The document describes a new Fraud Classification Model (FCM) proposed by ZonOptimus for the telecommunications industry. The FCM differentiates between fraud enablers, which are the vulnerabilities exploited to access networks or services, and fraud types, which are the actual fraudulent activities. It was presented to several industry groups including TMForum, GSMA, CFCA, and FIINA. These groups updated their fraud reporting templates based on the FCM's core concepts of separately classifying enablers and types. The document also provides details on how fraud cases would be registered and classified using the FCM framework.
How to Prevent Telecom Fraud in Real-TimeAlan Percy
Telecommunications fraud continues to plaque the industry with ever increasingly sophisticated methods and tools. From simple theft of services to international premium toll rate calling scams, stories of service providers and enterprises being stuck with thousands of dollars of fraudulent calls is a common occurrence that can be financially devastating. The Communications Fraud Control Association reports that in 2015, service providers suffered over 22 billion dollars in fraud.
During this “How To” session we will be joined by the experts from Jerasoft, showing various methods that utilize real-time billing systems and Session Border Controller software to stop fraud in its tracks!
The document discusses telecom fraud, including definitions, types, and detection techniques. It notes that telecom fraud results in significant global losses estimated at $40 billion annually by the Communications Fraud Control Association in 2011. The document outlines different categories of fraud, including technical (external and internal) frauds and non-technical frauds. It also summarizes two literature articles on data mining approaches to fraud detection and an overview of different types of telecom frauds such as subscription, clip on, and call forwarding frauds. Detection techniques discussed include data modeling of user behavior, social media monitoring, and strengthening customer identification controls.
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...cVidya Networks
Tal Eisner, Senior Director Product Strategy at cVidya and Deputy Chair of the TM Forum Fraud Management Group, presented at TM Forum's Management World 2012 in Dublin on the Fraud Management Group Activities
Wholesale Fraud - Jason Lane-Sellers of cVidyacVidya Networks
Wholesale carriers face different fraud risks than traditional carriers. They see transit traffic but lack customer details. A main risk is false answer supervision fraud, where calls appear connected to generate charges though the call was not actually connected. Wholesale carriers could benefit from fraud but also face risks from established carriers. However, wholesale carriers are well positioned to provide fraud management as a service to other carriers due to their global traffic view and routing insights across multiple operators. This could help detect fraud scenarios and provide value-added intelligence to wholesale customers.
This document summarizes a webinar on fraud management and compliance. The webinar covered several topics:
- A CFCA survey that found global fraud losses increased 15% in 2013, with revenue share fraud as the largest threat.
- The TM Forum's fraud classification model and survey, which found revenue share fraud is driving other fraud types.
- Account takeover fraud, where fraudsters manipulate customer service processes to gain access to accounts. Pressure points like authentication and sales incentives enable this fraud.
- Fighting fraud through cyber intelligence techniques like monitoring dark web sites and forums where fraudsters share tactics and stolen customer information.
This document discusses revenue frauds against telecom operators. It defines fraud and outlines different forms of revenue fraud including subscription fraud, tee-in fraud, internal fraud using "magic phones", GSM interconnect bypass, and international gateway bypass. These frauds can result in significant losses of hundreds of millions of dollars annually for telecom operators around the world. The document recommends methods for telecom operators and regulators to prevent and manage such fraud.
Detecting fraud in cellular telephone networksJamal Meselmani
A Thesis Presented in Partial Fulfillment of the Requirement for the Degree in "MBA" by Hiyam Ali El Tawashi
Telecommunication fraud is a problem that has grown dramatically over the past ten years.
Fraud become a serious global issue for mobile network service providers, it has
undoubtedly become a significant source of revenue losses and bad debts to
telecommunication industry, and with the expected continuing growth in revenue it can be
expected that fraud will increase proportionally.
The research project therefore, focused on how Jawwal Company managing and detecting
the fraud, in order to modify the current tools for more effective fraud prevention and
detection, for this reason the researcher undertook a set of actions that are reported as
follow:
First step it was necessary to understand the problem of telecom fraud, then to know what
makes people perpetrate the fraud, and which are the most prevalent fraud types that are
occurring, clarifying which is the likely products and services to be attacked, what source
of information to facilitate the fraud, how fraudsters perpetrate the fraud finally explaining
the fraud detection and prevention procedures.
Then apply the study on Jawwal Company as study case, by distributing 200
questionnaires to targeted sections, and analyzing the result which shows that the current
fraud management at Jawwal Company is not efficient and needs to be modified.
How to Prevent Telecom Fraud in Real-TimeAlan Percy
Telecommunications fraud continues to plaque the industry with ever increasingly sophisticated methods and tools. From simple theft of services to international premium toll rate calling scams, stories of service providers and enterprises being stuck with thousands of dollars of fraudulent calls is a common occurrence that can be financially devastating. The Communications Fraud Control Association reports that in 2015, service providers suffered over 22 billion dollars in fraud.
During this “How To” session we will be joined by the experts from Jerasoft, showing various methods that utilize real-time billing systems and Session Border Controller software to stop fraud in its tracks!
The document discusses telecom fraud, including definitions, types, and detection techniques. It notes that telecom fraud results in significant global losses estimated at $40 billion annually by the Communications Fraud Control Association in 2011. The document outlines different categories of fraud, including technical (external and internal) frauds and non-technical frauds. It also summarizes two literature articles on data mining approaches to fraud detection and an overview of different types of telecom frauds such as subscription, clip on, and call forwarding frauds. Detection techniques discussed include data modeling of user behavior, social media monitoring, and strengthening customer identification controls.
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...cVidya Networks
Tal Eisner, Senior Director Product Strategy at cVidya and Deputy Chair of the TM Forum Fraud Management Group, presented at TM Forum's Management World 2012 in Dublin on the Fraud Management Group Activities
Wholesale Fraud - Jason Lane-Sellers of cVidyacVidya Networks
Wholesale carriers face different fraud risks than traditional carriers. They see transit traffic but lack customer details. A main risk is false answer supervision fraud, where calls appear connected to generate charges though the call was not actually connected. Wholesale carriers could benefit from fraud but also face risks from established carriers. However, wholesale carriers are well positioned to provide fraud management as a service to other carriers due to their global traffic view and routing insights across multiple operators. This could help detect fraud scenarios and provide value-added intelligence to wholesale customers.
This document summarizes a webinar on fraud management and compliance. The webinar covered several topics:
- A CFCA survey that found global fraud losses increased 15% in 2013, with revenue share fraud as the largest threat.
- The TM Forum's fraud classification model and survey, which found revenue share fraud is driving other fraud types.
- Account takeover fraud, where fraudsters manipulate customer service processes to gain access to accounts. Pressure points like authentication and sales incentives enable this fraud.
- Fighting fraud through cyber intelligence techniques like monitoring dark web sites and forums where fraudsters share tactics and stolen customer information.
This document discusses revenue frauds against telecom operators. It defines fraud and outlines different forms of revenue fraud including subscription fraud, tee-in fraud, internal fraud using "magic phones", GSM interconnect bypass, and international gateway bypass. These frauds can result in significant losses of hundreds of millions of dollars annually for telecom operators around the world. The document recommends methods for telecom operators and regulators to prevent and manage such fraud.
Detecting fraud in cellular telephone networksJamal Meselmani
A Thesis Presented in Partial Fulfillment of the Requirement for the Degree in "MBA" by Hiyam Ali El Tawashi
Telecommunication fraud is a problem that has grown dramatically over the past ten years.
Fraud become a serious global issue for mobile network service providers, it has
undoubtedly become a significant source of revenue losses and bad debts to
telecommunication industry, and with the expected continuing growth in revenue it can be
expected that fraud will increase proportionally.
The research project therefore, focused on how Jawwal Company managing and detecting
the fraud, in order to modify the current tools for more effective fraud prevention and
detection, for this reason the researcher undertook a set of actions that are reported as
follow:
First step it was necessary to understand the problem of telecom fraud, then to know what
makes people perpetrate the fraud, and which are the most prevalent fraud types that are
occurring, clarifying which is the likely products and services to be attacked, what source
of information to facilitate the fraud, how fraudsters perpetrate the fraud finally explaining
the fraud detection and prevention procedures.
Then apply the study on Jawwal Company as study case, by distributing 200
questionnaires to targeted sections, and analyzing the result which shows that the current
fraud management at Jawwal Company is not efficient and needs to be modified.
Comprehensive training on bypass sim box fraudMassango Junior
This 3-day training course provides an in-depth examination of mobile and fixed communications bypass fraud, including definitions, characteristics, detection tools, and case studies. The course objectives are to understand fraud and interconnect principles, define bypass fraud and SIM box scenarios, learn detection and elimination tools, and comprehend deficiencies of traditional tools. The course is intended for revenue assurance, fraud managers, analysts, consultants, and technicians.
Fraud Management Industry Update Webinar by cVidyacVidya Networks
This document summarizes key findings from fraud surveys and industry discussions on fraud trends. It highlights that fraud is increasing globally by 15% based on the CFCA survey. Major fraud methods identified include subscription fraud, international revenue share fraud, and SIM box gateways. The TM Forum proposes a fraud classification model to standardize naming and analysis of fraud types. There is also a shift towards viewing fraud management as a cybersecurity issue given rises in online fraud forums and dark web markets trading in stolen data and fraud guides. Industry groups and companies are responding by bringing fraud teams closer to security functions.
Telecommunication Fraud Detection and PreventionSumera Khan
Telecommunication fraud is the use of telecommunication products or services with the intent of illegitimately acquiring money from, or deteriorating to pay, a telecommunication company or its clients. E.g. PBX/IP-PBX Fraud: The hacking of a PBX to initiate long distance and high case destination calling by fraudsters.
A data mining framework for fraud detection in telecom based on MapReduce (Pr...Mohammed Kharma
The outputs of this research is a design and implement a model using data mining to detect fraud cases targeting telecom environment where a huge volume of data should to be processed based on cloud computing infrastructure we will build using the most popular and powerful cloud computing framework MapReduce. We will use Data obtained from call details record (CDR) in billing repository and the result is subscriber subset that classified as fraudulent subscription in near online mode. This will help to reduce time in detecting fraud events and enhance revenue assurance team ability to identify fraudulent cases efficiently.
SIM Box and its linked to external frauds affecting leading operators in Cambodia in the form of falling revenues, lower QoS for for International Incoming Calls and inbound roaming services. Arguably, such activity is becoming rampant due to lack of legal framework, poor enforcement and coordination among Government Ministries and Government agencies.
This document provides information about an upcoming workshop on telecom fraud in current and future telecom networks. The workshop will be held over two days in Dubai and will address how to detect and minimize telecom fraud, identify fraud in mobile and IP networks, and familiarize attendees with risks and future fraud risks. Attendees will learn techniques to locate fraudsters, select fraud management systems, and train staff to assist with fraud fighting. The workshop agenda covers topics such as detecting fraud, reconciling network data, using advanced techniques like link analysis to find fraudsters, and reacting to internal and external fraud.
The Rise of Card Not Present Crime in Contact CentersEckoh
Card Not Present Fraud has seen a dramatic rise in the past few years. In the U.S., it is predicted to see losses exceed $7 Billion by 2020. In this slideshare we explore merchant weaknesses which allow this crime to take place, and potential ways of preventing this type of crime.
This document discusses fraud management systems in telecommunications and describes a specific fraud management system called Centaur. It begins by introducing common types of telecom fraud like call selling, premium rate service fraud, surfing, and ghosting. It then provides an overview of generic fraud management system architectures and components like data collection, processing, detection, investigation, and reporting. The document focuses on describing Centaur, a new flexible fraud management system, including its context-based detection approach using lists, multipliers, and time windows. Detection methods in Centaur include rule-based processes, neural networks, and identifying new instances of known fraudster profiles. An example of using Centaur to detect a call selling operation is also provided.
The document summarizes the Fair and Accurate Credit Transactions Act of 2003 (FACT Act) Red Flag provisions, which require financial institutions and creditors to develop and implement an Identity Theft Prevention Program. It outlines who is covered under the Red Flag Rules, what needs to be included in an Identity Theft Prevention Program such as conducting risk assessments of covered accounts and identifying and detecting red flags. The document provides examples of red flags and guidelines on how to design, implement, update and administer an effective Identity Theft Prevention Program.
According to a research report, telecom companies across the globe could lose up to $172 Billion in revenues over the next five years. How can telcos turn the tide and increase the ARPU?
Identity, Authentication, and Programmable Telecoms SessionAlan Quayle
Pierre Demarche, VP Product and Marketing, TeleSign
Session is divided into 3 parts, based on use cases:
Registration fraud. Identifying fake users, preventing bulk account creation, etc.
ATO (Account TakeOver). Preventing ATO fraud through phone hijacking attacks like SIM Swap, Porting attacks, call forwarding, etc.
IRSF (International Revenue Sharing Fraud) attacks on enterprises. Registration to SIP trunking.
TCPA Compliance Experts Explain How to Avoid Fines in 2015 Connect First
This webinar presentation will provide you with helpful guidance to ensure that you are remaining compliant in your contact center. Join experts from Connect First, Contact Center Compliance, the Professional Association of Customer Experience (PACE), and Neustar as they present an informative webinar on TCPA compliance. Industry experts include; Ryan Thurman of Contact Center Compliance and Geoff Mina, the CEO of Connect First, and Mitch Young of Neustar.
Discussion Topics: TCPA overview and update, 2015 case updates and lessons learned, and how to ensure you remain TCPA compliant
Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...Michael Abernathy
A description of our fraud prevention and cyber crime projects we are preparing to implement on a nationwide basis. We are seeking investors, marketing, human resources, IT infrastructure, coding and programming, cyber security professionals. The services described are projected to generate over $286 Billion in revenue in 2018
The market share consists of 11 million businesses, 120 million consumers and family members, along with victims of ID Theft, Check Fraud. Tax Refund Fraud, Title Fraud, Mortgage Fraud, Installment loan fraud, and internet fraud.
Fraud crimes are at epidemic levels and has seen dramatic increases over the last 20 years.
This is a system that can be implemented throughout the U.S. Canada, and the world.
Consumers will be able to verify their identity and protect themselves from fraud just by submitting their fingerprint.
It will be required by any business that sells products or services.
The document discusses challenges that organizations face in complying with TCPA regulations regarding autodialing phone numbers. It notes that phone data is constantly changing, with numbers frequently changing between wireless and landline services and subscribers. This makes it difficult to determine if a number can be autodialed under TCPA rules without risking violations. The document advocates relying on current and authoritative phone data insights to identify phone types, verify subscriber information, and streamline operations, in order to both comply with TCPA and maintain efficiency.
The Fair and Accurate Credit Transactions Act of 2003 requires certain financial institutions and creditors to implement an Identity Theft Prevention Program to detect and mitigate identity theft. The Red Flags Rule specifies that programs must include risk assessments, policies to identify and respond to red flags of identity theft, staff training, and oversight of service providers. Failure to comply can result in fines and legal action by regulators and state attorneys general.
TCPA and Contact Center Law: What's on the Horizon in 2017? Ryan Thurman
This document summarizes a webinar presentation about TCPA and contact center law. It discusses the regulatory authorities of the FCC, FTC, and state regulators over telemarketing laws. It also summarizes recent TCPA and TSR amendments regarding autodialers, consent, and penalties. Upcoming legal issues are discussed, such as the definition of an autodialer and recent favorable court cases. Compliance strategies for 2017 like scrubbing lists of litigators and wireless numbers are also presented.
Advisory to Financial Institutions on E-Mail Compromise Fraud SchemesRyan Renicker CFA
"The Financial Crimes Enforcement Network (FinCEN) is issuing this advisory to help financial institutions guard against a growing number of e-mail fraud schemes, in which criminals
misappropriate funds by deceiving financial institutions and their customers into conducting wire transfers.
This advisory also provides red flags—developed in consultation with the Federal Bureau of Investigation (FBI) and the U.S. Secret Service (USSS)—that financial institutions may use to identify and prevent such e-mail fraud schemes."
Source: FinCEN Advisory FIN-2016-A003, September 6, 2016
The document discusses several ethics issues in the Indian telecom industry:
1. A major scam in the 1990s involved Reliance introducing an affordable mobile scheme that resulted in many fake subscribers and lost revenue.
2. Patent disputes between Apple, Samsung, Nokia, and others led to numerous lawsuits over attempts to copy technologies.
3. Loopholes in government policies have disadvantaged consumers regarding call drops and former regulators joining telecom companies.
4. Unethical practices like phishing, fraud calls, and major scams like the 2G spectrum scam have undermined trust and cost the country significantly.
5. The environmental impacts of mobile phone use and manufacturing, such as greenhouse gas emissions
The document discusses digital financial services (DFS) for underserved populations. It provides an overview of various DFS models including bank-led models where banks partner with non-banks to expand reach, and non-bank led models where mobile network operators (MNOs) provide financial services. The document compares the advantages and disadvantages of different technology options for DFS like SMS banking, mobile banking, POS devices, and voice IVR. It also discusses factors that affect the uptake of DFS like the presence of alternate financial channels, demographic characteristics, and socio-economic conditions of the target population.
Riskpro India Ventures provides integrated risk management consulting services to mid-large sized companies and financial institutions in India. It has offices in Mumbai, Delhi, and Bangalore, and alliances in other cities. Riskpro's services include fraud management, risk consulting, business ethics solutions, anti-corruption services, and forensics services. The company aims to provide quality advisory services at competitive prices using a hybrid delivery model and multi-skilled professionals with over 200 years of cumulative experience in risk management.
Comprehensive training on bypass sim box fraudMassango Junior
This 3-day training course provides an in-depth examination of mobile and fixed communications bypass fraud, including definitions, characteristics, detection tools, and case studies. The course objectives are to understand fraud and interconnect principles, define bypass fraud and SIM box scenarios, learn detection and elimination tools, and comprehend deficiencies of traditional tools. The course is intended for revenue assurance, fraud managers, analysts, consultants, and technicians.
Fraud Management Industry Update Webinar by cVidyacVidya Networks
This document summarizes key findings from fraud surveys and industry discussions on fraud trends. It highlights that fraud is increasing globally by 15% based on the CFCA survey. Major fraud methods identified include subscription fraud, international revenue share fraud, and SIM box gateways. The TM Forum proposes a fraud classification model to standardize naming and analysis of fraud types. There is also a shift towards viewing fraud management as a cybersecurity issue given rises in online fraud forums and dark web markets trading in stolen data and fraud guides. Industry groups and companies are responding by bringing fraud teams closer to security functions.
Telecommunication Fraud Detection and PreventionSumera Khan
Telecommunication fraud is the use of telecommunication products or services with the intent of illegitimately acquiring money from, or deteriorating to pay, a telecommunication company or its clients. E.g. PBX/IP-PBX Fraud: The hacking of a PBX to initiate long distance and high case destination calling by fraudsters.
A data mining framework for fraud detection in telecom based on MapReduce (Pr...Mohammed Kharma
The outputs of this research is a design and implement a model using data mining to detect fraud cases targeting telecom environment where a huge volume of data should to be processed based on cloud computing infrastructure we will build using the most popular and powerful cloud computing framework MapReduce. We will use Data obtained from call details record (CDR) in billing repository and the result is subscriber subset that classified as fraudulent subscription in near online mode. This will help to reduce time in detecting fraud events and enhance revenue assurance team ability to identify fraudulent cases efficiently.
SIM Box and its linked to external frauds affecting leading operators in Cambodia in the form of falling revenues, lower QoS for for International Incoming Calls and inbound roaming services. Arguably, such activity is becoming rampant due to lack of legal framework, poor enforcement and coordination among Government Ministries and Government agencies.
This document provides information about an upcoming workshop on telecom fraud in current and future telecom networks. The workshop will be held over two days in Dubai and will address how to detect and minimize telecom fraud, identify fraud in mobile and IP networks, and familiarize attendees with risks and future fraud risks. Attendees will learn techniques to locate fraudsters, select fraud management systems, and train staff to assist with fraud fighting. The workshop agenda covers topics such as detecting fraud, reconciling network data, using advanced techniques like link analysis to find fraudsters, and reacting to internal and external fraud.
The Rise of Card Not Present Crime in Contact CentersEckoh
Card Not Present Fraud has seen a dramatic rise in the past few years. In the U.S., it is predicted to see losses exceed $7 Billion by 2020. In this slideshare we explore merchant weaknesses which allow this crime to take place, and potential ways of preventing this type of crime.
This document discusses fraud management systems in telecommunications and describes a specific fraud management system called Centaur. It begins by introducing common types of telecom fraud like call selling, premium rate service fraud, surfing, and ghosting. It then provides an overview of generic fraud management system architectures and components like data collection, processing, detection, investigation, and reporting. The document focuses on describing Centaur, a new flexible fraud management system, including its context-based detection approach using lists, multipliers, and time windows. Detection methods in Centaur include rule-based processes, neural networks, and identifying new instances of known fraudster profiles. An example of using Centaur to detect a call selling operation is also provided.
The document summarizes the Fair and Accurate Credit Transactions Act of 2003 (FACT Act) Red Flag provisions, which require financial institutions and creditors to develop and implement an Identity Theft Prevention Program. It outlines who is covered under the Red Flag Rules, what needs to be included in an Identity Theft Prevention Program such as conducting risk assessments of covered accounts and identifying and detecting red flags. The document provides examples of red flags and guidelines on how to design, implement, update and administer an effective Identity Theft Prevention Program.
According to a research report, telecom companies across the globe could lose up to $172 Billion in revenues over the next five years. How can telcos turn the tide and increase the ARPU?
Identity, Authentication, and Programmable Telecoms SessionAlan Quayle
Pierre Demarche, VP Product and Marketing, TeleSign
Session is divided into 3 parts, based on use cases:
Registration fraud. Identifying fake users, preventing bulk account creation, etc.
ATO (Account TakeOver). Preventing ATO fraud through phone hijacking attacks like SIM Swap, Porting attacks, call forwarding, etc.
IRSF (International Revenue Sharing Fraud) attacks on enterprises. Registration to SIP trunking.
TCPA Compliance Experts Explain How to Avoid Fines in 2015 Connect First
This webinar presentation will provide you with helpful guidance to ensure that you are remaining compliant in your contact center. Join experts from Connect First, Contact Center Compliance, the Professional Association of Customer Experience (PACE), and Neustar as they present an informative webinar on TCPA compliance. Industry experts include; Ryan Thurman of Contact Center Compliance and Geoff Mina, the CEO of Connect First, and Mitch Young of Neustar.
Discussion Topics: TCPA overview and update, 2015 case updates and lessons learned, and how to ensure you remain TCPA compliant
Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...Michael Abernathy
A description of our fraud prevention and cyber crime projects we are preparing to implement on a nationwide basis. We are seeking investors, marketing, human resources, IT infrastructure, coding and programming, cyber security professionals. The services described are projected to generate over $286 Billion in revenue in 2018
The market share consists of 11 million businesses, 120 million consumers and family members, along with victims of ID Theft, Check Fraud. Tax Refund Fraud, Title Fraud, Mortgage Fraud, Installment loan fraud, and internet fraud.
Fraud crimes are at epidemic levels and has seen dramatic increases over the last 20 years.
This is a system that can be implemented throughout the U.S. Canada, and the world.
Consumers will be able to verify their identity and protect themselves from fraud just by submitting their fingerprint.
It will be required by any business that sells products or services.
The document discusses challenges that organizations face in complying with TCPA regulations regarding autodialing phone numbers. It notes that phone data is constantly changing, with numbers frequently changing between wireless and landline services and subscribers. This makes it difficult to determine if a number can be autodialed under TCPA rules without risking violations. The document advocates relying on current and authoritative phone data insights to identify phone types, verify subscriber information, and streamline operations, in order to both comply with TCPA and maintain efficiency.
The Fair and Accurate Credit Transactions Act of 2003 requires certain financial institutions and creditors to implement an Identity Theft Prevention Program to detect and mitigate identity theft. The Red Flags Rule specifies that programs must include risk assessments, policies to identify and respond to red flags of identity theft, staff training, and oversight of service providers. Failure to comply can result in fines and legal action by regulators and state attorneys general.
TCPA and Contact Center Law: What's on the Horizon in 2017? Ryan Thurman
This document summarizes a webinar presentation about TCPA and contact center law. It discusses the regulatory authorities of the FCC, FTC, and state regulators over telemarketing laws. It also summarizes recent TCPA and TSR amendments regarding autodialers, consent, and penalties. Upcoming legal issues are discussed, such as the definition of an autodialer and recent favorable court cases. Compliance strategies for 2017 like scrubbing lists of litigators and wireless numbers are also presented.
Advisory to Financial Institutions on E-Mail Compromise Fraud SchemesRyan Renicker CFA
"The Financial Crimes Enforcement Network (FinCEN) is issuing this advisory to help financial institutions guard against a growing number of e-mail fraud schemes, in which criminals
misappropriate funds by deceiving financial institutions and their customers into conducting wire transfers.
This advisory also provides red flags—developed in consultation with the Federal Bureau of Investigation (FBI) and the U.S. Secret Service (USSS)—that financial institutions may use to identify and prevent such e-mail fraud schemes."
Source: FinCEN Advisory FIN-2016-A003, September 6, 2016
The document discusses several ethics issues in the Indian telecom industry:
1. A major scam in the 1990s involved Reliance introducing an affordable mobile scheme that resulted in many fake subscribers and lost revenue.
2. Patent disputes between Apple, Samsung, Nokia, and others led to numerous lawsuits over attempts to copy technologies.
3. Loopholes in government policies have disadvantaged consumers regarding call drops and former regulators joining telecom companies.
4. Unethical practices like phishing, fraud calls, and major scams like the 2G spectrum scam have undermined trust and cost the country significantly.
5. The environmental impacts of mobile phone use and manufacturing, such as greenhouse gas emissions
The document discusses digital financial services (DFS) for underserved populations. It provides an overview of various DFS models including bank-led models where banks partner with non-banks to expand reach, and non-bank led models where mobile network operators (MNOs) provide financial services. The document compares the advantages and disadvantages of different technology options for DFS like SMS banking, mobile banking, POS devices, and voice IVR. It also discusses factors that affect the uptake of DFS like the presence of alternate financial channels, demographic characteristics, and socio-economic conditions of the target population.
Riskpro India Ventures provides integrated risk management consulting services to mid-large sized companies and financial institutions in India. It has offices in Mumbai, Delhi, and Bangalore, and alliances in other cities. Riskpro's services include fraud management, risk consulting, business ethics solutions, anti-corruption services, and forensics services. The company aims to provide quality advisory services at competitive prices using a hybrid delivery model and multi-skilled professionals with over 200 years of cumulative experience in risk management.
The document discusses the impact of over-the-top (OTT) applications on mobile network operators. It notes that while OTT applications have increased data usage and initially benefited operators, they have also shifted revenues away from operators to OTT providers. Operators still bear the infrastructure investment costs but are losing voice and messaging revenues as users switch to OTT applications like WhatsApp and Skype. This trend will continue as more users adopt smartphones and OTT applications, putting pressure on operator revenues and business models. Regulators face challenges in addressing this issue.
This document discusses the threat of OTT bypass fraud to mobile operator revenues from voice calls. It explains that OTT bypass fraud works by intercepting mobile-to-mobile calls and redirecting them to terminate over data networks and OTT applications like WhatsApp and Viber, bypassing the mobile operator's voice network and preventing them from collecting termination fees. The fraud benefits wholesale carriers by lowering termination costs but severely damages mobile operators and governments who lose voice revenues. The fraud also degrades call quality and consumes users' data without their knowledge.
This document discusses anomaly detection in telecommunications networks using big data analytics and machine learning. It notes that communication service providers lose over $38 billion annually to fraud and network abuse. Big data approaches are ideally suited to manage the high volume, velocity, and variety of data available to CSPs. The document promotes a company called Argyle Data that provides a platform and application suite leveraging machine learning to help CSPs detect fraudulent activity in real-time from their network data and gain other business insights. Their approach includes building a comprehensive enterprise data lake and using a native Hadoop architecture to operate at large scale.
EBU Connect: Channel Branding in the Digital AgeScopernia
The Presentation Jo Caudron gave at the EBU Connect event in Copenhagen. It deals with the way TV is changing in the digital age and what the challenges are for channels.
Presentatie Nicky Hekster eHealth Week 2017 20 januari 2017ICT Café Den Haag
Masterclass gegeven door Nicky Hekster, IBM Watson Health Technical Leader bij IBM én ambassadeur en adept van IBM Watson. Hij gaat in op de impact van zelflerende computersystemen op zaken als zorg en werk. In een wereld vol data, waar alles en iedereen gekoppeld is aan het Internet of Things, maakt cognitive computing het verschil. Zelflerende systemen doorgronden immense datastromen in milliseconden. En niet alleen feiten en cijfers, maar ook beelden, geluid, menselijke sentimenten en relaties. Ze redeneren zelf, leren continu en ondersteunen het nemen van complexe beslissingen. Ze brengen de toekomst naar het hier en nu
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentBillyCheuk
This document discusses fraud risk assessment and management. It covers key principles of fraud risk management programs including fraud risk assessment, prevention, detection, escalation, investigation and correction. The fraud risk assessment process involves identifying inherent fraud risks, assessing the likelihood and significance of risks, and responding to reasonably likely and significant residual risks. It provides examples of fraud risks across different areas like financial reporting, misappropriation of assets, corruption, and other risks. It also discusses establishing a fraud risk assessment team and outlines the fraud risk assessment framework and process.
The blog is the official blog of WeDo Technologies, sharing expert opinions on enterprise business assurance and its role in digital transformation. It features posts from both internal experts and guest writers on topics like fraud management, revenue assurance, and customer value management within industries like telecom, utilities, retail, insurance and healthcare. The document highlights a selection of the best blog posts from 2015 on issues faced by CEOs and discusses how enterprise software can help retailers better adapt to changing market conditions.
Telecom 2020: Preparing for a very different futureRob Van Den Dam
Mega market and technological trends are creating a very new world for consumers, businesses and markets as a whole. A potential role for communications service providers in this new world charts a path to growth
This document introduces the concepts of telco-OTT services and compares the traditional telco world to the emerging OTT world. It notes that the probability of a user's devices all being on a single telco's network is decreasing. It argues that telcos need to adopt OTT strategies if they want to remain competitive, such as building businesses that use OTT approaches and offering OTT extension services. The document suggests telcos can create value by addressing both telco and OTT characteristics in their services and propositions.
Protect roaming revenues with fraud detection and reaction in
real time. For more information, visit: http://www.starhomemach.com/solutions/active-roaming-anti-fraud/
This document contains a presentation given by David Morrow of Vodafone to the i3Forum on fraud issues related to next generation networks. The presentation discusses how next generation networks will separate the bearer network from services, creating challenges for fraud management. Specifically, it notes that next generation networks will involve more complex technologies, dynamic identities, and different billing models than current networks. This will create new opportunities for fraudsters but also require new approaches to fraud detection across both the bearer and services layers.
This document discusses mobile virtual network operators (MVNOs). It provides an overview of the MVNO ecosystem and business models, as well as global trends in MVNO regulation and markets. Key points include:
- MVNOs purchase airtime from existing mobile network operators and resell it to customers without owning their own network infrastructure.
- Common MVNO models include resellers, service operators, and full MVNOs with varying levels of control over offerings.
- Global MVNO markets range from countries that actively support MVNOs to those that are indifferent or prohibit them.
- Challenges to the growth of MVNOs in India include mobile number portability, lowering prices, and financial viability.
Telecommunications fraud continues to plaque the industry with ever increasingly sophisticated methods and tools. From simple theft of services to international premium toll rate calling scams, stories of service providers and enterprises being stuck with thousands of dollars of fraudulent calls is a common occurrence that can be financially devastating.
Telecommunications fraud continues to plague the industry with ever-increasingly sophisticated methods and tools. From simple theft of services to international premium toll rate calling scams, stories of service providers and enterprises being stuck with thousands of dollars of fraudulent calls is a common occurrence that can be financially devastating. The Communications Fraud Control Association reports that in 2015, service providers suffered over 22 billion dollars in fraud.
JeraSoft team was the guest expert at “How To” session, showing together with TelcoBridges experts various methods that utilize real-time billing systems and Session Border Controller software to stop fraud in its tracks!
Technology plays both a facilitating and mitigating role in money laundering risks. On one hand, technology enables new methods of money laundering like through electronic currencies and online banking. On the other hand, financial institutions rely on technology like transaction monitoring software to comply with anti-money laundering regulations and identify suspicious transactions. However, software alone is not a complete solution and well-trained staff are still needed to analyze transactions. New technologies also pose challenges as money laundering risks can change, and rules trying to define what constitutes suspicious activity can sometimes be abstract.
Fair Isaac is a leader in fraud detection and decision management solutions. Their Falcon Fraud Manager uses advanced analytics like neural networks and profiling to detect fraud across multiple channels. It has helped reduce credit card fraud losses significantly. The document discusses how debit fraud is evolving and Falcon Fraud Manager's capabilities for protecting debit transactions through profiling of cardholders, devices, and merchants.
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Molly Alexander
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, & ML Are Transforming the Fight Against Fraud, AML & Cybersecurity -Nadeem Asghar
This document discusses strategies for detecting and preventing bypass fraud in telecommunications. It outlines several techniques for detecting fraud, including test call generators, call detail record analysis, SS7 signaling analysis, and network protocol analysis. However, these detection techniques can fail if not implemented in an integrated way across a nationwide fraud management system. The document recommends taking an integrated approach using test call generators, call detail record analysis, and SS7 protocol analysis within a nationwide fraud management system to better identify and prevent bypass fraud cases. This integrated approach lowers the cost of fraud detection while reserving network quality and enabling information sharing.
SOA in Telecom describes the benefits of SOA in a Business Domain. The initial section of this document covers the challenges faced by the Telecom Industry and how SOA benefits the industry.
TADSummit Asia 2019, Richard Im, Apigate. Apigate’s Journey from In-house Ini...Alan Quayle
To remain competitive in the digital transformation context, telcos are leveraging on APIs to increase their agility and the efficiency of their products and services with which they adapt to the technological revolution. Consumers are expecting telco services to be embedded in a range of platforms and by opening up services for reach, engagement and monetisation, telcos are capitalising on this business opportunity to maintain its relevancy.
Richard Im from Apigate will be sharing on Apigate’s transformative journey; as inhouse initiative which is continuously evolving from its primary focus in enhancing the performance of Axiata OpCos to becoming a revolutionary solution that stretches out to the emerging digital markets. With the consolidation of 2 businesses – ApigateMint & ApigateAXP – Apigate has created an integrated platform that provides payment solutions and rich adjacent services to enable MNOs to digitise. We have a suite of educational and enablement programmes – ApigateGO with the main objective to gather early stage companies, developers and students to the API economy to elevate the awareness of APIs alongside its benefits; henceforth increasing adoption.
This document provides a survey of SIMBox fraud in cellular networks, including strategies, evolution, and detection methods. It begins with background on the full telephony ecosystem, including mobile and VoIP networks. It then describes how SIMBox fraud works, involving routing international calls through a SIMBox device to terminate them locally at lower rates. The document explores the components and architecture of SIMBoxes. It examines the evolution of SIMBox fraud strategies towards simulating human behavior. Finally, it categorizes and qualitatively compares different SIMBox detection methods in the literature and discusses future challenges as fraud and technologies continue advancing.
BizDay: Marco Polo: Making Trade Finance Smarter, More Transparent & Better C...R3
The Marco Polo Network is a collaborative network of bank platforms that are connected to corporate clients through trade and working capital finance applications embedded within enterprise resource planning (ERP) systems. The network aims to create a better customer experience and more seamless data integration while reducing costs, time, and risk. It is powered by open application programming interfaces and Coda blockchain technology. The network provides a single interface for banks to deliver various trade and working capital finance solutions and services to corporate clients.
Cataleya-Security-Feature_SAWC_April2016page-20-23Jacqueline Fick
This document discusses network security issues for mobile network operators (MNOs) in Africa. It notes that as smartphone adoption increases across Africa, network security remains a high priority for MNOs due to threats like cybercrime and fraud. Common security issues include SIMbox fraud, which involves using boxes of SIM cards to make illegal international calls. The rapid growth of mobile services in Africa has outpaced the development of robust security systems, making networks and customers vulnerable. MNOs are fighting back against fraud through measures like seizing SIMboxes and tightening SIM security, but will need more integrated security approaches to address evolving threats from domestic and international criminals.
(1) The document proposes a Software as a Service model called "3Steps" to provide business automation applications to small and medium enterprises (SMEs) via the web at a lower monthly cost compared to traditional software licensing. (2) It analyzes the Egyptian SME market and finds a need for affordable IT solutions. (3) 3Steps aims to help SMEs increase revenues, reduce costs and build customer relationships by offering integrated applications hosted remotely.
IT plays a key role in financial markets by enabling electronic networks for transactions and providing tools to analyze risks and transactions. The document discusses how IT systems help administer the field of finance through risk analysis, risk reduction, and information exchange over networks. It also outlines some of the computer hardware, software, telecommunications technologies, and security issues that financial institutions utilize with increasing IT usage.
The Ipsos - AI - Monitor 2024 Report.pdfSocial Samosa
According to Ipsos AI Monitor's 2024 report, 65% Indians said that products and services using AI have profoundly changed their daily life in the past 3-5 years.
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataKiwi Creative
Harness the power of AI-backed reports, benchmarking and data analysis to predict trends and detect anomalies in your marketing efforts.
Peter Caputa, CEO at Databox, reveals how you can discover the strategies and tools to increase your growth rate (and margins!).
From metrics to track to data habits to pick up, enhance your reporting for powerful insights to improve your B2B tech company's marketing.
- - -
This is the webinar recording from the June 2024 HubSpot User Group (HUG) for B2B Technology USA.
Watch the video recording at https://youtu.be/5vjwGfPN9lw
Sign up for future HUG events at https://events.hubspot.com/b2b-technology-usa/
Learn SQL from basic queries to Advance queriesmanishkhaire30
Dive into the world of data analysis with our comprehensive guide on mastering SQL! This presentation offers a practical approach to learning SQL, focusing on real-world applications and hands-on practice. Whether you're a beginner or looking to sharpen your skills, this guide provides the tools you need to extract, analyze, and interpret data effectively.
Key Highlights:
Foundations of SQL: Understand the basics of SQL, including data retrieval, filtering, and aggregation.
Advanced Queries: Learn to craft complex queries to uncover deep insights from your data.
Data Trends and Patterns: Discover how to identify and interpret trends and patterns in your datasets.
Practical Examples: Follow step-by-step examples to apply SQL techniques in real-world scenarios.
Actionable Insights: Gain the skills to derive actionable insights that drive informed decision-making.
Join us on this journey to enhance your data analysis capabilities and unlock the full potential of SQL. Perfect for data enthusiasts, analysts, and anyone eager to harness the power of data!
#DataAnalysis #SQL #LearningSQL #DataInsights #DataScience #Analytics
Analysis insight about a Flyball dog competition team's performanceroli9797
Insight of my analysis about a Flyball dog competition team's last year performance. Find more: https://github.com/rolandnagy-ds/flyball_race_analysis/tree/main
Global Situational Awareness of A.I. and where its headedvikram sood
You can see the future first in San Francisco.
Over the past year, the talk of the town has shifted from $10 billion compute clusters to $100 billion clusters to trillion-dollar clusters. Every six months another zero is added to the boardroom plans. Behind the scenes, there’s a fierce scramble to secure every power contract still available for the rest of the decade, every voltage transformer that can possibly be procured. American big business is gearing up to pour trillions of dollars into a long-unseen mobilization of American industrial might. By the end of the decade, American electricity production will have grown tens of percent; from the shale fields of Pennsylvania to the solar farms of Nevada, hundreds of millions of GPUs will hum.
The AGI race has begun. We are building machines that can think and reason. By 2025/26, these machines will outpace college graduates. By the end of the decade, they will be smarter than you or I; we will have superintelligence, in the true sense of the word. Along the way, national security forces not seen in half a century will be un-leashed, and before long, The Project will be on. If we’re lucky, we’ll be in an all-out race with the CCP; if we’re unlucky, an all-out war.
Everyone is now talking about AI, but few have the faintest glimmer of what is about to hit them. Nvidia analysts still think 2024 might be close to the peak. Mainstream pundits are stuck on the wilful blindness of “it’s just predicting the next word”. They see only hype and business-as-usual; at most they entertain another internet-scale technological change.
Before long, the world will wake up. But right now, there are perhaps a few hundred people, most of them in San Francisco and the AI labs, that have situational awareness. Through whatever peculiar forces of fate, I have found myself amongst them. A few years ago, these people were derided as crazy—but they trusted the trendlines, which allowed them to correctly predict the AI advances of the past few years. Whether these people are also right about the next few years remains to be seen. But these are very smart people—the smartest people I have ever met—and they are the ones building this technology. Perhaps they will be an odd footnote in history, or perhaps they will go down in history like Szilard and Oppenheimer and Teller. If they are seeing the future even close to correctly, we are in for a wild ride.
Let me tell you what we see.
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeWalaa Eldin Moustafa
Dynamic policy enforcement is becoming an increasingly important topic in today’s world where data privacy and compliance is a top priority for companies, individuals, and regulators alike. In these slides, we discuss how LinkedIn implements a powerful dynamic policy enforcement engine, called ViewShift, and integrates it within its data lake. We show the query engine architecture and how catalog implementations can automatically route table resolutions to compliance-enforcing SQL views. Such views have a set of very interesting properties: (1) They are auto-generated from declarative data annotations. (2) They respect user-level consent and preferences (3) They are context-aware, encoding a different set of transformations for different use cases (4) They are portable; while the SQL logic is only implemented in one SQL dialect, it is accessible in all engines.
#SQL #Views #Privacy #Compliance #DataLake
End-to-end pipeline agility - Berlin Buzzwords 2024Lars Albertsson
We describe how we achieve high change agility in data engineering by eliminating the fear of breaking downstream data pipelines through end-to-end pipeline testing, and by using schema metaprogramming to safely eliminate boilerplate involved in changes that affect whole pipelines.
A quick poll on agility in changing pipelines from end to end indicated a huge span in capabilities. For the question "How long time does it take for all downstream pipelines to be adapted to an upstream change," the median response was 6 months, but some respondents could do it in less than a day. When quantitative data engineering differences between the best and worst are measured, the span is often 100x-1000x, sometimes even more.
A long time ago, we suffered at Spotify from fear of changing pipelines due to not knowing what the impact might be downstream. We made plans for a technical solution to test pipelines end-to-end to mitigate that fear, but the effort failed for cultural reasons. We eventually solved this challenge, but in a different context. In this presentation we will describe how we test full pipelines effectively by manipulating workflow orchestration, which enables us to make changes in pipelines without fear of breaking downstream.
Making schema changes that affect many jobs also involves a lot of toil and boilerplate. Using schema-on-read mitigates some of it, but has drawbacks since it makes it more difficult to detect errors early. We will describe how we have rejected this tradeoff by applying schema metaprogramming, eliminating boilerplate but keeping the protection of static typing, thereby further improving agility to quickly modify data pipelines without fear.
The Building Blocks of QuestDB, a Time Series Databasejavier ramirez
Talk Delivered at Valencia Codes Meetup 2024-06.
Traditionally, databases have treated timestamps just as another data type. However, when performing real-time analytics, timestamps should be first class citizens and we need rich time semantics to get the most out of our data. We also need to deal with ever growing datasets while keeping performant, which is as fun as it sounds.
It is no wonder time-series databases are now more popular than ever before. Join me in this session to learn about the internal architecture and building blocks of QuestDB, an open source time-series database designed for speed. We will also review a history of some of the changes we have gone over the past two years to deal with late and unordered data, non-blocking writes, read-replicas, or faster batch ingestion.
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...sameer shah
"Join us for STATATHON, a dynamic 2-day event dedicated to exploring statistical knowledge and its real-world applications. From theory to practice, participants engage in intensive learning sessions, workshops, and challenges, fostering a deeper understanding of statistical methodologies and their significance in various fields."
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Aggregage
This webinar will explore cutting-edge, less familiar but powerful experimentation methodologies which address well-known limitations of standard A/B Testing. Designed for data and product leaders, this session aims to inspire the embrace of innovative approaches and provide insights into the frontiers of experimentation!
Open Source Contributions to Postgres: The Basics POSETTE 2024ElizabethGarrettChri
Postgres is the most advanced open-source database in the world and it's supported by a community, not a single company. So how does this work? How does code actually get into Postgres? I recently had a patch submitted and committed and I want to share what I learned in that process. I’ll give you an overview of Postgres versions and how the underlying project codebase functions. I’ll also show you the process for submitting a patch and getting that tested and committed.
Codeless Generative AI Pipelines
(GenAI with Milvus)
https://ml.dssconf.pl/user.html#!/lecture/DSSML24-041a/rate
Discover the potential of real-time streaming in the context of GenAI as we delve into the intricacies of Apache NiFi and its capabilities. Learn how this tool can significantly simplify the data engineering workflow for GenAI applications, allowing you to focus on the creative aspects rather than the technical complexities. I will guide you through practical examples and use cases, showing the impact of automation on prompt building. From data ingestion to transformation and delivery, witness how Apache NiFi streamlines the entire pipeline, ensuring a smooth and hassle-free experience.
Timothy Spann
https://www.youtube.com/@FLaNK-Stack
https://medium.com/@tspann
https://www.datainmotion.dev/
milvus, unstructured data, vector database, zilliz, cloud, vectors, python, deep learning, generative ai, genai, nifi, kafka, flink, streaming, iot, edge
4. TM FORUM AND
Fraud Group Overview
TM Forum Fraud Group works to assemble and maintain best
practices from operators around the world relating to Fraud
Management. This information will continue to be updated and
expanded to account for evolving fraud tactics.
TM Forum is a global, non-profit industry association focused on enabling
service provider agility and innovation, through the development of several
projects at key business areas:
65,000 Member Professionals
900+ Member Companies
195 Countries Represented
4
5. TM FORUM FRAUD GROUP
Fraud Management Guidebooks
GB954 Fraud Classification Guide
Arm operators with fraud information
and offers them a best practice for the
properly Classification of Fraud Cases:
o Fraud Classification Model
o Fraud Enablers Definitions
o Fraud Types Definitions
o Categories and Atributes
ZonOptimus attended TMForum Fraud Group sessions and proposed the development of
a Fraud Classification Model for the benefit of Telecom Industry
- Project started in January, 2012
5
6. 2. Reason for FCM Project
Why the Telecom Industry Requires a Model
6
7. TMForum 2012 Fraud Survey results, highlighted the lack
of a common Fraud Classification at Industry level:
o Distinct names for the same Fraud Types
o Distinct interpretations of same fraud incidents
o Multiple Frauds perpetrated in the same case
There is a clear need for a Multi-Dimensional Analysis
with different levels of abstraction.
Telecommunications
Industry was
presented with many
different and not
synchronized ways of
Fraud Classification
Roaming Fraud
Internal Fraud
Subscription Fraud
PaymentFraud
Credit Card Fraud
Hacking
SIM Cloning
Mobile Malware
Prepaid Fraud
Dealer Fraud
Wangiri
SS7 Tampering
Handset Subsidy Loss
PROBLEM AT INDUSTRY LEVEL
(at the time of project start up, January 2012)
7
9. 3. Core Concept of FCM
The Baseline for Fraud Classification Model
9
10. TECHNOLOGYFRAUDSTER OBJECTIVE ENVIRONMENT ATTACK CUSTOMER SERVICE PAYMENT IMPACTS
AAA
ViG
WLAN
Network
UTRAN
CS-CSCS-MS
CS-DS CS-WS
CS-AS
EFWS
SRD
EMA
Portal FOCAMN-OSS
MM
RSS-CSCF
S-CSCFI-CSCF
ENUM/
DNS
MGCF/SG
MG
N-SBGA-SBG
HSS
PSTN
PLMN
HTT
P/H
TTP
S
FTP
H.248
SIP
SIP
DIAMETER
ISC LDAP
DNS
SIP
ISUP
TDM
IMT
LDAP
HTTP/HTTPS
HTTP/HTTPS
BRI
PRI
BRI
POTS
SIP
H.323
SIP RTP
RTP
IP
Backbone
RTP
/SI
P/H
323
RT
P/
SIP
/H
32
3
GGSN
SGSN
PDG
WAG
P-CSCF
PCRF
Gx+
Rx+
Gm
(SIP)
DIAMETER
DIAMETER
PPS
DIAMETER
OSS-RC
Other VoIP
Networks
CORBA
Fraud Classification Attributes
FRAUD CASES CLASSIFICATION
FRAUD
TYPE
ENABLER
TECHNIQUE
The core concept of the “Fraud Classification Model” is a clear differentiation at the Classification of Fraud Cases between the:
o ENABLER TECHNIQUE
What was the vulnerability method explored to get access to network, products or services?
versus
o FRAUD TYPE
What was the fraud committed at network, products or services by exploring the vulnerability above?
FRAUD CLASSIFICATION MODEL
(BASIC PRINCIPLES)
10
11. In some circumstances the “Enabler Technique” is not a fraudulent attack but the exploitation of a risk
vulnerability from other Business Assurance areas, such as Revenue Assurance and Security
Management:
o The FCM assumes the relationship of the Fraud Management activity to Security Management; Revenue
Assurance and Risk Management Functions
The Fraud Classification Model assures CSPs/Operators with data collection to allow the
Understanding of Fraud and the development of Mitigation Strategies at the following levels:
o Revision of Internal Procedures, Processes and Products/Services
o Implementation of Technical Solutions at Network and Service Platforms
o Development, Enhancement and Updated Configuration of Fraud Management Systems (FMS)/Control Solutions
11
FRAUD CLASSIFICATION MODEL
(BASIC PRINCIPLES)
12. “Fraud Classification Model Brain-Center”
- Revision of Internal Procedures, Processes
and Products/Services
- Implementation of Technical Solutions at
Network and Service Platforms
Development, Enhancement and Reconfiguration of
Fraud Management Systems (FMS)/Control Solutions
Subscription Fraud
Hacking
Customer Account Take-Over
Mobile Malware
FRAUD ENABLER
(fraudulent way to obtain/access service)
FRAUD TYPE
(fraudulent scheme)
TELECOMSSERVICEFRAUD
SIM Card Cloning
Network/Protocol/Signalling
Manipulation
Tariff Rates/Pricing Plan Abuse
Social Engineering
Arbitrage
International Revenue Share Fraud
Service Reselling
Wholesale Fraud
Private Use
Commissions Fraud
Traffic Inflation for Credits/Bonus
Charging Bypass
Interconnect Bypass
SIMBox Gateway
Theft of Company
Handsets/Equipments
OBJECTIVE
(Scope)
Make Money/Profit
Obtain Free
Services/Goods
Obtain Credits/Bonuses
Obtain Commissions
Access User Bank
Account
Access Subscriber
Information
……….
BUSINESS
ASSURANCE AREAS
Security
Management
Fraud
Management
Revenue
Assurance
12
FRAUD CLASSIFICATION MODEL (BASIC PRINCIPLES)
13. The Effective Relation Between “Fraud Enablers” and “Fraud
Types”
Fraud Types
Advance Payment Fraud a a
Charging Bypass a a a a
Commissions Fraud a a a a
Interconnect Bypass / SIMBox Gateway a a a a
International Revenue Share Fraud (IRSF) a a a a a a a a a a a a a a a a a a
Toll Free Number Fraud a a a a
Money Laundering a
Online Banking Fraud a a a a a a a
Premium Rate Service Fraud a a a a a a a a a a a a a a a a a a
Private Use a a a a a a a a
Service Reselling a a a a a a a a a a a
Spamming a a a a a a a a a
Theft of Company Handsets / Equipment a a a a
Theft of Information a a a a a a
Traffic Inflation for Credits / Bonus a a a a a a
Wholesale Fraud a a a a a
TariffRates/PricingPlansAbuse
ClipOnAbuse
TechnicalFailureatNetwork/ServicePlatforms
SocialEngineering
SubscriptionFraud
FraudEnablers
Network/Protocol/SignalingManipulation
OpenSMS-CAbuse
Operator/Company/Brand/StaffImpersonation
Phishing
CustomerHandset/EquipmentTheft
FalseBaseStationAttack
Hacking
MaliciousApplication/Software
MisconfigurationofNetwork/ServicePlatforms
MobileMalware
AbuseofCompanyProcedures/Processes
Arbitrage
Cloning
CompromisedCreditCards
CustomerAccountTake-Over
Relational Matrix | Fraud Enablers vs Fraud Types
Fraud Classification Model (Basic Principles)
13
GB954 Fraud Classification Guide
15. GSMA Fraud Forum | Ireland and Malta Meetings
May and September 2012
ZonOptimus presented the Core Concept of the Fraud
Classification Model at the GSMA Fraud Forum event held in
Ireland (May 2012).
Fraud Forum updated its Fraud Incident Reporting
template, readapting it to include FCM Core Concept and
issued a new version at the FF meeting held in Malta
(September 2012).
15
MODEL SHARING WITH GSMA FRAUD FORUM
16. FF Classification before September, 2012 FF Classification after September, 2012
BEFORE AFTER
16
MODEL SHARING WITH GSMA FRAUD FORUM
17. CFCA Educational Event | Scottsdale, USA | September 2012
Presentation of Fraud Classification
Model to CFCA (Communications
Fraud Control Association)
organisation.
CFCA updated its Fraud Reporting
template, readapting it to include FCM
Core Concept.
CFCA (Communications Fraud Control Association)
17
MODEL SHARING WITH CFCA
18. Fraud Classification before October, 2012 Fraud Classification after October, 2012
BEFORE AFTER
18
MODEL SHARING WITH CFCA
19. 2013 CFCA Worldwide Communications Industry Fraud Survey
Released at 5th September, 2013 the annual CFCA Fraud Survey, is now reflecting the Core Concept
(Fraud Enablers vs Fraud Types) of the Fraud Classification Model, but still some adjustments need to
be made to the survey in the future.
FRAUD TYPE
(fraudulent abuse)
Wholesale Fraud | USD$ 5.32 B
Premium Rate Service | USD$ 4.73 B
Cable or Satellite Signal | USD$ 3.55 B
Hardware Reselling | USD$ 2.96 B
Hacking | USD$ 8,04 Billion
- PBX (USD$ 4.42B)
- VoIP System (USD$3.62B)
Account Take Over | USD$ 3.62 B
FRAUD ENABLER
(fraudulent way to obtain/access service)
TELECOMSSERVICEFRAUD
(ValuesinUSD$Billions)
Subscription Fraud | USD$ 5.22 B
USD$ 6.11 Billion of the frauds have been committed in Roaming
USD$ 3.35 Billion of the frauds have been perpetrated by Dealers
NOTES
Estimated Global Fraud Losses
o USD$ 46.3 Billion
Estimated Global Telecoms Revenues
o USD$ 2.214 Trillion
Fraud Losses as % of Telecoms Revenues
o 2.09%
19
20. FIINA Plenary | Port Louis, Mauritius | November 2012
Presentation of Fraud Classification
Model to the FIINA (Forum for Irregular
Network Access) plenary meeting held
in Mauritius.
Liaison Agreement signed between
TMForum and FIINA for future
cooperation and joint activities on FCM
(project running).
MODEL SHARING WITH FIINA
20
22. GENERAL
DATE:
CUSTOMER TYPE:
CUSTOMER SUB TYPE:
ACQUISITION SALES CHANNEL:
PAYMENT METHOD:
PAYMENT TYPE:
LOSSES QUALITATIVE:
LOSSES QUANTITATIVE:
MAIN IMPACTS:
CASE DESCRIPTION:
OPERATOR:
COUNTRY:
REGION:
FMS STATUS:
ENABLERFRAUDTYPE
FRAUD ENABLER:
ATTACK TYPE -
FRAUDSTER TYPE -
LOCATION -
ENVIRONMENT -
FRAUD ABUSE/TYPE:
LOCATION -
ENVIRONMENT -
OBJECTIVE -
TECHNOLOGY -
SERVICE -
SUPPLEMENTARY SERVICE -
FRAUD CLASSIFICATION FRAUD MITIGATION
DETECTION:
DETECTION SYSTEM -
PREVENTION:
PREVENTION SYSTEM -
MITIGATION DESCRIPTION:
22
Fraud Classification Model RegisterModel Concept Template
23. Fraud Classification Model Register
ENABLERTECH
FRAUDTYPE
FRAUD ENABLER: …..
ATTACK TYPE -
FRAUDSTER TYPE –
LOCATION –
ENVIRONMENT –
FRAUD ABUSE/TYPE: …..
LOCATION –
ENVIRONMENT –
OBJECTIVE –
TECHNOLOGY -
SERVICE –
SUPPLEMENTARY SERVICE -
FRAUD CLASSIFICATIONFRAUD ENABLERS
Abuse of Business Procedures/Processes Weaknesses
Abuse of Technical Failure at Network/Service Platforms
Arbitrage
Cloning
Compromised Credit Cards
Customer Account Take-Over
Customer Handset/Equipment Theft
Customer Handset/Equipment Configuration Abuse
False Base Station Attack
Hacking
Malicious Application/Software
Misconfiguration Abuse of Network/Service Platforms
Mobile Malware
Network/IT Systems Access Abuse
Network/Protocol/Signalling Manipulation
Open SMS-C Abuse
Operator/Company/Brand/Staff Impersonation
Phishing
Social Engineering/Single Ring Solicitation
Subscription Fraud
Tariff Rates/Pricing Plans Abuse
Clip On Abuse
Abuse of Contract Terms and Conditions
ATTACK TYPE
External
Internal
FRAUDSTER TYPE
Hacker
Dealer
Business Partner
Service User
Third Party
Employee
Service Provider
…….
LOCATION
Home Network
Visited Network
Home and Visited
Network
National Network
International Network
Customer Offices
Dealer Offices
World Wide Web
…….
ENVIRONMENT
National Territory
International Territory
Roaming IN
Roaming OUT
…..
Categories and Attributes Description – Fraud Classification (1)
23
24. Fraud Classification Model Register
ENABLERTECH
FRAUDTYPE
FRAUD ENABLER: …..
ATTACK TYPE -
FRAUDSTER TYPE –
LOCATION –
ENVIRONMENT –
FRAUD ABUSE/TYPE: …..
LOCATION –
ENVIRONMENT –
OBJECTIVE –
TECHNOLOGY -
SERVICE –
SUPPLEMENTARY SERVICE -
FRAUD CLASSIFICATION
FRAUD TYPES
Advanced Payment/Fee Fraud
Charging Bypass
Commissions Fraud
National Revenue Share Fraud
Interconnect Bypass/SIMBox
Gateway
IRSF (International Revenue Share
Fraud)
Money Laundering
Online Banking Fraud
Premium Rate Service Fraud
Private Use
Service Reselling
Spamming
Theft of Company
Handsets/Equipments
Theft of Information/Content
Toll Free Number Fraud
Traffic Inflation for Credits/Bónus
Wholesale Fraud
LOCATION
Home
Network
Visited
Network
Home and
Visited
Network
National
Network
International
Network
Customer
Offices
Dealer
Offices
ENVIRONMENT
National
Territory
International
Territory
Roaming IN
Roaming OUT
…..
OBJECTIVE
Make Money/Profit
Obtain Free
Services/Goods
Collect
Credits/Bonuses/C
ash
Obtain
Commissions
Access/Steal
Information
Access User Bank
Account
Operator’s
Impersonation
TECHNOLOGY
GSM
GPRS
3G
4G/LTE
IP /IMS
CDMA
ADSL
FTTH
……….
SERVICE
Voice Inbound
Voice Outbound
VoIP Inbound
VoIP Outbound
SMS Inbound
SMS Outbound
MMS Inbound
MMS Outbound
Data
M – Commerce
M – Payments
SUPPLEMENT
SERVICE
Call Conference
Call Forward
Call Hold
……….
Categories and Attributes Description – Fraud Classification (2)
24
25. GENERAL DATE: June, 2013
CUSTOMER TYPE: Postpaid
CUSTOMER SUB TYPE: Corporate
Business
ACQUISITION CHANNEL: NAp
PAYMENT METHOD: Postpaid Invoice
Payment
PAYMENT TYPE: Various
LOSSES QUALITATIVE: Very High
LOSSES QUANTITATIVE: Financials
NAv (150.000 minutes)
MAIN IMPACTS: Financial
CASE DESCRIPTION: Tests performed at Network/Session Border Gateway (SBG) for new VoIP Services left a backdoor at network level.
This vulnerability was used by an IP Address originating from Palestine who hacked SBG and performed 150.000 minutes of calls to Int. Premium Rate Services.
OPERATOR: Eagle Telecom
COUNTRY: USA
REGION: North America
FMS STATUS: In-House FMS
ENABLERTECHFRAUDTYPE
FRAUD ENABLER: Hacking: Session Border Gateway
ATTACK TYPE - External
FRAUDSTER TYPE – Hacker
LOCATION – Home Network
ENVIRONMENT – National Territory
FRAUD TYPE: IRSF (Spain; Somalia and Zimbabwe)
LOCATION – Home Network
ENVIRONMENT – National Territory
OBJECTIVE – Make Money/Profit
TECHNOLOGY – IP IMS
SERVICE – VoIP Outbound
SUPPLEMENTARY SERVICE – NAp
FRAUD CLASSIFICATION FRAUD MITIGATION
DETECTION: Traffic Monitoring/Analysis
DETECTION SYSTEM – Fraud Management System (FMS)
PREVENTION: Network Technical Solution
PREVENTION SYSTEM – Session Border Gateway (SBG)
MITIGATION DESCRIPTION: Engineering Department secured SBG
and blocked calls to International Premium Rate Services for all future
Network testing programs.
Case 1
25
26. 6. FIINA Fraud Reporting Template
The Summary of the Work Made at FIINA
26
30. 7. An Industry Perspective Through the Model?
The Model Potential
- Graphics hereby presented do not represent an Industry reality
- Fraud varies from region-to-region
30
32. IRSF (International Revenue
Share Fraud)
Interconnect Bypass/SIMBox
GatewayCharging Bypass
Private Use
Wholesale Fraud
Theft of Company
Handsets/Equipments
Commisions Fraud
Theft of Information
Service Reselling
Traffic Inflation for Credits/Bonus
32
World–Wide Fraud Types
33. IRSF (International
Revenue Share Fraud)
Service Reselling
Theft of Information
Premium Rate Service Fraud
Wholesale Fraud
Spamming
What Are the Main Fraud Types
Committed Through Hacking?
Fraud Types Through Hacking
PABX
VoIP Gateway/Switch
SMS - C
IP Broadband Router
Mobile Voice Mail System
Websites
SIP Switch
Network Elements Victim of Hacking?
33
34. 34
Wholesale Fraud Through Hacking
FRAUD OPERATION SCENARIO | TRAFFIC BROKERING | CASE STUDY
Negotiating “Traffic Termination Rates” at
the Wholesale Market.
Traffic Brokers offer the lowest price for call
termination at a specific country.
TRAFFIC BROKERS
(Least Cost Routers)
TELECOM OPERATORS
(Mobile-Fixed-Convergent)
END CUSTOMERS
(Mobile-Fixed-Convergent)
Pays Termination
Hacking Corporate Customers IP-BX Systems to
terminate traffic for free, forcing the Billing of these
calls upon Telecom Clients.
Hacked Corporate Customers pay the termination rate.
Traffic Negotiation
Traffic Negotiation
Traffic Negotiation
CORPORATE CUSTOMER
CORPORATE CUSTOMER
CORPORATE CUSTOMER
HACKING
HACKING
HACKING
35. IRSF (International Revenue Share
Fraud)
Theft of Company
Handsets/Equipments
Commisions Fraud
Traffic Inflation for Credits/Bonus
Premium Rate Service Fraud
Interconnect Bypass/SIMBox
Gateway
Private Use
Fraud Types Through Subscription Fraud
36. IRSF (International
Revenue Share Fraud)
Wholesale Fraud
Interconnect Bypass/
SIMBox Gateway
Traffic Inflation for
Credits/Bonus
Fraud Types Through Arbitrage
38. Service Reselling
Theft of Company
Handsets/Equipments
Premium Rate Service Fraud
HomeBanking Fraud
Commisions Fraud
IRSF (International Revenue Share
Fraud)
Fraud Types Through Customer Account Take-Over
39. Revenue Assurance
- Arbitrage
- Open SMS-C Abuse
- Tariff Rates/Pricing Plans Abuse
- Misconfiguration Abuse of Network/Service Platforms
- Abuse of Technical Failure at Network/Service Platforms
Fraud Management
- Customer Account Take-Over
- Operator/Company/Brand/Staff Impersonation
- Phishing
- Social Engineering
- Subscription Fraud
- Customer Handset/Equipment Theft
- Abuse of Business Procedures/Processes Weaknesses
Security Management
- Cloning
- Compromised Credit Cards
- False Base Station Attack
- Hacking
- Malicious Application/Software
- Mobile Malware
- Network/Protocol/Signalling Manipulation
- Misconfiguration Abuse of Network/Service Platforms
Fraud
Management
Security
Management
Revenue
Assurance
Classification of Enablers by Business Assurance Area
42. Subscription Fraud
Hacking
Arbitrage
Social Engineering
Customer Handset/Equipment Theft
Misconfiguration Abuse of
Network/Service Platforms
Compromised Credit Cards
Customer Account Take-Over
Enablers Contributing to IRSF (International Revenue Share Fraud)
43. Tariff Rates/
Pricing Plans Abuse
Subscription Fraud
Abuse of Business
Procedures/Processes Weaknesses
Arbitrage
Enablers Contributing to SIMBox Gateway Fraud
44. IRSF (International
Revenue Share Fraud)
Interconnect
Bypass/SIMBox
Gateway
Private Use
Charging Bypass
Traffic Inflation
for Credits/Bonus
Wholesale Fraud
Credit Balance
Reselling
Commisions Fraud
Fraud Types at Prepaid
Variations of Fraud Types at Prepaid vs Postpaid Customers
IRSF (International Revenue
Share Fraud)
Theft of Company
Handsets/Equipments
Service Reselling
Premium Rate
Service Fraud
Commisions Fraud
Private Use
Interconnect Bypass/SIMBox
Gateway
Wholesale Fraud
Fraud Types at Postpaid