This Michigan single mom was scammed out of thousands after falling for a fake rental listing on Facebook
An Eastpointe, Michigan, woman shared her story of being defrauded for thousands of dollars, hoping to help others avoid the same devastating experience.
Destiny Smith, a single mother in desperate need of a home, thought she had found the perfect place on Facebook. But it turns out the property was already occupied, and she had lost her deposit money in a scam.
I'm 49 years old and have nothing saved for retirement — what should I do? Don't panic. Here are 5 of the easiest ways you can catch up (and fast)
Nervous about the stock market in 2025? Find out how you can access this $1B private real estate fund (with as little as $10)
Want an extra $1,300,000 when you retire? Dave Ramsey says this 7-step plan 'works every single time' to kill debt, get rich in America — and that 'anyone' can do it
"I really wanted to pass out," she told Local 4 Detroit News in a story published March 21. "I was just, like, 'No way I've just been scammed.'"
Here are the details behind Smith's story, plus tips on how to avoid rental scams.
Smith's ordeal started when she saw what seemed like the ideal rental property. The ad featured a video showcasing what appeared to be an updated interior, and it seemed too good to pass up.
Rental scammers often prey on people who are looking for immediate housing, especially those who are vulnerable, including single parents like Smith and seniors. They promote fake listings on platforms like Facebook and Craigslist and ask for immediate cash deposits to lock in a deal.
Smith agreed to hand over a $2,500 security deposit, according to the local broadcaster, and she was handed a set of keys. Things took a strange turn when she arrived at the property.
'[There] was a white truck in the driveway, so I was, like, okay, maybe this is the guy that was coming to fix the stuff I requested,' Smith explained.
But when she asked the man what he was doing there, she was shocked to find out he was there to change the locks. That's when Smith realized she had been the victim of a scam.
Read more: The US stock market's 'fear gauge' has exploded — but this 1 'shockproof' asset is up 14% and helping American retirees stay calm. Here's how to own it ASAP
If you're worried about how to protect yourself as a renter, here's what you can do to protect yourself from rental and housing scams:
When looking for listings, stick to well-known platforms that have verification processes and user reviews.
Beware of listings with lower-than-normal prices. If it looks too good to be true, it may very well be.
Always check out a property in person before making any commitments. Don't settle for a video tour. It's a red flag if the landlord won't allow you to visit.
Be suspicious if you're asked to pay through unconventional methods, such as wire transfers or prepaid gift cards.
Do your research on listings and look up the address to spot potential duplicate listings or inconsistencies.
You may also be able to verify property ownership by checking local records to ensure a landlord's legitimacy.
Most of all, trust your instincts. If something feels off, it's best not to ignore it. Performing due diligence is always a good thing when it comes to finding a new home.
If you think you've been the victim of a rental scam, authorities urge you to file a police report and provide as much evidence as possible to help with any investigation.
Thanks to Jeff Bezos, you can now become a landlord for as little as $100 — and no, you don't have to deal with tenants or fix freezers. Here's how
Rich, young Americans are ditching the stormy stock market — here are the alternative assets they're banking on instead
Here are 3 'must have' items that Americans (almost) always overpay for — and very quickly regret. How many are hurting you?
This article provides information only and should not be construed as advice. It is provided without warranty of any kind.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles

35 minutes ago
Chinese hackers and user lapses turn smartphones into a 'mobile security crisis'
WASHINGTON -- WASHINGTON (AP) — Cybersecurity investigators noticed a highly unusual software crash — it was affecting a small number of smartphones belonging to people who worked in government, politics, tech and journalism. The crashes, which began late last year and carried into 2025, were the tipoff to a sophisticated cyberattack that may have allowed hackers to infiltrate a phone without a single click from the user. The attackers left no clues about their identities, but investigators at the cybersecurity firm iVerify noticed that the victims all had something in common: They worked in fields of interest to China's government and had been targeted by Chinese hackers in the past. Foreign hackers have increasingly identified smartphones, other mobile devices and the apps they use as a weak link in U.S. cyberdefenses. Groups linked to China's military and intelligence service have targeted the smartphones of prominent Americans and burrowed deep into telecommunication networks, according to national security and tech experts. It shows how vulnerable mobile devices and apps are and the risk that security failures could expose sensitive information or leave American interests open to cyberattack, those experts say. 'The world is in a mobile security crisis right now,' said Rocky Cole, a former cybersecurity expert at the National Security Agency and Google and now chief operations officer at iVerify. 'No one is watching the phones.' U.S. authorities warned in December of a sprawling Chinese hacking campaign designed to gain access to the texts and phone conversations of an unknown number of Americans. 'They were able to listen in on phone calls in real time and able to read text messages,' said Rep. Raja Krishnamoorthi of Illinois. He is a member of the House Intelligence Committee and the senior Democrat on the Committee on the Chinese Communist Party, created to study the geopolitical threat from China. Chinese hackers also sought access to phones used by Donald Trump and running mate JD Vance during the 2024 campaign. The Chinese government has denied allegations of cyberespionage, and accused the U.S. of mounting its own cyberoperations. It says America cites national security as an excuse to issue sanctions against Chinese organizations and keep Chinese technology companies from the global market. 'The U.S. has long been using all kinds of despicable methods to steal other countries' secrets,' Lin Jian, a spokesman for China's foreign ministry, said at a recent press conference in response to questions about a CIA push to recruit Chinese informants. U.S. intelligence officials have said China poses a significant, persistent threat to U.S. economic and political interests, and it has harnessed the tools of digital conflict: online propaganda and disinformation, artificial intelligence and cyber surveillance and espionage designed to deliver a significant advantage in any military conflict. Mobile networks are a top concern. The U.S. and many of its closest allies have banned Chinese telecom companies from their networks. Other countries, including Germany, are phasing out Chinese involvement because of security concerns. But Chinese tech firms remain a big part of the systems in many nations, giving state-controlled companies a global footprint they could exploit for cyberattacks, experts say. Chinese telecom firms still maintain some routing and cloud storage systems in the U.S. — a growing concern to lawmakers. 'The American people deserve to know if Beijing is quietly using state-owned firms to infiltrate our critical infrastructure,' U.S. Rep. John Moolenaar, R-Mich. and chairman of the China committee, which in April issued subpoenas to Chinese telecom companies seeking information about their U.S. operations. Mobile devices can buy stocks, launch drones and run power plants. Their proliferation has often outpaced their security. The phones of top government officials are especially valuable, containing sensitive government information, passwords and an insider's glimpse into policy discussions and decision-making. The White House said last week that someone impersonating Susie Wiles, Trump's chief of staff, reached out to governors, senators and business leaders with texts and phone calls. It's unclear how the person obtained Wiles' connections, but they apparently gained access to the contacts in her personal cellphone, The Wall Street Journal reported. The messages and calls were not coming from Wiles' number, the newspaper reported. While most smartphones and tablets come with robust security, apps and connected devices often lack these protections or the regular software updates needed to stay ahead of new threats. That makes every fitness tracker, baby monitor or smart appliance another potential foothold for hackers looking to penetrate networks, retrieve information or infect systems with malware. Federal officials launched a program this year creating a 'cyber trust mark' for connected devices that meet federal security standards. But consumers and officials shouldn't lower their guard, said Snehal Antani, former chief technology officer for the Pentagon's Joint Special Operations Command. 'They're finding backdoors in Barbie dolls,' said Antani, now CEO of a cybersecurity firm, referring to concerns from researchers who successfully hacked the microphone of a digitally connected version of the toy. It doesn't matter how secure a mobile device is if the user doesn't follow basic security precautions, especially if their device contains classified or sensitive information, experts say. Mike Waltz, who departed as Trump's national security adviser, inadvertently added The Atlantic's editor-in-chief to a Signal chat used to discuss military plans with other top officials. Secretary of Defense Pete Hegseth had an internet connection that bypassed the Pentagon's security protocols set up in his office so he could use the Signal messaging app on a personal computer, the AP has reported. Hegseth has rejected assertions that he shared classified information on Signal, a popular encrypted messaging app not approved for the use of communicating classified information. China and other nations will try to take advantage of such lapses, and national security officials must take steps to prevent them from recurring, said Michael Williams, a national security expert at Syracuse University. 'They all have access to a variety of secure communications platforms,' Williams said. "We just can't share things willy-nilly.'

USA Today
2 hours ago
- USA Today
Donald Trump says return of wrongfully deported man Kilmar Abrego Garcia 'wasn't my decision'
Donald Trump says return of wrongfully deported man Kilmar Abrego Garcia 'wasn't my decision' Show Caption Hide Caption Trump on the return of deported Kilmar Abrego Garcia President Trump spoke with reporters on Air Force One on the return of deported Kilmar Abrego Garcia. WASHINGTON — President Donald Trump said in a new interview that he didn't speak with Salvadoran President Nayib Bukele about Kilmar Abrego Garcia's return to the United States to face human trafficking charges, saying the move wasn't his choice. Trump told NBC News on June 7 it "wasn't my decision" to bring Abrego Garcia back to the country. Instead, he told the outlet the U.S. Justice Department 'decided to do it that way, and that's fine.' Abrego Garcia, a sheet metal worker and father of three from Maryland, was wrongly deported to El Salvador in March despite a 2019 court order barring his removal. His case drew national attention, after a standoff among the Trump administration, the courts and some congressional Democrats over his release. In April, a unanimous Supreme Court ordered the Trump administration to 'facilitate' Abrego Garcia's return to the United States. Officials claimed they couldn't force a sovereign nation − El Salvador − to relinquish a prisoner. The Trump administration insists that Abrego Garcia is a member of the MS-13 gang, but a federal judge had previously questioned the strength of the government's evidence. Abrego Garcia denies being a gang member. Now, the Maryland man faces new charges on American soil. At a June 6 press conference, U.S. Attorney General Pam Bondi accused Abrego Garcia of making over 100 trips to smuggle undocumented immigrants across the nation. The indictment against Abrego Garcia alleges that he and co-conspirators worked with people in other countries to transport immigrants from El Salvador, Guatemala, Honduras, Ecuador, and Mexico, and then took the people from Houston to Maryland, often varying their routes, and coming up with cover stories about construction if they were pulled over. Trump told NBC News he believes "it should be a very easy case' for federal prosecutors. But Simon Sandoval-Moshenberg, a lawyer for Abrego Garcia, criticized the Justice Department for bringing these charges at all: "Due process means the chance to defend yourself before you're punished, not after. This is an abuse of power, not justice." Contributing: USA TODAY Staff


Axios
3 hours ago
- Axios
Trump might be the most accessible president ever — for spies or scammers
President Trump reportedly picks up when his cell rings even if he doesn't know who's calling. Senior members of his team also love chatting on their personal devices. That makes the administration uniquely vulnerable to basic scams like spoofed calls and impersonation attempts. Why it matters: If Trump is willing to answer unknown numbers, as The Atlantic reported this week, there's no guarantee a scammer, impersonator, or even a foreign intelligence operative couldn't have a chat with the president. There's no evidence that has actually happened. But recent reports involving Trump and other top officials have raised red flags about the security of their communications. Driving the news: Federal authorities are investigating a scheme where someone spoofed the phone number of White House chief of staff Susie Wiles to impersonate her in calls to senators, governors, and CEOs, per the Wall Street Journal. Meanwhile, Chinese hackers reportedly penetrated U.S. telecom networks as early as summer 2023, according to Bloomberg — a year earlier than previously known. That access has been used by China-backed group Salt Typhoon to spy on Trump, Vice President Vance, and other officials, the NYT reported. Then there are the series of Signal-related scandals involving former national security adviser Mike Waltz, Defense Secretary Pete Hegseth and others. Between the lines: Eavesdropping on world leaders isn't new — but it's a lot easier if the leader in question is using a personal phone and eschewing standard cybersecurity practices. Flashback: In 2017, Trump had two phones — one issued through the White House and only capable of making phone calls, and a less secure phone equipped just for social media. At the time, he was urged to swap out his Twitter phone at least once a month. Politico reported he'd instead go months without security checks. It's unclear how many of those security protocols were brought back in this time around. "I think people gave up on that years ago," one adviser told The Atlantic. In a written statement, White House communications director Steven Cheung said the administration would "not discuss or disclose security measures regarding the President." "President Trump is the most transparent and accessible President in American history," Cheung said. "World leaders, heads of state, elected officials, and business titans all reach out to him because they know America is back under President Trump's leadership. "Whereas, Joe Biden was hidden and sheltered by his handlers because he was a total embarrassment and bumbling idiot during his time in office," Cheung added. The big picture: Since returning to office, the Trump administration has: Ignored basic security norms, including heavy reliance on Signal and personal numbers. Gutted existing federal cybersecurity leadership, with one-third of CISA's staff already gone. Empowered security-weakening tech initiatives through Elon Musk's Department of Government Efficiency (DOGE), which has been pursuing projects like using a buggy AI tool to crawl sensitive government data. Threat level: AI tools can clone a voice using just a few seconds of audio, and the FBI warned last month that scammers are already using them to impersonate senior officials.