The Scammer's Playbook: AI, Voice Cloning, and the Timeless Art of Deception

May 18, 2023
Ryan Findley, Principal
Philadelphia, PA

The Scammer's Playbook: AI, Voice Cloning, and the Timeless Art of Deception

Ah, the age of artificial intelligence (AI) – a time of technological marvels, job market panic, and a newfound fear of being duped by a robot with the voice of your dear Aunt Edna. As AI continues to evolve, so too does the concern that we'll be effortlessly swindled out of our personal and financial information by cyber tricksters armed with voice cloning technology. It's enough to make you long for the days when scams were limited to poorly worded emails from a "Nigerian prince."

But fear not, for while the tools of the trade may be changing, the scams themselves remain as predictable as a Hallmark movie plot. That's right – just as a story typically follows a classic five-part structure, scammers continue to pull from the same old playbook, no matter how futuristic their gadgets may appear. In this blog, we'll delve into the timeless art of deception and explore the key warning signs to watch out for, so you can keep your wits about you in this brave new world of AI chicanery.

The Five Timeless Signs of a Scam: A Guide to Navigating the AI-Infested Waters

As we embark on this journey through the murky depths of scam detection, let's arm ourselves by understanding  the five classic signs that a scam is afoot. Keep your eyes peeled and your wit razor-sharp, for the scammers may be crafty, but they are not invincible.

1. The Curious Case of the Suspicious Sender

Ah, the old "pretend to be someone you're not" trick. Scammers often masquerade as legitimate entities by using email addresses that are just slightly off. For example, they might use "" instead of "". Always scrutinize the sender's address with the intensity of a detective examining a fingerprint, lest you fall prey to their digital disguise.

Suspicious sender applies to phone numbers, too. If you receive a call from, let’s say, Aunt Edna again, and her contact information appears to be off, think twice before sharing information with her. A suspicious call could come from a blocked number, an unrecognized number, OR it can appear as “Aunt Edna.” In the event that the contact information appears as it usually does, get in the habit of confirming the phone number or hanging up and instead connecting via an outbound call when the conversation turns suspicious (as we’ll explore in the next four sections.)


2. Urgency: The Scammer's Best Friend

Nothing gets the heart racing quite like an email claiming your account has been compromised or that your long-lost cousin is in dire need of financial assistance. Scammers thrive on urgency, hoping to pressure you into making hasty decisions. Remember, panic is their ally – take a deep breath, and approach every urgent message with a healthy dose of skepticism.

Any legitimate situation that needs addressing, will not disappear. If you truly owe money to a lender, that money will still be owed tomorrow. If a relative is suddenly in jail and needs bail money… they’re not going anywhere anytime soon. The point is that with the exception of physical emergencies, very few situations would become worse in the few minutes you take to verify the claim. So pause, verify, and step away from the “phishy” situation with confidence.   


3. The Siren Call of Sensitive Information

Beware the scammer's insatiable appetite for your most precious secrets: passwords, credit card numbers, and Social Security digits. No legitimate company would dare request such treasures via email, text, or unannounced phone call, so guard your sensitive information as if it were the key to a hidden vault filled with gold and cat memes.

Many financial and government institutions have a policy that they will never solicit personal information. For example, the IRS will never call you. Chase Bank will never text you asking for your password and so on. 

There may come a time, however, when you receive a call from your car insurance company. Maybe they say you missed a payment and need to immediately share your billing information so your car insurance can be reinstated. Maybe this is true (cough: writing from experience: cough.) Even if the call is coming in a month after you changed your credit card number and it lines up perfectly, hang up. Take a minute to check your inbox for genuine emails that support the claim. Then, verify the phone number and call them back at a publicly listed phone number. You can request an encrypted link or update your billing directly to the payment portal. Any genuine situation will allow you options to feel safe and will not rush you into sharing  information. 


4. The Telltale Signs of an Unpolished Wordsmith

Ah, the sweet irony of a scammer claiming to represent a reputable company, yet littering their message with spelling and grammatical errors. While the occasional typo may slip through even the most vigilant of proofreaders, a message riddled with errors is as suspicious as a mustache-twirling villain in a silent film.

Strike a balance somewhere between being the over-correcting grammar police, and being appropriately suspicoius wh3n sumone tipes lik this.


5. The Treacherous Terrain of Suspicious Links and Attachments

The pièce de résistance of any scam is the malicious link or attachment, beckoning you to click and unleash digital chaos upon your unsuspecting device. Resist the temptation, and instead hover over links to inspect their true destination (failing that, right click and “copy link”, then paste it somewhere safe, like a notepad). When it comes to attachments, exercise extreme caution – especially if the sender is as mysterious as a figure lurking in the shadows.

In conclusion, dear reader, remember that while the tools of deception may evolve with the times, the scams themselves remain as predictable as ever. It's crucial to stay vigilant and be aware of the common signs of phishing scams, regardless of the technology used. By familiarizing yourself with these signs and practicing caution when dealing with suspicious messages, you can protect yourself and your sensitive information from falling into the hands of cybercriminals.

When you stay vigilant and keep these five classic signs of a scam in mind, you'll be well-equipped to navigate the AI-infested waters and emerge unscathed.

Recent Blog Posts

October 18, 2023
The Hidden Power of Zero Queue: Unlocking Unforeseen Opportunities
In a world that’s constantly on the move, we often find ourselves caught in the relentless cycle of accumulating tasks, creating invisible queues in various aspects of our lives. A cluttered kitchen sink full of dishes is a perfect embodiment of this problem. It not just occupies space but robs you of the ability to use the sink freely for other needs. Let's venture into the transformative concept of a 'zero queue', a philosophy that promises not only to save time but to unlock unforeseen opportunities and values.
September 20, 2023
Sustainable Development: A Path for Apps and Developers
In the world of app development, sustainability means creating software that not only solves today's challenges but is also designed to adapt and evolve, efficiently facing future needs. Whether you’re a developer or a project manager, consider this your friendly guide to building software that lasts—without wearing out your team in the process.
August 21, 2023
Job Hunting 101: A Guide for Frustrated Ruby On Rails Job Seekers
Are you a seasoned Ruby on Rails developer struggling to land your dream job? Or worse, any job at all? Applying to cold jobs across many industries is a nightmare right now. Maybe you’ve fired off rounds of applications each day, with only a few resulting in an interview that ultimately leads to nowhere. Or, you’ve spent hours applying to jobs that you’re qualified for, but you never even hear back.
July 6, 2023
Ruby on Rails: A Path to Sustainability for Apps and Developers
Ruby on Rails is a sustainable choice for both app development and developers. This open-source web application framework is renowned for its simplicity and flexibility, enabling the swift creation of robust applications.