How Apate's AI Bots Fight Phone Scammers

Speaking AI bots are going to end phone scammers' operations for good.

Phone scammers demanding passcodes are still among the widespread security threats today that hurt people financially and psychologically. To help combat this persisting menace, Macquarie University Professor Dali Kaafar and his colleagues produced speaking AI bots.

Based on his extensive research, Kaafar established Apate, named after the Greek goddess of deceit, to counter worldwide phone scams with conversational AI. Apate exploits telecom providers' systems to reroute scam calls, per The Guardian.

Giving Scammers a Dose of Their Own Medicine

In one incident, Kaafar pranked a scam caller at a picnic with his kids, which motivated him to invent this technique. A clever "dad's joke" kept the scammer on the line and entertained his kids. This encounter inspired the idea of tricking fraudsters and wasting their time to prevent them from attacking others.

The Apate AI bots are advanced, featuring various ages, accents, emotions, and personalities. These bots engage fraudsters from naive to suspicious to nasty. Apate's technology and $720,000 from the Office of National Intelligence have helped Australian telecoms reject roughly 2 billion scam calls since December 2020.

Telecommunications companies might reroute scam calls to Apate. The bots then attempt alternative tactics to keep the fraudsters on the line. This method wastes fraudsters' time but provides crucial information on new scams, such as call duration, peak scam periods, and strategies.

Kaafar, in the long run, expects Apate will hurt the phone scamming business model of multibillion-dollar criminal enterprises. Their next move is to utilize AI to alert victims and stop fraud in real time.

Scamwatch, conducted by the Australian Competition and Consumer Commission's (ACCC's) National Anti-Scam Centre (NASC), advises consumers to ignore scammers. Moreover, they monitor technology projects like Apate and want to evaluate their efficacy.

Experts say efforts against phone scams must improve as criminals develop more sophisticated methods using the latest technology, such as artificial intelligence.

Read also:

In addition to smishing, hackers may imitate someone and distribute malware. Cybersecurity expert Ravichandran says hackers may easily divert cell phone numbers or send phishing emails to get personal data. These communications often contain links to fraudulent websites that steal personal data.

Aside from using anti-fraud technologies, security experts advise caution when receiving unsolicited emails, especially ones asking for personal information or requesting clicks on unknown URLs.

US-TECHNOLOGY-FACEBOOK-ENERGY-SCAM-DISINFORMATION-FOCUS
This illustration photo taken on February 6, 2023 shows a phone screen displaying a video about a Filipino woman finding sand in her power bank. JIM WATSON/AFP via Getty Images

How to Spot Phone Scams

Phone scammers utilize tempting offers, philanthropic pleas, and official affiliations to attract victims. They often urge people to make snap judgments without thinking.

According to the site of the Texas Attorney General, here are common phone scam warning signs to watch out for:

  • Scammers may claim to have selected you for an offer.
  • To build urgency, they deploy high-pressure sales practices and "limited-time" offers.
  • Scammers avoid inquiries about their businesses or propositions.
  • Requests for Personal Details: They may "confirm your personal information" to steal your identity.
  • Scammers may seek cash, gift cards, wire transfers, or private couriers instead of credit cards.
  • Fraudsters may request your credit card or other payment method for "shipping and handling" costs.
  • Scammers may use threats and intimidation to get what they want from potential victims.

Security experts advise netizens to always check for unsolicited offers and demands for personal information or cash.

byline quincy
byline quincy byline quincy
ⓒ 2024 TECHTIMES.com All rights reserved. Do not reproduce without permission.
Join the Discussion
Real Time Analytics