Swindlers Are After Your Money
No matter how or “why” scammers contact you (why in quotes because the reason is usually false), they’re after one thing: to separate you from your money.
Social media scammers might pretend to be one or more of the following
- an expert book promotion specialist
- an agent looking for new clients
- a famous author who wants to hook you up with their book marketer
- a well-known publisher who guarantees to put your book in their book catalogue
- an actor, producer, or director who wants to turn your book into a movie or television series
- a man or woman who wishes to establish a romantic relationship
- a financial expert who can recommend the best way to accumulate Bitcoin or [__________]
- a “family member” who is down on their luck
- a person who needs money for [__________] and has set up a donation account
- , etc., etc., and disgustingly, etc.
Why Are There So Many Scammers?
Answer: greed.
The internet is overflowing with naïve victims willing to part with their cash.
A single scammer can set up several profiles, all with different throwaway e-mails, rotating IP addresses, and fake user-agent strings. This makes it difficult for social media apps to identify the scammer. And it also illustrates the futility of blocking people. Their other fake profiles can still see and interact with you.
If enough users report an account, it might be removed from social media. But the person behind the account just switches to another fake profile.
Definitions
IP address: a string of characters unique to each device that connects to the internet; i.e., no two routers in the world will have the same IP address (“DNA” for routers and modems); however, several devices can operate via the same router or modem
router: a device that forwards information to and from a computer network
modem: a device that converts signals created by one type of electronic device (such as a computer) to enable it to interact with another type of device (such as a telephone)
browser ID string: a characteristic string for a device (not unique) that allows other devices to identify the application, operating system, vendor, and version of each device
operating system: the software, used by a computer system, that controls its basic functions (Microsoft Windows, Apple IOS, Google Android, Linux, etc.)
app: software (computer program) that helps users perform specific tasks on a desktop or mobile device
The Writer’s Lexicon series
and additional resources on my Facebook page.
How to Recognize a Scammer
#1: If you’re contacted by a well-known person such as Taylor Swift, J. K. Rowling, Stephen King, or Elon Musk, it’s unlikely to be a valid account (unless you have some previous association with them).
#2: You receive direct messages such as:
- Are you author?
- hello.
- Wear to you live?
- You are a big winner. Please DM for how to collect your money.
- Click here to [verify your ID, claim your prize, get 5000 followers].
#3: The scammer’s “friends” may be all male or all female. Or you might recognize some of the “friends” as other scammers you’ve already encountered.
#4: The scammer might blackmail you, threatening to publicize compromising photos. They might even create AI photos.
#5: The scammer might ask for money. “I can’t afford [__________], and I need money within the next 24 hours or [__________].
6: Another approach: “Contact me for confidential details of how you can make quick easy money by [__________].”
7: Some scammers will ask you to interact with them on a different chat app. The app they suggest often contains malware such as key loggers.
Definitions
malware: malicious software that causes disruption to a computer, server, client, or client network; it may leak private information, permit unauthorized access, or hinder function of devices using the software
server: a computer program or device that provides services to another program or device referred to as the client
key logger: malware or hardware that tracks and records every keystroke a person makes; hackers use key loggers to record passwords and other private information
hacker: a person well-versed in technology who often gains illegal access to computer systems
Twelve Ways to Protect Yourself
The following measures will help you maintain your privacy.
- Always use a non-published e-mail for social media accounts, preferably a different e-mail for each social media network.
- Never reveal details that could allow a scammer to contact you outside of social media.
- Make your year of birth private. Some people obscure their entire birthdate. You won’t receive Happy Birthday wishes, but …
- Never reveal details that could aid in identity theft (name of mother and/or father, social security number, password information, marriage license details, birth certificate particulars, bank account info, credit card info, etc.).
- To prevent being hacked (not cloned) set up a difficult-to-guess, DIFFERENT password for every social media account.
- Report all suspicious accounts to the social media platform.
- Never reveal travel plans. Save your photos and details until after you return.
- Disable geolocation on all your devices. Do you need anyone to know you’re sitting in the Starbucks on 10th Avenue when you post a selfie?
- Be wary of advertisements for products or services endorsed by celebrities.
- Stop participating in quizzes on social media. Every answer provides more fuel for identity thieves.
- Never click on a link in a direct message, email, or advertisement unless you know the sender.
- Trust your distrust. If something seems too good to be true, it probably is.
Remember: Everything you say on social media stays on social media. It can reveal personal details, and affect employment opportunities and public perception of you. For as long as you live.
Definition
geolocation: software that can identify the geographic location of a device
The Difference Between Hacking and Cloning
If you’ve been hacked, someone has used your e-mail address and password to take over your account.
If you’ve been cloned, someone has copied your photos and details to create a lookalike account.
P.S.
You’ll notice a few definitions throughout this post. If I missed anything, please leave a comment within the next 90 days, or contact me.
P.P.S
Now go out there and enjoy yourself.
You deserve it.
The Writer’s Lexicon series
and additional resources on my Facebook page.
Discover more from KathySteinemann.com: Free Resources for Writers
Subscribe to get the latest posts sent to your email.
Thanks, Kathy. We all need to be reminded from time to time.
My pleasure, Thomas.
A spammer contacted me on X. I shouldn’t engage, but sometimes I can’t resist. It’s unlikely I’ll hear from them again.
From a Spammer:
Hi, We’ve been admiring your work and think it would be a great fit for a feature on our page. We believe our audience will resonate with your work.
Will you be interested?
10:35 AM
From me:
You’ve been admiring my work. That is wonderful. I lost my job two months ago and could use some FREE help to sell it. Food is expensive, pet food is expensive. I had to sell my car to afford food and rent. I don’t when I’ll get any money to pay rent.
From me:
It would be wonderful if you would promote my book for free. I make so little money, and I need to sell my 99c book to pay for rent next year. I only make 30 cents a book, so anything you can do to help me for free would be great.
LOL. I love it.
First, I never respond to unsolicited emails. If I want to find an agent, I’ll search and go to them.
Second. Be careful, even if the email purports to come from someone you know. I’ve had emails from two friends, supposedly. One was sending me pictures, it said. I knew he wouldn’t do that. But I’ve had that several times until I blocked him.
The other was supposedly from an old school friend asking for a favour. I emailed back asking her to answer a couple of questions a scammer wouldn’t know. I heard nothing more.
The scammers are very clever and you have to be on your guard all the time.
Excellent advice, Vivienne. Wouldn’t our lives be easier if we didn’t have to deal with dishonest people?