• Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World
Newsy Today
news of today
Home - Scam
Tag:

Scam

Tech

China TV variety show exposes scam linking ‘peace’ sign selfies to privacy risks

by Chief Editor May 10, 2026
written by Chief Editor

The Hidden Cost of a Smile: Is Your Favorite Selfie Pose a Security Risk?

For years, the “peace sign” or “scissor hand” pose has been a global staple of social media culture, especially across Asia. It’s a gesture of friendliness, youth and positivity. However, a startling revelation from cybersecurity experts in China is turning this innocent habit into a potential privacy nightmare.

View this post on Instagram about Your Favorite Selfie Pose, Security Risk
From Instagram — related to Your Favorite Selfie Pose, Security Risk

Recent warnings highlighted on a mainland workplace reality show have exposed a terrifying reality: high-resolution selfies can be used to harvest your fingerprints. By leveraging artificial intelligence (AI) and advanced photo-editing software, criminals can reconstruct biometric data from a simple photograph, effectively “stealing” your identity without you ever knowing.

Did you know? Experts suggest that fingerprints can be extracted from selfies taken within 1.5 meters if the fingers face the camera directly. Even at a distance of up to 3 meters, roughly half of the hand’s biometric details can still be recovered.

The AI Evolution: From Photo Enhancement to Biometric Theft

The core of the problem lies in the rapid evolution of AI-driven image reconstruction. In the past, a photo would need to be an extreme close-up to reveal the ridges of a fingerprint. Today, cryptography professors, including Jing Jiwu from the University of Chinese Academy of Sciences, warn that high-quality cameras combined with AI can fill in the gaps.

This isn’t just theoretical. We are seeing a rise in “visual hacking,” where public data is weaponized. This trend aligns with the broader surge in AI-driven fraud, such as the deepfake scams recently reported in Baotou, China, where AI-generated likenesses were used to deceive victims. When you combine a stolen fingerprint with a deepfake voice or face, the potential for bypassing biometric security systems—like those used in banking or smartphone unlocking—becomes a frightening reality.

The “Resolution Trap”

As smartphone manufacturers race to include 108MP or 200MP sensors, they are inadvertently creating a goldmine for bad actors. Higher resolution means more data points per pixel, making it easier for AI to map the unique whorls and loops of a human fingerprint from a distance.

The "Resolution Trap"
China Resolution Trap

Future Trends: The Era of Biometric Obfuscation

As we move forward, the relationship between our physical bodies and our digital identities will undergo a radical shift. We are likely to see several emerging trends in response to these vulnerabilities:

  • Biometric Noise and Masking: Just as some users blur their faces for privacy, we may see the rise of “biometric noise” filters. These AI tools would subtly alter the ridges of fingers or the patterns of an iris in a photo—invisible to the human eye but impossible for a machine to reconstruct.
  • The Shift to Multi-Modal Authentication: Relying on a single biometric (like a fingerprint) is becoming a liability. The industry will likely pivot toward “multi-modal” security, requiring a combination of behavioral biometrics (how you type or walk) and physical biometrics.
  • Legal Frameworks for Biometric Ownership: We can expect a surge in legislation regarding “biometric theft.” If a photo posted on a public forum is used to steal a fingerprint, who is liable? The platform, the user, or the hacker?
Pro Tip: To protect your biometric data, avoid taking high-resolution photos with your palms or fingertips facing the lens. If you are sharing photos of your hands in a professional or public context, consider using a slight blur filter on the fingertips.

Beyond the Fingerprint: What Else Are We Exposing?

The “peace sign” scare is a wake-up call for a larger issue: the over-sharing of biometric markers. From the unique geometry of our ears to the patterns in our retinas, our photos are essentially digital blueprints of our bodies.

Industry experts suggest that the next frontier of identity theft won’t be passwords or credit card numbers, but “biological keys.” As we integrate more biometric locks into our homes and cars, the incentive for criminals to harvest this data from social media will only grow.

For more on how global tech hubs are handling these risks, you can explore the technological landscape of China or research the latest guidelines on deepfake prevention from international cybersecurity agencies.

Frequently Asked Questions

Q: Is every selfie with a peace sign dangerous?
A: Not necessarily. The risk is highest with high-resolution photos taken from a close distance (under 3 meters) where the fingers are clearly visible and facing the camera.

Q: Can a hacker really unlock my phone with a photo?
A: While most modern phones use 3D mapping or ultrasonic sensors that are harder to fool, the reconstructed data could potentially be used to create a physical “spoof” (a synthetic fingerprint) to bypass simpler biometric scanners.

Q: How can I check if my biometric data has been compromised?
A: Unlike a password, you cannot “change” your fingerprint. The best defense is prevention—limiting the high-res biometric data you post publicly and using two-factor authentication (2FA) that doesn’t rely solely on biometrics.

Join the Conversation

Are you changing the way you take selfies, or do you think this is an overreaction to the power of AI? Let us know in the comments below!

Want more insights on digital privacy? Subscribe to our Privacy Watch newsletter.

May 10, 2026 0 comments
0 FacebookTwitterPinterestEmail
Business

Mining magnate Andrew Forrest takes Meta to court over scam ads using his likeness

by Chief Editor April 17, 2026
written by Chief Editor

The Finish of the ‘Safe Harbor’? How AI is Redefining Platform Liability

For decades, the digital landscape has been governed by a powerful legal shield: Section 230 of the Communications Decency Act. This law has largely immunized internet giants from being held responsible for the content users post on their platforms. Still, a high-stakes legal battle in Silicon Valley is now challenging this status quo.

View this post on Instagram about Meta, Andrew Forrest
From Instagram — related to Meta, Andrew Forrest

Australian mining magnate Andrew Forrest is taking Meta to court, arguing that the social media giant should be held accountable for deepfake scam ads using his likeness. This case isn’t just about one billionaire; it’s a bellwether for how the law will handle the intersection of artificial intelligence and corporate responsibility.

Did you know? Andrew Forrest has reportedly invested more than $60 million into this federal lawsuit in California, targeting over 230,000 deepfake scam ads that used his likeness to target victims, including many elderly Australians.

From Passive Host to Active Participant: The AI Shift

The core of the current legal tension lies in the difference between hosting content and optimizing it. Meta has traditionally argued that it is a mere intermediary. However, the legal strategy employed by Forrest’s team suggests a shift in perspective: when AI tools are used to optimize and personalize fraudulent ads, the platform becomes an active participant.

From Passive Host to Active Participant: The AI Shift
Meta Forrest Section

By using algorithms to ensure scam ads reach the most susceptible audiences, the argument is that Meta acts as a “co-author” of the content rather than a neutral host. This distinction is critical because if a court rules that AI-driven optimization removes Section 230 immunity, it opens the floodgates for thousands of similar claims.

The ‘Negligent Design’ Precedent

We are already seeing a trend where courts appear past the content and focus on the platform’s architecture. In a recent Los Angeles case, a jury found Meta and YouTube liable for harming a young woman, not because of the specific videos she watched, but because of the “addictive design” of the platforms.

The jury concluded that negligence in the design and operation of the platforms was a substantial factor in the harm caused. This “design-based” legal tactic is exactly what is being mirrored in the fight against deepfake ads—shifting the blame from the scammer to the tools that enabled the scam to scale.

Pro Tip: Spotting Deepfake Scams Be wary of “too good to be true” financial schemes, especially those featuring celebrities or prominent figures promoting cryptocurrency. Always verify such claims through official, verified channels rather than sponsored social media posts.

The Future of Digital Likeness and IP Law

As generative AI makes it easier to create hyper-realistic clones of people, intellectual property (IP) law is facing an existential crisis. The use of “deepfakes” to promote fraudulent financial schemes highlights a gap in current privacy and trademark laws.

Exclusive: Australian mining magnate and billionaire philanthropist Andrew Forrest on CNBC

Future trends suggest a move toward stricter regulations on how AI tools can utilize a person’s likeness. The current battle in the US District Court may determine whether platforms have a “duty of care” to verify the identity of advertisers using AI-generated imagery, potentially ending the era of unchecked automated ad placements.

FAQ: Understanding the Meta vs. Forrest Case

What is Section 230?
It is a part of the Communications Decency Act that generally protects internet companies from being held legally responsible for content posted by their users.

FAQ: Understanding the Meta vs. Forrest Case
Meta Andrew Forrest Forrest

Why is Andrew Forrest suing Meta?
He is seeking to hold Meta accountable for hundreds of thousands of scam ads that used his likeness without permission to promote fake cryptocurrency and fraudulent financial schemes.

What is the main legal argument against Meta?
The argument is that Meta’s AI tools optimized and personalized the ads, making the company an active participant in the fraud rather than a neutral platform.

Has Meta defended itself?
Yes. Meta contends that the marketing messages were not its doing, that it made reasonable efforts to preserve data, and that it is protected by Section 230.

Join the Conversation

Do you think social media platforms should be held responsible for AI-generated scams? Let us know your thoughts in the comments below or subscribe to our newsletter for more updates on the intersection of law and technology.

Subscribe Now

April 17, 2026 0 comments
0 FacebookTwitterPinterestEmail
Business

Online travel site Guest Reservations accused of fleecing customers with hidden fees and charges

by Chief Editor March 27, 2026
written by Chief Editor

The Rise of “Deceptive Design” in Online Travel: How to Avoid Booking Traps

A recent case involving Jacob Cass and online travel site Guest Reservations has shone a light on a growing problem: manipulative online tactics designed to mislead travellers and inflate booking costs. This isn’t an isolated incident; numerous reports suggest a pattern of hidden fees, deceptive website designs, and impersonation of legitimate hotel websites by third-party booking platforms.

How Guest Reservations Operates: A Case Study

Jacob Cass discovered Guest Reservations although searching for a holiday park in Shoal Bay, Australia. The platform appeared in Google search results, and its website design intentionally mimicked the look and feel of the actual holiday park’s site, tricking him into believing he was booking directly. He was ultimately charged $US1,099.70, including $US341.81 in taxes and service fees – a total of over $AU1,500, significantly higher than expected.

The core issue? Hidden fees weren’t disclosed upfront, and the currency wasn’t immediately clear. When Mr. Cass attempted to get a refund, he was met with resistance, and his complaint was redirected through multiple companies, ultimately landing with Priceline.com, owned by Booking Holdings.

The “Dark Patterns” at Play

Consumer advocate Erin Turner identifies several deceptive design elements used by Guest Reservations. These include:

  • Urgency Tactics: Alarm clocks and limited-time offers create pressure to book quickly, bypassing careful review of costs.
  • Hidden Fees: Taxes and service charges are revealed late in the booking process, inflating the final price.
  • Website Mimicry: The platform deliberately copies the design of legitimate hotel websites to mislead customers.
  • Search Engine Manipulation: Guest Reservations outbids hotels on their own names in Google search results, pushing their site to the top of the listings.

These tactics fall under the umbrella of “dark patterns,” user interface designs intentionally crafted to trick users into doing things they might not otherwise do.

The Role of Google and Affiliate Networks

The situation is complicated by the role of Google, which profits from advertising by platforms like Guest Reservations. While Google states its advertising policies require transparency, critics argue the platform doesn’t do enough to prevent deceptive practices. The complex network of affiliate partnerships between major travel companies (like Booking Holdings, which owns Booking.com, Agoda, and Priceline.com) obscures the relationships between these platforms and raises questions about accountability.

One hotel provider noted that reservations coming through Guest Reservations often appear on their systems as originating from Booking.com, further blurring the lines.

What’s Being Done – and What’s Coming

The Australian government is currently considering legislation to ban unfair trading practices, including dark patterns and drip pricing. Assistant Minister for Competition, Andrew Leigh, has promised to introduce the legislation soon, aiming to ensure transparent pricing and protect consumers from manipulative tactics.

However, enforcement remains a challenge. Guest Reservations is based in Delaware, a state known for its corporate secrecy, making it difficult to hold the company accountable.

Protecting Yourself: Pro Tips for Booking Travel

Here’s how to avoid falling victim to these deceptive practices:

  • Book Direct: Whenever possible, book directly through the hotel’s official website.
  • Verify Website URLs: Carefully check the website address to ensure you’re on the legitimate site.
  • Read the Fine Print: Pay close attention to all fees and charges before completing your booking.
  • Be Wary of Urgency Tactics: Don’t rush into a booking based on limited-time offers or scarcity warnings.
  • Report Suspicious Activity: If you suspect a website is engaging in deceptive practices, report it to your local consumer protection agency.

Future Trends: The Battle for Transparency

The fight against deceptive design in online travel is likely to intensify. Expect to observe:

  • Increased Regulation: Governments worldwide will likely introduce stricter regulations to protect consumers from dark patterns.
  • AI-Powered Detection: Tools that automatically detect and flag deceptive website designs could turn into more prevalent.
  • Consumer Awareness Campaigns: Increased public awareness about these tactics will empower travellers to make informed decisions.
  • Blockchain Solutions: Blockchain technology could potentially be used to create more transparent and secure booking systems.

FAQ: Online Travel Booking and Deceptive Practices

Q: What are “dark patterns”?
A: Dark patterns are deceptive user interface designs used to trick users into doing things they didn’t intend to do, like signing up for unwanted services or paying hidden fees.

Q: Why do these third-party booking sites exist?
A: They operate as intermediaries, earning commissions on bookings. Their business model often relies on attracting customers with lower initial prices and then adding fees later in the process.

Q: What should I do if I’ve been overcharged by a third-party booking site?
A: Contact the booking site directly to request a refund. If that fails, file a complaint with your local consumer protection agency.

Q: Is Google responsible for the ads it displays?
A: Google states it has policies to prevent deceptive ads, but critics argue it doesn’t do enough to enforce them.

Did you know? Many hotels will match or beat the price offered by third-party booking sites if you contact them directly.

Don’t let deceptive online tactics ruin your travel plans. By staying informed and following these tips, you can protect yourself and ensure a smooth and enjoyable booking experience.

March 27, 2026 0 comments
0 FacebookTwitterPinterestEmail
Entertainment

AI music scam: North Carolina man admits US$8m streaming fraud

by Chief Editor March 24, 2026
written by Chief Editor

The Rise of AI-Fueled Streaming Fraud: A Fresh Battle for the Music Industry

The music industry is facing a new wave of challenges, not from piracy as in the past, but from sophisticated fraud schemes leveraging artificial intelligence. A North Carolina man, Michael Smith, recently pleaded guilty to defrauding streaming services out of over $8 million using AI-generated songs and automated streaming – a case that marks the first of its kind in the U.S. This incident isn’t an isolated event, but a harbinger of potential future issues.

How the Scheme Worked: Bots, Streams, and Royalties

Smith’s operation, active between 2017 and 2024, involved generating a massive volume of AI-created music and then using bots to artificially inflate stream counts. These bots were programmed to mimic human listening habits, jumping between songs to avoid triggering fraud detection systems. The Attorney’s Office revealed the bots could stream over 661,440 songs daily, generating approximately $1,207,128 annually in fraudulent royalties. Smith understood that a large number of songs with smaller stream counts would be harder to detect than a few songs with billions of streams.

The core of the problem lies in how streaming platforms distribute royalties. Services like Spotify and Apple Music pool revenue and distribute it to artists based on their share of total streams. Fake streams siphon money from legitimate artists and rights holders.

The Growing Threat of AI-Generated Music and Detection

The sheer scale of AI-generated music being created is staggering. Deezer, a streaming platform, reported detecting and tagging over 13.4 million AI-tracks in 2025 alone. This explosion in volume makes manual detection nearly impossible, necessitating the development of AI-powered tools to combat the problem. Deezer has already implemented an AI-music detection tool to manage the influx of mass-produced content.

However, the arms race between fraudsters and detection systems is likely to continue. As AI detection becomes more sophisticated, those seeking to exploit the system will undoubtedly develop more advanced techniques to evade detection.

Beyond Streaming: The Broader Implications for Content Creation

This case extends beyond music. The same principles apply to other content creation industries, including podcasting. Netflix recently struck a deal with Spotify to stream video podcasts, creating another potential avenue for AI-driven fraud. The ability to generate synthetic content at scale, combined with automated distribution, presents a significant challenge to the integrity of online platforms.

The Legal Landscape and Future Enforcement

Smith’s guilty plea sets a precedent for future enforcement actions. He faces a maximum sentence of five years in prison and has agreed to pay over $8.09 million in forfeiture. This case demonstrates that authorities are taking AI-assisted fraud seriously. However, the legal framework surrounding AI-generated content and streaming fraud is still evolving, and further legislation may be needed to address the issue effectively.

FAQ

What is streaming fraud? Streaming fraud involves artificially inflating stream counts on platforms like Spotify and Apple Music to generate illegitimate royalties.

How is AI used in streaming fraud? AI is used to generate music and automate the process of streaming, creating a large volume of fake streams.

What are streaming platforms doing to combat fraud? Platforms are developing AI-powered detection tools and implementing anti-fraud policies.

What is the penalty for streaming fraud? Penalties can include imprisonment and financial forfeiture, as seen in the Michael Smith case.

Is this a problem limited to music? No, the same principles apply to other content creation industries, such as podcasting and video.

Did you know? The Attorney’s Office revealed Smith emailed co-conspirators in 2018 stating the need for “a TON of songs fast” to circumvent anti-fraud measures.

Pro Tip: Content creators should regularly monitor their streaming data for anomalies and report any suspicious activity to their distributors and streaming platforms.

What are your thoughts on the future of AI and music? Share your opinions in the comments below!

March 24, 2026 0 comments
0 FacebookTwitterPinterestEmail
Business

Family members stuck when loved ones fall for online romance scams

by Chief Editor March 24, 2026
written by Chief Editor

The Evolving Threat of Romance Scams: Protecting Hearts and Wallets in 2026

Internet romance scams continue to surge, becoming increasingly sophisticated and difficult to detect. Consumer protection authorities are warning that even highly intelligent individuals are falling victim to these emotionally manipulative schemes. The core problem? Scammers are masters of psychological manipulation, exploiting vulnerabilities and building trust before exploiting their victims financially.

The Tactics are Getting Smarter

As highlighted by recent cases, romance scammers are no longer simply initiating contact and immediately requesting funds. Trish Blake, the WA Commissioner for Consumer Protection, emphasizes that the initial phase focuses on building a strong emotional connection. “They will have spent some time telling her how wonderful she is, finding out things about her that really obtain her hooked in, that make her believe that they are the only people listening to her,” Blake explained in a recent ABC Perth interview. This prolonged grooming period makes it harder for victims to recognize the deception.

Moving to Encrypted Platforms

A key trend is the rapid migration of communication to encrypted messaging apps. As illustrated by the case of Tahina Leach’s grandmother, scammers quickly move conversations off public platforms like Facebook to avoid detection and scrutiny. This shift makes it harder for family members and authorities to monitor interactions and gather evidence.

The Apple Gift Card Preference

Scammers increasingly favor Apple gift cards as a method of payment. Here’s because these cards are difficult to trace, providing anonymity for the criminals. Stores selling these cards are now part of a national code of practice, requiring staff to inquire about the purpose of large purchases, but this isn’t always effective.

Why Are Seniors Particularly Vulnerable?

Although anyone can fall victim to a romance scam, older adults are disproportionately targeted. This is often due to a combination of factors, including social isolation, loneliness, and a desire for companionship. Scammers prey on these vulnerabilities, offering attention and affection that can be incredibly appealing.

Pro Tip: Be wary of individuals who profess strong feelings quickly, especially if you’ve never met them in person. Genuine connections take time to develop.

The Role of AI in Future Scams

Experts predict that artificial intelligence (AI) will play an increasingly significant role in romance scams. AI-powered chatbots and deepfake technology could be used to create even more convincing and personalized scams. This will make it even harder to distinguish between genuine interactions and fraudulent ones.

AI-Generated Profiles and Voices

AI can generate realistic profiles, complete with photos and detailed backgrounds. AI voice cloning technology can replicate a person’s voice, making phone calls and video chats even more deceptive. This will require heightened vigilance and skepticism.

What Can Be Done?

Combating romance scams requires a multi-faceted approach involving education, awareness, and proactive measures.

Reporting and ScamNet

Reporting suspected scams to authorities like ScamNet is crucial. While it may not recover lost funds, it helps track scam trends and warn others. Banks should also be notified, as they may be able to flag suspicious transactions.

Family Involvement and Open Communication

Open communication within families is essential. Encourage loved ones to discuss their online relationships and be alert for red flags. However, approaching the situation with sensitivity is key, as confronting a victim can be counterproductive.

FAQ: Romance Scams in 2026

Q: What are the first signs of a romance scam?
A: Excessive flattery, a reluctance to meet in person, requests for money, and moving the conversation to a private messaging app quickly are all red flags.

Q: What should I do if I suspect someone I know is being scammed?
A: Contact ScamNet, notify the person’s bank, and try to have a calm and supportive conversation with the individual.

Q: Can I recover money lost to a romance scam?
A: It’s often difficult to recover funds, but reporting the scam to authorities and contacting your bank may increase your chances.

Did you know? Scammers often target individuals after they’ve experienced a life event like bereavement or divorce, exploiting their emotional vulnerability.

The fight against romance scams is ongoing. Staying informed, remaining vigilant, and fostering open communication are essential steps in protecting ourselves and our loved ones from these devastating crimes.

Explore Further: Learn more about identifying and avoiding scams on the Consumer Protection WA website.

March 24, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

City ordinance targets crypto kiosk fraud as Clay County prosecutor pushes countywide effort

by Chief Editor March 12, 2026
written by Chief Editor

Gladstone Leads the Way in Crypto ATM Fraud Prevention: A Growing National Concern

Gladstone, Missouri, is taking a proactive stance against a surge in cryptocurrency ATM scams, requiring businesses operating these kiosks to prominently display warning signs asking customers, “Are you being scammed?” This move, spurred by a local resident losing nearly $100,000, reflects a growing national trend of fraudsters exploiting the anonymity of crypto transactions.

The Scammer’s Playbook: How Victims Are Targeted

According to Gladstone Police Chief Fred Farris, scammers are employing increasingly sophisticated tactics. Victims are contacted via phone, text message, or even pop-up advertisements, and pressured into depositing cash into crypto ATMs under false pretenses. Common threats include fabricated claims of unpaid bills, outstanding warrants, or imminent utility shutoffs. The speed and perceived urgency of these scams leave little time for victims to think critically.

The Clay County Prosecuting Attorney, Zachary Thompson, highlights the difficulty in prosecuting these crimes. Despite over 150 reported cases in Clay County, not a single charge has been filed. This is largely due to the challenges of identifying and locating the perpetrators, who often operate across state lines or even internationally.

Warning Signs: A ‘Last Line of Defense’

The newly mandated warning signs are being described as a crucial “last line of defense.” Thompson shared an instance where a sign directly intervened in a scam, prompting a potential victim to halt the transaction and contact authorities. This demonstrates the potential for simple, visible warnings to disrupt fraudulent activity.

Gladstone’s ordinance also introduces a permit requirement for businesses hosting crypto ATMs. This will allow the police department to track locations and ensure continued compliance with the signage requirement. Businesses failing to comply face escalating penalties, starting with warnings and potentially reaching fines of up to $500 per day.

Beyond Gladstone: A National Pattern of Crypto ATM Scams

Even as Gladstone is among the first cities to implement such measures, the problem of crypto ATM fraud is widespread. The anonymity offered by cryptocurrency, combined with the cash-based nature of ATM transactions, makes them an attractive tool for scammers. The lack of robust regulation and consumer protection in the crypto space further exacerbates the issue.

The rise in these scams is prompting calls for increased federal oversight of the cryptocurrency industry. Law enforcement agencies are struggling to keep pace with the evolving tactics of fraudsters, and consumers remain vulnerable.

The Future of Crypto ATM Regulation: What to Expect

The trend towards increased regulation of crypto ATMs is likely to continue. Expect to see more cities and counties following Gladstone’s lead, implementing similar signage requirements and permit processes. Further developments could include:

  • Enhanced KYC (Know Your Customer) protocols: Requiring users to verify their identity before using crypto ATMs.
  • Transaction limits: Imposing limits on the amount of cash that can be deposited or withdrawn from crypto ATMs.
  • Real-time monitoring: Implementing systems to monitor transactions for suspicious activity.
  • Increased public awareness campaigns: Educating consumers about the risks of crypto scams.

The Clay County Prosecuting Attorney’s office is actively working to expand the warning sign initiative countywide, signaling a broader regional effort to combat this growing problem.

FAQ: Crypto ATM Scams

Q: What should I do if someone asks me to deposit money into a crypto ATM?

A: Be extremely cautious. Verify the request independently through official channels. Never deposit money based solely on a phone call, text message, or pop-up ad.

Q: Are crypto ATMs safe to leverage?

A: They can be, but they are also a high-risk environment for scams. Always be vigilant and aware of potential fraud.

Q: What if I’ve already sent money to a scammer using a crypto ATM?

A: Report the incident to your local law enforcement agency and the Federal Trade Commission (FTC) immediately.

Q: How can I protect myself from crypto scams?

A: Be skeptical of unsolicited requests for money, never share personal information, and always verify the legitimacy of any financial transaction.

Did you know? Scammers often target vulnerable individuals, including seniors and those unfamiliar with cryptocurrency.

Pro Tip: If you receive a suspicious call or message, hang up and contact the organization directly using a known phone number or website.

Have you or someone you know been targeted by a crypto ATM scam? Share your experience in the comments below.

March 12, 2026 0 comments
0 FacebookTwitterPinterestEmail
News

Property ‘lawyer’ accused of scamming homebuyers

by Rachel Morgan News Editor February 12, 2026
written by Rachel Morgan News Editor

A woman posing as a conveyancer is under investigation for allegedly defrauding multiple individuals who believed they were purchasing property legitimately.

Allegations of Fraud

The Property Practitioners Regulatory Authority (PPRA) has confirmed receiving five complaints against Nomakhosazana Petunia Macingwane, the CEO and director of Petu Estate, which operates from an office in Ghandi Square, Johannesburg. Macingwane is accused of defrauding buyers out of their money, with at least three victims reporting they never occupied properties they had paid for.

Did You Know? The Legal Practice Council (LPC) confirmed that Nomakhosazana Petunia Macingwane is not a registered legal practitioner.

According to the LPC, which regulates legal practitioners, Macingwane is not registered as a lawyer and therefore operating as one would be a criminal offense. Macingwane admitted to not being registered with the LPC, stating she is only registered with the PPRA. However, the LPC maintains that acting as a lawyer without proper admission is misrepresentation.

Victims Speak Out

Bafana Mbundwini, 45, purchased a house in Protea Glen in January 2022 for R180,000 after being connected to Macingwane through an agent, Sello Morajane. Mbundwini was advised to deposit the funds into another person’s bank account, with a promise of receiving the title deed within three months. He moved into the property while awaiting the deed, only to discover months later that the house was being re-advertised for sale and did not actually belong to the seller.

Mbundwini was subsequently evicted and opened a fraud case with the police. He has received R110,000 in repayments – R80,000 from Macingwane and R30,000 from Morajane – and is still owed R70,000. Macingwane later claimed Morajane provided Petu Estate with fraudulent documents.

Two other individuals, Tshegofatso Namame and Nokuthula Kgoadi and her husband, as well allege they were defrauded by Macingwane, paying R250,000 and R700,000 respectively for properties they did not ultimately acquire. Namame received only R10,000 in reimbursement.

Expert Insight: Cases like these highlight the critical importance of verifying credentials and conducting thorough due diligence when engaging in significant financial transactions, particularly in property sales. The involvement of an unregulated individual underscores the risks associated with bypassing established legal and regulatory frameworks.

Macingwane’s Response

Macingwane denied the allegations of theft in a WhatsApp voice note to Sowetan, stating, “I am not the one who comes with the property, as they say I scam. I don’t do that.” She also claimed some clients cancelled sales due to delays. She admitted to receiving funds into her bank account and stated she was planning to settle the debts, blaming the agents and sellers for the issues.

Macingwane also threatened legal action against Sowetan should the story be published, though she had not filed any court papers at the time of reporting.

Frequently Asked Questions

What is the role of the PPRA?

The Property Practitioners Regulatory Authority (PPRA) received five complaints against Nomakhosazana Petunia Macingwane and is investigating the allegations.

Is Nomakhosazana Petunia Macingwane a registered lawyer?

No, the Legal Practice Council (LPC) has no record of Nomakhosazana Petunia Macingwane as a registered legal practitioner.

What has happened to the victims who allege they were defrauded?

Bafana Mbundwini was evicted from a property he believed he purchased and is owed R70,000. Tshegofatso Namame received only R10,000 of the R250,000 she paid, and Nokuthula Kgoadi and her husband opened a case with the police and the PPRA after paying R700,000 for a property.

Given the ongoing investigations and potential legal challenges, it remains to be seen what the ultimate outcome of these allegations will be, and whether further victims will come forward.

February 12, 2026 0 comments
0 FacebookTwitterPinterestEmail
World

Bangkok Post – China executed a series of Myanmar crime bosses

by Chief Editor February 8, 2026
written by Chief Editor

China’s Expanding Reach: Executions Signal Recent Era of Cross-Border Law Enforcement

Beijing is sending a stark message to transnational crime syndicates and the nations that harbor them: harming Chinese citizens will have severe consequences. The recent wave of executions targeting leaders of Myanmar-based scam operations – 16 core members of four criminal groups put to death in under a week – marks a significant escalation in China’s willingness to project its legal authority beyond its borders.

The Bai Family and the Kokang Connection

The crackdown specifically targeted the Bai family, a notorious syndicate operating in Myanmar’s Kokang region. Bai Yingcang, a core member, was among those executed. The group ran sprawling scam complexes, leading to the deaths of six Chinese citizens and injuries to many more. In a televised confession, Bai Yingcang apologized for the harm caused to Chinese citizens, stating his family was responsible for impacting “tens of thousands” of people.

Beyond the Bai Family: The Ming, Xu, and Wei Syndicates

The Bai family wasn’t alone. Ming Guoping, second-in-command of the Ming family syndicate, and Xu Laofa, head of the Xu family crime group, were also executed. While members of the Wei syndicate have been prosecuted, sentencing has not yet been announced. These groups were involved in a range of crimes, including fraud, intentional homicide, kidnapping, and extortion.

A Shift in China’s Legal Philosophy

China’s criminal law allows prosecution of severe crimes committed by foreigners abroad if they target Chinese citizens. While this law has existed since 1979, its application has become more assertive, particularly after the 2011 Mekong River massacre, which resulted in the execution of Myanmar national Naw Kham. This recent surge in extraditions and executions demonstrates a “merciless resolve” to protect Chinese interests, according to observers.

Myanmar’s Cooperation Under Pressure

The fact that Myanmar handed over suspects to China is noteworthy. Despite previously being considered an abolitionist state regarding the death penalty, Myanmar has sentenced over 160 people to death since the 2021 military coup. However, there were no prior reports of crime bosses being executed within the country. Experts suggest Myanmar’s cooperation was not voluntary, but rather a response to China’s significant leverage, particularly its political and economic support for the current military government.

Cambodia Follows Suit

The trend extends beyond Myanmar. In January 2026, Cambodia revoked the citizenship of crime boss Chen Zhi and extradited him to China. Chen Zhi is also wanted by authorities in the United States and the United Kingdom, and US$15 billion in his crypto assets were seized. This demonstrates China’s growing influence in the region and its determination to pursue criminals operating within neighboring countries.

The Rise of Cyberscams and Public Outrage

The crackdown is fueled by growing public anger over the proliferation of cyberscams targeting Chinese citizens. Victims are often lured with promises of high-paying jobs, only to be trapped and forced to participate in fraudulent schemes, sometimes facing violence or even death. Chinese officials, including Public Security Minister Wang Xiaohong, have repeatedly called for stronger action against these operations, labeling them a “global scourge.”

Future Trends: What to Expect

Increased Cross-Border Cooperation (Under Duress)

Expect continued pressure on Southeast Asian nations to cooperate with China’s law enforcement efforts. While some cooperation may be genuine, much of it will likely be driven by economic and political considerations. Countries reliant on Chinese investment and support may find it increasingly hard to refuse extradition requests.

Expansion of Extraterritorial Jurisdiction

China is likely to continue expanding its interpretation of extraterritorial jurisdiction, asserting its right to prosecute crimes that harm its citizens, even if those crimes occur outside its borders. This could lead to further tensions with other nations, particularly those with differing legal systems.

Focus on Asset Seizure

Beyond arrests and executions, China will likely prioritize the seizure of assets linked to transnational crime. The US$15 billion seizure of Chen Zhi’s crypto assets sets a precedent for targeting the financial infrastructure that supports these operations.

Technological Advancement in Law Enforcement

China is investing heavily in technologies to combat cybercrime, including artificial intelligence and data analytics. These tools will be used to identify and track scammers, disrupt their operations, and gather evidence for prosecution.

FAQ

Q: What crimes were the executed individuals convicted of?
A: They were convicted of a range of crimes including fraud, intentional homicide, intentional injury, kidnapping, extortion, and forced prostitution.

Q: Why is China taking such a strong stance now?
A: Growing public anger over the increasing number of Chinese citizens falling victim to scams in Myanmar and other countries is a major driver.

Q: Does China have the legal right to prosecute crimes committed outside its borders?
A: Yes, China’s criminal law allows it to prosecute severe crimes committed by foreigners abroad if the crime targets China or its citizens.

Q: What is the future of cross-border law enforcement in this region?
A: Expect increased pressure on Southeast Asian nations to cooperate with China, expansion of China’s extraterritorial jurisdiction, and a greater focus on asset seizure.

Did you know? The Mekong River massacre in 2011 was a pivotal moment that spurred China to seize a more assertive approach to protecting its citizens abroad.

Pro Tip: If you are offered a job overseas that seems too good to be true, exercise extreme caution. Research the company and the location thoroughly before accepting any offer.

What are your thoughts on China’s expanding legal reach? Share your opinions in the comments below!

February 8, 2026 0 comments
0 FacebookTwitterPinterestEmail
Business

Rancho Bernardo woman warns others after buying fake Samsung Galaxy smartphone

by Chief Editor February 7, 2026
written by Chief Editor

The Rise of Tech Scams: How to Protect Yourself in a Digital Marketplace

A Rancho Bernardo woman recently learned a harsh lesson about the risks of online marketplaces. Leslie Feliciano-De la Cruz purchased what she believed was a Samsung S25 Ultra on OfferUp, only to discover it was a sophisticated fake. Her story, reported by KGTV, highlights a growing problem: the proliferation of counterfeit electronics and the increasingly clever tactics scammers are employing.

The Allure of the Deal – and the Danger

The appeal is obvious. A $650 price tag for a top-of-the-line Samsung S25 Ultra is significantly lower than retail. This discount, however, should have been a major red flag. Scammers often lure victims with prices that seem too good to be true. De la Cruz diligently checked the IMEI number, a common practice, but even this wasn’t enough to reveal the deception. The phone initially appeared legitimate, even successfully connecting calls.

The problems surfaced when she tried to transfer files, revealing insufficient memory and a processor from an older device. The inconsistencies in the seller’s receipt – different fonts, a Canadian promotion, and Asian tax terminology – were further indicators of fraud. This case underscores that even seemingly careful buyers can fall victim to these schemes.

Beyond Samsung: A Widespread Problem

While the Rancho Bernardo case involved a fake Samsung phone, it’s not an isolated incident. Numerous online posts detail similar experiences with counterfeit devices. The lack of centralized reporting makes it difficult to quantify the scale of the problem nationally, but the anecdotal evidence suggests it’s widespread. The Identity Theft Resource Center (ITRC) warns against purchasing tech on online marketplaces, noting the risk of remotely “bricking” stolen phones – rendering them unusable.

Why Online Marketplaces Are a Hotspot for Fraud

Online marketplaces offer scammers anonymity and a large pool of potential victims. The ease of creating fake profiles and the lack of stringent verification processes contribute to the problem. The urgency often created by limited-time offers or “one-of-a-kind” deals can pressure buyers into making hasty decisions without proper due diligence.

Pro Tip: If a deal seems too good to be true, it almost certainly is. Take a step back, research the seller, and compare prices with reputable retailers.

The Future of Tech Scams: What to Expect

As technology evolves, so too will the tactics of scammers. Here are some potential future trends:

  • AI-Powered Deepfakes: Scammers could use AI to create incredibly realistic fake product images and videos, making it even harder to distinguish genuine items from counterfeits.
  • Sophisticated Phishing Campaigns: Expect more targeted phishing emails and messages designed to steal login credentials for online marketplaces.
  • Exploitation of Emerging Technologies: Recent technologies, like virtual reality and augmented reality, could be exploited to create immersive but fraudulent shopping experiences.
  • Increased Use of Cryptocurrency: Cryptocurrency transactions offer a degree of anonymity that can appeal to scammers.

Protecting Yourself: A Checklist

  • Buy from Reputable Retailers: Whenever possible, purchase electronics directly from authorized dealers or the manufacturer.
  • Inspect Before You Buy: If buying from an individual, thoroughly inspect the device before handing over any money.
  • Verify the IMEI Number: Check the IMEI number on multiple websites to ensure it’s not blacklisted or reported stolen.
  • Be Wary of Low Prices: If a price seems significantly lower than market value, proceed with extreme caution.
  • Use Secure Payment Methods: Avoid using cash or wire transfers. Credit cards and PayPal offer some level of buyer protection.
  • Report Suspicious Activity: If you suspect you’ve been targeted by a scam, report it to the Federal Trade Commission (FTC) and your local law enforcement agency.

FAQ

Q: What is an IMEI number?
A: An IMEI (International Mobile Equipment Identity) number is a unique 15-digit code that identifies a mobile device. It can be used to check if a phone has been reported lost or stolen.

Q: What should I do if I think I’ve been scammed?
A: Report the incident to the FTC, your local police department, and the online marketplace where the transaction occurred.

Q: Is it safe to buy used electronics online?
A: It can be, but it requires extra caution. Thoroughly research the seller, inspect the device carefully, and use secure payment methods.

Did you grasp? The ITRC offers free resources and support to victims of identity theft, and scams. Visit their website at https://www.identitytheftresource.org/.

Stay informed, be vigilant, and protect yourself from becoming the next victim of a tech scam. Share this information with your friends and family to help raise awareness and prevent fraud.

February 7, 2026 0 comments
0 FacebookTwitterPinterestEmail
World

Scammers’ abandoned Cambodia compound exposes brutality and banality of fraud, Asia News

by Chief Editor February 7, 2026
written by Chief Editor

The Shadowy World of Scam Compounds: A Growing Global Threat

A recent discovery in O’Smach, Cambodia, has pulled back the curtain on a disturbing trend: sophisticated scam compounds operating across Southeast Asia. These aren’t just fly-by-night operations. they are meticulously organized facilities, complete with mock police stations – resembling those in Singapore, Australia and even Vietnam – and detailed victim profiles. The scale of these operations is staggering, with billions of dollars stolen globally and countless individuals subjected to exploitative, near-slave labor conditions.

Inside the Fraud Factories

The compound, now occupied by Thai troops following December clashes, revealed a chilling level of detail. Documents found on-site included personal information on potential victims, such as a 73-year-old Japanese retiree’s bank details and the personal history of an American woman who had experienced domestic abuse. Scripts for “love scams” and impersonating law enforcement were also present, illustrating the calculated nature of these crimes. Financial statements showed tenants – the scamming groups – were charged thousands of dollars per month in rent.

Reuters was the first news organization to authenticate some of these documents, verifying details with a Japanese retiree who confirmed receiving a scam call matching the information logged in the compound. This underscores the real-world impact of these operations and the vulnerability of individuals worldwide.

Southeast Asia: An Epicenter of Cyberfraud

Southeast Asia has become a hotbed for these scam centers, with Cambodia, Laos, the Philippines, and areas of Myanmar-Thai border seeing a proliferation of these compounds. These are largely run by Chinese criminal gangs, often employing individuals who have been trafficked and are living in brutal conditions. The US estimates that Americans alone lost $10 billion to these scams in 2024.

Recent military and police actions in Cambodia, spurred by a border conflict with Thailand and pressure from foreign governments, have led to an exodus of over 100,000 people from these compounds. This has created a humanitarian crisis, with many seeking assistance from embassies to return home.

Beyond Borders: The Evolving Threat

Experts warn that the crackdown in Southeast Asia isn’t eliminating the problem; it’s simply dispersing it. Delphine Schantz, regional representative for the United Nations Office on Drugs and Crime, notes that these scam centers are “mushrooming all over the world,” adopting the same model seen in Southeast Asia. This suggests a future where cyberfraud operations become more decentralized and harder to track.

The Role of Cryptocurrency

Investigations into the Cambodian compound revealed links to cryptocurrency wallets with connections to high-risk services, including gambling sites and cash-conversion locations. This highlights the role of digital currencies in facilitating these scams and laundering illicit funds. Blockchain analysis firms are increasingly crucial in tracing the flow of money and identifying the individuals behind these operations.

Future Trends & Potential Developments

Increased Sophistication of Scams

As law enforcement agencies crack down, scam operations are likely to become more sophisticated in their tactics. This could involve utilizing artificial intelligence (AI) to create more convincing deepfakes, personalized phishing attacks, and automated scam campaigns. Expect to see a rise in scams that exploit emerging technologies and target modern demographics.

Decentralization and Smaller Operations

The trend towards smaller, more decentralized operations will likely continue. This makes them harder to detect and disrupt, as they operate below the radar of traditional law enforcement methods. These smaller cells may also be more adaptable and quicker to relocate when threatened.

Expansion to New Geographies

While Southeast Asia is currently the epicenter, scam operations are expected to expand to other regions with weak governance, political instability, or limited cybersecurity infrastructure. Africa, Eastern Europe, and Latin America could become new targets for these criminal enterprises.

Greater Use of Social Engineering

Scammers will increasingly rely on social engineering techniques to manipulate victims and gain access to their personal information. This involves building trust, exploiting emotional vulnerabilities, and creating a sense of urgency. Education and awareness campaigns are crucial to help individuals recognize and avoid these tactics.

FAQ

Q: What is a scam compound?
A: A scam compound is a facility used to conduct large-scale cyberfraud operations, often involving forced labor and human trafficking.

Q: Who is typically targeted by these scams?
A: Victims come from all over the world, but recent cases have shown targets in Japan, the United States, and other countries.

Q: What types of scams are run from these compounds?
A: Common scams include love scams, investment fraud, and impersonating law enforcement officials.

Q: Is cryptocurrency involved in these scams?
A: Yes, cryptocurrency is often used to launder money and facilitate transactions.

Q: What is being done to combat these operations?
A: Law enforcement agencies are conducting raids, governments are implementing stricter regulations, and international organizations are working to raise awareness and provide assistance to victims.

Did you recognize? The compounds often feature meticulously crafted replicas of police stations from different countries to further deceive victims.

Pro Tip: Be extremely cautious of unsolicited calls or messages asking for personal or financial information. Verify the identity of the caller or sender before providing any details.

Stay informed about the latest cyberfraud threats and protect yourself from becoming a victim. Explore our other articles on cybersecurity and online safety for more information.

February 7, 2026 0 comments
0 FacebookTwitterPinterestEmail
Newer Posts
Older Posts

Recent Posts

  • Turkey Issues Yellow Weather Alerts for 10 Provinces Due to Heavy Rain

    May 18, 2026
  • Endangered Tree Kangaroos are Starring in Viral Crunch Videos

    May 18, 2026
  • Trump Warns Iran Time Is Running Out Amid UAE Nuclear Plant Drone Attack

    May 18, 2026
  • Britain’s deep political divides were plain to see on the streets of London this weekend – The Irish Times

    May 18, 2026
  • Pork Prices in Latvia Rise in March Amid EU Market Trends

    May 18, 2026

Popular Posts

  • 1

    Maya Jama flaunts her taut midriff in a white crop top and denim jeans during holiday as she shares New York pub crawl story

    April 5, 2025
  • 2

    Saar-Unternehmen hoffen auf tiefgreifende Reformen

    March 26, 2025
  • 3

    Marta Daddato: vita e racconti tra YouTube e podcast

    April 7, 2025
  • 4

    Unlocking Success: Why the FPÖ Could Outperform Projections and Transform Austria’s Political Landscape

    April 26, 2025
  • 5

    Mecimapro Apologizes for DAY6 Concert Chaos: Understanding the Controversy

    May 6, 2025

Follow Me

Follow Me
  • Cookie Policy
  • CORRECTIONS POLICY
  • PRIVACY POLICY
  • TERMS OF SERVICE

Hosted by Byohosting – Most Recommended Web Hosting – for complains, abuse, advertising contact: o f f i c e @byohosting.com


Back To Top
Newsy Today
  • Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World