A Little excerpt about telecoms fraud

I have just uploaded a little excerpt from my Final Year project about Telecoms Fraud. Basically I will use this as a grounding for creating my Neural Network in C#.

Enjoy! :)

Telecomm Fraud can be broken into several generic classes. These classes describe the mode in which the operator was defrauded and include subscription fraud, call surfing, ghosting, accounting fraud and information abuse. Each mode can be used to defraud the network for revenue based purposes or non-revenue based purposes.

Subscription Fraud

Subscription fraud occurs when an unsuspecting party have their identity stolen or a customer tries to evade payment. Essentially, personal details provided to the company are erroneous and designed to deceive the company into setting up an account. Reasons for this may include a customer knowing that they are a credit liability due to CCJ's or other credit problems; or a fraudster needs to obtain "legitimate" access to the telecomm network to perpetrate further modes of fraud.

Subscription fraud causes serious financial loses to the telecommunication operators, but in many instances may not be attributed to fraud. If someone does not pay their bill, then the telecomm company has to establish if the person was fraudulent or is merely unable to pay. This may result in a lot of subscription fraud being classified as bad debt. The BT Group in 2001-2002 estimated that bad debt cost the company ~£79 million.

Call Surfing

Call Surfing is when an outside party will gain unauthorised access to the operators network through several methods such as call forwarding, cloning, shoulder surfing.

Call Surfing can include gaining access to a company's PABX (Private Branch Exchange) either via social engineering, or by lack of security. Social Engineering could be considered as: A person rings the company's telephone administrators claiming to be a BT engineer performing a line test, they ask for the password so that they can negotiate access to the call-back of the PABX; or a employee in a large company receives a call from a person claiming to have got the wrong extension, and requests if they could put them through to extension 901, with 9 being the external dialling code of the PBX and 01 being the international prefix.

These may be unrealistic scenarios, but it is all too easy for someone to gain access to a system this way. Once the cracker has access to the PABX, they can use it to forward calls internationally or to premium rate service lines. All they pay for is the cost of the call to the company, while the company picks up the cost call to the proper destination. The cracker may even escape paying for the original call if they covered their tracks, for instance via subscription fraud.

Cloning of mobile phones is another issue that will arise, especially since the early mobile phones operated on analogue with the signal emanating from the phone being easy to detect and read, and thus the technology used to identify each phone uniquely was susceptible to being read. With this information, the fraudster would be able to reprogram one of their own phones to match these unique details. Once done, the con artist would be able to use the phone to make all the calls that they needed without the original phone owner knowing (until they get the telephone bill that is).

Accounting Fraud

Accounting Fraud can occur through manipulation of accounting systems and maybe used to help someone avoid having to pay for the service. Normally this is an internal problem. Accounting Fraud would normally occur, when someone would want to try and get cash back at the end of their billing period, or have their bill reduced.

Ghosting

Ghosting requires knowledge of the internal systems, maybe an employee would set up an account that would not need to be billed or remove billing details from the system. On the other hand, schemes may involve creating a piece of tone generating hardware that will fool the switch centre into thinking that a call might be a free call, or is operating from a public telephone. Essentially, they are "Ghosts" on the system as there is little or no trace of them ever being present on the network.

Information Abuse

Information Abuse occurs when an employee can use the telecommunications companies software to access privileged information about clients or systems. This information maybe passed on to third parties and used in further fraud. However, it is not solely limited to this, for instance company A might place spies into company B to find out information about any alliances that company B might have. Again, this is an internal fraud.

Technorati Tags
[feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed], [feed]

Related Wikipedia Documents
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

My Related Documents
,

Related Amazon Books
Maximize Business Profits Through E-Partnerships: / Integrated Broadband Networks: The Public Policy Issues: / Introduction to Public Switched Telephone Networks; POTS, ISDN, DLC, DSL, and PON Technologies, Systems and Services: / Data Transmission Via PABX's: / Smart Mobs: The Next Social Revolution: / Digital Private Branch Exchanges: / Implementing the IP-PBX: IP Telephony for Customer Premises (McGraw-Hill Telecom Professional): / Telecommunications Convergence: How to Profit from the Convergence of Technologies, Services and Companies (Telecom Portable Consultant S.): / Into the Networked Age: How IBM and Other Firms Are Getting There Now: / The New Forensics: Investigating Corporate Fraud and the Theft of Intellectual Property: / Avoiding Cyber Fraud in Small Businesses: What Auditors and Owners Need to Know: / MCAD Training Guide 70-320: Developing XML Web Services and Server Components with Visual C#.NET and the .NET Framework: / Information Theory and Statistics: / The Road to IP Telephony: How CISCO Systems Migrated from PBX to IP Telephony: / Centrex or PBX: The Impact of IP (Telecommunications Library): / Practical IP and Telecom for Broadcast Engineering and Operations: /

Related Images From Flickr
[[posterous-content:nhmuqifmAoIyBkAwntEf]][[posterous-content:nonGlIzsesqBpolrEvzw]][[posterous-content:kGBrApaCkvFmJwJsDEsv]][[posterous-content:HBGqDxHrbodCIjEpvCAh]][[posterous-content:zfturuyubAfvCvqphJrE]][[posterous-content:mEIDAwduFGHxjjytsGDH]][[posterous-content:EEIlbsDmCBGqxwgiGkBj]][[posterous-content:neHCeHkhmJEgsDiECyaq]][[posterous-content:zqmeHCDuJEvrHxzIjfHH]][[posterous-content:ovGJoCpEbGdmraGpICla]][[posterous-content:lhvEgCCvBaCIzpFdydhk]]