Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

I am the victim of an internet scam. It is very hard to write that sentence, but it's necessary in order to warn my fellow clowns, magicians and other entertainers, and to prevent them from being taken for $2,800.00 like I was. Here is what happened to me, and how you can avoid it.

I run the clown-ministry.com web site, and I perform as a clown at both ministry and secular events. Due to the popularity of the clown-ministry.com web site (do a search on Google .com for 'clown' and it's the 7th site listed, for example) I'm easily found by people -- for both good and bad reasons. For instance, last year my wife Ellen and I taught clowning for a week at the Seventh Day Adventists' national Camporee -- we're not Adventists, and don't know many people who are, but we were found by them & hired primarily due to the popularity of the web site. We've been invited to perform in clown at a conference in Canada, performed at company picnics, etc. well out of our neck of the wood, and so on. Please understand that this isn't bragging; it's setting the stage for what happened in the scam.

We were contacted via e-mail by someone purportedly from Cincinnati, Ohio, who wanted to fly my wife & I to Cincinnati to perform at a birthday party. Since we'd had similar things happen in the past, that didn't set off any alarms in my head. In addition, I knew that there are entertainers such as Jennifer Lopez who will sing "Happy Birthday" at your party, for a fee of $50,000.00; I'm no J Lo, and my singing is atrocious, but I charge a lot less as well :)

I did an internet search on that person (I'm not using the name he gave, since there's a criminal investigation as well as FBI investigation going on -- no joke), and found someone by that name in Cincinnati, Ohio, a "regional celebrity" so to speak. So, it didn't seem incredulous that he would have the money to hire us as well as pay round trip air fare. It's now obvious that it was merely someone using that person's name to "hook" us.

At that point, my wife & I were still inclined to think of this as a prank, but even so we replied to the email with a quotation for our services, politely and professionally. We were joking with each other that this had to be a prank; after all, why would someone hire us when there are hundreds of clowns in the Cincinnati area? Unless it was someone with money to burn who wanted to buy "bragging rights," it made no sense. So we forgot about it, until the person replied back, hiring us.

We still considered it a joke, until we received a check in the mail, for $2,800.00. MUCH more that we had quoted our services for! We thought that, maybe, the excess was to pay for round trip air fare and accommodations, but even so that was far too much. We e-mailed the person back, explaining that we had received $2,800.00 via check. His response is what should have tipped us off to the scam.

He replied that, since he was out of the country on a business trip, he had his personal assistant send the checks out for the party, and the assistant had made a mistake, combining with our check one for $2,300.00 for the photographer from the United Kingdom that he was flying in to photograph the party. Would we be so kind as to send him those funds via Western Union?

Like an idiot, I said "yes." The check had been deposited and cleared (I thought), and I didn't want to hold onto money that didn't belong to me. So, I went to the local Western Union office and sent $2,300.00 to an individual in the United Kingdom. This didn't set off any red flags (although it should have) since it seemed like the type of silly mistake I've seen people do before. What happened next, though, set off every red flag in my head, and then some.

Days later, I received another email from the man supposedly from Cincinnati. According to him, his mother had an advanced form of lung cancer, and needed an immediate operation. He wanted me to send the remaining money to his mother's doctor in Nigeria and he would reschedule the party later. When I heard the word 'Nigeria' I had icicles running up and down my spine. Nigeria is famous, in the internet world, for being home to the most prolific scam of all time. You've likely received spam email about it. In a nutshell, it involves the widow of some minister or rich person, who is trying to smuggle their immense fortune out of the country before it's seized by her dead husband's adversaries; in exchange for letting them use your bank account, they will give you (various amounts of money, if not enough to make you filthy rich, at least enough to make you dingy). Of course, no money comes out, but these people proceed to rob your bank account of every penny.

So, when I heard that, fear clutched at my heart. Besides, why would someone rich enough to hire me (and fly a photographer in from the UK) need my money? The answer is, he didn't; he was just trying to bilk me of more money before his ruse was exposed.

You see, when I initially deposited the $2,800.00 check, it appeared to clear; it was then several more days before he requested the $2,300 to his photographer, and nearly a week (from the time I deposited the check) until I complied with that. 11 days after the check was initially deposited, it came back 'funds denied.' The bank then debited $2,800.00 from my checking account -- which didn't contain that much, of course. So, I'm out $2,800.00, the crook (or his accomplice in the UK) received $2,300.00. What's the moral of the story?

The purpose of this is two-fold: to warn my fellow clowns, and to point out the red flags that I should have seen, and what I should have done.

  • Bogus email address: there are many 'free' email sites available, where anyone can set up a free email account. Spammers, and many others use these to hide behind. Never trust information coming from a 'free' account.
  • Depositing the check: I should have deposited the check, and then waited 2 weeks to ensure that it had cleared. I had seen people selling items on ebay.com who warn people paying by personal check that they would not ship items until 2 weeks after the check was deposited, just to prevent this problem. In my case, they used an internet service (qchex.com) instead of a personal check, but the same time period applies.
  • Sending money back: I should have offered to send the money back to the original person after 2 weeks, or destroyed the check and asked them to re-send the correct amount.
  • Nigeria!: need I say more? Sending money to Nigeria is a Bad Idea.

    So, that's where it lies. I'm out $2,800.00, and in danger of losing my house due to the actions of this criminal. Jesus Christ orders His followers to "pray for those who despitefully use you" (Matthew 5:44). It's difficult, but I'm praying. Thank you for listening -- be sure to protect yourself and your loved ones.

    Tom Raymond, aka. Raynbow the magic clown, is a professional clown and underemployed computer geek, webmaster of http://www.clown-ministry.com/ the largest clown resource site on the web. His personal site can be found at http://www.clown-ministry.com/raynbow/

    In The News:


    Kitsap Sun

    OC launches investigation of security director
    Kitsap Sun
    BREMERTON — Olympic College has launched an investigation of complaints against its director of campus safety in light of a vote of no confidence by the union representing security guards. The vote, taken in mid-January, showed 88 percent of members ...


    The Sun

    Security services knew of glaring weakness in Parliament security after 'war game' simulating attack on Westminster ...
    The Sun
    SECURITY services were aware of gaps in Parliament's security after a simulated attack ended with most MPs being killed, it has been claimed. A source quoted by the Sunday Times claimed a “table-top” exercise revealed four terrorists with automatic ...
    Security chief told MPs they were safe in parliament before attackThe Guardian
    Urgent review of security gates of Parliament needed after Westminster attackExpress.co.uk

    all 56 news articles »

    The Independent

    Security breach renders in-flight laptop ban useless
    The Independent
    The airport which is the main target of the Government's ban on electronic devices has a security flaw that renders rigorous checks futile, The Independent can reveal. After clearing six separate security hurdles at Istanbul airport, passengers bound ...

    and more »

    Rochester Democrat and Chronicle

    JCC receives $200,000 to improve security - Democrat and Chronicle
    Rochester Democrat and Chronicle
    Funds will be used to upgrade cameras and other measures following two bomb threats at the Brighton facility this month.
    JCC of Rochester gets $200,000 for security enhancements | WXXI ...WXXI News

    all 4 news articles »

    Reuters

    Britain reviewing security at parliament after deadly attack
    Reuters
    Interior minister Amber Rudd told the BBC there would be another review of security at the Palace of Westminster, but that such arrangements were continually assessed. "There are constant reviews and updates so that we have the right form of defense in ...
    London attack fuels calls for tighter Westminster securityThe Guardian
    London attack: Parliament security under reviewBBC News
    Questions over Parliament security as motorcyclist rides through gate shortly after terrorist attackTelegraph.co.uk
    Wall Street Journal (subscription)
    all 8,418 news articles »

    The Japan Times

    European security ties 'too precious' for Brexit talks
    The Japan Times
    LONDON – Britain's intelligence expertise may be “too precious” to use as a bargaining tool in the upcoming Brexit talks, experts said, after a terror attack in London highlighted the need for continued European security cooperation. The suggestion ...

    and more »

    New System Estimates Cleveland Airport Security Wait Times
    U.S. News & World Report
    New System Estimates Cleveland Airport Security Wait Times. Cleveland's main airport is developing a system to help travelers more accurately compare wait times at its security checkpoints and better plan their trips. | March 27, 2017, at 12:08 a.m.. MORE.

    and more »

    Huffington Post

    What Don't We Talk About When We Talk About Israel's Security
    Huffington Post
    When Israeli and American Jews talk about “Israel's security” they are thinking about the Holocaust and about extermination. That is the reason they choose the narrowest possible definition of “security,” a strip. Israel's “security” is what we ...

    and more »

    Otago Daily Times

    Ivory Coast rescinds port security measures, attack threat unfounded
    Reuters
    "After compiling the information ... it emerged that the threat is not real," the head of maritime security Colonel Bertin Koffi Tano wrote in a second order to the Abidjan and San Pedro port authorities and shipping companies on Sunday. "I ask that ...
    Ivory Coast boosts port security over attack threatOtago Daily Times

    all 5 news articles »

    The Sun

    Security alert at Ant and Dec's Saturday Night Takeaway as police called amid claims four men broke into the studio
    The Sun
    An ITV spokesman said: “A youth who attempted to gain access to the London Television Centre, as a prank, at 11pm last night was quickly apprehended by our security team when he triggered an alarm as he climbed an external wall. “He did not gain access ...
    Ant and Dec at centre of security alert after four men tried to 'break into' Saturday Night Takeaway studioMirror.co.uk

    all 38 news articles »
    Google News

  • How to Get Rid of New Sobig.F Virus?

    As you know, this time the virus under the name... Read More

    6 Ways To Prevent Identity Theft

    These six ways to prevent identity theft offer you valuable... Read More

    Lets Talk About Antivirus Software!

    Nowadays more and more people are using a computer. A... Read More

    Everything You Need To Know About Spyware and Malware

    You are at your computer, checking out software on EBay.... Read More

    Is Shopping Online For Your Horse Gifts Safe?

    Shopping for horse gifts or other gift items on the... Read More

    Internet Identity Theft - How You Can Shield Yourself

    With the advent of the World Wide Web, a whole... Read More

    Identity Theft Article ? A Phisher Is Trying To Steal Your Identity!

    Sooner or later everyone with an email account will receive... Read More

    Hacking the Body Via PDA Wireless Device

    First I would like to stress I am condoning the... Read More

    How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

    Spyware/adware is a new major concern for PC users everywhere.... Read More

    Check Out That Privacy Policy

    Before you enter your name, address or any other data... Read More

    Phishing ? Its Signs and Your Options

    Phishing is the act of some individual sending an email... Read More

    Watch Out For That Scam

    The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

    Phishing: A Scary Way of Life

    The Federal Bureau of Investigation has identified "phishing" as the... Read More

    DOS Attacks: Instigation and Mitigation

    During the release of a new software product specialized to... Read More

    Is Spyware Watching You?

    Imagine my surprise when I received a phone call from... Read More

    Behavior to Stay Safer Online

    1. Importance of a Virus Scanner: A Antivirus program can... Read More

    Identity Theft Offline -- So Many Possibilities

    Chris Simpson, head of Scotland Yard's computer crime unit was... Read More

    Mall Protection

    The Loss Prevention Manager should be receptive to the needs... Read More

    Web and Computer Security

    Well, if that would have been said to me by... Read More

    Securing Your Accounts With Well-Crafted Passwords

    In the past I've never really paid much attention to... Read More

    How to Protect Your Child from the Internet

    When the Internet first came about, it was realized it... Read More

    A Basic Introduction To Spyware

    Spyware is the most troublesome software to appear on the... Read More

    Whats All This I Hear About Firewalls?

    At this point, if you've got the whole "turning the... Read More

    A Painless Plagiarism Solution

    A crowded marketplace can lead to unethical webmasters using underhand... Read More

    How To Cover Your Tracks On The Internet

    Every single time you access a website, you leave tracks.... Read More