The FBI has issued a new warning about scams that use artificial intelligence to target your money.
The threat of deepfakes: a growing concern
Criminals are increasingly using deepfakes, a type of generative AI technology, to exploit unsuspecting individuals, according to a warning issued by the FBI. This alert highlights the growing sophistication and accessibility of these technologies and the urgent need for vigilance in protecting ourselves from potential scams. Let’s explore what deepfakes are, how they’re being used by criminals, and what steps you can take to safeguard your personal information.
Enter the giveaway by signing up for my free newsletter.
The rise of deepfake technology
AI-generated content that mimics real people, including their voices, images, and videos, is known as deepfakes. Criminals use these techniques to impersonate individuals, particularly in crisis situations. For example, they may create audio clips that sound like a loved one asking for urgent financial assistance or even create real-time video calls that appear to involve company executives or law enforcement officials. The FBI has identified 17 common techniques used by criminals to create these deceptive materials.
Key tactics used by criminals
These are the 17 techniques that criminals use to exploit generative AI technologies, such as deepfakes, for fraudulent activities, as identified by the FBI.
1) Voice impersonation: Producing audio recordings that mimic the voice of a loved one or trusted individual to deceive victims.
Fake video interactions that mimic real-time calls with authority figures, such as law enforcement or corporate executives, are being created.
3) Social engineering involves using emotional appeals to deceive victims into disclosing personal information or transferring funds.
AI-generated text: Creating convincing written messages for phishing attacks and social engineering schemes.
Synthetic images can be used to create convincing profiles on social media or fraudulent websites with the help of AI technology.
AI-generated videos: Creating convincing videos that can be used in fraudulent activities, such as investment scams or impersonation schemes.
Establishing fraudulent social media accounts that use AI-generated content to deceive others.
Phishing emails: Using AI to create emails that look legitimate in order to trick recipients into revealing sensitive information.
Using deepfake technology to impersonate public figures for scams.
Producing false identification documents, including driver's licenses or certificates, for the purpose of committing fraud and pretending to be someone else.
Non-existent investment opportunities: Using AI-generated materials to deceive victims into investing in them.
Ransom payments: Using fake loved ones in distress to demand money from victims.
13) Bypassing security measures through voice authentication using cloned voices.
False fundraising campaigns: Using deepfake technology to deceive individuals into donating money under false pretenses, typically during times of crisis.
Crafting emails that look like they were sent by executives or trusted contacts to authorize fraudulent transactions is known as business email compromise.
Utilizing deepfake videos as a key component of broader disinformation campaigns, particularly during significant events such as elections.
Crisis exploitation: Utilizing emergency situations to solicit immediate aid or funds, through emotional manipulation.
Fraud schemes facilitated by generative AI are becoming increasingly sophisticated, highlighting the need for vigilance in safeguarding personal information.
Tips for protecting yourself from deepfakes
Implementing the following strategies can enhance your security and awareness against deepfake-related fraud.
Adjust privacy settings on social media to limit personal information, particularly high-quality images and videos, available online.
Consider investing in personal data removal services: By reducing the amount of information available online, it becomes more difficult for someone to create a deepfake of you. Although no service can guarantee complete removal, utilizing a removal service can help automate and continuously monitor the process of removing your information from numerous websites over an extended period of time. Explore my top recommendations for data removal services here.
3) Be cautious with personal information: Be mindful of what you share with strangers online or over the phone, especially when it comes to sensitive information such as financial details.
Be cautious when accepting new friends or connections on social media; verify their authenticity before engaging.
To protect your privacy on social media, make sure your profiles are set to private and only accept friend requests from trusted individuals. Here's how to switch any social media accounts, including Facebook, Instagram, Twitter, and any others you use, to private.
- Update your Facebook privacy settings
- Update your Google privacy settings
- Update your X privacy settings
- Update your TikTok privacy settings
- Update your Instagram privacy settings
Implement two-factor authentication (2FA) on your accounts to enhance security against unauthorized access.
Verify callers: If you receive a suspicious call, independently verify the caller's identity by contacting their organization through official channels.
Consider adding digital watermarks to your online media to prevent unauthorized use.
Keep a watchful eye on your financial and online accounts to detect any suspicious activity that may suggest fraud.
To safeguard multiple accounts from being compromised by a single breach, use distinct passwords and consider employing a password manager to generate and store complex passwords.
Ensure data protection and recovery by regularly backing up important data against ransomware attacks.
Establish a unique word or phrase with family and friends to verify identities during unexpected communications.
Be mindful of visual inconsistencies: Search for slight irregularities in images or videos, such as distorted features or unnatural movements, which may suggest manipulation.
Pay attention to the tone, pitch, and choice of words in audio clips to detect anomalies in voice, especially in AI-generated voices that may sound unnatural or robotic.
Be cautious when receiving digital communications from unknown sources, especially if the message is urgent and demands immediate action. Deepfake creators use emotional manipulation to trick you into downloading malware or sharing personal information. Always verify the sender's identity and think before clicking on any links or attachments.
To safeguard yourself from malicious links and protect your private information, it is recommended to install antivirus software on all your devices. This software can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. If you're looking for the best antivirus protection for your Windows, Mac, Android, and iOS devices in 2025, check out my top picks.
Be wary of sending money, gift cards or cryptocurrencies to individuals you have not met in person or only interacted with online or via phone.
Report fraudulent activity: If you believe you have been scammed or fallen victim to a fraud scheme, report it to the FBI's Internet Crime Complaint Center.
To safeguard against the dangers of deepfake technology and frauds, individuals should adhere to these guidelines.
Kurt's key takeaways
The growing use of advanced AI technologies, specifically deepfakes, by criminals underscores the urgent need for caution and awareness. As the FBI advises, these sophisticated tools allow fraudsters to impersonate individuals with ease, making it harder to detect and believe scams. It is essential for everyone to comprehend the tactics used by these criminals and to take proactive steps to safeguard their personal information. By staying informed about the risks and implementing security measures, such as verifying identities and limiting online exposure, we can better protect ourselves against these emerging threats.
How should businesses and governments respond to the growing threat of AI-powered fraud? Share your thoughts with us at Cyberguy.com/Contact.
To receive my tech tips and security alerts, sign up for my free CyberGuy Report Newsletter at Cyberguy.com/Newsletter.
Follow Kurt on his social channels:
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
tech
15 things to do or try first when you get a new iPhone: 1. Set up your phone with your personal information and preferences. 2. Install your favorite apps and games. 3. Connect your phone to your Wi-Fi network and other devices. 4. Take a few photos and test out the camera. 5. Set up your email and other accounts. 6. Enable security features like Touch ID or Face ID. 7. Customize your phone's settings and appearance. 8. Explore the built-in features and apps on your phone. 9. Connect with friends and family on social media. 10. Set up reminders and alarms. 11. Use the phone's built-in voice assistant. 12. Download and install new apps from the App Store. 13. Set up your phone's screen time and parental controls. 14. Enable automatic updates for your apps and software. 15. Back up your important data to cloud storage or an external hard drive.
techYou might also like
- Your credit score could be negatively impacted by these mistakes.
- How to repurpose your old iPhone for a new purpose
- The world is privy to the robot training techniques of a Chinese tech company.
- An early supernova was captured in photos by a powerful Webb Telescope.
- If you suspect your computer is infected with a virus, take action immediately.