- The Fraudfather's Dead Drop
- Posts
- Desperation’s Playground: Fraud’s Twisted Games in the Shadows of Ambition
Desperation’s Playground: Fraud’s Twisted Games in the Shadows of Ambition
Exposing corporate trickery, twisted ambition, and the con man who sold the Eiffel Tower—twice.
Desperation’s Playground: Fraud’s Twisted Games in the Shadows of Ambition
Fraud rarely springs from black-hearted villains. More often, it brews in those breathless margins where ambition tangles with desperation—where the same spark that builds kingdoms can torch them just as swiftly. If you’re looking for neat morality tales, you’ll be disappointed; this is a saga of blurred lines and frayed nerves.
This week, we shine a spotlight on the misdeeds of institutions once deemed untouchable, the cunning art of instant fraud detection, and the audacity of a con man who literally tried to sell Paris’s greatest landmark for scrap—twice.
In this week's issue:
🧨 Fraudster of the Week: American Express—The Deceptive Maestro of Small Business Trust
They wore corporate polish and sold themselves as guardians of commerce. Yet a $230 million slap on the wrist reveals how AmEx quietly milked small businesses and, in the process, laid bare the uncomfortable truth that every saintly brand has a devil’s bargain tucked away.
🚀 Futureproofing Fraud Defenses: The Real-Time Detection Dilemma
Instant alerts and real-time triggers promise a fortress of safety, but biases and blinkered logic often lock out honest folks while letting slick hustlers waltz right in. Complexity isn’t just a bug in these systems—it’s the entire game board, and you either master it or get played.
🎩 Historical Insight: Victor Lustig—The Man Who Sold the Eiffel Tower Twice
Forged titles, whispered rumors, and an eager market for easy profit. Victor Lustig turned Paris’s most iconic structure into a hustle so brazen it defies reason. Twice. His stunts prove one unchanging truth: if there’s gold in a dream, people will buy it—even if it defies common sense.
🌀 Cognitive Insights: Hacking Your Brain—The Fraudster’s Way (But for Good)
Fraudsters rewrite your perception before you’ve noticed the script has changed. Their powers? Not brilliance, merely a razor-sharp understanding of human flaws. By hijacking their playbook—ethically, of course—you turn vulnerability into an edge. Why let them hold all the cards?
The Fraudfather’s Note:
Deception mutates over time, but so can your defenses. The biggest threat isn’t the cunning of these swindlers; it’s the complacency that says, “It won’t happen to me.” Well, it can—and will—unless you arm yourself with sharper instincts and a healthy dose of skepticism. Your move.
Need a Gig?
Introducing The Syndicate: Where Cunning Minds Converge
Step off the moral high ground and into a place where edge meets opportunity. The Syndicate is your backstage pass to the underworld of anti-fraud and compliance—an exclusive job board for those who thrive on unraveling secrets, sniffing out scams, and playing cat-and-mouse with the slickest operators on the planet.
📞 Book a Call with the Fraudfather! to fortify your defenses today!
“ It’s rare that fraud is born from greed or malice—it thrives in the quiet overlaps between ambition and desperation. The same ingenuity that builds empires can dismantle them, depending only on intent and opportunity. To understand fraud is to understand human nature: not a dichotomy of good and evil, but a spectrum of untapped potential and unchecked risk.”

Fraud’s Hall of Infamy: The Week’s Top Villain
Fraudster of the Week: American Express—The Deceptive Maestro of Small Business Trust
If Do Kwon was a crypto dreamer, American Express is the cold-blooded pragmatist—quietly siphoning trust and dollars from small businesses while wearing the polished veneer of corporate respectability. The scale isn’t $40 billion, but it’s not pocket change either: $230 million in penalties, fines, and forfeitures later, AmEx’s alleged crimes offer lessons in systemic exploitation, regulatory calculus, and the unnerving ease of fraud.
The Con and the Cover-Up
The Bait: "Innovative" Products for Small Businesses
Between 2018 and 2021, AmEx marketed wire and payroll products as if they were the keys to financial empowerment. They sold promises of tax deductions and fee benefits, knowing full well they were peddling fiction.
The Switch: "Dummy" Employer Identification Numbers (EINs)
Sales representatives used fabricated EINs to open accounts, turning a government-issued identifier into a tool for deceit. If you’ve never applied for an EIN, know this: it’s easier than getting a library card. Fraudsters exploit the same system, inflating their legitimacy while eroding yours.
The Fallout: Ethics for Sale
AmEx allegedly leaned into aggressive sales tactics—misleading fees, unauthorized credit checks, and phantom accounts—until they couldn’t ignore the regulatory glare. The $230 million settlement might sting, but let’s face it: when the profits eclipse the penalty, is it really a deterrent?
Tactics of Deception (and Defense)
AmEx’s story isn’t just about corporate malfeasance—it’s a masterclass in leveraging complexity, psychology, and the inevitability of human bias.
1. Law 26: Keep Your Hands Clean
AmEx insulated its upper echelons while allowing rogue sales practices to flourish. The system was engineered to blame individuals, not the institution.
Lesson for Leaders: Delegation without oversight is negligence dressed as plausible deniability. Know what’s happening at every layer of your operation.
2. Cialdini’s Principle of Authority
The AmEx logo is a global beacon of trust. That trust camouflaged their misdeeds, turning the very symbol of reliability into a Trojan horse.
Lesson for the Skeptical: Never conflate branding with benevolence. Scrutinize even the most trusted names.
3. Weaponizing Complexity
Using EINs and convoluted fee structures, AmEx exploited the public’s ignorance. The harder it is to decipher, the easier it is to deceive.
Lesson for Defenders: Simplify your understanding of critical systems. If a process is opaque, it’s either poorly designed or deliberately obscure.
The Fraudfather's Take: Banking on Fraud—A Profitable Gamble
The financial industry has a well-documented history of treating regulatory penalties as mere operational costs, often dwarfed by the profits reaped from their malpractices. Consider the following cases:
Wells Fargo: The Fake Accounts Scandal
Misconduct: Between 2002 and 2016, Wells Fargo employees, under immense pressure to meet unrealistic sales targets, opened millions of unauthorized accounts without customer consent.
Financial Impact: While the exact profits from these illicit activities remain undisclosed, the bank's net profit for 2019 was reported at $19.5 billion.
Penalty: In 2020, Wells Fargo agreed to a $3 billion settlement to resolve criminal and civil investigations into these practices.
JPMorgan Chase: Market Manipulation
Misconduct: Over an eight-year period, JPMorgan traders engaged in "spoofing"—manipulating precious metals and U.S. Treasury markets by placing orders they intended to cancel, misleading other market participants.
Financial Impact: The bank's net income for the fourth quarter of 2024 alone exceeded $14 billion, contributing to an annual profit of $54 billion.
Penalty: In 2020, JPMorgan agreed to pay $920 million in fines for its market manipulation schemes.
These cases illustrate a stark disparity between the penalties imposed and the profits generated by major financial institutions. When fines are merely a fraction of annual earnings, they fail to serve as effective deterrents. This dynamic raises critical questions about the efficacy of regulatory frameworks and the ethical responsibilities of financial institutions.
The ease with which entities can exploit systems extends beyond corporate malfeasance. For instance, obtaining an Employer Identification Number (EIN) is a straightforward process, accessible to anyone with internet access. This simplicity, while beneficial for legitimate purposes, also opens avenues for misuse by individuals and organizations alike.
The recurring theme of negligible penalties relative to profits underscores a systemic issue within the financial industry. Without more stringent consequences, the cycle of misconduct is likely to persist, eroding public trust and compromising the integrity of financial systems.
Why This Matters Now: Inflation, Fraud, and the Pressure to Cheat
In a world of rising costs and shrinking margins, desperation breeds creativity—and not the good kind. Inflation drives businesses and individuals alike to cut corners, rationalize shortcuts, and ignore red flags. Fraud isn’t an exception in these conditions; it’s the predictable outcome.
The Hidden Psychological Hack: AmEx leveraged what behavioral economists call present bias—our tendency to overvalue immediate rewards at the expense of future consequences. Businesses enticed by “instant tax benefits” ignored the long-term risks, much like consumers seduced by buy-now-pay-later schemes.
The Lessons of the American Express Saga
1. Trust Is a Double-Edged Sword
The stronger the brand, the easier it is to weaponize. Institutions aren’t immune to human failings—don’t outsource your skepticism.
2. Fraud Scales with Complexity
The more intricate a system, the more opportunities for exploitation. Whether it’s financial products or blockchain, simplicity is your best defense.
3. The Cost of Complacency Is Everything
Regulators fine, but fraudsters thrive because they anticipate apathy.
The Lessons of the American Express Saga
Fraud isn't just a game of cat and mouse—it's a chess match, where every move has consequences that ripple far beyond the players on the board. Early in my career, during the wild west days of cryptocurrency, illicit drug markets, and digital money laundering, I had a case that has haunted me ever since.
I knew where the money was—a specific country, a specific account, holding what would now be worth $24 million. The profits of human suffering, broken systems, and unbridled greed sat untouched, shielded by layers of bureaucracy. Efforts to claw back those illicit gains and make the victims and American taxpayers whole were stonewalled by red tape.
When we confronted the criminal, he had a choice: cooperate in a proffer session, surrender the funds, and reduce his sentence. He declined with a smirk that still echoes in my mind. Eight years for wire fraud and aggravated identity theft? To him, it was a calculated risk, and he’d already won. “Making a million bucks a year to go to jail ain’t a bad trade,” he quipped, as his lawyer sat stone-faced beside him.

The system celebrated his sentencing as a victory. Me? I saw a loss. He walked away with the spoils of his fraud intact, and the people who needed restitution were left empty-handed. The justice system had managed to punish but not deter, and certainly not recover.
Fraud, like inflation, is invisible until it isn’t. Whether you’re running a business or managing personal finances, remember this: the wolves wear suits, the scams come wrapped in trust, and the first defense is understanding how the game is played. Learn the rules, break their scripts, and always—always—outthink the opposition.
📞 Book a Call with the Fraudfather! to fortify your defenses today!
Start learning AI in 2025
Everyone talks about AI, but no one has the time to learn it. So, we found the easiest way to learn AI in as little time as possible: The Rundown AI.
It's a free AI newsletter that keeps you up-to-date on the latest AI news, and teaches you how to apply it in just 5 minutes a day.
Plus, complete the quiz after signing up and they’ll recommend the best AI tools, guides, and courses – tailored to your needs.
Futureproofing Fraud Defenses
Real-Time Fraud Detection: A Double-Edged Sword
The Promise and the Pitfall
Real-time fraud detection systems promise a digital fortress—catching fraudsters in the act and securing the fast-paced world of instant payments and e-commerce. But speed alone isn’t enough. These systems often miss the intricate layers of fraud taxonomies and human behavior, leaving the door open for fraudsters while locking out legitimate users in a frustrating web of false positives.

The Battle of Real-Time Detection – Where Every Crack is a Victory for Chaos!
Case in Point: The System That Knew Too Little
Imagine this: A customer on vacation tries to log in using their child’s tablet. The system, primed with generic behavioral biometrics, flags it as "suspicious" and locks the account. The real crime? A failure to account for context or the subtleties of fraud patterns.
This isn’t a glitch—it’s a gap. A gap between the complexity of real-world fraud and the oversimplified rules these systems follow.
Bias in the System: A Three-Headed Hydra
1. Investigator Bias: The Cognitive Trap
Fraud investigators often see what the system primes them to see. The result?
Ignoring exonerating evidence: Legitimate transactions are painted with the fraud brush.
Blind trust in alerts: System flags become gospel, even when flawed.
Reinforced errors: False positives go unchallenged, feeding flawed models.
The Hidden Risks of Investigator Bias
While models can perpetuate biases, investigators are equally prone to cognitive traps:
Confirmation Bias: When fraud alerts are flagged, investigators tend to seek evidence supporting the alert rather than questioning its validity.
Availability Heuristic: Investigators rely on recent examples to guide decisions, skewing focus toward easily recalled patterns rather than statistically significant trends.
Framing Effect: The way alerts are presented influences decisions. Alerts labeled "high risk" are often treated as fraudulent without scrutiny, even when evidence contradicts the label.
Example: A flagged high-value purchase might look fraudulent because it’s unusual. But investigators, fixated on the alert, overlook legitimate signs—consistent past spending patterns or valid ID verification.
2. Bias in Machine Learning: When the Builders Are Flawed, So Are the Systems
The Human in the Machine
Machine learning models are only as good as the data they’re trained on—and the people who build them. Here's the harsh reality:
Bias in Data: Training datasets often reflect the prejudices, blind spots, and structural inequalities of the systems they come from. For example, datasets skewed toward fraud in lower-income regions might overflag legitimate users from those areas.
Bias in Developers: Developers bring their own unexamined biases into the design process, including prejudices about what constitutes "suspicious" behavior. Worse, some developers approach model-building with resentment toward edge cases, dismissing these as outliers rather than critical scenarios to address.
Bias in Labels: Fraud labels are often subjectively applied, reinforcing flawed human decisions. A model trained on biased labels will perpetuate and amplify these mistakes.

When you're a highly advanced AI, but humans trained you with '2+2=fish' logic and crowned cats.
Technical Challenges: Why Bias Festers in ML
Class Imbalance: Fraudulent transactions are rare compared to legitimate ones, making models prone to overfitting on the majority class (non-fraudulent activity). This can result in fraud being overlooked or misclassified.
Concept Drift: Fraud tactics evolve, but models are often built on static data, leaving them unable to adapt to new threats. For example, real-time payments have enabled fraud patterns that older models weren’t designed to detect.
Feature Engineering Oversights: Developers often choose features based on their own understanding of fraud, which can be narrow or outdated. Behavioral biometrics, for instance, might emphasize login patterns but fail to capture cross-channel behaviors like email or call-center interactions.
3. Taxonomic Misalignment: Misguided Tools
Fraud isn’t a monolith—it’s a spectrum of schemes, each with its own tactics, motivations, and signatures:
First-party fraud: Legitimate individuals misrepresent information for personal gain. Examples include chargeback fraud (claiming a legitimate purchase as unauthorized), lying on loan applications, or deliberate default on borrowed funds.
Challenge for Detection: Behavioral patterns often mimic legitimate users, making detection highly dependent on nuanced data like spending trends or repayment behavior.Second-party fraud: A trusted individual, such as an employee, collaborator, or account holder, enables fraudulent activity by others. This could involve money mules laundering illicit funds or employees facilitating insider threats.
Challenge for Detection: Behavioral biometrics may miss these cases because the fraudster operates within expected boundaries, blending into legitimate activity.
Third-party fraud: External actors, such as hackers or scammers, exploit stolen credentials, system vulnerabilities, or unsuspecting users. Examples include account takeovers, phishing attacks, and synthetic identity fraud.
Challenge for Detection: These cases often rely on anomalies, like new devices or geographic locations, which risk triggering false positives in legitimate edge cases (e.g., users traveling).
Behavioral biometrics and fraud detection tools often fail because they’re not tailored to these distinctions. A system optimized for catching third-party fraud might miss second-party schemes, where behavioral patterns closely resemble legitimate activity.
4. Building Smarter Systems: Aligning Detection with Complexity
Fraud-Taxonomy Training
Tailored Models: Train ML models to identify fraud patterns specific to first-, second-, and third-party fraud. For example, first-party fraud might focus on repayment behavior, while second-party fraud would highlight unusual peer-to-peer transactions.
Dynamic Ensembles: Use multiple models trained for different fraud types, combining their predictions for a comprehensive risk score.
Bias Mitigation
Diverse Training Data: Use datasets that reflect global and demographic diversity. Include synthetic datasets to simulate underrepresented fraud scenarios, like second-party collusion.
Bias Testing: Regularly audit models for disparities in false-positive and false-negative rates across demographics, regions, and transaction types.
Adaptive Machine Learning
Real-Time Feedback Loops: Incorporate investigator feedback into model retraining pipelines to continuously improve accuracy.
Concept Drift Detection: Implement monitoring systems that flag when a model’s performance deteriorates due to new fraud tactics, triggering retraining with updated data.
Enhanced Behavioral Biometrics
Context-Aware Features: Incorporate data from multiple channels (e.g., online, in-app, and call center) to provide a holistic view of user behavior.
Dynamic Thresholding: Adjust fraud thresholds dynamically based on user history and transaction context, reducing false positives.
The Fraudfather’s Take: Complexity is the Enemy—and the Solution
Real-time fraud detection systems falter because they treat complexity as a flaw rather than a fundamental truth. Fraud isn’t a straightforward puzzle—it’s a living, breathing strategy game, layered with human ingenuity and adaptive tactics. The same should be true of your defenses. By mastering the nuances of fraud taxonomies, addressing biases in both investigators and machine learning models, and building smarter, more dynamic systems, you don’t just detect fraud—you outmaneuver it.
Here’s the lesson: fraudsters thrive in the cracks where systems fail to meet reality. Close those gaps, and you seize control of the game. Ignore them, and you’re just a pawn in their playbook—bleeding money on tools that deliver false positives, false rejections, and false hope.
Historical Insight
Victor Lustig: The Man Who Sold Paris—Twice
Victor Lustig wasn’t a mere con artist—he was a virtuoso of deception, an architect of audacity. His magnum opus? Selling the Eiffel Tower. Not once, but twice.
Victor Lustig: The Original Real Estate Genius – Selling Dreams, One Eiffel Tower at a Time!
In 1925, Lustig masqueraded as a government official, exploiting rumors that Paris could no longer afford the upkeep of its iconic tower. His target? Scrap metal dealers eager for a once-in-a-lifetime opportunity. With forged credentials and a pitch so polished it sparkled, Lustig convinced his first mark to part with a small fortune.
Then, with breathtaking boldness, he tried the same con on a second group. Though he narrowly avoided exposure, Lustig immortalized himself as the patron saint of con men, proving that the real art of the scam lies not in deception—but in understanding greed.
The Art of the Scam: Lessons from Lustig
Law 1: Never Outshine the Master
Lustig lived in the shadows of his own brilliance, never attracting more attention than the scam required. His anonymity was his armor.
Cialdini’s Principle of Authority
Forged documents and official titles lent Lustig an air of legitimacy. People instinctively trust authority, even when it’s a mirage.
Law 32: Play to People’s Fantasies
Like Ponzi before him, Lustig tapped into the universal dream of easy riches. His marks didn’t just buy metal—they bought a story, one that reflected their own aspirations.
📞 Book a Call with the Fraudfather! to fortify your defenses today!
The Fraudfather’s Take: From Lustig to Today
Victor Lustig’s schemes hold up a mirror to human nature: we trust what flatters us, obey what seems official, and chase dreams that bypass the grind. His legacy? A masterclass for today’s fraudsters, who use the same tools—phony authority, irresistible pitches, and emotional hooks—to thrive in the digital age.
How to Avoid Being the Next Buyer of an Eiffel Tower:
Question Authority: Scrutinize every credential, no matter how polished.
Follow the Money: Transparency is the enemy of fraud. If you can’t see where it’s going, don’t follow.
Study the Playbook: History doesn’t just repeat—it recycles. Familiarize yourself with the cons of the past to spot their modern iterations.
Fraud isn’t just theft; it’s a seduction of the mind. Lustig didn’t sell steel beams—he sold a fantasy, a version of his victims that they wanted to believe in. The cure? Ruthless skepticism. Because while the Eiffel Tower remains standing, those who let greed outweigh reason never do.
Cognitive Insights

Unlocking Potential: Exploring the Intersection of Technology and Human Cognition in the Quest to Hack Your Brain
Hacking Your Brain—The Fraudster’s Way (But for Good)
Fraudsters are master manipulators, turning trust into a weapon and ambition into a trap. They don’t just steal—they rewrite your reality, bending it to their will with unnerving precision. But here’s their dirty secret: their moves aren’t genius, just calculated exploits of human nature. With the right mindset, you can not only dismantle their playbook but also repurpose their tricks to outsmart them at every turn.
This isn’t for the faint-hearted. Fraud is war, and the weapons are everywhere—subtle psychological triggers, unchecked biases, and the allure of shortcuts. You can either be the mark or the master. The difference is knowing the game, seeing the angles, and exploiting them better than anyone else.
Let’s tear into their tactics and make them work for you. It's time to flip the script. Your move.
Flip the Script (Dark Arts Edition)
Hijack Their Playbook: Fraudsters exploit urgency, authority, and charm to manipulate. Perfect. Now, turn those same tools into weapons of influence—without the smoke and mirrors.
Weaponize Urgency: Create a ticking clock, but tie it to value, not pressure. Example: “This offer closes in 24 hours because I prioritize working with decisive partners.” The key? Make your urgency feel like an exclusive opportunity, not a desperate sales pitch. Scarcity sharpens focus.
Command Authority: Fraudsters fake it; you don’t have to. Lead with stories, not stats. Instead of saying, “I’m an expert,” try, “When I solved a similar challenge for [credible name], here’s how we nailed it.” Authority grounded in action is impossible to fake.
Charm with Precision: The secret to charm isn’t being likable—it’s making people feel understood. Listen more than you talk, then mirror their values back to them. Example: “I hear that precision and speed are your priorities. Here’s how we align.”
Turn Manipulation into Mastery: Control isn’t inherently bad—it’s power in the wrong hands. You’re not here for cheap tricks; you’re here to own the narrative and the outcome.
Pre-frame Every Interaction: Start every pitch or negotiation with a setup that benefits you. Example: “Before we dive into details, let’s agree on one thing: we’re both here to create maximum impact.” This locks the conversation into shared goals, making it harder for anyone to derail your momentum.
Seed the Outcome: Plant subtle cues that lead to your desired conclusion. Example: “Most successful partners we work with choose [X], and here’s why.” The more you normalize the result, the more likely they’ll follow your lead.
Own the Room: Confidence is the invisible hand that steers decisions. Hack it with power postures before the meeting—stand tall, shoulders back, deep breaths. It’s not just posture; it’s a signal of dominance your body feeds to your brain.

Al Capone 2.0: When old-school hustle goes digital, the con never dies.
Out-Charm the Charmers: Fraudsters trade in counterfeit likability. You’ll counter with the kind that leaves people buzzing long after you’ve left the room.
Deploy the Law of Reciprocity: Give first, even if it’s something small. A well-placed insight, a shared resource—people instinctively want to return the favor. Example: “Before we dive in, let me share a resource I think you’ll love.”
Trigger the Likability Loop: Smile strategically—not constantly. The occasional, genuine smile feels earned, not forced, and lands with far more impact.
Show the Power of Silence: Fraudsters talk fast to distract. You? You master the pause. Let your words hang, creating tension that forces others to fill the space—and reveal more than they planned.
The Fraudfather’s Take: Outthink, Outmaneuver, Outlast
Fraudsters aren’t often geniuses; they’re opportunists with good PR. They succeed because we hand them our trust on a silver platter. That stops now. You’re not playing defense anymore—you’re playing to dominate.
They’ll keep leaning on greed, naivety, and your misplaced faith in “It won’t happen to me.” But once you see through their illusions, you can snatch their tactics for your own. Being armed is half the victory; being audacious with your arsenal seals it.
Skepticism destroys their illusions. Resilience mocks their pressure. Preparation reduces their cunning to a feeble joke. This isn’t sorcery; it’s a rigged game they hope you’re too polite to expose. So flip the board. Write your own rules. Turn their “dark arts” into a gleaming spotlight on your skill.
This is more than winning. It’s stamping your signature on the entire battlefield. The side with sharper wits and steadier nerves doesn’t just thwart tricksters—they rule the game. Let fraudsters choke on their own illusions. You, on the other hand, will dismantle their schemes before breakfast and walk off whistling. That’s how you play. That’s how you triumph.
📞 Book a Call with the Fraudfather! to fortify your defenses today!
About The Fraudfather
The Fraudfather combines a unique blend of experiences as a former Senior Special Agent, Supervisory Intelligence Operations Officer, and now a recovering Digital Identity & Cybersecurity Executive, He has dedicated his professional career to understanding and countering financial and digital threats.
Fast Facts Regarding the Fraudfather:
Global Adventures: He’s been kidnapped in two different countries—but not kept for more than a day.
Uncommon Encounter: Former President Bill Clinton made him a protein shake.
Unusual Transactions: He inadvertently bought and sold a surface-to-air missile system.
Perpetual Patience: He spent 12 hours in an elevator.
Unique Conversations: He spoke one-on-one with Pope Francis for five minutes using reasonable Spanish.
Uncommon Hobbies: He discussed beekeeping with James Hetfield from Metallica.
Passion for Teaching: He taught teenagers archery in the town center of Kyiv, Ukraine.
Unlikely Math: Until the age of 26, he had taken off in a plane more times than he had landed.
📞 Book a Call with the Fraudfather! to fortify your defenses today!
This newsletter is for informational purposes only and promotes ethical and legal practices.


