2022 iSpoof fraud investigation

ispoof.cc was a website used by numerous people to mask phone numbers. In 2021 and 2022 it was part of an investigation by numerous law enforcement agencies into frauds enabled by caller ID spoofing. It was shut down in November 2022 as the result of Operation Elaborate, a multi-agency investigation led by the Metropolitan Police and supported by Netherlands Police, Europol and Eurojust. As of 2022, it is the largest fraud investigation that has ever taken place in the United Kingdom.

The investigation began in June 2021, targeting a suspected organised crime group.[Note 1] The website allowed people to use caller ID spoofing to appear as if they were calling from legitimate bodies, which in turn enabled them to defraud victims - tricking them into handing over money, or providing sensitive information, such as banking passwords. Those behind the site are believed by police to have earned almost £3,200,000 in a single 20 months period.[1] Globally, 142 people were arrested.[2] Police are focussing first on UK users and those who have spent at least £100 of bitcoin on the site, as the total number of potential suspects is 59,000 - too many to deal with at the same time.[1] In total, between August 2021 and August 2022, approximately 10,000,000 fraudulent calls were made via the website, with 3.5 million made in the UK.[1]

There were at least 4,785 victims who reported the crime to Action Fraud, with the highest loss to an individual as £3,000,000. In the UK, 70,000 individual phone numbers were targeted, and the Metropolitan Police estimate there are 200,000 victims in the UK. The average loss of those victims identified by Action Fraud is £10,000.[3] Europol estimated that there was an estimated worldwide loss to victims in excess of £100,000,000.[2]

Action by country

Netherlands

Netherlands Police came across iSpoof in an ongoing spoofing investigation. They discovered that the spoofing service was hosted on servers in The Netherlands. This resulted in a new investigation, completely focused on the service itself. Deconflicting with international partners turned out to be the start of a close collaboration with London’s Metropolitan Service which had their sights on the administrator residing in London. By means of a wiretap in Almere, the Netherlands Police gathered all calls made using the spoofing service. This resulted in insight into the users and how they work. Several forensic images of the server were taken over time and the databases were analyzed. Since then, several suspects have been identified and arrested in the Netherlands. The Dutch information about the criminal users has been shared with other countries making further investigations possible.[4]

Republic of Ireland

Six people were arrested in the Republic as part of the investigation. Seventeen locations across County Louth, County Meath and Dublin were searched, and 132 electronic devices seized. The Garda Síochána also identified 64 suspicious bank accounts.[5] Detective Inspector Mel Smyth said that while the exact amount lost in the Republic of Ireland was unknown, it did run into the millions. He also explained that more searches and arrests would be carried out as the investigation unfolded.[6]

Ukraine

The Department of Cyber Police of the National Police of Ukraine were involved in the seizure of the website and server.[2]

United Kingdom

The investigation was led by London's Metropolitan Police, and assisted by multiple other agencies, including the City of London Police and the National Fraud Intelligence Bureau (known publicly as 'Action Fraud'). In the UK, as of 25 November 2022, 120 arrests had been made; with 103 in London and 17 outside London.[3] The alleged site administrator, 34-year-old Tejay Fletcher, was arrested in East London on 6 November and was due to appear at Southwark Crown Court after the Crown Prosecution Service authorised charges against him.[2] On 20 April 2023, Fletcher pled guilty to multiple charges. He is due to be sentenced on 18 May.[7]

United States

Authorities from Ukraine and the USA seized the website and server, taking it offline on 8 November. The Federal Bureau of Investigation (Pittsburgh), United States Secret Service (Pittsburgh), and United States Attorney (Western Pennsylvania) were involved.[2]

Other agencies

The following other agencies were involved:

Notes

  1. An OCG is defined under the section 45 of the Serious Crime Act 2015 as a group which: has at its purpose, or one of its purposes, the carrying on of criminal activities, and consists of three or more people who agree to act together to further that purpose.

References

  1. "More than 100 arrests in UK's biggest ever fraud operation". Metropolitan Police Service. Retrieved 2022-11-25.
  2. "Action against criminal website that offered 'spoofing' services to fraudsters: 142 arrests". Europol. Retrieved 2022-11-25.
  3. Mcilkenny, Stephen (2022-11-24). "What is Ispoof and how did police take down ispoofers site linked to 200,000 victims?". www.scotsman.com. Retrieved 2022-11-25.
  4. "Grote spoofingdienst uit de lucht gehaald door internationale samenwerking". www.politie.nl (in Dutch). Retrieved 2023-04-08.
  5. Fox, Matt (24 November 2022). "I rish arrests in iSpoof anti-fraud operation". BBC News. Retrieved 2022-11-25.
  6. Reynolds, Paul (2022-11-24). "Six arrests in international fraud call investigation". RTE.
  7. "Fraudster pleads guilty to £100m iSpoof scam". BBC News. BBC. 20 April 2023. Retrieved 20 April 2023.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.