Families Encouraged to Establish Covert Communication System

**Cyber Security Experts Urge Families to Develop Secret Codes Amid Rise of AI Impersonation Threats**
Cardiff News Online Article Image

Cardiff Latest News
As the digital landscape continues to evolve at breakneck speed, leading cyber security voices are now advising members of the public to adopt an old-fashioned but deeply effective technique—secret codes shared only among trusted friends and family. This comes as artificial intelligence opens new doors for criminals seeking to impersonate loved ones and trick people into handing over personal information or money.

Traffic Updates
Modern technology increasingly allows criminals to mimic not only written communication but also voices and faces, making it possible to generate highly convincing deepfakes. Cody Barrow, chief executive at EclecticIQ and a cyber security specialist who formerly advised the US government, has spoken out about these growing dangers. In a recent interview, he noted that AI has significantly simplified the process for scammers, reducing both the cost and technical skills required to commit cybercrimes.

Barrow highlighted how the spread of artificial intelligence is far more serious than a mere technological fad. “It’s not just hype,” he said, emphasising the real-world impacts currently being observed. He revealed that he and his wife have already established their own secret code—a unique phrase known only to them. Should either of them receive a suspicious call or video message, even if it convincingly appears to come from the other, they can quickly confirm the person’s identity by requesting the code.

The case for such caution has never been stronger, experts argue, given the surge in data breaches across recent years. Millions of individuals have now had their personal information compromised at some point: login credentials, contact details, and even biometric samples are easily traded on the dark web, leaving people exposed to increasingly sophisticated scams.

Particular concern has been voiced for groups who may lack high levels of digital literacy, such as older adults and children. Barrow recommended that families involve their more vulnerable members in discussions around security and encourage them to adopt secret passwords. “It might sound extreme today, but I am convinced that in the near future we’ll all accept this as standard practice,” he observed, pointing out that neither the very young nor the elderly are immune to these evolving threats.

In the past, cyber criminals often relied on poorly secured email accounts to gain their first foothold. Once compromised, they could steal contact lists and craft believable messages, posing as trusted friends or relatives. With AI, however, they are now able to create videos or phone calls that perfectly imitate a familiar face or voice—raising the stakes dramatically.

Recent high-profile cyber attacks against British retailers, including Marks & Spencer and the Co-op, have only sharpened these concerns. The breach at M&S, for instance, was reportedly facilitated by social engineering—a technique in which hackers manipulate individuals into giving up confidential information, often by pretending to be a legitimate colleague or authority figure.

Barrow noted that, in this example, the attackers managed to exploit “human error” by leveraging their fluency in English to convincingly trick employees. He also warned that even widely used security procedures such as two-factor authentication could be exploited, especially as people become accustomed to routine prompts and may not stop to question an unusual request.

“Many people have become desensitised to standard security checks such as entering an authenticator code on their phones,” Barrow explained. This habitual behaviour makes it all too easy for a well-prepared scammer to orchestrate a plausible request and gain access.

As these threats proliferate, cyber security leaders are urging everyone to move beyond simply trusting technology. By establishing secret codes within families and among close friends, individuals can maintain an essential line of defence, even as the tools available to criminals grow ever more sophisticated. This shift in strategy may soon become a standard part of digital life, providing peace of mind in a world where what you see—and hear—can no longer automatically be believed.