{"id":11938,"date":"2025-08-18T14:57:50","date_gmt":"2025-08-18T14:57:50","guid":{"rendered":"https:\/\/www.digitalforensics.com\/blog\/?p=11938"},"modified":"2025-08-18T14:51:29","modified_gmt":"2025-08-18T14:51:29","slug":"is-your-live-feed-actually-a-video-call-scam","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/extortion\/is-your-live-feed-actually-a-video-call-scam\/","title":{"rendered":"How to Spot a Fake Video Call Scam and Protect Yourself"},"content":{"rendered":"\n<p>Have you ever been on a video call with someone where something just felt strange? You may have experienced a jump-scare prank in an online chat room during the early internet days. This is different. The person on the other end looks uncanny. Their face shifts and morphs in an unnatural amalgamation of pixels on your screen. It looks like they have some sort of filter over their face. Are they trying to hide their identity? As uncertainty creeps in, you begin to ask yourself \u2014 do scammers video call?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-would-a-scammer-want-to-video-call\"><span class=\"ez-toc-section\" id=\"Why_Would_a_Scammer_Want_to_Video_Call\"><\/span>Why Would a Scammer Want to Video Call?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>For many years, video calls were viewed as a way to undeniably confirm that online users were who they claimed. Many still hold this belief. However, scammers now have the capability to fake these calls. <a href=\"\/blog\/extortion\/senior-romance-scams\/\">Elderly romance scams<\/a>, investment fraud, and <a href=\"https:\/\/www.digitalforensics.com\/blog\/software\/phishing-attack-repsonse\/\">phishing attacks<\/a> can all be carried out with an added level of perceived validity.<\/p>\n\n\n\n<p>So why will a scammer video call you? <strong>The short answer is that a video call creates trust, lowers your guard, and makes the scam feel personal.<\/strong><\/p>\n\n\n\n<p>Scammers use video calls to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Build emotional trust quickly<\/li>\n\n\n\n<li>Prove they are \u201creal\u201d during romance scams<\/li>\n\n\n\n<li>Pressure victims into sending money<\/li>\n\n\n\n<li>Record private moments for sextortion<\/li>\n<\/ul>\n\n\n\n<p>The goal is simple: make you feel safe long enough to manipulate you. Just because you saw someone on camera does not mean they are who they claim to be.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"When The Face on Your Video Feed is Fake: The Shocking Rise of Video Call Scams\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/izpesu3dXV4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-can-a-scammer-fake-a-video-call\"><span class=\"ez-toc-section\" id=\"Can_a_Scammer_Fake_a_Video_Call\"><\/span>Can a Scammer Fake a Video Call?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><strong>Yes, a scammer can fake a video call by using software that replaces their real camera feed with an AI\u2011generated, prerecorded, or stolen video. Instead of showing themselves live, they may stream stolen footage or deepfake clips to make the call look real.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-does-a-scammer-fake-a-video-call\"><span class=\"ez-toc-section\" id=\"How_Does_a_Scammer_Fake_a_Video_Call\"><\/span>How Does a Scammer Fake a Video Call?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-stolen-videos\"><span class=\"ez-toc-section\" id=\"Stolen_Videos\"><\/span>Stolen Videos<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Scammers may repurpose a video recording that was posted online in their video call. They may steal footage of an attractive individual to try to lure someone into a romance scam. Or even steal video from their victim to repurpose for their next target, establishing a perpetual cycle of deceit.<\/p>\n\n\n\n<p>The restriction of using stolen video is that it is not interactive. The scammer may be able to convince their target it is a legitimate feed for a limited time. However, the fa\u00e7ade falls apart when they can\u2019t answer questions or their behavior is unnatural.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-ai-fueled-fakes\"><span class=\"ez-toc-section\" id=\"AI-Fueled_Fakes\"><\/span>AI-Fueled Fakes<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>The limitations of stolen videos have been bridged with the advance of AI and deepfake technology. Now, scammers can take a few still images and use readily available deepfake software to create convincing doctored video that appears to depict someone else.<\/p>\n\n\n\n<p>These <a href=\"\/blog\/extortion\/combating-ai-scams\/\">AI scams<\/a> can be made to depict any action, response, or backdrop that the scammer desires. They can even impose another video over the live video call feed, allowing the deepfake to interact in real time.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-types-of-video-call-scams-you-might-encounter-real-world-video-call-scams\"><span class=\"ez-toc-section\" id=\"Types_of_Video_Call_Scams_You_Might_Encounter_Real-World_Video_Call_Scams\"><\/span>Types of Video Call Scams You Might Encounter: Real-World Video Call Scams<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Exploring real scenarios where <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/what-to-do-if-scammer-has-video\/\">scammers used video<\/a> calls to carry out their schemes can help illustrate their deceitful techniques. The following examples show how easy it is to fall into these scams with just one lapse of judgement.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-facebook-video-call-scam\"><span class=\"ez-toc-section\" id=\"Facebook_Video_Call_Scam\"><\/span>Facebook Video Call Scam<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>A man named <a href=\"https:\/\/www.yahoo.com\/news\/beware-scam-involving-facebook-video-221439812.html?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuYmluZy5jb20v&amp;guce_referrer_sig=AQAAAAAvs4Svq7bLyyGheX-li5TL4RQXFtTgqIKNaANNaPwD7SZwDTkGVmlOxZ93OgOpTRMrTPVENyxbaYOygQLKgcXcz5Pdj3t3zUt3nxyCtgeUQcM2-ebrOBVgjMArOlfE5kimga5mOdT60f3ud9Ffr7ENfj29C4oMoStu9Tys99Zx\" target=\"_blank\" rel=\"noopener\">William Stone<\/a> has been receiving an influx of messages asking if he\u2019s okay. These aren\u2019t just wellness checks from family and friends. They are a response to a video call from Stone, and messages asking for financial assistance. The only problem is that Stone has not called or messaged any of these contacts. His Facebook account was compromised after he answered a call and message from a friend who themselves was asking for help.<\/p>\n\n\n\n<p>While on the call, scammers screen recorded the little interaction that was had with Stone, just as they had done with his friend. They then locked Stone from his account, likely through a malicious link in the message they sent. This scam is perpetuated with each new unsuspecting user who answers the call and opens the attachment in the message. Scammers record the video call, compromise the account, and send similar video chat scams to their Facebook friends.<\/p>\n\n\n\n<p>This example demonstrates just how little effort is needed to pull off these video scams. It also shows that one emotion-driven decision to help an assumed friend or family member could lead to a trap. If you\u2019re contacted by someone you know asking for help online, confirm the interaction through a second verified communication method.<\/p>\n\n\n\n<figure>\n  <picture>\n    <!-- Mobile image -->\n    <source \n      srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/12\/Red_Flags_of_Video_Call_Scams-1-scaled.jpg\"\n      media=\"(max-width: 767px)\"\n    >\n\n    <!-- Desktop fallback (required) -->\n    <img decoding=\"async\" \n      src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/12\/Red_Flags_of_Video_Call_Scams-scaled.jpg\"\n      alt=\"Red Flags of Video Call Scams - Infographics\"\n      style=\"width:100%; height:auto;\"\n    >\n  <\/picture>\n<\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-deepfake-video-call-in-the-senate\"><span class=\"ez-toc-section\" id=\"Deepfake_Video_Call_in_the_Senate\"><\/span>Deepfake Video Call in the Senate<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>In September of 2024, the Chair of the Senate Foreign Relations Committee was targeted in a deepfake video call scam. <a href=\"https:\/\/www.nbcnews.com\/politics\/congress\/ben-cardin-targeted-apparent-deep-fake-call-dmytro-kuleba-rcna172776\" target=\"_blank\" rel=\"noopener\">Sen. Ben Cardin<\/a> received an email from a scammer posing as former Ukrainian Foreign Minister Dmytro Kuleba. According to a notice from the Senate\u2019s security office, the email began a correspondence that included \u201cpolitically charged questions\u201d.<\/p>\n\n\n\n<p>This culminated in a zoom call between the two parties. Cardin had previously spoken with Kuleba, and his appearance and speech were consistent with previous interactions. However, Cardin grew skeptical of the person on the other end. They began asking out of character questions and demanding firm stances on political conflicts.<\/p>\n\n\n\n<p>Of these questions, the scammer asked Cardin if he supported sending long-range missiles into Russian territory. It was at this point that Cardin and his staff suspected the caller was a scammer trying to \u201cbate the Senator into commenting on a political candidate. The call was ended, and Cardin\u2019s office contacted the State Department who confirmed their suspicions.<\/p>\n\n\n\n<p>This example shows that nobody is too big to fall for these scams, and no system is immune to vulnerabilities \u2014 even in the government. It also shows just how convincing these deepfake scams can be. And once again, we see the importance of confirming the validity of contact requests by checking through a confirmed contact method.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-sextortion-video-call-scam\"><span class=\"ez-toc-section\" id=\"Sextortion_Video_Call_Scam\"><\/span>Sextortion Video Call Scam<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>When 24-year-old <a href=\"https:\/\/www.msn.com\/en-in\/news\/other\/man-falls-victim-to-sextortion-scam-on-dating-app-two-arrested\/ar-AA1HgK2q?ocid=BingNewsVerp\" target=\"_blank\" rel=\"noopener\">Ankit Kumar<\/a> matched with a woman on an online dating app, the last thing on his mind was getting scammed. Things were off to a great start. Eventually, the woman who went by \u201cNandini\u201d suggested that they move the conversation to WhatsApp for a video call.<\/p>\n\n\n\n<p>When he joined, the woman on screen appeared naked on screen. Kumar\u2019s face was visible in the other portion of the screen \u2014 and unbeknownst to him \u2014 the call was being recorded. Moments after the call, the scammer demanded roughly $400 USD not to expose the video, a crime known as <a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/different-types-of-sextortion\/\">sextortion<\/a>.<\/p>\n\n\n\n<p>Kumar initially complied with the scammer\u2019s demands to avoid public embarrassment. However, the sextortionist soon returned with further demands. This time, Kumar reported the crime to the National Cybercrime Reporting portal. This triggered an investigation by the Cyber Police Station of Shahdara, where two men were arrested in connection to the crime.<\/p>\n\n\n\n<p>This example serves as a valuable reminder of a number of cybersecurity best practices. For starters, you should avoid video calls with contacts who you do not know. Additionally, it is never a good idea to pay a cybercriminal of any kind. As you can see, it does nothing to guarantee they will <a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/how-to-stop-a-blackmailer\/\">stop the blackmail attempt<\/a> and often only incentivizes further demands. Finally, you should always <a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/\">report cybercrime to the FBI<\/a> and the appropriate <a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/what-can-the-police-do-about-blackmail\/\">law enforcement<\/a> agencies.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-warning-signs-how-can-you-spot-a-video-call-scam\"><span class=\"ez-toc-section\" id=\"Warning_Signs_How_Can_You_Spot_a_Video_Call_Scam\"><\/span>Warning Signs: How Can You Spot a Video Call Scam?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Well done video call scams are extremely convincing. However, even the best fakes have some red flags you can pick up on if you know what to look for. The following red flags could save you from a potential video call scam.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Irresponsive Correspondent. <\/strong>Does the person on the other end not seem to react to what is going on over the video call? Ask them a specific question or to complete a unique task. If they are unable to or simply ignore the request, it may be a stolen video.<\/li>\n\n\n\n<li><strong>Glitches or Poor Quality. <\/strong>The person on the other end is responsive, but their face seems to morph unnaturally when they move. Or maybe the background around them seems fuzzy or distorted. These are common visual errors that pop up in AI-augmented deepfake content.<\/li>\n\n\n\n<li><strong>Jumps or Loops in the Video Feed. <\/strong>Does the feed appear to be repeating the same cycle of footage. Maybe the video cuts from one scene to another, almost like a piece of content was removed or stitched together. This happens when the video is not long enough to encompass the entire video call.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-protect-yourself-from-video-call-scams\"><span class=\"ez-toc-section\" id=\"How_to_Protect_Yourself_From_Video_Call_Scams\"><\/span>How to Protect Yourself From Video Call Scams<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>In addition to knowing what to look for, there are actions you can take to avoid video call scams, and understanding <a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/do-blackmailers-give-up-if-you-ignore-them\/\">when to ignore the scammer is often part of staying safe<\/a>. Keep these suggestions in mind as you engage in virtual conversations.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Verify Your Contacts. <\/strong>Avoid joining calls with people you\u2019ve just met, and steer clear of online chat rooms that connect you with strangers. With deepfake capabilities, it can be challenging enough to confirm video of people you do know.<\/li>\n\n\n\n<li><strong>Use Safe Platforms. <\/strong>Keep your video calls on legitimate, verified, and secure platforms. Avoid moving the conversation to third-party apps. Don\u2019t click any links that are shared to you or open any strange attachments.<\/li>\n\n\n\n<li><strong>Avoid Oversharing. <\/strong>Many people will read this and assume it means to avoid talking about personal information. And while this is true, you also need to be aware of the information your video reveals. Make sure your background doesn\u2019t make your location identifiable.<\/li>\n\n\n\n<li><strong>Stay Aware and Informed. <\/strong>Scammers are constantly coming up with new tactics to trick their targets. Likewise, technology is always evolving and developing new uses for both good and bad. You need the latest expert advice in cybersecurity, and a great place to find it is our <a href=\"\/blog\/\">blog<\/a>.<\/li>\n<\/ul>\n\n\n\n<p>If you or someone you know is facing online blackmail, reaching out to the Digital Forensics Corporation <a href=\"https:\/\/www.digitalforensics.com\/blog\/software\/report-cybercrime-private-investigator\/\">Cybercrime Hotline<\/a> can connect you with experts who will guide you through this safely and confidentially.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-faq\"><span class=\"ez-toc-section\" id=\"FAQ\"><\/span>FAQ<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-can-a-scammer-fake-a-video-call-on-snapchat\"><span class=\"ez-toc-section\" id=\"Can_a_Scammer_Fake_a_Video_Call_on_Snapchat\"><\/span>Can a Scammer Fake a Video Call on Snapchat?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><br><strong>Yes, a scammer can fake a video call on Snapchat by using software that replaces their camera feed with a prerecorded or fake video. This can make it look like a real person is on the call, even though the video is not live.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-can-a-scammer-fake-a-video-call-on-whatsapp\"><span class=\"ez-toc-section\" id=\"Can_a_Scammer_Fake_a_Video_Call_on_WhatsApp\"><\/span>Can a Scammer Fake a Video Call on WhatsApp?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><strong>Yes, a scammer can fake a video call on WhatsApp by using tools that show a prerecorded or manipulated video instead of a live camera feed. They may do this to pretend they are someone else and gain your trust.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"Have you ever been on a video call with someone where something just felt strange? You may have&hellip;","protected":false},"author":131,"featured_media":11940,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[773],"tags":[],"class_list":{"0":"post-11938","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-extortion","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Do Scammers Video Call? How to Spot a Fake Video Call Scam<\/title>\n<meta name=\"description\" content=\"Yes, scammers video call using fake feeds, deepfakes, and prerecorded clips. Learn how to spot a fake video call scam, recognize imposters, and protect yourself.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/is-your-live-feed-actually-a-video-call-scam\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Do Scammers Video Call? Expert Guide to Spotting Fakes\" \/>\n<meta property=\"og:description\" content=\"Yes, scammers use fake video calls. Learn expert ways to spot deepfakes, imposters, and protect yourself from a video call scam.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/is-your-live-feed-actually-a-video-call-scam\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-18T14:57:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/08\/Do_scammers_video_call_-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jack Gillespie\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Do Scammers Video Call? Expert Guide to Spotting Fakes\" \/>\n<meta name=\"twitter:description\" content=\"Yes, scammers use fake video calls. Learn expert ways to spot deepfakes, imposters, and protect yourself from a video call scam.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/08\/Do_scammers_video_call_.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jack Gillespie\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/is-your-live-feed-actually-a-video-call-scam\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/is-your-live-feed-actually-a-video-call-scam\\\/\"},\"author\":{\"name\":\"Jack Gillespie\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/4eb49f01ff515fad38e835a9b9497fba\"},\"headline\":\"How to Spot a Fake Video Call Scam and Protect Yourself\",\"datePublished\":\"2025-08-18T14:57:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/is-your-live-feed-actually-a-video-call-scam\\\/\"},\"wordCount\":1774,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/is-your-live-feed-actually-a-video-call-scam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Do_scammers_video_call_.jpg\",\"articleSection\":[\"Resources and Articles for Victims of Extortion Scams\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/is-your-live-feed-actually-a-video-call-scam\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/is-your-live-feed-actually-a-video-call-scam\\\/\",\"name\":\"Do Scammers Video Call? How to Spot a Fake Video Call Scam\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/is-your-live-feed-actually-a-video-call-scam\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/is-your-live-feed-actually-a-video-call-scam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Do_scammers_video_call_.jpg\",\"datePublished\":\"2025-08-18T14:57:50+00:00\",\"description\":\"Yes, scammers video call using fake feeds, deepfakes, and prerecorded clips. Learn how to spot a fake video call scam, recognize imposters, and protect yourself.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/is-your-live-feed-actually-a-video-call-scam\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/is-your-live-feed-actually-a-video-call-scam\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/is-your-live-feed-actually-a-video-call-scam\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Do_scammers_video_call_.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Do_scammers_video_call_.jpg\",\"width\":2560,\"height\":1120,\"caption\":\"Video Call Scam\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/is-your-live-feed-actually-a-video-call-scam\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources and Articles for Victims of Extortion Scams\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Spot a Fake Video Call Scam and Protect Yourself\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/4eb49f01ff515fad38e835a9b9497fba\",\"name\":\"Jack Gillespie\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/jack-gillespie_avatar-96x96.png\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/jack-gillespie_avatar-96x96.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/jack-gillespie_avatar-96x96.png\",\"caption\":\"Jack Gillespie\"},\"description\":\"Cybercrime Writer & Awareness Advocate \\\"You don\u2019t need to be a tech expert to protect yourself online \u2014 but you do need the right information.\\\" \u2014 Jack Gillespie \u00a0 Jack Gillespie is a cybersecurity content writer who specializes in explaining the human, emotional, and technical elements behind modern online threats. With a background in journalism and a passion for digital safety, Jack creates high-impact, approachable content that helps readers of all experience levels understand, recognize, and respond to cybercrime. \u00a0 Areas of Expertise Jack\u2019s work aims for the sweet spot at the intersection of technology and psychology, helping readers stay informed and protected through education that\u2019s delivered in a digestible manner: \u2022 Social engineering scams \u2013 how manipulation tactics fuel phishing, sextortion, and online fraud. \u2022 Data breach scenarios \u2013 why they happen, how they spread, and how readers can proactively minimize exposure. \u2022 Malware and ransomware \u2013 plain-language breakdowns of how malicious software works and what to do if affected. \u00a0 Role at Digital Forensics Corp. At Digital Forensics Corp., Jack blends editorial clarity with technical accuracy to produce content that educates, supports, and engages. He contributes to both writing and editing efforts, working closely with cybersecurity experts and legal professionals to ensure each piece meets high standards of credibility and readability. His priority is helping people recognize threats before they arise \u2014 and empowering those already affected to take the next steps with confidence through expert advice. \u00a0 Key Publications & Projects \u2022 \\\"Sextortion Awareness for Children\\\" Booklet \u2013 A youth-focused educational guide distributed through local schools to help minors identify, avoid, and report this rapidly expanding cybercrime. \u2022 Sextortion Explained \u2013 A detailed resource for sextortion victims that explains common tactics, recovery strategies, legal protections, and examples of real-life cases. \u2022 \u201cOperation Artemis\u201d Coverage \u2013 \u201cFive Ws\u201d breaking news style coverage of a major FBI investigation that led to the extradition of 22 Nigerian nationals involved in an international sextortion ring. \u00a0 Professional Perspective Jack is committed to making cybersecurity education accessible to all, regardless of background or technical skill. Whether writing for victims, parents, small business owners, or curious readers, he combines journalistic integrity with a human-centered approach to ensure each message resonates with a broad audience. \u00a0 Education & Credentials \u2022 B.A. in Journalism and Promotional Communications Cleveland State University \u2022 SEO Principles Certification Semrush Academy \u00a0 Additional Background Jack began his career as a freelance sports journalist, where he sharpened his storytelling skills and editorial discipline: \u2022 Contributor at Ohio Varsity \u2022 Reporter for Geauga County Maple Leaf\u00a0 This experience has strengthened his ability to adapt his voice across formats and audiences \u2014 from breaking news to educational deep-dives.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/jack-gillespie-21aa85222\\\/\"],\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/jack-gillespie\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Do Scammers Video Call? How to Spot a Fake Video Call Scam","description":"Yes, scammers video call using fake feeds, deepfakes, and prerecorded clips. Learn how to spot a fake video call scam, recognize imposters, and protect yourself.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/extortion\/is-your-live-feed-actually-a-video-call-scam\/","og_locale":"en_US","og_type":"article","og_title":"Do Scammers Video Call? Expert Guide to Spotting Fakes","og_description":"Yes, scammers use fake video calls. Learn expert ways to spot deepfakes, imposters, and protect yourself from a video call scam.","og_url":"https:\/\/www.digitalforensics.com\/blog\/extortion\/is-your-live-feed-actually-a-video-call-scam\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2025-08-18T14:57:50+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/08\/Do_scammers_video_call_-1.jpg","type":"image\/jpeg"}],"author":"Jack Gillespie","twitter_card":"summary_large_image","twitter_title":"Do Scammers Video Call? Expert Guide to Spotting Fakes","twitter_description":"Yes, scammers use fake video calls. Learn expert ways to spot deepfakes, imposters, and protect yourself from a video call scam.","twitter_image":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/08\/Do_scammers_video_call_.jpg","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Jack Gillespie","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/is-your-live-feed-actually-a-video-call-scam\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/is-your-live-feed-actually-a-video-call-scam\/"},"author":{"name":"Jack Gillespie","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/4eb49f01ff515fad38e835a9b9497fba"},"headline":"How to Spot a Fake Video Call Scam and Protect Yourself","datePublished":"2025-08-18T14:57:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/is-your-live-feed-actually-a-video-call-scam\/"},"wordCount":1774,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/is-your-live-feed-actually-a-video-call-scam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/08\/Do_scammers_video_call_.jpg","articleSection":["Resources and Articles for Victims of Extortion Scams"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/is-your-live-feed-actually-a-video-call-scam\/","url":"https:\/\/www.digitalforensics.com\/blog\/extortion\/is-your-live-feed-actually-a-video-call-scam\/","name":"Do Scammers Video Call? How to Spot a Fake Video Call Scam","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/is-your-live-feed-actually-a-video-call-scam\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/is-your-live-feed-actually-a-video-call-scam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/08\/Do_scammers_video_call_.jpg","datePublished":"2025-08-18T14:57:50+00:00","description":"Yes, scammers video call using fake feeds, deepfakes, and prerecorded clips. Learn how to spot a fake video call scam, recognize imposters, and protect yourself.","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/is-your-live-feed-actually-a-video-call-scam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/extortion\/is-your-live-feed-actually-a-video-call-scam\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/is-your-live-feed-actually-a-video-call-scam\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/08\/Do_scammers_video_call_.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/08\/Do_scammers_video_call_.jpg","width":2560,"height":1120,"caption":"Video Call Scam"},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/is-your-live-feed-actually-a-video-call-scam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Resources and Articles for Victims of Extortion Scams","item":"https:\/\/www.digitalforensics.com\/blog\/extortion\/"},{"@type":"ListItem","position":3,"name":"How to Spot a Fake Video Call Scam and Protect Yourself"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/4eb49f01ff515fad38e835a9b9497fba","name":"Jack Gillespie","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/jack-gillespie_avatar-96x96.png","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/jack-gillespie_avatar-96x96.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/jack-gillespie_avatar-96x96.png","caption":"Jack Gillespie"},"description":"Cybercrime Writer & Awareness Advocate \"You don\u2019t need to be a tech expert to protect yourself online \u2014 but you do need the right information.\" \u2014 Jack Gillespie \u00a0 Jack Gillespie is a cybersecurity content writer who specializes in explaining the human, emotional, and technical elements behind modern online threats. With a background in journalism and a passion for digital safety, Jack creates high-impact, approachable content that helps readers of all experience levels understand, recognize, and respond to cybercrime. \u00a0 Areas of Expertise Jack\u2019s work aims for the sweet spot at the intersection of technology and psychology, helping readers stay informed and protected through education that\u2019s delivered in a digestible manner: \u2022 Social engineering scams \u2013 how manipulation tactics fuel phishing, sextortion, and online fraud. \u2022 Data breach scenarios \u2013 why they happen, how they spread, and how readers can proactively minimize exposure. \u2022 Malware and ransomware \u2013 plain-language breakdowns of how malicious software works and what to do if affected. \u00a0 Role at Digital Forensics Corp. At Digital Forensics Corp., Jack blends editorial clarity with technical accuracy to produce content that educates, supports, and engages. He contributes to both writing and editing efforts, working closely with cybersecurity experts and legal professionals to ensure each piece meets high standards of credibility and readability. His priority is helping people recognize threats before they arise \u2014 and empowering those already affected to take the next steps with confidence through expert advice. \u00a0 Key Publications & Projects \u2022 \"Sextortion Awareness for Children\" Booklet \u2013 A youth-focused educational guide distributed through local schools to help minors identify, avoid, and report this rapidly expanding cybercrime. \u2022 Sextortion Explained \u2013 A detailed resource for sextortion victims that explains common tactics, recovery strategies, legal protections, and examples of real-life cases. \u2022 \u201cOperation Artemis\u201d Coverage \u2013 \u201cFive Ws\u201d breaking news style coverage of a major FBI investigation that led to the extradition of 22 Nigerian nationals involved in an international sextortion ring. \u00a0 Professional Perspective Jack is committed to making cybersecurity education accessible to all, regardless of background or technical skill. Whether writing for victims, parents, small business owners, or curious readers, he combines journalistic integrity with a human-centered approach to ensure each message resonates with a broad audience. \u00a0 Education & Credentials \u2022 B.A. in Journalism and Promotional Communications Cleveland State University \u2022 SEO Principles Certification Semrush Academy \u00a0 Additional Background Jack began his career as a freelance sports journalist, where he sharpened his storytelling skills and editorial discipline: \u2022 Contributor at Ohio Varsity \u2022 Reporter for Geauga County Maple Leaf\u00a0 This experience has strengthened his ability to adapt his voice across formats and audiences \u2014 from breaking news to educational deep-dives.","sameAs":["https:\/\/www.linkedin.com\/in\/jack-gillespie-21aa85222\/"],"url":"https:\/\/www.digitalforensics.com\/blog\/author\/jack-gillespie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/11938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/131"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=11938"}],"version-history":[{"count":19,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/11938\/revisions"}],"predecessor-version":[{"id":12724,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/11938\/revisions\/12724"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/11940"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=11938"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=11938"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=11938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}