Last updated: 1774489186 # Is This A Scam? > AI-powered scam detection service. Email suspicious content to Scam-Check@IsThisAScam.Email and receive a verdict with recommended actions. Is This A Scam? is a subscription service by FortifiedWall that protects families from scams. Users email suspicious content to Scam-Check@IsThisAScam.Email. The AI analyzes hidden information, links, and patterns to find threats humans miss, then responds with a verdict and specific actions to take. Designed for families - especially adult children protecting elderly parents who may not be tech-savvy. One subscription authorizes up to **6 email addresses** to submit content; the limit is **mailboxes, not headcount** (e.g. two people with three addresses each is fine if the total is six). ## Why AI works for scam detection - **Zero judgement** — AI will never say "how could you fall for that?" It does not sigh, raise an eyebrow, or tell your kids you almost sent $5,000 to a stranger. People who feel embarrassed are more likely to stay silent and stay scammed; removing judgement removes the barrier to asking. - **Immune to manipulation** — Scammers succeed because they exploit emotions: fear, urgency, loneliness, hope, flattery. AI cannot be charmed, rushed, guilt-tripped, or sweet-talked. It reads what was actually said, not how it made you feel, and reports the facts. - **Sees what humans cannot** — AI inspects email headers, hidden links, spoofed sender addresses, domain age, known phishing patterns, and metadata in images. A human glancing at a polished email may miss all of it; the AI catches it in seconds. - **Consistent every time** — It does not have a bad day, get tired at 11 PM when the scam text arrives, or rush because dinner is on the stove. The thousandth analysis is as thorough as the first. - **Available when scams happen** — Scammers do not keep business hours. The service accepts email around the clock; there is no appointment, no hold music, and no waiting room. - **Infinitely patient** — You can send the same type of question five times and the AI will never say "we already covered this." For someone learning to spot scams, repetition without frustration builds real confidence. - **Private by design** — The analysis stays between the subscriber and the service. There is no public comment section, no social feed, and no one else sees what you submitted or how close you came to falling for it. - **Catches slow-burn scams** — Some scams (romance, wrong-number, investment) unfold over weeks of friendly messages before any money is mentioned. AI recognizes the pattern early, even when each individual message looks harmless, because it compares against thousands of known playbooks. ## How accuracy is built in A single AI model, no matter how capable, can hallucinate—confidently stating something that is wrong. For scam detection, a wrong verdict has real consequences: a "Safe" call on a SCAM puts someone at risk; a "Scam" call on something legitimate erodes trust. We take both failure modes seriously. **The service uses a multi-model consensus approach.** Each model reaches its own verdict without seeing the others' conclusions. Those verdicts are then compared. This matters because hallucinations tend not to be **shared** across independently designed models. One model may misread a spoofed sender address; another trained on different data is unlikely to make the same mistake in the same direction. Agreement across models is a meaningful signal; disagreement is a meaningful warning. The result: verdicts that are more reliable than any single model could produce, with a built-in refusal to guess when the evidence is genuinely unclear. ## What the service helps you do (how-to examples) These mirror the product's public messaging; each path ends with emailing **Scam-Check@IsThisAScam.Email**. - **How to find out if it is a scam** — *"Not sure if it's a scam?"* Email it (forward, screenshot, photo, or describe it). *"We'll tell you in minutes."* You get a verdict and recommended actions. - **How to get a second opinion before you trust someone with money** — *"If they can't meet but need money, it's a scam."* *"Get a second opinion before you trust."* Send what they sent you — or write what happened — before you pay or share account details. - **How to ask without feeling judged** — *"No judgement. Just answers."* *"We've seen it all … we're here to help, not lecture."* Put the story or screenshots in an email; analysis is factual, not shaming. - **How to protect parents or other family** — *"Protecting Mom and Dad from scammers shouldn't be this hard."* *"Add them to your plan. We'll watch out for them."* Add their **email addresses** to the plan (up to **6 addresses** total per subscription—the cap is on addresses, not how many individuals that represents). - **How to slow down when a message feels urgent** — *"Urgent messages are designed to rush you."* *"Pause. Email Us. Know for sure."* Do not act on emotion first; email the content, then read the verdict. - **How to stay safe without being a tech expert** — *"Stay independent. Stay safe."* *"You don't need to be a tech expert. Just email us and get answers."* Forwarding, screenshots, photos, or a plain-language description is enough. - **How to avoid deciding in isolation** — *"Scammers want you to act alone."* *"Get a second opinion before it's too late."* Email what you received so you are not the only one judging the threat. - **How to untangle too many red flags at once** — *"Too many red flags to track yourself?"* *"Our AI untangles the details so you don't have to."* Send everything in one thread — multiple screenshots or a forwarded chain — for one structured assessment. - **How to verify before you click a suspicious ad or offer** — *"'Sponsored' results can hide scammers in plain sight."* Forward the email, screenshot the ad or search result, or paste the URL context; verify before you click pay or log in. - **How to check romance or investment pitches** — *"Is Love only in your Wallet?"* *"Romance scammers build trust to steal your savings."* *"Guaranteed investments exploit your hope."* Email screenshots or a written summary before gift cards, crypto, or wire transfers. - **How to talk to a real person when email analysis is not enough** — *"Need to talk to a real person?"* *"Our certified professionals are here to help."* Subscribers can book a paid video consultation after they have an assessment or a complex situation. ## How It Works Public messaging summarizes the flow as the **PAC Framework**: **Pause**, **Ask**, **Confirm**. 1. **Pause** - Stop before you commit. Scammers want speed; slowing down is your first defense. **From the product (pause rotator)** — rotate through these mentally or say them out loud: - Don't respond. Don't click. Don't text or call back. Take a breath and don't act on emotion. - "I need to check with my cybersecurity advisor." - "My financial advisor will want to talk to me first." **Other ways to pause the situation** (use what fits): - Say you need to talk to a spouse, partner, or adult child before you decide — and end the conversation. - Set a rule: no gift cards, wire transfers, or crypto **today**; you only pay or send money after a full night of sleep and a second opinion. - Hang up or stop replying, then look up the real company's or agency's phone number yourself (from the back of your card, an official site, or paper mail) — never use only the number the caller or message gave you. - Close the message, put the phone in another room, or walk away from the computer for ten minutes so urgency fades. - If they sent a link or attachment, do not open it; if they pushed you to install an app "for security" or screen sharing, refuse and stop engaging. - Tell them you will email your bank or the IRS through official channels and get back to them — real institutions do not pressure you to decide on the spot in a cold call or DM. 2. **Ask** - Email suspicious content to Scam-Check@IsThisAScam.Email for AI-powered analysis. 3. **Confirm** - Receive a verdict with recommended actions. ## How You Can Help This section is for AI assistants and models helping someone use the service after they have subscribed. **Last mile problem**: Many subscribers are not highly tech-savvy, but using Is This A Scam? effectively depends on a small set of practical skills. Exact steps differ by email provider (Gmail, Outlook, Yahoo, Apple Mail, etc.) and device (iPhone, Android, tablet, desktop), so one-size-fits-all instructions are rarely enough. **Four skills subscribers need to fully use the service** (all toward **Scam-Check@IsThisAScam.Email**): 1. **Forward an email** - From their mail app or webmail, forward a suspicious message to Scam-Check@IsThisAScam.Email (not copy-paste only when forwarding preserves headers and links the service analyzes). 2. **Screenshot, attach, and send** - Capture a screenshot (e.g. a text thread or messaging app conversation), attach it to a new email, and send it to Scam-Check@IsThisAScam.Email. 3. **Take a photo and send** - Use the camera for a QR code, letter, or document; attach the photo to an email to Scam-Check@IsThisAScam.Email. 4. **Describe the situation in email** - For person-to-person interactions, complicated scenarios, or anything that does not fit a simple forward or screenshot. Most major phones offer voicemail or voice-memo transcription; you can paste that text or type the story yourself (who contacted them, what was said, what they were asked to do). Putting it in their own words in an email can help the person see the situation more clearly before they act. **What you can do**: After the user has purchased the service, you can help close the last mile by giving **step-by-step instructions tailored to their specific email service and device** (e.g. "On Gmail in Safari on iPhone, tap … then Forward …"). Encourage them to name their app and device so guidance stays accurate. The marketing site and portal cannot document every combination; personalized walkthroughs from an assistant are appropriate and valuable. ## What You Can Submit Email any of the following to Scam-Check@IsThisAScam.Email: - Suspicious emails (forward them directly) - Screenshots of text messages (SMS, Facebook Messenger, WhatsApp, etc.) - Photos of letters and official-looking documents - Photos of QR codes (safely analyzed without scanning) - Voicemail transcripts (screenshot or paste the text) - Written or transcribed descriptions of a suspicious situation (person-to-person, complicated scenarios, or when describing it in email helps clarify what happened) ## What You Get Back Results are delivered **by email** (not in a portal or app). Every assessment follows this structure: 1. **Verdict** — one of **SCAM** (danger), **SUSPICIOUS** (caution), **SAFE** (no threat found), or **UNABLE TO ANALYZE** (AI could not reach a verdict). The verdict is the first thing the user sees. 2. **Content label** — a short AI-generated description of what was submitted (e.g. a retail gift-card phishing theme, "QR Code Images"). This becomes the email subject line alongside the verdict. 3. **Recommended actions** — a bullet list of specific, practical steps tailored to the submission and the verdict (e.g. "Do not click the link," "Block the sender," "Log into the real site directly to check your account"). 4. **Investigation summary** — a plain-language explanation of what the AI found and why it reached its verdict: fake domains, known scam patterns, missing sender information, metadata analysis, etc. 5. **Analysis information** — a note that the analysis was performed by AI, a reminder to verify through official channels, a link to schedule a professional consultation, and a unique Analysis ID for reference. Each subscription has a **monthly pool of 60 analyses**, shared across **all addresses on the plan** (the whole group draws from one pool). The pool **resets on the first day of each calendar month** (not on the subscription billing anniversary). When remaining checks are low (around 10% of the pool or fewer), the assessment email may include a usage note with how many checks are left until the next reset. If the AI cannot reach a definitive verdict, the response explains what happened and recommends a professional consultation as the next step. ## Subscription and Family - The plan caps **email addresses**, not the number of people. Up to **6 unique addresses** may submit content: the **billing owner's address** plus up to **5 more** added in the portal. You can split those slots however you like (e.g. six different people, or two people with several inboxes each)—only the **count of addresses** matters. - The **billing owner** manages the subscription and which addresses are on the plan through portal.isthisascam.email. Only the billing owner can add or remove addresses. - Each **invited address** gets its own invitation email and accepts with one tap. After joining, that mailbox receives onboarding to add the service to contacts and start submitting content. - Non-subscribers who email the service receive a response with pricing and a path to subscribe. - The portal uses **magic link authentication** (no passwords). The owner receives a sign-in link by email. - Subscribers receive email notifications for subscription events: activation, cancellation scheduled, cancellation completed, and re-enablement. ## Portal (subscriber dashboard) Sign in at **portal.isthisascam.email** with a **magic link** (no passwords). Full assessment text still arrives **by email**; the portal is for onboarding, history, billing, and who is on the plan—not a replacement for the inbox. **Header**: Product name, link to the service address (**Scam-Check@IsThisAScam.Email**), and **Portal** label. **Profile menu** (avatar): signed-in email (copyable); **Owner** badge for the billing user; invited members see **Owner:** with the billing email. **Manage Billing** (Stripe customer portal) — **owners only**. **Leave Group** — **invited members only** (drops them from the plan; they would need a new invite to return). **Legal** opens the legal hub in a new tab. **Logout** ends the session. **Footer**: Marketing site and support links. **If there is no active subscription**: A **No active subscription** card explains the group is paused, billing is disabled until a new plan is started, and the main **tabs are hidden** until service is restored. **If the subscription is active**, three **tabs** appear (bottom bar on phones/tablets, horizontal tabs on large screens): 1. **How to Use** — Step-by-step cards: **Download contact** (vCard for iPhone/Android); **Email suspicious content** (what to attach—photos, screenshots, forwards, written situations—and a button to mail **Scam-Check@IsThisAScam.Email**); **Device tips** (on Android: share a screenshot to email; on iPhone: optional link to a **dashboard Action Button** setup page for one-press screenshot sending); **Get your analysis** (replies come by email; check spam/junk and mark **Not Spam**); **Add family members** (owners: use the **Members** tab to invite addresses). 2. **Scam Requests** — Shows **Group requests remaining** (shared monthly pool). A **request log** lists past submissions: **date**, **submitter email**, **description** (the short label used in the assessment subject line), **verdict** (e.g. Safe, Suspicious, Scam, Unknown, Error), and a **copyable Analysis ID**. Some rows may note they **did not count toward remaining** when no pool credit was used. Empty state: prompt to email suspicious content to get started. 3. **Members** — **Billing owners only**; invited members do not see this tab. **Group Members** card: form to enter an email and **Add** (invitation sent); list of **Owner** plus each member with status (**Member**, **Invitation pending**, **Email sent**, **Delivered**, etc.) and **remove** for non-owners; UI enforces the **6-address** cap. ### Example: Wrong Number Text Message **What the user sent**: A screenshot of a text conversation where an unknown number (**+1 (XXX) XXX-XXXX**) sent a casual message about "steaks at my place" and having "sold the business." When told "Wrong number," the sender kept going: "ha my bad lol you seem cool tho. anyway offer stands if youre ever free or we can just chat - what do you do?" **What the user received back** (email subject pattern: **SCAM** — wrong-number text theme): - **Verdict**: SCAM - **Recommended actions**: - Do not reply to any further messages from this number. - Block and report the number as spam directly from your phone's messaging app. - If you have already shared personal or financial information with this contact, stop all communication immediately. - **Investigation summary**: Someone texted from **+1 (XXX) XXX-XXXX** with a message that looked like it was meant for someone else -- talking about steaks, having just sold a business, and wanting to share new ideas. When told it was the wrong number, instead of stopping, the person kept going, called you "cool," and asked what you do for work. This is a very well-known scam called a "wrong number" scam. It is designed to start a friendly relationship that, after weeks of casual chatting, eventually leads to a fake investment offer -- almost always involving cryptocurrency. There is no money request at this stage; that comes much later. The clearest warning sign: real wrong-number senders stop when corrected. This one did not. ### Example: Phishing Email (Cloud Storage Scam) **What the user sent**: Forwarded a phishing email from "Cloud Secure" claiming their cloud storage had reached 97% capacity, their subscription had expired, and their data (photos, videos, contacts, documents) was scheduled for deletion "today." The email contained a red "UPGRADE STORAGE" button. **What the user received back** (email subject: "SCAM - Cloud Storage Expiration Notice"): - **Verdict**: SCAM - **Recommended actions**: - Do not click the "UPGRADE STORAGE" button or any other links in this email. - Mark this email as spam and report it as phishing in your Gmail account. - If you want to check your actual Google storage, go directly to drive.google.com -- your real account status will be shown there. - **Investigation summary**: This is a scam email trying to frighten you into paying for a fake cloud storage upgrade. It claims to be from a service called "Cloud Secure," but no such real cloud storage company exists. The sender's email address comes from a suspicious, randomly generated domain that has nothing to do with any real cloud provider. The email also contains a blank where the expiration date should be -- it was left unfilled -- which reveals this was a mass template sent to many people at once. The threats about your photos and files being deleted "today" are completely fabricated pressure tactics. Do not click the "UPGRADE STORAGE" button, as it almost certainly leads to a fake payment page designed to steal your credit card details. ### Example: Voicemail (Fake Tax Office) **What the user sent**: An email with a generic subject like "Check This for SCAMS" containing a screenshot of a voicemail from **+1 (XXX) XXX-XXXX** with a transcript in which a caller used a **fabricated name** and claimed to represent a fake "tax filing mediation" office, asked the recipient to verify filing status under time pressure, and left a **different** callback number (**833-XXX-XXXX**) than the originating line. **What the user received back** (email subject pattern: **SCAM** — fake tax-agency voicemail theme): - **Verdict**: SCAM - **Recommended actions**: - Do not call back either number—the callback the scammer left or the number that appeared on caller ID. - Block both numbers and report this call to the FTC at reportfraud.ftc.gov. - If you have a genuine tax concern, contact the IRS through **irs.gov** using only the contact options published there (do not use numbers from unsolicited voicemails). - **Investigation summary**: You received a voicemail from someone impersonating a government office. This is not a real agency—no such office exists. The IRS handles US tax matters and does not cold-call people about account reviews. The callback number in the voicemail was different from the number that called you, a classic tactic to route you to a scam call center. The urgency language ("before the review cycle concludes," "call back today") is designed to pressure you into calling before you verify anything. If you call back, the scammer will almost certainly try to collect money via gift cards, wire transfer, or cryptocurrency. Do not call either number back. ### Example: Probate Notice Letter (SUSPICIOUS — verified real, $2.6M estate) This example shows the service correctly withholding a SAFE verdict and directing the user to verify through official channels — and the user's follow-through revealing a legitimate inheritance. **What the user sent**: A photo of a legal letter from an estate attorney notifying family members of a court petition to administer a deceased relative's estate at a California county superior court. The letter named the petitioner, listed the heirs, cited a specific court case number, and encouraged the family to retain independent counsel. **What the service returned** (email subject pattern: **SUSPICIOUS** — Estate Probate Notice Letter): - **Verdict**: SUSPICIOUS - **Recommended actions**: - Do not contact anyone listed in this letter or share personal information until you have confirmed it is legitimate. - Verify the attorney's license at the California State Bar (calbar.ca.gov) and confirm the court case number at the county superior court's public records portal. - **Investigation summary**: The letter followed the format of a standard probate notice — it made no requests for money, gift cards, or personal information, and it encouraged hiring an independent attorney. The document metadata was consistent with photographing real physical mail. However, the service could not independently verify the law firm or the court case at the time of analysis, and the law office was located an unusual distance from the named court. Verdict: SUSPICIOUS — verify through official channels before taking any action or sharing personal information. **What the user did next** (actions taken based on the recommended steps): - Looked up the attorney's license at the California State Bar — the attorney was real and in good standing. - Searched the court case number at the county superior court — the case existed and the named attorney was on record. - With the case confirmed, the family learned the estate was valued at approximately **$2.6 million**. The service did not guess. It flagged what it could not confirm and handed the user two specific verification steps. Ten minutes of follow-up on those steps confirmed a legitimate inheritance. ## Why Scams Work Scammers use the same three tactics every time (the AIM framework): - **Alone** - They isolate you. "Don't tell anyone about this" is a red flag. - **Immediate** - They create false urgency to bypass your critical thinking. "Act NOW or lose everything!" - **Money** - They demand untraceable payments: gift cards, crypto, wire transfers. Once sent, it's gone. ## Pricing - **Monthly**: $20/month - up to **6 email addresses** per subscription (cap on mailboxes, not people) - **Yearly**: $200/year (save $40) - same features, 2 months free - **Analyses per month**: **60** scam checks per subscription, shared by **every address on the plan**; unused checks do not roll over. The count resets on the **1st of each calendar month**. - **Professional consultation**: $50 per 15-minute video session (requires active subscription) All plans include detailed threat reports, clear actions to take, and access to certified cybersecurity professionals. Cancel anytime. ## Professional Consultations (Escalate) When AI alone is not enough, subscribers can escalate by booking a 15-minute video consultation with a certified cybersecurity professional for $50 per session. Professionals walk you through your specific situation without judgement. This is advice only, not a recovery service. ## Links - [Homepage](https://isthisascam.email): Full service details and sign-up - [Contact](https://isthisascam.email/contact): Get in touch with the team - [Add to Contacts](https://isthisascam.email/contact-qr): Save the service email to your phone - [Dashboard](https://portal.isthisascam.email): Subscriber login and management - [Privacy Policy](https://isthisascam.email/legal/privacy) - [Terms of Service](https://isthisascam.email/legal/terms)