00
Jennifer DeStefano received a call, it was an unknown number on screen. The words that came when she answered pierced her heart instantly. "Help me, mom, please help me," heard an Arizona-based mother. There was no doubt in DeStefano’s mind that she just heard her 15-year-old daughter who was away on a skiing trip. “It was the way she would have cried," later said DeStefano to a local television station describing an incident.
In a chilling twist of events, it turned out that the voice the mother heard was not her daughter's at all. Instead, it was an AI doppelganger, cunningly used in an audacious scam attempt. Luckily, the woman instinctively reached out to her daughter's personal phone and exposed the sinister scheme.
This shocking account is merely a glimpse into the near future. Already, voice scams lead to a staggering 77% of victims suffering financial losses of averagely
Scammers possess a wide range of tools at their disposal, with AI being just one of them. Afterall, what is a convincing voice call without a phone number to call to?
YouTuber Jack Gordon recently went onto whitepages.com to search for famous people. Gordon easily found phone numbers he wanted and gave celebrities like Jimmy Kimmel and Charlie D'amelio a call. Jack's intention was merely to make an interesting video. Nevertheless, this serves as a reminder of the alarming accessibility of sensitive information such as home addresses, phone numbers, emails, and family connections.
People search sites, like whitepages.com, are just the tip of a vast data mining iceberg. I don’t mean to sound bleak, but the reality is that websites, apps, and digital record databases amass all sorts of data. The legal exchange and sale of data between companies is a well-established practice, with _
Rest assured, not everything is doom and gloom. You possess the power to opt-out of people search sites and legal rights to request the deletion of your data from data brokers’ databases. Though you should be prepared, getting companies to do what you want is time-consuming and complicated. In fact, the process proved to be such a burden, that you can now pay a service to do it on your behalf.
These services scan hundreds of databases and sites, and send official requests to remove personal data. Many services, like Incogni, also incorporate recurring scans to prevent an individual's information from being re-added. As the battle for data privacy wages on, such tools offer a glimmer of hope.
I already touched upon the fact that your own social media posts can later be turned against you. Makeup tutorials or unboxing videos expose your unique features to the world. From facial features and iris patterns to fingerprints and vocal nuances, these four key biometric data can be easily extracted from posts on social networks making them data storehouses for criminals.
Deepfake videos and AI-generated images hold the power to portray us doing any activity imaginable. One particularly notorious instance unfolded in March 2022 when a video emerged, depicting Ukrainian President Volodymyr Zelenskyy ordering his soldiers to lay down their weapons and surrender. Although this audacious attempt was quickly defeated, it revealed the endless possibilities of futuristic technology.
While deleting all your social media profiles, throwing away your phone, paying exclusively in cash, and boycotting services like Uber would be the ultimate solution for safeguarding your privacy, there are more modern measures to take.
Encrypted messaging. Message encryption effectively denies access to your voice messages and leaves hackers unable to pry into your private conversations. Apple's iMessage, Meta's WhatsApp, or Signal transforms messages into an unreadable jumble to anyone apart from the intended recipient.
Controlling post resolution and timing. Current AI tools heavily rely on high-quality images. To safeguard your identity, simply reduce the resolution of images and videos when posting. Also, don’t repeat the mistake of Kim Kardashian which led to the infamous Paris robbery and better wait until after returning home to share precious vacation memories.
Limiting social media posting. Exercise caution when it comes to videos featuring your voice. Whenever possible, opt for videos that solely consist of a soundtrack and don’t reveal your voice. Additionally, consider sharing videos in formats that automatically vanish after a brief period of time, such as Instagram stories or BeReal.
When receiving a suspicious call, there are four effective strategies to use:
Just as we developed ways to keep our houses from robbery, we must learn to protect our data from being taken and used in the rise of the AI. Such measures as deleting personal information from people search sites with Incogni, limiting social media posting, encrypting you messages with iMessage, WhatsApp or Signal, and exercising caution, are simple yet powerful tools to minimizing the risks of falling victim to AI voice cloning scams.