Voice Clone Scams and Real-Life Proof of Personhood
A fake CEO voice, gift cards, urgency, and secrecy almost worked. The defense is simple: break isolation, verify through known channels, and never treat voice as identity.
A Family and Small-Company Guide for Staying Safe
Tinkering with Time, Tech, and Culture #52
The story
A coworker got a call that sounded like the CEO.
The voice was familiar. The request was friendly. The framing was positive.
This was not a bad imitation. It was the CEO's actual voice, cloned from public audio. Podcast appearances, conference talks, internal videos, anything with a few minutes of clean speech. Modern tools need less than that. Once the voice exists as a model, it can say anything the attacker types.
The "CEO" said he wanted to get the team Apple gift cards to thank them for all the hard work they had been doing. He asked the coworker to go buy cards for specific employees and mentioned those employees by name, including nicknames.
The request had all the little touches that make a lie feel real.
It was not framed as a crisis. It was framed as trust.
The voice said, in effect: I would like to do this today. Can you just go down and take care of it for me? Do not tell anyone yet. I want it to be a surprise. Just expense the cards.
The coworker was young, helpful, and wanted to please. So he left the office to do the task.
He mostly kept the secret. He did not tell anyone what the task actually was. But he mentioned that the CEO had a job for him.
That sliver was the part that saved him.
If he had said nothing, no one in the office would have had a thread to pull on. He would have walked out, bought the cards, and the attack would have completed before anyone knew it was happening. But he gave his coworkers a single fact: the CEO had asked him to do something. That was enough.
They asked follow-up questions. Something smelled wrong. They pieced together the shape of the request. CEO voice, gift cards, urgency, secrecy, employee names, nicknames, a junior employee being pushed into action. They called him before the transaction completed.
By then, the fake CEO voice was applying pressure. But the office had already broken the spell.
He came back, and the team did a debrief.
This was not isolated. The same pattern was hitting other companies in the same window. Different voices, same script.
This is the new shape of the scam.
It is not just a bad email from a fake prince. It is a live social-engineering operation built from scraped relationships, public company data, LinkedIn roles, social media clues, podcasts, voice clips, and timing.
CEOs do podcasts. Founders post videos. Employees list roles and teams on LinkedIn. Company pages expose org structure. Social posts leak nicknames, travel, product launches, morale, deadlines, and who is trying to impress whom.
The attacker does not need to know everything. They only need enough.
At scale, attackers can scan public signals, test thousands of possible scenarios, and wait for one that scores high enough to try.
When the timing is right, they execute with a script that sounds human, specific, and plausible.
That is why the defense has to be prepared before the call.
What made the scam work
This attack worked because it combined several high-pressure ingredients:
- Voice cloning: The CEO's actual voice, generated from public audio
- Authority: A request that sounded like it came from the top
- Specificity: The caller used real employee names and nicknames
- Positive framing: It was presented as a reward for the team, not an obvious emergency
- Secrecy: "Do not tell anyone, it is a surprise"
- Urgency: "I would like to do it today"
- Low-friction payment: Apple gift cards are easy to buy and hard to reverse
- Social pressure: A younger employee wanted to be trusted and helpful
- Isolation: The employee left the office and began acting alone
Every item on this list matters, but isolation is the one that makes the rest possible. A scammer who cannot isolate the target cannot run the script. Authority, specificity, urgency, and the rest only work on someone who is alone with the call.
The voice clone is one piece of the attack. The script is the weapon. Isolation is what loads it.
The two rules
The diagnosis:
Voice is not identity. Urgency is not verification. Caller ID is not proof.
The prescription:
Any private, urgent, unusual request involving money, credentials, data, gift cards, or secrecy must be verified out of band.
Not every scam begins with fear. Some begin with praise, trust, gratitude, or a chance to be useful. The rule cannot be limited to "watch out for emergency calls." Fear is one version. Generosity is another. Urgency is the constant.
The problem
A phone call is no longer proof that the person on the other end is real. Neither is a voice message, a familiar caller ID, or a text from a known number.
Scammers now combine three things that used to be separate:
- Personal information scraped from social media, data brokers, old posts, and public records
- Caller ID spoofing or compromised accounts that make the contact look familiar
- AI-generated voices that can sound like a child, parent, spouse, boss, founder, lawyer, police officer, or company executive
The result is not just a robocall. It is a targeted social-engineering attack.
The scam works because it lands at a moment the attacker chose: a fake emergency, a fake reward, a fake favor. Whatever the framing, the goal is the same. Create pressure before the target has time to think.
That is why the defense has to be decided before the call.
Proof of personhood at human scale
For normal people, proof of personhood does not need to mean biometrics, blockchain, cryptography, or a government identity system. In real life, it can be much simpler:
A known person can prove they are real by passing a pre-agreed challenge through a known channel.
That is the whole idea. The rest of this guide is how to set it up before you need it.
Family ISOPREP-Lite
In military language, ISOPREP is about preparing identity and recovery information before someone is isolated or in danger.
For a family, we need the tiny version:
Family ISOPREP-Lite is a pre-agreed plan for proving who is real during a high-pressure call, whether the framing is fear, generosity, or urgency.
It should fit on one page. It should be boring. Everyone should know it exists.
The four parts
- The family verification phrase
- The callback rule
- The no-money-under-pressure rule
- The emergency contact tree
That is enough for most families.
1. Create a family verification phrase
Pick a phrase that is easy to remember but impossible to guess from public information.
Do not use anything a stranger could find on Facebook, Instagram, LinkedIn, TikTok, or an old blog. No pet names, no birthdays, no schools, no vacation spots, no favorite bands.
Use something arbitrary.
Examples:
- "Blue toolbox"
- "Orange ladder"
- "The turtle has shoes"
- "Coffee before thunder"
- "The left drawer is empty"
The phrase does not need to sound serious. In fact, silly is good. Silly is memorable.
The important part is that the phrase is never posted, texted publicly, or used as a password.
How to use it
If someone calls and says they are in trouble, ask:
"What is the family phrase?"
If they cannot answer, stop.
If they say they forgot, stop.
If another person says they are a police officer, lawyer, doctor, jail clerk, embassy official, or kidnapper and tells you not to ask questions, stop.
The phrase is not the whole defense. It is a speed bump that gives your brain time to come back online.
2. Use the callback rule
The callback rule is simple:
Hang up and call the person back on a number you already know.
Do not call a number provided by the caller.
Do not click a link.
Do not move to WhatsApp, Signal, Telegram, or another app just because the caller tells you to.
Do not trust caller ID.
Do not trust a voice message.
Use a number already saved in your contacts or written on your family emergency sheet.
If the person does not answer, call the next trusted person on the list.
Example:
- Call the child/spouse/parent directly
- Call their spouse, roommate, friend, or coworker
- Call the school, workplace, hospital, or police department using a number you find independently
- Do not pay or disclose anything until a known channel confirms the situation
The attacker wants to keep you inside their communication bubble. The callback rule breaks the bubble.
3. Make a no-money-under-pressure rule
Every family should agree on this before anything happens:
No money moves during a high-pressure call until the person is verified through the callback rule.
That means no:
- Gift cards
- Crypto
- Wire transfers
- Zelle
- Venmo
- Cash App
- Bank transfer
- Courier pickup
- "Bail money" delivery
- "Doctor fee" payment
- "Tow truck" payment
- "Customs" or "border" payment
- "Do not tell anyone" payment
Real situations can survive a callback.
Scams usually cannot.
If someone says, "You have to do this right now or something terrible will happen," that is not proof. That is the attack. The same goes for, "You have to do this right now or you'll spoil the surprise."
4. Make an emergency contact tree
Write down the real contact paths before you need them.
For each family member, list:
- Primary phone
- Backup phone
- Spouse/partner/roommate
- Close friend
- Workplace or school main number
- Doctor or care facility, if relevant
- Local police non-emergency number
- Trusted neighbor
Print it. Do not rely only on a phone that may be lost, dead, stolen, locked, or compromised.
Keep a copy:
- At home
- With an older parent or relative
- In a safe folder
- In a password manager note
The point is not to build a surveillance file on your family. The point is to prevent panic from becoming the attacker's weapon.
Briefing the rest of the household
Different people need the rule explained different ways. The rule is the same; the framing changes.
For older parents and relatives
Do not lead with "AI voice cloning." That can sound abstract. Say this:
"If someone calls and sounds like me, and says I am in trouble, hang up and call me back. If I do not answer, call the next person on this sheet. Do not send money. Do not keep it secret. Real help will still be real after you call back."
Then practice it once. Under stress, people do what they have rehearsed.
For kids and teenagers
Tell them:
"If someone calls Grandma or Dad pretending to be you, they may use your voice from a video. We need a family phrase so we can tell what is real."
This is not about scaring them. It is about making them part of the defense.
Also teach them not to post public videos saying things like "Mom, I need help" or "Dad, call me" or "I'm scared." Those clips become emotional raw material.
That does not mean children can never post videos. It means voice is now part of the attack surface, and the household should know it.
Social media cleanup
Scammers do not need everything. They just need enough detail to make the lie feel real.
Remove or hide:
- Exact birthdays
- Family relationships
- Children's names
- School names
- Pet names
- Home address clues
- Vacation timing
- Travel while away from home
- "Grandma is home alone" type posts
- Phone numbers
- Personal email addresses
- Old public posts with recovery-question answers
- Public friend lists
- Public follower lists where possible
Blur instead of bragging.
Use:
- "Northern California" instead of a town
- "My son" instead of full name and school
- "Traveling this month" after returning, not in real time
- "Working in networking/AI infrastructure" instead of detailed internal role and authority chain
The goal is not to disappear. The goal is to stop giving scammers a clean script.
Data poisoning, but safely
It is okay to make public information less useful to scammers. Hide your real birthday. Use a broad location. Remove old phone numbers. Use email aliases. Use random answers for security questions and store them in a password manager. Avoid posting family structure publicly.
(Don't fake legally meaningful information. Don't lie on bank, tax, employer, insurance, government, or age-verification systems. This is about denying scammers the personal facts they use to commit fraud against you, not committing fraud yourself.)
Small-company version
For a small company, the same rule applies:
Voice is not authorization. A familiar name is not approval. Urgency is not a control.
AI voice scams are especially dangerous in small companies because people know each other, move fast, and do not want to slow the founder or CEO down. Scammers exploit exactly that culture.
Company rule 1: No payment by voice-only approval
No wire, vendor payment, payroll change, bank change, crypto payment, gift card purchase, or emergency invoice should be approved only by a phone call, voice note, or text message.
Even if it sounds like the CEO. Even if it sounds like the founder. Even if the request is urgent. Even if the request is generous.
Company rule 2: Vendor payment changes require out-of-band verification
If a vendor says their bank account changed, verify through a known contact path already on file.
Do not use the phone number or email in the change request.
Use the vendor master record, signed portal, known account manager, or previously verified contact.
Company rule 3: Two-person approval for abnormal money movement
Use two-person approval for:
- New vendor payments
- Bank detail changes
- Large transfers
- Payroll destination changes
- Emergency purchases
- Legal settlement payments
- Founder/CEO urgent requests
- Gift card purchases for employees
The second approver should not merely rubber-stamp. Their job is to ask: "Was this verified out of band?"
Company rule 4: Create an executive challenge protocol
For a small team, this can be simple.
Executives, finance, HR, and operations agree on a private challenge phrase or callback procedure.
Example:
"If I ever ask you to move money urgently, call me back on my known number and ask for the phrase."
Better:
"If I ask you to move money urgently, do not do it over voice. Put it into the approved workflow and require a second person."
The stronger version is better because it does not depend on one person remembering the phrase under pressure.
Small-company ISOPREP-Lite
A company version should include:
- Known callback numbers for executives
- Known vendor verification contacts
- Payment-change procedure
- Emergency escalation tree
- Two-person approval thresholds
- List of things never approved by voice alone
- Incident phrase: "Stop and verify"
This should be part of onboarding for anyone who can move money, change payroll, access customer data, or approve vendor changes.
It does not need to be a 40-page policy. A one-page rule that people follow is better than a compliance binder nobody reads.
The "Stop and Verify" script
Families and companies both need language that gives people permission to pause.
Use this:
"I want to help, but we have a safety rule. I have to hang up and verify through a known number."
If the person is real, they may be annoyed, but they will understand.
If the person is a scammer, they will pressure you.
Pressure is the signal.
Red flags
Treat these as warning signs:
- The caller says not to tell anyone
- The caller demands secrecy, even for "happy" reasons
- The caller says police, doctors, lawyers, or family will be harmed if you hang up
- The caller wants gift cards, crypto, wire transfer, Zelle, Venmo, or cash courier
- The caller moves you to another app
- The caller refuses callback verification
- The caller creates extreme time pressure
- The caller uses just enough personal detail to sound real
- The voice sounds right, but the behavior feels wrong
The last one matters most.
A cloned voice may sound like someone you love, or someone you respect at work. But the situation may not behave like them. Trust the behavior over the voice.
What to do during one of these calls
- Stop talking
- Do not provide names, locations, or extra details
- Ask for the verification phrase
- Hang up
- Call back using a known number
- Contact another trusted person
- Preserve screenshots, phone numbers, voicemails, and payment instructions
- Report the attempt if money, threats, or impersonation were involved
Do not argue with the scammer.
Do not try to prove they are fake.
Do not feed them more personal information.
End the call and verify.
After the call
Whether the scam succeeded, almost succeeded, or failed cleanly, what happens next matters.
Tell people right away. Silence is what the attacker counted on. Tell your family or your team. Debrief the way the office in the opening story did. The scammer was relying on you to stay isolated; breaking that is the first step.
Preserve evidence. Save voicemails, screenshots, the calling number, payment instructions, any text messages, and the time. Do this before you delete anything in frustration.
Assume what they heard is now in the wild. Anything you said during the call should be treated as compromised. Names, schedules, procedures, account references. Scammers share and resell what they collect.
Change the family phrase if it was spoken. Even if the caller did not seem to react to it, treat it as burned. Pick a new one and tell the household.
Report it. In the US, report to the FTC at reportfraud.ftc.gov and the FBI's Internet Crime Complaint Center at ic3.gov. If money moved, tell your bank immediately. Speed matters for reversals. If threats or impersonation were involved, call your local police non-emergency line. Outside the US, your national consumer-protection or cybercrime authority is the equivalent.
Brief anyone they might call next. Scammers often work down a contact list. If they impersonated you to your parents, warn your siblings. If they impersonated the CEO to one employee, warn the rest of the finance team. The script that almost worked once is the script they will try again.
Review what they knew. What information did they have? Where did it come from? A LinkedIn page, a podcast, an old social media post, a leaked employee list? Closing that source does not undo this attack but it shrinks the next one.
The deeper principle
The old world treated voice as identity.
The new world cannot.
A person is not proven by a voice, a number, a profile photo, a familiar name, or a few personal details scraped from the internet.
A person is proven by their network. By the people who know them, the channels they share, the procedures they follow together. Scams work by cutting the target off from that network for long enough to act.
The defense is to refuse the cutoff.
- Known channels
- Shared procedures
- Trusted relationships
- Callback paths
- Pre-agreed verification
- Calm behavior under pressure
That is proof of personhood at human scale.
Not a blockchain.
Not a retina scan.
Not a government database.
Just a family or company deciding in advance:
"When fear or flattery shows up on the phone, we verify before we act."
One-page family card
Family anti-scam rule: Voice is not proof. Caller ID is not proof. Urgency is not proof.
Family phrase: _______________________________
If someone calls in trouble, or with an unusual favor:
- Ask for the phrase
- Hang up
- Call them back on a known number
- Call the next trusted person if they do not answer
- Do not send money until verified
Never send under pressure: gift cards, crypto, wire transfer, Zelle, Venmo, Cash App, courier cash, bank transfer, or account codes.
Gift card rule: Anyone asking you to buy gift cards for them by phone is almost certainly a scammer. Real people do not pay each other in iTunes cards.
Emergency contacts:
- Person 1: __________________ / __________________
- Person 2: __________________ / __________________
- Person 3: __________________ / __________________
- Local police non-emergency: __________________
- School/workplace main number: __________________
Family phrase rule: Never post it. Never text it in a public thread. Change it if exposed.
One-page small-company card
Company anti-scam rule: Voice is not authorization. Urgency is not approval.
Never approve by voice alone:
- Wire transfers
- Vendor bank changes
- Payroll changes
- Gift card purchases
- Crypto payments
- Customer data exports
- Credential sharing
- Emergency invoices
Required controls:
- Use known callback numbers
- Verify vendor changes out of band
- Require two-person approval for abnormal money movement
- Treat gift cards as cash. Same approval path as any other payment
- Use the approved payment workflow
- Stop and verify when pressured
Stop-and-verify phrase:
"I want to help, but our safety rule requires me to verify this through a known channel."
Escalation contacts:
- Finance lead: __________________
- Founder/CEO known number: __________________
- HR/payroll lead: __________________
- IT/security contact: __________________
- Bank fraud number: __________________
Rule: A real executive can survive the verification process. A scam usually cannot.