• Home
  • Am I Being Scammed
  • Financial Education
  • C.E.O
  • Serviam
  • SavingThePlanet
  • Education & Innovation
  • Recent Projects
  • James E- Higher Education
  • More
    • Home
    • Am I Being Scammed
    • Financial Education
    • C.E.O
    • Serviam
    • SavingThePlanet
    • Education & Innovation
    • Recent Projects
    • James E- Higher Education
  • Home
  • Am I Being Scammed
  • Financial Education
  • C.E.O
  • Serviam
  • SavingThePlanet
  • Education & Innovation
  • Recent Projects
  • James E- Higher Education

Am I Being Scammed?

Too many Americans are being scammed each year. Con-artists and Scammers are far more prolific than in the past with global access to our personal data, inexpensive means to contact us, and improved skills to deceitfuly persuade us to act using our age, geography, wealth, interests, and  known relationships against us.

Email To Learn More About How We Can Help.

Our Mission...

This site is dedicated to help improve your avoidance and detection skills to better protect yourself, your future, your family, and your local community. from all these scammers and identity theiives that victimize the public. 


Our volunteers provide valuable educational materials and are also available to speak at local social or professional events to share our insightss and educational materials. 


We report scam materials that you send to us to the authorities and related vendors.  So, if you want to confirm that you are being scammed, we are happy to research the materials. 


This service is supported by the J24 Charity Trust, a 501c3 organization. We do not charge for our services, unless there are travel or materials expenses.  Our organization and presenters are experts who volunteer their time to help the public and regulatory agencies. 

Educational Materials About Scams and Identity Theft

What is Identity Theft?

Monitor for Identity and Financial Theft

Monitor for Identity and Financial Theft

Identity theft occurs when someone fraudulently obtains and uses another person’s personal information, such as their Social Security number, credit card number, or other identifying information. The goal is usually to commit fraud or other crimes under the victim’s identity. Identity theft cost US citizens and businesses about $56 billion annually. AARP research in 2023 indicated $43 billion was stolen from US citizens.

Monitor for Identity and Financial Theft

Monitor for Identity and Financial Theft

Monitor for Identity and Financial Theft

How to Detect  Identity Theft and unathorized withdrawals:

  1. Credit Monitoring: Services that monitor your credit report for any changes or inquiries. Examples include Credit  Karma and Experian Credit Services. 
  2. Fraud Alerts: Place a fraud alert on your credit file with the major credit bureaus.
  3. Credit Freeze: Freezing your credit report prevents creditors from accessing your credit, making it harder for thieves to open accounts in your name. You can release the freeze at anytime. 
  4. Annual Credit Report Review: Review credit reports from all three bureaus (Equifax, Experian, and TransUnion) yearly using the free resource provided by  AnnualCreditReport.com.
  5. Review your medical claims charged against your healthcare insurance to verify that there are no reported procedures  with doctors and hospitals that you have never been to. 


It is important to monitor for fraud and report fraud as soon as you suspect it, to protect you rrights and reduce liability. 

Protection Strategies

The following is a list of common strategies to protect your personal information from hacking and fraudulent disclosure:


  1. Strong, Unique Passwords:
    Use different passwords for each account and consider a password manager. It is important to realize that a password that is used on one account my later be known and attempted on another account, so do not use the same passwords or password template on different accounts. 
  2. Two-Factor Authentication (2FA): Enables an additional layer of security by requiring a second form of verification.
  3. Limit Social Media Sharing:
    Avoid sharing personal information like birthdates, addresses, or other sensitive data online.
  4. Shred Documents:
    Shred any documents containing personal information before disposal.
  5. Secure Wi-Fi Connections:
    Use a secure network, particularly when conducting financial transactions.
  6. Review Financial Statements: Regularly check credit card, bank, and other financial statements for unusual activity.

Types of Phishing Attempts

Phishing is a common method used by cybercriminals to trick individuals into sharing sensitive information such as passwords, credit card numbers, or Social Security numbers. Phishing usually happens via email, but it can also occur through text messages (smishing), phone calls (vishing), and fake websites.

  1. Email Phishing: The most common form where attackers send fraudulent emails that look legitimate, often impersonating trusted organizations like banks, delivery services, or government agencies. These emails contain links to fake websites or attachments with malware.
  2. Spear Phishing: A targeted form of phishing aimed at specific individuals, often containing personal information to make the message seem more convincing.
  3. Smishing: Phishing through text messages. Smishing attempts may include links to fake websites or request that the user replies with personal information.
  4. Vishing: Phishing through phone calls. Attackers might impersonate support representatives, bank officials, or government agents to convince the victim to reveal information or make payments.
  5. Clone Phishing: Cybercriminals copy a legitimate email and replace any links or attachments with malicious versions, then send it to the victim, often appearing to come from a known contact.

More Detailed Educational Articles and Videos

We provide these documents for free personal use.  The information has been  consolidated from a variety of resources and experience that we believe are accurate  to be used for educational purposes. 

Primer on Identity Theft Protection (pdf)Download
IRS Identity Protection Tips (pdf)Download
IRS Identity Theft Protection Brochure pub 5027 (pdf)Download

Copyright © 2025 J24 Charity Trust  (501c3) - All Rights Reserved.

  • Downloads & Privacy
  • Contact Us to Learn More
  • Donations
  • Recent Projects

Powered by