Email a colleague    

October 2015

Nine Simple Strategies for Protecting an Operator or MVNO from Telecom Fraud

Nine Simple Strategies for Protecting an Operator or MVNO from Telecom Fraud

One of the biggest challenges in fighting telecom fraud is simply knowing where to start.

Fraud threats are so diverse and complex that’s it’s hard for fraud managers to get their minds around the problems.

Well, I recently attended the WeDo Technologies Conference in Washington DC where I heard some fine briefings by key experts and members of the fraud prevention association, CFCA.

One of these experts was Jim Bolzenius, Head of Anti-Fraud Services at TNS, a leading provider of roaming, clearing/settlement, signaling, interoperability, and information validation solutions to the telecom industry.  Prior to joining TNS two years ago, Jim held the high profile job of Executive Director of Fraud and Prevention at Verizon Wireless.

I think you’ll thoroughly enjoy reading Jim’s clear, cut-to-the-chase way of explaining fraud management issues.  He begins by giving us a quick backgrounder on International Revenue Share Fraud (IRSF) and subscription fraud.  He then follows that with nine solid strategies for aiming a carrier’s or MVNO’s fraud prevention program in the right direction.

Dan Baker: Jim, people are familiar with the basics of IRSF fraud, but the details on exactly how fraudsters make their money there are less clear.  Can you shed some light on that?

Jim Bolzenius: Sure, Dan.  It’s really a case of “following the money.” If you trace the way money flows in these schemes, understanding IRSF and premium rate fraud becomes rather simple.

Basically the fraudsters need to cut a deal with a supportive local exchange carrier (LEC) in a country that has a high exchange rate.  Historically, these locations included Somalia, Gambia, and Latvia.  These are the popular destinations.

In some cases the LEC is owned by the government, so if you seek help from that government to stop the fraud, they really don’t care.  This is especially true if the government official working with the fraudster just bought himself a new Bentley :- )

To generate traffic, the fraudsters use a conference call line, a hacked PBX, stolen wireless service or a variety of other means to push traffic to these high rate destinations.  And then the terminating carrier splits the revenue with the fraudster who generates all of the calls.

In the end, it’s the “A number” home carriers who lose money.  Whoever’s customer generated those calls has to pay the bills all the way down the line.  And there’s no relief from that.

Now the US domestic version of IRSF is called “traffic pumping”.  And here the LECs are located in various States: Iowa has been a typical location.

You see a lot of calls being pumped to those LECs for things like free conference calls.  And it’s the same model as IRSF: they are paying someone to pump phone calls into these locations so the carrier can make money and share the revenue with the people generating the calls.  Please note that this Domestic Traffic Pumping is not illegal and some businesses are valid, but not all.  Carriers just need to be aware of this process and look for suspicious activity.

Now you can think of IRSF as US domestic traffic pumping times 20 — because that’s the likely exchange rate difference.

So when you add it all up, IRSF, premium rate fraud, and traffic pumping are based on a very simple model.

Of course, the other big hurdle for the bad guys is getting in the door.  They need to gain access to actual phone lines to do their traffic pumping fraud.

That’s right.  And subscription fraud remains the number one method of gaining access.  Now there are many ways to perform subscription fraud, and how to prevent and identify subscription fraud is a subject I could talk about for hours.

But the two basic schemes are to steal a person’s ID (True Name Fraud) or to take over an existing account or add-on lines to an existing account via Social Engineering.

Of course, what the fraudsters really love is a faceless transaction.  That way, the bad guys don’t have to go to a store, show an ID, or risk having their picture taken by the store’s video camera.

This is why much of today’s fraud occurs over the internet and through wholesalers or telesales.  Dealers need to be closely monitored because we pay them a commission on sales.  Do they really care if this guy is a little bit suspicious?  Maybe not if the carrier has not implemented a commission charge-back process for subscription fraud activations.

Jim, how can carriers get their fraud management problems into high gear?  What are some of the programs you feel are essential?

Well, I’ve put together a short list of 9 things that guide my own thinking.  So here they are:

1 Make Timely Detection & Blocking your Key Goal

As a fraud fighter, you need to be realistic.  You can’t really stop IRSF.  The only way to totally stop it would be to disallow all international calls.  And if you did that, I think sales would have a bit of a problem with that strategy.

So if you can’t stop it entirely, your key mission is to detect and block fraud as soon as possible.

The fraud losses can add up very fast.  Let’s say you’ve got a fraudulent phone that’s reaching a $2 a minute destination and the fraudster is using the conference call function to generate six simultaneous calls or they activate lines via subscription fraud.

Now if you have real-time tools in place to look for that type of fraud, in 30 minutes or less you could identify and stop the fraud, so your fraud loss is still going to be around $360.  No matter what, you are still going to lose money because you are not preventing the initial call, just detecting it as fast as possible.

Fraud Monitoring

But if you have no monitoring in place and are waiting, say, for the TAP records or CIBER records to come in, it could be two-days before you catch the fraud.  So by not having the proper tools in place, that one fraud account could cost you $34,000.  And that’s potentially just one phone with a six-way conference feature.

Now imagine your subscription fraud account had 10 phones with a six-way conference call feature.  Well, you’re then talking about $300,000 in a matter of two days!  That’s the money you lost because you didn’t have a real-time data feed and a Fraud Management System.

Real-time data exchange is quite critical.  If you don’t have a NRTDE feed set up, you’re waiting for the billing records to come in.  And by the way, the carriers partnering with the fraudsters are in no hurry to send you a billing record because the longer the fraud goes undetected, the more money they make.

This is why actively monitoring for calls to suspicious locations is key.  You need to know where these are so you can identify them on the first call.

2 Use Social Network Analysis to Multiply Your Blocking Capability

It’s clear that when the first call from the first phone is identified as a fraudster, you should shut down that entire account right away.

But that one phone call can lead to other fraud prevention opportunities too.  The secret is to run a linkage analysis back for accounts who the fraudulent account also called.

If I now have one bad account A, there’s an account B, account C and so forth that are associated with Account A, so you can potentially shut down 50 or 60 lines by doing that social network analysis.

So detecting one bad phone call should lead you to other suspicious numbers.

3 Don’t Make PBX Hacking Easy for the Fraudster

Hacking a PBX to pump traffic to international destinations has been around for two decades or more, but it’s still a huge business for the fraudsters.

There are MVNOs out there serving business clients, and if they are not diligent with their security procedures regarding access ports, default passwords, and training employees regarding social engineering techniques, people will get into that PBX.

It’s amazing how many times a PBX is hacked because the default password on the PBX was never changed.  Most hackers know the PBX manufacturer’s default password.  So if you never change it, you’re going to have a lot of fraud.

4 Educate Customers & Call Center Reps about Social Engineering Schemes

One of the weakest points in a carrier’s defense is that customers and call center reps are often easy prey for the fraudsters.

Calling into a call center is a very popular path.  They pretend to be a customer and attempt to take over accounts to add lines of service and international dialing features.

Phishing

“Hi, I’m from General Motors (GM) and I’m the new telecom account manager here.  I need 10 more mobile phone lines.” So with social engineering and phishing, people who are very experienced at this game can get your customer care rep to send them phones and add it to GM’s bill.

Another tactic is to send a text message to customers directly, saying, “Hey, I’m with Verizon Wireless, and you need to verify this information on your account or we will have to shut it off.” You’d be surprised how many people will send their sensitive ID information back by text or call the 800-number left by the message.

Or the text will send the customer to a website owned by the criminal where they gather information.  They may have a Verizon or AT&T logo on the web page to convince the customer that the web site is valid.

5 Implement Processes to Limit the Wangiri Fraud

One of the easier methods to commit IRSF or PRS fraud is via a method called Wangiri fraud (also known as a One Ring Scheme).  Once again, it’s a very easy process.  The fraudster sets up an auto-dialer to call thousands or millions of your customers; after one ring the call disconnects.

Now, amazingly, about 15% of people will actually call that number back.

So let’s say the call goes to Grenada.  Well, the idea is to keep the customer on the line, talk to them with recorded messages, and all that time they’re being charged $10 a minute.

Wangiri fraud

Then, when your customer sees the bill, he calls to say, “Hey, Mr.  Carrier, I don’t have international service with you, so why are you billing me for international calls?” So you guessed it: the carrier gets stuck with the bill.

And the fraudsters setup the Wangiri fraud by choosing the right call back numbers.  If you aim to defraud US customers, the best place for the fraudsters to have their premium rate numbers is in places like Jamaica, the Dominican Republic, or Grenada.  Calls to these countries are 10-digit numbers, so the customer looks at the area code and figures it’s a free US long distance call.

Now the cure to blocking this Wangiri fraud is to put in the right processes.

Do you allow the Caribbean to be 10-digit dialing?  It’s part of the North American dialing plan, so an International Dialing feature is not required to call these locations unless the carrier has established these locations as requiring that feature in their networks.

As these attacks are identified, it is imperative that the carrier notify and educate their customers to prevent further losses.

6 Control or Turn Off Dangerous Calling Features & Destinations

Does someone who lives in rural Minnesota ever need to call someone in the country of Latvia?

I think the prudent thing is to block certain capabilities and dangerous calling features.

You really should consider blocking call-forwarding, multi-party calls, and explicit call transfers for all international roamers and international calls.  The need for a valid customer to forward their phone to an international location or establish 10 simultaneous calls to an international location is very small and not worth the fraud risk.  People doing that — 99% of the time — are criminals.

And for the 1% who need that capability, well, I’m not sure those customers are worth the risk.

7 Monitor and Test your International Roaming Rules

Ok, you’ve set up your roaming rules to block six simultaneous calls because there’s a strong likelihood that’s criminal activity.  It’s too much risk.

But how do you know your roaming partners are following these rules?  How do you know they are not over-riding those rules?

Well, you need to test that.  Depending on what switches they are using, the fraud prevention rules you set up may not be read properly.  So make sure to test that your roaming rules are being followed in every market you roam.

8 Don’t Let Your Guard Down over the Holidays

What is the number one day for fraud losses?

Thanksgiving

Well in the United States, it’s the Wednesday before Thanksgiving.  That’s because many carrier fraud centers are closed on Thursday, Friday, Saturday and Sunday over the Thanksgiving holiday.  Go back and look at write-offs and fraud losses for that time last year.

If you don’t have a 24/7 shop that cycles through the big alarms — or if your system doesn’t send you alerts or text message alerts — you will be hit hard during the Thanksgiving break.  On Monday morning you could have thousands of alarms waiting for you.

People really need to come in over the holidays and watch for the big alarms.

9 Recognize that a Fraud Management System Alone is Not Enough

Finally, you need to ensure that the three legs of your program — systems, processes and people — all work together.

You need all of them.  You could have the greatest system in the world, but if you don’t have the processes and trained people behind it, the system doesn’t do any good.  People may not be working the system properly or identifying the right things.  Your processes and system may be outdated if you do not stay current with the new fraud trends and types of attacks.

So that’s a critical point if you want to ever have a chance of identifying and mitigating your fraud losses.

Copyright 2015 Black Swan Telecom Journal

 

About the Expert

Jim Bolzenius

Jim Bolzenius

Jim is an industry expert in the Telecom fraud prevention and detection arena.  Jim participates and contributes to several Global Fraud and Security Associations.  He has worked in the Telecom fraud prevention space for about 20 years.

Jim is currently the Head of anti-fraud Services at Transaction Network Services (TNS).  Prior to that, Jim was the Vice President of Product and Market Development for RoamEx Inc.  Jim also worked for Verizon Wireless for 27 years.  He was the Executive Director of Fraud Prevention and Strategy at Verizon Wireless for 12 years.   Contact Jim via

Related Stories

  • A Herculean Task: Battling Fraud in an Increasingly Complex Comms World interview with Michalis Mavis — A fraud control expert walks through some interesting cases, gives us his advice on FMS software, and offers four key lessons on the path to fraud management excellence.
  • The Early Warning Power of IPRN Test Call Detection in Blocking IRSF Fraud interview with Colin Yates — Detecting the test calls made to International Premium Rate Numbers (IPRN) is helping telcos block IRSF fraud.  An expert explains fraudster methods and the value of IPRN databases.
  • Calculating the Fraud Risks of the Digital Era by Dror Eshet — Digital and mobile technology are an integral part of our daily lives.  Not only is the technology evolving at a frantic rate, but a leading fraud expert explains how fraudsters now team with one another to commit their crimes and magnify the risks to users, companies, and global infrastructure.
  • SIM Box Bypass: The Damage to Developing Nations and the Actions Regulators Must Take interview with Lex Wilkinson — Bypass fraud via the SIM box causes great revenue loss and poses many other dangers, especially in developing nations.  An expert discusses the regulator issues and recommended actions in the fight to control bypass.
  • Nine Simple Strategies for Protecting an Operator or MVNO from Telecom Fraud interview with Jim Bolzenius — An expert in telecom fraud management explains essential strategies for aiming a carrier’s or MVNO’s fraud prevention program in the right direction.
  • A Sweeping 239-Page Research Report on Fraud Management Solutions & Strategies by Dan Baker — TRI has released a comprehensive  analyst report on fraud management solutions.  The study is based on interviews with three dozen leading FM consultants and solution experts.  Download the free Executive Summary.
  • SMS Bypass Blocking: A Service that Protects & Maximizes A2P Revenue for Mobile Operators interview with Claire Cassar — A2P messaging is a multi-billion dollar revenue stream that mobile operators need to protect.  In this interview, you’ll learn how a managed service solution blocks bulk marketing messages and other bypass fraud in enterprise-to-operator SMS traffic.
  • Device Intelligence and Big Data Linkage: Guarding Consumer Access Points from the Fraudsters interview with Matt Ehrlich — Preventing subscription fraud today means supplementing traditional identity checks with a host of new processes, technology, and big data analytics.  A credit and fraud risk expert explains the roles of predictive scores, device risk assessment, and linkage analysis.
  • Mapping the Interconnect Resale Routes of Fraudsters: How a Global Robot Network Detects Voice and SMS Bypass interview with Xavier Lesage — SIM box voice bypass is a persistent problem, but now, bypass is spreading to SMS, OTT apps on the smartphone, and ghost trunks.  This interview explains the fast evolving bypass scene, highlights the strategy of fraudsters, and provides case studies.
  • Law Enforcement & Security in a World Where Industry and National Boundaries are Blurred interview with Mark Johnson — Are we destined to be forever reactive over security, fraud, and risk issues?  Or will we put wise standards, regulations, and frameworks in place that allow us to deliver technology that’s relatively secure and fraud-resistant? 
  • Thinking Outside the Comms Box: A New, Cross Industry Fraud Check Service that Telecoms can Leverage interview with Jim Rice — For decades, telecoms have done fraud and identity checks using comms industry data.  This interview explains the power of using cross-industry data to pinpoint known fraudsters and suspicious individuals in finance, retail, and other industry data sets.
  • Integrated Test Call & CDR Analysis: A New Tool in the Fight Against SIM Box & OTT Bypass Fraud interview with Kenneth Mouton — Why not combine the virtues of FMS CDR analysis and test call generators to create a single integrated tool for bypass fraud control?  The benefits of that idea, a tutorial on test call systems in SIM box detection, and OTT bypass via mobile services like VIBER are all discussed in this interview.
  • White Paper: How to Defend Your Network Against the New SIM Server Threat by Dan Baker — SIM box bypass is a very stubborn fraud problem: fraudsters are succeeding despite carriers‘ best efforts to defeat the fraud.  This white paper explains the impact of SIM Servers as a powerful stealth weapon of the fraudsters.  In turn, the paper discusses new technologies and strategies that can defeat the more sophisticated types of SIM box fraud emerging.
  • Intelligent Routing: The Case for Blocking IRSF Fraud at the SIP Session Border Controller interview with Jim Dalton — A bad fraud event can be a huge loss, especially to OTT players who provide a VoIP service.  In this interview, you’ll learn about an anti-fraud solution that works in concert with  intelligent routing.
  • A Privacy-Enabled Data Exchange that Expands Analytics Uses in Fraud, Credit Risk and Beyond interview with Michelle Wheeler — Analytics data today is managed in a privacy-negligent way.  This interview discusses an ingenious privacy and analytics exchange that allows telecoms, banks, and money lenders to trade fraud, credit risk and other data with each other in complete confidence and control.
  • From Rules Design to Adaptive Learning Systems in Telecom Fraud Control interview with Shankar Palaniandy — Adaptive and behaviorial learning systems are at the forefront of R&D in telecom fraud management systems.  Here an expert developer explains their usefulness in use cases such as IRSF detection, subscription fraud, application fraud, and voice biometrics.
  • Protecting 900+ MVNOs around the Globe from IRSF Fraud Pirates interview with Colin Yates — Telecom fraudsters are seeking a new, more vulnerable path to riches.  Their target: 900+ MVNOs around the globe who generally own no mobile networks, but sell mobile service virtually.  This interview with a fraud control expert explains what steps MVNOs must take to protect themselves from IRSF fraud.
  • Combating SIM Box Fraud: Network Protocol Analysis to the Revenue Rescue interview with Lex Wilkinson — International call bypass is fraud perpetrated through SIM boxes equipped with dozens to hundreds of SIM cards that disguise international calls as local domestic phone calls.  This article give a backgrounder on SIM box detection techniques and talks about a new, rapid-detection technology based on network protocol analysis.
  • Making the Retail Operator Case for Anti-Fraud Protection via Wholesalers interview with Jan Dingenouts — Small retail operators are highly vulnerable to fraud, so enlisting the anti-fraud assistance of wholesalers is a great idea.  This interview explains useful negoiating tactics for retail operators and shows how wholesalers can lend support and grow their business at the same time.
  • A Wholesaler’s Fraud Prevention Creed: If You Lose the Trust, You Lose the Traffic interview with Robert Benlolo — Large wholesalers play a major role in keeping a lid on international telecom fraud.  In this interview, a wholesale voice and fraud management expert explains the role of its vendor systems and multi-threaded internal processes in protecting customers from fraud losses and shady wholesale suppliers.
  • Telecom Fraud & Credit Protection: A Desperate Need in Unbanked Regions of the World interview with Luke Taylor — Mobile money plus related fraud and credit protection are crucial to the prosperity of developing nations where most “unbanked” people live.  This article discusses the special issues of the unbanked market as well as broader revenue protection challenges and opportunities.
  • The Grey Market in Prepaid: Tactics to Combat International Bypass via the SIM Box interview with Ahmad Nadeem Syed — SIM box fraud is one of the toughest revenue threats that telecoms face.  It is the redirection of international calls via the internet to drop illegal VoIP traffic onto mobile networks.  This interview with an expert RA and fraud manager provides a detailed overview of the threat scenario, current SIM box tactics, and some creative ideas for bringing this problem under control.
  • Why Deep Packet Inspection Analysis is Essential for Detecting IP Fraud by Dror Eshet — The IP and mobile broadband revolution is in full swing: time for fraud managers to totally rethink their existing controls and areas of exposure.  In this article, a fraud expert discusses the power of DPI technology and the key impact its analysis is having in an FM world where knowing what’s inside the packets is as important as figuring out where those IP packages are going.
  • Flexibility & Fraud Management Systems: 8 Questions for Luke Taylor of Neural Technologies interview with Luke Taylor — Meeting today’s fraud threats is not just about technology, but also the speed of threat detection, the scanning of data outliers, and being enormously flexible.  A leading fraud management vendor takes a bead on current FM issues and points to where software is headed.
  • What Makes Good Fraud Management Software?  9 Questions for Tal Eisner of cVidya interview with Tal Eisner — How do you know if the fraud management software you own or are considering is a good one?  That’s the starting point of a conversation Black Swan had with a product strategist of a leading FMS vendor.  The article discusses everything from maturity and customer collaboration... to PBX hacking and enabling the FMS to actually enhance the relationship a telco has with its enterprise customers.
  • Fraud Management at Kyivstar in Ukraine interview with Anton Pivala — Kyivstar from Ukraine is a leading mobile operator in both  voice service quality and consumer value.  This case study gives details on Kyivstar’s fraud control program, reveals some of the unique operator challenges faced in Eastern Europe, and explains how Kyivstar is successfully winning the battle against  IRSF and SIMbox fraud.
  • Gratifying Ghana: Why Listening to Operators Trumps Vendor Technology and Size interview with Ludvig Lindqvist — The value of technically excellent software is negated if the solution is not implemented right.  This article makes a strong case that vendors need to focus on first things first — get in full synch with a service provider’s business, capabilities and unique needs before you recommend or implement any software.  Topics discussed include: the benefits of retaining in-house expertise, implementation challenges in Africa, and the meaning of “thorough engagement” with the client.
  • “Fraud Is a Wind that Always Blows” and Other Wisdom From a 28-Year Old Software Firm interview with Gary Beck — Here’s the amazing story of how Beck Computers was pulled out of a Tier 1 account only to be brought back in a few months later.  The article explores software vendor service and support challenges, real-time computing requirements, advanced fraud management functions, and ways to educate management on the value an FMS investment.
  • Fraud & Credit Risk Software: Setting the Client Free to Innovate interview with Luke Taylor — Not every operator wants the freedom to configure its own fraud management solution, but certain providers wouldn‘t live without such a “framework” approach .  This article discusses: the reasons why operator choose this strategy as it covers many other fraud and credit software implementation issues.

Related Articles

  • A Herculean Task: Battling Fraud in an Increasingly Complex Comms World interview with Michalis Mavis — A fraud control expert walks through some interesting cases, gives us his advice on FMS software, and offers four key lessons on the path to fraud management excellence.
  • The Race to Develop Cross-Industry “Know Your Customer” Biometrics to Verify Identity Remotely interview with Shankar Palaniandy — ground-breaking cross-industry ID verification software. India’s 1 billion-people-strong national identity database could become the model for cross-industry ID verification worldwide.  An expert trialing visual biometrics at several Indian banks explains the latest in Know Your Customer technology.  
  • The Early Warning Power of IPRN Test Call Detection in Blocking IRSF Fraud interview with Colin Yates — Detecting the test calls made to International Premium Rate Numbers (IPRN) is helping telcos block IRSF fraud.  An expert explains fraudster methods and the value of IPRN databases.
  • How Regulators can Lead the Fight Against International Bypass Fraud by Dan Baker — As a regulator in a country infected by SIM box fraud, what can you do to improve the situation?  A white paper explains the steps you can and should you take — at the national government level — to better protect your country’s tax revenue, quality of communications, and national infrastructure.
  • Global Interconnect Specialist iconectiv Ramps up its Fraud & Identity Solutions in Bypass & A2P Messaging interview with Bojan Andelkovic — Today’s IRSF, SIM Box, and SMS A2P frauds call for coordinated and broadly conceived FM programs.  A leading interconnect specialist explains the benefits of its managed services approach.
  • A Real-Time Packet-Based Solution to Detect & Block any Hijacked OTT Call interview with Paul David & Andy Gent — Two veterans of the SIM Box call bypass wars describe a new solution for stopping OTT bypass.  Get vital intel on the call hijacking of VIBER and other OTTs.  Learn why the revenue threat to roaming is as serious as it is to international calls.
  • Calculating the Fraud Risks of the Digital Era by Dror Eshet — Digital and mobile technology are an integral part of our daily lives.  Not only is the technology evolving at a frantic rate, but a leading fraud expert explains how fraudsters now team with one another to commit their crimes and magnify the risks to users, companies, and global infrastructure.
  • SIM Box Bypass: The Damage to Developing Nations and the Actions Regulators Must Take interview with Lex Wilkinson — Bypass fraud via the SIM box causes great revenue loss and poses many other dangers, especially in developing nations.  An expert discusses the regulator issues and recommended actions in the fight to control bypass.
  • Protecting the Roaming Cash Cow: Using a Global Test Network for LTE Deployments & Beyond interview with Florian Leeder — International is a premium service that operators must ensure the roaming business is reliable and optimized.  This article makes the case for a global roaming test service.  It explains the problems operators face in contracting with roaming partners, maintaining quality, and rolling out LTE.
  • Nine Simple Strategies for Protecting an Operator or MVNO from Telecom Fraud interview with Jim Bolzenius — An expert in telecom fraud management explains essential strategies for aiming a carrier’s or MVNO’s fraud prevention program in the right direction.
  • A Sweeping 239-Page Research Report on Fraud Management Solutions & Strategies by Dan Baker — TRI has released a comprehensive  analyst report on fraud management solutions.  The study is based on interviews with three dozen leading FM consultants and solution experts.  Download the free Executive Summary.
  • SMS Bypass Blocking: A Service that Protects & Maximizes A2P Revenue for Mobile Operators interview with Claire Cassar — A2P messaging is a multi-billion dollar revenue stream that mobile operators need to protect.  In this interview, you’ll learn how a managed service solution blocks bulk marketing messages and other bypass fraud in enterprise-to-operator SMS traffic.
  • Device Intelligence and Big Data Linkage: Guarding Consumer Access Points from the Fraudsters interview with Matt Ehrlich — Preventing subscription fraud today means supplementing traditional identity checks with a host of new processes, technology, and big data analytics.  A credit and fraud risk expert explains the roles of predictive scores, device risk assessment, and linkage analysis.
  • Mapping the Interconnect Resale Routes of Fraudsters: How a Global Robot Network Detects Voice and SMS Bypass interview with Xavier Lesage — SIM box voice bypass is a persistent problem, but now, bypass is spreading to SMS, OTT apps on the smartphone, and ghost trunks.  This interview explains the fast evolving bypass scene, highlights the strategy of fraudsters, and provides case studies.
  • Law Enforcement & Security in a World Where Industry and National Boundaries are Blurred interview with Mark Johnson — Are we destined to be forever reactive over security, fraud, and risk issues?  Or will we put wise standards, regulations, and frameworks in place that allow us to deliver technology that’s relatively secure and fraud-resistant? 
  • Thinking Outside the Comms Box: A New, Cross Industry Fraud Check Service that Telecoms can Leverage interview with Jim Rice — For decades, telecoms have done fraud and identity checks using comms industry data.  This interview explains the power of using cross-industry data to pinpoint known fraudsters and suspicious individuals in finance, retail, and other industry data sets.
  • Integrated Test Call & CDR Analysis: A New Tool in the Fight Against SIM Box & OTT Bypass Fraud interview with Kenneth Mouton — Why not combine the virtues of FMS CDR analysis and test call generators to create a single integrated tool for bypass fraud control?  The benefits of that idea, a tutorial on test call systems in SIM box detection, and OTT bypass via mobile services like VIBER are all discussed in this interview.
  • White Paper: How to Defend Your Network Against the New SIM Server Threat by Dan Baker — SIM box bypass is a very stubborn fraud problem: fraudsters are succeeding despite carriers‘ best efforts to defeat the fraud.  This white paper explains the impact of SIM Servers as a powerful stealth weapon of the fraudsters.  In turn, the paper discusses new technologies and strategies that can defeat the more sophisticated types of SIM box fraud emerging.
  • Intelligent Routing: The Case for Blocking IRSF Fraud at the SIP Session Border Controller interview with Jim Dalton — A bad fraud event can be a huge loss, especially to OTT players who provide a VoIP service.  In this interview, you’ll learn about an anti-fraud solution that works in concert with  intelligent routing.
  • A Privacy-Enabled Data Exchange that Expands Analytics Uses in Fraud, Credit Risk and Beyond interview with Michelle Wheeler — Analytics data today is managed in a privacy-negligent way.  This interview discusses an ingenious privacy and analytics exchange that allows telecoms, banks, and money lenders to trade fraud, credit risk and other data with each other in complete confidence and control.
  • From Rules Design to Adaptive Learning Systems in Telecom Fraud Control interview with Shankar Palaniandy — Adaptive and behaviorial learning systems are at the forefront of R&D in telecom fraud management systems.  Here an expert developer explains their usefulness in use cases such as IRSF detection, subscription fraud, application fraud, and voice biometrics.
  • Protecting 900+ MVNOs around the Globe from IRSF Fraud Pirates interview with Colin Yates — Telecom fraudsters are seeking a new, more vulnerable path to riches.  Their target: 900+ MVNOs around the globe who generally own no mobile networks, but sell mobile service virtually.  This interview with a fraud control expert explains what steps MVNOs must take to protect themselves from IRSF fraud.
  • Insider Fraud: How to Create an Anti-Fraud Culture in Your Telecom Organization interview with Mark Yelland — Thirteen years after the WorldCom scandal, experts generally agree that insider fraud remains a massive problem in telecom.  In this article you’ll learn the outlines of building a program to instill an anti-fund culture at your telecoms organization.
  • IRSF Protection: Software that Blocks Telecom Fraud at the Enterprise PBX interview with Roger Ansin — The richest criminal path to International Revenue Share Fraud (IRSF) goes through the enterprise PBX.  Hijacking the PBX has cost businesses and telecoms countless billions of dollars in the past 15 years.  In this interview you’ll learn about this industry challenge and an affordable and proven tool that blocks IRSF at the enterprise.
  • Combating SIM Box Fraud: Network Protocol Analysis to the Revenue Rescue interview with Lex Wilkinson — International call bypass is fraud perpetrated through SIM boxes equipped with dozens to hundreds of SIM cards that disguise international calls as local domestic phone calls.  This article give a backgrounder on SIM box detection techniques and talks about a new, rapid-detection technology based on network protocol analysis.
  • Making the Retail Operator Case for Anti-Fraud Protection via Wholesalers interview with Jan Dingenouts — Small retail operators are highly vulnerable to fraud, so enlisting the anti-fraud assistance of wholesalers is a great idea.  This interview explains useful negoiating tactics for retail operators and shows how wholesalers can lend support and grow their business at the same time.
  • A Wholesaler’s Fraud Prevention Creed: If You Lose the Trust, You Lose the Traffic interview with Robert Benlolo — Large wholesalers play a major role in keeping a lid on international telecom fraud.  In this interview, a wholesale voice and fraud management expert explains the role of its vendor systems and multi-threaded internal processes in protecting customers from fraud losses and shady wholesale suppliers.
  • Telecom Fraud & Credit Protection: A Desperate Need in Unbanked Regions of the World interview with Luke Taylor — Mobile money plus related fraud and credit protection are crucial to the prosperity of developing nations where most “unbanked” people live.  This article discusses the special issues of the unbanked market as well as broader revenue protection challenges and opportunities.
  • The Grey Market in Prepaid: Tactics to Combat International Bypass via the SIM Box interview with Ahmad Nadeem Syed — SIM box fraud is one of the toughest revenue threats that telecoms face.  It is the redirection of international calls via the internet to drop illegal VoIP traffic onto mobile networks.  This interview with an expert RA and fraud manager provides a detailed overview of the threat scenario, current SIM box tactics, and some creative ideas for bringing this problem under control.
  • Why Deep Packet Inspection Analysis is Essential for Detecting IP Fraud by Dror Eshet — The IP and mobile broadband revolution is in full swing: time for fraud managers to totally rethink their existing controls and areas of exposure.  In this article, a fraud expert discusses the power of DPI technology and the key impact its analysis is having in an FM world where knowing what’s inside the packets is as important as figuring out where those IP packages are going.
  • Flexibility & Fraud Management Systems: 8 Questions for Luke Taylor of Neural Technologies interview with Luke Taylor — Meeting today’s fraud threats is not just about technology, but also the speed of threat detection, the scanning of data outliers, and being enormously flexible.  A leading fraud management vendor takes a bead on current FM issues and points to where software is headed.
  • Recruiting Smartphone Users as Partners in Telecom Fraud & Security Control by Tal Eisner — Premium Rate Service (PRS) fraud and spyware on a mobile phone can ruin an operator’s relationship with a  subscriber.  The attacker uses malware to automatically generate phone calls, SMSs and data sessions to high cost (premium) phone numbers.  This article discusses a new crowd sourcing mobile app that addresses the problem and helps operators better manage the threat.
  • Roaming — if Managed Correctly --  Can Be a Spark to Revenues by Brian Silvestri — Major analyst firms are predicting that roaming revenues will almost double in five years.  What’s more, roaming remains at the pivot point of Wireless Carrier strategy.  Drawing lessons from the incredible rise of AT&T’s Digital One Rate Plan, this article points to future challengtes and raises key  questions about how mobile operators will ultimately come to terms with smartphone market profitability, service quality, and data roaming.
  • What Makes Good Fraud Management Software?  9 Questions for Tal Eisner of cVidya interview with Tal Eisner — How do you know if the fraud management software you own or are considering is a good one?  That’s the starting point of a conversation Black Swan had with a product strategist of a leading FMS vendor.  The article discusses everything from maturity and customer collaboration... to PBX hacking and enabling the FMS to actually enhance the relationship a telco has with its enterprise customers.
  • International Revenue Share Fraud: Are We Winning the Battle Against Telecom Pirates? interview with Colin Yates — International Revenue Share Fraud (IRSF) is one of the telecom industry’s most enduring problems.  Yet many of us have only a foggy notion of how IRSF works and how operators around the globe are coping with the issue. This interview covers the bases: the origins of IRSF, typical fraud scenarios, efforts to get international cooperation on the issue, and the future outlook of IRSF.
  • Fraud Management at Kyivstar in Ukraine interview with Anton Pivala — Kyivstar from Ukraine is a leading mobile operator in both  voice service quality and consumer value.  This case study gives details on Kyivstar’s fraud control program, reveals some of the unique operator challenges faced in Eastern Europe, and explains how Kyivstar is successfully winning the battle against  IRSF and SIMbox fraud.
  • Converging Criminal and Technical Intelligence: Secret to Combating the Explosion in Telecom Fraud and Security Threats interview with Mark Johnson — A fraud and security expert gives a big picture talk on why industry convergence is driving the need for a broader “revenue risk intelligence.”  His prescription?  Yes, telecoms surely need to excel in technical  infrastructure such as traffic usage data, IP intrusion appliances, and physical barriers.  But just as important is the need to pair that knowledge with the real-life lessons of fighting criminals in general.
  • Gratifying Ghana: Why Listening to Operators Trumps Vendor Technology and Size interview with Ludvig Lindqvist — The value of technically excellent software is negated if the solution is not implemented right.  This article makes a strong case that vendors need to focus on first things first — get in full synch with a service provider’s business, capabilities and unique needs before you recommend or implement any software.  Topics discussed include: the benefits of retaining in-house expertise, implementation challenges in Africa, and the meaning of “thorough engagement” with the client.
  • Roaming Fraud: The Importance of Real-Time Data Exchange and Analysis interview with James Stewart — The Near Real Time Roaming Data Exchange (NRTRDE) is a GSM standard allowing operators to gain fast access to the roaming records of service providers half way around the world.  The article explains how 65 carriers are using this data to combat fraud through a service bureau.  Learn about the dangers of international roaming fraud and the value a roaming service bureau brings to the table.
  • Is the M2M Device in Your Refrigerator a Telecom Fraud Threat? interview with Simon Collins — Machine to machine (M2M) technology is being applied in hundreds of monitoring apps, such as smart metering and health diagnosis.  It’s even being used to monitor driving patterns tied to auto insurance rates.  But this article shows the serious M2M fraud and security threat that stem from the theft of the SIM/USIM device used in every M2M device.  The article discusses the RA and fraud strategies operators need to employ to manage the risks that will come from wider M2M deployments.
  • “Fraud Is a Wind that Always Blows” and Other Wisdom From a 28-Year Old Software Firm interview with Gary Beck — Here’s the amazing story of how Beck Computers was pulled out of a Tier 1 account only to be brought back in a few months later.  The article explores software vendor service and support challenges, real-time computing requirements, advanced fraud management functions, and ways to educate management on the value an FMS investment.
  • Insider Fraud: Detecting Criminal Activity in the Telecom Sales Process interview with Tal Eisner — One of the biggest problems telecoms now face is fraud done inside their offices, dealer stores and firewalls.  This type of fraud is especially dangerous because it’s performed by people fully authorized to transact for the company.  The story dicusses the major causes of insider fraud, presents a case study, and explains basic techniques that software uses to detect insider fraud.
  • Fraud & Credit Risk Software: Setting the Client Free to Innovate interview with Luke Taylor — Not every operator wants the freedom to configure its own fraud management solution, but certain providers wouldn‘t live without such a “framework” approach .  This article discusses: the reasons why operator choose this strategy as it covers many other fraud and credit software implementation issues.
  • Why Selling to Business Customers Makes You a High Risk Target for Fraud by David West — There’s a saying in the fraud business: “It’s not a question of whether you’ll be hit by fraud — only when, how bad, and from which direction.“  Citing four recent cases where operators were hit by fraud, this article explains why investing in a fraud soluiont — and keeping up-to-date — are so critical.  The article gives several examples of vulnerability points that fraudsters commonly exploit.