logo
Oklahoma woman scammed $1.5 million out of elderly women posing as men in fake romances, officials say

Oklahoma woman scammed $1.5 million out of elderly women posing as men in fake romances, officials say

NBC News10-04-2025

In December 2024, Oklahoma officials say Jason Morris convinced his online, elderly girlfriend to send him $120,000 to pay for an oil vessel carrying 700,000 barrels in Alaska he allegedly owned to return to shore. Once the rig returned, she and Morris would move in together.
The bank held the funds, according to court documents. Morris instructed the woman to contact her bank and lie to them, saying the funds were for purchasing property and not for the alleged oil tanker.
But the bank was right to raise suspicion — officials say there was never an Alaskan oil rig. In fact, they say there was never a Jason Morris.
'Scams that target seniors'
Christine Joan Echohawk, a 53-year-old woman from Oklahoma, was allegedly the face behind the screen, scamming the older woman out of hundreds of thousands of dollars and laundering the money.
Four different women were scammed out of $1.5 million through Echohawk's online romance scams between Sept. 30 and Dec. 26, 2024, according to a release from the office of Oklahoma Attorney General Gentner Drummond.
The women were between the ages of 64 and 79 and all lived outside of Oklahoma.
'These types of scams that target seniors are especially egregious,' Drummond said in the release.
The attorney general filed charges against Echohawk on Monday for 'unlawful use of criminal proceeds and using a computer to violate state statutes,' the release said. Echohawk was sent cash, checks, wired funds and even tens of thousands in Apple gift cards.
Authorities say Echohawk laundered the funds through various accounts, converting the money into cryptocurrency and sending those crypto payments to an unidentified suspect.
Jason Morris, Edward Lotts and Glenn Goadard
The alleged scams included fake names — such as Edward Lotts and Glenn Goadard — and elaborate backstories explaining the need for loads of cash, according to a probable cause affidavit.
Lotts convinced one woman to send more than $600,000 to pay off a debt that would allow $2 million to be released to "him." When the debt was paid off, Lotts would move in with her, the affidavit stated.
The victim sold her paid-off home to send all the money.
Goadard contacted another woman claiming to know her since college. The woman was persuaded into paying $250,000 for expenses on a financial portfolio Goadard would send her from Syria.
But Echohawk allegedly received all the funds, depositing them into a MidFirst Bank account in which she was the sole signatory, according to the affidavit.
The Stillwater MidFirst Bank branch tipped off Drummond's office in January, suspecting Echohawk of senior-fraud activity after a $120,000 payment from one of the victims was intercepted and held, according to the release. The Consumer Protection Unit subsequently investigated.
Confidence/romance crimes and Maurice Deniro
Defined as a confidence/romance scheme by the FBI, these crimes occur when an individual believes they are in a relationship — whether family, friend or romantic — and manipulated into sending money, financial or personal information, or items of value to a perpetrator. The FBI Internet Crime Report found more than $600 million was lost in 2023 to confidence/romance crimes alone.
Local law enforcement confronted Echohawk about the suspected criminal activity in January, but after a short hiatus she allegedly continued to launder the money.
Echohawk was voluntarily interviewed at the Pawnee police department on March 26, an interview she opened with asking if it would "all go away" if she paid back the individuals who sent her money, according to the affidavit.
But she then claimed it was her who was in an online relationship, that she was receiving cash, checks, wire transfers and other items since 2023 for an individual under the alias of Maurice Dinero, the affidavit said. Echohawk claimed there were "red flags" about her situation and had concerns she would be arrested.
When Echohawk consented to having her purse searched, the affidavit said, there were multiple bank cards associated with accounts she allegedly laundered money through, a MidFirst Bank deposit slip for $110,000 and several Apple gift cards found with the barcodes revealed. There was also $500 in cash, which Echohawk said was from individuals sending money to the alias, but she had not yet deposited.
Echohawk faces four counts of unlawful use of criminal proceeds and one count of violating the Oklahoma Computer Crimes Act, which could carry up to 62 years in prison and $260,000 in fines, the release said.
She has been held in Pawnee County Jail since Monday, according to Pawnee County Sheriff's Office records. An attorney was not listed and it's unclear if she has legal representation.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Couple ‘steal back' their own car after police didn't know when they could investigate
Couple ‘steal back' their own car after police didn't know when they could investigate

The Independent

time11 hours ago

  • The Independent

Couple ‘steal back' their own car after police didn't know when they could investigate

A couple said they were forced to 'steal back' their own car after being told by police they did not know when they would be able to investigate the matter. Mia Forbes Pirie, 48, and Mark Simpson, 62, took matters into their own hands after their Jaguar was stolen from near their home in Brook Green, west London. The car contained an Apple airtag, which allowed the couple to track its location to just a few miles away in Chiswick. They called 999 to report the theft, but the Metropolitan Police could not say when they would be able to investigate the matter, according to The Times. Instead, the couple suggested they could find the vehicle themselves and were told to call 101 if they found it. 'I have to confess … it was kind of fun stealing back our own car,' Ms Forbes Pirie said in a LinkedIn post . 'But it does make me wonder whether we should have had to do that. And not whether it's normal, but whether it's right that the police seem to have no interest in investigating what is likely to have been a reasonably sophisticated operation involving a flat bed truck. 'If there are no consequences, what is the incentive for people not to do more of this?' The couple said that they first noticed the car had gone missing on last week, with the airtag last locating it to their road at around 3:20am. It later pinged from Chiswick at 10:30am, where they later found the car with its interior and carpets ripped out as thieves tried to get to its wiring. According to the paper, the police got in touch after they recovered the car but a forensics team has yet to assess the car. Ms Forbes Pirie said: 'Since we've found it lots of people have touched the car and the police say that they're going to look underneath the carpets and at the fuse box to see if there are prints there. But it wouldn't have cost very much for them to tell us not to touch anything. That's the one criticism I have. 'The police are under-resourced and it's a shame. But if there ­aren't any consequences to people stealing cars or a lot of the other crimes where there aren't any consequences, then I don't really see what the deterrent is to stop people from doing it more.' The Metropolitan Police said: 'On Tuesday, 3 June at 10:06hrs, police were alerted to the theft of a vehicle on Sterndale Road, W14. 'Officers spoke to the victim, who shared his intention to recover the vehicle himself. An Apple Airtag was inside, allowing the victim to view its location and trace it. 'The victim was reminded by officers to contact police again as needed or if police assistance was necessary at the vehicle's location. 'At 11:23hrs the victim confirmed with police that he had found the vehicle and that it was being recovered by a truck back to the victim's home address. 'This investigation is ongoing and police are working with the victim. No arrests have been made at this stage.' Anyone with information is asked to call police on 101 quoting CAD 2311/03JUN.

This is why you should never trust a man with three names
This is why you should never trust a man with three names

The Herald Scotland

time14 hours ago

  • The Herald Scotland

This is why you should never trust a man with three names

Robinson's 'big lie' was to convince his customers that some of the world's finest teas could be grown, not in Sri Lanka or China, but here in Scotland. Last week Robinson – also known as Thomas O'Brien and Tam O'Braan – was convicted of fraud, after a court heard he imported sacks of bog-standard commercial tea from abroad, and passed it off as exclusive, specialist varieties, grown on his 'plantations' in Perthshire and Dumfries and Galloway. Never trust a man with three names. Read More Among his victims, duped out of almost £600,000, were some of the UK's top hotels and exclusive retailers like Fortnum and Mason. In a world where avoiding being fleeced by ever more audacious and resourceful online scammers has become a daily challenge, nothing is any longer safe or sacred – not even the good old British cuppa. The media is awash with stories of people being left high-and-dry after going along with a plausible story, or an inviting opportunity, only to learn when it is too late that they have been cleaned-out by shadowy and amoral swindlers. Some of the most heart-wrenching examples are of people who lost their pensions or life savings, after being smooth-talked into investing in dubious schemes. Banks are notoriously unsympathetic to people who have willingly handed over their funds to people they have only just met, only to learn that they are not what they seemed. And yet, as we have seen, some of the most suggestible marks for fraudsters and scammers are not pensioners, but large commercial enterprises who really should know better. Among the most watched shows currently streaming is the Netflix documentary The Search for Instagram's Worst Con Artist and the new Apple series, Cider Vinegar. Both tell the story of the disgraced Australian wellness influencer, Belle Gibson, who built a huge online following, and made a fortune, by falsely claiming to have cured her brain cancer through alternative therapies. Gibson rose to fame in 2013 by documenting her fabricated cancer battle on Instagram, gaining more than 200,000 followers. She later launched The Whole Pantry, a wellness app and cookbook, which earned her more than $400,000 AUD. Arguably more shocking than her deception was the way in which large companies lined up to associate themselves with her and her story, seemingly without doing even a modicum of due diligence. Taken in by her tale of courage and survival against-the-odds, Penguin offered her a lucrative book deal, while Apple featured her app on its new watch. Both will have eyed the potential profits to be made in the emerging success of the wellness industry. However, a 2023 study found that many influencers promote unscientific or unrealistic health claims. Speaking to any oncologist worth their salt would have raised alarm bells at Apple and Penguin, given the planet-sized holes in Gibson's story. The hotels and shops where Robinson's teas were sold were doubtless seduced by his claims to have developed a "special biodegradable polymer" that allowed his plants – which had names like White Dalreoch, Scottish Antlers and Highland Green - to grow in half the usual time in the inclement Scottish climate. The court was told it looked like a black bin liner. Prosecutor Joanne Ritchie said: 'When you look at what he was actually doing, the suggestion that this was genuine Scottish tea, or these were ­Scottish-grown plants, is almost laughable.' Whether it's a sharp-talking fraudster, an eye-catching ad on social media, or a plausible politician promising simple solutions to complicated problems, we seem willing to drop our defences at the first hint of a likely story. The notion that the leaves in your teapot were teased into existence on the drizzly hills of a verdant Perthshire hillside was enough to convince customers to shell-out a hefty premium, even though the liquid didn't taste any different to a cup of Typhoo. Robinson even boasted that tea he had supplied to London's Dorchester Hotel was "the Queen's favourite". Kerching. It's significant that he wasn't rumbled by anyone who had tasted his tea, but rather by trading standards officials who became suspicious when he couldn't produce any import documents. A growing source of fraud is social media adverts posted by companies that don't exist, or which deliver products that are wildly different from what is featured online. One Scottish couple was promised a hot tub for the bargain price of £20, but instead received an inflatable children's rubber ring. Such scams prey on the assumption that most people will be too embarrassed to admit they genuinely believed they would receive a hot tub for such a modest amount, and that they will write-off the loss. Such a lack of critical application extends well beyond online adverts. The phenomenal rise of Reform UK as the country's dominant political force, less than a year after Labour's landslide general election victory, says much about the willingness of voters to entertain the blandishments of false prophets. It should come as no surprise that Donald Trump failed to follow through on his range of promises – to end the Ukraine War, solve the Israeli Palestinian conflict, and bring down the price of eggs – all on the first day of his presidency. And yet, his approval ratings have plummeted, as a result. In our collective desire to improve our lives, we have apparently lost sight of an important maxim, that if a story sounds too good to be true, then it probably isn't . Anyone who took the time to read the tea leaves could have reasoned that Robinson's cha empire was a figment of his creative imagination, and you can put the kettle on for that. Carlos Alba is a journalist, author, and PR consultant at Carlos Alba Media. His latest novel, There's a Problem with Dad, explores the issue of undiagnosed autism among older people

High-profile Americans' iPhones may have been targeted in hacking campaign, says cybersecurity firm for Harris-Walz
High-profile Americans' iPhones may have been targeted in hacking campaign, says cybersecurity firm for Harris-Walz

NBC News

time4 days ago

  • NBC News

High-profile Americans' iPhones may have been targeted in hacking campaign, says cybersecurity firm for Harris-Walz

One of the few companies to specialize in iPhone cybersecurity said in a report Thursday that it has uncovered evidence in a handful of mobile phones of a potentially groundbreaking hacking campaign targeting five high-profile Americans in media, artificial intelligence and politics, including former members of Kamala Harris' presidential campaign. The preliminary research, conducted by the cybersecurity firm iVerify, includes a significant amount of circumstantial evidence,' iVerify CEO Rocky Cole said. Apple, the maker of the iPhone, refuted the findings. But Cole stood by the report's significance for research purposes. Apple's reputation is sterling among security professionals, and if a hack occurred, it would be a significant development in the cybersecurity industry. IVerify has not identified who may be behind the potential hacking operation, but believes the targets and technical sophistication suggest a capable spy agency may have been involved. Two people familiar with the investigation told NBC News that former members of the Harris-Walz campaign were some of the people iVerify believes were targeted. It's not clear what initially set off the investigation. IVerify said that in addition to the Americans who were targeted, a European government official's iPhone had indications of remote tampering. It appears that last year, a hacker remotely and secretly installed a type of invasive, malicious program known as spyware to snoop on those users without their knowledge, iVerify said. Out of nearly 50,000 phones that iVerify analyzed, it found only six — all belonging to high-profile people who would be potential targets for an espionage campaign — that showed evidence of exploitation. Apple disputed iVerify's conclusion that its evidence is a strong indication that iPhones were hacked. 'We've thoroughly analyzed the information provided by iVerify, and strongly disagree with the claims of a targeted attack against our users. Based on field data from our devices, this report points to a conventional software bug that we identified and fixed in iOS 18.3,' Ivan Krstić, the head of Apple Security Engineering and Architecture, said in an emailed statement. Apple is 'not currently aware of any credible indication that the bug points to an exploitation attempt or active attack,' Krstić said. IVerify CEO Rocky Cole responded in a statement: 'In light of the recent public conversation around mobile security, there is ample evidence in the report worth sharing with the research community. We've never claimed there is a smoking gun here, only a significant amount of circumstantial evidence.' iVerify's report makes it clear it did not directly catch malicious software that took over phones. Instead, its researchers found evidence that it had been installed, then deleted. The phones suspected of being hacked displayed suspicious activity in crash logs, the records a computer or a smartphone automatically writes when the operating system encounters an error or a program fails. That indicates tampering, the company said. 'We identified exceedingly rare crash logs that appeared exclusively on devices belonging to high-risk individuals including government officials, political campaign staff, journalists, and tech executives,' the report says. 'At least one affected European Union government official received an Apple Threat Notification approximately thirty days after we observed this crash on their device, and forensic examination of another device revealed signs of successful exploitation.' Andrew Hoog, a co-founder of the mobile phone security company NowSecure, told NBC News that he found iVerify's 'analysis and conclusions credible and consistent with what we've observed over nearly a decade of mobile zero-click attacks.' If a spyware campaign has been taking over high-profile Americans' phones, it would be a major escalation in the back-and-forth between cyberspies and the security engineers who try to stop them. The iPhone's cybersecurity is widely revered, and cybersecurity experts largely view iPhones as some of the most secure devices that are commercially available. Apple routinely updates its operating system to fix flaws that hackers use to break in. But it has also designed the iPhone operating system to share very little information with cybersecurity researchers, far less than most other operating systems. iVerify's claim comes in the context of other allegations that cyberspies snooped on the 2024 presidential campaigns, including the United States' accusing China of listening to both parties' presidential campaigns' phone calls and Iran of hacking Trump campaign emails and sending stolen information to Biden campaign officials. The Biden administration's Justice Department charged three Iranians in connection with the operation in September. Researchers have for years tracked governments' use of spyware to spy on journalists and activists in other countries. Politicians in France and Spain have been targeted by spyware, prompting national scandals. IVerify's report is the first major public claim of spyware's successfully breaking into iPhones tied to American phone numbers and high-profile Americans. There is precedent for cyberspies' targeting major political campaigns. Last year, Microsoft, Google and several federal agencies said Chinese intelligence had hacked several major telecommunications companies, including AT&T and Verizon, and used that access to specifically spy on both the Trump and Harris campaigns ' conversations. The White House did not respond to a request for comment. The Trump campaign did not hire iVerify, so it does not have data from it to analyze. Sources who confirmed that members of the Harris-Waltz campaign were among those whom iVerify has investigated as targets of the campaign did not identify those people. iVerify also discovered a potential way hackers could have gotten in: a vulnerability in iMessage, the chat app that comes preloaded in Apple phones, that appears to be a zero-click vulnerability, meaning a hacker could exploit it without the user's even knowing. Apple has since patched the vulnerability. Spyware can give remote hackers remarkable insight into their victims' personal messages and accounts. While confirmed instances are rare, it is the only proven tactic for hackers to reliably bypass the major privacy protections available for commercial phones, like the encrypted messaging app Signal. A hacker who successfully deploys spyware on politicians' phones, for instance, could read all their Signal chats, track their browsing histories, listen to their phone calls and even turn the phones into covert listening devices to spy on conversations while they are in the targets' pockets. By giving a hacker remote access to a phone, spyware goes beyond even the Salt Typhoon espionage campaign, in which the United States accused China last year of hacking AT&T and Verizon to intercept phone calls and text messages as they traveled from one person to another — including targeting the messages of both the Trump-Vance and Harris-Walz campaigns. The most commonly identified spyware in such cases is designed by the Israeli company NSO Group, which is sanctioned by the United States and has long claimed its products cannot be used to hack phones with American numbers. An NSO Group spokesperson told NBC News it was not involved in the incidents iVerify's research identified. American diplomats and embassy workers abroad have also been infected with NSO spyware, according to the Biden White House, but evidence that such technology had targeted a U.S. presidential campaign or other high-profile Americans in the United States has never been previously reported. 'I think it illustrates that mobile compromise is real, not academic or hypothetical, and it's happening here in the United States in a systematic way,' said Cole, iVerify's CEO. He declined to specify the identities of the five people whose phones exhibited signs of having been targeted with spyware, except to say that they are all Americans who work in politics, media and artificial intelligence and that all would be of interest to a foreign intelligence service. The fact that sophisticated phone spyware is becoming the most reliable way to read a person's otherwise secure messages makes it an obvious tactic for spy agencies, despite its technical difficulty, said Patrick Arvidson, a National Security Agency veteran who worked on mobile phone security at the agency, who viewed iVerify's report before it was published. 'I think that you're going to see in the coming year, two years, three years, more and more of these kinds of mass-scale incidents,' he said.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store