This document discusses revenue frauds against telecom operators. It defines fraud and outlines different forms of revenue fraud including subscription fraud, tee-in fraud, internal fraud using "magic phones", GSM interconnect bypass, and international gateway bypass. These frauds can result in significant losses of hundreds of millions of dollars annually for telecom operators around the world. The document recommends methods for telecom operators and regulators to prevent and manage such fraud.
Detecting fraud in cellular telephone networksJamal Meselmani
A Thesis Presented in Partial Fulfillment of the Requirement for the Degree in "MBA" by Hiyam Ali El Tawashi
Telecommunication fraud is a problem that has grown dramatically over the past ten years.
Fraud become a serious global issue for mobile network service providers, it has
undoubtedly become a significant source of revenue losses and bad debts to
telecommunication industry, and with the expected continuing growth in revenue it can be
expected that fraud will increase proportionally.
The research project therefore, focused on how Jawwal Company managing and detecting
the fraud, in order to modify the current tools for more effective fraud prevention and
detection, for this reason the researcher undertook a set of actions that are reported as
follow:
First step it was necessary to understand the problem of telecom fraud, then to know what
makes people perpetrate the fraud, and which are the most prevalent fraud types that are
occurring, clarifying which is the likely products and services to be attacked, what source
of information to facilitate the fraud, how fraudsters perpetrate the fraud finally explaining
the fraud detection and prevention procedures.
Then apply the study on Jawwal Company as study case, by distributing 200
questionnaires to targeted sections, and analyzing the result which shows that the current
fraud management at Jawwal Company is not efficient and needs to be modified.
The document discusses telecom fraud, including definitions, types, and detection techniques. It notes that telecom fraud results in significant global losses estimated at $40 billion annually by the Communications Fraud Control Association in 2011. The document outlines different categories of fraud, including technical (external and internal) frauds and non-technical frauds. It also summarizes two literature articles on data mining approaches to fraud detection and an overview of different types of telecom frauds such as subscription, clip on, and call forwarding frauds. Detection techniques discussed include data modeling of user behavior, social media monitoring, and strengthening customer identification controls.
Comprehensive training on bypass sim box fraudMassango Junior
This 3-day training course provides an in-depth examination of mobile and fixed communications bypass fraud, including definitions, characteristics, detection tools, and case studies. The course objectives are to understand fraud and interconnect principles, define bypass fraud and SIM box scenarios, learn detection and elimination tools, and comprehend deficiencies of traditional tools. The course is intended for revenue assurance, fraud managers, analysts, consultants, and technicians.
How to Prevent Telecom Fraud in Real-TimeAlan Percy
Telecommunications fraud continues to plaque the industry with ever increasingly sophisticated methods and tools. From simple theft of services to international premium toll rate calling scams, stories of service providers and enterprises being stuck with thousands of dollars of fraudulent calls is a common occurrence that can be financially devastating. The Communications Fraud Control Association reports that in 2015, service providers suffered over 22 billion dollars in fraud.
During this “How To” session we will be joined by the experts from Jerasoft, showing various methods that utilize real-time billing systems and Session Border Controller software to stop fraud in its tracks!
2014 march falcon business fraud classification model (3attendees)jcsobreira
The document describes a new Fraud Classification Model (FCM) proposed by ZonOptimus for the telecommunications industry. The FCM differentiates between fraud enablers, which are the vulnerabilities exploited to access networks or services, and fraud types, which are the actual fraudulent activities. It was presented to several industry groups including TMForum, GSMA, CFCA, and FIINA. These groups updated their fraud reporting templates based on the FCM's core concepts of separately classifying enablers and types. The document also provides details on how fraud cases would be registered and classified using the FCM framework.
Telecommunication Fraud Detection and PreventionSumera Khan
Telecommunication fraud is the use of telecommunication products or services with the intent of illegitimately acquiring money from, or deteriorating to pay, a telecommunication company or its clients. E.g. PBX/IP-PBX Fraud: The hacking of a PBX to initiate long distance and high case destination calling by fraudsters.
SIM Box and its linked to external frauds affecting leading operators in Cambodia in the form of falling revenues, lower QoS for for International Incoming Calls and inbound roaming services. Arguably, such activity is becoming rampant due to lack of legal framework, poor enforcement and coordination among Government Ministries and Government agencies.
International Revenue Share Fraud has increased 497% since 2013.
It is now the number 1 fraud threat to Telcos worldwide.
Let us help you fix the problem!
Detecting fraud in cellular telephone networksJamal Meselmani
A Thesis Presented in Partial Fulfillment of the Requirement for the Degree in "MBA" by Hiyam Ali El Tawashi
Telecommunication fraud is a problem that has grown dramatically over the past ten years.
Fraud become a serious global issue for mobile network service providers, it has
undoubtedly become a significant source of revenue losses and bad debts to
telecommunication industry, and with the expected continuing growth in revenue it can be
expected that fraud will increase proportionally.
The research project therefore, focused on how Jawwal Company managing and detecting
the fraud, in order to modify the current tools for more effective fraud prevention and
detection, for this reason the researcher undertook a set of actions that are reported as
follow:
First step it was necessary to understand the problem of telecom fraud, then to know what
makes people perpetrate the fraud, and which are the most prevalent fraud types that are
occurring, clarifying which is the likely products and services to be attacked, what source
of information to facilitate the fraud, how fraudsters perpetrate the fraud finally explaining
the fraud detection and prevention procedures.
Then apply the study on Jawwal Company as study case, by distributing 200
questionnaires to targeted sections, and analyzing the result which shows that the current
fraud management at Jawwal Company is not efficient and needs to be modified.
The document discusses telecom fraud, including definitions, types, and detection techniques. It notes that telecom fraud results in significant global losses estimated at $40 billion annually by the Communications Fraud Control Association in 2011. The document outlines different categories of fraud, including technical (external and internal) frauds and non-technical frauds. It also summarizes two literature articles on data mining approaches to fraud detection and an overview of different types of telecom frauds such as subscription, clip on, and call forwarding frauds. Detection techniques discussed include data modeling of user behavior, social media monitoring, and strengthening customer identification controls.
Comprehensive training on bypass sim box fraudMassango Junior
This 3-day training course provides an in-depth examination of mobile and fixed communications bypass fraud, including definitions, characteristics, detection tools, and case studies. The course objectives are to understand fraud and interconnect principles, define bypass fraud and SIM box scenarios, learn detection and elimination tools, and comprehend deficiencies of traditional tools. The course is intended for revenue assurance, fraud managers, analysts, consultants, and technicians.
How to Prevent Telecom Fraud in Real-TimeAlan Percy
Telecommunications fraud continues to plaque the industry with ever increasingly sophisticated methods and tools. From simple theft of services to international premium toll rate calling scams, stories of service providers and enterprises being stuck with thousands of dollars of fraudulent calls is a common occurrence that can be financially devastating. The Communications Fraud Control Association reports that in 2015, service providers suffered over 22 billion dollars in fraud.
During this “How To” session we will be joined by the experts from Jerasoft, showing various methods that utilize real-time billing systems and Session Border Controller software to stop fraud in its tracks!
2014 march falcon business fraud classification model (3attendees)jcsobreira
The document describes a new Fraud Classification Model (FCM) proposed by ZonOptimus for the telecommunications industry. The FCM differentiates between fraud enablers, which are the vulnerabilities exploited to access networks or services, and fraud types, which are the actual fraudulent activities. It was presented to several industry groups including TMForum, GSMA, CFCA, and FIINA. These groups updated their fraud reporting templates based on the FCM's core concepts of separately classifying enablers and types. The document also provides details on how fraud cases would be registered and classified using the FCM framework.
Telecommunication Fraud Detection and PreventionSumera Khan
Telecommunication fraud is the use of telecommunication products or services with the intent of illegitimately acquiring money from, or deteriorating to pay, a telecommunication company or its clients. E.g. PBX/IP-PBX Fraud: The hacking of a PBX to initiate long distance and high case destination calling by fraudsters.
SIM Box and its linked to external frauds affecting leading operators in Cambodia in the form of falling revenues, lower QoS for for International Incoming Calls and inbound roaming services. Arguably, such activity is becoming rampant due to lack of legal framework, poor enforcement and coordination among Government Ministries and Government agencies.
International Revenue Share Fraud has increased 497% since 2013.
It is now the number 1 fraud threat to Telcos worldwide.
Let us help you fix the problem!
The document discusses several ethics issues in the Indian telecom industry:
1. A major scam in the 1990s involved Reliance introducing an affordable mobile scheme that resulted in many fake subscribers and lost revenue.
2. Patent disputes between Apple, Samsung, Nokia, and others led to numerous lawsuits over attempts to copy technologies.
3. Loopholes in government policies have disadvantaged consumers regarding call drops and former regulators joining telecom companies.
4. Unethical practices like phishing, fraud calls, and major scams like the 2G spectrum scam have undermined trust and cost the country significantly.
5. The environmental impacts of mobile phone use and manufacturing, such as greenhouse gas emissions
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...cVidya Networks
Tal Eisner, Senior Director Product Strategy at cVidya and Deputy Chair of the TM Forum Fraud Management Group, presented at TM Forum's Management World 2012 in Dublin on the Fraud Management Group Activities
Wholesale Fraud - Jason Lane-Sellers of cVidyacVidya Networks
Wholesale carriers face different fraud risks than traditional carriers. They see transit traffic but lack customer details. A main risk is false answer supervision fraud, where calls appear connected to generate charges though the call was not actually connected. Wholesale carriers could benefit from fraud but also face risks from established carriers. However, wholesale carriers are well positioned to provide fraud management as a service to other carriers due to their global traffic view and routing insights across multiple operators. This could help detect fraud scenarios and provide value-added intelligence to wholesale customers.
Cataleya-Security-Feature_SAWC_April2016page-20-23Jacqueline Fick
This document discusses network security issues for mobile network operators (MNOs) in Africa. It notes that as smartphone adoption increases across Africa, network security remains a high priority for MNOs due to threats like cybercrime and fraud. Common security issues include SIMbox fraud, which involves using boxes of SIM cards to make illegal international calls. The rapid growth of mobile services in Africa has outpaced the development of robust security systems, making networks and customers vulnerable. MNOs are fighting back against fraud through measures like seizing SIMboxes and tightening SIM security, but will need more integrated security approaches to address evolving threats from domestic and international criminals.
This document summarizes a webinar on fraud management and compliance. The webinar covered several topics:
- A CFCA survey that found global fraud losses increased 15% in 2013, with revenue share fraud as the largest threat.
- The TM Forum's fraud classification model and survey, which found revenue share fraud is driving other fraud types.
- Account takeover fraud, where fraudsters manipulate customer service processes to gain access to accounts. Pressure points like authentication and sales incentives enable this fraud.
- Fighting fraud through cyber intelligence techniques like monitoring dark web sites and forums where fraudsters share tactics and stolen customer information.
This document provides information about an upcoming workshop on telecom fraud in current and future telecom networks. The workshop will be held over two days in Dubai and will address how to detect and minimize telecom fraud, identify fraud in mobile and IP networks, and familiarize attendees with risks and future fraud risks. Attendees will learn techniques to locate fraudsters, select fraud management systems, and train staff to assist with fraud fighting. The workshop agenda covers topics such as detecting fraud, reconciling network data, using advanced techniques like link analysis to find fraudsters, and reacting to internal and external fraud.
The Rise of Card Not Present Crime in Contact CentersEckoh
Card Not Present Fraud has seen a dramatic rise in the past few years. In the U.S., it is predicted to see losses exceed $7 Billion by 2020. In this slideshare we explore merchant weaknesses which allow this crime to take place, and potential ways of preventing this type of crime.
Mobilereg Nigeria Ltd operates Fonreg, an online platform that aims to reduce mobile phone theft and crimes by allowing users to register their phones and check IMEI numbers. Fonreg's services include allowing individual users, police, and mobile operators to register phones, check if a phone is lost or stolen, and access a database of registered phones. Fonreg also integrates with other services to check IMEI numbers and notifies owners if a phone is reported as stolen. The goal is to monetize these services through commissions, advertising, premium SMS checking, and revenue sharing with mobile operators.
The paper explains the various strategies used by cyberrcriminals and the mesures to be adopted by the law enforcement officers or security service to combat cyber criminality. It also presents future targets and some reasons for collaboration between the security service and security students.
Cell phone cloning involves copying the identity of one mobile phone to another without authorization. This allows fraudulent calls to be made and billed to the legitimate subscriber. Cell phone cloning works by intercepting a phone's Electronic Serial Number and Mobile Identification Number and reprogramming another phone with the stolen identifiers. While cloning has been used in criminal activities like drug trafficking, providers are working to prevent it through methods such encryption, blocking cloned phones from networks, and requiring personal identification numbers.
Battling Robocallers - How to Implement STIR-SHAKENAlan Percy
In 2018, both the FCC and the CRTC called on carriers that serve their jurisdictions to implement the STIR-SHAKEN framework without delay. Since then, many carriers have announced plans to implement STIR-SHAKEN within their networks by the end of 2019 or sooner.
TelcoBridges and TransNexus have teamed up to present an informational webinar, "Battling Robocallers – How to Implement STIR-SHAKEN", to address this important industry-wide issue and describe effective, production-ready solutions that you can quickly deploy today.
Agenda:
• What is the FCC and CRTC requiring from carriers?
• How does STIR/SHAKEN help prevent illegal and fraudulent calls?
• What is the easiest way to implement STIR/SHAKEN in a VoIP network?
• How will TDM and rural carriers implement STIR-SHAKEN?
• What are the business, technical, and policy issues that you may encounter in developing and deploying your SHAKEN solution, and how can you resolve them?
Effective STIR/SHAKEN and Robocall Solutions that Work TodayDonaldStDenis1
Unwanted scam robocalls with spoofed caller IDs are a menace to consumers and businesses. These calls threaten the viability of the telephone network.
The telecommunications industry has developed a technology framework, STIR/SHAKEN, to combat caller ID spoofing. When you can identify spoofed caller IDs, robocall prevention measures become much more effective.
This presentation explains how STIR/SHAKEN prevents caller ID spoofing. Then it describes a variety of spam robocall prevention methods that are effective today. Finally, it shows how these methods will become even stronger with widespread deployment of STIR/SHAKEN.
No topic has generated as much interest, consumer complaints, and coordinated technical hurdles in telecommunications at the problem with illegal robocalling and the associated fraud.
We were astounded by the response to our “How To” webinar held in February, by far the most registrations, attendees and questions. With over 137 questions in the queue at the end of the session, we thought it best to organize a follow-up, taking time to analyze the list of questions and come up with a TOP 10 FAQ. Thanks for joining us as we work through the STIR/SHAKE Frequently Asked questions
Alternative Finance & Payments stream - Stuart Sykes slidesCallcredit123
The document discusses how an online company uses information from its front line IP provider to better understand potential clients and detect fraud. It provides statistics on the types of rules the company uses, the evidence those rules find, and how fraud is broken down. Crime gangs are said to prefer using stolen identities and cloned cards from the dark web while applying for loans with dynamic IPs or public networks on Windows PCs.
The document discusses regulations around mobile devices in Indonesia. It covers the industry landscape including major operators and market shares. It also discusses Indonesia's general mobile device market conditions, including a decline in 2008 due to overstocking and economic issues. The converged devices segment is seen as a promising area for growth. The document also summarizes stakeholders in the mobile device industry and issues around interoperability and licensing. Regulatory issues discussed include privacy, security, and internalization of mobile device production. The future is predicted to include more integration of broadcasting and telecom.
This document discusses fraud management systems in telecommunications and describes a specific fraud management system called Centaur. It begins by introducing common types of telecom fraud like call selling, premium rate service fraud, surfing, and ghosting. It then provides an overview of generic fraud management system architectures and components like data collection, processing, detection, investigation, and reporting. The document focuses on describing Centaur, a new flexible fraud management system, including its context-based detection approach using lists, multipliers, and time windows. Detection methods in Centaur include rule-based processes, neural networks, and identifying new instances of known fraudster profiles. An example of using Centaur to detect a call selling operation is also provided.
This talk will discuss the latest advancements with STIR (Secure Telephone Identity Revisited) and SHAKEN (Signature-based Handling of Asserted information using toKENs), new tech standards that use well accepted public key cryptography methods to validate caller identification. We’ll discuss the path and challenges to getting this implemented industry wide, where this tech will fall short, and what we can do to limit exposure to call spam and fraud in the meantime.
Identity, Authentication, and Programmable Telecoms SessionAlan Quayle
Pierre Demarche, VP Product and Marketing, TeleSign
Session is divided into 3 parts, based on use cases:
Registration fraud. Identifying fake users, preventing bulk account creation, etc.
ATO (Account TakeOver). Preventing ATO fraud through phone hijacking attacks like SIM Swap, Porting attacks, call forwarding, etc.
IRSF (International Revenue Sharing Fraud) attacks on enterprises. Registration to SIP trunking.
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...Ryan Thurman
Christine Reilly and David Kaminski presented a seminar on effective mobile marketing compliance strategies under the Telephone Consumer Protection Act (TCPA). They discussed how the TCPA regulates automated calls and texts to mobile phones, including requiring prior express written consent for telemarketing. They also explained recent changes that tightened the rules, such as needing written consent as of October 2013, and common issues companies face with TCPA compliance.
The telecom industry in India ranks 3rd globally and has the 2nd largest network in Asia. It has experienced rapid growth, with wireless subscribers increasing from 150 million in 2007 to over 850 million in 2012. However, the industry now faces challenges of market saturation, declining revenues due to intense price competition, and low ARPU. The future of the industry depends on expanding rural connectivity, leveraging new technologies like 3G, increasing value-added services, and more infrastructure sharing between providers. Strict regulation by TRAI has both helped and posed difficulties for telecom companies in India.
No topic has generated as much interest, consumer complaints, and coordinated technical hurdles in telecommunications at the problem with illegal robocalling and the associated fraud.
We were astounded by the response to our “How To” webinar held in February, by far the most registrations, attendees and
The document discusses several ethics issues in the Indian telecom industry:
1. A major scam in the 1990s involved Reliance introducing an affordable mobile scheme that resulted in many fake subscribers and lost revenue.
2. Patent disputes between Apple, Samsung, Nokia, and others led to numerous lawsuits over attempts to copy technologies.
3. Loopholes in government policies have disadvantaged consumers regarding call drops and former regulators joining telecom companies.
4. Unethical practices like phishing, fraud calls, and major scams like the 2G spectrum scam have undermined trust and cost the country significantly.
5. The environmental impacts of mobile phone use and manufacturing, such as greenhouse gas emissions
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...cVidya Networks
Tal Eisner, Senior Director Product Strategy at cVidya and Deputy Chair of the TM Forum Fraud Management Group, presented at TM Forum's Management World 2012 in Dublin on the Fraud Management Group Activities
Wholesale Fraud - Jason Lane-Sellers of cVidyacVidya Networks
Wholesale carriers face different fraud risks than traditional carriers. They see transit traffic but lack customer details. A main risk is false answer supervision fraud, where calls appear connected to generate charges though the call was not actually connected. Wholesale carriers could benefit from fraud but also face risks from established carriers. However, wholesale carriers are well positioned to provide fraud management as a service to other carriers due to their global traffic view and routing insights across multiple operators. This could help detect fraud scenarios and provide value-added intelligence to wholesale customers.
Cataleya-Security-Feature_SAWC_April2016page-20-23Jacqueline Fick
This document discusses network security issues for mobile network operators (MNOs) in Africa. It notes that as smartphone adoption increases across Africa, network security remains a high priority for MNOs due to threats like cybercrime and fraud. Common security issues include SIMbox fraud, which involves using boxes of SIM cards to make illegal international calls. The rapid growth of mobile services in Africa has outpaced the development of robust security systems, making networks and customers vulnerable. MNOs are fighting back against fraud through measures like seizing SIMboxes and tightening SIM security, but will need more integrated security approaches to address evolving threats from domestic and international criminals.
This document summarizes a webinar on fraud management and compliance. The webinar covered several topics:
- A CFCA survey that found global fraud losses increased 15% in 2013, with revenue share fraud as the largest threat.
- The TM Forum's fraud classification model and survey, which found revenue share fraud is driving other fraud types.
- Account takeover fraud, where fraudsters manipulate customer service processes to gain access to accounts. Pressure points like authentication and sales incentives enable this fraud.
- Fighting fraud through cyber intelligence techniques like monitoring dark web sites and forums where fraudsters share tactics and stolen customer information.
This document provides information about an upcoming workshop on telecom fraud in current and future telecom networks. The workshop will be held over two days in Dubai and will address how to detect and minimize telecom fraud, identify fraud in mobile and IP networks, and familiarize attendees with risks and future fraud risks. Attendees will learn techniques to locate fraudsters, select fraud management systems, and train staff to assist with fraud fighting. The workshop agenda covers topics such as detecting fraud, reconciling network data, using advanced techniques like link analysis to find fraudsters, and reacting to internal and external fraud.
The Rise of Card Not Present Crime in Contact CentersEckoh
Card Not Present Fraud has seen a dramatic rise in the past few years. In the U.S., it is predicted to see losses exceed $7 Billion by 2020. In this slideshare we explore merchant weaknesses which allow this crime to take place, and potential ways of preventing this type of crime.
Mobilereg Nigeria Ltd operates Fonreg, an online platform that aims to reduce mobile phone theft and crimes by allowing users to register their phones and check IMEI numbers. Fonreg's services include allowing individual users, police, and mobile operators to register phones, check if a phone is lost or stolen, and access a database of registered phones. Fonreg also integrates with other services to check IMEI numbers and notifies owners if a phone is reported as stolen. The goal is to monetize these services through commissions, advertising, premium SMS checking, and revenue sharing with mobile operators.
The paper explains the various strategies used by cyberrcriminals and the mesures to be adopted by the law enforcement officers or security service to combat cyber criminality. It also presents future targets and some reasons for collaboration between the security service and security students.
Cell phone cloning involves copying the identity of one mobile phone to another without authorization. This allows fraudulent calls to be made and billed to the legitimate subscriber. Cell phone cloning works by intercepting a phone's Electronic Serial Number and Mobile Identification Number and reprogramming another phone with the stolen identifiers. While cloning has been used in criminal activities like drug trafficking, providers are working to prevent it through methods such encryption, blocking cloned phones from networks, and requiring personal identification numbers.
Battling Robocallers - How to Implement STIR-SHAKENAlan Percy
In 2018, both the FCC and the CRTC called on carriers that serve their jurisdictions to implement the STIR-SHAKEN framework without delay. Since then, many carriers have announced plans to implement STIR-SHAKEN within their networks by the end of 2019 or sooner.
TelcoBridges and TransNexus have teamed up to present an informational webinar, "Battling Robocallers – How to Implement STIR-SHAKEN", to address this important industry-wide issue and describe effective, production-ready solutions that you can quickly deploy today.
Agenda:
• What is the FCC and CRTC requiring from carriers?
• How does STIR/SHAKEN help prevent illegal and fraudulent calls?
• What is the easiest way to implement STIR/SHAKEN in a VoIP network?
• How will TDM and rural carriers implement STIR-SHAKEN?
• What are the business, technical, and policy issues that you may encounter in developing and deploying your SHAKEN solution, and how can you resolve them?
Effective STIR/SHAKEN and Robocall Solutions that Work TodayDonaldStDenis1
Unwanted scam robocalls with spoofed caller IDs are a menace to consumers and businesses. These calls threaten the viability of the telephone network.
The telecommunications industry has developed a technology framework, STIR/SHAKEN, to combat caller ID spoofing. When you can identify spoofed caller IDs, robocall prevention measures become much more effective.
This presentation explains how STIR/SHAKEN prevents caller ID spoofing. Then it describes a variety of spam robocall prevention methods that are effective today. Finally, it shows how these methods will become even stronger with widespread deployment of STIR/SHAKEN.
No topic has generated as much interest, consumer complaints, and coordinated technical hurdles in telecommunications at the problem with illegal robocalling and the associated fraud.
We were astounded by the response to our “How To” webinar held in February, by far the most registrations, attendees and questions. With over 137 questions in the queue at the end of the session, we thought it best to organize a follow-up, taking time to analyze the list of questions and come up with a TOP 10 FAQ. Thanks for joining us as we work through the STIR/SHAKE Frequently Asked questions
Alternative Finance & Payments stream - Stuart Sykes slidesCallcredit123
The document discusses how an online company uses information from its front line IP provider to better understand potential clients and detect fraud. It provides statistics on the types of rules the company uses, the evidence those rules find, and how fraud is broken down. Crime gangs are said to prefer using stolen identities and cloned cards from the dark web while applying for loans with dynamic IPs or public networks on Windows PCs.
The document discusses regulations around mobile devices in Indonesia. It covers the industry landscape including major operators and market shares. It also discusses Indonesia's general mobile device market conditions, including a decline in 2008 due to overstocking and economic issues. The converged devices segment is seen as a promising area for growth. The document also summarizes stakeholders in the mobile device industry and issues around interoperability and licensing. Regulatory issues discussed include privacy, security, and internalization of mobile device production. The future is predicted to include more integration of broadcasting and telecom.
This document discusses fraud management systems in telecommunications and describes a specific fraud management system called Centaur. It begins by introducing common types of telecom fraud like call selling, premium rate service fraud, surfing, and ghosting. It then provides an overview of generic fraud management system architectures and components like data collection, processing, detection, investigation, and reporting. The document focuses on describing Centaur, a new flexible fraud management system, including its context-based detection approach using lists, multipliers, and time windows. Detection methods in Centaur include rule-based processes, neural networks, and identifying new instances of known fraudster profiles. An example of using Centaur to detect a call selling operation is also provided.
This talk will discuss the latest advancements with STIR (Secure Telephone Identity Revisited) and SHAKEN (Signature-based Handling of Asserted information using toKENs), new tech standards that use well accepted public key cryptography methods to validate caller identification. We’ll discuss the path and challenges to getting this implemented industry wide, where this tech will fall short, and what we can do to limit exposure to call spam and fraud in the meantime.
Identity, Authentication, and Programmable Telecoms SessionAlan Quayle
Pierre Demarche, VP Product and Marketing, TeleSign
Session is divided into 3 parts, based on use cases:
Registration fraud. Identifying fake users, preventing bulk account creation, etc.
ATO (Account TakeOver). Preventing ATO fraud through phone hijacking attacks like SIM Swap, Porting attacks, call forwarding, etc.
IRSF (International Revenue Sharing Fraud) attacks on enterprises. Registration to SIP trunking.
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...Ryan Thurman
Christine Reilly and David Kaminski presented a seminar on effective mobile marketing compliance strategies under the Telephone Consumer Protection Act (TCPA). They discussed how the TCPA regulates automated calls and texts to mobile phones, including requiring prior express written consent for telemarketing. They also explained recent changes that tightened the rules, such as needing written consent as of October 2013, and common issues companies face with TCPA compliance.
The telecom industry in India ranks 3rd globally and has the 2nd largest network in Asia. It has experienced rapid growth, with wireless subscribers increasing from 150 million in 2007 to over 850 million in 2012. However, the industry now faces challenges of market saturation, declining revenues due to intense price competition, and low ARPU. The future of the industry depends on expanding rural connectivity, leveraging new technologies like 3G, increasing value-added services, and more infrastructure sharing between providers. Strict regulation by TRAI has both helped and posed difficulties for telecom companies in India.
No topic has generated as much interest, consumer complaints, and coordinated technical hurdles in telecommunications at the problem with illegal robocalling and the associated fraud.
We were astounded by the response to our “How To” webinar held in February, by far the most registrations, attendees and
The document discusses VOIP issues in Nepal and potential solutions. It notes that while VOIP technology is not prohibited, providing end user telephony services is. It also discusses how VOIP started in Nepal due to high international calling rates by NTC and lack of competition. Potential solutions proposed include speeding telecom liberalization, discouraging technology-specific licensing, separating NTC into different units, and monitoring international telecommunications policies to prevent illegal use of technologies.
Bharti Airtel is an international telecommunications company headquartered in India. It is the second largest mobile network operator in the world with operations across 18 countries in Asia and Africa. The presentation provides an overview of Bharti Airtel's business including its market position, growth opportunities in India and Africa, strategy and financial performance. It highlights Airtel's leadership position in key markets, focus on network investments to drive data and digital growth, and goals of winning new customers and reducing costs.
Protecting your phone verification flow from fraud & abuseKelley Robinson
The document discusses SMS pumping fraud and how to prevent it. SMS pumping involves abusing phone verification systems to trigger a large number of SMS messages to generate revenue from mobile carriers. Attackers enroll phone numbers from different carriers, have one-time passwords sent to each number, and carriers share the resulting SMS revenue with the attackers. The document recommends ways for websites to protect against this fraud, such as adding CAPTCHAs, setting rate limits on messages to numbers, implementing delays between verification attempts, restricting destination countries, and monitoring OTP conversion rates.
This document provides an overview of voice transit operators and anti-fraud systems in telecommunications. It discusses:
1) The processes of call origination and termination between operators and how voice traffic flows through transit operators.
2) The types of operators involved in voice transit, including national operators, mobile operators, VoIP operators, and small/large transit operators.
3) Technologies used for inter-operator connections like copper, optics, Ethernet.
4) Anti-fraud systems used by mobile operators to detect gateway fraud and methods like SIM rotation, migration, and profiling used to avoid detection.
5) The ANTRAX solution which includes hardware like SIM boards and software for running an
MTN negotiating $5.2b fine for security failureArun Shankar
MTN Nigeria was fined $5.2 billion by the Nigerian Communications Commission for failing to deactivate 5.1 million unregistered SIM card subscribers by the deadline in August and September 2015. Trading of MTN shares was suspended on November 2nd after the fine was announced and the share price fell sharply. MTN is negotiating with Nigerian authorities to resolve the matter and is advising shareholders to exercise caution when dealing in MTN securities until the issue is resolved.
The document describes a medium power 30W cellular jammer called the CCJ1590. It can block all cellular networks and standards worldwide using state-of-the-art frequency hopping technology controlled by a microprocessor. The jammer transmits noise signals that cut off cellular communication between mobile phones and towers within its jamming radius, causing mobile phones to display "NO SERVICE".
The document describes a medium power 30W cellular jammer called the CCJ1590. It can block all cellular networks and standards worldwide using state-of-the-art frequency hopping technology controlled by a microprocessor. The jammer transmits noise signals that cut off all cellular communication between mobile phones and towers within its jamming radius, causing mobile phones to display "NO SERVICE".
The telecommunications market in Oman saw significant growth in 2009. Mobile phone subscribers increased by 23% compared to 2008, with a penetration rate of 138%. Pre-paid subscribers make up 91% of the mobile segment. While Omantel and Nawras remain the dominant providers, mobile resellers captured 6.5% of the market within six months of launching services. The total number of mobile subscribers grew almost 197% over the past five years. Mobile ARPUs declined by around 15% in 2009 compared to 2007. Nawras' market share relative to Omantel is decreasing as Nawras' pre-paid subscriber base grows rapidly.
Wire and Wireless India Limited (WWIL) is India's largest cable TV operator. It operates in 35 cities through over 4,000 local cable operators. WWIL plans to aggressively expand its subscriber base through acquiring local cable operators, rolling out digital cable under the conditional access system, and launching its headend in the sky service. WWIL aims to increase its subscriber base from 1.6 million currently to over 9.6 million by 2012 through these strategies while growing its revenues from $35 million to over $760 million in the same period. WWIL is seeking to raise $158 million over the next two years through debt and equity to fund this expansion.
Battling Robocallers - How to Implement STIR-SHAKENTelcoBridges Inc.
In 2018, both the FCC and the CRTC called on carriers that serve their jurisdictions to implement the STIR-SHAKEN framework without delay. Since then, many carriers have announced plans to implement STIR-SHAKEN within their networks by the end of 2019 or sooner.
TelcoBridges and TransNexus have teamed up to present an informational webinar, "Battling Robocallers – How to Implement STIR-SHAKEN", to address this important industry-wide issue and describe effective, production-ready solutions that you can quickly deploy today.
Agenda:
• What is the FCC and CRTC requiring from carriers?
• How does STIR/SHAKEN help prevent illegal and fraudulent calls?
• What is the easiest way to implement STIR/SHAKEN in a VoIP network?
• How will TDM and rural carriers implement STIR-SHAKEN?
• What are the business, technical, and policy issues that you may encounter in developing and deploying your SHAKEN solution, and how can you resolve them?
Wateen provides various internet, voice, and multimedia packages for consumers and businesses in Pakistan. This document outlines Wateen's commercial WiMAX packages, which include speeds from 1-4 Mbps with data allowances or unlimited data. Packages are available with or without voice services, and a student package and night unlimited add-on are also offered. Tax is added to all rates.
Like consumers across the globe, African mobile subscribers have been paying extortionately high charges to make and receive calls when communicating outside of their country of origin, using their domestic mobile service.
This is despite the so called “death of distance” and even when countries were contiguous and the cost of calls could not be very different from the costs of local termination.
This presentation describes the "end of roaming" initiative launched in when 2006 Celtel launched the One Network, a single service across the three East African countries charged at the local rate of origin when travelling in any of the other two countries.
The presentation provides lessons learned, and an overview of the policy and regulatory challenges and opportunities entailed.
This document discusses India's telecommunication system and its economic impact. It provides statistics on telecom subscribers and sector revenues, and the contribution of telecom to GDP and foreign direct investment. It also performs a SWOT analysis of the telecom sector and lists the top telecom companies in India by market capitalization.
J-Telecom provides global roaming SIM services including voice and data roaming. Their SIM allows customers to make low-cost calls while roaming internationally through call-back technology. They also offer PBX, VoIP, SMS services and have extensive global network coverage. J-Telecom aims to offer the highest quality roaming services at competitive prices through their network operations center and daily testing.
1) The document discusses trends in the telecommunications industry including the transition to 4G networks, growth of mobile transactions, and regulatory issues surrounding new technologies and services.
2) Key areas that will require regulatory focus are mobile banking, payments, and the use of technologies like near field communication (NFC) for transactions.
3) Regulators will need to determine the appropriate level of regulation for new services involving mobile operators and financial institutions to encourage innovation while ensuring consumer protection and compliance.
The document describes a 100W cellular jammer device called the CCJ1890. It can block all cellular communication standards within its radius by transmitting a noise signal. The CCJ1890 uses state-of-the-art technology and has a microprocessor for programming. It can block GSM networks and mobile phones will display "NO SERVICE" when in the jamming radius.
This final project is a partial requirement to obtain a training certificate for the online course on Mobile Sector Taxation offered by the GSMA. On this final project, we investigated the issue of taxation in the mobile sector of The Gambia.
This document discusses robocalls and solutions for mitigating them. It introduces TelcoBridges and YouMail - TelcoBridges produces VoIP gateways and SBC software, while YouMail provides robocall detection using a sensor network and call content analysis. The document outlines government actions against robocalls, YouMail's detection capabilities, and how carriers can use ProSBC and YouMail APIs to check call reputations and block high risk calls.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
2. Agenda
g
Background
Fraud-Definitions
Different Forms of Revenue Fraud
Fraud Prevention Methods
Conclusion
Recommendations
2 Pakistan Telecommunication Authority
3. Why?
y
Background
◘ Revenue F d against
R Fraud i t
licensed telecom operators
What is visible is just
the tip of the iceberg……..
3 Pakistan Telecommunication Authority
4. $$
Commercial Magnitude of Telecom Fraud
◘ $50 Billion 2004
Billi
◘ $60 Billion 2006
◘ Estimates
E ti t vary but probably stable around $50 - $60 Billion
b t b bl t bl d Billi
per annum worldwide according to a 2008 report of CFCA
◘ The fraud tends to increase during recession
◘ A value of up to 6% of total company revenue is not unusual
in US
◘ In recently liberalised markets the figures are up to 20%
Source: CFCA: Communications Fraud Control Association (CFCA)
4 Pakistan Telecommunication Authority
5. $$
• Middle East
> President of Telco confirmed over US $400million loss in 2006
• Mid Asia
> Regulator and others publish loses over US $500million in 2006
• North Africa
> PT&T measured loss at US $400million in 2006
• Sub Sahara Africa
SubSahara Africa
> Measured at over US $60million losses in 2005
• Central America
> Government officially recognizes loss over US $100million in 2006
• Europe
> VoIP bypass calls exceeded $3bn in 2005 to Africa
b ll d d$ b 5 f
5 Pakistan Telecommunication Authority
6. $$
• Pakistan
> No formal study carried out
No formal study carried out
> Estimates differ by vast amounts
> In the range of 3 5 billion PKR
In the range of 3 ‐ 5 billion PKR
annually (35 – 60 million USD)
6 Pakistan Telecommunication Authority
7. Why?
y
Effects of revenue losses occurring from fraud
> Reduced revenue to Licensed Telecom Operators by
free/cheaper call offering by illegal telecom operators;
stealing current and future revenues
g
> Loss of taxes and levies to the government exchequers
(which are based on telecom operator’s revenues)
> Financial loss to regulators (regulators are normally funded
on a percentage of annual licence fees from licensed
operators). Same for ICT R&D Fund and USF.
> Telcos may end up paying PRS partners for fraudulent calls
> Security threats posed by absence of lawful interception and
non availability of caller identity information
7 Pakistan Telecommunication Authority
8. What is Fraud?
Fraud
> “Intentional misrepresentation or concealment of information
“I t ti l i t ti l t fi f ti
in order to deceive or mislead.”
Telecom Fraud
> According to CFCA the use of the telecommunications
CFCA,
network with the intention of avoiding payment
• without correct payment
ith t t t
• with no payment at all
• someone else pays
8 Pakistan Telecommunication Authority
10. Characteristics of Telecom Fraud
> Telco fraud seen as victimless
> Crime committed remotely - minimises detection risk
> Often,
Often no equipment is needed
> Easy conversion to cash - eg call selling
> Telecom products are complex and become more so with
further interactions with other products
p
10 Pakistan Telecommunication Authority
11. Types of Revenue Frauds
yp
> There are more than 200 types of frauds and the number is on
the rise
> We briefly discuss only the most common types here
• Subscription Fraud
• Teeing-in or Clipping on
• Internal Fraud-Magic Phones
• GSM Interconnect Bypass
• GSM International Gateway Bypass
y y
11 Pakistan Telecommunication Authority
13. Subscription Frauds (Mobile and Fixed)
p ( )
> Customer has No Intention to Pay
> Customer misrepresenting his/her
identity (e.g. stolen electricity bills)
> Use of forged salary slip to get high
credit li it
dit limits
> Misuse of value-added, international
roaming and PRS services
g
> Initial bills are paid on time “sleeper”,
followed by heavy usage - default to
pay - forced churn
> Appears like bad debt
> Almost always associated with call
selling
13 Pakistan Telecommunication Authority
14. Teeing-
Teeing-In or Clipping On (Fixed Line)
> Connecting an instrument “box” parallel
to the telephone line
> Divert the stolen line to fake subscriber
> Legitimate user loses connection on
and off when the fake subscriber is
using the line.
> May also be used against Public
yp
Payphones
14 Pakistan Telecommunication Authority
15. Internal Frauds (Mobile and Fixed)
( )
> All telecom networks face the risk
of being compromised from within
> Providing value-added services to
customers free of cost, un-
authorised bill adjustments and
discounted tariff to customers
> Temptation of financial gain; or
disgruntled employees may take
their revenge
> “Magic phones/SIMs” employ
Magic phones/SIMs
network vulnerabilities to provide
certain services free of cost or to
charge 3rd party for the services
used by the magic phone user
15 Pakistan Telecommunication Authority
16. GSM Interconnect Bypass (
yp (Mobile and Fixed)
)
> Corporate customers use intelligent PBX to bypass the
interconnection costs for Fixed to Mobile calls
> The intelligent PBX can sense the number being dialled and
doesn’t route it through fixed lines but through SIM box
containing SIMS of the CMO being called.
t i i SIMSs f th b i ll d
> Calling from fixed terminal but CLI of called mobile shows the
incoming call from mobile number (on-net call)
> The mobile number seen on CLI cannot be called back …!!!
!!!
16 Pakistan Telecommunication Authority
17. GSM Interconnect Bypass (
yp (Mobile and Fixed)
)
> Illustration
Both outgoing No incoming call
g
and incoming
20 CMO lines
5 fixed (each CMO
lines selected)
0345-XXXX
calling
17 Pakistan Telecommunication Authority
18. GSM Interconnect Bypass (
yp (Mobile and Fixed)
)
> Cost savings for corporate fraudsters and revenue losses to
telcos are huge
> For a 30 second call to Mobile
• Ordinary fixed line charges = PKR 2.5 (excluding tax)
25
• Using interconnect bypass cost = PKR 0.63 (excluding tax)
• Saving / loss of PKR 1.87
PKR 1.6 Loss to fixed line operator PKR 0.27 Loss to CMO
2.5 – MTR (0.9) = PKR 1.6 tariff – MTR (0.9) = PKR 0.27
> Actual losses are even higher because of corporate discounts
negotiated by such clients
> On-net
On net calls are also free in certain situations
18 Pakistan Telecommunication Authority
19. International Gateway Bypass (
y yp (Mobile and Fixed)
)
> Illegal gateway exchange terminate voice over internet protocol
(VoIP) International calls over public switched telephone
network (PSTN) or over the GSM network
> Bypassing the legal International Gateways
yp g g y
> Fraudster receives international calls from foreign countries
over VoIP (through an ISP)
> Illegal operator collects revenue from foreign callers
> Losses to telcos
• LDI operator loses foreign revenue from carriers
• LL operator loses APCL
• Mobile operator loses MTR
19 Pakistan Telecommunication Authority
21. Fraud Prevention and Management
g
> Finding telecommunications fraud in masses of call records is
more diffi lt th fi di a needle i a h
difficult than finding dl in haystack.
t k
21 Pakistan Telecommunication Authority
22. Activities Required resources
• Risk assessment review • Expertise in telecom
Min
• Define fraud management policy fraud management
• Create awareness regarding
g g • Expertise in risk assessment
p
fraud & its management
• Perform customer vetting & Cr. • Tools to support authentication,
rating Internal Cr. Rating & exposure
• Set alerts based o Usage, C
a e ts on Cr. Security • Experience of use of techniques
Exposure, dealer performance & tools to manage telecom fraud
• Tighten data & network security
• Maintain audit trails
• Capability to process CDR
Fraud prevention to generate alerts
• Process CDRs & monitor
alerts and usage reports • Alerts monitoring experience
• Reconciliation audits
• Fraud analysis
• Analyse alerts Fraud detection experience
• Investigate • Knowledge of
Max
fraud & impact law enforcement
• Take action Fraud investigation & prosecution
COST
22 Pakistan Telecommunication Authority
23. Fraud Detection
> An average mobile p
g phone operator p
p produces 250 million
CDRs every week. (CFCA estimate)
> Gigantic d t b
Gi ti databases; l
large d t warehouses
data h
> Fraud Management Systems (FMS) rely on complex data
mining techniques
> $$$
23 Pakistan Telecommunication Authority
24. Conclusion
> Revenue Fraud is a reality
> This menace is continuously on the rise
> It is not only affecting the telcos but the regulator and
Government as well (since tax receipts and other subscriptions
are based on teleco revenues)
24 Pakistan Telecommunication Authority
25. Recommendations
> Incentivise CMOs, being the biggest markets takers, to invest
in FMS
> Possible funding source % share from APC which must be
spent on FMS for international bypass detection
> This investment will be recovered when CMO revenues
increase and consequently the subscriptions and levies
received from CMOs are increased
> Further benefits will emerge from shared responsibility of
bypass detection between PTA and CMOs
25 Pakistan Telecommunication Authority
26. Thank you for patience……..
Questions
26 Pakistan Telecommunication Authority