The Weaponization of Urgency: Scammers Exploiting Crisis
Dubai Police recently issued a high-priority warning regarding fraudsters exploiting the current Middle East crisis. These scammers impersonate employees from the "Dubai Crisis Management" department, falsely claiming links to law enforcement to harvest sensitive data, their primary goal involves obtaining UAE Pass credentials and Emirates ID details.
I read this warning from the RCMP in Castlegar (a small town in British Columbia Canada) and while the details are vague as to what service providers are calling and what tale they are spinning but it is worth writing about.
The evolution of Business Identity Compromise represents a significant shift in corporate fraud. Scammers now leverage generative artificial intelligence to bypass traditional security filters and exploit the natural trust between colleagues.
Moving identity verification from websites directly into the operating system of a device creates a permanent phishing season for every user in North America and beyond.
The Singapore Police Force (SPF) issued a formal advisory on February 26, 2026, regarding a surge in Business Impersonation Call (BIC) scams. Since early 2025, at least ten reported cases resulted in staggering losses exceeding $13.5 million.
Police in New Castle County and various international jurisdictions report a resurgence of fraudulent letters claiming recipients missed jury duty. These operations merge traditional mail fraud with digital extortion to exploit victims globally.
I just realized I have been mentioning Digital Footprint in a number of articles but have yet to post an article on the to
The Federal Trade Commission issued a stern warning this week regarding a surge in fraudulent unemployment claims. Many individuals are receiving official letters about benefits they never requested. Receiving such a document serves as a definitive indicator of identity theft. This trend aligns with alarming global projections for 2026.
Another high pressure personation scam is currently targeting individuals by exploiting the names of reputable government entities, specifically CISA (the Cybersecurity and Infrastructure Security Agency) and the MHS GENESIS health record system.