Hi guys,

Following up on my recent articles about the rise in artificial intelligence voice cloning, whereby cybercriminals can use sophisticated computer systems to simulate a person’s voice based on a short recording. This means a computer program could generate a person’s voice after listening and learning their voice patterns. It is a terrifying prospect and is already being used to target people for cybercrime. You can read the articles that I wrote by clicking on these links: HERE and HERE

Today, I have even more disturbing news to share regarding the rise in voice cloning. A research company called MyShell TTS I’ve just launched a product that can generate synthetic voice clowns that are impossible to detect as fakes using just one to 12 seconds of a person’s voice. If you follow this link HERE, you can go to their webpage to listen to examples that make it impossible to tell the difference between the reference voice, i.e. the authentic voice and the generated voice, i.e. the artificially cloned voice. Also, this technology is not just confined to English; it can work in any language.

I will repeat it: You cannot believe anything you hear or see online or on any media platform. Anything can be generated synthetically now, from a person’s voice to an image.

I know this will sound like something out of the 1980s sci-fi film, but you now need a plan of action to deal with voice-synthetic clowns. At the very least, you need to have a plan of action on how to distinguish between who is your family member and who is not. I know it is ridiculous, but it is a real threat, and this year, we will see more and more attacks on people using artificial intelligence.

Consider this:
When you receive an urgent phone call from a loved one saying they’ve lost their wallet and need money transferred immediately, how can you be sure it’s genuinely them and not a computer-generated voice clone? The chilling truth is it’s becoming almost impossible to differentiate.

Have a code word:
So, how can you shield yourself from such threats? One effective method is establishing a unique code word with your family members, known only to you. It’s reminiscent of the spinning top used by Leonardo DiCaprio’s character in the movie “Inception” to distinguish reality from dream. Similarly, we need our version of the spinning top – a code word that a voice clone won’t know.

You can ask for this code word if you receive a suspicious call. If the caller fails to provide it, you know it’s not genuine. While it may seem overly simplistic, it’s currently one of the most practical solutions. Always remember your code word should remain strictly confidential within your family.

Please let me know if you need assistance with this or anything else. Our privacy care team are available 24 hours a day, seven days a week, to assist you with any security and privacy-related issues you might face.

I am sending you and your loved ones all the very best.

Max