This concept represents Hargadon's systematic approach to protecting against AI-powered impersonation scams through human-centric verification methods that function even when emotional responses are compromised. Drawing on understanding of evolutionary psychology and brain science, Hargadon developed these protocols in response to the emergence of AI-generated voice cloning and deepfake technology that renders traditional scam detection methods obsolete.
Foundational Principle: From Detection to Verification
Hargadon's framework is built on what he identifies as a fundamental shift in anti-fraud strategy: "we have to move from detection to verification." The traditional approach focused on spotting fake communications through identifying poor grammar, generic greetings, or suspicious signs. However, Hargadon argues that modern AI-powered scams eliminate these detection markers entirely—"The greeting will use your name. The voice will sound exactly like your child. The email will match your boss's communication style across multiple exchanges."
The protocols address what Hargadon describes as the core vulnerability: "Human trust was hacked." He emphasizes that falling victim to these scams "isn't about victims being careless or uninformed" but rather about technology that exploits evolutionary brain mechanisms designed for small tribal living, where trusting familiar voices and faces was essential for survival.
The Four Protocols
The Safe Word Protocol
Hargadon identifies this as "the single most important defense." The protocol involves establishing a secret verification phrase known only to immediate family members, derived from shared memories, inside jokes, or random phrases that family members will remember. The safe word must never appear on social media, never be recorded anywhere, and be impossible for outsiders to guess. When someone calls claiming to be a family member in distress, the recipient asks for the safe word. Inability to provide it confirms the caller is an imposter.
The Callback Protocol
This protocol requires hanging up on suspicious calls and calling back using a verified number, such as the family member's known cell phone or a boss's direct line. Hargadon notes this is challenging because "scammers create enormous time pressure," but emphasizes it is "devastatingly effective" because scammers "can only control the channel they've initiated. They can't intercept your outbound call to a known number."
Out-of-Band Verification
Any request involving money must be confirmed through a separate, independent communication channel. If a boss emails requesting wire transfers, the recipient calls directly rather than replying to the email. If a grandchild calls requesting money, the recipient hangs up and calls the child's parents. Hargadon relates this to the financial community's "four eyes principle"—multiple independent checks on any transaction, with no single person authorizing large payments based solely on one communication.
The Two-Minute Rule
All urgent requests involving money or sensitive information require a two-minute pause before compliance. Hargadon explains that while this timeframe "sounds almost impossibly short," it is sufficient to allow "the prefrontal cortex to come back online" and enable critical thinking that "unravel[s] the scam." He identifies the urgency itself as a warning sign: "If something can't wait two minutes, that itself is a massive red flag."
Neurological Foundation
The protocols are grounded in Hargadon's analysis of how scams exploit evolutionary brain mechanisms. He explains that human brains "evolved over hundreds of thousands of years for small tribal living" and are "fundamentally wired to believe what we hear from people we recognize." When the emotional, fear-driven brain regions are activated, they "flood the body with stress hormones and the rational mind shuts down."
Hargadon emphasizes that scammers deliberately exploit authority bias, protective instincts toward children and grandchildren, and social conditioning to comply with urgent requests. The protocols work by being "automatic" rather than requiring clear thinking under pressure, since "these scams work by hijacking our ability to think clearly."
Implementation and Teaching Approach
Hargadon stresses that when teaching these protocols, "shame is the enemy of protection." He advocates leading with neuroscience explanations to help people understand that vulnerability to scams results from being human rather than being foolish. This approach is particularly important for older adults, who Hargadon identifies as especially vulnerable to grandparent scams due to "less daily communication combined with an enormous emotional desire to help."
The framework emphasizes that "the appropriate emotional response to being scammed is anger at the criminals, not shame at being targeted." This perspective aims to encourage reporting and help-seeking, as Hargadon notes that only one in ten scams is actually reported, often due to victim shame.
Practical Application
Hargadon's approach recognizes the industrial scale of modern AI-powered fraud, noting that one in four spam calls now uses AI-generated voices and reported losses reached $16.6 billion in 2024. The protocols are designed to work against increasingly sophisticated attacks that can clone voices from three-second audio clips and create real-time deepfake video calls convincing enough to fool financial professionals.
The framework concludes with what Hargadon calls a "30-Minute Protection Protocol"—the time needed to establish a family safe word and share the verification methods with others. This reflects his emphasis on immediate, actionable steps that can provide protection against what he describes as "the fastest-growing form of fraud in history."