How crime has shifted: The scams are new, but the psychology isn’t
The episode quickly underscores how the tactics behind crime remain the same even as the methods evolve. The surprise, urgency, and emotional pressure Dietl once saw in street cons now appear in cyber scams, amplified by the vast amount of personal information available online.
With social media and data leaks, criminals can build highly personalized schemes without ever meeting a victim. Shawnee and Tyler note how a few simple details — a relative’s name, a phone number, a school — can fuel convincing scams like the “grandparent con,” fake investments, or online romance schemes.
Watch the full Control Room episode on YouTube to learn more.
How crime has evolved and why instincts still matter
Dietl explores how today’s criminals use data breaches, social media, and publicly available information to personalize attacks. A scammer no longer needs to find you on a dark street; they can find your family details, employer, phone number, and friendships online, then craft a story designed to trigger urgency and fear.
This is where intuition plays a critical role. Dietl explains that during undercover work, he learned to sense danger through subtle cues — the same way people today sense something “off” in a suspicious email or unexpected call. Shawnee and Tyler reinforce this idea: if something feels wrong, slow down. Scammers rely on quick reactions and emotional responses. A pause is one of your strongest defenses.
Understanding the patterns behind modern scams
Rather than focusing on individual scam types, the episode highlights the patterns that unite them. Nearly every scam uses urgency with messages like “Act now,” isolation through instructions such as “Don’t tell anyone,” and escalation that begins with a small ask and grows into a major request. Whether it’s a romance scam, investment fraud, a government impersonation call, or a sextortion threat, the mechanics are remarkably similar.
Dietl says legitimate institutions don’t threaten you by email or demand unconventional payments. If someone pressures you — especially with fear — it’s a sign to step back and verify through a known, trusted channel.
The protector mindset: A modern approach to everyday security
Dietl notes how anyone can adopt what they call a “protector mindset.” It means staying aware, asking questions, and layering your defenses — from using strong passwords and multifactor authentication to verifying identities and monitoring kids’ online activity.
Tyler introduces a planning concept used in military operations: prepare for both the most likely threat and the most dangerous. In everyday terms, that means guarding against common identity theft attempts while also preparing for more serious risks like account takeover or large-scale fraud.
Catch the full episode on our YouTube channel to learn more.
Get the latest insights with weekly episodes of Control Room
Catch a new episode every Wednesday at 5 p.m. ET / 2 p.m. PT on the LifeLock YouTube channel for a new episode of Control Room. Each week, we break down emerging scam trends, expose the methods fraudsters rely on, and share clear, practical steps you can take to protect your identity with confidence.
Editor’s note: Our articles provide educational information. LifeLock offerings may not cover or protect against every type of crime, fraud, or threat we write about.
This article contains
Start your protection,
enroll in minutes.
LifeLock is part of Gen – a global company with a family of trusted brands.
Copyright © 2026 Gen Digital Inc. All rights reserved. Gen trademarks or registered trademarks are property of Gen Digital Inc. or its affiliates. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.