Collaborate with Mark ✅

Collaborate with Mark ✅

8 Breakpoints, 10 Controls, 60 Minutes, $561M Saved

🔒 Leader's Dispatch: Volume 30 (Click to Catastrophe, Part 1 of 7 Part Series)

Mark S. Carroll ✅'s avatar
Mark S. Carroll ✅
Feb 16, 2026
∙ Paid

Previous:

Click to Catastrophe, Episode 1: Pig Butchering

How it works. How it spreads. How to shut it down.

And the most dangerous moment is not the first message.

It is the moment you feel embarrassed.

Not because embarrassment makes you weak. Because embarrassment makes smart people go quiet, go fast, and go solo.

I have watched this dynamic play out in rooms full of high performers for two decades. On improv stages. In government programs. In enterprise transformations where one “tiny” decision can turn into a seven-figure fire drill.

The system wants you isolated. It wants you improvising alone.

And if you are thinking, “I would never fall for something like this,” congratulations. That is also a system response.

Embarrassment is the lever

A quick primer before we go any further

This episode is about a scam type called pig butchering.

Calling it “pig butchering” sounds alarming, and it often is. Either way, we still need to learn the pattern.

Why the name: the scam is structured like a long con where the victim is “fattened” with attention, trust, and small wins before the extraction. The point is not the word. The point is the sequence.

And here is the key move that makes pig butchering different from a basic “send me money” scam:

It feels like relationship first. Then opportunity. Then urgency. Then shame.

That sequence is what we are going to break.

One extra credibility line, because this matters: in compliance-heavy environments, you learn quickly that “verification” is not bureaucracy. It is how you keep a bad day from becoming a permanent one.

Now let’s map the pattern.

The breakpoint framework (B1 to B8)

In the ensemble, every member carries a piece of reality.

Scams try to remove the ensemble.

They do it with a series of breakpoints, each one nudging you toward private decision-making.

Breakpoints B1–B8 overview

Below is the arc. You do not need to memorize it. You just need to recognize where you are so you can stop climbing the ladder.

B1: The “normal” opener

A message that looks harmless.
Often friendly.
Often mundane.

This is not a hack of your bank account. It is a hack of your social reflexes.

In improv, you accept offers because you are building something together. In scams, they are using that same human instinct to get you to accept a premise without checking the stage you are standing on.

Early defense:

  • Do not reward unknown openers with momentum.

  • Slow the tempo. Ask one grounding question.

  • Move the conversation back to a verified channel if it matters.

B2: Consistency and cadence

They show up again.
Same tone.
Same responsiveness.
Same drip of attention.

The system wants you to confuse consistency with legitimacy.

This is also where people start thinking: “They are so consistent, it would be rude to question them.”

That is a collaboration instinct.
It is also a vulnerability.

B3: Personal disclosure that invites reciprocation

They share something small, then slightly larger.
A little vulnerability.
A little struggle.
A little intimacy.

Not because they want closeness. Because closeness makes scrutiny feel like betrayal.

In the ensemble, trust grows through shared risk. Here, the risk is one-directional.

The two costumes / “friend” and “finance”

B4: The “world expands”

Share

They introduce a broader narrative:

  • a friend who made money

  • a method

  • a platform

  • a “mentor”

  • an inside track

This is the moment the conversation stops being social and starts becoming a system.

And systems have controls.

Which is exactly why the scam wants you off your controls.

B5: The first small “win”

A tiny test.
A small deposit.
A small return.
A feeling of, “Huh. That worked.”

This is where your brain starts trying to protect the story.
Because the story feels good.

B6: Channel migration

This one is so common it deserves its own alarm.

They want you to move off the platform where you found them.
To a private messenger.
To a new number.
To a new app.
To a new email.

Not because it is more convenient.

Because once you migrate channels, you also migrate accountability.

A simple rule that saves people:
Any financial conversation that leaves your verified channel triggers out-of-band verification. Period.

Not because you are paranoid. Because you are sane.

Pressure phrases / urgency scripts

B7: Acceleration and pressure

User's avatar

Continue reading this post for free, courtesy of Mark S. Carroll ✅.

Or purchase a paid subscription.
© 2026 Mark S. Carroll · Privacy ∙ Terms ∙ Collection notice
Start your SubstackGet the app
Substack is the home for great culture