RobocallScience

Research to restore trust in telephones



Diving into Robocall Content with SnorCall

USENIX Security Symposium

Sathvik Prasad, Trevor Dunlap, Alexander Ross, and Bradley Reaves

Summary:

Research paper introducing SnorCall, a framework that scalably and efficiently extracts content from robocalls. SnorCall enables us to obtain first estimates on how prevalent different scam topics are, determine which organizations are referenced in these calls, estimate the average amounts solicited in scam calls, identify shared infrastructure between campaigns, and monitor the rise and fall of election-related political calls.

Paper Abstract

Unsolicited bulk telephone calls — termed “robocalls” — nearly outnumber legitimate calls, overwhelming telephone users. While the vast majority of these calls are illegal, they are also ephemeral. Although telephone service providers, regulators, and researchers have ready access to call metadata, they do not have tools to investigate call content at the vast scale required. This paper presents SnorCall, a framework that scalably and efficiently extracts content from robocalls. SnorCall leverages the Snorkel framework that allows a domain expert to write simple labeling functions to classify text with high accuracy. We apply SnorCall to a corpus of transcripts covering 232,723 robocalls collected over a 23-month period. Among many other findings, SnorCall enables us to obtain first estimates on how prevalent different scam and legitimate robocall topics are, determine which organizations are referenced in these calls, estimate the average amounts solicited in scam calls, identify shared infrastructure between campaigns, and monitor the rise and fall of election-related political calls. As a result, we demonstrate how regulators, carriers, anti-robocall product vendors, and researchers can use SnorCall to obtain powerful and accurate analyses of robocall content and trends that can lead to better defenses.

Code and Data Releases

We have released SnorCall code on Google Colab that you can test and use.

We have also released a dataset of robocall audio originally sourced from the FTC Project Point of No Entry. You can test SnorCall with that code. Unfortunately, we cannot release the dataset we used for this paper.