The Family Voice
Any voice in your household that appears online long enough to be cloned.
Commercial voice cloning can work from a short clip — often under two minutes of clean audio for many tools, depending on the tool and quality bar. TikToks, YouTube videos, podcast appearances, school presentations, and voicemails all count. Your child's voice, your parents' voices, and your own are all potential training data. The target of the cloned voice is usually someone else — your bank, your kid's school, your parent.
IN THE WILD ——
A grandmother hears her grandson's voice saying he's in jail and needs bail. The voice was cloned from a sports highlight reel his high school posted on Instagram.
$893 million
FBI IC3 losses to AI-enabled fraud, 2025
The Trusted Contact
Any institution or person your family would act on word from — without verifying.
Schools, pediatricians, banks, employers, coaches, churches. Attackers impersonate these trusted entities because the emotional response is automatic — you don't pause to verify the school calling about your child. Every trusted contact is also an attack surface.
IN THE WILD ——
In January 2023, Jennifer DeStefano, a mother in Scottsdale, Arizona, received a call from what sounded exactly like her 15-year-old daughter crying for help — followed by a man demanding $1 million ransom. The voice was a clone. She later testified about the experience before the U.S. Senate Judiciary Committee.
The Trusted Device
The specific number, email, or account your family treats as proof of identity.
Phone numbers can be spoofed in under a minute. Email accounts get compromised. WhatsApp numbers can be cloned. The device or channel is not the person — but most families treat a text from mom's number as if it came from mom. This is the assumption attackers exploit.
IN THE WILD ——
A child at soccer practice receives a text from "mom's number" asking them to go with an unfamiliar adult. The number was spoofed from public directory information.
The Urgent Moment
The specific window of the day when your family's defenses are lowest.
Friday at 4:45pm. 1:47pm during a meeting. 11pm when a teenager is alone in their room. 7am when elderly parents are still sleepy. Attackers research timing. The urgency in the message is often real — in the sense that the attacker genuinely wants you to act before the moment passes. Your defense has to survive urgent moments, not just calm ones.
IN THE WILD ——
Business wire fraud is most commonly reported on Friday afternoons, when finance staff are trying to close out before the weekend and the CEO is unreachable.
The Private Content
What your family has posted, what's been scraped, and what's training the next deepfake.
Photos used for facial deepfakes. Voice from TikToks. Biographical detail from LinkedIn. Family relationships from Facebook. None of this is private anymore. An attacker's profile of your family can be built in an afternoon from public sources. The goal is not to post nothing — it's to know what's out there and build protocols that assume the attacker has this information.
IN THE WILD ——
Scam calls to grandparents frequently include the specific name of the grandchild, the city they live in, and the college they attend. All three are typically on the family's Facebook or LinkedIn.