www.1001TopWords.com |
Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers
I am the victim of an internet scam. It is very hard to write that sentence, but it's necessary in order to warn my fellow clowns, magicians and other entertainers, and to prevent them from being taken for $2,800.00 like I was. Here is what happened to me, and how you can avoid it. I run the clown-ministry.com web site, and I perform as a clown at both ministry and secular events. Due to the popularity of the clown-ministry.com web site (do a search on Google .com for 'clown' and it's the 7th site listed, for example) I'm easily found by people -- for both good and bad reasons. For instance, last year my wife Ellen and I taught clowning for a week at the Seventh Day Adventists' national Camporee -- we're not Adventists, and don't know many people who are, but we were found by them & hired primarily due to the popularity of the web site. We've been invited to perform in clown at a conference in Canada, performed at company picnics, etc. well out of our neck of the wood, and so on. Please understand that this isn't bragging; it's setting the stage for what happened in the scam. We were contacted via e-mail by someone purportedly from Cincinnati, Ohio, who wanted to fly my wife & I to Cincinnati to perform at a birthday party. Since we'd had similar things happen in the past, that didn't set off any alarms in my head. In addition, I knew that there are entertainers such as Jennifer Lopez who will sing "Happy Birthday" at your party, for a fee of $50,000.00; I'm no J Lo, and my singing is atrocious, but I charge a lot less as well :) I did an internet search on that person (I'm not using the name he gave, since there's a criminal investigation as well as FBI investigation going on -- no joke), and found someone by that name in Cincinnati, Ohio, a "regional celebrity" so to speak. So, it didn't seem incredulous that he would have the money to hire us as well as pay round trip air fare. It's now obvious that it was merely someone using that person's name to "hook" us. At that point, my wife & I were still inclined to think of this as a prank, but even so we replied to the email with a quotation for our services, politely and professionally. We were joking with each other that this had to be a prank; after all, why would someone hire us when there are hundreds of clowns in the Cincinnati area? Unless it was someone with money to burn who wanted to buy "bragging rights," it made no sense. So we forgot about it, until the person replied back, hiring us. We still considered it a joke, until we received a check in the mail, for $2,800.00. MUCH more that we had quoted our services for! We thought that, maybe, the excess was to pay for round trip air fare and accommodations, but even so that was far too much. We e-mailed the person back, explaining that we had received $2,800.00 via check. His response is what should have tipped us off to the scam. He replied that, since he was out of the country on a business trip, he had his personal assistant send the checks out for the party, and the assistant had made a mistake, combining with our check one for $2,300.00 for the photographer from the United Kingdom that he was flying in to photograph the party. Would we be so kind as to send him those funds via Western Union? Like an idiot, I said "yes." The check had been deposited and cleared (I thought), and I didn't want to hold onto money that didn't belong to me. So, I went to the local Western Union office and sent $2,300.00 to an individual in the United Kingdom. This didn't set off any red flags (although it should have) since it seemed like the type of silly mistake I've seen people do before. What happened next, though, set off every red flag in my head, and then some. Days later, I received another email from the man supposedly from Cincinnati. According to him, his mother had an advanced form of lung cancer, and needed an immediate operation. He wanted me to send the remaining money to his mother's doctor in Nigeria and he would reschedule the party later. When I heard the word 'Nigeria' I had icicles running up and down my spine. Nigeria is famous, in the internet world, for being home to the most prolific scam of all time. You've likely received spam email about it. In a nutshell, it involves the widow of some minister or rich person, who is trying to smuggle their immense fortune out of the country before it's seized by her dead husband's adversaries; in exchange for letting them use your bank account, they will give you (various amounts of money, if not enough to make you filthy rich, at least enough to make you dingy). Of course, no money comes out, but these people proceed to rob your bank account of every penny. So, when I heard that, fear clutched at my heart. Besides, why would someone rich enough to hire me (and fly a photographer in from the UK) need my money? The answer is, he didn't; he was just trying to bilk me of more money before his ruse was exposed. You see, when I initially deposited the $2,800.00 check, it appeared to clear; it was then several more days before he requested the $2,300 to his photographer, and nearly a week (from the time I deposited the check) until I complied with that. 11 days after the check was initially deposited, it came back 'funds denied.' The bank then debited $2,800.00 from my checking account -- which didn't contain that much, of course. So, I'm out $2,800.00, the crook (or his accomplice in the UK) received $2,300.00. What's the moral of the story? The purpose of this is two-fold: to warn my fellow clowns, and to point out the red flags that I should have seen, and what I should have done. So, that's where it lies. I'm out $2,800.00, and in danger of losing my house due to the actions of this criminal. Jesus Christ orders His followers to "pray for those who despitefully use you" (Matthew 5:44). It's difficult, but I'm praying. Thank you for listening -- be sure to protect yourself and your loved ones. Tom Raymond, aka. Raynbow the magic clown, is a professional clown and underemployed computer geek, webmaster of http://www.clown-ministry.com/ the largest clown resource site on the web. His personal site can be found at http://www.clown-ministry.com/raynbow/
|
RELATED ARTICLES
Delete Cookies: New-Age Diet or Common Sense Internet Security? No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them. Computer cookies actually have quite a bit in common with their baked counterparts - some are good, some are bad, and they have expiration dates. Top Five Spyware Fighting Tips Spyware and adware are becoming major problems for onlinesurfers and PC owners. Some highly respected sources such as AOL, Earthlink and Webroot place the rate of infection at 80-90% of all computers. Granted, some of this percentage is taken up by relatively benign tracking cookies, but other types like keyword logging, system monitors, worms and Trojans present a major threat to your privacy and may even do serious damage to your computer. The Importance of Protecting Your PC from Viruses and Spam Today the internet is a mine field of malicious code looking to harm your computer. Hackers want to have access to your PC for both fun and profit. You must be diligent in your ability to detect and then protect your important computer data. Phishing: A Scary Way of Life The Federal Bureau of Investigation has identified "phishing" as the "hottest and most troubling new scam on the Internet." Phishing - A High Tech Identity Theft With A Low Tech Solution Have you ever got an email asking you to confirm your account information from a bank or a company that you have never done business with? The email looks official and it even has a link that appears to take you to the company's website. The email you have received is actually from an identity thief. These crooks are hoping people that have an account with the business will click on the link and submit their account information for verification purposes. These thieves are phishing for account information. Phishing is a sophisticated way to lure you to phony websites where you voluntarily surrender your passwords and account information to identity thieves without realizing it. Avoid Internet Theft, Fraud and Phishing Since its birth, the Internet has grown and expanded to unprecedented, unmanageable proportions. Information, software, news, and much more flow freely through its twisted pathways. Online services such as Internet banking save time and money. However, from the depths of its vast expanse have come the dregs of society intent on preying on the new, the naïve, and the less informed. Phishing Recently I have received email from my bank/credit Card Company, eBay & pay pal saying that my account has possibly been compromised and I need to confirm my details and password in order to get continued access. Can I Guess Your Password? We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access? The Risk Of Electronic Fraud & Identity Theft Electronic Fraud and Identity Theft-----------------------------------Human beings are pretty sensible when presented with an imminent threat or risk. That is, if it's staring us directly in the face. Many threats and risk are presented in subtle ways, and it is these subtleties we tend to overlook. Spyware Protection Software Spyware protection software is the easiest way of removing spyware from your computer and keeping it away. It detects and removes all pieces of spyware and adware automatically. Spyware is extremely difficult to remove manually and should only be removed with spyware protection software. Breaking Into Your PC: News... You'd better learn news from media, not from emails, security experts warn us users again. 3 Pervasive Phishing Scams Scams involving email continue to plague consumers across America, indeed the world. These so called "phishing" scams involve "spoofed" emails meant to draw the unwary to bogus internet sites masquerading as legitimate sites. These scam artists -- phishers -- attempt to hook visitors in by having them divulge certain critical and personal bits of information. Once the information has been divulged the phishers start their dirty work and you have been conned. Several phishing scams continue to persist, the following are three of the most pervasive ones. The Top Twelve Threats No Computer User Should Ignore The internet is undoubtedly a fantastic resource for families and offers a rich vein of educational content. Firewall Protection - Does Your Firewall Do This? The first thing people think about when defending their computers and networks is an up-to-date antivirus program. Without this most basic protection, your computer will get a virus, which could just slow it down or potentially bring the pc to a complete standstill!So anti-virus software is the answer?An anti-virus solution on it's own is not the answer to all of your problems, it can only protect you so much; in fact test have shown that a new pc running Windows XP if left connected to the Internet unprotected will be infected with viruses and remotely controlled via unauthorised persons within 20 minutes! To protect you against hackers and often to prevent spyware and 'scumware' from communicating directly with their servers about information it may have picked up from your pc, a firewall should form the key part of your e-security solution. Previously, the targets of hackers were large institutions, banks and government organisations; now hackers try to steal your personal information, including bank details and passwords directly from your PC on a daily basis. But perhaps you don't consider that your data is particularly valuable? You will be the one who suffers the consequences when it is destroyed, and these consequences are usually expressed in economic terms. If you lose your data, you will have to pay someone to try and recover it for you, and if your computer is illegally hijacked and used to attack others, then you will also have to handle any legal issues that may result from this.What will a firewall do to limit the danger to your systems?A decent firewall is sometimes referred to as a 'choke-point' or 'bridge'. Every piece of data that comes into your network has to go through the firewall in order that data of undesirable content and unauthorised users cannot gain access to your computer or network.A good firewall will also hide the fact from others, that you are actually connected to the Internet, stopping software that pings, sniffs and queries IP addresses in the hope of finding a system to attack.A firewall will cloak me, but which one do I need?There are two different types of firewall available for you to use; a software firewall that is loaded onto your computer and a hardware firewall. In truth, both types are software, but the hardware one is a dedicated firewall appliance, whose only job is to perform firewall functionality. A clear advantage of a hardware firewall, is that if you happen to install some sort of maleware or virus on your system, it cannot take over your firewall.Unified Threat Management firewall functionalityUnified Threat Management products are defined as those that act as firewalls, include intrusion detection and protection, and also deal with viruses. Does your current firewall perform content filtering, spam filtering, intrusion detection and anti-virus duties? All of these functions are usually on a number of different pieces of hardware, taking up valuable space in your server racks.The technology within business grade firewalls has become considerably more robust recently, and paved the way to add these additional, but vital functions to the one appliance. The administration time has been cut significantly, as there is only one appliance; product selection is quicker and easier, as is product integration and ongoing support. With only one appliance, troubleshooting also becomes a lot less of an issue. If the firewall were to fail, then only one piece of hardware needs to be swapped out; which means that your business can be back up and running faster.Winding upIn conclusion a good firewall should do the following things:Protect your personal dataProtect your computers resourcesProtect your reputation and that of your businessProtect your liabilityIdeally be capable of Unified Threat Management Consumers: Shop Online and Get Information Safely Do you really have to know how feeds work? Not really. But you do need to understand how they can benefit you as a consumer or as an information seeker. Phishing: An Interesting Twist On A Common Scam After Two Security Assessments I Must Be Secure, Right?---------------------------------------Imagine you are the CIO of a national financial institution and you've recently deployed a state of the art online transaction service for your customers. To make sure your company's network perimeter is secure, you executed two external security assessments and penetration tests. When the final report came in, your company was given a clean bill of health. At first, you felt relieved, and confident in your security measures. Shortly thereafter, your relief turned to concern. "Is it really possible that we are completely secure?" Given you're skepticism, you decide to get one more opinion. Dont be a Dork ? Protect Yourself There are folks out there who use their powers for evil, not good. Let's not give them the opportunity to sneak into our lives and wreak havoc. Submitted for your reading pleasure are some of my tips to protect yourself and your identity. Firewalls: What They Are And Why You MUST Have One! A firewall is a system or gateway that prevents unauthorized access to your computer or private network. It is usually the first line of defense in protecting your private information or data. A good firewall will help protect you from malicious attacks of spyware, adware, malware, worms, trojans, and hackers. Temporary Internet Files - the Good, the Bad, and the Ugly A little bit of time invested into learning about internet security can go a long way in preventing mishaps on your computer. Temporary internet files are not something we should be afraid of, but we should certainly be careful in how much we trust them and how we deal with them. Securing Your Accounts With Well-Crafted Passwords In the past I've never really paid much attention to security issues when it comes to user names and passwords. Frankly I figured it was all a lot of overblown hype. This led to an unfortunate incident that involved my website being attacked, apparently by a skillful youth with a propensity for mischief. |
© Athifea Distribution LLC - 2013 |