Scam Defence Project exists because the people who most need fraud awareness are rarely the ones who seek it out — and by the time most people learn how scams work, they have already been targeted.
"The people who fall for scams are not careless or naive. They are human. Scammers are behavioral engineers who exploit the same four emotional levers across every scam type, every medium, and every demographic. The specific disguise changes. The skeleton never does. Our goal is to give people the skeleton."
Most fraud prevention advice arrives too late — after someone has already lost money, trust, and peace of mind. Generic tips like "be careful online" do not protect anyone. What protects people is knowing the specific patterns that scammers actually use, and the specific defenses that actually work.
Every resource we publish is grounded in documented victim testimonies, FTC fraud data, and behavioral psychology research on how scammers exploit the human nervous system. Not hypotheticals. Not general advice.
Our research draws from three sources: real victim testimonies collected from FTC reports, consumer advocacy interviews, and direct accounts — FTC fraud data on what is actually happening at scale across the United States — and behavioral psychology research on why these tactics work on everyone, regardless of intelligence, education, or experience.
Nothing in our resources is theoretical. Every pattern described, every red flag listed, every psychological mechanism explained is drawn from documented real-world cases.
We do not shame victims. We do not suggest that falling for a scam is a failure of intelligence or character. Research consistently shows that overconfidence is itself a risk factor — people who believe they "would never fall for this" are precisely the people scammers target.
Our approach is education before exposure. We give people the structural skeleton of how scams work so that when a new variation appears, they can recognize it regardless of the specific disguise.
We track emerging fraud tactics actively. AI voice cloning, deepfake video calls, autonomous scam agents, and synthetic identities represent a fundamental shift in how fraud operates. The traditional tells — typos, foreign accents, suspicious formatting — are disappearing.
Our resources cover the current threat landscape in full, including verification protocols specifically designed for the AI era.
10 real scenarios. 3 minutes. A personalized blind spots report based on your specific answers.
Take the free quiz →