Resource Article

Resources / Family & Child Safety

Deepfake Voice Scam Playbook for Families and Staff

Voice-clone fraud works when urgency bypasses verification. Policy and rehearsal help close that gap.

Family & Child Safety Practical guidance Action-oriented next steps

Resource Article

Resources / Family & Child Safety

Synthetic voice fraud can be used to pressure immediate money movement or location disclosure.

Defensive controls:

  • Never authorize transfers or pickups from voice requests alone.
  • Require a second-channel verification step.
  • Use a pre-shared challenge prompt for high-urgency calls.
  • Document incident reporting and follow-up actions.

The most reliable control in these situations is a disciplined process, not caller recognition alone.