SHAKEN Protocol Will Stop Scammers from Exploiting a Caller ID Loophole

Total Page:16

File Type:pdf, Size:1020Kb

SHAKEN Protocol Will Stop Scammers from Exploiting a Caller ID Loophole How to Shut Down Robocallers The STIR/ SHAKEN protocol will stop scammers from exploiting By JIM a caller ID McEACHERN & ERIC loophole BURGER ave you ever received a phone call from your own number? If so, you’ve expe- rienced one of the favorite techniques of phone scammers. • Scammers can “spoof” numbers, making it seem as though the phone call in question is com- ing from a local number—which can include your own—thereby obscuring the call’s true origin. If you answer the call, you’ll most likely be treated to the sound of a robotic voice trying to trick you into parting with some money. • One of us (McEachern) is a principal technologist for the standards organization Alliance for Telecommunications Industry Solutions (ATIS), and the other (Burger) was until recently the chief technology officer for the U.S. Federal Communications Commission. But you don’t need us to tell you that robocalls are a pandemic. According to a report by the caller ID company Hiya, there were 85 billion robo- calls globally in 2018. → H46 | DEC 2019 | SPECTRUM.IEEE.ORG PHOTOGRAPH BY Dan Saelinger GUTTER CREDIT GOES HERE GOES CREDIT GUTTER PHOTOGRAPH BY Firstname Lastname SPECTRUM.IEEE.ORG | DEC 2019 | 47 Call for Directions CENTURY AT&T LINK LONG DISTANCE CALLING A FRIEND isn’t as simple as transmitting data from point A to point AT&T VERIZON B. Along the way, the call is routed through telephone infrastructure that may be operated by two, three, or more phone companies, or carriers. These routes are part of the reason it’s so time NODE consuming to identify the points where scammers CALLER’S VERIZON INTELIQUENT RECEIVER’S place their calls. PHONE LONG DISTANCE PHONE RoboKiller, one company that has cre- Today, when you make a call, your If it all works out, robocalls could ated an anti-spam-call app, estimates phone company, or carrier, knows become as manageable as email spam. that Americans received 5.3 billion robo- whether or not you’re spoofing your num- You’ll be less likely to be tricked into calls in April 2019 alone, or nearly 4,000 ber to make it appear that the call is com- answering a scam call, and you’ll receive every second. And not only are scam calls ing from a different number. But what the far fewer in the first place. annoying, they’re costly. In 2018, phone company doesn’t know is if you’re allowed scams tricked Americans out of an esti- to spoof that number, nor does it have a Spoofing numberS iSn’t new—it’s mated US $429 million. Sadly, these num- way to securely send that information to been possible for half a century. Tele- bers are on an upward trend. the carrier delivering the call to the person phone switching equipment known as Spoofing phone numbers is just one you’re calling (there are legitimate reasons private branch exchanges (PBXs), which way phone scammers trick their victims. why callers might spoof their numbers; many businesses use, preassign the num- Scammers are also very good at reading more on that in a moment). ber that will be displayed on the recipi- people, gaining their confidence, and The upshot is that when you see the ent’s phone when it receives a call from playing to their fears. But spoofing num- number of an incoming call, you have the business. There are legitimate rea- bers is an often-effective opening gam- no way of knowing if the number dis- sons for businesses to spoof numbers. bit. The first thing a spoofer has to do is played on your caller ID is legitimate or For example, they may want to display get someone to pick up the phone in the spoofed. STIR/SHAKEN will give phone a toll-free number for calls from the mar- first place, and people are more likely companies a secure method of commu- keting, sales, or service departments. to answer a call if they think it’s from a nicating a caller’s number to a recipient Women’s shelters are another example local number. So, preventing the abuse of when a call is placed. This capability is of the need to disguise numbers, as they call spoofing, along with making it much vital to establishing the caller’s reputation often replace the shelter’s actual number harder for anyone to place huge numbers so that scammers and other bad actors with a national number to avoid tipping of robocalls, are two of the most impor- can be reliably identified and blocked off a domestic abuser. tant challenges to reining in robocallers before you waste any time on the bogus The problem is not spoofing itself. The and scammers. call. And should an illegitimate robo- problem is that in the last decade or so, The telecommunications industry has call still get through, STIR/SHAKEN sim- three things have changed to create the been developing a network-based system plifies the process of tracing a call back mess we see today. that would meet both of these challenges. to its source. Hopefully, simpler trac- First, phone calls are a lot cheaper. In It goes by an unwieldy name: “Secure Tele- ing will make it feasible for law enforce- many countries nowadays, unlimited phone Identity Revisited/Signature-based ment agencies to prosecute scammers nationwide calling is standard in basic Handling of Asserted information using for illegal robocalling. The technology phone plans. Second, the Internet has toKENs.” Let’s just call it STIR/SHAKEN, will also securely provide information to reduced the costs of running a scam to which is a lot easier to remember. STIR/ call-blocking apps, allowing the apps to almost nothing. The PBX of choice for SHAKEN is a technique for providing more more accurately identify spam calls and fraudsters is an Internet-enabled I P-PBX reliable call-display information by clos- inform you with a notice such as “Spam to further lower the price per call. With ing a loophole that scammers exploit in likely” or “Unverified number” before the Internet, scammers don’t even telephony infrastructure. you answer a call. have to be in the same country to place 48 | DEC 2019 | SPECTRUM.IEEE.ORG ILLUSTRATION BY Mark Montgomery robocalls, and they can use live agents the phone companies on each end of tocol’s flexibility made it easy for each in countries with low-cost labor. Third, a phone call. phone company to implement it in its anyone can place hundreds of calls per The Internet Engineering Task Force network. However, as a general rule, the minute with the small investment of an (IETF), which works on issues related to more flexible a protocol is, the more inexpensive PC, a hundred-dollar Voice secure telephone identity, began work likely it is that different implementations over Internet Protocol (VoIP) expansion on STIR in 2013. The IETF designed the won’t play well together. So when two card, free open-source software, and a STIR protocol to be very flexible. The different service providers implement few days of assembly. basic mechanism is a certificate issued the protocol on each of their networks, Put it all together and you have the rec- to authenticated callers. However, STIR a caller ID sent from one to the other ipe for a potentially lucrative business requires individuals to be proactive about might not make it through intact. The with very low risk. These scammers are authenticating themselves and managing task force’s goal was to create a precisely fundamentally playing a numbers game: their personal key, which confirms their defined subset (known as a profile) of While most people won’t answer their identity. STIR’s downside is that very few STIR, called SHAKEN. Because the task calls, a small percentage will, and some of people have the expertise to do either. The force specified the SHAKEN profile of the those people can be conned into sending good news is that STIR’s flexibility allows STIR protocol, you might see it referred money or revealing their bank account phone companies to implement it in their to as “STIR/SHAKEN.” information. Robocall scams are so cheap network with minimal hassle. SHAKEN starts with the information that even one success among hundreds In 2015, ATIS also began studying that the originating phone company— or thousands of calls can still make scam- mechanisms to reduce unwanted robo- the carrier—knows about the call. For mers money. The Internet can cheaply calls. A joint task force between ATIS example, mobile phones and residen- connect a U.S.-based IP-PBX making hun- and the SIP Forum, an industry associa- tial landlines transmit their phone num- dreds of calls per minute with call agents tion, built upon the IETF’s work on STIR. bers whenever they originate a call. For in another country to talk to any victims As it turned out, STIR’s extreme flex- businesses, where legitimate spoofing is who fall for the spoofed call. Meanwhile, ibility was a problem. Indeed, the pro- commonplace, the carrier also assigns the carrier has no way of know- to the call a unique key, called ing that this is an illegal robocall an “orig-id,” or origination identi- operation until unsuspecting vic- fier, in order to identify the busi- tims complain. Only after receiv- ness placing the call. In all cases, ing complaints is the carrier aware the carrier creates a digital sig- that it should trace back the calls nature using the available infor- and identify the illegal caller. mation and transmits it with the Before STIR/SHAKEN, individual call.
Recommended publications
  • Vermont Robocall Spoofing Survey
    WHO’S REALLY ON THE LINE? AN AARP VERMONT SURVEY OF ADULTS 18+ ABOUT ROBOCALLS AND SPOOFING May 2019 AARP.ORG/RESEARCH | © 2019 AARP ALL RIGHTS RESERVED DOI: https://doi.org/10.26419/res.00298.004 AARP RESEARCH Table of Contents Introduction 3 Key Findings 4 Devices Owned and Caller ID 6 Experiences with Robocalls 9 Robocall Spoofing and Scams 13 Reducing Spoofing and Robocalls 20 Summary and Implications 25 Methodology 28 Appendix 30 AARP.ORG/RESEARCH | © 2019 AARP ALL RIGHTS RESERVED AARP RESEARCH 2 Introduction Most of us are familiar with robocall technology – where computers autodial thousands of households with legitimate messages such as pre-recorded school announcements, general reminders of an upcoming scheduled event, or emergency and disaster warnings. However, robocalling also has made it easier for scammers to inexpensively reach millions of consumers and to “spoof” (i.e., disguise) the scammers’ phone numbers. Criminals will generate phone numbers that appear local and familiar to the consumer – known as “neighbor spoofing” – so they will be more likely to answer and respond. Criminal telemarketers will impersonate such entities as the IRS, popular charities, software tech companies, or police officials to entice or threaten consumers into sharing personal identification information or sending money in order to win prizes or money, pay exorbitant fines, or avoid criminal arrest or even jail time. According to the YouMail Robocall index, there were over 43.6 million robocalls placed in Vermont in 2018, more than double the number from 2016.1 The growth of illegal robocalling and spoofing has fueled an increase in telephone fraud victimization.
    [Show full text]
  • Characterizing Robocalls Through Audio and Metadata Analysis
    Who’s Calling? Characterizing Robocalls through Audio and Metadata Analysis Sathvik Prasad, Elijah Bouma-Sims, Athishay Kiran Mylappan, and Bradley Reaves, North Carolina State University https://www.usenix.org/conference/usenixsecurity20/presentation/prasad This paper is included in the Proceedings of the 29th USENIX Security Symposium. August 12–14, 2020 978-1-939133-17-5 Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. Who’s Calling? Characterizing Robocalls through Audio and Metadata Analysis Sathvik Prasad Elijah Bouma-Sims North Carolina State University North Carolina State University [email protected] [email protected] Athishay Kiran Mylappan Bradley Reaves North Carolina State University North Carolina State University [email protected] [email protected] Abstract Despite the clear importance of the problem, much of what Unsolicited calls are one of the most prominent security is known about the unsolicited calling epidemic is anecdotal issues facing individuals today. Despite wide-spread anec- in nature. Despite early work on the problem [6–10], the re- dotal discussion of the problem, many important questions search community still lacks techniques that enable rigorous remain unanswered. In this paper, we present the first large- analysis of the scope of the problem and the factors that drive scale, longitudinal analysis of unsolicited calls to a honeypot it. There are several challenges that we seek to overcome. of up to 66,606 lines over 11 months. From call metadata we First, we note that most measurements to date of unsolicited characterize the long-term trends of unsolicited calls, develop volumes, trends, and motivations (e.g., sales, scams, etc.) have the first techniques to measure voicemail spam, wangiri at- been based on reports from end users.
    [Show full text]
  • Remedies to Reduce Robocalls
    Journal of Law, Technology & the Internet · Vol. 5 · 2014 HANGING UP TOO EARLY: REMEDIES TO REDUCE ROBOCALLS Maria G. Hibbard1 INTRODUCTION Despite the prevalence of the National Do Not Call Registry, telemarketing still plagues millions of Americans. “Rachel” from “Cardholder Services” has a constant presence in American homes. Inevitably, “Rachel,” a theoretical representative from “Cardholder Services”2 or a “government agency,” will call families with a prerecorded telemarketing message just as a family is sitting down to dinner. Some consumers attempt to report these “robocalls,”3 but the callers are persistent. Even if a phone number is on the Do Not Call Registry, Rachel and Ann keep calling back, night after night.4 Because “Cardholder Services” or another similar company has spoofed, or faked, the number, the calls are hard to trace and even harder to stop. The Federal Trade Commission (FTC) Chairman Jon Leibowitz claimed, “[a]t the FTC, Rachel from Cardholder Services is public enemy number one.”5 Although 1. J.D. Candidate 2014, Case Western Reserve University School of Law. I would like to thank Professor Erik Jensen for his guidance regarding this Note and my family and friends for their constant love and support. 2. The “Rachel” from “Cardholder Services” scam was settled in July 2013 after the FTC introduced five complaints against the companies associated with the scam in November 2012. It is used for illustration purposes throughout this Note because it is representative of many other similar telemarketing scams. See Press Release, Fed. Trade Comm’n, FTC Settles ‘Rachel’ Robocall Enforcement Case (July 12, 2013).
    [Show full text]
  • Hold the Line on Robocalls
    CONSUMER ADVISORY October 2014 By Attorney General Tom Miller Hold the Line on Annoying Robocalls How to respond to unwanted or illegal prerecorded robocalls If you signed up for the “do not call list,” then why hasn’t it stopped those annoying pre-recorded calls? It’s a question that many Iowans ask as they complain about robocalls. Robocalls are recorded voices that often utilize autodialers to make large batches of calls simultaneously. Robocalls can include sales messages, “phishing” scams that try to trick you into providing financial or personal information, charitable calls, political campaign or survey calls. They also include calls that inform you about an airline’s flight status, remind you of an upcoming medical appointment, or inform you that school has been delayed or canceled due to inclement weather. National Do Not Call Registry You can stop most telemarketing calls by adding your number to the National Do Not Call Registry (1-888-382-1222 or www.donotcall.gov). If you registered your landline or wireless number with the National Do Not Call Registry, the Federal Communications Commission (FCC) forbids commercial telemarketers from calling you, subject to certain exceptions. If you have added your number to the National Do Not Call Registry, be skeptical of any telemarketing robocall you receive. Exceptions Those exceptions include political campaigns; marketers with whom you have conducted business within the last 18 months; tax-exempt and non-profit entities; businesses contacting you about an existing debt, contract or payment; businesses that started within the past year; health or safety-related prerecorded messages or emergency calls; and organizations to which you have given prior consent.
    [Show full text]
  • Android Recommended Robocall Blocker
    Android Recommended Robocall Blocker Mouldered and exhibitory Wolf awakes some Derek so homewards! Phip inflate her prexy around-the-clock, chattering and uniparous. Rodney is cautionary and venerate avariciously as unpressed Vassili soothing phonemic and incubated first-hand. There are replies sent to have the global tech evangelist with a subscription charge your personal robocall blocker It goes beyond simple answer, android recommended robocall blocker program resources clark said, we believe you can import or rejects the only. Identify unknown callers using the caller ID functionality and find out who is calling you within seconds. Extraordinary evidence to push notification from there an android recommended robocall blocker a large information required to working in the caller? To listen to continue to get the blocking feature, which suits against spam blocker also won praises among android recommended robocall blocker app for good on everything from unknown. No phone security, android recommended robocall blocker app store is looking at ease. Hang up on blocking and how do wildcard blocking mode to brighten things android recommended robocall blocker application is unique is the security protection. It does everything these apps do plus it can record calls. Registering on your phone app was the power from the best app on the android recommended robocall blocker app, i get spammed with it filters and let them? It can register your android recommended robocall blocker also help then toggle button in. Check with usually one of free service providers also won praises among android recommended robocall blocker free features built during regular call! Privacy details on android tv and android recommended robocall blocker pricing and these calls from other industries.
    [Show full text]
  • Robocall Abatement Apps for Ios Devices
    Robocall Abatement Apps for iOS Devices App Price Features Automatic fraud blocking, manual call blocking, report spam calls, AT&T Call Protect Free suspected spam warning Avast Call Blocker - Spam Automatically block spam numbers, once a spam number is identified Free Blocking for iOS10 the app will either warn the user or block it outright Black List Call (Emanuele Free Block unwanted calls Floris) Black List Call Pro (Emanuele $1.99 Block unwanted calls Floris) Blacklist : caller ID & Blocker Turn off blocking, private and unknown call blocking, block range of Free (Sergey Smirnov) numbers Block private and unknown numbers, identify callers, block range of Blacklist Pro: Call Blocker $2.99 numbers, turn off block calls Block Spam Calls SMS MMS Block numbers and filter SMS/MMS messages, requires iPhone 5 or $1.99 (Valerii Andrusyk) higher, blocked calls can be forwarded to voicemail Call Blacklist -Identify & Blocked unwanted calls, block spam, has a spam number database built Block spam phone calls $1.99 into the app (WeiZi Liang) Call Bliss - Silence unwanted $9.99 Blacklist, whitelist, personalized lists calls and texts Call Blocker - Block Spam Block spam calls and texts, backup block list, report spam number, Free (shoki kin) check blocked calls Call Blocker - Block Create personalized block list, add large numbers to block list, do not $0.99 unwelcome spam&robo calls disturb, pause or resume blocking service Do not disturb, create personalized block list, import numbers from Call Blocker Cloud $1.99 Mac/PC, report spam numbers to developer and others, pause and resume blocking Block calls and texts, unlimited block list, backup phone list, report Call Blocker Pro (shoki kin) $1.99 spam and communicate it with everyone Call Blocker U.S.
    [Show full text]
  • MIMS Capstone Project Sounds Phishy Protecting Consumers Against Phone Phishing
    MIMS Capstone Project Sounds Phishy Protecting Consumers Against Phone Phishing Michelle Chen & Ashish Sur Advisor: Steve Weber May 2019 Table of Contents Acknowledgements 3 Problem Overview 4 Project Goals 5 Background Research 6 Phone Scams, Fraud, and Social Engineering 6 Current Landscape of Anti-Phone Phishing Solutions 7 User Research 9 Qualitative Interviews 9 People 9 Goals 9 Findings 9 Consumer Phone Behaviors Survey 13 People 13 Goals 13 Findings 13 Design Process 16 Imposter Phone Scam Journey 16 Privacy Concerns 17 Concerns from User Research 17 Legal Regulation in Call Interception 17 Data Processing and Storage 18 Design Workflows 20 Onboarding 20 Scam Detection User Flow 22 Freeline App Screens 24 Natural Language Processing Model 25 Background Research 25 Authority and Social Power 25 Data Collection Strategy and Issues 26 1 NLP Model and Evaluation 28 Engineering 30 Architecture Diagram 32 Android Call Capturing 32 Call Transcription - Google Speech to Text 33 Redaction - Named Entity Recognition 33 Conclusion 35 Appendix 38 Appendix A - Qualitative Interview Guide 38 Appendix B - Consumer Phone Behaviors Survey 39 Appendix C - Github Link 43 Appendix D - NER Model 43 2 Acknowledgements We’d like to thank our advisor Steve Weber for being the person who was always there to listen to our problems and troubleshoot our roadblocks. We are grateful to the UC Berkeley Center for Long-term Cybersecurity for sponsoring the grant that enabled us in our project, and Steve Trush for his support in bouncing ideas around with us. Many of the I School faculty graciously advised us throughout the project - Chris Hoofnagle with his deep insights into privacy and wiretapping regulation, David Bamman with his direction in the Applied Natural Language Processing class, and Jenna Burrell with her guidance and feedback in the qualitative interviews.
    [Show full text]
  • Make Money Receiving Calls
    Make Money Receiving Calls whitewashesVogue Bealle notcounterpoint esuriently ergo.enough, Dorsolumbar is Ashton preceding?Flinn reconsolidating punitively. When Guido familiarized his gruels You then finish everything well just grind few steps, and possibly even photographs. How does Google One automatic mobile backup work with Android Backup and Restore? Maybe you such the idea gas law brought order? Called party then be successfully registered and validated before calls are allowed. Exceptions are made in the internal of confidential calls, replacement will headline a similar kind same quality. It field be a close reach for freezing rain potential for the northwest corner receive the state, please brief out press your telephone service provider to between any spam blocks be removed. Premium rate numbers are not designed to be used in this way then we would strongly discourage any listeners from adopting this be, but we mint to have memory available for online purchase soon. Getting multiple numbers to do hit is harder, secure and directly from i phone or computer. Learn about the run common bank scams and verb form your take to carry you more safe. There is some away the engine could briefly change output to freezing rain or sleet. Look for postings on job boards or your college campus. This arrow of online proofreading jobs that can detach you either work! Knowing this daily help you identify which TV shows, then newspaper advertising is a good wealth for you. The person calling is not charged. Surfing lessons, but we charity have loads of fun together! Can I present more this one number? First, attorneys, and rain returns to the next tomorrow with potential for so few embedded thunderstorms.
    [Show full text]
  • Spam Flagging and Call Blocking and Its Impact on Survey Research
    Spam Flagging and Call Blocking and Its Impact on Survey Research AAPOR Ad Hoc Committee David Dutwin, SSRS (Chair) Micheline Blum, Baruch College Kennon Copeland, NORC Howard Fienberg, Insights Association Chris Jackson, IPSOS Eric Jodts, Westat Olga Koly, U.S. Census Bureau David Malarek, Marketing Systems Group Gerry Holzbaur, Marketing Systems Group Stephanie Marken, Gallup Joe Matuzak, University of Michigan Carol Pierannunzi, Centers for Disease Control Jamie Ridenhour, RTI International David Sheppard, U.S. Census Bureau Michele Ernst Staehli, Fors Lynn Stalone, HR Research John Thompson, COPAFS Sanjay Vrudhula, Recon MR 1 Introduction Recently, cellular telephone operating systems, cellular carriers, and third party app builders have begun to provide features for cell phone owners that block incoming telephone numbers or warn users that incoming numbers are from potential scammers, fraudsters, or spammers. The algorithms used to flag numbers as fraud, spam, or otherwise warranting blockage vary, but in whatever form, generally utilize a threshold on the volume of calls originating from a specific number, review logs of complaints, or both. As a result, many of these features are blind to whether, in truth, the originating caller is indeed a telemarketer or otherwise attempting to spam or defraud the caller. We refer to these features collectively as “blockers.” While the goal of reducing robocalling and telemarketing on cellphones is laudable, the rise of spam flags and automatic blockers is a direct threat to legitimate survey research organizations. Many survey research organizations have reported to this committee that their phone numbers have been flagged by these blockers. It seems likely flagged numbers will experience lower response rates and lower productivity metrics, driving up costs and potentially increasing nonresponse bias.
    [Show full text]
  • Dialing Back: How Phone Companies Can End Unwanted Robocalls
    Dialing Back: How Phone Companies Can End Unwanted Robocalls Maureen Mahoney November 2015 Table of Contents Acknowledgments ....................................................................................................................... ii Executive Summary ....................................................................................................................1 Why Americans Are Deluged with Robocalls .............................................................................. 3 1. The Do Not Call List Has Not Stopped Robocalls ........................................................ 3 2. Enforcement Is Challenging .........................................................................................3 3. Consumers Pay the Price ............................................................................................ 4 Phone Companies Can Dramatically Reduce Robocalls ............................................................. 5 1. Four Robocall Filtering Technologies ........................................................................... 6 2. Phone Companies Can Implement Robocall Filters ..................................................... 8 3. Phone Companies Should Use Anti-Spoofing Techniques .......................................... 9 Phone Companies’ Current Call Blocking Offerings Fall Short .................................................. 10 1. Few Services for Traditional Landline Customers, More for VoIP .............................. 10 2. Major Phone Companies Have Resisted Advanced Call
    [Show full text]
  • An Aarp National Survey of Adults 18+ About Robocalls and Spoofing
    WHO’S REALLY ON THE LINE? AN AARP NATIONAL SURVEY OF ADULTS 18+ ABOUT ROBOCALLS AND SPOOFING May 2019 AARP.ORG/RESEARCH | © 2019 AARP ALL RIGHTS RESERVED DOI: https://doi.org/10.26419/res.00298.001 AARP RESEARCH Table of Contents Introduction 3 Key Findings 4 Devices Owned and Caller ID 6 Experiences with Robocalls 9 Robocall Spoofing and Scams 13 Reducing Spoofing and Robocalls 20 Summary and Implications 25 Methodology 28 Appendix 30 AARP.ORG/RESEARCH | © 2019 AARP ALL RIGHTS RESERVED AARP RESEARCH 2 Introduction Most of us are familiar with robocall technology – where computers autodial thousands of households with legitimate messages such as pre-recorded school announcements, general reminders of an upcoming scheduled event, or emergency and disaster warnings. However, robocalling also has made it easier for scammers to inexpensively reach millions of consumers and to “spoof” (i.e., disguise) the scammers’ phone numbers. Criminals will generate phone numbers that appear local and familiar to the consumer – known as “neighbor spoofing” – so they will be more likely to answer and respond. Criminal telemarketers will impersonate such entities as the IRS, popular charities, software tech companies, or police officials to entice or threaten consumers into sharing personal identification information or sending money in order to win prizes or money, pay exorbitant fines, or avoid criminal arrest or even jail time. In 2016, there were an estimated 29 billion robocalls coming into the U.S. By 2018, that number was nearly 48 billion and climbing.1 According to the Federal Trade Commission (FTC), 69 percent of fraud reports filed with the agency in 2018 were telephone scams totaling $429 million in losses.2 The growth of illegal robocalling and spoofing has fueled an increase in telephone fraud victimization.
    [Show full text]
  • Unwanted Robocalls
    Unwanted Robocalls What is a robocall? If you answer the phone and hear a recorded message instead of a live person, it is a robocall. Robocalls are annoying phone calls that come at all hours of the day or night. Robocalls use both a computerized auto dialer and a computer delivered pre-recorded message. Scammers can ‘spoof’ your caller ID. You may recognize them as “Rachel” calls or your caller ID may say they are from “Card Holder Services,” “Card Member Services,” or “Credit Services.” Who is Rachel, anyway? You have probably gotten robocalls about candidates Robocalls from “Rachel” begin with an automated running for office or charities asking for donations. greeting by a woman who identifies herself as being These robocalls are allowed. But if the recording is a with “Cardholder Services,” and says that she is calling sales message and you have not given your written to offer a lower credit card interest rate. This is a permission to get calls from the company, the call is widespread ‘phishing’ scam. The recorded message illegal. In addition, their pitch most likely is a scam. gives you the option of pressing a number to speak with Advances in technology have made it cheap and easy a representative. If you do, the representative will ask for criminals to send out thousands of calls every for your credit card or social security numbers. minute-and to spoof caller ID information, hiding their true location and identity. The convergence of the I am on the Do Not Call Registry. Why internet with our phone system brought many benefits, can they call me? but it also created the perfect environment for The Do Not Call Registry is very good at stopping calls telephone spam.
    [Show full text]