Cloned Vishing : A case study
Katherine Rackliffe
DEF CON 33 (backfill) · Day 1 · Main Stage
In an era where digital threats evolve at an unprecedented pace, social engineering tactics continue to be a primary vector for cybercriminals. Katherine Rackliffe's DEF CON talk, "Cloned Vishing: A Case Study," delves into a particularly insidious and emerging form of this threat: **cloned vishing**. This presentation, delivered by Rackliffe—a recent cybersecurity graduate from Brigham Young University and an incoming PhD student at the University of Wisconsin Madison specializing in phishing and human-computer interaction—sheds light on the alarming effectiveness of using AI-generated voice clones in targeted attacks.
AI review
A competent undergrad research project that doesn't belong at DEF CON — or at least not in a full talk slot. The study design is solid for an IRB-constrained academic exercise, but the findings are thin, the sample is narrow, and the core result ('AI voice clones are convincing') has been common knowledge in the security community for two-plus years before this was presented.