Skip to main content

Avoid the Virtual Kidnapping Scam

A relative recently fell victim to the virtual kidnapping scam, where criminals demand ransom for a loved one whom they only claim to have kidnapped.  To make their claim more convincing, the perpetrators make their ransom demand when the purported kidnapping victim cannot be contacted.  They might simply know when the person is isolated and unavailable, or they might force them to go incommunicado by stealing their mobile phone.

A variant is the Grandparent Scam, in which the con artists calls an elderly person, claiming to be a grandchild in distress. The Grandparent Scam is huge in in Japan, with its wealthy elderly population.

These scams depend on the victim believing that a total stranger is actually a close friend or relative worthy of financial assistance.  This enormous lie can be unveiled by just thinking up and asking a few simple trivia questions.

Verification Procedure

Let’s say I send you a message asking for monetary assistance.  Here is how you can verify it’s really me.  No advance preparation, like agreeing on passwords, is required.  This will work with any two people who are well acquainted.

  1. If a "kidnapper" calls you, demand to speak directly to me. If they refuse, tell them that you think this is just another virtual kidnapping scam. Real kidnappers know that these days they have to prove they really are holding a captive.
  2. Ask a few questions about memorable events we shared. An outsider should not be able to distinguish a right or wrong answer.  Ask something like, “What is Thunder Chicken?”
  3. Assess my response:
    • Generally correct answers to all questions prove that I really want you to cooperate and take the requested action.  Allow for the possibility that we may have remembered events a bit differently.
    • Correct answers combined with one or two outlandishly incorrect answers will prove it’s me, but I purposely inserted obviously incorrect answers to tell you that I am under duress: “Thunder Chicken is Ian’s recipe for spicy chicken.” While Thunder Chicken is indeed Ian’s, it’s a car, not a recipe. In this unlikely event, contact the police and get their advice on how to proceed.
    • Incorrect answers, or an effort to evade answering, reveal that you are dealing with an impostor
  4. Send lawyers guns and money

Do you have a suggestion for improving this protocol? Tell us in a comment.

Comments

Popular posts from this blog

The Reef Lounge

When I was about four, we vacationed at the Handerly Hotel & Resort in San Diego (formerly the Stardust Motor Hotel).  That place was heaven on earth as far as I was concerned. I loved the pool. Next to the pool there was a bar, and behind the bar was an underwater theater. It was here that I saw one of the most outlandish scenes I have ever witnessed.

Build with CMake in Eclipse

Cross-platform CMake can generate a wide variety of build systems.  The CMake 2.8 project generator for Eclipse does not work, so you must create the project and configure it to build with GNU Make .  Here’s how to do it on Linux.

Use Multilingual UTF-8 Strings with any OpenAccess Version

In this article I show you how to use multilingual UTF-8 strings with standard, unmodified OpenAccess oa-22.04p028 release. In the last  article , I introduced UTF-8, the popular 8 bit encoding of Unicode into multibyte character strings that can represent virtually every written language in history.  I presented the OpenAccess software changes required to fully support UTF-8 and showed you how to convert your existing application software to properly manipulate UTF-8 in the OpenAccess oaString class.