https://en.wikipedia.org/w/api.php?action=feedcontributions&feedformat=atom&user=2409%3A4041%3AD9D%3AC44B%3A0%3A0%3A934A%3ACE04 Wikipedia - User contributions [en] 2024-11-08T20:02:23Z User contributions MediaWiki 1.44.0-wmf.2 https://en.wikipedia.org/w/index.php?title=Phone_fraud&diff=1023056332 Phone fraud 2021-05-14T02:46:56Z <p>2409:4041:D9D:C44B:0:0:934A:CE04: Bitch</p> <hr /> <div>{{short description|Illegitimate way of obtaining money by using phones}}<br /> {{multiple issues|<br /> {{Refimprove|date=February 2014}}<br /> {{Globalize|article|USA|2name=the United States|date=December 2010}}<br /> {{weasel|date=January 2013}}<br /> {{external links|date=March 2016}}<br /> }}<br /> '''+919026857651 fraud''', or more generally '''communications fraud,''' is the use of telecommunications products or services with the intention of illegally acquiring money from, or failing to pay, a [[Telephone company|telecommunication company]] or its customers.<br /> <br /> Many operators have increased measures to minimize fraud and reduce their losses. Communications operators tend to keep their actual loss figures and plans for corrective measures confidential.&lt;ref name=cfca2011&gt;{{cite web|last=CFCA|title=CFCA's 2011 Worldwide Telecom Fraud Survey|url=http://cfca.org/pdf/survey/Global%20Fraud_Loss_Survey2011.pdf|publisher=CFCA|access-date=5 December 2011}}{{Dead link|date=May 2020 |bot=InternetArchiveBot |fix-attempted=yes }}&lt;/ref&gt;<br /> <br /> According to a 2011 survey by CFCA, an industry group created to reduce fraud against carriers, the five top fraud loss categories reported by operators were:&lt;ref name=cfca2011 /&gt;<br /> * [[US$]]4.96 billion – compromised PBX/voicemail systems<br /> * $4.32 billion – subscription/identity theft<br /> * $3.84 billion – International Revenue Share Fraud<br /> * $2.88 billion – by-pass fraud<br /> * $2.40 billion – cash fraud<br /> <br /> <br /> == Types of frauds ==<br /> <br /> === Fraud against users by phone companies ===<br /> * ''[[Cramming (fraud)|Cramming]]'' is the addition of charges to a subscriber's telephone bill for services which were neither ordered nor desired by the client, or for fees for calls or services that were not properly disclosed to the client. These charges are often assessed by dishonest third-party suppliers of data and communication service that phone companies are required, by law, to allow the third-party to place on the bill.<br /> * ''[[Telephone slamming|Slamming]]'' is any fraudulent, unauthorized change to the default long-distance/local carrier or DSL Internet service selection for a subscriber's line, most often made by dishonest vendors desiring to steal business from competing service providers.<br /> * ''[[False Answer Supervision]]'' is a misconfiguration of telephone company equipment, by negligence or design, which causes billing to start as soon as the distant telephone begins ringing, even if a call is busy or there is no answer. The cost is typically subtle but recurring as subscribers repeatedly pay some small amount for calls which were never completed.&lt;ref&gt;{{cite web |url=http://freerouteserver.com/wordpress/2012/10/call-fraud-scenarios.html |title=Call Fraud Scenarios|work=The TransNexus Blog|last= Bradford|first=Valerie|date=October 25, 2012 |access-date=2014-02-03 |url-status=dead |archive-url=https://web.archive.org/web/20140220094021/http://freerouteserver.com/wordpress/2012/10/call-fraud-scenarios.html |archive-date=2014-02-20 }}&lt;/ref&gt;<br /> <br /> === Fraud against customers by third parties ===<br /> * [[Private branch exchange|PBX]] dial-through can be used fraudulently by placing a call to a business then requesting to be transferred to &quot;9-0&quot; or some other outside toll number.{{citation needed|date=January 2013}} (9 is normally an outside line and 0 then connects to the utility's operator.) The call appears to originate from the business (instead of the original fraudulent caller) and appears on the company's phone bill.{{citation needed|date=January 2013}} [[Trickery]] (such as [[impersonation]] of [[installer]] and telecommunications company personnel &quot;testing the system&quot;) or bribery and collusion with dishonest employees inside the firm may be used to gain access.{{citation needed|date=January 2013}}<br /> * A variant is a call forwarding scam, where a fraudster tricks a subscriber into [[call forwarding]] their number to either a long-distance number or a number at which the fraudster or an accomplice is accepting [[collect call]]s. The unsuspecting subscriber then gets a huge long-distance bill for all of these calls.&lt;ref&gt;{{cite web|url=https://www.snopes.com/fact-check/call-forwarding-scam/|title=FACT CHECK: Call Forwarding Scam|website=Snopes.com|access-date=9 May 2019}}&lt;/ref&gt;<br /> * A similar scheme involves forwarding an individual PBX extension to a long-distance or overseas number; the PBX owner must pay tolls for all of these calls. [[Voice over IP]] servers are often flooded with brute-force attempts to register bogus [[off-premises extension]]s (which may then be forwarded or used to make calls) or to directly call [[SIP address]]es which request outside numbers on a gateway; as they are computers, they are targets for Internet system crackers.<br /> * [[Autodialer]]s may be used for a number of dishonest purposes, including [[telemarketing fraud]] or even as [[War dialing]]. War dialers take their name from a scene in the 1983 movie [[WarGames]] in which a 'cracker' programs a [[home computer]] to dial every number in an exchange, searching for lines with auto-answer data [[modem]]s. Sequential dialing is easy to detect, pseudo-random dialing is not.&lt;ref&gt;{{cite web|url=https://www.cebodtelecom.com/features/sequential-calls/|title=Sequential Calls}}&lt;/ref&gt;<br /> * In the US, owners of [[Payphone|customer-owned coin-operated telephones]] (COCOTs) are paid sixty cents for every call their users make to a [[toll-free telephone number]], with the charges billed to the called number. A fraudulent COCOT provider could potentially auto-dial 1-800 wrong numbers and get paid for these as &quot;calls received from a payphone&quot; with charges reversed.<br /> * [[Autodialer|Autodialers]] are also used to make many short-duration calls, mainly to mobile devices, leaving a missed call number which is either premium rate or contains advertising messages, in the hope that the victim will call back.&lt;ref&gt;{{cite web |url=http://www.economist.com/node/1367988 |title=You've got my number|work=The Economist|date=October 3, 2002 |access-date=2014-02-03 |url-status=live |archive-url=https://web.archive.org/web/20140203193811/http://www.economist.com/node/1367988 |archive-date=2014-02-03 }}&lt;/ref&gt; This is known as Wangiri (literally, &quot;One (ring) and cut&quot;) from Japan where it originated.<br /> * [[809 scam]]s take their name from the former +1-809 area code which used to cover most of the [[Caribbean]] nations (it has since been split into multiple new area codes, adding to the confusion). The numbers look like Canadian or US telephone numbers but turn out to be costly, overpriced international calls that bypass consumer-protection laws which govern [[premium number]]s based in the victim's home country. Some advertise [[phone sex]] or other typically premium content. Other variants on this scheme involve leaving unsolicited messages on [[pagers]] or making bogus claims of being a relative in a family emergency to trick users into calling the foreign numbers, then attempting to keep the victim on the line as long as possible in order to incur the cost of an expensive foreign call.&lt;ref&gt;{{cite web |url=http://www.bbb.org/us/article/beware-of-fraudulent-international-phone-calls-466 |title=Beware of Fraudulent International Phone Calls|publisher=Better Business Bureau|date=2004-04-07|access-date=2014-01-29 |url-status=dead |archive-url=https://web.archive.org/web/20140207104315/http://www.bbb.org/us/article/beware-of-fraudulent-international-phone-calls-466 |archive-date=2014-02-07 }}&lt;/ref&gt;<br /> * A more recent version of the 809 scam involves calling cellular telephones then hanging up, in hopes of the curious (or annoyed) victim calling them back.&lt;ref&gt;{{cite web|url=http://wisconsin.bbb.org/article/BBB-Warns-of-One-Ring-Cell-Phone-Scam-45593|title=BBB Warns of One Ring Cell Phone Scam|archive-url=https://web.archive.org/web/20140219220901/http://wisconsin.bbb.org/article/BBB-Warns-of-One-Ring-Cell-Phone-Scam-45593 |archive-date=2014-02-19|date=2014-01-29|publisher=Better Business Bureau in Wisconsin }}&lt;/ref&gt; Effectively, this is [[Wangiri]] but using former +1-809 countries such as 1-473 ([[Grenada]]) which look like North American domestic calls but are Caribbean island nations.&lt;ref&gt;{{cite web |url=http://www.ksl.com/?sid=28211799&amp;nid=148&amp;title=scammers-calling-from-473-area-code-police-warn |title=Scammers calling from 473 area code, police warn|work=KSL.com Utah|last=Evans|first=Whitney|date=2014-01-01 |access-date=2014-02-03 |url-status=dead |archive-url=https://web.archive.org/web/20140220103952/http://www.ksl.com/?sid=28211799&amp;nid=148&amp;title=scammers-calling-from-473-area-code-police-warn |archive-date=2014-02-20 }}&lt;/ref&gt;<br /> * Pre-pay [[telephone card]]s or &quot;calling cards&quot; are also very vulnerable to fraudulent use;{{citation needed|date=January 2013}} these cards contain a number or passcode which can be dialed in order to bill worldwide toll calls to the card. Anyone who obtains the passcode can dishonestly misuse it to make or to resell toll calls.{{citation needed|date=January 2013}}<br /> * [[Carrier access code]]s were widely misused by phone-sex [[scam]]mers in the early days of competitive long distance;{{citation needed|date=January 2013}} the phone-sex operations would misrepresent themselves as alternate long-distance carriers to evade [[consumer protection]] measures which prevent US phone subscribers from losing local or long-distance service due to calls to +1-900 or 976 premium numbers. This loophole is now closed.{{citation needed|date=January 2013}}<br /> * In the US, [[area code 500]] and its overlays permit a &quot;follow-me routing&quot; in which, if the number has been forwarded to some expensive and arbitrary destination, the caller is billed for the call to that location. Similar issues existed with [[area code 700]] as the numbers are long-distance carrier specific (except 1-700-555-4141, which identifies the carrier). Because of the unpredictable and potentially costly rate for such a call, these services never gained widespread use.<br /> * [[Telemarketing fraud]] takes a number of forms; much like [[mail fraud]], solicitations for the sale of goods or investments which are worthless or never delivered and requests for donations to [[Charitable organization|unregistered charities]] are not uncommon.{{citation needed|date=January 2013}} Callers{{who|date=January 2013}} often prey upon [[illness|sick]], [[disabled]] and [[elderly]] persons;{{citation needed|date=January 2013}} scams in which a caller attempts to obtain [[banking]] or [[credit card]] information also frequently{{when|date=January 2013}} occur.{{citation needed|date=January 2013}} One other variant involves calling a number of business offices, asking for model numbers of various pieces of [[office equipment]] in use (such as photocopiers) and sending unsolicited shipments of supplies for the machines, and then billing the victims at artificially inflated prices.{{citation needed|date=January 2013}}<br /> * [[Caller ID spoofing]] can be used to fraudulently impersonate a trusted vendor (such as a bank or credit union), a law enforcement agency or another subscriber. These calls may be used for [[vishing]], where a scammer impersonates a trusted counterparty in order to fraudulently obtain financial or personal information.<br /> * ''Call clearing delays'' in some [[United Kingdom]] exchanges may be abused to defraud. For obscure historical reasons, the system was designed so that a called party could hang up a call and immediately pick it up from another extension without it being disconnected. A fraudster would call a household and impersonate a bank or police; when the householder hung up and then attempted to call police or contact the impersonated party, the fraudster would still be on the line because the original call never properly ended.&lt;ref&gt;{{cite web |url=https://www.bbc.co.uk/news/technology-26559554 |title=Fraud prompts UK phone firms to tweak networks|publisher=BBC News|date=2014-03-13 |access-date=2014-03-14 |url-status=live |archive-url=https://web.archive.org/web/20140314014409/http://www.bbc.co.uk/news/technology-26559554 |archive-date=2014-03-14 }}&lt;/ref&gt;<br /> * [[Cordless telephone|Cordless phones]] are often even less secure than cell phones; with some models a [[scanner (radio)|scanner radio]] may intercept analogue conversations in progress or a handset of the same or a similar model as the target system may be usable to make toll calls through a cordless base station which lacks authentication capability. Obsolete analogue mobile telephones have stopped working in areas where the AMPS service has been shut down, but obsolete cordless phone systems may remain in service indefinitely.<br /> * A recent{{When|date=March 2021}}[[IRS_impersonation_scam | scam]] involved Indian call centers targeting American or Canadian customers demanding &quot;unpaid taxes&quot; by impersonating government officials.&lt;ref&gt;{{cite web |url=http://www.ndtv.com/mumbai-news/thane-call-centre-workers-pretended-to-be-irs-extorted-crores-from-americans-1470551?pfrom=home-lateststories |title=How Workers From 9 Call Centres Near Mumbai Extorted Crores From Americans|publisher=NDTV|last=Zanane|first=Anant R.|date=2016-10-05 |access-date=2016-10-05 |url-status=live |archive-url=https://web.archive.org/web/20161006052208/http://www.ndtv.com/mumbai-news/thane-call-centre-workers-pretended-to-be-irs-extorted-crores-from-americans-1470551?pfrom=home-lateststories |archive-date=2016-10-06 }}&lt;/ref&gt; Similar government impersonation scams include the [[SSA impersonation scam]].<br /> * Every day, hundreds of scam calls are received on the US mainland which offer the recipients grant money from the Federal Government, but requesting a &quot;small administration fee&quot;,&lt;ref&gt;{{cite web|title=Phone grant scam|url=http://www.scamcallfighters.com/search-phone-grant-scam.html|url-status=live|archive-url=https://web.archive.org/web/20170905141805/http://www.scamcallfighters.com/search-phone-grant-scam.html|archive-date=2017-09-05|access-date=2017-09-05|website=scamcallfighters.com}}&lt;/ref&gt; even though there are no fees associated with applying for or receiving a Government Grant.<br /> * During the 1980s, a common form of premium-rate fraud involved manipulating children (often through [[television commercial]]s, such as during [[Saturday morning cartoon]]s) to call a premium-rate number without their parents' knowledge or permission, sometimes going so far as to ask a child to hold the phone receiver up to the television set as it played [[DTMF tones]] to automatically trigger the dialing of a premium number.&lt;ref&gt;Stern, Jane; Stern, Michael (1992). ''Jane &amp; Michael Stern's Encyclopedia of Pop Culture: An A to Z Guide to Who's Who and What's What, from Aerobics and Bubble Gum to Valley of the Dolls''.&lt;/ref&gt; Such practices are now illegal in the United States.<br /> * The [[Can You Hear Me? (telephone scam)|Can You Hear Me?]] telephone scam was an alleged scam reported in the United States and Canada in 2017.<br /> <br /> === Fraud by phone companies against one another ===<br /> * [[Interconnect fraud]] involves the falsification of records by telephone carriers in order to deliberately miscalculate the money owed by one telephone network to another. This affects calls originating on one network but carried by another at some point between source and destination.{{citation needed|date=January 2013}}<br /> * [[Refiling]] is a form of [[interconnect fraud]] in which one carrier tampers with CID (caller-ID) or ANI data to falsify the number from which a call originated before handing the call off to a competitor. Refiling and interconnect fraud briefly made headlines in the aftermath of the [[Worldcom]] financial troubles; the refiling scheme is based on a quirk in the system by which telecommunications companies bill each other{{Snd}}two calls to the same place may incur different costs because of differing displayed origin. A common calculation of payments between telecommunications companies calculates the percentage of the total distance over which each telecommunications company has carried one call to determine division of toll revenues for that call; refiling distorts data required to make these calculations.{{citation needed|date=January 2013}}<br /> * [[White, black and grey routes|Grey routes]] are [[voice over IP]] gateways which deliver international calls to countries by mis-labelling them as inbound local [[mobile telephone]] calls at destination. These &quot;SIM box&quot; operations are common in third world nations with exorbitant official international rates, usually due to some combination of tight control by one state-supported monopoly and/or excessive taxation of inbound overseas calls. Governments who believe themselves entitled to charge any arbitrary inflated price for inbound international calls, even far above the cost of domestic calls to the same destinations, will legislate against any privately owned, independent, competitive VoIP gateway, labelling the operations as &quot;bypass fraud&quot; and driving them underground or out of business.{{Citation needed|date=March 2021}} As a VoIP gateway in such a regulatory environment typically does not have access to [[T-carrier]] [[primary rate interface]] or [[private branch exchange|PBX]]-style trunks, its operator is forced to rely on a hardware configuration with Internet telephony on one side and a large number of mobile [[SIM card]]s and handsets on the other to place the calls as if they were from individual local mobile subscribers.<br /> <br /> === Fraud against phone companies by users ===<br /> * [[Subscription fraud]]: for example, signing up with a false name, or no intention to pay.{{citation needed|date=January 2013}}<br /> * [[Collect call]] fraud: most automated collect call systems allow the caller to record a short audio snippet, intended to identify the caller so that the recipient can decide whether or not to accept the charges. With the system being automated, the caller could insert any message they want, free of charge, as long as it fit within the short allotted time, and the recipient could refuse charges. A variant is to refuse a collect call at the higher operator-assisted rate, then call the person back at a lower price.<br /> * [[Person-to-person call]] fraud: Under archaic operator assistance systems, a person-to-person call only charged a caller if they could reach a specific person at the other end of the line. Thus, if coordinated beforehand, a caller could use a false name as a code word, with the recipient rejecting the call, and no one would be charged.<br /> * Intentional non-return of rental equipment (such as extension telephones) when relocating to a new address. The equipment would then be used at the new location without paying a monthly equipment rental fee. This has become rare as most telephones are now owned outright, not rented.<br /> <br /> === Frauds against phone companies by third parties ===<br /> * [[Phreaking]] involves obtaining knowledge of how the telephone network operates, which can be (but is not always) used to place unauthorised calls. The history of phone phreaking shows that many 'phreaks' used their vast knowledge of the network to help telephone companies.{{Citation needed|date=March 2021}} There are, however, many phreaks who use their knowledge to exploit the network for personal gain, even today.{{Citation needed|date=March 2021}} In some cases, [[social engineering (computer security)|social engineering]] has been used to trick telecommunications company [[employees]] into releasing technical information.{{Citation needed|date=March 2021}} Early examples of phreaking involved generation of various control tones, such as a [[2600 hertz]] [[Blue box (phreaking)|blue box]] tone to release a long-distance trunk for immediate re-use or the [[Red box (phreaking)|red box]] tones which simulate coins being inserted into a [[payphone]].{{Citation needed|date=March 2021}} These exploits no longer work in many areas of the telephone network due to widespread use of digital switching systems and out-of-band signaling. There are, however, many areas of the world{{which|date=January 2013}} where these control tones are still used and this kind of fraud still continues to happen.{{citation needed|date=January 2013}}<br /> * A more high-tech version of the above is [[switch reprogramming]], where unauthorized &quot;back door&quot; access to the phone company's network or billing system is used to allow free telephony. This is then sometimes resold by the 'crackers' to other customers.{{citation needed|date=January 2013}}<br /> * Caller name display (CNAM) is vulnerable to [[data mining]], where a dishonest user obtains a line (fixed or mobile) with caller name display and then calls that number repeatedly from an autodialer which uses [[caller ID spoofing]] to send a different presentation number on each call. None of the calls are actually answered, but the telephone company has to look up every number (a CNAM database &quot;dip&quot;) to display the corresponding subscriber name from its records. The list of displayed names and numbers (which may be landline or wireless) is then sold to telemarketers.&lt;ref&gt;{{cite web |url=https://www.courthousenews.com/2011/08/16/39024.htm |title=AT&amp;T Says Data Miners Defrauded It|publisher=Court House News Service|date=2011-08-16 |access-date=2014-02-03 |url-status=live |archive-url=https://web.archive.org/web/20140203075652/http://www.courthousenews.com/2011/08/16/39024.htm |archive-date=2014-02-03 }}&lt;/ref&gt;<br /> * [[Payphone]]s have also been misused to receive fraudulent collect calls; most carriers{{who|date=January 2013}} have turned off the feature of accepting incoming calls or have muted the payphones internal ringing mechanism for this very reason.{{citation needed|date=January 2013}}<br /> * [[Cloning (telephony)|Cloning]] has been used as a means of copying both the [[electronic serial number]] and the telephone number of another subscriber's phone to a second (cloned) phone. Airtime charges for outbound calls are then mis-billed to the victim's cellular phone account instead of the perpetrator's.<br /> <br /> == See also ==<br /> * [[Caller ID spoofing]]<br /> * [[List of confidence tricks|Confidence tricks]]<br /> * [[Credit card fraud]]<br /> * [[Pulse dialing#Tapping|Dial tapping]]<br /> * [[Internet fraud]]<br /> * [[Mobile phone spam]]<br /> * [[Phreaking]]<br /> * [[Traffic pumping]]<br /> * [[Vishing]]<br /> * [[Wire fraud]]<br /> * [[Technical support scam]]<br /> <br /> == References ==<br /> {{reflist}}<br /> <br /> == External links ==<br /> * OFCOM: [https://web.archive.org/web/20070629203613/http://www.ofcom.org.uk/complain/landline/slamming/ Problems with your landline phone: slamming] - advice from the British communications regulator<br /> * [[The Guardian]]: [http://money.guardian.co.uk/phones/story/0,13283,1466811,00.html When slamming the phone prompts a row]<br /> * The Guardian: [http://money.guardian.co.uk/phones/story/0,,2109131,00.html Orange slammed as users see red] - concerns over data protection by British mobile telecom suppliers<br /> * [http://support.bell.ca/en-on/Home_phone/Long_distance_and_calling_cards/How_to_protect_against_long_distance_fraud Bell Canada Fraud Control Centre]<br /> * [https://www.police.gov.hk/ppp_en/04_crime_matters/adcc/contact.html Anti-Deception Coordination Centre] ([[Hong Kong]])<br /> {{Fraud}}<br /> <br /> {{DEFAULTSORT:Phone Fraud}}<br /> [[Category:Fraud]]<br /> [[Category:Telephone crimes|Fraud]]</div> 2409:4041:D9D:C44B:0:0:934A:CE04