January 5, 2026

The Code Word You Don't Have Yet

How voice cloning scams work at the office and at home - and what stops them

An Arizona mother picked up the phone and heard her daughter crying. The voice was unmistakable - the specific way she said “Mom,” the panic in her breath. A man came on the line. He had her daughter. He wanted $1 million.

She didn’t have a thousand dollars, let alone a million dollars. She stayed on the line, terrified, negotiating. Her husband used another phone to call their daughter’s cell.

Their daughter picked up on the second ring. She was fine. She was at work.

The voice on the first call was AI-generated, cloned from videos their daughter had posted online — and the whole thing, from finding the source audio to making the call, probably took a few hours and cost almost nothing, which is the part that should really unsettle you.

The same trick, different targets

These tricks probably first showed up in corporate fraud. In 2019, a UK energy executive wired €220,000 after getting a call from his “boss” - same voice, same German accent. The audio had been cloned from earnings calls. In early 2024, a Hong Kong finance worker authorized $25.6 million in transfers after a video call where every participant except him was AI-generated.

But the same tools that clone a CEO’s voice from investor presentations can clone your grandmother’s voice from a Facebook birthday video. Or your nephew’s voice from his TikTok. You only need seconds of audio for a convincing clone - one paper puts it only between 2 and 11 seconds, and Microsoft’s VALL-E research from 2023 says about 3 seconds for high-quality output. Either way, many of us have our voices floating around online or can be gathered in a simple spam phone call.

The family emergency scam isn’t new. What’s new is that it now sounds exactly like the person it’s supposed to be.

Smart people fall for this, too

These scams succeed because they target the part of your brain that doesn’t stop to think. When you hear your daughter crying or your boss stressed, you don’t analyze - you respond.

One CISO called it “hacking the limbic system.” Fear and urgency shortcut your critical thinking. By the time the rational part of your brain catches up, the money’s gone.

Create urgency. Establish a plausible crisis. Cut off verification options. “Don’t call anyone, they’re monitoring my phone.” “I’m about to board a flight, just handle this.” “If you hang up, they’ll hurt me.” The pattern works whether the target is a CFO or a grandparent.

What actually stops these calls

An executive got a call last summer from what sounded exactly like his CEO, complete with the right southern accent. The request was strange - something about a wire transaction. Rather than challenge them directly, he asked a simple question: “What book did you recommend to me last week?”

The line went dead.

Now that’s probably a fake story, but the principle is sound, and it’s the same one that works at home. You just have to set it up before you need it.

Establish a family code word. Pick something that wouldn’t appear in any of your online conversations or social media. Not a pet’s name. Not a birthday. Something so off the wall and extreme that you’d all remember. “Michael Jordan knitting a flaming tire.”

When you get a distress call from a family member, ask for the code word. If they can’t provide it, you know. If they can, you still verify - but you’ve bought yourself a moment to think.

Have this conversation with aging parents and grandparents specifically. They’re the most common targets for the grandchild-in-trouble variant. Frame it simply: “There are scam calls now that can copy people’s voices. If you ever get a call saying I’m in trouble and need money, ask me for our family code word. If I can’t give it to you, hang up and call me directly.”

Always verify through a separate channel. Hang up and call the person directly on a number you already have - not one the caller gives you. If your nephew is supposedly in jail in Mexico, call his cell phone. Call his parents. If your boss is supposedly on a plane, email their assistant.

This feels rude in the moment. It isn’t. Legitimate emergencies can survive a two-minute verification.

Know what to say. If you suspect a scam, you don’t need to accuse the caller. Just say: “Let me call you right back” and hang up. Then call the real person. If you have elderly parents, give them this exact script. Role-play it once so it feels natural.

The technology is already here and getting cheaper. A voice clone that costs $5 — or probably free on some site, the tools keep changing — can fool someone who isn’t expecting it.

Talk to your family about code words. Tell them it’s okay to hang up on anyone, including someone who sounds like you. The calls that succeed catch people off guard. The ones that fail hit someone who knew to pause.

Know where to report

If you get one of these calls, report it — even if you didn’t lose money. The FTC takes reports at reportfraud.ftc.gov and the FBI’s Internet Crime Complaint Center is at ic3.gov. To be honest, I don’t know how much filing a report actually accomplishes in terms of catching anyone specific, but it does help law enforcement track which scams are surging and where. And if you did lose money, a report is the first step toward any chance of recovery.

Conversations to have

This is the part that’s actually difficult to have. It’s awkward to say “hey, if someone calls sounding exactly like me and says I’m in trouble, don’t believe them.” It feels like you’re teaching them that the world is scarier than they thought, for a very low-probability event.

You don’t have to cover every scenario. Just: we have a code word, it’s okay to hang up on anyone, and if something feels off, call me back on my regular number before you do anything. Maybe run through it once so it doesn’t feel weird in the moment.

I don’t have a clean ending for this. The technology is going to keep getting better and cheaper, and the best we can do is make sure the people we care about know to pause before they panic.

Ready to make security your competitive advantage?

Schedule a call