Scammers Want to Steal Your Voice
By Greg Collier
In the Upper Peninsula of Michigan, a recent incident highlighted a scam that is as calculated as it is dangerous. According to a press release from the Michigan State Police, scammers are increasingly targeting older adults using impersonation, intimidation, and a tactic that should concern anyone with a phone or computer: recorded voice data.
This is not just another phishing attempt. This is something more deliberate, more invasive, and potentially more damaging.
A Script Built on Fear
The scam begins the way many do, with urgency and authority.
An elderly woman was contacted by someone claiming her computer had been hacked. The caller positioned themselves as a figure of authority, creating a sense of panic that demanded immediate action. The goal was simple: overwhelm the victim before they had time to think.
From there, the scam escalated.
The victim was instructed to “verify her identity” by recording herself stating her full name, address, and Social Security number. This wasn’t just data collection. This was harvesting something far more valuable.
Her voice.
Why Scammers Want Your Voice
At first glance, asking someone to record personal information may seem redundant. After all, scammers could just write it down. But the real objective isn’t just the information. It’s how that information is captured.
A recorded voice sample opens the door to several high-risk scenarios:
Voice authentication fraud:
Many banks, financial institutions, and government systems now use voice recognition as a security layer. A clean recording of someone stating identifying details can be used to bypass those protections, especially when combined with stolen personal data.
Deepfake voice cloning:
With even a short audio sample, scammers can use AI tools to create a synthetic version of a person’s voice. That cloned voice can then be used to call family members, banks, or employers, making fraudulent requests sound legitimate.
Social engineering amplification:
A victim’s own voice can be repurposed in scams targeting others. Imagine a grandparent hearing what sounds like their child or grandchild asking for help. That is no longer hypothetical. It is already happening.
Account takeover and impersonation:
Recorded statements that include names, addresses, and Social Security numbers can be stitched together to pass identity verification checks or support fraudulent claims in customer service interactions.
In short, scammers are no longer just stealing your information. They are trying to become you.
The Second Phase: Financial Extraction
Once the scammers had what they wanted, they moved to the next stage.
The victim was instructed to withdraw money from her bank. The threat was explicit: comply, or face arrest. To reinforce the illusion, the scammer claimed that a federal agent would come to her home to collect the money.
This is a classic pressure tactic. Introduce authority. Add urgency. Remove time for doubt.
But in this case, something interrupted the script.
The Break in the Chain
When the woman arrived at her bank, staff recognized the situation for what it was. They intervened and warned her that this was likely a scam.
Instead of proceeding, she contacted law enforcement and visited her local MSP post. Because of that decision, she did not lose any money.
That outcome is the exception, not the rule.
What Police Want You to Understand
The Michigan State Police made one point clear: legitimate government agencies do not operate this way.
They do not:
- Call you out of the blue demanding personal information
- Ask you to record sensitive details
- Threaten arrest over the phone
- Send agents to collect money from your home
If law enforcement needs to speak with you, it happens in person, through official and verifiable channels.
Anything else should be treated as a red flag.
Recognizing the Pattern
This scam works because it follows a predictable formula:
It starts with fear.
It builds with authority.
It escalates with urgency.
It ends with compliance.
And now, it includes voice harvesting as a new layer of exploitation.
The addition of recorded audio marks a shift. Scammers are adapting to new technologies, and they are doing it quickly. What used to be simple identity theft is becoming something closer to full identity replication.
What to Do If You Encounter This
If you receive a similar call, the correct response is simple, even if it feels difficult in the moment.
Stop the conversation.
Do not provide any information. Do not record anything. Do not follow instructions involving money.
Then take action:
- Contact your bank or credit union immediately if you shared any details
- Change your passwords, especially for financial and email accounts
- Reach out to local law enforcement for guidance
The sooner you break contact, the less damage can be done.
The Bigger Picture
Scams like this persist because they exploit something universal: fear of authority and fear of consequences.
But the technology behind them is evolving. The use of recorded voice data signals a shift toward more sophisticated, layered fraud schemes. These are not random attempts. They are structured operations designed to extract maximum value from a single victim.
And once your voice is out there, you cannot take it back.
That is what makes this different.
That is what makes this dangerous.
And that is why awareness is no longer optional.
Discover more from Greg's Corner
Subscribe to get the latest posts sent to your email.


Leave a Reply