MiClase’s True Stories — Level 3 Too Good To Be True: Modern Scams

Read the Story

Rosa is a nursing assistant in Chicago. One Tuesday afternoon, her phone buzzes. The caller ID says “Cook County Sheriff.” A serious voice tells her, “Your nephew Luis caused an accident. He’s injured and needs money now for treatment. Don’t hang up. We’ll tell you where to send the payment.” Rosa hears a young man crying in the background. Her heart races.

Rosa almost reaches for her wallet but remembers a class story about virtual kidnapping and grandparent scams: criminals pretend to have a loved one and demand fast payment by wire, crypto, or gift cards. She hangs up and calls Luis’s mother. Luis is safe at school. These calls are designed to keep you on the line and pressure you to pay immediately.

That evening, Mark gets an email that looks like it’s from his bank. The logo is perfect. The message says, “Unusual sign-in attempt. Confirm your account in 30 minutes or it will be locked.” There’s a button: “Verify Now.” Mark doesn’t click. He opens a new browser tab and signs in the usual way. No alerts. He forwards the suspicious email to the bank’s fraud address.

Two days later, Rosa receives a text “from the IRS” about a “special refund.” It asks her to click a shortened link and enter her Social Security number. She laughs—she remembers that the IRS doesn’t start contact by text, social media, or email asking for personal info. She deletes the text and checks the IRS site for scam alerts.

On Friday, Mark’s aunt gets a call: “Auntie, it’s me. I need bail money. Please don’t tell Mom.” The voice is shaky and sounds like their nephew. She’s told to buy gift cards and read the numbers over the phone. Auntie pauses and calls the nephew directly—he’s at work, perfectly fine.

At week’s end, the community center hosts a safety talk. The speaker explains that reported U.S. losses to fraud have hit record highs in recent years, with older adults often targeted. The group practices how to respond: slow down, verify using a trusted number, never pay with gift cards or crypto for emergencies, and report scams to official sites.

Key signals: pressure + secrecy + unusual payment (gift cards/crypto); don’t trust caller ID or display names; verify using a number or website you find yourself.
Vocabulary — Matching A (advanced terms)

Drag to match terms (left) to definitions (right). On mobile, tap-and-hold to drag.

Answer Key (A): 1→b, 2→c, 3→d, 4→e, 5→a, 6→h, 7→f, 8→g, 9→i, 10→j
Vocabulary — Matching B (everyday words)

Drag to match plain-language words to their definitions.

Answer Key (B): 1→i, 2→a, 3→e, 4→j, 5→b, 6→d, 7→f, 8→c, 9→h, 10→g
Vocabulary in Context

Choose the best word for each sentence.

    Answer Key: a phishing; b spoofed; c verify; d refund; e attachment; f ransomware; g privacy; h complaint; i urgent; j wallet
    Multiple Choice
    Answer Key: 1-B, 2-C, 3-B, 4-C, 5-C
    Cloze (~25 blanks) — Word Bank Above

    One correct fill: urgent / secrecy / spoofed caller ID / phishing / attachment / refund / link / account / PIN / verify / gift / crypto / breach / report / losses
    True / False (explain why)
    Answer Key: 1-False, 2-True, 3-False, 4-True, 5-False
    Sequencing A & B

    Sequencing A — Scary call about a family member

      Best order: B → A → C → D → E

      Sequencing B — If you clicked a bad link

        Best order: A → B → C → D → E
        “For Example” — Rewrite risky messages into safe actions
        Sample safe plans:
        • a) Hang up; call the grandchild/parent using a known number; refuse gift cards; report.
        • b) Do not click; sign in via your normal bank app; contact bank support; report.
        • c) Hang up; call the relative & local authorities at trusted numbers; refuse payment; report to IC3/FTC.
        • d) Don’t open; verify sender independently; use secure client-intake tools; alert IT; report.
        Discussion / Writing & Role-Play

        Discussion / Writing

        • Describe a suspicious message you’ve seen. What signals told you it was a scam?
        • Why do scammers push for secrecy and speed?
        • Write a short PSA with three steps to stop a scam in your community.

        Role-Play (15–20 lines)

        1. Caller: “This is urgent. Your nephew is hurt. Buy gift cards now.”
        2. Rosa: “I’m ending this call. I will verify with family directly.”
        3. Moderator: “Notice the pressure and secrecy?”
        4. Mark: “Bank email says ‘confirm password.’ I’ll use the bank app instead.”
        5. Bank Rep: “We never ask you to confirm a password by email.”
        6. Auntie: “Someone sounding like my grandson wants bail money. I’ll call him.”
        7. Caller: “No—stay on the line!”
        8. Auntie: “Goodbye.”
        9. Moderator: “What payment method was demanded?”
        10. Rosa: “Gift cards—big red flag.”
        11. Bank Rep: “Never share one-time codes or your PIN.”
        12. Mark: “If I clicked, I should change passwords, enable 2FA, and report it.”
        13. Moderator: “Exactly—report to your bank, the FTC, and IC3.”
        14. Rosa: “Caller ID can be spoofed.”
        15. All: “Slow down. Verify. Report.”
        Quick Reference & Sources

        Quick Reference

        • Don’t trust caller ID or surprise links.
        • No gift cards, crypto, or wire for emergencies.
        • Type websites yourself; verify with a known number.
        • Report scams: reportfraud.ftc.gov (all scams), ic3.gov (internet crimes).

        Sources (teacher refs)

        • FTC Consumer Sentinel data/press (record fraud losses).
        • FBI IC3 Internet Crime reports (internet-crime losses).
        • IRS scam guidance (Dirty Dozen; no initial contact by text/email asking SSN).
        • Grandparent / virtual kidnapping alerts (FTC/FCC/FBI).