v1.5 — Updated December 2025

Emotional Deterrence Assessment

🔄 v1.5 Threat Update

This version includes scenarios addressing AI voice cloning, deepfake impersonation, seasonal attack patterns, and platform-specific vectors emerging in 2025.

Welcome to Your Emotional Security Assessment

Social engineers succeed not by exploiting technical vulnerabilities, but by manipulating our natural human emotions and instincts.

This assessment will help you recognize Emotional Indicators of Compromise (EIOCs)—the psychological states that attackers create to bypass your rational defenses.

"Power wears many masks. Urgency is not trust. Pause, then protect."

You'll learn about six critical emotional vulnerabilities and develop practical stewardship skills to protect yourself and your organization.

🎭
6 interactive scenarios testing different emotional vulnerabilities
📊
Self-assessment of your responses to manipulation tactics
🎯
Personalized recommendations based on your profile
💡
Educational insights, not clinical diagnosis
⏱️ Time: 8-12 minutes 🎯 Goal: Build self-awareness and emotional resilience
🎭

Synthetic Familiarity

Technical Mapping: AI-Enhanced Trust Injection
🛡️ "Pause before you mirror."
⚡ 2025 Threat Vector

AI voice cloning now replicates tone, cadence, and verbal habits with seconds of sample audio. Attackers target the colleague who is usually unflappable—hyper-competence, not exhaustion.

📞 Scenario: The Perfectly Calm Colleague

You receive a voice call from "Maya," your famously composed project manager. Her voice is flawless—tone, cadence, even her dry humor. She says:

"I'm in a client meeting and can't access the shared drive. Can you send me the updated contract PDF? Just email it to this address—it's the client's secure portal."

Detection Cues
No background noise (AI-cleaned audio) Perfectly even tone (no stress markers) Slightly outdated jargon New email/portal requested

What's the strongest red flag in this scenario?

How often do you verify identity when someone demonstrates familiarity with you or your work?

Always
Usually
Sometimes
Rarely
Never
EIOC Recognition Prompts
  • Does the emotional tone match the situation?
  • Is the request routed through a new channel?
  • Would this colleague ever ask me to bypass our normal workflow?

Performance Reflex

Technical Mapping: Urgency Trigger Exploit
🛡️ "Urgency is not a credential."
📅 Seasonal Attack Pattern

Tax season scams exploit guilt, urgency, and fear of penalties. Modern variants use correct employer branding scraped from LinkedIn and AI-generated "proof" documents.

📧 Scenario: The Refund Reversal

During tax season, you receive an email from "Payroll Support" saying:

"We accidentally over-refunded your tax adjustment. Please return the excess amount today to avoid IRS penalties."

The email includes a professional PDF with your name, employee ID, and what appears to be your W-2 information.

Detection Cues
Correct employer branding Real tax deadlines referenced AI-generated PDF "proof" Polite, not threatening tone

What makes this scenario particularly dangerous?

How does time pressure affect your decision-making?

Makes me more careful
Doesn't affect me
Sometimes I rush
Often makes me hasty
I always rush
EIOC Recognition Prompts
  • Is this a new or unusual financial workflow?
  • Is the emotional pressure disproportionate to the request?
  • Does the sender route me outside official payroll systems?
💝

Empathic Camouflage

Technical Mapping: Affinity Bias Pretexting
🛡️ "Familiar warmth may conceal cold intent."
📅 Open Enrollment Season

Healthcare coverage scams exploit fear of losing protection and responsibility for dependents. Modern variants use cloned benefits portals and reference real enrollment deadlines.

📱 Scenario: The Coverage Gap

During open enrollment, you receive a text message:

"URGENT: Your dependent coverage is incomplete. Submit your SSN and dependent info to finalize enrollment before the deadline. Failure to complete may result in coverage gaps for your family."

The link leads to a benefits portal that looks almost identical to your company's.

Detection Cues
AI-generated logos (almost right) Cloned benefits portal Real enrollment dates "Helpful" not alarming tone

What's the appropriate response to this message?

How difficult is it for you to pause when family security is invoked?

Very Easy
Easy
Moderate
Difficult
Very Difficult
EIOC Recognition Prompts
  • Is this channel normally used for benefits communication?
  • Is the request asking for information HR already has?
  • Does the emotional tone push me toward immediate action?
👔

Deference Drift

Technical Mapping: Authority Spoof Lever
🛡️ "Stewardship honors questions."
🏢 Industry-Specific Vector

Tech industry attacks exploit professional responsibility and fear of being the bottleneck. Attackers use correct internal jargon and create artificial urgency around security reviews.

💬 Scenario: The Safety Escalation

You receive a Slack DM from someone appearing to be from "Security Engineering":

"We detected anomalous model behavior. Need your API logs ASAP for the safety review. Upload here: [external link]. This is time-sensitive—the safety team is standing by."

The message uses your team's exact terminology and references a real project name.

Detection Cues
Correct internal jargon Authoritative but calm tone External upload destination Responsibility pressure

What's the most appropriate action?

How comfortable are you questioning instructions from security or leadership?

Very Comfortable
Comfortable
Neutral
Uncomfortable
Very Uncomfortable
EIOC Recognition Prompts
  • Is the request consistent with our incident response workflow?
  • Is the emotional tone designed to make me feel responsible?
  • Is the upload destination legitimate?
🎪

Prestige Mirage

Technical Mapping: Status-Based Exploit
🛡️ "Signal is earned, not borrowed."
🤖 AI-Era Vector

Attackers exploit curiosity and FOMO by leveraging AI-generated meeting summaries. File names mimic legitimate productivity tools, and the casual tone bypasses suspicion.

💻 Scenario: The Helpful Summary

You receive a Teams message from a colleague:

"Here's the AI-generated summary of yesterday's leadership meeting. Let me know if anything looks off."

Attachment: MeetingSummary_AutoGen.docx

The message uses correct internal terminology—but you realize this colleague wasn't in that meeting.

Detection Cues
File name mimics AI tools Casual, familiar tone Correct internal terminology Sender mismatch to meeting

What's the strongest indicator this is suspicious?

How often do you verify file sources before opening attachments from colleagues?

Always
Usually
Sometimes
Rarely
Never
EIOC Recognition Prompts
  • Does the sender normally share files this way?
  • Is the emotional hook (curiosity, FOMO) being exploited?
  • Is the file type consistent with our internal tools?
📚

Duty Exploitation

Technical Mapping: Professional Obligation Lever
🛡️ "Care protects through process."
🎓 Education Sector Vector

AI-generated "parent voice" emails exploit teacher empathy and duty of care. Attackers scrape class events from newsletters to build context and bypass parent portal verification.

📧 Scenario: The Worried Parent

A teacher receives an email from a Gmail address:

"I'm worried about my daughter Sarah's behavior lately, especially after that field trip last week. Can you send me her last two assignments and any notes you have? I want to understand what's going on before our conference."

The email references a real class event and uses an emotionally intimate tone.

Detection Cues
AI-generated emotional nuance Real class events referenced Gmail instead of parent portal Requests more than necessary

What's the appropriate response to this emotional appeal?

How difficult is it for you to maintain process when someone appeals to your professional duty?

Very Easy
Easy
Moderate
Difficult
Very Difficult
EIOC Recognition Prompts
  • Is the emotional tone unusually intimate for a first contact?
  • Is the request bypassing official communication channels?
  • Is the sender asking for more data than necessary?

Your Emotional Security Assessment

--
Emotional Security Readiness
"Power wears many masks. Urgency is not trust. Pause, then protect."

Understanding Your Assessment

This assessment measures your awareness of emotional manipulation patterns that social engineers commonly exploit. Your readiness level reflects how well you recognize and respond to these tactics.

Your Personal Development Focus Areas