All Widgets | From the briefing: The Trusted Voice
Read the Briefing
Red Team Decision Simulator

The Trusted Voice

You are the senior advisor to the Principal Deputy Director of National Intelligence. A foreign adversary is using AI-generated voice clones to impersonate senior officials over phone-based tasking channels. At least three classified personnel rosters have been compromised. You have three decisions to make. None of them are clean.
Containment
Containment Response
Full Ban
Community-wide emergency directive. No phone-based tasking of classified personnel info.
Targeted Restriction
Personnel data requests only. Mandatory callback verification on all tasking calls.
Advisory Only
Enhanced monitoring. No operational change. Analysts remain in the threat environment.
CI Exploitation
Counterintelligence Play
Active Exploitation
Feed fabricated rosters back through the compromised channel.
Passive Collection
Monitor the channel without engaging. Gather intelligence on adversary behavior.
Shut It Down
Sever the channel. Notify all compromised personnel immediately.
Technical Fix
Technical Countermeasure
Cryptographic Voice Auth
Presidential priority. $340M. 9-12 months. Structural fix across all 18 IC elements.
Interim Verbal Codes
Challenge-response authentication. 30-day rollout. Low cost. Compliance uncertain.
Hybrid Approach
Verbal codes now. Phased crypto rollout starting with highest-risk elements.
Risk Profile
Congressional Notification Window 10 days
Notification pressure is low. Your posture does not yet trigger urgent disclosure requirements.
Make all three decisions above to generate your recommendation memo.
Your Recommendation