This document summarizes Hemant Sengar's approach to identifying VoIP fraud through device fingerprinting. It discusses how Sengar proposes classifying devices based on acoustic features in RTP payloads and uniquely fingerprinting devices based on timing differences. The document outlines Sengar's two-phase approach of device identification and verification. It also summarizes the methodology and results of experiments classifying 11 hardphones and 5 softphones based on these techniques.