Communications Fraud Control Association Global Fraud Loss Survey

Size: px
Start display at page:

Download "Communications Fraud Control Association. 2013 Global Fraud Loss Survey"

Transcription

1 Communications Fraud Control Association 2013 Global Fraud Loss Survey

2 Overview Survey Type & Methodology Executive Summary Results Fraud Management Snapshot Top Fraud Methods & Types Top Countries Where Fraud Originates & Terminates Comparison of Fraud Trends 2013 Global Fraud Loss Estimate 2013 Estimated Fraud Losses by Method, Type, CSP Size and Region

3 Survey Type & Methodology Panel of Experts Survey: Surveys taken from fraud and security experts working within the industry who are directly involved in identifying and stopping communications fraud Responses were received from: 93 Communications Service Providers (CSPs) located throughout the industry and around the globe CSPs included both Small (<1K employees) and Large (100K+) CSPs included wireless, wireline, broadband, and narrowband service providers CSPs reported providing service in multiple areas including: voice, data, financial services, and content distribution

4 Executive Summary Highlights: 2013 Global Fraud Loss Estimate*: $46.3 Billion (USD) annually The 15% increase from 2011 is a result of increased fraudulent activity targeting the wireless industry. Approx. 2.09% of telecom revenues The 0.21% increase from 2011 is a result of fraud losses growing at a faster pace than global telecom revenues. 94% said global fraud losses had increased or stayed the same a 4% decrease from % said fraud had trended up or stayed the same within their company a 3% increase from Top 5 Fraud Methods Reported by Surveyed Companies: $5.22 B Subscription Fraud $4.42 B PBX Hacking $3.62 B Account Take Over / Identity Theft $3.62 B VoIP Hacking $3.35 B Dealer Fraud Top 5 Fraud Types Reported by Surveyed Companies : $6.11 B Roaming Fraud $5.32 B Wholesale Fraud $4.73 B Premium Rate Service $3.55 B Cable or Satellite Signal Theft $2.96 B Hardware Reselling *Note: In 2013 fraud classifications were divided into methods and type categories For more information please visit:

5 2013 CFCA Survey Results

6 In which region are you located? 35.0% 31.9% 30.0% 28.6% 25.0% 20.0% 15.0% 10.0% 8.8% 11.0% 8.8% 6.6% 5.0% 2.2% 2.2% 0.0% Asia South Pacific Central and South America North America Western Europe Eastern Europe Africa Middle East Note: Local, Regional, National and International CSPs participated in the survey

7 90% 80% 70% 60% 50% 40% 30% 20% 10% 2013 Survey Which services does your company provide? 0% Pre-paid Mobile Post-paid Mobile Fixed Line Services Cable & Satellite Wholesale Internet Other Voice (Examples: Local, Long Distance, & International) Data (Examples: VoIP & Over-the-Top, and other communication services.) Financial (Examples: mobile purchase & ecommerce) Content (Examples: IPTV, Advertising, etc.) Machine-to-Machine (Examples: Smart Meters, Cars, Sensors...)

8 How many employees are in your company? 3.6% 4.8% 17.9% 19.0% <1,000 1,001 to 5,000 5,001 to 10,000 10,001 to 50,000 50,001 to 100, , % 36.9% Note: Small, Medium and Large CSPs responded to the survey

9 How many subscribers does your company have? 4.8% 6.0% 8.4% 14.5% <10, % 10,001 to 1,000,000 1,000,001 to 10,000, % 33.7% 10,000,001 to 25,000,000 25,000,001 to 50,000,000 50,000,001 + Wholesale Only (no end user subscribers)

10 Where is your fraud department situated? Security 32.8% Operations IT 4.7% 17.2% Finance IT Operations Security Finance 45.3% 0% 10% 20% 30% 40% 50% Since 2011 about 8% of Fraud Departments have moved from under Finance to IT & Security; Other functional areas included Risk Management, Internal Audit, Revenue Assurance, Customer Care, Network Operations and Routing.

11 How many are in your Fraud department? 60% 50% 40% 36% 42% 51% 50% 30% 20% 10% 0% 27% 26% 26% 20% 12% Analysts Investigators Administrative & Case Management Other (please specify) Fraud departments grew by about 2% since However, larger departments reduced Fraud Analyst positions by about 5%. Notes: Other category includes staff managers and supervisors. Some CSPs reported revenue assurance and subpoena compliance personnel in their departments. Some CSPs also reported as little as one person on staff. 28% 16% 5% 5% 4% 2% 0% < 3 3 to 5 6 to to % 13% 13% 0%

12 When is your fraud department staffed? Holidays 15% 44% 44% 44% Off-Hours Coverage Provided by Another Organization Weekend 17% 41% 42% 50% Non-Business Hours (24 Hours) Extended Business Hours Weekdays 11% 32% 47% 65% Business Hours 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Off-hour coverage on weekends and weekdays grew by about 3% since 2011.

13 What functions apply to your current role and responsibilities? Vendor/Consultant Law Enforcement Security/Network Legal/Regulatory Finance/Billing/Revenue Assurance Customer Service Supervisory Fraud Detection End User Investigation Security/Physical Operations Sales/Marketing Non-Supervisory Fraud Investigation Systems Administrator 2.1% 10.6% 12.8% 10.6% 12.8% 8.5% 4.3% 10.6% 21.3% 25.5% 25.5% 36.2% 38.3% 40.4% 68.1% 76.6% 0.0% 10.0% 20.0% 30.0% 40.0% 50.0% 60.0% 70.0% 80.0%

14 Are you a member of any other organizations? CFCA 29% GSMA FF 33% DFF 2% TRMA 3% NCFTA 2% i3 3% CINNA 2% ATFRA 3% TM Forum (RA) 2% ETNO 8% FIINA 14% CFCA GSMA FF FIINA ETNO TM Forum (RA) ATFRA CINNA i3 NCFTA TRMA DFF Many CSPs reported being a member of more than one organization

15 How many fraud incidents does your department handle per month? < 50, 22.5% Estimated Monthly Case Volumes 51 to 100, 16.3% 1,001 +, 25.0% 101 to 500, 28.8% 501 to 1,000, 7.5% 200, , , , , ,000 80,000 60,000 40,000 20,000 Estimated Cases Annually Per Region - Asia Central and South America Western Europe Africa On average, fraud departments reported 117% more cases per month since The majority of these cases were reported by North American and Western European CSPs. 54,569 13,642 13, , ,812 68,211 South Pacific North America Eastern Europe Middle East 54,569 40,927

16 How many cases does your department refer to law enforcement per YEAR? 101 +; 11.4% 11 to 100; 34.3% None; 11.4% < 10; 42.9% Since 2011, there was no change in the number of CSPs not referring cases to law enforcement. CSPs that do refer cases reported an 11% increase.

17 Why do you think cases are not reported to law enforcement? 20.0% 18.0% 16.0% 14.0% 12.0% 10.0% 13.6% 18.2% 12.1% 18.2% 13.6% 19.7% Debt recovery pursued through civil means No faith in the judicial system to administer the right punishment to deter others No perceived value to the business Not referred due to lack of evidence 8.0% 6.0% 4.0% 2.0% 4.5% Perceived lack of interest by law enforcement to take the case Perceived lack of understanding by law enforcement to pursue the case Lack of resources 0.0% CSPs reported an increase in faith and confidence in law enforcement to pursue cases. However, many reported continued resource constraints in this area.

18 What do you view as the top 5 fraud methods GLOBALLY? 0% 2% 4% 6% 8% 10% 12% 14% Roaming Fraud 13% Wholesale Fraud 11% Premium Rate Service 10% Cable or Satellite 8% Hardware Reselling 6%

19 What do you view as the top 5 fraud types GLOBALLY? 0% 5% 10% 15% 20% International Revenue Share Fraud (IRSF) 16% Roaming Fraud 11% Premium Rate Service 10% Interconnect Bypass (e.g. SIM box) 9% Payment Fraud 7% In 2011, the top 5 fraud types were: PBX/VM Fraud, International Revenue Share Fraud, Subscription Fraud, Bypass Fraud and Roaming Fraud.

20 What do you view as the top 5 fraud methods at YOUR COMPANY? 0% 2% 4% 6% 8% 10% 12% Subscription Fraud 11% PBX Hacking 10% Account Takeover / Identity Take Over 8% VoIP Hacking 8% Dealer Fraud 7%

21 What do you view as the top 5 fraud types at YOUR COMPANY? 0% 2% 4% 6% 8% 10% 12% 14% Roaming Fraud 13% Wholesale Fraud 11% Premium Rate Service 10% Cable or Satellite 8% Hardware Reselling 6% In 2011, the top 5 fraud types were: PBX/VM Fraud, Subscription Fraud, International Revenue Share Fraud, Bypass Fraud and Credit Card Fraud.

22 What do you view as the top 5 EMERGING fraud methods GLOBALLY? 0% 2% 4% 6% 8% 10% 12% 14% PBX Hacking 12% Subscription Fraud 10% VoIP Hacking 10% Dealer Fraud 7% Account Takeover / Identity Take Over 6%

23 What do you view as the top 5 EMERGING fraud types GLOBALLY? % of Total Responses 0% 2% 4% 6% 8% 10% 12% 14% International Revenue Share Fraud (IRSF) 14% Roaming Fraud 10% Interconnect Bypass (e.g. SIM box) 9% Premium Rate Service 8% Domestic Revenue Share (DRSF) 8% In 2011, the top 5 fraud types were: PBX/VM Fraud, International Revenue Share Fraud, Bypass Fraud, Arbitrage and Subscription Fraud.

24 Fraud Methods in YOUR COMPANY 0% 2% 4% 6% 8% 10% 12% Subscription Fraud PBX Hacking Account Takeover / Identity Take Over VoIP Hacking Dealer Fraud Abuse of Service Terms & Conditions Abuse of network, device or configuration weakness- Social Engineering Stolen Credit Cards & Returned or Counterfeit Checks Voic Hacking Wangiri Pre-Paid Equipment & Services Phishing / Pharming (e.g. internet fraud) SMS Faking or Spoofing Network/IT Abuse (e.g. Internal fraud/employee theft) Unauthorized abuse of access (e.g. Customer Care System) Brand Name / Logo Abuse Clip-on Fraud Signalling Manipulation Mobile Malware Proxy Fraud SIM Cloning 4% 4% 4% 4% 4% 4% 3% 3% 3% 2% 2% 2% 2% 2% 1% 6% 5% 8% 8% 7% 10% 11%

25 Fraud Types in YOUR COMPANY 0% 2% 4% 6% 8% 10% 12% 14% Roaming Fraud Wholesale Fraud Premium Rate Service Cable or Satellite Hardware Reselling Service Reselling (e.g: Call Sell) IMEI Reprogramming Arbitrage Theft / Compromise of data (e.g. logins) Interconnect Bypass (e.g. SIM box) International Revenue Share Fraud (IRSF) Payment Fraud Theft of Content Denial of Service (DoS) and Distributed Denial of Service (DDoS) Theft / Stolen Goods Commissions Fraud Private Use Domestic Revenue Share (DRSF) Spamming 2% 2% 3% 3% 3% 3% 5% 5% 4% 4% 4% 4% 6% 6% 6% 8% 10% 11% 13%

26 % of Responses 2013 Survey Top 10 Countries That ORIGINATE Fraudulent Calls: 8% 7% 6% 7% 5% 4% 3% 4% 4% 3% 3% 3% 3% 3% 3% 2% 2% 1% 0% The top 3 countries remained unchanged from 2011.

27 % of Responses 2013 Survey Top 10 Countries Where Fraud TERMINATES: 10% 10% 9% 8% 8% 7% 6% 7% 6% 6% 5% 4% 3% 2% 1% 4% 4% 4% 4% 4% 0% Latvia Gambia Somalia Sierra Leone Guinea Cuba East Timor Lithuania Taiwan United Kingdom Cuba was the top response in 2011, showing a shift from Call Sell fraud to IRSF fraud

28 % of Responses 2013 Survey Over the past 12 months, do you think GLOBAL fraud losses have trended up, trended down, or stayed the same? 80.0% 70.0% 60.0% 59.0% 65.2% 70.5% 50.0% 40.0% 30.0% 20.0% 10.0% 0.0% 47.2% 37.4% 32.6% 20.5% 20.5% 23.0% 15.4% 6.6% 2.2% Trended UP Trended DOWN Stayed the SAME

29 % of Responses 2013 Survey Over the past 12 months, has fraud IN YOUR COMPANY trended up, trended down, or stayed the same? 70.0% 64.4% 60.0% 52.5% 50.0% 43.1% 40.0% 39.3% 40.0% 35.4% 35.0% 30.0% 20.0% 10.0% 25.0% 21.5% 11.1% 8.2% 24.4% 0.0% Trended UP Trended DOWN Stayed the SAME Note: In % of CSPs reported fraud had increased or stayed the same.

30 % of Responses 2013 Survey What percentage of bad debt is a result of fraud in YOUR COMPANY? 70.0% 63.8% 60.0% 50.0% 40.0% 30.0% 20.0% 22.4% 10.0% 0.0% 6.9% 5.2% 0.0% 1.7% < 10% 10-20% 21-30% 31-40% 41-50% > 50% In 2013 some CSPs reported >50% bad debt related to fraud

31 % of Responses 2013 Survey What percentage of the total GLOBAL telecom revenue base do you think is fraud? 30% 25% 26.3% 20% 15% 10% 12.3% 15.8% 17.5% 8.8% 10.5% 8.8% 5% 0% < 1% 1-2% 2-3% 3-4% 4-5% 5-10% > 10% In % believed fraud losses were 4-5%, 13% believed they were 5-10%, and 0% believed they were more than 10%.

32 % of Responses 2013 Survey What percentage of YOUR COMPANY S revenue base do you think is fraud? 50% 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% 45.6% 24.6% 12.3% 1.8% < 1% 1-2% 2-3% 3-4% 4-5% 5-10% > 10% In % believed fraud losses were 4-5%, 5% believed they were 5-10%, and 0% believed they were more than 10%. 3.5% 10.5% 1.8%

33 % of Responses 2013 Survey Comparison Between 2008, 2011 and % 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% Survey Results in YOUR COMPANY 23% 46% 46% 15% 25% 23% 13% 12% 11% 12% 2% < 1% 1-2% 2-3% 3-4% 4-5% 5-10% > 10% % 10% 14% 4% 27% 5% 11% 0% 0% 2%

34 % of Responses 2013 Survey Of the global telecom revenue base, what percentage do you think is fraud in YOUR COMPANY? 16% 14% 12% 10% 8% 6% 4% 2% 0% Asia South Pacific Fraud Losses by Region Central and South America North America Western Europe Eastern Europe < 1% 1-2% 2-3% 3-4% 4-5% 5-10% > 10% Africa Middle East

35 % of Responses 2013 Global Fraud Loss Estimate Of the global telecom revenue base, what percentage do you think is fraud? 18% 16% 14% 12% 10% 8% 6% 4% 2% Fraud Losses by Size 0% < 1% 1-2% 2-3% 3-4% 4-5% 5-10% > 10% <1,000,000 1,000,001 to 10,000,000 10,000,001 to 50,000,000 25,000,001 to 50,000,000 50,000,001 + Wholesale Only (no end user subscribers) CSPs with 1-10M subscribers reported the most fraud losses. In 2011 CSPs with 50M+ subscribers reported 34% fewer fraud losses.

36 Of the global telecom revenue base, what percentage do you think is fraud?* Fraud Loss as a % of Revenue <1,000,000 Fraud Losses by # of Subscribers 1,000,001 to 10,000,000 10,000,001 to 50,000,000 25,000,001 to 50,000,000 50,000,001+ Wholesale % Total Responses Adjusted Weights < 1% 9.34% 15.38% 8.24% 6.59% 3.85% 2.20% 45.60% 70.0% 1-2% 5.04% 8.30% 4.45% 3.56% 2.07% 1.19% 24.60% 23.3% 2-3% 2.52% 4.15% 2.22% 1.78% 1.04% 0.59% 12.30% 14.0% 3-4% 0.37% 0.61% 0.33% 0.26% 0.15% 0.09% 1.80% 9.7% 4-5% 0.72% 1.18% 0.63% 0.51% 0.30% 0.17% 3.50% 7.8% 5%-10% 2.15% 3.54% 1.90% 1.52% 0.89% 0.51% 10.50% 4.7% > 10% 0.37% 0.61% 0.33% 0.26% 0.15% 0.09% 1.80% 3.4% *Note: Percentages taken from losses reported by the CSPs occurring in their own companies.

37 2013 Estimated Global Telecom Revenues*: $2.214 Trillion (USD) 2013 Estimated Global Loss: $46.3 Billion (USD), or 2.09% Notes: Loss Calculation: ((CSP Size x % by Group) x Group Midpoint)/100) x Global Telecom Revenues Fraud loss weights based on CSP size helps avoid bias created when small and large CSP responses are combined. *Source: The Insight Research Corporation (Estimate for 2013)

38 Comparison to Previous Surveys Estimated Global Revenues Estimated Global Fraud Loss % Var $1.2 Trillion $1.7 Trillion $2.1 Trillion $2.2 Trillion +3.7% (USD) (USD) (USD) (USD) $61.3 Billion (USD) $60.1 Billion (USD) $40.1 Billion (USD) $46.3 Billion (USD) +15.4% % Loss* 5.11% 3.54% 1.88% 2.09% +0.21% $2,500,000 $2,000,000 $1,500,000 $1,000,000 $500,000 $ Est. Global Telecom Revenues Est. Global Fraud Loss In 2013, growth in global revenue outpaced reported fraud losses. However, as a percent of revenue, fraud is growing at a faster rate than in *Note: In 2011 losses were recalculated using a new methodology 6% 5% 4% 3% 2% 1% 0%

39 2013 Global Fraud Loss Estimate 2013 Estimated Fraud Losses by CSP Type (in $ USD Billions) $5.84 ; 12% $2.64 ; 6% $6.35 ; 14% $11.52 ; 25% $7.25 ; 16% $2.86 ; 6% $9.92 ; 21% Pre-paid Mobile Post-paid Mobile Fixed Line Services Cable & Satellite Wholesale Internet Other

40 2013 Global Fraud Loss Estimate 2013 Estimated Fraud Losses by Service Type (in $ USD Billions) $11.80 ; 25% $6.98 ; 15% $8.14 ; 18% $13.46 ; 29% $5.98 ; 13% Voice (Examples: Local, Long Distance, & International) Data (Examples: VoIP & Over-the- Top, other alternate communication services...) Financial (Examples: mobile purchase & ecommerce) Content (Examples: IPTV, Advertising, etc.) Machine-to-Machine (Examples: Smart Meters, Cars, Sensors...)

41 2013 Estimated Fraud Losses by Method (in $ USD Billions) Account Takeover / Identity Take Over; $3.6 VoIP Hacking; $3.6 Dealer Fraud; $3.3 Abuse of Service Terms & Conditions; $2.7 PBX Hacking; $4.4 Abuse of network, device or configuration weakness; $2.5 Social Engineering; $2.0 Subscription Fraud; $5.2 Wangiri; $2.0 Stolen Credit Cards & Returned or Counterfeit Checks; $2.0 SIM Cloning; $0.5 Proxy Fraud; $0.8 Mobile Malware; $0.8 Signalling Manipulation; $0.9 Clip-on Fraud; $0.9 Brand Name / Logo Abuse; $1.1 Unauthorized abuse of access (e.g. Customer Care System); $1.2 SMS Faking or Spoofing; $1.6 Network/IT Abuse (e.g. Internal fraud/employee theft); $1.3 Pre-Paid Equipment & Services; $1.9 Phishing / Pharming (e.g. internet fraud); $1.7 Voic Hacking; $2.0

42 2013 Estimated Fraud Losses by Type (in $ USD Billions) Wholesale Fraud; $5.3 Premium Rate Service; $4.7 Cable or Satellite; $3.5 Hardware Reselling; $3.0 Service Reselling (e.g: Call Sell); $2.8 Roaming Fraud; $6.1 IMEI Reprogramming; $2.6 Arbitrage; $2.2 Spamming; $0.8 Domestic Revenue Share (DRSF); $0.8 Private Use; $1.2 Commissions Fraud; $1.2 Theft / Compromise of data (e.g. logins); $2.2 Theft / Stolen Goods; $1.4 Denial of Service (DoS) and Distributed Denial of Service (DDoS); $1.4 Theft of Content; $1.8 Payment Fraud; $1.8 Interconnect Bypass (e.g. SIM box); $2.0 International Revenue Share Fraud (IRSF); $1.8

43 Estimated Fraud Losses by Method by Size Fraud Method <1,000,000 Abuse of network, device or configuration weakness 1,000,001 to 10,000,000 10,000,001 to 50,000,000 (In Billions $ USD) 25,000,001 to 50,000,000 50,000,001 + Wholesale Only (no end user subs) $0.52 $0.86 $0.46 $0.37 $0.21 $0.12 Abuse of Service Terms & Conditions $0.55 $0.90 $0.48 $0.39 $0.23 $0.13 Account Takeover / Identity Take Over $0.74 $1.22 $0.65 $0.52 $0.30 $0.17 Brand Name / Logo Abuse $0.22 $0.36 $0.19 $0.15 $0.09 $0.05 Clip-on Fraud $0.19 $0.32 $0.17 $0.14 $0.08 $0.05 Dealer Fraud $0.69 $1.13 $0.60 $0.48 $0.28 $0.16 Mobile Malware $0.16 $0.27 $0.15 $0.12 $0.07 $0.04 Network/IT Abuse (e.g. Internal fraud/employee theft) $0.27 $0.45 $0.24 $0.19 $0.11 $0.06 PBX Hacking $0.91 $1.49 $0.80 $0.64 $0.37 $0.21 Phishing / Pharming (e.g. internet fraud) $0.36 $0.59 $0.31 $0.25 $0.15 $0.08 Pre-Paid Equipment & Services $0.38 $0.63 $0.34 $0.27 $0.16 $0.09 Proxy Fraud $0.16 $0.27 $0.15 $0.12 $0.07 $0.04 Signalling Manipulation $0.19 $0.32 $0.17 $0.14 $0.08 $0.05 SIM Cloning $0.11 $0.18 $0.10 $0.08 $0.05 $0.03 SMS Faking or Spoofing $0.33 $0.54 $0.29 $0.23 $0.14 $0.08 Social Engineering $0.41 $0.68 $0.36 $0.29 $0.17 $0.10 Stolen Credit Cards & Returned or Counterfeit Checks $0.41 $0.68 $0.36 $0.29 $0.17 $0.10 Subscription Fraud $1.07 $1.76 $0.94 $0.75 $0.44 $0.25 Unauthorized abuse of access (e.g. Customer Care System) $0.25 $0.41 $0.22 $0.17 $0.10 $0.06 Voic Hacking $0.41 $0.68 $0.36 $0.29 $0.17 $0.10 VoIP Hacking $0.74 $1.22 $0.65 $0.52 $0.30 $0.17 Wangiri $0.41 $0.68 $0.36 $0.29 $0.17 $0.10 Total $9.49 $15.63 $8.37 $6.70 $3.91 $2.23

44 Estimated Fraud Losses by Fraud Type by Size Fraud Type <1,000,000 1,000,001 to 10,000,000 10,000,001 to 50,000,000 (In Billions $ USD) 25,000,001 to 50,000,000 50,000,001 + Wholesale Only (no end user subs) Arbitrage $0.44 $0.73 $0.39 $0.31 $0.18 $0.10 Cable or Satellite $0.73 $1.20 $0.64 $0.51 $0.30 $0.17 Commissions Fraud $0.24 $0.40 $0.21 $0.17 $0.10 $0.06 Denial of Service (DoS) and Distributed Denial of Service (DDoS) $0.28 $0.47 $0.25 $0.20 $0.12 $0.07 Domestic Revenue Share (DRSF) $0.16 $0.27 $0.14 $0.11 $0.07 $0.04 Hardware Reselling $0.61 $1.00 $0.53 $0.43 $0.25 $0.14 IMEI Reprogramming $0.52 $0.86 $0.46 $0.37 $0.22 $0.12 Interconnect Bypass (e.g. SIM box) $0.40 $0.67 $0.36 $0.29 $0.17 $0.10 International Revenue Share Fraud (IRSF) $0.36 $0.60 $0.32 $0.26 $0.15 $0.09 Payment Fraud $0.36 $0.60 $0.32 $0.26 $0.15 $0.09 Premium Rate Service $0.97 $1.60 $0.86 $0.68 $0.40 $0.23 Private Use $0.24 $0.40 $0.21 $0.17 $0.10 $0.06 Roaming Fraud $1.25 $2.06 $1.10 $0.88 $0.52 $0.29 Service Reselling (e.g: Call Sell) $0.57 $0.93 $0.50 $0.40 $0.23 $0.13 Spamming $0.16 $0.27 $0.14 $0.11 $0.07 $0.04 Theft / Compromise of data (e.g. logins) $0.44 $0.73 $0.39 $0.31 $0.18 $0.10 Theft / Stolen Goods $0.28 $0.47 $0.25 $0.20 $0.12 $0.07 Theft of Content $0.36 $0.60 $0.32 $0.26 $0.15 $0.09 Wholesale Fraud $1.09 $1.80 $0.96 $0.77 $0.45 $0.26 Total $9.49 $15.63 $8.37 $6.70 $3.91 $2.23

45 Estimated Fraud Losses by Method by Region Fraud Method Asia South Pacific Central and South America North America Western Europe Eastern Europe Africa Middle East Abuse of network, device or configuration weakness $0.22 $0.06 $0.06 $0.73 $0.81 $0.28 $0.22 $0.17 Abuse of Service Terms & Conditions $0.24 $0.06 $0.06 $0.77 $0.85 $0.29 $0.24 $0.18 Account Takeover / Identity Take Over $0.32 $0.08 $0.08 $1.03 $1.15 $0.40 $0.32 $0.24 Brand Name / Logo Abuse $0.09 $0.02 $0.02 $0.31 $0.34 $0.12 $0.09 $0.07 Clip-on Fraud $0.08 $0.02 $0.02 $0.27 $0.30 $0.10 $0.08 $0.06 Dealer Fraud $0.29 $0.07 $0.07 $0.96 $1.07 $0.37 $0.29 $0.22 Mobile Malware $0.07 $0.02 $0.02 $0.23 $0.26 $0.09 $0.07 $0.05 Network/IT Abuse (e.g. Internal fraud/employee theft) $0.12 $0.03 $0.03 $0.38 $0.43 $0.15 $0.12 $0.09 PBX Hacking $0.39 $0.10 $0.10 $1.26 $1.41 $0.49 $0.39 $0.29 Phishing / Pharming (e.g. internet fraud) $0.15 $0.04 $0.04 $0.50 $0.55 $0.19 $0.15 $0.11 Pre-Paid Equipment & Services $0.16 $0.04 $0.04 $0.54 $0.60 $0.21 $0.16 $0.12 Proxy Fraud $0.07 $0.02 $0.02 $0.23 $0.26 $0.09 $0.07 $0.05 Signalling Manipulation $0.08 $0.02 $0.02 $0.27 $0.30 $0.10 $0.08 $0.06 SIM Cloning $0.05 $0.01 $0.01 $0.15 $0.17 $0.06 $0.05 $0.04 SMS Faking or Spoofing $0.14 $0.04 $0.04 $0.46 $0.51 $0.18 $0.14 $0.11 Social Engineering $0.18 $0.04 $0.04 $0.57 $0.64 $0.22 $0.18 $0.13 Stolen Credit Cards & Returned or Counterfeit Checks $0.18 $0.04 $0.04 $0.57 $0.64 $0.22 $0.18 $0.13 Subscription Fraud $0.46 $0.11 $0.11 $1.49 $1.66 $0.57 $0.46 $0.34 Unauthorized abuse of access (e.g. Customer Care System) $0.11 $0.03 $0.03 $0.34 $0.38 $0.13 $0.11 $0.08 Voic Hacking $0.18 $0.04 $0.04 $0.57 $0.64 $0.22 $0.18 $0.13 VoIP Hacking $0.32 $0.08 $0.08 $1.03 $1.15 $0.40 $0.32 $0.24 Wangiri $0.18 $0.04 $0.04 $0.57 $0.64 $0.22 $0.18 $0.13 Total $4.07 $1.02 $1.02 $13.24 $14.76 $5.09 $4.07 $3.05 (In Billions $ USD)

46 2011 Survey Estimated Fraud Losses by Fraud Type by Region Fraud Type Asia South Pacific Central and South America North America Western Europe Eastern Europe Africa Middle East Arbitrage $0.19 $0.05 $0.05 $0.62 $0.69 $0.24 $0.19 $0.14 Cable or Satellite $0.31 $0.08 $0.08 $1.01 $1.13 $0.39 $0.31 $0.23 Commissions Fraud $0.10 $0.03 $0.03 $0.34 $0.38 $0.13 $0.10 $0.08 Denial of Service (DoS) and Distributed Denial of Service (DDoS) $0.12 $0.03 $0.03 $0.39 $0.44 $0.15 $0.12 $0.09 Domestic Revenue Share (DRSF) $0.07 $0.02 $0.02 $0.23 $0.25 $0.09 $0.07 $0.05 Hardware Reselling $0.26 $0.06 $0.06 $0.84 $0.94 $0.32 $0.26 $0.19 IMEI Reprogramming $0.23 $0.06 $0.06 $0.73 $0.82 $0.28 $0.23 $0.17 Interconnect Bypass (e.g. SIM box) $0.17 $0.04 $0.04 $0.56 $0.63 $0.22 $0.17 $0.13 International Revenue Share Fraud (IRSF) $0.16 $0.04 $0.04 $0.51 $0.57 $0.19 $0.16 $0.12 Payment Fraud $0.16 $0.04 $0.04 $0.51 $0.57 $0.19 $0.16 $0.12 Premium Rate Service $0.42 $0.10 $0.10 $1.35 $1.51 $0.52 $0.42 $0.31 Private Use $0.10 $0.03 $0.03 $0.34 $0.38 $0.13 $0.10 $0.08 Roaming Fraud $0.54 $0.13 $0.13 $1.75 $1.95 $0.67 $0.54 $0.40 Service Reselling (e.g: Call Sell) $0.24 $0.06 $0.06 $0.79 $0.88 $0.30 $0.24 $0.18 Spamming $0.07 $0.02 $0.02 $0.23 $0.25 $0.09 $0.07 $0.05 Theft / Compromise of data (e.g. logins) $0.19 $0.05 $0.05 $0.62 $0.69 $0.24 $0.19 $0.14 Theft / Stolen Goods $0.12 $0.03 $0.03 $0.39 $0.44 $0.15 $0.12 $0.09 Theft of Content $0.16 $0.04 $0.04 $0.51 $0.57 $0.19 $0.16 $0.12 Wholesale Fraud $0.47 $0.12 $0.12 $1.52 $1.70 $0.58 $0.47 $0.35 Total $4.07 $1.02 $1.02 $13.24 $14.76 $5.09 $4.07 $3.05 (In Billions $ USD)

47 Fraud Method Definitions: Fraud Method Description Abuse of network, device or configuration weakness--exploitation of a configuration Exploitation of a configuration weakness to gain access to a network or device weakness to gain access to a network or device Abuse of Service Terms & Conditions Violation of the carrier's service terms and conditions or acceptable use policy Account Takeover / Identity Take Over Brand Name / Logo Abuse Clip-on Fraud Dealer Fraud Mobile Malware Network/IT Abuse (e.g. Internal fraud/employee theft) PBX Hacking Use of identity information (real or synthetic ID theft) to obtain a new account or to gain access to an existing account Acquisition and use of a company's logo without permission Stealing service by attaching wires to another customer's phone equipment All types of fraud conducted by indirect and 3rd party dealers Compromised mobile applications Theft of service or equipment by employees Compromised PBX systems used to make calls Phishing / Pharming (e.g. internet fraud) Pre-Paid Equipment & Services Proxy Fraud Signalling Manipulation SIM Cloning SMS Faking or Spoofing Social Engineering Stolen Credit Cards & Returned or Counterfeit Checks Subscription Fraud Unauthorized abuse of access (e.g. Customer Care System) Voic Hacking VoIP Hacking Wangiri Stealing bandwidth, hacking, phishing, vishing, etc. All types of fraud and abuse involving pre-paid equipment and services Manipulation of the IP address to hide someone's true origination or identity Manipulation of the SIP or SS7 signaling message to hide the true origination or identity of a caller Duplicated SIM card used to charge phone calls back to the original SIM card Manipulation of the ANI to hide the true origination or identity of the caller Manipulation of an employee or customer to unintentionally give out important information All types of fraud involving stolen credit cards, returned or counterfeit checks Use of service with no intent to pay Unauthorized abuse of company's credit and adjustment policy Compromised Voic systems used to make calls Compromised VoIP equipment such as an IP PBX or Modem used to make fraudulent calls Call-back fraud schemes

48 Fraud Type Definitions: Fraud Type Description Arbitrage Exploitation of the differences in rates between different countries Cable or Satellite Commissions Fraud Denial of Service (DoS) and Distributed Denial of Service (DDoS) Domestic Revenue Share (DRSF) Hardware Reselling IMEI Reprogramming Signal theft or retransmission from a cable or satellite provider Schemes used by dealers to collect additional commissions and spiffs An explicit attempt to make a machine or network resource unavailable to the users of a service Abuse of Carrier Interconnect agreements through such things as Traffic Pumping, Switch Access Stimulation, 8yy Dip Pumping & CNAM Revenue pumping schemes Resold handsets or equipment Changing the IMEI of a handset to hide the true origination or identity of a caller Interconnect Bypass (e.g. SIM box) International Revenue Share Fraud (IRSF) Payment Fraud Premium Rate Service Private Use Roaming Fraud Service Reselling (e.g: Call Sell) Spamming Theft / Compromise of data (e.g. logins) Theft / Stolen Goods Theft of Content Wholesale Fraud Unauthorized insertion of traffic onto another carriers network. This includes Interconnect Fraud and GSM Gateway Fraud or SIM Boxing. Artificial inflation of traffic terminating to international revenue share providers Includes items such as charge-backs, returned checks, card holder not present, etc. Artificial inflation of traffic terminating to premium service providers Use of a service neither directly nor indirectly paid for without rendering some kind of financial compensation All types of fraud and abuse involving roaming Resale of stolen phone service to other people Use of electronic messaging systems to send unsolicited bulk messages Includes such things as the acquisition of personal information or intellectual property Equipment Theft Stealing content such as ringtones, games, or applications Exploitation of wholesale interconnect agreements

49 About Communications Fraud Communications fraud is the use of telecommunications products or services with no intention of payment. Fraud negatively impacts everyone, including residential and commercial customers. The losses increase the communications carriers operating costs. Although communications operators have increased measures to minimize fraud and reduce their losses, criminals continue to abuse communications networks and services. Therefore, communications operators tend to keep their actual loss figures and their plans for corrective measures confidential. Due to the sensitive nature of this topic, CFCA used a confidential opinion survey of global communications operators to support the global fraud loss study.

50 About CFCA CFCA is a not-for-profit global educational association that is working to combat communications fraud. The mission of the CFCA is to be the premier international association for revenue assurance, loss prevention and fraud control through education and information. By promoting a close association among telecommunications fraud security personnel, CFCA serves as a forum and clearinghouse of information pertaining to the fraudulent use of communications services. For more information, visit CFCA at

51 Communications Fraud Control Association 4 Becker Farm Road 4 th Floor PO BOX 954 Roseland, NJ Phone Fax fraud@cfca.org website Roberta Aronoff Executive Director

Fighting Future Fraud A Strategy for Using Big Data, Machine Learning, and Data Lakes to Fight Mobile Communications Fraud

Fighting Future Fraud A Strategy for Using Big Data, Machine Learning, and Data Lakes to Fight Mobile Communications Fraud Fighting Future Fraud A Strategy for Using Big Data, Machine Learning, and Data Lakes to Fight Mobile Communications Fraud Authored by: Dr. Ian Howells Dr. Volkmar Scharf-Katz Padraig Stapleton 1 TABLE

More information

TELECOM FRAUD CALL SCENARIOS

TELECOM FRAUD CALL SCENARIOS TELECOM FRAUD CALL SCENARIOS Contents Introduction to Telecom Fraud... 2 Three Major Categories of Telecom Fraud... 2 Premium Rate Numbers... 2 Traffic Pumping Schemes... 2 Call Forwarding Fraud... 3 Multiple

More information

Anti Fraud Services. Associate Member of..

Anti Fraud Services. Associate Member of.. Anti Fraud Services Associate Member of.. Fraud Context: Global Risk Fraud losses as a percentage of global telecom revenues were estimated at 2.09% in 2013 by the Communications Fraud Control Association

More information

WHAT THE FRAUD? A Look at Telecommunications Fraud and Its Impacts

WHAT THE FRAUD? A Look at Telecommunications Fraud and Its Impacts WHAT THE FRAUD? A Look at Telecommunications Fraud and Its Impacts OUTLINE Overview...3 What is Telecom Fraud...4 Different Types of Fraud...5 A Look at the Top 5...6 What is a PBX... 10 PBX Hacking A

More information

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== Table of Contents Introduction to VoIP Security... 2 Meet Our Expert - Momentum Telecom... 2 BroadWorks... 2 VoIP Vulnerabilities... 3 Call

More information

Telecommunications Fraud Organized approaches to fight it

Telecommunications Fraud Organized approaches to fight it Telecommunications Fraud Organized approaches to fight it Presentation for FIRST Technical Colloquium February 7. 2000 By Security Supervisor Keld Frimann Nielsen Tele Denmark Agenda Telecommunications

More information

International Dialing and Roaming: Preventing Fraud and Revenue Leakage

International Dialing and Roaming: Preventing Fraud and Revenue Leakage page 1 of 7 International Dialing and Roaming: Preventing Fraud and Revenue Leakage Abstract By enhancing global dialing code information management, mobile and fixed operators can reduce unforeseen fraud-related

More information

INTRODUCTION TO VOIP FRAUD

INTRODUCTION TO VOIP FRAUD INTRODUCTION TO VOIP FRAUD Contents Introduction to VoIP Fraud... 2 What constitutes VoIP Fraud?... 2 Who does VoIP fraud affect?... 2 Where does VoIP fraud come from?... 3 How big of a problem is VoIP

More information

Fraud Overview. Agenda. TAF Regional Seminar on Costs and Tariffs, 28-31 January 2008, Djibouti. Peter Hoath peter.hoath@bt.com

Fraud Overview. Agenda. TAF Regional Seminar on Costs and Tariffs, 28-31 January 2008, Djibouti. Peter Hoath peter.hoath@bt.com Fraud Overview TAF Regional Seminar on Costs and Tariffs, 28-31 January 2008, Djibouti Peter Hoath peter.hoath@bt.com Agenda Fraud introduction and overview Standard fraud types Some more recent fraud

More information

International Carriers

International Carriers International Carriers combatting by-pass fraud with Orange expertise and services Pierre Paufique December 2014 Anti-Fraud Interconnect Roaming & Supervision of Transactions 2014 why we should fight by-pass

More information

FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem

FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem FIGHTING FRAUD ON 4G Neutralising threats in the LTE ecosystem TABLE OF CONTENTS Introduction...3 New and Old Vulnerabilities...4 Identity Management...5 A Unified Response...6 Data Mining...7 An Evolving

More information

Solving the SMS Revenue Leakage Challenge

Solving the SMS Revenue Leakage Challenge Whitepaper Table of Contents 1 Background 2 SMS fraud technical overview 3 Affected parties 4 Common methodologies 5 Ways to control the different types of SMS fraud Solving the SMS Revenue Leakage Challenge

More information

[PRIVATE LABEL TELEPHONY SOLUTION]

[PRIVATE LABEL TELEPHONY SOLUTION] POWERED BY: [PRIVATE LABEL TELEPHONY SOLUTION] DISTRIBUTION UNDER 3NG NETWORKS NON-DISCLOSURE AGREEMENT ONLY Table of Contents INTRODUCTION:... 3 MISSION:... 4 OVERVIEW:... 5 WHAT DO OUR PARTNERS GET WITH

More information

Control Traffic from Grey Routes and Boost Enterprise Messaging Revenue

Control Traffic from Grey Routes and Boost Enterprise Messaging Revenue SAP Brief SAP Mobile Services SAP SMS Firewall 365 Objectives Control Traffic from Grey Routes and Boost Enterprise Messaging Revenue Cloud-based managed service helps control messaging abuse Cloud-based

More information

FACT SHEET MOBILES: SERVICE PROVIDER GSM POSTPAID RESALE

FACT SHEET MOBILES: SERVICE PROVIDER GSM POSTPAID RESALE FLEXIBLE MOBILE SOLUTIONS GSM Postpaid Resale lets customers manage, brand and market their own mobile products by reselling GSM circuit-switched voice and data services using Telstra s GSM network. We

More information

Definitions of the Telecommunication indicators used in the EUROSTAT telecommunications inquiry

Definitions of the Telecommunication indicators used in the EUROSTAT telecommunications inquiry Definitions of the Telecommunication indicators used in the EUROSTAT telecommunications inquiry Table 1 Operators (Unit: number (NBR)) Number of active operators (only active) offering publicly available

More information

Voice Over IP is it hype or can it work for me? By American Business Communication Inc.

Voice Over IP is it hype or can it work for me? By American Business Communication Inc. Voice Over IP is it hype or can it work for me? By American Business Communication Inc. In the world of telecom, it seems like everywhere you turn there is a buzz about Voice over IP (VoIP). Hardly a day

More information

PBX Fraud Educational Information for PBX Customers

PBX Fraud Educational Information for PBX Customers PBX Fraud Educational Information for PBX Customers Telephone Hackers Hit Where It Hurts: Your Wallet Telephone hacking is unauthorized or fraudulent activities that can affect your telephone system, and

More information

An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks An Oracle White Paper December 2013 The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks Introduction Today s mobile networks are no longer limited to voice calls. With

More information

How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation

How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation Introduction Enterprises are continuing to convert and

More information

These terms are product specific terms which apply to the AdamMobile Services.

These terms are product specific terms which apply to the AdamMobile Services. CONDITIONS OF SERVICE ADAMMOBILE SERVICES 1. ABOUT These terms are product specific terms which apply to the AdamMobile Services. 2. APPLICATION We will supply the AdamMobile Service to you pursuant to

More information

Masters Seminar 2015. Privacy, security and fraud detection solutions for communication services

Masters Seminar 2015. Privacy, security and fraud detection solutions for communication services Masters Seminar 2015 Privacy, security and fraud detection solutions for communication services Agenda 1. Your Team 2. Organizational Issues 3. Introduction to the Topics 4. Distribution of Topics 5. Scientific

More information

Callika Internet Telephony Voice Over IP (VoIP) Private Label Reseller Program

Callika Internet Telephony Voice Over IP (VoIP) Private Label Reseller Program Callika Internet Telephony Voice Over IP (VoIP) Private Label Reseller Program Start selling VoIP services with no minimum investment no equipment purchases no hidden fees 1 888 276 8881 info@callika.com

More information

Enabling Innovation with KPI-based Service Management Operator Key Performance Indicators (KPIs)

Enabling Innovation with KPI-based Service Management Operator Key Performance Indicators (KPIs) www.pipelinepub.com Volume 5, Issue 5 Enabling Innovation with KPI-based Service Management Operator Key Performance Indicators (KPIs) Operators encounter it daily: They work to provide their subscribers

More information

How much mobile fraud goes under your Radar?

How much mobile fraud goes under your Radar? How much mobile fraud goes under your Radar? John Hurley, Chief Product Manager Executive Summary Mobile Operators are involved in a constant cat-and-mouse struggle with fraudsters who continually alter

More information

Executive Summary. August 2015. Technology Research Institute (TRI) 1245 N. Rocky Mountain Drive Effort of the Poconos, PA 18330

Executive Summary. August 2015. Technology Research Institute (TRI) 1245 N. Rocky Mountain Drive Effort of the Poconos, PA 18330 Telecom Fraud Management Services, Software & Strategies Executive Summary August 2015 Technology Research Institute (TRI) 1245 N. Rocky Mountain Drive Effort of the Poconos, PA 18330 Tel: 570--620-2320

More information

CONSULTATION. National Numbering Plan Review. A short Consultation issued by the Telecommunications Regulatory Authority 28 August 2007

CONSULTATION. National Numbering Plan Review. A short Consultation issued by the Telecommunications Regulatory Authority 28 August 2007 National Numbering Plan Review A short Consultation issued by the Telecommunications Regulatory Authority 28 August 2007 The address for responses to this document is: The General Director, Telecommunications

More information

What Makes Good Fraud Management Software? 9 Questions for Tal Eisner of cvidya

What Makes Good Fraud Management Software? 9 Questions for Tal Eisner of cvidya What Makes Good Fraud Management Software? 9 Questions for Tal Eisner of cvidya An Article by Tal Eisner, Senior Director Product Strategy at cvidya, January 2013. Tal Eisner Senior Director Product Strategy

More information

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft OVERVIEW 2 1. Cyber Crime Unit organization 2. Legal framework 3. Identity theft modus operandi 4. How to avoid online identity theft 5. Main challenges for investigation 6. Conclusions ORGANIZATION 3

More information

NAPCS Product List for NAICS 517: Telecom Products

NAPCS Product List for NAICS 517: Telecom Products NAPCS List for NAICS 517: Telecom s 1 2 3 4 5 6 7 8 9 National 1.1 X Carrier services and Internet backbone services Providing wired or wireless facilities to originate, terminate or transit voice or data

More information

NineStar Connect MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION. Policy Statement:

NineStar Connect MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION. Policy Statement: Policy Statement: NineStar Connect MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION The following policies apply to mass market broadband Internet services offered by NineStar Connect. NineStar

More information

hubbing international wholesale solutions our solution in brief TDM / IP voice Orange, a major player in the wholesale market

hubbing international wholesale solutions our solution in brief TDM / IP voice Orange, a major player in the wholesale market international wholesale solutions hubbing TDM / IP voice, a major player in the wholesale market Choose reliability and quality: Take advantage of our in-depth knowledge of the industry resulting from

More information

Brief Company Profile

Brief Company Profile Brief Company Profile Who we are TALINDA EAST AFRICA is a highly innovative, technology driven and customer focused organization; Our solutions focus on enabling businesses save cost, increase their operational

More information

Preventing Telecommunication Fraud in Machine-to Machine Communications

Preventing Telecommunication Fraud in Machine-to Machine Communications Preventing Telecommunication Fraud in Machine-to Machine Communications Introduction Machine to Machine (M2M) Communications and the related concept of Embedded Mobile refer to the communication between

More information

Fraud Detection for Next-Generation Networks

Fraud Detection for Next-Generation Networks Fraud Detection for Next-Generation Networks Name of company/ies submitting case study: University of Deusto Web links to company/ies submitting case studies: http://www.deusto.es http://www.fundacion-deusto.deusto.es/

More information

AWITEL solution and services for PTTs:

AWITEL solution and services for PTTs: AWITEL solution and services for PTTs: AWITEL Voice Traffic Solutions for Carriers using IP backbone AWITEL supports PTTs; International carriers and service providers with high quality voice/data traffic

More information

Rules of Operation for Contact Centers Operators

Rules of Operation for Contact Centers Operators Rules of Operation for Contact Centers Operators The purpose of this document is to clarify the rules of operation for Contact Centers services, the process of applications and decision making procedures

More information

International roaming explained

International roaming explained International roaming explained Africa Contents 1. Mobile roaming explained 1. Mobile roaming explained... 1 2. Mobile roaming in Africa... 5 3. Price trends... 10 4. Impact of regulation... 11 5. Best

More information

Service Specific Terms & Conditions

Service Specific Terms & Conditions These Service Specific Terms and Conditions together with the General Terms and Conditions and the Service Specific Terms and Conditions for Mobile Services apply when We provide to You mobile data services

More information

VOIP THEFT OF SERVICE: PROTECTING YOUR NETWORK ======

VOIP THEFT OF SERVICE: PROTECTING YOUR NETWORK ====== VOIP THEFT OF SERVICE: PROTECTING YOUR NETWORK ====== Table of Contents Introduction to VoIP Theft of Service... 2 Meet Our Expert Phone Power... 2 The Anatomy of International Revenue Sharing Fraud...

More information

Fraud Associate Course Description

Fraud Associate Course Description Fraud Associate Course Description Revenue Intelligence elearning cvidya Education Center addresses a market demand for high quality Revenue Assurance (RA) and Fraud Management (FM) training in an elearning

More information

Concept Note. powering the ROC. PBX Hacking. www.subex.com

Concept Note. powering the ROC. PBX Hacking. www.subex.com Concept Note powering the ROC PBX Hacking Introduction A PABX/PBX (Private (Automatic) Branch exchange) is telephone equipment that is installed on corporate premises to provide a number of telephone extensions

More information

SMS Reseller Glossary of Terms These terms are all specific to the SMS Reseller industry and not Mobile Marketing as a whole.

SMS Reseller Glossary of Terms These terms are all specific to the SMS Reseller industry and not Mobile Marketing as a whole. SMS Reseller Glossary of Terms These terms are all specific to the SMS Reseller industry and not Mobile Marketing as a whole. Aggregator A company that pushes applications to content providers and mobile

More information

Award-winning VoIP business solutions VOIP SOLUTIONS DIALEXIA.COM / INFO@DIALEXIA.COM

Award-winning VoIP business solutions VOIP SOLUTIONS DIALEXIA.COM / INFO@DIALEXIA.COM Award-winning VoIP business solutions Breaking Communications Barriers 13 years of innovations in VoIP Dialexia Communications is an award-winning telecom software & services company established in 2001

More information

Three Ways to Reduce Exposure to Bypass Fraud The Risk Management Group

Three Ways to Reduce Exposure to Bypass Fraud The Risk Management Group Three Ways to Reduce Exposure to Bypass Fraud The Risk Management Group May 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,

More information

Identifying Security. Payment System. Federal Reserve Bank. Ellen Richey Chief Enterprise Risk Officer Visa Inc. Visa Public

Identifying Security. Payment System. Federal Reserve Bank. Ellen Richey Chief Enterprise Risk Officer Visa Inc. Visa Public Identifying Security Issues in the Retail Payment System Federal Reserve Bank Chicago Ellen Richey Chief Enterprise Risk Officer Visa Inc. June 5, 2008 Agenda 1. The Data Security Landscape 2. Recent Trends

More information

How To Make A Cell Phone Converged Into A Cell Network

How To Make A Cell Phone Converged Into A Cell Network MPLS: Enabling Fixed-Mobile Convergence Barry M. Tishgart Vice President, Managed Services 2006 11 10 SPRINT, the "Going Forward" logo, the NEXTEL name and logo and other trademarks are trademarks of Sprint

More information

PBX Fraud Information

PBX Fraud Information PBX Fraud Information Increasingly, hackers are gaining access to corporate phone and/or voice mail systems. These individuals place long distance and international calls through major telecom networks

More information

WESTLINK MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION

WESTLINK MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION WESTLINK MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION The following policies apply to mass market mobile broadband Internet services offered by WestLink. It is WestLink s policy to provide

More information

MVNO Solution for Highly Profitable Global Roaming Services

MVNO Solution for Highly Profitable Global Roaming Services MVNO Solution for Highly Profitable Global Roaming Services A Guide to Help You Provide Highly Profitable Mobile Voice, Data and SMS Services to Travelers www.telinta.com +1 (888) 888-3307 +1 (973) 467-3364

More information

Managed VoIP platform for delivering business class features to your clients. Deliver reliable Voice Over IP service without licensing costs

Managed VoIP platform for delivering business class features to your clients. Deliver reliable Voice Over IP service without licensing costs Managed VoIP platform for delivering business class features to your clients. Deliver reliable Voice Over IP service without licensing costs HOW TO BECOME A VOIP PROVIDER WITHOUT THE HEFTY COSTS? Start

More information

Call-Blocking Technology

Call-Blocking Technology Call-Blocking Technology MODERATOR: Bikram Bandy, FTC PANELISTS: Andrew Whitt, Verizon Communications Jeff Stalnaker, PrivacyStar Matt Stein, Primus Telecommunications Canada Inc. Andrew Whitt Director

More information

ADVOSS SIP APPLICATION SERVERS

ADVOSS SIP APPLICATION SERVERS ADVOSS SIP APPLICATION SERVERS PRODUCT DATA SHEET COPYRIGHT ADVOSS.COM, 2007 2011 ALL RIGHTS RESERVED This document is property of AdvOSS Page 1 TABLE OF CONTENTS 1 AdvOSS SIP Application Servers... 3

More information

Cheap International Calls

Cheap International Calls Address Suite 1003 10F Chung Shueng Building 9 Queen Victoria Street Central, Hong Kong SAR Phone: HKG: +852 3693 1593 China: +86 134 8088 3515 India: +91 80 4180 0986 UK: +44 20 3411 5665 Internet www.cheapintlcalls.com

More information

CCT Telecomm offers the following tips to ensure your protection from phone fraud at your home or business:

CCT Telecomm offers the following tips to ensure your protection from phone fraud at your home or business: Fraud FAQs Telephone and Internet fraud happens every day. It rings up billions in fraudulent phone charges and victimizes millions of people a year. It can happen in public, in your home, at your business

More information

SERVICE SCHEDULE & ADDITIONAL TERMS AND CONDITIONS FOR DIRECT WHOLESALE INTERCONNECT VOICE SERVICE

SERVICE SCHEDULE & ADDITIONAL TERMS AND CONDITIONS FOR DIRECT WHOLESALE INTERCONNECT VOICE SERVICE SERVICE SCHEDULE & ADDITIONAL TERMS AND CONDITIONS FOR DIRECT WHOLESALE INTERCONNECT VOICE SERVICE The following terms and conditions are additional to those in the prevailing Viatel General Terms and

More information

Post, Broadcasting & Telecommunications Annual Market Review 2012/2013

Post, Broadcasting & Telecommunications Annual Market Review 2012/2013 Post, Broadcasting & Telecommunications Annual Market Review 2012/2013 Legal Disclaimer 2 Contents 5 10 14 18 24 28 32 35 36 3 Overview Godfrey Mutabazi Executive Director This review presents the performance

More information

Managed Services Billing Platform For MVNOs

Managed Services Billing Platform For MVNOs Managed Platform For MVNOs Search for local partners (MVNEs) One Business Avenue / One Address for Business Development About One Business Avenue One Address for Business Development A business consulting

More information

US WIRELESS & WIRELINE VOICE: THREATS AND OPPORTUNITIES

US WIRELESS & WIRELINE VOICE: THREATS AND OPPORTUNITIES US WIRELESS & WIRELINE VOICE: THREATS AND OPPORTUNITIES 2013-2018 FEBRUARY 2014 PO Box 34 Mountain Lakes, New Jersey 07046 USA 973-541-9600 phone reports@insight-corp.com http://www.insight-corp.com What

More information

Canada s New Anti-Spam Legislation: Overview and Implications for Businesses

Canada s New Anti-Spam Legislation: Overview and Implications for Businesses dentons.com Focus on Communications Canada s New Anti-Spam Legislation: Overview and Implications for Businesses January, 2011 Contact Margot Patterson Dentons Canada LLP Counsel, Ottawa margot.patterson@dentons.com

More information

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems VOIP Components Common Threats How Threats are Used Future Trends Provides basic network connectivity and transport

More information

Access Mediation: Preserving Network Security and Integrity

Access Mediation: Preserving Network Security and Integrity Access Mediation: Preserving Network Security and Integrity Definition Access mediation is the process of examining and controlling signaling traffic between networks, resources and users by filtering

More information

White Paper. avaya.com 1. Table of Contents. Starting Points

White Paper. avaya.com 1. Table of Contents. Starting Points White Paper Session Initiation Protocol Trunking - enabling new collaboration and helping keep the network safe with an Enterprise Session Border Controller Table of Contents Executive Summary...1 Starting

More information

WHY VOIP WHY IPVDX WITH IPT.CC A GUIDE TO IPVDX SERVICES. ipvdx VoIP. IN partnership WITH IPT.CC - the no.1 trading platform. www.ipvdx.

WHY VOIP WHY IPVDX WITH IPT.CC A GUIDE TO IPVDX SERVICES. ipvdx VoIP. IN partnership WITH IPT.CC - the no.1 trading platform. www.ipvdx. WHY VOIP WHY IPVDX WITH IPT.CC A GUIDE TO IPVDX SERVICES ipvdx VoIP IN partnership WITH IPT.CC - the no.1 trading platform www.ipvdx.com THE FUTURE OF TELECOMS IS VOIP THE FUTURE OF VOIP TRADING IS IPVDX

More information

Understanding Eligible Services

Understanding Eligible Services E rate Program I 2013 Schools and Libraries Fall Applicant Trainings 1 Overview Overview Priority One (P1) (P2) Miscellaneous Interconnected Voice over Internet Protocol (VoIP) I 2013 Schools and Libraries

More information

Speedflow presents exceptional range of software solutions Single Point of Control solutions from Speedflow include:

Speedflow presents exceptional range of software solutions Single Point of Control solutions from Speedflow include: Income Calls ACD ASR Speedflow Communications successfully operates on VoIP market since 2004. The company provides its customers with high-quality telecom services and VoIP software solutions. Speedflow

More information

Pronto Mobile Convergence Platform

Pronto Mobile Convergence Platform Pronto Mobile Convergence Platform Table of Contents 1. Preface.. 3 2. Pronto Mobile Convergence Platform. 3 3. Technical Architecture. 4 4. Key Elements of Mobile Convergence Platform... 5 5. Features

More information

Paving the Way to Next Generation Media and Signaling VoIP Gateways

Paving the Way to Next Generation Media and Signaling VoIP Gateways Small Logo Paving the Way to Next Generation Media and Signaling VoIP Gateways Executive Summary This white paper examines how the rapid adoption of SIP and the distribution of network elements are moving

More information

Management s Discussion

Management s Discussion 90 Management s Discussion and Analysis Management s Discussion Management s Discussion and Analysis/Operating and Financial Review and Prospects 91 and Analysis OPERATING AND FINANCIAL REVIEW AND PROSPECTS

More information

Best Practices: Mobile Roaming

Best Practices: Mobile Roaming Best Practices: Mobile Roaming Mobile roaming enables consumers to use their mobile phones when travelling abroad or outside of their current network carrier calling area by connecting to partnered provider

More information

OVERVIEW OPTUS OUTBOUND VOICE SOLUTIONS

OVERVIEW OPTUS OUTBOUND VOICE SOLUTIONS OVERVIEW OPTUS OUTBOUND VOICE SOLUTIONS ANSWER THE CALL TO KEEP COSTS DOWN CONTENTS YOUR VOICE SERVICES NEED TO KEEP UP WITH YOUR BUSINESS 01 EVOLVING AT A PACE THAT SUITS YOU 02 OUTBOUND VOICE SOLUTIONS

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Internet 1. How does New Source Broadband Internet service work? 2. How is the Outdoor Unit wired into my home or business 3. Can I connect multiple computers to the connection?

More information

BUSINESS TRUNKING TERMS & CONDITIONS

BUSINESS TRUNKING TERMS & CONDITIONS BUSINESS TRUNKING TERMS & CONDITIONS This Agreement commences on the day of, 20. In this Agreement, the terms You and Your / the Customer will be used to refer to [ ] (the Customer and the terms FLOW,

More information

2012 NCSA / Symantec. National Small Business Study

2012 NCSA / Symantec. National Small Business Study 2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National

More information

Protecting Mobile Networks from SS7 Attacks. Telesoft White Papers

Protecting Mobile Networks from SS7 Attacks. Telesoft White Papers Protecting Mobile Networks from SS7 Attacks Telesoft White Papers Christian Feest 23rd June 2015 SS7 Networks The Challenge The problem with the current SS7 system is that messages can be altered, injected

More information

TOLL FRAUD POLICIES AND PREVENTION

TOLL FRAUD POLICIES AND PREVENTION TOLL FRAUD POLICIES AND PREVENTION What is Toll Fraud? Toll Fraud is the theft of long-distance service. It s the unauthorized use of phone lines, services or equipment to make long distance calls. When

More information

Securing SIP Trunks APPLICATION NOTE. www.sipera.com

Securing SIP Trunks APPLICATION NOTE. www.sipera.com APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)

More information

Some Perspectives On Cybersecurity. Shernon Osepa Manager Regional Affairs Latin America & Caribbean www.internetsociety.org

Some Perspectives On Cybersecurity. Shernon Osepa Manager Regional Affairs Latin America & Caribbean www.internetsociety.org Some Perspectives On Cybersecurity Shernon Osepa Manager Regional Affairs Latin America & Caribbean www.internetsociety.org Agenda What is the Internet Society (ISOC) On the IETF Cyber Security Themes

More information

Levelling the Playing Field

Levelling the Playing Field ROGERS WHITE PAPER 1 Rev. May 2011 page 2 2 TABLE OF CONTENTS Introduction 3 Small Business Telephony Options 4 Basic Phone Service 4 Traditional PBX and Key Systems 4 Digital Services Business Cable and

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

Barbados Voice over Internet Protocol (VoIP) Policy

Barbados Voice over Internet Protocol (VoIP) Policy Barbados Voice over Internet Protocol (VoIP) Policy Policy in accordance with sections 4 (2)(b) and 4 (2)(f) of the Telecommunications Act Cap 282B. This policy describes the terms and outlines the techniques

More information

3rd Annual i3forum Conference

3rd Annual i3forum Conference 3rd Annual i3forum Conference The Future is All IP May 17, 2012 Chicago Implementing Voice over IP together presented by Alessandro Forcina (i3 Forum WS Technical Aspects Chairman) TELECOM ITALIA SPARKLE

More information

Choosing the Right Telephone Provider and Service Options

Choosing the Right Telephone Provider and Service Options Choosing the Right Telephone Provider and Service Options The Choice is Yours This brochure helps answer these questions: How do you know which providers offer local and long distance service in your area?

More information

Acceptable Usage Policy

Acceptable Usage Policy Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...

More information

BlackBerry Mobile Voice System

BlackBerry Mobile Voice System BlackBerry Mobile Voice System Mobile Unified Communications BlackBerry Mobile Voice System (BlackBerry MVS) brings desk phone features to BlackBerry smartphones. Work with one business number at the office

More information

Challenger Mobile strengthens the ties between your company and your customers. Create new revenue streams and build a stronger brand by offering

Challenger Mobile strengthens the ties between your company and your customers. Create new revenue streams and build a stronger brand by offering Challenger Mobile strengthens the ties between your company and your customers. Create new revenue streams and build a stronger brand by offering your customers mvoip. at more competitive rates using Challenger

More information

NETWORK MANAGEMENT DISCLOSURE

NETWORK MANAGEMENT DISCLOSURE NETWORK MANAGEMENT DISCLOSURE Rules issued by the Federal Communications Commission ( FCC ) require broadband Internet access providers, such as Vyve Broadband, LLC (together with its subsidiaries, Vyve

More information

THE TOP SECURITY QUESTIONS YOU SHOULD ASK A CLOUD COMMUNICATIONS PROVIDER

THE TOP SECURITY QUESTIONS YOU SHOULD ASK A CLOUD COMMUNICATIONS PROVIDER THE TOP SECURITY QUESTIONS YOU SHOULD ASK A CLOUD COMMUNICATIONS PROVIDER How to ensure a cloud-based phone system is secure. BEFORE SELECTING A CLOUD PHONE SYSTEM, YOU SHOULD CONSIDER: DATA PROTECTION.

More information

T.V. SERVICE, INC., dba TVS CABLE MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION

T.V. SERVICE, INC., dba TVS CABLE MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION T.V. SERVICE, INC., dba TVS CABLE MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION The following policies apply to mass market broadband Internet services offered by T.V. Service, Inc., doing

More information

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current

More information

Not for distribution or reproduction.

Not for distribution or reproduction. www.pipelinepub.com Volume 12, Issue 5 Cybersecurity Goes Mainstream By Rob Marson Back to the Future I recently read an article online entitled: Virtualization is Going Mainstream. The dateline was January

More information

CRTC 21411 GENERAL TARIFF BASIC SERVICES 1st Revised Page 74 Cancels Original Page 74

CRTC 21411 GENERAL TARIFF BASIC SERVICES 1st Revised Page 74 Cancels Original Page 74 GENERAL TARIFF BASIC SERVICES 1st Revised Page 74 Cancels Original Page 74.1 Resale and Sharing Definitions For the purposes of this Tariff Item: Affiliate refers to any person who is not a Canadian Carrier,

More information

Title 35 Mississippi State Tax Commission. Part IV Sales and Use Tax. Subpart 06 Utilities

Title 35 Mississippi State Tax Commission. Part IV Sales and Use Tax. Subpart 06 Utilities 1 Chapter 02 Telecommunications 100 Definitions Title 35 Mississippi State Tax Commission Part IV Sales and Use Tax Subpart 06 Utilities 101 Telecommunications Service means the electronic transmission,

More information

How To Follow The University Telephone Policy

How To Follow The University Telephone Policy Telephone Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED QUESTIONS

More information

MTS Communications Inc. GENERAL TARIFF CRTC 24001 Part I 7th Revised Page 67 Cancels 6th Revised Page 67 GENERAL ITEM 250 RESALE AND SHARING

MTS Communications Inc. GENERAL TARIFF CRTC 24001 Part I 7th Revised Page 67 Cancels 6th Revised Page 67 GENERAL ITEM 250 RESALE AND SHARING MTS Communications Inc. TARIFF CRTC 24001 7th Revised Page 67 Cancels 6th Revised Page 67 250 RESALE AND SHARING 1. DEFINITIONS For purposes of this tariff item: "Affiliate" means any person who is not

More information

Service Provider VoIP and IMS CONTINUOUS RESEARCH SERVICE. VAS and Softswitch Deployment Strategies: Global Service Provider Survey November 4, 2009

Service Provider VoIP and IMS CONTINUOUS RESEARCH SERVICE. VAS and Softswitch Deployment Strategies: Global Service Provider Survey November 4, 2009 Service Provider VoIP and IMS CONTINUOUS RESEARCH SERVICE TABLE OF CONTENTS VAS and Softswitch Deployment Strategies: Global Service Provider Survey November 4, 2009 INTRODUCTION... 1 TOP TAKEAWAYS...

More information

Information Security: A Perspective for Higher Education

Information Security: A Perspective for Higher Education Information Security: A Perspective for Higher Education A By Introduction On a well-known hacker website, individuals charged students $2,100 to hack into university and college computers for the purpose

More information

White Paper Voice Fraud Monitoring

White Paper Voice Fraud Monitoring White Paper Voice Fraud Monitoring Executive Summary Voice Fraud is a growing concern in this country, with 98% of businesses which have experienced hacking also victims of Voice Fraud. The cost of the

More information

Going Global with M2M: What You Must Know to Control Costs

Going Global with M2M: What You Must Know to Control Costs WHITE PAPER Going Global with M2M: What You Must Know to Control Costs To launch a successful global M2M deployment, service providers and enterprise customers should first develop a plan that takes into

More information