The Smoke Scam Playbook

How Polite Outreach Hides Predatory Agendas

A contact messages you with a clean request: collaborate, compare notes, or explore a partnership. You confirm in writing. The calendar invite arrives with a different name and a different goal. The clock is already running on your time.

It’s core mechanics; the oldest corporate hustle in the book: Capture your attention with one story, then swap in a different player with their agenda.

Nine patterns told straight

  1. Bait-and-Switch Outreach
    They open with “peer-to-peer” language. Once you show up, out slides a polished sales deck. The problem is not selling; the problem is pretending not to.
    Tell: the slide sales order is fixed before they ask a single question.
    My line: “I agreed to explore collaboration, not to hear a sales pitch. If selling is the point, say it plainly and send terms.”
  2. Pay-to-Be-Considered
    You are “invited” to a leadership council, board membership, advisory role, or awards list. At minute 22, a fee appears, monthly, annual, or a “placement” charge, to be eligible. If selected, you might get paid, but the real business model is selling you access to the list, not placing people. If you have to pay to be considered, you are the product.
    Tell: money is tied to an eligibility and access opportunity, not to defined deliverables.
    My line: “If there is a fee, put what I receive in writing. If the fee buys consideration, I am out.”
  3. White-Glove Mirage
    They sell prestige: franchise territory, regional license, big-name logos. The risk and labor move to you while they extract recurring fees. They monetize your hope and call it exclusivity. Oh, by the way, for a monthly fee, you pay just to get access to the “exclusive” franchise list. Then you meet a potential one who might be interested in your profile, and only then are you asked to drop the real money.
    Tell: you wire money before you see verifiable outcomes.
    My line: “Show audited results and the refund policy. If you cannot, this is a banner for sale, not a business.”
  4. Fake Collaboration Content Grab
    They propose co-authoring an article or webinar. You send outlines, sources, and framing. The project goes quiet or reappears with your ideas and someone else’s byline. If they want your brain for free, they are not a partner.
    Tell: urgency to “send the manuscript” while their publishing record is thin.
    My line: “We will draft in a shared doc with tracked attribution. If that is a problem, the answer is no.”
  5. Free Trial Trap
    “No obligation” software that takes real setup. After you integrate, the working features sit behind a higher tier with auto-renew and friction to cancel. Free like a puppy.
    Tell: value appears only after migration to the paid plan.
    My line: “I will test with sample data in a sandbox. No credit card. No auto-renew. If not possible, we are done.”
  6. Overseas Direct Source Manufacturing Pitch
    A supplier claims to be the source behind reputable brands and pushes to mail “free” samples. The hook arrives later: purchase commitments or unexpected shipping and brokerage charges from outside your region.
    Tell: pressure to accept physical samples before any independent verification.
    My line: “Send third-party certifications and a reference I can call. No samples until verification.”
  7. Staffing Funnel Shakedown
    You are told a role is in play. Before any interview, they push paid “readiness” services such as resume rewrites, proprietary assessments, or mandatory coaching. They sell hope to job seekers.
    Tell: fees appear before an actual offer or a written job requisition.
    My line: “No money to be considered. If I am a candidate, schedule the interview. If I am a customer, send the rate card.”
  8. Credentialing Shortcut Racket
    They promise “fast-track credentialing,” “affiliation letters,” or “university certificates” portrayed as equivalent to licensure. The target is the international professional who needs a path and a sponsor. Payment secures paperwork, not a recognized credential.
    Tell: vague references to “state approval,” “partners,” or “verification portals” with no verifiable program or regulatory citation.
    My line: “Name the statute, agency, and program code. Show where this path is recognized. If you cannot, it is a paid promise, not credentialing.”
  9. More Patients, Guaranteed: Marketing Mirage
    An agency promises a flood of new patients, “exclusive” ZIPs, and secret funnels. You get vanity metrics, recycled leads, coupon hunters, and a long contract you cannot exit. They count every form fill as a “patient,” take control of your Google Business Profile, withhold ad accounts, and claim credit for traffic you already had.
    Tell: guarantees of a fixed number of “patients” without defining patient as a paid visit; refusal to give you admin access to ad platforms and analytics; no Business Associate Agreement for PHI.
    My line: “Define patient as a booked visit that shows and pays. Ad spend runs from my accounts. I retain admin access, the phone number, and the listings. You sign a BAA. Month-to-month or a 60-day out for underperformance. If that is a problem, we are done.”

Hard tests before you sign

  • Contract measures booked-and-shown, not “leads.”
  • You own the ad accounts, CRM, tracking numbers, and listings.
  • Clear ad spend vs. fee breakdown. No markups hidden inside “packages.”
  • Written compliance: Business Associate Agreement (BAA), review policy, no fake testimonials.
  • Performance clause with a clean exit and data handover.

“We will proceed once we have a signed HIPAA Business Associate Agreement. If your workflow requires PHI access, the BAA is non-negotiable.”

Why this Matters

  • Trust decays: When misdirection becomes common, professionals start to excuse it as standard practice.
  • Time burns: Time is the only nonrenewable professional asset. Treat it like liquid gold.
  • Norms bend: If we stop challenging these tactics, we begin to imitate them.

In time, it conditions professionals to accept this behavior, and before you know it, they’re passing it on to others like it’s normal business.  

Spot Smoke in minutes

  • Mismatch Between Pitch and Agenda: If they can’t confirm the meeting purpose in writing, that’s a red flag.
  • Unknown Faces: If you think you’re meeting one person but the invite lists someone else, clarify before accepting.
  • One-Way Value: If the upside is theirs while you supply time, audience, or brand, reset or decline. If all the benefits flow to them, assume that’s intentional.
  • Manufactured Urgency: “Only a few spots left,” without concrete details, is just pressure sales.
  • Hidden Gatekeeping Costs: Any money tied to being considered is a sales funnel, not a professional standard. Fees to be considered for a role or opportunity are pay-to-play in disguise!

The Cybersecurity Angle

Smoke Scams are social-engineering plays that run through calendar links, doc shares, and DMs. Treat them as human-layer security events.

  • Assume pretext until proven otherwise: Verify identity across channels before joining calls or sharing data.
  • Inspect invites: Host name, domain, and calendar metadata must match the person who contacted you.
  • Control access: Use view-only links, watermark drafts, and restrict downloads until terms are agreed.
  • No blind links or attachments: Open only from known domains; avoid quick “drive-by” portals for files or calendars.
  • Document everything: Written agendas and confirmations close loopholes and deter abuse.
  • Separation of duties: Keep sales discussions and collaboration rooms separate.
  • Least privilege: Grant access in stages only after scope and value are aligned.

Counter-Measures to Protect Yourself

Before the call

  • Ask for a one-sentence agenda in writing and the names and roles of participants.
  • Confirm success for each party in one line.
  • Decline if they cannot meet these basics.

During the call

  • Open with: “My understanding is that we are meeting to do X. If that is accurate, let us proceed.”
  • If the frame flips: “This is not what we agreed. I am stepping off. We can reschedule if the original purpose stands.”

After the call

  • Document misalignment with dates and quotes. Patterns reveal themselves in writing.
  • Share a neutral advisory post so others can avoid the same trap.

A professional standard

Selling is fine. Recruiting is fine. Hiding the true intent from the beginning is Not. Put the agenda and any commercial terms in writing. Respect the other person’s time and intelligence. That is the bar!

The Bottom Line

If you are selling, say you are selling upfront. If you are recruiting, say you are recruiting upfront. If you spin, hide, or bait, you are being an a**.

Sunlight is the best Disinfectant!  If we stop calling these tactics out, we normalize them. If we normalize them, we adopt them. In time, they become our culture. That is not a culture worth building.

Stay quiet and it will condone it. Practice it and it will multiply. It will return to haunt you, with interest.

Have you experienced any of these “smoke scams”?

Which pattern did you see?

How did you handle it, and what would you advise a colleague to do next time?

#BaitAndSwitch #SmokeScam #ProfessionalIntegrity #BusinessTransparency #EthicalBusiness #Leadership #Entrepreneurship #BusinessGrowth #Networking #Partnerships #ProtectYourTime #TrustMatters #BusinessEthics #DueDiligence #ProfessionalStandards

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *