Family 'Are You Really You?' Protocol: Stop Impersonation Scams & Verify Urgent Digital Requests
Learn the 'Are You Really You?' protocol to protect your family from urgent digital impersonation scams. A practical guide to verifying requests & boosting online safety.

In our increasingly connected world, digital communication has become the norm, yet it also presents new vulnerabilities. Impersonation scams are a growing threat, with criminals exploiting trust and urgency to defraud individuals and families. Establishing a robust family impersonation scam protocol is no longer a luxury but a necessity to protect your loved ones from urgent digital requests that could lead to significant financial loss or emotional distress. This guide provides a practical, actionable framework for your family to verify identities and prevent fraud.
What is the ‘Are You Really You?’ Protocol?
The ‘Are You Really You?’ Protocol is a simple yet powerful system designed to confirm the identity of a family member making an urgent or unusual request via digital channels. Itβs a pre-agreed, memorable phrase, question, or verification method that only your trusted family members know. This protocol acts as a crucial ‘stop and verify’ step before anyone acts on a suspicious message, call, or email.
“A key aspect of effective fraud prevention is creating a ‘friction point’ β a moment where individuals pause and question the legitimacy of a request,” explains a cybersecurity expert. “The ‘Are You Really You?’ Protocol provides that essential friction, empowering families to challenge suspicious communications safely.”
This system helps guard against common tactics used by scammers, such as: * Urgency: “I need money now for an emergency!” * Secrecy: “Don’t tell anyone about this, it’s a surprise/secret.” * Threats: “If you don’t do this, there will be serious consequences.” * Emotional manipulation: Playing on love, fear, or helpfulness.
Why Your Family Needs This Protocol: The Threat of Impersonation Scams
Impersonation scams are pervasive and increasingly sophisticated, leveraging technology to mimic legitimate communications. Fraud prevention agencies globally report that millions of individuals fall victim to impersonation scams each year, with estimated financial losses reaching billions of pounds collectively. For instance, a 2023 report by a leading consumer protection agency highlighted a 25% increase in financial losses from ‘friend or family’ impersonation scams compared to the previous year.
These scams target individuals of all ages but often disproportionately affect older adults, who may be less familiar with digital threats or more susceptible to emotional manipulation. However, younger family members are also targets, especially through social media or messaging apps where accounts can be easily compromised.
Key Takeaway: Impersonation scams are a significant and growing threat, preying on trust and urgency. A family protocol provides a vital defence mechanism, allowing individuals to verify urgent requests before acting, thereby preventing financial loss and emotional harm.
Common Impersonation Scam Tactics:
- “Grandparent Scams”: A scammer pretends to be a grandchild in distress, needing money for bail, medical bills, or travel. They typically demand secrecy and immediate action.
- “Hi Mum/Dad” Scams (or “WhatsApp Scams”): The scammer claims to be a child who has lost their phone and is messaging from a new number, asking for money to pay an urgent bill or replace the phone.
- Email Impersonation: A fraudster sends an email seemingly from a family member, often with a slightly altered email address, requesting a money transfer or sensitive information.
- Social Media Account Takeovers: If a family member’s social media account is hacked, scammers can use it to message their connections with urgent pleas for help or money.
Building Your Family’s ‘Are You Really You?’ Protocol
Creating your family’s unique identity verification family strategy is a collaborative effort. It should be simple, memorable, and understood by everyone.
Steps to Establish Your Protocol:
- Gather Your Family: Hold a family meeting β in person or via video call β to discuss the rising threat of impersonation scams. Explain why this protocol is necessary, emphasising that it’s a collective defence for everyone’s safety.
- Choose Your Secret Phrase/Question: This is the core of your protocol. It should be:
- Unique: Not easily guessable from public information (e.g., avoid pet names, birthdays).
- Memorable: Easy for all family members to recall, even under stress.
- Simple: A short phrase, a specific answer to a question, or even a shared inside joke.
- Examples: “What was the name of Gran’s first cat?” (Answer: “Whiskers”), “What’s our family’s holiday catchphrase?” (Answer: “Adventure Awaits!”), or a specific, pre-agreed code word.
- Define the Activation Rule: When should the protocol be used?
- Any urgent request for money or personal details.
- Any request to keep a situation secret.
- Any message from an unfamiliar number claiming to be a family member.
- Any request that feels ‘off’ or out of character.
- “It’s vital to establish clear triggers for using the protocol,” notes a family safety specialist. “This removes ambiguity and ensures consistency in verification.”
- Agree on the Verification Method: How will you ask the question, and how will the real family member respond?
- Call Back: The safest method. If you receive an urgent text or email, do not reply to that message. Instead, call the family member’s known and saved phone number. If they answer, ask the protocol question. If they don’t answer, leave a message and wait.
- Alternative Channel: If a phone call isn’t possible, agree on an alternative, secure channel. This could be a specific, pre-arranged messaging app (e.g., one with end-to-end encryption) or email address different from the one the suspicious request came from. Use this alternative channel to ask the protocol question.
- Practise and Review: Periodically review the protocol. Practise role-playing scenarios to ensure everyone understands. Remind family members, particularly older ones, about the protocol during family gatherings or regular check-ins. Consider changing the phrase periodically, especially if it feels like it might have been compromised.
Age-Specific Guidance for Implementing the Protocol
Effective online identity verification for families requires tailoring the approach to different age groups.
For Younger Children (Under 12):
- Focus on ‘Ask a Trusted Adult’: Teach children that if they receive any strange messages claiming to be from family members, they should immediately show it to a parent or trusted adult.
- No Sharing Personal Information: Emphasise that they should never give out personal details or respond to requests for money, even if it seems to be from a family member.
- Parental Controls: Utilise parental control software on devices to monitor communications and block suspicious contacts. [INTERNAL: Guide to setting up parental controls]
For Teenagers and Young Adults (13-25):
- Direct Engagement: Involve them in choosing the protocol phrase. They are often targets of social media and messaging app scams.
- Critical Thinking: Encourage critical thinking about digital requests. “Does this sound like Mum/Dad? Is this how they usually communicate about money?”
- Multi-Factor Authentication (MFA): Stress the importance of MFA on all their social media, email, and messaging accounts to prevent account takeovers.
- Report and Block: Teach them how to report suspicious messages and block contacts on various platforms.
For Older Adults and Grandparents:
- Simplify the Protocol: Keep the secret phrase very simple and easy to remember. Write it down in a secure, private place if necessary.
- Reinforce Call-Back Rule: Strongly emphasise that the only way to verify an urgent digital request is to call the known, saved phone number of the family member, never to reply directly to the suspicious message.
- Regular Reminders: Gently remind them about the protocol frequently. Offer to help them set up their phone contacts correctly.
- Emotional Preparedness: Discuss the emotional tactics scammers use. Reassure them that it’s okay to question requests and that they will not be letting anyone down by verifying.
Recognising Common Impersonation Scams
Beyond the protocol, understanding the red flags of scam attempts is crucial for preventing family fraud.
- Unusual Communication Method: If a family member usually calls but suddenly texts with an urgent request, be suspicious.
- Grammar and Spelling Errors: Scammers often make mistakes that a real family member might not.
- Pressure to Act Quickly: Any demand for immediate action without time to think or verify is a major red flag.
- Requests for Unusual Payment Methods: Scammers often ask for gift cards, cryptocurrency, or money transfers via services that are hard to trace. Real family members rarely request these for emergencies.
- Secrecy Demands: “Don’t tell anyone about this,” or “It’s a surprise,” are tactics to isolate the victim and prevent verification.
- Emotional Manipulation: Scammers often invoke strong emotions like fear, love, or guilt to bypass rational thought.
By combining a proactive verification strategy like the ‘Are You Really You?’ protocol with a general awareness of scam tactics, your family can create a strong defence against digital impersonation attempts.
What to Do Next
- Schedule a Family Meeting: Gather your immediate and extended family to discuss the ‘Are You Really You?’ protocol and collectively agree on your secret phrase and verification method.
- Document and Share: Create a simple, written version of your protocol (e.g., “If you get an urgent message asking for money, call [family member’s name] on their known number and ask: [Your Secret Phrase]?”). Distribute it to all family members.
- Practise Regularly: Conduct occasional, unannounced ‘drills’ within the family (e.g., a parent sending a fake urgent text) to ensure everyone remembers and correctly applies the protocol.
- Secure Devices: Ensure all family members use strong, unique passwords and enable multi-factor authentication on all critical online accounts (email, social media, messaging apps). [INTERNAL: Ultimate guide to strong passwords and MFA]
Sources and Further Reading
- National Cyber Security Centre (NCSC) β www.ncsc.gov.uk
- Action Fraud (UK’s national reporting centre for fraud and cyber crime) β www.actionfraud.police.uk
- Interpol (International Criminal Police Organization) β www.interpol.int
- UNICEF (United Nations Children’s Fund) β www.unicef.org
- Consumer Protection Agencies (refer to your national or regional agency)