{
    "version" : "https://jsonfeed.org/version/1",
    "content" : "news",
    "type" : "single",
    "title" : "FTC Awards Five Winners from #DEFCON22 Robocall Honeypot Challenge |Digital.gov",
    "description": "FTC Awards Five Winners from #DEFCON22 Robocall Honeypot Challenge",
    "home_page_url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/","feed_url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2014/08/29/ftc-awards-five-winners-from-defcon22-robocall-honeypot-challenge/index.json","item" : [
    {"title" :"FTC Awards Five Winners from #DEFCON22 Robocall Honeypot Challenge","summary" : "The Federal Trade Commission (FTC) had such great success with their first robocall challenge competition that the agency decided to take a different angle this year—targeting the skilled hackers at DEF CON 22, the annual defense conference in Las Vegas in early August. Five winners earned cash prizes and bragging rights for their creative technical","date" : "2014-08-29T11:00:26-04:00","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"tammi-marcoullier" : "Tammi Marcoullier"},"topics" : {
        
            "challenges-and-prize-competitions" : "Challenges and prize competitions"
            },"branch" : "bc-archive-content-3",
      "filename" :"2014-08-29-ftc-awards-five-winners-from-defcon22-robocall-honeypot-challenge.md",
      
      "filepath" :"news/2014/08/2014-08-29-ftc-awards-five-winners-from-defcon22-robocall-honeypot-challenge.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2014/08/2014-08-29-ftc-awards-five-winners-from-defcon22-robocall-honeypot-challenge.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2014/08/2014-08-29-ftc-awards-five-winners-from-defcon22-robocall-honeypot-challenge.md","slug" : "ftc-awards-five-winners-from-defcon22-robocall-honeypot-challenge","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2014/08/29/ftc-awards-five-winners-from-defcon22-robocall-honeypot-challenge/","content" :"\u003cdiv class=\"image\"\u003e\n  \u003cimg\n    src=\"https://s3.amazonaws.com/digitalgov/_legacy-img/2014/08/600-x-408-Golden-honey-bee-rvbox-iStock-Thinkstock-162847094.jpg\"\n    alt=\"Honey dipper and pot\"/\u003e\u003c/div\u003e\n\n\n\u003cp\u003eThe Federal Trade Commission (FTC) had such \u003ca href=\"/preview/gsa/digitalgov.gov/bc-archive-content-3/2013/10/25/thousands-of-calls-blocked-thanks-to-contest-winner/\" title=\"Thousands of Calls Blocked, Thanks to Contest Winner\"\u003egreat success with their first robocall challenge competition\u003c/a\u003e that the agency decided to take a different angle this year—targeting the skilled hackers at DEF CON 22, the annual defense conference in Las Vegas in early August.\u003c/p\u003e\n\u003cp\u003eFive winners earned cash prizes and bragging rights for their creative technical solutions around building and hacking “honeypots” that spoofed illegal robocall experiences. Some details from the program managers:\u003c/p\u003e\n\u003cblockquote\u003e\n\u003cp\u003eThe FTC \u003ca href=\"http://www.ftc.gov/news-events/press-releases/2014/08/ftc-announces-winners-zapping-rachel-robocall-contest\"\u003eannounced\u003c/a\u003e the winners of its Zapping Rachel robocall contest that we held at DEF CON 22, one of the oldest hacker conferences in the U.S. This was our second robocall challenge and first contest at DEF CON. Our contest consisted of three phases all focused on robocall honeypots, an information system designed to attract robocallers and help law enforcement, researchers, and others understand robocaller tactics. Phase 1 challenged contestants to build a honeypot, phase 2 challenged contestants to circumvent a honeypot, and phase 3 challenged contestants to analyze data from an existing robocall honeypot.\u003c/p\u003e\n\u003cp\u003eSixty teams and individuals participated in one or more of three phases. We are excited about the results of the contest and the level of interest that the DEF CON community expressed in learning more about the robocall problem. And we hope to continue engaging this community on this issue in the future. For additional information on the contest or about the robocall problem, please visit the \u003ca href=\"http://www.ftc.gov/zapping-rachel/\"\u003econtest website\u003c/a\u003e or the\u003ca href=\"http://www.ftc.gov/robocalls\"\u003e robocall website\u003c/a\u003e.\u003c/p\u003e\n\u003c/blockquote\u003e\n\u003cp style=\"color: #323232\"\u003e\n  The winners are:\n\u003c/p\u003e\n\u003cp style=\"color: #323232\"\u003e\n  \u003cstrong\u003eThe Creator Phase:\u003c/strong\u003e \u003cstrong\u003eJon Olawski\u003c/strong\u003e will receive $3,133.70 for his winning honeypot. Phase 1 challenged contestants to build a honeypot that identifies inaccurate information in incoming calls, such as spoofed caller IDs, or determines which calls are likely robocalls. Jon’s honeypot uses a combination of an audio captcha filter, call detail analysis, and recording and transcription analysis to determine, on a sliding scale, the likelihood that an incoming call was a robocall.\n\u003c/p\u003e\n\u003cp style=\"color: #323232\"\u003e\n  \u003cstrong\u003eThe Attacker Phase:\u003c/strong\u003e \u003cstrong\u003eJan Volzke\u003c/strong\u003e will receive $3,133.70 for his winning solution, Droid Rachel. Phase 2 challenged contestants to circumvent an existing honeypot and prevent it from collecting information on incoming calls. Droid Rachel circumvents the existing honeypot by employing a four-step targeting process that screens out phone numbers potentially connected to a honeypot, and optimizes Droid Rachel’s ability to send robocalls using unsuspecting consumers’ Android phones.\n\u003c/p\u003e\n\u003cp style=\"color: #323232\"\u003e\n  \u003cstrong\u003eThe Detective Phase:\u003c/strong\u003e The winning team is \u003cstrong\u003eYang Yang and Jens Fischer\u003c/strong\u003e, and they will share $3,133.70. Phase 3 challenged participants to analyze call data from an existing honeypot and develop algorithms that predict which calls are likely robocalls.\n\u003c/p\u003e\n\u003cp style=\"color: #323232\"\u003e\n  The judges also selected two honorable mentions—\u003cstrong\u003eSean Beck \u003c/strong\u003eand \u003cstrong\u003eDarkTyphoon\u003c/strong\u003e—and each will receive $1,337. The winning solution focused on metrics such as the number of calls made, whether the number called was a toll-free number, and the time of the call to identify likely robocalls. Sean’s solution focused on time of call and number of calls made, while DarkTyphoon’s solution utilized additional metrics such as the area code and exchange numbers called.\n\u003c/p\u003e\n\u003cp style=\"color: #323232\"\u003e\n  \u003cem\u003eInterested in learning more about Challenge and Prize Competitions? Check out our \u003ca title=\"Get Started with Challenge and Prize Competitions\" href=\"/preview/gsa/digitalgov.gov/bc-archive-content-3/2014/03/31/get-started-with-challenge-and-prize-competitions/\"\u003eGet Started Guide\u003c/a\u003e.\u003c/em\u003e\n\u003c/p\u003e"}
  ]
}
