True Crime Reporter® Podcast

  • About
  • Crime Stories
  • Subscribe
  • News
  • Contact
You are here: Home / General / One Click Away From Cyber Catastrophe

May 6, 2025 By Robert Riggs

One Click Away From Cyber Catastrophe

By Robert Riggs

A Knock at the Digital Door

The most dangerous criminal in your life may never break into your home. He won’t kick down the door or climb through a window. He doesn’t need to.

He only needs you—or your child, or your elderly parent—to click once.

That’s all it takes.

I interviewed Art Bowker on my True Crime Reporter® podcast to understand the new breed of digital predator lurking in plain sight. A former federal probation officer and co-author of Surviving a Cyberattack: Securing Social Media and Protecting Your Home, Bowker doesn’t mince words. “You’re more than likely going to be a victim of a cybercrime,” he warned me. “We wrote the book to prevent that—or help you survive it if it happens”.

He calls it cyber survival.

Digital Predators Target the Most Vulnerable

Bowker explained that we’re in the middle of an invisible war inside our homes, and our children and aging parents are in the crosshairs.

“They go after the vulnerable,” he said. “People who are lonely, people who are isolated, people who don’t fully understand how the technology works.”

In what’s chillingly called “pig butchering scams”—a term imported from China—criminals fatten their victims with flattery, fake love, and false financial opportunities. “Then, piece by piece, they cut off their finances,” Bowker explained. “I’m talking about entire 401(k)s, college savings, everything. Gone”.

He described cases where retirees were conned into fake crypto investments, only to be bled dry. “It’s not just financial devastation,” he said. “It’s emotional isolation, shame. They feel they can’t trust anyone anymore.”

A Child’s Game Console Becomes a Hunting Ground

Bowker told me about sextortion—something he thought he had seen the worst of during his years supervising sex offenders. But it’s gotten darker.

“There are now organized criminal groups extorting young boys. They trick them into sending explicit content, then threaten to expose them unless they pay money. Some of these boys are killing themselves,” he said, his voice tight with disgust.

He recounted recent cases where victims were blackmailed into self-mutilation—carving initials into their skin—while the abuse was livestreamed. “It’s about control,” he said. “They want power over someone’s life.”

And they’re finding kids not just through Instagram or Snapchat, but inside video game chats. “They play the game with them,” Bowker said, “then start the grooming process”.

Artificial Intelligence Makes Scams Undetectable

I asked Bowker about the role of artificial intelligence in all this. His answer chilled me.

“A man was taking photos of children at Disneyland,” he said. “He used AI to morph them into pornography.” In South America, criminals use AI to mimic voices pulled from social media. “A grandparent gets a call that sounds exactly like their grandchild. ‘I’ve been in an accident. Send money.’ It’s terrifying—and it’s convincing.”

He warned that old clues—misspellings, bad grammar—no longer apply. “AI cleans all that up,” he said. “It’s harder to detect every day”.

Your Smart Thermostat Can Betray You

Antivirus software won’t save you either.

“It only stops viruses that it recognizes,” Bowker said. “It doesn’t stop someone from sending you a message with a malicious link. One click and you’re compromised.”

Hackers breached a Las Vegas casino through an internet-connected thermostat. “The device had low security. Once they were in, they accessed the high-roller database,” Bowker explained.

Garage doors. Refrigerators. Cars. “You have to ask yourself—do I need this to be connected to the internet?” he said.

Protecting Yourself Means Changing the Mindset

The biggest myth, Bowker told me, is that cybersecurity is just about software.

“It’s a mindset,” he said. “It’s about talking to your kids. Talking to your parents. Monitoring their behavior and communication, not just their devices.”

He told me about a child whose parents had tightly locked down their home computer. But one sleepover at a friend’s house, and she spent the evening on unrestricted YouTube.

“She came back saying things that horrified them,” Bowker said. “Because they didn’t control that environment—and didn’t ask the right questions afterward”.

Skepticism is the New Armor

“You have to be skeptical—of everything,” Bowker advised.

He told me about fake threats that scare victims into paying ransoms. “They’ll say, ‘We saw what you did on your computer. Here’s your address.’ It’s all from publicly available data, tied to breaches.”

The AT&T breach, the Office of Personnel Management breach, and countless others put private information out there. “It becomes fuel for a scam,” Bowker said. “Your social security number, your contacts, your photos—they use all of it to socially engineer you”.

When the FBI Calls, It’s Not the FBI

Bowker shared a personal story about his late father.

“My dad used to call me in a panic. He’d get emails saying the FBI was going to arrest him. I had to tell him, ‘Dad, that’s not the FBI. They don’t send emails like that.”

He fears for his grandchildren now. “They’re growing up with this stuff. It’s going to affect their whole lives,” he said. “We wrote this book to help protect them—and everyone else’s kids too”.

If You’re a Victim, Speak Up

Silence is the scammer’s best friend. I belong to the FBI’s North Texas Chapter of Infragard, which was set up after 9-11 to protect critical infrastructure.

If you are a victim or something feels off, report it to the FBI’s Internet Crime Complaint Center at IC3.gov.

Cybercriminals are organized. Global. Supported by rogue governments. “They don’t need to invade our country,” Bowker warned. “They’re already in our homes. Through our phones, our kids’ games, and our parents’ email. They’re just one click away.”


PLEASE SUPPORT MY WORK


Click here to purchase my “Texas Crime Stories” audiobook. It downloads into your podcast app.

Click here to purchase the Paperback & Kindle editions on Amazon.


Subscribe to the True Crime Reporter® podcast.


Subscribe to the “Stories To Keep You Safe” Newsletter on the True Crime Reporter® website.


Schedule me to speak at your social meeting or corporate event.

My presentation, “Evil Walks Among Us,” features stories about serial killers and notorious criminals and personal safety tips.


Step into the storied halls of the Texas Prison Museum and uncover the gripping tales of infamous inmates, daring escapes, and the history of justice in the Lone Star State.



GET YOUR EXCLUSIVE DISCOUNT PROMO CODES


Click the Promo Code for your exclusive 20% OFF DISCOUNT at Eric Javits Designer Hats.

We wear these hats and receive a sales commission to keep producing stories.


Click the Promo Code for your exclusive 41% OFF DISCOUNT at Cozy Earth Bedding & Lounge Wear.

Oprah’s favorite since 2018. We receive a sales commission.


Click the Promo Code for your exclusive 30% OFF DISCOUNT at Protégé Painless Stiletto Heels

Designed by an MIT graduate who wanted comfort & luxury. We receive a sales commission.


Click the Promo Code for your exclusive 20% OFF DISCOUNT at Men’s HyperNatural Cool Polo Shirts.

Great for travel and golf. We receive a sales commission.


Click the Promo Code for your exclusive 15% OFF DISCOUNT at TONA Activewear Designer Gym Leggings.

Created by one of the founding designers of Lululemon. We receive a sales commission.


Filed Under: General

Subscribe to Podcast

Apple PodcastsSpotifyAndroidPodcast IndexRSSMore Subscribe Options

Real Crime Lessons From Those Who Lived It

Search

Recent Blog Post

One Million Dollar Reward Posted In Cold Case Murder Mystery

Widow of Slain Tennessee Autobody Shop Owner Offers Record Reward To Break The Silence By Robert Riggs A billboard towers above a pasture fence in rural Tennessee, its message blunt and … Continue Reading

Recent Episodes

Widow Offers One Million Dollars To Crack Cold Case Murder Mystery

The Rock: Alcatraz’s Chilling True Crime Legacy

The Click That Opens The Door To Cyber Hell

Search

Copyright © 2025 True Crime Reporter

Sitemap · Privacy Policy · Terms & Conditions · Disclaimer · Cookies Policy

Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}