For Librarians: Recognizing Seniors in Active Scams at Public Computers

Public libraries are an under-recognized chokepoint in senior fraud. When a senior comes in to “check on a Bitcoin account,” “download remote support software,” or “buy gift cards on the library Wi-Fi,” library staff are often the only person with both the visibility and the trust relationship to interrupt. This guide is a free, citable reference for public libraries — large or small. It explains the most common library-computer scam scripts, intervention language that respects user autonomy, and a clear set of confidentiality boundaries.

Why libraries matter: Many seniors use library computers because they don’t have one at home, or because their home computer has been compromised by an earlier scam. The scammer’s script often explicitly directs them to a library: “Go to a library computer so the hackers can’t see you.”

Red flags at the public computer

  • Patron is on a phone call during the entire computer session, often using a Bluetooth earpiece.
  • Patron is being walked through screens by the person on the phone.
  • Patron is downloading remote-access software (TeamViewer, AnyDesk, LogMeIn, ScreenConnect, QuickAssist).
  • Patron is logging into their bank or brokerage account and following spoken instructions.
  • Patron is asking for help finding a “Bitcoin ATM” near the library.
  • Patron is buying multiple high-value gift cards on Amazon, Apple, Google Play, or Target.
  • Patron is in obvious emotional distress — fear, urgency, secrecy.
  • Patron asks how to “hide” what they’re doing from family.
  • Pop-up windows on the patron’s screen with phone numbers to call (fake tech support).
  • Patron mentions a federal agency, a warrant, a grandchild emergency, or a romantic partner abroad.

Reference-desk scripts that work without lecturing

Library culture rightly protects patron privacy and autonomy. These scripts respect that while creating space for the patron to recognize the scam themselves:

  • “I noticed you’ve been on the phone the whole time you’ve been here. Would you like a quiet space to step away from the call for a minute?”
  • “That kind of software you’re being asked to download can give someone full access to your bank accounts. Is the person on the phone someone you know in person?”
  • “Just so you know, the IRS, FBI, and Social Security never call to ask for help. Are you being told you’re in trouble with one of them?”
  • “It looks like you may be buying gift cards as payment. No real bill is ever paid in gift cards — that’s almost always a scam. Would you like to talk to someone before you buy these?”
  • “Would you like the number for the National Elder Fraud Hotline? It’s free and confidential. They can help sort through what’s happening.”

Confidentiality boundaries

ALA’s Code of Ethics protects patron privacy and the freedom to read. Scam intervention does not violate these principles when:

  • You speak only with the patron themselves, not about them to third parties.
  • You provide resources (hotline numbers, printed guides) and let the patron decide.
  • You document only patterns (“we see this script several times a month”), not individuals.
  • You contact APS or law enforcement only if the patron consents OR if state law requires reporting of suspected elder abuse.
  • Your state’s mandatory reporter statute may apply — check your state Adult Protective Services for specifics.

Quick reference: top scam scripts in libraries

  • Fake tech support pop-up — “Your computer is infected, call this number.”
  • Government impersonation — “Your SSN is involved in a money-laundering case.”
  • Grandparent / family emergency — “Your grandchild is in jail.”
  • Bitcoin ATM script — “Go to the gas station and deposit cash to protect your account.”
  • Romance scam — patron has been corresponding with an online partner for months.
  • Lottery / inheritance scam — “You’ve won a prize, just pay the processing fee.”

Suggested library training elements

  • Annual senior-scam-recognition session for all reference and circulation staff.
  • A laminated red-flag card at every reference desk.
  • Printed handouts of First 24 Hours After Being Scammed and the Senior Fraud Emergency Card.
  • Clear escalation path: branch manager / branch security / non-emergency police.
  • Display National Elder Fraud Hotline number visibly near public computers.

Free resources for library staff

Cite this resource

HCSK Inc., For Librarians: Recognizing Seniors in Active Scams at Public Computers, seniors.hcsk.org. Licensed under CC BY 4.0. Free to share with state library associations and incorporate into library training materials.