Pause. Verify. Do not pay under pressure: The core anti scam protocol

FRAUD PREVENTIONFFDI

Friendly Tech Guide

3/3/20264 min read

PAUSE. VERIFY. DO NOT PAY UNDER PRESSURE.

The core anti-scam protocol

Protocol tagline: Pause. Verify. Do not pay under pressure.

This is a mini protocol you can run anytime a call, text, or email tries to rush you.

It is built for one goal: slow the moment down, verify safely, and avoid irreversible moves. (See Sources at the end for official guidance.)

This protocol is the RPR Method in action: Recognize the red flags, Pause to create a safety gap, and Respond by verifying through a trusted channel, and never pay under pressure.

STEP 1: PAUSE

Do not click. Do not answer questions. Do not explain yourself.

Take 10 seconds and ask:

Am I being pushed to act right now?

If yes, treat it as high risk. Your job is to slow it down first.

STEP 2: VERIFY USING A TRUSTED CHANNEL

Verification is not debating the person who contacted you.

Verification is switching to a channel you trust.

A trusted channel is one you choose — not one they provide.

Use one of these:

• A number from the back of your card

• A number from a statement you already receive

• A number inside the official app or official website you navigate to yourself

• The official app you already have installed

• A website address you type in yourself, or a bookmark you already use

Do not use:

• Any link they sent

• Any QR code they sent

• Any phone number or email address they sent (even if it looks real)

If you think it might be legitimate, verify by looking up the organization’s contact information yourself (or using your card/statement/app), then checking through that channel.

If the message is real, it will remain real after you verify it through your own channel.

STEP 3: DO NOT PAY UNDER PRESSURE

If anyone pressures you to pay, move money, share a code, or give remote access, that pressure is your stop sign.

Do this instead:

• End the contact

• Verify through your trusted channel

• Only decide after verification

Important: Only scammers demand payment by gift card or cryptocurrency. If you hear those words, stop immediately. (Sources below.)

You do not need to be rude. You just need to be consistent.

THE PROTOCOL IN ONE SENTENCE

Pause. Verify. Do not pay under pressure.

THREE SCRIPTS YOU CAN USE TODAY

SCRIPT 1: PHONE CALL

Use this when someone claims to be a bank, a delivery company, tech support, the government, or even a family member in trouble.

“Thanks for letting me know. I can’t act on this during a call. I’m going to verify through my own channel and call back if needed.”

If they push:

“I understand. I still need to verify. I’m ending the call now.”

Then:

  1. Hang up

  2. Find the trusted number from your card, statement, or official app/website you navigate to yourself

  3. Call that number and ask if the issue is real

SCRIPT 2: TEXT MESSAGE

Default rule: do not reply.

Verify independently through your trusted path.

If you need a rare boundary line for repeated messages, use it once, then stop engaging:

“I will not use links or codes from texts. I will verify through the official app or website I access directly.”

Then:

  1. Do not click

  2. Open the official app, or type the official website yourself

  3. Check for alerts inside your account

  4. Block and report the sender if the platform offers it

SCRIPT 3: EMAIL

Default rule: do not reply.

Verify independently through your trusted path.

If you must send a boundary line once, keep it short and stop there:

“I will verify by signing in through the official website I access directly. I will not use links or attachments from this email.”

Then:

  1. Do not open attachments

  2. Do not click buttons

  3. Type the official website yourself or use a bookmark

  4. Check messages inside the official site or app

ONE-SCREEN CHECKLIST

Pause. Verify. Do not pay under pressure.

  1. I pause before I click, reply, call back, or act

  2. I do not trust links, QR codes, or contact details inside the message

  3. I verify using a trusted path: card, statement, official app, or a website I type myself

  4. I never share passwords or one-time codes

  5. I never grant remote access because someone asked

  6. I do not make irreversible payments under pressure, including gift cards, wire, crypto, or fast transfer apps

  7. I end the contact if they push speed, secrecy, or threats

  8. I write down what happened and verify using official channels I navigate to myself

Optional rule:

If I feel urgency in my body, I treat it as high risk — and I pause.

SOURCES (OFFICIAL GUIDANCE)

CISA — Recognize and Report Phishing

https://www.cisa.gov/secure-our-world/recognize-and-report-phishing

FBI — Spoofing and Phishing (includes: don’t click; look up the company’s number on your own)

https://www.fbi.gov/how-we-can-help-you/scams-and-safety/common-frauds-and-scams/spoofing-and-phishing

FTC — Avoiding and Reporting Gift Card Scams (includes: only scammers tell you to buy gift cards and share the numbers)

https://consumer.ftc.gov/articles/avoiding-and-reporting-gift-card-scams

FTC — What To Know About Cryptocurrency and Scams (includes: only scammers demand payment in cryptocurrency)

https://consumer.ftc.gov/articles/what-know-about-cryptocurrency-scams

CFPB — Fraud and Scams consumer tools

https://www.consumerfinance.gov/consumer-tools/fraud/

IdentityTheft.gov — Report identity theft and get a recovery plan

https://www.identitytheft.gov/

DISCLAIMER

This is general prevention guidance, not legal advice. If you believe money or accounts are at immediate risk, use official channels you can navigate yourself, such as your bank’s support number on your card or statement. If identity theft is involved, IdentityTheft.gov can help you report and get a recovery plan.

Next up: Impersonation Playbook

If you found this information helpful, please forward it to someone who could benefit.