Feeds

Fujitsu has phone fraudsters in its sights

Last call for pesky scammers who target the elderly

Protecting users from Firesheep and other Sidejacking attacks with SSL

Boffins at Fujitsu and Japan’s Nagoya university are claiming to have successfully developed technology designed to prevent phone scammers by recognising certain keywords and detecting changes in voice pitch and level.

The technology was developed as part of the "Modelling and Detecting Overtrust from Behaviour Signals" research area led by Kazuya Takeda.

It focuses on the notion of “overtrust”, the situation that occurs when a human is overwhelmed with distressing information and loses the capacity to objectively evaluate whether they are being lied to or not.

The technology analyses the pitch and volume of the potential victim’s voice to detect when a situation of overtrust is occurring. Typically a person's voice flatens out in the high frequency range when they are put under psychological stress, and from this Fujitsu said it can can infer a situation of overtrust with over 90 per cent accuracy.

Bolstering the detection capabilities is keyword detection functionality which uses a list provided by the National Police Academy and counts the number of times any of those keywords are spoken, ignoring any other words.

The tech will then make a decision on whether the potential victim is being scanned by assessing the number of keywords in the conversation and whether their voice indicates a situation of overtrust, said Fujitsu.

This may seem like a lot of bother to be going to for a crime which rarely hits the front pages in the UK, however phone scams are a big problem in Japan and deemed particularly reprehensible in a country where crime is rare as it is usually targeted at the elderly and infirm.

Typically the scammer will pretend to be either a member of the victim’s family, friend or someone in a position of authority. They will usually impart some distressing information about a crime committed by an acquaintance of the victim and urge them to send money to sort the problem out.

Fujitsu now plans to work with the National Police Academy and The Bank of Nagoya to test the technology embedded in mobile phones. ®

The next step in data security

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.