AI and Elder Abuse

by | Jul 23, 2025 | AI, Cyberbullying, Elder Abuse, Uncategorized | 0 comments

The news is full of AI (Artificial Intelligence) stories. How will it empower us in our jobs? Whose job will it take next? Is it creating actual fake news? 

While there’s a lot of “we’ll see” in the answers to these questions, one immediate and quite pressing issue is how AI is contributing to Elder Abuse. Elder abuse is an action(s) in any relationship where there is an expectation of trust that causes harm or distress to an older person.

American elders were conned out of more than three $3 billion dollars in 2023 in a range of financial crimes, according to the FBI data. AI can make these scammers seem more believable partially because these programs help with content creation and cleaning up human error that might otherwise warn us we’re being served up something fraudulent.

Already, there are so many scams via email, websites, phone calls, advertisements, and offers of romance that there’s plenty to worry about. But does the emergence of AI in everyday life and writing supercharge these efforts to relieve the older amongst us of their carefully husbanded and/or limited resources?

Already, individuals are reaching through our computers and phones to lighten our wallets and bank accounts. There are websites that look like our bank sites, phishing emails that look like they’re from someone or from an institution that we know and trust, ads galore that tempt the reader with promised services, goods, or fortunes.

Already, we give away so much of our privacy in return for the freedom to browse the web and to use other online services. We also regularly share our private information, favorite colors, cars, dates and faces on publicly available social media. But now, there are tools in the guise of fun apps that offer to clean up our photos, or ones to let us have our own voices sing our favorite songs perfectly, our own tin ears notwithstanding.

I see ads every day inviting me to seamlessly insert my voice instead of the original voice – say Sting’s or Sinatra’s, into a popular song. Like karaoke on steroids that we can save and play for or send to others. It’s likely to be fun, but then your voice is being stored in records you have no control over. Thousands of people’s voices are thereby being harvested and stored by some company you don’t know, that has a privacy policy that most of us never read through, and which can be used by these unknown persons in any which way. 

Even if the company offering these services is completely on the up and up, they are a prime target to be hacked by those who would love to use these stored audio clips to clone your voice into realistic but invented audio sent to you via email, or even a phone call?

So what happens when you hear from a beloved grandchild – in their own voices – that they are suffering, or need help out of a jam? And what if you, as a parent, grandparent, or even just a friend, hears from another trusted friend or loved one that they have “such a deal?”

Why, for the cost of nothing at all, you can use chat GPT right now to create a picture of you standing next to the President or your favorite rock star. Some generative AI tools can even create  a video of the two of you singing 70’s rock anthems together.

But nearly as easily, a bad actor could create a picture or audio of your child or friend, needing bail, stuck without airfare far away, injured, in a foreign prison cell, or in the hands of dangerous thugs, begging for your help. 

As technology advances in leaps and bounds, human nature stays much the same. There’s always somebody out to take advantage of the system ,and of you, while we remain always sympathetic to those we care about. The game hasn’t changed – just the tools of the game, and the ease with which the unscrupulous can run their scams on a wider swath of folks. And the tools are ever more easily and cheaply accessible. 

So, what to do?

There are simple steps to make it harder for unscrupulous folks to take advantage. First of all, educate yourself and your elder relations and loved ones about the risks. There’s no need to get paranoid about it – just to take some practical steps.

  • DO enable two-factor authentication (2FA) , one of the most important, but simple security practices. 
  • DON’T share passwords. (There are a few exceptions for the elderly or ill.)
  • DON’T use dictionary words or favorite colors, cars, kids, or teams as your passwords.
  • If passwords are hard to remember, DO use password managers, such as NordPass, Dashlane, 1Password, or Last Pass.
  • DON’T give away your voice to be recorded by those you don’t know, no matter how much fun it looks like.
  • DON’T click on links in emails or texts, especially from financial institutions. Rather, use your browser and type in the website of the institution. Most offer apps for direct access that are generally safe.
  • DO look for odd misspellings or extra words in email addresses and domains. Website domains don’t have typos. For instance Welsfargo.com is not Wellsfargo.com (it’s missing an “l.”). Applepayments.com is not Apple.com/payments.
  • DON’T open attachments to emails or texts if you’re not sure or don’t know who the sender is.

Modern tech and the Internet make so many things available for us and in many cases, easier for us. While there are always bad actors, and while AI tool

s make it easier for those bad actors to fool us, some sensible practices make it more difficult for those bad actors to fleece us of our hard-earned resources

Checking up on our elders and educating them about some of these simple steps can make them and you safer, help you both sleep at night, and even bring you a little bit closer, and after all, what could be better than that?

Related Posts

Email spoofing, scamming, and hacking

Email spoofing, scamming, and hacking, Copyright 2024 by Steve Burgess Email domain spoofing scams With fortunes, privacy, and identity fraud at stake, we have had a number of cases involving phishing and spoofing in the past few years and into the present where...

AT&T Data Breach and Hack: What Does it Mean to Me?

AT&T Data Breach and Hack: What Does it Mean to Me? copyright 2024, Steven Burgess It was ginormous. It included almost all wireless customers from 2022. Did you have an AT&T phone or other account in 2022? You’re one of 110 million (gasp). You be hacked, my...

Somebody deleted stuff off my phone (I swear it wasn’t me!). Can I get it back?

- Copyright Steve Burgess 2024 Your phone is suddenly losing text, videos, photos. What’s happening? Are they gone forever? Have I been hacked? How do I avoid this in the future? What’s happening? Of course, it’s hard to tell without some history of the phone’s use,...

CSI Cases from Burgess Forensics #69 A Case of Hiphop Beef

The Stories are true; the names and places have been changed to protect the potentially guilty. It was almost closing time on Friday and my thoughts were turning to Barbequeing some of that mouth-watering Santa Maria tri-tip while my nose was turned to the scent of...

Email as a signed contract vs. fraudulent emails

Email as a signed contract vs. fraudulent emails We all send and receive email, but did you know that what you say in an email can be interpreted as a legal contract? And that sometimes, emails are fraudulent? Both are true. The Statute of Frauds Although email didn’t...

El Salvador Adopts BitCoin

El Salvador Adopts BitCoin copyright Steve Burgess, 2021 El Salvador just passed a law to make BitCoin (BTC) legal tender and is the first country to do so. It did something similar back in 2001, when it made the US Dollar the official currency, replacing the...

Keeping Your Bitcoin Safe

BitCoin. Everybody wants some. But what’s the best way to keep it safe once you’ve got it? And how to get it? First things first – you get BitCoin (and Etherium, and DogeCoin) from a cryptocurrency exchange, like you would from a “regular” currency exchange to turn...

Cyberbullying and Covid-19: 2021 Update

California defines a cyberbully as anyone who sends any online communication to deliberately frighten, embarrass, harass, or otherwise target another. The Cyberbullying Research Center defines it as “willful and repeated harm inflicted through the use of computers,...

Cybersecurity & Covid-19: Vulnerability and What to Do About It

Cybersecurity & Covid-19: Vulnerability and What to Do About It Steve Burgess, 2020 As if we didn’t have enough to worry about. With so many of us working from home (close to 90% of American corporations are encouraging or requiring employees to do so) and having...

Cyberbullying and Covid-19

Cyberbullying and Covid-19 We’ve all made fun of people sitting across the table from each other, looking at their phones and tablets instead of at the person right in front of them. Sometimes we talk to each other across the table though our phones! My wife and I...

Pin It on Pinterest

Share This