{"595086":{"#nid":"595086","#data":{"type":"event","title":"Cybersecurity Lecture Series with Terry Nelms","body":[{"value":"\u003Ch5\u003E\u003Cstrong\u003E\u003Cem\u003E\u0026quot;Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud\u0026quot;\u003C\/em\u003E\u003C\/strong\u003E\u003C\/h5\u003E\r\n\r\n\u003Cdiv\u003E\r\n\u003Cp\u003ERobocalling, voice phishing and caller ID spoofing are common cybercrime techniques used to launch scam campaigns through the telephony channel that many people have long trusted. More than 660,000 online complaints regarding unwanted phone calls were recorded on the top six phone complaints websites. More reliable than online complaints, a telephony honeypot provides complete, accurate and timely information about unwanted phone calls across the United States. By tracking calling patterns in a large telephony honeypot receiving over 600,000 calls per month from more than 90,000 unique source phone numbers, we gathered threat intelligence in the telephony channel. Leveraging this data we developed a methodology to uniquely \u0026ldquo;fingerprint\u0026rdquo; bad actors hiding behind multiple phone numbers and detect them within the first few seconds of a call. Over several months, we recorded more than 100,000 calls and analyzed several million call records to validate our methodology. Our results show that only a few bad actors are responsible for the majority of the spam and scam calls and that they can be quickly identified with high accuracy using features extracted from the audio. This discovery has major implications for law enforcement and businesses that are presently engaged in combatting the rise of telephony fraud.\u003C\/p\u003E\r\n\u003C\/div\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022http:\/\/attend.com\/cyberlecture-Nelms\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003ERegister to attend\u003C\/strong\u003E\u003C\/a\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003E\u003Cstrong\u003ETerry \u003C\/strong\u003E\u003Cstrong\u003ENelms\u003C\/strong\u003E \u003C\/strong\u003Eis a director of research at Pindrop, where he leads a team of applied researchers solving challenging problems in fraud detection and authentication.\u0026nbsp; Prior joining Pindrop, he spent over a decade inventing, designing and developing protection technologies at ISS, IBM and Damballa. His research has produced new security products, patents and publications in top industry and academic conferences. Nelms holds a B.S. and M.S. in Information Systems and a Ph.D. in Computer Science from the Georgia Institute of Technology.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EOrganized by the\u0026nbsp;\u003Ca href=\u0022https:\/\/protect-us.mimecast.com\/s\/1dr5BkcYL59Mh8\u0022 rel=\u0022noopener\u0022 target=\u0022_blank\u0022\u003EInstitute for Information Security \u0026amp; Privacy\u003C\/a\u003E, the free and open-to-the-public Cybersecurity Lecture Series \u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/cyber-lecture\u0022 target=\u0022_blank\u0022\u003Emeets throughout the fall\u003C\/a\u003E each Friday at Noon on the Georgia Tech campus, August \u0026ndash; December. Invited speakers include executives and researchers from Fortune 500 companies, federal intelligence agencies, start-ups and incubators, as well as Georgia Tech faculty and students presenting their research.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/sign-cybersecurity-lecture-updates\u0022\u003EReceive future schedule updates\u003C\/a\u003E\u003C\/strong\u003E\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EGeorgia Tech\u0026rsquo;s free and open-to-the-public Cybersecurity Lecture Series welcomes Terry Nelms, director of research at Pindrop and a Georgia Tech alumnus.\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Georgia Tech\u2019s Cybersecurity Lecture Series features Terry Nelms, director of research at Pindrop. "}],"uid":"27490","created_gmt":"2017-08-28 12:20:45","changed_gmt":"2017-08-28 17:24:02","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2017-09-01T13:00:00-04:00","event_time_end":"2017-09-01T14:00:00-04:00","event_time_end_last":"2017-09-01T14:00:00-04:00","gmt_time_start":"2017-09-01 17:00:00","gmt_time_end":"2017-09-01 18:00:00","gmt_time_end_last":"2017-09-01 18:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"593723":{"id":"593723","type":"image","title":"Cybersecurity Lecture Series by IISP","body":null,"created":"1500996186","gmt_created":"2017-07-25 15:23:06","changed":"1500996186","gmt_changed":"2017-07-25 15:23:06","alt":"","file":{"fid":"226333","name":"CLS_logo_FY18 w tag.jpg","image_path":"\/sites\/default\/files\/images\/CLS_logo_FY18%20w%20tag.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/CLS_logo_FY18%20w%20tag.jpg","mime":"image\/jpeg","size":580256,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/CLS_logo_FY18%20w%20tag.jpg?itok=S8GXpa-Z"}},"570741":{"id":"570741","type":"image","title":"Terry Nelms","body":null,"created":"1472579954","gmt_created":"2016-08-30 17:59:14","changed":"1475895379","gmt_changed":"2016-10-08 02:56:19","alt":"Terry Nelms","file":{"fid":"207073","name":"terry_nelms.jpg","image_path":"\/sites\/default\/files\/images\/terry_nelms.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/terry_nelms.jpg","mime":"image\/jpeg","size":58074,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/terry_nelms.jpg?itok=NiQfmet9"}}},"media_ids":["593723","570741"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"},{"id":"50877","name":"School of Computational Science and Engineering"},{"id":"50875","name":"School of Computer Science"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"},{"id":"78751","name":"Undergraduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ELindsey Panetta, \u003Ca href=\u0022mailto:lindsey.panetta@gtri.gatech.edu\u0022\u003Elindsey.panetta@gtri.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}