Scammers Want to Steal Your Voice

By Greg Collier

In the Upper Peninsula of Michigan, a recent incident highlighted a scam that is as calculated as it is dangerous. According to a press release from the Michigan State Police, scammers are increasingly targeting older adults using impersonation, intimidation, and a tactic that should concern anyone with a phone or computer: recorded voice data.

This is not just another phishing attempt. This is something more deliberate, more invasive, and potentially more damaging.

A Script Built on Fear

The scam begins the way many do, with urgency and authority.

An elderly woman was contacted by someone claiming her computer had been hacked. The caller positioned themselves as a figure of authority, creating a sense of panic that demanded immediate action. The goal was simple: overwhelm the victim before they had time to think.

From there, the scam escalated.

The victim was instructed to “verify her identity” by recording herself stating her full name, address, and Social Security number. This wasn’t just data collection. This was harvesting something far more valuable.

Her voice.

Why Scammers Want Your Voice

At first glance, asking someone to record personal information may seem redundant. After all, scammers could just write it down. But the real objective isn’t just the information. It’s how that information is captured.

A recorded voice sample opens the door to several high-risk scenarios:

Voice authentication fraud:
Many banks, financial institutions, and government systems now use voice recognition as a security layer. A clean recording of someone stating identifying details can be used to bypass those protections, especially when combined with stolen personal data.

Deepfake voice cloning:
With even a short audio sample, scammers can use AI tools to create a synthetic version of a person’s voice. That cloned voice can then be used to call family members, banks, or employers, making fraudulent requests sound legitimate.

Social engineering amplification:
A victim’s own voice can be repurposed in scams targeting others. Imagine a grandparent hearing what sounds like their child or grandchild asking for help. That is no longer hypothetical. It is already happening.

Account takeover and impersonation:
Recorded statements that include names, addresses, and Social Security numbers can be stitched together to pass identity verification checks or support fraudulent claims in customer service interactions.

In short, scammers are no longer just stealing your information. They are trying to become you.

The Second Phase: Financial Extraction

Once the scammers had what they wanted, they moved to the next stage.

The victim was instructed to withdraw money from her bank. The threat was explicit: comply, or face arrest. To reinforce the illusion, the scammer claimed that a federal agent would come to her home to collect the money.

This is a classic pressure tactic. Introduce authority. Add urgency. Remove time for doubt.

But in this case, something interrupted the script.

The Break in the Chain

When the woman arrived at her bank, staff recognized the situation for what it was. They intervened and warned her that this was likely a scam.

Instead of proceeding, she contacted law enforcement and visited her local MSP post. Because of that decision, she did not lose any money.

That outcome is the exception, not the rule.

What Police Want You to Understand

The Michigan State Police made one point clear: legitimate government agencies do not operate this way.

They do not:

  • Call you out of the blue demanding personal information
  • Ask you to record sensitive details
  • Threaten arrest over the phone
  • Send agents to collect money from your home

If law enforcement needs to speak with you, it happens in person, through official and verifiable channels.

Anything else should be treated as a red flag.

Recognizing the Pattern

This scam works because it follows a predictable formula:

It starts with fear.
It builds with authority.
It escalates with urgency.
It ends with compliance.

And now, it includes voice harvesting as a new layer of exploitation.

The addition of recorded audio marks a shift. Scammers are adapting to new technologies, and they are doing it quickly. What used to be simple identity theft is becoming something closer to full identity replication.

What to Do If You Encounter This

If you receive a similar call, the correct response is simple, even if it feels difficult in the moment.

Stop the conversation.

Do not provide any information. Do not record anything. Do not follow instructions involving money.

Then take action:

  • Contact your bank or credit union immediately if you shared any details
  • Change your passwords, especially for financial and email accounts
  • Reach out to local law enforcement for guidance

The sooner you break contact, the less damage can be done.

The Bigger Picture

Scams like this persist because they exploit something universal: fear of authority and fear of consequences.

But the technology behind them is evolving. The use of recorded voice data signals a shift toward more sophisticated, layered fraud schemes. These are not random attempts. They are structured operations designed to extract maximum value from a single victim.

And once your voice is out there, you cannot take it back.

That is what makes this different.

That is what makes this dangerous.

And that is why awareness is no longer optional.


Discover more from Greg's Corner

Subscribe to get the latest posts sent to your email.