[ad_1]
But this is not any call. It's from you.
This was played on a recent Wednesday night, when the caller ID of my iPhone showed my own phone number, as well as a picture of my face. It was an automated call using identity theft technology to pretend calling from my own number.
It was an automated pre-recorded message from "Microsoft" claiming that my computer's license was expiring. Knowing the exercise, I was not surprised to learn that I had 24 hours to react before going to jail.
Still, some experts warned that it was only a taster of the biggest dangers ahead: a world in which you receive automated calls from numbers you know and where the no one at the other end sounds like someone you know.
Spoofing, a form of robotic calling, is becoming more commonplace. This is when a person makes a call from an IP voice service, such as Skype, and can enter a host number. While the operator must provide a number when a call is made from a mobile phone or landline, any sequence of numbers can be entered via a VoIP service, whether it is a dialed number, a a number from your address book or from the White House. . It's so easy that everyone can do it.
Tarun Wadhwa, founder of technology consulting firm Day One Insights, says it's easy for strangers to find out who's close to you and what their personal contact information is on social media or other sites Web. Years of large-scale data breaches have put online the phone number, address, password and credit card information of millions of people, facilitating their insertion into a ploy.
"It will be like Photoshop – something so easy, widespread and well known that we stop following how it is used against people and that it does not surprise us," said Wadhwa, who has spent years in study problems related to identity, technology falsification and cybersecurity.
Wadhwa fears that this type of forgery technology can also ruin relationships and reputation.
"I can easily imagine situations in which this type of speech synthesis technology is used to confuse people, extort people and make fraud and scams much more precise," he said.
But Alex Quilici, CEO of the YouMail automated call prevention application, said it would require considerable work from the scammer.
"Building a fake computer voice right now is a decent job," said Quilici. "If I wanted to create one that looks like you, for example, I would need a ton of samples of you saying specific phonemes, and form a computer model about it."
He argues that it is easier, but nevertheless sophisticated, to call a number of a friend to tell him that he is in jail and that it must be bailed out. Or, it could mean calling your child's number from someone claiming to be a doctor, asking you to go to the hospital – only to be burglarized when you're out.
In general, I do not answer calls to unknown numbers, but it was difficult to resist that of me. According to Quilici, simply taking the phone can be a mistake. By answering a phone call, fraudsters know that my number is active and that I am ready to take it.
"Identity theft is becoming more common as fraudsters try to call with numbers less likely to be blocked," he said. "You do not block your own number and you are more likely to answer numbers that seem local."
But because it's a massive crossover – a person using an AT & T wireless phone will need to be verified when calling a Comcast landline – it's a big technical challenge. Some experts, like Wadhwa, fear that solutions will be obsolete by the time they arrive on the market.
Automated call scammers rely on cheap technology that works on a large scale, but new systems could become smarter and pose an even greater threat in the future.
"If we can not solve this problem, I think we will consider automated calls as a problem much easier to solve than what is in the pipeline," Wadhwa said.
[ad_2]
Source link