A guide to protecting your yourself online from a white hat hacker
They don’t hack your computer; they hack your biology. Here is the science behind the scams targeting older adults.
THE COUNTERMEASURE
Dispatch #011
Note to readers: my book featuring white hat hacker Niko Webb is out now on Amazon! Read the first chapter for free on Substack.
Niko Webb protects billionaires, banks, and pharmaceutical companies.
But in the real world, the most targeted demographic isn’t the Fortune 500 CEO. It’s the retiree.
I get asked a lot by readers: “How do I keep my parents safe online?” or “I’m getting older, what should I look out for?”
The answer is surprisingly simple. You don’t need a firewall. You need to understand Social Engineering.
Con artists, whether they are posing as the IRS, a panicked grandson, or “Microsoft Support”, all use the exact same psychological trigger that Hackers use to breach a secure facility.
They use The Urgency Loop.
The Attack Vector
When Niko Webb wants a security guard to open a locked door right now, he doesn’t ask politely. He creates a crisis.
“The server is melting down! If I don’t get in there, we lose everything!”
He is hacking the guard’s biology. When a human hears “Emergency,” the amygdala (the fear center of the brain) takes over. It shuts down the prefrontal cortex (the logic center).
Fight or Flight kicks in. Critical thinking turns off.
Scammers do the exact same thing to older adults:
“Your bank account has been drained! Transfer money NOW to save it!”
“Your grandson is in jail! He needs bail money NOW!”
If you feel your heart racing, you are being hacked.
The Countermeasure: “Stop. Challenge. Verify.”
In the intelligence community, there is a rule: Never trust the incoming signal.
If a call comes to you, you have no idea who is on the other end. Caller ID can be spoofed. Voices can be cloned by AI.
Here is the 3-step protocol I recommend to everyone, whether you are 25 or 85:
1. The “Tactical Pause” (Stop)
If someone on the phone demands you act immediately, hang up. Real emergencies (banks, police, doctors) do not demand immediate crypto-transfers or gift cards over the phone.
The Rule: “If it’s urgent, it’s a lie.” Give yourself 5 minutes for your logic brain to turn back on.
2. The “Call Back” (Challenge)
Never give information to an incoming call.
The Fix: Hang up. Look up the official number for the bank/organization (on the back of your credit card or a paper statement). Call that number.
In Spy Terms: This is called “Out-of-Band Authentication.” You are initiating the secure line.
3. The “Safe Word” (Verify)
This is my favorite tip for families. Pick a weird, random word that only your family knows (e.g., “Purple Flamingo” or “Baseballs”).
The Fix: If someone calls claiming to be your son/daughter/grandchild in trouble, ask: “What is the Safe Word?”
If they can’t say it, hang up. AI voice clones cannot guess a password.
Why This Matters
We often treat older adults like they are helpless victims. They aren’t. They are High-Value Targets. They have assets, good credit, and life savings.
You should treat your personal security with the same seriousness as a bank vault.
In Stone Cold Webb, Niko defeats his enemies not because he is stronger, but because he is calmer. He recognizes when someone is trying to manipulate him, and he refuses to play their game.
Be like Niko. Be suspicious. Be calm. And never let anyone rush you.
The Sign-off
If you found this helpful, forward this email to your parents, your grandparents, or anyone who might need a reminder that “politeness” is a security vulnerability.
Read the first chapter for free of my book on Substack.
Stay dangerous,
Alex Holt


