小程序
传感搜
传感圈

The Robocalls Problem Is So Bad That the FCC Actually Did Something

2022-08-10
关注

“Hello, we’ve been trying to reach you about your car’s extended warranty.” After years of seemingly unstoppable scam robocalls, this phrase is embedded into the minds of many of us. Last month the Federal Communications Commission (FCC) announced it was ordering phone providers to block any calls coming from a known car warranty robocall scam, offering hope that U.S. phone users may hear that all-too-familiar automated voice a little less often.

But there is more work required to crack down on these calls. After all, car warranty warnings are only one type of scam. To understand how robocallers reach us, and why it’s so hard to stop them, Scientific American spoke with Adam Doupé, a cybersecurity expert at Arizona State University.

[An edited transcript of the interview follows.]

How big is the robocall problem in the U.S.?

I think it’s difficult to wrap our head around the scale. We can look at hard evidence of the complaints that consumers are sending to the FCC, but those are just people who actually complain. The FCC is claiming that one auto warranty scam operation is responsible for making more than eight billion robocall messages since 2018—that’s just staggering. That’s two billion a year from one campaign. Companies are sending out billions of messages, and that’s inherently going to affect you; you’ll get one to three a day.

A lot of these are done by companies that are selling real products. They’re just using an illegal marketing campaign to get consumers to buy those products. That’s distinct from robocalls that are trying to target people for fraud: the robocall itself is the marketing lure to get somebody on the hook, then they’re transferred to a real person who is defrauding them out of money.

Why hasn’t anyone been able to stop robocalls so far?

Robocalls are such a problem because they are cheap to make. They are highly effective because they’re so cheap and can reach so many people. The other thing criminals keep in mind is: What’s the likelihood of ... being caught in this criminal activity? The number for that was shockingly low for a long time.

Spam callers are changing the caller ID that shows up on your phone to a number [with an area code] that’s close to you, and that’s illegal. The question to me is always “How come they can just change their number?” That seems kind of crazy, right? You place a phone call, your provider—AT&T, Verizon, whatever—knows your phone number. How could another number appear there? The way it used to be designed is the caller ID field was essentially optional, and so nobody had verified it anywhere along the chain. The networks got more complex—a phone call will just come in, and nobody’s checking to say, “Oh, wait, who is originating this call? Is it actually the same number?” It actually does have a purpose. A big company doesn’t necessarily want anyone external to know the phone numbers of anybody internal. So it changes the caller ID so that the number that appears is the general number of the company.

The other thing to remember is that the telephone system was created among trusting parties—all of the telephone companies knew each other. But as technology improves, and smaller companies get connected to the phone networks..., you have these untrusted parties in the network that are essentially causing a lot of these problems.

How does the FCC currently tackle robocalls?

There is a protocol that was created called STIR/SHAKEN, [or secure telephony identity revisited/signature-based handling of asserted information using tokens, which the FCC began requiring in 2021]. It adds a field when you’re making a voice call that says, “I am this entity, and I have verified the caller ID.” This allows anyone who’s transmitting that request to look at that header message and say, “Okay, I can verify with cryptography that, yes, this actually is the originator [of the call].”

Now the problem is if a call comes in from a VoIP [voice-over-Internet protocol] provider overseas. How does the U.S. carrier verify that phone number? What the FCC has done is create this system where it has a Robocall Mitigation Database. U.S. companies that act as connection points between foreign VoIP and other phone services have to register and say, “These are the steps we’re taking to verify these [overseas] phone numbers.” The [U.S.] phone providers are now allowed to drop traffic from providers that are not following these standards. The FCC actually orders companies to block [the known auto warranty] robocall scam calls.

So STIR/SHAKEN is not a defense against robocalling per se. It’s a defense against changing the caller ID, which is an important part of these scams.

What other techniques can be used to detect and prevent robocalls?

What you’d probably use is some type of pattern detection based on: Where are these calls coming from? What’s the number of times that people answer this call or not? How long are the durations of the calls? All these types of things [matter] as you try to identify as many different features as possible that separate good calls from bad calls. Putting trust back into caller ID is super important.

You could also set up fake phone numbers—in cybersecurity terms, a honeypot. You create fake numbers that you don’t give out to anybody, so any phone calls to those numbers are unwanted. You could use some automated system to answer the calls, listen to the recording, then maybe you either have a human or an automated system trying to make a determination: Is this a scam or a robocall? And then you could use that to feed back into your detection systems.

I think disincentives will make businesses say, “As a legitimate business, we shouldn’t do this.” There was a $225-million fining of Texas-based health insurance telemarketers that made about a billion robocalls. You can see a combination of technical measures and policy measures designed to try to close these loopholes. Is that going to stop criminals located in other countries who are trying to defraud people? Probably not. One thing we could do is make the cost of making a billion calls more expensive. I’m hopeful that this will help stem the tide.

What about stopping other ways scammers target people?

The key thing when you study cybercrime is: humans are very resilient in finding new ways to commit crime. [If calls become more expensive], the other option is the scammers will shift to other platforms, which we’re already seeing. They’ll switch to sending WhatsApp messages or Twitter spam. I think that’s a better situation. If you’re the phone company, you don’t know what’s going to be said when somebody answers that call. You have patterns in the network, and you have where it came from, but fundamentally, you don’t have the content of the scam. With a text message, you do have that content. The problem becomes more similar to e-mail spam. If you use something like Gmail, the spam detection capabilities are so good that you’ll maybe get one message a month there.

Fundamentally, right now, it’s hard to trust your phone when it rings. I think a world where we can trust phone calls again—or maybe be excited to receive them and not just [be] like, “Oh, somebody’s gonna try to scam me”—is a better world. And I think slowly we’re getting there.

参考译文
电话录音问题如此严重,以至于FCC真的做了些什么
“你好,我们一直想找你谈谈您汽车的延保问题。”在经历了多年看似不可阻挡的骗局语音电话之后,这句话已经深深植入了我们许多人的脑海。上个月,美国联邦通信委员会(FCC)宣布,它要求电话供应商屏蔽任何来自已知的汽车保修语音电话骗局的电话,这给美国电话用户带来了希望,他们可能会少听到这种再熟悉不过的自动语音。但要打击这些电话,还需要做更多的工作。毕竟,汽车保修警告只是骗局的一种。为了了解自动呼叫器是如何联系到我们的,以及为什么阻止它们如此困难,《科学美国人》采访了亚利桑那州立大学网络安全专家亚当Doupé。[以下是经过编辑的采访记录。美国的语音通话问题有多严重?我认为我们很难理解这个比例。我们可以看到消费者向联邦通信委员会投诉的确凿证据,但这些只是真正抱怨的人。美国联邦通信委员会声称,自2018年以来,一次汽车保修骗局制造了超过80亿条语音留言——这真是令人震惊。一年一次竞选就能赚20亿。公司正在发出数十亿条信息,这些信息本质上会影响到你;一天会有一到三次。其中很多都是由销售真正产品的公司完成的。他们只是利用非法营销活动来让消费者购买这些产品。这与试图针对欺诈对象的语音电话是不同的:语音电话本身是一种营销诱惑,让某人上钩,然后他们被转移到一个真实的人,这个人诈骗他们的钱。为什么到目前为止还没人能阻止语音电话?语音电话之所以成为一个问题,是因为它的成本很低。它们非常有效,因为它们很便宜,可以接触到很多人。罪犯们记住的另一件事是:发生……的可能性有多大?在犯罪活动中被抓?这一数字在很长一段时间内都非常低。垃圾电话是把你手机上显示的来电显示改成你附近的一个号码(带有区号),这是违法的。对我来说,问题总是“为什么他们可以换号码?”这听起来有点疯狂,对吧?你打个电话,你的供应商——at&T, Verizon,等等——就会知道你的电话号码。怎么可能出现另一个数字呢?它过去的设计方式是来电显示字段本质上是可选的,所以没有人在链上任何地方验证它。网络变得更加复杂——一个电话直接打进来了,没有人会问:“哦,等等,这是谁打的?”实际上是相同的数字吗?”它其实是有目的的。大公司并不一定想让外部的人知道内部人员的电话号码。所以它改变了来电显示,所以出现的号码是公司的通用号码。另一件要记住的事情是,电话系统是在相互信任的各方之间创建的——所有的电话公司都互相认识。但随着技术的进步,小公司连接到电话网络……在网络中有一些不受信任的团体,这些团体本质上造成了很多这样的问题。FCC目前是如何处理语音电话的?有一种名为STIR/SHAKEN的协议,[或使用令牌对断言信息的安全电话身份重访/基于签名的处理,FCC在2021年开始要求]。当你进行语音通话时,它会添加一个字段,表示“我是这个实体,我已经验证了来电显示。”这允许任何传输请求的人看到消息头说,“好的,我可以用密码学验证,是的,这实际上是发起者[呼叫]。” 现在的问题是,如果一个电话来自海外的VoIP(互联网语音协议)提供商。美国运营商如何验证这个电话号码?联邦通信委员会所做的就是创建这个系统,其中有一个语音呼叫缓解数据库。作为外国网络电话和其他电话服务的连接点的美国公司必须注册,并说:“这些是我们正在采取的步骤,以核实这些[海外]电话号码。”(美国现在允许电话供应商取消不遵守这些标准的供应商的流量。联邦通信委员会实际上命令公司屏蔽(已知的汽车保修)语音电话骗局。所以STIR/SHAKEN本身并不是对自动电话的防御。这是对更改来电显示的防御,这是这些骗局的重要组成部分。还有什么其他技术可以用来检测和防止语音电话?您可能会使用某种类型的模式检测,基于:这些调用来自哪里?人们接这个电话的次数是多少?通话时间是多长?所有这些类型的事情[很重要],因为你试图识别尽可能多的不同特征,以区分好呼叫和坏呼叫。让来电显示恢复信任是非常重要的。你还可以设置假电话号码——用网络安全术语来说,就是一个蜜罐。你制造假号码,不给任何人,所以任何打给这些号码的电话都是多余的。你可以使用一些自动化系统来接听电话,听录音,然后也许你有一个人或一个自动化系统试图做出决定:这是一个骗局还是一个语音电话?然后你可以用它反馈到你的探测系统。我认为,消极因素会让企业说:“作为一个合法的企业,我们不应该这样做。”总部位于德克萨斯州的医疗保险电话推销员因拨打约10亿次语音电话而被罚款2.25亿美元。你可以看到技术措施和政策措施的组合,旨在弥补这些漏洞。这能阻止其他国家的犯罪分子诈骗吗?可能不会。我们可以做的一件事就是让打十亿次电话的成本更高。我希望这将有助于遏制这一趋势。如何阻止骗子以其他方式锁定目标人群?当你研究网络犯罪时,关键是:人类在寻找新的犯罪方式方面非常有弹性。(如果电话变得更贵),另一种选择是骗子将转向其他平台,这一点我们已经看到了。他们会转而发送WhatsApp信息或Twitter垃圾邮件。我认为这是一个更好的情况。如果你是电话公司,你不知道当有人接听电话时会说什么。你有网络中的模式,你有它的来源,但从根本上说,你没有骗局的内容。通过短信,你就可以获得这些内容。这个问题变得更类似于电子邮件垃圾邮件。如果您使用像Gmail这样的东西,那么垃圾邮件检测功能非常好,您可能每个月都会收到一条消息。从根本上说,现在,当你的手机响起时,你很难相信它。我认为,一个我们可以再次相信电话的世界——或者也许可以为收到电话而感到兴奋,而不是像“哦,有人想要骗我”那样——是一个更好的世界。我认为我们正在慢慢地实现这一点。
您觉得本篇内容如何
评分

评论

您需要登录才可以回复|注册

提交评论

scientific

这家伙很懒,什么描述也没留下

关注

点击进入下一篇

如何投资无人机行业:深入研究无人机ETF

提取码
复制提取码
点击跳转至百度网盘