Abstract
Voice Phishing is an emergent crime in which victims are deceived during the course of a phone conversation. According to the crime statistics released by the Korean National Police Agency, over 4000 cases of voice phishing are committed per year and the cost per victim is over US$1000. However, because of its unique characteristics when compared with traditional fraud, few studies have been conducted on this subject. This is the first study assessing the modus operandi of voice phishing using crime script analysis. A total of 182 case files were analyzed, in addition to 229 posts in Internet portals. Moreover, 20 detectives in charge of voice phishing cases were consulted via in-depth interviews. The results showed that the preparation for phishing includes getting ready for the crime, recruiting telemarketers and creating the scripts. The next step involves randomly making international and Internet calls to a large number of people, which constitutes the major activity, while the post-activity involves the withdrawal and wiring of the money deposited by victims to the offenders. This research aimed to provide a foundation for future research on related crimes, including mutation phishing and pharming, and offer insights into effective policy implementation to control the crime by identifying its situational context and unique characteristics.
Similar content being viewed by others
Notes
Mobile banking is a system that allows customers of a financial institution to conduct a number of financial transactions through a mobile device such as a mobile phone or tablet (en.wikipedia.org/wiki/Mobile_banking).
Key-in transaction indicates transactions that are carried out by only using card numbers, expiration dates and installment-lump sum payment periods without the actual card.
These are the three largest engines in South Korea:Daum (www.daum.net/), Nate (www.nate.com/), Naver (www.naver.com/). According to the report (January to 17 December 2013) released by the Ministry of Information and Communication, the market share of the 3 major portals was about 95 per cent.
References
Baggili, I. and Rogers, M. (2009) Self-reported cyber crime: An analysis on the effects of anonymity and pre-employment integrity. International Journal of Cyber Criminology 3(2): 550–565.
Beauregard, E. and Leclerc, B. (2007) An application of the rational choice approach to the offending process of sex offenders: A closer look at the decision-making. Sex Abuse 19(2): 115–133.
Beauregard, E., Rebocho, M.F. and Kim, M. (2010) Target selection patterns in rape. Journal of Investigative Psychology and Offender Profiling 7(2): 137–152.
Brayley, H., Cockbain, E. and Laycock, G. (2011) The value of crime scripting: Deconstructing internal child sex trafficking. Policing: A Journal of Policy and Practice 5(2): 132–143.
Bullock, K., Clarke, R.V. and Tilley, N. (2010) Situational Prevention of Organised Crime. Devon, UK: Willan Publishing.
Chiu, Y.N., Leclerc, B. and Townsley, M. (2011) Crime script analysis of drug manufacturing in clandestine laboratories. British Journal of Criminology 51(2): 355–374.
Clarke, R.V. and Cornish, D.B. (1985) Modeling offenders’ decisions: A framework for policy and research. In: M. Tonry and N. Morris (eds.) Crime and Justice: An Annual Review of Research. Chicago, IL: University of Chicago Press, 6, pp. 147–185.
Cornish, D. (1994) The procedural analysis of offending and its relevance for situational prevention. In: R.V. Clarke (ed.) Crime Prevention Studies. Monsey, NY: Criminal Justice Press, 3, pp. 151–195.
Cornish, D.B. (1993) Crime as scripts. Paper presented at the second annual seminar on environmental criminology and crime analysis; 26–28 May, University of Miami, Coral Gables, FL.
Ekblom, P. (1997) Gearing up against crime: A dynamic framework to help designers keep up with the adaptive criminal in a changing world. International Journal of Risk, Security and Crime Prevention 2(4): 249–265.
Heo, S.U. (2008) A study on the crimes of the international voice phishing. Doctoral Dissertation, Changwon National University, Changwon, Korea.
Kim, H.M. (2014) Overseas Korean – Chinese network research in multinational era. Korean Journal of Peace Studies 15(2): 29–48.
Kim, S.E. and Yang, Y.J. (2008) The evolution of tele-financial fraud: An analysis of offender-victim interaction structures and respondence to ‘voice phishing’. Korean Journal of Public Safety and Criminal Justice 32(1): 103–149.
Korea National Police Agency. (2014) White Paper on Crime. Seoul: Korea National Police Agency.
Lacoste, J. and Tremblay, P. (2003) Crime innovation: A script analysis of patterns in check forgery. In: M.J. Smith and D.B. Cornish (eds.) Crime Prevention Studies. Monsey, NY: Criminal Justice Press 16, pp. 171–198.
Lee, B.H. (2008) Analysis of types and victims of the tele-financial fraud: A comparison between Korea and Japan. Korean Criminal Psychology Review 9(2): 165–192.
Morselli, C. and Roy, J. (2008) Brokerage qualifications in ringing operations. Criminology 46(1): 71–98.
Police Science Institute. (2014) Security Prospect 2014. Seoul, Korea: Korea National Police Agency.
Talon, T.B. and Hurley, D. (2001) Body switching and related adaptations in the resale of stolen vehicles: Script elaborations and aggregate crime learning curves. British Journal of Criminology 41(4): 561–579.
Tompson, L. and Chainey, S. (2011) Profiling illegal waste activity: Using crime scripts as a data collection and analytical strategy. European Journal of Criminal Policy Research 17(3): 179–201.
Yin, R.K. (2003) Case Study Research: Design and Method. 3rd edn. London: Sage Publications.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Choi, K., Lee, Jl. & Chun, Yt. Voice phishing fraud and its modus operandi. Secur J 30, 454–466 (2017). https://doi.org/10.1057/sj.2014.49
Published:
Issue Date:
DOI: https://doi.org/10.1057/sj.2014.49