Telecomm Fraud can be broken into several generic classes. These classes describe the mode in which the operator was defrauded and include subscription fraud, call surfing, ghosting, accounting fraud and information abuse. Each mode can be used to defraud the network for revenue based purposes or non-revenue based purposes.
Subscription FraudSubscription fraud occurs when an unsuspecting party have their identity stolen or a customer tries to evade payment. Essentially, personal details provided to the company are erroneous and designed to deceive the company into setting up an account. Reasons for this may include a customer knowing that they are a credit liability due to CCJ's or other credit problems; or a fraudster needs to obtain "legitimate" access to the telecomm network to perpetrate further modes of fraud.Subscription fraud causes serious financial loses to the telecommunication operators, but in many instances may not be attributed to fraud. If someone does not pay their bill, then the telecomm company has to establish if the person was fraudulent or is merely unable to pay. This may result in a lot of subscription fraud being classified as bad debt. The BT Group in 2001-2002 estimated that bad debt cost the company ~£79 million.Call Surfing is when an outside party will gain unauthorised access to the operators network through several methods such as call forwarding, cloning, shoulder surfing.Call Surfing can include gaining access to a company's PABX (Private Branch Exchange) either via social engineering, or by lack of security. Social Engineering could be considered as: A person rings the company's telephone administrators claiming to be a BT engineer performing a line test, they ask for the password so that they can negotiate access to the call-back of the PABX; or a employee in a large company receives a call from a person claiming to have got the wrong extension, and requests if they could put them through to extension 901, with 9 being the external dialling code of the PBX and 01 being the international prefix.These may be unrealistic scenarios, but it is all too easy for someone to gain access to a system this way. Once the cracker has access to the PABX, they can use it to forward calls internationally or to premium rate service lines. All they pay for is the cost of the call to the company, while the company picks up the cost call to the proper destination. The cracker may even escape paying for the original call if they covered their tracks, for instance via subscription fraud.Cloning of mobile phones is another issue that will arise, especially since the early mobile phones operated on analogue with the signal emanating from the phone being easy to detect and read, and thus the technology used to identify each phone uniquely was susceptible to being read. With this information, the fraudster would be able to reprogram one of their own phones to match these unique details. Once done, the con artist would be able to use the phone to make all the calls that they needed without the original phone owner knowing (until they get the telephone bill that is).
Accounting Fraud can occur through manipulation of accounting systems and maybe used to help someone avoid having to pay for the service. Normally this is an internal problem. Accounting Fraud would normally occur, when someone would want to try and get cash back at the end of their billing period, or have their bill reduced.
Ghosting requires knowledge of the internal systems, maybe an employee would set up an account that would not need to be billed or remove billing details from the system. On the other hand, schemes may involve creating a piece of tone generating hardware that will fool the switch centre into thinking that a call might be a free call, or is operating from a public telephone. Essentially, they are "Ghosts" on the system as there is little or no trace of them ever being present on the network.
Information Abuse occurs when an employee can use the telecommunications companies software to access privileged information about clients or systems. This information maybe passed on to third parties and used in further fraud. However, it is not solely limited to this, for instance company A might place spies into company B to find out information about any alliances that company B might have. Again, this is an internal fraud.
My Related Documents |
C#, .Net Framework, C#, .Net Framework: RE: Bluetooth Library |
Related Amazon Books |
Maximize Business Profits Through E-Partnerships: View From Amazon UK/View From Amazon USA Integrated Broadband Networks: The Public Policy Issues: View From Amazon UK/View From Amazon USA Introduction to Public Switched Telephone Networks; POTS, ISDN, DLC, DSL, and PON Technologies, Systems and Services: View From Amazon UK/View From Amazon USA Data Transmission Via PABX's: View From Amazon UK/View From Amazon USA Smart Mobs: The Next Social Revolution: View From Amazon UK/View From Amazon USA Digital Private Branch Exchanges: View From Amazon UK/View From Amazon USA Implementing the IP-PBX: IP Telephony for Customer Premises (McGraw-Hill Telecom Professional): View From Amazon UK/View From Amazon USA Telecommunications Convergence: How to Profit from the Convergence of Technologies, Services and Companies (Telecom Portable Consultant S.): View From Amazon UK/View From Amazon USA Into the Networked Age: How IBM and Other Firms Are Getting There Now: View From Amazon UK/View From Amazon USA The New Forensics: Investigating Corporate Fraud and the Theft of Intellectual Property: View From Amazon UK/View From Amazon USA Avoiding Cyber Fraud in Small Businesses: What Auditors and Owners Need to Know: View From Amazon UK/View From Amazon USA MCAD Training Guide 70-320: Developing XML Web Services and Server Components with Visual C#.NET and the .NET Framework: View From Amazon UK/View From Amazon USA Information Theory and Statistics: View From Amazon UK/View From Amazon USA The Road to IP Telephony: How CISCO Systems Migrated from PBX to IP Telephony: View From Amazon UK/View From Amazon USA Centrex or PBX: The Impact of IP (Telecommunications Library): View From Amazon UK/View From Amazon USA Practical IP and Telecom for Broadcast Engineering and Operations: View From Amazon UK/View From Amazon USA |
Related Images From Flickr |
[[posterous-content:nhmuqifmAoIyBkAwntEf]][[posterous-content:nonGlIzsesqBpolrEvzw]][[posterous-content:kGBrApaCkvFmJwJsDEsv]][[posterous-content:HBGqDxHrbodCIjEpvCAh]][[posterous-content:zfturuyubAfvCvqphJrE]][[posterous-content:mEIDAwduFGHxjjytsGDH]][[posterous-content:EEIlbsDmCBGqxwgiGkBj]][[posterous-content:neHCeHkhmJEgsDiECyaq]][[posterous-content:zqmeHCDuJEvrHxzIjfHH]][[posterous-content:ovGJoCpEbGdmraGpICla]][[posterous-content:lhvEgCCvBaCIzpFdydhk]] |