The Language Of Cybercrime Cybercriminals have learned to refine the language they use in scams, making scams harder to detect and more likely to fool potential victims.
NPR logo

The Language Of Cybercrime

  • Download
  • <iframe src="https://www.npr.org/player/embed/779386167/780713541" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript
The Language Of Cybercrime

The Language Of Cybercrime

  • Download
  • <iframe src="https://www.npr.org/player/embed/779386167/780713541" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript

RACHEL MARTIN, HOST:

Romance scams are the type of cybercrimes most people are sure they would never fall for. But the FBI says victims reported losing $211 million in 2017. And last year, losses jumped to over $350 million. As NPR's Martin Kaste reports, the scammers have turned manipulating people into a science.

MARTIN KASTE, BYLINE: It's an old grift - older than the Internet. You make a long-distance love connection, but soon you're being asked for money. To understand why it still works, it helps to talk to a victim.

TEXAS MOM: Hi, I'm a single, working mom in Texas.

KASTE: And for our purposes here today, that's what we're going to call her - Texas Mom. Few people in her life know this story, and she wants to keep it that way. It started about three years ago, after her divorce, when she tried online dating. She found a match, a guy with a nice picture and an Austin area code. There was just one thing.

TEXAS MOM: Before I ever spoke to him, he said, well, I have an accent. And I'm like, well, you know, that's OK. And then he told me, you know, the Italian story.

KASTE: He said he'd grown up in Milan. And she could look past the accent, given the way he talked to her.

TEXAS MOM: Just very complimentary, understanding and someone who had a real interest in me, which was new to me.

KASTE: Now, it's important to point out here that Texas Mom knew very well that this could be fake. She was a little suspicious when a job took him out of the country right before they could meet. And her suspicion grew. And he contacted her from South Africa. He said he'd been hacked, couldn't get access to his money and had an emergency expense at work. Could she help him?

TEXAS MOM: I started crying, and I said to him, I've heard stories about scammers. And he's like, oh, no, no, no. Forget it. Forget I even asked. And he really tried to make me feel better, but I was very upset.

KASTE: And yet she didn't cut things off. She eventually sent him money - again and again. He had unexpected travel expenses. He was being fined by abusive government officials. It was one thing after another.

TEXAS MOM: It's that gambling scenario. It's like, OK, now, if I give him a little bit more, I can get that back. That's what you keep telling yourself, and that's what he keeps telling you.

JOHN WILSON: It's hard to comprehend. And yet, when she explains it, it starts to make sense as to how somebody could fall for this.

KASTE: John Wilson is field chief technology officer with Agari, a cybersecurity company. And he's impressed by the amount of research that goes into these romance scams.

WILSON: The folks that get roped into these things are very carefully selected. They know, demographically, the people that are going to be most susceptible. They have these playbooks that we've seen.

KASTE: The playbooks are scripts, conversational gambits for a variety of situations that might come up in conversations with victims, which scammers have refined over time. When a certain kind of sweet talk works, they make a note of it and share it in their network. Looking back, Texas Mom seems almost fascinated by what happened to her.

TEXAS MOM: You know, the best way I could describe it is that you have two brains when you have this excitement or these feelings of love or passion - because you know it's wrong, and you've read stories about it, and people are telling you. You would tell your best friend, you're crazy, don't do it. But then, you do it.

KASTE: And there's another piece to this manipulation. The victims start to lie to friends and family to cover what's happening. They start to participate in the deception. Texas Mom remembers how she went from bank to bank, borrowing money to send to South Africa. One of the bank's suspected she was being conned and made her talk to a fraud investigator.

TEXAS MOM: The fraud investigator on the phone said I would strongly advise you not to do this. And I sat there and I said, OK, I won't do it. And they're like, OK. Wow, you're really smart. And then I went somewhere else and did it.

KASTE: And when the victims start covering for the scammers like this, there's a danger that they'll take the next step and become accomplices.

NOWELL AGENT: We have found several individuals who started off with a romance scam.

KASTE: This is the FBI supervisory special agent in charge of the criminal cyber squad in Houston. His name is Nowell Agent (ph).

AGENT: So Agent is my last name.

KASTE: Which makes him special agent Agent - just to get that distracting detail out of the way. Anyway, Agent spends a lot of time tracking cybercrime networks. And that often means tracking money mules. Those are the people here in the U.S. who set up American bank accounts for foreign scammers. Basically, they're helping them to move money stolen from other Americans. Agent says, sometimes, the accounts are owned by victims of romance scams, who take a chance doing this to try to get back some of the money they lost.

AGENT: They're going to get a percentage of the money that goes through their account. So even though they were suspicious, and even though they felt that there was something malicious going on, they were also making money.

KASTE: Other times, the romance scam victims are blackmailed into being money mules. Here's John Wilson, again, with Agari.

WILSON: Very often, the victim has perhaps sent compromising photographs, may have moved money once or twice or something. When they say they want to get out, that's when they may be reminded, hey, I have pictures of you. You moved this money through your bank account. You're part of this now.

KASTE: But in the case of Texas Mom, this did not happen. She bucked the trend and never became a money mule. Instead, she got a warning. Late last year, Wilson's company, Agari, was investigating a gang of scammers based in South Africa. And they saw that the gang was talking to a woman in Texas. Wilson says they had to step in.

WILSON: You know, we took a big risk. There was a very good chance that this woman was simply going to tell her, quote-unquote, "boyfriend," hey, I got this really weird call today. There's this company that thinks you're so-and-so. And, you know, what do you make of that?

KASTE: But Texas Mom believed them. She says these strangers - these cybersecurity guys provided the confirmation that she needed.

TEXAS MOM: I had to know that they were a scammer. And this was finally the evidence that proved that to me.

KASTE: And then, a rarity in these cases, some justice was done. Agari connected her with the Secret Service, which alerted the South African authorities, and they set up a sting. She sent her fake boyfriend one last loan, and the police there arrested a group of Nigerians as they picked up the money. Still, the damage was done. All told, she says she sent her fictional friend nearly half a million dollars.

TEXAS MOM: The person really did break my heart because I believed everything that they told me. I had to change the way I thought about myself.

KASTE: The money's probably not recoverable, and she's mired in debt. Uncomfortable as it is for her to talk about what happened, she decided she should because she figures other people are being conned right now with the same playbook. And they're probably also hiding the truth from themselves and others the same way she did. Martin Kaste, NPR News.

SOUNDBITE OF DJ KRUSH'S "DUST TRAIL")

Copyright © 2019 NPR. All rights reserved. Visit our website terms of use and permissions pages at www.npr.org for further information.

NPR transcripts are created on a rush deadline by Verb8tm, Inc., an NPR contractor, and produced using a proprietary transcription process developed with NPR. This text may not be in its final form and may be updated or revised in the future. Accuracy and availability may vary. The authoritative record of NPR’s programming is the audio record.