SlideShare a Scribd company logo
1 of 6
Download to read offline
+92 51 873 4525 | info@track4solutions.com | track4solutions.com
506-A, 5th Floor, Evacuee Trust Complex, F-5/1, Islamabad, Pakistan
Course Outline
Comprehensive Training on Bypass/SIM Box Fraud
Detection and Termination
Duration: 3 Days
+92 51 873 4525 | info@track4solutions.com | track4solutions.com
506-A, 5th Floor, Evacuee Trust Complex, F-5/1, Islamabad, Pakistan
Title: Comprehensive Training on Bypass/SIM Box Fraud: Detection
and Termination
Duration: 3 day
Course Code: NSE-RA-704
Course Description:
This training course is designed to explain the mobile and fixed communications bypass fraud in-depth
and present effective solutions for detection and termination of bypass fraud. This course examines key
subjects including: Definition of fraud and its types along with defining interconnection operations in
order to help attendees better understand how bypass fraud works. The course also examines additional
key subjects including: SIM box Interconnect configuration scenarios, and most importantly presenting
and examining the fraud detection tools utilized. This is a must-attend course for revenue assurance and
fraud management professionals.
Course Objectives:
 Understand what is Fraud and its Types
 Understand the Interconnect Principles
 Define Bypass Fraud and Understand its Characteristics
 Comprehend SIM Box Interconnect Configuration Scenarios
 Learn the Bypass Fraud Detection and Elimination tools
 Comprehend the Deficiencies of Traditional Behavioral Detection tools
 Learn the Non-Passive Push Calls Methodology
+92 51 873 4525 | info@track4solutions.com | track4solutions.com
506-A, 5th Floor, Evacuee Trust Complex, F-5/1, Islamabad, Pakistan
Pre Requisite
Basic understanding of Fraud, Basic understanding of Networks and Interconnection
Who Should Attend?
Revenue Assurance and Fraud Managers/ Analysts /Consultants/ Implementation and Deployment
Technicians/ Project Team Members/Researchers
Course Outline:
I. Telecommunications Fraud Overview
A. Telecommunication Fraud Overview
1. What is Fraud
2. Motivation of Fraud
3. Operators Risk Exposure
4. New Access Methods
5. Billing Systems and Processes
B. Interconnection Overview
1. Fundamentals of Interconnect Operations
2. Interconnect Network Design and Constraints
3. Interconnect Controls
4. Forms of Interconnections
C. Types of Fraud
1. Illegal SIM Boxes
a. Motivation and Scale
b. Associated Risks
2. Subscription Fraud
a. Motivation of Subscription Fraud
b. Associated Risks
3. Roaming Fraud
a. Motivation and Scale
b. Associated Risks
+92 51 873 4525 | info@track4solutions.com | track4solutions.com
506-A, 5th Floor, Evacuee Trust Complex, F-5/1, Islamabad, Pakistan
4. Premium Service Fraud
a. Projected Revenue Unearned
b. Associated Risk
5. Internal Fraud
a. Motivation of Internal Fraud
b. Impact and Scale of Internal Fraud
6. Partnership Fraud
a. Types of Partnership Fraud
b. Interconnect Fraud Recognition
7. Pre-Paid Services Fraud Methods
a. Risk Associated with Recharge Methods
b. Methods to Curb Pre-paid Fraud
II. SIM Box and Bypass Fraud
A. What is Bypass Fraud
1. By Pass Fraud Direct Effect
a. Huge Revenue Loss
b. Poor Voice Quality
c. Increase in Post Dial Delay
2. By Pass Fraud Indirect Effect
a. Inability to Call Back
b. Short Duration Calls
c. Increase in Call Drops
B. GSM VOIP Gateways/SIM Boxes
1. What are SIM Boxes
2. SIM Box Functionality
3. Advanced SIM Box Features and Functionalities
a. SIM-Rotation
b. Remote Pre-Paid Recharging
c. SIM-Card off-site Storage
+92 51 873 4525 | info@track4solutions.com | track4solutions.com
506-A, 5th Floor, Evacuee Trust Complex, F-5/1, Islamabad, Pakistan
C. Use of SIM Cloning for SIMBox/ByPass Fraud
D. Use of International Roaming for SIMBox/Bypass Fraud
E. Re-filing Numbers within SIMBox Fraud
F. Effect of Special Rates between International Interconnects
G. SIM Box Interconnect Configuration
3. SIM Box Location: Adjacent Operator’s Network
a. Adjacent Network Inbound Mobile Originated Calls Delivery
b. Scenario Identification and Details
c. Scenario Treatment Difficulty
d. Soft Loss
e. Cases and Examples
4. SIM Box Location: In the Home Operator’s Network
a. Adjacent Operator Outbound Mobile Originated Calls Delivery
b. Scenario Identification and Details
c. Outbound Termination Access Fees Payment
d. Soft and Hard Loss Cases
e. Cases and Examples
5. SIM Box Location: Within the Home Operator’s Network
a. SIM Box Delivers and Terminated Calls On-Net
b. Network Concerns
c. Quality of Service
d. Congestion
e. Spectrum Management
f. Network Utilization
H. By-Pass Fraud Detection and Elimination
1. Traditional Behavioral Detection Examples
a. Incoming to Outgoing Calls Ratio and Comparison
i. “Voice Call Accepting” GSM Gateway Configuration
ii. “Duration of Call” Comparison Counter Measure
+92 51 873 4525 | info@track4solutions.com | track4solutions.com
506-A, 5th Floor, Evacuee Trust Complex, F-5/1, Islamabad, Pakistan
iii. “Pre-Recorded Messaged or Dial Tones”
b. No or Low Mobility
i. “Take SIMs for a Ride” Counter Measure
ii. Voice Call Making Location
c. Distinct Numbers - High Number of Calls
d. High Number of One Cell Subscribers
e. High Number of Night Calls
i. Placing GSM Gateways in Large Cells
ii. Disabling Not-in-Use SIM Cards
iii. Automatic SIM Mapping
2. Signaling-Based Monitoring
a. Behavior Dependent
b. Near-Real time Monitoring
c. Media Dependent
d. High Deployment Cost
3. Non-Passive By-Pass Fraud Detection and Elimination
a. Solution Methodology
b. Real-time Individual Calls Monitoring and Blocking
c. Media Independent
4. Trunk Data
a. Trunk Analysis
b. Method of Trunk Analysis
c. Advantage of Trunk Analysis
5. Detection and Elimination Tool Comparison
6. Case Studies and Exercises

More Related Content

What's hot

FraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under ControlFraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under ControlRichard Hickson
 
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...cVidya Networks
 
A data mining framework for fraud detection in telecom based on MapReduce (Pr...
A data mining framework for fraud detection in telecom based on MapReduce (Pr...A data mining framework for fraud detection in telecom based on MapReduce (Pr...
A data mining framework for fraud detection in telecom based on MapReduce (Pr...Mohammed Kharma
 
Ethics in Telecom Sector
Ethics in Telecom SectorEthics in Telecom Sector
Ethics in Telecom SectorSagar Patekar
 
IRSF Protection with PRISM
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISMXINTEC
 
Hacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraudHacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraudcVidya Networks
 
International Revenue Share Fraud webinar
International Revenue Share Fraud webinarInternational Revenue Share Fraud webinar
International Revenue Share Fraud webinarXINTEC
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereGoutama Bachtiar
 
Wholesale Fraud - Jason Lane-Sellers of cVidya
Wholesale Fraud - Jason Lane-Sellers of cVidyaWholesale Fraud - Jason Lane-Sellers of cVidya
Wholesale Fraud - Jason Lane-Sellers of cVidyacVidya Networks
 
Ict2005 fms
Ict2005 fmsIct2005 fms
Ict2005 fmskkvences
 
The Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersThe Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersEckoh
 
Advisory to Financial Institutions on E-Mail Compromise Fraud Schemes
Advisory to Financial Institutions on E-Mail Compromise Fraud SchemesAdvisory to Financial Institutions on E-Mail Compromise Fraud Schemes
Advisory to Financial Institutions on E-Mail Compromise Fraud SchemesRyan Renicker CFA
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021lior mazor
 
Fonreg presentation - official
Fonreg presentation - officialFonreg presentation - official
Fonreg presentation - officialAyodele Thomas
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 

What's hot (20)

FraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under ControlFraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under Control
 
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
 
A data mining framework for fraud detection in telecom based on MapReduce (Pr...
A data mining framework for fraud detection in telecom based on MapReduce (Pr...A data mining framework for fraud detection in telecom based on MapReduce (Pr...
A data mining framework for fraud detection in telecom based on MapReduce (Pr...
 
Ethics in Telecom Sector
Ethics in Telecom SectorEthics in Telecom Sector
Ethics in Telecom Sector
 
IRSF Protection with PRISM
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISM
 
Hacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraudHacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraud
 
International Revenue Share Fraud webinar
International Revenue Share Fraud webinarInternational Revenue Share Fraud webinar
International Revenue Share Fraud webinar
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
 
Wholesale Fraud - Jason Lane-Sellers of cVidya
Wholesale Fraud - Jason Lane-Sellers of cVidyaWholesale Fraud - Jason Lane-Sellers of cVidya
Wholesale Fraud - Jason Lane-Sellers of cVidya
 
Ict2005 fms
Ict2005 fmsIct2005 fms
Ict2005 fms
 
The Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersThe Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact Centers
 
Advisory to Financial Institutions on E-Mail Compromise Fraud Schemes
Advisory to Financial Institutions on E-Mail Compromise Fraud SchemesAdvisory to Financial Institutions on E-Mail Compromise Fraud Schemes
Advisory to Financial Institutions on E-Mail Compromise Fraud Schemes
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021
 
Fonreg presentation - official
Fonreg presentation - officialFonreg presentation - official
Fonreg presentation - official
 
Sim swapping
Sim swappingSim swapping
Sim swapping
 
Fair and Accurate Credit Transactions Act of 2003
Fair and Accurate Credit Transactions Act of 2003Fair and Accurate Credit Transactions Act of 2003
Fair and Accurate Credit Transactions Act of 2003
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 

Similar to Comprehensive Training on Bypass/SIM Box Fraud Detection

Fraud Management Industry Update Webinar
Fraud Management Industry Update WebinarFraud Management Industry Update Webinar
Fraud Management Industry Update WebinarcVidya Networks
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeTelcoBridges Inc.
 
How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom FraudJeraSoft
 
Co cubes.com hiring & engagement overview
Co cubes.com hiring & engagement overviewCo cubes.com hiring & engagement overview
Co cubes.com hiring & engagement overviewnidhimota
 
Co cubes.com hiring & engagement overview
Co cubes.com hiring & engagement overviewCo cubes.com hiring & engagement overview
Co cubes.com hiring & engagement overviewnidhimota
 
Telecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasuresTelecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasuresPositiveTechnologies
 
b2b ecommerce security safeguarding transactions and data.pdf
b2b ecommerce security safeguarding transactions and data.pdfb2b ecommerce security safeguarding transactions and data.pdf
b2b ecommerce security safeguarding transactions and data.pdfDEMANDAY intent driven
 
Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05BookStoreLib
 
Telecom Revenue Assurance Workshop
Telecom Revenue Assurance WorkshopTelecom Revenue Assurance Workshop
Telecom Revenue Assurance WorkshopParcus Group
 
IRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid ModelsIRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid ModelsIRJET Journal
 
Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENTelcoBridges Inc.
 
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...IFG Network marcus evans
 
Fitsum ristu lakew transaction security on e-commerce
Fitsum ristu lakew transaction security on e-commerceFitsum ristu lakew transaction security on e-commerce
Fitsum ristu lakew transaction security on e-commerceFITSUM RISTU LAKEW
 
Seeds of prosperity v2.1 print friendly
Seeds of prosperity v2.1 print friendlySeeds of prosperity v2.1 print friendly
Seeds of prosperity v2.1 print friendlyDanielGBroome
 

Similar to Comprehensive Training on Bypass/SIM Box Fraud Detection (20)

Fraud Management Industry Update Webinar
Fraud Management Industry Update WebinarFraud Management Industry Update Webinar
Fraud Management Industry Update Webinar
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom Fraud
 
Co cubes.com hiring & engagement overview
Co cubes.com hiring & engagement overviewCo cubes.com hiring & engagement overview
Co cubes.com hiring & engagement overview
 
Co cubes.com hiring & engagement overview
Co cubes.com hiring & engagement overviewCo cubes.com hiring & engagement overview
Co cubes.com hiring & engagement overview
 
Telecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasuresTelecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasures
 
b2b ecommerce security safeguarding transactions and data.pdf
b2b ecommerce security safeguarding transactions and data.pdfb2b ecommerce security safeguarding transactions and data.pdf
b2b ecommerce security safeguarding transactions and data.pdf
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05
 
Telecom Revenue Assurance Workshop
Telecom Revenue Assurance WorkshopTelecom Revenue Assurance Workshop
Telecom Revenue Assurance Workshop
 
IRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid ModelsIRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid Models
 
Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKEN
 
NARENDRA NEW CV--rak
NARENDRA NEW CV--rakNARENDRA NEW CV--rak
NARENDRA NEW CV--rak
 
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
 
Reflection on compliance and automation
Reflection on compliance and automationReflection on compliance and automation
Reflection on compliance and automation
 
Voice Mail Strategy Chile
Voice Mail Strategy ChileVoice Mail Strategy Chile
Voice Mail Strategy Chile
 
Fitsum ristu lakew transaction security on e-commerce
Fitsum ristu lakew transaction security on e-commerceFitsum ristu lakew transaction security on e-commerce
Fitsum ristu lakew transaction security on e-commerce
 
Seeds of prosperity v2.1 print friendly
Seeds of prosperity v2.1 print friendlySeeds of prosperity v2.1 print friendly
Seeds of prosperity v2.1 print friendly
 
ECA
ECAECA
ECA
 
ECA
ECAECA
ECA
 

Recently uploaded

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 

Recently uploaded (20)

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 

Comprehensive Training on Bypass/SIM Box Fraud Detection

  • 1. +92 51 873 4525 | info@track4solutions.com | track4solutions.com 506-A, 5th Floor, Evacuee Trust Complex, F-5/1, Islamabad, Pakistan Course Outline Comprehensive Training on Bypass/SIM Box Fraud Detection and Termination Duration: 3 Days
  • 2. +92 51 873 4525 | info@track4solutions.com | track4solutions.com 506-A, 5th Floor, Evacuee Trust Complex, F-5/1, Islamabad, Pakistan Title: Comprehensive Training on Bypass/SIM Box Fraud: Detection and Termination Duration: 3 day Course Code: NSE-RA-704 Course Description: This training course is designed to explain the mobile and fixed communications bypass fraud in-depth and present effective solutions for detection and termination of bypass fraud. This course examines key subjects including: Definition of fraud and its types along with defining interconnection operations in order to help attendees better understand how bypass fraud works. The course also examines additional key subjects including: SIM box Interconnect configuration scenarios, and most importantly presenting and examining the fraud detection tools utilized. This is a must-attend course for revenue assurance and fraud management professionals. Course Objectives:  Understand what is Fraud and its Types  Understand the Interconnect Principles  Define Bypass Fraud and Understand its Characteristics  Comprehend SIM Box Interconnect Configuration Scenarios  Learn the Bypass Fraud Detection and Elimination tools  Comprehend the Deficiencies of Traditional Behavioral Detection tools  Learn the Non-Passive Push Calls Methodology
  • 3. +92 51 873 4525 | info@track4solutions.com | track4solutions.com 506-A, 5th Floor, Evacuee Trust Complex, F-5/1, Islamabad, Pakistan Pre Requisite Basic understanding of Fraud, Basic understanding of Networks and Interconnection Who Should Attend? Revenue Assurance and Fraud Managers/ Analysts /Consultants/ Implementation and Deployment Technicians/ Project Team Members/Researchers Course Outline: I. Telecommunications Fraud Overview A. Telecommunication Fraud Overview 1. What is Fraud 2. Motivation of Fraud 3. Operators Risk Exposure 4. New Access Methods 5. Billing Systems and Processes B. Interconnection Overview 1. Fundamentals of Interconnect Operations 2. Interconnect Network Design and Constraints 3. Interconnect Controls 4. Forms of Interconnections C. Types of Fraud 1. Illegal SIM Boxes a. Motivation and Scale b. Associated Risks 2. Subscription Fraud a. Motivation of Subscription Fraud b. Associated Risks 3. Roaming Fraud a. Motivation and Scale b. Associated Risks
  • 4. +92 51 873 4525 | info@track4solutions.com | track4solutions.com 506-A, 5th Floor, Evacuee Trust Complex, F-5/1, Islamabad, Pakistan 4. Premium Service Fraud a. Projected Revenue Unearned b. Associated Risk 5. Internal Fraud a. Motivation of Internal Fraud b. Impact and Scale of Internal Fraud 6. Partnership Fraud a. Types of Partnership Fraud b. Interconnect Fraud Recognition 7. Pre-Paid Services Fraud Methods a. Risk Associated with Recharge Methods b. Methods to Curb Pre-paid Fraud II. SIM Box and Bypass Fraud A. What is Bypass Fraud 1. By Pass Fraud Direct Effect a. Huge Revenue Loss b. Poor Voice Quality c. Increase in Post Dial Delay 2. By Pass Fraud Indirect Effect a. Inability to Call Back b. Short Duration Calls c. Increase in Call Drops B. GSM VOIP Gateways/SIM Boxes 1. What are SIM Boxes 2. SIM Box Functionality 3. Advanced SIM Box Features and Functionalities a. SIM-Rotation b. Remote Pre-Paid Recharging c. SIM-Card off-site Storage
  • 5. +92 51 873 4525 | info@track4solutions.com | track4solutions.com 506-A, 5th Floor, Evacuee Trust Complex, F-5/1, Islamabad, Pakistan C. Use of SIM Cloning for SIMBox/ByPass Fraud D. Use of International Roaming for SIMBox/Bypass Fraud E. Re-filing Numbers within SIMBox Fraud F. Effect of Special Rates between International Interconnects G. SIM Box Interconnect Configuration 3. SIM Box Location: Adjacent Operator’s Network a. Adjacent Network Inbound Mobile Originated Calls Delivery b. Scenario Identification and Details c. Scenario Treatment Difficulty d. Soft Loss e. Cases and Examples 4. SIM Box Location: In the Home Operator’s Network a. Adjacent Operator Outbound Mobile Originated Calls Delivery b. Scenario Identification and Details c. Outbound Termination Access Fees Payment d. Soft and Hard Loss Cases e. Cases and Examples 5. SIM Box Location: Within the Home Operator’s Network a. SIM Box Delivers and Terminated Calls On-Net b. Network Concerns c. Quality of Service d. Congestion e. Spectrum Management f. Network Utilization H. By-Pass Fraud Detection and Elimination 1. Traditional Behavioral Detection Examples a. Incoming to Outgoing Calls Ratio and Comparison i. “Voice Call Accepting” GSM Gateway Configuration ii. “Duration of Call” Comparison Counter Measure
  • 6. +92 51 873 4525 | info@track4solutions.com | track4solutions.com 506-A, 5th Floor, Evacuee Trust Complex, F-5/1, Islamabad, Pakistan iii. “Pre-Recorded Messaged or Dial Tones” b. No or Low Mobility i. “Take SIMs for a Ride” Counter Measure ii. Voice Call Making Location c. Distinct Numbers - High Number of Calls d. High Number of One Cell Subscribers e. High Number of Night Calls i. Placing GSM Gateways in Large Cells ii. Disabling Not-in-Use SIM Cards iii. Automatic SIM Mapping 2. Signaling-Based Monitoring a. Behavior Dependent b. Near-Real time Monitoring c. Media Dependent d. High Deployment Cost 3. Non-Passive By-Pass Fraud Detection and Elimination a. Solution Methodology b. Real-time Individual Calls Monitoring and Blocking c. Media Independent 4. Trunk Data a. Trunk Analysis b. Method of Trunk Analysis c. Advantage of Trunk Analysis 5. Detection and Elimination Tool Comparison 6. Case Studies and Exercises