During the last couple of years, cryptocurrencies and NFTs were one of the biggest trends on social media. They represent a complicated form of financial technology that got the attention of mainstream news media and even had a commercial air during the 2022 Super Bowl. How does it all work? And is it something that I should worry about? We’re going to break down some of the questions you may have about this technology and highlight some of the controversial issues surrounding the social media craze.
What are cryptocurrencies and NFTs?
Cryptocurrencies are a form of digital currency created for use on the Internet. GetKidsInternetSafe previously published the article “What is Bitcoin anyways?” that goes in-depth on the subject, but we’ll cover some of the basics here as well.
Bitcoin and other more recent cryptocurrencies like Ethereum and Dogecoin were created to have a decentralized form of currency that was not tied to banks or other financial institutions following the 2008 housing market crash.[1] Cryptocurrencies are not stocks but they are often traded in a similar way because of how much their value can fluctuate over time. All cryptocurrencies are managed using a type of program called a blockchain, which is a publicly viewable list of all transactions and activity done with a specific cryptocurrency. All transactions made on a blockchain are verified by the other users, which makes it impossible for anyone to make changes to old transactions without that change being corrected immediately.
Non-Fungible Tokens, more commonly referred to as NFTs, are another technology created using blockchains. NFTs function like serial numbers attached to virtual data and are used to show ownership and authenticity of that data similar to a deed or certificate. They cannot be copied, substituted, or subdivided, and they’re used to create a unique digital object. The most common form of NFTs is images, but the technology can be used for music, videos, documents, or anything else that can be stored digitally.
How did NFTs become so successful?
NFTs are a technology that has been around since 2014[2], but they were brought into the media spotlight in March 2021 when digital artist Beeple sold an NFT collage of his artwork for 69 million dollars.[3]
The trend exploded in popularity afterward, with the next series of major sales coming from original creators of various early internet viral memes selling their creations as NFTs for tens or hundreds of thousands of dollars[1]. In the digital art community, NFTs were also heavily marketed to artists as a solution for online copyright infringement and art theft.[2]
Major investors like Elon Musk[4] and Mark Cuban[5] began to invest in cryptocurrencies, and celebrities like Matt Damon[6] and Larry David[7] have acted in advertisements for the new technology, with one of them playing during the 2022 Superbowl. NFTs had become a lucrative business model in only a couple of months, but this surge in popularity did not last for long.
The Technical Problems with NFTs and Cryptocurrency
As NFTs and cryptocurrencies both began to receive mainstream attention and thousands of new users, various technical problems began to hamper their success. Despite the early successes in March, by June 2021 the market had already dropped by 90%.[1]
Slow speeds
Blockchain technology is not a quick or efficient system for handling monetary transactions, and if a user tried to use their cryptocurrency to make a purchase, they would face wait times of 30 minutes to several hours in a queue before their transaction would be approved[8].
Security Problems
Due to unaddressed security risks in their programming, NFTs became notorious for being stolen by hackers.[9][10] Because blockchains cannot have their history changed, and because they’re unregulated by the government, if your NFTs were stolen this way there was no way to recover them.[8] NFTs also don’t have any inherent connection to copyright or trademark law, so your digital ownership only extended to the NFT program itself, not the artwork that it was connected to.[2]
Another problem caused by the lack of regulation was that the artists who had been the target of early NFT marketing were facing more art theft problems than before. There were no protections to prevent somebody from creating NFTs using another person’s art, and many artists found that their art was already being sold on cryptocurrency apps without their approval or knowledge. In some cases, NFTs were created using artworks from deceased artists without consulting the artists’ families.[11]
Environmental Problems
NFTs and cryptocurrency are also horrible for the environment. Because the process of operating and interacting with a blockchain requires hundreds or thousands of computers to be operating all at once, they consume extreme amounts of electricity. Conservative estimates for the total amount of electrical energy consumed and CO2 emissions caused by cryptocurrency rival those of mid-sized European countries.[12]
The Financial Risks of Crypto
The largest problem with cryptocurrency and NFTs, however, is that most projects were intentionally made to scam people out of their money. These digital assets only have value because of the amount of real money that is inserted into them by investors, and unlike banks or the stock market, they don’t generate additional wealth over time.[13] To make a profit with cryptocurrency, it has to be sold to somebody willing to spend more money on it than what you originally purchased it for.
“Pump-and-dump” scams like this are not only common but encouraged in many cryptocurrency communities as a way to make quick profits.[1] Most artists who began selling their art as NFTs were selling at a loss after transaction fees and costs associated with creating the NFTs.[14] The cryptocurrency apps which handle these transactions are aware of these practices, and many of the security problems mentioned earlier were neglected because their creators profited off of the transactional fees.[10]
How to Protect Yourself and Your Family from Cryptocurrency Scams
While the trend of cryptocurrency and NFT projects being advertised has gone on the decline, there are still pushes for the technology to be used in other parts of the web.
Here are some things you can do to help protect your family from cryptocurrency and NFT-related scams:
Keep an eye on new internet products and services that talk about NFTs, Ethereum, Bitcoin, blockchains, and Web3.0. These are all buzzwords that are commonly associated with each other to help sell the idea of cryptocurrency on social media.
Sign up for the FREE GKIS Connected Family Screen Agreement, which covers the basics of preventing digital injuries and opens a forum of discussion for you and your family to discuss internet safety.
Take a look at the How to Spot Marketing and Cybersecurity & Red Flags Supplements for the GKIS Connected Family Screen Agreement, which can help you to stay safe against identity theft, hacking, and scamming strategies common on the internet.
Thanks to CSUCI intern Brandon Bishop for researching the history of cryptocurrency development and authoring this article.
I’m the mom psychologist who will help you GetKidsInternetSafe.
When children and parents use online platforms to showcase talents, they open themselves up to becoming victims of exploitation and scams. Someone’s hopes and dreams can turn into their worst nightmare. It is easier than ever before to fall victim due to today’s technology. As a psychologist, Dr. Tracy Bennett saw the growing rate of online injuries and the need to educate families about online safety. Our Social Media Readiness Course helps tweens and teens avoid digital injury and optimize psychological wellness. Today’s GKIS article discusses exploitation and scams on online platforms used to showcase kids’ talents.
Parents Use Social Media to Showcase Child Talent
Kids love to be creative and show off their talents, whether it’s sports, art, singing, dancing, acting, or modeling. And for a lucky few, online branding can lead to big profits. Social media can be the perfect platform to build an audience and get the attention of professionals in that industry.
One of the most popular social media apps for showcasing talent is TikTok.[3] TikTok is one of the fastest-growing platforms where users can create a huge following and make income. It’s the most popular medium currently for showcasing talent.
Here are some methods commonly used to optimize child talent exposure
posting high-quality content regularly on social media
running advertisements
partnering with other influencers
partnering with various brands
contracting with content developers
buying likes and follows
creating custom websites[11]
The Benefits of Showcasing Talent
Showcasing children’s talents can be profitable, lead to amazing opportunities, and may help boost a child’s confidence, self-esteem, and social capital. In fact, Dr. Bennett often presents to high school students how to create a personal brand to help them showcase their strengths and qualifications for college. This webinar is offered as a live webinar for students and parents and is included in our Screen Safety Essentials Course.
The Risks of Showcasing Talent
Anytime we reveal personal information online or allow strangers to have access to us, we must be aware of risks. Big exposure can make one vulnerable to exploitation, scams, cyberbullies, and predators.
Child exploitation refers to using a child to perform or work for the benefit of others at a disservice to the child’s mental or physical health, education, or development.[1]
A scam is popularly known as a deceptive trick or a scheme used to cheat someone out of something valuable, usually money.[2]
Some argue that supporting your child so they can benefit from their talents and helping them achieve their dreams is the job of a parent. Others believe that kids should be allowed to be kids and that putting them to work creating a “brand” meets the needs of the parents rather than the child. We at GKIS recognize both situations exist out there.
While it can be healthy to have high expectations, applying too much pressure can be harmful. Because kids don’t have the cognitive abilities necessary to calculate the odds of success and risks involved with online exposure, some say online branding should wait until adulthood. Other risks from overdoing it include physical or cognitive injury, mental illness, self-esteem problems, academic delay, and sleep deprivation.[8]
Gaming a System Set Up for Child Protection
Another cause for concern is how many kids on social media do not meet the age requirements specified in the platforms’ terms of agreement. These terms are created for the protection of children. Unfortunately, it is hard to enforce because children easily bypass these by simply creating accounts under a false age.
Interpersonal Exploitation
Another harmful outcome of online showcasing is unsafe peers and predators communicating with your child online. For example, a father was interviewed after discovering that his seven-year-old daughter was being contacted by adults for naked pictures on TikTok.[4] This type of exploitation is a common threat that parents need to be aware of and why monitoring activity regularly is imperative. Setting parental controls can be beneficial and possible with our Screen Safety Toolkit.
Financial Exploitation
Another risk is financial exploitation with identity theft. Scammers have many ways to target children online. Scammers can open lines of credit that can go undetected for several years.[5] To read more about how to protect your family against cybercrime, read our article Child Identity Theft is on the Rise. Protect Your Family Against Cybercrime.
Red Flags to Look Out For
Before interacting with potential producers or partners, vet them online using search engines like Google and LinkedIn, professional organization credentialing, and reviewing testimonials and reviews. Avoid rushing into having your child interact with people claiming to want to work with them
Also, when your child is hired to showcase their talents, do not pay fees upfront.[9]
Also, be wary of talent opportunities where
the other party uses urgent or threatening language
appears to be too good to be true
provides suspicious attachments
makes threats of any kind
requests personal or private information
urges you to click on a link
provides information that you were not expecting[7]
How to Protect Your Family from Online Dangers
Educate Your Child and Initiate Frequent Screen Safety Conversations
To help your kids learn about red flags for online exploitation, use our free Connected Family Screen Agreement. Our Connected Family Screen Agreement is like a screen safety checklist but so much more. It informs you about the risks of digital injury and how to prevent them. Our agreement also aids in empowering your kids to teach you since they are digital natives and you’re the digital immigrant. Use it to clarify your expectations and prevent conflict while practicing critical listening and negotiating skills while having fun. With our screen agreement, you will create a living document that can be changed and renegotiated along the way.
Set Up Your Online Management Toolkit
Children are more prone than ever before to fall victim to online injury. With this in mind, psychologist Dr. Tracy Bennett has dedicated herself to perfecting products for families like yours. To help parents and families prevent digital injury, we created several online courses like the GKIS Screen Safety Toolkit for parents of kids of all ages.
Optimize Healthy Tech Use with Best Home Setup
To help you learn how to achieve screen sanity, we at GKIS have spent time creating a vital course for your entire family. Our Screen Safety Essentials Course includes parent-only videos with the information and tools you need to earn the credibility to be your go-to expert. We also include family videos, workbook pages, and colorful infographic downloads to help do the teaching and discussing with you. You also get exclusive access to Dr. Bennett’s BEST webinars. Need a little expert support? Opt for private coaching with Dr. Bennett.
Encourage Independence and Critical Problem Solving
Our GKIS Social Media Readiness Course is an awesome resource for tweens and teens. Our free GKIS Blog articles offer great ideas for screen safety discussions during a screen-free dinner.
Thanks to CSUCI intern Janette Jimenez for researching the risks of exploitation and scams when using online platforms to showcase kids’ talent and authoring this article.
I’m the mom psychologist who will help you GetKidsInternetSafe.
Onward to More Awesome Parenting,
Tracy S. Bennett, Ph.D. Mom, Clinical Psychologist, CSUCI AdjunctFaculty GetKidsInternetSafe.com
Works Cited
[1] Action for the Rights of Children (ARC) chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://www.unhcr.org/3bb81aea4.pdf
Scams can cause extreme financial and emotional distress to victims and their families. With technology, scammers have become more creative in accessing their victims by offering quick clicks and false credibility. Even young teens that navigate effortlessly online have a hard time distinguishing legitimate situations from scams. To help you and your family avoid becoming the victims of a scammer, I interviewed “William”* who shared his mother’s story. She was an educated professional that fell victim to multiple scams over five years. You won’t want to miss the true story about what happened to her. If your family hasn’t taken steps for increased awareness and cybersecurity, you’ll want to check out our Cybersecurity & Red Flags supplement. The perfect compliment to our free Connected Family Agreement, you can take the extra steps you need to protect your loved ones right now. Our guide offers tips to avoid hacking, scamming, malware, and phishing and is a must-have for today’s modern family. Today’s GKIS article shares the story of an elderly woman victimized by scammers, the types of scams to look out for, and tips on how to avoid becoming a victim yourself.[1]
*Names were changed to protect the privacy of the victims.
What are scams?
A scam is a dishonest scheme to cheat someone or steal money. With the help of technology, scammers have been able to target their victims in more creative, easier, and faster ways than ever before. According to an FBI report, 2020 scams resulted in a loss of over 4.2 billion dollars. With more baby boomers retiring and the pandemic resulting in more at-hone isolation, I suspect those losses rose in the last few years.[1,2]
Who Scammers Target
Although anyone can become a scam victim, research has shown that scammers tend to target kids, teens, and the elderly. A study conducted by the University of Iowa confirmed that a certain area of the prefrontal cortex of the brain is responsible for processing information and solving problems – tasks that help people consider whether information is true or not. Young people tend to be vulnerable to scams because this part of the brain is still developing, and older individuals are vulnerable when they demonstrate poor technological fluency, are isolated, or suffer from a decline in problem solving ability.[3]
The Story of William and His Mom
William is a middle-aged man who generously shared his story with us about his elderly mother, Mrs. Thorn, who was scammed out of tens of thousands of dollars over a five-year period. Despite his best efforts to protect and rescue her from the scammers, he struggled to keep her safe. Once one scammer got ahold of her and convinced her to send money, many other scammers started approaching her too. William suspects that the scams were somehow linked as if they shared her information with others. Below are some of the scams she fell victim to.
Different Types of Scams
Charity Scams
William described his mother as a generous individual. She was a nurse in Japan during the 1950s, and, after she retired, she continued helping others by volunteering at church and other organizations. As she got older, she would receive postcards in the mail from different charities, a common scam targeted at elders. Although her income from social security and savings was not a lot, she began “donating” money to those she perceived as less fortunate than herself.
Piecing together what happened with his mom’s checking and bank documents, William found that she initially sent small amounts of money ranging from $5-10. Once the scammers had her on the hook, however, they would groom her for larger and larger “charitable” donations.[4]
Lottery/Sweepstakes Scams
Another scam that William’s mother fell victim to was the lottery/sweepstakes scam, which also commonly targets elders. These types of scams claim that the victim has won a large amount of money or other prizes such as a new car. Once the victim is excited and eager to collect their prize, scammers require that they pay a fee or taxes. As the scammer reaches out with details, the victim often adopts an illusion of intimacy, meaning they feel they have a personal, caring relationship with the scammer. This false intimacy pulls the victim in deeper, often eliciting more and more personal information from the victim.
William confirmed that Mrs. Thorn spoke to the scammers about his efforts to block their access and protect her safety. Mrs. Thorn’s scammers not only instructed her not to tell anyone because it could be a nice surprise for her family, but they also offered specific suggestions on how to work around the safeguards her son put in place. They seemed to play on her wishes for independence and worked to create and escalate conflict between her and her son.
Our GKIS Connected Family Course can help you close screen risk gaps and improve family cooperation and closeness. If you have school-age children at home or love somebody who does, check it out. Not only does the course offer amazing safety home setup tips, but it helps parents create fun dialogues for better, healthier parent-child relationships.[4]
Government Impersonation Scams
William noticed that some of the scams his mom was involved with may be linked with others. For instance, to pay the taxes of her “prize,” the scammer would set Mrs. Thorn up to talk to an “IRS agent.” These types of scams are known as government impersonation scams which are types of very popular imposter scams. According to the FBI, government impersonation scams typically involve the scammer impersonating a government official who threatens to arrest or prosecute victims unless they pay a fee. William shared that they even tried to trick him with false threats of prosecution and arrest unless he agreed to cooperate.
Dr. Bennett shared that immigrants can easily be targeted with this type of scam as well. She shared a story of a colleague who was a Chinese immigrant who worked as a software engineer. This victim’s scammer posed as a member of the Chinese government and threatened the safety of her family if she didn’t pay overdue fines. The scammer demanded that she not tell her friends and family and immediately pay. She lost over $150,000 that was never recovered before she realized she’d been scammed.[4]
Phone Scams
William explains that although his mother’s scams initially started by mail, they soon turned into phone calls. He allowed me access to his mother’s journal which included notes on the people she spoke to and what they had asked her to do. Her notes reveal that she would talk to the same people over and over and eventually trusted them more than her own family and friends. The scammers were very persuasive and would instruct her how to wire funds to unfamiliar places and people, even going so far as giving her directions to wiring locations that her son had not blocked yet. William spent countless hours visiting banks, local wiring locations, and friends begging them to not help his mom transfer money or provide transportation. Although he spoke to his mom many times, he found that the scammers would get to her anyway with relentless pressure and creative arguments.
Scammers have no limits.
It was not until William caught his mom almost wire transferring $200,000 that he finally got the information he needed to gain conservatorship over Mrs. Thorn. By then, the scammers had even instructed her to how to send money from q reverse mortgage loan on her home to complete the transaction!
William said the scammers had no shame and would even help her find ways to continue participating in the scams even after he took steps to stop them. He shared that they would pressure her with false deadlines and threats, making her so anxious that she would rush into performing workaround instructions. Her journal reflects moments of intense anxiety as she tried to complete the complex transactions.
To emphasize how far scammers would go, he shared that, after he lowered his mom’s allowance to $25 a week and there was not much to get from her anymore, they still tried one last thing – the 976 phone scam. According to William, this is a scam where you call back a number with an area code of 976 and get charged a huge per-minute fee. The longer the scammer keeps the victim on the phone confused and anxious, the more money the scammer gets.
Avoid Being Next
William shared that his mom was scammed out of about $70,000 before it stopped. If it was not for her son’s compassionate and tireless commitment to protect her, it could have been far more. Other popular scams include shopping scams and job opportunity scams. If you are worried that bad actors can access your family members, check out our Screen Safety Toolkit. Our resource guide is perfect for those that need smart tech tools for filtering, monitoring, and management.
Tips to Outsmart the Scammers
Contact your phone carrier and internet service provider to research helpful tools for blocking unwanted and unknown calls, texts, and emails.
Remember, if it sounds too good to be true, it probably is.
Don’t act immediately, take a moment to research the situation and talk to someone who you trust.
Don’t give out personal information like your name, date of birth, social security number, address, or usernames or passwords. Legitimate organizations will not text, call, or email you to obtain private information.
Don’t complete forms from an email link. Instead, go directly to the website of the company you are dealing with and complete the business from there.
Call the company directly to confirm the request was legitimate before you offer information or complete forms. The IRS communicates through US mail, not by telephone or email. Call 800-366-4484 to report IRS-related phishing attempts and fraud.
Be sure to keep up with device updates for security patches, delete unused and unwanted apps, and change your passwords frequently.
Review your credit card statements regularly to catch unauthorized charges and periodically review your credit report.
Consider freezing your social security number for new financial transactions with Experian, Equifax, and TransUnion to escape identity theft.
Lastly, Google “scams” or a quote from any communication that may be a scam to learn more about the common scams that may target you.
Scams are no joke. Once you become a victim, serious damage can occur that can take years and years to repair. Check out our other GKIS article Child Identity Theft is on the Rise. Protect Your Family Against Cybercrime, to learn more about how fraudulent purchases made with your private information can change your life
Here are some other related articles offered on our GKIS website for more information on hacking, scamming, malware, and phishing. Learn more about the dangers of online to be prepared for anything that comes your way.
Kids and teens love YouTube’s colorful celebrities who cater to their specific interests. But many influencers use their celebrity status to lead fans into harmful situations. In today’s GKIS article, find out how these YouTube celebrities promised big earnings from online gambling, offered poorly planned conventions, attacked other influencers, and encouraged fans to harass other online competitors. Using unethical tactics and no disclosure, many of these profit-making schemes succeed unchallenged.
What’s a YouTube influencer?
A YouTube influenceris a person with a YouTube profile that has a large number of followers and can influence trends, products, and purchasing habits. Their content is typically videos of product recommendations or reviews. Other times, it’s a video (vlog) with influencers talking to their audience about anything that strikes their fancy. Most vlogs include colorful opinions, vulgar language, and provocative topics.
Most influencers are trained marketers who profit from ads, partnerships, and paid sponsorships. Although some provide harmless entertainment, others intentionally mislead or introduce content that can harm their followers.
“Oops, I didn’t mean it.”
One-time mistakes are getting increasingly rare among YouTube celebrities. For some, a string of mistakes results in more fame and profit. For instance, PewDiePie is one of the world’s most famous YouTube celebrities with 91 million subscribers. In 2108, he was criticized for promoting an Anti-Semitic YouTube channel [1], delivering Anti-Semitic jokes [2], and using the hard N-word to thousands of viewers in a live stream video [3].
In 2019, PewDiePie stoked fan fires by encouraging “a fight” with a YouTube channel T-Series and Indian production house. Competing for subscribers, PewDiePie fanned a competition between American YouTube culture versus Indian YouTube Culture. The rallying cry resulted in hacking printers and Google homes, a vandalized World War II memorial in Brooklyn (“subscribe to Pewdiepie”), and, most horrifying, a Christchurch mass murderer yelling “subscribe to PewDiePie” during the live stream of his shooting.
YouTube Influencers Encourage Gambling
CSGOLotto: In 2016, YouTubers TmarTn and ProSyndicate promoted and advertised a site called CSGOLotto. On this site, players bought in-game items that were placed into an online pot alongside other people’s purchased merchandise. The goal was to gamble to win the biggest pot of merchandise.
Video ads for the GSGOLotto showed TmarTn and ProSyndicate having fun gambling large amounts of money trying to win big. Most times, they did win BIG – up to three times the amount they started with up to $20,000 worth of merchandise!
Based on our research, at no point in the ads or written copy did either influencer mention to their collective audience of 13.5 million that they owned this site and were profiting directly. We found the ads to be misleading, looking like the celebrities were simply players rather than profiteers.
Mystery Brand: In 2018, Jake Paul and RiceGum created a similar gambling site called Mystery Brand. In this game, players purchase $5 to $100 virtual boxes that would contain a mystery item worth either less or more than the amount paid. The promised a chance to win a $250 million house with only a $15 buy-in.
The influencers were reportedly paid $100,000 for promotion to their collective 30 million subscribers. In their videos, they narrated how they “teamed up” with Mystery Brand to show how “dope” it was to play.
After demonstrating the easy signup process, the two spent big. Once a player buys in, their money stays in. Players can’t cash out. They can only earn sponsored prizes shown on the site, like a virtual shopping mall. For example, in one video RiceGum shows off his $15,000 profit after only spending $3,000. Neither RiceGum nor Jake Paul refers to the site as “gambling,” but instead call it a “game” with “good value,” promising “there is no losing in this.” Based on our research, no place on the site states the players’ chances of winning.
A Poorly Planned Convention
Tana Mongeau is a content creator with 3.7 million subscribers. In 2018, 5,000 people showed up at a hotel in Anaheim to attend her convention, advertised to be a cheaper and more accessible version of Vidcon (which is a large-scale event hosted by YouTube to meet your favorite YouTuber). Due to poor planning, over 4,000 people waited for over four hours in the sweltering heat outside of the hotel. There were little shade, food, or water available, and many attendees got sunburned, passed out, and rioted due to poor accommodations and security.
Although promised to be free, it wasn’t. While 4,000 waited outside, the 1,000 inside were greeted with a $60 “VIP” pass, with a lack of entertainment, overcrowding, and almost the same issues as those outside the hotel. The videos of this event are upsetting to watch.
Using Their Platform to Attack People
When some YouTube influencers don’t like other content creators or other people in general, they sometimes rant with name-calling and unfair accusations. This cyberbullying can result in a cyber flash mob of dedicated fans that cyber attack through doxing(showing private information), pranking, and cyber-harassment.
False Accusations Against a Competitive Influencer
Jackie Aina is a popular beauty guru who creates and shares videos of makeup applications with 2.9 million subscribers. In 2018, she made a video accusing another YouTuber, Petty Paige (128 thousand subscribers), of stealing $1,500 from her personal bank account.
This accusation appeared to have no proof of legitimacy. Although she never stated Petty Paige’s name in the video, she put up a picture of a video Paige had made, making it easy for her subscribers to identify the accused perpetrator. Jackie Aina’s fans took to social media to harass Paige for weeks. Paige even stated that many business and job opportunities were canceled because of harassment.
Targeting Their Audience
The Gabbie show (6.4 million subscribers) is one of many YouTubers who have targeted everyday people with no regard to how the fan base would react to it. When a young girl in her audience made a negative comment on one of Gabbie’s tweets, Gabbie screenshotted it along with the girl’s account and posted it on her Twitter (2.7 million followers). This led fans to spam and harass the girl, flooding her inbox with hateful messages.
Are there legal consequences?
Too often, when malicious or unethical online behavior is identified, the scandal is fleeting. For example, in the case of TmarTns and ProSyndicate’s gambling scam, the Federal Trade Commission (FTC) filed a case for lying about ownership of a product. Yet somehow, both influencers avoided legal prosecution, only suffering a mild loss in subscribers and yearly income due to a damaged reputation. They still have a net worth of around $5 million.
For Jake Paul and RiceGum, absolutely nothing happened. RiceGum created a video justifying his behavior as the same as what others do. Jake Paul made a joke about the situation. When asked, “You loved being called out for selling a gambling scam to underage kids?” He responded, “Yes, love it.”
Of the influencers covered in this article, Tana Monogue probably received the biggest consequences. After months of backlash and hate from fans and YouTubers, Tana made multiple apologies. But she still suffered no legal consequences. And as for what Jackie Aina and Gabby Shows did, many just see it as insignificant errors in judgment.
What can be learned?
Influencers are not your friends and most often cannot be trusted.
Fanning follower anger is often fake and staged.
On the internet, bad behavior makes influencers money and often goes unpunished.
If you believe the hype, you’re gullible. It’s probably not worth the drama. Think for yourself instead of following blindly.
Thanks to GKIS intern Jack Riley for researching and writing this article. If you learned from this article, stay tuned for part 2, which details the irresponsibility and scams that YouTube influencers continue to feed their audience as well as the marketing and social manipulations used to make sure viewers keep coming back.
Onward to More Awesome Parenting,
Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty
Works Cited
YouTube Influencers Encourage Gambling
Fluff, TMARTN GAMBLING ON CSGO LOTTO & DECEIVING OWNERSHIP (Full Video Reupload), YouTube.com
(2016, July) YouTube gamers caught in gambling row, bbc.com
Virtual kidnapping scams are on the rise and, since it is difficult to identify the perpetrator, they are unlikely to go away. Last week a Facebook friend posted about a terrifying telephone scam. She encouraged me to share her story. Be warned, it’s really upsetting, and it’s a true story! It’s worth the read so you won’t fall emotional and financial victim to scammers, phishers, and extortionists.
“Mommy! Mommy! Mommy! He’s got me! He’s got me!”
A mother’s WORST NIGHTMARE, and it happened to me Saturday morning.
I was at home working in my office when my cell phone rang. I picked it up and heard a girl screaming and crying, “Mommy! Mommy! Mommy! He’s got me! He’s got me!” Then a male voice saying, “Shut the f__ up b___!” The girl’s voice sounded like my daughter who is living away for graduate school.
The world beneath me fell away. I can’t tell you the fear I felt. This VILE man spoke to me in a thick accent telling me what he is going to do to her, and after he’s finished with her he will send her home to me in pieces if I don’t give him money right now.
I kept talking to him on speaker while dialing 911. The dispatcher said, “Stay on the phone, police have been dispatched.” Within minutes a special crime unit arrived.
For the next twenty minutes, I spoke to the “kidnapper” while the police coached my questions and traced the call. I demanded he put her on the phone and text me her picture. He continued to threaten terrible things. Meanwhile, our calls to my daughter went to voicemail, so they sent Arizona police her work.
My husband and other daughter could see my texts, CALL HOME NOW!!!! URGENT!!! and were freaking out. Neighbors told them the police were everywhere, and they couldn’t get through.
Finally she texted after the police located her at work. They checked her apartment and verified it was safe. I broke down crying.
I don’t want ANYONE, EVER to go through what we did! The fear and possible reality were there for me for what seemed like hours! All I have thought about ALL weekend is “These VILE people are putting someone else through this!” Please share this story about the new horrible scam out there.
Source of the Theft
A few days after my friend posted this story, I followed up with her. She informed me that another family from the same university was scammed by the same man minutes after he hung up on her. They were about to wire $7000 before they were able to contact their daughter. This incident made her wonder if the information was gathered from hacked university data. A few weeks later, another Facebook friend posted this one:
Today my parents got a phone call from someone pretending to be my son. He told my dad that he went to the store to get cold medicine with a friend from school who was driving, they got pulled over, and his friend had pot in the car, so he was arrested and now was in jail. He begged my dad not to tell “my mom.”
My dad asked a few questions and was thinking it may be a scam, but he said the person on the phone sounded young, so he wasn’t quite sure. After a few questions, the kid hung up. We’re pretty sure that he would have asked for money to wire or something. My son is safe at school (I checked). But wanted to pass this on to you guys. Maybe this scam has been going around? Obviously, they are targeting older people, and I can see some people falling for it. My dad is pretty sharp, and it still tricked him at first.
Other Scams to Look Out For
Other types of extortion scams involve the perpetrator posing as the IRS or a crime cartel framing you for a false crime that will result in a suspension of your bank accounts, criminal charges, or a threat to you or your family’s safety if you do not send money. For instance, there have been reports of victims on vacation receiving a call in their hotel room stating that they are being targeted by a drug cartel and should turn off their phones to remain safe. While the victim is out of communication, the virtual kidnappers demand money from friends and family.
Another type of scam involves ransomware, which is a virus that infects your computer and encrypts the data. The scammer sends a message threatening to keep your hijacked computer data unless a ransom is received.
To avoid this kind of virus:
learn how to identify typical phishing strategies,
do not click on unknown email links or websites,
install premium security software, and
keep your software updated.
It is also important to backup computer data on a secure cloud-based backup service with revision history. Even legitimate websites can be hacked to spread malware, so awareness and preparation are key.
Here are GetKidsInternetSafe tips to avoid being a victim of virtual kidnapping:
Stay up to date about the scams popular in your area.
Set your social media profiles to private and avoid giving out personal information. Teach your kids to do the same with GetKidsInternetSafe techniques.
Occasionally cleanse your social media profile of photos. A backlog of photos tells a detailed blueprint of your family’s activities and personalities. When viewed by a perpetrator, those details can be used against you.
Keep your telephone landline.
Download GPS location-sharing apps to family member phones, such as Find My iPhone, Find Friends, or Life360.
Create an emergency plan, which includes a list sharing of names and phone numbers of workplace landlines, friends, and extended family. Create and include family nicknames to use in case of a need for emergency telephone identification.
If you get a suspicious call, assess its authenticity. For example, if the call is not from the victim’s telephone and they want you to stay on the phone until the money is delivered, be suspect.
If they are on the victim’s phone, recognize that the phone may have been hacked and forwarded to another phone or lost or stolen. Just because the number shows up as your child’s phone doesn’t necessarily mean the scammer has possession of the phone or the phone’s owner.
Recognize that scammers often ask for money to be wired through services like Western Union or online currency like Bitcoin, as these methods of payment are untraceable.
Stay calm, slow the caller down, and do not share any personal information. Ask them to answer a question only the victim would know. Don’t challenge or argue with the caller. Buy time by saying you are writing down the demand and need time to comply.
Use another device to call the police while on the phone.
Ask questions and, if feasible, demand a call from the victim’s phone or a picture of the victim.
Get to a safe place as soon as possible.
These tips do not constitute legal advice from GetKidsInternetSafe. Although many of these suggestions are offered by the Federal Bureau of Investigation website, recognize that nothing outweighs your instincts. Err on the side of caution and seek expert help from your local police department or the FBI.