![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers
I am the victim of an internet scam. It is very hard to write that sentence, but it's necessary in order to warn my fellow clowns, magicians and other entertainers, and to prevent them from being taken for $2,800.00 like I was. Here is what happened to me, and how you can avoid it. I run the clown-ministry.com web site, and I perform as a clown at both ministry and secular events. Due to the popularity of the clown-ministry.com web site (do a search on Google .com for 'clown' and it's the 7th site listed, for example) I'm easily found by people -- for both good and bad reasons. For instance, last year my wife Ellen and I taught clowning for a week at the Seventh Day Adventists' national Camporee -- we're not Adventists, and don't know many people who are, but we were found by them & hired primarily due to the popularity of the web site. We've been invited to perform in clown at a conference in Canada, performed at company picnics, etc. well out of our neck of the wood, and so on. Please understand that this isn't bragging; it's setting the stage for what happened in the scam. We were contacted via e-mail by someone purportedly from Cincinnati, Ohio, who wanted to fly my wife & I to Cincinnati to perform at a birthday party. Since we'd had similar things happen in the past, that didn't set off any alarms in my head. In addition, I knew that there are entertainers such as Jennifer Lopez who will sing "Happy Birthday" at your party, for a fee of $50,000.00; I'm no J Lo, and my singing is atrocious, but I charge a lot less as well :) I did an internet search on that person (I'm not using the name he gave, since there's a criminal investigation as well as FBI investigation going on -- no joke), and found someone by that name in Cincinnati, Ohio, a "regional celebrity" so to speak. So, it didn't seem incredulous that he would have the money to hire us as well as pay round trip air fare. It's now obvious that it was merely someone using that person's name to "hook" us. At that point, my wife & I were still inclined to think of this as a prank, but even so we replied to the email with a quotation for our services, politely and professionally. We were joking with each other that this had to be a prank; after all, why would someone hire us when there are hundreds of clowns in the Cincinnati area? Unless it was someone with money to burn who wanted to buy "bragging rights," it made no sense. So we forgot about it, until the person replied back, hiring us. We still considered it a joke, until we received a check in the mail, for $2,800.00. MUCH more that we had quoted our services for! We thought that, maybe, the excess was to pay for round trip air fare and accommodations, but even so that was far too much. We e-mailed the person back, explaining that we had received $2,800.00 via check. His response is what should have tipped us off to the scam. He replied that, since he was out of the country on a business trip, he had his personal assistant send the checks out for the party, and the assistant had made a mistake, combining with our check one for $2,300.00 for the photographer from the United Kingdom that he was flying in to photograph the party. Would we be so kind as to send him those funds via Western Union? Like an idiot, I said "yes." The check had been deposited and cleared (I thought), and I didn't want to hold onto money that didn't belong to me. So, I went to the local Western Union office and sent $2,300.00 to an individual in the United Kingdom. This didn't set off any red flags (although it should have) since it seemed like the type of silly mistake I've seen people do before. What happened next, though, set off every red flag in my head, and then some. Days later, I received another email from the man supposedly from Cincinnati. According to him, his mother had an advanced form of lung cancer, and needed an immediate operation. He wanted me to send the remaining money to his mother's doctor in Nigeria and he would reschedule the party later. When I heard the word 'Nigeria' I had icicles running up and down my spine. Nigeria is famous, in the internet world, for being home to the most prolific scam of all time. You've likely received spam email about it. In a nutshell, it involves the widow of some minister or rich person, who is trying to smuggle their immense fortune out of the country before it's seized by her dead husband's adversaries; in exchange for letting them use your bank account, they will give you (various amounts of money, if not enough to make you filthy rich, at least enough to make you dingy). Of course, no money comes out, but these people proceed to rob your bank account of every penny. So, when I heard that, fear clutched at my heart. Besides, why would someone rich enough to hire me (and fly a photographer in from the UK) need my money? The answer is, he didn't; he was just trying to bilk me of more money before his ruse was exposed. You see, when I initially deposited the $2,800.00 check, it appeared to clear; it was then several more days before he requested the $2,300 to his photographer, and nearly a week (from the time I deposited the check) until I complied with that. 11 days after the check was initially deposited, it came back 'funds denied.' The bank then debited $2,800.00 from my checking account -- which didn't contain that much, of course. So, I'm out $2,800.00, the crook (or his accomplice in the UK) received $2,300.00. What's the moral of the story? The purpose of this is two-fold: to warn my fellow clowns, and to point out the red flags that I should have seen, and what I should have done. So, that's where it lies. I'm out $2,800.00, and in danger of losing my house due to the actions of this criminal. Jesus Christ orders His followers to "pray for those who despitefully use you" (Matthew 5:44). It's difficult, but I'm praying. Thank you for listening -- be sure to protect yourself and your loved ones. Tom Raymond, aka. Raynbow the magic clown, is a professional clown and underemployed computer geek, webmaster of http://www.clown-ministry.com/ the largest clown resource site on the web. His personal site can be found at http://www.clown-ministry.com/raynbow/
MORE RESOURCES: California security firm CEO, workers charged after woman forcibly removed from Republican town hall Los Angeles Times Defense Officials Outline AI's Strategic Role in National Security U.S. Department of Defense (.gov) Why NHIs Are Security's Most Dangerous Blind Spot The Hacker News Belarus Weekly: Russian, Belarusian security services plan violent attacks on Belarusian diaspora The Kyiv Independent Remarks at a UN Security Council Briefing on the Political and Humanitarian Situations in Syria United States Mission to the United Nations (.gov) Summit on the Future of Energy Security IEA – International Energy Agency NSA targets OT cyber risks with new smart controller security standards for national security systems Industrial Cyber Allegiant flight attendant finds bomb threat just before St. Pete-Clearwater International departure: Sheriff FOX 13 Tampa Bay ATA Transportation Security Council Recognizes Fleets American Trucking Associations Get to know new security leaders at OSU-CHS Oklahoma State University Safeguarding Your Corporate Leaders Against Rising Security Threats: FP’s Guide on Executive Protection Fisher Phillips Signalgate lessons learned: If creating a culture of security is the goal, America is screwed theregister.com Legislature should provide lobbyists with key fobs to bypass new Capitol security screening The Alaska Landmine Security Alert: Los Cabos and La Paz, Baja California Sur U.S. Embassy & Consulates in Mexico (.gov) US House Committee subpoenas Chinese state telecoms over data privacy, national security concerns Industrial Cyber DOJ’s Data Security Program Final Rules Effective – Implications for Telecom Providers NatLawReview.com US Donates Decommissioned Cutters to Tunisia to Bolster Regional Security The Maritime Executive Court grants NM Tech student temporary restraining order against Homeland Security Source New Mexico Kristi Noem’s Stolen Purse at a Burger Joint Is Still a Washington Mystery The New York Times Mobile Applications: A Cesspool of Security Issues Dark Reading Judges Worry Trump Could Tell U.S. Marshals to Stop Protecting Them The New York Times Ukraine, allies working on security guarantees potentially similar to NATO Article 5, Zelensky says The Kyiv Independent King County Security Tips – “Google” yourself kcemployees.com National Security Commission on Emerging Biotechnology’s Final Report Includes Recommendations to Boost Economy and Protect National Security NatLawReview.com Inside the Fiasco at the National Security Council The Atlantic Footage Reveals New York-To-Paris Delta Flight Stowaway Getting Through Airport Security Travel Noire Tarleton State University elevates campus security, student safety with new mobile app. Beneath the Surface News Fiesta goers can expect increased security at main events Texas Public Radio Somos, Finite State partner to boost supply chain security through enhanced binary, source code analysis, and SBOM solutions Industrial Cyber Hyosung Urges Operators of All ATMs to Follow Previous Security Guidance Due to Large-Scale Cyberattacks Business Wire Associated Press: Civil rights groups sue to restore jobs at Homeland Security oversight offices that were gutted Robert F. Kennedy Human Rights New Security Perimeter Around Mt. Kolang Gaz La Secret Nuclear Tunnel Complexes Institute for Science and International Security (ISIS) Climate and National Security: Bridging the Divide in Energy Policy Columbia Business School KETS Quantum Security Futureproofs Critical Infrastructure For Government Contract The Quantum Insider Remarks at a UN Security Council Briefing on Haiti United States Mission to the United Nations (.gov) Rome Health to install new security systems Rome Sentinel Trump administration highlights economic growth and national security wins in April 2025 Fingerlakes1.com Trump Should Have Stuck With Border Security, Not Mass Deportations New York Magazine Two state officials join Department of Homeland Security Dakota News Now ‘We need to apprehend him’: $10K reward offered for Family Dollar ‘security guard’ who killed man WSB-TV Updates to parking and security at the parks around Lake Tapps Tacoma News Tribune Security increased in disputed Kashmir as India vows to punish perpetrators of attack that killed 26 PBS Verkada launches executive protection offering Security Systems News Hegseth’s Personal Phone Use Created Vulnerabilities The New York Times Windows "inetpub" security fix can be abused to block future updates BleepingComputer The impressive security measures at Pope Francis' funeral, from anti-drone bazookas to Eurofighters Euronews.com Everything You Need to Know About the Air Defenses Protecting World Leaders at the Pope’s Funeral The Aviationist Joint Press Statement on United States-Japan-Republic of Korea Trilateral Security Coopera U.S. Department of Defense (.gov) The Role of Smart Security Systems in Addressing Healthcare Demands Security Sales & Integration Amidst Tariff Uncertainty, Asset Security Can’t Take a Backseat Roofing Contractor Increased Security at City Courthouses? Unanswered Questions Baltimore Witness Yes, You Can Take Water Through Airport Security—Here's How Travel + Leisure Israeli defence minister, army chief discuss 'security, regional issues' with CENTCOM chief Middle East Monitor Windows 11’s New ‘inetpub’ Folder Could Expose PCs to Security Risks Petri IT Knowledgebase NSA Publishes Recommendations for Smart Controller Security Controls and Technical Require National Security Agency (.gov) |
![]() |
![]() |
![]() |
RELATED ARTICLES
Personal Firewalls for Home Users What is a Firewall?The term "firewall" illustrates a system that protects a network and the machines on them from various types of attack. Firewalls are geared towards keeping the server up all the time and protecting the entire network. The 5 Critical Steps to Protecting Your Computer on the Internet Spyware, viruses and worms.. Watching the Watchers: Detection and Removal of Spyware If spyware were a person and he set himself up in yourhouse, you are likely going to do one of two things. You'llkick him out yourself or you'll call someone (such as thepolice) to do it for you. Top Spyware Removers Considerations Only the top spyware removers are successful at detecting and removing spyware and adware from your computer. You should look for complete protection against these threats: spyware, adware, keyloggers browser hijackers and Remote Access Trojans. How Can Someone Get Private Information From My Computer? From the "Ask Booster" column in the June 17, 2005 issue of Booster's Auction News, a free ezine for online auction sellers and enthusiasts.Dear Booster,How can someone get private information from my computer?Thank you,Evan S. Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc. Adware. Spyware. Dont be a Dork - Protect Yourself There are folks out there who use their powers for evil, not good. Let's not give them the opportunity to sneak into our lives and wreak havoc. How to Get Rid of New Sobig.F Virus? As you know, this time the virus under the name Sobig.F has wreaked quite havoc! No doubt, many of us have suffered from this recent virus outbreak. Another Fine Mess! I'm in the Anti-Spyware business, and I'm doing a lot of advertising to promote my website, but here I am online and on the phone, giving my personal information to.. Do You Know What your Kids Are Doing Online? It's a sad statistic, but hundreds of unsuspecting kids are lured away from home every year by strangers they meet in online chat rooms.As frightening as this seems, it gets scarce attention in the media. 7 Ways to Spot a PayPal Scam E-Mail Paypal is a great site and is used by many to send and receive money. Unfortunately some dishonest people are using the Popularity of Paypal to line their own pockets with gold at the expense of unsuspecting Pay Pal members. Viruses and Worms: The Problems and Their Solutions History and BackgroundThe virus was one of the first ever threats to computer security. It brought a whole new fear upon computer users. Its Time to Sing the Encryption Song - Again! Yes, I'm wearing my encryption hat again. Why you may ask? Well I just finished reading about the newest security hole in Microsoft's latest server product. Is Shopping Online For Your Horse Gifts Safe? Shopping for horse gifts or other gift items on the internetis quick, convenient and is probably safer than you think.However, you still need to be aware that it is essential tovigorously protect your privacy and financial informationwhen making purchases online. Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing The Internet offers a global marketplace for consumers and businesses. However, criminals also recognize the potential of cyberspace. Is the Internet Insecure Because of You? Long gone are the days that we could feel secure and know for certain that we had privacy. With the digital age upon us we can no longer be so sure that our privacy is secure. Delete Cookies: New-Age Diet or Common Sense Internet Security? No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them. Its War I Tell You! There are ways to insure security though. You can get the Windows Update CD from Microsoft and install that before you get online, You can also get most Antivirus Definitions downloaded and save them to disk, then install those before you go online, (of course you have to be using that Product in the first place), and you can get Anti-Spyware on a disk and do the same. Identity Theft - Dont Blame The Internet Identity theft - also known as ID theft, identity fraud and ID fraud - describes a type of fraud where a criminal adopts someone else's identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries. 3 Steps to Ending Scams and Virus Problems Watching how the traditional media covers the latest virus or scam would make one think we are all innocent victims and it is the "evil Internet" at work once again. News flash! Innocent? More like uninformed. ![]() |
home | site map |
© 2006 |