Insights / The Org Chart Behind the Con / Chapter 5
Chapter 05 of 08

The Criminal Verticals

April 2026 Shadow Sciences Group Series: The Org Chart Behind the Con

Every business has a product. In legitimate enterprise, products are designed around customer needs — what people want, what they will pay for, and what keeps them coming back. The business of fraud operates on a different but structurally similar logic.

Products are designed around human vulnerability — what people fear, what they desire, what they will believe under the right conditions, and what circumstances make them most likely to act before they think. The fraud categories most people recognize by name are not random. They are engineered. Each targets a specific demographic, exploits a specific psychological mechanism, and has been refined through operational experience into something that works with a consistency that justifies the organizational investment behind it.

What follows is an examination of some of the primary criminal verticals running inside these operations today — what they are, how they work, who they target, and what they yield.

Romance Scams: The Long Game

Of all the fraud categories in operation today, romance scams require the most patience, the most sustained effort, and the most sophisticated psychological management. They are also, consistently, among the most financially devastating for individual victims.

The basic architecture is straightforward. A target is approached — through a dating platform, a social media connection request, or increasingly a misdirected text message that quickly pivots to personal conversation — by a manufactured persona. The persona is carefully constructed: attractive but not implausibly so, professionally credible, geographically distant enough to explain why an in-person meeting is difficult, and emotionally available in ways that feel rare and genuine.

What follows is a relationship, built deliberately over weeks or months, that is real in every way the target can experience it. Conversations are warm, consistent, and attentive. The persona remembers details, asks follow-up questions, and demonstrates the kind of sustained interest that people in genuine relationships recognize as meaningful. Scripts guide the operator through the emotional progression — when to introduce vulnerability, when to suggest deeper commitment, when to begin the financial conversation — but the target experiences none of this as scripted. They experience it as connection.

The financial request, when it comes, is rarely framed as a request. It arrives as a crisis — a medical emergency, a business deal gone wrong, a customs problem that requires immediate resolution, a temporary cash flow problem that will be repaid as soon as a wire clears. The amount is calibrated to what the target is believed to be able to provide without triggering alarm.

The FBI reported that Americans lost more than $1.3 billion to romance scams in 2022. The average individual loss exceeded $4,400. But that average obscures the distribution. Victims who are deeply invested in a manufactured relationship before the financial requests begin frequently lose amounts that dwarf that figure. Retirement accounts emptied. Home equity borrowed against. In documented cases, victims have lost everything they had accumulated over decades to a person who never existed.

Elder Fraud: Volume, Trust, and the Grandparent’s Instinct

Elder financial exploitation is one of the most underreported fraud categories in the United States. According to FBI data cited by the AARP, adults aged sixty and older reported nearly $4.9 billion stolen in 2024 — a 43 percent increase over the previous year. That figure reflects only what was reported.

The targeting logic is not difficult to understand. Older Americans disproportionately control accumulated wealth. They are more likely to answer a phone call from an unknown number. And they are more likely to have been socialized toward deference to authority — government agencies, financial institutions, law enforcement — in ways that younger generations may not share.

The Grandparent Scam illustrates the psychological architecture of elder fraud with particular clarity. A caller reaches an older adult and quickly establishes — through leading questions or simply asserting — that they are a grandchild in serious trouble. An arrest. A car accident. A medical emergency. The details vary but the emotional structure is consistent: someone you love needs help right now, the situation is urgent, and for reasons explained with enough plausibility to survive initial scrutiny, the normal channels — calling the grandchild’s parents, verifying through family — are unavailable or inadvisable.

What the script is exploiting is not gullibility. It is love, and the instinct to protect someone you love when they appear to be in danger. Those are not weaknesses. They are entirely human responses, and these operations are engineered around them.

AI-generated voice cloning has transformed the Grandparent Scam from a performance requiring skill and improvisation into something that can be automated using audio sourced from social media videos or voicemail greetings. A grandparent who hears what sounds unmistakably like their grandchild’s voice is not being foolish when they believe it. They are being defeated by technology that did not exist in consumer-accessible form until very recently.

Gift Card Fraud: The Untraceable Currency

Gift cards have become the preferred payment instrument for fraud operations across almost every category — and understanding why reveals something important about how these organizations think about operational risk.

A gift card transaction, once completed, is effectively irreversible. The funds are not held in an account that can be frozen, recalled, or traced through the banking system the way a wire transfer can. The card itself is anonymous — its value accessible to anyone who has the card number and PIN, regardless of who purchased it or where. And gift cards are available everywhere, purchasable with cash, in amounts that don’t trigger reporting requirements.

From an operational standpoint, gift cards solve several problems simultaneously. They remove the need for mule accounts. They reduce the money movement infrastructure required to convert proceeds. And they place the irreversibility of the transaction in the hands of the victim — who completes it themselves, at a retail location, often while on the phone with the operator coaching them through it.

The IRS has stated explicitly and repeatedly that no legitimate government agency will ever request payment via gift card. Americans reported losing more than $228 million to gift card fraud in 2023, with total annual losses from fraud and card-draining schemes estimated at approximately $1 billion. Target, Apple, Google Play, Walmart, and eBay cards are among the most frequently demanded, chosen in part because they are easy to resell or convert through secondary markets.

It is worth noting that none of this occurs without the awareness of card issuers themselves. Major retailers and technology companies maintain dedicated fraud teams focused on identifying suspicious redemption patterns and cooperating with law enforcement. Apple, Google, and others have invested significantly in detection infrastructure that has disrupted a meaningful volume of gift card fraud. The schemes persist not because issuers are indifferent, but because the volume of transactions involved, the anonymity of the instrument, and the speed of redemption create a detection challenge that no internal team has yet fully solved.

Investment Fraud: The Sophisticated Pitch

Investment fraud occupies a different position in the criminal vertical lineup than romance scams or elder fraud. Where those categories rely primarily on emotional manipulation, investment fraud adds a layer of intellectual engagement — the target is presented with something that appears to make financial sense.

The pig butchering variant, examined in detail in Chapter 3, represents the most sophisticated current iteration. But investment fraud in its broader forms encompasses a wide range of approaches: fake cryptocurrency platforms showing fabricated returns, fraudulent investment advisors with manufactured credentials, Ponzi-adjacent structures that pay early investors with later investors’ money long enough to build credibility, and social media-driven pump-and-dump schemes targeting retail investors in thinly traded assets.

What these approaches share is the exploitation of a genuine and reasonable human desire — to grow wealth, to make smart financial decisions, to not miss an opportunity that others are benefiting from. The fear of missing out is a documented psychological mechanism, and investment fraud operations use it deliberately. Testimonials, whether real or fabricated, showing others’ returns create social proof. Time pressure — the opportunity closes soon, the offer is limited — prevents the deliberation that might expose the fraud.

The FBI reported investment fraud losses of $4.57 billion in 2023, the highest of any fraud category — a 38 percent increase over the prior year. The growth is attributable in significant part to cryptocurrency-based schemes, which offer fraudulent operators the same money movement advantages they offer legitimate investors: speed, borderlessness, and technical complexity that many targets find difficult to fully evaluate.

Authorized Push Payment Fraud: The Invisible Category

Of all the criminal verticals discussed in this chapter, authorized push payment fraud is the least known by name and arguably the most insidious in its mechanics. It is also growing faster than almost any other category.

The defining characteristic is that the victim makes the payment themselves. They are not hacked. Their account is not accessed without permission. They are manipulated — through social engineering sophisticated enough to produce voluntary action — into initiating a transfer to an account controlled by the fraud operation. Because the victim authorized the transaction, the usual protections that apply to unauthorized fraud are frequently unavailable.

The scenarios that produce these payments are varied. A caller representing the victim’s bank warns that their account has been compromised and funds must be moved immediately to a safe account — which is, of course, the fraudster’s account. A business email compromise operation intercepts or spoofs communications between a company and its vendors, substituting fraudulent payment instructions at the moment a large invoice is due. A conveyancing fraud targets homebuyers at the point of property purchase — the single largest financial transaction most individuals ever make — by substituting fraudulent wire instructions for those of the legitimate escrow or law firm.

In the United Kingdom, where authorized push payment fraud is tracked more comprehensively than in the United States, losses exceeded £460 million in 2023. Critically, the victims of these schemes are frequently not stereotypically vulnerable individuals. They are financially literate, professionally accomplished people who were defeated not by a lack of sophistication but by a manipulation crafted specifically to defeat sophisticated people — one that used their own institutions, their own transaction processes, and their own judgment against them.

The assumption that financial literacy or professional accomplishment provides meaningful protection is one that the authorized push payment fraud category has disproven at considerable cost to people who held that assumption.

About Shadow Sciences Group

Shadow Sciences Group is a boutique risk advisory firm providing intelligence-led Strategic Exposure Assessments to high-visibility individuals, including corporate executives, professional athletes, and public figures. Operating through a discreet network of Risk Briefing Centers, the firm delivers behavioral exposure analysis, threat intelligence, and protective risk strategy to clients who require a higher standard of discretion and precision.

Shadow Sciences Group’s advisory model is built on the premise that visibility creates exposure — and that exposure, left unassessed, becomes vulnerability.

shadowsciences.com  •  shadowsciences.com/insights  •  shadowsciences.com/contact

Back to Series Index