Case Study: Exposing a Romance Scammer Operating From Overseas | People Locator Skip Tracing
๐Ÿ•ต๏ธ

Case Study: Exposing a Romance Scammer Who Stole $95K From an Elderly Victim

How Digital Footprint Analysis and Identity Verification Unmasked a Fake Online Persona and Identified the Domestic Accomplice Funneling the Money

๐Ÿ“‹ Case Study | People Locator Skip Tracing

๐Ÿ“Œ Executive Summary

๐Ÿšจ The Challenge: A 72-year-old retired widow in Florida had sent $95,000 over 14 months to a man she believed was a U.S. military engineer working overseas. ๐Ÿ’” The man’s photos, stories, and excuses were all fabricated. The victim’s adult daughter contacted us after discovering the financial drain and being unable to get answers from the scammer’s claimed identity.
๐Ÿ” The Solution: People Locator Skip Tracing conducted a multi-phase investigation including digital persona deconstruction, reverse image analysis, identity verification, and money trail analysis. We determined the claimed identity was entirely fabricated, identified the stolen photos being used, and located a domestic accomplice in Houston, Texas who had been receiving and forwarding the wire transfers.
โœ… The Result: Our evidence package was provided to both the victim’s family and law enforcement. ๐Ÿ‘ฎ The domestic accomplice โ€” a U.S.-based “money mule” โ€” was identified with full name, address, employment, and financial connection documentation. The investigation gave the family the definitive proof needed to convince the victim the relationship was fraudulent, stopping the bleeding immediately and providing actionable intelligence for the criminal investigation.
๐Ÿ’ธ $95K Stolen From Victim
๐Ÿ•ต๏ธ Exposed Fake Identity Unmasked
โšก 24 Hrs Initial Findings Delivered
๐Ÿ“… 14 Mo Scam Duration
๐Ÿ‘ค 1 Domestic Accomplice Found
๐Ÿ›‘ Stopped Further Payments Prevented

๐Ÿ’” The Romance Scam Epidemic: How Big Is the Problem?

Romance scams are the single most financially devastating form of consumer fraud in the United States. ๐Ÿ“Š According to the Federal Trade Commission, Americans lost over $1.3 billion to romance scams in a recent reporting year โ€” and that figure represents only the cases that were actually reported. Experts estimate the true number is several times higher, because many victims are too embarrassed or ashamed to come forward.

The scam works because it targets the most fundamental human need: connection. ๐Ÿ’• Scammers create detailed fake personas โ€” typically attractive, successful, and working in a profession that explains why they can’t meet in person (military deployment, overseas engineering contracts, offshore oil rigs). They invest weeks or months building a genuine-feeling emotional relationship with their target before ever asking for money. By the time the first financial request comes, the victim is deeply emotionally invested and views the request as helping someone they love, not sending money to a stranger.

Elderly and recently widowed individuals are disproportionately targeted. ๐Ÿ‘ด๐Ÿ‘ต Scammers deliberately seek out people who are isolated, recently bereaved, or otherwise emotionally vulnerable. Online dating platforms, social media, and even religious community groups serve as hunting grounds. The scammer’s patience and emotional manipulation skills can fool intelligent, successful people โ€” this is not a crime of stupidity. It’s a crime of expertly targeted psychological manipulation.

๐Ÿ“Š Romance Scam Financial Losses by Age Group (Annual U.S. Data)
Ages 70+
Highest per-victim loss
Ages 60โ€“69
$9,000 median loss
Ages 50โ€“59
$5,500 median loss
Ages 40โ€“49
$3,200 median loss
Ages 20โ€“39
$1,800 median loss

Older adults lose the most per incident โ€” seniors 70+ average losses exceeding $9,000 | Source: FTC reporting data

โš ๏ธ Why Romance Scams Are So Hard to Stop

Unlike other types of fraud, romance scam victims often actively resist intervention. ๐Ÿ›ก๏ธ The emotional bond they’ve formed with the scammer feels real โ€” and being told it’s fake feels like losing a loved one all over again. Family members who try to intervene are often met with anger, denial, and accusations of jealousy. This is why objective, documented evidence from a professional investigation is so critical. Telling a victim “I think you’re being scammed” doesn’t work. Showing them that the person they’ve been talking to doesn’t exist โ€” with documented proof โ€” is the only thing that cuts through the emotional manipulation.

๐Ÿ‘ค Client Background: A Family Desperate for Answers

Our client was not the victim herself โ€” it was the victim’s adult daughter, who had discovered the situation after noticing unusual financial activity on accounts she helped her mother manage. ๐Ÿ‘ฉโ€๐Ÿ‘ง The victim, a 72-year-old retired schoolteacher living in central Florida, had been widowed three years earlier after 45 years of marriage. She was intelligent, financially comfortable from her late husband’s pension and their retirement savings, and deeply lonely after his passing.

The victim had met a man on a social media platform approximately 14 months before our engagement. ๐Ÿ’ฌ He claimed to be a 58-year-old civil engineer working on a dam construction project in Turkey. His profile featured photos of an attractive, distinguished-looking man in professional settings. He was well-spoken, attentive, and showered the victim with daily messages, phone calls, and emotional support. Within two months, they had discussed marriage and he had begun calling her “my wife.”

The money requests started small โ€” $500 for an “emergency passport renewal” โ€” and escalated steadily. ๐Ÿ“ˆ Over the next 12 months, the victim had wired a total of $95,000 through a combination of wire transfers, gift cards, and cryptocurrency purchases (which the scammer coached her through step by step). Each payment was accompanied by an elaborate story: equipment failures, hospital bills, customs fees, lost luggage, and โ€” in the most manipulative twist โ€” money needed to “pay for his plane ticket to finally come visit her.”

๐Ÿข Key Client Profile

  • ๐Ÿ‘ฉClient: Adult daughter of the victim (retained People Locator Skip Tracing)
  • ๐Ÿ‘ตVictim: 72-year-old retired widow, central Florida
  • ๐Ÿ’ฐTotal Losses: $95,000 over 14 months
  • ๐ŸŽญScammer’s Claimed Identity: 58-year-old civil engineer, U.S. citizen, working in Turkey
  • ๐Ÿ’ธPayment Methods: Wire transfers, gift cards, cryptocurrency
  • โฐActive Scam Duration: 14 months and ongoing at time of engagement

๐Ÿšจ The Challenge: A Convincing Fake Identity Built Over 14 Months

The daughter’s primary objectives were clear but emotionally complex. ๐ŸŽฏ First, she needed definitive proof that the man her mother was communicating with was not who he claimed to be โ€” proof strong enough to overcome the emotional bond her mother had formed. Second, she wanted to identify who was actually behind the scam, if possible. Third, she needed the investigation results in a format that could be shared with law enforcement to support a criminal fraud report.

The scammer had built an unusually sophisticated fake identity. ๐Ÿงฉ He had provided the victim with a detailed personal backstory (including a fake deceased wife and fake adult son), professional credentials that included a specific engineering firm name, a consistent phone number with a U.S. area code (likely a VoIP number), and dozens of photographs showing the same man in various settings. He had also sent voice messages and made video calls โ€” though the video quality was always poor and brief, likely using pre-recorded clips or a video face-swapping tool.

๐Ÿ“ธ

Extensive Photo Library

The scammer had sent 40+ photos over 14 months, showing the same man in casual clothes, business settings, and outdoor scenes โ€” all stolen from someone else’s social media. ๐Ÿ–ผ๏ธ

๐Ÿ“ž

U.S. Phone Number

Calls came from a number with a Texas area code, making the scammer appear domestic. VoIP services allow scammers anywhere in the world to display U.S. numbers. ๐ŸŒ

๐Ÿ“

Detailed Backstory

A fake deceased wife, a fake adult son “in college,” fake work credentials, and a fake engineering firm. The narrative was consistent across 14 months of daily communication. ๐ŸŽญ

๐Ÿ’ธ

Varied Payment Methods

Wire transfers sent to an individual in Texas, gift cards purchased and codes read over the phone, and cryptocurrency purchases coached step-by-step โ€” designed to make tracing difficult. ๐Ÿ”—

๐Ÿ” Suspect Someone You Love Is Being Scammed? We Can Help. ๐Ÿ”

Our background check and identity verification services deliver results within 24 hours or less.

๐Ÿš€ Order a Background Investigation

๐Ÿ”ฌ Our Investigation Methodology

Romance scam investigations require a different skill set than traditional skip tracing or asset searches. ๐ŸŽฏ Instead of finding a real person who’s hiding, we’re doing the reverse โ€” starting with a claimed identity and determining whether that person actually exists, and if not, tracing the digital and financial threads back to whoever is actually behind the fake persona.

Our four-phase romance scam investigation protocol was developed through years of experience helping families expose fraudulent online relationships. ๐Ÿ† Each phase peels back another layer of the deception, building an evidence package that is both emotionally convincing (for the victim) and legally useful (for law enforcement).

Phase 1

๐Ÿ–ฅ๏ธ Digital Persona Deconstruction

Systematically analyzing every detail the scammer has provided โ€” name, profession, employer, backstory โ€” and verifying each claim against verifiable databases and public records.

Phase 2

๐Ÿ“ธ Reverse Image & Identity Verification

Running all photos through reverse image analysis to determine if they’re stolen, identifying the original source, and verifying whether the claimed identity matches any real person.

Phase 3

๐Ÿ’ฐ Money Trail & Domestic Accomplice Identification

Tracing the financial transactions to identify who received the money domestically, using skip tracing to identify and locate any U.S.-based accomplices (“money mules”).

Phase 4

๐Ÿ“ฆ Evidence Compilation & Law Enforcement Support

Assembling all findings into a comprehensive evidence package structured for both family intervention and law enforcement reporting.

๐Ÿ–ฅ๏ธ Phase 1 โ€” Digital Persona Deconstruction

The first step in any romance scam investigation is to test whether the claimed identity holds up under professional scrutiny. ๐Ÿ” Scammers invest enormous effort in making their fake personas feel real to their victims, but they can’t fabricate an actual existence in public record databases, professional licensing records, or verified identity systems. Our job is to check every single claim against verifiable reality.

The daughter provided us with everything the scammer had told her mother: his full name, date of birth, city of origin (claimed Houston, TX), employer name, profession, and the backstory he had built over 14 months. ๐Ÿ“‹ We systematically ran each of these details through our investigation process.

๐Ÿ“‹ What We Checked โ€” And What We Found

๐Ÿ”Ž Identity Verification Results: Claim vs. Reality

Scammer’s Claim Verification Method Result
Name: “Robert J. Caldwell” National identity database search โŒ No match for claimed DOB + name combination
DOB: March 15, 1966 SSN/Identity header verification โŒ No SSN record matches this name + DOB
Hometown: Houston, TX Address history, property, voter records โŒ No residential history in Houston under this identity
Employer: “Meridian Global Engineering” Business registration, SEC, professional databases โŒ Company does not exist in any state or federal registry
Profession: Licensed Civil Engineer State PE licensing boards (all 50 states) โŒ No PE license under this name in any U.S. jurisdiction
Deceased wife “Margaret” Death records, obituary search โŒ No matching death record found

The results were unambiguous. โŒ Every single verifiable claim the scammer had made about his identity was false. There was no Robert J. Caldwell matching the claimed date of birth and background in any U.S. database. The engineering company he claimed to work for didn’t exist. No professional engineering license existed under his name in any of the 50 states. Even his backstory about a deceased wife named Margaret had no supporting evidence in death records or obituary databases. The person the victim believed she was in love with simply did not exist.

๐Ÿง  Investigative Insight: Why Professional Verification Matters

Many family members try to expose romance scams by Googling the scammer’s claimed name or running a basic online search. ๐Ÿ”Ž These efforts rarely produce conclusive results because scammers deliberately choose names that are common enough to return plausible search results (there may be real people with similar names) but not so specific that the absence of records is obvious. Professional identity verification through investigative databases provides a definitive answer โ€” not a guess โ€” about whether a specific claimed identity is real. In this case, the comprehensive failure across every verification vector left no room for doubt.

๐Ÿ“ธ Phase 2 โ€” Reverse Image & Identity Verification

With the claimed identity debunked, Phase 2 focused on the photographs โ€” the most emotionally convincing element of the scam. ๐Ÿ–ผ๏ธ The victim had received over 40 photos showing the same man, and these images were a cornerstone of her belief in the relationship. Proving that these photos were stolen from another person was essential to breaking through the emotional manipulation.

Our investigators conducted comprehensive reverse image analysis on every photograph the scammer had sent. ๐Ÿ” This process involves running each image through multiple reverse image search engines and proprietary databases that catalog images across social media platforms, stock photography sites, and web content worldwide. The goal is to find the original source of the photos and determine whose images are actually being used.

๐Ÿ“ธ What We Discovered

The reverse image analysis produced a devastating finding. ๐Ÿ’” The photos the scammer had been sending were stolen from the public social media profile of a real person โ€” a retired businessman living in Europe who had no connection whatsoever to the victim, the scam, or the claimed identity. This individual’s Facebook and Instagram profiles were publicly visible, and the scammer had systematically downloaded photos over several years’ worth of posts, curating a collection that looked like a natural personal photo library.

  • ๐Ÿ“ธAll 40+ photos traced to a single source: A retired European businessman whose public social media profiles had been harvested by the scammer. The real person in the photos had no knowledge he was being used in the scam.
  • ๐Ÿ“…Photos spanned multiple years: The scammer had collected images from across several years of posts, giving the false impression of an ongoing, real life. Travel photos, holiday meals, casual snapshots โ€” all stolen.
  • โŒNo engineering connection: The real person in the photos was not an engineer, was not American, and had never been to Turkey. Everything the scammer claimed about the photos was fabricated.
  • ๐ŸŽฅVideo calls explained: The brief, poor-quality video calls the victim had received were consistent with either pre-recorded clips from the same social media profile or face-swapping technology applied in real-time.

๐Ÿ’ฐ Phase 3 โ€” Money Trail & Domestic Accomplice Identification

Phase 3 shifted the investigation from debunking the fake identity to identifying who was actually behind the scam โ€” specifically, the person in the United States who had been receiving the victim’s wire transfers. ๐Ÿ”Ž While the mastermind of the scam was likely overseas (based on communication patterns and VoIP phone analysis), the money had been sent to a domestic recipient โ€” a critical vulnerability in the scam’s infrastructure.

The daughter provided records showing that the victim’s wire transfers had been sent to an individual named “Marcus T.” at a personal address in Houston, Texas. ๐Ÿ“‹ The scammer had told the victim this was his “financial manager” who was handling payments for the engineering project. In reality, this person was what law enforcement calls a “money mule” โ€” someone who receives stolen funds domestically and forwards them overseas, either knowingly as an accomplice or unknowingly as a secondary scam victim.

๐Ÿ•ต๏ธ Identifying the Money Mule

We conducted a full skip trace and background investigation on the wire transfer recipient. ๐Ÿ” Our investigation revealed:

  • ๐Ÿ“Verified Current Address: The individual was located at the Houston address where wire transfers had been received. Identity confirmed through multiple data vectors.
  • ๐Ÿ’ผEmployment Status: Employed as a warehouse worker at a logistics company โ€” a role inconsistent with being a “financial manager” for an international engineering firm.
  • ๐Ÿ“‹Criminal History: A prior criminal record including charges related to wire fraud and identity theft โ€” indicating this was likely a knowing accomplice rather than an unwitting mule.
  • ๐Ÿ”—Pattern of Activity: Address-based analysis revealed the same Houston address had been associated with wire transfer complaints from at least two other individuals โ€” suggesting our victim was not the only person being funneled through this accomplice.

๐Ÿ’ก The Money Mule Connection: Why This Matters for Law Enforcement

While the overseas scammer may be difficult for U.S. law enforcement to reach, the domestic money mule is fully within the jurisdiction of American courts. ๐Ÿ‘ฎ Identifying the money mule gives law enforcement a tangible, prosecutable target โ€” someone on U.S. soil who participated in the fraud scheme. In many romance scam cases, the money mule is the critical link that enables prosecution, asset recovery, and disruption of the scam network. Our investigation provided the mule’s complete identity, address, employment, criminal history, and documented connection to the wire transfers โ€” everything law enforcement needs to pursue charges.

๐Ÿ“ฆ Phase 4 โ€” Evidence Compilation & Law Enforcement Support

The final phase compiled all findings into two distinct deliverables โ€” one designed for the family’s intervention with the victim, and one structured for law enforcement reporting. ๐Ÿ“‘

๐Ÿ“‹ The Family Intervention Package

The most emotionally delicate part of any romance scam investigation is presenting the evidence to the victim. ๐Ÿ’” We structured the family intervention package to be clear, compassionate, and irrefutable โ€” showing the victim the truth without attacking them for being deceived. The package included:

  • โŒIdentity Verification Report: Documented proof that no person matching the scammer’s claimed identity exists in any U.S. database โ€” no SSN, no address history, no professional license, no employer.
  • ๐Ÿ“ธPhoto Source Documentation: Side-by-side comparison showing the scammer’s photos next to the original source โ€” the European businessman’s social media profile โ€” proving the photos were stolen.
  • ๐Ÿ“ŠFinancial Impact Summary: A chronological breakdown of all payments totaling $95,000, mapped against the scammer’s fabricated excuses for each request.
  • ๐Ÿ”—Scam Pattern Analysis: Documentation showing how the scammer’s tactics matched known romance scam playbooks โ€” professional deployment excuse, escalating financial requests, promises to visit that never materialize.

๐Ÿ‘ฎ The Law Enforcement Package

  • ๐Ÿ‘คMoney Mule Identification: Complete dossier on the domestic accomplice including verified name, address, employment, criminal history, and documented receipt of the victim’s wire transfers.
  • ๐Ÿ“žCommunication Analysis: Documentation of the VoIP phone number used, area code analysis, and call pattern indicators consistent with overseas operation.
  • ๐Ÿ’ฐFinancial Transaction Records: Organized timeline of all wire transfers with recipient information, amounts, dates, and the fabricated pretexts the scammer used for each request.
  • ๐Ÿ”ŽAdditional Victim Indicators: Evidence suggesting the money mule’s address had received funds from other victims โ€” supporting a pattern of organized criminal activity.

โšก Delivered in 24 Hours or Less

Our initial findings โ€” including the identity verification failures and preliminary reverse image results proving the photos were stolen โ€” were delivered within 24 hours or less of engagement. โฐ This rapid turnaround was critical because the scam was ongoing โ€” the scammer was actively requesting another $15,000 from the victim at the time we were engaged. The early findings gave the family the ammunition they needed to intervene immediately and stop further payments while the full investigation was completed.

๐Ÿ† Results & Case Outcome

โœ… The Final Outcome

Our investigation achieved three critical objectives for the family:

๐Ÿ›‘ Stopped No Further Payments
๐ŸŽญ Exposed Fake Identity Proven
๐Ÿ‘ค Located Domestic Accomplice ID’d
๐Ÿ‘ฎ Filed Law Enforcement Report

The family intervention was successful. ๐ŸŽฏ When the daughter presented the evidence โ€” particularly the side-by-side photo comparison showing the scammer’s pictures were stolen from a real person’s social media โ€” the victim finally accepted the truth. It was a devastating emotional moment, but it ended the financial bleeding. The scammer’s next request for $15,000 went unfulfilled, and all communication was terminated.

The law enforcement package was filed with the FBI’s Internet Crime Complaint Center (IC3) and the local police department. ๐Ÿ‘ฎ The identification of the domestic money mule โ€” a U.S.-based individual with a criminal history, receiving wire transfers at a known address from multiple suspected scam victims โ€” provided law enforcement with an actionable, prosecutable target. While the overseas scammer may never face U.S. justice, the domestic accomplice is fully within the reach of American criminal law.

Perhaps most importantly, the investigation protected the victim from further loss. ๐Ÿ›ก๏ธ At the time of our engagement, the scammer was requesting another $15,000. Without intervention, the victim would likely have continued sending money indefinitely โ€” the scam would have continued until her savings were completely exhausted. By providing irrefutable evidence within 24 hours, we estimate our investigation prevented at least $50,000 or more in additional losses.

๐Ÿšฉ Red Flags of a Romance Scam: Know the Warning Signs

Based on this investigation and dozens of similar cases, here are the warning signs that an online relationship may be a romance scam. ๐Ÿ” If you or someone you love recognizes these patterns, a professional background check can quickly determine whether the person is real.

๐ŸŒ

Can Never Meet in Person

They’re always deployed overseas, working on a remote project, stuck in a foreign country, or facing travel complications. Every planned visit gets canceled with a new crisis. โœˆ๏ธ

๐Ÿ’ธ

Escalating Money Requests

Requests start small and grow over time โ€” emergency expenses, medical bills, customs fees, plane tickets. Each request has an urgent, emotional justification. ๐Ÿ“ˆ

๐Ÿ’•

Rapid Emotional Intensity

Declarations of love within days or weeks. “Soul mate” language, talk of marriage very early, and an intensity that feels overwhelming โ€” it’s manufactured to build attachment before the money requests begin. โค๏ธ

๐ŸŽฅ

Avoids Video Calls

They refuse video calls, or calls are always brief with poor quality. Excuses include bad internet, camera broken, or security restrictions at their work site. ๐Ÿ“ต

๐Ÿ’ณ

Unusual Payment Methods

Requests for wire transfers, gift cards, or cryptocurrency instead of normal payment methods. These are preferred because they’re difficult or impossible to reverse or trace. ๐Ÿ”—

๐ŸŽญ

Inconsistent Details

Small contradictions in their story โ€” job details that don’t add up, timeline inconsistencies, or facts that change over time. Professional scammers are good, but 14 months of lying produces mistakes. ๐Ÿ”

๐Ÿ›ก๏ธ How to Protect Yourself and Your Family

1

๐Ÿ” Run a Background Check Before Investing Emotionally

Before any online relationship progresses to financial involvement or deep emotional attachment, a professional background check can verify whether the person is who they claim to be. โšก People Locator Skip Tracing delivers identity verification results within 24 hours or less โ€” a small investment that can prevent catastrophic financial losses.

2

๐Ÿ“ธ Reverse Image Search Their Photos

While DIY reverse image searches (Google Images, TinEye) can sometimes detect stolen photos, professional-grade analysis is more thorough. ๐Ÿ”Ž If the photos come back as belonging to someone else, the person you’re talking to is not who they say they are โ€” period.

3

๐Ÿšซ Never Send Money to Someone You Haven’t Met in Person

This is the single most important rule. ๐Ÿ’ฐ No legitimate romantic partner will ask you to wire money, send gift cards, or purchase cryptocurrency for them โ€” especially before you’ve met face-to-face. Any request for money from an online-only contact is a red flag, regardless of the story behind it.

4

๐Ÿ‘จโ€๐Ÿ‘ฉโ€๐Ÿ‘ง Talk to Family and Friends

Scammers thrive on isolation โ€” they encourage victims to keep the relationship secret from family members who might ask uncomfortable questions. ๐Ÿ—ฃ๏ธ If you’re in an online relationship, share the details with someone you trust. An outside perspective can spot red flags that emotional involvement makes invisible.

5

๐Ÿ›๏ธ Report to Law Enforcement Immediately

If you’ve been scammed, report to the FBI’s Internet Crime Complaint Center (IC3) at ic3.gov and your local police department. ๐Ÿ‘ฎ Reports โ€” even when individual cases aren’t prosecuted โ€” help law enforcement identify patterns and take down scam networks. Professional investigation evidence significantly strengthens these reports.

โ“ Frequently Asked Questions About Romance Scam Investigation

๐Ÿค” How quickly can you determine if an online persona is fake?
Our initial identity verification results โ€” confirming whether the claimed name, employer, and professional credentials match a real person โ€” are typically delivered within 24 hours or less. โšก For ongoing scams, this rapid turnaround is critical because every day of delay is another day the scammer may request additional money.
๐Ÿ’ฐ What does a romance scam investigation cost?
Investigation costs depend on the scope โ€” a basic identity verification and reverse image analysis costs significantly less than a full investigation with money mule identification. ๐Ÿ“Š In every case we’ve handled, the investigation cost was a tiny fraction of the money already lost to the scam. More importantly, the investigation stops the bleeding โ€” preventing tens of thousands in additional losses. Contact us for a specific quote.
๐Ÿ’” Can you help me convince my family member they’re being scammed?
This is one of our most important services. ๐Ÿ›ก๏ธ Simply telling a scam victim they’re being deceived rarely works โ€” the emotional bond is too strong. Our investigation produces documented, irrefutable evidence that the person doesn’t exist: failed identity verification, stolen photos traced to their real source, and a non-existent employer. This evidence-based approach is far more effective than emotional arguments because it addresses the victim’s specific beliefs point by point.
๐Ÿ‘ฎ Can you help with law enforcement reporting?
Yes โ€” our evidence packages are specifically structured for law enforcement use. ๐Ÿ“‹ We provide organized documentation that investigators can immediately act on, including money mule identification, financial transaction timelines, communication analysis, and pattern evidence. Our reports have been submitted to the FBI’s IC3, state attorneys general offices, and local law enforcement agencies across the country.
๐Ÿ’ต Can I get my money back from a romance scammer?
Recovery of funds from romance scams is extremely difficult once the money has been sent โ€” especially for wire transfers and cryptocurrency. โš ๏ธ However, identifying a domestic money mule creates a potential path for civil recovery against a U.S.-based individual, and law enforcement restitution orders can sometimes recover funds. The most important financial outcome our investigation provides is stopping the scam โ€” preventing future losses that can easily exceed what’s already been taken.
๐Ÿ” I’m starting a new online relationship โ€” can you verify the person proactively?
Absolutely โ€” and this is the smartest time to investigate. โœ… A proactive background check before you’re emotionally or financially invested costs a fraction of what a post-scam investigation requires, and it gives you peace of mind from the beginning. We verify identity, check criminal records, confirm professional claims, and analyze photos โ€” all within 24 hours or less. Think of it as due diligence for your heart.
๐Ÿ›ก๏ธ

Protect Yourself or Someone You Love

If an online relationship seems too good to be true, let us verify the truth. People Locator Skip Tracing delivers identity verification and background check results within 24 hours or less โ€” nationwide since 2004.

๐Ÿš€ Order a Background Check Today

๐Ÿ“š Related Resources & Guides