Digital SHTF: How to Protect Yourself from Scammers, Hackers, and AI-Driven Cons
Prepare For Digital Attacks
I got an email this morning that almost got me. It looked completely professional. A marketing agency claimed they wanted to help me make more money from my content. They even made a custom video showing improvements to my channel and how much I could earn. For a split second, I was mildly intrigued.
But then I stopped myself. I have rules that has saved me countless times. NEVER CLICK ON ANY LINK YOU DON'T KNOW WHO IT'S FROM. QUADRUPLE VERIFY. I was also reminded of how my friendโs bank account and phone was recently wiped clean from these predators.
These are not just scammers. These are cyber vultures, soulless thieves who steal more than money. They rob people of security, dignity, and peace of mind. Their attacks have pushed some victims so far that they have taken their own lives, devastated by the destruction these criminals leave behind.
These are not just thieves. They are wolves in the digital wilderness, and their goal is to drain you dry financially, emotionally, and spiritually.
I donโt click on links that companies send me. As a content creator, I regularly get emails from companies that want to communicate solely through email. A month of back-and-forth might sound extreme, but some scammers play the long game. Theyโll email you for weeks, slowly building trust. Just so they can take everything from you.
This doesnโt apply only to content creators. The same tactics are used in all kinds of situations, from online dating to fake business opportunities, charity scams, and more. Stay cautious and take your time verifying who youโre dealing with.
Iโll be sharing my SHTF Digital Plan later in this article.
In a world where many of us prepare for natural disasters, power grid failures, or supply chain breakdowns, we often overlook a threat that's already here: digital SHTF. Scammers, cybercriminals, and AI-powered con artists are targeting people daily, and their tactics are more sophisticated than ever. It's time to fortify our digital defenses with the same mindset we use for physical preparedness.
The threat landscape has evolved dramatically. Gone are the days of obvious Nigerian prince emails with broken English. Today's criminals use artificial intelligence, social engineering, advanced tools and psychological manipulation that would make even seasoned preppers take notice. They're not just after your money. They want your identity, your access to accounts, and sometimes they want to destroy your digital life entirely.
But here's what really annoyed me about that email this morning. It wasn't just targeting me.
They're Coming for Your Community Too
After I made a post warning about scams, something unexpected happened that revealed another layer of this threat. A YouTube subscriber reached out to tell me that someone had contacted him pretending to be me. This imposter asked if he wanted to pay for my membership or support services. Thankfully, the subscriber was smart enough to verify with me directly, and I confirmed it was completely fake.
Let me be clear. I have never reached out to anyone individually asking for money, memberships, or support, and I never will. I may make posts about how you can support the channel through memberships, handmade goods, or other offerings, but I will never contact you one-on-one asking for money.
I have also informed you that scammers can and will replicate a content creatorโs icon, profile picture, or name to make it look almost identical to the real account. The differences can be so subtle that you may not notice at first glance.
As a subscriber or audience member and or social media user, here is how you can safeguard yourself. Always double-check the username or handle carefully. Look for small changes like added periods, extra letters, or strange characters. Be wary of anyone who reaches out to you privately asking for money or personal information. If you are ever unsure, contact that claimed source directly through official ways. Some of those ways I will share with you soon.
These criminals are smart, patient, and ruthless. But together, we can stay one step ahead.
This shows how scammers don't just target you directly. They study your online presence, your followers, your community, and then impersonate you to scam people who trust you. These criminals can damage your reputation while stealing from people who genuinely want to support your work.
But the sophistication doesn't stop there. Let me tell you what's really happening out there.
The New Breed of Digital Predators
They Sound Like Your Loved Ones
Scammers aren't just sending emails. Many use AI tools to clone voices including the voices of people you know. There have been verified reports of criminals using AI-generated versions of a loved one's voice to call and demand ransom money. In these cases, the "kidnapped" person was perfectly safe. Thank God the person was perfectly safe. The voice was fake, but convincing enough to cause panic and financial loss.
These AI voices can mimic regional accents, speech patterns, and emotional tones with frightening accuracy. Combined with personal details scraped from social media platforms, your name, your kids' names, where you work, what you post about, it sounds shockingly real. The voice seems natural, friendly, or distressed, whatever it takes to lower your guard and bypass your critical thinking.
A recent case involved a mother who received a call from what sounded exactly like her daughter, crying and claiming she'd been in a car accident and needed bail money immediately. The voice was so convincing that the mother was reaching for her credit card before she thought to hang up and call her daughter directly. The daughter was safe at work, completely unaware of the scam attempt. I am glad the daughter answered. What if she didnโt? The mother may have proceeded if the scammer called her back in an even more panicked voice because they know how to shake emotions.
They Appear to Be Calling from Your Bank
My friend learned this the hard way. He received a call that appeared to come from his business bank's customer service line. The caller had some very convincing details, and knew his business name. They claimed there was suspicious activity and needed to verify his login credentials to secure his account.
My friend saw that $4,000 was just stolen out of his bank account so he was very willing to give all the information that they asked for after he looked up the number to โconfirmโ it was his bank. Only after providing his information did he realize he'd been scammed again. The criminals cleaned out his business account within hours and had a lot of his very sensitive information. They wiped his phone clean and more!
But it doesnโt stop there. These criminals don't just pretend to be banks.
They Impersonate Law Enforcement and Government Agencies
Phone scams have evolved beyond simple cold calls. Criminals now use caller ID spoofing to make their calls appear to come from legitimate institutions like your bank, the IRS, police departments, and even fire stations. The technology to fake these numbers is surprisingly accessible and effective.
Recently, my wife got a call that shook up her emotions. The caller claimed to be from the county sheriff's office, saying she had failed to appear for jury duty and there was now a warrant for her arrest. The voice was authoritative, professional, and the caller ID showed what appeared to be the actual local police department number.
My wife, caught off guard and slightly panicked, began to let her emotions steer the conversation for a very short period of time. The caller said she could pay a fine immediately to resolve the warrant and avoid arrest. He had official sounding procedures, case numbers, and even knew some of her personal information.
But then something triggered her gut instinct. When she said she was going to drive to the police department to handle this in person, the caller's tone changed dramatically. He became aggressive, insisting that if she went to the station, they would arrest her on site. That's when she hung up.
She immediately called the police department using a number she found independently online and verified through THREE separate sources, which actually did match the number that had appeared on her caller ID. But here's the terrifying part: even matching numbers can be misleading because of how easy it is to spoof caller ID.
The real police department confirmed there was no warrant, no missed jury duty, and no case with her name on it. It was completely fabricated. The sheriff said that man has been conning people for years and they havenโt been able to catch him.
Why These Attacks Work So Well
The psychology behind these scams is what makes them so dangerous. Modern scammers understand human nature better than ever. They exploit our natural tendencies to trust familiar voices, respond to urgency, and want to help others. When someone who sounds like your family member calls in distress, your protective instincts override your skepticism.
When an authority figure threatens legal consequences, our fight or flight response kicks in, making us more likely to comply without thinking critically. When a professional looking email references our actual work and interests, we want to believe it's a legitimate opportunity.
The voice sounds human because it was built with cutting edge AI that understands emotion and pacing. The message feels personal, referencing real details about you and your life. The sense of urgency, a family emergency, legal threat, or amazing opportunity pressures you to act fast without thinking it through.
They spend considerable time gathering intelligence about their targets. They mine social media profiles, public records, data breaches, and even your digital footprint from various online services. This reconnaissance allows them to craft attacks that feel impossibly personal and legitimate.
Your Digital Defense Strategy
The good news is that you can protect yourself, but it requires the same kind of methodical preparation you'd use for any other emergency.
Immediate Protection Measures
Set family code words: Just like you might have a rally point for a physical emergency, establish a code word that only you and trusted family members know. If someone calls claiming to be a loved one in distress, ask for the code word. This simple step can prevent devastating financial losses from voice cloning scams.
Verify through independent channels: Never trust a single point of contact. If your "bank" calls about suspicious activity, hang up and call the number on your card or statement. If someone claims to be a family member in trouble, contact them directly through their usual number or ask another family member to check on them. If law enforcement contacts you about legal issues, hang up and call the department directly using a number you find yourself.
Check for account impersonation: Regularly search for your name, business name, or brand online to look for fake accounts or websites. Set up Google alerts for your name to catch impersonation attempts early.
Educate your network: If you have followers, subscribers, or customers, tell them how you actually communicate. Let them know you never ask for payments through direct messages, that you always use specific email addresses, or whatever your actual communication practices are.
Limit personal information online: Review your social media presence and remove posts that give away your location, kids' names, daily routines, or other personal details scammers could exploit. Consider making your profiles private and being selective about who you accept as connections.
Use privacy settings on everything: Most platforms have privacy settings that limit who can see your posts, contact you, or find you in searches. Use them. Make it harder for criminals to gather information about you.
Be cautious with public WiFi: Avoid accessing sensitive accounts or entering personal information when connected to public WiFi networks. These connections can be monitored or even controlled by criminals.
Technical Safeguards
Use multi-factor authentication everywhere: Protect your email, bank, and social media accounts with MFA (multi factor authentication) so even if a hacker gets your password, they can't easily break in. This is one of the most effective defenses against account takeovers.
Keep software updated: Many attacks exploit known vulnerabilities in outdated software. Enable automatic updates for your operating system, browsers, and applications. Those security patches exist for a reason.
Use reputable security software: Use trusted antivirus and anti-malware programs that include real-time scanning and web protection. Many modern security suites can detect and block malicious websites before they load.
Use a password manager: Generate unique, complex passwords for every account and store them securely. If one account gets compromised, your other accounts remain protected.
Enable account notifications: Turn on alerts for login attempts, password changes, and other account activity. Many services can text or email you when someone accesses your account from a new device or location.
Use different email addresses: Consider using separate email addresses for different purposes like banking, shopping, social media, and newsletters. This limits the damage if one email gets compromised.
Keep personal documents secure: Store digital copies of important documents like IDs, insurance papers, and financial records in encrypted cloud storage or offline encrypted drives. Don't leave them in easily accessible folders.
Behavioral Defenses
Never click links in emails: This is a hard rule I follow religiously. If someone wants to share information with me, I ask them to paste it directly in the body of the email. No exceptions. If they claim they can't do that or insist I must click their link, that's a red flag.
Make scammers work harder: Some scammers are patient and will play a long game, but many want to move on to easier targets. By asking questions, requesting verification, and making them jump through hoops, you'll often find they stop communicating entirely. Legitimate businesses don't mind proving their authenticity. I often report scammers' emails. It may not do much but makes me feel better about taking that step.
Embrace healthy skepticism: Be wary of unsolicited contact, especially anything involving urgency, money, or personal information. Legitimate organizations don't pressure you for immediate action or threaten consequences for taking time to verify their identity.
Know the red flags: Watch for spelling errors, generic greetings, mismatched email addresses, and pressure tactics. Be especially cautious of links in emails, even from seemingly trusted sources.
Practice the pause: When faced with urgent requests, force yourself to slow down. Take a breath, step away from the situation, and verify through independent means before taking any action.
Trust your instincts: If something feels off, it probably is. Don't ignore that gut feeling just because someone sounds professional or has some of your personal information.
Verify unexpected winnings or opportunities: If you receive notice that you've won something you didn't enter, or get an amazing business opportunity from someone you don't know, it's almost certainly a scam. Verify through several sources before moving forward.
Be wary of romance scams: Online dating and social media connections can be used for long term scams. Be extremely cautious about anyone who quickly professes love, has limited photos, refuses video calls, or eventually asks for money or personal information. Remember AI has made it easy for people to speak to you now and soon they will be able to create an avatar that can speak to you and look very believable. SO INVASIVE!!!
If You've Been Targeted
Recovery and Response
Disconnect immediately: If you click a malicious link or realize you're being scammed, disconnect from the internet immediately to prevent further damage.
Run comprehensive scans: Use your security software to perform full system scans, checking for malware, keyloggers, or other malicious programs.
Change credentials systematically: Start with critical accounts like banking and email, then work through your other accounts. Don't forget to update any stored payment methods or automatic billing arrangements. Get new cards. Also call your bank and other sources to help.
Monitor your accounts: Watch for unauthorized transactions, new accounts opened in your name, or other signs of identity theft. Consider freezing your credit reports to prevent new accounts from being opened.
Report and warn others: Contact your financial institutions, report the incident to relevant authorities, and warn your friends and family about the specific tactics used. Your experience could prevent others from falling victim.
Check for identity theft: Look for unexpected bills, credit inquiries, or accounts you didn't open. Monitor your credit reports from all three major bureaus regularly.
Document everything: Keep records of all communications with scammers, financial institutions, and authorities. This documentation can be crucial for recovering losses or prosecuting criminals.
Consider professional help: For serious breaches involving identity theft or significant financial loss, consider hiring a professional service that specializes in identity restoration and fraud recovery.
Building Long-Term Resilience
Maintain offline backups: Store copies of important documents, photos, and files in multiple locations, including offline storage that can't be accessed by ransomware or hackers.
Develop a response plan: Just as you might have an evacuation plan for natural disasters, create a step by step response plan for digital emergencies. Include contact numbers for your banks, a list of critical accounts to secure, and trusted people who can help you verify suspicious communications.
Stay educated: Scam tactics evolve constantly. Follow reputable cybersecurity resources, pay attention to warnings from your bank or other institutions, and stay informed about new threats targeting people in your situation.
The Bottom Line
Digital preparedness isn't just about having the right software. It's about developing the right mindset. In the same way physical preparedness requires vigilance, planning, and the right supplies, digital security requires ongoing attention, good habits, and the right tools.
The criminals attacking us online are sophisticated, well funded, and constantly evolving their tactics. They're betting that our natural human tendencies toward trust and helpfulness will override our caution. Don't let them win.
Your digital life is worth protecting with the same intensity you'd use to protect your physical safety and property. The threats are real, they're happening now, and they're only getting more sophisticated. But with the right knowledge, tools, and mindset, you can build robust defenses that will serve you well in our increasingly connected world.
Remember: the strongest defense is a prepared mind. Stay vigilant, stay skeptical, and never hesitate to verify before you trust. Your future self will thank you for the extra caution you take today.
That email I got this morning? I deleted it without clicking anything. Because I know better. And after reading this, I hope you do too. Please share to help people stay protected. I have been conned one too many times to let it happen again.
Important Disclaimer
I am not a cybersecurity expert or professional. The information in this article is based on research, personal experience, and widely available security guidance. Every situation is different, and you should do your own research and consider consulting with cybersecurity professionals for your specific needs. Technology and scam tactics change rapidly, so stay informed through multiple trusted sources.
Want more no nonsense survival and prepper advice? Follow me for more informative resources:
Substack: Subscribe to my weekly newsletter and podcasts at Jason Salyer On Ready for great content and early warnings about emerging threats.
YouTube: Head over to for detailed tutorials, gear reviews, and situation analysis you will not find anywhere else.
Patreon: Support my mission to spread real preparedness knowledge and get access to my private community, exclusive guides, and monthly Q&A sessions.
Remember, in a world of sheep, be the well prepared wolf. Your family, friends, and or community are counting on you.
This article is part of our "Uncomfortable Truths" series, where we tackle the aspects of prepping that others are too afraid to discuss.
P.S. Forward this newsletter to someone who needs to hear it. The prepping and survival community is filled with fantasies - let's spread some reality instead.
Check Out My Recommended Gear & Supplies
Explore the gear and supplies I personally use and trust. When you purchase through my Amazon storefront and other affiliates, I earn a small commission at no extra cost to you. These small commissions help support the creation of informative, free content for you to enjoy.
Sign up for emails to get bug in and bug out information, practical prepping, survival tips, gear reviews and uncomfortable moments that lead to growth.
ยฉ 2025 goon3.com | The Reality Check Newsletter