Category Archives: Fraud

Phone based legal advice

The Revival of Pay Per Minute Phone Services

Pay-per-minute phone services that were very popular in the 80s and 90s. There were inherent flaws in this system that eventually led to a decline in popularity, partially as a result of problems the companies faced. In the past few years, there has been a revival in these types of services thanks to innovative companies which are using technology to bypass previous limitations.

Premium rate phone service were accessed by dialing a specific number, typically starting with 1-900 or 1-976, and billed through the phone company. Typically, an initial fee was charged for connecting to the phone service followed by a smaller fee for every minute the calling party remained connected.

Most of the pay per minute phone services and 1-900 numbers were discontinued as a result of a large number of cases of fraud. People hacked phones to automatically make calls to these numbers each month which caused an individual to be billed unknowingly. Additionally, people with young children fell prey to these scams when their child would pick the phone up and dial a 1-900. There is a case where one child caused $17,000 of charges in one month, which ultimately led to phone companies cracking down on companies providing these services.

Tech companies have realized a great money making opportunity that has been made available by the disappearance of these 900 numbers. Keen.com, ether.com, ingenio.com, and prestoexperts.com are being used as online alternatives to this service. These companies are filling the void left by the retirement of 1-900 premium rate numbers and providing people with the services they desire which were previously unavailable.

All types of services are benefiting from these new call services: psychics, phone sex lines, technical support, counselors, life coaches, business analysts, financial advisors, tax and legal advice, and tutoring, just to name a few. Each of these services is backed by a stay-at-home professionals who are ready to help.

These sites each offer paid phone based advice which anyone can take advantage of. Keen.com has a large number of experts who specialize in psychic readings, tarot cards, and love and spiritual advice. Ether.com offers a wide variety of specialists ranging from medical advice to financial tips to counseling and therapy. Ingenio specializes in coaching: relationship, life, and family. PrestoExperts offers a similar selection to Ether. There are many topics including technology, health, and business.

Users of these sites have a simple but slightly different method of payment than what they may be used to. The websites offer a membership where you sign in and link your phone number to a registered credit card. After registration, use of the service is seamless. The users are identified by their phone number and password and do not have to repeatedly enter their information. The vendors can identify individual customer accounts based on caller identification and an identifying personal identification number or password. This allows the service to be more secure and easy to use and provide a quick connection to the service you are trying to contact. Credit card use with these services has also led to a decrease on accidental dialing and fraud which has been beneficial to both vendors and consumers.

Since phone based services are not restricted by physical limitations and can easily be requested by anybody in the world, they have become a point of interest for many professionals looking to make extra money. This is fortunate for the consumer as the services offered online and over the phone may effectively cost less than the in-person alternative; going to a therapist may cost upwards of $50 while a ten-minute session on the phone with a therapist may cost only $15. This price gap provides an incentive for consumers to consider these services as an option.

Most of the vendors on advice websites such as Keen or Ether are professionals who are working from home. Perhaps their schedule allows them free time during the work or during the afternoon, and working from home via these phone services provides them with some extra income. This is a great way to get good advice and other services at a cheaper rate than what could be found somewhere else.

Use of the internet brought another unforeseen benefit: consumers interested in these hotline services can now look at profile pictures of the providers and get a better idea of who they’ll be speaking with. This gives the user a better connection with the person and allows them to form a stronger and more personal relationship.

Mary Duncan, an expert from PrestoExperts, offers health and medicine advice. She has a PhD in counseling, a Master of Science degree in educational psychology, and a Bachelor of Science degree in English and secondary education. She is very qualified to offer advice! With 4.98 stars out of 5 and over four thousand reviews, other people seem to think so too. On Keen.com, a member named Darla1951 offers a review on a recent psychic reading she had. At 5 stars, she seems very pleased. She said “Matthew gave me answers before I asked the question! His talents are incredible!”

Additionally, these services can be discreetly billed. Part of the popularity of these pay per minute phone services were a result of the love or dating hotlines and phone sex services. These services have casually transitioned to the online marketplace, switching from the 1-900 numbers to billing via credit cards. Some services, such as TalkToMe.com and Niteflirt even allow their users to initiate a call online, which allows for more discretion for the user.

Hacker executing TDoS attack

Experiencing a Telephone Denial of Service (TDoS) Attack

I was of late contacted by one of the largest chat line operators, and they told me they were receiving a huge number of very short calls. Since The Chatline Guide is one of their largest exposure avenues, they wanted to check if I knew anything about this. I had no idea. They then asked me to swap the numbers for new ones to check if there was any difference. And in fact, they were able to confirm that the spam phone calls were coming from the numbers posted on this site. I went online and started to investigate phone spam attacks and found out there has been many cases regarding this. In our case, a TDoS was launched against some of the major chat lines listed on the ChatlineGuide.com’s singles page.

What is a TDoS Attack?

A telephone denial-of-service also known as phone bombing or voice spam assault is one that a small number of organizations know, and many are shocked to hear they are vulnerable. In actual fact, these attacks are practically difficult to avoid. They disable phone systems, in spite of whether they are premises-based, hosted, VoIP-based or time-division multiplexing (TDM)-based.TDoS attacks are frequently part of a blackmail scheme: A person requests payment after that launches an incessant stream of calls that stop regular calls till payment is acknowledged. Ordinarily, the assaults begin and stop indiscriminately until the payment is paid. Common targets comprise government offices, hospitals, and public-welfare answering point agencies.

TDoS attacks are close to Internet DDoS attacks that topple websites with overpowering IP traffic. Every Internet-linked server is prone to a DDoS attack, as well as telephone systems. As a webmaster, I was aware of DDoS attacks I had even been a victim of DDoS attacks in the past however TDoS attacks were new to me.

TDoS bouts target phone numbers instead of IP addresses. The attack can make use of the public transferred telephone system, rather than the Internet that makes TDM tracks just as vulnerable as Voice over IP (VoIP). There are numerous methods to make calls that it is very hard to protect against this kind of assault. Calls can originate from whichever city or Automatic Number Identification, hence theres no trustworthy technique that can correctly recognize and screen fake calls from genuine calls.

The Internet makes phone bombing easy to start and make it low-cost than ever to call. All it requires is an embezzled credit card. Bear in mind, these calls do not, in fact, pass any broadcasting streams. Hence they can scale resourcefully. Joined with common methods for caller-ID hoaxing, these uncomplicated attacks can destroy a company’s communications system.

Carriers are in the same way destitute in attack deterrence and alleviation. Theres no system to block the source since it can be distinct with every call. Making use of a hosted supplier is not safe also. An assault on one firm could even impact other unconnected organizations on the same supplier when it comes to shared trunking.

TDoS Attack Mitigation

A lasting solution will involve major modifications in existing communications structures. For now, there are some ideas on how to moderate a TDoS attack. To reduce the effect of assault, it is good for a business to isolate its physical trunks into diverse groups in order that a particular number cannot link all of its volumes. As well, telecom and network engineers ought to elect specific trunks for outbound calls or make sure they arent shared with issued numbers.

In the course of a TDoS attack, it is recommended that firms make in-depth notes of the assailants’ instructions and demands. Preferably, victims ought to record all dealings with the suspects. Businesses should try to record the start and finish periods and the data from the phone calls. Logs ought to gather information for instance IP addresses and caller IDs and protect it. You should report to the police as well.

Lasting answers are being assessed. They will perhaps consist of stiffened rules directed at curbing phone bombing, along with bigger penalties for those sentenced. There are several debates around layer network developments to add more responsibility, traceability, and control in the system. There is as well a method employed by websites that safeguards sessions to licensed domains. This answer is restricted to businesses that can limit requests to and from identified parties. Hence this regrettably will not help most companies.

Some likely resolutions to TDoS attacks entail IP multimedia subsystem beckoning that is used in a good number of carrier networks. Since the attack, the phone bureaus that control the chatlines have implemented security measures to prevent this type of attack.

The vital near-term stride is to know that all establishments are susceptible and that such assaults are growing. Enterprises ought to take steps to alleviate the likely impact till a lasting solution can eradicate the threat.

High Cell Phone Bill

You got Crammed! What are those Mysterious Phone Bill Charges

Sound a little odd, no? Seriously, get your head out of the gutter. If you have been noticing a few oddities here and there when it comes to your phone bill, then someone could be doing more than just sniffing around. Generally, phone cramming involves someone placing a charge on your phone tab for a call/service you did not make or authorize. The fraud can be carried out on both home phones or mobile types. At times, the charges are so minuscule that they can be overlooked or ignored as a minor accounting error, sometimes they can be substantial.

How did we get here?

Man fainting after seeing cell phone charges In 1982, AT&T agreed that it would cease controlling the Bell System. This opened up the market for a wide number of vendors, which in turn weakened regulatory capacities across the board. Instead of having one vendor for both short and long distance calls, subscribers had to migrate to a new system that differentiated the two and allotted different points of purchase of service. In doing this, the industry opened up a chasm for unscrupulous vendors to insert charges in bills that did not exist. The problem was so widespread that by 2007,cramming was the 4th most prevalent complaint among consumers of goods and services in the USA. Apparently, it became the perfect scam because only one in 20 people can see what is coming before it gets too late. And those who notice it simply dismiss the anomaly because ‘it is just a few cents, after all’. For a long time, this crime was perpetuated by use of premium rate or 1-900 numbers because the billing was horribly complex and third-party companies could bill at rates that bounced from minute to the next. Since the scraping of these numbers, the fraud has moved on to smarter, less conspicuous ways.

But why?

When the Bell Group of companies splintered, plenty of third parties decided to offer telephone services, with AT&T deciding to specialize in international calls. As such, some of those who entered the market were not exactly looking for an honest buck; they wanted a quick ground game in the face of cut-throat competition. In a nutshell, the whole import behind phone cramming is to charge more and make a little extra over what a legitimate phone bill would bring in. Today, 20 million US residents are crammed every year, and the charged are hidden within simple names as hotline charges or even chat line services.

As indicated earlier, it turns out that only 5% of victims of cramming actually know that entries have been falsified in their bills. This happens because crammers have been doing this for decades now and have become really good at it. Basically, a billing company places small charges under the ‘miscellaneous’ section of your telephone bill. Usually, the charge is so small that you are tempted to overlook it or think that maybe you did actually access the services indicated and then forgot about it. Charges will be inflated by anything from cents to the golden cramming figure, $1.99. You can identify this type of thing by looking at the specific entries made in the miscellaneous section. If you see something put down as ‘texts’, ‘horoscopes’, ‘gossip’, ‘ringtones’, ‘love messages’, ‘service charges’, ‘voice mail’ or even ‘calling plan’, then your radar needs to immediately go up.

Real Life cases of Phone Cramming

In 2012, the Federal Trade Commission took issue with T-Mobile US where the service provider was accused allowing vendors to charge millions of dollars for services clients had not asked for. In the end, the service was ordered to pay over $90 million in refunds to disgruntled consumers.

In 2015, Verizon and Sprint were ordered to pay an mount in the region of $158 million for allowing third party billing companies to insert charges that did not exist into the bills of thousands of subscribers. A large portion of this money ($120M) went directly towards refunds to consumers.

Earlier this month, it was revealed that AT&T had agreed to pay its consumers back a total of $7.8 million in yet another cramming case.

Disputing Unauthorized Charges

You will need to take a keen look at your statements at the end of every month in order to isolate cases of cramming where they exist. Should you notice any glitch, reach out to your phone company and have them explain the basis for the charges. If the matter is settled, inform your service provider that you do not want to be tied to a third party anymore and see if they can bill you directly. If the issue is not resolved, simply file a complaint with the Federal Communication Commission (FCC). In addition, always look out for telephone services labeled as ‘free’ because most of the time, people end up subscribing for ‘free’ services, only to get billed for them at the end of the month.

The Government’s Position

Laws that look to nip this practice in the bud have been around for some time now, but the most stringent measures were introduced when the Senate Commerce Committee sat down in 2013. Previously, liability was placed at the feet of the service provider, and the third party players responsible for this sort of mayhem were basically just given a slap on the wrist, although punishment could be effected by the companies they worked under(that is, the service provider at the top of the line).

Here is a look at the measures adopted by the Federal Communication Commission (FCC) after the senate hearings:

Separation of bills

Phone companies are now required by the law to separate the bills they charge directly from the ones inserted into statements by third-party vendors.

Notifications for consumers

The FCC requires that phone companies alert users of third party services and give everyone the chance to block any services they do not need. There is also a requirement for FCC contact data to be placed on every statement and online notification. The commission also continues to exact harsh penalties on those caught in the practice.

Where to seek help for phone cramming

https://www.fcc.gov
https://www.usa.gov/phone-tv-complaints
You state’s Attorney General’s office

Key Takeaways

  • Phone cramming did not die with 1-900 numbers
  • 20 million USA residents fall victim every year
  • Only 5% of victims can actually identify instances of voice cramming
  • FCC, FTC and congress have sought to address this concern