Detectig Voice Mail Fraud Detectig Voice Mail Fraud - 1 Issue 2
Detectig Voice Mail Fraud Detectig Voice Mail Fraud Several reportig mechaisms ca assist you i determiig voice mail fraud. Call Detail Recordig (or SMDR) With Call Detail Recordig (CDR) activated for the icomig truk groups, you ca fid out details about the calls made ito your voice mail ports. This feature is kow as Statio Message Detail Recordig (SMDR) o some switches icludig MERLIN LEGEND. NOTE: Lucet s optioal Call Accoutig System (CAS) may be istalled o the Lucet system, allowig you to create customized reports with your G1, G3, or Ituity MERLIN LEGEND CDR/SMDR data. The optioal Lucet HackerTracker program works i cojuctio with CAS Plus Versio 3 to alert you to abormal callig activities. NOTE: Review the CDR data for the followig symptoms of voice messagig abuse: Short holdig times o ay truk group where voice messagig is the origiatig edpoit or termiatig edpoit Calls to iteratioal locatios ot ormally used by your busiess Calls to suspicious destiatios Cotiue, press PAGE DOWN. Detectig Voice Mail Fraud - 2 Issue 2
Detectig Voice Mail Fraud Numerous calls to the same umber Udefied accout codes NOTE: For G2 ad System 85, sice CDR oly records the last extesio o the call, iteral toll abusers trasfer uauthorized calls to aother extesio before they discoect so the CDR does ot track the origiatig statio. If the trasfer is to your voice messagig system, it could give a false idicatio that your voice messagig system is the source of the toll fraud. Call Traffic Report This report provides hourly port usage data ad couts the umber of calls origiated by each port. By trackig ormal traffic patters, you ca respod quickly if a uusually high volume of calls begis to appear, especially after busiess hours or durig weekeds, which might idicate hacker activity. For G1, G3, ad System 75, traffic data reports are maitaied for the last hour ad the peak hour. For G2 ad System 85, traffic data is available via Moitor I, which ca store the data ad aalyze it over specified periods. Cotiue, press PAGE DOWN. Detectig Voice Mail Fraud - 3 Issue 2
Truk Group Report Detectig Voice Mail Fraud This report tracks call traffic o truk groups at hourly itervals. Sice truk traffic is fairly predictable, you ca easily establish over time what is ormal usage for each truk group. Use this report to watch for abormal traffic patters, such as uusually high off-hour loadig. SAT, Maager I, ad G3-MT Reportig Traffic reportig capabilities are built-i ad are obtaied through the System Admiistrator Tool (SAT), Maager I, ad G3-MT termials. These programs track ad record the usage of hardware ad software features. The measuremets iclude peg couts (umber of times ports are accessed) ad call duratio. Traffic measuremets are maitaied costatly ad are available o demad. However, reports are ot archived ad should therefore be prited to moitor a history of traffic patters. ARS Measuremet Selectio The ARS Measuremet Selectio ca moitor up to 20 routig patters (25 for G3) for traffic flow ad usage. Cotiue, press PAGE DOWN. Detectig Voice Mail Fraud - 4 Issue 2
Automatic Circuit Assurace Detectig Voice Mail Fraud This moitorig techique detects a umber of short-holdig-time calls or a sigle logholdig-time call which may idicate hacker activity. Log holdig times o truk-to-truk calls ca be a warig sig. The ACA feature allows you to set time limit thresholds defiig what is cosidered a short holdig time ad a log holdig time. Whe a violatio occurs, a desigated statio is visually otified. Whe a alarm occurs, determie if the call is still active. If toll fraud is suspected (for example, a log-holdig-time alarm occurs o a truk-to-truk call), you may wat to use the Busy Verificatio feature to moitor the call i progress. Busy Verificatio Whe toll fraud is suspected, you ca iterrupt the call o a specified truk group ad moitor the call i progress. Callers will hear a log toe to idicate the call is beig moitored. Cotiue, press PAGE DOWN. Detectig Voice Mail Fraud - 5 Issue 2
AUDIX Traffic Reports Detectig Voice Mail Fraud The Ituity AUDIX system tracks traffic data over various time spas. Reviewig these reports o a regular basis helps to establish traffic treds. If icreased activity or uusual usage patters occur, such as heavy call volume o ports assiged to outcallig, they ca be ivestigated immediately. I additio, the AUDIX Admiistratio ad Data Acquisitio Package (ADAP) uses a PC to provide exteded storage ad aalysis capabilities for the traffic data. You ca also use the AUDIX Admiistratio Log ad Activity Log to moitor usage ad ivestigate possible break-i attempts. For more iformatio o ruig ad usig reports, see AUDIX Traffic Reports. Procedure completed. Detectig Voice Mail Fraud - 6 Issue 2