SlideShare une entreprise Scribd logo
1  sur  8
Fraud in Telecoms
Sources of operational risk




© E.O’Connor – May 2008
DEFINITIONS
 Definition of Fraud varies by jurisdiction but a fair summary is:
 “a deception deliberately practiced in order to secure unfair or unlawful gain.”



 The Telecoms Management Forum defines Revenue Assurance as the:
       “data quality and process improvement methods that improve profits,
                      revenues and cash flows without influencing demand.”



 Together the revenue losses from RA and Fraud can be significant




                                                                                    2
A FEW RA & FRAUD ISSUES
             Revenue Assurance                        Fraud
                           Internal systems            B Employees
                           & processes
              Invoicing                                                 Number porting
              accuracy           Product mix
                                 complexity             Metallic
                                                        number resale
               Profitability
                                                                           “Goodwill” credits
                                     Incorrect
                                     pricing tables     Passing on of
              Real-time vs                              customer details
              batch processing                                                Box breaking
  Internal
                                   Channel            D   Call & port
                                   incentivisation        forwarding
               Pricing signals                                                 Theft SIMs ,
               driving behaviour                                               handsets &
                                                       Slamming
                                                                               subscriptions
                                     Process
                Accuracy of          interfaces           SIM Gateways
                data flows
                                                                               Roaming
                       Accuracy of customer
                       information at touchpoints      Bad debt & Credit
                                                       worthiness
  External
                                                                                                3
FRAUD
Fraudulent activities tend to fall into one of 7 categories:

 Voice – threat of impersonation for malicious or profitable motives
 Subscription – use of a legitimate subscriber’s network access for malicious or profitable
   motives
 Data – removal, inspection or insertion of data onto a network for malicious or profitable
   motives
 Internal – abuse of access to operator data by an employee for malicious or profitable
   motives
 Interconnection – exploitation of operator interconnection agreements for malicious or
   profitable motives
 Roaming – exploitation of operator roaming agreements for malicious or profitable
   motives
 Technical – use of counterfeiting or other technologies to duplicate, infiltrate or manipulate
   a mobile network for malicious or profitable motives


                                                                                                   4
EXAMPLE OF FRAUDULENT ACTIVITIES
Subscription fraud                                      Roaming fraud (I)
 Call selling using GSM conference calling              Where operators have roaming agreements
   feature where fraudster acts as an ‘operator’           Operator A must pay Operator B for the time
   setting up calls between parties and then               used by their customers on Operator’s B network
   dropping out to set up another                          regardless of whether Operator A is paid for the
 GSM call forwarding where fraudster sets call            time
   forward to required number. Caller calls the          Principle problem is the time it takes for billing
   fraudster’s phone and is transferred. Caller only       from Operator B to Operator A - used to be 72
   pays for the call to the fraudster’s phone number.      hours now down to 24 hours using EDI
 Fraudsters using a gateway to provide an               GSM MoU states that any user exceeding 100
   international ‘call box’ from shops                     Special Drawing Rights (SDR) must be billed
                                                           within 24 hours
Internal Fraud                                           But, when is collection actually made?
 Mobile markets are very competitive with
    operators subsidising handsets to entice new        Roaming fraud (II)
    customers to subscribe. Dealer or gangs often        SIM cards are taken out of phones acquired with
    sell these handsets on to overseas buyers. And         false identities and sent abroad where they are
    of course pre-paid handsets can be unlocked            used in call selling fraud. Call lengths of over 10
    and used on any network                                hours typical




                                                                                                                 5
THE CHALLENGE
 The ‘natural’ order of tasks for revenue assurance is to:
     monitor for evidence of loss
     investigate where & why there is loss
     resolve the problems so loss does not occur again


 However changing nature of business relationships means
     not clear where boundaries lie & hence where operational risk may arise
     process design & data integrity becomes even more important




                                          Service Provider
                                                             Content
 Collaborative methods of working                           Services




                                                                                                                                              Enterprise




                                                                                                                                                                         Customer
                                                                                                                    Gamma Telecom
                                                                                                                                    Virtual                Contracting              End-user
                                                                                                                                    Network                party




                                                                 Fixed Operator
  are essential to mutually assure                                                Carrier
                                                                                  Services
                                                                                                                                    Enabler


  data, revenues & costs


                                                                                       Mobile Operator
                                                                                                         Bearer
                                                                                                         Services




                                                                                                                                                                                               6
SUMMARY
 The major sources of revenue           Follow the cash
  loss continue to be:                   Understand the processes
    Fraud                               Audit rights with partners
    Credit management
                                         Strength & enforceability of
    Least-cost-routing errors            commercial agreements
    Interconnect / partner-payment
                                         Traceability of products in the
     errors
                                          distribution chain
    Poor processes & systems
                                         Integrity of interfaces – human &
                                          automated
 All adds up to a loss of
                                         Training & culture
  customer confidence in your
  business…                              Who has access to customer
                                          data?




                                                                              7
TECHNIQUES FOR AUDITING
Track-Back Approach                        The Grid Approach
 Audit works backwards from a              The key mobile revenue streams &
   convenient point, such as the             logical operations for each stream
   customer invoice, to the first source     are identified and set out in a grid
   of data capture                            (e.g. voice, sms, interconnect streams versus
                                              switch, mediation, rating, invoicing operations)

 Allows the detail of how the data
  flows & is manipulated to be              Offers a useful visual framework to
                                             help identify common processes &
  understood and data integrity /
                                             enable a high-level understanding of
  leakage risks quantified                   how the processes work, the controls
                                             and checks, known leakages and the
 Can be a time consuming process            confidence that all leakages / fraud
                                             risks have been identified

                                            The issue is that this approach may
                                             not capture sufficient detail nor show
                                             the commonality of operations
                                             between revenue streams

                                                                                                 8

Contenu connexe

Tendances

Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managers
rickycfe
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
mbachnak
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud Prevention
Blackbaud
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
efandeye
 

Tendances (20)

Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managers
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud Prevention
 
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Bank frauds
Bank fraudsBank frauds
Bank frauds
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Types of Fraud.pptx
Types of Fraud.pptxTypes of Fraud.pptx
Types of Fraud.pptx
 
Workshop on Fraud Investigation
Workshop on Fraud InvestigationWorkshop on Fraud Investigation
Workshop on Fraud Investigation
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Credit card frauds
Credit card fraudsCredit card frauds
Credit card frauds
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in banks
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
 
Preventing Bank's Fraud and Forgery
Preventing Bank's Fraud and ForgeryPreventing Bank's Fraud and Forgery
Preventing Bank's Fraud and Forgery
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 

En vedette (6)

Ethics in Telecom Sector
Ethics in Telecom SectorEthics in Telecom Sector
Ethics in Telecom Sector
 
The impact of telecommunications policy on the economy - Raul L. Katz and Ja...
The impact of telecommunications policy on the economy  - Raul L. Katz and Ja...The impact of telecommunications policy on the economy  - Raul L. Katz and Ja...
The impact of telecommunications policy on the economy - Raul L. Katz and Ja...
 
Telecom industry in india
Telecom industry in indiaTelecom industry in india
Telecom industry in india
 
2G Spectrum Scam: Case-study
2G Spectrum Scam: Case-study2G Spectrum Scam: Case-study
2G Spectrum Scam: Case-study
 
Telecom Sector in India
Telecom Sector in IndiaTelecom Sector in India
Telecom Sector in India
 
Telecom Sector
Telecom SectorTelecom Sector
Telecom Sector
 

Similaire à Fraud in Telecoms

ANZ Trend Micro Campaign Creative 11 SEPT 2010
ANZ Trend Micro Campaign Creative 11 SEPT 2010ANZ Trend Micro Campaign Creative 11 SEPT 2010
ANZ Trend Micro Campaign Creative 11 SEPT 2010
Graeme Wood
 
Cem webinar brazil_final
Cem webinar brazil_finalCem webinar brazil_final
Cem webinar brazil_final
Rafael Junquera
 
Effective administration of mobile number portability databases and systems –...
Effective administration of mobile number portability databases and systems –...Effective administration of mobile number portability databases and systems –...
Effective administration of mobile number portability databases and systems –...
BSP Media Group
 
Grabovsky a.t.kearney telco-form_08.06.11
Grabovsky a.t.kearney telco-form_08.06.11Grabovsky a.t.kearney telco-form_08.06.11
Grabovsky a.t.kearney telco-form_08.06.11
Андрей Лукин
 

Similaire à Fraud in Telecoms (20)

TelBill Product Overview
TelBill Product OverviewTelBill Product Overview
TelBill Product Overview
 
TelBill Overview
TelBill OverviewTelBill Overview
TelBill Overview
 
ANZ Trend Micro Campaign Creative 11 SEPT 2010
ANZ Trend Micro Campaign Creative 11 SEPT 2010ANZ Trend Micro Campaign Creative 11 SEPT 2010
ANZ Trend Micro Campaign Creative 11 SEPT 2010
 
Anz campaign creative 11 sept 2010
Anz campaign creative 11 sept 2010Anz campaign creative 11 sept 2010
Anz campaign creative 11 sept 2010
 
PartnerTEL TEM Services
PartnerTEL TEM ServicesPartnerTEL TEM Services
PartnerTEL TEM Services
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
 
B2B eCommerce
B2B eCommerceB2B eCommerce
B2B eCommerce
 
Mobility Platform for Insurers
Mobility Platform for InsurersMobility Platform for Insurers
Mobility Platform for Insurers
 
Mobility Platform for Insurers
Mobility Platform for InsurersMobility Platform for Insurers
Mobility Platform for Insurers
 
e-Business ideas in Telecom
e-Business ideas in Telecome-Business ideas in Telecom
e-Business ideas in Telecom
 
Cut Costs by as much as 60% on Communications!
Cut Costs by as much as 60% on Communications!Cut Costs by as much as 60% on Communications!
Cut Costs by as much as 60% on Communications!
 
Cut Costs by as much as 60% on Communications!
Cut Costs by as much as 60% on Communications!Cut Costs by as much as 60% on Communications!
Cut Costs by as much as 60% on Communications!
 
Scalability problems and E-business
Scalability problems and E-businessScalability problems and E-business
Scalability problems and E-business
 
Cem webinar brazil_final
Cem webinar brazil_finalCem webinar brazil_final
Cem webinar brazil_final
 
Delivering the Next Generation Airport
Delivering the Next Generation AirportDelivering the Next Generation Airport
Delivering the Next Generation Airport
 
IMOBIX RoamSource
IMOBIX RoamSourceIMOBIX RoamSource
IMOBIX RoamSource
 
Effective administration of mobile number portability databases and systems –...
Effective administration of mobile number portability databases and systems –...Effective administration of mobile number portability databases and systems –...
Effective administration of mobile number portability databases and systems –...
 
Grabovsky a.t.kearney telco-form_08.06.11
Grabovsky a.t.kearney telco-form_08.06.11Grabovsky a.t.kearney telco-form_08.06.11
Grabovsky a.t.kearney telco-form_08.06.11
 

Dernier

Dernier (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Fraud in Telecoms

  • 1. Fraud in Telecoms Sources of operational risk © E.O’Connor – May 2008
  • 2. DEFINITIONS  Definition of Fraud varies by jurisdiction but a fair summary is: “a deception deliberately practiced in order to secure unfair or unlawful gain.”  The Telecoms Management Forum defines Revenue Assurance as the: “data quality and process improvement methods that improve profits, revenues and cash flows without influencing demand.”  Together the revenue losses from RA and Fraud can be significant 2
  • 3. A FEW RA & FRAUD ISSUES Revenue Assurance Fraud Internal systems B Employees & processes Invoicing Number porting accuracy Product mix complexity Metallic number resale Profitability “Goodwill” credits Incorrect pricing tables Passing on of Real-time vs customer details batch processing Box breaking Internal Channel D Call & port incentivisation forwarding Pricing signals Theft SIMs , driving behaviour handsets & Slamming subscriptions Process Accuracy of interfaces SIM Gateways data flows Roaming Accuracy of customer information at touchpoints Bad debt & Credit worthiness External 3
  • 4. FRAUD Fraudulent activities tend to fall into one of 7 categories:  Voice – threat of impersonation for malicious or profitable motives  Subscription – use of a legitimate subscriber’s network access for malicious or profitable motives  Data – removal, inspection or insertion of data onto a network for malicious or profitable motives  Internal – abuse of access to operator data by an employee for malicious or profitable motives  Interconnection – exploitation of operator interconnection agreements for malicious or profitable motives  Roaming – exploitation of operator roaming agreements for malicious or profitable motives  Technical – use of counterfeiting or other technologies to duplicate, infiltrate or manipulate a mobile network for malicious or profitable motives 4
  • 5. EXAMPLE OF FRAUDULENT ACTIVITIES Subscription fraud Roaming fraud (I)  Call selling using GSM conference calling  Where operators have roaming agreements feature where fraudster acts as an ‘operator’ Operator A must pay Operator B for the time setting up calls between parties and then used by their customers on Operator’s B network dropping out to set up another regardless of whether Operator A is paid for the  GSM call forwarding where fraudster sets call time forward to required number. Caller calls the  Principle problem is the time it takes for billing fraudster’s phone and is transferred. Caller only from Operator B to Operator A - used to be 72 pays for the call to the fraudster’s phone number. hours now down to 24 hours using EDI  Fraudsters using a gateway to provide an  GSM MoU states that any user exceeding 100 international ‘call box’ from shops Special Drawing Rights (SDR) must be billed within 24 hours Internal Fraud  But, when is collection actually made?  Mobile markets are very competitive with operators subsidising handsets to entice new Roaming fraud (II) customers to subscribe. Dealer or gangs often  SIM cards are taken out of phones acquired with sell these handsets on to overseas buyers. And false identities and sent abroad where they are of course pre-paid handsets can be unlocked used in call selling fraud. Call lengths of over 10 and used on any network hours typical 5
  • 6. THE CHALLENGE  The ‘natural’ order of tasks for revenue assurance is to:  monitor for evidence of loss  investigate where & why there is loss  resolve the problems so loss does not occur again  However changing nature of business relationships means  not clear where boundaries lie & hence where operational risk may arise  process design & data integrity becomes even more important Service Provider Content  Collaborative methods of working Services Enterprise Customer Gamma Telecom Virtual Contracting End-user Network party Fixed Operator are essential to mutually assure Carrier Services Enabler data, revenues & costs Mobile Operator Bearer Services 6
  • 7. SUMMARY  The major sources of revenue  Follow the cash loss continue to be:  Understand the processes  Fraud  Audit rights with partners  Credit management  Strength & enforceability of  Least-cost-routing errors commercial agreements  Interconnect / partner-payment  Traceability of products in the errors distribution chain  Poor processes & systems  Integrity of interfaces – human & automated  All adds up to a loss of  Training & culture customer confidence in your business…  Who has access to customer data? 7
  • 8. TECHNIQUES FOR AUDITING Track-Back Approach The Grid Approach  Audit works backwards from a  The key mobile revenue streams & convenient point, such as the logical operations for each stream customer invoice, to the first source are identified and set out in a grid of data capture (e.g. voice, sms, interconnect streams versus switch, mediation, rating, invoicing operations)  Allows the detail of how the data flows & is manipulated to be  Offers a useful visual framework to help identify common processes & understood and data integrity / enable a high-level understanding of leakage risks quantified how the processes work, the controls and checks, known leakages and the  Can be a time consuming process confidence that all leakages / fraud risks have been identified  The issue is that this approach may not capture sufficient detail nor show the commonality of operations between revenue streams 8