Case Accounts · FBI & FTC Patterns · Updated 2026-03-07

Real People Who Almost Got Scammed by AI Voices (And How They Stopped It)

These accounts are reconstructed from FBI IC3 and FTC fraud patterns. The details vary. The mechanics are identical. The difference between every case that succeeded and every case that failed: a verification protocol the scammer couldn't defeat.

Disclosure: The accounts below are composite reconstructions based on patterns in FBI IC3 annual reports, FTC Consumer Sentinel data, AARP research, and published news coverage. They do not represent specific identified individuals.

Scam Succeeded · $9,200 lostFTC fraud pattern · Arizona

The Grandmother Who Wired $9,000

A 74-year-old woman received a call that sounded exactly like her granddaughter — crying, distressed, saying she'd been in a car accident in another state.

The 'granddaughter' said her lawyer needed $9,200 immediately before she could be released. The grandmother should not tell anyone yet because it would 'ruin everything.'

The grandmother drove to the bank, withdrew cash, and handed it to a 'courier' who arrived at her door. The real granddaughter called that evening for a routine check-in.

The FBI documents dozens of variations of this case every month. The only change from the pre-AI version: the voice is now indistinguishable from the real person.

What would have stopped this

A 10-second Real Authenticator code request. The scammer cannot produce a code from a secret stored in the real granddaughter's phone.

Scam Stopped · $5,000 protectedReal Authenticator user composite

The Father Who Asked for the Code

A 61-year-old man received a call from what sounded exactly like his 28-year-old son — panicked, saying he'd been in an accident and needed $5,000 for emergency surgery.

The father felt something was wrong. The urgency didn't match his son's usual personality. He remembered the family rule they'd set up the previous month.

'Give me your Real Authenticator code.'

Silence. Then the line went dead.

He called his son's actual number immediately. His son was at work, confused, and had no idea what had happened.

Why the protocol worked

The protocol worked exactly as designed. No code = hang up. The scammer had no way to generate the cryptographic code from the son's device.

Scam Succeeded · $47,000 lostFBI IC3 BEC pattern · Enterprise

The CEO's Voice, the CFO's Wire

A finance manager at a mid-size company received a call from the CEO's number with the CEO's voice requesting an urgent wire transfer to a new vendor.

The CEO was 'traveling' and couldn't be reached by normal channels. The finance manager had spoken with the CEO many times and recognized the voice immediately.

$47,000 was wired. The 'CEO' called to thank her for handling it quickly.

The real CEO found out two days later during a routine finance review.

What would have stopped this

A Real Authenticator verification request, or even a company policy requiring all wire transfers to be verified via a second channel before execution.

Scam Stopped · unknown amount protectedAARP scam prevention documentation

The Grandparent With the Note on the Phone

A 79-year-old grandfather received the classic 'grandson in trouble' call. The voice sounded right. The story was urgent.

But his daughter had posted a yellow sticky note on his phone two weeks earlier: 'If anyone calls asking for money, ask for the Real Authenticator code first. No exceptions.'

He read the note. He asked for the code. The caller said 'What? I don't know what that is.'

He hung up and called his daughter.

Why the protocol worked

A physical reminder was enough in this case. The verification request — even the mention of it — caused the scammer to abandon the call.

The pattern across every stopped scam is the same.

A verification request the scammer can't fulfill. Real Authenticator makes this request cryptographically unfakeable. Set it up with your family tonight.

Download Free

Know who you're really
talking to

In a world of deepfakes and impersonation, Real Authenticator gives you and your trusted contacts a private, unforgeable way to verify identity. Download today — it's free.

Download on App Store

Free to download · No credit card required · Privacy-first design