Deepfake detection protection
How do I spot deepfakes and protect myself from AI-generated scams?
Projekt-Plan
{{whyLabel}}: Modern deepfakes have crossed the 'indistinguishable threshold,' making traditional signs like blinking patterns obsolete.
{{howLabel}}:
- Look for temporal incoherence: subtle glitches when an object passes in front of a face.
- Check lighting consistency: see if the light on the person matches the background environment.
- Observe micro-expressions: AI often struggles with the subtle muscle movements around the eyes during complex emotions.
{{doneWhenLabel}}: You can identify at least three non-obvious visual inconsistencies in a test video.
{{whyLabel}}: AI voice cloning (vishing) is now the most frequent and impactful form of deepfake fraud.
{{howLabel}}:
- Listen for unnatural cadence: perfectly rhythmic speech without the typical 'ums' or 'ahs' of human conversation.
- Detect lack of breathing: AI models often forget to simulate the sound of a speaker taking a breath between sentences.
- Spot robotic intonation: a slight metallic or 'flat' quality in emotional peaks.
{{doneWhenLabel}}: You can distinguish between a 3-second cloned clip and a real voice recording in a blind test.
{{whyLabel}}: Understanding the societal and technical context of the 'Infocalypse' helps you anticipate future scam vectors.
{{howLabel}}:
- Focus on the chapters regarding synthetic media evolution.
- Take notes on how scammers use emotional urgency to bypass your critical thinking.
{{doneWhenLabel}}: Book finished and key takeaways summarized.
{{whyLabel}}: Scammers only need 3–10 seconds of high-quality audio or video to create a convincing clone of you.
{{howLabel}}:
- Set all video-heavy profiles (Instagram, TikTok) to Private.
- Remove public videos that feature clear, isolated speech.
- Limit 'Public' posts to static images only.
{{doneWhenLabel}}: All personal video content is restricted to 'Friends Only' or deleted.
{{whyLabel}}: Data brokers sell your phone number and family connections, which scammers use to target you with personalized deepfake calls.
{{howLabel}}:
- Sign up for a reputable data removal service (e.g., Incogni or DeleteMe) to automate opt-out requests.
- Specifically target brokers that list family associations and current phone numbers.
{{doneWhenLabel}}: Initial scan completed and removal requests sent to 100+ brokers.
{{whyLabel}}: Scammers record your 'Hello, this is...' greeting to train their voice models.
{{howLabel}}:
- Delete your personalized voice recording.
- Use the default system-generated voice or a text-to-speech tool to record a generic message.
- Avoid saying your name or any unique phrases in the greeting.
{{doneWhenLabel}}: Your voicemail no longer contains a recording of your actual voice.
{{whyLabel}}: Deepfakes can be used to bypass SMS or app-based 2FA; hardware keys are the only phishing-proof defense.
{{howLabel}}:
- Purchase a FIDO2-compliant security key (e.g., YubiKey 5 series or Google Titan).
- Register the key as the primary MFA for your email, banking, and social media accounts.
- Disable SMS-based recovery wherever possible.
{{doneWhenLabel}}: Key is active and tested on your primary email account.
{{whyLabel}}: The C2PA standard (Coalition for Content Provenance and Authenticity) allows you to see if an image or video was AI-generated.
{{howLabel}}:
- Install a browser extension like UncovAI or the Content Credentials extension.
- Look for the 'CR' icon on images to verify their origin and edit history.
{{doneWhenLabel}}: Extension is installed and you have successfully verified one 'Content Credential' enabled image.
{{whyLabel}}: If a deepfake scam succeeds, immediate notification allows you to freeze funds before they are laundered.
{{howLabel}}:
- Log into your banking app and enable Push Notifications for all outgoing transfers.
- Set a threshold (e.g., $1) so you are alerted for every single transaction.
{{doneWhenLabel}}: You receive a test notification for a small purchase.
{{whyLabel}}: In a high-stress 'emergency' call, a pre-agreed word is the fastest way to verify identity.
{{howLabel}}:
- Choose a simple but random phrase (e.g., 'Blue Pineapple') that is not found on your social media.
- Share it in person or via an encrypted app (Signal/WhatsApp), never via SMS or email.
- Instruct family to ask for the word immediately if a call involves money or danger.
{{doneWhenLabel}}: All immediate family members have memorized the safe word.
{{whyLabel}}: Scammers can spoof caller IDs, but they cannot intercept a direct call you initiate to a known number.
{{howLabel}}:
- If a loved one calls from an unknown number or sounds 'off,' hang up immediately.
- Call them back using the saved contact number in your phone.
- If they don't answer, try a secondary channel like a video call or a different messaging app.
{{doneWhenLabel}}: Rule is explained to and accepted by your inner circle.
{{whyLabel}}: Business Email Compromise (BEC) now uses deepfake video calls to authorize fraudulent wire transfers.
{{howLabel}}:
- Agree with your finance team or manager on a specific internal detail to verify identity (e.g., 'What was the color of the carpet in our last offsite?').
- Require this verification for any 'urgent' or 'confidential' financial request made via video/audio.
{{doneWhenLabel}}: Protocol is documented in your team's security guidelines.