SlideShare a Scribd company logo
1 of 35
Users Really Do Answer
Telephone Scams
Huahong Tu (Raymond), UMD
Adam Doupé, ASU
Ziming Zhao, RIT
Gail-Joon Ahn, ASU & Samsung
Distinguished Paper Award Aug 15, 2019#usesec19
What inspired our research?
Research Question
•What causes the users to answer
and fall victim to telephone
scams?
Collect and listen to scam samples
• Collected over 150 telephone scam samples from the IRS,
YouTube, Sound Cloud, News sites, etc.
• Listened to each them identify different attributes.
What are the telephone scam attributes we’ve identified?
• Area Code: e.g. Washington (202), Local (480), Toll Free (800)
• Caller Name: a known name displayed with the caller ID
• Voice Production: e.g. human or synthesized voice
• Gender: e.g. male or female voice
• Accent: e.g. American or Indian accent
Entity: who to impersonate, e.g. IRS or the university’s HR dept
Scenario: provide motivation to divulge SSN, e.g. tax or payroll
• Design a minimum set of experiments
that allow comparison of different
properties of an attribute with a set
of standard background conditions.
How did we design our experiments?
List of all our experiments and their attribute properties
Caller ID Area Code Location Caller Name Voice Production Gender Accent Entity Scenario
E1 202-869-XXX5 Washington, DC N/A Synthesizer Male American IRS Tax Lawsuit
E2 800-614-XXX9 Toll-free N/A Synthesizer Male American IRS Tax Lawsuit
E3 480-939-XXX6 University Location N/A Synthesizer Male American IRS Tax Lawsuit
E4 202-869-XXX0 Washington, DC N/A Synthesizer Female American IRS Tax Lawsuit
E5 202-869-XXX2 Washington, DC N/A Synthesizer Male American IRS Unclaimed Tax Return
E6 202-849-XXX7 Washington, DC N/A Human Male American IRS Tax Lawsuit
E7 202-869-XXX4 Washington, DC N/A Human Male Indian IRS Tax Lawsuit
E8 480-462-XXX3 University Location N/A Synthesizer Male American ASU Payroll Withheld
E9 480-462-XXX5 University Location W-2 Administration Synthesizer Male American ASU Payroll Withheld
E10 480-462-XXX7 University Location N/A Synthesizer Male American ASU Bonus Issued
How we gathered our phone number recipients?
• Downloaded our university’s public phone directory
associated with our staffs and faculties.
• Removed telephone numbers of people already aware of
the study.
• Randomly selected 3,000 telephone numbers and
assigned 300 to each experiment.
Steps we took to mitigate the risks to our recipients
• Worked with IRB on our experimental process.
• In all experiments, no SSN was actually collected.
• Upon entering any SSN digit, the user was immediately informed
that the call was just an experiment, and no SSN was actually
collected, IRB contact was given at the end.
• Each recipient only received one phone call.
• Prior to dissemination, we communicated and coordinated with
the HR dept and tech support office.
Dissemination
• Set up our experiments using an online robocalling
platform.
• 10 experiments can run simultaneously.
• Limited all experiments to a single work week, duringthe
work hours of 10am – 5pm.
• Outbound and return calls were directed to start of each
experiment’s standard procedure.
The standard procedure of each experiment
e.g.
e.g.
e.g.
e.g.
e.g.
Call log of recipients that pressed 1 to continue
Incidents during call dissemination
Day 1 Day 2 Day 3 Day 4 Day 5
Day 1 Day 2 Day 3 Day 4 Day 5
• 2 hours and 45 minutes since launch:
• The school of journalism and mass communication
identified our scam calls…
• They did not consult with the IT department and sent out
mass emails in their dept to warn about the scam calls.
Day 1 Day 2 Day 3 Day 4 Day 5
• 4 hours and 22 minutes since launch:
• The university’s telephone service office started blocking
our phone calls…
• Our calls were triggering IT system alerts as they were
exhausting the university’s telephone trunk routes.
• So we had to reduce the rate of outgoing calls.
Day 1 Day 2 Day 3 Day 4 Day 5
• Day 2 since launch:
• The IRB received many complaints…
• So they asked us to pause our experiments so that they
could review the study was proceeding as described.
• 12 hours later, after review, they found everything was in
order, and suggested we proceed.
Day 1 Day 2 Day 3 Day 4 Day 5
Collected Results
Continued Entered SSN Convinced Recordings Unconvinced Recordings
E1 12 4.00% 6 2.00% 0 0.00% 0 0.00% 4 1.33% 2 0.67%
E2 19 6.33% 15 5.00% 3 1.00% 0 0.00% 3 1.00% 3 1.00%
E3 13 4.33% 8 2.67% 1 0.33% 1 0.33% 2 0.67% 1 0.33%
E4 23 7.67% 13 4.33% 2 0.67% 0 0.00% 3 1.00% 2 0.67%
E5 9 3.00% 2 0.67% 1 0.33% 0 0.00% 1 0.33% 1 0.33%
E6 9 3.00% 8 2.67% 2 0.67% 2 0.67% 2 0.67% 1 0.33%
E7 13 4.33% 9 3.00% 3 1.00% 1 0.33% 5 1.67% 4 1.33%
E8 53 17.67% 30 10.00% 8 2.67% 3 1.00% 9 3.00% 8 2.67%
E9 60 20.00% 35 11.67% 7 2.33% 3 1.00% 4 1.33% 3 1.00%
E10 45 15.00% 22 7.33% 8 2.67% 7 2.33% 4 1.33% 2 0.67%
Total 256 8.53% 148 4.93% 35 1.17% 17 0.57% 37 1.23% 27 0.90%
Finding an Analysis Metric
• Entered SSN: # of users entered a digit when asked for
last 4 SSN digits
Issue: Too lax as a measure since users could have
enter fake SSNs
Convinced: # of users enter 1 indicating that they were
convinced by the scam
Issue: Too sparse as users rarely indicated that they
were convinced by the scam
Our Chosen Metric
• Possibly Tricked: # of users Entered SSN - Unconvinced
–A more reasonable estimate of the actual number of
recipients that fell for the scam that is not too lax and
not too sparse.
Results of Possibly Tricked
10.33%
7.00%
6.00%
4.00%
3.33%
2.00% 2.00%
1.33%
0.67% 0.33%
E9 E8 E10 E2 E4 E3 E6 E7 E10 E5
Results of Possibly Tricked
10.33%
7.00%
6.00%
4.00%
3.33%
2.00% 2.00%
1.33%
0.67% 0.33%
E9 E8 E10 E2 E4 E3 E6 E7 E10 E5
Your payroll is withheld by the University,
Caller ID shows W-2 Administration
Results of Possibly Tricked
10.33%
7.00%
6.00%
4.00%
3.33%
2.00% 2.00%
1.33%
0.67% 0.33%
E9 E8 E10 E2 E4 E3 E6 E7 E10 E5
You have an Unclaimed
Tax Return from the IRS
Linear regression coefficients of all attribute properties
Local
TollFree
Washington,DC
Unknown
Known
Synthetic
Human
Male
Female
American
Indian
IRS
ASU
TaxLawsuit
UnclaimedTaxReturn
PayrollWithheld
BonusIssued
Area Code Caller
Name
Voice
Production
Gender Accent Entity Scenario
Statistical significance & effect size of comparable
attribute properties
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
Entity Scenario
(IRS vs. HR)
Area Code
(202 vs. 800)
Voice Gender
(Male vs.
Female)
Voice
Production
(Synthetic vs.
Human)
Motivation
(Reward vs.
Fear)
Caller Name
(Unknown vs.
Known)
Voice Accent
(Indian vs.
American)
Conclusive Somewhat Not Conclusive
Adjusted p-Value Effect Size
Reasons Convinced
2
2
3
4
Trusted the caller ID number / name
Trusted the work phone
Sounded legit / believeable
To get paid / the bonus
Reasons Unconvinced
1
2
2
2
2
3
3
16
Synthetic voice
Did not sound legit / convincing
Indian accent
Asked to enter SSN
Did not asked for full SSN
Not from ASU caller ID number
Already aware of scams like this
The IRS / ASU won't make calls like this
Spearphishing is effective
• Telephone scammers may spoof a
known caller ID name and voice a
plausible scenario to make the scam
exceptionally convincing.
Ways to protect the users
• Make the users be aware of telephone scams.
• E.g. The HR won’t make calls like this
• Adopt caller ID authentication technology.
• Provide safeguards against caller ID spoofing
• Fight malicious calls with a caller ID reputation system
• More research into the understanding of scammers.
Thank you for your attention!
Post your questions to @h2raymond

More Related Content

Similar to Users really do answer telephone scams USENIX Security 2019 Presentation

Infographic analytics infographic_illustrations_121117-2
Infographic analytics infographic_illustrations_121117-2Infographic analytics infographic_illustrations_121117-2
Infographic analytics infographic_illustrations_121117-2Richard Smiraldi
 
How To Write A Essay Step By Ste
How To Write A Essay Step By SteHow To Write A Essay Step By Ste
How To Write A Essay Step By SteAlicia Stoddard
 
Walking Through The Aisle of Artificial Intelligence
Walking Through The Aisle of  Artificial IntelligenceWalking Through The Aisle of  Artificial Intelligence
Walking Through The Aisle of Artificial IntelligenceSridhar Seshadri
 
04 01-2011 express poll 5000
04 01-2011 express poll 500004 01-2011 express poll 5000
04 01-2011 express poll 5000mikecgonz
 
Human Face Identification
Human Face IdentificationHuman Face Identification
Human Face Identificationbhupesh lahare
 
KLA Your View Panel.pptx
KLA Your View Panel.pptxKLA Your View Panel.pptx
KLA Your View Panel.pptxJasonViviers2
 
Benfords Law
Benfords LawBenfords Law
Benfords LawEd Tobias
 
Best Essay Titles Ever. Create Your Best Title With An Essay Title ...
Best Essay Titles Ever. Create Your Best Title With An Essay Title ...Best Essay Titles Ever. Create Your Best Title With An Essay Title ...
Best Essay Titles Ever. Create Your Best Title With An Essay Title ...Aaron Anyaakuu
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShravan Halankar
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfpreethi3173
 
City of Oakland - Client Presentation
City of Oakland - Client PresentationCity of Oakland - Client Presentation
City of Oakland - Client PresentationJoseph Duffy, MBA
 
Relationships Essay Introduction
Relationships Essay IntroductionRelationships Essay Introduction
Relationships Essay IntroductionAngel Morris
 
Satisfying Auditors: Plans and Evidence in a Regulated Environment
Satisfying Auditors: Plans and Evidence in a Regulated EnvironmentSatisfying Auditors: Plans and Evidence in a Regulated Environment
Satisfying Auditors: Plans and Evidence in a Regulated EnvironmentTechWell
 
'Conducing Security Investigations' Webinar 1-17-2012
'Conducing Security Investigations' Webinar 1-17-2012'Conducing Security Investigations' Webinar 1-17-2012
'Conducing Security Investigations' Webinar 1-17-2012SkylerWeisenburger
 
Creating a Big data Strategy with Tactics for Quick Implementation
Creating a Big data Strategy with Tactics for Quick ImplementationCreating a Big data Strategy with Tactics for Quick Implementation
Creating a Big data Strategy with Tactics for Quick ImplementationLewandog, Inc,
 
E-Voting and Credible Elections in Nigeria
E-Voting and Credible Elections in NigeriaE-Voting and Credible Elections in Nigeria
E-Voting and Credible Elections in Nigeriainventionjournals
 

Similar to Users really do answer telephone scams USENIX Security 2019 Presentation (20)

Infographic analytics infographic_illustrations_121117-2
Infographic analytics infographic_illustrations_121117-2Infographic analytics infographic_illustrations_121117-2
Infographic analytics infographic_illustrations_121117-2
 
How To Write A Essay Step By Ste
How To Write A Essay Step By SteHow To Write A Essay Step By Ste
How To Write A Essay Step By Ste
 
Walking Through The Aisle of Artificial Intelligence
Walking Through The Aisle of  Artificial IntelligenceWalking Through The Aisle of  Artificial Intelligence
Walking Through The Aisle of Artificial Intelligence
 
Essay Similarity
Essay SimilarityEssay Similarity
Essay Similarity
 
04 01-2011 express poll 5000
04 01-2011 express poll 500004 01-2011 express poll 5000
04 01-2011 express poll 5000
 
Ravi Ravani CV.
Ravi Ravani CV.Ravi Ravani CV.
Ravi Ravani CV.
 
AUDITO TOOLS
AUDITO TOOLSAUDITO TOOLS
AUDITO TOOLS
 
Human Face Identification
Human Face IdentificationHuman Face Identification
Human Face Identification
 
KLA Your View Panel.pptx
KLA Your View Panel.pptxKLA Your View Panel.pptx
KLA Your View Panel.pptx
 
Benfords Law
Benfords LawBenfords Law
Benfords Law
 
Best Essay Titles Ever. Create Your Best Title With An Essay Title ...
Best Essay Titles Ever. Create Your Best Title With An Essay Title ...Best Essay Titles Ever. Create Your Best Title With An Essay Title ...
Best Essay Titles Ever. Create Your Best Title With An Essay Title ...
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 
City of Oakland - Client Presentation
City of Oakland - Client PresentationCity of Oakland - Client Presentation
City of Oakland - Client Presentation
 
Relationships Essay Introduction
Relationships Essay IntroductionRelationships Essay Introduction
Relationships Essay Introduction
 
Final Forensics Project
Final Forensics Project Final Forensics Project
Final Forensics Project
 
Satisfying Auditors: Plans and Evidence in a Regulated Environment
Satisfying Auditors: Plans and Evidence in a Regulated EnvironmentSatisfying Auditors: Plans and Evidence in a Regulated Environment
Satisfying Auditors: Plans and Evidence in a Regulated Environment
 
'Conducing Security Investigations' Webinar 1-17-2012
'Conducing Security Investigations' Webinar 1-17-2012'Conducing Security Investigations' Webinar 1-17-2012
'Conducing Security Investigations' Webinar 1-17-2012
 
Creating a Big data Strategy with Tactics for Quick Implementation
Creating a Big data Strategy with Tactics for Quick ImplementationCreating a Big data Strategy with Tactics for Quick Implementation
Creating a Big data Strategy with Tactics for Quick Implementation
 
E-Voting and Credible Elections in Nigeria
E-Voting and Credible Elections in NigeriaE-Voting and Credible Elections in Nigeria
E-Voting and Credible Elections in Nigeria
 

Recently uploaded

Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...ThinkInnovation
 
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarjSCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarjadimosmejiaslendon
 
原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证pwgnohujw
 
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...BabaJohn3
 
How to Transform Clinical Trial Management with Advanced Data Analytics
How to Transform Clinical Trial Management with Advanced Data AnalyticsHow to Transform Clinical Trial Management with Advanced Data Analytics
How to Transform Clinical Trial Management with Advanced Data AnalyticsBrainSell Technologies
 
Audience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptxAudience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptxStephen266013
 
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...Klinik Aborsi
 
Northern New England Tableau User Group (TUG) May 2024
Northern New England Tableau User Group (TUG) May 2024Northern New England Tableau User Group (TUG) May 2024
Northern New England Tableau User Group (TUG) May 2024patrickdtherriault
 
Formulas dax para power bI de microsoft.pdf
Formulas dax para power bI de microsoft.pdfFormulas dax para power bI de microsoft.pdf
Formulas dax para power bI de microsoft.pdfRobertoOcampo24
 
Bios of leading Astrologers & Researchers
Bios of leading Astrologers & ResearchersBios of leading Astrologers & Researchers
Bios of leading Astrologers & Researchersdarmandersingh4580
 
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一fztigerwe
 
edited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdfedited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdfgreat91
 
obat aborsi Bontang wa 081336238223 jual obat aborsi cytotec asli di Bontang6...
obat aborsi Bontang wa 081336238223 jual obat aborsi cytotec asli di Bontang6...obat aborsi Bontang wa 081336238223 jual obat aborsi cytotec asli di Bontang6...
obat aborsi Bontang wa 081336238223 jual obat aborsi cytotec asli di Bontang6...yulianti213969
 
Digital Marketing Demystified: Expert Tips from Samantha Rae Coolbeth
Digital Marketing Demystified: Expert Tips from Samantha Rae CoolbethDigital Marketing Demystified: Expert Tips from Samantha Rae Coolbeth
Digital Marketing Demystified: Expert Tips from Samantha Rae CoolbethSamantha Rae Coolbeth
 
The Significance of Transliteration Enhancing
The Significance of Transliteration EnhancingThe Significance of Transliteration Enhancing
The Significance of Transliteration Enhancingmohamed Elzalabany
 
MATERI MANAJEMEN OF PENYAKIT TETANUS.ppt
MATERI  MANAJEMEN OF PENYAKIT TETANUS.pptMATERI  MANAJEMEN OF PENYAKIT TETANUS.ppt
MATERI MANAJEMEN OF PENYAKIT TETANUS.pptRachmaGhifari
 
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证zifhagzkk
 
Sensing the Future: Anomaly Detection and Event Prediction in Sensor Networks
Sensing the Future: Anomaly Detection and Event Prediction in Sensor NetworksSensing the Future: Anomaly Detection and Event Prediction in Sensor Networks
Sensing the Future: Anomaly Detection and Event Prediction in Sensor NetworksBoston Institute of Analytics
 
Predictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting TechniquesPredictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting TechniquesBoston Institute of Analytics
 

Recently uploaded (20)

Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
 
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarjSCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
 
原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证
 
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...
 
How to Transform Clinical Trial Management with Advanced Data Analytics
How to Transform Clinical Trial Management with Advanced Data AnalyticsHow to Transform Clinical Trial Management with Advanced Data Analytics
How to Transform Clinical Trial Management with Advanced Data Analytics
 
Audience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptxAudience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptx
 
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
 
Northern New England Tableau User Group (TUG) May 2024
Northern New England Tableau User Group (TUG) May 2024Northern New England Tableau User Group (TUG) May 2024
Northern New England Tableau User Group (TUG) May 2024
 
Formulas dax para power bI de microsoft.pdf
Formulas dax para power bI de microsoft.pdfFormulas dax para power bI de microsoft.pdf
Formulas dax para power bI de microsoft.pdf
 
Bios of leading Astrologers & Researchers
Bios of leading Astrologers & ResearchersBios of leading Astrologers & Researchers
Bios of leading Astrologers & Researchers
 
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
 
edited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdfedited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdf
 
obat aborsi Bontang wa 081336238223 jual obat aborsi cytotec asli di Bontang6...
obat aborsi Bontang wa 081336238223 jual obat aborsi cytotec asli di Bontang6...obat aborsi Bontang wa 081336238223 jual obat aborsi cytotec asli di Bontang6...
obat aborsi Bontang wa 081336238223 jual obat aborsi cytotec asli di Bontang6...
 
Digital Marketing Demystified: Expert Tips from Samantha Rae Coolbeth
Digital Marketing Demystified: Expert Tips from Samantha Rae CoolbethDigital Marketing Demystified: Expert Tips from Samantha Rae Coolbeth
Digital Marketing Demystified: Expert Tips from Samantha Rae Coolbeth
 
The Significance of Transliteration Enhancing
The Significance of Transliteration EnhancingThe Significance of Transliteration Enhancing
The Significance of Transliteration Enhancing
 
MATERI MANAJEMEN OF PENYAKIT TETANUS.ppt
MATERI  MANAJEMEN OF PENYAKIT TETANUS.pptMATERI  MANAJEMEN OF PENYAKIT TETANUS.ppt
MATERI MANAJEMEN OF PENYAKIT TETANUS.ppt
 
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotecAbortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
 
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
 
Sensing the Future: Anomaly Detection and Event Prediction in Sensor Networks
Sensing the Future: Anomaly Detection and Event Prediction in Sensor NetworksSensing the Future: Anomaly Detection and Event Prediction in Sensor Networks
Sensing the Future: Anomaly Detection and Event Prediction in Sensor Networks
 
Predictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting TechniquesPredictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting Techniques
 

Users really do answer telephone scams USENIX Security 2019 Presentation

  • 1. Users Really Do Answer Telephone Scams Huahong Tu (Raymond), UMD Adam Doupé, ASU Ziming Zhao, RIT Gail-Joon Ahn, ASU & Samsung Distinguished Paper Award Aug 15, 2019#usesec19
  • 2. What inspired our research?
  • 3. Research Question •What causes the users to answer and fall victim to telephone scams?
  • 4. Collect and listen to scam samples • Collected over 150 telephone scam samples from the IRS, YouTube, Sound Cloud, News sites, etc. • Listened to each them identify different attributes.
  • 5. What are the telephone scam attributes we’ve identified? • Area Code: e.g. Washington (202), Local (480), Toll Free (800) • Caller Name: a known name displayed with the caller ID • Voice Production: e.g. human or synthesized voice • Gender: e.g. male or female voice • Accent: e.g. American or Indian accent Entity: who to impersonate, e.g. IRS or the university’s HR dept Scenario: provide motivation to divulge SSN, e.g. tax or payroll
  • 6. • Design a minimum set of experiments that allow comparison of different properties of an attribute with a set of standard background conditions. How did we design our experiments?
  • 7. List of all our experiments and their attribute properties Caller ID Area Code Location Caller Name Voice Production Gender Accent Entity Scenario E1 202-869-XXX5 Washington, DC N/A Synthesizer Male American IRS Tax Lawsuit E2 800-614-XXX9 Toll-free N/A Synthesizer Male American IRS Tax Lawsuit E3 480-939-XXX6 University Location N/A Synthesizer Male American IRS Tax Lawsuit E4 202-869-XXX0 Washington, DC N/A Synthesizer Female American IRS Tax Lawsuit E5 202-869-XXX2 Washington, DC N/A Synthesizer Male American IRS Unclaimed Tax Return E6 202-849-XXX7 Washington, DC N/A Human Male American IRS Tax Lawsuit E7 202-869-XXX4 Washington, DC N/A Human Male Indian IRS Tax Lawsuit E8 480-462-XXX3 University Location N/A Synthesizer Male American ASU Payroll Withheld E9 480-462-XXX5 University Location W-2 Administration Synthesizer Male American ASU Payroll Withheld E10 480-462-XXX7 University Location N/A Synthesizer Male American ASU Bonus Issued
  • 8. How we gathered our phone number recipients? • Downloaded our university’s public phone directory associated with our staffs and faculties. • Removed telephone numbers of people already aware of the study. • Randomly selected 3,000 telephone numbers and assigned 300 to each experiment.
  • 9. Steps we took to mitigate the risks to our recipients • Worked with IRB on our experimental process. • In all experiments, no SSN was actually collected. • Upon entering any SSN digit, the user was immediately informed that the call was just an experiment, and no SSN was actually collected, IRB contact was given at the end. • Each recipient only received one phone call. • Prior to dissemination, we communicated and coordinated with the HR dept and tech support office.
  • 10. Dissemination • Set up our experiments using an online robocalling platform. • 10 experiments can run simultaneously. • Limited all experiments to a single work week, duringthe work hours of 10am – 5pm. • Outbound and return calls were directed to start of each experiment’s standard procedure.
  • 11. The standard procedure of each experiment
  • 12. e.g.
  • 13. e.g.
  • 14. e.g.
  • 15. e.g.
  • 16. e.g.
  • 17. Call log of recipients that pressed 1 to continue
  • 18. Incidents during call dissemination Day 1 Day 2 Day 3 Day 4 Day 5
  • 19. Day 1 Day 2 Day 3 Day 4 Day 5 • 2 hours and 45 minutes since launch: • The school of journalism and mass communication identified our scam calls… • They did not consult with the IT department and sent out mass emails in their dept to warn about the scam calls.
  • 20. Day 1 Day 2 Day 3 Day 4 Day 5 • 4 hours and 22 minutes since launch: • The university’s telephone service office started blocking our phone calls… • Our calls were triggering IT system alerts as they were exhausting the university’s telephone trunk routes. • So we had to reduce the rate of outgoing calls.
  • 21. Day 1 Day 2 Day 3 Day 4 Day 5 • Day 2 since launch: • The IRB received many complaints… • So they asked us to pause our experiments so that they could review the study was proceeding as described. • 12 hours later, after review, they found everything was in order, and suggested we proceed.
  • 22. Day 1 Day 2 Day 3 Day 4 Day 5
  • 23. Collected Results Continued Entered SSN Convinced Recordings Unconvinced Recordings E1 12 4.00% 6 2.00% 0 0.00% 0 0.00% 4 1.33% 2 0.67% E2 19 6.33% 15 5.00% 3 1.00% 0 0.00% 3 1.00% 3 1.00% E3 13 4.33% 8 2.67% 1 0.33% 1 0.33% 2 0.67% 1 0.33% E4 23 7.67% 13 4.33% 2 0.67% 0 0.00% 3 1.00% 2 0.67% E5 9 3.00% 2 0.67% 1 0.33% 0 0.00% 1 0.33% 1 0.33% E6 9 3.00% 8 2.67% 2 0.67% 2 0.67% 2 0.67% 1 0.33% E7 13 4.33% 9 3.00% 3 1.00% 1 0.33% 5 1.67% 4 1.33% E8 53 17.67% 30 10.00% 8 2.67% 3 1.00% 9 3.00% 8 2.67% E9 60 20.00% 35 11.67% 7 2.33% 3 1.00% 4 1.33% 3 1.00% E10 45 15.00% 22 7.33% 8 2.67% 7 2.33% 4 1.33% 2 0.67% Total 256 8.53% 148 4.93% 35 1.17% 17 0.57% 37 1.23% 27 0.90%
  • 24. Finding an Analysis Metric • Entered SSN: # of users entered a digit when asked for last 4 SSN digits Issue: Too lax as a measure since users could have enter fake SSNs Convinced: # of users enter 1 indicating that they were convinced by the scam Issue: Too sparse as users rarely indicated that they were convinced by the scam
  • 25. Our Chosen Metric • Possibly Tricked: # of users Entered SSN - Unconvinced –A more reasonable estimate of the actual number of recipients that fell for the scam that is not too lax and not too sparse.
  • 26. Results of Possibly Tricked 10.33% 7.00% 6.00% 4.00% 3.33% 2.00% 2.00% 1.33% 0.67% 0.33% E9 E8 E10 E2 E4 E3 E6 E7 E10 E5
  • 27. Results of Possibly Tricked 10.33% 7.00% 6.00% 4.00% 3.33% 2.00% 2.00% 1.33% 0.67% 0.33% E9 E8 E10 E2 E4 E3 E6 E7 E10 E5 Your payroll is withheld by the University, Caller ID shows W-2 Administration
  • 28. Results of Possibly Tricked 10.33% 7.00% 6.00% 4.00% 3.33% 2.00% 2.00% 1.33% 0.67% 0.33% E9 E8 E10 E2 E4 E3 E6 E7 E10 E5 You have an Unclaimed Tax Return from the IRS
  • 29. Linear regression coefficients of all attribute properties Local TollFree Washington,DC Unknown Known Synthetic Human Male Female American Indian IRS ASU TaxLawsuit UnclaimedTaxReturn PayrollWithheld BonusIssued Area Code Caller Name Voice Production Gender Accent Entity Scenario
  • 30. Statistical significance & effect size of comparable attribute properties 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 Entity Scenario (IRS vs. HR) Area Code (202 vs. 800) Voice Gender (Male vs. Female) Voice Production (Synthetic vs. Human) Motivation (Reward vs. Fear) Caller Name (Unknown vs. Known) Voice Accent (Indian vs. American) Conclusive Somewhat Not Conclusive Adjusted p-Value Effect Size
  • 31. Reasons Convinced 2 2 3 4 Trusted the caller ID number / name Trusted the work phone Sounded legit / believeable To get paid / the bonus
  • 32. Reasons Unconvinced 1 2 2 2 2 3 3 16 Synthetic voice Did not sound legit / convincing Indian accent Asked to enter SSN Did not asked for full SSN Not from ASU caller ID number Already aware of scams like this The IRS / ASU won't make calls like this
  • 33. Spearphishing is effective • Telephone scammers may spoof a known caller ID name and voice a plausible scenario to make the scam exceptionally convincing.
  • 34. Ways to protect the users • Make the users be aware of telephone scams. • E.g. The HR won’t make calls like this • Adopt caller ID authentication technology. • Provide safeguards against caller ID spoofing • Fight malicious calls with a caller ID reputation system • More research into the understanding of scammers.
  • 35. Thank you for your attention! Post your questions to @h2raymond

Editor's Notes

  1. Hi my name is Raymond tu from the university of Maryland, today, it is my pleasure to talk about our research on telephone scams. I’m very grateful for receiving the distinguished paper award.
  2. Let me ask you all a question: how many received a robocall today? How many of you have never received a robocall. Robocall is such a problem, john oliver did an entire episode on it According to the fcc, nearly half of the call you receive will be spam, scam or robocalls. We understand this is a serious issue, to do something about, inspired by a fellow research paper by matt tisher 3 years ago at Oakland, which I was also there with a paper. In this research, we have decided to ask the question,
  3. What causes the users to answer and fall victim to telephone scam? So, How did we conduct our research?
  4. Remove the animations How to Conduct a Study like this? We scammed people, and here’s how we did it First, we collected 100+ scam samples And identified attributes Rather than simply replicating the scams, we broke the scams into visual and voice attributes And our experiments were designed to test these attributes and see what made the most impact to the attack success So after we designed the experiments, we Disseminate phone calls, Collect and tabulate results, Select analysis criteria and present analysis results, and Provide evaluations and recommendations
  5. First, to understand what contributes to telephone scams, we collected over 150 telephone scam samples from various public sources and listened to all of them with the goal to identify different attributes.
  6. After listening to the scam samples, what are the scam attributes we identified? Here’s the list of attributes that we identified: Area Code: e.g. 202, 480, 800 Caller Name: name associated with the caller ID Voice Production: e.g. human or synthesized Gender: e.g. male or female Accent: e.g. American or Indian Entity: who to impersonate, e.g. IRS or HR Scenario: motivation to divulge SSN, e.g. tax or payroll issue scenario With these attributes in mind, how did you did design our experiments
  7. This is our design principle: Design a minimum set of experiments that allow comparison of different properties of an attribute with a set of standard background conditions.
  8. And so here is the list of all our experiments and their attribute properties. There are 10 experiments in total, every one of them is design to test specific type of attribute property. With 10 experiment we have, the next step is to gather the phone recipients for our experiments.
  9. To do that, we emulated what a real world spammer would do, that is to download or crawl our university’s public telephone directory associated with our staffs and faculties. After gathering those phone numbers, we removed the numbers of those people that were already aware of our study, such as people we worked with from the IT and IRB department. After that, we randomly selected 3000 phone numbers and assigned 300 to each experiment.
  10. Also to migrate the risks to our recipients, we worked the IRB to design our experimental process. For instance, in all experiments, we made sure that no ssn was actually collected. And, upon entering any ssn digit, the user was immediately informed that was actually just an experiment, no ssn was collected and IRB contact information was also given. Also, each recipient would also receive one phone call from us. Finally, prior to dissemination, we coordinated with the HR dept and tech support office to ensure proper response to our calls.
  11. With that out of the way, to ensure the entire procedure was completely standardized and automated, we set up our experiments using an online robocalling platform. In the online platform, we set up our account with 10 different campaigns, so that the 10 experiments can run simultaneously. We also limited the experiments to a single work week, during the work hours of 10am – 5pm. Finally, in each experiment, the outbound and return calls were directed to the start of each experiment’s standard procedure.
  12. So here’s what the standard procedure looks like:
  13. First, we start with ringing the recipient’s work phone and displaying the visual attributes of the experiment. Here for example, we show a 480 area code that is local to our university’s location.
  14. If the recipient picked up the phone, we played what we called a “scenario announcement message” with the voice attributes of the experiment. Here’s an example. At the end, we asked the recipient to continue by pressing 1, if they did so,
  15. We play a follow up message that requests the recipient to enter the last 4 digits of their social security number. Here’s what it sound like. During this step, if the user press any digit on the phone, it is immediately directed to the next step
  16. At this point, the user hears a debriefing announcement, and asked them to participate in our survey. Here’s what it sounds like, it’s very long so I will just play a part of it. At the end of this message, we asked user to participate in our survey by pressing 1, if they pressed 1 to continue,
  17. Here we followed up with some survey questions, we asked questions like “were you convinced by the scam?”, “what were the reasons you were convinced or unconvinced by the scam?” and then we record their voice responses. Here’s what the first question sounds like. After this step, they will hear an IRB statement and a contact info for any questions or concerns. That’s standard procedure of each call, so we were ready to actually start sending out our calls,
  18. Here’s the call logs of all recipents by that pressed 1 to continue during the experiments. As you can see, during the dissemination, several incidents happened that come up unexpected.
  19. At 2 hours and 45 minutes since launch, The School of journalism and mass communication identified our scam calls. They did not consult with the IT department and sent out mass emails in their dept to warn about the scam calls.
  20. At 4 hours and 22 minutes since launch: The university’s telephone service office started blocking our phone calls… Our calls were triggering IT system alerts as they were exhausting the university’s telephone trunk routes. So we had to reduce the rate of outgoing calls.
  21. At Day 2 since launch: The IRB received many complaints… So they asked us to pause our experiments so that they could review the study was proceeding as described. 12 hours later, after review, they found everything was in order, and suggested we proceed.
  22. After completing the experiments, these are the results we collected: On the data we collected, there are 6 different actions that we measured Continued is the number of people continued after listening to the announcement message Entered is the number of people enter a digit of their social security number Convinced is the number of people explicitly stated that they were convinced by the scam during the survey question Recording is the number of people stated they the reason why they were convinced Unconvinced is the number of people explicitly stated that they were unconvinced by the scam during the survey question Recording is the number of people stated they the reason why they were unconvinced
  23. With our data, to perform an analysis, we needed to find an Analysis Metric. This was a challenging task because if we used Entered SSN as our metric, it could be too lax as a measure since users could have enter fake SSNs If we used Convinced as our metric, the data could be too sparse as users rarely indicated that they were convinced by the scam
  24. So in the end, we settle on Possibly Tricked as our metrics, which is derived from subtracting the # of Unconvinced from Entered SSN It provided a more reasonable estimate of the actual number of recipients that fell for the scam
  25. Here’s the result of Possibly Tricked across different experiments.
  26. For the most successful experiment, we had 10.3% receipeits possibly tricked.
  27. For least successful experiment, only 0.3% were possibly tricked.
  28. To better understand the attributes Further Analysis on Possibly Tricked, Comparing linear regression coefficients of all attribute properties. Comparing statistical significance & effect size of comparable attribute properties.
  29. In this chart, all attribute properties were overfitted on our possibly tricked data to get the linear regression coefficient
  30. The other analysis was Statistical significance & effect size, for comparable experiemtns for the comparable attribute properties, and found the changing he entity scenario had the most conclusion results. This is calculated based on the adj p-value which was stepped down using the holm-berferoni method, and the effect size which was based on cohens ‘d
  31. Finally, we also analyzed the recording of survey participants that stated that they were convinced by the scam, and here are the results.
  32. Here are the results for the Reasons Unconvinced, as you can see, main reaseaon they were unconvicend was because they suspected that the irs or asu won’t make calls like this.
  33. What can we learn from our study? Spearphishing is effective Telephone scammers may spoof a known caller ID name and voice a plausible scenario to make the scam exceptionally convincing.
  34. In defense, we recommend the following ways to Ways to protect the users Make the users be aware of telephone scams. Teaching users that The HR won’t make calls like this Adopt caller ID authentication technology. More research into the understanding of scammers.