PROJECT: WHAT TO DO IF A FAMILY MEMBER REFUSES TO BELIEVE THEY ARE BEING SCAMMED BY AI, A ROMANCE FRAUDSTER, OR A DEEPFAKE IMPERSONATOR (PART 3)
- 1 day ago
- 9 min read
PLEASE SHARE THIS PUBLIC DOCUMENT
One of the most painful and frustrating realities in modern fraud cases is that the family often sees the scam long before the victim does. In many AI-enabled scams, romance fraud cases, impersonation schemes, fake investment operations,
and deepfake-assisted emotional manipulation, the victim may become so psychologically invested in the deception that they begin to defend the criminal, reject evidence, distrust loved ones, and isolate themselves
from the very people trying to protect them.
This is especially common when the scam has been active for weeks, months, or even years, and where the criminal has used Artificial Intelligence, scripted emotional manipulation, false “proof,” voice cloning, fake photos, fabricated documents,
fake legal threats, or carefully staged personal attention to build trust.
The danger is that by the time the family realises what is happening, the situation is often no longer “just a scam.”
It has become a form of psychological control, coercive manipulation, and in many cases, financial abuse.
This is where many families make a critical mistake:
They confront too hard, too fast, too emotionally — and drive the victim deeper into the scam.
THE IMPACT OF DENIAL: WHEN THE VICTIM PROTECTS THE FRAUDSTER INSTEAD OF THEMSELVES
When a victim refuses to believe they are being scammed, the consequences can become devastating.
The victim may:
Continue sending money.
Borrow against assets.
Sell vehicles or property.
Empty savings accounts.
Take out loans.
Hide financial losses.
Lie to family out of shame or emotional dependence.
Break contact with loved ones.
Defend the scammer aggressively.
Believe that “everyone is against the relationship”.
View protective family members as controlling or jealous.
Become vulnerable to blackmail, extortion, or reputational destruction.
Ignore legal warnings, banking warnings, or police advice.
Destroy evidence that could help investigators.
In severe cases, victims may also:
Travel to unsafe locations.
Invite criminals into their homes or lives.
Share identity documents.
Provide banking credentials.
Transfer company funds.
Compromise business systems.
Become part of secondary fraud networks without realising it.
This is why a loved one’s refusal to accept the truth is not simply a family disagreement.
It is an active crime vulnerability.
WHY VICTIMS REFUSE TO BELIEVE THE TRUTH:
Families often ask: “Why can’t they see what is so obvious?”
The answer is complex, but important.
Victims may resist the truth because of:
Emotional attachment.
Loneliness.
Hope.
Embarrassment.
Shame.
Fear of humiliation.
Fear of losing the fantasy.
Financial denial.
Cognitive dissonance.
Trauma bonding.
Manipulation through guilt.
Repeated reinforcement by the scammer.
AI-generated “proof” that feels convincing.
Belief that family “doesn’t understand”.
A need to protect their own pride.
In romance scams, especially, the victim is often not merely “being tricked.”
They may feel:
Loved.
Needed.
Chosen.
Understood.
Rescued from loneliness.
Emotionally dependent.
Protective of the scammer.
Convinced that obstacles are “temporary”.
This is why logic alone often fails.
You are not always arguing with facts. You are often arguing with emotion, fantasy, identity, ego, and psychological dependency.
HOW FAMILIES SHOULD RESPOND WHEN A LOVED ONE REFUSES TO BELIEVE THEY ARE BEING SCAMMED:
1. DO NOT RIDICULE, HUMILIATE, OR ATTACK THE VICTIM:
This is one of the most important rules.
If the victim feels mocked, shamed, controlled, or ambushed, they may:
Defend the scammer more aggressively
Hide communication
Secretly send more money
Cut off family contact
Delete evidence
Become even more emotionally attached to the fraudster
AVOID STATEMENTS LIKE:
“How can you be so stupid?”
“Only an idiot would believe this.”
“You are embarrassing the family.”
“You never listen.”
“We told you so.”
These responses often strengthen the scammer’s hold.
SSS PRINCIPLE:
The victim must be treated as manipulated and vulnerable, not as the enemy.
2. UNDERSTAND THAT THIS MAY NOW BE A FORM OF PSYCHOLOGICAL CONTROL:
By the time a victim is in denial, the criminal may have already established a pattern of:
Emotional dependence.
Isolation from trusted people.
Reinforced secrecy.
Crisis cycles.
Reward and punishment.
Guilt manipulation.
“Us against the world” narratives.
Fake emergencies.
False proof of loyalty.
AI-generated reassurance.
Deepfake validation.
Scripted persuasion.
This can resemble:
Coercive control.
Grooming.
Emotional exploitation.
Trauma bonding.
Psychological conditioning.
In other words:
The victim may not simply need “more evidence.”
They may need careful deprogramming.
3. STAY CALM, STRATEGIC, AND CONSISTENT:
Families often panic when they discover large losses or obvious deception.
That is understandable.
However, panic can make the situation worse.
INSTEAD:
Stay calm.
Remain respectful.
Speak slowly.
Focus on concern, not accusation.
Repeat the same facts consistently.
Avoid emotional shouting matches.
Do not turn every conversation into a confrontation.
Keep the door open for future trust.
USE LANGUAGE LIKE:
“We are worried because we care about you.”
“Please help us verify this together.”
“If it is real, verification will protect you too.”
“We are not attacking you — we are trying to protect you.”
“Let us test the facts before more money is sent.”
This reduces defensiveness.
4. FOCUS ON VERIFICATION, NOT ARGUMENT:
Do not frame the conversation as: “You are wrong.”
Frame it as: “Let us verify this together.”
This is a far more effective approach.
EXAMPLES OF PRACTICAL VERIFICATION STEPS:
Request a live video call with unpredictable interaction.
Ask the person to answer specific questions only the real individual would know.
Reverse image search profile photos.
Check whether the “business” is registered.
Verify investment platforms with the FSCA.
Confirm company directors.
Check phone numbers against fraud reports.
Verify email domains carefully.
Compare claimed timelines to reality.
Investigate fake social media profiles.
Review metadata where possible.
Confirm whether “official documents” are genuine.
The goal is to let the facts weaken the illusion without making the victim feel cornered.
5. INTERRUPT THE FLOW OF MONEY IMMEDIATELY:
If the victim is still sending money, urgent protective steps are essential.
WHERE POSSIBLE:
Ask them to pause all payments for 24–72 hours.
Encourage immediate contact with the bank.
Flag suspicious transfers.
Alert the fraud department.
Freeze compromised accounts if necessary.
Change passwords.
Secure email access.
Revoke remote access apps.
Stop crypto transfers.
Prevent new loans or credit applications where possible.
Watch for asset liquidation.
Monitor business accounts if company funds are at risk.
CRITICAL POINT:
Even if the victim is angry, stopping further losses may be more important than winning the argument immediately.
6. PRESERVE EVIDENCE — DO NOT LET THE VICTIM DELETE EVERYTHING:
Victims often delete messages out of shame, fear, or because the scammer instructs them to do so.
THIS CAN SEVERELY DAMAGE THE CHANCES OF:
Tracing the fraud
Preserving proof
Identifying co-conspirators
Assisting banks
Supporting criminal complaints
Detecting patterns across multiple victims
Protecting future victims
PRESERVE:
WhatsApp chats.
Telegram chats.
Emails.
Voice notes.
Call logs.
Screenshots.
Bank payment records.
Crypto wallet details.
Usernames.
Profile links.
Video files.
Images.
“Contracts”.
Fake legal documents.
Investment dashboards.
Courier tracking numbers.
All promises, threats, and demands.
SSS RULE:
Evidence is often more valuable than emotion in the early recovery stage.
7. EXPECT THE SCAMMER TO TURN THE VICTIM AGAINST THE FAMILY:
Once the fraudster senses resistance, they often escalate.
THEY MAY TELL THE VICTIM:
“Your family is jealous.”
“They want to control you.”
“They don’t understand our relationship.”
“They are sabotaging your future.”
“They want to keep you poor.”
“The bank is wrong.”
“The authorities are corrupt.”
“You are the only one who believes in me.”
“This is our private matter.”
“If you stop now, everything will be lost.”
This is a classic isolation tactic.
FAMILIES MUST UNDERSTAND:
The scammer’s objective is to break trust between the victim and their real support system.
Do not be surprised by this.
Prepare for it.
8. INVOLVE A NEUTRAL THIRD PARTY THE VICTIM MAY TRUST:
SOMETIMES THE VICTIM WILL NOT LISTEN TO CLOSE FAMILY BECAUSE:
They feel judged.
Family conflict already exists.
Pride is involved.
They feel controlled.
The scammer has framed the family as hostile.
IN THESE CASES, A NEUTRAL BUT RESPECTED PERSON MAY HELP:
A trusted attorney.
A financial advisor.
A banker’s fraud division.
A psychologist or counsellor.
A clergy member.
A respected friend.
A family doctor.
A cybercrime specialist.
A professional investigator.
SSS OBSERVATION:
Victims sometimes accept the truth more readily from a calm outsider than from an emotional family member.
9. WATCH FOR SIGNS OF FINANCIAL ABUSE, COGNITIVE DECLINE, OR DEEP VULNERABILITY:
Some cases involve more than ordinary deception.
FAMILIES SHOULD PAY CLOSE ATTENTION TO WHETHER THE VICTIM IS:
Forgetful.
Confused.
Repeating scam narratives compulsively.
Hiding statements or documents.
Showing unusual secrecy.
Taking unexplained loans.
Liquidating assets.
Becoming socially withdrawn.
Displaying depression or agitation.
Losing sleep.
Fixated on the scammer.
Reacting with irrational anger to basic questions.
Showing impaired judgment.
Ignoring repeated obvious contradictions.
IN SOME CASES, ESPECIALLY WITH ELDERLY VICTIMS, THERE MAY BE:
Cognitive decline.
Loneliness-driven dependency.
Medication-related confusion.
Emotional fragility after bereavement.
Depression.
Impaired executive decision-making.
This requires compassion and urgent protective action.
10. UNDERSTAND THAT “PROOF” MAY NOT WORK IMMEDIATELY:
Families often believe: “Once we show them the proof, it will be over.”
Unfortunately, that is not always true.
EVEN WHEN PRESENTED WITH:
Reverse image results.
Fake identity evidence.
Bank warnings.
Expert reports.
Contradictory facts.
Exposed scam patterns.
Multiple victim testimonies.
THE VICTIM MAY STILL SAY:
“You don’t understand.”
“There is a reason for that.”
“They explained it.”
“The profile was hacked.”
“The bank is mistaken.”
“This is different.”
“You are trying to ruin this.”
This is why the process may take time.
The goal is not always immediate conversion.
SOMETIMES THE FIRST GOAL IS SIMPLY:
To stop further money paid.
To preserve evidence.
To reduce contact.
To create doubt.
To prevent escalation.
To keep communication open with the victim.
That alone can be a major victory.
CRIMINAL OPPORTUNITIES CREATED WHEN FAMILIES RESPOND INCORRECTLY:
If families respond impulsively, criminals gain additional advantages.
POOR FAMILY RESPONSES CAN LEAD TO:
Increased victim isolation.
More secret transfers.
Destruction of evidence.
Emotional alliance with the scammer.
Loss of trust in protective relatives.
Faster asset liquidation.
Greater reputational damage.
Delayed bank intervention.
Delayed reporting.
Greater extortion leverage.
More difficult recovery.
Long-term family breakdown.
This is why the family response itself must be disciplined, strategic, and evidence-driven.
WHEN TO SEEK PROFESSIONAL HELP IMMEDIATELY:
PROFESSIONAL INTERVENTION IS STRONGLY RECOMMENDED IF:
Large sums of money have already been lost.
The victim continues sending money.
The victim is being blackmailed or extorted.
The victim is planning to travel to meet the scammer.
The victim has shared identity documents.
The victim has shared banking credentials.
Business accounts are involved.
The victim is liquidating assets.
The scammer is using legal threats or fake police claims.
The victim is being manipulated through sexual images or deepfake content.
The victim has cut off family support.
There are signs of cognitive decline or severe vulnerability.
The family is in conflict and cannot manage the situation constructively.
When a loved one refuses to believe they are being scammed, the family’s instinct is often to force the truth.
But in many cases, that approach pushes the victim deeper into the control of the criminal.
The more effective strategy is clear:
Protect first. Verify carefully. Preserve evidence. Interrupt the money flow.
Stay calm. Stay present. Stay strategic.
Remember:
The victim may be ashamed.
The victim may be emotionally dependent.
The victim may be psychologically manipulated.
The victim may be protecting a fantasy.
The victim may not yet be ready to face the humiliation of the truth.
This does not mean the family is powerless.
It means the family must respond like protectors, not prosecutors.
In the age of AI-enabled fraud, romance scams, deepfake deception, investment fraud, and organised emotional exploitation, family intervention has become a critical crime prevention function.
If your family is facing a situation where a loved one refuses to believe they are being scammed,
contact Mr. Mike Bolhuis of Specialised Security Services and his experienced Specialist Investigators for urgent professional guidance, evidence preservation, risk assessment, strategic intervention, and specialised investigative support.
READ OUR PREVIOUS PROJECTS FOR MORE CONTEXT:
Specialised Security Services invites the public to the Mike Bolhuis Daily Projects WhatsApp Channel.
This channel is important in delivering insights into the latest crime trends, awareness, warnings and the exposure of criminals.
How to Join the WhatsApp Channel:
1. Make sure you have the latest version of WhatsApp on your device.
2. Click on the link below to join the Mike Bolhuis Daily Projects WhatsApp Channel:
3. Follow the prompts to join the channel.
4. Make sure you click on "Follow", then click on the "bell"-icon (🔔)
CONTACT MR MIKE BOLHUIS FOR SAFETY AND SECURITY MEASURES, PROTECTION, OR AN INVESTIGATION IF NEEDED.
ALL INFORMATION RECEIVED WILL BE TREATED IN THE STRICTEST CONFIDENTIALITY AND EVERY IDENTITY WILL BE PROTECTED.
Regards,
Mike Bolhuis
Specialist Investigators into
Serious Violent, Serious Economic Crimes & Serious Cybercrimes
PSIRA Reg. 1590364/421949
Mobile: +27 82 447 6116
E-mail: mike@mikebolhuis.co.za
Fax: 086 585 4924
Follow us on Facebook to view our projects -
EXTREMELY IMPORTANT: All potential clients need to be aware that owing to the nature of our work as specialist investigators there are people who have been caught on the wrong side of the law - who are trying to discredit me - Mike Bolhuis and my organisation Specialised Security Services - to get themselves off the hook. This retaliation happens on social media and creates doubt about our integrity and ability. Doubt created on social media platforms is both unwarranted and untrue. We strongly recommend that you make up your minds concerning me and our organisation only after considering all the factual information - to the exclusion of hearsay and assumptions. Furthermore, you are welcome to address your concerns directly with me should you still be unsatisfied with your conclusions. While the internet provides a lot of valuable information, it is also a platform that distributes a lot of false information. The distribution of false information, fake news, slander and hate speech constitutes a crime that can be prosecuted by law. Your own research discretion and discernment are imperative when choosing what and what not to believe.
STANDARD RULES APPLY: Upon appointment, we require a formal mandate with detailed instructions. Please take note that should you not make use of our services – you may not under any circumstance use my name or the name of my organisation as a means to achieve whatever end.
POPI ACT 4 of 2013 South Africa: Mike Bolhuis' "Specialised Security Services" falls under Section 6 of the act. Read more here: https://mikebh.link/fntdpv
SSS TASK TEAM:

Copyright © 2015- PRESENT | Mike Bolhuis Specialised Security Services | All rights reserved.
Our mailing address is:
Mike Bolhuis Specialised Security Services
PO Box 15075 Lynn East
Pretoria, Gauteng 0039
South Africa
Add us to your address book
THIS PUBLIC DOCUMENT WAS INTENDED TO BE SHARED, PLEASE DO SO.

