The vast majority of fraud attributed to crypto ATMs originates from unregulated telephone calls. Scammers use VoIP services — available for as little as $100 with no identity verification — to impersonate government agencies, law enforcement, and financial institutions. The phone call is the weapon; the ATM is merely one of many payment methods the scammer directs the victim to use. Bank wires, gift cards, and cash-by-mail are equally common endpoints.
The $12.5 Billion Fraud Crisis Starts With a Phone Call — Not a Bitcoin ATM
52.5 billion robocalls. Zero telecom KYC. $100 buys a fully anonymous fraud operation. Meanwhile, Bitcoin ATMs face the strictest compliance in financial services. The real failure is upstream.
The Crisis in Numbers
Fraud losses are accelerating. The data reveals where the failure actually lies.
$12.5B
Total Fraud Losses (2024)
+25% YoYFTC 2024 Consumer Sentinel Report
$4.9B
Elder Fraud Losses (60+)
+43% surgeFBI IC3 Elder Fraud Report 2024
52.5B
Robocalls in 2025
Highest since 2019YouMail Robocall Index
$2,210
Median Loss per Phone Scam
Highest of any contact methodFTC Consumer Sentinel Report
Anatomy of a Scam: Follow the Chain
We strictly regulate the EXIT door but leave the FRONT DOOR wide open.
Step 1
Origination
Scammer purchases VoIP service for ~$100 with no identity verification. Uses fake name, hotel address, prepaid card.
No KYC Required
Step 2
Transmission
Call enters US telecom network. STIR/SHAKEN attestation fails — 48% of illegal calls still carry A-Level trust ratings.
STIR/SHAKEN Failing
Step 3
The Hook
Victim receives spoofed call appearing to be from IRS, Social Security, or law enforcement. "You owe $5,000 or face arrest."
No Content Inspection
Step 4
Bank Withdrawal
Victim withdraws cash from their bank. Banks monitor but rarely intervene — they are facilitators, not guardians.
Monitors, Not Guardians
Step 5
Payment Exit
Cash is inserted at a BTM, wired, or converted to gift cards. This is the ONLY step facing proposed bans.
Heavily Regulated
Step 1
Origination
Scammer purchases VoIP service for ~$100 with no identity verification. Uses fake name, hotel address, prepaid card.
No KYC Required
Step 2
Transmission
Call enters US telecom network. STIR/SHAKEN attestation fails — 48% of illegal calls still carry A-Level trust ratings.
STIR/SHAKEN Failing
Step 3
The Hook
Victim receives spoofed call appearing to be from IRS, Social Security, or law enforcement. "You owe $5,000 or face arrest."
No Content Inspection
Step 4
Bank Withdrawal
Victim withdraws cash from their bank. Banks monitor but rarely intervene — they are facilitators, not guardians.
Monitors, Not Guardians
Step 5
Payment Exit
Cash is inserted at a BTM, wired, or converted to gift cards. This is the ONLY step facing proposed bans.
Heavily RegulatedBanning Step 5 doesn't stop Step 1.
Criminals simply shift to gift cards, gold, or mail-in cash. Until the origination point is addressed, fraud will continue through every available payment channel.
The Regulatory Asymmetry
A side-by-side comparison of how we regulate the tools that enable fraud versus the tools that are blamed for it.
The Front Door: VoIP Providers
How scammers reach their victims
- No AML/KYC program required
- No SAR filing obligations
- No state licensing needed
- No FinCEN registration
- No surety bond requirements
- ~$100 setup cost, anonymous
- $0 annual compliance cost
The Exit Door: Bitcoin ATMs
Where regulation is concentrated
- Full AML/KYC program mandatory
- SAR filing required by law
- Licensed in 48+ states
- FinCEN registered as MSB
- Surety bonds in most states
- Photo ID + selfie verification
- $500K–$2M annual compliance cost
| Requirement | VoIP Providers | Bitcoin ATMs |
|---|---|---|
| AML Program | Not required | Mandatory (BSA) |
| Suspicious Activity Reports | Not required | Required by law |
| State Licenses | None | 48+ state MTLs |
| FinCEN Registration | Not required | Registered MSB |
| Surety Bonds | None | $10K–$1M per state |
| Violation Consequence | Rarely enforced | Criminal penalties |
| Annual Compliance Cost | ~$0 | $500K–$2M+ |
BTM operators spend 5,000x more on compliance than VoIP providers — yet VoIP is where every scam begins.
Follow the Money
When you look at actual fraud losses by payment method, Bitcoin ATMs are a fraction of the total.
Fraud Losses by Payment Method
Check Fraud (Global) $26.6B
Bank Transfers $2.09B
Wire Transfers $287M
Bitcoin ATMs $246.7M
Only 1.5% of total internet crime losses
98.8%
Legitimate
of all crypto ATM transactions are lawful
FCC Enforcement Failure
$208M
Fines Levied
$6,790
Actually Collected
0.003%
Collection Rate
STIR/SHAKEN Investment
$250M invested in caller ID authentication — 48%% of illegal calls still carry A-Level trust ratings.
Byte Federal's Five-Layer Defense
While regulators debate upstream solutions, we're protecting customers right now.
84%
Elder Fraud Prevention Rate
Through proactive outreach calls to customers aged 60+, Byte Federal prevents 84% of potential elder fraud cases from completing.
KYC & Identity Verification
Government-issued photo ID verification with liveness detection for every transaction. No anonymous usage permitted.
AI-Powered Behavioral Detection
Camera-based analysis detects signs of duress, coaching, or phone-guided behavior. Transaction pacing algorithms flag unusual patterns in real time.
Mandatory Kiosk Warnings
Age-sensitive, on-screen scam education displayed before every transaction. Customers over 60 see enhanced warnings about common government impersonation scams.
Anti-Fraud Terms of Service
Terms explicitly prohibit coerced transactions. Customers must affirmatively confirm they are not being directed by a third party.
Live Outreach Calls to 60+ Customers
Byte Federal proactively calls customers aged 60+ after flagged transactions. This program alone prevents 84% of potential elder fraud cases from completing.
Case Studies: When the Front Door Fails
Real incidents that demonstrate how unregulated telecom access enables large-scale fraud.
The "MarioCop" Incident
2022A scammer registered a VoIP line using a fake name, a hotel address, and anonymous Bitcoin. The application was approved without question.
- • Registered with alias 'MarioCop' — no real identity check
- • Used a hotel as a business address
- • Paid with anonymous cryptocurrency
- • Originated hundreds of government imposter scam calls
- • VoIP provider faced no consequences for enabling the fraud
“In banking, this onboarding would be a crime. In telecom, it was standard practice.”
The Biden Deepfake Robocall
January 2024Lingo Telecom gave A-Level STIR/SHAKEN attestation to an AI-generated deepfake robocall impersonating President Biden, used for voter suppression in New Hampshire.
- • AI-generated voice clone of President Biden
- • Targeted New Hampshire primary voters
- • Received A-Level attestation — the highest trust rating
- • Lingo Telecom knew the originating customer
- • Demonstrated that STIR/SHAKEN verifies identity, not intent
“They knew the customer — but didn't inspect the content. The highest trust rating in American telecom was awarded to a machine-generated lie.”
Who Gets Hurt When You Ban the Bridge
Banning Bitcoin ATMs punishes the most vulnerable Americans while doing nothing to stop the source of fraud.
24.6M
24.6 Million Unbanked Americans
Crypto ATMs serve as critical financial infrastructure for communities with limited banking access. Banning them removes a lifeline.
- Native American households: 12.2% unbanked
- Black households: 10.6% unbanked
- Hispanic households: 9.5% unbanked
- White households: 1.9% unbanked
50%
UK's Confirmation of Payee
The UK's Confirmation of Payee system reduced authorized push payment fraud by 50%. The United States has not adopted any equivalent measure.
2026
Supreme Court Threat to FCC Authority
A pending Supreme Court case (April 2026) may eliminate the FCC's ability to levy fines against telecom violators entirely, removing the last enforcement mechanism.
Enforce existing laws to stop the signal, rather than banning the bridge that serves 24 million Americans.
Resources & Reports
Download the full research behind these findings.
MarioCop and the Failed War on Robocalls
Audio briefing
The Architecture of Exploitation
Comprehensive briefing on how unregulated telecom infrastructure enables the fraud ecosystem.
Download PDFSecuring the Bridge
Policy framework for protecting crypto ATM access while stopping fraud at the source.
Download PDFClosing the Telecom Regulatory Gap
Analysis of the regulatory asymmetry between telecom and financial services compliance.
Download PDFFrequently Asked Questions
Stop the Signal. Stop the Theft.
The data is clear. The solution is upstream. Let's work together to close the telecom regulatory gap and protect consumers at the source.
For Regulators
Data-driven policy analysis and enforcement recommendations
For Press
Source documents, statistics, and expert commentary
For Customers
How to identify and avoid phone-based scams