Skip to main content
Log in

Voice phishing fraud and its modus operandi

  • Original Article
  • Published:
Security Journal Aims and scope Submit manuscript

Abstract

Voice Phishing is an emergent crime in which victims are deceived during the course of a phone conversation. According to the crime statistics released by the Korean National Police Agency, over 4000 cases of voice phishing are committed per year and the cost per victim is over US$1000. However, because of its unique characteristics when compared with traditional fraud, few studies have been conducted on this subject. This is the first study assessing the modus operandi of voice phishing using crime script analysis. A total of 182 case files were analyzed, in addition to 229 posts in Internet portals. Moreover, 20 detectives in charge of voice phishing cases were consulted via in-depth interviews. The results showed that the preparation for phishing includes getting ready for the crime, recruiting telemarketers and creating the scripts. The next step involves randomly making international and Internet calls to a large number of people, which constitutes the major activity, while the post-activity involves the withdrawal and wiring of the money deposited by victims to the offenders. This research aimed to provide a foundation for future research on related crimes, including mutation phishing and pharming, and offer insights into effective policy implementation to control the crime by identifying its situational context and unique characteristics.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. Mobile banking is a system that allows customers of a financial institution to conduct a number of financial transactions through a mobile device such as a mobile phone or tablet (en.wikipedia.org/wiki/Mobile_banking).

  2. Key-in transaction indicates transactions that are carried out by only using card numbers, expiration dates and installment-lump sum payment periods without the actual card.

  3. These are the three largest engines in South Korea:Daum (www.daum.net/), Nate (www.nate.com/), Naver (www.naver.com/). According to the report (January to 17 December 2013) released by the Ministry of Information and Communication, the market share of the 3 major portals was about 95 per cent.

References

  • Baggili, I. and Rogers, M. (2009) Self-reported cyber crime: An analysis on the effects of anonymity and pre-employment integrity. International Journal of Cyber Criminology 3(2): 550–565.

    Google Scholar 

  • Beauregard, E. and Leclerc, B. (2007) An application of the rational choice approach to the offending process of sex offenders: A closer look at the decision-making. Sex Abuse 19(2): 115–133.

    Google Scholar 

  • Beauregard, E., Rebocho, M.F. and Kim, M. (2010) Target selection patterns in rape. Journal of Investigative Psychology and Offender Profiling 7(2): 137–152.

    Google Scholar 

  • Brayley, H., Cockbain, E. and Laycock, G. (2011) The value of crime scripting: Deconstructing internal child sex trafficking. Policing: A Journal of Policy and Practice 5(2): 132–143.

    Article  Google Scholar 

  • Bullock, K., Clarke, R.V. and Tilley, N. (2010) Situational Prevention of Organised Crime. Devon, UK: Willan Publishing.

    Google Scholar 

  • Chiu, Y.N., Leclerc, B. and Townsley, M. (2011) Crime script analysis of drug manufacturing in clandestine laboratories. British Journal of Criminology 51(2): 355–374.

    Article  Google Scholar 

  • Clarke, R.V. and Cornish, D.B. (1985) Modeling offenders’ decisions: A framework for policy and research. In: M. Tonry and N. Morris (eds.) Crime and Justice: An Annual Review of Research. Chicago, IL: University of Chicago Press, 6, pp. 147–185.

    Google Scholar 

  • Cornish, D. (1994) The procedural analysis of offending and its relevance for situational prevention. In: R.V. Clarke (ed.) Crime Prevention Studies. Monsey, NY: Criminal Justice Press, 3, pp. 151–195.

    Google Scholar 

  • Cornish, D.B. (1993) Crime as scripts. Paper presented at the second annual seminar on environmental criminology and crime analysis; 26–28 May, University of Miami, Coral Gables, FL.

  • Ekblom, P. (1997) Gearing up against crime: A dynamic framework to help designers keep up with the adaptive criminal in a changing world. International Journal of Risk, Security and Crime Prevention 2(4): 249–265.

    Google Scholar 

  • Heo, S.U. (2008) A study on the crimes of the international voice phishing. Doctoral Dissertation, Changwon National University, Changwon, Korea.

  • Kim, H.M. (2014) Overseas Korean – Chinese network research in multinational era. Korean Journal of Peace Studies 15(2): 29–48.

    Google Scholar 

  • Kim, S.E. and Yang, Y.J. (2008) The evolution of tele-financial fraud: An analysis of offender-victim interaction structures and respondence to ‘voice phishing’. Korean Journal of Public Safety and Criminal Justice 32(1): 103–149.

    Google Scholar 

  • Korea National Police Agency. (2014) White Paper on Crime. Seoul: Korea National Police Agency.

  • Lacoste, J. and Tremblay, P. (2003) Crime innovation: A script analysis of patterns in check forgery. In: M.J. Smith and D.B. Cornish (eds.) Crime Prevention Studies. Monsey, NY: Criminal Justice Press 16, pp. 171–198.

  • Lee, B.H. (2008) Analysis of types and victims of the tele-financial fraud: A comparison between Korea and Japan. Korean Criminal Psychology Review 9(2): 165–192.

    Google Scholar 

  • Morselli, C. and Roy, J. (2008) Brokerage qualifications in ringing operations. Criminology 46(1): 71–98.

    Article  Google Scholar 

  • Police Science Institute. (2014) Security Prospect 2014. Seoul, Korea: Korea National Police Agency.

  • Talon, T.B. and Hurley, D. (2001) Body switching and related adaptations in the resale of stolen vehicles: Script elaborations and aggregate crime learning curves. British Journal of Criminology 41(4): 561–579.

    Article  Google Scholar 

  • Tompson, L. and Chainey, S. (2011) Profiling illegal waste activity: Using crime scripts as a data collection and analytical strategy. European Journal of Criminal Policy Research 17(3): 179–201.

    Article  Google Scholar 

  • Yin, R.K. (2003) Case Study Research: Design and Method. 3rd edn. London: Sage Publications.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ju-lak Lee.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Choi, K., Lee, Jl. & Chun, Yt. Voice phishing fraud and its modus operandi. Secur J 30, 454–466 (2017). https://doi.org/10.1057/sj.2014.49

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/sj.2014.49

Keywords

Navigation