{"id":6058,"date":"2025-05-06T14:16:29","date_gmt":"2025-05-06T19:16:29","guid":{"rendered":"https:\/\/nakedpolitics.net\/?p=6058"},"modified":"2025-05-06T14:16:31","modified_gmt":"2025-05-06T19:16:31","slug":"scammers-are-cloning-your-voice-and-using-it-to-trick-your-family","status":"publish","type":"post","link":"https:\/\/nakedpolitics.net\/?p=6058","title":{"rendered":"Scammers Are Cloning Your Voice &#8211; And Using It to Trick Your Family"},"content":{"rendered":"\n<p>One of the most frightening uses of AI today is voice cloning, where scammers can replicate a person\u2019s voice with just a few seconds of audio and use it to trick their loved ones into sending money. The result is a scam that feels more personal and believable than anything we\u2019ve seen before.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Rise of Voice Cloning Scams<\/h3>\n\n\n\n<p>For decades, phishing scams have relied on fake emails or texts to trick people into giving up sensitive information. This has now evolved into smishing\u2014phishing by text\u2014and vishing, which involves fake or cloned voices over the phone. But what makes voice cloning different is how intimate it feels.<\/p>\n\n\n\n<p>Scammers are now able to mimic a person\u2019s voice so accurately that even close family members can\u2019t tell the difference. According to Nathan House, CEO of cybersecurity firm StationX, \u201cThe everyday vishing script is a high-pressure, \u2018urgent problem\u2019 phone call. The caller spoofs your bank\u2019s number, claims your account is compromised, and needs you to verify a one-time passcode they just texted &#8211; actually your real two-factor code.\u201d<\/p>\n\n\n\n<p>House explained that scammers impersonate \u201cpolice, utility companies, or a panicked relative demanding emergency funds.\u201d The common pattern is clear: the call appears to come from someone you trust, the message creates a sense of emergency, and the caller demands immediate action, like reading a code or wiring money.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">A Technology That\u2019s Becoming Harder to Spot<\/h3>\n\n\n\n<p>Voice cloning technology used to require several minutes of high-quality audio to work. But according to cybersecurity journalist Jurgita Lapienyte, \u201cThese days, with AI and automation, and other innovations, you just need a couple of seconds of someone\u2019s voice, and you can fake someone\u2019s voice.\u201d She explained that scammers can now grab audio from a TikTok post or a wrong-number voicemail, then feed that into a free cloning engine and start calling potential victims.<\/p>\n\n\n\n<p>The voice often follows a script because the current generation of AI can\u2019t react naturally in a conversation. But that\u2019s changing. \u201cIt\u2019s only a matter of time until it actually learns to be more like us and can be weaponized against us,\u201d Lapienyte warned.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">A Real and Terrifying Example<\/h3>\n\n\n\n<p>In one disturbing case, a woman named Robin received a late-night phone call. On the other end, she heard what sounded like her mother-in-law\u2019s voice crying out, \u201cI can\u2019t do it, I can\u2019t do it.\u201d Robin believed she was being told something tragic had happened, maybe a car crash involving her parents and in-laws. She woke her husband Steve, who works in law enforcement. When he answered the phone, a man told him, \u201cYou\u2019re not gonna call the police. You\u2019re not gonna tell anybody. I\u2019ve got a gun to your mom\u2019s head, and I\u2019m gonna blow her brains out if you don\u2019t do exactly what I say.\u201d<\/p>\n\n\n\n<p>Steve kept the caller on the line while texting a colleague with hostage negotiation experience. He asked to hear his mother\u2019s voice. The man refused and threatened to kill her if Steve asked again. Then he demanded $500 via Venmo. \u201cIt was such an insanely small amount of money for a human being,\u201d Steve said. But they sent the money. The scammer then asked for more &#8211; another $250 &#8211; for a plane ticket. Only after the call ended did they reach Steve\u2019s real parents, who were safe and asleep the whole time.<\/p>\n\n\n\n<p>Robin later reflected, \u201cWe told everyone we knew to be aware of this very sophisticated thing.\u201d Their family now uses a shared password to verify calls, though her mother-in-law admitted she already forgot what it was. \u201cSeven hundred and fifty dollars,\u201d she said. \u201cI still can\u2019t believe that\u2019s all I was worth.\u201d<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Scale of the Problem<\/h3>\n\n\n\n<p>The FBI\u2019s Internet Crime Complaint Center received 193,407 reports of phishing or spoofing scams in 2024, making it the most reported cybercrime that year. In comparison, there were just 441 reports of malware. The agency said that voice phishing and spoofing are particularly dangerous because they are cheap to run and can scale to millions of people.<\/p>\n\n\n\n<p>Older adults are the most common targets. People over the age of 60 reported losses nearing $5 billion in 2024. The agency also found that many of these crimes go unreported. \u201cThey are feeling lonely and they don\u2019t want to be ridiculed,\u201d said Lapienyte, explaining why many victims, especially seniors, choose not to come forward.<\/p>\n\n\n\n<p>In another case, a British executive transferred over $243,000 to scammers after being tricked by a cloned voice he believed was his boss. \u201cVoice-deepfake heists remain rare headlines, but they\u2019re almost certainly under-reported because companies dread the reputational hit,\u201d said House.<\/p>\n\n\n\n<p>A U.K. man named Tejay Fletcher was sentenced to more than 13 years in prison in 2023 for operating iSpoof, a website that allowed scammers to buy spoofing software and impersonate banks, government agencies, and even relatives. That single operation brought in more than $1 million in Bitcoin from users around the world.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Smishing: The Silent Threat in Your Texts<\/h3>\n\n\n\n<p>While voice cloning grabs headlines, smishing remains a major threat. The Internal Revenue Service has warned of mass campaigns that send fake text messages claiming to offer tax refunds, COVID relief, or other benefits. Clicking the links in these messages can lead to websites that collect personal data or install malicious code.<\/p>\n\n\n\n<p>\u201cThis is phishing on an industrial scale,\u201d said former IRS Commissioner Chuck Rettig. In some cases, scammers used just a few dozen fake email addresses to create over a thousand fraudulent domains.<\/p>\n\n\n\n<p>Smishing scams may claim to be from banks, delivery services, or government agencies. Some texts even pose as customer service messages, asking users to verify account details.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What Can You Do?<\/h3>\n\n\n\n<p>Experts and agencies say that awareness and preparation are your best defense.<\/p>\n\n\n\n<p><strong>1. Use a Family Safe Word<\/strong><br>Choose a phrase that only your family would know\u2014something that isn\u2019t posted on social media or easily guessed. Actor James Nesbitt suggested using \u201ca family in-joke\u201d to confirm identities. If someone calls asking for money, ask them for the phrase. If they can\u2019t say it, hang up.<\/p>\n\n\n\n<p>Nathan House agreed: \u201cIt\u2019s a simple, effective speed-bump. If someone calls sounding like your son begging for bail money, asking for the agreed phrase forces the impostor to break character.\u201d<\/p>\n\n\n\n<p><strong>2. Verify Every Emergency Call<\/strong><br>If you get a call from a loved one asking for money, hang up and call them back using a number you know is real. If you can\u2019t reach them, contact another family member.<\/p>\n\n\n\n<p><strong>3. Never Send Money Over the Phone<\/strong><br>The FTC warns that real emergencies rarely involve wiring money, buying gift cards, or sending crypto. If someone pressures you to act fast and avoid contacting others, it\u2019s likely a scam.<\/p>\n\n\n\n<p><strong>4. Train Yourself and Your Family<\/strong><br>Teach elderly relatives about the risks of voice cloning and smishing. Talk about what to do if they receive a suspicious call or message. Lapienyte pointed out, \u201cWhen someone close to you is calling, you don\u2019t try to verify their identity. You don\u2019t put up protective shields.\u201d<\/p>\n\n\n\n<p><strong>5. Push for Better Protections<\/strong><br>The FTC has launched a Voice Cloning Challenge to develop tools that detect fake voices in real time. One winning entry uses a \u201cliveness score\u201d to identify whether a voice is human or synthetic. Others use invisible audio watermarks to confuse cloning software.<\/p>\n\n\n\n<p>Still, experts like Berkeley professor Hany Farid say the technology is advancing faster than the regulations can keep up. He noted that scammers only need to succeed once in a hundred attempts to profit: \u201cThe bad guy can fail ninety-nine percent of the time, and they will still become very, very rich.\u201d<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Bigger Picture<\/h3>\n\n\n\n<p>Voice cloning isn\u2019t always used for crime. It\u2019s helping people with diseases like ALS keep their voices. It\u2019s letting actors dub films in other languages. Even former President Obama has used it for official announcements. But when tools like ElevenLabs and Vall-E can replicate your voice from a three-second clip, it\u2019s clear that criminals have the same power as corporations.<\/p>\n\n\n\n<p>Senator Jon Ossoff said the issue of deepfake voices is urgent for lawmakers. \u201cCan we get good enough fast enough at discerning real from fake, or will we lose the ability to verify the authenticity of voices, images, video, and other media?\u201d he asked.<\/p>\n\n\n\n<p>For now, protecting yourself means slowing down, verifying everything, and trusting your instincts. Technology may be making life easier, but it\u2019s also making lies sound more like the truth than ever before.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the most frightening uses of AI today is voice cloning, where scammers can replicate a person\u2019s voice with just a few seconds of audio and use it to trick their loved ones into sending money. The result is a scam that feels more personal and believable than anything we\u2019ve seen before. The Rise of Voice Cloning Scams For decades, phishing scams have relied on fake emails or texts to trick people into giving up sensitive information. This has [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":6059,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-6058","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-crime"],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/nakedpolitics.net\/wp-content\/uploads\/2025\/05\/vishingasfa.jpg","_links":{"self":[{"href":"https:\/\/nakedpolitics.net\/index.php?rest_route=\/wp\/v2\/posts\/6058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nakedpolitics.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nakedpolitics.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nakedpolitics.net\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/nakedpolitics.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6058"}],"version-history":[{"count":1,"href":"https:\/\/nakedpolitics.net\/index.php?rest_route=\/wp\/v2\/posts\/6058\/revisions"}],"predecessor-version":[{"id":6060,"href":"https:\/\/nakedpolitics.net\/index.php?rest_route=\/wp\/v2\/posts\/6058\/revisions\/6060"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nakedpolitics.net\/index.php?rest_route=\/wp\/v2\/media\/6059"}],"wp:attachment":[{"href":"https:\/\/nakedpolitics.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nakedpolitics.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6058"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nakedpolitics.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}