<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Blog</title>
    <link>https://gasa.org/knowledge-base/blog</link>
    <description>Explore the latest reports, webinar recordings, best practices, scam trends and news from GASA.</description>
    <language>en</language>
    <pubDate>Tue, 28 Apr 2026 05:10:14 GMT</pubDate>
    <dc:date>2026-04-28T05:10:14Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>What 22,000 Fraud &amp; Cyber Crime Operator Signals Reveal About the State of Bank Attacks</title>
      <link>https://gasa.org/knowledge-base/blog/what-22000-fraud-cyber-crime-operator-signals-reveal-about-the-state-of-bank-attacks</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://gasa.org/knowledge-base/blog/what-22000-fraud-cyber-crime-operator-signals-reveal-about-the-state-of-bank-attacks" title="" class="hs-featured-image-link"&gt; &lt;img src="https://gasa.org/hubfs/Blog%20banner-2.jpg" alt="22,000 Fraud Signals Bank Attack Trends – March 2026" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="line-height: 1.5;"&gt;On Telegram channels and dark web forums, operators trade phishing kits like SaaS subscriptions, sell stolen identities by the bundle, and rent OTP-bot platforms by the hour. What used to require skill, infrastructure, and patience is now a checkout flow. The barrier to running a sophisticated scam against a major bank has collapsed to a few hundred dollars and a willing buyer with some free time. We’ve spent time inside these operator networks and wanted to share a snapshot of what we saw over the past 6 weeks.&lt;/p&gt; 
&lt;p style="line-height: 1.5;"&gt;&lt;span style="font-size: 30px;"&gt;&lt;strong&gt;Where the signal comes from&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 1.5;"&gt;FALKIN monitors the infrastructure that fraud operators use to organise their work. We watch channels where phishing kits are sold and rooms where OTP bots relay live SMS codes in seconds. We’re also in forums where stealer logs, card dumps and identity bundles trade hands.&lt;br&gt;&lt;br&gt;&lt;span style="color: #340649;"&gt;Over the last six weeks, FALKIN has collected 22,661 bank-tagged signals across Telegram channels, dark web forums, and live attack infrastructure. Each signal represents a discrete, classified operator action:&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p style="line-height: 1.5;"&gt;&lt;img src="https://gasa.org/hs-fs/hubfs/Blog%20banner-2.jpg?width=833&amp;amp;height=469&amp;amp;name=Blog%20banner-2.jpg" width="833" height="469" alt="Blog banner-2" style="height: auto; max-width: 100%; width: 833px;"&gt;&lt;/p&gt; 
&lt;p style="line-height: 1.5;"&gt;On Telegram channels and dark web forums, operators trade phishing kits like SaaS subscriptions, sell stolen identities by the bundle, and rent OTP-bot platforms by the hour. What used to require skill, infrastructure, and patience is now a checkout flow. The barrier to running a sophisticated scam against a major bank has collapsed to a few hundred dollars and a willing buyer with some free time. We’ve spent time inside these operator networks and wanted to share a snapshot of what we saw over the past 6 weeks.&lt;/p&gt; 
&lt;p style="line-height: 1.5;"&gt;&lt;span style="font-size: 30px;"&gt;&lt;strong&gt;Where the signal comes from&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p style="line-height: 1.5;"&gt;FALKIN monitors the infrastructure that fraud operators use to organise their work. We watch channels where phishing kits are sold and rooms where OTP bots relay live SMS codes in seconds. We’re also in forums where stealer logs, card dumps and identity bundles trade hands.&lt;br&gt;&lt;br&gt;&lt;span style="color: #340649;"&gt;Over the last six weeks, FALKIN has collected 22,661 bank-tagged signals across Telegram channels, dark web forums, and live attack infrastructure. Each signal represents a discrete, classified operator action:&lt;/span&gt;&lt;/p&gt; 
&lt;ul style="list-style-type: disc; line-height: 1.5;"&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;a phishing kit listed for sale,&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;a stealer log posted with bank-specific customer data,&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;an OTP bot active against a named institution, or&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;a fullz bundle advertised with routing details.&lt;/span&gt;&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p style="line-height: 1.5;"&gt;&lt;span style="color: #340649;"&gt;Signals were classified by typology and attributed to operator region where confidence was high enough to assign. The numbers below reflect what operators were doing, not just what they were advertising&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="line-height: 1.5;"&gt;&lt;span style="font-size: 30px;"&gt;&lt;strong&gt;What operators are actually trading&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt; 
&lt;p style="line-height: 1.5;"&gt;Of the 22,000 signals, account takeover and credential harvesting is by far the largest category, at &lt;strong&gt;69.2% of classified signals&lt;/strong&gt;. OTP interception sits in second place at 17.3%. Card and CVV trade accounts for 7.3%, identity theft and fullz 5.1% and APP mule infrastructure 1.1%. &lt;i&gt;(Definitions at end of article)&lt;/i&gt;&lt;/p&gt; 
&lt;p style="line-height: 1.5;"&gt;This breakdown is a direct reflection of where operators are spending most of their collaborative efforts based on the financial opportunity. The overwhelming majority of the visible trade is in stolen credentials and the live interception of authentication codes that are meant to protect the credentials.&lt;/p&gt; 
&lt;p style="text-align: center; line-height: 1.5;"&gt;&lt;img src="https://gasa.org/hs-fs/hubfs/image1-png.png?width=1980&amp;amp;height=1260&amp;amp;name=image1-png.png" width="1980" height="1260" style="margin-left: auto; margin-right: auto; display: block;"&gt;&lt;/p&gt; 
&lt;p style="text-align: center; line-height: 1.5;"&gt;&lt;span style="color: #340649;"&gt;&lt;i&gt;Overall typology distribution across 22,661 bank-tagged signals collected in March 2026.&lt;/i&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="line-height: 1.5;"&gt;&lt;span style="font-size: 30px;"&gt;&lt;strong&gt;US, UK, and Neobanks are attacked differently&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt; 
&lt;p style="line-height: 1.5;"&gt;As you unpack the data, you see that the attack vectors across markets are structurally different and therefore the defence strategies should not be copy-pasted across segments.&lt;/p&gt; 
&lt;p style="line-height: 1.5;"&gt;&lt;strong&gt;US banks are credential-dominated.&lt;/strong&gt; Account takeover and credentials account for roughly 72% of classified US signals, with OTP interception a significant secondary vector at 19%. US banks remain heavily exposed because SMS OTP is still the dominant second factor, and real-time phishing panels and OTP-bot-as-a-service platforms have industrialised the interception of those codes.&lt;br&gt;&lt;br&gt;The defensive implication is equally direct. Continuing to rely on SMS OTP as a second factor while OTP-bot-as-a-service platforms operate at industrial scale is not a neutral choice, it's an active subsidy to the attack. The path forward is device-bound authentication, the same transition UK banking has already made. The US market knows this. The gap is execution speed.&lt;/p&gt; 
&lt;p style="line-height: 1.5;"&gt;&lt;strong&gt;UK banks are identity-dominated.&lt;/strong&gt; The UK picture is the most strategically interesting finding in this dataset, and the most underappreciated risk in the market.&lt;span&gt; &lt;/span&gt;Identity theft and fullz is the single largest UK typology at 57% of classified signals, with account takeover at 27% and card trade at 16%. UK banking has largely solved the OTP problem with device-bound authentication and biometric second factors have made SMS interception nearly unviable, which is why OTP signals in the UK dataset are effectively zero.&lt;/p&gt; 
&lt;p style="line-height: 1.5;"&gt;But operators don't retire. They adapt. When you remove the second factor as an attack surface, the fraud pressure migrates upstream to the first factor: identity itself. Synthetic identity construction, blending a genuine ID from a low-activity victim (a child, an elderly person, a recent immigrant) with fabricated supporting details is now the primary UK operator investment. The goal is fraudulent account opening: passing KYC not by stealing access to an existing account, but by manufacturing a convincing new person.&lt;/p&gt; 
&lt;p style="line-height: 1.5;"&gt;The defensive implication is direct. If your institution has invested heavily in authentication security and seen credential-based fraud fall, don't read that as a solved problem. Read it as displacement. The attack surface didn't disappear, it moved to onboarding.&lt;/p&gt; 
&lt;p style="line-height: 1.5;"&gt;&lt;strong&gt;Neobanks are card-heavy.&lt;/strong&gt; Card and CVV trade is the top neobank typology at 46%, with credentials at 41% and identity at 13%. The OTP signal that shows up in the neobank surface is payment-authorisation SMS codes intercepted via malware on compromised devices, which is a card fraud vector rather than an account takeover vector.&lt;br&gt;&lt;br&gt;The defensive implication here is about card controls and compromise velocity, not authentication. Neobanks with real-time card freeze, granular merchant controls, and low-friction dispute flows are compressing the window between compromise and cashout. Those without are absorbing losses that are structurally preventable.&lt;/p&gt; 
&lt;p style="text-align: center; line-height: 1.5;"&gt;&lt;img src="https://gasa.org/hs-fs/hubfs/image2-png.png?width=1980&amp;amp;height=1350&amp;amp;name=image2-png.png" width="1980" height="1350" style="margin-left: auto; margin-right: auto; display: block;"&gt;&lt;/p&gt; 
&lt;p style="text-align: center; line-height: 1.5;"&gt;&lt;span style="color: #340649;"&gt;&lt;i&gt;Same underlying fraud economy, three very different attack profiles.&lt;/i&gt;&lt;/span&gt;&lt;span style="font-size: 30px;"&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;u&gt;&lt;a href="https://www.gasa.org/working-groups" style="color: #340649;"&gt;&lt;em&gt;&lt;span style="color: #1155cc;"&gt;&lt;span style="color: #340649;"&gt;&lt;span style="color: #05463d;"&gt;Looking to contribute to collaborative anti-scam initiatives? GASA Working Groups bring members together to develop practical, real-world solutions.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/a&gt;&lt;/u&gt;&lt;/p&gt; 
&lt;h2 style="line-height: 1.5;"&gt;&lt;span style="font-size: 30px;"&gt;&lt;strong&gt;Operator geography is specialised&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt; 
&lt;p style="line-height: 1.5;"&gt;Different operator regions specialise in different attack patterns, and each region’s specialism tells you something about how that ecosystem evolved.&lt;/p&gt; 
&lt;p style="line-height: 1.5;"&gt;&lt;strong&gt;West African operators are social engineering and OTP specialists.&lt;/strong&gt; Account takeover and OTP interception make up roughly 80% of their combined activity. OTP interception requires live English-language phone calls impersonating bank fraud teams, and this region has that capability at scale.&lt;/p&gt; 
&lt;p style="line-height: 1.5;"&gt;&lt;strong&gt;Russia/CIS operators are infrastructure vendors.&lt;/strong&gt; Their activity clusters around card and CVV trade (61%) and credential marketplaces (28%). These operators function primarily as wholesalers, selling stealer logs, phishing kits, and card bundles to downstream operators globally. Direct victim-interaction activity is markedly lower.&lt;/p&gt; 
&lt;p style="line-height: 1.5;"&gt;&lt;strong&gt;South East Asian operators run the most diversified mix.&lt;/strong&gt; Card trade, credentials, OTP interception, APP mule infrastructure, and a notable crypto drainer presence all appear at meaningful share. This reflects the rise of scam compound operations in Myanmar, Cambodia, and Laos, where trafficked workers run multi-typology fraud under coercion.&lt;/p&gt; 
&lt;p style="line-height: 1.5;"&gt;Put differently: the operator region your institution is facing is a function of what kind of attack surface you expose. A bank fighting OTP-bot pressure is likely looking at West African threat actor infrastructure. A bank seeing coordinated card trade is almost certainly looking at Russia/CIS. A fintech with a mixed threat profile is likely in the South East Asian crosshairs.&lt;/p&gt; 
&lt;p style="text-align: center; line-height: 1.5;"&gt;&lt;img src="https://gasa.org/hs-fs/hubfs/image3-png.png?width=1980&amp;amp;height=1350&amp;amp;name=image3-png.png" width="1980" height="1350" style="margin-left: auto; margin-right: auto; display: block;"&gt;&lt;/p&gt; 
&lt;p style="text-align: center; line-height: 1.5;"&gt;&lt;span style="color: #340649;"&gt;&lt;i&gt;Each operator region has a distinct specialism that reflects how that ecosystem evolved.&lt;/i&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="line-height: 1.5;"&gt;&lt;span style="font-size: 30px;"&gt;&lt;strong&gt;Why this is a growing problem for banks&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt; 
&lt;p style="line-height: 1.5;"&gt;For the last decade, the industry has spent its fraud budget in two places: the device layer (fingerprinting, device trust, malware signals) and the transaction layer (rules engines, anomaly detection). These are necessary. They are also increasingly insufficient as AI has changed the unit economics of running scams and the technical bar to do so. The layer that's now most exposed is the one that sits between the device and the transaction: the human.&lt;/p&gt; 
&lt;p style="line-height: 1.5;"&gt;The change we're observing in operator channels isn't primarily about volume, it’s about the collapse of the skill floor. The volume numbers are already striking: since ChatGPT launched, malicious phishing volume has surged by over 4,000% (SlashNext, 2024). But that statistic understates the real shift. A year ago, running a convincing English-language OTP-bot call against a US bank customer required an operator who could improvise, handle objections, and hold a plausible conversation under pressure. That's a scarce human skill.&lt;/p&gt; 
&lt;p style="line-height: 1.5;"&gt;Today, the call script is AI-generated, the voice is cloned from a short public audio sample for under $20 a month, and the objection handling is templated. The operator on the other end of that call can be anywhere in the world and barely speaks English. Adversary-in-the-middle attacks that once required specialist infrastructure can now be assembled in an afternoon with a cloned replica website, a Telegram channel for live coordination, and a voice bot handling the call. The attack surface this exposes isn't the device or the transaction. It's the phone call itself. Banks that still engage customers primarily via inbound and outbound calls, rather than authenticated in-app communication, are handing operators a channel they can't secure. We're not citing external statistics here, we're describing what we watched being built and sold in the channels we monitor. The infrastructure for AI-assisted social engineering is now a commodity product in the same marketplaces where phishing kits and stealer logs trade.&lt;/p&gt; 
&lt;h2 style="line-height: 1.5; font-size: 24px;"&gt;&lt;span style="color: #340649; font-size: 30px;"&gt;&lt;strong&gt;Why we publish this&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt; 
&lt;p style="line-height: 1.5;"&gt;The operators in this dataset don't work in isolation. The West African OTP specialist buys his phishing kit from a Russia/CIS vendor. The South East Asian compound worker runs scripts built by someone else entirely. The fraud economy is integrated and the supply chain is functional.&lt;/p&gt; 
&lt;p style="line-height: 1.5;"&gt;The defensive side is not. Banks share fraud data bilaterally when they have to, rarely proactively, and almost never across institution types. A neobank absorbing card fraud pressure from the same operator network hitting a high-street bank has no mechanism to know that.&lt;/p&gt; 
&lt;p style="line-height: 1.5;"&gt;That's the gap this report is trying to close, one month at a time. If you want to see how your institution appears in the operator signals we're monitoring, get in touch at &lt;a href="mailto:partner@falkin.com"&gt;&lt;span style="text-decoration: underline;"&gt;partner@falkin.com&lt;/span&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="line-height: 1.5;"&gt;You can read the full March 2026 &lt;i&gt;Trends&lt;/i&gt; report below.&lt;/p&gt; 
&lt;h2 style="line-height: 1.5; font-weight: bold;"&gt;&lt;span style="font-size: 30px;"&gt;About the Author&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="color: #340649;"&gt;Boaz is CEO and Co-Founder of &lt;a href="http://falkin.com/"&gt;FALKIN&lt;/a&gt;, an embedded digital safety company working with banks and other financial institutions to stop scams before they happen. FALKIN combines threat intelligence and AI to offer a variety of customer facing prevention products.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="line-height: 1.5;"&gt;&lt;a&gt;&lt;/a&gt;&lt;span style="font-size: 30px;"&gt;&lt;strong&gt;Typology definitions&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt; 
&lt;p style="line-height: 1.5;"&gt;For reference, the seven categories used across the report are defined below.&lt;/p&gt; 
&lt;table width="624" style="border-collapse: collapse; border-image: initial; height: 739.387px; border: medium none currentcolor;"&gt; 
 &lt;thead&gt; 
  &lt;tr style="height: 52.0375px;"&gt; 
   &lt;td style="width: 150px; background-color: #efe2ff; vertical-align: top; border: 1.33333px solid #e5d9cf; height: 52.0375px;" width="200"&gt; &lt;p style="line-height: 116%;"&gt;&lt;span style="color: #05463d;"&gt;&lt;strong&gt;TYPOLOGY&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt; &lt;/td&gt; 
   &lt;td style="width: 424px; border-width: 1.33333px 1.33333px 1.33333px medium; border-style: solid solid solid none; border-color: #e5d9cf #e5d9cf #e5d9cf currentcolor; background-color: #efe2ff; vertical-align: top; height: 52.0375px;" width="424"&gt; &lt;p style="line-height: 116%;"&gt;&lt;span style="color: #05463d;"&gt;&lt;strong&gt;DEFINITION&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
 &lt;/thead&gt; 
 &lt;tbody&gt; 
  &lt;tr style="height: 100.512px;"&gt; 
   &lt;td style="width: 150px; border-width: medium 1.33333px 1.33333px; border-style: none solid solid; border-color: currentcolor #e5d9cf #e5d9cf; vertical-align: top; height: 100.512px;" width="200"&gt; &lt;p style="line-height: 116%;"&gt;&lt;strong&gt;Account Takeover &amp;amp; Credentials&lt;/strong&gt;&lt;/p&gt; &lt;/td&gt; 
   &lt;td style="width: 424px; border-width: medium 1.33333px 1.33333px medium; border-style: none solid solid none; border-color: currentcolor #e5d9cf #e5d9cf currentcolor; vertical-align: top; height: 100.512px;" width="424"&gt; &lt;p style="line-height: 116%;"&gt;Phishing kits, scam pages, harvested logins, browser cookies, and stealer-malware output (Redline, Lumma, Vidar, Raccoon). Also includes smishing infrastructure. The largest single category across the dataset.&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr style="height: 116.75px;"&gt; 
   &lt;td style="width: 150px; border-width: medium 1.33333px 1.33333px; border-style: none solid solid; border-color: currentcolor #e5d9cf #e5d9cf; vertical-align: top; height: 116.75px;" width="200"&gt; &lt;p style="line-height: 116%;"&gt;&lt;strong&gt;OTP Interception&lt;/strong&gt;&lt;/p&gt; &lt;/td&gt; 
   &lt;td style="width: 424px; border-width: medium 1.33333px 1.33333px medium; border-style: none solid solid none; border-color: currentcolor #e5d9cf #e5d9cf currentcolor; vertical-align: top; height: 116.75px;" width="424"&gt; &lt;p style="line-height: 116%;"&gt;Two primary vectors. (1) Voice bots: Telegram-controlled bots that call victims impersonating bank fraud teams to extract live SMS one-time passcodes. (2) Real-time phishing panels: victim enters OTP on a scam page, operator replays it to complete the session hijack in seconds. Both target SMS-based second factors during active authentication flows.&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr style="height: 84.275px;"&gt; 
   &lt;td style="width: 150px; border-width: medium 1.33333px 1.33333px; border-style: none solid solid; border-color: currentcolor #e5d9cf #e5d9cf; vertical-align: top; height: 84.275px;" width="200"&gt; &lt;p style="line-height: 116%;"&gt;&lt;strong&gt;Card &amp;amp; CVV Trade&lt;/strong&gt;&lt;/p&gt; &lt;/td&gt; 
   &lt;td style="width: 424px; border-width: medium 1.33333px 1.33333px medium; border-style: none solid solid none; border-color: currentcolor #e5d9cf #e5d9cf currentcolor; vertical-align: top; height: 84.275px;" width="424"&gt; &lt;p style="line-height: 116%;"&gt;Stolen card data (PAN + CVV), BIN lookups, and 3DS challenger tools used for high-value merchant abuse.&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr style="height: 149.225px;"&gt; 
   &lt;td style="width: 150px; border-width: medium 1.33333px 1.33333px; border-style: none solid solid; border-color: currentcolor #e5d9cf #e5d9cf; vertical-align: top; height: 149.225px;" width="200"&gt; &lt;p style="line-height: 116%;"&gt;&lt;strong&gt;Identity Theft &amp;amp; Fullz&lt;/strong&gt;&lt;/p&gt; &lt;/td&gt; 
   &lt;td style="width: 424px; border-width: medium 1.33333px 1.33333px medium; border-style: none solid solid none; border-color: currentcolor #e5d9cf #e5d9cf currentcolor; vertical-align: top; height: 149.225px;" width="424"&gt; &lt;p style="line-height: 116%;"&gt;Complete real identity bundles (name, DOB, SSN or NIN, address, mother’s maiden name, sort code) used for two primary purposes: (1) fraudulent account opening, impersonating a real person to pass KYC, and (2) KBA bypass, answering knowledge-based authentication challenges to recover or take over existing accounts. Also includes synthetic identities: fabricated profiles blending real data (a genuine SSN from a child, elderly, or immigrant victim) with fictional details, engineered to pass automated KYC at banks and fintechs.&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr style="height: 84.275px;"&gt; 
   &lt;td style="width: 150px; border-width: medium 1.33333px 1.33333px; border-style: none solid solid; border-color: currentcolor #e5d9cf #e5d9cf; vertical-align: top; height: 84.275px;" width="200"&gt; &lt;p style="line-height: 116%;"&gt;&lt;strong&gt;APP Fraud &amp;amp; Mules&lt;/strong&gt;&lt;/p&gt; &lt;/td&gt; 
   &lt;td style="width: 424px; border-width: medium 1.33333px 1.33333px medium; border-style: none solid solid none; border-color: currentcolor #e5d9cf #e5d9cf currentcolor; vertical-align: top; height: 84.275px;" width="424"&gt; &lt;p style="line-height: 116%;"&gt;Authorised Push Payment cashout layer: drop accounts, mule recruitment, and beneficiary routing infrastructure.&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr style="height: 68.0375px;"&gt; 
   &lt;td style="width: 150px; border-width: medium 1.33333px 1.33333px; border-style: none solid solid; border-color: currentcolor #e5d9cf #e5d9cf; vertical-align: top; height: 68.0375px;" width="200"&gt; &lt;p style="line-height: 116%;"&gt;&lt;strong&gt;Business Email Compromise&lt;/strong&gt;&lt;/p&gt; &lt;/td&gt; 
   &lt;td style="width: 424px; border-width: medium 1.33333px 1.33333px medium; border-style: none solid solid none; border-color: currentcolor #e5d9cf #e5d9cf currentcolor; vertical-align: top; height: 68.0375px;" width="424"&gt; &lt;p style="line-height: 116%;"&gt;Employee phishing, payroll diversion, W-2 theft, and executive impersonation infrastructure.&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr style="height: 84.275px;"&gt; 
   &lt;td style="width: 150px; border-width: medium 1.33333px 1.33333px; border-style: none solid solid; border-color: currentcolor #e5d9cf #e5d9cf; vertical-align: top; height: 84.275px;" width="200"&gt; &lt;p style="line-height: 116%;"&gt;&lt;strong&gt;Crypto Drainers&lt;/strong&gt;&lt;/p&gt; &lt;/td&gt; 
   &lt;td style="width: 424px; border-width: medium 1.33333px 1.33333px medium; border-style: none solid solid none; border-color: currentcolor #e5d9cf #e5d9cf currentcolor; vertical-align: top; height: 84.275px;" width="424"&gt; &lt;p style="line-height: 116%;"&gt;Wallet draining kits, seed-phrase harvesting, and approval-exploit infrastructure targeting retail crypto holders.&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
 &lt;/tbody&gt; 
&lt;/table&gt; 
&lt;p style="line-height: 1.5; background-color: #e3f2e5; padding-left: 14px;"&gt;&lt;strong&gt;A note on coverage &lt;/strong&gt;Investment, purchase, and romance scams feature minimally in this dataset. These are heavy APP fraud use cases, but they rely on long-form one-to-one victim grooming and operate primarily through social media, messaging apps, and scam compound operations, outside the commodity-tooling marketplaces that form our collection surface. Their absence here is a collection-surface artefact, not evidence of low prevalence.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://40nv62.share-na2.hsforms.com/2HszREpgESHekaKa6DgkBKg"&gt;&lt;span style="font-style: italic; color: #05463d;"&gt;Sign up for the GASA newsletter to receive regular updates on scam prevention, research, and best practices.&lt;/span&gt;&lt;/a&gt;&lt;span style="font-style: italic; color: #05463d;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track-na2.hubspot.com/__ptq.gif?a=242978186&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fgasa.org%2Fknowledge-base%2Fblog%2Fwhat-22000-fraud-cyber-crime-operator-signals-reveal-about-the-state-of-bank-attacks&amp;amp;bu=https%253A%252F%252Fgasa.org%252Fknowledge-base%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Research</category>
      <category>Region - Global</category>
      <category>Scam Trends</category>
      <category>Topic - Fraud Research</category>
      <category>Topic - Scam Detection</category>
      <category>Region - North America</category>
      <category>Industry - Financial Authorities</category>
      <pubDate>Tue, 28 Apr 2026 05:10:14 GMT</pubDate>
      <guid>https://gasa.org/knowledge-base/blog/what-22000-fraud-cyber-crime-operator-signals-reveal-about-the-state-of-bank-attacks</guid>
      <dc:date>2026-04-28T05:10:14Z</dc:date>
      <dc:creator>Boaz Valkin</dc:creator>
    </item>
    <item>
      <title>Reinventing Fraud Detection Through Digital Fingerprinting and Link Analysis</title>
      <link>https://gasa.org/knowledge-base/blog/reinventing-fraud-detection-through-digital-fingerprinting-and-link-analysis</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://gasa.org/knowledge-base/blog/reinventing-fraud-detection-through-digital-fingerprinting-and-link-analysis" title="" class="hs-featured-image-link"&gt; &lt;img src="https://gasa.org/hubfs/Blog-Apr-15-2026-12-02-51-0755-PM.jpg" alt="Microsoft White Paper  on Link Analysis and Digital Fingerprinting in Fraud Detection" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;Fraud detection systems are designed to assess risk at the level of individual transactions or accounts. However, this approach is becoming less effective as fraud becomes more complex.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://gasa.org/hs-fs/hubfs/Blog-Apr-15-2026-12-02-51-0755-PM.jpg?width=3840&amp;amp;height=2160&amp;amp;name=Blog-Apr-15-2026-12-02-51-0755-PM.jpg" width="3840" height="2160" alt="Blog-Apr-15-2026-12-02-51-0755-PM" style="height: auto; max-width: 100%; width: 3840px;"&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Fraud detection systems are designed to assess risk at the level of individual transactions or accounts. However, this approach is becoming less effective as fraud becomes more complex.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Fraud is often spread across &lt;/span&gt;&lt;strong&gt;&lt;span&gt;multiple accounts, devices, and interactions&lt;/span&gt;&lt;/strong&gt;&lt;span&gt; rather than appearing as a single event, making it difficult for traditional detection models to capture this kind of activity.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;A white paper from &lt;/span&gt;&lt;strong&gt;&lt;span&gt;Microsoft&lt;/span&gt;&lt;/strong&gt;&lt;span&gt;, &lt;/span&gt;&lt;em&gt;&lt;span&gt;Reinventing Link Analysis: How Digital Fingerprinting and LLMs Are Transforming Enterprise Fraud Detection&lt;/span&gt;&lt;/em&gt;&lt;span&gt;, authored by Akhil Singhal and Sadhana Viswanathan, explores how combining digital fingerprinting with link analysis can shift fraud detection from isolated events to &lt;/span&gt;&lt;strong&gt;&lt;span&gt;network intelligence&lt;/span&gt;&lt;/strong&gt;&lt;span&gt; across systems.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span style="font-size: 24px;"&gt;&lt;strong&gt;From Isolated Detection to Network Intelligence&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;Traditional approaches work well for known patterns, but are less effective when fraud is distributed across multiple entities.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;This has led to a shift towards &lt;/span&gt;&lt;strong&gt;&lt;span&gt;network intelligence&lt;/span&gt;&lt;/strong&gt;&lt;span&gt;, where relationships between entities are analysed to uncover hidden connections. Rather than asking whether a single transaction is fraudulent, this approach focuses on how multiple interactions relate to one another across time and systems.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span style="font-size: 24px;"&gt;&lt;strong&gt;Identifying the User Behind Fraud Activity&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;A central component of this approach is &lt;/span&gt;&lt;strong&gt;&lt;span&gt;digital fingerprinting&lt;/span&gt;&lt;/strong&gt;&lt;span&gt;, which creates a probabilistic representation of a user based on device, network, and behavioural signals.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;These signals can include device characteristics, IP attributes, environmental configurations, and interaction patterns. By analysing how a user behaves, rather than relying solely on static identifiers, organisations can move closer to identifying the individual operating the system.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Identifying the “user at the keyboard” enables more accurate classification of risk, particularly in cases where fraudsters rotate accounts or reuse infrastructure to evade detection.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span style="font-size: 24px;"&gt;&lt;strong&gt;Connecting Fraud Through Link Analysis&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;Once suspicious activity is identified, &lt;/span&gt;&lt;strong&gt;&lt;span&gt;link analysis&lt;/span&gt;&lt;/strong&gt;&lt;span&gt; is used to uncover relationships across historical and real-time data.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;By connecting shared attributes such as device identifiers, login credentials, IP addresses, and behavioural patterns, systems can construct a network of related entities. This allows organisations to identify not only the initial fraud signal but also other accounts and transactions that may be connected.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;This approach supports &lt;/span&gt;&lt;strong&gt;&lt;span&gt;earlier detection&lt;/span&gt;&lt;/strong&gt;&lt;span&gt; by enabling organisations to reassess previously approved activity and prevent further abuse. It also shifts detection from identifying individual events to exposing broader fraud networks.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.gasa.org/working-groups"&gt;&lt;em&gt;&lt;u&gt;&lt;span style="color: #1155cc;"&gt;&lt;span style="color: #340649;"&gt;&lt;span style="color: #05463d;"&gt;Looking to contribute to collaborative anti-scam initiatives? GASA Working Groups bring members together to develop practical, real-world solutions.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/em&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 24px;"&gt;&lt;strong&gt;The Role of LLMs in Detection&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="font-weight: normal;"&gt;The paper also outlines how LLMs&lt;/span&gt;&lt;span&gt;&lt;span style="font-weight: normal;"&gt; ca&lt;/span&gt;n enhance link analysis by introducing a &lt;/span&gt;&lt;strong&gt;&lt;span&gt;reasoning layer&lt;/span&gt;&lt;/strong&gt;&lt;span&gt; on top of traditional rule-based systems.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Instead of relying solely on predefined rules, LLMs can interpret patterns across complex datasets, identifying relationships that may not be captured through static logic. This allows detection systems to adapt more effectively to evolving fraud behaviours while reducing the need for continuous manual rule updates.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Importantly, this layer operates alongside existing controls, supporting decision-making while maintaining governance and oversight.&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 24px;"&gt;&lt;strong&gt;What This Changes for Fraud Prevention&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;Together, digital fingerprinting and link analysis enable a shift from reactive detection to &lt;/span&gt;&lt;strong&gt;&lt;span&gt;preventive disruption&lt;/span&gt;&lt;/strong&gt;&lt;span&gt; of fraud activity.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;By identifying connections across users, devices, and transactions, organisations can detect &lt;/span&gt;&lt;strong&gt;&lt;span&gt;coordinated behaviour&lt;/span&gt;&lt;/strong&gt;&lt;span&gt; earlier and respond at scale.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #340649;"&gt;This approach also delivers clear operational benefits:&lt;/span&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;&lt;strong&gt;Higher fraud coverage&lt;/strong&gt; by detecting coordinated networks&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;&lt;strong&gt;Reduced false positives&lt;/strong&gt; through probabilistic fingerprinting&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;&lt;strong&gt;Faster response&lt;/strong&gt; through automated linkage and blocking&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;&lt;strong&gt;Greater scalability&lt;/strong&gt; across large datasets&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;&lt;strong&gt;Improved explainability&lt;/strong&gt; through connected fraud relationships&lt;/span&gt;&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;span&gt;Network-level intelligence offers a more resilient model for detecting and disrupting organised fraud.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span style="font-size: 24px;"&gt;&lt;strong&gt;From Detection to Disruption&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;The approach outlined in the paper reflects a broader transition in fraud prevention, where detection is no longer limited to individual events but extends to understanding how activity is connected across systems.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;This allows organisations to act earlier and more consistently, addressing fraud patterns before they scale.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;The full white paper explores these concepts in greater detail, including the underlying architecture and practical considerations for implementation.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #05463d;"&gt;&lt;a href="https://40nv62.share-na2.hsforms.com/2HszREpgESHekaKa6DgkBKg" style="color: #05463d;"&gt;&lt;em&gt;&lt;u&gt;Sign up for the GASA newsletter to receive regular updates on scam prevention, research, and best practices.&lt;/u&gt;&lt;/em&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track-na2.hubspot.com/__ptq.gif?a=242978186&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fgasa.org%2Fknowledge-base%2Fblog%2Freinventing-fraud-detection-through-digital-fingerprinting-and-link-analysis&amp;amp;bu=https%253A%252F%252Fgasa.org%252Fknowledge-base%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Research</category>
      <category>Topic - Fraud Prevention</category>
      <category>Region - Global</category>
      <category>Topic - Scam Detection</category>
      <category>Region - North America</category>
      <category>Industry - Big Tech / Social Media</category>
      <pubDate>Tue, 21 Apr 2026 03:21:20 GMT</pubDate>
      <guid>https://gasa.org/knowledge-base/blog/reinventing-fraud-detection-through-digital-fingerprinting-and-link-analysis</guid>
      <dc:date>2026-04-21T03:21:20Z</dc:date>
      <dc:creator>Global Anti-Scam Alliance (GASA)</dc:creator>
    </item>
    <item>
      <title>On the Frontlines: Fighting AI-Powered Scams &amp; Fraud</title>
      <link>https://gasa.org/knowledge-base/blog/on-the-frontlines-fighting-ai-powered-scams-fraud</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://gasa.org/knowledge-base/blog/on-the-frontlines-fighting-ai-powered-scams-fraud" title="" class="hs-featured-image-link"&gt; &lt;img src="https://gasa.org/hubfs/webinar%20thumbnail-01-2.png" alt="gasa meet-up" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;a href="https://app.livestorm.co/global-anti-scam-alliance/on-the-frontlines-fighting-ai-powered-scam-and-fraud/live?s=265f6b89-0d86-477f-a1af-bd67381fc69d#/chat"&gt;&lt;/a&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;a href="https://app.livestorm.co/global-anti-scam-alliance/on-the-frontlines-fighting-ai-powered-scam-and-fraud/live?s=265f6b89-0d86-477f-a1af-bd67381fc69d#/chat"&gt;&lt;img src="https://gasa.org/hs-fs/hubfs/webinar%20thumbnail-01-2.png?width=2509&amp;amp;height=1416&amp;amp;name=webinar%20thumbnail-01-2.png" width="2509" height="1416" alt="webinar thumbnail-01-2" style="height: auto; max-width: 100%; width: 2509px;"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;Date of Event: &lt;/span&gt;14 April 2026&lt;br&gt;&lt;span style="font-weight: bold;"&gt;Event: &lt;/span&gt;GASA Meet-Up&lt;/p&gt; 
&lt;p&gt;Scammers are rapidly adopting artificial intelligence to scale and refine their operations, making fraud more convincing, targeted, and difficult to detect. While much of the public conversation focuses on deepfakes, the reality is far broader. This GASA meet-up explored how AI is being actively used across the scam ecosystem, and what organisations can do to stay ahead of these evolving threats.&lt;/p&gt; 
&lt;p&gt;The session brought together experts from leading technology companies and research organisations to share frontline insights. Drawing on real-world intelligence from platforms and investigations, the discussion focused on how fraudsters are operationalising AI today, and how the same technologies can be leveraged to strengthen detection, prevention, and response.&lt;/p&gt; 
&lt;h2 style="font-weight: bold;"&gt;&lt;span style="font-size: 24px;"&gt;Speakers&lt;/span&gt;&lt;/h2&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;strong&gt;Dora Cheng&lt;/strong&gt;, Principal Product Manager – Microsoft&lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;span style="font-weight: bold;"&gt;Jack Stubbs&lt;/span&gt;, Intelligence &amp;amp; Investigations – OpenAI&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;span style="font-weight: bold;"&gt;Aparajitha Vadlamannati&lt;/span&gt;, Public Policy Manager, Search Quality – Google&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Mollie Zapata&lt;/strong&gt;, Senior Director of Analysis – C4ADS&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;&amp;nbsp;Jorij Abraham&lt;/strong&gt;, Managing Director – Global Anti-Scam Alliance (Moderator)&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;At the same time, the panel underscored that AI is also a critical part of the solution. Advanced detection systems, behavioural analysis, and cross-platform intelligence sharing are already helping organisations disrupt fraud networks more effectively. However, no single organisation can address this challenge alone. Collaboration between technology companies, governments, and industry stakeholders remains essential to counter increasingly sophisticated scam operations.&lt;/p&gt; 
&lt;p&gt;The session reinforced a central theme: as scammers continue to operate like coordinated global networks, defenders must do the same. By combining intelligence, technology, and shared expertise, organisations can build stronger, more adaptive defences against AI-driven fraud.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;Watch the full discussion below to learn how organisations are tackling AI-powered scams on the frontlines.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track-na2.hubspot.com/__ptq.gif?a=242978186&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fgasa.org%2Fknowledge-base%2Fblog%2Fon-the-frontlines-fighting-ai-powered-scams-fraud&amp;amp;bu=https%253A%252F%252Fgasa.org%252Fknowledge-base%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Topic - Fraud Prevention</category>
      <category>Region - Global</category>
      <category>Video</category>
      <category>Topic - Scam Detection</category>
      <category>Event - GASA Meet-Ups</category>
      <category>Region - North America</category>
      <category>Industry - Big Tech / Social Media</category>
      <pubDate>Mon, 20 Apr 2026 05:05:57 GMT</pubDate>
      <guid>https://gasa.org/knowledge-base/blog/on-the-frontlines-fighting-ai-powered-scams-fraud</guid>
      <dc:date>2026-04-20T05:05:57Z</dc:date>
      <dc:creator>Global Anti-Scam Alliance (GASA)</dc:creator>
    </item>
    <item>
      <title>Telecoms on the Front Line: GASA at the Stimson Center Dialogue on Combating Scams</title>
      <link>https://gasa.org/knowledge-base/blog/gasa-presents-global-scam-trends-and-the-importance-of-public-private-cooperation-at-stimson-center</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://gasa.org/knowledge-base/blog/gasa-presents-global-scam-trends-and-the-importance-of-public-private-cooperation-at-stimson-center" title="" class="hs-featured-image-link"&gt; &lt;img src="https://gasa.org/hubfs/Blog-4.jpg" alt="Telecoms on the Front Line: GASA at the Stimson Center Dialogue on Combating Scams" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;Last week at the Stimson Center, leaders from across the telecom, technology, and policy communities gathered to continue to address the hard truth: scams are no longer a fringe cybercrime issue—they are a systemic, global threat embedded in the communications infrastructure we all rely on.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://gasa.org/hs-fs/hubfs/Blog-4.jpg?width=833&amp;amp;height=469&amp;amp;name=Blog-4.jpg" width="833" height="469" alt="Blog-4" style="height: auto; max-width: 100%; width: 833px;"&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Last week at the Stimson Center, leaders from across the telecom, technology, and policy communities gathered to continue to address the hard truth: scams are no longer a fringe cybercrime issue—they are a systemic, global threat embedded in the communications infrastructure we all rely on.&lt;/span&gt;&lt;/p&gt;  
&lt;p&gt;&lt;span&gt;In opening remarks at the &lt;em&gt;Dialogue on Disrupting Scams in the Telecoms Sector&lt;/em&gt;, &lt;span style="font-weight: bold;"&gt;Global Anti-Scam Alliance (GASA) North America Chapter Director Nils Mueller&lt;/span&gt; grounded the conversation in data. The numbers are staggering: more than half of adults globally report experiencing a scam in the past year, with estimated annual losses between $442 billion and $1 trillion.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;But beyond the scale of the problem, &lt;/span&gt;&lt;span&gt;&lt;span style="line-height: 115%;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;emphasized something even more urgent: &lt;strong&gt;if we are going to protect consumers effectively, we have to stop more scams where they begin.&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Scams don’t start with a bank transfer.&lt;/span&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span&gt;They don’t start on a crypto exchange.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;They start with a message. A phone call, a text message, an email. An unexpected point of contact that feels just real enough to engage.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;According to GASA’s &lt;span style="font-weight: normal;"&gt;&lt;/span&gt;&lt;a href="https://gasa.org/knowledge-base/reports"&gt;&lt;span style="font-weight: normal;"&gt;&lt;em&gt;Global State of Scams 2025&amp;nbsp;Report&lt;/em&gt;&lt;/span&gt;&lt;/a&gt;, telecommunications channels—voice and SMS in particular—remain a predominant “front door” for scams.&lt;/span&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;&lt;img src="https://gasa.org/hs-fs/hubfs/image-1.png?width=955&amp;amp;height=539&amp;amp;name=image-1.png" width="955" height="539" alt="global state of scams 2025" style="height: auto; max-width: 100%; width: 955px;"&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;h3&gt;&lt;span style="font-size: 24px;"&gt;&lt;strong&gt;A Critical Intervention Point&lt;/strong&gt;&lt;/span&gt;&lt;/h3&gt; 
&lt;p&gt;&lt;span&gt;This reality places telecommunications providers on the front lines of scam prevention. As Mueller noted at the event, stopping scams at the point of contact - before a victim is ever engaged - represents one of the most effective ways to reduce harm at scale.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #340649;"&gt;Panelists at the Stimson Dialogue made it clear that progress is happening:&lt;/span&gt;&lt;/p&gt; 
&lt;ul style="list-style-type: disc;"&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;&lt;strong&gt;Industry efforts are advancing.&lt;/strong&gt; Josh Bercu shared insights from the Industry Traceback Group’s work to improve call authentication frameworks and traceback initiatives to identify and shut down bad actors. &lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;&lt;strong&gt;Technology innovation is accelerating.&lt;/strong&gt; Eugene Liderman demonstrated how Google is already using AI to detect, flag, and intervene effectively with Android phone users during scam calls and texts in real time.&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;&lt;strong&gt;Public-private collaboration is proving effective.&lt;/strong&gt; Hubert Han shared how public-private partnerships have strengthened telecom security and raised consumer awareness in Singapore.&lt;/span&gt;&lt;/li&gt; 
&lt;/ul&gt; 
&lt;h3 style="font-size: 24px;"&gt;&lt;strong&gt;&lt;span&gt;The Work Ahead&lt;/span&gt;&lt;/strong&gt;&lt;/h3&gt; 
&lt;p&gt;&lt;span&gt;Despite these advances, speakers were clear: much more remains to be done.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Scammers continue to exploit gaps across jurisdictions, technologies, and regulatory frameworks. The increasing use of AI by bad actors is also raising the stakes, enabling more convincing impersonation and faster iteration of scam tactics.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #340649;"&gt;To keep pace, participants emphasized that we need to continue advancing our strategies and improving our tools to:&lt;/span&gt;&lt;/p&gt; 
&lt;ul style="list-style-type: disc;"&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Detect and block spoofed or suspicious communications before they ever reach a consumer &lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Deploy real-time analytics to identify scams in progress &lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Strengthen onboarding and due diligence to prevent bad actors from exploiting networks &lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Share intelligence across borders and sectors to disrupt scam operations at scale&lt;/span&gt;&lt;/li&gt; 
&lt;/ul&gt; 
&lt;h3&gt;&lt;span style="font-size: 24px;"&gt;&lt;strong&gt;The Path Forward: Shared Responsibility&lt;/strong&gt;&lt;/span&gt;&lt;/h3&gt; 
&lt;p&gt;&lt;span&gt;The conversation at the Stimson Center made one thing clear: no single actor can solve this alone. But collective action is both possible—and urgent.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;GASA’s research shows that, as AI helps criminals to create increasingly believable scam communications, consumers are looking to their providers and institutions to better protect them against scams. &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Telecom providers have a unique and powerful opportunity to act as a first line of defense. But as the Stimson Center dialogue made clear, meaningful progress will depend on aligning innovation, policy, and industry action. By working together across sectors and borders, stakeholders can significantly reduce the volume of scam attempts—and the harm they cause.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #340649;"&gt;Through its research, thought leadership, and network convenings, GASA continues to work to promote what’s needed:&lt;/span&gt;&lt;/p&gt; 
&lt;ul style="list-style-type: disc;"&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;&lt;strong&gt;Expanded adoption of existing best practices,&lt;/strong&gt; e.g. call authentication, network-level blocking, and real-time detection&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;&lt;strong&gt;Continued investment in innovation&lt;/strong&gt;, including AI-driven defenses that can match the scale and sophistication of modern scams &lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;&lt;strong&gt;Outcome-oriented cross-sector collaboration&lt;/strong&gt; between telecom providers, technology companies, financial institutions, civil society organizations, and governments&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;&lt;strong&gt;Greater global coordination&lt;/strong&gt;, particularly to address cross-border scam operations&lt;/span&gt;&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;span&gt;&lt;span style="font-weight: bold;"&gt;What can you do?&lt;/span&gt; Connect with our team if you’re interested in getting involved and being part of the solution.&lt;/span&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="line-height: 20.85px;"&gt;&lt;em style="color: #340649;"&gt;&lt;span&gt;The GASA North America Chapter brings together several leading organizations across the region to address scams and fraud. &lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;a href="https://gasa.org/global-network/regions/north-america" style="font-style: italic;"&gt;&lt;span style="color: #05463d;"&gt;Learn more about the chapter and membership.&lt;/span&gt;&lt;/a&gt;&lt;span style="color: #05463d;"&gt;&lt;span style="font-style: italic;"&gt; &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;  
&lt;p&gt;GASA will continue to build on these discussions through its global convenings, bringing together leaders across sectors to drive coordinated action against scams.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://events.gasa.org/gass-europe-2026"&gt;&lt;strong&gt;Global Anti-Scam Summit Europe 2026&lt;/strong&gt;&lt;/a&gt;&lt;br&gt;9–10 June 2026&lt;br&gt;Convento do Beato, Lisbon, Portugal&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://events.gasa.org/gass-america-2026"&gt;&lt;strong&gt;Global Anti-Scam Summit America 2026&lt;/strong&gt;&lt;/a&gt;&lt;br&gt;2–3 September 2026&lt;br&gt;Pier 48, San Francisco, California&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://events.gasa.org/gass-asia-2026"&gt;&lt;strong&gt;Global Anti-Scam Summit Asia 2026&lt;/strong&gt;&lt;/a&gt;&lt;br&gt;10–11 November 2026&lt;br&gt;Pullman Bangkok King Power, Bangkok, Thailand&lt;/p&gt;  
&lt;img src="https://track-na2.hubspot.com/__ptq.gif?a=242978186&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fgasa.org%2Fknowledge-base%2Fblog%2Fgasa-presents-global-scam-trends-and-the-importance-of-public-private-cooperation-at-stimson-center&amp;amp;bu=https%253A%252F%252Fgasa.org%252Fknowledge-base%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>News</category>
      <category>Topic - Fraud Policy</category>
      <category>Region - North America</category>
      <category>Industry - Policy Makers</category>
      <pubDate>Tue, 14 Apr 2026 03:31:53 GMT</pubDate>
      <guid>https://gasa.org/knowledge-base/blog/gasa-presents-global-scam-trends-and-the-importance-of-public-private-cooperation-at-stimson-center</guid>
      <dc:date>2026-04-14T03:31:53Z</dc:date>
      <dc:creator>Global Anti-Scam Alliance (GASA)</dc:creator>
    </item>
    <item>
      <title>What Really Works in Preventing Fraud Against Older Adults? Insights from Frontline Practitioners</title>
      <link>https://gasa.org/knowledge-base/blog/what-works-in-preventing-fraud-against-older-adults</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://gasa.org/knowledge-base/blog/what-works-in-preventing-fraud-against-older-adults" title="" class="hs-featured-image-link"&gt; &lt;img src="https://gasa.org/hubfs/Blog%20banner.jpg" alt="What Really Works in Preventing Fraud Against Older Adults? Insights from Frontline Practitioners" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Fraud has quietly become the UK’s most common crime, now making up nearly &lt;a href="https://www.gov.uk/government/publications/fraud-strategy/fraud-strategy-stopping-scams-and-protecting-the-public"&gt;40% of all offences&lt;/a&gt;. And while people of all ages are targeted, older adults face some of the most severe consequences — losing more money, suffering greater emotional distress, and often receiving the least support. Yet despite the scale of the problem, there is still surprisingly little solid evidence about what truly works to prevent scams.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://gasa.org/hs-fs/hubfs/Blog%20banner.jpg?width=3840&amp;amp;height=2160&amp;amp;name=Blog%20banner.jpg" width="3840" height="2160" alt="Practitioner perspectives on what works in preventing fraud against older adults" style="height: auto; max-width: 100%; width: 3840px;"&gt;&lt;/p&gt; 
&lt;p&gt;Fraud has quietly become the UK’s most common crime, now making up nearly &lt;a href="https://www.gov.uk/government/publications/fraud-strategy/fraud-strategy-stopping-scams-and-protecting-the-public"&gt;40% of all offences&lt;/a&gt;. And while people of all ages are targeted, older adults face some of the most severe consequences — losing more money, suffering greater emotional distress, and often receiving the least support. Yet despite the scale of the problem, there is still surprisingly little solid evidence about what truly works to prevent scams.&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;A recent study, &lt;a href="https://www.sciencedirect.com/science/article/pii/S2949791426000084"&gt;&lt;em&gt;Practitioner Perspectives on What Works in Preventing Fraud Against Older Adults&lt;/em&gt;&lt;/a&gt;, set out to bridge that gap by asking the people closest to the issue – fraud prevention experts, police officers, NGOs, financial professionals, and government specialists – what they believe is most effective in protecting older adults. Drawing on interviews with 17 practitioners and survey responses from over 300 professionals, the study offers a rare, practice-based insight into what works, what doesn’t, and where efforts should shift.&lt;/p&gt; 
&lt;p&gt;The findings show that while fraud prevention is complex, certain strategies stand out as consistently effective.&lt;/p&gt; 
&lt;h2 style="font-size: 24px;"&gt;1. Tech That Blocks Scammers Before They Reach the Door&lt;/h2&gt; 
&lt;p&gt;One message came through loud and clear: technology that disrupts scammer communication works.&lt;/p&gt; 
&lt;p&gt;Tools like spam detectors, call&lt;span&gt;‑&lt;/span&gt;blocking apps, and real&lt;span&gt;‑&lt;/span&gt;time banking alerts were viewed as some of the most effective ways to prevent fraud. These tools intervene early &lt;span&gt;—&lt;/span&gt; often before an older adult even realises a scam attempt has occurred.&lt;/p&gt; 
&lt;p&gt;Practitioners noted that:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Real&lt;span&gt;‑&lt;/span&gt;time transaction alerts help people spot unexpected withdrawals or suspicious activity.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Call&lt;span&gt;‑&lt;/span&gt;blocking tools reduce exposure to phone&lt;span&gt;‑&lt;/span&gt;based scams, which remain a key method used against older adults.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Mobile apps that combine multiple features — such as scam call blocking, malware detection, and transaction monitoring — are becoming especially valuable.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;The benefit of these tools is simple: they reduce the need for individuals to evaluate whether a message, call, or alert is genuine. In a landscape where scams look increasingly convincing, this barrier is essential.&lt;/p&gt; 
&lt;h2 style="font-size: 24px;"&gt;2. Education Works — But Only When It’s Specific&lt;/h2&gt; 
&lt;p&gt;Mass advertising campaigns and generic warnings don’t significantly reduce fraud. Practitioners overwhelmingly agreed that education only works when it’s highly targeted.&lt;/p&gt; 
&lt;p&gt;T&lt;span style="color: #340649;"&gt;he most effective approaches include:&lt;/span&gt;&lt;/p&gt; 
&lt;ul style="list-style-type: disc;"&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Personalised, one‑to‑one training&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Alerts tailored specifically for older adults&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Campaigns focused on emerging scam types&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Community‑based talks where people can ask questions and share experiences&lt;/span&gt;&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p style="font-weight: bold;"&gt;What doesn’t work?&lt;/p&gt; 
&lt;p&gt;Broad “be aware of scams” campaigns, phishing tests that shame participants, and generic websites that overwhelm with information.&lt;/p&gt; 
&lt;p&gt;Crucially, older adults respond best when the messenger is someone they trust — family members, community organisations, police, or dedicated NGOs.&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #05463d;"&gt;&lt;a href="https://www.gasa.org/working-groups" style="color: #05463d;"&gt;&lt;em&gt;&lt;u&gt;Looking to contribute to collaborative anti-scam initiatives? GASA Working Groups bring members together to develop practical, real-world solutions.&lt;/u&gt;&lt;/em&gt;&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 24px;"&gt;3. Banks and Care Professionals Are on the Front Line&lt;/h2&gt; 
&lt;p&gt;The single most effective fraud&lt;span&gt;‑&lt;/span&gt;prevention method identified in the study was intervention by trained bank staff. When employees recognise the signs of active fraud &lt;span&gt;—&lt;/span&gt; a rushed transfer, unusual behaviour, a distressed customer &lt;span&gt;—&lt;/span&gt; they can step in and prevent losses.&lt;/p&gt; 
&lt;p&gt;Similarly, care professionals, from nurses to social workers, often spot early warning signs that family or friends might miss. Their intervention can stop fraud in its early stages, especially in cases of long&lt;span&gt;‑&lt;/span&gt;running scams or coercion.&lt;/p&gt; 
&lt;p&gt;Data analytics, account&lt;span&gt;‑&lt;/span&gt;level risk flags, and behaviour&lt;span&gt;‑&lt;/span&gt;based alerts further strengthen banks&lt;span&gt;’&lt;/span&gt; ability to detect suspicious transactions before they escalate.&lt;/p&gt; 
&lt;h2 style="font-size: 24px;"&gt;4. Partnerships Are Powerful — But Not Yet Visible&lt;/h2&gt; 
&lt;p&gt;Practitioners strongly support national and local partnerships across police, NGOs, banks, and tech companies. Yet surprisingly, most said they weren’t aware of existing collaborations.&lt;/p&gt; 
&lt;p&gt;The desire for coordinated, well&lt;span&gt;‑&lt;/span&gt;funded, visible partnerships is clear. Professionals want structured networks where:&lt;/p&gt; 
&lt;ul style="list-style-type: disc;"&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;New technology can be tested and rolled out&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Community support can be scaled&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Public awareness campaigns can align&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Innovations can be evaluated and shared&lt;/span&gt;&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Without coordination, promising approaches remain isolated and underused.&lt;/p&gt; 
&lt;h2 style="font-size: 24px; font-weight: normal;"&gt;Why This Matters&lt;/h2&gt; 
&lt;p&gt;Fraud is evolving quickly, and older adults are increasingly exposed as they use more digital services. While there is still a lack of rigorous scientific trials, insights from those on the ground offer valuable direction.&lt;/p&gt; 
&lt;ul style="list-style-type: disc;"&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;This research suggests the future of effective fraud prevention lies in:&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Smarter technology that blocks scams automatically&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Personalised, trusted education&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Strong intervention roles for banks and care professionals&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Better‑coordinated nationwide partnerships&lt;/span&gt;&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;And while more high&lt;span&gt;‑&lt;/span&gt;quality evaluation is badly needed, these practitioner insights offer a meaningful starting point &lt;span&gt;—&lt;/span&gt; evidence&lt;span&gt;‑&lt;/span&gt;informed strategies that can be put into practice now to help protect older adults from one of today&lt;span&gt;’&lt;/span&gt;s most pervasive crimes.&lt;/p&gt; 
&lt;p&gt;The full article can be read at Button, M., Karagiannopoulos, V., Shepherd, D., Kirby, A., Lee, J., Suh, J. B., ... &amp;amp; Koh, C. S. (2026). Practitioner Perspectives on What Works in Preventing Fraud Against Older Adults. Journal of Economic Criminology, 100213. &lt;a href="https://www.sciencedirect.com/science/article/pii/S2949791426000084?via%3Dihub"&gt;https://www.sciencedirect.com/science/article/pii/S2949791426000084&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="color: #05463d;"&gt;&lt;a href="https://40nv62.share-na2.hsforms.com/2HszREpgESHekaKa6DgkBKg" style="color: #05463d;"&gt;&lt;em&gt;&lt;u&gt;Sign up for the GASA newsletter to receive regular updates on scam prevention, research, and best practices.&lt;/u&gt;&lt;/em&gt;&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 24px; font-weight: normal;"&gt;About the Author&lt;/h2&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;Professor Mark Button&lt;/span&gt; is Professor of Criminology and Director of the Centre for Cybercrime and Economic Crime at the University of Portsmouth. His work focuses on fraud, cybercrime, and economic crime prevention, with a particular interest in the role of non-state actors in policing and security.&lt;/p&gt;  
&lt;img src="https://track-na2.hubspot.com/__ptq.gif?a=242978186&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fgasa.org%2Fknowledge-base%2Fblog%2Fwhat-works-in-preventing-fraud-against-older-adults&amp;amp;bu=https%253A%252F%252Fgasa.org%252Fknowledge-base%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Research</category>
      <category>Best Practices</category>
      <category>Region - Europe</category>
      <category>Topic - Fraud Prevention</category>
      <pubDate>Tue, 07 Apr 2026 04:34:41 GMT</pubDate>
      <author>mark.button@port.ac.uk (Prof. Mark Button)</author>
      <guid>https://gasa.org/knowledge-base/blog/what-works-in-preventing-fraud-against-older-adults</guid>
      <dc:date>2026-04-07T04:34:41Z</dc:date>
    </item>
    <item>
      <title>Brazil’s BC Protege+ Blocks Fake Bank Accounts Before They Can Be Opened</title>
      <link>https://gasa.org/knowledge-base/blog/brazils-bc-protege-blocks-fake-bank-accounts-before-they-can-be-opened</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://gasa.org/knowledge-base/blog/brazils-bc-protege-blocks-fake-bank-accounts-before-they-can-be-opened" title="" class="hs-featured-image-link"&gt; &lt;img src="https://gasa.org/hubfs/Blog-2.jpg" alt="Brazil Launches BC Protege+ to Block Fraudulent Bank Account Openings" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;Financial institutions are facing increasing exposure to &lt;/span&gt;&lt;strong&gt;&lt;span&gt;identity-based account fraud&lt;/span&gt;&lt;/strong&gt;&lt;span&gt;, particularly where onboarding relies on remote verification. Stolen documents, synthetic identities and manipulated facial data are being used to open accounts without the knowledge of the individual concerned. Biometric checks alone are not always sufficient when identity data has already been compromised.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://gasa.org/hs-fs/hubfs/Blog-2.jpg?width=3840&amp;amp;height=2160&amp;amp;name=Blog-2.jpg" width="3840" height="2160" alt="Blog-2" style="height: auto; max-width: 100%; width: 3840px;"&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Financial institutions are facing increasing exposure to &lt;/span&gt;&lt;strong&gt;&lt;span&gt;identity-based account fraud&lt;/span&gt;&lt;/strong&gt;&lt;span&gt;, particularly where onboarding relies on remote verification. Stolen documents, synthetic identities and manipulated facial data are being used to open accounts without the knowledge of the individual concerned. Biometric checks alone are not always sufficient when identity data has already been compromised.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;In response to this risk, the &lt;/span&gt;&lt;strong&gt;&lt;span&gt;Central Bank of Brazil&lt;/span&gt;&lt;/strong&gt;&lt;span&gt; introduced &lt;/span&gt;&lt;a href="https://www.bcb.gov.br/meubc/bcprotege"&gt;&lt;strong&gt;&lt;u&gt;&lt;span style="color: #1155cc;"&gt;BC Protege+&lt;/span&gt;&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;span&gt;. The tool allows individuals to proactively block the opening of new bank accounts in their name across the financial system, adding a preventive layer to existing onboarding controls.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Within its first month of operation, the Central Bank reported that more than &lt;/span&gt;&lt;strong&gt;&lt;span&gt;111,000&lt;/span&gt;&lt;/strong&gt;&lt;span&gt; attempted fraudulent account openings were &lt;/span&gt;&lt;strong&gt;&lt;span&gt;prevented&lt;/span&gt;&lt;/strong&gt;&lt;span&gt;. As of February 2026, the BC Protege+ service has reached &lt;/span&gt;&lt;a href="https://g1.globo.com/economia/noticia/2026/02/20/ferramenta-que-impede-abertura-de-contas-falsas-alcanca-1-milhao-de-adesoes-diz-banco-central.ghtml"&gt;&lt;strong&gt;&lt;u&gt;&lt;span style="color: #1155cc;"&gt;1 million&lt;/span&gt;&lt;/u&gt;&lt;/strong&gt;&lt;u&gt;&lt;span style="color: #1155cc;"&gt; activations&lt;/span&gt;&lt;/u&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span style="font-size: 24px;"&gt;&lt;strong&gt;Why Identity-Based Account Fraud Requires Structural Controls&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;Account opening fraud is not limited to isolated incidents. Once identity data is compromised, it can be reused across multiple institutions, allowing fraudulent accounts to be created at scale.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;International cases have shown how deepfake technology can be used to bypass selfie and biometric onboarding systems. In one case in Amsterdam, a man used &lt;/span&gt;&lt;a href="https://www.dutchnews.nl/2026/03/man-opened-46-bank-accounts-using-deepfakes-and-stolen-ids/"&gt;&lt;u&gt;&lt;span style="color: #1155cc;"&gt;deepfake images&lt;/span&gt;&lt;/u&gt;&lt;/a&gt;&lt;span&gt; of his own face together with stolen identity documents to open 46 bank accounts. Once opened, these accounts may be used for money mule activity, laundering scam proceeds or facilitating further fraud.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;These patterns expose a structural weakness. Once identity data has been compromised, the only point at which fraud can be stopped is during onboarding. If manipulation is not detected at that moment, an account can still be opened in the victim’s name.&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 24px;"&gt;&lt;strong&gt;&lt;span&gt;How BC Protege+ Works&lt;/span&gt;&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;BC Protege+ introduces a system-wide restriction mechanism managed centrally by the Central Bank.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Through the official portal, individuals and businesses can:&lt;/span&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Log in using their government digital identity credentials&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Activate a block on new current and savings account openings&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Review a history of activations and deactivations&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;See which financial institutions have consulted their status&lt;/span&gt;&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;span&gt;Once activated, the restriction is automatically communicated to participating financial institutions. The block remains in place until the individual chooses to deactivate it.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;The service is free and can be activated or cancelled at any time by the user.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;This model shifts part of fraud prevention upstream. Rather than relying solely on institutions to detect manipulation during onboarding, it enables individuals to stop fraudulent account creation before an application succeeds.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span style="font-size: 24px;"&gt;&lt;strong&gt;A Model With Replication Potential&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;BC Protege+ reflects a broader evolution in fraud prevention design. Rather than relying exclusively on biometric detection or institutional monitoring, it introduces a shared-responsibility model in which individuals can activate a recognised protective status across the banking system.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;This approach changes the risk model in several ways:&lt;/span&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;It creates an upstream barrier before fraudulent accounts are created&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;It reduces reliance on biometric-only onboarding controls&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;It limits the supply of mule accounts used to receive scam proceeds&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;It formalises coordination between central authorities and financial institutions&lt;/span&gt;&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;span&gt;For jurisdictions facing rising identity fraud or AI-enabled impersonation, a centrally managed blocking mechanism offers a structural complement to Know Your Customer and biometric safeguards.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Implementation will depend on national legal frameworks, digital identity infrastructure and institutional coordination. However, the Brazilian model demonstrates that preventive identity controls can be embedded at system level rather than applied institution by institution.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;&amp;nbsp;&lt;a href="https://www.gasa.org/working-groups"&gt;&lt;em&gt;&lt;u&gt;&lt;span style="color: #1155cc;"&gt;Looking to contribute to collaborative anti-scam initiatives? GASA Working Groups bring members together to develop practical, real-world solutions.&lt;/span&gt;&lt;/u&gt;&lt;/em&gt;&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span style="font-size: 24px;"&gt;&lt;strong&gt;What This Development Demonstrates&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;BC Protege+ illustrates how central authorities can introduce preventive mechanisms that reduce fraud opportunities before harm occurs. By enabling individuals and businesses to activate a system-wide restriction, the model shifts part of identity protection upstream and distributes responsibility across the financial ecosystem.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;As identity misuse becomes more sophisticated, structural controls that operate across institutions may become increasingly relevant. Brazil’s approach demonstrates how preventive design can strengthen financial integrity without relying solely on post-incident enforcement.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://40nv62.share-na2.hsforms.com/2HszREpgESHekaKa6DgkBKg"&gt;Sign up to the GASA newsletter for regular updates on scam prevention, research, and best practices.&lt;/a&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span style="font-size: 24px;"&gt;&lt;strong&gt;About the Author&lt;/strong&gt;&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;James Greening is a Digital Content Manager at the Global Anti-Scam Alliance (GASA), where he writes on cyber-enabled fraud and developments in the global fight against online scams. He previously founded Fake Website Buster, a project dedicated to identifying and raising awareness of fraudulent websites.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track-na2.hubspot.com/__ptq.gif?a=242978186&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fgasa.org%2Fknowledge-base%2Fblog%2Fbrazils-bc-protege-blocks-fake-bank-accounts-before-they-can-be-opened&amp;amp;bu=https%253A%252F%252Fgasa.org%252Fknowledge-base%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Topic - Fraud Prevention</category>
      <category>Industry - Financial Authorities</category>
      <category>Region - Latin America</category>
      <pubDate>Tue, 31 Mar 2026 07:00:00 GMT</pubDate>
      <author>james.greening@gasa.org (James Greening)</author>
      <guid>https://gasa.org/knowledge-base/blog/brazils-bc-protege-blocks-fake-bank-accounts-before-they-can-be-opened</guid>
      <dc:date>2026-03-31T07:00:00Z</dc:date>
    </item>
    <item>
      <title>From Vienna to Global Action: Key Takeaways from the UN Global Fraud Summit</title>
      <link>https://gasa.org/knowledge-base/blog/from-vienna-to-global-action-key-takeaways-from-the-un-global-fraud-summit</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://gasa.org/knowledge-base/blog/from-vienna-to-global-action-key-takeaways-from-the-un-global-fraud-summit" title="" class="hs-featured-image-link"&gt; &lt;img src="https://gasa.org/hubfs/image%20(9)-1.jpeg" alt="From Vienna to Global Action: Key Takeaways from the UN Global Fraud Summit" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;Date of Event:&lt;/span&gt; 16 -17 March 2026&lt;br&gt;&lt;span style="font-weight: bold;"&gt;Event: &lt;/span&gt;&lt;span style="font-weight: normal;"&gt;Global Fraud Summit&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;On March 16–17, global leaders convened in Vienna for the UN &lt;span style="font-weight: bold; font-style: italic;"&gt;Global Fraud Summit&lt;/span&gt;, hosted by UNODC, where GASA was proud to serve as a key supporter. With over 1,300 participants from more than 100 countries, spanning government, law enforcement, financial services, technology, and international organizations, one message was unmistakable: Fraud is global, organized, and accelerating. Likewise, our response must be ever more coordinated, connected, and operational. A strong &lt;/span&gt;&lt;a href="https://www.unodc.org/res/organized-crime/GFS/Global-Fraud-Summit-Outcome-Documents-English.pdf"&gt;&lt;u&gt;&lt;span style="color: #467886;"&gt;Call to Arms&lt;/span&gt;&lt;/u&gt;&lt;/a&gt;&lt;span&gt; agreed at the summit demonstrates that fraud is now embedded as a key international security and organized crime priority, and our efforts need to reflect that.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Across plenaries, expert panels, and working sessions, the summit focused on advancing public-private partnerships in action, strengthening global coordination, and moving from dialogue to implementation.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;As the Global Anti-Scam Alliance (GASA) aims to bringing together actors from public and private sectors, across jurisdictions and industries, we were proud to contribute to these discussions. The next stage is now to actively work out how to deliver on these priorities at our upcoming Global Anti-Scam Summits in &lt;a href="https://gasa.org/events/summit/gass-europe-2026"&gt;Lisbon&lt;/a&gt; (June), &lt;a href="https://gasa.org/events/summit/gass-america-2026"&gt;San Francisco&lt;/a&gt; (September), and &lt;a href="https://gasa.org/events/summit/gass-asia-2026"&gt;Bangkok&lt;/a&gt; (November).&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 24px;"&gt;&lt;strong&gt;&lt;span&gt;Public-private partnership in action&lt;/span&gt;&lt;/strong&gt;&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;A central theme throughout the summit was the urgent need to move beyond siloed efforts. Fraud networks operate seamlessly across borders, sectors, and modalities. Yet, our defenses remain fragmented, often inhibited by jurisdictional, legal, and operational barriers.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;The Summit featured over 53 side-events which reinforced that the next phase of anti-fraud efforts must be built on true public-p&lt;/span&gt;&lt;span&gt;rivate collaboration, not just as a concept but as a live operational model. This was reflected in a highly ambitious world-first, a &lt;/span&gt;&lt;a href="https://www.unodc.org/res/organized-crime/GFS/Global-Fraud-Summit-Outcome-Documents-English.pdf"&gt;&lt;u&gt;&lt;span style="color: #467886;"&gt;Global Public Private Partnership on Fraud&lt;/span&gt;&lt;/u&gt;&lt;/a&gt;&lt;span&gt;, which includes principles of joint action, including:&lt;/span&gt;&lt;/p&gt; 
&lt;ul style="list-style-type: disc;"&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Shared responsibility for tackling fraud&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Proactive and coordinated prevention&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Joint intelligence and data sharing between industry and law enforcement &lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Stronger victim support frameworks &lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Education for public and businesses&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;A strong focus on innovation and adaptability in the face of an ever-changing threat&lt;/span&gt;&lt;/li&gt; 
&lt;/ul&gt;</description>
      <content:encoded>&lt;p&gt;&lt;span style="font-weight: bold;"&gt;Date of Event:&lt;/span&gt; 16 -17 March 2026&lt;br&gt;&lt;span style="font-weight: bold;"&gt;Event: &lt;/span&gt;&lt;span style="font-weight: normal;"&gt;Global Fraud Summit&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="font-weight: normal;"&gt;&lt;img src="https://gasa.org/hs-fs/hubfs/image%20(9)-1.jpeg?width=833&amp;amp;height=469&amp;amp;name=image%20(9)-1.jpeg" width="833" height="469" alt="key insights from global fraud summit" style="height: auto; max-width: 100%; width: 833px;"&gt;&lt;/span&gt;&lt;span&gt;On March 16–17, global leaders convened in Vienna for the UN &lt;span style="font-weight: bold; font-style: italic;"&gt;Global Fraud Summit&lt;/span&gt;, hosted by UNODC, where GASA was proud to serve as a key supporter. With over 1,300 participants from more than 100 countries, spanning government, law enforcement, financial services, technology, and international organizations, one message was unmistakable: Fraud is global, organized, and accelerating. Likewise, our response must be ever more coordinated, connected, and operational. A strong &lt;/span&gt;&lt;a href="https://www.unodc.org/res/organized-crime/GFS/Global-Fraud-Summit-Outcome-Documents-English.pdf"&gt;&lt;u&gt;&lt;span style="color: #467886;"&gt;Call to Arms&lt;/span&gt;&lt;/u&gt;&lt;/a&gt;&lt;span&gt; agreed at the summit demonstrates that fraud is now embedded as a key international security and organized crime priority, and our efforts need to reflect that.&lt;/span&gt;&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Across plenaries, expert panels, and working sessions, the summit focused on advancing public-private partnerships in action, strengthening global coordination, and moving from dialogue to implementation.&lt;/span&gt;&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;As the Global Anti-Scam Alliance (GASA) aims to bringing together actors from public and private sectors, across jurisdictions and industries, we were proud to contribute to these discussions. The next stage is now to actively work out how to deliver on these priorities at our upcoming Global Anti-Scam Summits in &lt;a href="https://gasa.org/events/summit/gass-europe-2026"&gt;Lisbon&lt;/a&gt; (June), &lt;a href="https://gasa.org/events/summit/gass-america-2026"&gt;San Francisco&lt;/a&gt; (September), and &lt;a href="https://gasa.org/events/summit/gass-asia-2026"&gt;Bangkok&lt;/a&gt; (November).&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 24px;"&gt;&lt;strong&gt;&lt;span&gt;Public-private partnership in action&lt;/span&gt;&lt;/strong&gt;&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;A central theme throughout the summit was the urgent need to move beyond siloed efforts. Fraud networks operate seamlessly across borders, sectors, and modalities. Yet, our defenses remain fragmented, often inhibited by jurisdictional, legal, and operational barriers.&lt;/span&gt;&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;The Summit featured over 53 side-events which reinforced that the next phase of anti-fraud efforts must be built on true public-p&lt;/span&gt;&lt;span&gt;rivate collaboration, not just as a concept but as a live operational model. This was reflected in a highly ambitious world-first, a &lt;/span&gt;&lt;a href="https://www.unodc.org/res/organized-crime/GFS/Global-Fraud-Summit-Outcome-Documents-English.pdf"&gt;&lt;u&gt;&lt;span style="color: #467886;"&gt;Global Public Private Partnership on Fraud&lt;/span&gt;&lt;/u&gt;&lt;/a&gt;&lt;span&gt;, which includes principles of joint action, including:&lt;/span&gt;&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;ul style="list-style-type: disc;"&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Shared responsibility for tackling fraud&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Proactive and coordinated prevention&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Joint intelligence and data sharing between industry and law enforcement &lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Stronger victim support frameworks &lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Education for public and businesses&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;A strong focus on innovation and adaptability in the face of an ever-changing threat&lt;/span&gt;&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;span&gt;Where data is increasingly collected and shared between public and private sectors, for example through the Global Signal Exchange, it is becoming imperative to shift our mindset from data &lt;/span&gt;&lt;em&gt;&lt;span&gt;sharing &lt;/span&gt;&lt;/em&gt;&lt;span&gt;to data &lt;/span&gt;&lt;em&gt;&lt;span&gt;activation&lt;/span&gt;&lt;/em&gt;&lt;span&gt;.&lt;span style="color: #340649;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style="color: #340649;"&gt;As Chris Compton from&lt;span style="line-height: 19.7625px;"&gt;&amp;nbsp;Microsoft&lt;/span&gt;&amp;nbsp;captured succinctly:&lt;/span&gt;&lt;/p&gt; 
&lt;p style="font-weight: normal;"&gt;We must start turning insights into measurable disruption.&lt;/p&gt; 
&lt;h2 style="font-size: 24px;"&gt;&lt;strong&gt;&lt;span&gt;From frameworks to real-world action&lt;/span&gt;&lt;/strong&gt;&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;Beyond strategy, the summit highlighted tangible examples of what effective government and law enforcement collabo&lt;span style="color: #340649;"&gt;ration looks like in practice. A standout case was Nigeria’s Joint Case Team on Cybercrime (JCTC), an inter-agency model bringing together:&lt;/span&gt;&lt;/span&gt;&lt;span style="background-color: #c6c6c6; color: #340649;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;ul style="list-style-type: disc;"&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Law enforcement &lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Financial intelligence units &lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Prosecutors &lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;The judiciary &lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;span&gt;&lt;span style="color: #340649;"&gt;This integrated approach, similar to the concept of national anti-scam centers, significantly accelerates investigations and case handling, demon&lt;/span&gt;strating how breaking down institutional silos leads directly to operational impact. Additionally, these centres can then bring international partners on board to have much more effective global operations to target the ringleaders of fraud gangs.&lt;/span&gt;&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;These models signal a shift from fragmented response to coordinated systems-level defense; which is becoming ever more instrumental in the fight against scams.&lt;/span&gt;&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 24px;"&gt;&lt;strong&gt;&lt;span&gt;The rise of AI-driven scams&lt;/span&gt;&lt;/strong&gt;&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;Another urgent theme across multiple sessions: the rapid evolution of AI-enabled fraud. We are no longer preparing for this shift, we are already in it. AI-driven scams are:&lt;/span&gt;&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;ul style="list-style-type: disc;"&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;More convincing (e.g. with deepfakes)&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;More scalable (e.g. the rapid onset of agentic AI)&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Significantly more effective (with success rates reportedly 4–5x higher than traditional scams, according to INTERPOL’s latest research)&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;Easier to coordinate and more difficult to disrupt&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;span style="color: #340649;"&gt;This creates a dual reality:&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;ul style="list-style-type: disc;"&gt; 
 &lt;li&gt;&lt;span style="color: #340649;"&gt;A rapidly escalating threat landscape &lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span&gt;&lt;span style="color: #340649;"&gt;A powerful opportunity to deploy AI defensively&lt;/span&gt; &lt;/span&gt;&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;span&gt;Tools like our recently launched &lt;a href="http://scam.org"&gt;Scam.org&lt;/a&gt;&amp;nbsp;demonstrate how AI can be used to educate, support victims, and strengthen prevention at scale. The key question moving forward is not whether AI will shape fraud... but who will use it more effectively.&lt;/span&gt;&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 24px;"&gt;&lt;strong&gt;&lt;span&gt;What’s next: from Vienna to Lisbon and beyond&lt;/span&gt;&lt;/strong&gt;&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;The conversations in Vienna marked a significant step forward, but they are only the beginning. At GASA, we are committed to turning these insights into concrete, coordinated action.&lt;/span&gt;&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;This continues at our upcoming Global Anti-Scam Summits, in &lt;a href="https://gasa.org/events/summit/gass-europe-2026"&gt;Lisbon&lt;/a&gt; (June), &lt;a href="https://gasa.org/events/summit/gass-america-2026"&gt;San Francisco&lt;/a&gt; (September), and &lt;a href="https://gasa.org/events/summit/gass-asia-2026"&gt;Bangkok&lt;/a&gt; (November). &lt;/span&gt;&lt;span&gt;These summits are where strategy meets execution, and where the global community comes together to turn collaboration into impact.&lt;/span&gt;&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;If Vienna made one thing clear, it’s this: The fight against scams will not be won in isolation. It will be won through coordinated, global action. And the time to act is now.&lt;/span&gt;&lt;span style="background-color: #c6c6c6;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;&lt;a href="https://gasa.org/events"&gt;&lt;em&gt;Explore our upcoming events &amp;amp; webinars to continue the conversation, or browse past sessions for deeper insights into evolving scam threats.&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;  
&lt;img src="https://track-na2.hubspot.com/__ptq.gif?a=242978186&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fgasa.org%2Fknowledge-base%2Fblog%2Ffrom-vienna-to-global-action-key-takeaways-from-the-un-global-fraud-summit&amp;amp;bu=https%253A%252F%252Fgasa.org%252Fknowledge-base%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Region - Global</category>
      <category>Scam Trends</category>
      <category>Topic - Fraud Policy</category>
      <category>Industry - Law Enforcement</category>
      <pubDate>Fri, 27 Mar 2026 07:26:19 GMT</pubDate>
      <guid>https://gasa.org/knowledge-base/blog/from-vienna-to-global-action-key-takeaways-from-the-un-global-fraud-summit</guid>
      <dc:date>2026-03-27T07:26:19Z</dc:date>
      <dc:creator>Global Anti-Scam Alliance (GASA)</dc:creator>
    </item>
    <item>
      <title>League of Protectors: Women Fighting Against Scams</title>
      <link>https://gasa.org/knowledge-base/blog/league-of-protectors-women-fighting-against-scams</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://gasa.org/knowledge-base/blog/league-of-protectors-women-fighting-against-scams" title="" class="hs-featured-image-link"&gt; &lt;img src="https://gasa.org/hubfs/webinar%20thumbnail-01-Mar-25-2026-10-28-00-0372-AM.jpg" alt="League of Protectors: Women Fighting Against Scams" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;Date of Event: &lt;/span&gt;25 March 2026&lt;br&gt;&lt;span style="font-weight: bold;"&gt;Event: &lt;/span&gt;GASA Meet-Up&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://app.livestorm.co/global-anti-scam-alliance/women-fighters-against-scams-league-of-protectors/live?s=1e857155-a0c5-4854-babe-81eb52437a4a"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="line-height: 20.925px;"&gt;Scams are no longer isolated incidents. They are fast, organized, emotionally manipulative, and increasingly designed to exploit trust at scale. And for many women, the impact goes far beyond financial loss; affecting confidence, safety, and peace of mind.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="line-height: 20.925px;"&gt;That was the focus of &lt;em&gt;League of Protectors: Women Fighting Against Scams&lt;/em&gt;, GASA’s International Women’s Month webinar, which brought together women leaders from telecom, payments, cybersecurity, policy, and civil society to examine how scams are targeting women, and what it will take to stop them.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;strong style="color: #340649; font-size: 1rem;"&gt;Speakers:&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Patricia Eromosele, Director – Africa Chapter, Global Anti-Scam Alliance (Moderator)&lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Erica Okibe, Executive Secretary – Ndukwe Kalu Foundation (NKF)&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;span style="font-size: 1rem;"&gt;Irish Salandanan-Almeida, Chief Privacy Officer and Vice President for Digital Policy – Globe Telecom&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;span style="font-size: 1rem;"&gt;Mel Migrino, Country General Manager / Southeast Asia Regional Director – Information Security, Gogolook; Chairperson and President and Chief Executive Officer – WiSAP (Women in Security Alliance Philippines)&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;span style="font-size: 1rem;"&gt;Reski Damayanti, Chief Legal &amp;amp; Regulatory Officer – Indosat Ooredoo Hutchison&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;span&gt;Stella Uchenna, Vice President – Women in CyberSecurity (WiCyS) Nigeria Affiliate&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Wanjing Ji, VP, AP Payment Ecosystem Risk – Visa&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt;</description>
      <content:encoded>&lt;p&gt;&lt;span style="font-weight: bold;"&gt;Date of Event: &lt;/span&gt;25 March 2026&lt;br&gt;&lt;span style="font-weight: bold;"&gt;Event: &lt;/span&gt;GASA Meet-Up&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://app.livestorm.co/global-anti-scam-alliance/women-fighters-against-scams-league-of-protectors/live?s=1e857155-a0c5-4854-babe-81eb52437a4a"&gt;&lt;img src="https://gasa.org/hs-fs/hubfs/webinar%20thumbnail-01-Mar-25-2026-10-28-00-0372-AM.jpg?width=2508&amp;amp;height=1415&amp;amp;name=webinar%20thumbnail-01-Mar-25-2026-10-28-00-0372-AM.jpg" width="2508" height="1415" alt="league of protectors webinar gasa" style="height: auto; max-width: 100%; width: 2508px;"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="line-height: 20.925px;"&gt;Scams are no longer isolated incidents. They are fast, organized, emotionally manipulative, and increasingly designed to exploit trust at scale. And for many women, the impact goes far beyond financial loss; affecting confidence, safety, and peace of mind.&lt;/span&gt;&lt;span style="background-color: #606060; line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="line-height: 20.925px;"&gt;That was the focus of &lt;em&gt;League of Protectors: Women Fighting Against Scams&lt;/em&gt;, GASA’s International Women’s Month webinar, which brought together women leaders from telecom, payments, cybersecurity, policy, and civil society to examine how scams are targeting women, and what it will take to stop them.&lt;/span&gt;&lt;span style="background-color: #606060; line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;strong style="color: #340649; font-size: 1rem;"&gt;Speakers:&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Patricia Eromosele, Director – Africa Chapter, Global Anti-Scam Alliance (Moderator)&lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Erica Okibe, Executive Secretary – Ndukwe Kalu Foundation (NKF)&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;span style="font-size: 1rem;"&gt;Irish Salandanan-Almeida, Chief Privacy Officer and Vice President for Digital Policy – Globe Telecom&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;span style="font-size: 1rem;"&gt;&lt;/span&gt;&lt;span style="font-size: 1rem;"&gt;Mel Migrino, Country General Manager / Southeast Asia Regional Director – Information Security, Gogolook; Chairperson and President and Chief Executive Officer – WiSAP (Women in Security Alliance Philippines)&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;span style="font-size: 1rem;"&gt;&lt;/span&gt;&lt;span style="font-size: 1rem;"&gt;Reski Damayanti, Chief Legal &amp;amp; Regulatory Officer – Indosat Ooredoo Hutchison&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;span style="font-size: 1rem;"&gt;&lt;/span&gt;&lt;span&gt;Stella Uchenna, Vice President – Women in CyberSecurity (WiCyS) Nigeria Affiliate&lt;/span&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;span style="font-size: 1rem;"&gt;&lt;/span&gt;Wanjing Ji, VP, AP Payment Ecosystem Risk – Visa&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 24px;"&gt;&lt;strong&gt;&lt;span style="line-height: 20.925px;"&gt;Women are already doing many of the right things&lt;/span&gt;&lt;/strong&gt;&lt;span style="background-color: #606060; line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="line-height: 20.925px;"&gt;Patricia opened with insights from GASA’s 2025 gender data, which shows that women are more likely than men to adopt protective behaviors that reduce scam risk. Women are more likely to verify suspicious offers with friends and family and more likely to read reviews before acting. Those behaviors matter: women experience fewer scams overall than men and are less likely to lose money when targeted.&lt;/span&gt;&lt;span style="background-color: #606060; line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="line-height: 20.925px;"&gt;But the same data also reveals a troubling gap. Women report lower confidence in recognizing scams, higher stress after being targeted, and are less likely to report scams to authorities. In other words, women are often taking the right steps, yet still carrying a heavier emotional burden.&lt;/span&gt;&lt;span style="background-color: #606060; line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 24px;"&gt;&lt;strong&gt;&lt;span style="line-height: 20.925px;"&gt;The same scam patterns are showing up across regions&lt;/span&gt;&lt;/strong&gt;&lt;span style="background-color: #606060; line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="line-height: 20.925px;"&gt;From Indonesia, Reski Damayanti pointed to three major threats affecting women: romance scams, investment scams, and online shopping scams. She noted that in Indonesia, around 60% of love scam victims are women, while low financial literacy and economic pressure make fraudulent investment offers especially dangerous.&lt;/span&gt;&lt;span style="background-color: #606060; line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="line-height: 20.925px;"&gt;From the payments side, VISA’s Wanjing Ji described how romance and connection-based scams continue to surface across Visa’s network. She shared the example of a fake dating scam operation in which bots built emotional trust, encouraged small payments, and then stole payment details for repeated unauthorized charges. Her warning was clear: scam operations are becoming increasingly industrialized.&lt;/span&gt;&lt;span style="background-color: #606060; line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="line-height: 20.925px;"&gt;That same pattern was echoed by Uchenna Stella Emeka-Obi, who described how romance and investment scams exploit social pressure, emotional urgency, and silence. In her view, shame and victim-blaming still prevent too many women from speaking up, allowing scams to spread quietly through communities.&lt;/span&gt;&lt;span style="background-color: #606060; line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 24px;"&gt;&lt;strong&gt;&lt;span style="line-height: 20.925px;"&gt;Behind every scam is a human story&lt;/span&gt;&lt;/strong&gt;&lt;span style="background-color: #606060; line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="line-height: 20.925px;"&gt;Some of the strongest moments came from the speakers’ personal stories.&lt;/span&gt;&lt;span style="background-color: #606060; line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="line-height: 20.925px;"&gt;Irish Salandanan-Almeida shared how she almost became a victim herself after receiving alerts that her credit card was being used fraudulently. Because she acted quickly and reported it immediately, the bank was able to reverse the charges. Her story reinforced a simple but powerful lesson: awareness and fast action matter.&lt;/span&gt;&lt;span style="background-color: #606060; line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="line-height: 20.925px;"&gt;Mel Migriño recounted meeting a woman at a resort in the Philippines who had paid around 26,000 pesos for a fake hotel booking arranged through convincing brochures and false promotions. The financial loss was serious, but the emotional impact was even greater: the scam disrupted a family celebration, and drained money meant for essential needs.&lt;/span&gt;&lt;span style="background-color: #606060; line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="line-height: 20.925px;"&gt;Erika Okibe shared a similar story of nearly sending money to someone impersonating her uncle in a family WhatsApp group. The message created urgency around a sick relative, and only a pause to verify stopped the scam in time. Her takeaway was one many speakers repeated: scammers are highly effective at using emotion, urgency, and familiarity to lower people’s guard.&lt;/span&gt;&lt;span style="background-color: #606060; line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 24px;"&gt;&lt;strong&gt;&lt;span style="line-height: 20.925px;"&gt;Why cross-border collaboration can’t wait&lt;/span&gt;&lt;/strong&gt;&lt;span style="background-color: #606060; line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="line-height: 20.925px;"&gt;Again and again, the panel returned to the same conclusion: no single sector can solve scams alone.&lt;/span&gt;&lt;span style="background-color: #606060; line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="line-height: 20.925px;"&gt;Reski described a fragmented system in which responsibility is passed between telecoms, banks, and law enforcement while scammers move money and infrastructure across borders. Wanjing stressed that inconsistent rules around data sharing are creating dangerous visibility gaps. If suspicious domains, spoofed identities, fraudulent merchant patterns, and other impersonation signals were shared earlier across platforms, telecoms, financial institutions, and regulators, intervention could happen much faster.&lt;/span&gt;&lt;span style="background-color: #606060; line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="line-height: 20.925px;"&gt;That need for trusted, standardized cross-border intelligence sharing emerged as one of the clearest calls to action from the session.&lt;/span&gt;&lt;span style="background-color: #606060; line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 24px;"&gt;&lt;strong&gt;&lt;span style="line-height: 20.925px;"&gt;Awareness must lead to action&lt;/span&gt;&lt;/strong&gt;&lt;span style="background-color: #606060; line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="line-height: 20.925px;"&gt;The webinar also made clear that technology alone is not enough. Public education, community awareness, and practical digital literacy remain some of the strongest defenses.&lt;/span&gt;&lt;span style="background-color: #606060; line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="line-height: 20.925px;"&gt;Irish highlighted Globe’s work on digital literacy for both young people and seniors. Uchenna boiled her advice down to three simple words: pause, verify, report. Erika called for more advocacy and more spaces where women feel safe to speak openly about their experiences.&lt;/span&gt;&lt;span style="background-color: #606060; line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="line-height: 20.925px;"&gt;Closing the session, Intan Faradila reminded participants that scams are not just technical attacks, they exploit stress, trust, and moments of vulnerability. She also highlighted the ASEAN Foundation’s SCAM Ready program, supported by Google, which aims to equip 3 million people with the knowledge and confidence to recognize and respond to scams.&lt;/span&gt;&lt;span style="background-color: #606060; line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 24px;"&gt;&lt;strong&gt;&lt;span style="line-height: 20.925px;"&gt;From discussion to collective action&lt;/span&gt;&lt;/strong&gt;&lt;span style="background-color: #606060; line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span style="line-height: 20.925px;"&gt;The session ended with a series of pledges: stronger education, stronger partnerships, and stronger protections across the ecosystem. Together, they reflected the webinar’s core message: women are already leading in scam prevention, but systems must do more to support them.&lt;/span&gt;&lt;span style="background-color: #606060; line-height: 20.925px;"&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="line-height: 20.925px;"&gt;Scams are evolving fast. Our response must evolve faster, and it must be collaborative, practical, and global.&lt;/span&gt;&lt;span style="line-height: 20.925px;"&gt;&lt;span style="white-space-collapse: preserve;"&gt; &lt;/span&gt;&lt;br style="white-space-collapse: preserve;"&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="line-height: 20.925px;"&gt;&lt;span style="white-space-collapse: preserve;"&gt;When women are informed, supported, and heard, the impact extends far beyond the individual. It strengthens families, communities, and the wider fight against scams.&lt;span style="background-color: #606060; line-height: 20.925px;"&gt; &lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;Watch the full discussion to learn how women leaders are driving global efforts to combat scams.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;&lt;a href="https://gasa.org/events"&gt;&lt;em&gt;Explore our upcoming webinars to continue the conversation, or browse past sessions for deeper insights into evolving scam threats.&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;  
&lt;img src="https://track-na2.hubspot.com/__ptq.gif?a=242978186&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fgasa.org%2Fknowledge-base%2Fblog%2Fleague-of-protectors-women-fighting-against-scams&amp;amp;bu=https%253A%252F%252Fgasa.org%252Fknowledge-base%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Video</category>
      <category>Scam Trends</category>
      <category>Region - Africa</category>
      <category>Event - GASA Meet-Ups</category>
      <category>Region - Asia-Pacific</category>
      <pubDate>Wed, 25 Mar 2026 10:36:44 GMT</pubDate>
      <guid>https://gasa.org/knowledge-base/blog/league-of-protectors-women-fighting-against-scams</guid>
      <dc:date>2026-03-25T10:36:44Z</dc:date>
      <dc:creator>Global Anti-Scam Alliance (GASA)</dc:creator>
    </item>
    <item>
      <title>The Real Gap in Fraud Defense Is Strategy, Not AI</title>
      <link>https://gasa.org/knowledge-base/blog/the-real-gap-in-fraud-defense-is-strategy-not-ai</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://gasa.org/knowledge-base/blog/the-real-gap-in-fraud-defense-is-strategy-not-ai" title="" class="hs-featured-image-link"&gt; &lt;img src="https://gasa.org/hubfs/73a75e_12e77748f6f84cc39d68b98dba862ea4~mv2.jpg" alt="The Real Gap in Fraud Defense Is Strategy, Not AI" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;Fraud and scams are out of control. Everyone knows it. Attempts are up, losses are up, and complexity is up. And the standard response has been predictable – fight deception with better detection. Enter AI, faster models, and myriad “solutions”. Yet outcomes keep getting worse.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://gasa.org/hs-fs/hubfs/73a75e_12e77748f6f84cc39d68b98dba862ea4~mv2.jpg?width=868&amp;amp;height=488&amp;amp;name=73a75e_12e77748f6f84cc39d68b98dba862ea4~mv2.jpg" width="868" height="488" alt="73a75e_12e77748f6f84cc39d68b98dba862ea4~mv2" style="height: auto; max-width: 100%; width: 868px;"&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Fraud and scams are out of control. Everyone knows it. Attempts are up, losses are up, and complexity is up. And the standard response has been predictable – fight deception with better detection. Enter AI, faster models, and myriad “solutions”. Yet outcomes keep getting worse.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;p&gt;&lt;span&gt;That is because we are fighting a strategic problem with tactical tools. Across the ecosystem, governments, platforms, banks, telcos, and exchanges are deploying AI-driven fraud detection at scale. Each organization is doing what it can within its own mandate, budget, and risk appetite. On paper, this looks like progress. In practice, it is a fragmented arms race.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Scammers are winning this asymmetric war, exploiting the seams across channels and jurisdictions, and rapidly adopting cheap AI tools openly available for as little as $25. GenAI has dramatically changed the fraud landscape, not just in volume, but in sophistication and conversion. Scams now feel personal and much more persistent, with conversations adapting in real time. AI removes barriers at the moment when trust matters most. Voice cloning and video deepfakes shatter our normal skepticism, moving scam victims from first contact to irreversible action in a matter of hours, not days, thereby shrinking the window for intervention.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;At the same time, our defenses remain siloed. Each institution sees a slice of the scam journey. Platforms see behavior, telcos see origin signals, banks see transactions, law enforcement see victims; no one sees the whole picture. Most AI fraud models are trained on an organization’s own data, its customers, its transactions, its historical fraud cases. Alerts trigger when activity crosses thresholds that make sense for that organization’s risk appetite, regulatory exposure, and cost tolerance. Moreover, decisions are optimized for internal risk, not system-wide harm. Scammers exploit this perfectly.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;They probe the ecosystem for weak seams. When pressure rises on one platform, they shift to another. When banks tighten controls, they reroute through payments, crypto, or telcos. Fraud does not move in a straight line; it moves to the weakest control point. When detection improves in one sector, scammers shift to another channel. When one platform tightens controls, activity migrates to the next weakest link. This is the balloon effect -- squeeze in one place and the fraud pops up somewhere else.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;The result is a tactical arms race. Everyone deploys the best weapons they can afford, not the weapons the system actually needs. Large technology platforms invest heavily in AI detection and trust infrastructure. Top-tier e-commerce players are not far behind. Banks vary widely depending on leadership, regulation, and willingness to pay. Telcos operate on the thinnest margins of all, despite sitting at the front lines of scam delivery. This uneven defense landscape guarantees failure.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Even the best AI model cannot compensate for fragmented visibility. It cannot see what it is not allowed to see, and it cannot act where it has no authority. It cannot coordinate responses across institutions that do not share signals, timing, or incentives. More AI inside silos will not fix this. In fact, it may make things worse. Faster detection in one place simply may accelerate displacement elsewhere. This is not a technology failure. It is a coordination failure.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;&lt;u&gt;&lt;a href="https://www.gasa.org/working-groups"&gt;&lt;em&gt;Looking to contribute to collaborative anti-scam initiatives? GASA Working Groups bring members together to develop practical, real-world solutions.&lt;/em&gt;&lt;/a&gt;&lt;/u&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;What reduces losses today is not smarter detection alone, but rather earlier intervention enabled by shared signals and clear shared responsibility. We need to know who acts when risk first appears and align incentives so that speed matters more than liability avoidance.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;We see this where coordination exists. National Anti-Scam Centers are one example. When designed well, they provide a focal point for cross-sector intelligence, escalation, and action. &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Not just reporting and dashboards, but actual operational coordination. Shared signal environments are another. When banks, platforms, telcos, and exchanges act on common indicators in near real time, scams attack chains break earlier. Infrastructure gets disrupted, victims get contacted by their bank before trust in the scam hardens, and losses stop.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;These are not theoretical benefits; they are observable outcomes. The lesson is simple. Fraud is now a system-level risk, and it must be managed as such. That requires strategy, not just tactics. A strategy starts with accepting that no single actor can solve this alone, which is why the Global Anti-Scam Alliance (GASA) exists, bringing together government, law enforcement, industry and civil society to find solutions.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Our strategy should prioritize early disruption over late-stage recovery and invest in shared visibility, not just internal performance metrics. Until we make a shift, we will keep building better tools, and we will keep losing because scammers are not fighting tactically. They are exploiting our lack of strategy, and they are very good at it.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;&lt;u&gt;&lt;a href="https://www.gasa.org/newsletter"&gt;&lt;em&gt;Sign up to the GASA newsletter for regular updates on scam prevention, research, and best practices.&lt;/em&gt;&lt;/a&gt;&lt;/u&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;h2 style="font-size: 36px;"&gt;&lt;strong&gt;About the Author&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;span&gt;&lt;strong&gt;Brian D. Hanley &lt;/strong&gt; is the Director - Asia-Pacific at the Global Anti-Scam Alliance (GASA), building coalitions across the region to combat scams. He has worked in 30+ countries as an international development expert, and brings more than 20 years of experience advancing democratic governance, human rights, civil society and media across Asia and the Pacific.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track-na2.hubspot.com/__ptq.gif?a=242978186&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fgasa.org%2Fknowledge-base%2Fblog%2Fthe-real-gap-in-fraud-defense-is-strategy-not-ai&amp;amp;bu=https%253A%252F%252Fgasa.org%252Fknowledge-base%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Industry - National Cyber Security Centers (NCSCs)</category>
      <category>Industry - Telecom Operators / Hosters</category>
      <category>Topic - Data Sharing</category>
      <category>Region - Global</category>
      <category>Scam Trends</category>
      <category>Topic - Fraud Policy</category>
      <category>Industry - Law Enforcement</category>
      <category>Region - Asia-Pacific</category>
      <category>Industry - Registries / Registrars</category>
      <category>Industry - Policy Makers</category>
      <category>Industry - Big Tech / Social Media</category>
      <category>Topic - Scam Prosecution &amp; Enforcement</category>
      <pubDate>Tue, 24 Mar 2026 07:00:39 GMT</pubDate>
      <guid>https://gasa.org/knowledge-base/blog/the-real-gap-in-fraud-defense-is-strategy-not-ai</guid>
      <dc:date>2026-03-24T07:00:39Z</dc:date>
      <dc:creator>Brian D. Hanley</dc:creator>
    </item>
    <item>
      <title>New Executive Order on Cybercrime and Fraud Marks a More Coordinated U.S. Response</title>
      <link>https://gasa.org/knowledge-base/blog/new-executive-order-on-cybercrime-and-fraud-marks-a-more-coordinated-u.s.-response</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://gasa.org/knowledge-base/blog/new-executive-order-on-cybercrime-and-fraud-marks-a-more-coordinated-u.s.-response" title="" class="hs-featured-image-link"&gt; &lt;img src="https://gasa.org/hubfs/Blog-1.jpg" alt="executive order on scam networks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;The U.S. Government has taken a significant step in addressing the growing threat of online fraud with the release of a new &lt;/span&gt;&lt;strong&gt;&lt;span&gt;Executive Order&lt;/span&gt;&lt;/strong&gt;&lt;span&gt; titled &lt;/span&gt;&lt;a href="https://www.whitehouse.gov/presidential-actions/2026/03/combating-cybercrime-fraud-and-predatory-schemes-against-american-citizens/"&gt;&lt;em&gt;&lt;u&gt;&lt;span style="color: #1155cc;"&gt;Combating Cybercrime, Fraud, and Predatory Schemes Against American Citizens&lt;/span&gt;&lt;/u&gt;&lt;/em&gt;&lt;/a&gt;&lt;span&gt;. The order formally recognises scams, referred to as “predatory schemes”, as a national priority and outlines a more coordinated, whole-of-government response.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;img src="https://gasa.org/hs-fs/hubfs/Blog-1.jpg?width=3840&amp;amp;height=2160&amp;amp;name=Blog-1.jpg" width="3840" height="2160" alt="Executive Order on scam networks" style="height: auto; max-width: 100%; width: 3840px;"&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;The U.S. Government has taken a significant step in addressing the growing threat of online fraud with the release of a new &lt;/span&gt;&lt;strong&gt;&lt;span&gt;Executive Order&lt;/span&gt;&lt;/strong&gt;&lt;span&gt; titled &lt;/span&gt;&lt;a href="https://www.whitehouse.gov/presidential-actions/2026/03/combating-cybercrime-fraud-and-predatory-schemes-against-american-citizens/"&gt;&lt;em&gt;&lt;u&gt;&lt;span style="color: #1155cc;"&gt;Combating Cybercrime, Fraud, and Predatory Schemes Against American Citizens&lt;/span&gt;&lt;/u&gt;&lt;/em&gt;&lt;/a&gt;&lt;span&gt;. The order formally recognises scams, referred to as “predatory schemes”, as a national priority and outlines a more coordinated, whole-of-government response.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Until now, federal anti-fraud efforts have been fragmented across agencies and focused primarily on financial crimes and cybersecurity. This Executive Order is the first to name scams, scam centres, and &lt;/span&gt;&lt;strong&gt;&lt;span&gt;Transnational Criminal Organizations (TCOs)&lt;/span&gt;&lt;/strong&gt;&lt;span&gt; as a distinct national policy problem.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Senior officials across State, Treasury, Justice, Homeland Security, and Defense have been directed to submit an &lt;/span&gt;&lt;strong&gt;&lt;span&gt;Action Plan&lt;/span&gt;&lt;/strong&gt;&lt;span&gt; outlining how the government will target transnational criminal organisations and improve coordination, including partnerships with the private sector.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;The Attorney General has also been directed to prioritize the prosecution of cyber-enabled fraud, including scams and sextortion schemes. At the same time, the Department of Homeland Security, through CISA, will provide training and technical support to state and local partners.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;The order also places emphasis on victim support and restitution. The Attorney General must provide recommendations for a&lt;/span&gt;&lt;strong&gt;&lt;span&gt; Victims Restoration Program&lt;/span&gt;&lt;/strong&gt;&lt;span&gt;, enabling the return of seized or forfeited funds to victims.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Finally, the Executive Order introduces consequences for countries that tolerate or host scam operations targeting Americans, including potential diplomatic and economic measures.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;While implementation details are still to be defined, the Executive Order establishes a clearer framework for coordination, enforcement, and victim support.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;em&gt;&lt;span&gt;The GASA North America Chapter brings together several leading organizations across the region to address scams and fraud. &lt;/span&gt;&lt;/em&gt;&lt;a href="https://gasa.org/global-network/regions/north-america"&gt;&lt;em&gt;&lt;u&gt;&lt;span style="color: #1155cc;"&gt;Learn more about the chapter and membership.&lt;/span&gt;&lt;/u&gt;&lt;/em&gt;&lt;/a&gt;&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track-na2.hubspot.com/__ptq.gif?a=242978186&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fgasa.org%2Fknowledge-base%2Fblog%2Fnew-executive-order-on-cybercrime-and-fraud-marks-a-more-coordinated-u.s.-response&amp;amp;bu=https%253A%252F%252Fgasa.org%252Fknowledge-base%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Best Practices</category>
      <category>Region - North America</category>
      <category>Industry - Law Enforcement</category>
      <category>Region - Asia-Pacific</category>
      <category>Industry - Policy Makers</category>
      <pubDate>Fri, 20 Mar 2026 09:40:44 GMT</pubDate>
      <guid>https://gasa.org/knowledge-base/blog/new-executive-order-on-cybercrime-and-fraud-marks-a-more-coordinated-u.s.-response</guid>
      <dc:date>2026-03-20T09:40:44Z</dc:date>
      <dc:creator>Global Anti-Scam Alliance (GASA)</dc:creator>
    </item>
  </channel>
</rss>
