Clown internet scam - an internet scam is now targeting clowns and other entertainers - collateral
I am the victim of an internet scam. It is very hard to write that sentence, but it's compulsory in order to warn my fellow clowns, magicians and other entertainers, and to foil them from being taken for $2,800. 00 like I was. Here is what happened to me, and how you can avoid it.
I run the clown-ministry. com web site, and I achieve as a clown at both bureau and secular events. Due to the popularity of the clown-ministry. com web site (do a exploration on Google . com for 'clown' and it's the 7th site listed, for example) I'm by a long shot found by citizens -- for both good and bad reasons. For instance, last year my wife Ellen and I educated fooling around for a week at the Seventh Day Adventists' inhabitant Camporee -- we're not Adventists, and don't know many ancestors who are, but we were found by them & hired primarily due to the popularity of the web site. We've been invited to act in clown at a alliance in Canada, performed at band picnics, etc. well out of our neck of the wood, and so on. Delight absorb that this isn't bragging; it's backdrop the stage for what happened in the scam.
We were contacted via e-mail by a big name as rumor has it from Cincinnati, Ohio, who sought to fly my wife & I to Cincinnati to achieve at a birthday party. Since we'd had analogous effects ensue in the past, that didn't set off any alarms in my head. In addition, I knew that there are entertainers such as Jennifer Lopez who will sing "Happy Birthday" at your party, for a fee of $50,000. 00; I'm no J Lo, and my singing is atrocious, but I accusation a lot less as well :)
I did an internet hunt on that anyone (I'm not using the name he gave, since there's a criminal investigation as well as FBI investigation going on -- no joke), and found a big shot by that name in Cincinnati, Ohio, a "regional celebrity" so to speak. So, it didn't seem skeptical that he would have the money to hire us as well as pay round trip air fare. It's now evident that it was only a big shot using that person's name to "hook" us.
At that point, my wife & I were still liable to think of this as a prank, but even so we replied to the email with a quotation for our services, respectfully and professionally. We were joking with each other that this had to be a prank; after all, why would a big cheese hire us when there are hundreds of clowns in the Cincinnati area? If not it was a big cheese with money to burn who required to buy "bragging rights," it made no sense. So we forgot about it, until the being replied back, hiring us.
We still well thought-out it a joke, until we customary a check in the mail, for $2,800. 00. MUCH more that we had quoted our military for! We brain wave that, maybe, the dissipation was to pay for round trip air fare and accommodations, but even so that was far too much. We e-mailed the character back, elucidation that we had customary $2,800. 00 via check. His comeback is what be supposed to have tipped us off to the scam.
He replied that, since he was out of the land on a affair trip, he had his own associate send the checks out for the party, and the junior had made a mistake, combining with our check one for $2,300. 00 for the photographer from the United Kingdom that he was brief in to photograph the party. Would we be so kind as to send him those funds via Western Union?
Like an idiot, I said "yes. " The check had been deposited and clear (I thought), and I didn't want to hold onto money that didn't be in the right place to me. So, I went to the local Western Union bureau and sent $2,300. 00 to an creature in the United Kingdom. This didn't set off any red flags (although it be supposed to have) since it seemed like the type of silly confuse I've seen associates do before. What happened next, though, set off every red flag in my head, and then some.
Days later, I customary a new email from the man apparently from Cincinnati. According to him, his protect had an difficult form of lung cancer, and considered necessary an direct operation. He sought me to send the lasting money to his mother's doctor of medicine in Nigeria and he would carry over the party later. When I heard the word 'Nigeria' I had icicles in a row up and down my spine. Nigeria is famous, in the internet world, for being home to the most creative scam of all time. You've expected acknowledged spam email about it. In a nutshell, it involves the widow of some minister or rich person, who is demanding to smuggle their immense affluence out of the kingdom beforehand it's detained by her dead husband's adversaries; in altercation for let them use your bank account, they will give you (various amounts of money, if not an adequate amount of to make you filthy rich, at least an adequate amount of to make you dingy). Of course, no money comes out, but these associates proceed to rob your bank bill of every penny.
So, when I heard that, fear clutched at my heart. Besides, why would a big name rich an adequate amount to hire me (and fly a photographer in from the UK) need my money? The fulfil is, he didn't; he was just difficult to bilk me of more money ahead of his ruse was exposed.
You see, when I at the outset deposited the $2,800. 00 check, it appeared to clear; it was then quite a few more days already he requested the $2,300 to his photographer, and almost a week (from the time I deposited the check) until I complied with that. 11 days after the check was firstly deposited, it came back 'funds denied. ' The bank then debited $2,800. 00 from my read-through bank account -- which didn't be full of that much, of course. So, I'm out $2,800. 00, the crook (or his assistant in the UK) customary $2,300. 00. What's the moral of the story?
The drive of this is two-fold: to warn my fellow clowns, and to point out the red flags that I be supposed to have seen, and what I ought to have done.
So, that's where it lies. I'm out $2,800. 00, and in jeopardy of bringing up the rear my house due to the procedures of this criminal. Jesus Christ commands His followers to "pray for those who despitefully use you" (Matthew 5:44). It's difficult, but I'm praying. Thank you for listening -- be sure to care for by hand and your loved ones.
Tom Raymond, aka. Raynbow the magic clown, is a expert clown and underemployed mainframe geek, webmaster of http://www. clown-ministry. com/ the leading clown reserve site on the web. His individual site can be found at http://www. clown-ministry. com/raynbow/
Investigators push to charge security involved in deadly fight; judge declines to issue warrant - WSB Atlanta
Investigators push to charge security involved in deadly fight; judge declines to issue warrant WSB Atlanta
CBS 2 Investigators Discover Major Security Lapses At O’Hare Airport Perimeter Access Gates - CBS Chicago
CBS 2 Investigators Discover Major Security Lapses At O’Hare Airport Perimeter Access Gates CBS Chicago
Three security personnel killed in Iran amid wave of unrest The Washington Post
The Case for a National Security Budget Foreign Affairs Magazine
Minneapolis-St. Paul Airport leaders balk at TSA's closure of hotel security checkpoint - Minneapolis Star Tribune
Minneapolis-St. Paul Airport leaders balk at TSA's closure of hotel security checkpoint Minneapolis Star Tribune
Microsoft starts releasing fixes for Access bugs introduced in Office security patches this month - Computerworld
Microsoft starts releasing fixes for Access bugs introduced in Office security patches this month Computerworld
DOJ outlines slew of Strzok 'security violations,' says wife learned of affair through unsecured phone - Fox News
DOJ outlines slew of Strzok 'security violations,' says wife learned of affair through unsecured phone Fox News
Calls Grow for Added Security at Staten Island Mall Spectrum News NY1
A Primer for Holiday Travel Security Stratfor Worldview
Top National Security Council Lawyer Fielded Officials’ Ukraine Complaints - The Wall Street Journal
Top National Security Council Lawyer Fielded Officials’ Ukraine Complaints The Wall Street Journal
Brooklyn Bar Association CLE gives attorneys cyber-security tips to protect their clients - Brooklyn Daily Eagle
Brooklyn Bar Association CLE gives attorneys cyber-security tips to protect their clients Brooklyn Daily Eagle
Should Amazon pay workers waiting for security screenings? 6th Circuit asks SCOPA to decide - Pittsburgh Post-Gazette
Should Amazon pay workers waiting for security screenings? 6th Circuit asks SCOPA to decide Pittsburgh Post-Gazette
Experience the World of Interconnected Security on IDEMIA's Booth at Milipol Paris (november 19-22, 2019) - Business Wire
Experience the World of Interconnected Security on IDEMIA's Booth at Milipol Paris (november 19-22, 2019) Business Wire
Fortinet CEO: Network and security technologies give rise to security-driven networking - Network World
Fortinet CEO: Network and security technologies give rise to security-driven networking Network World
Ransomware Bites 400 Veterinary Hospitals Krebs on Security
MSP Airport officials slam TSA for closing security checkpoint at InterContinental Hotel - Bring Me The News
MSP Airport officials slam TSA for closing security checkpoint at InterContinental Hotel Bring Me The News
Why Were the Russians So Set Against This Hacker Being Extradited? Krebs on Security
The Top Cyber Security Certifications Hiring Managers Will Look For in 2020 - Hashed Out by The SSL Store™ - Hashed Out by The SSL Store™
The Top Cyber Security Certifications Hiring Managers Will Look For in 2020 - Hashed Out by The SSL Store™ Hashed Out by The SSL Store™
Lieutenant Colonel Alexander Vindman Doesn't Scare Easily. But It's Shameful We Have to Say So. - Esquire.com
Lieutenant Colonel Alexander Vindman Doesn't Scare Easily. But It's Shameful We Have to Say So. Esquire.com
The Security Impact of Digital Transformation BankInfoSecurity.com
CME's record prize sheds light on importance of financial security for LPGA players - Naples Daily News
CME's record prize sheds light on importance of financial security for LPGA players Naples Daily News
10 ways to kill your security career CSO Online
2 Top US National Security Aides Say They Were Troubled by Trump Call for Ukraine Investigations - Voice of America
2 Top US National Security Aides Say They Were Troubled by Trump Call for Ukraine Investigations Voice of America
Extra security at Warwick High School after social media threat surfaces 13newsnow.com WVEC
3 Iranian security forces said killed by protesters The Times of Israel
School of Medicine phishing incident raises security concerns The Daily Tar Heel
Huawei back in New Zealand's 5G plans despite security concerns Nikkei Asian Review
Doorbell cameras: Privacy vs security WNEM Saginaw
Security guard shoots, kills man at Florida nightclub WPLG Local 10
GitHub launches Security Lab to boost open source security Naked Security
Trump’s Choice: National Security or Political Obsession The New York Times
In Sri Lanka’s Presidential Election, a Question of Security vs. Rights The New York Times
Security VAD Ignition signs up Google's threat-hunting platform Chronicle www.channelweb.co.uk
Chile's Sebastian Pinera vows action over security force abuses Al Jazeera English
Clumio Announces Secure SaaS Backup for AWS Business Wire
Syracuse University beefs up security, offers $50,000 in rewards following racial incidents - syracuse.com
Syracuse University beefs up security, offers $50,000 in rewards following racial incidents syracuse.com
Intel Fixes a Security Flaw It Said Was Repaired 6 Months Ago The New York Times
A10 Networks' Multi-Cloud Blueprint Provides Intelligent Automation of Polynimbus Secure Application Services - Business Wire
A10 Networks' Multi-Cloud Blueprint Provides Intelligent Automation of Polynimbus Secure Application Services Business Wire
Ambassador’s cellphone call to Trump from Kyiv restaurant was a stunning breach of security, former officials say - The Washington Post
Ambassador’s cellphone call to Trump from Kyiv restaurant was a stunning breach of security, former officials say The Washington Post
Mass Shootings Raise Questions About Security and Training The Wall Street Journal
CRPF writes to states, UTs on Gandhi's new security cover; to seek 1,000 more troops - Economic Times
POLICE: 'non-credible' threat made to Valders schools, added security Monday as classes resume - WBAY
UCL strike: Hundreds of outsourced cleaners, porters and security guards protest to demand better conditions - The Independent
UCL strike: Hundreds of outsourced cleaners, porters and security guards protest to demand better conditions The Independent
Protecting Your Character On The Internet
Afraid that a celebrity is monitoring your PC or installed a keylogger to best ever every lone keystroke? Find out which tools you need to get to make sure you are protected.X-Cleaner Deluxe http://www.
The Chief Steps To Keep Your Kids on the Internet
Internet is the ocean of knowledge. In this ocean you will find charming pearls of knowledge.
Behavior to Stay Safer Online
1. Consequence of a Virus Scanner: A Antivirus course can help to foil you from apt infected with a Virus or Trojan.
What is Hacking? Are You a Hacker?
WHAT IS HACKING?Hacking, every so often known as "computer crime" has only freshly been taken very seriously. The actions undertaken by the real hackers have been criminalized and they are now being officially persecuted on a scale disproportional to the concrete intimidation they pose.
Protect Your Barely Black Book
The movie A small amount Black Book skin texture a young woman, Stacy, who is frustrated when her boyfriend refuses to share in rank about his past relationships. When his PDA, a Palm Tungsten C, falls into her hands, she is faced with a conundrum.
Social Commerce - The Real E-Terrorism?
One evening, all through the necropolis shift, an AOL mechanical aid machinist took a call from a hacker. At some stage in the hour long banter the hacker mentioned he had a car for sale.
8 Dependable Ways to Spot an EBAY Scam E-Mail and Care for Manually from Character Theft
Ebay is a great site and is used by many to buy and sell new and used Items. It truly is the worlds Biggest Garage Sale Regrettably when an online site becomes as big and admired as E-Bay the scam artists seem to just biologically follow.
Hacking Threats and Caring Security
The 1998 Data Armor Act was not an addition to, but instead a alternate which retains the accessible provisions of the data guard coordination conventional by the 1984 legislation. The Act was to come into force from 24 October 1998 but was delayed until 1st March 2000.
Phishing - Learn To Categorize It
Phishing: (fish'ing) (n.)This is when a big name sends you an email deceitfully claiming to be a legitimate commerce - like your bank or acclaim card band - in an challenge to scam you into charitable them your personal, concealed in a row that they can use to approach your accounts.
Detect Spyware Online
You can become aware of spyware online using free spyware cleaners and by installing spyware defense software on your computer. Often it's best to start with free spyware cleaners as these free programs will confiscate any spyware programs at present in a row on your computer.
Virus Nightmare..Lessons Learned
I got a virus the other day, Thursday I accept as true and since then I have been assembly FRANTIC pains to save all my info.The most chief thing for me to save are my Outlook Definite emails and my Roboform passwords.
Cybercriminals Trick: Embattled Trojan-Containing Emails
Threats we everyday Web users face online leave us no array but learn. Haven't you noticed how many new belongings you cultured lately? We are much advance conversant about malicious programs than just a year ago.
The Truth About Thrashing Your Tracks on the Internet
Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads adage "Your mainframe is under surveillance!" And all you need to do is buy their effect and your computer's visbility will dissolve from the Internet.
Is The Internet Over Regulated
Today's Internet or World Wide Web is being over regulated.But, are you being taken for a ride, are you lead to consider that Governments World Wide are creating new legislation for your benefit or are there underlying factors that these laws are more beneficial to Governments and big business?First we had the Can-Spam and other laws accepted adaptable the conveyance of unsolicited commercial e-mail, that contains false or not to be trusted business information, or that is sent from null e-mail addresses, but for me, my inbox still seems to continually be full of junk mail.
Online Shoppers, Beware of a New Scam
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy a bit cheap is categorically natural--and online crooks set traps for ignorant bargain-hunters. On April 6 Panda Software warned Internet users of a new above all audacious scam aimed at stealing confidential information.
Spyware SolutionProbably Today's Largest Central processing unit Problem. You Endure Devoid of Aware Your PC is Infected! "The personal property can be devastating.
Types Of Central processing unit Infections
Computer infections can be busted up into 4 main categories which are explained in conscript below:VirusesComputer Viruses are small pieces of software that add themselves to real programs. An exemplar would be a virus that attaches itself onto windows explorer.
How to Fight Spyware
If you are wondering how to fight spyware for safe web surfing, this Internet privacy clause will counter some of your questions. By now you have almost certainly heard about the dangers of spyware.
Road Fighter At Risk: The Dangers Of Ad-Hoc Wireless Networking
Airport Menace: The Wireless Tweeting Tom ---------------------------------------- As a arrangement guarantee consultant, I pass through quite frequently. At times, it seems like the airport is my be with home.
The Risk Of Electronic Fraud & Individuality Theft
Electronic Fraud and Characteristics Theft ----------------------------------- Human beings are beautiful judicious when existing with an imminent hazard or risk. That is, if it's staring us directly in the face.
|home | site map|
|goldenarticles.net © 2019|