free trial

From $11.99/month after trial. Cancel anytime.

I Was Scammed
I Was Scammed
I Was Scammed
Ebook366 pages3 hours

I Was Scammed

Rating: 5 out of 5 stars

5/5

()

Read preview

About this ebook

I Was Scammed features an overview of different types of scams, focusing on digital and internet scams. After an introduction to how the scam investigation began after experiencing a scam targeting book authors in The Big Con, the book discusses personality identity fraud, which is the root of so many scams.
        The book describes the growing identity theft problem, the many data breaches that have occurred, the ways scammers use your personal information, how to protect your identity from theft, and how to repair the damage after a scam. Then, the book describes these major types of scams:

Merchant and customer scams

Real estate frauds, including rental scams, moving scams, home improvement and repair scams, and real estate investment scams

Email, phone, and social media scams

Gift card scams

Couponing scams

Phony contest and prize scams

Podcast participation scams

Conference participation scams

Publishing and marketing services scams

The book review scam

Besides describing the scams, the book provides tips on how to avoid becoming a victim, and what to do if you are.

GINI GRAHAM SCOTT, PhD, JD, is a nationally known writer, consultant, speaker, and seminar leader, specializing in business and work relationships, professional and personal development, social trends, popular culture, science, and crime. She has published over 50 books with major publishers. She is the founder of Changemakers Publishing, featuring 150+ books on work, business, psychology, self-help, and social trends. She has worked with dozens of clients on self-help, business books, memoirs, and film scripts.

LanguageEnglish
Release dateJun 28, 2023
ISBN9798223945239
I Was Scammed
Author

Gini Graham Scott PhD

Gini Graham Scott is a screenplay writer, executive producer, and TV game show developer, plus a nonfiction writer who has published over 200 books, 50 for traditional publishers and 150 for her own company Changemakers Publishing. She also writes, reviews, and ghostwrites scripts and books for clients. She has written scripts for 20 feature films and has written and executive produced 11 film and TV projects. These include Me, My Dog, and I and Rescue Me, distributed by Random Media,  Driver, distributed by Gravitas Ventures, Deadly Infidelity, distributed by Green Apple,  Death’s Door, a TV series based on a co-written book. At Death’s Door, published by Rowman & Littlefield, The New Age of Aging, distributed by Factory Films, and Reversal distributed by Shami Media Group. Several other films have just been completed or are in production: Courage to Continue and Bad Relationships She has recently developed a TV series The Neanderthals Return, based on a series of books about the Neanderthals coming back into modern society. She has written and produced over 60 short films, including dramas, book and film trailers, TV show pilots, documentaries, and promotional videos.  Her IMDB resume is at http://imdb.me/ginigrahamscott. She is the author of four books on filming, including So You Want to Turn Your Book Into a Film?, The Basic Guide to Pitching, Producing, and Distributing Your Film, and The Basic Guide to Doing Your Own Film Distribution, Finding Funds for Your Film or TV Project.  and The Complete Guide to Distributing an Indie Film. She has been hired to write over two dozen scripts for clients, adapted from their novels, memoirs, or script ideas. She reviews books for their film potential and writes treatments and scripts for three major companies that publish books and promote them for authors. Her scripts include action/adventure scripts, suspense thrillers, psychological character films, and contemporary dramas.  Some recent scripts are the sci-fi suspense thrillers Brain Swap, Dead No More, Deadly Deposit, and Reverse Murder.  Other scripts include the crime action thrillers Rich and Dead and Deadly Affair; and the suspense thriller Bankrupt.

Read more from Gini Graham Scott Ph D

Related to I Was Scammed

Related ebooks

Con Artists & Hoaxes For You

View More

Related articles

Reviews for I Was Scammed

Rating: 5 out of 5 stars
5/5

1 rating1 review

What did you think?

Tap to rate

Review must be at least 10 words

  • Rating: 5 out of 5 stars
    5/5
    I lost all my savings to CM Trading. I invested 41,000 and they refused to allow me to withdraw both my initial deposit and accrued interest. I have reached out to a recovery expert techspypro @gmail com to help me recover the money back from them and it is really progressing. I have been able to recover over 15,000 and I hope I will get the rest of the money in a few days.

Book preview

I Was Scammed - Gini Graham Scott PhD

Diagram Description automatically generated

I WAS SCAMMED

The Many Scams Today and How to Avoid Becoming a Victim: From Personal Identity Theft to Merchant and Customer Scams, Real Estate Fraud, and Email, Phone, and Social Media Scams
by Gini Graham Scott, PhD

American Leadership Books

with

Changemakers Publishing

3527 Mt. Diablo Blvd., #273

Lafayette, CA 94549

(925) 385-0608

I WAS SCAMMED

Copyright © 2021 by Gini Graham Scott

All rights reserved.  No part of this book may be used or reproduced by any means, graphic, electronic, or mechanical, including photocopying, recording, taping or by any information storage retrieval system without the written permission of the author except in the case of brief quotations embodied in critical articles and reviews.

TABLE OF CONTENTS

INTRODUCTION

How It All Began

Discovering a World of Scams

The Major Scams and Stories of Victims in this Book

PART I: PERSONAL IDENTITY FRAUD

CHAPTER 1: LOSING YOUR PERSONAL IDENTITY

The Growing Identity Theft Problem

How the Scammers Acquire Your Personal Data

Summing Up

CHAPTER 2: THE MANY DATA BREACHES THAT STEAL YOUR PERSONAL INFORMATION

The Pervasiveness of Data Breaches

Some of the Biggest Breaches in 2021

Some of the Biggest Breaches in 2020

CHAPTER 3: HOW THE SCAMMERS USE YOUR PERSONAL INFORMATION

Credit Card Fraud

Bank or Finance Fraud

Government Documents Fraud

Obtaining Products and Services in Your Name

Gaining Other Benefits by Claiming to Be You

Engaging in Criminal Activity in Your Name

Convincing You to Send Money or Take Other Actions Because They Know Who You Are

Accessing Your Email or Social Media Accounts to Find Out More Sensitive Information or Scam Others

Summing Up

CHAPTER 4: WHAT YOU CAN DO TO PROTECT YOUR INFORMATION

Some Ways to Prevent Identity Theft

Summing Up

CHAPTER 5: HOW TO REPAIR THE DAMAGE AFTER A SCAM

How to Learn If Your Identity Was Stolen

How to Stop or Reduce the Damage

PART II: THE MANY DIFFERENT WAYS YOU CAN GET SCAMMED

INTRODUCTION TO PART II

CHAPTER 6: MERCHANT AND CUSTOMER SCAMS

How Buyers Can Scam Sellers

Using the Chargeback as a Weapon

Why Merchants and Service Providers Can Often Become Victims of Fraud

The Prevalence of Online Fraud

Why It’s Easy for Fraudsters to Obtain Stolen Credit Cards

Why It’s So Difficult to Investigate and Prosecute an Online Fraud

Why Merchants and Service Providers Have Become an Ideal Target for Online Scams

How the Payment and Chargeback Process Works

The Major Players in a Transaction

How an Online Transaction Works

Dealing with Fraudulent Chargebacks

The Reasons for a Chargeback Dispute

Deciding What to Do about a Friendly Fraud Chargeback

When a Win Is More Likely Against a Scam Company

How to Deal with a Fraudulent Chargeback

Merchant Account Scams

Hidden-Fee Scams

Merchant Fraud Scams

Identity Theft

Gateway Hacking

What Happens to Victims of These Scams?

Phony Merchant Scams

Summing Up

CHAPTER 7: WHEN REAL ESTATE ISN’T REAL

Some Examples of Scam Victims

Rick’s Story

Alice’s Story

Henry and Sarah’s Story

The Many Real Estate Scams

Rental Scams

Foreclosure Relief Scams

Moving Scams

Loan Flipping

The Bait and Switch Mortgage

Home Title or Deed Theft

Home Inspection Scams

Wire Transfer Scams

Home Improvement and Repair Scams

Real Estate Investment Scams

Real Estate Investment Seminar Scams

Online Property Investment Scams

Phony Broker Scams

Real Estate Ponzi Scams

Property Investment Club Scams

Property Condition Scams

And Still More Investment Scams

How to Avoid Becoming an Investment Scam Victim

CHAPTER 8: EMAIL, PHONE, AND SOCIAL MEDIA SCAMS

An Example of a Victim Who Became a Hostage

The Great Opportunity Scams

Examples of an Inheritance Scam

Examples of a Dying Benefactor Scam

Examples of a Business Opportunity

Examples of an Investment Opportunity Scam

Examples of a Consignment Scam

Examples of a Scam for Dealing with Scams

Examples of the Funds Due to You Scam

Example of Winning a Lottery Scam

Example of a News for You Scam

Example of Help with a Government Payment

Examples of Seeking a Friend or Personal Relationship

The Loss and Danger Scams

Examples of the Order You Didn’t Make Scam

Examples of an Account Suspended or Restricted Scam

Example of an Unauthorized Credit/Debit Card Use Scam

Example of an Unauthorized Access or Email Update Scam

Examples of Problems with Your Email Scams

Example of a Cyberattack Scam

The Pervasiveness of Email Scams

The Most Common Email Scams

How to Recognize and Avoid These Scams

Phone Call and Social Media Scams

Phone Scams

Social Media Scams

ABOUT THE AUTHOR

OTHER BOOKS ON SCAMS, CRIME, AND SOCIAL ISSUES BY GINI GRAHAM SCOTT

CONTACT INFORMATION

INTRODUCTION

How It All Began

I began investigating scams about two years ago when I got caught up in two scams.

A close up of a tombstone Description automatically generated with medium confidence

In one case, I was working as a ghostwriter writing book to film reviews and the materials authors needed to present to a legitimate TV/film executive or producer to consider turning their book or script into a film, such as scripts, loglines, synopses, and show bibles. However, in speaking to one author, I discovered that one company had created a scam with imposter executives and producers for a real company to get the authors to pay them to write more and more, but then the material went nowhere. The scammers created a phony marketing campaign for them, too, and then the scammers disappeared.

In the other case, I was the victim due to writing materials for a client I obtained through a ghostwriting service.  But after I had written about half the client’s proposal and he had paid me through the service, he filed a fraudulent chargeback through his bank. Then he stopped communicating and disappeared.  In such cases, the banks normally support their clients, who can readily get away with what’s called a friendly fraud chargeback scam, though there is nothing friendly about it.  The result was that the payment platform this ghostwriting service used initially subjected any further payments to me to a 90-day hold for 35% of the funds. Then, it cancelled my account, restored it for a few months, and cancelled it again, before I finally convinced the platform to restore my account, since this was a fraudulent claim by a client who disappeared.

After those experiences, I began investigating to learn more about those scams, and soon I found many more scams targeting writers, and I discovered over 200 merchants who complained that their accounts were unfairly terminated by this same payment platform due to their friendly fraud chargebacks.

Discovering a World of Scams

Then, as I continued to investigate, the universe of scams exploded like a star in the galaxy.  It seemed like there were a number of a scams in virtually every industry, as devious schemers found different ways to cheat consumers, merchants, producers, service providers, and anyone else connected to that industry. And for the most part, the police, FBI, and other law enforcement agencies would simply take a report should a victim contact them, because the world of scams was too large, with millions of victims losing billions of dollars. And the scammers were very elusive, and often in other states or countries. So for the most part law enforcement would just pay attention if enough victims reported being victimized by a scam, if the media raised awareness about that scam, or an especially powerful person became a victim.

––––––––

A sign on a brick wall Description automatically generated

An especially powerful image of this world of scams appeared in Bloomberg Businessweek’s July 5, 2021 edition.  It illustrated the frauds reported by the Federal Trade Commissions Sentinel database, which indicated that there were 4.8 million fraud reports in the U.S. alone, an increase of 43% from 2019, representing many billions of dollars lost to fraudsters each year.  What was especially amazing about this chart is that it listed virtually every industry, as reflected in the graphic below, which an artist designed for me.

There were retail, health-care, tax, and business opportunity frauds; work-at-home, travel, networking, and fake check scams. Just about anywhere you might look in any industry or any activity in everyday life, there would be scam. 

Perhaps a key reason for so many scams is the growing influence of an online economy, even before the pandemic led to lockdowns. As a result, more and more business was conducted between buyers and sellers, customers and merchants, and clients and service providers, who didn’t meet each other face to face.  Instead, they dealt over computers, phones, and emails, so it was easy for individuals to create whatever persona they wanted, and they could connect from anywhere, while pretending to be someplace else if they wished to deceive someone.

Chart Description automatically generated

In short, this new high-tech world created the perfect conditions for scams of all kinds to emerge with fraudsters coming up with more and more creative arrangements. Then, as one fraud was exposed, the fraudster could easily move on to another fraud by using a different name or creating another company using a new approach.  And the technology of the internet made it easy to set up a company website to provide a convincing presence with an address in a headquarters building or postal outlet that could be in any city in any country.

The Major Scams and Stories of Victims in this Book

Given this vast universe of scams, it is impossible to provide a comprehensive look at all of the scams in this universe.  Accordingly, I Was Scammed is designed to look at some of the biggest scams and at the effects of these scams on the victims.

To this end, the book describes how these scams work and how to avoid becoming a victim.  It discusses how to report a scam and possibly gain compensation.  Also, it features the stories of some of the victims, discussing how they got caught up in the scam, how it affected them, and what they lost. 

In featuring these stories, I have created composites drawn from the experiences of a number of victims in order to protect the name and identity of individual victims. I have included the real names of the scam individuals and companies where they have become a subject of public record, but otherwise I have used pseudonyms to avoid being subject to litigation by them—which is another kind of scam: filing suits in order to get compensation from the victims who cannot afford the cost of such litigation. 

A person using a computer Description automatically generated with medium confidence

Following are the main scams to be featured.  Each chapter will describe how the scam works and the stories of some of the victims of each scam and what happened as a result.

Personal identity theft scams,

Scams against merchants by customers, clients, and payment systems,

House sale and rental scams with ghost properties,

Phony law enforcement and government agency scams to pay money to avoid going to jail or losing a license

Phony romance and friend scams,

Phony family member or relative in trouble scams.

Phony tech support, website creation, and other online service scams,

Phony health care products and services scams,

Counterfeit product scams,

Elder abuse scams,

Phony publicity and marketing scams.

And more.

The final chapters of the book deal with what to look for in a scam offer; how to assess the individual or company making the offer; and how to avoid being scammed yourself.

PART I: PERSONAL IDENTITY FRAUD

CHAPTER 1: LOSING YOUR PERSONAL IDENTITY

––––––––

Many scams occur because scammers are trying to get you to share your personal identity or because they are using your personal identity to scam you or scam others. 

A picture containing text, electronics, display Description automatically generated

Unfortunately, the scammers have become expert and creative at what they do, especially in disguising their identity when they contact you. They can easily seem to call you or email you from any phone number or email address they choose, and they can create websites that look like the real thing for a big company.  Thus, it can often be hard to determine if a scammer is contacting you or if a communication is coming from a legitimate person or company.

However, there are ways to protect your personal identity from being stolen or used by the scammers, and ways to tell when a scammer is likely to be using a phony identity to scam you.  Plus there are steps you can take if you discover that your identity has been stolen.

Accordingly, I want to start this book by discussing how the scammers are stealing personal identities and using stolen identities in other scams that can end up hurting you, too.

The Growing Identity Theft Problem

Graphical user interface, website Description automatically generated

Identity theft is a huge problem, because of the vast number of victims, which has increased as more and more business and communication is conducted online, especially due to the pandemic.  The scammers use all kinds of techniques to get your information directly from you through personal phone calls, texts, and emails; through thefts from your mail or wallet; and through skimming devices when you make a purchase at a store or gas station. But the biggest identity threat is the data breaches of major companies, which reveal the personal information of millions of people at one shot. Then, once the thieves have this data, they share it on a vast black market for stolen data, which has become its own industry—the buying and selling of personal data, including credit card information. And the losses that result are HUGE!

For example, in 2019, 13 million consumers were victims and lost $3.5 billion in out-of-pocket costs, according to the consulting firm Javelin Strategy & Research, cited in report on Experian.[1]  Another survey reported by Allstate Insurance indicated that the millions of Americans victimized by identity theft has increased about 16% each year.[2]

The potential for theft is even greater from the data breaches. In one case, hackers stole the private Social Security information of nearly 80% of working Americans, and other data breaches of private companies and government agencies have affected billions of individuals.  These big data dumps don’t mean that your personal information will actually be used, but some reports suggest that the data of at least 1 in 10 Americans has been used to scam them or others.

Unfortunately, once your personal identity information is stolen and used, it can cost hundreds of dollars, and victims can spend many days repairing their good name and credit record.  Otherwise, with a damaged record, you can experience numerous difficulties from losing out on job opportunities to being unable to get loans for housing or cars because of negative information on your credit report.  Some victims may even get arrested, if a thief commits a crime in their name.

For example, Thomas was a typical victim, who wasn’t aware that his personal identity was stolen until he discovered charges he hadn’t made on his credit card. Then, he found he couldn’t get a loan to buy a car, because the scammer had gotten other credit cards in his name and had racked up so many disputed bills that his credit was downgraded. Once he realized what happened, it took him over 40 hours to report the fraud to his credit card company, bank, and credit reporting agencies to fix the problem. 

A picture containing text Description automatically generated

But what happened? How did Thomas lose his personal information to the scammers who wreaked such havoc on his life? As he thought back to what might have happened several weeks before, he considered several possibilities. Maybe the theft had occurred when he was at a table in a restaurant for a family dinner and the waiter took his card to the front to charge it.  Perhaps the waiter or someone at the restaurant had take information from his card.  Maybe the theft happened when he filled up his car with gas and he used his credit card in the machine to charge his purchase.  Possibly a device on the machine had copied data from his card.  Or maybe the theft happened at the ATM when he put his card in to get cash—perhaps a camera overhead recorded information or maybe the identity thief was that man that patiently stood behind him while he made a withdrawal.  Or possibly the problem was one of the many purchases he made online. 

––––––––

Thomas thought he entered his credit card information into a legitimate site, but maybe one of the small boutique shops he bought some gifts from was a front for getting his information.  Or perhaps the monthly bills he didn’t get in his mailbox could have been taken. When he asked the companies to send the bills again, he hadn’t thought that the mail could have been stolen.  He just thought it might have gotten lost in a snowstorm.  Or maybe his information got taken when there was a data breach of one of the big stores where he once bought equipment many years ago.  Maybe his information was in one of the millions of accounts that got compromised in the breach.

In the end, Thomas had no idea of how his personal identity might have gotten stolen—just a list of several dozen possibilities, and there could be even more. Unfortunately, that’s the way it is.  There are so many ways that scammers can find out your personal identity these days, and you don’t even know they have it until they use it in one of the many ways that scammers can obtain your personal data. 

So

Enjoying the preview?
Page 1 of 1