Wednesday, December 31, 2025

AI's (Perplexity) Guides to dealing with AI-enhanced fraud and scams: General, Christian, Muslim, Atheist/secular humanist, "Senior Citizen," and Japanese Buddhist/Shinto approaches

THE PROBLEM: In about a year moving from Canada to the US we were
Clearly, we needed a little help with protecting our online life and identities, other than what was provided by our financial institutions and VPNs. Also, had we been able to afford lawyer(s)  . . . who knows . . . !

THE PLAN: Have decided to become part of the solution, not just for us, but for my friends and associates who don't have the time or resources to put together a feasible plan for themselves. (Check with me, wracton@gmail.com) for more on that!) 

Clker.com

ASK THE DRAGON:
So, I asked AI for some thoughts on how to best deal with all the above and beyond. What follows is basically Perplexity AI's respnnse with my added comments in italics. The sources Perplexity took material from are, all things considered, not bad, although the focus was on more advice rather thatn evidence-based protocols and "rules," and many are relatively "light weight." Nonetheless, the general perspectives seem to be relatively consistent. And, as always, AI "sins" more by omission than by commission!

Perplexity AI begins here:

Worldview and perspectives: 

Understanding your worldview—what you believe about people, institutions, money, truth, and technology—matters because it quietly shapes how much you trust others, how quickly you act under pressure, and how you interpret messages and offers. If your assumptions were formed in an era of handshake deals, stable institutions, and slower change, they can make it harder to recognize how different today’s AI‑driven, high‑speed fraud environment really is. ​​(gotzero +2)

​In addition to the General set of procedures here, directed toward a family application, there are
(c) An Atheist/secular humanist perspective
(d)  A basic approach for those in their sixth decade and beyond.
(e) A Japanese Buddhist/Shinto perspective
 
THE QUESTION/PROMPT: How can I best protect my family, resources and identity today, especially with the increasing threat of AI-generated fraud and deep fakes?

THE General GUIDE: Procedures

"The most effective protection in 2025 is a layered strategy: lock down your accounts and devices, sharply upgrade how your family verifies “urgent” requests, and minimize exploitable personal data online. This reduces the risk from AI driven scams, deepfakes, and traditional identity theft at the same time. (acrisure+4)

Biggest AI driven threats now
  • AI makes phishing and social engineering messages highly personalized, including realistic emails, texts, and websites that mimic banks, brokerages, and government agencies. (norton+1)
  • Deepfakes and voice cloning are being used for “grandparent” scams, fake kidnapping/extortion calls, and CEO style payment requests, where a cloned voice or video urges urgent action. (jpmorgan+1)
  • Deepfake video and face/voice spoofing can bypass some basic biometric and video ID checks, feeding both classic identity theft and fraudulent benefit or loan applications. (fcnb+1)

Lock down accounts and devices
  • Enable multi factor authentication (MFA) on every important account (email, banking, brokerage, password manager, government logins), using an authenticator app or hardware key rather than SMS wherever possible. (hefcu+1)
  • Use a reputable password manager and make all passwords long, unique, and randomly generated; this sharply reduces reuse based account takeovers. (cloudeagle+1)
  • Keep operating systems, browsers, and security software fully updated and use a modern security suite that includes phishing and malicious site blocking. (hefcu+1)

Defend against deepfakes and social engineering
  • Establish family verification protocols: a shared passphrase or question that must be used on any urgent money or data request by phone, text, or video, even if the voice/face seems familiar. (aba+1)
  • For any out of pattern request (wire transfer, gift cards, changing banking info), always verify through an independent channel: hang up and call back on a known number or in person if feasible. (acrisure+1)
  • Train family members to slow down when confronted with emotional urgency (crisis, law enforcement threats, “act now or lose everything”) and treat that urgency itself as a red flag.cybersecurity. (yale+1)

Reduce identity exposure and monitor for misuse
  • Limit public sharing of birth dates, addresses, high resolution photos, and voice/video clips that make cloning easier; tighten social media privacy settings to restrict data scraping. (proof+1)
  • Turn on bank, credit card, and brokerage alerts for new payees, large transfers, logins from new devices, and card not present transactions; many institutions now use AI to flag anomalous activity in real time. (mastercard+1)
  • Use an identity monitoring / dark web alert service (from a bank, insurer, or specialist provider) that watches for breached credentials and new account fraud in your name. (id+1)

Concrete next steps for your situation
  • Prioritize your “crown jewels”: primary email, tax SSA/IRS accounts, bank/brokerage, and password manager; add app based MFA and review recovery options on each this week. (cloudeagle+1)
  • Run a quick “family safety briefing” (spouse, adult children, key contacts) to set a code phrase, document the callback numbers you trust, and agree that no one moves money on the basis of a single urgent message or call. (aba+1)
  • Ask your financial institutions and any identity protection provider you use which AI enhanced fraud detection and alert tools they already offer, and enable the most conservative settings that still fit your lifestyle. (id+1)

If you share a bit about which banks/brokerages and identity protection tools you already use, a custom checklist can be created that fits your exact accounts and your family’s tech comfort level."

(My) Summary/Comments: 

A. Use multi-factor authentication system
B. Use a password manager
C. Use independent channels in verifying requests and queries 
D. Turn on alerts (banks, credit cards, etc.)
E. Use an identity monitoring service with dark web alert functions
F. Other recommended actions (not mentioned above)
    a. Be part of a team, if possible, or at least have one trusted connection to consult with. 
    b. Have legal consultation and backup available when necessary
    c. Have both eCopies and hardcopies securely filed.
    d. Have updated wills and key connections/beneficiaries oriented to their respective roles. 
    e. Have or at least know a good tax accountant.
    f. Continually take training/orientation courses—on most anything!
    g. Be at least a competent (not necessarily enthusiastic), informed user of AI!


Sources
1. https://www.acrisure.com/blog/ai-deepfake-scams-2025-guide
2. https://www.hefcu.com/news/ai-fraud-and-how-to-protect-yourself
3. https://us.norton.com/blog/online-scams/top-5-ai-and-deepfakes-2025
4. https://www.mastercard.com/us/en/news-and-trends/stories/2025/cybersecurity-2025-year-in-review.html
5. https://www.fcnb.ca/en/guides/protecting-yourself-from-ai-and-deepfake-scams
6. https://sift.com/blog/how-ai-is-fueling-online-fraud-in-2025-and-what-businesses-can-do-about-it/
7. https://www.jpmorgan.com/insights/fraud/fraud-protection/ai-scams-deep-fakes-impersonations-oh-my
8. https://network.id.me/article/fighting-the-new-face-of-identity-theft/
9. https://www.techprescient.com/identity-security/multi-factor-authentication-mfa/
10. https://www.cloudeagle.ai/blogs/identity-management-best-practices
11. https://www.aba.com/about-us/press-room/press-releases/aba-foundation-and-fbi-joint-infographic-on-deepfake-scams
12. https://cybersecurity.yale.edu/monthly-tip/july-2025
13. https://www.credithuman.com/building-slack/what-financial-fraud-really-is-and-five-ways-to-protect-yourself
14. https://www.proof.com/blog/deepfake-scams-how-to-spot-them
15. https://www.iddataweb.com/ai-fraud-detection/
16. https://efraudprevention.com/security/Prevent_deepfake_fraud_attacks.html
17. https://securityscorecard.com/blog/iam-in-2025-identity-and-access-management-best-practices/
18. https://cloudsecurityalliance.org/blog/2025/07/02/mfa-made-easy-8-best-practices-for-seamless-authentication-journeys
19. https://alsafarpartners.com/blog/legal-articles-and-judgements-4/how-to-protect-yourself-from-ai-scams-in-2025-344
20. https://www.infisign.ai/blog/multi-factor-authentication-mfa-best-practices

    



Tuesday, December 23, 2025

Happy Zoom Festivus Festival!

Clker.com

 In a classic episode of Seinfeld in 1997 the idea of the Festivus Festival (according to Wikipedia!) celebrated on December 23, wonderfully light-hearted flat-out anti-consumerist occasion shows up. One key feature is the use of an aluminum Christmas tree, for example, where in various ways, grievances are presented creatively and often as outlandishly as possible. 

In that spirit, I propose a "Zoom" Festivus Festival here! 

I love it when

• All the apathetic expressions on the faces of participants in there little windows reflect PERFECTLY the quality of the presentation!

• There are so many words on the powerpoint that it gives me something to do other than listen to nonsense coming from the speaker(s)

• The comments go by so fast that it gives me something to do other than listen to nonsense coming from the speaker(s)

• You get occasional looks at the top of participants heads, among other, less engaging scenes

• Speakers have learned the classic Ronald Reagan "trick" of, after each profound blurb, act nonverbally as if you have at least nodded back, even with enthusiasm.

• Speaker speaks so rapidly that even on half speed the recording is "immemorable!)

• Participants use virtual backgrounds and avatars on screen.

• Participants are "required" to leave cameras on with seminars of 500+

• Their cursor bounces around, unrelated to the content or voice.

• Participants do not turn on video and their picture is of their cat or dog . . .

• Participants have baseball caps on backward to make sure they are not attacked from behind.

• Participants wear baseball caps with the brim down to their eyebrows so you can't tell which cards they are holding.

• We go to breakout rooms for less time than we could possibly perform the assigned task(s)

• Breakout conversations demand pointless emotional blathering --and I get appointed to report back to main group . . .

• Books or objects appear on bookshelves behind the speaker that near totally undermine any credibility 

• The speaker makes a big deal of showing /exposing some upper body part(s) and maybe even commenting on it

• Speaker talks from a treadmill with breathing patterns suggesting cardiac arrest.

• The screen freezes repeatedly and the speaker does not/ will not figure out a workaround.

Feel free to add to the festivities in the comment section and I'll post them!

Keep in touch!

BIll

Monday, December 22, 2025

Celebrating 20 years of Haptic and the "virtual peaceful-of-mind" of the road ahead!


Hard to believe it was over 20 years ago that we stumbled into the idea that touch would immeasurably complement use of gesture in pronunciation teaching. The concept has now evolved to v8.0 and will be offered, as usual, as an online course, beginning the week of February 9th. Please pass on the word; if you have a group of students, contact me directly. (wracton@gmail.com)

In addition, as suggested above, I'm now associated with LegalShield and company, among the top providers of subscriber-based legal, identity and dark web protection. It is very affordable and, depending on the extent of your life on the web and the rapid emergence of the threat of AI, is becoming more and more essential/critical for many of us. (Here's my website: williamacton.legalshieldassociate.com) . Check it out and/or get in touch and I'll be happy to give you the tour! (Here's a nice 10-minute link that describes the Legal and Identity Shield systems: https://ltl.is/djkyfqn89)

Keep in touch!

Bill


Tuesday, December 9, 2025

Links to EAPIC Lesson 10 (MT4 Grand Tour)

 Link to Lesson 10 training video

Link to Lesson 10 blog page

Link to Lesson Wednesday 8 p.m. EST Feedback Session

(Password required; send me an email and, for a small fee,  I'll send you the password for this week.) 




  Link to Lesson 9 ttaining video

Link to Lesson 9 blog page

Link to EAPIC 8 Training Video 

Link to EAPIC 8 blog page

Link to Lesson 7 Training Video

Link to Lesson 7 Blog page

 Link to Lesson 6 Training video

Link to Lesson 6 Blog page

Link to Lesson 5 Training Video (YouTube)

Link to Lesson 5 Blog Page

 Link to L4 Trainng video (Youtube)

Link to L4 blog page

Link to L3 training video (Youtube)

Link to L3 Blog page.

Links to EAPIC Lesson 9

 

Link to Lesson Wednesday 8 p.m. EST Feedback Session

(Password required; send me an email and, for a small fee,  I'll send you the password for this week.) 




  Link to Lesson 9 ttaining video

Link to Lesson 9 blog page

Link to EAPIC 8 Training Video 

Link to EAPIC 8 blog page

Link to Lesson 7 Training Video

Link to Lesson 7 Blog page

 Link to Lesson 6 Training video

Link to Lesson 6 Blog page

Link to Lesson 5 Training Video (YouTube)

Link to Lesson 5 Blog Page

 Link to L4 Trainng video (Youtube)

Link to L4 blog page

Link to L3 training video (Youtube)

Link to L3 Blog page.