Scam Alert 🛑Holiday-Themed giveaways(cash, Teslas, Packages)

Live, Lies & a Verified Name

Live, Lies & a Verified NameLive, Lies & a Verified NameLive, Lies & a Verified Name
  • Home
  • Authors Message
  • STOP THE SCAM
  • More
    • Home
    • Authors Message
    • STOP THE SCAM

Live, Lies & a Verified Name

Live, Lies & a Verified NameLive, Lies & a Verified NameLive, Lies & a Verified Name
  • Home
  • Authors Message
  • STOP THE SCAM

“They didn’t destroy me. If anything, they built me.”

“They didn’t destroy me. If anything, they built me.” “They didn’t destroy me. If anything, they built me.” “They didn’t destroy me. If anything, they built me.”

“Lies and loss I found my purpose to expose, to educate, to empower  “ 

“What meant for harm became my mission”.




BLOCK /REPORT BEFORE it BEGINS

HomeScammed Start HereBEFORE it BEGINSHow to Recognize a Scam “Real stories. Real tactics. No shame.” MY BLOGDISCLAIMER

🛑SCAM AWARENESS

Block Report Before it Begins

“View in Another Language”

“External Translation Tool”
Translate 🌐

Author Note

About Me

“They didn’t destroy me. If anything, they built me.”


This space was created out of something painful —

But it did not end in pain.

It ended in purpose.

I was targeted by coordinated impersonation scams involving fake “Elon Musk” accounts.

This was not just fraud — it was emotional manipulation, psychological abuse, and financial harm.

I know what it feels like to love with your whole heart and be deceived.

But I also know what it means to rise.


This Toolkit exists so others do not fall into the same trap.

Not on my watch.

Not anymore.


This space is for:

• Victims and survivors

• Advocates, families, and supporters

• Financial institutions and investigators

• Anyone seeking to understand how these scams work


You are not here to start over.

You are here to continue — with strength, clarity, and light.


You are not alone.

Neither was I.


— Anne Marie

🌎 SPANISH — Latin American Welcome Message


Mensaje de Bienvenida de la Autora — SPANISH (Latin American)

Bienvenidos — No estás solo(a), estés donde estés en el mundo.

Gracias por estar aquí. Ya sea que hayas sido víctima de una estafa, casi estafado(a), o si estás tratando de proteger a alguien que amas, quiero que sepas esto:

Mereces seguridad, dignidad y apoyo — sin importar en qué país vivas.

Mi misión es crear conciencia global sobre las estafas en línea, especialmente aquellas que involucran suplantación de identidad de figuras públicas.

Estos delitos afectan a personas en todas partes: Estados Unidos, América Latina, Europa, Asia y más. Las tácticas pueden variar, pero el impacto emocional es universal.

Este sitio web fue creado para:

• Educar y empoderar

• Mostrar señales de alerta y ejemplos reales

• Ofrecer pasos claros para actuar

• Recordarte que ser víctima de una estafa NO te define

🌐 Si necesitas reportar una estafa:

Usa el botón Traducir en la parte superior de la página y contacta a las autoridades oficiales de tu país.

Ellos son los más calificados para ayudarte.

Mereces paz, claridad y verdad.

Estoy aquí para iluminar el camino — una persona, un país, una historia a la vez.

— Anne Marie

🇧🇷 PORTUGUESE — Brazilian Welcome Message



Mensagem de Boas-Vindas da Autora — PORTUGUESE (Brazilian Portuguese)

Bem-vindo(a) — Você não está sozinho(a), em qualquer lugar do mundo.

Obrigada por estar aqui. Seja porque você foi vítima de um golpe, quase caiu em uma fraude, ou está tentando proteger alguém que ama, quero que saiba isto:

Você merece segurança, dignidade e apoio — não importa em que país viva.

Minha missão é aumentar a conscientização global sobre golpes online, especialmente aqueles que usam a identidade de figuras públicas.

Esses crimes afetam pessoas em todos os lugares: Estados Unidos, América Latina, Brasil, Europa, Ásia e além. As táticas podem mudar, mas o impacto emocional é o mesmo.

Este site foi criado para:

• Educar e fortalecer

• Mostrar sinais de alerta e exemplos reais

• Oferecer passos claros para agir

• Lembrar que ser vítima de um golpe NÃO define quem você é

🌐 Se você precisar denunciar um golpe:

Use o botão Traduzir no topo da página e procure as autoridades oficiais do seu próprio país.

Elas são as mais qualificadas para ajudar.

Você merece paz, clareza e verdade.

Estou aqui para iluminar o caminho — uma pessoa, um país, uma história de cada vez.

— Anne Marie



🌍 Global Access Now Available

My website now supports every language — Spanish, Portuguese, Chinese, Italian, French, and more.

If you or someone you know has been targeted by an impersonation scam, you can now read my resources in your own language using the new translation tool on my home page.

My mission reaches beyond borders.

Scammers operate globally — so now my advocacy does, too.


Discover the comprehensive Scam Survival Toolkit designed to equip you with the tools and knowledge to navigate online threats. This toolkit includes resources, checklists, and actionable steps to help you stay informed and vigilant against scams. Empower yourself with this essential guide that can make a significant difference in your online experience.


❤️🌹

Anne Marie Advocate

Upcoming Book: Live, Lies, and a Verified Name
Welcome — No matter your language, you are home.

Scammers don’t care where you’re from.

Neither do I.

Whether you’re in Mexico City, São Paulo, Manila, Lagos, or Madrid  

you deserve safety, dignity, and the truth.

Hit the translate button ↑ and read everything in your language.

You are not alone.

You are not defined by what they stole.

You are here, and that means you’re already fighting back.


PSYCHOLOGICAL MANIPULATION • HOW THEY CAPTURE YOUR MIND

LIVED EXPERIENCE

I’m not describing theory — I’m documenting what was done to me.

I preserve the full transcripts privately. Public examples are summarized to avoid giving scammers reusable scripts and to protect survivors from re-triggering content.

VALUE MIRRORING

They reflect your deepest beliefs back to you until agreement feels like loyalty to yourself. It’s designed to lower skepticism without earning trust.

  • EXAMPLE (IMPOSTER #4): “Integrity starts there… reclaiming clarity.”
  • EXAMPLE (IMPOSTER #1): “You’re strong. Insightful. Someone I can trust.”
  • WHAT IT’S DOING: Borrowing your values and character to manufacture credibility without proof.

COGNITIVE INTIMACY

Long, deep conversations arrive fast and feel like “finally, someone who gets me.” The bond forms in the mind before the person is proven.


  • EXAMPLE (IMPOSTER #2): “Every moment I spend with you is a gift.”
  • EXAMPLE (IMPOSTER #2): “I’d take you anywhere… just to distract you from what’s been weighing on your heart.”
  • WHAT IT’S DOING: Fast emotional closeness meant to feel like safety and “home.”

MEANING INJECTION

Ordinary moments get framed as destiny, purpose, or “signs.” Meaning becomes the hook that keeps you leaning forward.


  • EXAMPLE (IMPOSTER #2): “If I made mistakes… would you still love me the same?”
  • EXAMPLE (IMPOSTER/BROTHERHOOD): “You are being chosen tonight. This is no accident.”
  • WHAT IT’S DOING: Turning the bond into destiny, mission, or “purpose” to keep you leaning in.

INTERPRETATION CONTROL

Confusion is created on purpose, then they position themselves as the only one who can explain what’s “really” happening. Reality starts to run through them.


  • EXAMPLE (IMPOSTER #4): “When simulation feels real… what is real anymore?”
  • EXAMPLE (IMPOSTER #2): “We’re closer to a world war than anyone knows… I know what is coming.”
  • WHAT IT’S DOING: Reframing facts into philosophy/fear so you doubt verification and rely on them for reality.

THE NERVOUS SYSTEM LOOP

Intensity creates a high, silence creates anxiety, and the next message brings relief. Relief can strengthen attachment even when logic warns you.


  • EXAMPLE (IMPOSTER #2): “Clearing your head means you should leave while I’m still talking.”
  • EXAMPLE (IMPOSTER #2): “Get lost… you will regret your actions.” (profanity optional to omit)
  • WHAT IT’S DOING: Creating stress, then forcing you to chase relief by re-engaging.

SPIRITUAL COERCION

Faith language may be used to override questions and make obedience feel “right.” If doubt is treated as sin, that’s not faith—it’s control.


  • EXAMPLE (IMPOSTER #3): “God is your protector.” / “Do you pray every night…?”
  • EXAMPLE (IMPOSTER #4) “If you ever receive a reply from me again, then know that your magic is working on me. 
  • EXAMPLE (IMPOSTER/BROTHERHOOD): “Resistance is betrayal.” / “Betrayal invites the curse.”
  • WHAT IT’S DOING: Using faith/fear language to override questions and make obedience feel “right.”


BROTHERHOOD TACTICS

“Orders,” ranks, secrecy, and private channels create false authority and belonging. The goal is dependence, not protection.


  • EXAMPLE (IMPOSTER/BROTHERHOOD): “The Brotherhood owns your life as of today.”
  • EXAMPLE (IMPOSTER #2): “You are a disgrace to me and the brotherhood.”
  • WHAT IT’S DOING: Fake authority + belonging + threat language to lock you into compliance.

MONEY DISGUISED AS MEANING

Payments get reframed as duty, sacrifice, security, or “the cost of the mission.” When money is tied to love or faith, it’s manipulation.


  • EXAMPLE (IMPOSTER #1): “You will have to pay ] $$$$]… to come meet with me.”
  • EXAMPLE (IMPOSTER #2): “If you help me with this $$$$$$ loan… this is history. I promise I’ll pay you back.”
  • WHAT IT’S DOING: Dressing payments as love, duty, urgency, or “bigger purpose.”

BOUNDARY & EXIT

Real trust doesn’t require secrecy, urgency, or payment. Slow everything down to verification—and walk away the moment pressure replaces respect.


  • EXAMPLE (ME): “I asked only for proof.”
  • EXAMPLE (IMPOSTER #4): “Please don’t walk away… I’m not an imposter.”
  • WHAT IT’S DOING: You return to reality; they escalate emotion to keep the bond alive.


PHYSIOLOGICAL MANIPULATIONL

Most people imagine scams as quick tricks — a stolen password, a fraudulent charge, a moment of bad luck.

What happened to me was nothing like that.

It was 8,760 hours of manipulation — weeks and months of emotional pressure, fear, confusion, false hope, spiritual threat, financial urgency, and “prove your loyalty” messaging.

People underestimate what happens to a mind under that much pressure. The human brain cannot sustain that level of stress without changing — and that’s exactly what scammers rely on.

They don’t just take money. They take stability, clarity, sleep, and your sense of reality.


HOW COERCIVE PSYCHOLOGICAL MANIPULATION WORKS

** Sleep Deprivation as Control — When nights become vigilance, the brain can’t heal or think clearly.

** Identity Confusion — Intimacy and spiritual language are mixed with punishment and fear until you question yourself — even your faith.

** Trauma Bonding — Affection and threat alternate until the nervous system bonds to the person holding the “key.” This isn’t obsession. It’s survival instinct.

** Moral Distortion — Spiritual language (sacrifice, punishment, obedience) is used to manipulate conscience. This isn’t belief. It’s control.

** Emotional Exhaustion — After sustained pressure, boundaries blur and shame grows — because conditioning feels like personal failure.

** Isolation — They position themselves as the only one who understands you. Control thrives where support is absent.

To anyone who has suffered like I did

You are not weak. You are not foolish. You are not “crazy.” You are not to blame.

If your body can’t sleep, clenches its jaw, flinches at messages, feels confused, replays conversations, or misses someone who never existed — that is not your fault. Those are wounds of coercive psychological abuse, and they can heal.

They altered my mind and pressed on my soul — but they did not break me. And now I name what was done to me so others can recognize what is being done to them.❤️🏮🌹

WHEN THE SCAM BEGINS FIRST WARNING SIGNS

RED FLAGS: THE VERY FIRST MESSAGE INCLUDES

RED FLAGS: THE VERY FIRST MESSAGE INCLUDES

• “You’ve won a special prize.”

• “I chose you personally.”

• “Click this link to talk privately.”

• They ask you to move to Telegram, WhatsApp, Signal, or another private app.

• 🚫 If you receive a message saying you’ve WON money or a prize, it is almost certainly a scam. 🚫


IMMEDIATELY

(What to do the moment you notice a red flag)

• Stop.

• Do not click.

• Do not respond.

• Report. Block.

• Walk away.

• Real opportunities never require secrecy.

• Real people don’t rush trust.

• Scammers do.


Grooming & Love-Bombing




Grooming & Love-Bombing

  • Scammers create fast emotional intimacy — affection, compliments, and attention meant to make you trust them before you notice the lies.




Urgency & Pressure

  • “Do this now.” “Don’t tell anyone.” Pressure is not love — it’s control. Urgency is the clearest red flag in every scam.




Moving Off the Platform:

  • “Let’s move to Telegram.” “Download this app.” This removes platform protections and hides their identity. Real people don’t demand secrecy.

Manipulation & False Proof


  • Scammers use false websites, fake balances, and doctored screenshots to convince you they’re wealthy or legitimate.


You “Won” Something

  • Unexpected winnings, gifts, or rewards are ALWAYS scams. No real prize requires fees, codes, or secrecy.


Fake Government, Bank, or Legal Notices

  • Threatening messages from “IRS,” “bank security,” “CFTC,” or “police” are almost always scams. Real agencies do not message you through apps.

Control, Fear, and Isolation

Isolation & Secrets

  • “Don’t tell anyone.” “This is our secret.” Isolation is the #1 emotional weapon scammers use to trap you.



 Emergencies & Sob Stories

  • Fake illnesses, frozen accounts, accidents, or desperation pleas are scripts created to make you act with your heart instead of your clarity.



AI Voice Notes / Fake PLATORMS 

  • AI-generated voice messages, videos, or IDs are now common. Scammers use technology to imitate real people — even celebrities.

Money Hooks & Your Safety


“If your ‘billionaire boyfriend’ can’t send proof but can send you to Walmart for gift cards, 🚩 you’re dating a scammer.”


Money, Crypto, or “Investments”🔮

  • “Invest for us.” “We’ll grow your future.” These are pig-butchering tactics, designed to take every dollar you have.


 Gift Cards & Wire Transfers 🎁 Gift 

  • No real person, agency, or business asks for gift cards. It’s the #1 payment method used by scammers.


The Gut Feeling Something’s Wrong

  • Your intuition is your greatest protection. If something feels off — stop, breathe, and block. Scammers rely on your hesitation, not your clarity.

**Real Examples of Active Imposter Scams**


These screenshots come directly from real platforms 


Threads, X, Facebook, Instagram, WhatsApp — where imposters target victims every day. Seeing the scam clearly helps you avoid it instantly.

Scammers use affectionate language to lower your guard and build fast trust.

This is manipulation, not affection.

If someone asks you to buy an Apple, Google, Steam, or Walmart gift card — it’s a scam every time.

No real celebrity, company, or public figure will ever ask for gift cards.

When Exposure Doesn’t Stop the Scam: A Live Imposter Example

The following example illustrates how impersonation attempts can continue even after a person publicly documents their experience and advocates for awareness. Identifying details have been removed for safety and educational purposes.

Scenario Overview

After publishing a chapter of my book and sharing my experience publicly, I received a private message from an account claiming to represent a well-known public figure.

The account acknowledged awareness of my work and stated familiarity with impersonation scams — yet continued to pursue private conversation.

Excerpt from the Message (paraphrased)

  • Claimed authority to help “fans” deal with imposters
  • Emphasized being “very busy” while continuing private contact
  • Reframed the interaction as fan admiration
  • Asked whether I had lost money or anything else due to an imposter

Red Flags Present

  • Private authority claim
    Real public figures do not personally resolve impersonation issues via direct messages.
  • Status framing (“very busy man”)
    Common tactic to justify selective attention and discourage questioning.
  • Emotional reframing (“fan”)
    Shifts the power dynamic away from informed advocate → admirer.
  • Financial probing
    Questions about loss are used to assess vulnerability and future leverage.
  • Persistence after exposure
    Awareness of documentation does not deter scammers; access is their goal.

Why This Matters

Even informed individuals who publicly share their experiences can continue to be targeted.

Imposters do not stop because credibility is questioned —

they stop only when access is removed.

This is why education alone is not enough without firm boundaries.

What To Do If You Receive Messages Like This

  • Do not engage in further conversation
  • Preserve screenshots as documentation
  • Report the account on the platform
  • Block immediately

No explanation is required.

Screen shot of the message?

LIVE DM on X 12/20/2025.

Maria, I followed you because many people pretend to be me. That’s why I reached out privately so you know this is really me Elon. You’re not following a fake.Maria, I followed you because many people pretend to be me. That’s why I reached out privately so you know this is really me Elon. You’re not following a fake.Maria, I followed you because many people pretend to be me. That’s why I reached out privately so you know this is really me Elon. You’re not following a fake.


I know you probably don’t believe it’s really memessaging you now, and I just finished up dealing with a big legal win restoring my Tesla pay package in court today.


Are you usually active 


Yes, very active.


So tell me me how long have you been in contact with an imposter pretending to be me?


annenarieadvocate.com

My book will be out soon, you can learn about my interactions with many imposters.


Thanks for the website I know this isn’t something new, and I’ve helped many fans deal with imposters because I’m not a very busy man with a lot going on

Now that I know you’re not in contact with an imposter I want to ask: how long have you been a fan of mine, and have you lost any money or anything else because of that imposter?




CLOSING MESSAGE

CLOSING MESSAGE


Block. Report. Walk away.

You are not alone. You will not be fooled twice.

You are stronger than their script.

BLOCK/REPORT BEFORE IT BEGINS

Red Flags The Very First Message Includes

  • “You’ve won a special prize.”
  • I chose you personally.”
  • “Click this link to talk privately.”
  • Or they immediately ask you to move to Telegram, WhatsApp, Signal, or another private app—
  • 🚫 If you receive a text, email, or DM saying you've WON a prize or money — it is almost certainly a scam. 🚫


Immediately

  • Stop.
  • Do not click. 
  • Do not respond.
  • Report. Block. 
  • Walk away.    
  • Real opportunities don’t require secrecy.
  • Real people don’t rush trust.
  • Scammers do.


Types of Scams

  • Investment
  • Tesla
  • Bitcoin 
  • Stocks
  • Crypt
  • Prize Money
  • Recovery 


Notice How Imposter (Elon Musk)Pushes

  • Repetition and pressure: keeps telling you to “go and install it” and checks if you did.
  • False authority: claiming Signal is the only “safe and secure” way (that’s not true — it’s just safer for them to hide).
  • Urgency: within minutes they’re already following up (“Are you done or you fall asleep??”). That’s manipulative — designed to wear you down.

A real Musk (or anyone legitimate) would never:

  • Demand you install an app to keep talking.
  • Rush you with instructions like a drill sergeant.
  • Need to leave a public platform for “safety.”

How to Stay Safe

  • Be cautious when anyone you don’t know personally asks you to switch to Signal.
  • Verify identities independently (outside the app) before trusting.
  • Keep screenshots and copies of conversations — even if messages disappear, you can capture evidence.
  • Never send money, crypto, or personal information based on conversations that you don't personally know.

Money Hooks & Your Safety

  • If your “billionaire boyfriend” can’t send proof but sends you to Walmart for gift cards — 🚩 you’re being scammed.
  • “Invest for us” or “We’ll grow your future” = pig-butchering tactics.
  • Gift cards & wire transfers: No real person, agency, or company asks for these. This is scammer payment #1.
  • Your gut matters: If something feels off — stop, block, breathe. Scammers rely on your hesitation

Control, Fear, and Isolation

Isolation & Secrets


  • “Don’t tell anyone.”
  • “This is our secret.”
    Isolation is their #1 emotional weapon.


Emergencies & Sob Stories



  • Fake illnesses
  • Frozen accounts
  • Desperation pleas
    Designed to make you act with your heart, not your clarity.



AI Voice Notes / Fake Platforms

AI Voice Notes / Fake Platforms

  • AI-generated voices, videos, and screenshots are everywhere now.
  • Scammers use doctored websites and fake balances to appear legitimate.

Fake Platforms & Screenshots

  • Fake websites, fake balances, doctored images — all designed to look “official.”

“You Won” Something

  • Any unexpected prize, winnings, or money is ALWAYS a scam.
  • No real prize requires fees, codes, or secrecy.

Fake Government, Bank, or Legal Notices

  • Threats from “IRS,” “CFTC,” “police,” or “bank security” = almost always scams.
  • Real agencies do not contact you through apps.

Universal Response

STOP SCAM NOW RESPONSE

  • “I don’t move conversations to Signal or any other app — if you can’t continue here, then this isn’t real.”
  • Use this line once. If they persist, block immediately and save evidence (screenshots).

🛡️ IF YOU’VE BEEN SCAMMED: START HERE

Contact Your Bank Immediately

Your bank or payment app is your first line of defense.

Ask them to freeze transfers, reverse transactions, and reissue cards.

Block the Scammer Everywhere

Block on every platform:

X, Telegram, iMessage, WhatsApp, Signal, email, and any new “accounts” they make.

Secure Your Accounts

Change passwords for:

• Apple ID

• Email

• X / Twitter

• Telegram

• Banking apps

Enable two-factor authentication everywhere.


Save All Evidence

Keep everything:

messages, usernames, voice notes, screenshots, receipts, fake documents.

This protects you — and helps stop them from targeting others.


──────────────────────────

🛡️ Report the Scam 🛡 .

Report the Scam

Report to:

• FTC — https://reportfraud.ftc.gov

• IC3 (FBI) — https://www.ic3.gov

• X / Social Media — Use the in-app “Report” tools

• Telegram — https://t.me/spam

• WhatsApp — Settings → Help → Contact Us

• Apple Messages — Forward scam texts to 7726 (SPAM)

• Your Phone Carrier — Report spam texts/links


You’re not “in trouble.”  

You’re protecting the next person.


──────────────────────────

 

If you live outside the United States, use the reporting options below for your country or region.

Global Reporting Options

For readers outside the United States

Even if you are not in the United States, you still have the right to report scams, extortion, identity theft, and online manipulation. Below are official agencies that handle cybercrime worldwide:

🇪🇺 Europe

Europol – Online Fraud Reporting

https://www.europol.europa.eu

Handles major international scam rings, identity theft, investment fraud, and impersonation crimes.

European Cybercrime Centre (EC3)

Coordinates cross-border investigations and receives scam intelligence.

🇬🇧 United Kingdom

Action Fraud (National Fraud & Cyber Crime Reporting Centre)

https://www.actionfraud.police.uk

Report romance fraud, investment scams, impersonation, extortion, and online abuse.

🇨🇦 Canada

Canadian Anti-Fraud Centre (CAFC)

https://www.antifraudcentre-centreantifraude.ca

Collects reports on financial scams, extortion, identity theft, and online manipulation.

🇦🇺 Australia

Scamwatch (Australian Competition & Consumer Commission)

https://www.scamwatch.gov.au

Report any type of fraud, including romance scams and blackmail.

🌍 Anywhere in the World

Interpol – Cybercrime Resources

https://www.interpol.int

While individuals cannot file reports directly, Interpol provides guidance and works with national police on cross-border scams.

“The Crimes Behind the Scams”

Extortion / Blackmail

Behavior:

Threatening you with exposure, punishment, harm, or humiliation, including statements such as:

  • “I also have your video…”
  • “I will report you to the Grand Master…”
  • “You will face severe punishment…”

Applicable Federal Crimes:

  • ✔ 18 U.S.C. § 873 — Blackmail
    Demanding something of value (money, compliance, silence) under threat.
  • ✔ 18 U.S.C. § 875(d) — Interstate Extortion
    Applies to any electronic communication (text, WhatsApp, Telegram, social media) used to threaten or demand something.
  • ✔ 18 U.S.C. § 2261A — Coercive Harassment / Stalking
    Covers threats, intimidation, emotional manipulation, and psychological coercion intended to cause fear or compliance.

These threats qualify fully as federal criminal extortion, regardless of whether the content was fake, fabricated, edited, or never actually existed.







“The Crimes Behind the Scams”

Fraud (Romance Fraud / Pig-Butchering Scam)

Behavior:

Creating a false identity, forming a fake relationship, inducing trust, and manipulating you into sending money or assets.

Applicable Federal Crimes:

  • ✔ 18 U.S.C. § 1343 — Wire Fraud
    Every text message, call, or online communication used to deceive you constitutes a separate act of wire fraud.
  • ✔ 18 U.S.C. § 1349 — Mail/Wire Fraud Conspiracy
    Applies because multiple actors collaborated across platforms, bank accounts, usernames, and devices.
  • ✔ Identity Fraud & Impersonation
    Including impersonation of a public figure, fabricated companies, fake investment 

“The Crimes Behind the Scams”

Sex-Based Blackmail (“Sextortion”)

Behavior:

Threatening to release intimate content—real or fabricated—to force compliance, silence, money, or emotional submission.

Applicable Federal Crimes:

  • ✔ 18 U.S.C. § 2255 — Sextortion
    Classified under child sexual exploitation statutes when minors are involved, but adults are also protected under federal coercion and fraud statutes.
  • ✔ Classified by the FBI as Sexual Exploitation
    Any threat to disclose sexual content is treated as sexual extortion, a crime involving serious psychological harm, coercion, and abuse of power.

Even suggesting possession of intimate content or threatening “exposure” qualifies.

Tell One Safe Person

  • Scammers thrive in silence.
  • “They isolated us. Lied to us. Made us feel small.
  • But they forgot something powerful — we can find each other.
  • This isn’t just my story. It’s ours.”
  • #ScamSurvivors #WeStandTogether #EvidenceIsPower
  • Tell someone you trust so you’re not handling this alone.
  • Rebuild Your Financial Safety
  • Expect days of:
  • • canceling cards
  • • resetting autopay
  • • managing short-term bills
  • • cleaning up accounts
  • This is normal — and temporary.

Closing Message

⭐ Golden Rule

If anyone contacts you afterward with:

love, apologies, threats, forgiveness, “help recovering funds,”

or claiming to be “the real Elon”…

It’s the scammer again. Every time.

You didn’t “fall for it.”

You were targeted — because you’re human, trusting, and compassionate.

Awareness restores your power.

Action ends the cycle.

You move forward — stronger than before.

“FROM GROOMING to MONEY THE SCAMMER’S PLAYBOOK”:

Types of Scams

  • Impersonation scams: Fraudsters posing as Elon Musk, brokers, celebrities, or even friends move conversations to Signal to avoid platform moderation (like on X, Threads, or Telegram).
  • Investment scams: They’ll start on social media or dating apps, then ask to “continue securely on Signal” to push crypto or forex schemes.
  • Romance scams: Scammers build trust elsewhere, then move to Signal to isolate victims.
  • Recovery scams: Some claim they can recover stolen funds but insist on chatting only through Signal.

How trust becomes control — and control becomes financial loss.

  • Scammers follow a predictable psychological playbook.
  • It starts with grooming — affection, attention, connection — and ends with financial exploitation.
  • Understanding this pattern helps you stop the scam before you’re pulled deeper into their control.
  • Follow my instructions
  • Hurray up fast
  • Focus on me listen
  • Where is password
  • How much are you able to deposit into PayPal 
  • Alright, do that now


Grooming: The Emotional Setup

✔️ Love bombing

✔️ Fast emotional intimacy

✔️ Daily messages and routines

✔️ Trauma bonding

✔️ “Only you understand research.

✔️ Isolation from others


  • Requests for research or specialized help
  • Talking about medical crises or emotional trauma
  • Praise for how caring, smart, or important you are
  • “I need you” messages
  • Work that feels like you’re supporting a loved one


If someone online asks you to do unpaid emotional or research labor, they’re not bonding — they’re grooming.

Real public figures do not ask strangers for app lists or health research.


Manipulation: Psychological Control

✔️ Guilt

✔️ Ghosting

✔️ Mood swings

✔️ Pressure for secrecy

✔️ “Tests” of loyalty

✔️ Manufactured crise


Section: “Manipulation Through Tasks & Emotional Labor”

How Scammers Use “Help Requests” to Deepen Attachment

One of the most overlooked but powerful tactics scammers use is requesting emotional or intellectual labor. Not money — not at first. They ask for “help,” “input,” or “support” in ways that make the victim feel connected, useful, and valued.

This is what happened in the March 17 exchange.

Tactic: The “Work Bonding” Strategy

Scammers will:

  • Ask you to research something “important”
  • Request emotional support about someone’s illness
  • Pretend to need your expertise
  • Engage you in long, caring conversations
  • Position you as their trusted advisor or emotional anchor

This creates a false intimacy and tricks your brain into believing the relationship is real and reciprocal.

Why This Works

Helping releases oxytocin — the same hormone connected to bonding and affection.

The scammer then reinforces the bond with:

✔ Gratitude

✔ Vulnerable confessions

✔ “You’re the only one I trust” messages

✔ Emotional dependency

By the time the money request comes, victims often feel:

  • invested
  • responsible
  • connected
  • and emotionally tangled

Red Flag Checklist (from your email example):

  • Requests for research or specialized help
  • Talking about medical crises or emotional trauma
  • Praise for how caring, smart, or important you are
  • “I need you” messages
  • Work that feels like you’re supporting a loved one

What Victims Need to Know

If someone online asks you to do unpaid emotional or research labor, they’re not bonding — they’re grooming.

Real public figures do not ask strangers for app lists or health research.

Toolkit Note:

Your March 17 research email is a perfect example of how scammers create emotional entanglement long before money is involved. It should be included as a sample scenario under:

📌 “Chapter: Behavioral Manipulation Techniques”

📌 “Case File: Emotional Labor as Grooming”

📌 “Appendix: Real Victim Examples (Redacted)”


The Financial Hook

✔️ Wires

✔️ Cash App / Venmo

✔️ PayPal

✔️ Bitcoin

✔️ Gift cards

✔️ Fake invoices

✔️ Fees, penalties, investments

Love Bombing/Scam Tatic

  • "You're special... different from everyone"
  • "Good morning baby, I love you" Hope you slept well
  • bombing
  • "I was thinking
  • about you all night
  • "Good
  • Morning baby. I love
  • you." "
  • Words aren't enough... you're
  • special" "No matter how far... always in my
  • thoughts" "Are you love bombing
  • me?" → "Love it tell
  • me more"I'm doing all this for my love for you
  • Trust me
  • I'm here for you
  • Sweetheart 
  • Dear
  • Darling
  • Princess
  • Queen

How Scammers Use Verifiable Facts to Hook Intelligent Victims

Tactic: Self-Validated Deception

A scammer gives a detail that is:

  • unusual enough to feel personal
  • true enough to be verifiable
  • vague enough to fit any narrative

Then the victim looks it up, confirms it, and feels reassured by their own research, not by the scammer’s claim.

This is psychological mastery, not coincidence.

It works because:

  • You trust your own intelligence.
  • You verified it yourself.
  • Your brain registers “confirmation,” not manipulation.

This creates one of the strongest cognitive traps:

“If the detail is true, the person must be real.”

But the truth is:

Scammers borrow facts from real life to make the illusion harder to question.



Why “True Facts” Don’t Equal True Identity

Scammers often give accurate details because:

  • They know you’ll Google it.
  • They know you’ll confirm it.
  • They know confirmation makes trust grow.
  • They need the illusion to feel airtight.

Real fact ➜ Real trust ➜ Fake identity strengthened.

Never assume real-world accuracy equals real-world identity.


💡 Survivor Lesson

Being smart doesn’t protect you from this tactic —

it actually activates it.

Scammers reserved these high-level methods for you because you were the kind of person who checked, verified, questioned, and researched.

This wasn’t naïveté.

This was targeted psychological engineering.

Closing Message

If you recognize any of these patterns, pause.

You did not imagine it. You did not “fall for it.”

You were targeted — because you are human, trusting, and capable of deep connection.

Scammers use emotion the way pickpockets use distraction.

The moment you begin to see the pattern, their power fades.

“The Cycle Continues: Vanish → Return → Rebrand”

The Vanish

  • Scammers disappear to create confusion and emotional instability. Their silence is meant to make you doubt yourself, fear losing them, or feel responsible. It is a tactic — not affection.

The Return

  • When they reappear, it’s never random. They come back with excuses, apologies, or new stories. Their goal: test whether you’re still emotionally attached and regain control.



  • 💔“He is not returning to love me. He is returning to reattach me.”💔

The Rebrand

  • A scammer can reinvent themselves instantly. New username, new number, new platform. Sometimes they return pretending to be someone else entirely. The behavior, not the name, reveals them.



The Recovery Scam

  • After stealing money, scammers may return pretending to help you get it back. They pose as agents, officials, or “the real Elon.” They always ask for a fee. This is the second fraud — often worse than the first.

The Threat Cycle

  • If emotional tactics fail, scammers switch to fear. They may threaten to share messages or photos. These threats are manipulation tools — not real danger. Their power ends the moment you stop responding.

The Golden Rule

  • If someone returns with love, fear, forgiveness, or “help,” it is the scammer again — every time. Block, report, move forward.

Closing Message

Once you recognize their pattern, you break their control. Awareness ends the cycle — and you take your power back.


• Get in Touch • How can we help?

Please don’t include passwords, verification codes, bank details, or crypto seed phrases.

“Screenshots Welcome “
Attachments (0)

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Live, Lies & a Verified Name

annemarie@annemarieadvocate.com

Hours

Please note I reply within 48 hours, if you urgently require attention please not it in the description box.

My Blog

“Impersonators will stoop to anything — even fake intimate photos — to manipulate victims. I won’t share those images because they disrespect the real person they’re stealing from. But I will expose the tactics. My advocacy is about truth, not humiliation.”

FALSE FUTURE: THE DREAM THEY SELL TO CONTROL YOU

The Promise of a Life That Never Existed

Scammers don’t begin by asking for money.

  • They begin by offering a future.
  • They create a story so emotional, so intimate, and so believable that you start to picture yourself living in it. This is not love — it’s strategy.

How the Illusion Begins

They echo your hopes, your dreams, and your values… then build a fantasy around them.

Common false-future themes:

  • A shared home or life together
  • Marriage or family plans
  • Traveling as a couple
  • Deep emotional partnership
  • A destiny that feels “meant to be”

And then come the scripted emotional hooks:

  • “I’ve never felt this way about anyone.”
  • “Our future is so bright together.”
  • “You’re the person I’ve been waiting for.”
  • “Trust me — we’re building something real.”

Every line is crafted to disarm you.

The Future You Begin to Believe In

You start imagining things that feel natural:

  • Meeting in person
  • Spending holidays together
  • Supporting each other’s dreams
  • Building a life side by side

This is how emotional dependency forms.

Not because you’re weak — but because you’re human.

The Shift: When the Dream Becomes Control

Once you’re emotionally invested, their tone changes.

They begin using the future against you:

  • “If we’re going to build our life, I need you to trust me.”
  • “Love means supporting each other, even in hard moments.”
  • “Don’t let me down — we’re so close to everything we want.”

Suddenly the future feels like something you must protect…

even though they were never protecting you.

When the Future Falls Apart

  • Eventually, the promises unravel.
  • The excuses increase.
  • The affection fades.
  • The person vanishes.
  • And you’re left grieving a life that never existed.
  • But your heartbreak is real —
  • even if they weren’t.
  • You didn’t fall for a scammer.
  • You fell for the future they designed to trap you.

Why Good, Intelligent People Get Caught in This

  • Because future-talk is powerful.
  • Psychologists call this future faking —
  • promising love, commitment, or destiny to gain emotional control.
  • Anyone with empathy and a hopeful heart is vulnerable.


  • How to Break the Spell
  • Awareness breaks their control.
  • Pause when someone:
  • Promises a future too quickly
  • Avoids real-world consistency (video, calls, proof)
  • Speaks in dramatic, romantic scripts
  • Makes everything sound urgent or destined
  • Uses the “future” as a bargaining chip
  • A real future is built slowly.

A false one is offered immediately.

You were targeted because you’re capable of love —

not because you’re naïve.

Closing Message

The future they promised was never real —

but your emotions were.

Now you can see the pattern clearly.

Now you can protect your heart, your finances, and your peace.

You move forward with truth —

not fantasy.

AWARENESS of PIG~BUTCHERING a game of grooming.

About Pig-Butchering Scam

Pig-Butchering is a long-con scam where criminals slowly “fatten up” a victim with affection, trust, and fabricated success — before wiping out their money.

It is not random.

It is a system.

This scam blends:

  • emotional manipulation
  • romance or companionship
  • fake investment platforms
  • high-pressure coaching
  • identity fraud (often impersonating public figures)
  • technology exploitation

It’s the fastest-growing scam globally — and the least understood.

Targeting & Grooming/Affection & Emotional Bond/The Hook

 They find you where you already are — X, Threads, Telegram, Instagram, Facebook


They study your communication style and mirror it.

They appear respectful, intelligent, spiritual, and supportive.

They are unlike other scammers


They introduce:

  • Bitcoin
  • crude oil
  • investment apps (Kraken, Edge Wallet)
  • exclusive tips
  • “only for you”


The Setup/The Slaughter

You are asked to:

  • Download a wallet or trading app
  • Send a “test amount”
  • “connect your bank”
  • “Verify your identity” 

The wipeout.

The dashboard crashes, the account freezes, or they demand more money.

Then—

they vanish.



Real Messages from a Pig-Butchering Scam

A psychological game of grooming, trust-building, and financial destruction — wrapped in affection, false identity, and “investment opportunities.”

Grooming

Grooming is the opening phase of a Pig-Butchering scam. The scammer builds comfort, trust, and emotional closeness through daily conversation, validation, and affection. They make the victim feel seen, understood, and special — creating an illusion of genuine connection. This emotional foundation makes the victim more vulnerable to later manipulation.

Emotional guilt

Once trust is established, the scammer introduces guilt to control the victim’s responses. They act hurt, disappointed, or offended when the victim hesitates, setting a pattern where the victim feels responsible for maintaining the scammer’s emotional well-being. Guilt becomes a tool to keep communication active and compliance high.

Investment Push

During this phase, the scammer introduces a “life-changing opportunity,” usually involving cryptocurrency, trading, or business deals. They promise high returns, guaranteed success, or exclusive access. Emotion and trust are leveraged to make the financial request feel natural — even loving. This is the core of the financial exploitation.

Gaslighting/Pressure

When the victim hesitates, the scammer increases pressure. They dismiss concerns, challenge the victim’s judgment, and create urgency. Gaslighting may involve statements like “you’re overthinking” or “don’t lose this chance.” The goal is to break down resistance and push the victim into fast, uncritical decisions.

The “you owe me” script

The scammer creates a false sense of obligation by reminding the victim of the time, attention, and emotional support they’ve provided. They frame the relationship as reciprocal — implying that financial participation is proof of loyalty or affection. This manipulates victims into acting out of duty instead of logic.

Spiritual Manipulation

Some scammers invoke God, destiny, soul-connections, or divine purpose to strengthen emotional ties. By framing the relationship as spiritually meaningful or fated, they create a powerful emotional bond that overrides logic and amplifies trust. This is especially effective with empathetic or faith-based individuals.

Dream talk/Love-bombing

The scammer paints vivid pictures of a future together — travel, marriage, family, or shared success. They overwhelm the victim with affection, attention, and promises. Dream talk deepens emotional investment and makes the financial requests feel like steps toward a shared life.

The cruelty phase The discard phase

Once the scammer has extracted the maximum money or senses the victim is no longer compliant, they disappear. This may include blocking, deleting accounts, or leaving messages unread. Some scammers return later with new identities, new stories, or “I was scammed too” narratives — beginning a new manipulation cycle.


CONTINUATION PIG~BUTCHERING

More Pig- Butchering Material

A deeper look into how pig-butchering scams evolve over time. This section expands on patterns, behaviors, and psychological tactics that victims commonly face, helping you recognize subtle manipulation long before money enters the conversation.

Real Messages

Actual messages from scam attempts (anonymized for safety). These examples reveal how scammers craft trust, mirror your emotions, and adjust their tone to reel victims in. Once you see the patterns, they become unmistakable.

Comeback Cycles

Scammers rarely disappear forever — they “vanish,” then return with new stories, new identities, or new emotional hooks. This section breaks down the comeback cycle, why they do it, and how to protect yourself after the first escape.

Shakepay Examples

Specific examples of how scammers misuse real financial apps like Shakepay to create fake legitimacy. Learn to identify fraudulent transfers, staged screenshots, and digital illusions meant to pressure “investment.”

Scammer Tactics

  • A breakdown of the professional methods scammers use to manipulate emotions, create urgency, isolate victims, and gain financial access. Understanding the strategy helps you break the spell before it tightens.

Spotting Mask Rotation Early

These early red flags mean a rotation is beginning:

  • Multiple “trusted insiders” suddenly appear.
  • A new person claims to “know” the celebrity or to work on their team.
  • New platforms or dashboards are introduced quickly.
  • The tone shifts dramatically between contacts (corporate → spiritual → familial → legal).
  • You are encouraged to isolate from others.
  • You’re pressured to move fast, trust fast, or invest fast.


Screenshot Descriptions

.Clear explanations of the screenshots shown across the toolkit — what they represent, why they’re dangerous, and the red flags hidden inside each one.

Why Victims Stay

  • Emotional bonds, trauma-bonding, shame, fear, hope, and the simple human desire to be believed. This section explains the psychological grip scammers create — not because victims are weak, but because they are human.
  • Why I Believed Again and Again
  • What allowed me to believe not just one, but several different people—each one more clever than the next?
  • It wasn’t because I lacked intelligence. It wasn’t because I was blind. It was because they studied me. They listened to my grief, my longings, my memories of love, and then they spoke them back to me as if they were their own.
  • The first one found me in the rawness of loss and offered comfort.
  • The next wrapped that comfort in promises of wealth, security, and belonging.
  • Another bound it with secrecy, making me feel chosen, as though our connection was sacred.
  • Each step, each lie, was tailored to my vulnerabilities—loneliness, loyalty, and the need to believe in something bigger than myself.
  • And so I believed because my heart wanted love to be true so badly that I ignored the jagged edges of deceit. Because each crumb they dropped was just enough to convince me to starve a little longer.
  • I see now that it wasn’t weakness—it was hope.
  • And hope, when twisted by clever hands, can become the cruelest weapon of all.
  • ✨

How Scammers Return

Scammers track emotions, waiting for moments of vulnerability — holidays, anniversaries, loneliness, or financial stress — to re-appear. This section explains how they monitor and time their re-entry.

Proof Tricks

The “proof” scammers send — videos, photos, voice messages — are all part of the performance. Here you’ll find the most common proof tricks and learn why none of them confirm identity.

Emotional Hooks

The phrases and emotional triggers scammers rely on to build devotion, loyalty, or guilt. Understanding these hooks helps you recognize manipulation instantly.

Financial Scripts

The polished scripts scammers use for transferring money, creating urgency, offering fake investment returns, or claiming emergencies. Once you’ve seen the script, you cannot be fooled by it again.

How to Break the Spell

A gentle but powerful guide to recognizing manipulation, detaching emotionally, reclaiming control, and stepping out of the scam with clarity and strength. A reminder that you are not alone — and never were

Continuance of Scripts Specifically for Pig-Butchering Scams

Scammer Messages: Scripts for Cutting Ties & Reclaiming Power

These scripts are for you — to shut down scammers, protect your heart, and reclaim your voice. Use them as-is, or adjust a few words so they sound like you.

Firm & Final (Use when you are 100% done)

Firm & Final Script

“I know this is a scam. Do not contact me again. I’m reporting and blocking you now.”

Calm & Neutral (For a clean, quiet exit)

Calm & Neutral Script

“I will not be downloading apps or sending money. This conversation is over. Goodbye.”

Short Cut‑Off Lines

Use these when you want to end it quickly, without getting pulled into a back‑and‑forth.

  • “This conversation is over. I know what you are doing. I’m reporting this.”
  • “I will not send you money or personal information. Do not contact me again.”
  • “I’ve recognized this as a scam. I am ending this conversation now.”

Exposing the Scam (When you want to name what they did)

These are for when you choose to speak the truth out loud — for yourself, not for them.

  • “You lied. You used someone else’s identity to hurt people. I’m not staying silent.”
  • “You’re part of a global scam operation, and your manipulation is textbook. I’ve documented everything.”
  • “You targeted me because I have a heart. But you forgot — I also have a voice, and I’m using it.”
  • “I’ve spoken to experts. Your patterns match Pig‑Butchering scams perfectly.”

Reclaiming My Story (Heart‑strong responses)

These are for those moments when you want to close the door with dignity and truth.

  • “You made me believe in something beautiful, only to weaponize it against me. I won’t let your lies define me.”
  • “You pretended to love me, but I found the strength to love myself more.”
  • “Blocked, reported, and documented. You’ve been added to the database of known scammer activity.”
  • “The love I gave was real. The person you pretended to be was not.”

Anne’s Personal Power Scripts

These are your anchor lines — they belong to you as much as your name does. Keep this box as a special section.

1. My Boundary Script

“I refuse to be controlled through chaos or urgency. If this can’t be calm, it can’t continue.”

2. My Clarity Script

“I know what manipulation feels like now, and I won’t step into that space again.”

3. My Spirit Script

“My faith is my strength — not a doorway for someone else’s power.”

4. My Detachment Script

“I choose what honors me. Everything else can fall away.”

5. My Closure Script

“The love I gave was real. The person you pretended to be was not. I walk forward with truth, not fear.”

How to Use These Scripts

These scripts are not about changing a scammer’s mind — they are about protecting your own. Use them when you feel pressured, confused, or emotionally exhausted. You are never obligated to explain, justify, or defend yourself to someone who is lying to you. Your silence can be power. Your “no” can be holy.

Closing Message

Tonight, I don’t need to fight. I don’t need to analyze. I just need to rest.

And maybe remember this:

I wasn’t broken. I was worn down.

But even worn down, a soul can rise again.

And maybe — just maybe — that rising begins with letting go.

🌹 Need to Talk?  

If something feels confusing, pressured, or wrong — please know you’re not alone

“If something feels confusing, pressured, or wrong — please know you’re not alone. You don’t have to face manipulation, fear, or threats in silence. Reach out, pause, and remember: no genuine person will rush or pressure you.”


Anne Marie’s Scam Awareness Lifeline

Subscribe

Monthly News

Everything you read here begins with my own words — my memories, records, and lived experience.

I use AI as a writing tool (similar to an editor) to help me organize, clarify, and polish what I have already written.

AI does not replace my voice or invent my truth.


© 2025 ANNE MARIE HORTON. ALL RIGHTS RESERVED.

UPCOMING BOOK: LIVE, LIES & A VERIFIED NAME

LEGAL TERMS USED IN THIS TOOLKIT ARE PRESENTED IN GENERAL FORM AND MAY ALIGN WITH UNITED STATES FEDERAL LAW. READERS OUTSIDE THE U.S. SHOULD CONSULT LOCAL CYBERCRIME AND CRIMINAL CODES, AS DEFINITIONS AND ENFORCEMENT VARY BY COUNTRY.

🌟 THIS WEBSITE SHARES PERSONAL EXPERIENCE AND SCAM-AWARENESS CONTENT ONLY. IT DOES NOT PROVIDE LEGAL, FINANCIAL, MEDICAL, PSYCHOLOGICAL, OR OTHER PROFESSIONAL ADVICE. IF YOU BELIEVE YOU ARE BEING TARGETED, THE SAFEST FIRST STEPS ARE OFTEN TO STOP ENGAGING, SAVE EVIDENCE, REPORT THROUGH OFFICIAL CHANNELS, AND BLOCK.





Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept