SlideShare a Scribd company logo
www.subex.com
INROAMER FRAUDS-Primary
Investigation
Akhil Singh Rawat
Sr. Analyst
www.subex.com
PRINCIPAL MOTIVE:-
As per Fraud Scenario, In roamers started
making voice calls from VPMN of Ooredoo
towards IRSF Destinations to Create Huge
Traffic Volumes and Change Calling the
Destinations whenever Blocking is applied
Specified B-Party Number/Series. This Led to
the New IRSF Fraud Amplification Method to
Cellular World via Fraudsters as term as In
roamer Fraud.
Ooredoo HPMN
IRSF DESTINATION X
IRSF DESTINATION X
IRSF DESTINATION Z
www.subex.com
INROAMER ACTIVITIES:-
•Above MSISDNs Started making voice calls in June-14 from VPMN of Ooredoo.
•Calls were made towards IRSF Destinations to Create Huge Traffic Volumes.
ACTIONS TAKEN:-
•Blocking of the called ‘B’ numbers/series in our IGW was regularized.
•Shared the number details and asked DCH to confirm whether they have
generated the NRT files and sent on time.
www.subex.com
INVESTIGATION TILL NOW:-
•Alternatively it was observed IRSF fraud traffic
by In roamers from Saudi, Dubai and have
noticeable 27 Distinct Cell Sites from where the
traffic is being originated.
•In all In roamer cases, it was found that
generation of IRSF traffic from the VPMN
network, But the In roamers start generating
traffic to new ‘B’ numbers/series whenever
blocking is implicated on the Current IRSF
Destinations.
CELL SITE ANALYSIS
www.subex.com
PRIMARY OBJECTIVE:-
•Identification of Involvement of QATARI/NON-QATARI Element towards the
INROAMER FRAUD.
•Applying the Link Establishment of INROAMER FRAUDS with the Ooredoo
Subscriber Database to Track an INTERNAL INVOLVMENT.
•Using Complex Rules and Algorithms for HIGHLY DETAILED ANALYSIS to TRACK
the SOURCE SUSPECT.
•Use of Fingerprint MANAGEMENT with configuring Fingerprint Elements
COMPROMISING of MATCH and SUMMARY ELEMENT.
Private & Confidentialwww.subex.com
INROAMERS OOREDOO VPMN
CELL SITE 1
CELL SITE 2
CELL SITE 3
MSISDN SERIES
966XXX
971XXX
IRSF X
IRSF Y
IRSF Z
DISTINCT IMEIs
2AMTO4AM
FINGERPRINTING ELEMENTS
Private & Confidentialwww.subex.com
RECOMMENEDED FUTURE PROSPECTIVE:-
Using the Available Elements and Detailed Analysis is required for capturing the Matched Element of
Fraudster.
Available Elements for FINGERPRINT PROFILE GENERATION:-
•Visited Cell Sites of Earlier Inroamer Frauds.
•Country Codes called(Ex:-966%,971%) or IRSF Destinations.
•Frequently Called Numbers/Destinations from Visited Cell Sites.
•Caller Numbers/Series of Inroamer Fraud Placed.
•VPMN Visited.
DUMMY SCENARIO:-
These elements can Track the Unique MSISDNs either from HPMN latched to Ooredoo VPMN or Ooredoo
Subscriber using these Particular Configured Entities.
Gradually Increase the Chances of getting Closer to the PRIME SUSPECTS with moving the SUSPICIOUS
PROFILES to MATCH LIST.
Private & Confidentialwww.subex.com

More Related Content

What's hot

Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKEN
Alan Percy
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKEN
Alan Percy
 
Pabx fraud
Pabx fraudPabx fraud
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQ
Alan Percy
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
VIKASH MEWAL
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
Jagjit Khalsa
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
Sai Srinivas Mittapalli
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
Rhithu
 
Datasheet_Fraud_Detection_System
Datasheet_Fraud_Detection_SystemDatasheet_Fraud_Detection_System
Datasheet_Fraud_Detection_System
Richard Hill
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
maham4569
 
Effective STIR/SHAKEN and Robocall Solutions that Work Today
Effective STIR/SHAKEN and Robocall Solutions that Work TodayEffective STIR/SHAKEN and Robocall Solutions that Work Today
Effective STIR/SHAKEN and Robocall Solutions that Work Today
DonaldStDenis1
 
Cloning
CloningCloning
Intro to SHAKEN/STIR
Intro to SHAKEN/STIRIntro to SHAKEN/STIR
Intro to SHAKEN/STIR
Kelley Robinson
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
Jashir Chakkayil
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
Hema Sharma
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
Virendra Baviskar
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
Ankur Kumar
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
Pushkar Dutt
 
company profile
company profilecompany profile
company profile
Amax Electronics PTY LTD
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
SreedevV
 

What's hot (20)

Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKEN
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKEN
 
Pabx fraud
Pabx fraudPabx fraud
Pabx fraud
 
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQ
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
Datasheet_Fraud_Detection_System
Datasheet_Fraud_Detection_SystemDatasheet_Fraud_Detection_System
Datasheet_Fraud_Detection_System
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Effective STIR/SHAKEN and Robocall Solutions that Work Today
Effective STIR/SHAKEN and Robocall Solutions that Work TodayEffective STIR/SHAKEN and Robocall Solutions that Work Today
Effective STIR/SHAKEN and Robocall Solutions that Work Today
 
Cloning
CloningCloning
Cloning
 
Intro to SHAKEN/STIR
Intro to SHAKEN/STIRIntro to SHAKEN/STIR
Intro to SHAKEN/STIR
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
company profile
company profilecompany profile
company profile
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 

Similar to Inroamer frauds

Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
Lancope, Inc.
 
Guideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu KhimaniGuideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu Khimani
Dr Raghu Khimani
 
Footprinting _ By Mujmmil Shaikh
Footprinting _ By Mujmmil ShaikhFootprinting _ By Mujmmil Shaikh
Footprinting _ By Mujmmil Shaikh
Mujmmil Shaikh
 
Apidays Singapore 2024 - API : New Economy for Telcos by Rajesh Mhatre, StarHub
Apidays Singapore 2024 - API : New Economy for Telcos by Rajesh Mhatre, StarHubApidays Singapore 2024 - API : New Economy for Telcos by Rajesh Mhatre, StarHub
Apidays Singapore 2024 - API : New Economy for Telcos by Rajesh Mhatre, StarHub
apidays
 
Visualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber SecurityVisualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber Security
Cambridge Intelligence
 
Zero Trust Networks
Zero Trust NetworksZero Trust Networks
Zero Trust Networks
Practical Code, LLC
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber Crime
Lancope, Inc.
 
1330 keynote zoldi
1330 keynote zoldi1330 keynote zoldi
1330 keynote zoldi
Rising Media, Inc.
 
1330 keynote shahapurkar
1330 keynote shahapurkar1330 keynote shahapurkar
1330 keynote shahapurkar
Rising Media, Inc.
 
1330 keynote Shahapurkar
1330 keynote Shahapurkar1330 keynote Shahapurkar
1330 keynote Shahapurkar
Rising Media, Inc.
 
If I want a perfect cyberweapon, I'll target ERP
If I want a perfect cyberweapon, I'll target ERPIf I want a perfect cyberweapon, I'll target ERP
If I want a perfect cyberweapon, I'll target ERP
ERPScan
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed AdamAndroid Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed Adam
Mohammed Adam
 
Cyber Security for Everyone Course - Final Project Presentation
Cyber Security for Everyone Course - Final Project PresentationCyber Security for Everyone Course - Final Project Presentation
Cyber Security for Everyone Course - Final Project Presentation
CMR WORLD TECH
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
CMR WORLD TECH
 
Angler talk
Angler talkAngler talk
Angler talk
Artsiom Holub
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
Abhishek Abhi
 
Leantegra Real-Time Location System
Leantegra Real-Time Location SystemLeantegra Real-Time Location System
Leantegra Real-Time Location System
Julia Danby
 
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Carl Blume
 
Managed Vulnerability Scan
Managed Vulnerability ScanManaged Vulnerability Scan
Managed Vulnerability Scan
Shawn Jordan
 

Similar to Inroamer frauds (20)

Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
Guideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu KhimaniGuideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu Khimani
 
Footprinting _ By Mujmmil Shaikh
Footprinting _ By Mujmmil ShaikhFootprinting _ By Mujmmil Shaikh
Footprinting _ By Mujmmil Shaikh
 
Apidays Singapore 2024 - API : New Economy for Telcos by Rajesh Mhatre, StarHub
Apidays Singapore 2024 - API : New Economy for Telcos by Rajesh Mhatre, StarHubApidays Singapore 2024 - API : New Economy for Telcos by Rajesh Mhatre, StarHub
Apidays Singapore 2024 - API : New Economy for Telcos by Rajesh Mhatre, StarHub
 
Visualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber SecurityVisualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber Security
 
Zero Trust Networks
Zero Trust NetworksZero Trust Networks
Zero Trust Networks
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber Crime
 
1330 keynote zoldi
1330 keynote zoldi1330 keynote zoldi
1330 keynote zoldi
 
1330 keynote shahapurkar
1330 keynote shahapurkar1330 keynote shahapurkar
1330 keynote shahapurkar
 
1330 keynote Shahapurkar
1330 keynote Shahapurkar1330 keynote Shahapurkar
1330 keynote Shahapurkar
 
If I want a perfect cyberweapon, I'll target ERP
If I want a perfect cyberweapon, I'll target ERPIf I want a perfect cyberweapon, I'll target ERP
If I want a perfect cyberweapon, I'll target ERP
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 
Android Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed AdamAndroid Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed Adam
 
Cyber Security for Everyone Course - Final Project Presentation
Cyber Security for Everyone Course - Final Project PresentationCyber Security for Everyone Course - Final Project Presentation
Cyber Security for Everyone Course - Final Project Presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Angler talk
Angler talkAngler talk
Angler talk
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
Leantegra Real-Time Location System
Leantegra Real-Time Location SystemLeantegra Real-Time Location System
Leantegra Real-Time Location System
 
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
 
Managed Vulnerability Scan
Managed Vulnerability ScanManaged Vulnerability Scan
Managed Vulnerability Scan
 

Recently uploaded

Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
manishkhaire30
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
Timothy Spann
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
Timothy Spann
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
Sm321
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
ihavuls
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
javier ramirez
 
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdfUdemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
Fernanda Palhano
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
Sachin Paul
 
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docxDATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
SaffaIbrahim1
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
nyfuhyz
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
v7oacc3l
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
vikram sood
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
nuttdpt
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
sameer shah
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
Bill641377
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
ElizabethGarrettChri
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
roli9797
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
apvysm8
 

Recently uploaded (20)

Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
 
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdfUdemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
Udemy_2024_Global_Learning_Skills_Trends_Report (1).pdf
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
 
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docxDATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
 

Inroamer frauds

  • 2. www.subex.com PRINCIPAL MOTIVE:- As per Fraud Scenario, In roamers started making voice calls from VPMN of Ooredoo towards IRSF Destinations to Create Huge Traffic Volumes and Change Calling the Destinations whenever Blocking is applied Specified B-Party Number/Series. This Led to the New IRSF Fraud Amplification Method to Cellular World via Fraudsters as term as In roamer Fraud. Ooredoo HPMN IRSF DESTINATION X IRSF DESTINATION X IRSF DESTINATION Z
  • 3. www.subex.com INROAMER ACTIVITIES:- •Above MSISDNs Started making voice calls in June-14 from VPMN of Ooredoo. •Calls were made towards IRSF Destinations to Create Huge Traffic Volumes. ACTIONS TAKEN:- •Blocking of the called ‘B’ numbers/series in our IGW was regularized. •Shared the number details and asked DCH to confirm whether they have generated the NRT files and sent on time.
  • 4. www.subex.com INVESTIGATION TILL NOW:- •Alternatively it was observed IRSF fraud traffic by In roamers from Saudi, Dubai and have noticeable 27 Distinct Cell Sites from where the traffic is being originated. •In all In roamer cases, it was found that generation of IRSF traffic from the VPMN network, But the In roamers start generating traffic to new ‘B’ numbers/series whenever blocking is implicated on the Current IRSF Destinations. CELL SITE ANALYSIS
  • 5. www.subex.com PRIMARY OBJECTIVE:- •Identification of Involvement of QATARI/NON-QATARI Element towards the INROAMER FRAUD. •Applying the Link Establishment of INROAMER FRAUDS with the Ooredoo Subscriber Database to Track an INTERNAL INVOLVMENT. •Using Complex Rules and Algorithms for HIGHLY DETAILED ANALYSIS to TRACK the SOURCE SUSPECT. •Use of Fingerprint MANAGEMENT with configuring Fingerprint Elements COMPROMISING of MATCH and SUMMARY ELEMENT.
  • 6. Private & Confidentialwww.subex.com INROAMERS OOREDOO VPMN CELL SITE 1 CELL SITE 2 CELL SITE 3 MSISDN SERIES 966XXX 971XXX IRSF X IRSF Y IRSF Z DISTINCT IMEIs 2AMTO4AM FINGERPRINTING ELEMENTS
  • 7. Private & Confidentialwww.subex.com RECOMMENEDED FUTURE PROSPECTIVE:- Using the Available Elements and Detailed Analysis is required for capturing the Matched Element of Fraudster. Available Elements for FINGERPRINT PROFILE GENERATION:- •Visited Cell Sites of Earlier Inroamer Frauds. •Country Codes called(Ex:-966%,971%) or IRSF Destinations. •Frequently Called Numbers/Destinations from Visited Cell Sites. •Caller Numbers/Series of Inroamer Fraud Placed. •VPMN Visited. DUMMY SCENARIO:- These elements can Track the Unique MSISDNs either from HPMN latched to Ooredoo VPMN or Ooredoo Subscriber using these Particular Configured Entities. Gradually Increase the Chances of getting Closer to the PRIME SUSPECTS with moving the SUSPICIOUS PROFILES to MATCH LIST.