The Daily XX
[0] Yeah, hi, this is Alex, calling you from the refund department of computer company, just to refund back your money.
[1] How are you doing today?
[2] I've gotten a lot of scam calls like this over the years.
[3] Sometimes these callers claim to be calling from the IRS, sometimes from the Social Security Administration, sometimes from my tech support company.
[4] And then we are going to refund your money and everything will be done.
[5] When I hear their accents, I can tell almost immediately.
[6] immediately where they're calling from.
[7] The calls usually end when I start using some colorful language in Hindi.
[8] My name is Yudhijit Patacharji, and I'm a contributor to the New York Times Magazine.
[9] I wrote a story about the flood of scam calls that Americans receive every day and who's behind them.
[10] I've always been fascinated by deception and fraud and scams, and I'm a very visual person, so I found myself kind of picturing these callers sitting in cubicles with headsets on working in the middle of the night making hundreds of phone calls to American targets many of whom are lonely elderly and are just sitting ducks for their scams to the callers these people are simply ATM machines that they can squeeze money from it's the ultimate commodification of human beings.
[11] Now, this scammer was talking to a grandma in Tennessee trying to cajole her into logging into her bank account online.
[12] And I was able to hear this tape thanks to a computer engineer who goes by the name Jim Browning.
[13] He found a way to hack into the scammer's computers.
[14] And then he's able to eavesdrop on their calls.
[15] He's able to record all of the activities on their screens.
[16] and he started sharing these with me. Your computer will be locked and you won't be able to get into your computer anymore for the whole lifetime.
[17] From Jim Browning's work, I learned that a lot of these scam calls were emanating from Kolkata, which is a city that I know very well.
[18] I was born there, and I worked there in the mid -1990s as a crime reporter.
[19] So I booked a flight to Kolkata with a plan to try.
[20] try to track down one of these scammers and talk to them face to face.
[21] So here's my story.
[22] Who's making all those scam calls?
[23] Read by Vakas Adam.
[24] One afternoon in December 2019, Kathleen Langer, an elderly grandmother who lives by herself in Crossville, Tennessee, got a phone call from a person who said he worked in the refund department of her computer manufacturer.
[25] The reason for the call, he explained, was to process a refund the company owed Langer for anti -virus and anti -hacking protection that had been sold to her and was now being discontinued.
[26] Langer, who has a warm and kind voice, couldn't remember purchasing the plan in question, but at her age, she didn't quite trust her memory.
[27] She had no reason to doubt the caller, who spoke with an Indian accent and said his name was Roger.
[28] He asked her to turn on her computer and led her through a series of steps so that he could access it remotely.
[29] When Langer asked why this was necessary, he said he needed to remove his company software from her machine.
[30] Because the protection was being terminated, he told her, leaving the software on the computer would cause it to crash.
[31] Ma 'am, if we will not remove those services, you won't be able to use your computer.
[32] After he gained access to her desktop using the program, Team Viewer, the caller asked Langer to log into her bank to accept the refund, $399, which she was going to transfer into her account.
[33] Because of a technical issue with our system, we won't be able to refund your money on your credit card or mail you a check, he said.
[34] Langer made a couple of unsuccessful attempts to log in.
[35] She didn't do online banking too often and couldn't remember her username.
[36] Ma 'am, it's a login ID.
[37] Frustrated, the caller opened her bank's internet banking registration form on her computer screen, created a new username and password for her, and asked her to fill out the required details, including her address, social security number, and birth date.
[38] When she typed this last part in, the caller noticed she had turned 80 just weeks earlier and wished her a belated happy birthday.
[39] Thank you, she replied.
[40] After submitting the form, he tried to log out of her.
[41] into Langer's account, but failed, because Langer's bank, like most banks, activates a newly created user ID only after verifying it by speaking to the customer who has requested it.
[42] The caller asked Langer if she could go to her bank to resolve the issue.
[43] How far is the bank from your house?
[44] He asked.
[45] A few blocks away, Langer answered.
[46] Because it was late afternoon, however, she wasn't sure if it would be open when she got there.
[47] The caller noted that the bank didn't close until 4 .30, which meant she still had 45 minutes.
[48] He was very insistent, Langer told me recently.
[49] On her computer screen, the caller typed out what he wanted her to say at the bank.
[50] Don't tell them anything about the refund, he said.
[51] She was to say that she needed to log in to check her statements and pay bills.
[52] Langer couldn't recall when we spoke if she drove to the bank or not.
[53] But later that afternoon, she rang the number the caller had given her and told him she had been unable to get to the bank in time.
[54] He advised her to go back the next morning.
[55] By now, Langer was beginning to have doubts about the caller.
[56] She told him she wouldn't answer the phone if he contacted her again.
[57] Do you care about your computer?
[58] He asked.
[59] He then uploaded a program onto her computer called lock my PC and locked its screen with a password she couldn't see.
[60] When she complained, he got belligerent.
[61] You can call the police, the FBI, the CIA, he told her.
[62] If you want to use your computer as you were doing, you need to go ahead as I was telling you or else you will lose your computer and your money.
[63] That computer will be also locked up.
[64] When he finally hung up, after reiterating that he would call the following day, Langer felt shaken.
[65] minutes later her phone rang again this caller introduced himself as Jim Browning hello my name is Jim the guy who is trying to convince you to sign into your online banking is after one thing alone and that is he wants to steal your money he said Langer was mystified that this new caller who had what seemed to be a strong Irish accent knew about the conversations she had just had Are you sure you are not with this group?
[66] She asked.
[67] He replied that the same scammers had targeted him too.
[68] But when they were trying to connect remotely to his computer, as they had done with hers, he had managed to secure access to theirs.
[69] For weeks, that remote connection had allowed him to eavesdrop on and record calls like those with Langer, in addition to capturing a visual record of the activity on a scammers computer screen.
[70] I'm going to give you the password to unlock your PC because they use the same password every time, he said.
[71] If you type 4521, you'll unlock it.
[72] Langer keyed in the digits.
[73] Okay, it came back on, she said, relieved.
[74] For most people, calls like the one Langer received are a source of annoyance or anxiety.
[75] According to the FBI's Internet Crime Complaint Center, the total losses reported to it by scam victims increased to $3 .5 billion in 2019 from $1 .4 billion in 2017.
[76] Last year, the app True Caller commissioned the Harris poll to survey roughly 2 ,000 American adults and found that 22 % of the respondents said they had lost money to a phone scam in the past 12 months.
[77] True caller projects that as many as 56 million Americans may have been victimized this way, losing nearly $20 billion.
[78] The person who rescued Langer that afternoon delights in getting these calls, however.
[79] I'm fascinated by scams, he told me. I like to know how they work.
[80] A software engineer based in the United Kingdom, he runs a YouTube channel under the pseudonym Jim Browning, where he regularly posts videos about his fraud, fighting efforts, identifying call centers and those involved in the crimes.
[81] He began talking to me over Skype in the fall of 2019, and then sharing recordings like the episode with Langer on the condition that I not reveal his identity, which he said was necessary to protect himself against the ire of the bad guys and to continue what he characterizes as his activism.
[82] Maintaining anonymity, it turns out, is key to scam -busting and scamming alike.
[83] I'll refer to him by his middle initial, L. The goal of L's efforts, and those of others like him, is to raise the costs and risks for perpetrators, who hide behind the veil of anonymity afforded by the internet and typically do not face punishment.
[84] The work is a hobby for L. He has a job at an IT company, although it seems more like an obsession.
[85] Tracking scammers has consumed much of L's free time in the evenings over the past few years, he says, except for several weeks in March and April last year when the start of the coronavirus pandemic forced strict lockdowns in many parts of the world causing call centers from which much of this activity emanates to temporarily suspend operations.
[86] Ten months later, scamming has gone right back to the way it was before the pandemic, Elle told me earlier this month.
[87] Like Elle, I was curious to learn more about phone scammers having received dozens of their calls over the years.
[88] They have offered me low interest rates on my credit card balances, promised to write off my federal student loans, and congratulated me on having just won a big lottery.
[89] I've answered fraudsters, claiming to be from the Internal Revenue Service who threatened to send the police to my doorstep unless I agree to pay back taxes that I didn't know I owed, preferably in the form of iTunes gift cards or by way of a Western Union money transfer.
[90] Barring a few exceptions, the individuals calling me have had South Asian accents, leading me to suspect that they are calling from India.
[91] On several occasions, I've tested this theory by letting the voice on the other end go on for a few minutes before I suddenly interrupt with a torrent of Hindi curses that I retain full mastery of even after living in the United States for the past two decades.
[92] I haven't yet failed to elicit a retaliatory offensive in Hindi, confirming that these scammers are operating from India hasn't given me any joy.
[93] Instead, as an Indian ex -patriot living in the United States, I felt a certain shame.
[94] Elle started going after scammers when a relative of his lost money to a tech support swindle, a common scheme with many variants.
[95] Often it starts when the mark gets a call from someone offering unsolicited help in ridding a computer's hard drive of malware or the like.
[96] Other times, computer users looking for help stumble upon a website masquerade as Microsoft or Dell or some other computer maker and end up dialing a listed number that connects them to a fraudulent call center.
[97] In other instances, victims are tricked by a pop -up warning that their computer is at risk and that they need to call the number flashing on the screen.
[98] Once someone is on the phone, the scammers talk the caller into opening up team viewer or another remote access application on his or her computer, after which they get the victim to read back unique identifying information that allows them to establish control over the computer.
[99] L flips the script.
[100] What's the company?
[101] What computer company are we talking about here?
[102] He starts by playing an unsuspecting target.
[103] Speaking in a polite and even tone, with a cadence that conveys naivete, he follows instructions and allows the scammer to connect to his device.
[104] This doesn't have any of his actual data, however.
[105] It is a virtual machine or a program that simulates a functioning desktop on his computer, including false files, like documents with a fake home address.
[106] It looks like a real computer that belongs to someone.
[107] I've got a whole lot of identities set up, Elle told me. He uses dummy credit card numbers that can pass a cursory validation check.
[108] The scammer's connection to Elle's virtual machine is effectively a two -way street that allows Elle to connect to the scammer's computer and infect it with his own software.
[109] Once he has done this, he can monitor the scammers activities long after the call has ended, sometimes for months, or as long as the software goes undetected.
[110] Thus, sitting in his home office, Elle is able to listen in on calls between scammers and targets, because these calls are made over the internet from the scammer's computer, and watch as the scammer takes control of a victim's computer.
[111] Elle acknowledged to me that his access to the scammer's computer puts him at legal risk.
[112] Without the scammer's permission, establishing that access is unlawful.
[113] But that doesn't worry him.
[114] If it came down to someone wanting to prosecute me for accessing a scammer's computer illegally, I can demonstrate in every single case that the only reason I gained access is because the scammer was trying to steal money from me, he says.
[115] On occasion, Elle succeeds in the case.
[116] turning on the scammer's webcam and is able to record video of the scammer and others at the call center, who can usually be heard on phones in the background.
[117] From the IP address of the scammer's computer and other clues, L frequently manages to identify the neighborhood, and, in some cases, the actual building where the call center is.
[118] When he encounters a scam in progress while monitoring a scammer's computer, L tries to both document and disrupt it, at times using his real -time access to undo the scammers' manipulations of the victim's computer.
[119] He tries to contact victims to warn them before they lose any money, as he did in the case of Kathleen Langer.
[120] L's videos of such episodes have garnered millions of views, making him a faceless YouTube star.
[121] He says he hopes his exploits will educate the public and deter scammers.
[122] He claims he has emailed the law enforcement authorities in India, offering to share the evidence he has collected against specific call centers.
[123] Except for one instance, his inquiries have elicited only form responses, although last year, the police raided a call center that Elle had identified in Gururam outside Delhi after it was featured in an investigation aired by the BBC.
[124] Now and then, during our Skype conversations, L would begin monitoring a call between a scammer and a mark and let me listen in.
[125] In some instances, I would also hear other call center employees in the background, some of them making similar calls, others talking among themselves.
[126] The chatter evoked a busy workplace, reminding me of my late nights in a Korkata newsroom where I began my journalism career 25 years ago, except that these were young men and women working through the night to con people many time zones away.
[127] When scammers called me in the past, I tried cajoling them into telling me about their enterprise, but never succeeded.
[128] Now, with Elle's help, I thought, I might have better luck.
[129] I flew to India at the end of 2019, hoping to visit some of the call centers that Elle had identified as homes for scams.
[130] Although he had detected many tech support scams, originating from Delhi, Hyderabad, and other Indian cities, Elle was convinced that Kolkata, based on the volume of activity he was noticing there, had emerged as a capital of such frauds.
[131] I knew the city well, having covered the crime beat there for an English language daily in the mid -1990s, and so I figured that my chances of tracking down scammers would be better there than most other places in India.
[132] I took with me, in my notebook, a couple of addresses that Elle, identified in the days just before my trip as possible origins for some scam calls.
[133] Because the geolocation of IP addresses, ascertaining the geographical coordinates associated with an internet connection, isn't an exact science, I wasn't certain that they would yield any scammers.
[134] But I did have the identity of a person linked to one of these spots, a young man whose first name is Shahbaz.
[135] Elle identified him by matching webcam images, and several government -issued IDs found on his computer.
[136] The home address on his ID matched what Elle determined from the IP address to be the site of the call center where he operated, which suggested that the call center was located where he lived or close by.
[137] That made me optimistic I would find him there.
[138] In a recording of a call Shahbaz made in November, weeks before my Kolkata visit, I heard him trying to hustle a woman in Ottawa and successfully intimidating and then fleecing an elderly man, in the United States.
[139] Although individuals like this particular scammer are the ones responsible for manipulating victims on the phone, they represent only the outward face of a multi -billion -dollar criminal industry.
[140] Call centers that run scams employ all sorts of subcontractors, Buneith Singh, an FBI agent who serves as the Bureau's legal attache at the U .S. Embassy in New Delhi told me. These include sellers of phone numbers, programmers who develop malware and pop -ups and money mules.
[141] From the constantly evolving nature of scams, lately I've been receiving calls from the Law Enforcement Department of the Federal Reserve System about an outstanding arrest warrant instead of the fake Social Security Administration calls I was getting a year ago, it's evident that the industry has its share of innovators.
[142] The reasons this activity seems to have flourished in India are much the same as those behind the growth of the country legitimate information technology services industry after the early 2000s, when many American companies like Microsoft and Dell began outsourcing customer support to workers in India.
[143] The industry expanded rapidly as more companies in developed countries saw the same economic advantage in relocating various services there that could be performed remotely, from airline ticketing to banking.
[144] India's large population of English speakers kept labor costs down.
[145] Because the overwhelming majority of call centers in the country are engaged in legitimate business, the ones that aren't can hide in plain sight.
[146] Amid the mazes of gleaming steel and glass high rises in a place like Cyber City near Delhi or Sector 5 in Salt Lake near Kolkata, two of the numerous commercial districts that have sprung up across the country to nurture IT businesses, it's impossible to distinguish a call center that handles inquiries from air travelers in the United States from one that targets hundreds of Americans every day with fraudulent offers to lower their credit card interest rates.
[147] The police do periodically crack down on operations that appear to be illegitimate.
[148] Shortly after I got to Kolkata, the police raided five call centers in Salt Lake that officials said had been running a tech support scam.
[149] The employees of the call centers were accused of impersonating Microsoft representatives.
[150] The police raid followed a complaint by the tech company, which in recent years has increasingly pressed Indian law enforcement to act against scammers abusing the company's name.
[151] I learned from Murli Dhar Sharma, a senior official in the city police, that his team had raided two other call centers in Korkata a couple of months earlier in response to a similar complaint.
[152] Microsoft had done extensive work before coming to us.
[153] Sharma, who is in his 40s and speaks with quite authority, told me. The company lent its help to the police in connection with the raids, which Sharma seemed particularly grateful for.
[154] Often the police lack the resources to pursue these sorts of cases.
[155] These people are very smart, and they know how to hide data, Sharma said, referring to the scammers.
[156] It was in large part because of Microsoft's help, he said, that investigators had been able to file charges in court within a month after the raid.
[157] A trial has begun, but could drag on for years.
[158] The call centers have been shut down, at least for now.
[159] Sharmah pointed out that preemptive raids do not yield the desired results.
[160] Our problem, he said, is that we can act only when there's a complaint of cheating.
[161] In 2017, he and his colleagues raided a call center on their own initiative, without a complaint, and arrested several people.
[162] But then the court was like, Why did the police raid these places?
[163] Sharma said.
[164] The judge wanted statements from victims, which the police were unable to get despite contacting authorities in the U .S. and UK.
[165] The case fell apart.
[166] The slim chances of detection and the even slimmer chances of facing prosecution have seemed to make scamming a career option, especially among those who lack the qualifications to find legitimate employment in India's slowing economy.
[167] Indian educational institutions churn out more than 1 .5 million engineers every year, but according to one survey, fewer than 20 % are equipped to land positions related to their training, leaving a vast pool of college graduates, not to mention an even larger population of less educated young men and women struggling to earn a living.
[168] That would partly explain why call centers run by small groups, are popping up in residential neighborhoods.
[169] The worst thing about this crime is that it's becoming trendy, Aparejita Rai, a deputy commissioner in the Kolkata police told me. More and more youngsters are investing the crucial years of their adolescents into this.
[170] Everybody wants fast money.
[171] In Kolkata, I met Anirudanath, then 23, who said he spent a week working at a call center that he quickly realized was engaged in fraud.
[172] Nath has a pensive air and a shy smile that intermittently cut through his solemnness as he spoke.
[173] While finishing his undergraduate degree in engineering from a local college, he took a loan to study there, Nath got a job offer after a campus interview.
[174] The company insisted he joined immediately for a monthly salary of about $200.
[175] Nath asked me not to name the company out of fear that he would be exposing himself legally.
[176] His jubilation turned into skepticism on his very first day when he and other fresh recruits were told to simply memorize the contents of the company's website which claimed his employer was based in Australia.
[177] On a whim, he googled the address of the Australian office listed on the site and discovered that only a parking garage was located there.
[178] He said he learned a couple of days later what he was to do.
[179] Call Indian students in Australia whose visas were.
[180] were about to expire and offered to place them in a job in Australia if they paid $800 to take a training course.
[181] On his seventh day at work, Nath said, he received evidence from a student in Australia that the company's promise to help with job placements was simply a ruse to steal $800.
[182] The training the company offered was apparently little more than a farce.
[183] She sent me screenshots of complaints from individuals who had been defrauded, Nath said.
[184] said.
[185] He stopped going into work the next day.
[186] His parents were unhappy, and he said, told him, what does it matter to you what the company is doing?
[187] You'll be getting your salary, Nath answered.
[188] If there is a raid there, I'll be charged with fraud.
[189] Late in the afternoon, the day after I met with Nath, I drove to Garden Reach, a predominantly Muslim and largely poor section in southwest Kolkata on the banks of the Hugli River.
[190] Home to a 137 -year -old shipyard, the area includes some of the city's noted crime hotspots and has a reputation for crime and violence.
[191] Based on my experience reporting from the Garden Reach in the 1990s, I thought it was probably not wise to venture there alone late at night, even though that was most likely the best time to find scammers at work.
[192] I was looking for Shahbaz.
[193] Parking my car in the vicinity of the address Elle had given me, I walked through a narrow lane where children were playing cricket, past a pharmacy, and a tiny store selling cookies and snacks.
[194] The apartment I sought was on the second floor of a building at the end of an alley, a few hundred yards from a mosque.
[195] It was locked, but a woman next door said that the building belonged to Shahbaz's extended family and that he lived in one of the apartments with his parents.
[196] Then I saw elderly couple seated on the steps in the front.
[197] His parents, it turned out.
[198] The father summoned Shahbaz's brother, a lanky, long -haired man who appeared to be in his 20s.
[199] He said Shahbaz had woken up a short while earlier and gone out on his motorbike.
[200] I don't know when he goes to sleep and when he wakes up, his father said, with what sounded like exasperation.
[201] They gave me Shahbaz's mobile number, but when I called, I got no answer.
[202] It was getting awkward for me to wait around indefinitely without disclosing why I was there, so eventually I pulled the brother aside to talk in private.
[203] We sat down on a bench at a roadside tea stall, a quarter mile from the mosque.
[204] Between sips of tea, I told him that I was a journalist in the United States and wanted to meet his brother because I had learned he was a scammer.
[205] I hoped he would pass on my message.
[206] I got a call from Shakbas a few hours later.
[207] He denied that he'd ever worked at a call center.
[208] There are a lot of young guys who are involved in the scamming business, but I'm not one of them, he said.
[209] I persisted, but he kept brushing me off until I asked him to confirm that his birthday was a few days later in December.
[210] Look, you are telling me my exact birth date.
[211] That makes me nervous, he said.
[212] He wanted to know what I knew about him and how I knew it.
[213] I said I would tell him if he met with me. I volunteered to protect his identity if he answered my questions truthfully.
[214] Two days later, we met for lunch at the Taj Bengal, one of Korkata's five -star hotels.
[215] I'd chosen that as the venue out of concern for my safety.
[216] When he showed up at the hotel lobby, however, I felt a little silly.
[217] Physically, Shahbaz is hardly intimidating.
[218] He is short and skinny, with a face that would seem babyish, but for his thin mustache and beard, which are still a work in progress.
[219] He was in his late 20s, but had brought along an older cousin for his own safety.
[220] We found a secluded table in the hotel's Chinese restaurant and sat down.
[221] I took out my phone and played a video that Elle had posted on YouTube.
[222] Only those that Elle shared the link with knew of its existence.
[223] The video was a recording of the call from November 2019, in which Shaqbas was trying to defraud the woman in Ottawa with a trick that scammers often use to arm -twist their victims, editing the HTML coding of the victim's bank account web page to alter the balances.
[224] Because the woman was pushing back, Shahbaz zeroed out her balance to make it look as if he had the ability to drain her account.
[225] On the call, he can be heard threatening her.
[226] Do you want me to do that?
[227] You don't want to lose all your money, right?
[228] I watched him shift uncomfortably in his chair.
[229] "'Whose voice is that?' I asked. "'It's yours, isn't