Email a colleague    

July 2011

“Fraud Is a Wind that Always Blows” and Other Wisdom From a 28-Year Old Software Firm

“Fraud Is a Wind that Always Blows” and Other Wisdom From a 28-Year Old Software Firm

If you’ve read my other columns, you know that most of them focus on a particular industry theme or trend.

This one’s going to be different.  This column is about the history of one company, Beck Computers, founded and run by Gary Beck.  Yes, my interview covers fraud management software, which is Beck’s specialty, but this story is also about how a tiny (15-employee) software firm can succeed in the B/OSS market — and even serve Tier 1 carriers.

I should have run into Beck Computers years ago, particularly since they have some marquis accounts and their customers process hundreds of millions of CDRs a day.  But somehow Beck evaded my radar until fraud expert, Jim Marsh, told me about the firm a few weeks ago.

The company began in 1983 when Gary teamed up with his Dad to form the company.  Dad was an antique dealer.  It’s questionable whether or not Dad actually ever turned on a computer in his life, but fear not: Dad did know a thing or two about business, and Gary was prepared to supply the computer expertise anyway.  The company’s original products were outside telecom — in areas like inventory control, accounting, and logistics.  In fact, Beck Computers is still serving some of the same customers today, although 95 percent of its business these days is creating and selling fraud management software and systems.

I’d planned for this interview with Gary to be short and sweet.  But I didn’t count on a couple of things.  Number one: Gary’s quite the talker; and two: he has a lot of interesting things to say.  So my original plan was out the window.  Suffice it to say that Gary and I spent an entertaining hour on the phone together.  And that resulted in this double-sized blog, which will inspire the entrepreneurial spirit that shines — brightly or dimly — in telecom software firms large or small.

Dan Baker: TRI has been in business since 1994 and I thought that was a long time, but Beck Computers beats me by eleven years.  So what’s your longevity secret, Gary?

Gary Beck: First of all, Dan, we are not a sales organization selling software.  We are a service company that truly partners with our customers.  And I think this philosophy is what’s allowed us to survive.

Can you qualify that statement a bit?  Lots of companies tell me they are partners with their customers.  Why do you believe Beck’s any better?

I think the difference is we treat another company’s requirements, their system, and their money as if it was our own.  I don’t advise my customers to buy a bigger computer they don’t need.  And I’m not always trying to sell them more software.  We’ve created some great relationships and I make money from them over the long term.

We like to drop a black box solution into a customer’s organization and in that way we minimize the need for IT to waste precious resources managing it.  If the computer causes any sort of trouble, they call us and we handle it, period.  And that’s not the typical support you get elsewhere.  We support our users and computers as mission critical systems.  One of our customers has a system that has been up for four years and never been down.  Our software and our hardware is designed to be highly available.

It’s pretty amazing that a tiny software firm like yours is handling fraud management for a carrier processing almost 200 million CDRs a day.  Tell us how that started.

Well, we had the good fortune of having our system installed at a Tier 2 operator, which was then acquired by a larger company.  And now we handle the volumes of both companies combined.

Over the years, I’ve purposely over-engineered my systems to handle larger volumes than the customer initially anticipated.  But mergers aren’t the only reason to over-engineer.  Sometimes you don’t get the data because of problems with the network or the switch.  And so, if you’re down for a few hours, you’ve got to catch up, but how do you catch up if you can’t process more than you’re sending?

Then there’s another issue most people try not to think about — and that’s hot hours.  It’s a known fact that often about 17 percent of daily telecom traffic will actually come through in one hour.  So to handle that volume and allow you to catch up, that’s how we design our systems.

But if you go to other suppliers you’re liable to end up buying two to three times as much equipment than originally proposed — “You need three times more disk“ or “Oh no, you need a bigger processor.”  Many salesmen play that game because it’s their job to get the initial order.  Well, I don’t play that game.  Instead, I leave in some leeway: put in more processing power than I promise.  And customers come back and say, “Gee, we’re now processing 50 million CDRs.“ And it’s at that time that I go back and say, “Guys, it’s now time to think about adding capacity because I only promised you 25 million.  I’ve given you a lot of extra room, but now you need to consider something bigger.”

I understand that for a time you were actually replaced at Williams.

Yes, a couple years into our work at WilTel, they told us we would be replaced by a solution from SOTAS (now out of business).  SOTAS had absolutely beautiful marketing materials.  And they made a lot of big promises.  In fact, they were still developing their system when they put it in, but they promised it would be complete in a few months.

Now our systems were running in parallel for some time there.  SOTAS actually upgraded twice during the implementation.  And the amount of hardware they kept bringing in was crazy.  We’re talking row upon row of servers, pre-processors, pre-post-processors, and all these things to get data to move through the system.  They put in eleven 6-foot bays of equipment, promising WilTel that it would handle 25 million CDRs a day.

Well, it took ten months for them to decide to turn down our system.  But after they did, it was only 6 months later that I got a sheepish call from our friends at WilTel saying, “Hey, Beck, how fast can you get a new system in here?“ It turns out WilTel spent over $2 million with SOTAS and the highest throughput they could achieve was 16 million CDRs.  SOTAS was out the door when they asked for yet another $500,000 for more hardware.  That request was the one that broke the camel’s back.

Now WilTel wanted us to deliver an entirely new system that could do 35 million CDRs a day.  The day we rolled in that new system at WilTel was one I’ll always remember.  My team and I from Beck were there to install the system that was shipped to WilTel in two big boxes.  Inside were two bays of equipment, including a SAN with lots of disk on it, two fully clustered systems, and ancillary parts such as fiber switches for communicating with the disk, etc.

But when the shipment arrived, the WilTel folks said, “Hey wait a minute, Gary, you only have two boxes here.  That can’t be enough.“ And I said, “No, that’s the whole system.” And they said, “Gary, you know we’re going to do extensive regression testing to ensure this can absolutely handle the volumes.“ Well, I assured them that we had delivered a system that did as we promised.  And it was at this point that they walked me back to their data center — that was the first time I saw the massive eleven bays of SOTAS equipment.

WilTel tested our system extensively over the next two days and discovered it could process 60 million CDRs.

So there’s a simple lesson here.  Salesmen will promise the moon just to get the deal.  But it’s not the salesman’s job to deliver.  Well, guess what.  My company is going to deliver because it’s got my damn name on it.  And it’s more than pride in what we do; I’m a small company.  I can’t afford not to deliver what I promise.

That’s a great success story, Gary.  And please tell us about your technology.  How are you able to pack all that processing power in a small footprint?

The simplest way to describe our technology, Dan, is to say we sell a black box.  In that respect, we’re a lot like a cloud computing supplier because when you sign up for a SaaS or other cloud service, you don’t ask: is it running on Unix or a Mainframe?  That’s not important.  The only thing you worry about is performance — are you getting what you paid for?

Well, unfortunately, the real-time requirements of our fraud system mean we can’t rely on a relational database like everyone else.  So we built our own memory models that store, manage and mediate the data internally.  Our entire data structure — memory as well as disk — was designed around doing one thing: processing vast amounts of data very quickly and optimized for our technology on top.

But this computer merely sits in a corner and nobody in the IT shop even maintains it.  What you need to do is post a big sign on the rack saying, “Black box application running here.  Do Not Disturb.“

Exactly, but you’d be surprised how long it takes customers to come around to that way of thinking.  They hardly know the system is there.  Even when a disk dies, we ship them a new disk and they swap it in at no cost to them.

Remember these are extremely highly available, multi-clustered systems.  You could almost take an axe to the back of it and it would still run.  System A’s uptime is measured in years and the redundant system B is capable of processing the full load.  So if either system completely fails, the other takes over.

But how many CLECs or other small carriers really need this power?

Well, we can scale the solution up or down.  It’s not one-size-fits-all.

I have a small wireless ISP customer in Texas.  They run something like 100,000 call detail records a day — not a lot.  But they were being hit by $10,000 a day in fraud, so that’s why they are on our system.  It’s very small.  They have one guy who checks the system a couple times a day.  Well, that customer doesn’t need a big computer, so that’s why we’re hosting them.  They are paying about $1,500 a month to be hosted on my system.  That’s it.  Plus, they never have to do anything special, just log in and FTP us their CDR files.

So we are flexible in the way we deliver the solution.  Another big customer is running about 14 million CDRs and that’s fully hosted in my data center too.  But I also have a customer in the UK running about 20 million CDRs and they have their own system.

OK, we’ve covered your hardware technology.  What about the software side of your fraud management system?

Dan, we do things differently in a number of areas, such as in-system-mediation and our customizable user interface, all designed to simplify the investigator’s job, but let me cover the two most important ones.

In our fraud system, for every line of telecom service, we create a three dimensional model of that line’s traffic automatically.  And the beauty of this is you don’t have to set up the system and say: “Anybody who calls X number of times gets an alarm.“ Almost everyone designs their fraud system with thresholds like that, but when you think about it, it’s impractical because you’ll have customers who call a thousand times a day and others who call 10 times a day.

As I said, with us, every single phone number and phone line is profiled.  That’s our unique Fingerprint Signature Profile.  And by the way, that requires more computing power than other methods because we update the 3D profile constantly to keep it statistically current.  And if you have tens of millions of lines in service, we do that for every line.

For example, we may find out that you typically make X number of calls during certain hours of the day and those call are X minutes long.  Then the next time we see traffic, we compare that new call to see if it fits the pattern.

Now for a new customer, we tell them to send us up to 90 days worth of back data.  And we will pre-process and run that data through to create the memory model.  In that way, the day our fraud system is turned on, you’ve already got the memory models for every line of service.  Interestingly enough, every time we‘ve first turned on our system for a customer (with their data) the demo was stopped because they immediately found fraud.

In addition to your automated method for finding fraud, how does the fraud investigator insert new rules into the system?

Well, we allow the fraud investigator to create alarms and more rules in their system to alarm any combination of call data, destination, times, etc.  We also create watch points, or simplified rules that you can implement fast without a lot of fuss.

Now with this design our systems generates more alarms than anybody, so I’m sure the next question you’re going to ask me is: “So how do you keep people from being inundated with alarms?“ That’s where our Automatic Intelligent Feedback and the way we roll alarms up to the line of service level comes in.  Bottom line, the system learns and minimizes the work load of the investigator.

As we accumulate alarms up to the LOS level, the number of alarms contributes to the priority of those listed LOS’s.  And as that rolls up, the phone numbers with the highest numbers, the highest valued lines, worst countries, most minutes, most international calls, and all the other rules — those are the ones at the top of the list.  So as you work from the top down, within minutes you’ve handled everything that’s going to hurt you.  In other words, we create such a tight net that we can identify exactly what the investigator should be looking at.

Another important feature I’ll highlight and it has to do with a customer’s traffic changes.  In this lousy economy of ours, companies have been reducing the amount of outbound calls they make.  Ah, but this would allow somebody to get in there and start using a company’s traffic and you would never detect the increase for a long time.  So to combat that threat, our system calculates for attenuation.  It will compensate for the lowering levels of traffic automatically.

Finally, the intelligence we’ve put into the system has allowed operators to run fraud management with far fewer people.  In the WilTel days, fraud staffs at carriers were typically anywhere between 10 and 20 people.  Today, even large operators need only 4 or 5 fraud investigators to run our system; small operators can get by with only one.

Gary, this is great stuff.  One final question: what’s the biggest challenge the fraud investigators — the people who use your system — worry about these days?

To be honest, the biggest problem they face is getting steady funding for their fraud department.  Once they stop the fraud, after a while management says, “We don’t have any fraud.  Why am I spending this kind of money on staffing if I don’t have fraud?“

To combat that misunderstanding, (besides management reports) we coined an analogy that our customers find useful when trying to convince management, and here it is: Fraud is a wind that always blows.  If you put up a wall, you won’t feel the wind.  But as soon as you take down that wall, it’s going to blow you over.

I remember one time the wind blew pretty fierce at one company.  Due to a reduction in force, they had to reduce their staffing from 8 to 2 fraud investigators.  Shortly thereafter, the company lost $2.2 million in fraud.  The system even noted the events, but nobody took action on it because there was too much to do.  In the end, they brought back half the team.

So remember that: Fraud is the wind that always blows.

This article first appeared in Billing and OSS World.

Copyright 2011 Black Swan Telecom Journal


About the Expert

Gary Beck

Gary Beck

Gary Beck is the founder and president of Long Beach, CA-based Beck Computer Systems, a company that sells telecom fraud systems that integrate across hardware and software.

Beck Computer Systems, Inc. (BCS) is a privately-owned computer and network solutions organization founded in 1983.   Contact Gary via

Related Stories

Related Articles

  • Art of the Fugue: Bringing the Baroque World of Telecom Reference Data to Fraud Management interview with Guy Howie — A tutorial on the role of telecom reference data in billing, revenue assurance, and pricing analysis.  The interview includes details on four new reference databases in fraud control.
  • Share, Educate & Tighten Controls: How to Instill a Strong Telecom Risk & Anti-Fraud Culture interview with Luke Taylor — Learn the steps operators should take to: educate staff/customers in fraud prevention and assure against mobile service abuse.  The interview also dives deep into risk issues that affect the African continent.
  • How IRSF Predators are Evolving their Fraud Attacks on the Weak and Unprotected of the Telecom Serengeti interview with Colin Yates — Fraud fighter Colin Yates shares some startling research data and facts on how fraudsters are using automation and other techniques get around the recent success operators have had in blocking fraud, particularly to high-revenue destinations.
  • NuData Shines Digital Behavior Light on Operating Telecoms Securely in a World Darkened by Identity Fraud interview with Ryan Wilk — A tutorial on digital behavior analysis and how it drives value for telecoms in: greater fraud protection and intelligence to improve the digital customer experience.
  • Fraud Management in Music City: The 2017 Equinox Protector User Group Meeting by Dan Baker — Program details of an upcoming fraud management conference in Nashville, Tennessee in November 2017.  It’s the Equinox Protector User Group Meeting.
  • Mobileum Brings Analytic Scans & Minimally Invasive Treatment to Fraud Removal interview with Jason Lane-Sellers — Advanced analytics-driven fraud detection has arriving.  It enables targeted treatment of fraud cases, lessening customer experience mistakes such as blocking calls to legitimate businesses.
  • Stealth Test Calls: A Powerful New Weapon in the Fight to Block SIM Box Bypass interview with Kenneth Mouton — SIM Box bypass is a highly challenging interconnect fraud to detect.  An expert explains the benefits of a new hybrid test call and CDR profiling systems.  Also discussed is a major anti-fraud breakthrough: stealth test calls.
  • Telecoms Need to Step Up their Game in Subscription Fraud and Customer Onboarding Control interview with Luke Taylor — Know your customer and subscription fraud systems critical investments for telcos today.  An expert discusses: delivering first-class onboarding controls; selecting risk mitigation priorities; and integrating back end systems.
  • WeDo Offers Fraud Detection via a New Cloud Platform interview with Thomas Steagall — A leading vendor introduces a cloud fraud control solution to serve the low cost, easy-to-deploy-learn-and-support requirements of many new operators, OTTs, and MVNOs.
  • Bypass Fraud Evolves: New Threats from Outgoing SIM Box Bypass & Spikes in CLI-Tampering interview with Philippe Orsini — An overview of explosive fraud threats like outgoing SIM box call dumping and CLI spoofing.  What roles do human experts play and technical platforms in battling SIM box via electronic warfare?
  • A Herculean Task: Battling Fraud in an Increasingly Complex Comms World interview with Michalis Mavis — A fraud control expert walks through some interesting cases, gives us his advice on FMS software, and offers four key lessons on the path to fraud management excellence.
  • The Race to Develop Cross-Industry “Know Your Customer” Biometrics to Verify Identity Remotely interview with Shankar Palaniandy — ground-breaking cross-industry ID verification software. India’s 1 billion-people-strong national identity database could become the model for cross-industry ID verification worldwide.  An expert trialing visual biometrics at several Indian banks explains the latest in Know Your Customer technology.  
  • The Early Warning Power of IPRN Test Call Detection in Blocking IRSF Fraud interview with Colin Yates — Detecting the test calls made to International Premium Rate Numbers (IPRN) is helping telcos block IRSF fraud.  An expert explains fraudster methods and the value of IPRN databases.
  • How Regulators can Lead the Fight Against International Bypass Fraud by Dan Baker — As a regulator in a country infected by SIM box fraud, what can you do to improve the situation?  A white paper explains the steps you can and should you take — at the national government level — to better protect your country’s tax revenue, quality of communications, and national infrastructure.
  • Global Interconnect Specialist iconectiv Ramps up its Fraud & Identity Solutions in Bypass & A2P Messaging interview with Bojan Andelkovic — Today’s IRSF, SIM Box, and SMS A2P frauds call for coordinated and broadly conceived FM programs.  A leading interconnect specialist explains the benefits of its managed services approach.
  • A Real-Time Packet-Based Solution to Detect & Block any Hijacked OTT Call interview with Paul David & Andy Gent — Two veterans of the SIM Box call bypass wars describe a new solution for stopping OTT bypass.  Get vital intel on the call hijacking of VIBER and other OTTs.  Learn why the revenue threat to roaming is as serious as it is to international calls.
  • Calculating the Fraud Risks of the Digital Era by Dror Eshet — Digital and mobile technology are an integral part of our daily lives.  Not only is the technology evolving at a frantic rate, but a leading fraud expert explains how fraudsters now team with one another to commit their crimes and magnify the risks to users, companies, and global infrastructure.
  • SIM Box Bypass: The Damage to Developing Nations and the Actions Regulators Must Take interview with Lex Wilkinson — Bypass fraud via the SIM box causes great revenue loss and poses many other dangers, especially in developing nations.  An expert discusses the regulator issues and recommended actions in the fight to control bypass.
  • Protecting the Roaming Cash Cow: Using a Global Test Network for LTE Deployments & Beyond interview with Florian Leeder — International is a premium service that operators must ensure the roaming business is reliable and optimized.  This article makes the case for a global roaming test service.  It explains the problems operators face in contracting with roaming partners, maintaining quality, and rolling out LTE.
  • Nine Simple Strategies for Protecting an Operator or MVNO from Telecom Fraud interview with Jim Bolzenius — An expert in telecom fraud management explains essential strategies for aiming a carrier’s or MVNO’s fraud prevention program in the right direction.
  • A Sweeping 239-Page Research Report on Fraud Management Solutions & Strategies by Dan Baker — TRI has released a comprehensive  analyst report on fraud management solutions.  The study is based on interviews with three dozen leading FM consultants and solution experts.  Download the free Executive Summary.
  • SMS Bypass Blocking: A Service that Protects & Maximizes A2P Revenue for Mobile Operators interview with Claire Cassar — A2P messaging is a multi-billion dollar revenue stream that mobile operators need to protect.  In this interview, you’ll learn how a managed service solution blocks bulk marketing messages and other bypass fraud in enterprise-to-operator SMS traffic.
  • Device Intelligence and Big Data Linkage: Guarding Consumer Access Points from the Fraudsters interview with Matt Ehrlich — Preventing subscription fraud today means supplementing traditional identity checks with a host of new processes, technology, and big data analytics.  A credit and fraud risk expert explains the roles of predictive scores, device risk assessment, and linkage analysis.
  • Mapping the Interconnect Resale Routes of Fraudsters: How a Global Robot Network Detects Voice and SMS Bypass interview with Xavier Lesage — SIM box voice bypass is a persistent problem, but now, bypass is spreading to SMS, OTT apps on the smartphone, and ghost trunks.  This interview explains the fast evolving bypass scene, highlights the strategy of fraudsters, and provides case studies.
  • Law Enforcement & Security in a World Where Industry and National Boundaries are Blurred interview with Mark Johnson — Are we destined to be forever reactive over security, fraud, and risk issues?  Or will we put wise standards, regulations, and frameworks in place that allow us to deliver technology that’s relatively secure and fraud-resistant? 
  • Thinking Outside the Comms Box: A New, Cross Industry Fraud Check Service that Telecoms can Leverage interview with Jim Rice — For decades, telecoms have done fraud and identity checks using comms industry data.  This interview explains the power of using cross-industry data to pinpoint known fraudsters and suspicious individuals in finance, retail, and other industry data sets.
  • Integrated Test Call & CDR Analysis: A New Tool in the Fight Against SIM Box & OTT Bypass Fraud interview with Kenneth Mouton — Why not combine the virtues of FMS CDR analysis and test call generators to create a single integrated tool for bypass fraud control?  The benefits of that idea, a tutorial on test call systems in SIM box detection, and OTT bypass via mobile services like VIBER are all discussed in this interview.
  • White Paper: How to Defend Your Network Against the New SIM Server Threat by Dan Baker — SIM box bypass is a very stubborn fraud problem: fraudsters are succeeding despite carriers‘ best efforts to defeat the fraud.  This white paper explains the impact of SIM Servers as a powerful stealth weapon of the fraudsters.  In turn, the paper discusses new technologies and strategies that can defeat the more sophisticated types of SIM box fraud emerging.
  • Intelligent Routing: The Case for Blocking IRSF Fraud at the SIP Session Border Controller interview with Jim Dalton — A bad fraud event can be a huge loss, especially to OTT players who provide a VoIP service.  In this interview, you’ll learn about an anti-fraud solution that works in concert with  intelligent routing.
  • A Privacy-Enabled Data Exchange that Expands Analytics Uses in Fraud, Credit Risk and Beyond interview with Michelle Wheeler — Analytics data today is managed in a privacy-negligent way.  This interview discusses an ingenious privacy and analytics exchange that allows telecoms, banks, and money lenders to trade fraud, credit risk and other data with each other in complete confidence and control.
  • From Rules Design to Adaptive Learning Systems in Telecom Fraud Control interview with Shankar Palaniandy — Adaptive and behaviorial learning systems are at the forefront of R&D in telecom fraud management systems.  Here an expert developer explains their usefulness in use cases such as IRSF detection, subscription fraud, application fraud, and voice biometrics.
  • Protecting 900+ MVNOs around the Globe from IRSF Fraud Pirates interview with Colin Yates — Telecom fraudsters are seeking a new, more vulnerable path to riches.  Their target: 900+ MVNOs around the globe who generally own no mobile networks, but sell mobile service virtually.  This interview with a fraud control expert explains what steps MVNOs must take to protect themselves from IRSF fraud.
  • Insider Fraud: How to Create an Anti-Fraud Culture in Your Telecom Organization interview with Mark Yelland — Thirteen years after the WorldCom scandal, experts generally agree that insider fraud remains a massive problem in telecom.  In this article you’ll learn the outlines of building a program to instill an anti-fund culture at your telecoms organization.
  • IRSF Protection: Software that Blocks Telecom Fraud at the Enterprise PBX interview with Roger Ansin — The richest criminal path to International Revenue Share Fraud (IRSF) goes through the enterprise PBX.  Hijacking the PBX has cost businesses and telecoms countless billions of dollars in the past 15 years.  In this interview you’ll learn about this industry challenge and an affordable and proven tool that blocks IRSF at the enterprise.
  • Combating SIM Box Fraud: Network Protocol Analysis to the Revenue Rescue interview with Lex Wilkinson — International call bypass is fraud perpetrated through SIM boxes equipped with dozens to hundreds of SIM cards that disguise international calls as local domestic phone calls.  This article give a backgrounder on SIM box detection techniques and talks about a new, rapid-detection technology based on network protocol analysis.
  • Making the Retail Operator Case for Anti-Fraud Protection via Wholesalers interview with Jan Dingenouts — Small retail operators are highly vulnerable to fraud, so enlisting the anti-fraud assistance of wholesalers is a great idea.  This interview explains useful negoiating tactics for retail operators and shows how wholesalers can lend support and grow their business at the same time.
  • A Wholesaler’s Fraud Prevention Creed: If You Lose the Trust, You Lose the Traffic interview with Robert Benlolo — Large wholesalers play a major role in keeping a lid on international telecom fraud.  In this interview, a wholesale voice and fraud management expert explains the role of its vendor systems and multi-threaded internal processes in protecting customers from fraud losses and shady wholesale suppliers.
  • Telecom Fraud & Credit Protection: A Desperate Need in Unbanked Regions of the World interview with Luke Taylor — Mobile money plus related fraud and credit protection are crucial to the prosperity of developing nations where most “unbanked” people live.  This article discusses the special issues of the unbanked market as well as broader revenue protection challenges and opportunities.
  • The Grey Market in Prepaid: Tactics to Combat International Bypass via the SIM Box interview with Ahmad Nadeem Syed — SIM box fraud is one of the toughest revenue threats that telecoms face.  It is the redirection of international calls via the internet to drop illegal VoIP traffic onto mobile networks.  This interview with an expert RA and fraud manager provides a detailed overview of the threat scenario, current SIM box tactics, and some creative ideas for bringing this problem under control.
  • Why Deep Packet Inspection Analysis is Essential for Detecting IP Fraud by Dror Eshet — The IP and mobile broadband revolution is in full swing: time for fraud managers to totally rethink their existing controls and areas of exposure.  In this article, a fraud expert discusses the power of DPI technology and the key impact its analysis is having in an FM world where knowing what’s inside the packets is as important as figuring out where those IP packages are going.
  • Flexibility & Fraud Management Systems: 8 Questions for Luke Taylor of Neural Technologies interview with Luke Taylor — Meeting today’s fraud threats is not just about technology, but also the speed of threat detection, the scanning of data outliers, and being enormously flexible.  A leading fraud management vendor takes a bead on current FM issues and points to where software is headed.
  • Recruiting Smartphone Users as Partners in Telecom Fraud & Security Control by Tal Eisner — Premium Rate Service (PRS) fraud and spyware on a mobile phone can ruin an operator’s relationship with a  subscriber.  The attacker uses malware to automatically generate phone calls, SMSs and data sessions to high cost (premium) phone numbers.  This article discusses a new crowd sourcing mobile app that addresses the problem and helps operators better manage the threat.
  • Roaming — if Managed Correctly --  Can Be a Spark to Revenues by Brian Silvestri — Major analyst firms are predicting that roaming revenues will almost double in five years.  What’s more, roaming remains at the pivot point of Wireless Carrier strategy.  Drawing lessons from the incredible rise of AT&T’s Digital One Rate Plan, this article points to future challengtes and raises key  questions about how mobile operators will ultimately come to terms with smartphone market profitability, service quality, and data roaming.
  • What Makes Good Fraud Management Software?  9 Questions for Tal Eisner of cVidya interview with Tal Eisner — How do you know if the fraud management software you own or are considering is a good one?  That’s the starting point of a conversation Black Swan had with a product strategist of a leading FMS vendor.  The article discusses everything from maturity and customer collaboration... to PBX hacking and enabling the FMS to actually enhance the relationship a telco has with its enterprise customers.
  • International Revenue Share Fraud: Are We Winning the Battle Against Telecom Pirates? interview with Colin Yates — International Revenue Share Fraud (IRSF) is one of the telecom industry’s most enduring problems.  Yet many of us have only a foggy notion of how IRSF works and how operators around the globe are coping with the issue. This interview covers the bases: the origins of IRSF, typical fraud scenarios, efforts to get international cooperation on the issue, and the future outlook of IRSF.
  • Fraud Management at Kyivstar in Ukraine interview with Anton Pivala — Kyivstar from Ukraine is a leading mobile operator in both  voice service quality and consumer value.  This case study gives details on Kyivstar’s fraud control program, reveals some of the unique operator challenges faced in Eastern Europe, and explains how Kyivstar is successfully winning the battle against  IRSF and SIMbox fraud.
  • Converging Criminal and Technical Intelligence: Secret to Combating the Explosion in Telecom Fraud and Security Threats interview with Mark Johnson — A fraud and security expert gives a big picture talk on why industry convergence is driving the need for a broader “revenue risk intelligence.”  His prescription?  Yes, telecoms surely need to excel in technical  infrastructure such as traffic usage data, IP intrusion appliances, and physical barriers.  But just as important is the need to pair that knowledge with the real-life lessons of fighting criminals in general.
  • Gratifying Ghana: Why Listening to Operators Trumps Vendor Technology and Size interview with Ludvig Lindqvist — The value of technically excellent software is negated if the solution is not implemented right.  This article makes a strong case that vendors need to focus on first things first — get in full synch with a service provider’s business, capabilities and unique needs before you recommend or implement any software.  Topics discussed include: the benefits of retaining in-house expertise, implementation challenges in Africa, and the meaning of “thorough engagement” with the client.
  • Roaming Fraud: The Importance of Real-Time Data Exchange and Analysis interview with James Stewart — The Near Real Time Roaming Data Exchange (NRTRDE) is a GSM standard allowing operators to gain fast access to the roaming records of service providers half way around the world.  The article explains how 65 carriers are using this data to combat fraud through a service bureau.  Learn about the dangers of international roaming fraud and the value a roaming service bureau brings to the table.
  • Is the M2M Device in Your Refrigerator a Telecom Fraud Threat? interview with Simon Collins — Machine to machine (M2M) technology is being applied in hundreds of monitoring apps, such as smart metering and health diagnosis.  It’s even being used to monitor driving patterns tied to auto insurance rates.  But this article shows the serious M2M fraud and security threat that stem from the theft of the SIM/USIM device used in every M2M device.  The article discusses the RA and fraud strategies operators need to employ to manage the risks that will come from wider M2M deployments.
  • “Fraud Is a Wind that Always Blows” and Other Wisdom From a 28-Year Old Software Firm interview with Gary Beck — Here’s the amazing story of how Beck Computers was pulled out of a Tier 1 account only to be brought back in a few months later.  The article explores software vendor service and support challenges, real-time computing requirements, advanced fraud management functions, and ways to educate management on the value an FMS investment.
  • Insider Fraud: Detecting Criminal Activity in the Telecom Sales Process interview with Tal Eisner — One of the biggest problems telecoms now face is fraud done inside their offices, dealer stores and firewalls.  This type of fraud is especially dangerous because it’s performed by people fully authorized to transact for the company.  The story dicusses the major causes of insider fraud, presents a case study, and explains basic techniques that software uses to detect insider fraud.
  • Fraud & Credit Risk Software: Setting the Client Free to Innovate interview with Luke Taylor — Not every operator wants the freedom to configure its own fraud management solution, but certain providers wouldn‘t live without such a “framework” approach .  This article discusses: the reasons why operator choose this strategy as it covers many other fraud and credit software implementation issues.
  • Why Selling to Business Customers Makes You a High Risk Target for Fraud by David West — There’s a saying in the fraud business: “It’s not a question of whether you’ll be hit by fraud — only when, how bad, and from which direction.“  Citing four recent cases where operators were hit by fraud, this article explains why investing in a fraud soluiont — and keeping up-to-date — are so critical.  The article gives several examples of vulnerability points that fraudsters commonly exploit.