
FLOYD COUNTY SHERIFF'S OFFICE

Popular SCAMs
How to Protect Yourself
While each scam operates differently, the best defense is to remain cautious of any unsolicited contact that demands immediate action, payment, or personal information. Legitimate agencies and businesses do not request sensitive information or payments over the phone, via text, or through email links. Always take the time to verify the source independently using official phone numbers or websites, never trust caller ID alone, and avoid sending payments or providing information unless you are absolutely certain of who you are dealing with.
Jury Duty
Scammers posing as law enforcement officers, court officials, or government representatives call individuals claiming they failed to report for jury duty. They often say a warrant has been issued for the person's arrest unless an immediate payment is made to "clear" the charges. Victims are instructed to pay fines through wire transfers, prepaid cards, or cryptocurrency to avoid being arrested.
Publisher's Clearing House
In this scam, individuals receive calls, emails, or even in-person visits informing them they’ve won a large cash prize or luxury item from Publisher’s Clearing House or a similar organization. Before receiving their "winnings," victims are told they must first pay taxes, insurance fees, or legal processing costs. In some instances, you receive mail requesting you cash a fraudulent check and transfer some of the money back to the scammer. Scammers often create a false sense of excitement and urgency to push victims into paying quickly.
Funeral Homes
Fraudsters monitor online obituaries and contact grieving families, pretending to be from the funeral home handling the arrangements. They claim there are urgent, unexpected fees that must be paid immediately for services such as additional transport costs, permits, or administrative processing. These calls often come when families are most vulnerable and emotionally overwhelmed.
Phishing/ Smishing
Phishing scams involve fraudulent messages that appear to come from reputable organizations, such as banks, government agencies, or online retailers. Victims may receive an urgent email or text stating there is a problem with their account, a missed delivery, or suspicious activity. They are directed to click on a link or call a number, which leads them to fake websites or scammers posing as customer service representatives seeking sensitive information.
Medicare
Scammers impersonate Medicare representatives and contact individuals, often seniors, under the guise of updating records or offering new benefits. They request sensitive information such as Social Security numbers, bank details, or Medicare numbers. Some scams involve fake calls offering free medical supplies or insurance services, only to steal personal identities or commit billing fraud against Medicare.
Romance
Romance scams occur when a fraudster establishes a fake relationship with someone online through social media, dating apps, or other online platforms. After gaining the victim’s trust and affection over time, the scammer fabricates an emergency—such as medical issues, legal troubles, or travel expenses—and asks for money. These scams often involve elaborate, emotionally charged stories to exploit the victim’s feelings.
Bondsman
In bondsman scams, scammers contact the family members of individuals who have actually been arrested and are in jail. They pose as legitimate bondsmen or court officials, claiming they can secure the individual's release, sometimes under the condition of wearing an ankle monitor. They demand that the family pay "ankle monitor fees" or other associated costs upfront before release. These scammers prey on the urgency and emotional distress of families desperate to help their loved ones.
Toll Violation Notice/ Peach Pass
This SCAM is one of many types of phishing/ smishing methods by scammers. Victims receive a text message claiming they owe money for an unpaid toll violation. The message often warns that failure to pay immediately will result in suspension of their vehicle registration or driver’s license. The text includes a link to "resolve" the violation, but it is a scam designed to steal credit or debit card information through a fake payment portal.
IRS
Scammers impersonate Internal Revenue Service (IRS) agents, informing victims that they owe back taxes and must pay immediately to avoid arrest, deportation, or license suspension. They often use spoofed phone numbers to appear legitimate and employ fear tactics, insisting that victims must act without delay. Some scams also involve follow-up fake "case managers" to seem more convincing.
Online Shopping
Scammers create fake websites, online ads, or social media profiles pretending to represent well-known, reputable companies. They offer heavily discounted products to lure victims into making purchases. After payment is made, the product never arrives, or the victim's credit or debit card information is compromised for further fraudulent use.
Unauthorized Purchase
Victims receive calls, texts, or emails stating that their credit or debit card has been declined, compromised, or involved in suspicious activity. In many cases, scammers claim there was a large unauthorized purchase made on the account and ask if the victim recognizes it. If the victim denies making the purchase, they are instructed to "verify" their card number, expiration date, security code, or even online banking credentials. These scams are designed to steal card information and gain access to the victim’s accounts.
Sextortion
Victims believe they are building an online relationship with someone they met through social media, dating apps, or messaging platforms. The scammer quickly escalates the conversation by sending provocative photos and encourages the victim to share similar intimate images. Once the victim responds, the scammer manipulates and crops the conversation to create damaging material. They then threaten to release the explicit images to the victim’s friends, family, or employer unless payment is made. Even after payment, the extortion typically continues, with scammers repeatedly demanding more money.
Employment SCAM
Victims are contacted through text messages, emails, or online ads advertising attractive job openings with excellent pay and benefits. The "employer" often conducts a fake hiring process and requests personal information under the guise of background checks or payroll setup. In some cases, they also ask for banking details to "set up direct deposit." The scammer uses the information to steal identities, access financial accounts, and potentially compromise the victim’s credit or debit cards.
Account Cloning
Scammers target Facebook accounts that have public friend lists and create a duplicate account using the victim’s name, profile picture, and other publicly available information. They then send friend requests to the victim’s friends, making the cloned profile appear legitimate. Once connected, the scammer often sends private messages with sympathetic stories, such as needing emergency financial help, in an attempt to scam the victim’s friends out of money.
All Scams
While this list highlights many common scams, it is impossible to cover every tactic scammers use. For many criminals, scamming is a full-time operation. They continuously invent new scams, refine existing ones, and adapt their tactics to current events and trends to increase their chances of success. Popular scams are frequently updated with new twists to bypass public awareness and exploit new vulnerabilities. Staying informed, alert, and skeptical of unsolicited communication is critical, as scammers are relentless in their efforts to steal personal information and money.
Don't Be Scammed!
-
Be skeptical of unsolicited calls, texts, emails, or messages — especially those asking for money or personal information.
-
Never click links or open attachments from unknown sources.
-
Verify independently — contact the company, agency, or person using a trusted phone number or official website.
-
Avoid quick decisions — scammers create urgency to pressure you into acting without thinking.
-
Never pay with gift cards, wire transfers, cryptocurrency, or other untraceable methods.
-
Protect personal information — don't share Social Security numbers, banking details, or passwords with unknown or unverified contacts.
-
Use strong privacy settings on social media and limit the information you make public.
-
Trust your instincts — if something feels suspicious or too good to be true, it probably is.
