This document discusses cell phone fraud, including definitions, types of fraud, and preventative measures. It defines cell phone fraud as unauthorized use, tampering, or manipulation of a cellular phone or service. There are three main types of cell phone fraud: fraud against users by phone companies (e.g. cramming, slamming), fraud against users by third parties (e.g. SIM swapping, missed call scams), and fraud against phone companies by users or third parties (e.g. phreaking, phone cloning). The document provides details on several specific fraud techniques and recommends steps users can take to help prevent fraud, such as using a VPN, strong passwords, and call blocking apps.
1. S U B M I T T E D B Y
G O P I K A G O PA N
M S C . FA F I
R A S H T R I YA R A K S H A U N I V E R S I T Y
CELL PHONE FRAUD
2. CELL
PHONE
FRAUDS
DEFINITION
• It is an act of fraud in which unauthorized use, tampering
or manipulation of a cellular phone or service.
• Mobile phone fraud involves a variety of scams that either
persuade you to buy phone-related products/services
that turn out to be substandard or non-existent; or to
make phone calls or texts to premium services by
accident; or to unknowingly sign up to expensive
subscription services.
• People find it difficult to stay without their mobile phones
even for a split second. So much so that the addiction to
mobile phones has led to a new form of a mental disorder
called ‘Nomophobia’
• Wireless Telephone Protection Act of 1998 expanded
prior law to criminalize the use, possession, manufacture
or sale of cloning hardware or software.
3. Based on the results of a March 2021 survey, call-
security app maker Truecaller estimates that
Americans lost $29.8 billion to phone scams in the
previous 12 months, up from $19.7 billion a year
earlier. Some 59 million Americans lost money to a
phone scam during that period, according to the
report, with the average cost jumping 43 percent,
from $351 to $502.
LATEST
REPORT
5. 1. Fraud against user by phone
companies
2. Fraud against user by third
parties
3. Fraud against phone companies
by users or third parties
TYPES OF CELL
PHONE FRAUD
6. FRAUDAGAINSTUSERBYPHONECOMPANIES
1. CRAMMING : Addition of charges to a subscriber's telephone bill for
services
2. SLAMMING : Subscriber's telephone service is changed without their
consent
3. FALSE ANSWER SUPERVISION : VoIP fraud where the billed duration for
the caller is more than the duration of the actual connection duration.
The FAS fraud can be implemented in a softswitch in many different ways.
▪ False billing of party A without calling a party B
▪ Start of billing before actual answer of party B
▪ Extra billing after disconnection of party B
7. FRAUDAGAINSTUSERBYTHIRDPARTIES
1.SIM SWAPPING : Criminals use SIM cards linked to your phone to steal access to your phone number and carrier account.
By having your cell number, a scammer could trick caller ID systems and get into your financial accounts or call financial
institutions that use your phone number to identify you.
2. SUBSCRIBER FRAUD occurs when someone signs up for service with fraudulently obtained customer information or false
identification. Lawbreakers obtain your personal information and use it to set up a cell phone account in your name. Resolving
subscriber fraud could develop into a long and difficult process for victims. It may take time to discover that subscriber fraud
has occurred and an even longer time to prove that you did not incur the debts.
3.MOBILE PHONE TEXT SCAMS : Fake text messages from banks are one of the most common types of mobile phone text
scams. Such messages look like they have been sent from a bank. Users are prompted to call the number provided in the SMS
or visit a website. Once that is done, hackers may gain access to your financial details or other sensitive personal information.
8. 4.MISSED CALL SCAMS OR ONE-RING SCAMS OR WANGIRI : Fraudsters call multiple
random numbers per hour through automatic dialers. The call is usually set to ring
just once. When victims return the call, they are usually connected to a paid
international hotline for adult entertainment. While some victims immediately
disengage from further communication, some stay hooked for longer. This costs them
an exorbitant amount once they disconnect.
5. PHONE VISHING : Vishing, also known as, "voice phishing" involves cell phone scam
calls that urge you to take action — normally by calling you or leaving a voicemail.
Vishing involves scammers trying to impersonate an authentic person or organization
to gain your trust. They may pose as part of an official company or government
service, convincing you that you must provide personal information or money.
6. SMS PHISHING: SMS phishing, also known as “smishing”, involves a scammer
getting you to act via text message. Malware SMS links can be sent in these messages,
and if you open the link, your device can become infected with malware or spyware.
9. 1. PHREAKING : Fraudulent manipulation of
telephone signaling in order to make free phone
calls.
2. PHONE CLONING has been used as a means of
copying both the electronic serial number and the
telephone number of another subscriber's phone to
a second (cloned) phone.
FRAUDAGAINSTPHONE
COMPANIESBYUSERSOR
THIRDPARTIES
11. ❖ Use a virtual private network (VPN) on public
Wi-Fi
❖ Create highly secure passwords
❖ Create extended-length PINs
❖ Store your unique passwords in a secure
online vault
❖ Credible giveaways don’t ask for a fee
❖ Use a call blocking app
❖ Do not interact and hang up
❖ Only use official apps for services
❖ Watch your phone bill
❖ Get cybersecurity on your phone
PREVENTIVE
MEASURES
12. REFERENCE
1 . C e l l - p h o n e - f r a u d . p d f . ( n . d . ) . R e t r i e v e d D e c e m b e r 1 1 , 2 0 2 1 ,
f r o m h t t p s : / / s a p u t o . l a w / w p - c o n t e n t / u p l o a d s / 2 0 1 5 / 1 1 / c e l l - p h o n e -
f r a u d . p d f
2 . M o b i l e p h o n e f r a u d . ( n . d . ) . A c t i o n F r a u d . R e t r i e v e d D e c e m b e r
1 1 , 2 0 2 1 , f r o m h t t p s : / / w w w. a c t i o n f r a u d . p o l i c e . u k / a - z - o f -
f r a u d / m o b i l e - p h o n e - f r a u d
3 . M o b i l e S c a m s H o w t o I d e n t i f y T h e m a n d P r o t e c t Yo u r s e l f .
( n . d . ) . R e t r i e v e d D e c e m b e r 1 1 , 2 0 2 1 , f r o m
h t t p s : / / u s . n o r t o n . c o m / i n t e r n e t s e c u r i t y - m o b i l e - m o b i l e - s c a m s -
h o w - t o - i d e n t i f y - t h e m - a n d - p r o t e c t - y o u r s e l f . h t m l
4 . To p M o b i l e P h o n e S c a m s – Ti p s o n H o w t o Av o i d M o b i l e S c a m s .
( n . d . ) . R e t r i e v e d D e c e m b e r 1 1 , 2 0 2 1 , f r o m h t t p s : / / i f f l a b . o r g / t o p -
m o b i l e - p h o n e - s c a m s - h o w - t o - a v o i d - m o b i l e - s c a m s /
5 . Wo n g , K . ( 1 9 9 6 ) . M o b i l e p h o n e f r a u d — A r e G S M n e t w o r k s
s e c u r e ? C o m p u t e r F r a u d & S e c u r i t y, 1 9 9 6 ( 1 1 ) , 1 1 – 1 8 .
h t t p s : / / d o i . o r g / 1 0 . 1 0 1 6 / 1 3 6 1 - 3 7 2 3 ( 9 6 ) 8 8 9 3 1 - 7
6 . K y l , J . ( 1 9 9 8 , A p r i l 2 4 ) . S . 4 9 3 - 1 0 5 t h C o n g r e s s ( 1 9 9 7 - 1 9 9 8 ) :
Wi r e l e s s Te l e p h o n e P r o t e c t i o n A c t ( 1 9 9 7 / 1 9 9 8 ) [ L e g i s l a t i o n ] .
h t t p s : / / w w w. c o n g r e s s . g o v / b i l l / 1 0 5 t h - c o n g r e s s / s e n a t e - b i l l / 4 9 3