Protecting against AI Impersonation
Overview
-
The New Face of Social Engineering
-
AI and Deepfake Capabilities
-
Detection: Identifying AI Artifacts
-
Countermeasures
-
NousInt's Deepfake Scanner
The New Face of Social Engineering
Traditional Social Engineering relied on phishing emails with broken syntax or suspicious domains. In 2026, AI has lowered these telltale signs, turning grammatical errors into emails worthy of Shakespeare. Attackers now use Generative AI to launch hyper-personalized and sophisticated attacks at scale by mimicking the exact cadence, vocabulary, and emotional triggers of someone you trust; or, impersonating you through voice calls and videos.
While the "Why" remains the same (financial fraud, credential harvesting, or reputation damage), the "How" has shifted from technical exploits to psychological operations.
AI and Deepfake Capabilities
Adversarial Capabilities
-
Voice Cloning: With as little as 3 seconds of audio, often pulled from social media or a silent phone call, an adversary can clone a voice with 95% accuracy.
-
Real-Time Video Synthesis: Modern models can overlay a digital mask during live video calls. This makes it appear as if you are speaking to a known colleague or family member. This is done through GAN.
-
Vocabulary Fingerprinting: AI can analyze your past public posts to mirror your specific Stylometry. This makes a fake message feel like it was written by you personally.
Detection: Identifying AI Artifacts
As models improve, the tells move from the obvious to the biological. To identify a deepfake, look for failures in physics and human quirks.
-
Biological Inconsistencies: Watch the eyes carefully. Real humans blink spontaneously, but AI often blinks mechanically or not at all. Look for a lack of micro-expressions around the mouth during speech.
-
Edge Artifacting: In video calls, ask the person to turn their head or wave their hand in front of their face. Real-time synthesis often breaks at the edges. This causes the jawline to blur or glasses to melt into the skin.
-
Audio Anomalies: Listen for the breath. AI audio often inserts breathing sounds at syntactically incorrect moments. It also lacks the natural background noise consistent with the environment.
Countermeasures
To protect yourself and other people you trust, you should move from implicit/automatic trust to explicit verification.
1. Family/Internal Safe Phrases
Establish a safe phrase with your inner circle. It should be random (e.g., "Neon Hedgehog") and never shared digitally. Use it to verify identity odd/irregular/high stakes requests, such as money transfers or sharing secrets.
Tip: If the caller cannot provide the phrase, hang up immediately and contact them via a Secondary Channel. For example, if they called on GSM, message them on Signal instead.
2. Synthesis Checking
If you suspect a video call is a deepfake, ask for the following: - "Please hold up a piece of paper with today's date." - "Turn your head 90 degrees to the left." - "Wave your hand rapidly in front of your eyes." This forces the AI to recalculate occlusions, which usually triggers visual glitching.
3. Hardened Digital Presence
- Biometric Denial: Treat your voice and face as critical information. Limit public video or audio of yourself if you can.
- Default Voicemails: Use automated, generic voicemail greetings rather than your own voice. This prevents voice harvesting.
- C2PA and Content Credentials: For tech researchers, advocate for and use tools that support Content Provenance. This cryptographically signs media at the point of capture to prove it hasn't been altered by AI.
NousInt Deepfake Scanner
While AI generated content was originally easy to detect, it is no longer sufficient to take a quick look and confirm GenAI against sophisticated, rapidly developing models. To bridge this gap, we created the NousInt Deepfake Scanner, a multi-model analysis tool designed to detect synthetic media.
Scanner Capabilities
-
Multi-Model Analysis: By using SightEngine, Google Gemini, and HuggingFace models simultaneously, you can reduce false positives and cover a wider range of generation techniques.
-
OSINT Integration: The scanner is built with Open Source Intelligence workflows in mind, allowing analysts to quickly verify the authenticity of viral images or suspicious profile photos without logging in.
-
Rapid Verification: Designed for security-conscious users, providing immediate feedback on image authenticity.
Access the scanner directly from the NousInt Dashboard. (Note: As with other OSINT tools, you should use other resources for deepfake detection! Do not rely on just one source. And look at our privacy page.:))