How Scams Work and Fool Millions of People Every Year

Every year, millions of people lose billions of dollars to fraud and scams. And the con artists won’t be going anywhere soon. New scams are created every day. For instance, this year in the U.S. one in ten people will fall victim to a scam.

Know how scams works, and you can work your way out of one.

Research and surveys clearly show that knowledge and awareness regarding scams can reduce the chance of being a victim. The more we know how scams work, therefore, the less likely we are to become victims of them.

Knowledge is power. The power to stay safe.

 

How Scams Work Infographic
(Right click on the infographic to display it on your website.)

From start to finish, here is what makes a “successful” scam work.

A successful scam by a con artist happens only when they get what they were out for—usually someone’s money.

It doesn’t happen by accident. They’re not waiting for people to drop their wallets, leave their purse or backpack unattended, or leave their front door unlocked. Scammers create their fraud with precision.

A scam is a plan that a con artist rolls-out hundreds of times a day. And even though the scammer knows their schemes won’t work 80%-90% of the time, that doesn’t matter. The payoff they get from their victims is worth it.

Here’s a breakdown of how 5 components of a scam turn a target into a victim.

1. It starts with a devious plan.

ScammerA scammer is a liar and a thief, make no mistake about it.

The scammers “tool” is trickery, deceit, lies, and a plan (a scheme). It takes the form of a message, with the promise of something very special that people want—money, a job, riches, love. Once he or she has a scheme, they're ready to launch their fraud on the world.

Scammers are devious. They often prey on innocent, vulnerable, and desperate people, often taking advantage of their kind-hearted nature.

Scammer are liars and impersonators—you won’t always see them coming.

2. Add targets (potential victims).

People being targetedA scam involves two people—the scammer and a target, a potential victim. Almost anyone can be a target at any time for fraud of some kind.

Consider yourself a target for a scammer right now. One day and maybe soon, you’ll likely be talking to a scammer, getting a message from one, or reading a fraudulent email or letter.

Just remember that being a target is not the same as being a victim. If you can sniff out the scam while it’s unfolding, you can bring the con’s plan to a quick halt.

That’s why it’s important to be aware of the different kinds of scams out there today. A believable yet devious scheme has the power to fool.

Consider yourself a target at any time. If you do, your eyes will be open and your radar will be up.

Scams and Fraud: How They Trick Millions into Losing Billions: #HowScamsWork Share on X

3. There’s the sales pitch, the hook.

Dangling carrotFraudsters must initiate a conversation to the target, to get their scheme underway. They contact people through phone calls, emails and texts. They’ll sometimes post ads on websites or on social media. To them, it’s a numbers game to them. That's why they’ll keep sending out messages, because they know a percentage of people will respond.

The scammer’s message usually isn’t personalized. They typically don’t know your name or much about you. They simply have a sales pitch or an opportunity they hope will catch your attention.

Often their message—the hook—will seem reasonable or even interesting: they may pose as a buyer interested in what you’re selling online, or they want to hire you for the professional services you provide, such as photography. Scams work because they’re well thought out.

Scammers know some people will listen to their sales pitch, and that’s all they’re hoping for.

A scammer’s “hook” is a lie that will sound a lot like the truth.

4. The potential victims listen—they “engage” with the scammer.

Two people talkingScammers need the attention of their targets to get their deceptive story going.

They don’t always get it. Research shows, for instance, that almost 50% of people who get an unwanted message don’t waste a second listening. They instantly reject the message and move on. (Think of it like getting a sales call and just hanging up.)

The other 50%? They’ll keep listening…at least initially. That’s what scammers need: the ears and attention of their targets, so the con artist can tell their whole message and hook people.

The research shows as many as 85% of people who were listening (initially engaged) will eventually—it could be after a few minutes, or it could be just before losing money. Good for them.

Those who keep on listening and talking to the scammer, however, aren’t so lucky.

Scammers need only a small percentage of people to stay engaged in the conversation.

5. Scammers turn fully engaged listeners into victims.

A victimThe targets who eventually become victims fall into a wide variety of scams, but they all share one thing in common:
They kept listening the scammers lie, believing it and hoping for the best. They do it right up to the point when they realize their hopes—and money—have vanished, and there is nothing to show for it. For victims, it goes something like this:

  • The victim got a new job and had to pay for supplies and training: they sent their money and received nothing for it.
  • The victim accepted a check for a professional service and agreed to send some cash to someone else as part of the deal. The check bounced and their cash disappeared.
  • They paid for merchandise online that never arrived or came damaged, and the seller disappeared with their money.
  • The victim won a sweepstakes prize that never arrived—even after they paid a fee to get it.

If you willingly give a scammer your full attention, they will happily take your money.

Knowledge is your best defense. Listen to the Easy Prey podcast.

Here’s what we know. The more information someone knows about scams and how they work, the less likely they are to become a victim of one. There are hundreds of scams and millions of victims every year.

The best defense isn’t the police or the FBI—they get involved after people become victims of a scam—it’s knowledge and awareness that can keep you out of scammers’ grip.

That’s why you need to learn about scams, how they work, what they sound and look like—so you can avoid being a victim.  For instance, in this article you learned that hanging up on an unwanted call is a sure-fire way to avoid a potential scammer. You need to find information resources you can trust.

The Easy Prey podcast is devoted to helping listeners avoid scams by providing insights, information and advice, in a friendly, easy-listening format.

You can find the Easy Prey podcast on iTunes, Google Play and other media player platforms.

Listen to the Easy Prey podcasts.
The more you know, the safer you are.

See All Episodes

 

About Your Host

Chris Parker

Chris Parker is the founder of WhatIsMyIPAddress.com, a tech-friendly website attracting a remarkable 6,000,000 visitors a month. In 2000, Chris created WhatIsMyIPAddress.com as a solution to finding his employer’s office IP address. Today, WhatIsMyIPAddress.com is among the top 3,000 websites in the U.S.

Share Post:

COULD YOU BE EASY PREY?

Take the Easy Prey
 Self-Assessment.

YOU MAY ALSO LIKE

If you’ve ever felt like your smart devices are “spying” on you and silently collecting your personal data to feed the almighty algorithm or…

Less than 30 years ago, biometric security seemed like something out of science fiction—reserved for futuristic thriller films like The Bourne Identity or Mission:…

Professionally and personally, most of us spend a lot of our time online. We use our smartphones and our personal computers for everything from…

PODCAST reviews

Excellent Podcast

Chris Parker has such a calm and soothing voice, which is a wonderful accompaniment for the kinds of serious topics that he covers. You want a soothing voice as you’re learning about all the ways the bad guys out there are desperately trying to take advantage of us, and how they do cleverly find new and more devious ways each day! It’s a weird world out there! Don’t let your guard down, this podcast will give you some explicit directions!

MTracey141

Required Listening

Somethings are required reading – this podcast should be required listening for anyone using anything connected in the current world.

Apple Podcasts User

Fascinating stuff!

I've listened to quite of few of these podcasts now. Some of the topics I wouldn't have given a second look, but the interviewees have always been very interesting and knowledgeable. Fascinating stuff!

Apple Podcasts User

Excellent Show

Excellent interview. Don't give personal information over the phone … it can be abused in countless ways

George Jenson

Interesting

I've listened to quite of few of these podcasts now. Some of the topics I wouldn't have given a second look, but the interviewees have always been very interesting and knowledgeable. Fascinating stuff!

User22

Content, content, content!

Chris provides amazing content that everyone needs to hear to better protect themselves and learn from other’s mistakes to stay safe!

CaigJ3189

New Favorite Podcast!

Entertaining, educational and I cannot 
get enough! I am excited for more phenomenal content to come and this is sthe only podcast I check frequently to see if a new episode has rolled out.

brandooj

Big BIG ups!

What Chris is doing with this podcast is something that isn’t just desirable, but needed – everyone using the internet should be listening to this! Our naivete is constantly being used against us when we’re online; the best way to combat this is by arming the masses with the information we need to stay wary and keep ourselves safe. Big, BIG ups to Chris for putting the work in for us.

Riley

As seen on

COULD YOU BE EASY PREY?

Take the Easy Prey Self-Assessment.
close

Copy and paste this code to display the image on your site

COULD YOU BE EASY PREY?

Take the Easy Prey Self-Assessment.

We will only send you awesome stuff!

Privacy Policy

Your privacy is important to us. To better protect your privacy we provide this notice explaining our online information practices and the choices you can make about the way your information is collected and used. To make this notice easy to find, we make it available on every page of our site.

The Way We Use Information

We use email addresses to confirm registration upon the creation of a new account.

We use return email addresses to answer the email we receive. Such addresses are not used for any other purpose and are not shared with outside parties.

On occasion, we may send email to addresses of registered users to inform them about changes or new features added to our site.

We use non-identifying and aggregate information to better design our website and to share with advertisers. For example, we may tell an advertiser that X number of individuals visited a certain area on our website, or that Y number of men and Z number of women filled out our registration form, but we would not disclose anything that could be used to identify those individuals.

Finally, we never use or share the personally identifiable information provided to us online in ways unrelated to the ones described above.

Our Commitment To Data Security

To prevent unauthorized access, maintain data accuracy, and ensure the correct use of information, we have put in place appropriate physical, electronic, and managerial procedures to safeguard and secure the information we collect online.

Affiliated sites, linked sites, and advertisements

CGP Holdings, Inc. expects its partners, advertisers, and third-party affiliates to respect the privacy of our users. However, third parties, including our partners, advertisers, affiliates and other content providers accessible through our site, may have their own privacy and data collection policies and practices. For example, during your visit to our site you may link to, or view as part of a frame on a CGP Holdings, Inc. page, certain content that is actually created or hosted by a third party. Also, through CGP Holdings, Inc. you may be introduced to, or be able to access, information, Web sites, advertisements, features, contests or sweepstakes offered by other parties. CGP Holdings, Inc. is not responsible for the actions or policies of such third parties. You should check the applicable privacy policies of those third parties when providing information on a feature or page operated by a third party.

While on our site, our advertisers, promotional partners or other third parties may use cookies or other technology to attempt to identify some of your preferences or retrieve information about you. For example, some of our advertising is served by third parties and may include cookies that enable the advertiser to determine whether you have seen a particular advertisement before. Through features available on our site, third parties may use cookies or other technology to gather information. CGP Holdings, Inc. does not control the use of this technology or the resulting information and is not responsible for any actions or policies of such third parties.

We use third-party advertising companies to serve ads when you visit our website. These companies may use information (not including your name, address, email address, or telephone number) about your visits to this and other websites in order to provide advertisements about goods and services of interest to you. For information about their specific privacy policies please contact the advertisers directly.

Please be careful and responsible whenever you are online. Should you choose to voluntarily disclose Personally Identifiable Information on our site, such as in message boards, chat areas or in advertising or notices you post, that information can be viewed publicly and can be collected and used by third parties without our knowledge and may result in unsolicited messages from other individuals or third parties. Such activities are beyond the control of CGP Holdings, Inc. and this policy.

Changes to this policy

CGP Holdings, Inc. reserves the right to change this policy at any time. Please check this page periodically for changes. Your continued use of our site following the posting of changes to these terms will mean you accept those changes. Information collected prior to the time any change is posted will be used according to the rules and laws that applied at the time the information was collected.