Description: A Chicago-area Vietnam War veteran, Richard Lyons, reportedly lost $10,000 to a cryptocurrency scam that used purported AI voice cloning and fake social media profiles to impersonate Elon Musk. The fraudster allegedly convinced Lyons to invest in bogus cryptocurrency opportunities using fake voice memos, images, and spoofed caller IDs showing "Elon Musk." The scam reportedly involved dozens of messages and deepfake audio files that reinforced the impersonation.
Entities
View all entitiesAlleged: Unknown deepfake technology developers and Unknown voice cloning technology developers developed an AI system deployed by Unknown scammer impersonating Elon Musk and Unknown scammers, which harmed Richard Lyons and Cryptocurrency investors.
Alleged implicated AI systems: Unknown deepfake technology and Unknown voice cloning technology
Incident Stats
Risk Subdomain
A further 23 subdomains create an accessible and understandable classification of hazards and harms associated with AI
4.3. Fraud, scams, and targeted manipulation
Risk Domain
The Domain Taxonomy of AI Risks classifies risks into seven AI risk domains: (1) Discrimination & toxicity, (2) Privacy & security, (3) Misinformation, (4) Malicious actors & misuse, (5) Human-computer interaction, (6) Socioeconomic & environmental harms, and (7) AI system safety, failures & limitations.
- Malicious Actors & Misuse
Entity
Which, if any, entity is presented as the main cause of the risk
Human
Timing
The stage in the AI lifecycle at which the risk is presented as occurring
Post-deployment
Intent
Whether the risk is presented as occurring as an expected or unexpected outcome from pursuing a goal
Intentional
Incident Reports
Reports Timeline
Loading...
CHICAGO (WLS) -- The ABC7 I-Team is uncovering how criminals are using famous faces to lure in victims. Scammers are impersonating celebrities, convincing people to invest in fake cryptocurrency opportunities.
One victim lost $10,000 to a p…
Variants
A "variant" is an AI incident similar to a known case—it has the same causes, harms, and AI system. Instead of listing it separately, we group it under the first reported incident. Unlike other incidents, variants do not need to have been reported outside the AIID. Learn more from the research paper.
Seen something similar?
Similar Incidents
Did our AI mess up? Flag the unrelated incidents
Loading...

Hackers Break Apple Face ID
· 24 reports
Loading...

2010 Market Flash Crash
· 30 reports
Similar Incidents
Did our AI mess up? Flag the unrelated incidents
Loading...

Hackers Break Apple Face ID
· 24 reports
Loading...

2010 Market Flash Crash
· 30 reports