Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers > NetSparsh - Viral Content you Love & Share

Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

I am the victim of an internet scam. It is very hard to write that sentence, but it's necessary in order to warn my fellow clowns, magicians and other entertainers, and to prevent them from being taken for $2,800.00 like I was. Here is what happened to me, and how you can avoid it.

I run the web site, and I perform as a clown at both ministry and secular events. Due to the popularity of the web site (do a search on Google .com for 'clown' and it's the 7th site listed, for example) I'm easily found by people -- for both good and bad reasons. For instance, last year my wife Ellen and I taught clowning for a week at the Seventh Day Adventists' national Camporee -- we're not Adventists, and don't know many people who are, but we were found by them & hired primarily due to the popularity of the web site. We've been invited to perform in clown at a conference in Canada, performed at company picnics, etc. well out of our neck of the wood, and so on. Please understand that this isn't bragging; it's setting the stage for what happened in the scam.

We were contacted via e-mail by someone purportedly from Cincinnati, Ohio, who wanted to fly my wife & I to Cincinnati to perform at a birthday party. Since we'd had similar things happen in the past, that didn't set off any alarms in my head. In addition, I knew that there are entertainers such as Jennifer Lopez who will sing "Happy Birthday" at your party, for a fee of $50,000.00; I'm no J Lo, and my singing is atrocious, but I charge a lot less as well :)

I did an internet search on that person (I'm not using the name he gave, since there's a criminal investigation as well as FBI investigation going on -- no joke), and found someone by that name in Cincinnati, Ohio, a "regional celebrity" so to speak. So, it didn't seem incredulous that he would have the money to hire us as well as pay round trip air fare. It's now obvious that it was merely someone using that person's name to "hook" us.

At that point, my wife & I were still inclined to think of this as a prank, but even so we replied to the email with a quotation for our services, politely and professionally. We were joking with each other that this had to be a prank; after all, why would someone hire us when there are hundreds of clowns in the Cincinnati area? Unless it was someone with money to burn who wanted to buy "bragging rights," it made no sense. So we forgot about it, until the person replied back, hiring us.

We still considered it a joke, until we received a check in the mail, for $2,800.00. MUCH more that we had quoted our services for! We thought that, maybe, the excess was to pay for round trip air fare and accommodations, but even so that was far too much. We e-mailed the person back, explaining that we had received $2,800.00 via check. His response is what should have tipped us off to the scam.

He replied that, since he was out of the country on a business trip, he had his personal assistant send the checks out for the party, and the assistant had made a mistake, combining with our check one for $2,300.00 for the photographer from the United Kingdom that he was flying in to photograph the party. Would we be so kind as to send him those funds via Western Union?

Like an idiot, I said "yes." The check had been deposited and cleared (I thought), and I didn't want to hold onto money that didn't belong to me. So, I went to the local Western Union office and sent $2,300.00 to an individual in the United Kingdom. This didn't set off any red flags (although it should have) since it seemed like the type of silly mistake I've seen people do before. What happened next, though, set off every red flag in my head, and then some.

Days later, I received another email from the man supposedly from Cincinnati. According to him, his mother had an advanced form of lung cancer, and needed an immediate operation. He wanted me to send the remaining money to his mother's doctor in Nigeria and he would reschedule the party later. When I heard the word 'Nigeria' I had icicles running up and down my spine. Nigeria is famous, in the internet world, for being home to the most prolific scam of all time. You've likely received spam email about it. In a nutshell, it involves the widow of some minister or rich person, who is trying to smuggle their immense fortune out of the country before it's seized by her dead husband's adversaries; in exchange for letting them use your bank account, they will give you (various amounts of money, if not enough to make you filthy rich, at least enough to make you dingy). Of course, no money comes out, but these people proceed to rob your bank account of every penny.

So, when I heard that, fear clutched at my heart. Besides, why would someone rich enough to hire me (and fly a photographer in from the UK) need my money? The answer is, he didn't; he was just trying to bilk me of more money before his ruse was exposed.

You see, when I initially deposited the $2,800.00 check, it appeared to clear; it was then several more days before he requested the $2,300 to his photographer, and nearly a week (from the time I deposited the check) until I complied with that. 11 days after the check was initially deposited, it came back 'funds denied.' The bank then debited $2,800.00 from my checking account -- which didn't contain that much, of course. So, I'm out $2,800.00, the crook (or his accomplice in the UK) received $2,300.00. What's the moral of the story?

The purpose of this is two-fold: to warn my fellow clowns, and to point out the red flags that I should have seen, and what I should have done.

  • Bogus email address: there are many 'free' email sites available, where anyone can set up a free email account. Spammers, and many others use these to hide behind. Never trust information coming from a 'free' account.
  • Depositing the check: I should have deposited the check, and then waited 2 weeks to ensure that it had cleared. I had seen people selling items on who warn people paying by personal check that they would not ship items until 2 weeks after the check was deposited, just to prevent this problem. In my case, they used an internet service ( instead of a personal check, but the same time period applies.
  • Sending money back: I should have offered to send the money back to the original person after 2 weeks, or destroyed the check and asked them to re-send the correct amount.
  • Nigeria!: need I say more? Sending money to Nigeria is a Bad Idea.

    So, that's where it lies. I'm out $2,800.00, and in danger of losing my house due to the actions of this criminal. Jesus Christ orders His followers to "pray for those who despitefully use you" (Matthew 5:44). It's difficult, but I'm praying. Thank you for listening -- be sure to protect yourself and your loved ones.

    Tom Raymond, aka. Raynbow the magic clown, is a professional clown and underemployed computer geek, webmaster of the largest clown resource site on the web. His personal site can be found at

    In The News:

    This RSS feed URL is deprecated, please update. New URLs can be found in the footers at

    Retirement Security: Fire And Fury In Telecommunications
    Seeking Alpha
    AT&T's merger with Time Warner has hit a brick wall and the market is celebrating. Here's what I'm doing. How about you? Subscribers to "Retirement: One Dividend At A Time" got an early look at this material via free instant text message trade alert ...

    and more »


    How This Millennial Went From A High School Dropout To Cyber Security Expert
    Manan Shah, the 24-year-old founder of cyber security firm Avalance Global Solutions, is one of the top cyber security experts, but his path to the top was far from traditional. A high school dropout and former hacker, Shah had to overcome run-ins with ...


    Tortuga Logic raises $2 million to build chip-level security systems
    Tortuga Logic has raised $2 million in seed funding from Eclipse Ventures to help in their effort to maintain chip-level system security. Based in Palo Alto, the company plans to use the cash to build products that will find “lurking vulnerabilities ...

    Fox News

    Schools adept at shoring up security at any hint of danger
    Fox News
    Schools have become adept at rapidly shoring up security, measuring responses against the toll it could take on students' learning and sense of safety. The president of the National Association of School Resource Officers says schools regularly ...

    and more »

    New York Times

    Homeland Security Official Resigns Over Remarks on African-Americans and Muslims
    New York Times
    WASHINGTON — The Department of Homeland Security's head of outreach to religious and community organizations resigned on Thursday after audio recordings revealed that he had previously made incendiary remarks about African-Americans and ...
    Homeland Security Official Who Blamed Slums On 'Lazy Blacks' QuitsHuffPost
    Homeland Security official Jamie Johnson resigns after comments ...Washington Post
    Homeland Security's head of community outreach resigns over past controversial comments on black community, IslamCNN
    Fort Dodge Messenger -New York Daily News -The Hill
    all 71 news articles »

    North Darfur security: Swiss aid worker released, kidnappers held
    The security authorities in North Darfur announced on Wednesday that kidnapped Swiss aid worker Margaret Schenkel has been “released from her captors in a mountainous area during a professional security operation”. The head of the National ...

    and more »

    UN News Centre

    Russia again vetoes extension of chemical experts in Syria
    ABC News
    And it was Russia's 11th veto of a Security Council resolution dealing with Syria, its close ally. Russia cast its latest veto Friday night on a last-ditch resolution by Japan to extend the mandate for 30 days for further discussions. It was supported ...
    Security Council fails at fresh attempt to renew panel investigating chemical weapons use in SyriaUN News Centre
    Security Council Considers 30-day Extension on Syria ExpertsVoice of America
    The Investigation Into Chemical Attacks in Syria Is Fizzling Out After a Security Council ShowdownTIME

    all 602 news articles »

    UN News Centre

    At Security Council, UN chief urges cooperation to tackle security challenges in Mediterranean
    UN News Centre
    17 November 2017 – The Mediterranean – a confluence of civilizations, cultures, religions, trade and migration – is facing multiple security challenges, such as terrorism, illicit trade in narcotics, environmental degradation and forced displacement ...

    and more »


    Strong and stable: The iOS security guide
    So, what's the weakest point in mobile device security? Sadly, it's you. From tapping links in phony emails to accessing confidential password-protected information using open public Wi-Fi hotspots to simply using the same password everywhere: All ...

    and more »

    Seattle police plan security for tree lighting ceremony
    Seattle police have a plan to secure next week's holiday tree lighting ceremony in Westlake Park, and it makes room for protesters to exercise their first amendment rights. "It's the kickoff for the holiday season," said James Sido, DSA spokesperson ...

    Google News

  • Password Security and Safety

    There is nothing more important that password security in world... Read More

    Three-pronged Trojan Attack Threatens Security on the Internet

    Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More

    Message Board Security Problems

    Security leaks can be a big problem for any site... Read More

    Ransom Trojan Uses Cryptography for Malicious Purpose

    Every day millions of people go online to find information,... Read More

    A Basic Introduction To Spyware

    Spyware is the most troublesome software to appear on the... Read More

    Top 10 tips for Safe Internet Shopping

    Over £5 billion pounds was spent on online shopping in... Read More

    Spyware Protection Software

    Spyware protection software is the easiest way of removing spyware... Read More

    What Can Be Done About Spyware And Adware

    Having a good Spyware eliminator on your computer is vital... Read More

    Detect Spyware Online

    You can detect spyware online using free spyware cleaners and... Read More

    Personal Firewalls - Secure Your Computer

    There has not been a time in the history of... Read More

    How Spyware Blaster Can Protect Your Computer From Harm

    By browsing a web page, you could infect your computer... Read More

    Phishing, Fraudulent, and Malicious Websites

    Whether we like it or not, we are all living... Read More

    Check Out That Privacy Policy

    Before you enter your name, address or any other data... Read More

    How to Know Whether an Email is a Fake or Not

    A few nights ago I received an email from "2CO"... Read More

    Internet Privacy

    Over the past few years as the internet has become... Read More

    How To Cover Your Tracks On The Internet

    Every single time you access a website, you leave tracks.... Read More

    The Importance of Protecting Your PC from Viruses and Spam

    Today the internet is a mine field of malicious code... Read More

    The 5 Critical Steps to Protecting Your Computer on the Internet

    Spyware, viruses and worms... oh my!If you are connected to... Read More

    Cybercriminals Trick: Targeted Trojan-Containing Emails

    Threats we ordinary Web users face online leave us no... Read More

    Are They Watching You Online?

    When surfing the Internet you probably take your anonymity for... Read More

    Top Five Spyware Fighting Tips

    Spyware and adware are becoming major problems for online surfers... Read More

    Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders

    Can you protect your computer from all possible viruses and... Read More

    Online Shopping: 10 Tips For Safe Online Shopping

    Have you ever bought a product or service from the... Read More

    How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

    Spyware/adware is a new major concern for PC users everywhere.... Read More

    Reporting Internet Scams

    When it comes to reporting Internet scams most of us... Read More