SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
+92 51 873 4525 | info@track4solutions.com | track4solutions.com
506-A, 5th Floor, Evacuee Trust Complex, F-5/1, Islamabad, Pakistan
Course Outline
Comprehensive Training on Bypass/SIM Box Fraud
Detection and Termination
Duration: 3 Days
+92 51 873 4525 | info@track4solutions.com | track4solutions.com
506-A, 5th Floor, Evacuee Trust Complex, F-5/1, Islamabad, Pakistan
Title: Comprehensive Training on Bypass/SIM Box Fraud: Detection
and Termination
Duration: 3 day
Course Code: NSE-RA-704
Course Description:
This training course is designed to explain the mobile and fixed communications bypass fraud in-depth
and present effective solutions for detection and termination of bypass fraud. This course examines key
subjects including: Definition of fraud and its types along with defining interconnection operations in
order to help attendees better understand how bypass fraud works. The course also examines additional
key subjects including: SIM box Interconnect configuration scenarios, and most importantly presenting
and examining the fraud detection tools utilized. This is a must-attend course for revenue assurance and
fraud management professionals.
Course Objectives:
 Understand what is Fraud and its Types
 Understand the Interconnect Principles
 Define Bypass Fraud and Understand its Characteristics
 Comprehend SIM Box Interconnect Configuration Scenarios
 Learn the Bypass Fraud Detection and Elimination tools
 Comprehend the Deficiencies of Traditional Behavioral Detection tools
 Learn the Non-Passive Push Calls Methodology
+92 51 873 4525 | info@track4solutions.com | track4solutions.com
506-A, 5th Floor, Evacuee Trust Complex, F-5/1, Islamabad, Pakistan
Pre Requisite
Basic understanding of Fraud, Basic understanding of Networks and Interconnection
Who Should Attend?
Revenue Assurance and Fraud Managers/ Analysts /Consultants/ Implementation and Deployment
Technicians/ Project Team Members/Researchers
Course Outline:
I. Telecommunications Fraud Overview
A. Telecommunication Fraud Overview
1. What is Fraud
2. Motivation of Fraud
3. Operators Risk Exposure
4. New Access Methods
5. Billing Systems and Processes
B. Interconnection Overview
1. Fundamentals of Interconnect Operations
2. Interconnect Network Design and Constraints
3. Interconnect Controls
4. Forms of Interconnections
C. Types of Fraud
1. Illegal SIM Boxes
a. Motivation and Scale
b. Associated Risks
2. Subscription Fraud
a. Motivation of Subscription Fraud
b. Associated Risks
3. Roaming Fraud
a. Motivation and Scale
b. Associated Risks
+92 51 873 4525 | info@track4solutions.com | track4solutions.com
506-A, 5th Floor, Evacuee Trust Complex, F-5/1, Islamabad, Pakistan
4. Premium Service Fraud
a. Projected Revenue Unearned
b. Associated Risk
5. Internal Fraud
a. Motivation of Internal Fraud
b. Impact and Scale of Internal Fraud
6. Partnership Fraud
a. Types of Partnership Fraud
b. Interconnect Fraud Recognition
7. Pre-Paid Services Fraud Methods
a. Risk Associated with Recharge Methods
b. Methods to Curb Pre-paid Fraud
II. SIM Box and Bypass Fraud
A. What is Bypass Fraud
1. By Pass Fraud Direct Effect
a. Huge Revenue Loss
b. Poor Voice Quality
c. Increase in Post Dial Delay
2. By Pass Fraud Indirect Effect
a. Inability to Call Back
b. Short Duration Calls
c. Increase in Call Drops
B. GSM VOIP Gateways/SIM Boxes
1. What are SIM Boxes
2. SIM Box Functionality
3. Advanced SIM Box Features and Functionalities
a. SIM-Rotation
b. Remote Pre-Paid Recharging
c. SIM-Card off-site Storage
+92 51 873 4525 | info@track4solutions.com | track4solutions.com
506-A, 5th Floor, Evacuee Trust Complex, F-5/1, Islamabad, Pakistan
C. Use of SIM Cloning for SIMBox/ByPass Fraud
D. Use of International Roaming for SIMBox/Bypass Fraud
E. Re-filing Numbers within SIMBox Fraud
F. Effect of Special Rates between International Interconnects
G. SIM Box Interconnect Configuration
3. SIM Box Location: Adjacent Operator’s Network
a. Adjacent Network Inbound Mobile Originated Calls Delivery
b. Scenario Identification and Details
c. Scenario Treatment Difficulty
d. Soft Loss
e. Cases and Examples
4. SIM Box Location: In the Home Operator’s Network
a. Adjacent Operator Outbound Mobile Originated Calls Delivery
b. Scenario Identification and Details
c. Outbound Termination Access Fees Payment
d. Soft and Hard Loss Cases
e. Cases and Examples
5. SIM Box Location: Within the Home Operator’s Network
a. SIM Box Delivers and Terminated Calls On-Net
b. Network Concerns
c. Quality of Service
d. Congestion
e. Spectrum Management
f. Network Utilization
H. By-Pass Fraud Detection and Elimination
1. Traditional Behavioral Detection Examples
a. Incoming to Outgoing Calls Ratio and Comparison
i. “Voice Call Accepting” GSM Gateway Configuration
ii. “Duration of Call” Comparison Counter Measure
+92 51 873 4525 | info@track4solutions.com | track4solutions.com
506-A, 5th Floor, Evacuee Trust Complex, F-5/1, Islamabad, Pakistan
iii. “Pre-Recorded Messaged or Dial Tones”
b. No or Low Mobility
i. “Take SIMs for a Ride” Counter Measure
ii. Voice Call Making Location
c. Distinct Numbers - High Number of Calls
d. High Number of One Cell Subscribers
e. High Number of Night Calls
i. Placing GSM Gateways in Large Cells
ii. Disabling Not-in-Use SIM Cards
iii. Automatic SIM Mapping
2. Signaling-Based Monitoring
a. Behavior Dependent
b. Near-Real time Monitoring
c. Media Dependent
d. High Deployment Cost
3. Non-Passive By-Pass Fraud Detection and Elimination
a. Solution Methodology
b. Real-time Individual Calls Monitoring and Blocking
c. Media Independent
4. Trunk Data
a. Trunk Analysis
b. Method of Trunk Analysis
c. Advantage of Trunk Analysis
5. Detection and Elimination Tool Comparison
6. Case Studies and Exercises

Weitere ähnliche Inhalte

Was ist angesagt?

FraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under ControlFraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under ControlRichard Hickson
 
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...cVidya Networks
 
A data mining framework for fraud detection in telecom based on MapReduce (Pr...
A data mining framework for fraud detection in telecom based on MapReduce (Pr...A data mining framework for fraud detection in telecom based on MapReduce (Pr...
A data mining framework for fraud detection in telecom based on MapReduce (Pr...Mohammed Kharma
 
Ethics in Telecom Sector
Ethics in Telecom SectorEthics in Telecom Sector
Ethics in Telecom SectorSagar Patekar
 
IRSF Protection with PRISM
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISMXINTEC
 
Hacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraudHacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraudcVidya Networks
 
International Revenue Share Fraud webinar
International Revenue Share Fraud webinarInternational Revenue Share Fraud webinar
International Revenue Share Fraud webinarXINTEC
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereGoutama Bachtiar
 
Wholesale Fraud - Jason Lane-Sellers of cVidya
Wholesale Fraud - Jason Lane-Sellers of cVidyaWholesale Fraud - Jason Lane-Sellers of cVidya
Wholesale Fraud - Jason Lane-Sellers of cVidyacVidya Networks
 
Ict2005 fms
Ict2005 fmsIct2005 fms
Ict2005 fmskkvences
 
The Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersThe Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersEckoh
 
Advisory to Financial Institutions on E-Mail Compromise Fraud Schemes
Advisory to Financial Institutions on E-Mail Compromise Fraud SchemesAdvisory to Financial Institutions on E-Mail Compromise Fraud Schemes
Advisory to Financial Institutions on E-Mail Compromise Fraud SchemesRyan Renicker CFA
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021lior mazor
 
Fonreg presentation - official
Fonreg presentation - officialFonreg presentation - official
Fonreg presentation - officialAyodele Thomas
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 

Was ist angesagt? (20)

FraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under ControlFraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under Control
 
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
 
A data mining framework for fraud detection in telecom based on MapReduce (Pr...
A data mining framework for fraud detection in telecom based on MapReduce (Pr...A data mining framework for fraud detection in telecom based on MapReduce (Pr...
A data mining framework for fraud detection in telecom based on MapReduce (Pr...
 
Ethics in Telecom Sector
Ethics in Telecom SectorEthics in Telecom Sector
Ethics in Telecom Sector
 
IRSF Protection with PRISM
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISM
 
Hacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraudHacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraud
 
International Revenue Share Fraud webinar
International Revenue Share Fraud webinarInternational Revenue Share Fraud webinar
International Revenue Share Fraud webinar
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
 
Wholesale Fraud - Jason Lane-Sellers of cVidya
Wholesale Fraud - Jason Lane-Sellers of cVidyaWholesale Fraud - Jason Lane-Sellers of cVidya
Wholesale Fraud - Jason Lane-Sellers of cVidya
 
Ict2005 fms
Ict2005 fmsIct2005 fms
Ict2005 fms
 
The Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersThe Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact Centers
 
Advisory to Financial Institutions on E-Mail Compromise Fraud Schemes
Advisory to Financial Institutions on E-Mail Compromise Fraud SchemesAdvisory to Financial Institutions on E-Mail Compromise Fraud Schemes
Advisory to Financial Institutions on E-Mail Compromise Fraud Schemes
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021
 
Fonreg presentation - official
Fonreg presentation - officialFonreg presentation - official
Fonreg presentation - official
 
Sim swapping
Sim swappingSim swapping
Sim swapping
 
Fair and Accurate Credit Transactions Act of 2003
Fair and Accurate Credit Transactions Act of 2003Fair and Accurate Credit Transactions Act of 2003
Fair and Accurate Credit Transactions Act of 2003
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 

Ähnlich wie Comprehensive training on bypass sim box fraud

Fraud Management Industry Update Webinar
Fraud Management Industry Update WebinarFraud Management Industry Update Webinar
Fraud Management Industry Update WebinarcVidya Networks
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeTelcoBridges Inc.
 
How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom FraudJeraSoft
 
Co cubes.com hiring & engagement overview
Co cubes.com hiring & engagement overviewCo cubes.com hiring & engagement overview
Co cubes.com hiring & engagement overviewnidhimota
 
Co cubes.com hiring & engagement overview
Co cubes.com hiring & engagement overviewCo cubes.com hiring & engagement overview
Co cubes.com hiring & engagement overviewnidhimota
 
Business Email Compromise: A Symptom Not A Cause.pdf
Business Email Compromise: A Symptom Not A Cause.pdfBusiness Email Compromise: A Symptom Not A Cause.pdf
Business Email Compromise: A Symptom Not A Cause.pdfNiloufer Tamboly
 
Telecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasuresTelecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasuresPositiveTechnologies
 
b2b ecommerce security safeguarding transactions and data.pdf
b2b ecommerce security safeguarding transactions and data.pdfb2b ecommerce security safeguarding transactions and data.pdf
b2b ecommerce security safeguarding transactions and data.pdfDEMANDAY intent driven
 
Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05BookStoreLib
 
Telecom Revenue Assurance Workshop
Telecom Revenue Assurance WorkshopTelecom Revenue Assurance Workshop
Telecom Revenue Assurance WorkshopParcus Group
 
IRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid ModelsIRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid ModelsIRJET Journal
 
Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENTelcoBridges Inc.
 
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...IFG Network marcus evans
 
Fitsum ristu lakew transaction security on e-commerce
Fitsum ristu lakew transaction security on e-commerceFitsum ristu lakew transaction security on e-commerce
Fitsum ristu lakew transaction security on e-commerceFITSUM RISTU LAKEW
 
Seeds of prosperity v2.1 print friendly
Seeds of prosperity v2.1 print friendlySeeds of prosperity v2.1 print friendly
Seeds of prosperity v2.1 print friendlyDanielGBroome
 

Ähnlich wie Comprehensive training on bypass sim box fraud (20)

Fraud Management Industry Update Webinar
Fraud Management Industry Update WebinarFraud Management Industry Update Webinar
Fraud Management Industry Update Webinar
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom Fraud
 
Co cubes.com hiring & engagement overview
Co cubes.com hiring & engagement overviewCo cubes.com hiring & engagement overview
Co cubes.com hiring & engagement overview
 
Co cubes.com hiring & engagement overview
Co cubes.com hiring & engagement overviewCo cubes.com hiring & engagement overview
Co cubes.com hiring & engagement overview
 
Business Email Compromise: A Symptom Not A Cause.pdf
Business Email Compromise: A Symptom Not A Cause.pdfBusiness Email Compromise: A Symptom Not A Cause.pdf
Business Email Compromise: A Symptom Not A Cause.pdf
 
Telecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasuresTelecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasures
 
b2b ecommerce security safeguarding transactions and data.pdf
b2b ecommerce security safeguarding transactions and data.pdfb2b ecommerce security safeguarding transactions and data.pdf
b2b ecommerce security safeguarding transactions and data.pdf
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05
 
Telecom Revenue Assurance Workshop
Telecom Revenue Assurance WorkshopTelecom Revenue Assurance Workshop
Telecom Revenue Assurance Workshop
 
IRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid ModelsIRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid Models
 
Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKEN
 
NARENDRA NEW CV--rak
NARENDRA NEW CV--rakNARENDRA NEW CV--rak
NARENDRA NEW CV--rak
 
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
 
Reflection on compliance and automation
Reflection on compliance and automationReflection on compliance and automation
Reflection on compliance and automation
 
Voice Mail Strategy Chile
Voice Mail Strategy ChileVoice Mail Strategy Chile
Voice Mail Strategy Chile
 
Fitsum ristu lakew transaction security on e-commerce
Fitsum ristu lakew transaction security on e-commerceFitsum ristu lakew transaction security on e-commerce
Fitsum ristu lakew transaction security on e-commerce
 
Seeds of prosperity v2.1 print friendly
Seeds of prosperity v2.1 print friendlySeeds of prosperity v2.1 print friendly
Seeds of prosperity v2.1 print friendly
 
ECA
ECAECA
ECA
 

Kürzlich hochgeladen

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 

Kürzlich hochgeladen (20)

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 

Comprehensive training on bypass sim box fraud

  • 1. +92 51 873 4525 | info@track4solutions.com | track4solutions.com 506-A, 5th Floor, Evacuee Trust Complex, F-5/1, Islamabad, Pakistan Course Outline Comprehensive Training on Bypass/SIM Box Fraud Detection and Termination Duration: 3 Days
  • 2. +92 51 873 4525 | info@track4solutions.com | track4solutions.com 506-A, 5th Floor, Evacuee Trust Complex, F-5/1, Islamabad, Pakistan Title: Comprehensive Training on Bypass/SIM Box Fraud: Detection and Termination Duration: 3 day Course Code: NSE-RA-704 Course Description: This training course is designed to explain the mobile and fixed communications bypass fraud in-depth and present effective solutions for detection and termination of bypass fraud. This course examines key subjects including: Definition of fraud and its types along with defining interconnection operations in order to help attendees better understand how bypass fraud works. The course also examines additional key subjects including: SIM box Interconnect configuration scenarios, and most importantly presenting and examining the fraud detection tools utilized. This is a must-attend course for revenue assurance and fraud management professionals. Course Objectives:  Understand what is Fraud and its Types  Understand the Interconnect Principles  Define Bypass Fraud and Understand its Characteristics  Comprehend SIM Box Interconnect Configuration Scenarios  Learn the Bypass Fraud Detection and Elimination tools  Comprehend the Deficiencies of Traditional Behavioral Detection tools  Learn the Non-Passive Push Calls Methodology
  • 3. +92 51 873 4525 | info@track4solutions.com | track4solutions.com 506-A, 5th Floor, Evacuee Trust Complex, F-5/1, Islamabad, Pakistan Pre Requisite Basic understanding of Fraud, Basic understanding of Networks and Interconnection Who Should Attend? Revenue Assurance and Fraud Managers/ Analysts /Consultants/ Implementation and Deployment Technicians/ Project Team Members/Researchers Course Outline: I. Telecommunications Fraud Overview A. Telecommunication Fraud Overview 1. What is Fraud 2. Motivation of Fraud 3. Operators Risk Exposure 4. New Access Methods 5. Billing Systems and Processes B. Interconnection Overview 1. Fundamentals of Interconnect Operations 2. Interconnect Network Design and Constraints 3. Interconnect Controls 4. Forms of Interconnections C. Types of Fraud 1. Illegal SIM Boxes a. Motivation and Scale b. Associated Risks 2. Subscription Fraud a. Motivation of Subscription Fraud b. Associated Risks 3. Roaming Fraud a. Motivation and Scale b. Associated Risks
  • 4. +92 51 873 4525 | info@track4solutions.com | track4solutions.com 506-A, 5th Floor, Evacuee Trust Complex, F-5/1, Islamabad, Pakistan 4. Premium Service Fraud a. Projected Revenue Unearned b. Associated Risk 5. Internal Fraud a. Motivation of Internal Fraud b. Impact and Scale of Internal Fraud 6. Partnership Fraud a. Types of Partnership Fraud b. Interconnect Fraud Recognition 7. Pre-Paid Services Fraud Methods a. Risk Associated with Recharge Methods b. Methods to Curb Pre-paid Fraud II. SIM Box and Bypass Fraud A. What is Bypass Fraud 1. By Pass Fraud Direct Effect a. Huge Revenue Loss b. Poor Voice Quality c. Increase in Post Dial Delay 2. By Pass Fraud Indirect Effect a. Inability to Call Back b. Short Duration Calls c. Increase in Call Drops B. GSM VOIP Gateways/SIM Boxes 1. What are SIM Boxes 2. SIM Box Functionality 3. Advanced SIM Box Features and Functionalities a. SIM-Rotation b. Remote Pre-Paid Recharging c. SIM-Card off-site Storage
  • 5. +92 51 873 4525 | info@track4solutions.com | track4solutions.com 506-A, 5th Floor, Evacuee Trust Complex, F-5/1, Islamabad, Pakistan C. Use of SIM Cloning for SIMBox/ByPass Fraud D. Use of International Roaming for SIMBox/Bypass Fraud E. Re-filing Numbers within SIMBox Fraud F. Effect of Special Rates between International Interconnects G. SIM Box Interconnect Configuration 3. SIM Box Location: Adjacent Operator’s Network a. Adjacent Network Inbound Mobile Originated Calls Delivery b. Scenario Identification and Details c. Scenario Treatment Difficulty d. Soft Loss e. Cases and Examples 4. SIM Box Location: In the Home Operator’s Network a. Adjacent Operator Outbound Mobile Originated Calls Delivery b. Scenario Identification and Details c. Outbound Termination Access Fees Payment d. Soft and Hard Loss Cases e. Cases and Examples 5. SIM Box Location: Within the Home Operator’s Network a. SIM Box Delivers and Terminated Calls On-Net b. Network Concerns c. Quality of Service d. Congestion e. Spectrum Management f. Network Utilization H. By-Pass Fraud Detection and Elimination 1. Traditional Behavioral Detection Examples a. Incoming to Outgoing Calls Ratio and Comparison i. “Voice Call Accepting” GSM Gateway Configuration ii. “Duration of Call” Comparison Counter Measure
  • 6. +92 51 873 4525 | info@track4solutions.com | track4solutions.com 506-A, 5th Floor, Evacuee Trust Complex, F-5/1, Islamabad, Pakistan iii. “Pre-Recorded Messaged or Dial Tones” b. No or Low Mobility i. “Take SIMs for a Ride” Counter Measure ii. Voice Call Making Location c. Distinct Numbers - High Number of Calls d. High Number of One Cell Subscribers e. High Number of Night Calls i. Placing GSM Gateways in Large Cells ii. Disabling Not-in-Use SIM Cards iii. Automatic SIM Mapping 2. Signaling-Based Monitoring a. Behavior Dependent b. Near-Real time Monitoring c. Media Dependent d. High Deployment Cost 3. Non-Passive By-Pass Fraud Detection and Elimination a. Solution Methodology b. Real-time Individual Calls Monitoring and Blocking c. Media Independent 4. Trunk Data a. Trunk Analysis b. Method of Trunk Analysis c. Advantage of Trunk Analysis 5. Detection and Elimination Tool Comparison 6. Case Studies and Exercises