Episode 3 of 17
DEEPFAKES & DIGITAL IDENTITY
Protecting Your Voice & Likeness
"If you ever get somebody calling you and they're not there and you're 'hello, hello, are you there?' — that could be a system trying to get your voice to use against you later."
Briefing Session 03
Watch Episode 3
Learn how to protect your voice, your likeness, and your family from AI-powered identity theft and deepfake scams.
Evolution of Deception
From Photoshop to Deepfakes
The Old Days
Remember when Photoshop was the big scare? We used to laugh at doctored images because they were easy to spot. Me sitting on some Sergeant's lap? Obviously fake.
Today's Reality
Look up Will Smith eating spaghetti — the AI-generated version from months ago vs. today. The new one is indistinguishable from reality. If you think you can always spot AI, be careful with that arrogance.
"As of today, AI is the worst it will ever be. It's continually improving."
Critical Threat Vector
The Voice Cloning Attack
THE GRANDPARENT SCAM ON STEROIDS
"Grampy, grampy, it's Megan. They just picked me up and I'm scared and I don't know what to do..." — Your heart's going to blow out of your chest. But it might not be Megan at all.
Voice Capture
AI systems need only 3-15 seconds of your voice. Every "Hello? Are you there?" could be harvesting your voice print.
Network Mapping
They can find your carrier, other numbers on your account, your relatives' public info through sites like Spokeo.
Targeted Strike
Clone your voice, call your loved ones, create urgency: "Connor is in a Mexican jail and needs bail money NOW."
Data Exposure Assessment
Your Likeness Is Already Compromised
What's Out There
Every photo uploaded to Facebook since 2007. Video calls. Voicemails. Public speaking events. Your kids' TikToks and YouTube channels. It's all training data now.
Terms of Service
Your iPhone, smart TV, Gmail, Netflix, Amazon Prime — every agreement you clicked "Accept" on probably signed away rights you didn't know you had.
REALITY CHECK: "They're not open to lawsuit. They're probably in some other country sitting in some cyber cafe on a crappy computer. That's enough to get people to send money."
Defense Strategies
Protection Protocols
Family Code Words
Establish secret phrases for emergency calls. DO NOT say them near any device — no phones, TVs, Alexa, or Google. Write it down, memorize it, destroy the paper.
Hang Up & Call Back
If someone calls claiming to be family in trouble, hang up immediately and call them directly on their known number.
Be Skeptical of Urgency
"Don't tell anyone, just send money NOW" is the scammer's favorite line. Real emergencies allow time for verification.
Trust Nothing, Verify Everything
Your Gen X BS detector is your greatest asset. Use it. Check multiple sources. Never take anything at face value.
Intelligence Assessment
We've Passed the Turing Test
Alan Turing postulated in the 1950s: once machines can fool humans into thinking they're dealing with another human, we've crossed a threshold.
Most scientists believe we passed it 2-3 years ago with ChatGPT. That was November 30, 2022 — just over 3 years ago. Experts say in the next 800 days, the world will be completely different.
These systems may become truly conscious — or fake conscious so well we can't tell the difference. Either way, the implications are the same.
Mission Control
Tactical Archives
MISSION STATUS BRIEFING:
Sequential subdomains (1.honorelevate.com - 17.honorelevate.com) are being deployed. Each selection below will open in a new tab. If a selection redirects you back to Episode 1, the specific intel for that mission is still under encryption.