CyberSmarts for Seniors: A Detailed Guide on AI Romance Scams

CyberSmarts for Seniors: A Detailed Guide on AI Romance Scams

Technology has made it easier than ever to meet new people and build meaningful connections online; but it has also given dishonest people powerful new tools to take advantage of kind, trusting individuals. This guide will walk you through exactly how these scams work, what warning signs to watch for, and simple steps you can take to protect yourself and your finances. Knowledge is your strongest defence, and by the end of this guide, you will feel confident and prepared.

(A quick guide with the key points from this resource can also be downloaded as a PDF so you can read it anytime, even if you are offline. Click here to download your copy.)

SECTION 1: What Are AI Romance Scams?

You may have heard the term "Artificial Intelligence" in the news lately, and it is now playing a significant role in online scams that can be surprisingly difficult to detect. Today's scammers are not the obvious, clumsy fraudsters of the past. They use sophisticated technology to create fake identities that look, sound, and feel completely real. Understanding how these tools work is the first step toward recognizing them before any harm is done.

Romance scams are not new, but they have become much more dangerous due to Artificial Intelligence (AI). In the past, scammers were often easy to spot because they used obviously stolen photos, had poor grammar, or told stories that did not make sense. AI has changed everything.

1. The Threat of AI-Generated People

AI technology can create entirely fake people who seem real.

  • AI-Generated Faces: AI can create faces that look completely real, but the person with that exact face does not exist anywhere in the world. This technology can create unlimited faces of any age, ethnicity, or style, and scammers can even create a whole "photo album" of the same fake person by aging the faces or changing hairstyles.

  • Creating Entire Fake Lives: The AI creates more than just photos; it generates entire fake lives:

    • Detailed employment histories that match job sites like LinkedIn.

    • Family stories with specific details about children, parents, and pets.

    • Hobbies and interests that perfectly complement yours.

    • A social media presence across multiple platforms.

2. Voice and Video Manipulation

This is what makes the new scams so concerning: the ability to manipulate real-time communication.

  • Voice Cloning: Scammers can change their voice in real-time during phone calls. For example, a man can sound like a woman with a local accent. They can also copy someone else's voice if they have just a few minutes of recording.

  • Deepfakes: These are videos where someone appears to be saying something they never actually said. They can now create what looks like a live video call. If you ask to see them on camera, they might show you a pre-recorded fake video that responds with generic answers.

3. Personalized Communication

AI can write messages that sound caring and genuine.

  • If you mention you love gardening, the fake person will suddenly also love gardening and have detailed stories about prize-winning roses.

  • If you are a widow, they will claim to understand your loss because they are also recently widowed.

SECTION 2: The Romance Scammer Playbook (Scam Tactics)

Scammers are not acting randomly; they follow a careful, calculated script designed to build your trust before they ever ask for anything. Knowing the stages of this script ahead of time puts you in the driver's seat, because a tactic that is named and recognized loses much of its power. The following breakdown will help you see the warning signs at each stage of the relationship, often long before a scammer reveals their true intentions.

Scammers follow a systematic, three-phase playbook.

Phase 1: The Approach (Finding You)

Scammers find you on dating sites (like Match or eHarmony), but also on Facebook, Instagram, or even games like Words with Friends or online Scrabble.

  • Profile Selection: They often use photos of attractive people in uniforms—military personnel, doctors, engineers, or pilots. These professions suggest trustworthiness, success, and provide an excuse for why they cannot meet immediately. They may claim to be widowed or divorced to create an emotional connection.

  • First Contact: They mention specific details from your profile to appear genuinely interested, often complimenting your smile or eyes. They may claim you remind them of someone special from their past.

  • Red Flag: Scammers often respond immediately at all hours, whereas real people usually take time to respond.

Phase 2: Building the Relationship (Love-Bombing)

This phase is dangerous because the scammer systematically plays with your emotions.

  • Intense Communication: They send daily good morning messages and "How was your day?" check-ins, sharing fake personal stories.

  • Emotional Manipulation: They express love unusually quickly—sometimes within days or weeks. They make you feel special, chosen, and understood.

  • Information Gathering: They are studying you to find vulnerabilities and assets. They ask about:

    • Your family (who would miss money?).

    • Your living situation (do you own your home?).

    • Your retirement plans (do you have significant savings?).

  • Avoiding Detection: They always have excuses for not meeting in person. Common excuses include:

    • "I'm deployed overseas" (military).

    • "I'm caring for my sick mother in another province".

    • "My work requires constant travel".

    • Being in the middle of a messy divorce.

Phase 3: The Financial Request (The Goal)

The ultimate goal of romance scammers is to get money from you, and they will create urgency around money to do so. The software they use costs thousands of dollars, meaning they are targeting people with significant assets like retirement savings or home equity.

  • Emergency Scenarios: They request money for sudden emergencies:

    • Medical bills for themselves or a family member.

    • Legal trouble requiring immediate bail or lawyer fees.

    • Travel problems (stuck somewhere and need money to get home).

    • Military personnel claiming they need money to take leave.

  • Investment Opportunities: They may suggest "get rich quick" schemes, cryptocurrency opportunities, or ask you to "help me move money out of the country, we'll split the profits".

  • Escalation Pattern: They start small (maybe $200 for an emergency). Once you send the first amount, they know you will send more, and the amounts gradually increase (e.g., $500, $1,000, $5,000).

SECTION 3: Red Flags and Protection Strategies

Even the most sophisticated scam will leave clues if you know where to look, and the good news is that most of the tools for spotting them are simple and free.

Your instincts matter enormously here. That quiet sense that something feels "a little off" is worth paying attention to. The strategies below require no special technical skills and can be used by anyone with a phone or computer.

Your instincts are your best protection. If something feels off, investigate further.

Communication Red Flags

  • Too Romantic Too Fast: They express feelings like "soulmates" or being in love very quickly.

  • Too Impressive: They claim to have highly specialized jobs like "neurosurgeon working with Doctors Without Borders".

  • Convenient Excuses: They use excuses for limited communication, such as claiming the internet is limited where they are.

  • Story Inconsistencies: Details about their life that change over time.

  • Pressure Tactics: They create urgency around sending money or sharing information.

  • Unusual Phrasing: Non-native expressions or overly formal language.

  • Time Zone Confusion: They are online at impossible hours for their claimed location.

Technical Red Flags

  • Photo Analysis: They have too few photos, the photos are overly professional in quality, or there are no candid shots.

  • Video Call Issues: They always have a poor connection, strange pauses, or limited movement.

  • Social Media Presence: They have limited posts or no interaction with friends or family.

Protection Strategy: Reverse Image Search

This is a protective strategy everyone can use right now. It takes about 30 seconds and can save thousands of dollars.

  1. Open Google Images on your phone or computer.

  2. Click the camera icon in the search bar.

  3. Upload the photo from the scammer's profile.

  4. See if it appears elsewhere with different names.

If the photo appears with different names on stock photo sites or on other dating profiles, it is a significant red flag.

Identity Verification Techniques

Ask them to prove their identity in ways that AI cannot easily fake:

  • Photo Verification: Ask them to take a photo holding a sign with your name and today's date. Scammers will make excuses or disappear.

  • Voice Verification: Ask unexpected questions about their claimed local area (e.g., weather, specific neighbourhoods) during phone calls.

  • Story Verification: Ask detailed follow-up questions about their claimed profession, military service, or family. Real people have consistent, detailed knowledge.

SECTION 4: Financial and Family Protection Rules

When emotions are involved, even careful people can find themselves making decisions they would not normally make. Scammers count on exactly that. Setting firm financial boundaries in advance, before any situation feels urgent, is one of the most effective ways to stay protected. Sharing these guidelines with a trusted family member or friend adds an extra layer of security, because an outside perspective can catch things that are harder to see from the inside.

Financial Protection Rules (Absolute Rules - No Exceptions)

  1. NEVER send money to someone you have never met in person. Real love does not require immediate financial help from someone you have never met.

  2. NEVER share financial information (bank accounts, credit cards, SIN numbers).

  3. NEVER provide access to your computer or accounts.

  4. NEVER invest in opportunities they suggest.

  5. NEVER accept packages or money transfers on their behalf.

Family Protection Strategy

Talk to family or friends about any new online relationships. They can provide an objective perspective when your emotions are involved.

Questions you can discuss with a trusted family member:

  • Have you met this person in person?

  • What do you know about their background that you can verify?

  • Have they asked for money or personal information?

  • How long have you been communicating?

SECTION 5: What to Do If You're Targeted

First and most importantly, know this: being targeted by one of these scams says nothing negative about your intelligence or your character. Scammers are professional criminals who have refined their methods over years, and they specifically seek out warm, generous people. If you suspect something is wrong, the steps below will help you act quickly to protect yourself. Your experience, once reported, may also prevent the very same thing from happening to someone else.

Immediate Response Plan

If you suspect a scam:

  1. Stop all communication immediately—do not warn them you are suspicious.

  2. Do not send any more money or information.

  3. Save all evidence—screenshots, emails, phone records, and photos.

  4. Change your passwords for email, social media, and banking.

  5. Check your credit report for unauthorized activity.

Reporting Process

Reporting is crucial because it helps police track these criminals and protect future victims.

  • Canadian Anti-Fraud Centre: 1-888-495-8501.

  • Local Police: File a report even if no money was lost.

  • Your Bank: Contact them immediately if you have sent money.

  • Dating Platforms: Report fake profiles to help protect others.

Emotional Recovery

If you have been targeted, remember that being targeted does not reflect poor judgment. These scammers study human psychology and use sophisticated technology.

  • You may experience feelings of foolishness or embarrassment (which you shouldn't, as these are professionals).

  • Seek support through family, friends, senior support groups, or counselling services through community health centers.

To secure your online presence, please complete the following steps:

  1. Check your social media privacy settings.

  2. Review what personal information is publicly visible.

  3. If you have dating profiles, audit the information you are sharing.

  4. Practice reverse image searching with photos from your own accounts.

Final Reminder: Trust your instincts, verify what you can, and never let anyone pressure you into financial decisions.

.

Return to the CyberSmarts for Seniors Introduction:

CyberSmarts for Seniors: Practical Lessons to Build Digital Confidence and Safety

.


.

This resource is part of the CyberSmarts for Seniors Project, funded in part by the Government of Canada’s
New Horizons for Seniors Program and ELNOS, and delivered in Elliot Lake by Raknas Inc. and
Golden Voices, the seniors-focused division of the DiversityCanada Foundation.


.

Download PDF

How to download  a quick guide with the key points of this article as a PDF:

—Click the File Name below (in blue).

— If your device is set up to download automatically, the file you just clicked will be saved where your downloaded items can be found (usually in your Downloads folder or Desktop).

—If your device is not set up to download automatically, a dialogue box should pop up.

Click Save.

—According to your device settings, the file may now be saved where your downloaded items can be found (usually in your Downloads folder or Desktop).

—Alternatively, your device may show you a window, and you will have the chance to choose a location where you want to save the file. Choose a place that's easy to find, like Downloads, Documents, or Desktop.

The PDF will be downloaded to your device.

—You can now open it anytime in the future, even without an Internet connection.

Files