AI Over 50 | Episode 3: Deepfakes & Digital Identity

Episode 3 of 17

DEEPFAKES & DIGITAL IDENTITY

Protecting Your Voice & Likeness

"If you ever get somebody calling you and they're not there and you're 'hello, hello, are you there?' — that could be a system trying to get your voice to use against you later."

CONNOR MACIVOR // IDENTITY DEFENSE PROTOCOL

Briefing Session 03

Watch Episode 3

Learn how to protect your voice, your likeness, and your family from AI-powered identity theft and deepfake scams.

Evolution of Deception

From Photoshop to Deepfakes

The Old Days

Remember when Photoshop was the big scare? We used to laugh at doctored images because they were easy to spot. Me sitting on some Sergeant's lap? Obviously fake.

Today's Reality

Look up Will Smith eating spaghetti — the AI-generated version from months ago vs. today. The new one is indistinguishable from reality. If you think you can always spot AI, be careful with that arrogance.

"As of today, AI is the worst it will ever be. It's continually improving."

Critical Threat Vector

The Voice Cloning Attack

THE GRANDPARENT SCAM ON STEROIDS

"Grampy, grampy, it's Megan. They just picked me up and I'm scared and I don't know what to do..." — Your heart's going to blow out of your chest. But it might not be Megan at all.

Voice Capture

AI systems need only 3-15 seconds of your voice. Every "Hello? Are you there?" could be harvesting your voice print.

Network Mapping

They can find your carrier, other numbers on your account, your relatives' public info through sites like Spokeo.

Targeted Strike

Clone your voice, call your loved ones, create urgency: "Connor is in a Mexican jail and needs bail money NOW."

Data Exposure Assessment

Your Likeness Is Already Compromised

What's Out There

Every photo uploaded to Facebook since 2007. Video calls. Voicemails. Public speaking events. Your kids' TikToks and YouTube channels. It's all training data now.

Terms of Service

Your iPhone, smart TV, Gmail, Netflix, Amazon Prime — every agreement you clicked "Accept" on probably signed away rights you didn't know you had.

REALITY CHECK: "They're not open to lawsuit. They're probably in some other country sitting in some cyber cafe on a crappy computer. That's enough to get people to send money."

Defense Strategies

Protection Protocols

Family Code Words

Establish secret phrases for emergency calls. DO NOT say them near any device — no phones, TVs, Alexa, or Google. Write it down, memorize it, destroy the paper.

Hang Up & Call Back

If someone calls claiming to be family in trouble, hang up immediately and call them directly on their known number.

Be Skeptical of Urgency

"Don't tell anyone, just send money NOW" is the scammer's favorite line. Real emergencies allow time for verification.

Trust Nothing, Verify Everything

Your Gen X BS detector is your greatest asset. Use it. Check multiple sources. Never take anything at face value.

Intelligence Assessment

We've Passed the Turing Test

Alan Turing postulated in the 1950s: once machines can fool humans into thinking they're dealing with another human, we've crossed a threshold.

Most scientists believe we passed it 2-3 years ago with ChatGPT. That was November 30, 2022 — just over 3 years ago. Experts say in the next 800 days, the world will be completely different.

These systems may become truly conscious — or fake conscious so well we can't tell the difference. Either way, the implications are the same.

Mission Control

Tactical Archives

MISSION STATUS BRIEFING:
Sequential subdomains (1.honorelevate.com - 17.honorelevate.com) are being deployed. Each selection below will open in a new tab. If a selection redirects you back to Episode 1, the specific intel for that mission is still under encryption.

CONNOR MACIVOR // STAY CURIOUS. STAY SKEPTICAL. STAY ALIGNED.