Ditch the Pitch
You can file a complaint and submit applications for licensing online. Filings you do not wish to make or that are not available online can be submitted via mail for processing. Department staff is available to assist with any questions at (800) 922-1594 (toll free in SC) or 803-734-4200 8:30 a.m. until 5 p.m. Monday through Friday, excluding State holidays. You can also email general questions to scdca@scconsumer.gov.
Artificial Intelligence (AI) can be a helpful tool that helps analyze, process and organize large amounts of data. Legitimate businesses can use AI to streamline complicated tasks. Unfortunately, scammers can use the same tools to trick you into giving over your money or personal information.
Artificial Intelligence is simply the ability of a computer system to learn, reason and act like a human. Common uses of AI include:
Voice Assistants that allow you to ask your phone or device to perform a task.
Writing tools that can help you clean up documents you’ve already written or write new ones from the information you give it.
Transcription software used to take conversations or meetings and write them out into text.
Photo and Video programs that use AI to edit images/video or use prompts to create something new altogether.
Search Engines sort through large amounts of information on the internet and find the result that you may be looking for.
Scammers can use software to create videos that can be rather convincing. Their schemes often involve videos that appear to feature celebrities that you will recognize. They pick these famous faces so you are more likely to watch the video and believe what they are telling you. These videos will often promote a fake investment opportunity involving cryptocurrency. Scammers may also use these types of programs to create fake personas for romance scams.
Here are some clues that may help you spot a fake video.
Many of the same rules apply to AI Generated Images. Scammers use the programs to craft social media profiles for romance scams, create images that can be used in extortion attempts and may fabricate some type of emergency to use for charity or crowd funding scams.
These clues may help identity photos made with AI:
Computer programs can easily fake someone’s voice. In some cases, scammers can use a recording of just a few seconds of audio to recreate a voice that sounds like someone you know.
Grandparent / Family Emergency Scams
A common example of voice cloning is grandparent or family emergency scams. You may receive a call from someone pretending to be a family member. The person on the phone will say that they are in trouble. They may claim to need bail money, medical treatment or be involved in some other type of emergency. There may be multiple scammers on the phone pretending to be different people involved with the situation.
Take these steps to help avoid falling for these scams:
Impersonation Scams
Scammers often use AI audio programs to carry out impersonation scams. They may pretend to be a business, government employee, a celebrity or tech support for a service you use. The scammer will often start with a call or message about suspicious or unauthorized activity on an account. They may claim your money is at risk and depositing it into a cryptocurrency ATM is the only way to protect it.
These tips can help you from becoming a victim:
Scammers can use artificial intelligence and chat programs to help them write believable content for fake websites. These services can help them build legitimate looking online stores that often feature chat bots that respond to your messages and prompt you for financial or personal information.
Practice these cyber safety tips to protect your information and money:
Bad grammar and strange word selection used to help tip off that a scammer may be behind the message. Scammers have discovered that AI can help them make write emails, text messages and social media messages that are more convincing. They often ask you to confirm, verify, or update your personal information or logins.
Recognize the signs of phishing and remember to follow these guidelines: