PROJECT: HOW TO IDENTIFY THE RED FLAGS, VERIFY ONLINE IDENTITIES, AND PROTECT YOURSELF BEFORE YOU SEND MONEY (PART 2)
- 3 days ago
- 10 min read
PLEASE SHARE THIS PUBLIC DOCUMENT.
THE MOST DANGEROUS MOMENT IS OFTEN JUST BEFORE THE FIRST PAYMENT
In Part 1, Specialised Security Services explained how romance scammers, AI love scammers, and catfishers build trust,
create emotional dependency, isolate victims from reality, and prepare the ground for financial exploitation.
By the time a victim is asked for money, the scam is often already advanced.
READ PART 1 HERE:
The criminal has usually already achieved several critical objectives:
Emotional trust.
Routine contact.
Psychological influence.
Secrecy.
Defensive loyalty from the victim.
Reduced family interference.
A false sense of future commitment.
The victim’s willingness to ignore warning signs.
This is why the moment just before the first payment, first private image, first banking detail,
or first “small favour” is often the most dangerous point in the entire scam.
That is the moment where a suspicious online relationship crosses over into an active criminal exploitation process.
Specialised Security Services warns the public in the strongest possible terms:
If a person you have never safely and independently verified begins asking for money, emotional secrecy,
urgent assistance, intimate content, or access to your personal world, you are not dealing with love –
you are dealing with a criminal operation.
WHY VICTIMS MISS THE RED FLAGS:
One of the greatest misunderstandings about romance scams is the belief that the warning signs are always obvious.
They are not.
In many cases, the red flags are deliberately introduced slowly, subtly, and strategically so that the victim becomes accustomed to them.
The scammer does not begin with obvious fraud.
The scammer begins with:
Attention.
Validation.
Sympathy.
Consistency.
Emotional warmth.
Shared values.
Future promises.
Manufactured trust.
By the time the first contradiction appears, the victim may already be emotionally invested.
This causes the victim to:
Excuse the strange behaviour.
Ignore inconsistencies.
Accept poor explanations.
Rationalise cancelled meetings.
Defend the scammer to family.
Minimise requests for money.
Believe “this is temporary”.
Prioritise emotion over proof.
This is why practical verification is critical.
THE FIRST RULE: NEVER TRUST A PROFILE, A PHOTO, OR A VOICE WITHOUT VERIFICATION
In the modern digital crime environment, appearances can no longer be accepted as proof:
A profile can be fake.
A photograph can be stolen.
A video can be manipulated.
A voice note can be cloned.
A polished message can be AI-assisted.
A “live call” can still be deceptive.
This means the old approach of saying:
“But I saw his face,”
“But she sent me voice notes,”
“But he video called me,”
“But the profile has many photos,”
“But she sounds sincere” is no longer enough.
Specialised Security Services strongly advises the public to understand this critical reality:
Digital familiarity is not identity verification.
A scammer’s greatest weapon is not only false identity – it is the victim’s willingness to accept emotional evidence instead of factual evidence.
THE PRIMARY RED FLAGS THAT MUST IMMEDIATELY TRIGGER SUSPICION:
The following red flags should never be dismissed, especially when several appear together:
1. RELATIONSHIP RED FLAGS:
The person becomes emotionally intense unusually quickly.
They speak about commitment, destiny, or marriage too early.
They say “I love you” before genuine, real-world trust exists.
They create a feeling of exclusivity before proper verification.
They want the relationship kept private.
2. IDENTITY RED FLAGS:
They avoid meeting in person.
They repeatedly postpone travel or meetings.
They claim to be overseas, deployed, offshore, on a remote contract, or travelling constantly.
Their work story explains every delay too neatly.
Their timeline does not make practical sense.
Their social media history looks shallow, inconsistent, or unusually curated.
Their profile appears too polished or too “perfect”.
3. COMMUNICATION RED FLAGS:
They insist on moving off the original platform quickly.
They avoid stable live video calls.
Video calls are brief, low-quality, poorly lit, or strangely interrupted.
They refuse natural, real-time interaction.
Their tone, language, or grammar changes unexpectedly.
Their personal details shift over time.
4. CONTROL RED FLAGS:
They discourage family involvement.
They make you feel guilty for asking questions.
They accuse you of not trusting them.
They frame verification as an insult.
They create emotional pressure when you hesitate.
They ask for secrecy “for now”.
5. FINANCIAL RED FLAGS:
They mention a temporary problem.
They hint at financial difficulty before directly asking.
They request “just a small amount”.
They ask for urgent help.
They say they are embarrassed to ask.
They promise quick repayment.
They ask for gift cards, crypto, cash transfers, third-party payments, or unusual payment methods.
They claim a parcel, customs issue, medical emergency, travel problem, or banking issue
6. ESCALATION RED FLAGS:
Every time you question them, a new crisis appears.
Just before meeting, something “goes wrong”.
They ask for private photos or sensitive content.
They begin making you responsible for solving their life problems.
The relationship becomes a cycle of affection, crisis, apology, and renewed dependence.
If these signs are present, the matter must be treated as a potential active criminal scam,
not as a normal relationship complication.
HOW TO VERIFY AN ONLINE IDENTITY PROPERLY:
The public must stop relying on emotional impressions and start using practical verification methods.
Below are some of the most important steps:
1. REQUIRE A REAL-WORLD MEETING IN A SAFE, CONTROLLED ENVIRONMENT:
If the person claims to be serious, there must eventually be a real, safe, in-person meeting in a public setting.
Repeated refusal, delay, or excuse-making is a major warning sign.
2. REQUIRE CONSISTENT, NATURAL LIVE VIDEO INTERACTION:
A short, poor-quality, heavily interrupted video call is not enough.
Look for:
Normal lighting.
Natural conversation.
Spontaneous interaction.
Willingness to answer practical questions in real time.
Consistency between appearance, voice, background, and story.
3. CHECK WHETHER THEIR LIFE STORY ACTUALLY MAKES SENSE:
Ask practical, specific questions:
Where exactly are they working?
For which company?
What does their role involve?
How long have they been there?
What is their realistic timeline to return?
Why can they not meet safely?
Why is every problem conveniently unsolvable without your help?
Scammers often rely on broad emotional storytelling rather than verifiable specifics.
4. EXAMINE THEIR DIGITAL FOOTPRINT:
Look for:
Long-term profile history.
Genuine interaction with known people.
Natural comments over time.
Real-world event consistency.
Profile age versus activity depth.
Sudden “clean” or highly curated accounts.
Stock-like or over-professional images.
5. WATCH FOR STORY DRIFT:
Scammers struggle to maintain consistency over time.
Keep notes if necessary.
Compare:
Dates.
Locations.
Family details.
Job details.
Travel timelines.
Financial explanations.
Past claims versus current claims.
Inconsistency is a major warning sign.
6. NEVER ACCEPT “TRUST ME” AS A SUBSTITUTE FOR EVIDENCE:
If the person becomes offended when you ask for verification, that itself is valuable information.
A genuine person may feel awkward.
A scammer often weaponises the request and turns it into emotional manipulation.
THE MOST IMPORTANT FINANCIAL RULE: NEVER SEND MONEY TO A PERSON YOU HAVE NOT VERIFIED IN THE REAL WORLD
This rule should be treated as absolute.
Never send:
EFTs.
Cash transfers.
Gift cards.
Crypto.
Wallet top-ups.
“Travel help”.
“Emergency assistance”.
Customs or courier fees.
Medical funds.
Bail money.
Hotel money.
Visa money.
Fuel money.
Airtime or data for “urgent contact”.
Payments to a “friend,” “agent,” or “lawyer” connected to the scammer.
Specialised Security Services strongly warns: The first payment is often the gateway to repeated financial abuse.
Once you pay, the scammer now knows:
You are emotionally hooked.
You are financially reachable.
You are willing to act under pressure.
You may continue paying to “protect the relationship”.
You may hide it from others
Many victims do not lose everything in one payment.
They lose it in stages, through repeated “temporary” emergencies.
NEVER SEND THESE ITEMS EITHER:
Even if no money has yet been requested, victims place themselves at severe risk when they send:
Identity document copies.
Passport copies.
Banking details.
Account numbers.
OTPs.
Proof of address.
Selfies holding documents.
Private or intimate images.
Nude photographs.
Work-related access details.
Contact lists.
Personal schedules.
Travel plans.
Family details.
Information about assets, inheritances, pensions, or investments.
These items can later be used for:
Identity theft.
Account fraud.
Sextortion.
Blackmail.
Social engineering.
Impersonation.
Follow-on targeting of relatives.
Financial fraud against third parties.
HOW FAMILIES CAN HELP WITHOUT DRIVING THE VICTIM DEEPER INTO THE SCAM:
This is one of the most important public guidance points.
When a loved one is emotionally attached to a scammer, the family often reacts with:
Anger.
Ridicule.
Shaming.
Accusations.
Ultimatums.
Mockery.
Public embarrassment.
This often makes the situation worse.
Why?
Because the scammer has already prepared the victim to believe:
“Your family will not understand us.”
“They are jealous.”
“They want to control you.”
“They want to take your happiness away.”
If the family reacts emotionally, the scammer’s narrative appears to be “confirmed.”
A better approach is:
Stay calm.
Focus on evidence, not insults.
Ask neutral questions.
Point out patterns gently.
Document contradictions.
Encourage verification.
Delay payments.
Involve a trusted third party.
Protect accounts and assets discreetly.
Avoid humiliating the victim.
This is not a normal argument; rather, it is often a deprogramming process.
A PRACTICAL “STOP AND CHECK” SAFETY RULE FOR THE PUBLIC:
Before you:
Send money.
Send a private image.
Share personal information.
Keep the relationship secret.
Make travel plans.
Agree to meet privately.
Accept a courier or parcel issue.
Help with an “emergency”.
Lend from savings, pension funds, or family money.
ask these questions:
1. Have I independently verified this person in the real world?
2. Have I met them safely and consistently?
3. Can their story be proven with real facts?
4. Why does every obstacle require my trust instead of real proof?
5. Why is urgency being created?
6. Why am I being asked to keep this private?
7. Would I advise my own child or parent to do this?
8. If this is genuine, why is basic verification treated as betrayal?
If the answers are weak, inconsistent, emotional, or evasive, stop immediately.
THE LEGAL CONSEQUENCES AND CRIMINAL RISKS ESCALATE FAST:
Once money is sent or personal data is shared, the risk grows significantly.
The victim may now be exposed to:
Repeated fraud.
Identity theft.
Banking compromise.
SIM-swap or social engineering follow-up.
Sextortion.
Blackmail.
Impersonation.
Pressure to move money for the scammer.
Secondary targeting of family and friends.
Use of the victim as a money mule in some cases.
Wider organised criminal exposure.
This is why early intervention matters.
The public must understand:
A romance scam is rarely only one lie and one payment.
It is often the beginning of a chain of deeper exploitation.
SSS CRITICAL PUBLIC WARNING:
If an online “romantic partner” does any of the following:
Refuses proper verification.
Avoids safe in-person meetings.
Creates emotional urgency.
Creates repeated financial emergencies.
Requests secrecy.
Becomes offended by normal questions.
Requests private images or personal documents.
Makes you feel responsible for “saving” them, you must assume that you may be dealing with an active criminal deception until proven otherwise.
Do not wait for a larger loss. Do not wait for a final confession. Do not wait for the “next promise to meet.”
By then, the damage may already be severe.
Romance scams, AI love scams, and catfishing succeed because they do not begin with obvious criminality.
They begin with attention, emotional validation, false intimacy, and carefully manufactured trust.
By the time the victim is asked for money, personal information, intimate content, or secrecy,
the criminal has often already built a powerful psychological hold. That is why the public must stop relying on emotion
and start relying on verification, consistency, evidence, and practical safety discipline.
The most important lesson of Part 2 is simple but urgent:
No online relationship should ever be trusted with money, private images, identity documents,
or personal vulnerability until the person has been properly and independently verified in the real world.
If the relationship cannot survive normal questions, normal proof, and normal caution, it is not a safe relationship.
In PART 3, Specialised Security Services will explain what to do if you or a loved one is already emotionally trapped in a romance scam, refuses to believe the truth, has already sent money, or is being threatened, blackmailed, or manipulated further.
For victims, families, and all concerned members of the public requiring professional investigative support, intervention,
strategic guidance, or assistance in serious matters involving scams, fraud, catfishing, emotional manipulation, extortion,
or digital deception, contact Mr. Bolhuis immediately.
Specialised Security Services invites the public to the Mike Bolhuis Daily Projects WhatsApp Channel.
This channel is important in delivering insights into the latest crime trends, awareness, warnings and the exposure of criminals.
How to Join the WhatsApp Channel:
1. Make sure you have the latest version of WhatsApp on your device.
2. Click on the link below to join the Mike Bolhuis Daily Projects WhatsApp Channel:
3. Follow the prompts to join the channel.
4. Make sure you click on "Follow", then click on the "bell"-icon (🔔)
CONTACT MR MIKE BOLHUIS FOR SAFETY AND SECURITY MEASURES, PROTECTION, OR AN INVESTIGATION IF NEEDED.
ALL INFORMATION RECEIVED WILL BE TREATED IN THE STRICTEST CONFIDENTIALITY AND EVERY IDENTITY WILL BE PROTECTED.
Regards,
Mike Bolhuis
Specialist Investigators into
Serious Violent, Serious Economic Crimes & Serious Cybercrimes
PSIRA Reg. 1590364/421949
Mobile: +27 82 447 6116
E-mail: mike@mikebolhuis.co.za
Fax: 086 585 4924
Follow us on Facebook to view our projects -
EXTREMELY IMPORTANT: All potential clients need to be aware that owing to the nature of our work as specialist investigators there are people who have been caught on the wrong side of the law - who are trying to discredit me - Mike Bolhuis and my organisation Specialised Security Services - to get themselves off the hook. This retaliation happens on social media and creates doubt about our integrity and ability. Doubt created on social media platforms is both unwarranted and untrue. We strongly recommend that you make up your minds concerning me and our organisation only after considering all the factual information - to the exclusion of hearsay and assumptions. Furthermore, you are welcome to address your concerns directly with me should you still be unsatisfied with your conclusions. While the internet provides a lot of valuable information, it is also a platform that distributes a lot of false information. The distribution of false information, fake news, slander and hate speech constitutes a crime that can be prosecuted by law. Your own research discretion and discernment are imperative when choosing what and what not to believe.
STANDARD RULES APPLY: Upon appointment, we require a formal mandate with detailed instructions. Please take note that should you not make use of our services – you may not under any circumstance use my name or the name of my organisation as a means to achieve whatever end.
POPI ACT 4 of 2013 South Africa: Mike Bolhuis' "Specialised Security Services" falls under Section 6 of the act. Read more here: https://mikebh.link/fntdpv
SSS TASK TEAM:

Copyright © 2015- PRESENT | Mike Bolhuis Specialised Security Services | All rights reserved.
Our mailing address is:
Mike Bolhuis Specialised Security Services
PO Box 15075 Lynn East
Pretoria, Gauteng 0039
South Africa
Add us to your address book
THIS PUBLIC DOCUMENT WAS INTENDED TO BE SHARED, PLEASE DO SO.




