SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Fraud in Telecoms
Sources of operational risk




© E.O’Connor – May 2008
DEFINITIONS
 Definition of Fraud varies by jurisdiction but a fair summary is:
 “a deception deliberately practiced in order to secure unfair or unlawful gain.”



 The Telecoms Management Forum defines Revenue Assurance as the:
       “data quality and process improvement methods that improve profits,
                      revenues and cash flows without influencing demand.”



 Together the revenue losses from RA and Fraud can be significant




                                                                                    2
A FEW RA & FRAUD ISSUES
             Revenue Assurance                        Fraud
                           Internal systems            B Employees
                           & processes
              Invoicing                                                 Number porting
              accuracy           Product mix
                                 complexity             Metallic
                                                        number resale
               Profitability
                                                                           “Goodwill” credits
                                     Incorrect
                                     pricing tables     Passing on of
              Real-time vs                              customer details
              batch processing                                                Box breaking
  Internal
                                   Channel            D   Call & port
                                   incentivisation        forwarding
               Pricing signals                                                 Theft SIMs ,
               driving behaviour                                               handsets &
                                                       Slamming
                                                                               subscriptions
                                     Process
                Accuracy of          interfaces           SIM Gateways
                data flows
                                                                               Roaming
                       Accuracy of customer
                       information at touchpoints      Bad debt & Credit
                                                       worthiness
  External
                                                                                                3
FRAUD
Fraudulent activities tend to fall into one of 7 categories:

 Voice – threat of impersonation for malicious or profitable motives
 Subscription – use of a legitimate subscriber’s network access for malicious or profitable
   motives
 Data – removal, inspection or insertion of data onto a network for malicious or profitable
   motives
 Internal – abuse of access to operator data by an employee for malicious or profitable
   motives
 Interconnection – exploitation of operator interconnection agreements for malicious or
   profitable motives
 Roaming – exploitation of operator roaming agreements for malicious or profitable
   motives
 Technical – use of counterfeiting or other technologies to duplicate, infiltrate or manipulate
   a mobile network for malicious or profitable motives


                                                                                                   4
EXAMPLE OF FRAUDULENT ACTIVITIES
Subscription fraud                                      Roaming fraud (I)
 Call selling using GSM conference calling              Where operators have roaming agreements
   feature where fraudster acts as an ‘operator’           Operator A must pay Operator B for the time
   setting up calls between parties and then               used by their customers on Operator’s B network
   dropping out to set up another                          regardless of whether Operator A is paid for the
 GSM call forwarding where fraudster sets call            time
   forward to required number. Caller calls the          Principle problem is the time it takes for billing
   fraudster’s phone and is transferred. Caller only       from Operator B to Operator A - used to be 72
   pays for the call to the fraudster’s phone number.      hours now down to 24 hours using EDI
 Fraudsters using a gateway to provide an               GSM MoU states that any user exceeding 100
   international ‘call box’ from shops                     Special Drawing Rights (SDR) must be billed
                                                           within 24 hours
Internal Fraud                                           But, when is collection actually made?
 Mobile markets are very competitive with
    operators subsidising handsets to entice new        Roaming fraud (II)
    customers to subscribe. Dealer or gangs often        SIM cards are taken out of phones acquired with
    sell these handsets on to overseas buyers. And         false identities and sent abroad where they are
    of course pre-paid handsets can be unlocked            used in call selling fraud. Call lengths of over 10
    and used on any network                                hours typical




                                                                                                                 5
THE CHALLENGE
 The ‘natural’ order of tasks for revenue assurance is to:
     monitor for evidence of loss
     investigate where & why there is loss
     resolve the problems so loss does not occur again


 However changing nature of business relationships means
     not clear where boundaries lie & hence where operational risk may arise
     process design & data integrity becomes even more important




                                          Service Provider
                                                             Content
 Collaborative methods of working                           Services




                                                                                                                                              Enterprise




                                                                                                                                                                         Customer
                                                                                                                    Gamma Telecom
                                                                                                                                    Virtual                Contracting              End-user
                                                                                                                                    Network                party




                                                                 Fixed Operator
  are essential to mutually assure                                                Carrier
                                                                                  Services
                                                                                                                                    Enabler


  data, revenues & costs


                                                                                       Mobile Operator
                                                                                                         Bearer
                                                                                                         Services




                                                                                                                                                                                               6
SUMMARY
 The major sources of revenue           Follow the cash
  loss continue to be:                   Understand the processes
    Fraud                               Audit rights with partners
    Credit management
                                         Strength & enforceability of
    Least-cost-routing errors            commercial agreements
    Interconnect / partner-payment
                                         Traceability of products in the
     errors
                                          distribution chain
    Poor processes & systems
                                         Integrity of interfaces – human &
                                          automated
 All adds up to a loss of
                                         Training & culture
  customer confidence in your
  business…                              Who has access to customer
                                          data?




                                                                              7
TECHNIQUES FOR AUDITING
Track-Back Approach                        The Grid Approach
 Audit works backwards from a              The key mobile revenue streams &
   convenient point, such as the             logical operations for each stream
   customer invoice, to the first source     are identified and set out in a grid
   of data capture                            (e.g. voice, sms, interconnect streams versus
                                              switch, mediation, rating, invoicing operations)

 Allows the detail of how the data
  flows & is manipulated to be              Offers a useful visual framework to
                                             help identify common processes &
  understood and data integrity /
                                             enable a high-level understanding of
  leakage risks quantified                   how the processes work, the controls
                                             and checks, known leakages and the
 Can be a time consuming process            confidence that all leakages / fraud
                                             risks have been identified

                                            The issue is that this approach may
                                             not capture sufficient detail nor show
                                             the commonality of operations
                                             between revenue streams

                                                                                                 8

Weitere ähnliche Inhalte

Was ist angesagt?

Cybercrime
CybercrimeCybercrime
CybercrimeAvinash
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
E mail fraud
E mail fraudE mail fraud
E mail fraudslire
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationmbachnak
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of ComputerFaizan Janjua
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat Mishra
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPTAnandKaGe
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud Dixita S
 

Was ist angesagt? (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
E mail fraud
E mail fraudE mail fraud
E mail fraud
 
cyber security
cyber securitycyber security
cyber security
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of Computer
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
 

Andere mochten auch

Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sectorsksahu099
 
Ethics in Telecom Sector
Ethics in Telecom SectorEthics in Telecom Sector
Ethics in Telecom SectorSagar Patekar
 
The impact of telecommunications policy on the economy - Raul L. Katz and Ja...
The impact of telecommunications policy on the economy  - Raul L. Katz and Ja...The impact of telecommunications policy on the economy  - Raul L. Katz and Ja...
The impact of telecommunications policy on the economy - Raul L. Katz and Ja...ACORN-REDECOM
 
2G Spectrum Scam: Case-study
2G Spectrum Scam: Case-study2G Spectrum Scam: Case-study
2G Spectrum Scam: Case-studyAmrita Beri
 
Telecom Sector
Telecom SectorTelecom Sector
Telecom Sectorsantossb
 

Andere mochten auch (7)

Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sector
 
Ethics in Telecom Sector
Ethics in Telecom SectorEthics in Telecom Sector
Ethics in Telecom Sector
 
The impact of telecommunications policy on the economy - Raul L. Katz and Ja...
The impact of telecommunications policy on the economy  - Raul L. Katz and Ja...The impact of telecommunications policy on the economy  - Raul L. Katz and Ja...
The impact of telecommunications policy on the economy - Raul L. Katz and Ja...
 
Telecom industry in india
Telecom industry in indiaTelecom industry in india
Telecom industry in india
 
2G Spectrum Scam: Case-study
2G Spectrum Scam: Case-study2G Spectrum Scam: Case-study
2G Spectrum Scam: Case-study
 
Telecom Sector in India
Telecom Sector in IndiaTelecom Sector in India
Telecom Sector in India
 
Telecom Sector
Telecom SectorTelecom Sector
Telecom Sector
 

Ähnlich wie Fraud in Telecoms

TelBill Product Overview
TelBill Product OverviewTelBill Product Overview
TelBill Product Overviewparisholt
 
TelBill Overview
TelBill OverviewTelBill Overview
TelBill OverviewParis Holt
 
ANZ Trend Micro Campaign Creative 11 SEPT 2010
ANZ Trend Micro Campaign Creative 11 SEPT 2010ANZ Trend Micro Campaign Creative 11 SEPT 2010
ANZ Trend Micro Campaign Creative 11 SEPT 2010Graeme Wood
 
Anz campaign creative 11 sept 2010
Anz campaign creative 11 sept 2010Anz campaign creative 11 sept 2010
Anz campaign creative 11 sept 2010Graeme Wood
 
PartnerTEL TEM Services
PartnerTEL TEM ServicesPartnerTEL TEM Services
PartnerTEL TEM ServicesSeanRosales
 
e-Business ideas in Telecom
e-Business ideas in Telecome-Business ideas in Telecom
e-Business ideas in Telecomsam_tandon
 
Cut Costs by as much as 60% on Communications!
Cut Costs by as much as 60% on Communications!Cut Costs by as much as 60% on Communications!
Cut Costs by as much as 60% on Communications!Pranay Sanghavi
 
Cut Costs by as much as 60% on Communications!
Cut Costs by as much as 60% on Communications!Cut Costs by as much as 60% on Communications!
Cut Costs by as much as 60% on Communications!Pranay Sanghavi
 
Cem webinar brazil_final
Cem webinar brazil_finalCem webinar brazil_final
Cem webinar brazil_finalRafael Junquera
 
Delivering the Next Generation Airport
Delivering the Next Generation AirportDelivering the Next Generation Airport
Delivering the Next Generation AirportAmor Group
 
IMOBIX RoamSource
IMOBIX RoamSourceIMOBIX RoamSource
IMOBIX RoamSourceJeff Hunter
 
Effective administration of mobile number portability databases and systems –...
Effective administration of mobile number portability databases and systems –...Effective administration of mobile number portability databases and systems –...
Effective administration of mobile number portability databases and systems –...BSP Media Group
 
Grabovsky a.t.kearney telco-form_08.06.11
Grabovsky a.t.kearney telco-form_08.06.11Grabovsky a.t.kearney telco-form_08.06.11
Grabovsky a.t.kearney telco-form_08.06.11Андрей Лукин
 

Ähnlich wie Fraud in Telecoms (20)

TelBill Product Overview
TelBill Product OverviewTelBill Product Overview
TelBill Product Overview
 
TelBill Overview
TelBill OverviewTelBill Overview
TelBill Overview
 
ANZ Trend Micro Campaign Creative 11 SEPT 2010
ANZ Trend Micro Campaign Creative 11 SEPT 2010ANZ Trend Micro Campaign Creative 11 SEPT 2010
ANZ Trend Micro Campaign Creative 11 SEPT 2010
 
Anz campaign creative 11 sept 2010
Anz campaign creative 11 sept 2010Anz campaign creative 11 sept 2010
Anz campaign creative 11 sept 2010
 
PartnerTEL TEM Services
PartnerTEL TEM ServicesPartnerTEL TEM Services
PartnerTEL TEM Services
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
 
B2B eCommerce
B2B eCommerceB2B eCommerce
B2B eCommerce
 
Mobility Platform for Insurers
Mobility Platform for InsurersMobility Platform for Insurers
Mobility Platform for Insurers
 
Mobility Platform for Insurers
Mobility Platform for InsurersMobility Platform for Insurers
Mobility Platform for Insurers
 
e-Business ideas in Telecom
e-Business ideas in Telecome-Business ideas in Telecom
e-Business ideas in Telecom
 
Cut Costs by as much as 60% on Communications!
Cut Costs by as much as 60% on Communications!Cut Costs by as much as 60% on Communications!
Cut Costs by as much as 60% on Communications!
 
Cut Costs by as much as 60% on Communications!
Cut Costs by as much as 60% on Communications!Cut Costs by as much as 60% on Communications!
Cut Costs by as much as 60% on Communications!
 
Scalability problems and E-business
Scalability problems and E-businessScalability problems and E-business
Scalability problems and E-business
 
Cem webinar brazil_final
Cem webinar brazil_finalCem webinar brazil_final
Cem webinar brazil_final
 
Delivering the Next Generation Airport
Delivering the Next Generation AirportDelivering the Next Generation Airport
Delivering the Next Generation Airport
 
IMOBIX RoamSource
IMOBIX RoamSourceIMOBIX RoamSource
IMOBIX RoamSource
 
Effective administration of mobile number portability databases and systems –...
Effective administration of mobile number portability databases and systems –...Effective administration of mobile number portability databases and systems –...
Effective administration of mobile number portability databases and systems –...
 
Grabovsky a.t.kearney telco-form_08.06.11
Grabovsky a.t.kearney telco-form_08.06.11Grabovsky a.t.kearney telco-form_08.06.11
Grabovsky a.t.kearney telco-form_08.06.11
 

Kürzlich hochgeladen

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 

Kürzlich hochgeladen (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 

Fraud in Telecoms

  • 1. Fraud in Telecoms Sources of operational risk © E.O’Connor – May 2008
  • 2. DEFINITIONS  Definition of Fraud varies by jurisdiction but a fair summary is: “a deception deliberately practiced in order to secure unfair or unlawful gain.”  The Telecoms Management Forum defines Revenue Assurance as the: “data quality and process improvement methods that improve profits, revenues and cash flows without influencing demand.”  Together the revenue losses from RA and Fraud can be significant 2
  • 3. A FEW RA & FRAUD ISSUES Revenue Assurance Fraud Internal systems B Employees & processes Invoicing Number porting accuracy Product mix complexity Metallic number resale Profitability “Goodwill” credits Incorrect pricing tables Passing on of Real-time vs customer details batch processing Box breaking Internal Channel D Call & port incentivisation forwarding Pricing signals Theft SIMs , driving behaviour handsets & Slamming subscriptions Process Accuracy of interfaces SIM Gateways data flows Roaming Accuracy of customer information at touchpoints Bad debt & Credit worthiness External 3
  • 4. FRAUD Fraudulent activities tend to fall into one of 7 categories:  Voice – threat of impersonation for malicious or profitable motives  Subscription – use of a legitimate subscriber’s network access for malicious or profitable motives  Data – removal, inspection or insertion of data onto a network for malicious or profitable motives  Internal – abuse of access to operator data by an employee for malicious or profitable motives  Interconnection – exploitation of operator interconnection agreements for malicious or profitable motives  Roaming – exploitation of operator roaming agreements for malicious or profitable motives  Technical – use of counterfeiting or other technologies to duplicate, infiltrate or manipulate a mobile network for malicious or profitable motives 4
  • 5. EXAMPLE OF FRAUDULENT ACTIVITIES Subscription fraud Roaming fraud (I)  Call selling using GSM conference calling  Where operators have roaming agreements feature where fraudster acts as an ‘operator’ Operator A must pay Operator B for the time setting up calls between parties and then used by their customers on Operator’s B network dropping out to set up another regardless of whether Operator A is paid for the  GSM call forwarding where fraudster sets call time forward to required number. Caller calls the  Principle problem is the time it takes for billing fraudster’s phone and is transferred. Caller only from Operator B to Operator A - used to be 72 pays for the call to the fraudster’s phone number. hours now down to 24 hours using EDI  Fraudsters using a gateway to provide an  GSM MoU states that any user exceeding 100 international ‘call box’ from shops Special Drawing Rights (SDR) must be billed within 24 hours Internal Fraud  But, when is collection actually made?  Mobile markets are very competitive with operators subsidising handsets to entice new Roaming fraud (II) customers to subscribe. Dealer or gangs often  SIM cards are taken out of phones acquired with sell these handsets on to overseas buyers. And false identities and sent abroad where they are of course pre-paid handsets can be unlocked used in call selling fraud. Call lengths of over 10 and used on any network hours typical 5
  • 6. THE CHALLENGE  The ‘natural’ order of tasks for revenue assurance is to:  monitor for evidence of loss  investigate where & why there is loss  resolve the problems so loss does not occur again  However changing nature of business relationships means  not clear where boundaries lie & hence where operational risk may arise  process design & data integrity becomes even more important Service Provider Content  Collaborative methods of working Services Enterprise Customer Gamma Telecom Virtual Contracting End-user Network party Fixed Operator are essential to mutually assure Carrier Services Enabler data, revenues & costs Mobile Operator Bearer Services 6
  • 7. SUMMARY  The major sources of revenue  Follow the cash loss continue to be:  Understand the processes  Fraud  Audit rights with partners  Credit management  Strength & enforceability of  Least-cost-routing errors commercial agreements  Interconnect / partner-payment  Traceability of products in the errors distribution chain  Poor processes & systems  Integrity of interfaces – human & automated  All adds up to a loss of  Training & culture customer confidence in your business…  Who has access to customer data? 7
  • 8. TECHNIQUES FOR AUDITING Track-Back Approach The Grid Approach  Audit works backwards from a  The key mobile revenue streams & convenient point, such as the logical operations for each stream customer invoice, to the first source are identified and set out in a grid of data capture (e.g. voice, sms, interconnect streams versus switch, mediation, rating, invoicing operations)  Allows the detail of how the data flows & is manipulated to be  Offers a useful visual framework to help identify common processes & understood and data integrity / enable a high-level understanding of leakage risks quantified how the processes work, the controls and checks, known leakages and the  Can be a time consuming process confidence that all leakages / fraud risks have been identified  The issue is that this approach may not capture sufficient detail nor show the commonality of operations between revenue streams 8