Welcome to the SCARS INSTITUTE Journal of Scam Psychology
A Journal of Applied Scam, Fraud, and Cybercrime Psychology – and Allied Sciences
A dedicated site for psychology, victimology, criminology, applied sociology and anthropology, and allied sciences, published by the SCARS INSTITUTE™ – Society of Citizens Against Relationship Scams Inc.

Fundamental Attribution Error Bias
Overestimate Character and Underestimate Context
Principal Category: Cognitive Biases & Psychological Heuristics
Author:
• Tim McGuinness, Ph.D., DFin, MCPO, MAnth – Anthropologist, Scientist, Polymath, Director of the Society of Citizens Against Relationship Scams Inc.
Abstract
The fundamental attribution error is a common shortcut that pushes you to explain behavior by blaming character while overlooking the situation that shaped it. In scams, this bias invites harsh judgments from others and from yourself, and it hides the engineered pressures that offenders create through secrecy, urgency, role casting, and platform switching. Before harm, the bias can lull you into overconfidence. During harm, it turns scripted manipulation into a story about your personality. After harm, it fuels shame and slows reporting. You reduce the bias by asking first about pressures, timelines, channels, and scripts, then weighing how those factors interact with your values and needs. Clear refusal rules, a verification ladder, daylight conversations, and one trusted witness redesign the situation so decisions slow down and judgment returns. This shift protects dignity, speeds learning, and strengthens prevention for you and your community.

Fundamental Attribution Error and Scam Victims: Seeing Context Clearly Before, During, and After Harm
Fundamental Attribution Error is a cognitive bias that changes how we see ourselves and others.
Many survivors of relationship and financial scams carry a quiet burden that slows recovery. They tell themselves and hear from others that they should have known better, that they were too trusting, or that their personality made them easy to fool. This kind of story fits a common mental shortcut that social psychologists call the fundamental attribution error. The shortcut encourages people to explain behavior by looking first at personal traits and only later, if at all, at the situation that surrounded the behavior. When this bias takes hold, observers overlook pressure, fatigue, isolation, scripts, and deception that were carefully arranged by an offender.
What is the Fundamental Attribution Error Cognitive Bias
The fundamental attribution error describes a common mental shortcut in which you explain someone’s behavior by focusing on presumed character traits while overlooking the situation that shaped their choices. You see a late arrival and conclude the person is careless, while ignoring traffic, childcare complications, or an emergency. This bias feels natural because personality trait stories are quick and tidy, whereas situational explanations require details that are not always visible. It also pairs with the actor, observer pattern, where you explain your own missteps by citing circumstances, yet explains other people’s missteps by citing personality.
You can reduce this error by deliberately asking what pressures, incentives, and constraints were present before judging a person’s character. Consider timing, information available at the moment, role expectations, and social or organizational rules that may have influenced what happened. When you train yourself to look for context first, your interpretations become more accurate and your responses become fairer. The shift does not excuse harmful actions. It adds clarity by balancing who someone is with where they were and what they faced, which leads to better decisions in conversation, teamwork, and everyday life.
What the Fundamental Attribution Error Means
The fundamental attribution error describes a tendency to overestimate the role of character and underestimate the role of context when judging why someone acted as they did. If a driver cuts into a lane, an observer may think that the driver is rude, not that the driver was avoiding debris. If a colleague misses a deadline, a manager may think that the colleague is lazy, not that the colleague was caring for a sick child. Family and friends of scam victims also employ this bias when they comment on how a scam victim could have become the victim of a scam.
The bias appears because people see their own situations from the inside, while they see others through a narrow window. The human brain prefers simple stories that point to stable personal qualities, since those stories feel easy to predict. Situations are messy, temporary, and often invisible. In the world of online fraud, this bias encourages harsh judgments of victims and harsh self-judgments by victims themselves. It also blinds communities to the engineered settings that make deception highly effective.
Why Brains Lean on This Shortcut
Attribution happens fast. Our brains evolved to draw quick conclusions about who is safe, who is trustworthy, and who might cause harm. Personal explanations arrive quickly because they save energy and time. Situational explanations require more effort. They ask a person to search for unseen pressures, to imagine environments, and to consider timelines that stretch across hours or weeks. Offenders exploit this tendency by designing scenes that look ordinary and personal. A victim walks into a bank or opens a familiar app. A message arrives with polite wording. A friendly voice offers praise and a plausible reason for urgency. Nothing in the moment announces that the room has been staged, that emotion has been rehearsed, or that financial rails have been mapped in advance. The brain, scanning for simple cues, labels the scene as personal choice rather than as a high-pressure setting created by someone else.
Before a Scam: How the Bias Warms the Ground
Before the first approach, the fundamental attribution error can shape beliefs about risk. People often carry quiet stories about who gets scammed. They imagine a careless person who moves too fast or a lonely person who believes anything. Those images place the cause inside character and push situational factors into the background. As a result, people who do not see themselves as careless or lonely may ignore practical protections. They may treat platform switches, secrecy, or verification as issues for other people. In this way, the bias lowers guardrails because it reassures the person that character will protect them.
Communities also make the ground warmer when they speak about victims as if personal flaws were the main explanation. Jokes about gullibility or lectures about common sense shift attention away from scripts, platform architecture, and cash-out routes that matter more. When people hear those messages, they are less likely to prepare simple plans that protect anyone, regardless of temperament or life stage. A healthy approach starts with the opposite assumption. It treats every person as potentially vulnerable when a situation is designed to capture attention, isolate the target, and compress time. Situational humility prevents overconfidence and invites practical steps.
During a Scam: How the Bias Hides the Situation
During a scam, the bias invites both the victim and any outsider to misread what is happening. The victim may read emotional pressure as a test of love or loyalty rather than as a scripted manipulation of urgency and reciprocity. An outsider who sees a screenshot or a bank visit may assume that the victim is reckless, not that the offender has moved the conversation to private channels, rehearsed phrases that borrow the victim’s own values, and generated a sequence of small requests that created momentum. In both cases, the person’s character feels like the explanation. The situation, which contains the true power, remains hidden.
The bias becomes stronger when the situation includes role assignments. Offenders cast themselves as authority figures, wounded partners, or insiders who will open doors if the victim proves loyalty. Offenders cast the victim as a rescuer or a chosen confidant. Roles carry scripts and obligations, and people tend to act in ways that fit a role even when those actions contradict their usual preferences. The brain explains the behavior as a trait. The reality is a role-bound response inside a staged environment.
Another layer appears when strong emotion rises. Stress, fear, urgency, and affection narrow attention and shift control from reflective systems to faster, habit-driven systems. A person in that state prioritizes action that ends the tension. The choice may look personal from the outside, yet the choice is being steered by a physiology that has been pushed into a corner. The fundamental attribution error turns that pressured behavior into a claim about personality, which adds shame and slows later disclosure.
After a Scam: Self-Blame, Public Blame, and Slower Recovery
After the loss, the bias often comes home with a harsh voice. The survivor may review events and conclude that personal defects caused the harm. The survivor may label themselves as naive, weak, or foolish. This self-explanation arrives quickly because personal explanations always arrive quickly. Situational explanations take more effort when the event is painful. Yet recovery depends on an accurate map of the situation. Without that map, the survivor may try to change stable traits rather than changing routines, channels, and verification habits that will offer better protection.
Public commentary often amplifies the same bias. Friends, coworkers, and social media observers may ask how the survivor could possibly have believed the story. They may define the person by a single event and ignore a lifetime of steady judgment. These reactions mirror the bias and add isolation. Isolation then delays reporting, cuts off support, and leaves the offender free to move on. When families and teams understand the bias, they can choose a different response. They can ask first about the setting. They can ask what scripts and pressures were used. They can ask what handoffs happened between platforms and why those handoffs worked. This approach replaces blame with analysis, which strengthens prevention for everyone.
How Offenders Exploit the Bias
Offenders rely on the bias in several ways. First, they build scenes that look personal and private so that observers will not consider structural causes. A kitchen table, a phone screen, and a late-night call appear intimate even when the conversation is part of a large-scale operation. Second, they craft identities that shift attention to character judgments. A uniform, a job title, or a carefully staged vulnerability invites the victim to attribute goodwill or competence to the person, not to examine the process. Third, they pressure secrecy so that no outside witness can point out the situational traps. The less context that others see, the more likely the story will remain about the victim’s supposed personality traits rather than the offender’s design.
Correcting the Bias: A Practice in Three Parts
The bias softens when people adopt a practice that asks about the situation first, explores the interaction between person and context second, and leaves character labels for last. The first step is a simple sentence that becomes a habit. What were the pressures, constraints, incentives, and scripts present when the choice was made? This question shifts attention outward and collects details about technology, timing, handoffs, and emotional tactics. The second step asks how those features interact with the person’s values and needs. For example, a value for family care combined with a staged family emergency can explain decisions far better than a trait label can. The third step considers personal learning and boundary setting without shame. A survivor can honor caring values while choosing methods that include verification and time.
Teams and families can use the same practice when someone discloses a scam. A supportive response might begin with, tell me what they asked you to do, in what order, and on which channels. The listener can ask, “Where did the urgency come in, and who invited the move to a private app.” The conversation stays anchored in context and sequence, which lowers blame and increases clarity. Once the map is clear, the same group can help the survivor adopt specific protections, such as a written money and access rule, a verification ladder, and one trusted contact who reviews unusual requests.
Designing Situations that Support Safer Choices
Since situations shape behavior so powerfully, recovery plans work best when they redesign everyday settings to reduce risk and increase reflection. Small changes matter. One visible rule on a card or lock screen that reads no money, no codes, no remote access converts a value into a behavioral anchor. One decision to keep all financial conversations inside a single, verifiable channel prevents platform fragmentation. One habit of waiting a day before sending funds disrupts the engineered rush that offenders prefer. One agreement with a trusted person to review any request that touches money or privacy adds external context when emotion runs high. These designed situations counter the fundamental attribution error by building protections that do not depend on character labels. They protect caring people by changing the environment in which choices occur.
Reframing Personal Identity Without Shame
The bias harms identity because it whispers that a single event defines a person. Survivors benefit when identity statements return to balance. A fair statement might sound like this. The person is caring, and their care was exploited in a high-pressure situation that was designed to move money fast. The person is thoughtful, and their thoughtful habits were bypassed through secrecy and fragmentation. The person is strong, and strength includes learning situational awareness and boundary setting after harm. These statements are not slogans. They reflect the reality that most people behave differently when the room changes. When identity sits on that truth, shame fades and practice grows.
Supporting Others Without Repeating the Bias
Friends, families, professionals, and peer supporters can reduce harm by adopting language that resists trait labels. Supporters can ask about timeline, triggers, and channel changes, then validate the person’s caring values while helping them translate those values into safer methods. Supporters can also avoid moralizing that confuses kindness with weakness. Many offenders target generous and conscientious people precisely because generosity and conscientiousness are stable strengths. The goal is to keep those strengths while building routines that honor limits and require proof.
Indicators that the Bias is Losing Power
Recovery brings signs that the bias has loosened its grip. The survivor begins to describe the scam in terms of sequence rather than in terms of personal defect. The survivor replaces global self-judgments with specific adjustments, such as keeping a single communication channel for sensitive matters and using official contact pages for any verification. Family conversations shift from why to how, and from blame to design. New requests no longer trigger immediate action. Instead, they trigger a pause, a breath, and a move to the verification ladder. These changes mark progress because they reflect a deeper understanding of how behavior rises from the mix of person and context.
Implications for Prevention Campaigns
Public education campaigns can avoid repeating the fundamental attribution error by focusing on situations rather than on victim traits. Messages that explain platform switching, private channel migration, urgency scripts, and cash-out pathways help the public recognize patterns. Stories that show how ordinary, capable people were pressured inside carefully staged scenes normalize disclosure and help others come forward sooner. Practical tools, such as downloadable verification checklists and one-line refusal rules, turn awareness into action. Campaigns that feature survivors who describe context and recovery, rather than personality, model a path out of shame.
Conclusion
The fundamental attribution error encourages quick, character-based explanations for complex events. In the context of scams, that shortcut hurts survivors, slows reporting, and leaves systems unchanged. A better approach starts with the situation. It asks how timing, channels, roles, scripts, and physiology shaped decisions. It honors caring values while translating those values into safer behavior. It replaces labels with designs that support reflection and verification. When people adopt this approach, blame loses heat, learning accelerates, and prevention spreads.
A survivor of a scam is not defined by a single moment under pressure. The survivor is a person with strengths, obligations, and hopes who was maneuvered inside a scene that prized speed and secrecy. Recovery grows when that truth takes center stage. Families and teams can help by asking about context first, by reinforcing small protective rituals, and by celebrating each moment when a pause replaces a rush. Over time, those moments add up. The next urgent message meets a different situation. The person breathes, reads a visible rule, verifies through official channels, and involves one trusted witness. The decision that follows comes from clarity rather than from compression. In that clearer space, dignity returns, confidence grows, and kindness can remain part of the person’s identity without inviting harm.

Glossary
- Actor–observer bias — You explain your own actions by pointing to circumstances, yet you explain other people’s actions by pointing to their character. This split feeds unfair blame in scams because you saw the pressure you faced, while outsiders only saw a screenshot or a bank visit. Naming this bias helps you redirect attention to the situation.
- Arousal narrowing — Under stress your attention tunnels and favors fast action over careful review. Offenders raise arousal on purpose so you miss red flags and skip verification. You regain range by pausing, breathing slowly, and adding time before any decision.
- Attribution (dispositional) — You label behavior as the result of character traits, such as gullible or careless. This habit feels tidy, yet it hides the setting that shaped the choice. You protect recovery by asking what pressures were present before judging character.
- Attribution (situational) — You explain behavior by examining context, timing, roles, and constraints. This approach fits scams because offenders stage scenes that reward speed and secrecy. You get closer to the truth when you map the situation first.
- Boundary ritual — You use a short routine to protect your limits when pressure rises. A workable ritual is three slow exhales, a relaxed jaw and shoulders, and a clear no to money, codes, or remote access. You bring your thinking mind back online before you answer.
- Cash-out path — This is the route that turns your funds into usable cash or goods for the offender. It can include private apps, gift cards, wires, or crypto transfers. You block the path by refusing rushed payments and by using verified channels only.
- Cognitive bias — A mental shortcut that can speed decisions but also distort judgment. In scams, common biases steer you toward personal explanations and away from context. You lower risk by learning the shortcuts and testing your first impressions.
- Compassion fatigue — Long exposure to distress without recovery time leaves you emotionally drained and less able to think clearly. Offenders keep you in this state with serial emergencies and praise for sacrifice. You restore steadiness by pairing care with limits.
- Compassion with limits — You stay warm and helpful while protecting your energy, money, and privacy. This style of care relies on clear rules, slow timing, and independent verification. You help wisely rather than endlessly.
- Context-first question — You ask what pressures, incentives, scripts, and handoffs were present before judging anyone’s character. This question resets the lens from blame to analysis. You will make fairer decisions when you use it as a habit.
- Cooling-off period — A planned delay that prevents rushed transfers or disclosures. Even 24 hours can collapse a scripted crisis. You announce this rule in advance and follow it every time.
- Cross-platform migration — The offender moves you from a public platform to private apps where oversight is weak. This step hides the trail and resets your memory of earlier doubts. You keep control by refusing to change platforms for financial matters.
- Daylight conversation — You insist that sensitive topics stay in visible channels where a record exists. This design choice slows pressure and invites a second set of eyes. You protect yourself by keeping money talk in the open.
- Decision compression — High emotion and tight timelines squeeze you toward immediate action. The squeeze makes a bad choice feel like the only choice. You reduce compression by adding time, space, and verification.
- Disclosure-friendly response — When you tell someone what happened, you deserve questions about sequence and context rather than labels about character. A helpful listener asks what they asked you to do, on which channels, and in what order. You can request this kind of support.
- Engineered urgency — The offender creates a deadline that punishes waiting. Timers, closing hours, and threatened harm push you to act before you think. You answer urgency with a pause and a verification step.
- Empathic distress — You feel another person’s pain so strongly that you lose judgment and relief becomes the goal. Offenders use rehearsed emotion to trigger this state. You shift to compassion by grounding your body and checking facts.
- Evidence-based verification — You confirm claims using official websites, public phone numbers, and written invoices. You never rely on contacts sent inside a message thread. You act only after independent proof appears.
- Fundamental attribution error — You explain behavior by blaming character while overlooking the situation that shaped it. In scams, this bias fuels self-blame and public blame. You correct it by mapping context first and traits last.
- Grounding routine — A brief sequence that calms your nervous system so you can think clearly. Slow breathing, relaxed posture, and naming three neutral objects are simple options. You use this routine before any money or access decision.
- Handoff sequence — A planned series of steps that guide you from greeting to payment. Offenders test boundaries, switch channels, assign roles, and then request funds. You break the sequence by refusing secrecy and adding verification.
- High-pressure scene — A setting designed to speed you up and narrow your view. It can be a late-night call, a private chat, or a bank visit framed as urgent. You lower the risk by changing the scene to daylight, public channels, and slower timing.
- Independent verification — You contact an organization through its public website or main phone number and confirm the request yourself. You never use numbers or links provided by the requester. You act only after the check passes.
- Isolation script — The offender warns that others will not understand and asks you to keep the plan secret. Secrecy removes protective friction and silences helpful allies. You counter isolation by looping in one trusted person every time.
- Official channel — A communication route that you can audit and that belongs to a known entity. Examples include a bank’s main phone number or secure message center. You keep important matters inside these channels.
- Overconfidence — You trust that your character or experience will protect you, and you skip routine protections. This belief warms the ground for harm. You replace confidence with process and follow your rules every time.
- Private-channel rule — You decide that requests involving money, codes, or remote access will never move to private apps. This rule blocks a common tactic and preserves records. You state the rule and repeat it without debate.
- Reciprocity pressure — You feel obligated to return a favor after receiving attention, gifts, or praise. Offenders build this feeling to make refusal harder later. You thank the person and still follow your process.
- Refusal rule — A one-sentence policy that protects your money and privacy. A strong example is no money, no codes, no remote access. You read it aloud before you act, and you let it carry you through pressure.
- Role assignment — The offender casts you as a rescuer, insider, or loyal partner to steer your choices. Roles come with scripts and obligations that feel natural in the moment. You step out of the role by returning to your rules and adding time.
- Secrecy — A request to hide the plan, the channel, or the payment details. Secrecy is the oxygen of scams because it prevents protective feedback. You keep yourself safe by refusing secret steps.
- Shame reduction — You replace trait labels with situational maps and specific adjustments. This shift turns a painful story into a learning plan. You heal faster when you use this frame.
- Situational humility — You accept that any person can be pressured inside a well-designed scene. This stance replaces overconfidence with preparation. You practice habits that work for everyone, every time.
- Situational map — A clear outline of sequence, channels, timing, and tactics used against you. The map shows where your routines held and where they failed. You use it to redesign your protections.
- Sunk cost effect — You feel pushed to continue because you already invested time, money, or emotion. Offenders exploit this to keep you in motion. You reset by telling yourself that past steps do not require future steps.
- Timeline reconstruction — You write what happened in order, including channel changes and requests. The timeline reveals patterns that were hard to see in the moment. You use it to teach yourself and to brief helpers.
- Trusted witness — One person who reviews unusual requests with you before you act. This ally repeats your refusal rule and helps you verify through official channels. You reduce isolation and slow the rush.
- Urgency script — A set of phrases that make waiting feel dangerous or cruel. The goal is to tilt your body toward action before your mind checks facts. You answer the script with your pause, your rule, and your verification ladder.
- Verification ladder — A simple sequence that starts with independent checks and ends with time. You look up the organization yourself, call from another device, require written documentation, and wait a day. You move only when every rung holds.
- Victim-blaming language — Words that reduce a complex event to character judgments. This talk adds isolation and slows reporting. You replace it with questions about context and steps for protection.
- Written anchor — A short rule or reminder kept on your phone or a card that you read before making decisions. It keeps your values visible when emotion runs high. You rely on it to carry your intention across moments and channels.

TABLE OF CONTENTS
- Fundamental Attribution Error Bias
- Overestimate Character and Underestimate Context
- What is the Fundamental Attribution Error Cognitive Bias
- What the Fundamental Attribution Error Means
- Why Brains Lean on This Shortcut
- Before a Scam: How the Bias Warms the Ground
- During a Scam: How the Bias Hides the Situation
- After a Scam: Self-Blame, Public Blame, and Slower Recovery
- How Offenders Exploit the Bias
- Correcting the Bias: A Practice in Three Parts
- Designing Situations that Support Safer Choices
- Reframing Personal Identity Without Shame
- Supporting Others Without Repeating the Bias
- Indicators that the Bias is Losing Power
- Implications for Prevention Campaigns
- Conclusion
- Glossary
A Question of Trust
At the SCARS Institute, we invite you to do your own research on the topics we speak about and publish, Our team investigates the subject being discussed, especially when it comes to understanding the scam victims-survivors experience. You can do Google searches but in many cases, you will have to wade through scientific papers and studies. However, remember that biases and perspectives matter and influence the outcome. Regardless, we encourage you to explore these topics as thoroughly as you can for your own awareness.
Please Leave A Comment
Recent Comments
On Other Articles
on Psychological Trauma & Stress And Its Effects On Sufferer’s Genetics – 2024: “Very interesting article. I have wondered sometimes if the way I respond to trauma was due to the trauma and…” Aug 14, 11:15
on Psychological Denial – A Maladaptive Coping Mechanism In Scam Victims – 2024: “I can see from this article how denial can become a coping mechanism for individuals after a scam. I myself…” Jul 15, 19:51
on Reductive Thinking – A Maladaptive Coping Mechanism – An Enemy Of Scam Victims Recovery – 2024: “Very good article that explained the differences between reductive thinking and minimizing. I’m not sure but it seems that minimizing…” Jul 13, 20:14
on Self-Hate In Scam Victims And Its Impact From Psychological Trauma – 2024: “At one time in my life I felt self hate and I did at one point want to end my…” Jul 6, 15:23
on Victim Complex/Victim Mentality In Relationship Scam Victims 2023: “Thank you for another great article. I have known a few people with victim mentality in my life. Knowing them…” Jul 6, 13:35
A Note About Labeling!
We often use the term ‘scam victim’ in our articles, but this is a convenience to help those searching for information in search engines like Google. It is just a convenience and has no deeper meaning. If you have come through such an experience, YOU are a Survivor! It was not your fault. You are not alone! Axios!
Statement About Victim Blaming
Some of our articles discuss various aspects of victims. This is both about better understanding victims (the science of victimology) and their behaviors and psychology. This helps us to educate victims/survivors about why these crimes happened and to not blame themselves, better develop recovery programs, and to help victims avoid scams in the future. At times this may sound like blaming the victim, but it does not blame scam victims, we are simply explaining the hows and whys of the experience victims have.
These articles, about the Psychology of Scams or Victim Psychology – meaning that all humans have psychological or cognitive characteristics in common that can either be exploited or work against us – help us all to understand the unique challenges victims face before, during, and after scams, fraud, or cybercrimes. These sometimes talk about some of the vulnerabilities the scammers exploit. Victims rarely have control of them or are even aware of them, until something like a scam happens and then they can learn how their mind works and how to overcome these mechanisms.
Articles like these help victims and others understand these processes and how to help prevent them from being exploited again or to help them recover more easily by understanding their post-scam behaviors. Learn more about the Psychology of Scams at www.ScamPsychology.org
Psychology Disclaimer:
All articles about psychology, neurology, and the human brain on this website are for information & education only
The information provided in these articles is intended for educational and self-help purposes only and should not be construed as a substitute for professional therapy or counseling.
While any self-help techniques outlined herein may be beneficial for scam victims seeking to recover from their experience and move towards recovery, it is important to consult with a qualified mental health professional before initiating any course of action. Each individual’s experience and needs are unique, and what works for one person may not be suitable for another.
Additionally, any approach may not be appropriate for individuals with certain pre-existing mental health conditions or trauma histories. It is advisable to seek guidance from a licensed therapist or counselor who can provide personalized support, guidance, and treatment tailored to your specific needs.
If you are experiencing significant distress or emotional difficulties related to a scam or other traumatic event, please consult your doctor or mental health provider for appropriate care and support.
Also, please read our SCARS Institute Statement About Professional Care for Scam Victims – here
If you are in crisis, feeling desperate, or in despair please call 988 or your local crisis hotline.
SCARS Institute Resources:
- If you are a victim of scams go to www.ScamVictimsSupport.org for real knowledge and help
- Enroll in SCARS Scam Survivor’s School now at www.SCARSeducation.org
- To report criminals visit https://reporting.AgainstScams.org – we will NEVER give your data to money recovery companies like some do!
- Sign up for our free support & recovery help by https://support.AgainstScams.org
- Follow us and Find our podcasts, webinars, and helpful videos on YouTube: https://www.youtube.com/@RomancescamsNowcom
- SCARS Institute Songs for Victim-Survivors: https://www.youtube.com/playlist…
- See SCARS Institute Scam Victim Self-Help Books at https://shop.AgainstScams.org
- Learn about the Psychology of Scams at www.ScamPsychology.org
- Dig deeper into the reality of scams, fraud, and cybercrime at www.ScamsNOW.com and www.RomanceScamsNOW.com
- Scam Survivor’s Stories: www.ScamSurvivorStories.org
- For Scam Victim Advocates visit www.ScamVictimsAdvocates.org
- See more scammer photos on www.ScammerPhotos.com