SlideShare a Scribd company logo
Fraud in Telecoms
Sources of operational risk




© E.O’Connor – May 2008
DEFINITIONS
 Definition of Fraud varies by jurisdiction but a fair summary is:
 “a deception deliberately practiced in order to secure unfair or unlawful gain.”



 The Telecoms Management Forum defines Revenue Assurance as the:
       “data quality and process improvement methods that improve profits,
                      revenues and cash flows without influencing demand.”



 Together the revenue losses from RA and Fraud can be significant




                                                                                    2
A FEW RA & FRAUD ISSUES
             Revenue Assurance                        Fraud
                           Internal systems            B Employees
                           & processes
              Invoicing                                                 Number porting
              accuracy           Product mix
                                 complexity             Metallic
                                                        number resale
               Profitability
                                                                           “Goodwill” credits
                                     Incorrect
                                     pricing tables     Passing on of
              Real-time vs                              customer details
              batch processing                                                Box breaking
  Internal
                                   Channel            D   Call & port
                                   incentivisation        forwarding
               Pricing signals                                                 Theft SIMs ,
               driving behaviour                                               handsets &
                                                       Slamming
                                                                               subscriptions
                                     Process
                Accuracy of          interfaces           SIM Gateways
                data flows
                                                                               Roaming
                       Accuracy of customer
                       information at touchpoints      Bad debt & Credit
                                                       worthiness
  External
                                                                                                3
FRAUD
Fraudulent activities tend to fall into one of 7 categories:

 Voice – threat of impersonation for malicious or profitable motives
 Subscription – use of a legitimate subscriber’s network access for malicious or profitable
   motives
 Data – removal, inspection or insertion of data onto a network for malicious or profitable
   motives
 Internal – abuse of access to operator data by an employee for malicious or profitable
   motives
 Interconnection – exploitation of operator interconnection agreements for malicious or
   profitable motives
 Roaming – exploitation of operator roaming agreements for malicious or profitable
   motives
 Technical – use of counterfeiting or other technologies to duplicate, infiltrate or manipulate
   a mobile network for malicious or profitable motives


                                                                                                   4
EXAMPLE OF FRAUDULENT ACTIVITIES
Subscription fraud                                      Roaming fraud (I)
 Call selling using GSM conference calling              Where operators have roaming agreements
   feature where fraudster acts as an ‘operator’           Operator A must pay Operator B for the time
   setting up calls between parties and then               used by their customers on Operator’s B network
   dropping out to set up another                          regardless of whether Operator A is paid for the
 GSM call forwarding where fraudster sets call            time
   forward to required number. Caller calls the          Principle problem is the time it takes for billing
   fraudster’s phone and is transferred. Caller only       from Operator B to Operator A - used to be 72
   pays for the call to the fraudster’s phone number.      hours now down to 24 hours using EDI
 Fraudsters using a gateway to provide an               GSM MoU states that any user exceeding 100
   international ‘call box’ from shops                     Special Drawing Rights (SDR) must be billed
                                                           within 24 hours
Internal Fraud                                           But, when is collection actually made?
 Mobile markets are very competitive with
    operators subsidising handsets to entice new        Roaming fraud (II)
    customers to subscribe. Dealer or gangs often        SIM cards are taken out of phones acquired with
    sell these handsets on to overseas buyers. And         false identities and sent abroad where they are
    of course pre-paid handsets can be unlocked            used in call selling fraud. Call lengths of over 10
    and used on any network                                hours typical




                                                                                                                 5
THE CHALLENGE
 The ‘natural’ order of tasks for revenue assurance is to:
     monitor for evidence of loss
     investigate where & why there is loss
     resolve the problems so loss does not occur again


 However changing nature of business relationships means
     not clear where boundaries lie & hence where operational risk may arise
     process design & data integrity becomes even more important




                                          Service Provider
                                                             Content
 Collaborative methods of working                           Services




                                                                                                                                              Enterprise




                                                                                                                                                                         Customer
                                                                                                                    Gamma Telecom
                                                                                                                                    Virtual                Contracting              End-user
                                                                                                                                    Network                party




                                                                 Fixed Operator
  are essential to mutually assure                                                Carrier
                                                                                  Services
                                                                                                                                    Enabler


  data, revenues & costs


                                                                                       Mobile Operator
                                                                                                         Bearer
                                                                                                         Services




                                                                                                                                                                                               6
SUMMARY
 The major sources of revenue           Follow the cash
  loss continue to be:                   Understand the processes
    Fraud                               Audit rights with partners
    Credit management
                                         Strength & enforceability of
    Least-cost-routing errors            commercial agreements
    Interconnect / partner-payment
                                         Traceability of products in the
     errors
                                          distribution chain
    Poor processes & systems
                                         Integrity of interfaces – human &
                                          automated
 All adds up to a loss of
                                         Training & culture
  customer confidence in your
  business…                              Who has access to customer
                                          data?




                                                                              7
TECHNIQUES FOR AUDITING
Track-Back Approach                        The Grid Approach
 Audit works backwards from a              The key mobile revenue streams &
   convenient point, such as the             logical operations for each stream
   customer invoice, to the first source     are identified and set out in a grid
   of data capture                            (e.g. voice, sms, interconnect streams versus
                                              switch, mediation, rating, invoicing operations)

 Allows the detail of how the data
  flows & is manipulated to be              Offers a useful visual framework to
                                             help identify common processes &
  understood and data integrity /
                                             enable a high-level understanding of
  leakage risks quantified                   how the processes work, the controls
                                             and checks, known leakages and the
 Can be a time consuming process            confidence that all leakages / fraud
                                             risks have been identified

                                            The issue is that this approach may
                                             not capture sufficient detail nor show
                                             the commonality of operations
                                             between revenue streams

                                                                                                 8

More Related Content

What's hot

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mohan Robert
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
Sreejith Nair
 
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
John Owens
 
Cyber breach at target.pptx
Cyber breach at target.pptxCyber breach at target.pptx
Cyber breach at target.pptx
VarunLala2
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
PrabhatChoudhary11
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
N F
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector Venktesh Venke
 
Seminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attackSeminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attack
rohit2495
 
Internet related frauds
Internet related fraudsInternet related frauds
Internet related frauds
TejalAdani
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Greater Noida Institute Of Technology
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
Dheeraj Dani
 
Satyam scam
Satyam scamSatyam scam
Satyam scam
CP default
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet Banking
Chiheb Chebbi
 
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Dinidu Weeraratne
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
Tapan Khilar
 
Airtel vs reliance
Airtel vs relianceAirtel vs reliance
Airtel vs reliance
Saurabh Shukla
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
Hernan Huwyler
 
TCS iON certificate
TCS iON certificateTCS iON certificate
TCS iON certificate
sayan1998
 
Money laundering
Money launderingMoney laundering
Money laundering
Akshay Kumar
 

What's hot (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
 
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
Risk, Fraud Management and Current Issues and Challenges for Digital Financia...
 
Cyber breach at target.pptx
Cyber breach at target.pptxCyber breach at target.pptx
Cyber breach at target.pptx
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector
 
Seminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attackSeminar on yahoo mail cyber attack
Seminar on yahoo mail cyber attack
 
Internet related frauds
Internet related fraudsInternet related frauds
Internet related frauds
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Satyam scam
Satyam scamSatyam scam
Satyam scam
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet Banking
 
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Airtel vs reliance
Airtel vs relianceAirtel vs reliance
Airtel vs reliance
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
 
TCS iON certificate
TCS iON certificateTCS iON certificate
TCS iON certificate
 
Money laundering
Money launderingMoney laundering
Money laundering
 

Viewers also liked

Ethics in Telecom Sector
Ethics in Telecom SectorEthics in Telecom Sector
Ethics in Telecom Sector
Sagar Patekar
 
The impact of telecommunications policy on the economy - Raul L. Katz and Ja...
The impact of telecommunications policy on the economy  - Raul L. Katz and Ja...The impact of telecommunications policy on the economy  - Raul L. Katz and Ja...
The impact of telecommunications policy on the economy - Raul L. Katz and Ja...
ACORN-REDECOM
 
Telecom industry in india
Telecom industry in indiaTelecom industry in india
Telecom industry in india
Sandhir Sharma, Ph.D. (Management)
 
2G Spectrum Scam: Case-study
2G Spectrum Scam: Case-study2G Spectrum Scam: Case-study
2G Spectrum Scam: Case-studyAmrita Beri
 
Telecom Sector in India
Telecom Sector in IndiaTelecom Sector in India
Telecom Sector in India
Sandeep Sreenivasa
 
Telecom Sector
Telecom SectorTelecom Sector
Telecom Sector
santossb
 

Viewers also liked (6)

Ethics in Telecom Sector
Ethics in Telecom SectorEthics in Telecom Sector
Ethics in Telecom Sector
 
The impact of telecommunications policy on the economy - Raul L. Katz and Ja...
The impact of telecommunications policy on the economy  - Raul L. Katz and Ja...The impact of telecommunications policy on the economy  - Raul L. Katz and Ja...
The impact of telecommunications policy on the economy - Raul L. Katz and Ja...
 
Telecom industry in india
Telecom industry in indiaTelecom industry in india
Telecom industry in india
 
2G Spectrum Scam: Case-study
2G Spectrum Scam: Case-study2G Spectrum Scam: Case-study
2G Spectrum Scam: Case-study
 
Telecom Sector in India
Telecom Sector in IndiaTelecom Sector in India
Telecom Sector in India
 
Telecom Sector
Telecom SectorTelecom Sector
Telecom Sector
 

Similar to Fraud in Telecoms

TelBill Product Overview
TelBill Product OverviewTelBill Product Overview
TelBill Product Overview
parisholt
 
TelBill Overview
TelBill OverviewTelBill Overview
TelBill Overview
Paris Holt
 
ANZ Trend Micro Campaign Creative 11 SEPT 2010
ANZ Trend Micro Campaign Creative 11 SEPT 2010ANZ Trend Micro Campaign Creative 11 SEPT 2010
ANZ Trend Micro Campaign Creative 11 SEPT 2010Graeme Wood
 
Anz campaign creative 11 sept 2010
Anz campaign creative 11 sept 2010Anz campaign creative 11 sept 2010
Anz campaign creative 11 sept 2010
Graeme Wood
 
PartnerTEL TEM Services
PartnerTEL TEM ServicesPartnerTEL TEM Services
PartnerTEL TEM Services
SeanRosales
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
Dr. Eman Gawish
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
Dr. Eman Gawish
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
Dr. Eman Gawish
 
B2B eCommerce
B2B eCommerceB2B eCommerce
Mobility Platform for Insurers
Mobility Platform for InsurersMobility Platform for Insurers
Mobility Platform for Insurers
Newgen Software Technologies Limited
 
Mobility Platform for Insurers
Mobility Platform for InsurersMobility Platform for Insurers
Mobility Platform for Insurers
Newgen Software Technologies Limited
 
e-Business ideas in Telecom
e-Business ideas in Telecome-Business ideas in Telecom
e-Business ideas in Telecom
sam_tandon
 
Cut Costs by as much as 60% on Communications!
Cut Costs by as much as 60% on Communications!Cut Costs by as much as 60% on Communications!
Cut Costs by as much as 60% on Communications!
Pranay Sanghavi
 
Cut Costs by as much as 60% on Communications!
Cut Costs by as much as 60% on Communications!Cut Costs by as much as 60% on Communications!
Cut Costs by as much as 60% on Communications!
Pranay Sanghavi
 
Scalability problems and E-business
Scalability problems and E-businessScalability problems and E-business
Cem webinar brazil_final
Cem webinar brazil_finalCem webinar brazil_final
Cem webinar brazil_finalRafael Junquera
 
Delivering the Next Generation Airport
Delivering the Next Generation AirportDelivering the Next Generation Airport
Delivering the Next Generation Airport
Amor Group
 
IMOBIX RoamSource
IMOBIX RoamSourceIMOBIX RoamSource
IMOBIX RoamSource
Jeff Hunter
 
Effective administration of mobile number portability databases and systems –...
Effective administration of mobile number portability databases and systems –...Effective administration of mobile number portability databases and systems –...
Effective administration of mobile number portability databases and systems –...BSP Media Group
 
Grabovsky a.t.kearney telco-form_08.06.11
Grabovsky a.t.kearney telco-form_08.06.11Grabovsky a.t.kearney telco-form_08.06.11
Grabovsky a.t.kearney telco-form_08.06.11Андрей Лукин
 

Similar to Fraud in Telecoms (20)

TelBill Product Overview
TelBill Product OverviewTelBill Product Overview
TelBill Product Overview
 
TelBill Overview
TelBill OverviewTelBill Overview
TelBill Overview
 
ANZ Trend Micro Campaign Creative 11 SEPT 2010
ANZ Trend Micro Campaign Creative 11 SEPT 2010ANZ Trend Micro Campaign Creative 11 SEPT 2010
ANZ Trend Micro Campaign Creative 11 SEPT 2010
 
Anz campaign creative 11 sept 2010
Anz campaign creative 11 sept 2010Anz campaign creative 11 sept 2010
Anz campaign creative 11 sept 2010
 
PartnerTEL TEM Services
PartnerTEL TEM ServicesPartnerTEL TEM Services
PartnerTEL TEM Services
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
 
B2B eCommerce
B2B eCommerceB2B eCommerce
B2B eCommerce
 
Mobility Platform for Insurers
Mobility Platform for InsurersMobility Platform for Insurers
Mobility Platform for Insurers
 
Mobility Platform for Insurers
Mobility Platform for InsurersMobility Platform for Insurers
Mobility Platform for Insurers
 
e-Business ideas in Telecom
e-Business ideas in Telecome-Business ideas in Telecom
e-Business ideas in Telecom
 
Cut Costs by as much as 60% on Communications!
Cut Costs by as much as 60% on Communications!Cut Costs by as much as 60% on Communications!
Cut Costs by as much as 60% on Communications!
 
Cut Costs by as much as 60% on Communications!
Cut Costs by as much as 60% on Communications!Cut Costs by as much as 60% on Communications!
Cut Costs by as much as 60% on Communications!
 
Scalability problems and E-business
Scalability problems and E-businessScalability problems and E-business
Scalability problems and E-business
 
Cem webinar brazil_final
Cem webinar brazil_finalCem webinar brazil_final
Cem webinar brazil_final
 
Delivering the Next Generation Airport
Delivering the Next Generation AirportDelivering the Next Generation Airport
Delivering the Next Generation Airport
 
IMOBIX RoamSource
IMOBIX RoamSourceIMOBIX RoamSource
IMOBIX RoamSource
 
Effective administration of mobile number portability databases and systems –...
Effective administration of mobile number portability databases and systems –...Effective administration of mobile number portability databases and systems –...
Effective administration of mobile number portability databases and systems –...
 
Grabovsky a.t.kearney telco-form_08.06.11
Grabovsky a.t.kearney telco-form_08.06.11Grabovsky a.t.kearney telco-form_08.06.11
Grabovsky a.t.kearney telco-form_08.06.11
 

Recently uploaded

Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

Fraud in Telecoms

  • 1. Fraud in Telecoms Sources of operational risk © E.O’Connor – May 2008
  • 2. DEFINITIONS  Definition of Fraud varies by jurisdiction but a fair summary is: “a deception deliberately practiced in order to secure unfair or unlawful gain.”  The Telecoms Management Forum defines Revenue Assurance as the: “data quality and process improvement methods that improve profits, revenues and cash flows without influencing demand.”  Together the revenue losses from RA and Fraud can be significant 2
  • 3. A FEW RA & FRAUD ISSUES Revenue Assurance Fraud Internal systems B Employees & processes Invoicing Number porting accuracy Product mix complexity Metallic number resale Profitability “Goodwill” credits Incorrect pricing tables Passing on of Real-time vs customer details batch processing Box breaking Internal Channel D Call & port incentivisation forwarding Pricing signals Theft SIMs , driving behaviour handsets & Slamming subscriptions Process Accuracy of interfaces SIM Gateways data flows Roaming Accuracy of customer information at touchpoints Bad debt & Credit worthiness External 3
  • 4. FRAUD Fraudulent activities tend to fall into one of 7 categories:  Voice – threat of impersonation for malicious or profitable motives  Subscription – use of a legitimate subscriber’s network access for malicious or profitable motives  Data – removal, inspection or insertion of data onto a network for malicious or profitable motives  Internal – abuse of access to operator data by an employee for malicious or profitable motives  Interconnection – exploitation of operator interconnection agreements for malicious or profitable motives  Roaming – exploitation of operator roaming agreements for malicious or profitable motives  Technical – use of counterfeiting or other technologies to duplicate, infiltrate or manipulate a mobile network for malicious or profitable motives 4
  • 5. EXAMPLE OF FRAUDULENT ACTIVITIES Subscription fraud Roaming fraud (I)  Call selling using GSM conference calling  Where operators have roaming agreements feature where fraudster acts as an ‘operator’ Operator A must pay Operator B for the time setting up calls between parties and then used by their customers on Operator’s B network dropping out to set up another regardless of whether Operator A is paid for the  GSM call forwarding where fraudster sets call time forward to required number. Caller calls the  Principle problem is the time it takes for billing fraudster’s phone and is transferred. Caller only from Operator B to Operator A - used to be 72 pays for the call to the fraudster’s phone number. hours now down to 24 hours using EDI  Fraudsters using a gateway to provide an  GSM MoU states that any user exceeding 100 international ‘call box’ from shops Special Drawing Rights (SDR) must be billed within 24 hours Internal Fraud  But, when is collection actually made?  Mobile markets are very competitive with operators subsidising handsets to entice new Roaming fraud (II) customers to subscribe. Dealer or gangs often  SIM cards are taken out of phones acquired with sell these handsets on to overseas buyers. And false identities and sent abroad where they are of course pre-paid handsets can be unlocked used in call selling fraud. Call lengths of over 10 and used on any network hours typical 5
  • 6. THE CHALLENGE  The ‘natural’ order of tasks for revenue assurance is to:  monitor for evidence of loss  investigate where & why there is loss  resolve the problems so loss does not occur again  However changing nature of business relationships means  not clear where boundaries lie & hence where operational risk may arise  process design & data integrity becomes even more important Service Provider Content  Collaborative methods of working Services Enterprise Customer Gamma Telecom Virtual Contracting End-user Network party Fixed Operator are essential to mutually assure Carrier Services Enabler data, revenues & costs Mobile Operator Bearer Services 6
  • 7. SUMMARY  The major sources of revenue  Follow the cash loss continue to be:  Understand the processes  Fraud  Audit rights with partners  Credit management  Strength & enforceability of  Least-cost-routing errors commercial agreements  Interconnect / partner-payment  Traceability of products in the errors distribution chain  Poor processes & systems  Integrity of interfaces – human & automated  All adds up to a loss of  Training & culture customer confidence in your business…  Who has access to customer data? 7
  • 8. TECHNIQUES FOR AUDITING Track-Back Approach The Grid Approach  Audit works backwards from a  The key mobile revenue streams & convenient point, such as the logical operations for each stream customer invoice, to the first source are identified and set out in a grid of data capture (e.g. voice, sms, interconnect streams versus switch, mediation, rating, invoicing operations)  Allows the detail of how the data flows & is manipulated to be  Offers a useful visual framework to help identify common processes & understood and data integrity / enable a high-level understanding of leakage risks quantified how the processes work, the controls and checks, known leakages and the  Can be a time consuming process confidence that all leakages / fraud risks have been identified  The issue is that this approach may not capture sufficient detail nor show the commonality of operations between revenue streams 8