JBSA Graphics
A Scammer sits at a computer and tries to hack into a system.
240214-F-YI823-1003.PNG Photo By: Matthew McGovern

Joint Base San Antonio-Lackland, Texas - Scammers typically use technology to do the heavy lifting and avoid meeting in person. They use social media to create a fake persona or hack into other people’s profiles and con their friends and family members. They can even clip the victim’s voice through a telephone call and use AI software to replicate the victim’s voice and proceed to call loved ones of the victim usually asking for money. (photo illustration by Manuel Garcia)


DOWNLOAD PHOTO (0.24 MB)


This photograph is considered public domain and has been cleared for release. If you would like to republish please give the photographer appropriate credit. Further, any commercial or non-commercial use of this photograph or any other DoD image must be made in compliance with guidance found at http://www.dimoc.mil/resources/limitations.html , which pertains to intellectual property restrictions (e.g., copyright and trademark, including the use of official emblems, insignia, names and slogans), warnings regarding use of images of identifiable personnel, appearance of endorsement, and related matters.



Back to Gallery