<?xml version="1.0" encoding="UTF-8" standalone="yes"?><oembed><version><![CDATA[1.0]]></version><provider_name><![CDATA[The Tactical Hermit]]></provider_name><provider_url><![CDATA[https://hcsblogdotorg.wordpress.com]]></provider_url><author_name><![CDATA[The Tactical Hermit]]></author_name><author_url><![CDATA[https://hcsblogdotorg.wordpress.com/author/thetacticalhermit/]]></author_url><title><![CDATA[Virtual Kidnapping: Taking the Phone Scam up a&nbsp;Notch]]></title><type><![CDATA[link]]></type><html><![CDATA[<p><a href="https://hcsblogdotorg.files.wordpress.com/2014/08/vk1.jpg"><img loading="lazy" data-attachment-id="4097" data-permalink="https://hcsblogdotorg.wordpress.com/2014/08/20/virtual-kidnapping-taking-the-phone-scam-up-a-notch/vk1/" data-orig-file="https://hcsblogdotorg.files.wordpress.com/2014/08/vk1.jpg" data-orig-size="191,122" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="VK1" data-image-description="" data-medium-file="https://hcsblogdotorg.files.wordpress.com/2014/08/vk1.jpg?w=191" data-large-file="https://hcsblogdotorg.files.wordpress.com/2014/08/vk1.jpg?w=191" class="aligncenter size-full wp-image-4097" src="https://hcsblogdotorg.files.wordpress.com/2014/08/vk1.jpg?w=191&#038;h=122" alt="VK1" width="191" height="122" srcset="https://hcsblogdotorg.files.wordpress.com/2014/08/vk1.jpg 191w, https://hcsblogdotorg.files.wordpress.com/2014/08/vk1.jpg?w=150&amp;h=96 150w" sizes="(max-width: 191px) 100vw, 191px" /></a></p>
<p>&nbsp;</p>
<p><span style="color:#ff0000;"><strong><a style="color:#ff0000;" href="http://www.ksat.com/content/pns/ksat/news/2014/08/07/fbi-says--virtual-kidnapping--scams-now-targeting-doctors.html ">http://www.ksat.com/content/pns/ksat/news/2014/08/07/fbi-says&#8211;virtual-kidnapping&#8211;scams-now-targeting-doctors.html </a></strong></span></p>
<p>Phone scams are nothing new; they have been around about as long as the phone has been in existence. But criminals are an adaptive species of virus; constantly looking for new ways to exploit human frailties. In the savage and violent world in which we now live, <strong>FEAR</strong> can spread like a cancer, especially when everyday we are inundated with murder, rape and kidnappings on television and the internet. These criminals know that if they can <strong>SCARE</strong> somebody enough not to question the validity of a  threat and by consequence make them act out of <em>moral reflex</em> to try to<em> </em>avoid violence. If this can be accomplished, money can be made easily. This is how Virtual Kidnapping works.</p>
<p>It is no surprise that this scam started in Mexico, where <span style="color:#ff0000;"><a style="color:#ff0000;" href="http://www.vocativ.com/underworld/crime/places-youre-likely-get-kidnapped-vacation/#!bGkI1g"><strong>REAL KIDNAPPINGS</strong></a></span> still happen at an endemic rate. Last year alone, the <em>reported kidnappings</em> in Mexico were 1,583. It is interesting to note, that this stat, like almost all other crime statistics in Mexico (including Murder) is highly skewed and suspect; after all, in a society where &#8220;snitches&#8221; and people with loose lips typically end up in snuff films or be-headed on the side of the road, what get&#8217;s <strong>&#8220;REPORTED&#8221;</strong> is relatively always<strong> LOW or NON-EXISTENT.</strong></p>
<p>To get an ideal of how these creeps work, consider these <span style="color:#ff0000;"><strong><a style="color:#ff0000;" href="http://www.borderlandbeat.com/2012/10/living-in-mexico-with-virtual.html">transcripts</a> </strong></span>from Mexico recorded in 2012.</p>
<p>&nbsp;</p>
<p>Indicators that you are being scammed:</p>
<ul>
<li>Incoming calls made from an outside area code</li>
<li>Multiple successive phone calls</li>
<li>Calls do not come from the kidnapped victim’s phone</li>
<li>Callers go to great lengths to keep you on the phone</li>
<li>Callers prevent you from calling or locating the “kidnapped” victim</li>
<li>Ransom money is only accepted via wire transfer service</li>
</ul>
<p>Tips on what to do during the Call:</p>
<ul>
<li>Stay calm</li>
<li>Slow the situation down</li>
<li>Avoid sharing information about you or your family during the call</li>
<li>Listen carefully to the voice of the kidnapped victim</li>
<li>Attempt to call or determine the location of the “kidnapped” victim</li>
<li>Request to speak to the victim</li>
<li>Ask questions only the victim would know</li>
<li>Request the kidnapped victim call back from his/her cell phone</li>
</ul>
<p>All of these were taken directly from the<strong><a href="http://www.fbi.gov/sanantonio/press-releases/2014/virtual-kidnapping-extortion-calls-on-the-rise"> FBI&#8217;s website</a>, </strong>which also has all of the contact numbers for FBI field offices in the South Texas area.</p>
<p>Stay Frosty, Stay Armed and Stay Dangerous!</p>
]]></html><thumbnail_url><![CDATA[https://hcsblogdotorg.files.wordpress.com/2014/08/vk1.jpg?fit=440%2C330]]></thumbnail_url><thumbnail_width><![CDATA[]]></thumbnail_width><thumbnail_height><![CDATA[]]></thumbnail_height></oembed>