Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

I am the victim of an internet scam. It is very hard to write that sentence, but it's necessary in order to warn my fellow clowns, magicians and other entertainers, and to prevent them from being taken for $2,800.00 like I was. Here is what happened to me, and how you can avoid it.

I run the clown-ministry.com web site, and I perform as a clown at both ministry and secular events. Due to the popularity of the clown-ministry.com web site (do a search on Google .com for 'clown' and it's the 7th site listed, for example) I'm easily found by people -- for both good and bad reasons. For instance, last year my wife Ellen and I taught clowning for a week at the Seventh Day Adventists' national Camporee -- we're not Adventists, and don't know many people who are, but we were found by them & hired primarily due to the popularity of the web site. We've been invited to perform in clown at a conference in Canada, performed at company picnics, etc. well out of our neck of the wood, and so on. Please understand that this isn't bragging; it's setting the stage for what happened in the scam.

We were contacted via e-mail by someone purportedly from Cincinnati, Ohio, who wanted to fly my wife & I to Cincinnati to perform at a birthday party. Since we'd had similar things happen in the past, that didn't set off any alarms in my head. In addition, I knew that there are entertainers such as Jennifer Lopez who will sing "Happy Birthday" at your party, for a fee of $50,000.00; I'm no J Lo, and my singing is atrocious, but I charge a lot less as well :)

I did an internet search on that person (I'm not using the name he gave, since there's a criminal investigation as well as FBI investigation going on -- no joke), and found someone by that name in Cincinnati, Ohio, a "regional celebrity" so to speak. So, it didn't seem incredulous that he would have the money to hire us as well as pay round trip air fare. It's now obvious that it was merely someone using that person's name to "hook" us.

At that point, my wife & I were still inclined to think of this as a prank, but even so we replied to the email with a quotation for our services, politely and professionally. We were joking with each other that this had to be a prank; after all, why would someone hire us when there are hundreds of clowns in the Cincinnati area? Unless it was someone with money to burn who wanted to buy "bragging rights," it made no sense. So we forgot about it, until the person replied back, hiring us.

We still considered it a joke, until we received a check in the mail, for $2,800.00. MUCH more that we had quoted our services for! We thought that, maybe, the excess was to pay for round trip air fare and accommodations, but even so that was far too much. We e-mailed the person back, explaining that we had received $2,800.00 via check. His response is what should have tipped us off to the scam.

He replied that, since he was out of the country on a business trip, he had his personal assistant send the checks out for the party, and the assistant had made a mistake, combining with our check one for $2,300.00 for the photographer from the United Kingdom that he was flying in to photograph the party. Would we be so kind as to send him those funds via Western Union?

Like an idiot, I said "yes." The check had been deposited and cleared (I thought), and I didn't want to hold onto money that didn't belong to me. So, I went to the local Western Union office and sent $2,300.00 to an individual in the United Kingdom. This didn't set off any red flags (although it should have) since it seemed like the type of silly mistake I've seen people do before. What happened next, though, set off every red flag in my head, and then some.

Days later, I received another email from the man supposedly from Cincinnati. According to him, his mother had an advanced form of lung cancer, and needed an immediate operation. He wanted me to send the remaining money to his mother's doctor in Nigeria and he would reschedule the party later. When I heard the word 'Nigeria' I had icicles running up and down my spine. Nigeria is famous, in the internet world, for being home to the most prolific scam of all time. You've likely received spam email about it. In a nutshell, it involves the widow of some minister or rich person, who is trying to smuggle their immense fortune out of the country before it's seized by her dead husband's adversaries; in exchange for letting them use your bank account, they will give you (various amounts of money, if not enough to make you filthy rich, at least enough to make you dingy). Of course, no money comes out, but these people proceed to rob your bank account of every penny.

So, when I heard that, fear clutched at my heart. Besides, why would someone rich enough to hire me (and fly a photographer in from the UK) need my money? The answer is, he didn't; he was just trying to bilk me of more money before his ruse was exposed.

You see, when I initially deposited the $2,800.00 check, it appeared to clear; it was then several more days before he requested the $2,300 to his photographer, and nearly a week (from the time I deposited the check) until I complied with that. 11 days after the check was initially deposited, it came back 'funds denied.' The bank then debited $2,800.00 from my checking account -- which didn't contain that much, of course. So, I'm out $2,800.00, the crook (or his accomplice in the UK) received $2,300.00. What's the moral of the story?

The purpose of this is two-fold: to warn my fellow clowns, and to point out the red flags that I should have seen, and what I should have done.

  • Bogus email address: there are many 'free' email sites available, where anyone can set up a free email account. Spammers, and many others use these to hide behind. Never trust information coming from a 'free' account.
  • Depositing the check: I should have deposited the check, and then waited 2 weeks to ensure that it had cleared. I had seen people selling items on ebay.com who warn people paying by personal check that they would not ship items until 2 weeks after the check was deposited, just to prevent this problem. In my case, they used an internet service (qchex.com) instead of a personal check, but the same time period applies.
  • Sending money back: I should have offered to send the money back to the original person after 2 weeks, or destroyed the check and asked them to re-send the correct amount.
  • Nigeria!: need I say more? Sending money to Nigeria is a Bad Idea.

    So, that's where it lies. I'm out $2,800.00, and in danger of losing my house due to the actions of this criminal. Jesus Christ orders His followers to "pray for those who despitefully use you" (Matthew 5:44). It's difficult, but I'm praying. Thank you for listening -- be sure to protect yourself and your loved ones.

    Tom Raymond, aka. Raynbow the magic clown, is a professional clown and underemployed computer geek, webmaster of http://www.clown-ministry.com/ the largest clown resource site on the web. His personal site can be found at http://www.clown-ministry.com/raynbow/

    In The News:


    Aljazeera.com

    Milo Yiannopoulos' security cost UC Berkeley $800,000 | Far Right ...
    Aljazeera.com
    US university grappling with budget cuts and layoffs spends sum on security for far-right speaker's 15-minute rally.

    and more »

    Gizmodo

    Source: Deloitte Breach Affected All Company Email, Admin Accounts
    Krebs on Security
    In its statement about the incident, Deloitte said it responded by “implementing its comprehensive security protocol and initiating an intensive and thorough review which included mobilizing a team of cyber-security and confidentiality experts inside ...
    One of the World's Biggest Accounting Firms Hacked After Basic Security GoofGizmodo
    Industry reactions to the Deloitte cyber attackHelp Net Security

    all 88 news articles »

    ZDNet

    Microsoft adds new Microsoft 365 versions, plus security and management features
    ZDNet
    Microsoft is adding new Microsoft 365 bundles, and adding more features to these integrated Windows, Office 365 and Enterprise Mobiity + Security management and security subscription offerings. Microsoft introduced Microsoft 365 at its Inspire ...
    Microsoft looks to the cloud to expand its security offeringsTechCrunch
    Ignite 2017: Improving Security via the Microsoft's Intelligent Security GraphWindows IT Pro

    all 188 news articles »

    Forbes

    Security Concerns Again Hang Over Winter Olympics
    Forbes
    The PyeongChang 2018 Olympic medals during their unveiling at a ceremony in Seoul on Sept. 21. (Photo by JUNG YEON-JE/AFP/Getty Images). North Korea ramped up its vitriol on Monday, undoubtedly increasing concerns by athletes who are preparing ...
    South Korean Olympic chief downplays security concernsUPI.com

    all 48 news articles »

    Bloomberg

    SEC Says It Told US Security Officials of Hack Months Ago
    Bloomberg
    The U.S. Securities and Exchange Commission told government cybersecurity officials about a hack into its database of corporate filings soon after it happened last year, months before the agency's new chairman made the breach public. Since disclosing ...

    and more »

    Daily Signal

    Trump's New Travel Ban Is Standard Security Policy
    Daily Signal
    President Donald Trump's latest travel executive order restricts travel from seven countries that are known state sponsors of terrorism or have failed to work effectively with the U.S. against emerging threats. (Photo: Jonathan Ernst/Reuters /Newscom) ...
    President Trump's New Travel Executive Order Has Little National Security JustificationCato Institute (blog)
    White House expands travel ban, restricting visitors from eight countriesWashington Post

    all 839 news articles »

    cleveland.com

    Cleveland Browns security guard robbed at gunpoint near FirstEnergy Stadium
    cleveland.com
    Darnell Hurt, an employee at Contemporary Services Corporation, which provides security for the Browns, said he was walking to the stadium to catch a bus that would take him and other employees to Indianapolis where they would provide security for the ...


    Macworld

    Report: Security hole in macOS Keychain puts passwords at risk
    Macworld
    Apple released macOS High Sierra on Monday, so it should be a nice way to spotlight the Mac this week after last week's iOS 11 and iPhone 8 releases. But a report by a security researcher at Synack puts a bit of a damper on the High Sierra release.
    macOS High Sierra Automatically Performs Security Check on EFI Firmware Each WeekMac Rumors
    Ex-NSA hacker drops macOS High Sierra zero-day hours before launchZDNet
    High Sierra validates Mac firmware weekly, alerts users to possible security issuesAppleInsider (press release) (blog)

    all 108 news articles »

    East Bay Times

    Safeway adds security, OKs arresting trespassers at downtown Concord store
    East Bay Times
    15 letter to Mayor Laura Hoffmeister, the supermarket chain responded to the city's concerns about shoplifting, trespassing and security at the downtown grocery store. Safeway confirmed plans to paint the building's exterior, evaluate the parking lot ...

    and more »

    WKRN.com

    Church shooting suspect worked for security company less than 12 hours before Antioch attack
    WKRN.com
    NASHVILLE, Tenn. (WKRN) – The man arrested for the deadly shooting at an Antioch church Sunday applied for a security guard license Friday before the attack, and worked as a security guard Saturday night . Emanuel Samson attended a class for ...
    Antioch Church Gunman Attended Unarmed Security Training Class Before AttackNewsChannel5.com
    Alleged Antioch church gunman tried to renew security license days before shootingWZTV

    all 618 news articles »
    Google News

  • Crack The Code - Thats A Direct Challenge

    I Challenge You To Crack The Code ------------------------------------- I had... Read More

    How Can Someone Get Private Information From My Computer?

    From the "Ask Booster" column in the June 17, 2005... Read More

    What Can Be Done About Spyware And Adware

    Having a good Spyware eliminator on your computer is vital... Read More

    How Spyware Blaster Can Protect Your Computer From Harm

    By browsing a web page, you could infect your computer... Read More

    I Spy...Something Terribly Wrong (In Your Computer)

    This really chapped my lips...I recently bought a new computer.... Read More

    Phishing - Identity Theft & Credit Card Fraud

    What is Phishing? Phishing is a relatively newly coined term... Read More

    8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

    Ebay is a great site and is used by many... Read More

    5 Simple Steps to Protect your Digital Downloads

    A couple of days ago, I was searching for a... Read More

    Computer Viruses - How to Remove a Computer Virus from Your Computer

    Computer viruses infect millions of computers every day. Viruses can... Read More

    Corporate Security for Your Home Business

    The words Corporate Security may conjure up images of a... Read More

    Protecting Your Children On The Internet

    If you are a parent, as am I, I think... Read More

    An Open Letter From a So-called Stupid

    Someone recently told me, "You would have to be a... Read More

    What is Spyware?

    The most frustrating part of having Spyware on your computer... Read More

    Phishing ? Its Signs and Your Options

    Phishing is the act of some individual sending an email... Read More

    Network Security 101

    As more people are logging onto the Internet everyday, Network... Read More

    Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER

    From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More

    How to Fight Spyware

    If you are wondering how to fight spyware for safe... Read More

    Watching the Watchers: Detection and Removal of Spyware

    If spyware were a person and he set himself up... Read More

    File Sharing - What You Need to Know!

    File sharing on p2p is soaring despite the music and... Read More

    Why you Must Secure your Digital Product and Thank You Web Page

    A couple of years back, I paid my dues the... Read More

    Computer-Virus Writers: A Few Bats In The Belfry?

    "Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More

    SPYWARE - Whos Watching Who?

    I am in the midst of Oscar Wilde's The Picture... Read More

    3 Steps to Ending Scams and Virus Problems

    Watching how the traditional media covers the latest virus or... Read More

    The Truth About Hiding Your Tracks on the Internet

    Ok, ok, I know you've seen them. All those pop... Read More

    The 5 Critical Steps to Protecting Your Computer on the Internet

    Spyware, viruses and worms... oh my!If you are connected to... Read More