Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

I am the victim of an internet scam. It is very hard to write that sentence, but it's necessary in order to warn my fellow clowns, magicians and other entertainers, and to prevent them from being taken for $2,800.00 like I was. Here is what happened to me, and how you can avoid it.

I run the clown-ministry.com web site, and I perform as a clown at both ministry and secular events. Due to the popularity of the clown-ministry.com web site (do a search on Google .com for 'clown' and it's the 7th site listed, for example) I'm easily found by people -- for both good and bad reasons. For instance, last year my wife Ellen and I taught clowning for a week at the Seventh Day Adventists' national Camporee -- we're not Adventists, and don't know many people who are, but we were found by them & hired primarily due to the popularity of the web site. We've been invited to perform in clown at a conference in Canada, performed at company picnics, etc. well out of our neck of the wood, and so on. Please understand that this isn't bragging; it's setting the stage for what happened in the scam.

We were contacted via e-mail by someone purportedly from Cincinnati, Ohio, who wanted to fly my wife & I to Cincinnati to perform at a birthday party. Since we'd had similar things happen in the past, that didn't set off any alarms in my head. In addition, I knew that there are entertainers such as Jennifer Lopez who will sing "Happy Birthday" at your party, for a fee of $50,000.00; I'm no J Lo, and my singing is atrocious, but I charge a lot less as well :)

I did an internet search on that person (I'm not using the name he gave, since there's a criminal investigation as well as FBI investigation going on -- no joke), and found someone by that name in Cincinnati, Ohio, a "regional celebrity" so to speak. So, it didn't seem incredulous that he would have the money to hire us as well as pay round trip air fare. It's now obvious that it was merely someone using that person's name to "hook" us.

At that point, my wife & I were still inclined to think of this as a prank, but even so we replied to the email with a quotation for our services, politely and professionally. We were joking with each other that this had to be a prank; after all, why would someone hire us when there are hundreds of clowns in the Cincinnati area? Unless it was someone with money to burn who wanted to buy "bragging rights," it made no sense. So we forgot about it, until the person replied back, hiring us.

We still considered it a joke, until we received a check in the mail, for $2,800.00. MUCH more that we had quoted our services for! We thought that, maybe, the excess was to pay for round trip air fare and accommodations, but even so that was far too much. We e-mailed the person back, explaining that we had received $2,800.00 via check. His response is what should have tipped us off to the scam.

He replied that, since he was out of the country on a business trip, he had his personal assistant send the checks out for the party, and the assistant had made a mistake, combining with our check one for $2,300.00 for the photographer from the United Kingdom that he was flying in to photograph the party. Would we be so kind as to send him those funds via Western Union?

Like an idiot, I said "yes." The check had been deposited and cleared (I thought), and I didn't want to hold onto money that didn't belong to me. So, I went to the local Western Union office and sent $2,300.00 to an individual in the United Kingdom. This didn't set off any red flags (although it should have) since it seemed like the type of silly mistake I've seen people do before. What happened next, though, set off every red flag in my head, and then some.

Days later, I received another email from the man supposedly from Cincinnati. According to him, his mother had an advanced form of lung cancer, and needed an immediate operation. He wanted me to send the remaining money to his mother's doctor in Nigeria and he would reschedule the party later. When I heard the word 'Nigeria' I had icicles running up and down my spine. Nigeria is famous, in the internet world, for being home to the most prolific scam of all time. You've likely received spam email about it. In a nutshell, it involves the widow of some minister or rich person, who is trying to smuggle their immense fortune out of the country before it's seized by her dead husband's adversaries; in exchange for letting them use your bank account, they will give you (various amounts of money, if not enough to make you filthy rich, at least enough to make you dingy). Of course, no money comes out, but these people proceed to rob your bank account of every penny.

So, when I heard that, fear clutched at my heart. Besides, why would someone rich enough to hire me (and fly a photographer in from the UK) need my money? The answer is, he didn't; he was just trying to bilk me of more money before his ruse was exposed.

You see, when I initially deposited the $2,800.00 check, it appeared to clear; it was then several more days before he requested the $2,300 to his photographer, and nearly a week (from the time I deposited the check) until I complied with that. 11 days after the check was initially deposited, it came back 'funds denied.' The bank then debited $2,800.00 from my checking account -- which didn't contain that much, of course. So, I'm out $2,800.00, the crook (or his accomplice in the UK) received $2,300.00. What's the moral of the story?

The purpose of this is two-fold: to warn my fellow clowns, and to point out the red flags that I should have seen, and what I should have done.

  • Bogus email address: there are many 'free' email sites available, where anyone can set up a free email account. Spammers, and many others use these to hide behind. Never trust information coming from a 'free' account.
  • Depositing the check: I should have deposited the check, and then waited 2 weeks to ensure that it had cleared. I had seen people selling items on ebay.com who warn people paying by personal check that they would not ship items until 2 weeks after the check was deposited, just to prevent this problem. In my case, they used an internet service (qchex.com) instead of a personal check, but the same time period applies.
  • Sending money back: I should have offered to send the money back to the original person after 2 weeks, or destroyed the check and asked them to re-send the correct amount.
  • Nigeria!: need I say more? Sending money to Nigeria is a Bad Idea.

    So, that's where it lies. I'm out $2,800.00, and in danger of losing my house due to the actions of this criminal. Jesus Christ orders His followers to "pray for those who despitefully use you" (Matthew 5:44). It's difficult, but I'm praying. Thank you for listening -- be sure to protect yourself and your loved ones.

    Tom Raymond, aka. Raynbow the magic clown, is a professional clown and underemployed computer geek, webmaster of http://www.clown-ministry.com/ the largest clown resource site on the web. His personal site can be found at http://www.clown-ministry.com/raynbow/

    In The News:

    This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

    Russia says NATO membership of Balkan countries threatens security
    Reuters
    SARAJEVO (Reuters) - NATO enlargement to take in members from the Balkan countries is undermining security and stability in the region, a senior Russian parliamentarian said on Monday. Valentina Matviyenko, speaking in the upper house of Bosnia's ...

    and more »

    NPR

    Alexa, Tell Me A National Security Secret: Amazon's Reach Goes ...
    NPR
    It's little known that the CIA uses Amazon Web Services to store its data, and, now, it's the favorite for a big-money Pentagon contract to do the same. Amazon's tentacles go to other agencies, too.
    Alexa, tell me a national security secret: Amazon's reach goes beyond the Post Office89.3 KPCC

    all 1 news articles »

    Council on Foreign Relations (blog)

    Nigeria Security Tracker Weekly Update: April 14 - April 20
    Council on Foreign Relations (blog)
    April 15: Boko Haram killed three Chadian soldiers in Abadam, Borno. April 15: Herdsmen killed seventy-eight in Awe, Keana, Obi, and Doma LGAs in Nasarawa (casualties not specified by LGA; majority in Obi). April 16: Kidnappers killed one policeman and ...

    and more »

    Quick Take-Aways From the RSA Security Conference
    CSO Online
    The transition from “bolted on” to “baked in” security. With security as a top-of-mind issue across business and IT, security functionality is moving toward cloud, application, and IT infrastructure. Intel announced new chip-level security ...

    and more »

    Stars and Stripes

    Chinese smartphones cited by intelligence as security risk sold on US bases
    Stars and Stripes
    “Regardless of where the device is purchased, on base or off base, servicemembers should practice good (operational security).” In February, the director of national intelligence, along with the heads of the CIA, FBI, National Security Agency, Defense ...

    and more »

    Chicago Tribune

    Oakbrook Center security scans license plates in its parking lots, raising privacy concerns
    Chicago Tribune
    If you park at Oakbrook Center, your car may be part of a candid camera scenario, as security cars drive up and down aisles in lots and garages, using license plate reading technology to check the plate numbers on vehicles. The license plate ...

    and more »

    New York Post

    National security adviser recently chaired nonprofit with anti-Muslim views
    New York Post
    National security adviser John Bolton recently chaired a nonprofit that has shared fake anti-Muslim news, according to a new report. Bolton was chairman of the New York-based Gatestone Institute, which peddled misleading and false anti-Muslim accounts ...
    National Security Adviser John Bolton is the former chairman of a sensationalist, anti-immigrant nonprofitThe Week Magazine
    John Bolton presided over anti-Muslim think tankNBCNews.com
    Are Jihadists Taking over Europe?Gatestone Institute

    all 17 news articles »

    New security at courthouse diffuses several situations
    Abilene Recorder Chronicle
    The presence of security guards in the Dickinson County Courthouse is making workdays a little less stressful for some employees. Dickinson County Administrator Brad Homman told commissioners Thursday that not only has the screening process and metal ...


    Haaretz

    Egypt's New Internet Law Blocks Sites Over 'National Security Concern'
    Haaretz
    What is national security, wondered Yasser Abdel Aziz, a leading member of Egypt's National Council for Human Rights. “If I were to publish something saying that the president is not a native Egyptian, would that harm national security?” At a meeting ...


    The Hill

    Homeland Security chief issues warning to 'caravan'
    The Hill
    Homeland Security Secretary Kirstjen Nielsen · Kirstjen Michele NielsenSenators chart path forward on election security bill Navy, Marines chiefs say no morale issues with transgender troops Staff changes upend White House cyber team MORE said Monday ...
    Trump Brands Migrant Caravan a 'Disgrace,' Orders Homeland Security Officials to Turn Away Immigrants at BorderNewsweek
    DHS boss threatens 'caravan' border-crossers with prosecution, detention, deportationFox News

    all 70 news articles »
    Google News

  • Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is

    A week or so ago, I received an inquiry from... Read More

    Pharming - Another New Scam

    Pharming is one of the latest online scams and rapidly... Read More

    Is Shopping Online For Your Horse Gifts Safe?

    Shopping for horse gifts or other gift items on the... Read More

    Just Whos Computer is this Anyway?

    Well, this is an article I never thought I would... Read More

    Its War I Tell You!

    There are ways to insure security though. You can get... Read More

    8 Surefire Ways to Spot an E-Mail Identity Theft Scam!

    The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More

    Computer Viruses, Worms, and Hoaxes

    In recent days, I was one of the unfortunate persons... Read More

    Corporate Security for Your Home Business

    The words Corporate Security may conjure up images of a... Read More

    Data Security; Are Your Company Assets Really Secure?

    Is your data secure? Think again. Securing data is unlike... Read More

    Avoid Internet Theft, Fraud and Phishing

    Since its birth, the Internet has grown and expanded to... Read More

    Firewall Protection - Does Your Firewall Do This?

    The first thing people think about when defending their computers... Read More

    Reducing Fraudulent Transations ? 5 Simple Ways To Protect Yourself

    The money being spent online is steadily growing. With billions... Read More

    How to Protect Your Child from the Internet

    When the Internet first came about, it was realized it... Read More

    Fishing for Fortunes. Scam!

    Spelt phishing, but pronounced as above, this despicable act is... Read More

    Is Your Email Private? Part 1 of 3

    In a word, no - an email message has always... Read More

    Lottery Scam, What It is and how to Avoid It?

    Internet scams and frauds are on the rise! The quantity... Read More

    Another Fine Mess!

    I'm in the Anti-Spyware business, and I'm doing a lot... Read More

    Is My PC Vulnerable on the Internet?

    No longer are viruses the only threat on the internet.... Read More

    An Open Letter From a So-called Stupid

    Someone recently told me, "You would have to be a... Read More

    Information Security for E-businessmen: Just a Couple of Ideas

    If you constantly deal with bank or electronic accounts, it... Read More

    Phishing

    Recently I have received email from my bank/credit Card Company,... Read More

    If You Steal It, They May Come!

    Business on the internet is getting down right shameless. This... Read More

    DOS Attacks: Instigation and Mitigation

    During the release of a new software product specialized to... Read More

    Types Of Computer Infections

    Computer infections can be broken up into 4 main categories... Read More

    5 Simple Steps to Protect your Digital Downloads

    A couple of days ago, I was searching for a... Read More