Scammers use AI voices to impersonate loved ones to steal millions
In 2022, more than 5,000 victims were scammed out of money over the phone.
- Artificial intelligence voice generation software allows scammers to imitate the voices of loved ones.
- These impersonations led to people being scammed out of $11 million over the phone in 2022.
- Elderly people make up the majority of the target population.
Artificial intelligence has been a central topic in the tech world for some time now, as Microsoft continues to inject ChatGPT into its products and Google attempts to keep up with the trend by launching its own artificial intelligence products. While AI has the potential to do some truly impressive things — like generating an image from a line of text — we’re starting to see more downsides to a technology that’s largely unregulated. The latest example is artificial intelligence voice generators being used to defraud people out of their money.
Artificial intelligence speech generation software has been in the headlines lately, mostly for stealing the voices of voice actors. Initially, the software only needed a few words to convincingly recreate the speaker's voice and tone. The technology has advanced to the point where just a few seconds of conversation is enough to accurately imitate someone.
In a new report from The Washington Post, thousands of victims claim they were targeted by imposters posing as loved ones deceived. Imposter scams have reportedly become the second most popular type of fraud in the United States, with more than 36,000 cases filed in 2022. According to FTC officials, of the 36,000 cases, more than 5,000 victims had their money scammed over the phone, with losses totaling $11 million.
One story that stands out involves an elderly couple who They believed they had spoken to their son and sent more than $15,000 to the scammers through a Bitcoin terminal. An artificial intelligence voice led the couple to believe their son was in legal trouble after killing an American diplomat in a car accident. Like the victims in the story, the attacks appear to be mostly targeting the elderly. This is not surprising, as seniors are one of the most vulnerable groups when it comes to financial fraud. Unfortunately, courts have yet to decide whether companies should be held liable for damages caused by AI voice generators or other forms of AI technology.The above is the detailed content of Scammers use AI voices to impersonate loved ones to steal millions. For more information, please follow other related articles on the PHP Chinese website!

Exploring the Inner Workings of Language Models with Gemma Scope Understanding the complexities of AI language models is a significant challenge. Google's release of Gemma Scope, a comprehensive toolkit, offers researchers a powerful way to delve in

Unlocking Business Success: A Guide to Becoming a Business Intelligence Analyst Imagine transforming raw data into actionable insights that drive organizational growth. This is the power of a Business Intelligence (BI) Analyst – a crucial role in gu

SQL's ALTER TABLE Statement: Dynamically Adding Columns to Your Database In data management, SQL's adaptability is crucial. Need to adjust your database structure on the fly? The ALTER TABLE statement is your solution. This guide details adding colu

Introduction Imagine a bustling office where two professionals collaborate on a critical project. The business analyst focuses on the company's objectives, identifying areas for improvement, and ensuring strategic alignment with market trends. Simu

Excel data counting and analysis: detailed explanation of COUNT and COUNTA functions Accurate data counting and analysis are critical in Excel, especially when working with large data sets. Excel provides a variety of functions to achieve this, with the COUNT and COUNTA functions being key tools for counting the number of cells under different conditions. Although both functions are used to count cells, their design targets are targeted at different data types. Let's dig into the specific details of COUNT and COUNTA functions, highlight their unique features and differences, and learn how to apply them in data analysis. Overview of key points Understand COUNT and COU

Google Chrome's AI Revolution: A Personalized and Efficient Browsing Experience Artificial Intelligence (AI) is rapidly transforming our daily lives, and Google Chrome is leading the charge in the web browsing arena. This article explores the exciti

Reimagining Impact: The Quadruple Bottom Line For too long, the conversation has been dominated by a narrow view of AI’s impact, primarily focused on the bottom line of profit. However, a more holistic approach recognizes the interconnectedness of bu

Things are moving steadily towards that point. The investment pouring into quantum service providers and startups shows that industry understands its significance. And a growing number of real-world use cases are emerging to demonstrate its value out


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

Dreamweaver Mac version
Visual web development tools

Dreamweaver CS6
Visual web development tools