Letters to the Editor — Dec. 10, 2025

Anatomy of a scam

Internet scammers exploit psychological tactics, urgency, and impersonation to convince victims to surrender money or personal data. Typical approaches include phishing emails, counterfeit websites, and deceptive phone calls.

Recently, I was targeted by a pop-up message on my laptop claiming it was locked and instructing me to call “Microsoft Fraud Support.”

The so-called tech support team requested remote access to my computer, falsely reported illegal activity, and manufactured an urgent scenario involving threats of federal investigation tied to my bank accounts.

Their pressure escalated as they demanded I transfer money to avoid arrest, asked for photographic proof of cash and receipts, and even arranged a courier pickup.

Recognizing the situation as fraudulent, I took immediate action: I contacted the FTC, filed police reports, cut off communication with the scammers, and visited a computer repair shop.

The technician discovered and removed malicious backdoor files from my device.

To protect yourself from such scams, use reputable antivirus software, consider employing a VPN for secure online transactions, and store sensitive documents in the cloud with trusted providers.

Be skeptical of unexpected messages or calls that demand urgent action, especially those requesting money transfers or personal information.

Always verify claims independently before taking any steps and report suspicious incidents to relevant authorities.

Vigilance and prompt action are key to minimizing the risks posed by increasingly sophisticated internet scams.

Additionally, regularly update your operating system and all installed applications to patch security vulnerabilities that scammers might exploit.

Jay Sakas

Sequim