SMS BYPASS FRAUD & PURGEFRAUD s SOLUTION

Similar documents
Control Traffic from Grey Routes and Boost Enterprise Messaging Revenue

Solving the SMS Revenue Leakage Challenge

A Review of Mobile Messaging Use Cases

Two-Factor Authentication: Tailor-Made for SMS

Top 10 Questions about VoWiFi

Fighting the threat of SIM boxes to A2P SMS revenues

Protecting Mobile Networks from SS7 Attacks. Telesoft White Papers

Big Data empowered messaging. How to boost telco legacy services profitability?

Worldwide attacks on SS7 network

JT Wholesale. Tier 1 Capability Boutique Approach

About Silverstreet. ! Virtual Mobile Numbers - Inbound SMS numbers for 2-way traffic and response tracking purposes.

SIP Trunks. The cost-effective and flexible alternative to ISDN

Whatsapp Marketing. Proposal. 500 Million Monthly Active Users. Web Development Online Marketing S.E.O Solutions

SIP Trunking with Microsoft Office Communication Server 2007 R2

GET MORE FROM MOBILE MESSAGING

Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy

Protecting the Last Refuge of Spam-Free Communication. How to Defend Against Spam Text Messaging Attacks

TELECOM FRAUD CALL SCENARIOS

Whitepaper. Are Firewalls Enough for End-to-End. VoIP Security

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

hubbing international wholesale solutions our solution in brief TDM / IP voice Orange, a major player in the wholesale market

WHAT THE FRAUD? A Look at Telecommunications Fraud and Its Impacts

DISPUTE AND FRAUD IN TELECOM TRADING MARKET 2011

In this age of mobile revolution, it is extremely important to stay in touch with technology at all times. Bulk SMS are the fastest way for conveying

Fugure 1. Scheme of sending bulk SMS. Source: J son & Partners Consulting

International Dialing and Roaming: Preventing Fraud and Revenue Leakage

On the Radar: Truphone

fraud & billing For example, Layer4 will identify: Compliance of telecom operators with service level agreements

Enabling Innovation with KPI-based Service Management Operator Key Performance Indicators (KPIs)

TELEGEOGRAPHY REPORT EXECUTIVE SUMMARY. Executive Summary

Anti Fraud Services. Associate Member of..

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

SMS SS7 Fraud February 2005

Community Management. How to build and manage a loyal community for your mobile app with the help of social media networks!

An Oracle White Paper December The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

BT IP Exchange helps mobile operators accelerate VoLTE deployment

Jibe Hub. RCS Exchange for Mobile Operators. The Global Communications Cloud. Anil Sharma Director, Jibe Mobile anil@jibemobile.

Revenue Enhancement and Churn Prevention

TRANSPARENCY STATEMENT POLICIES PRESERVING THE OPEN INTERNET

Automatic Monitoring & Detection System (AMDS) for Grey Traffic

International Carriers

IN.08 SMS Hubbing Handbook

Cameron Communications Network Management Practices Policy November, Cameron Communications Network Management Practices Policy Disclosure

Guiding principles for security in a networked society

Executive Summary. August Technology Research Institute (TRI) 1245 N. Rocky Mountain Drive Effort of the Poconos, PA 18330

VOICE OVER IP SECURITY

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======

Geographic Routing of Toll Free Services

How To Use Proactive Notification For Business

Walnut Telephone Company, Inc. dba/ Walnut Communications Network Management Practices Policy Disclosure

Access Mediation: Preserving Network Security and Integrity

SIP and VoIP 1 / 44. SIP and VoIP

SS7 & LTE Stack Attack

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Smart VoIP Enabling Mobile Operators to Deliver OTT VoIP

How To Use A College Computer System Safely

SIGNALING SYSTEM 7 (SS7) SECURITY REPORT

Network Management, Performance Characteristics, and Commercial Terms Policy. (1) mispot's Terms of Service (TOS), viewable at mispot.net.

Beyond vouchers: Meeting growing demand for off-net P2P transfers

Privacy Policy. What is Covered in This Privacy Policy. What Information Do We Collect, and How is it Used?

Advanced Threat Protection with Dell SecureWorks Security Services

SIP Security Controllers. Product Overview

An Oracle White Paper November Typical Key Performance Indicator Reports for Performance Intelligence Centers

White Paper. avaya.com 1. Table of Contents. Starting Points

How to Avoid the 10 BIGGEST MISTAKES. in Voice Application Development

Revenue Analytics for Long Term Evolution (LTE)

Cellular Networks: Background and Classical Vulnerabilities

Technical Questions on Data Retention

Session Border Controllers: Addressing Tomorrow s Requirements

VoIP 101. E911-Enhanced 911- Used for providing emergency service on cellular and internet voice calls.

CHINA MOBILE LIMITED ANNUAL REPORT Business Review

The IP Interconnection Debate: What is it and Why is it So Important?

BT One for Communications. Mobile Roam. A unified roaming service offering your customers enhanced mobile connection around the world.

Fighting Future Fraud A Strategy for Using Big Data, Machine Learning, and Data Lakes to Fight Mobile Communications Fraud

Application Security in the Software Development Lifecycle

SIP Trunking Configuration with

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System

FRANKFORT PLANT BOARD CABLE MODEM INTERNET BROADBAND INTERNET SERVICE DISCLOSURES

NATIONAL COST OF VoIP BYPASS

NBP's remittance portfolio currently stands at over Rupees 160 Billion per annum.

The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions

SMS Roaming Service and SMS Interworking Service

magazine VoIP Services class 4 solution class 5 solution Transaction Processing System

Mobile Internet trends in the Middle East-Africa region: mobile Internet survey results

STRATEGIC WHITE PAPER

Ericsson Mobile digital identity

West River Telecom Network Management Practices Policy

TELEGEOGRAPHY REPORT EXECUTIVE SUMMARY. Executive Summary

Acceptable Use Policy

Securing SIP Trunks APPLICATION NOTE.

CHINA UNICOM COMMIT TO MAKE CONNECTED LIVING EASIER

Congestion Management Provider does not employ any congestion management tools, practices and/or software on network traffic.

creativity ADAPTABIlITY PASSION

5th Annual i3forum Conference

Five Steps Towards Effective Fraud Management

Nebraska Central Telephone Company Nebraska Central Telecom, Inc. Network Management Practices Policy

Network Instruments white paper

Cloud App Security. Tiberio Molino Sales Engineer

The New Era of Mobile Engagement for the Enterprise. Reaching Today s Empowered Mobile Users in Faster, Richer and More Intuitive Ways

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Transcription:

Purgefraud endeavors to be a leading valueadded resource for our clients by providing services, cutting edge technologies, and strategic management consulting that improves quality and cost effectiveness. At Purgefraud, we believe in building longterm relationships by combining top-notch ICT services and solutions with state of the art innovations and the goal of complete customer satisfaction. SMS BYPASS FRAUD & PURGEFRAUD s SOLUTION VERSION 11 www.purgefraud.com

Disclaimer This document has been prepared by PurgefraudTM, a brand name of Teralight FZ LLC. The use, copying, reproduction or translation of this document in any other language is prohibited unless written permission is granted by the company. The applications/screenshots shown are developed and owned by the company and it is not permissible to illustrate them with any other identity. A legal action will be taken against anyone violating these conditions. Copyright TERALIGHT-PURGEFRAUD. All Rights Reserved. Confidential & Proprietary Page 2 8

OVERVIEW Telecommunications fraud endures to be an immense problem in today s industry. The use of ubiquitous technologies have made the average life style more comfortable and expedient, but not without a price. These evolutions not only generate innovation for good, but also bring about progressively refined practices in which fraudsters can penetrate an organization. With fraud continuing to be a major issue, fraud management has developed from a guarded and responsive system concentrated on anticipation, to a more proactive, revenue assuring, and imaginative methodology. Aims have progressed from simply distinguishing fraud to building consumer satisfaction and generating new streams of revenue. Purgefraud has spent valuable years in detecting and eliminating various types of telecom fraud and understands the dynamics of this fast growing problem. This document delineates the significance

and impact of SMS Bypass fraud on telco revenues. This document also focuses on the acute countermeasures offered by Purgefraud in order to safeguard the operator s network from SMS Bypass fraud. Confidential & Proprietary Page 3 8 Short Message Service (SMS) Bypass Fraud Revenue assurance has been a grave challenge for Mobile Network Operators (MNOs) coping with the most recent trends of telecom fraud. SMS is in the beginning of a longhaul decline, however, its significance to operators is still imperative, both in terms of brand quality and revenue. It is presently more fundamental than ever for operators seeking to secure their revenues, to begin allocating resources towards specific key areas including revenue assurance relating to SMS interconnect, spam analysis, and counteractive action. With this, operators will not only secure their own revenue streams but will also be able to guarantee that their clients benefit from the best client experience possible.

The use of ubiquitous technologies greatly altered the basic means of either sending a message or making a voice call. The free costs, the convenience of access, as well as the unique novelty of application converted many users from traditional SMS. MNO s have experienced large declines in SMS traffic revenues over the past five years, and are yet again confronted by new attacks on their revenues. Services like WhatsApp, and imessage, along with many others, have transitioned revenues from the use of standard SMS to OTT applications over data networks provided by those same operators. Due to this fierce competition, the MNO s business model is under threat. SMS Bypass fraud is truly posing serious trouble for telecom operators making the requirement to be competent in such a turbulent business environment indispensable. Confidential & Proprietary Page 4 8 Challenges & Impacts of SMS Bypass The manifestation of Over-the-top (OTT) communications services has badly tarnished the Person to Person (P2P) SMS market. On the other hand, due to increasing use of OTT apps, Application to Person (A2P) messaging has become

the most profitable sector for MNOs to build up new tributaries of revenue. Unfortunately, this multi-billion dollar SMS market has attracted telecom pirates with plans to encroach network operator revenues, making SMS bypass is an immense problem for network operators. According to GSMA document IR.70, there are numerous cases of SMS fraud defined such as spamming & spoofing of SMS, fake SMS or illegal use of SMSC address. Moreover, SMS bypass can cause the following glitches in the operators network: Loss in revenue due to grey route SMS traffic and SMS spoofing Capricious loads on the network due to bulk SMS Degradation in reputation of the network due to SMS spamming. However, the ever-increasing use of smartphones has provided extra leverage to the illegitimate marketers. This added commodity has provided the telecom pirates a break to utilize manifold mobile phones to generate illegitimate money from their agreement, with a single phone capable of transmitting thousands of SMS messages through these apps. Eventually, this is driving the grey market for steering messages as cheaply as possible via black aggregators around the globe. Why SMS Bypass Occurs - SMS fraud occurs when law-violators collect information and pursue clients under different reasons to execute financial operations in favor of third parties via bulk SMS. SMS bypass fraud usually occurs at the

point when wholesale revenues resulting from voice termination continue on declining; whereas the SMS termination revenues stay elevated. Confidential & Proprietary Page 5 8 Another factor causing SMS bypass fraud is that the SS7 network is vulnerable to A2P fraud schemes. When utilized solely by trusted individuals, this network used to be a sheltered territory. Today, numerous OTT players such as MNOs, SMS or Hub aggregators, etc. have the right to access the SS7 network, although telecom pirates have revealed an enhanced Distributed Denial of Service (DDoS) approach to intrude into this network. SIM Farming is another illustration of how particular illicit bulk SMS service providers drive the confinements of the law (AA19). Technically, this strategy of SMS delivery is not illegitimate but evidently a break of the operator s goal of providing a consumer based tariff. Generally, the terms and conditions preclude "boundless SMS" packages being utilized for promoting, advertising, or wholesale delivery campaigns. Though, the low charges of these tariffs make it alluring for the intermediate parties to provide bulk volume SMS delivery service to SMS aggregators.

SMS Bypass Detection and Identification With SMS bypass fraud growing rapidly, the onus is on the network operator to have in place, effectual SMS bypass detection schemes with regard to conventional SS7 signaling surveillance systems. With regard to SMS bypass detection, operators need to monitor the doorways (such as International SCCP/MAP gateway (IGP) and SMS Center (SMS-C)) that are vulnerable to telecom pirates. SMS Fraud can be identified principally by: SMS volume analysis Inbound vs. Outbound SMS SMS Frequency Analysis SS7 SMS Inspection Available MSISDN or IMSI Discrepancies between protocol layers Confidential & Proprietary Page 6 8 How Purgefraud can benefit your business?

Purgefraud s all-encompassing services can identify imbalances via its end-to-end active testing operations to help identify and eliminate discrepancies in the network caused by A2P SMS traffic. We provide a fully managed and customizable solution to identify the actual and grey route SMS while sending SMS from TCG SIMs using boundless international routes. Timely and fully customized reports are then generated.

Destination Cellular Network

IP/SS7 Network SMS by Legal Route SMS by Illegal Route Destination International Gateway Bulk SMS Service Provider End User International Mobile Network Legend Illicit SMS or Hub Aggregators Confidential & Proprietary Page 7 8

Contact Details Dubai, UAE #402, Alfa Building, Knowledge Village P.O. Box: 500759 Dubai, UAE Tel: +971 4375 1313 Fax: +971 4420 5416 Islamabad, Pakistan #104, 1st Floor, Green Trust Tower, Blue Area Islamabad, Postal Code: 44000-Pakistan Tel: +92 51 281 3081-86 Fax: +92 51 281 3085 Chandler North America 295 North Rural Rd., Suite 263, Chandler, AZ 85226, USA Tel: +1 480 292 7150 Fax: +1 480 452 1998 Confidential & Proprietary Page 8 8