![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers
I am the victim of an internet scam. It is very hard to write that sentence, but it's necessary in order to warn my fellow clowns, magicians and other entertainers, and to prevent them from being taken for $2,800.00 like I was. Here is what happened to me, and how you can avoid it. I run the clown-ministry.com web site, and I perform as a clown at both ministry and secular events. Due to the popularity of the clown-ministry.com web site (do a search on Google .com for 'clown' and it's the 7th site listed, for example) I'm easily found by people -- for both good and bad reasons. For instance, last year my wife Ellen and I taught clowning for a week at the Seventh Day Adventists' national Camporee -- we're not Adventists, and don't know many people who are, but we were found by them & hired primarily due to the popularity of the web site. We've been invited to perform in clown at a conference in Canada, performed at company picnics, etc. well out of our neck of the wood, and so on. Please understand that this isn't bragging; it's setting the stage for what happened in the scam. We were contacted via e-mail by someone purportedly from Cincinnati, Ohio, who wanted to fly my wife & I to Cincinnati to perform at a birthday party. Since we'd had similar things happen in the past, that didn't set off any alarms in my head. In addition, I knew that there are entertainers such as Jennifer Lopez who will sing "Happy Birthday" at your party, for a fee of $50,000.00; I'm no J Lo, and my singing is atrocious, but I charge a lot less as well :) I did an internet search on that person (I'm not using the name he gave, since there's a criminal investigation as well as FBI investigation going on -- no joke), and found someone by that name in Cincinnati, Ohio, a "regional celebrity" so to speak. So, it didn't seem incredulous that he would have the money to hire us as well as pay round trip air fare. It's now obvious that it was merely someone using that person's name to "hook" us. At that point, my wife & I were still inclined to think of this as a prank, but even so we replied to the email with a quotation for our services, politely and professionally. We were joking with each other that this had to be a prank; after all, why would someone hire us when there are hundreds of clowns in the Cincinnati area? Unless it was someone with money to burn who wanted to buy "bragging rights," it made no sense. So we forgot about it, until the person replied back, hiring us. We still considered it a joke, until we received a check in the mail, for $2,800.00. MUCH more that we had quoted our services for! We thought that, maybe, the excess was to pay for round trip air fare and accommodations, but even so that was far too much. We e-mailed the person back, explaining that we had received $2,800.00 via check. His response is what should have tipped us off to the scam. He replied that, since he was out of the country on a business trip, he had his personal assistant send the checks out for the party, and the assistant had made a mistake, combining with our check one for $2,300.00 for the photographer from the United Kingdom that he was flying in to photograph the party. Would we be so kind as to send him those funds via Western Union? Like an idiot, I said "yes." The check had been deposited and cleared (I thought), and I didn't want to hold onto money that didn't belong to me. So, I went to the local Western Union office and sent $2,300.00 to an individual in the United Kingdom. This didn't set off any red flags (although it should have) since it seemed like the type of silly mistake I've seen people do before. What happened next, though, set off every red flag in my head, and then some. Days later, I received another email from the man supposedly from Cincinnati. According to him, his mother had an advanced form of lung cancer, and needed an immediate operation. He wanted me to send the remaining money to his mother's doctor in Nigeria and he would reschedule the party later. When I heard the word 'Nigeria' I had icicles running up and down my spine. Nigeria is famous, in the internet world, for being home to the most prolific scam of all time. You've likely received spam email about it. In a nutshell, it involves the widow of some minister or rich person, who is trying to smuggle their immense fortune out of the country before it's seized by her dead husband's adversaries; in exchange for letting them use your bank account, they will give you (various amounts of money, if not enough to make you filthy rich, at least enough to make you dingy). Of course, no money comes out, but these people proceed to rob your bank account of every penny. So, when I heard that, fear clutched at my heart. Besides, why would someone rich enough to hire me (and fly a photographer in from the UK) need my money? The answer is, he didn't; he was just trying to bilk me of more money before his ruse was exposed. You see, when I initially deposited the $2,800.00 check, it appeared to clear; it was then several more days before he requested the $2,300 to his photographer, and nearly a week (from the time I deposited the check) until I complied with that. 11 days after the check was initially deposited, it came back 'funds denied.' The bank then debited $2,800.00 from my checking account -- which didn't contain that much, of course. So, I'm out $2,800.00, the crook (or his accomplice in the UK) received $2,300.00. What's the moral of the story? The purpose of this is two-fold: to warn my fellow clowns, and to point out the red flags that I should have seen, and what I should have done. So, that's where it lies. I'm out $2,800.00, and in danger of losing my house due to the actions of this criminal. Jesus Christ orders His followers to "pray for those who despitefully use you" (Matthew 5:44). It's difficult, but I'm praying. Thank you for listening -- be sure to protect yourself and your loved ones. Tom Raymond, aka. Raynbow the magic clown, is a professional clown and underemployed computer geek, webmaster of http://www.clown-ministry.com/ the largest clown resource site on the web. His personal site can be found at http://www.clown-ministry.com/raynbow/
MORE RESOURCES: Analysis: Google-Wiz deal sparks questions about cloud security strategy at AWS and Microsoft GeekWire FabCon 2025: Fueling tomorrow’s AI with new agentic capabilities and security innovations in Fabric Microsoft Waltz and staff used Gmail for government communications, officials say The Washington Post Top cybersecurity boffin, wife vanish as FBI raids homes theregister.com Fight at maximum security unit precedes tour by state’s prison work group - South Dakota Searchlight Fight at maximum security unit precedes tour by state’s prison work group South Dakota Searchlight EU analysis highlights space capabilities, lists scenarios for space security by 2050 Industrial Cyber Mobile police installing new security cameras at city parks, following shootout at Langan Park fox10tv.com Alaska Capitol will get airport-style security checkpoint, legislative panel orders Anchorage Daily News JFrog Enables Trusted AI - Uncovers Critical Security Threats Emerging from AI’s Expansion in the Software Supply Chain Business Wire Fortress Government Solutions receives impact Level 6 security accreditation from US Navy Industrial Cyber LightPath Technologies to Exhibit Advanced Infrared Solutions at 2025 Border Security Expo PR Newswire Lawmatics Achieves SOC 2 & HIPAA Compliance, Reinforcing Commitment to Data Security and Privacy LawSites Could drones replace school security guards? FOX 7 Austin MPD: Driver of security truck issued several traffic citations after hitting pedestrian along S. Parkway East Action News 5 Security officer made Pasadena middle schooler duct-tape her own mouth shut, father says Los Angeles Times Breaking the Cone of Silence: The Jigsaw Puzzle of Operational Security Security Clearance Jobs Mike Waltz Faces Another Embarrassing Data Security Failure The Daily Beast Northwest Dallas security guard fatally shoots man outside motel FOX 4 News Dallas-Fort Worth IEMA Announces Second Round of Funding for the Illinois Not-for-Profit Security Grant Program RiverBender.com BitLyft Gives Back to the Information Security Community GlobeNewswire Akron-Canton Airport has new security measure: K9 Luna Cleveland 19 News Blocking 7-Eleven deal on security grounds would hurt Japan's image, head of state-backed fund says Reuters Senate Education Focuses On School Security, Classroom Aides West Virginia Public Broadcasting AI Agent and Copilot Podcast: Microsoft Exec Dorothy Li on Role of AI Agents, Ecosystem in Security Cloud Wars "Credible Threats" to 2025 Chincoteague Pony Swim Prompts New Security Policies Chesapeake Bay Magazine Central America Builds on CENTSEC for Security Diálogo Americas Gun-detecting dogs join LVHN security team Times News Online Security dog bites woman at Mayfair Mall, police describe fight FOX6 News Milwaukee The urgent reality of machine identity security in 2025 csoonline.com Secure Passage and Sunflower Labs Take Security to the Skies with Autonomous Drone Integration PR Newswire SCOTUS examines court’s role in national security Courthouse News Service Pasadena school security officer accused of duct-taping 11-year-old girl's mouth shut for 'talking too much' ABC7 Los Angeles ReliaQuest Closes $500M Round to Boost Agentic AI Security BankInfoSecurity This Security Control Is So Good We Don’t Even Have to Turn It On (LIVE in Clearwater, FL) CISO Series Women in Security: Tia Eskandari, Senior Director, Allied Universal Security Sales & Integration Two new security K-9s join Lehigh Valley Health Network NBC10 Philadelphia Europe on the horns of the security dilemma Le Monde diplomatique - English Jozu Accelerates Enterprise AI with 10x Faster Deployment and Contributes Security Project to CNCF Morningstar Clemson Po-po enforces TSA security at all downtown bars thetigercu.com U.S. Imposes Sanctions on Chinese and Hong Kong Officials for Pursuing Activists Abroad The New York Times Border security and enforcement is an important issue The Clarion-Ledger Weekly Student News Quiz: Earthquake, Security Breach, Baseball Season The New York Times New phishing scam outsmarts security codes to steal your info Kurt the CyberGuy After controversy, TF Green Airport revamps leadership of security, police department The Providence Journal Former Homeland Security secretary breaks down 'important development' in Trump deportations Fox News Bitdefender Introduces Industry’s First Role-Based Family Plans for its Consumer Security Product Lines Silicon Canals Meeting with permanent members of the Security Council Президент России |
![]() |
![]() |
![]() |
RELATED ARTICLES
Personal Firewalls for Home Users What is a Firewall?The term "firewall" illustrates a system that protects a network and the machines on them from various types of attack. Firewalls are geared towards keeping the server up all the time and protecting the entire network. The 5 Critical Steps to Protecting Your Computer on the Internet Spyware, viruses and worms.. Watching the Watchers: Detection and Removal of Spyware If spyware were a person and he set himself up in yourhouse, you are likely going to do one of two things. You'llkick him out yourself or you'll call someone (such as thepolice) to do it for you. Top Spyware Removers Considerations Only the top spyware removers are successful at detecting and removing spyware and adware from your computer. You should look for complete protection against these threats: spyware, adware, keyloggers browser hijackers and Remote Access Trojans. How Can Someone Get Private Information From My Computer? From the "Ask Booster" column in the June 17, 2005 issue of Booster's Auction News, a free ezine for online auction sellers and enthusiasts.Dear Booster,How can someone get private information from my computer?Thank you,Evan S. Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc. Adware. Spyware. Dont be a Dork - Protect Yourself There are folks out there who use their powers for evil, not good. Let's not give them the opportunity to sneak into our lives and wreak havoc. How to Get Rid of New Sobig.F Virus? As you know, this time the virus under the name Sobig.F has wreaked quite havoc! No doubt, many of us have suffered from this recent virus outbreak. Another Fine Mess! I'm in the Anti-Spyware business, and I'm doing a lot of advertising to promote my website, but here I am online and on the phone, giving my personal information to.. Do You Know What your Kids Are Doing Online? It's a sad statistic, but hundreds of unsuspecting kids are lured away from home every year by strangers they meet in online chat rooms.As frightening as this seems, it gets scarce attention in the media. 7 Ways to Spot a PayPal Scam E-Mail Paypal is a great site and is used by many to send and receive money. Unfortunately some dishonest people are using the Popularity of Paypal to line their own pockets with gold at the expense of unsuspecting Pay Pal members. Viruses and Worms: The Problems and Their Solutions History and BackgroundThe virus was one of the first ever threats to computer security. It brought a whole new fear upon computer users. Its Time to Sing the Encryption Song - Again! Yes, I'm wearing my encryption hat again. Why you may ask? Well I just finished reading about the newest security hole in Microsoft's latest server product. Is Shopping Online For Your Horse Gifts Safe? Shopping for horse gifts or other gift items on the internetis quick, convenient and is probably safer than you think.However, you still need to be aware that it is essential tovigorously protect your privacy and financial informationwhen making purchases online. Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing The Internet offers a global marketplace for consumers and businesses. However, criminals also recognize the potential of cyberspace. Is the Internet Insecure Because of You? Long gone are the days that we could feel secure and know for certain that we had privacy. With the digital age upon us we can no longer be so sure that our privacy is secure. Delete Cookies: New-Age Diet or Common Sense Internet Security? No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them. Its War I Tell You! There are ways to insure security though. You can get the Windows Update CD from Microsoft and install that before you get online, You can also get most Antivirus Definitions downloaded and save them to disk, then install those before you go online, (of course you have to be using that Product in the first place), and you can get Anti-Spyware on a disk and do the same. Identity Theft - Dont Blame The Internet Identity theft - also known as ID theft, identity fraud and ID fraud - describes a type of fraud where a criminal adopts someone else's identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries. 3 Steps to Ending Scams and Virus Problems Watching how the traditional media covers the latest virus or scam would make one think we are all innocent victims and it is the "evil Internet" at work once again. News flash! Innocent? More like uninformed. ![]() |
home | site map |
© 2006 |