2. Scams and external threats (part 1)