SlideShare a Scribd company logo
1 of 42
Download to read offline
OPERATIONAL 
RISK MANAGEMENT & COMPLIANCE 
© 2012 – PROPRIETARY AND CONFIDENTIAL INFORMATION OF CVIDYA 
Fraud Management Industry Update 
Webinar, September 2014 
Dr. Gadi Solotorevsky 
CTO – cVidya Networks 
Ambassador, Distinguished Fellow and RA Team Leader – TM Forum
Agenda 
CFCA survey 
TM Forum classification and survey 
Account take over 
Fighting Fraud with Cyber Intelligence 
2
CFCA Survey 2013
CFCA Survey – Fraud Growth 
Global fraud loss survey trend – based on previous surveys 
Global fraud losses 
showing a 15% 
increase in 2013
CFCA Fraud Survey 
5
CFCA Fraud Survey 
6
CFCA Fraud Survey 
7
CFCA Fraud Survey 
8
CFCA Fraud Survey 
9
CFCA Fraud Survey 
10
CFCA Fraud Survey 
11
CFCA Fraud Survey 
12
Telephone numbers in the United Kingdom 
13 
Source Wikipedia: Telephone numbers in the United Kingdom
Telephone numbers in the United Kingdom 
14 
Source Wikipedia: Telephone numbers in the United Kingdom
CFCA Fraud Survey 
15
CFCA Fraud Survey 
16
CFCA Fraud Survey 
17
CFCA Fraud Survey 
18
Key Analysis and Observations 
Revenue Share Fraud (International and National) continues to be the biggest reported threat at GSMA 
–Both in terms of the number of cases and the value of losses reported 
Revenue Share Fraud (International and National) is Driving Other Fraud Types 
–Most subscription Fraud and PBX Hacking cases reported were linked to revenue share service abuse 
PBX Hacking involving Supplied Equipment 
–Several PBX hacking cases involved equipment that was not supplied by the operator 
 Usage monitoring is the primary method of detection cited 
–FMS, High Usage Monitoring, NRTRDE/HUR, CDR Analysis etc 
Is this due to a narrow focus? 
Would these issues be a better control point 
An Impact of convergence? 
Is this too reactive?
Fraud Classification Model – 
TM Forum
Fraud Classification Model – TM Forum 
•Why do we need an effective FM Classification Model? 
Fraud Scenario 
Referred Fraud Types 
Statistics 
“Fraudster generates a high volume of calls to a PRS number range that he owns in another country with no intention to pay.” 
•PRS 
•IRSF 
•PRS/IRSF 
•Bypass/SIMBOX 
•PABX Hacking 
•Clip-on 
•Stolen Line 
•Subscription 
•Dealer 
•Payment 
•PBX / Voicemail 
•Roaming out 
Unique: 39% 
Multiple: 44% 
Structured: 17% 
An example from the 2012 TMForum Fraud Survey
CFCA 2011 f Survey Fraud types 
22
Fraud Classification Model - Challenges 
•Distinct names for the same Fraud Type 
•Distinct interpretation depending on the core service (Mobile, Fixed, Cable, etc.) 
•Multiple Frauds perpetrated in the same Fraud Case 
•Fast changing nature of Fraud 
•Need for a multi-dimensional analysis 
•Need for different levels of abstraction 
•Existence of several similar Ad hoc “Fraud Type” lists
Proposed Classification Model - TM Forum 
Summary of Relations Between 
Enablers – Fraud Types 
Subscription Fraud 
Hacking of Network Elements 
Arbitrage 
Mobile Malware 
ENABLERS 
(Vulnerabilities) 
FRAUD TYPE 
(Fraudulent Scheme) 
TELECOMS SERVICE FRAUD 
Cloning of SIM Card/Equipment 
Protocol/Signalling Manipulation 
Tariff Rates/Pricing Plan Abuse 
False Base Station Attack 
Misconfiguration of Network/Service Platforms 
International Revenue Share Fraud 
Reselling of Calls 
Wholesale Fraud 
Private Use 
Commissions Fraud 
Traffic Inflation for Credits/Bonus 
Charging Bypass 
Interconnect Bypass 
SIMBox Gateway 
OBJECTIVE 
(Scope) 
Make Money/Profit 
Obtain Free Services/Goods 
Obtain Credits/Bonuses 
Obtain Commissions 
Obtain Money 
Access User Bank Account 
Pretending to Be the Operator 
………. 
BA - Related Fields 
Fraud 
Management 
Security Management 
Revenue 
Assurance -Revision of Internal Procedures, Processes and Products/Services -Implementation of Technical Solutions at Network and Service Platforms Development, Enhancement and Reconfiguration of Fraud Management Systems (FMS)
Account Takeover
What is it? 
Account Takeover Fraud (ATO, also known as ‘Facility takeover’ fraud) occurs where a person (the ‘facility hijacker’) unlawfully obtains access to details of the ‘victim of takeover’, namely an existing account holder or policyholder, and fraudulently operates the account or policy for his or her own (or someone else’s) benefit. 
Methodologies often form around the social engineering of existing customers or customer service and sales processes 
–Web Self Service portals 
–IVR 
–Upgrades, additional lines & Sim Swap 
? 
? 
?
2008 
Account Takeover Overview 
As a result of the Credit crunch operator behaviours have changed encouraging the growth in ATO worldwide (particularly well developed and competitive markets) 
As an example - Growth of ATO in the UK 
–330% in 2009, In 2010 a further 70% growth 
Upgrades or Additional Lines? 
–In 2008 - 92% additional, 8% upgrades 
–In 2009 – 55% additional, 45% upgrades 
–In 2010 – 37% additional, 63% upgrades 
–Further growth in 2011 & 2012 
This growth has been replicated worldwide 
Source: Cifas 
2009 
2010
Issues and Causes 
Pressure points in your organisation and market allowing ATO; 
–Focus on Customer retention & Churn reduction 
–Simplifying Customer Services (CS) processes 
–Customer satisfaction 
–Push for reductions in CS costs and ACHT 
–Reliance on simplistic Knowledge Based Authentication (KBA) 
–Internal sales pressure on staff 
–Desire for growth 
Fraudsters manipulate these pressure points 
–KBA, can be weak (ease of use) and simply compromised via social engineering 
–CS staff also liable to social engineering, based on sales & time pressures and related financial incentive 
–Less restrictions and checks in place on existing customer processes (compared to new applications) 
–Greater profit value for fraudsters (top offers for existing customers)
Typical flow & Pressure points 
AGENT LOGISTICS 
CRM 
WWW 
IVR 
Social engineering 
Data Misuse 
Process Abuse 
Logistics Manipulation
Account Takeover 
30 
http://diario.elmercurio.com/detalle/index.asp?id=%7B3c91699d-fa58-4d2a-a3d0-496a46fc9a55%7D
Account Takeover 
31 
http://diario.elmercurio.com/detalle/index.asp?id=%7B3c91699d-fa58-4d2a-a3d0-496a46fc9a55%7D
SIM Swap Fraud 
http://www.finextra.com/blogs/ fullblog.aspx?blogid=7766 
32
Fighting Fraud with Cyber Intelligence 
33
SIM Card Trade 
Anonymous SIM card trade on an underground market 
−It isn't clear whether these cards are stolen from customers or the company itself 
−These SIM cards are available in big quantities
Fraudsters Guides 
Hand Picked Set of Guides for Beginner Fraudsters – Premium. Including fraud method of how to get your own SIM cards from anywhere. 
How to steal people's information
Account Take Over Guide
Stolen Identities are cheap on the darknet 
37 
Source: http://www.itspecialist. com/Home/FeatureArticles/TabId/208/ArticleId/99/language/en- US/#.VBftKdK_nmI
Customer’s & Employees Information 
XXX workers' emails leaked by YYYY pre-leak 
Online publication of XXX clients and workers' information 
–Client's details (name, cell number, ssn on file, address) 
XXX.net users and passwords (published in an underground forum):
Public Web 
•“How to” blogs and forums 
•Customer’s complaint sites 
•Paste Sites 
Dark-Net 
•Underground Markets – sales of fraud services, SIMs, Identities and Internal information 
•Underground Forums – Tutorials and methods to perform different types of fraudulent activities 
Sources of Information
Dark-Net Search 
–The Dark-Net search, looks all over the Internet for information, located mostly in hackers and fraudsters’ forums and boards 
–This information is hard to reach, sometimes hidden in closed forums or chat rooms behind passwords and vetting processes 
–The Dark-Net search can be tailor-made to CSPs specific needs and gives a clear picture about the company’s reflection in the illegal zones of the web
Questions? 
Gadi@cVidya.com
THANK YOU! 
www.cvidya.com 
42

More Related Content

What's hot

TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...cVidya Networks
 
How to monetize and generate revenues from data services in a competitive market
How to monetize and generate revenues from data services in a competitive marketHow to monetize and generate revenues from data services in a competitive market
How to monetize and generate revenues from data services in a competitive marketcVidya Networks
 
Tech M White Paper Revenue Assurance D0 9 180612 (1)
Tech M White Paper Revenue Assurance D0 9 180612 (1)Tech M White Paper Revenue Assurance D0 9 180612 (1)
Tech M White Paper Revenue Assurance D0 9 180612 (1)aprasoon
 
How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom FraudJeraSoft
 
Zen Infographic - Revenue Assurance Automation
Zen Infographic - Revenue Assurance AutomationZen Infographic - Revenue Assurance Automation
Zen Infographic - Revenue Assurance AutomationSubex
 
Big Data Monetization - The Path From Internal to External
Big Data Monetization - The Path From Internal to ExternalBig Data Monetization - The Path From Internal to External
Big Data Monetization - The Path From Internal to ExternalcVidya Networks
 
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue AssuranceHow to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue AssurancecVidya Networks
 
Detecting fraud in cellular telephone networks
Detecting fraud in cellular telephone networksDetecting fraud in cellular telephone networks
Detecting fraud in cellular telephone networksJamal Meselmani
 
Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13Olya Saiko
 
Telecom Cambodia - SIM Box Issue 2013
Telecom Cambodia - SIM Box Issue 2013Telecom Cambodia - SIM Box Issue 2013
Telecom Cambodia - SIM Box Issue 2013Firdaus Fadzil
 
Pricing and commissions Webinar English
Pricing and commissions Webinar EnglishPricing and commissions Webinar English
Pricing and commissions Webinar EnglishCamilo Tellez
 
19 Tips for Achieving TCPA Compliance in Your Contact Center
19 Tips for Achieving TCPA Compliance in Your Contact Center19 Tips for Achieving TCPA Compliance in Your Contact Center
19 Tips for Achieving TCPA Compliance in Your Contact CenterConnect First
 
Questionnaire: the 70 questions to answer before engaging on the road to beco...
Questionnaire: the 70 questions to answer before engaging on the road to beco...Questionnaire: the 70 questions to answer before engaging on the road to beco...
Questionnaire: the 70 questions to answer before engaging on the road to beco...Computaris
 
Sim box fraud
Sim box fraudSim box fraud
Sim box fraudXINTEC
 
TCPA Compliance Experts Explain How to Avoid Fines in 2015
TCPA Compliance Experts Explain How to Avoid Fines in 2015 TCPA Compliance Experts Explain How to Avoid Fines in 2015
TCPA Compliance Experts Explain How to Avoid Fines in 2015 Connect First
 
Build competitive edge through differentiated customer experience
Build competitive edge  through differentiated  customer experienceBuild competitive edge  through differentiated  customer experience
Build competitive edge through differentiated customer experiencegiridharseorank
 
M Cardp2p
M Cardp2pM Cardp2p
M Cardp2pTom72
 
PCI DSS Compliance. Shop Direct; A Case Study.
PCI DSS Compliance. Shop Direct; A Case Study. PCI DSS Compliance. Shop Direct; A Case Study.
PCI DSS Compliance. Shop Direct; A Case Study. Compliance3
 
Mobile point of sale final deliverable
Mobile point of sale   final deliverableMobile point of sale   final deliverable
Mobile point of sale final deliverableMilind Kinker
 

What's hot (20)

TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
 
How to monetize and generate revenues from data services in a competitive market
How to monetize and generate revenues from data services in a competitive marketHow to monetize and generate revenues from data services in a competitive market
How to monetize and generate revenues from data services in a competitive market
 
Tech M White Paper Revenue Assurance D0 9 180612 (1)
Tech M White Paper Revenue Assurance D0 9 180612 (1)Tech M White Paper Revenue Assurance D0 9 180612 (1)
Tech M White Paper Revenue Assurance D0 9 180612 (1)
 
How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom Fraud
 
Zen Infographic - Revenue Assurance Automation
Zen Infographic - Revenue Assurance AutomationZen Infographic - Revenue Assurance Automation
Zen Infographic - Revenue Assurance Automation
 
Fighting the ARPU Challenge
Fighting the ARPU ChallengeFighting the ARPU Challenge
Fighting the ARPU Challenge
 
Big Data Monetization - The Path From Internal to External
Big Data Monetization - The Path From Internal to ExternalBig Data Monetization - The Path From Internal to External
Big Data Monetization - The Path From Internal to External
 
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue AssuranceHow to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
How to Leverage Big Data to Help Finding Fraud Patterns & Revenue Assurance
 
Detecting fraud in cellular telephone networks
Detecting fraud in cellular telephone networksDetecting fraud in cellular telephone networks
Detecting fraud in cellular telephone networks
 
Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13
 
Telecom Cambodia - SIM Box Issue 2013
Telecom Cambodia - SIM Box Issue 2013Telecom Cambodia - SIM Box Issue 2013
Telecom Cambodia - SIM Box Issue 2013
 
Pricing and commissions Webinar English
Pricing and commissions Webinar EnglishPricing and commissions Webinar English
Pricing and commissions Webinar English
 
19 Tips for Achieving TCPA Compliance in Your Contact Center
19 Tips for Achieving TCPA Compliance in Your Contact Center19 Tips for Achieving TCPA Compliance in Your Contact Center
19 Tips for Achieving TCPA Compliance in Your Contact Center
 
Questionnaire: the 70 questions to answer before engaging on the road to beco...
Questionnaire: the 70 questions to answer before engaging on the road to beco...Questionnaire: the 70 questions to answer before engaging on the road to beco...
Questionnaire: the 70 questions to answer before engaging on the road to beco...
 
Sim box fraud
Sim box fraudSim box fraud
Sim box fraud
 
TCPA Compliance Experts Explain How to Avoid Fines in 2015
TCPA Compliance Experts Explain How to Avoid Fines in 2015 TCPA Compliance Experts Explain How to Avoid Fines in 2015
TCPA Compliance Experts Explain How to Avoid Fines in 2015
 
Build competitive edge through differentiated customer experience
Build competitive edge  through differentiated  customer experienceBuild competitive edge  through differentiated  customer experience
Build competitive edge through differentiated customer experience
 
M Cardp2p
M Cardp2pM Cardp2p
M Cardp2p
 
PCI DSS Compliance. Shop Direct; A Case Study.
PCI DSS Compliance. Shop Direct; A Case Study. PCI DSS Compliance. Shop Direct; A Case Study.
PCI DSS Compliance. Shop Direct; A Case Study.
 
Mobile point of sale final deliverable
Mobile point of sale   final deliverableMobile point of sale   final deliverable
Mobile point of sale final deliverable
 

Viewers also liked

Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Tim Bass
 
Cybersource ecommerce summit
Cybersource ecommerce summitCybersource ecommerce summit
Cybersource ecommerce summitEcommerce Summit
 
Fraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsFraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsEMAC Consulting Group
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abusesharing notes123
 
Event Driven Architecture (EDA), November 2, 2006
Event Driven Architecture (EDA), November 2, 2006Event Driven Architecture (EDA), November 2, 2006
Event Driven Architecture (EDA), November 2, 2006Tim Bass
 
Complex Event Processing in Practice at jDays 2012
Complex Event Processing in Practice at jDays 2012Complex Event Processing in Practice at jDays 2012
Complex Event Processing in Practice at jDays 2012Peter Norrhall
 

Viewers also liked (9)

Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...
 
Cybersource ecommerce summit
Cybersource ecommerce summitCybersource ecommerce summit
Cybersource ecommerce summit
 
Event Driven Architecture
Event Driven ArchitectureEvent Driven Architecture
Event Driven Architecture
 
Fraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsFraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management Consultants
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 
Event Driven Architecture (EDA), November 2, 2006
Event Driven Architecture (EDA), November 2, 2006Event Driven Architecture (EDA), November 2, 2006
Event Driven Architecture (EDA), November 2, 2006
 
Fraud risk management
Fraud risk managementFraud risk management
Fraud risk management
 
Complex Event Processing in Practice at jDays 2012
Complex Event Processing in Practice at jDays 2012Complex Event Processing in Practice at jDays 2012
Complex Event Processing in Practice at jDays 2012
 
Fraud Management Solutions
Fraud Management SolutionsFraud Management Solutions
Fraud Management Solutions
 

Similar to Fraud Management Industry Update Webinar

How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeTelcoBridges Inc.
 
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle :  A Guide For Private Label IssuersUnderstanding the Card Fraud Lifecycle :  A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle : A Guide For Private Label IssuersChristopher Uriarte
 
Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy European Merchant Services
 
Telecom Revenue Assurance Workshop
Telecom Revenue Assurance WorkshopTelecom Revenue Assurance Workshop
Telecom Revenue Assurance WorkshopParcus Group
 
The DNA of Online Payments Fraud
The DNA of Online Payments FraudThe DNA of Online Payments Fraud
The DNA of Online Payments FraudChristopher Uriarte
 
Ict2005 fms
Ict2005 fmsIct2005 fms
Ict2005 fmskkvences
 
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...TransUnion
 
The Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersThe Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersEckoh
 
IRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid ModelsIRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid ModelsIRJET Journal
 
Real-time fraud detection
Real-time fraud detectionReal-time fraud detection
Real-time fraud detectionconfluent
 
AI Use-cases in Telecom sector - Part-2.pptx
AI Use-cases in Telecom sector - Part-2.pptxAI Use-cases in Telecom sector - Part-2.pptx
AI Use-cases in Telecom sector - Part-2.pptxSashilReddy1
 
7.2 gsm-association-fraud-forum
7.2 gsm-association-fraud-forum7.2 gsm-association-fraud-forum
7.2 gsm-association-fraud-forumkkvences
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Anil Jain
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
Faudalert_Data_Sheet
Faudalert_Data_SheetFaudalert_Data_Sheet
Faudalert_Data_SheetJuan Illidge
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToAlan Percy
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToTelcoBridges Inc.
 
Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sectorsksahu099
 

Similar to Fraud Management Industry Update Webinar (20)

How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle :  A Guide For Private Label IssuersUnderstanding the Card Fraud Lifecycle :  A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
 
Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy
 
Telecom Revenue Assurance Workshop
Telecom Revenue Assurance WorkshopTelecom Revenue Assurance Workshop
Telecom Revenue Assurance Workshop
 
The DNA of Online Payments Fraud
The DNA of Online Payments FraudThe DNA of Online Payments Fraud
The DNA of Online Payments Fraud
 
Falcon 012009
Falcon 012009Falcon 012009
Falcon 012009
 
Ict2005 fms
Ict2005 fmsIct2005 fms
Ict2005 fms
 
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
 
The Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersThe Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact Centers
 
IRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid ModelsIRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid Models
 
Real-time fraud detection
Real-time fraud detectionReal-time fraud detection
Real-time fraud detection
 
AI Use-cases in Telecom sector - Part-2.pptx
AI Use-cases in Telecom sector - Part-2.pptxAI Use-cases in Telecom sector - Part-2.pptx
AI Use-cases in Telecom sector - Part-2.pptx
 
7.2 gsm-association-fraud-forum
7.2 gsm-association-fraud-forum7.2 gsm-association-fraud-forum
7.2 gsm-association-fraud-forum
 
revenue assurance
revenue assurancerevenue assurance
revenue assurance
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Faudalert_Data_Sheet
Faudalert_Data_SheetFaudalert_Data_Sheet
Faudalert_Data_Sheet
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sector
 

More from cVidya Networks

Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...
Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...
Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...cVidya Networks
 
Utilizing Big Data to Optimize Customer Value Management Strategies
Utilizing Big Data to Optimize Customer Value Management StrategiesUtilizing Big Data to Optimize Customer Value Management Strategies
Utilizing Big Data to Optimize Customer Value Management StrategiescVidya Networks
 
“Full Strike – using your data to hit targeting, proposition and strategic in...
“Full Strike – using your data to hit targeting, proposition and strategic in...“Full Strike – using your data to hit targeting, proposition and strategic in...
“Full Strike – using your data to hit targeting, proposition and strategic in...cVidya Networks
 
Why should RA & Fraud Managers rethink the way they manage their business?
Why should RA & Fraud Managers rethink the way they manage their business?Why should RA & Fraud Managers rethink the way they manage their business?
Why should RA & Fraud Managers rethink the way they manage their business?cVidya Networks
 
Hacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraudHacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraudcVidya Networks
 
cVidya RA for Electric Utilities - RA Forum Conference
cVidya RA for Electric Utilities - RA Forum ConferencecVidya RA for Electric Utilities - RA Forum Conference
cVidya RA for Electric Utilities - RA Forum ConferencecVidya Networks
 
Shift at work of fraud management
Shift at work of fraud managementShift at work of fraud management
Shift at work of fraud managementcVidya Networks
 
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue Assurance
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue AssuranceSmart Margin Analytics: Adding Margin Assurance Capability to Revenue Assurance
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue AssurancecVidya Networks
 
TM Forum Presentation with cVidya and Alltel
TM Forum Presentation with cVidya and AlltelTM Forum Presentation with cVidya and Alltel
TM Forum Presentation with cVidya and AlltelcVidya Networks
 
TM Forum #MWA12 Catalyst Presentation with cVidya
TM Forum #MWA12 Catalyst Presentation with cVidyaTM Forum #MWA12 Catalyst Presentation with cVidya
TM Forum #MWA12 Catalyst Presentation with cVidyacVidya Networks
 
Telco’s change in Climate Brings new opportunities for growth
Telco’s change in Climate Brings new opportunities for growthTelco’s change in Climate Brings new opportunities for growth
Telco’s change in Climate Brings new opportunities for growthcVidya Networks
 
The Impact Data Traffic Explosion and LTE on Revenue Assurance
The Impact Data Traffic Explosion and LTE on Revenue AssuranceThe Impact Data Traffic Explosion and LTE on Revenue Assurance
The Impact Data Traffic Explosion and LTE on Revenue AssurancecVidya Networks
 
Enterprise Fraud Management - Challenges Brings New Opportunities
Enterprise Fraud Management - Challenges Brings New OpportunitiesEnterprise Fraud Management - Challenges Brings New Opportunities
Enterprise Fraud Management - Challenges Brings New OpportunitiescVidya Networks
 
Pricing Analytics - Pricing Mobile Data, London 2012
Pricing Analytics - Pricing Mobile Data, London 2012Pricing Analytics - Pricing Mobile Data, London 2012
Pricing Analytics - Pricing Mobile Data, London 2012cVidya Networks
 
Joint Oracle-cVidya Cloud webinar - SaaS Market Growth & Opportunities
Joint Oracle-cVidya Cloud webinar - SaaS Market Growth & OpportunitiesJoint Oracle-cVidya Cloud webinar - SaaS Market Growth & Opportunities
Joint Oracle-cVidya Cloud webinar - SaaS Market Growth & OpportunitiescVidya Networks
 
Cloud based fraud detection and management solution – alaska communications c...
Cloud based fraud detection and management solution – alaska communications c...Cloud based fraud detection and management solution – alaska communications c...
Cloud based fraud detection and management solution – alaska communications c...cVidya Networks
 
Cloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxCloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxcVidya Networks
 
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration StrategyBringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration StrategycVidya Networks
 
Uncovering Fraud Dilemmas - cVidya in London May 2012
Uncovering Fraud Dilemmas - cVidya in London May 2012Uncovering Fraud Dilemmas - cVidya in London May 2012
Uncovering Fraud Dilemmas - cVidya in London May 2012cVidya Networks
 
When revenue intelligence meets the cloud
When revenue intelligence meets the cloudWhen revenue intelligence meets the cloud
When revenue intelligence meets the cloudcVidya Networks
 

More from cVidya Networks (20)

Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...
Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...
Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...
 
Utilizing Big Data to Optimize Customer Value Management Strategies
Utilizing Big Data to Optimize Customer Value Management StrategiesUtilizing Big Data to Optimize Customer Value Management Strategies
Utilizing Big Data to Optimize Customer Value Management Strategies
 
“Full Strike – using your data to hit targeting, proposition and strategic in...
“Full Strike – using your data to hit targeting, proposition and strategic in...“Full Strike – using your data to hit targeting, proposition and strategic in...
“Full Strike – using your data to hit targeting, proposition and strategic in...
 
Why should RA & Fraud Managers rethink the way they manage their business?
Why should RA & Fraud Managers rethink the way they manage their business?Why should RA & Fraud Managers rethink the way they manage their business?
Why should RA & Fraud Managers rethink the way they manage their business?
 
Hacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraudHacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraud
 
cVidya RA for Electric Utilities - RA Forum Conference
cVidya RA for Electric Utilities - RA Forum ConferencecVidya RA for Electric Utilities - RA Forum Conference
cVidya RA for Electric Utilities - RA Forum Conference
 
Shift at work of fraud management
Shift at work of fraud managementShift at work of fraud management
Shift at work of fraud management
 
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue Assurance
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue AssuranceSmart Margin Analytics: Adding Margin Assurance Capability to Revenue Assurance
Smart Margin Analytics: Adding Margin Assurance Capability to Revenue Assurance
 
TM Forum Presentation with cVidya and Alltel
TM Forum Presentation with cVidya and AlltelTM Forum Presentation with cVidya and Alltel
TM Forum Presentation with cVidya and Alltel
 
TM Forum #MWA12 Catalyst Presentation with cVidya
TM Forum #MWA12 Catalyst Presentation with cVidyaTM Forum #MWA12 Catalyst Presentation with cVidya
TM Forum #MWA12 Catalyst Presentation with cVidya
 
Telco’s change in Climate Brings new opportunities for growth
Telco’s change in Climate Brings new opportunities for growthTelco’s change in Climate Brings new opportunities for growth
Telco’s change in Climate Brings new opportunities for growth
 
The Impact Data Traffic Explosion and LTE on Revenue Assurance
The Impact Data Traffic Explosion and LTE on Revenue AssuranceThe Impact Data Traffic Explosion and LTE on Revenue Assurance
The Impact Data Traffic Explosion and LTE on Revenue Assurance
 
Enterprise Fraud Management - Challenges Brings New Opportunities
Enterprise Fraud Management - Challenges Brings New OpportunitiesEnterprise Fraud Management - Challenges Brings New Opportunities
Enterprise Fraud Management - Challenges Brings New Opportunities
 
Pricing Analytics - Pricing Mobile Data, London 2012
Pricing Analytics - Pricing Mobile Data, London 2012Pricing Analytics - Pricing Mobile Data, London 2012
Pricing Analytics - Pricing Mobile Data, London 2012
 
Joint Oracle-cVidya Cloud webinar - SaaS Market Growth & Opportunities
Joint Oracle-cVidya Cloud webinar - SaaS Market Growth & OpportunitiesJoint Oracle-cVidya Cloud webinar - SaaS Market Growth & Opportunities
Joint Oracle-cVidya Cloud webinar - SaaS Market Growth & Opportunities
 
Cloud based fraud detection and management solution – alaska communications c...
Cloud based fraud detection and management solution – alaska communications c...Cloud based fraud detection and management solution – alaska communications c...
Cloud based fraud detection and management solution – alaska communications c...
 
Cloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxCloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake Paradox
 
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration StrategyBringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
Bringing Shadow IT into the Light with a Centralized IT Cloud Migration Strategy
 
Uncovering Fraud Dilemmas - cVidya in London May 2012
Uncovering Fraud Dilemmas - cVidya in London May 2012Uncovering Fraud Dilemmas - cVidya in London May 2012
Uncovering Fraud Dilemmas - cVidya in London May 2012
 
When revenue intelligence meets the cloud
When revenue intelligence meets the cloudWhen revenue intelligence meets the cloud
When revenue intelligence meets the cloud
 

Recently uploaded

The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...lizamodels9
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 

Recently uploaded (20)

Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 

Fraud Management Industry Update Webinar

  • 1. OPERATIONAL RISK MANAGEMENT & COMPLIANCE © 2012 – PROPRIETARY AND CONFIDENTIAL INFORMATION OF CVIDYA Fraud Management Industry Update Webinar, September 2014 Dr. Gadi Solotorevsky CTO – cVidya Networks Ambassador, Distinguished Fellow and RA Team Leader – TM Forum
  • 2. Agenda CFCA survey TM Forum classification and survey Account take over Fighting Fraud with Cyber Intelligence 2
  • 4. CFCA Survey – Fraud Growth Global fraud loss survey trend – based on previous surveys Global fraud losses showing a 15% increase in 2013
  • 13. Telephone numbers in the United Kingdom 13 Source Wikipedia: Telephone numbers in the United Kingdom
  • 14. Telephone numbers in the United Kingdom 14 Source Wikipedia: Telephone numbers in the United Kingdom
  • 19. Key Analysis and Observations Revenue Share Fraud (International and National) continues to be the biggest reported threat at GSMA –Both in terms of the number of cases and the value of losses reported Revenue Share Fraud (International and National) is Driving Other Fraud Types –Most subscription Fraud and PBX Hacking cases reported were linked to revenue share service abuse PBX Hacking involving Supplied Equipment –Several PBX hacking cases involved equipment that was not supplied by the operator  Usage monitoring is the primary method of detection cited –FMS, High Usage Monitoring, NRTRDE/HUR, CDR Analysis etc Is this due to a narrow focus? Would these issues be a better control point An Impact of convergence? Is this too reactive?
  • 21. Fraud Classification Model – TM Forum •Why do we need an effective FM Classification Model? Fraud Scenario Referred Fraud Types Statistics “Fraudster generates a high volume of calls to a PRS number range that he owns in another country with no intention to pay.” •PRS •IRSF •PRS/IRSF •Bypass/SIMBOX •PABX Hacking •Clip-on •Stolen Line •Subscription •Dealer •Payment •PBX / Voicemail •Roaming out Unique: 39% Multiple: 44% Structured: 17% An example from the 2012 TMForum Fraud Survey
  • 22. CFCA 2011 f Survey Fraud types 22
  • 23. Fraud Classification Model - Challenges •Distinct names for the same Fraud Type •Distinct interpretation depending on the core service (Mobile, Fixed, Cable, etc.) •Multiple Frauds perpetrated in the same Fraud Case •Fast changing nature of Fraud •Need for a multi-dimensional analysis •Need for different levels of abstraction •Existence of several similar Ad hoc “Fraud Type” lists
  • 24. Proposed Classification Model - TM Forum Summary of Relations Between Enablers – Fraud Types Subscription Fraud Hacking of Network Elements Arbitrage Mobile Malware ENABLERS (Vulnerabilities) FRAUD TYPE (Fraudulent Scheme) TELECOMS SERVICE FRAUD Cloning of SIM Card/Equipment Protocol/Signalling Manipulation Tariff Rates/Pricing Plan Abuse False Base Station Attack Misconfiguration of Network/Service Platforms International Revenue Share Fraud Reselling of Calls Wholesale Fraud Private Use Commissions Fraud Traffic Inflation for Credits/Bonus Charging Bypass Interconnect Bypass SIMBox Gateway OBJECTIVE (Scope) Make Money/Profit Obtain Free Services/Goods Obtain Credits/Bonuses Obtain Commissions Obtain Money Access User Bank Account Pretending to Be the Operator ………. BA - Related Fields Fraud Management Security Management Revenue Assurance -Revision of Internal Procedures, Processes and Products/Services -Implementation of Technical Solutions at Network and Service Platforms Development, Enhancement and Reconfiguration of Fraud Management Systems (FMS)
  • 26. What is it? Account Takeover Fraud (ATO, also known as ‘Facility takeover’ fraud) occurs where a person (the ‘facility hijacker’) unlawfully obtains access to details of the ‘victim of takeover’, namely an existing account holder or policyholder, and fraudulently operates the account or policy for his or her own (or someone else’s) benefit. Methodologies often form around the social engineering of existing customers or customer service and sales processes –Web Self Service portals –IVR –Upgrades, additional lines & Sim Swap ? ? ?
  • 27. 2008 Account Takeover Overview As a result of the Credit crunch operator behaviours have changed encouraging the growth in ATO worldwide (particularly well developed and competitive markets) As an example - Growth of ATO in the UK –330% in 2009, In 2010 a further 70% growth Upgrades or Additional Lines? –In 2008 - 92% additional, 8% upgrades –In 2009 – 55% additional, 45% upgrades –In 2010 – 37% additional, 63% upgrades –Further growth in 2011 & 2012 This growth has been replicated worldwide Source: Cifas 2009 2010
  • 28. Issues and Causes Pressure points in your organisation and market allowing ATO; –Focus on Customer retention & Churn reduction –Simplifying Customer Services (CS) processes –Customer satisfaction –Push for reductions in CS costs and ACHT –Reliance on simplistic Knowledge Based Authentication (KBA) –Internal sales pressure on staff –Desire for growth Fraudsters manipulate these pressure points –KBA, can be weak (ease of use) and simply compromised via social engineering –CS staff also liable to social engineering, based on sales & time pressures and related financial incentive –Less restrictions and checks in place on existing customer processes (compared to new applications) –Greater profit value for fraudsters (top offers for existing customers)
  • 29. Typical flow & Pressure points AGENT LOGISTICS CRM WWW IVR Social engineering Data Misuse Process Abuse Logistics Manipulation
  • 30. Account Takeover 30 http://diario.elmercurio.com/detalle/index.asp?id=%7B3c91699d-fa58-4d2a-a3d0-496a46fc9a55%7D
  • 31. Account Takeover 31 http://diario.elmercurio.com/detalle/index.asp?id=%7B3c91699d-fa58-4d2a-a3d0-496a46fc9a55%7D
  • 32. SIM Swap Fraud http://www.finextra.com/blogs/ fullblog.aspx?blogid=7766 32
  • 33. Fighting Fraud with Cyber Intelligence 33
  • 34. SIM Card Trade Anonymous SIM card trade on an underground market −It isn't clear whether these cards are stolen from customers or the company itself −These SIM cards are available in big quantities
  • 35. Fraudsters Guides Hand Picked Set of Guides for Beginner Fraudsters – Premium. Including fraud method of how to get your own SIM cards from anywhere. How to steal people's information
  • 37. Stolen Identities are cheap on the darknet 37 Source: http://www.itspecialist. com/Home/FeatureArticles/TabId/208/ArticleId/99/language/en- US/#.VBftKdK_nmI
  • 38. Customer’s & Employees Information XXX workers' emails leaked by YYYY pre-leak Online publication of XXX clients and workers' information –Client's details (name, cell number, ssn on file, address) XXX.net users and passwords (published in an underground forum):
  • 39. Public Web •“How to” blogs and forums •Customer’s complaint sites •Paste Sites Dark-Net •Underground Markets – sales of fraud services, SIMs, Identities and Internal information •Underground Forums – Tutorials and methods to perform different types of fraudulent activities Sources of Information
  • 40. Dark-Net Search –The Dark-Net search, looks all over the Internet for information, located mostly in hackers and fraudsters’ forums and boards –This information is hard to reach, sometimes hidden in closed forums or chat rooms behind passwords and vetting processes –The Dark-Net search can be tailor-made to CSPs specific needs and gives a clear picture about the company’s reflection in the illegal zones of the web