Lesson 4.2

Text and Phone Scenarios

10 minutes

Smishing (SMS Phishing)

Text messages are increasingly popular for scams because:

  • They feel more personal and urgent than email
  • People check texts immediately
  • Links on mobile are harder to inspect
  • Small screens make it harder to notice suspicious details

Scenario 1: Bank Fraud Alert Text

Text from 33749
[Bank of America] Unusual activity detected on your account. If you did not authorize a $892.43 transaction, call 1-888-555-0147 immediately to protect your account.

PUSHED Analysis

H - High-stakes (potential fraud) U - Urgency ("immediately")

The Trap

If you call that number, you’ll reach scammers pretending to be bank support. They’ll ask for:

  • Your card number “to verify your account”
  • Your PIN or security code “to cancel the transaction”
  • Your SSN “for identity verification”

Correct Action

Do NOT call the number in the text.

Instead:

  1. Call the number on the back of your Bank of America card
  2. Or log in to the official Bank of America app
  3. Check if there’s actually unusual activity

Scenario 2: The “Hi Mom” Scam

Text from +1 (555) 234-8901
Hi mom, I dropped my phone in water and this is my new number. Can you text me back? I need help with something urgent.

PUSHED Analysis

D - Desperation (needs help) U - Urgency ("urgent") S - Surprise (unexpected contact)

The Trap

Once you respond, they’ll claim:

  • They’re stranded somewhere
  • They need money for rent, a bill, or bail
  • They can only receive money via Zelle, Venmo, or gift cards
  • They don’t want you to call their “old number” or tell other family

Correct Action

Do NOT respond to the unknown number.

Instead:

  1. Call or text your actual child at their known number
  2. Contact another family member who might know where they are
  3. If you can’t reach them, try their workplace or school

Vishing (Voice Phishing)

Phone scams are especially dangerous because:

  • Real-time pressure is harder to resist
  • AI can clone voices convincingly
  • Caller ID can be completely spoofed
  • There’s no written record to review

Scenario 3: Tech Support Call

Your phone rings. Caller ID shows “Microsoft Support.”

“Hello, this is John from Microsoft Technical Support. Our system detected that your computer is sending error reports and may be infected with malware. We can help you fix this right now if you give us remote access.”

PUSHED Analysis

P - Pressure (Microsoft authority) H - High-stakes (malware infection) U - Urgency ("right now")

Key Facts

  • Microsoft does NOT call people about computer problems
  • Caller ID can be spoofed to show any name
  • Granting remote access gives scammers full control of your computer

Correct Action

Hang up immediately.

Microsoft, Apple, Google, and your ISP will never cold-call you about technical problems. If you’re concerned about your computer, contact support by going to the company’s official website yourself.


Scenario 4: Government Threat Call

You receive a voicemail:

“This is Officer Williams from the IRS Criminal Investigation Division. There is a warrant for your arrest due to unpaid taxes. To avoid arrest, you must call back immediately at 1-800-555-0193 and settle your account today.”

PUSHED Analysis

P - Pressure (government authority) H - High-stakes (arrest warrant) U - Urgency ("immediately," "today")

Key Facts

  • The IRS does NOT call about warrants or demand immediate payment
  • The IRS initiates contact by mail, not phone
  • Law enforcement doesn’t accept gift cards as payment
  • Real warrants involve actual court processes

Correct Action

Do NOT call back. Delete the voicemail.

If you’re genuinely concerned about your tax status, go to irs.gov or call the IRS directly at their official number: 1-800-829-1040.


AI Voice Cloning: The New Threat

A growing concern: attackers using AI to clone voices.

AI Voice Cloning Reality:

  • As little as 3 seconds of audio can create a convincing voice clone
  • Clips from voicemails, videos, or social media are enough
  • Cloned voices can say anything the attacker wants
  • Real-time voice changing during calls is now possible

The “Kidnapping” Scam

Scammers call parents claiming their child has been kidnapped. Using a voice clone, they play audio of the “child” crying or asking for help.

The reality: Your child is fine — they’re at school, work, or with friends. The scammers are counting on panic overriding verification.

Protection Against Voice Cloning

  1. Establish a family code word — something only you would know
  2. Call back on a known number — even if the voice sounds real
  3. Ask questions only the real person would know
  4. Trust the verification process, not the voice

Video Deepfakes

In 2024, criminals used AI-generated deepfake video in a video call to steal $25 million from a company. The finance employee thought they were speaking with the CFO and other executives — all were AI-generated fakes.

Key Protection

For any high-stakes request made during video calls:

  • Verify through a separate channel before acting
  • Ask questions that weren’t in the script
  • Be suspicious of calls where you can’t interact naturally
  • Confirm in person or via trusted messaging channels

The Universal Rule for Phone Scams

If someone calls you, hang up and call back on a number YOU find.

Look up the organization's phone number independently — from your card, their official website, or a trusted source. Never use a number the caller provides.

Key Takeaways

  1. Never call numbers from suspicious text messages
  2. Verify “family emergency” texts by calling the family member directly
  3. Tech companies and the government don’t cold-call about problems
  4. AI can clone voices — verify even if it sounds like someone you know
  5. For phone scams: hang up and call back on a number you find yourself
  6. Trust the verification process, not the voice or caller ID