THE FIELD GUIDE

Know the Playbook

Everything a family needs to understand deepfake attacks, in one place.

The drill rehearses. The Field Guide explains. Together they are the system. Read this in one sitting, or return when you need to understand a specific attack. You can come back to it from anywhere in the drill.

Human Actually essays and updates are on Substack.

The System Map carousel — first slide
The System Map — a 9-slide carousel explaining the family defenses.Download all 9 slides (PDF)

SWIPE THROUGH THE SYSTEM MAP

System Map slide 1
System Map slide 2
System Map slide 3
System Map slide 4
System Map slide 5
System Map slide 6
System Map slide 7
System Map slide 8
System Map slide 9

← swipe →

SWIPE THROUGH THE VERIFICATION PLAYBOOK

Verification Playbook slide 1
Verification Playbook slide 2
Verification Playbook slide 3
Verification Playbook slide 4
Verification Playbook slide 5
Verification Playbook slide 6
Verification Playbook slide 7

← swipe →

Section 01

ATTACK SURFACES

01

The Five Surfaces

Every deepfake attack on a family targets one of these.

An attack surface is anywhere your family is reachable. The goal of this drill is not to eliminate surfaces — you can't — but to know which ones exist and what a protocol looks like for each. Most families have five, and most have never named any of them.

The Family Voice

Any voice in your household that appears online long enough to be cloned.

Commercial voice cloning can work from a short clip — often under two minutes of clean audio for many tools, depending on the tool and quality bar. TikToks, YouTube videos, podcast appearances, school presentations, and voicemails all count. Your child's voice, your parents' voices, and your own are all potential training data. The target of the cloned voice is usually someone else — your bank, your kid's school, your parent.

IN THE WILD ——

A grandmother hears her grandson's voice saying he's in jail and needs bail. The voice was cloned from a sports highlight reel his high school posted on Instagram.

$893 million

FBI IC3 losses to AI-enabled fraud, 2025

The Trusted Contact

Any institution or person your family would act on word from — without verifying.

Schools, pediatricians, banks, employers, coaches, churches. Attackers impersonate these trusted entities because the emotional response is automatic — you don't pause to verify the school calling about your child. Every trusted contact is also an attack surface.

IN THE WILD ——

In January 2023, Jennifer DeStefano, a mother in Scottsdale, Arizona, received a call from what sounded exactly like her 15-year-old daughter crying for help — followed by a man demanding $1 million ransom. The voice was a clone. She later testified about the experience before the U.S. Senate Judiciary Committee.

The Trusted Device

The specific number, email, or account your family treats as proof of identity.

Phone numbers can be spoofed in under a minute. Email accounts get compromised. WhatsApp numbers can be cloned. The device or channel is not the person — but most families treat a text from mom's number as if it came from mom. This is the assumption attackers exploit.

IN THE WILD ——

A child at soccer practice receives a text from "mom's number" asking them to go with an unfamiliar adult. The number was spoofed from public directory information.

The Urgent Moment

The specific window of the day when your family's defenses are lowest.

Friday at 4:45pm. 1:47pm during a meeting. 11pm when a teenager is alone in their room. 7am when elderly parents are still sleepy. Attackers research timing. The urgency in the message is often real — in the sense that the attacker genuinely wants you to act before the moment passes. Your defense has to survive urgent moments, not just calm ones.

IN THE WILD ——

Business wire fraud is most commonly reported on Friday afternoons, when finance staff are trying to close out before the weekend and the CEO is unreachable.

The Private Content

What your family has posted, what's been scraped, and what's training the next deepfake.

Photos used for facial deepfakes. Voice from TikToks. Biographical detail from LinkedIn. Family relationships from Facebook. None of this is private anymore. An attacker's profile of your family can be built in an afternoon from public sources. The goal is not to post nothing — it's to know what's out there and build protocols that assume the attacker has this information.

IN THE WILD ——

Scam calls to grandparents frequently include the specific name of the grandchild, the city they live in, and the college they attend. All three are typically on the family's Facebook or LinkedIn.