Be aware of Artificial Intelligence Voice Cloning

The proliferation of AI technologies like voice cloning and caller ID spoofing has opened up new avenues for fraudsters to exploit. By mimicking voices and masking their true caller identities, scammers can launch highly convincing social engineering attacks over the phone. This potent combination poses serious risks to individuals and organizations alike.

However, we aren’t defenseless against these emerging threats. Biometric voice authentication solutions that analyze unique voice characteristics like pitch, tone, and speech patterns can detect synthetic voices and unmask deepfakes. Additionally, advanced caller ID intelligence services cross-reference numbers against databases of known fraudulent callers to flag suspicious calls.

We are hardly not out of the woods though.

A gym teacher is accused of using AI voice clone to try to get a high school principal fired.

Worried About AI Voice Clone Scams? Create a Family Password.

Voice cloning technology has made it alarmingly easy for scammers to carry out voice fraud or “vishing” attacks. With just a few seconds of audio, criminals can generate highly convincing deepfake voices. When combined with caller ID spoofing to mask their real numbers, fraudsters can impersonate trusted entities like banks or family members on a massive scale and at little cost.

Voice cloning technology, powered by artificial intelligence, has opened up new avenues for fraud. One example involves impersonating someone’s voice to authorize fraudulent transactions. For instance, a scammer could clone the voice of a company executive to trick employees into transferring funds or disclosing sensitive information.

Another example is using voice cloning to create convincing fake audio recordings for political or social manipulation. By imitating the voices of public figures, AI-generated content can spread misinformation, manipulate public opinion, or even incite unrest. Such fraudulent activities undermine trust in media and institutions, leading to widespread confusion and division. These examples highlight the potential dangers of AI voice cloning in the wrong hands.

No one is immune – even highly rational individuals have fallen prey to elaborate ruses involving fictitious identity theft scenarios and threats to their safety.

As generative AI capabilities advance, audio deepfakes will only become more realistic and accessible to criminals with limited skills. Worryingly, over half of people regularly share voice samples on social media, providing ample training data for voice cloning models.

I recently presented to a large financial services firm, and one of the questions I was asked, was in regards to whether or not they should have their photos and their emails on their contact us page. My response was, not only should they scrub their photos and emails from their contact page, they should also change any voicemail messages and use a computer generated message, and then go to their social media pages and scrub any video they have in their personal or professional lives.

And while, that certainly appears to be “alarmist” this author is completely freaked out by the advancement of AI voice clone technology, and how effective it has become and how vulnerable we are as a result.

Just listen to this OpenAI that mimics human voices on CNN. It’s alarmingly perfect.

Businesses, especially those relying on voice interactions like banks and healthcare providers, are also high-value targets. A single successfully manipulated employee could inadvertently disclose seemingly innocuous information that gets exploited for broader access.

Fortunately, regulators globally are waking up to the threat and implementing countermeasures. This includes intelligence sharing, industry security standards, obligations on telcos to filter spoofed calls, and outright bans on using AI-generated voices for robocalls. We are still a long ways away, if ever , from preventing AI fraud.

Technological solutions like voice biometrics, deepfake detectors, anomaly analysis and blockchain are also emerging. All combined with real-time caller risk assessment provides a multi-layered defense. Deploying these countermeasures is crucial for safeguarding against the devious fusion of AI and traditional phone scams. With the right tools and vigilance, we can stay one step ahead of the fraudsters exploiting cutting-edge technologies for nefarious gains. However, scammers continually evolve their tactics, so a multipronged strategy with security awareness training is crucial for effective defense.

Businesses must enhance their cybersecurity capabilities around telecom services, instituting clear policies like multi-factor voice authentication. Regular employee training and customer education to identify vishing tactics are vital too. Collective action between industry, government and individuals will be key to stemming the rising tide of AI-enabled voice fraud.

By leveraging technology to combat technology-enabled fraud, organizations can mitigate risks and individuals can answer calls with greater confidence. In the AI age, fighting voice fraud requires an arsenal of innovative security solutions.

Robert Siciliano CSP, CSI, CITRMS is a security expert and private investigator with 30+ years experience, #1 Best Selling Amazon author of 5 books, and the architect of the CSI Protection certification; a Cyber Social Identity and Personal Protection security awareness training program. He is a frequent speaker and media commentator, and CEO of Safr.Me and Head Trainer at ProtectNowLLC.com.

Surf Safely: Armoring Your Digital Life on Public Wi-Fi Waves

Protecting one’s data and devices on public Wi-Fi goes beyond protecting oneself on just the Wi-Fi aspect. Cyber security is holistic in its nature, meaning the devices hardware, software, and various forms of access control all need consideration.

I hear all the time that criminal hackers are so “sophisticated”. I suppose they are, but what they really are is organized, and they treat fraud like a business. Do you know who’s really sophisticated? White hat hackers also known as penetration testers. These are the security experts deployed to seek out vulnerabilities in your networks and to offer recommendations to tighten them up.

And for you laypersons, I’m going to let you in on a little secret that both criminal hackers, and the good guy hackers know: there are very basic, user-friendly tools that hackers on both sides of the fence use to “hack us” on public Wi-Fi:

The top three software tools that penetration testers commonly use to infiltrate and test the security of insecure Wi-Fi connections are:

  1. Aircracking: This is a comprehensive suite of tools for auditing wireless networks. It can monitor traffic, crack WEP and WPA/WPA2-PSK keys after capturing data packets, and check for vulnerabilities in wireless access points.
  2. Kismet: A wireless network detector, sniffer, and intrusion detection system. It can passively collect packets from both hidden and non-hidden networks, detect wireless access points and associated clients, and identify networks by probing them.
  3. Wireshark: A popular network protocol analyzer that can capture and inspect wireless traffic. It helps identify potential security issues by analyzing the data packets traveling over the Wi-Fi network.

These tools allow penetration testers to scan for and identify nearby wireless networks, capture network traffic, crack encryption keys, and exploit vulnerabilities in wireless access points and devices connected to the network. They are essential for comprehensively assessing the security posture of Wi-Fi networks during penetration testing engagements.

Keep in mind, anyone, and everyone, both good and bad have access to these software programs.

There are a number of vulnerabilities requiring consideration including:

Man-in-the-Middle (MITM) attacks: Hackers can position themselves between your device and the network, intercepting all your internet traffic to steal sensitive data like passwords, financial information, etc.

Malware distribution: Public Wi-Fi can be used to spread malware that infects connected devices, allowing hackers to access files, spy on activities, or render devices unusable.

Unencrypted connection: Many public Wi-Fi networks lack encryption, allowing anyone on the network to easily snoop on your online activities and data transmissions.

Rogue hotspots: Cybercriminals can set up fake Wi-Fi access points with legitimate-sounding names to lure users and monitor their traffic.

Snooping and sniffing: Hackers can use tools to eavesdrop on Wi-Fi signals and capture data like webpages visited, login credentials, and more.

Malicious hotspots: Hackers create malicious hotspots with similar names to legitimate ones to trick users into connecting, enabling MITM attacks.

Lack of authentication: Most public Wi-Fi is open with no authentication required, allowing anyone to join and potentially launch attacks.

The key risks involve exposing your private data and online activities to malicious actors exploiting the lack of security on public wireless networks.

Here are 10 ways to lock down your data and prepare yourself on free open public Wi-Fi:

  1. Verify the wireless network is in fact legitimate. Confirm the network name with staff at the municipality, airport, or wherever, or seek out posted signage before connecting. Wi-Fi hackers can create fake hotspots often known as “evil twins” with similar names to trick Wi-Fi users.
  2. Avoid accessing sensitive information. If possible, avoid logging into sensitive accounts such as online banking or entering passwords on public Wi-Fi as your data can be intercepted. Save the critical and sensitive data processing for at home or at work on a secure Wi-Fi connection.
  3. Use a VPN. A virtual private network encrypts your internet traffic, protecting it from snooping on public networks. The VPN software is free to a small fee, and is your best defense against digital Wi-Fi snooping.
  4. Enable two-factor authentication. Any and all Critical accounts need additional password protection and this is done generally via your mobile phone as a second form of authentication receiving a one time pass code via text. This extra login step code sent to your phone for accounts that offer it, prevents unauthorized access even if your password is compromised.
  5. Keep software updated. Install the latest operating system and software app updates which often include security patches to protect against vulnerabilities. Outdated software creates vulnerabilities that Wi-Fi hackers can seek out.
  6. Use antivirus software. Paid antivirus comes with antivirus, anti-spyware, anti-phishing, and a firewall. Antivirus programs are designed to detect and block malicious software that spies on you and can infect your device on unsecured public Wi-Fi networks.
  7. Log out after use. When finished on critical websites, log out of websites and shut down tabs or even your whole browser, and disconnect from the Wi-Fi network to minimize exposure.
  8. Enable firewall. By default, your firewall should be turned on. Keep your device’s firewall enabled to block unauthorized access while on public networks. The devices operating system should come equipped with a built-in, firewall, or do a search engine query for the name of the operating system in the word firewall for instructions on how to enable it.
  9. Avoid auto-connecting. In your devices Wi-Fi settings, you should be able to toggle off various known Wi-Fi hotspots. Disabling automatic Wi-Fi connection on your devices prevents joining rogue hotspots that may be set up as “evil twins”.
  10. Browse securely. By default, your browser should let you know if a particular website is at risk. Only visit HTTPS encrypted websites which are more secure than unencrypted HTTP sites when on public Wi-Fi.

Robert Siciliano CSP, CSI, CITRMS is a security expert and private investigator with 30+ years experience, #1 Best Selling Amazon.com author of 5 books, and the architect of the CSI Protection certification; a Cyber Social Identity and Personal Protection security awareness training program. He is a frequent speaker and media commentator, and CEO of Safr.Me and Head Trainer at ProtectNowLLC.com.

12 of the Nastiest Tax Scams and How to Prevent Them

Lets agree on this: Most of what’s written below will NEVER happen to you. Why? Because you are a subscriber to this newsletter and your propensity to consume security related content keeps you current on fraud prevention tactics.

12 of the Nastiest Tax Scams and How to Prevent Them

So, this means you have a responsibility as a security conscious citizen to spread the prevention message below and make sure to specifically inform those in your life who are a bit more vulnerable. K?

Text message tax scams

Text message tax scams are a common form of phishing where scammers impersonate the IRS or other tax authorities to trick victims into revealing personal or financial information. Here’s how these scams typically work:

The scammer sends a text message claiming to be from the IRS, stating that the recipient has an outstanding tax bill, is owed a refund, or needs to verify information. The message often includes a link or phone number to call for more details.

If the victim clicks the link, they are directed to a fake website designed to steal login credentials, credit card numbers, or other sensitive data. If they call the number, they may be asked to provide personal information or make a payment over the phone.

These scam texts aim to create a sense of urgency and fear by threatening consequences like account freezes or legal action if the recipient doesn’t respond quickly. However, the IRS does not initiate contact with taxpayers via text messages, emails, or social media.

Key things to remember:

  • The IRS will never demand immediate payment, threaten arrest, or ask for credit/debit card numbers over the phone.
  • The IRS initiates most contacts through regular mail delivered by the United States Postal Service.
  • Never click on links or call numbers provided in unsolicited texts claiming to be from the IRS.
  • Report suspected tax scams to the IRS by forwarding the text to 202-552-1226.

By being aware of how these scams operate and the IRS’s actual practices, taxpayers can avoid falling victim to text message tax fraud attempts.

Tax scam extortion phone calls

Tax scam extortion phone calls are a common fraudulent tactic where scammers impersonate government agencies like the IRS or law enforcement to trick victims into paying fictitious tax debts or fines. Here’s how these scams typically work:

  • The scammer calls the victim claiming they owe back taxes or penalties to the IRS or other tax authority.
  • They use aggressive tactics like threats of arrest, deportation, or having the police sent to the victim’s home to create a sense of fear and urgency.
  •  The caller demands immediate payment via wire transfer, prepaid debit cards, gift cards, or even cryptocurrencies to resolve the fake tax debt.
  • They often provide a fake case number, badge number, or callback number to appear legitimate.

Key things to remember:

  •  The IRS will never demand immediate payment over the phone, threaten arrest for not paying, or request payment via gift cards or wire transfers.
  • The IRS initiates most contacts through regular mail, not by phone calls.
  • Scammers often spoof caller ID to make it appear the call is from a real IRS or law enforcement number.
  • They may use personal information obtained illegally to make the call seem more credible.

If you receive one of these calls, hang up immediately. Do not provide any personal information or make any payments. Report the call to the Treasury Inspector General for Tax Administration and the Federal Trade Commission.

By recognizing the telltale signs of these extortion scams and knowing the IRS’s actual practices, taxpayers can avoid falling victim to these fraudulent threats and demands for payment.

10 More NASTY Tax Scams

  1. Phishing Scams: Fraudsters often send phishing emails or text messages posing as the Internal Revenue Service (IRS) or tax preparation companies. These messages may claim you owe money or are eligible for a refund, and they typically include a link to a fake website designed to steal your personal and financial information.
  2. Ghost Preparers: Some unscrupulous tax preparers don’t sign the returns they prepare, making it difficult for the IRS to track them down if there are any issues with the return. These “ghost” preparers may also manipulate income figures and claim fake deductions to increase refunds, leaving the taxpayer liable for penalties and interest.
  3. Identity Theft: Identity thieves may use your Social Security number to file a fraudulent tax return and claim a refund in your name. This can delay your legitimate refund and create a mess to untangle with the IRS.
  4. Fake Charities: Scammers often try to take advantage of people’s generosity by setting up fake charities and soliciting donations, especially during tax season when people are looking for deductions.
  5. Inflated Refund Claims: Some unethical tax preparers may promise inflated refunds by claiming credits or deductions you don’t qualify for, leading to potential audits, penalties, and interest charges.
  6. Impersonation Scams: Fraudsters may call or send emails pretending to be IRS agents or other government officials, demanding immediate payment for alleged back taxes or threatening arrest if you don’t comply.
  7. Affinity Fraud: Scammers often target specific communities or groups, exploiting the trust and relationships within those circles to perpetrate tax-related fraud or investment schemes.
  8. Tax Preparer Fraud: Some dishonest tax preparers may alter returns without the taxpayer’s knowledge to claim improper deductions or credits, pocketing a portion of the inflated refund for themselves.
  9. Employment Scams: Unscrupulous employers may pay workers under the table or misclassify them as independent contractors to avoid payroll taxes, leaving employees liable for additional taxes and penalties.
  10. Cryptocurrency Scams: With the rise of cryptocurrency, scammers may try to exploit the relative anonymity and complexity of these transactions to facilitate tax evasion or other fraudulent activities.

To avoid falling victim to these scams, it’s crucial to be vigilant, verify the legitimacy of any communications from the IRS (they ONLY send letters) or tax preparers, and never provide personal or financial information unless you’ve initiated the contact and confirmed the recipient’s authenticity.

Now share this. Please.

Robert Siciliano CSP, CSI, CITRMS is a security expert and private investigator with 30+ years experience, #1 Best Selling Amazon.com author of 5 books, and the architect of the CSI Protection certification; a Cyber Social Identity and Personal Protection security awareness training program. He is a frequent speaker and media commentator, and CEO of Safr.Me and Head Trainer at ProtectNowLLC.com.