Perpetrators carrying out transnational telecommunications fraud originally came from Taichung. The typical pattern of attack is Taiwanese fraudsters relocate to a third country, such as Cambodia, to lure victims living in another country, such as China, to hand over money to local mules in person or deposit it in a local bank or virtual service account.
Initially, these fraudulent activities ran on telecommunications networks that required strong authentication, but since 2006, fraudsters have learned to exploit voice-over IP technology to evade detection and tracking by law enforcement agencies.
More recently, they have evolved to leverage more modern communication tools such as short message service, Facebook and other social networking sites.
As telecom fraud has grown more sophisticated and proliferated, it has become a major social problem. As a result, failure to eradicate telecom fraud has consistently ranked very high on surveys of public complaints about the government.
To curb telecom fraud, the National Communications Commission said it has urged telecoms to adopt the following two measures. First, the system should automatically block calls originating from numbers that have been blacklisted in a government-managed anti-fraud database. Second, when an incoming call begins with the numbers “+886,” indicating that the true source caller ID is masked, the system should display an alert to notify the callee.
Although these two measures might be helpful in stopping telecom fraud, they are not enough. Instead, the telecommunications industry should consider this pain point as a business opportunity, and take the initiative to leverage the massive amount of information available and the unique service position of a telecom to develop an easy-to-deploy solution that could solve the problem.
The following are three ideas that could effectively stop telecom fraud. They can operate independently, but also complement one another.
The first is to aggressively detect phone numbers that perpetrators use to carry out telecom fraud based on their specific usage patterns. Telecom fraudsters need to continuously make tens or hundreds of phone calls a day before they succeed in defrauding someone. As such, the caller’s number usually shows a unique combination of the following three call patterns: (1) the number of calls it makes within a unit of time is many times higher than that of phones used by ordinary people; (2) the numbers it calls are rarely repeated, and the callee numbers are not correlated in any obvious way; and (3) it rarely receives calls.
Based on the above patterns, after a telecom allocates a phone number to a new user, it should keep track of the usage pattern of this number for a period to determine whether it is being used for fraud.
The operator could work with law enforcement authorities to carry out an in-depth content analysis of some of the calls initiated by a suspect number to ascertain whether it is indeed being used for fraud. The implementation of the above mechanism is relatively straightforward, and the false positive rate is likely to be close to zero.
Telecom fraudsters take advantage of victims’ confusion and panic to induce them to make rash judgements. To combat this, telecoms could, using the latest telecom fraud techniques, mount high-fidelity simulated attacks on a target user, and, after each drill, explain to the “victim” the attacker’s specific techniques and their mistakes in the process, thereby enhancing each target user’s overall readiness to handle real-world fraudulent calls.
A similar drill mechanism has achieved great success in protecting users against malicious e-mail attacks, and should be equally effective in improving users’ immunity against telecom fraud. Moreover, since telecoms have access to subscribers’ personal information, they could leverage this to increase the degree of believability of simulated fraud attacks.
The third is to deploy a robot telephone assistant to answer calls from a unknown number, filter out fraudulent, advertising, sales or harassing calls, and then decide whether to transfer them to the user it serves. To do its job well, this robot assistant must keep abreast of the latest wording, routines and tricks used by telecom fraudsters. It should also have the capability to identify the caller’s organization, look up the organization’s number and call back. Such call-back capability would significantly increase the difficulty of perpetrating telecom fraud.
With the advent of ChatGPT, people are worried that telecom fraudsters might use the technology to automate and scale up their operations. However, the good guys could apply the same ChatGPT technology to, for example, facilitate the implementation of the three anti-telecom-fraud ideas described above.
In the constant technological tug-of-war between telecom fraudsters and their nemesis, which side eventually wins out would depend critically on the extent to which they could innovate on top of ChatGPT.
Chiueh Tzi-cker is a joint appointment professor in the Institute of Information Security at National Tsing Hua University.
Jan. 1 marks a decade since China repealed its one-child policy. Just 10 days before, Peng Peiyun (彭珮雲), who long oversaw the often-brutal enforcement of China’s family-planning rules, died at the age of 96, having never been held accountable for her actions. Obituaries praised Peng for being “reform-minded,” even though, in practice, she only perpetuated an utterly inhumane policy, whose consequences have barely begun to materialize. It was Vice Premier Chen Muhua (陳慕華) who first proposed the one-child policy in 1979, with the endorsement of China’s then-top leaders, Chen Yun (陳雲) and Deng Xiaoping (鄧小平), as a means of avoiding the
In the US’ National Security Strategy (NSS) report released last month, US President Donald Trump offered his interpretation of the Monroe Doctrine. The “Trump Corollary,” presented on page 15, is a distinctly aggressive rebranding of the more than 200-year-old foreign policy position. Beyond reasserting the sovereignty of the western hemisphere against foreign intervention, the document centers on energy and strategic assets, and attempts to redraw the map of the geopolitical landscape more broadly. It is clear that Trump no longer sees the western hemisphere as a peaceful backyard, but rather as the frontier of a new Cold War. In particular,
As the Chinese People’s Liberation Army (PLA) races toward its 2027 modernization goals, most analysts fixate on ship counts, missile ranges and artificial intelligence. Those metrics matter — but they obscure a deeper vulnerability. The true future of the PLA, and by extension Taiwan’s security, might hinge less on hardware than on whether the Chinese Communist Party (CCP) can preserve ideological loyalty inside its own armed forces. Iran’s 1979 revolution demonstrated how even a technologically advanced military can collapse when the social environment surrounding it shifts. That lesson has renewed relevance as fresh unrest shakes Iran today — and it should
The last foreign delegation Nicolas Maduro met before he went to bed Friday night (January 2) was led by China’s top Latin America diplomat. “I had a pleasant meeting with Qiu Xiaoqi (邱小琪), Special Envoy of President Xi Jinping (習近平),” Venezuela’s soon-to-be ex-president tweeted on Telegram, “and we reaffirmed our commitment to the strategic relationship that is progressing and strengthening in various areas for building a multipolar world of development and peace.” Judging by how minutely the Central Intelligence Agency was monitoring Maduro’s every move on Friday, President Trump himself was certainly aware of Maduro’s felicitations to his Chinese guest. Just