⚠️ This is a simulation for educational purposes. No real AI is used.

🚶 Complete Awareness Walkthrough

A multi-step journey through real-world AI threat scenarios

Interactive Scenario Walkthrough

This walkthrough guides you through four common situations where you might encounter AI-generated threats or need to work with AI security tools. Each step presents choices, reflection prompts, and AI partner explanations to build your awareness.

Step 1 of 4

1

Email Inspection

Analyzing a suspicious message

🤔 Reflection Prompt

Before making a decision, pause and think:

  • What elements of this email create urgency or pressure?
  • What would happen if this were legitimate and you ignored it?
  • What would happen if this were a scam and you clicked the link?
  • How could you verify this independently?

What do you do?

Click the Link

It looks urgent and I don't want my account frozen

Ignore It

Probably spam, I'll just delete it

Verify Independently

Log into PayPal directly to check for alerts

Check AI Analysis

See what AI security tools say about this

2

Social Media Analysis

Evaluating a suspicious post

LinkedIn Message

From: Sarah Chen • Recruiter at TechCorp Solutions

Profile shows: 12 connections • Joined 3 days ago • No profile picture


Hi there!

I came across your profile and was very impressed with your background in cybersecurity. We have an urgent opening for a Senior Security Analyst position at our company that I think you'd be perfect for.

The role offers $180,000+ salary, full remote work, and immediate start. Due to the urgent nature of this position, we need to move quickly.

Can you click this link to submit your resume and schedule an interview today? The position will close by end of week!

[External Link: careers-techcorp.info]

🤔 Reflection Prompt

Consider these questions:

  • What seems unusual about this recruiter's profile?
  • What tactics is this message using to encourage quick action?
  • How would a legitimate recruiter typically approach you?
  • What could you verify before responding?

How do you respond?

Click the Link

Good opportunity, I should act fast

Reply with Resume

Send resume directly in LinkedIn message

Research Company

Look up TechCorp Solutions independently first

Report as Suspicious

Too many red flags, report to LinkedIn

3

Website Verification

Assessing a login page

Website Assessment

You received an email about a package delivery issue. Clicking the tracking link brought you to this page:

URL: https://usps-trackng-portal.com/delivery


USPS Package Tracking

Your package requires address confirmation for delivery.

Please log in with your USPS account to confirm delivery details:

Note: USPS will never email you asking for login credentials. Visit usps.com directly for tracking.

🤔 Reflection Prompt

Examine this page carefully:

  • What do you notice about the URL?
  • Is it normal for delivery services to require login for tracking?
  • What would happen if you entered your credentials here?
  • How could you track your package safely?

What's your action?

Enter Login Info

I need my package, better confirm

Check URL Carefully

Something seems wrong with the web address

Close & Visit USPS.com

Go directly to official USPS website

Run URL Through AI Check

Use security tools to analyze this site

4

Deepfake Verification

Evaluating suspicious video content

Video Call Scenario

You receive a video call from someone claiming to be your company's CFO. The video quality is good but there's no audio. They type in the chat:

👤

Michael Roberts - CFO

Video: ON • Audio: MUTED

Chat:

Michael Roberts: Sorry, my audio isn't working. Emergency situation - need you to process urgent wire transfer of $45,000 to new vendor. Board approved this morning. I'm in airport heading to Singapore. Can you initiate transfer to account I'll send? Time sensitive - client waiting.

🤔 Reflection Prompt

This requires careful thought:

  • What seems unusual about this communication method?
  • Why might someone avoid using audio?
  • What verification steps should exist for financial transfers?
  • How could you confirm this is really your CFO?

How do you proceed?

Process Transfer

CFO needs it urgently, better help

Request Audio Verification

Ask them to fix audio before proceeding

Verify Separately

Call CFO's known number to confirm

Follow Transfer Protocol

Require standard authorization process

🎉 Walkthrough Complete!

You've experienced the complete AI Awareness cycle across four different threat scenarios.

What You've Learned:

  • Recognize: Identified AI-generated threats in emails, social media, websites, and video
  • Reflect: Practiced critical thinking about urgency, context, and verification
  • Reveal: Saw how AI analysis breaks down threat indicators systematically
  • Respond: Made decisions about trusting or overriding AI recommendations

Key Takeaways:

  • Always verify urgent requests through independent, trusted channels
  • AI can help identify threats, but you bring critical context AI lacks
  • Multiple indicators together reveal attacks more reliably than single signs
  • Following established protocols protects you even when pressure is high
  • When something feels wrong, trust that instinct and investigate

You're now better equipped to recognize AI-powered threats and work effectively with AI defensive tools!

Practice Trust Calibration →