SlideShare une entreprise Scribd logo
1  sur  26
Revenue Frauds and Telecom Operators




                 Muhammad Rasheed Khan
                                AD, CA
Agenda
     g

       Background

       Fraud-Definitions

       Different Forms of Revenue Fraud

       Fraud Prevention Methods

       Conclusion

       Recommendations




2                    Pakistan Telecommunication Authority
Why?
      y


Background


◘   Revenue F d against
    R       Fraud  i t

    licensed telecom operators




    What is visible is just
the tip of the iceberg……..

3                             Pakistan Telecommunication Authority
$$

        Commercial Magnitude of Telecom Fraud
    ◘   $50 Billion 2004
            Billi
    ◘   $60 Billion 2006
    ◘   Estimates
        E ti t vary but probably stable around $50 - $60 Billion
                      b t   b bl t bl         d            Billi
        per annum worldwide according to a 2008 report of CFCA
    ◘   The fraud tends to increase during recession
    ◘   A value of up to 6% of total company revenue is not unusual
        in US
    ◘   In recently liberalised markets the figures are up to 20%

    Source: CFCA: Communications Fraud Control Association (CFCA)

4                              Pakistan Telecommunication Authority
$$
    •   Middle East
         >  President of Telco confirmed over US $400million loss in 2006
    •   Mid Asia
         >   Regulator and others publish loses over US $500million in 2006
    •   North Africa
         >   PT&T measured loss at US $400million in 2006
    •   Sub Sahara Africa
        Sub­Sahara Africa
         >   Measured at over US $60million losses in 2005
    •   Central America
         >   Government officially recognizes loss over US $100million in 2006
    •   Europe
         >   VoIP bypass calls exceeded $3bn in 2005 to Africa
                  b        ll       d d$ b         5     f

5                             Pakistan Telecommunication Authority
$$
•       Pakistan
         >  No formal study carried out
            No formal study carried out
        >    Estimates differ by vast amounts

        >    In the range of  3   5 billion PKR   
             In the range of 3 ‐ 5 billion PKR
             annually (35 – 60 million USD)




    6                             Pakistan Telecommunication Authority
Why?
      y

        Effects of revenue losses occurring from fraud
    >   Reduced revenue to Licensed Telecom Operators by
        free/cheaper call offering by illegal telecom operators;
        stealing current and future revenues
               g
    >   Loss of taxes and levies to the government exchequers
        (which are based on telecom operator’s revenues)
    >   Financial loss to regulators (regulators are normally funded
        on a percentage of annual licence fees from licensed
        operators). Same for ICT R&D Fund and USF.
    >   Telcos may end up paying PRS partners for fraudulent calls
    >   Security threats posed by absence of lawful interception and
        non availability of caller identity information

7                            Pakistan Telecommunication Authority
What is Fraud?
        Fraud

    >   “Intentional misrepresentation or concealment of information
        “I t ti    l i          t ti            l   t fi f      ti
        in order to deceive or mislead.”

        Telecom Fraud

    >   According to CFCA the use of the telecommunications
                     CFCA,
        network with the intention of avoiding payment

        •   without correct payment
             ith t        t       t

        •   with no payment at all

        •   someone else pays
8                              Pakistan Telecommunication Authority
Fraud Triangle
               g




9                    Pakistan Telecommunication Authority
Characteristics of Telecom Fraud

 >   Telco fraud seen as victimless

 >   Crime committed remotely - minimises detection risk

 >   Often,
     Often no equipment is needed

 >   Easy conversion to cash - eg call selling

 >   Telecom products are complex and become more so with
     further interactions with other products
                                     p




10                      Pakistan Telecommunication Authority
Types of Revenue Frauds
  yp

 >   There are more than 200 types of frauds and the number is on
     the rise

 >   We briefly discuss only the most common types here

     •   Subscription Fraud

     •   Teeing-in or Clipping on

     •   Internal Fraud-Magic Phones

     •   GSM Interconnect Bypass

     •   GSM International Gateway Bypass
                                 y y


11                            Pakistan Telecommunication Authority
Fraud Types Chronology
        yp           gy


 >   50-70s: Teeing-in Payphone Tapping
             Teeing-in,

 >   70-90s: Meter tempering, 3rd party billing,

 >   90s onwards: PBX, Magic Phones, GSM bypass




12                        Pakistan Telecommunication Authority
Subscription Frauds (Mobile and Fixed)
        p            (                )
>    Customer has No Intention to Pay
>    Customer misrepresenting his/her
     identity (e.g. stolen electricity bills)
>    Use of forged salary slip to get high
     credit li it
        dit limits
>    Misuse of value-added, international
     roaming and PRS services
           g
>    Initial bills are paid on time “sleeper”,
     followed by heavy usage - default to
     pay - forced churn
>    Appears like bad debt
>    Almost always associated with call
     selling
13                           Pakistan Telecommunication Authority
Teeing-
 Teeing-In or Clipping On (Fixed Line)

 >   Connecting an instrument “box” parallel
     to the telephone line

 >   Divert the stolen line to fake subscriber

 >   Legitimate user loses connection on
     and off when the fake subscriber is
     using the line.

 >   May also be used against Public
       yp
     Payphones

14                           Pakistan Telecommunication Authority
Internal Frauds (Mobile and Fixed)
                     (                )
>   All telecom networks face the risk
    of being compromised from within
>   Providing value-added services to
    customers free of cost, un-
    authorised bill adjustments and
    discounted tariff to customers
>   Temptation of financial gain; or
    disgruntled employees may take
    their revenge
>   “Magic phones/SIMs” employ
     Magic phones/SIMs
    network vulnerabilities to provide
    certain services free of cost or to
    charge 3rd party for the services
    used by the magic phone user
    15                      Pakistan Telecommunication Authority
GSM Interconnect Bypass (
                   yp    (Mobile and Fixed)
                                          )

 >   Corporate customers use intelligent PBX to bypass the
     interconnection costs for Fixed to Mobile calls

 >   The intelligent PBX can sense the number being dialled and
     doesn’t route it through fixed lines but through SIM box
     containing SIMS of the CMO being called.
        t i i SIMSs f th        b i     ll d

 >   Calling from fixed terminal but CLI of called mobile shows the
     incoming call from mobile number (on-net call)

 >   The mobile number seen on CLI cannot be called back …!!!
                                                          !!!

16                       Pakistan Telecommunication Authority
GSM Interconnect Bypass (
                      yp    (Mobile and Fixed)
                                             )
>    Illustration
                    Both outgoing                 No incoming call
                                                            g
                    and incoming
                                             20 CMO lines
                        5 fixed               (each CMO
                         lines                 selected)




                                                                     0345-XXXX
                                                                       calling

17                        Pakistan Telecommunication Authority
GSM Interconnect Bypass (
                   yp    (Mobile and Fixed)
                                          )

 >   Cost savings for corporate fraudsters and revenue losses to
     telcos are huge
 >   For a 30 second call to Mobile
     •   Ordinary fixed line charges = PKR 2.5 (excluding tax)
                                           25
     •   Using interconnect bypass cost = PKR 0.63 (excluding tax)
     •   Saving / loss of PKR 1.87

     PKR 1.6 Loss to fixed line operator                  PKR 0.27 Loss to CMO
         2.5 – MTR (0.9) = PKR 1.6                     tariff – MTR (0.9) = PKR 0.27
 >   Actual losses are even higher because of corporate discounts
     negotiated by such clients
 >   On-net
     On net calls are also free in certain situations

18                          Pakistan Telecommunication Authority
International Gateway Bypass (
                     y yp     (Mobile and Fixed)
                                               )

 >   Illegal gateway exchange terminate voice over internet protocol
     (VoIP) International calls over public switched telephone
     network (PSTN) or over the GSM network
 >   Bypassing the legal International Gateways
      yp     g       g                       y
 >   Fraudster receives international calls from foreign countries
     over VoIP (through an ISP)
 >   Illegal operator collects revenue from foreign callers
 >   Losses to telcos
     •   LDI operator loses foreign revenue from carriers
     •   LL operator loses APCL
     •   Mobile operator loses MTR

19                          Pakistan Telecommunication Authority
International Gateway Bypass
                     y yp




20               Pakistan Telecommunication Authority
Fraud Prevention and Management
                          g

 >   Finding telecommunications fraud in masses of call records is
     more diffi lt th fi di a needle i a h
          difficult than finding dl in haystack.
                                           t k




21                       Pakistan Telecommunication Authority
Activities                                                           Required resources


       • Risk assessment review                                         • Expertise in telecom
Min




       • Define fraud management policy                                   fraud management
       • Create awareness regarding
                            g     g                                     • Expertise in risk assessment
                                                                             p
         fraud & its management

       • Perform customer vetting & Cr.                                            • Tools to support authentication,
       rating                                           Internal                     Cr. Rating & exposure
       • Set alerts based o Usage, C
             a e ts       on       Cr.                  Security                   • Experience of use of techniques
         Exposure, dealer performance                                                & tools to manage telecom fraud
       • Tighten data & network security
       • Maintain audit trails
                                                                                        • Capability to process CDR
                                                Fraud prevention                          to generate alerts
       • Process CDRs & monitor
         alerts and usage reports                                                       • Alerts monitoring experience
       • Reconciliation audits

                                                                                                         • Fraud analysis
       • Analyse alerts                           Fraud detection                                          experience
       • Investigate                                                                                     • Knowledge of
Max




         fraud & impact                                                                                  law enforcement
       • Take action            Fraud investigation & prosecution

COST

      22                                   Pakistan Telecommunication Authority
Fraud Detection


 >   An average mobile p
             g         phone operator p
                              p       produces 250 million
     CDRs every week. (CFCA estimate)

 >   Gigantic d t b
     Gi   ti databases; l
                        large d t warehouses
                              data    h

 >   Fraud Management Systems (FMS) rely on complex data
     mining techniques

 >   $$$




23                       Pakistan Telecommunication Authority
Conclusion

 >   Revenue Fraud is a reality

 >   This menace is continuously on the rise

 >   It is not only affecting the telcos but the regulator and
     Government as well (since tax receipts and other subscriptions
     are based on teleco revenues)




24                        Pakistan Telecommunication Authority
Recommendations
 >   Incentivise CMOs, being the biggest markets takers, to invest
     in FMS

 >   Possible funding source % share from APC which must be
     spent on FMS for international bypass detection

 >   This investment will be recovered when CMO revenues
     increase and consequently the subscriptions and levies
     received from CMOs are increased

 >   Further benefits will emerge from shared responsibility of
     bypass detection between PTA and CMOs
25                       Pakistan Telecommunication Authority
Thank you for patience……..

               Questions




26        Pakistan Telecommunication Authority

Contenu connexe

Tendances

Ethics in Telecom Sector
Ethics in Telecom SectorEthics in Telecom Sector
Ethics in Telecom SectorSagar Patekar
 
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...cVidya Networks
 
Wholesale Fraud - Jason Lane-Sellers of cVidya
Wholesale Fraud - Jason Lane-Sellers of cVidyaWholesale Fraud - Jason Lane-Sellers of cVidya
Wholesale Fraud - Jason Lane-Sellers of cVidyacVidya Networks
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Jacqueline Fick
 
Fraud Management Industry Update Webinar
Fraud Management Industry Update WebinarFraud Management Industry Update Webinar
Fraud Management Industry Update WebinarcVidya Networks
 
Dubai 1
Dubai 1Dubai 1
Dubai 1mmavis
 
The Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersThe Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersEckoh
 
Fonreg presentation - official
Fonreg presentation - officialFonreg presentation - official
Fonreg presentation - officialAyodele Thomas
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENAlan Percy
 
Effective STIR/SHAKEN and Robocall Solutions that Work Today
Effective STIR/SHAKEN and Robocall Solutions that Work TodayEffective STIR/SHAKEN and Robocall Solutions that Work Today
Effective STIR/SHAKEN and Robocall Solutions that Work TodayDonaldStDenis1
 
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQAlan Percy
 
Alternative Finance & Payments stream - Stuart Sykes slides
Alternative Finance & Payments stream - Stuart Sykes slidesAlternative Finance & Payments stream - Stuart Sykes slides
Alternative Finance & Payments stream - Stuart Sykes slidesCallcredit123
 
Mobile Device: Regulation and Reality
Mobile Device: Regulation and RealityMobile Device: Regulation and Reality
Mobile Device: Regulation and RealityArief Gunawan
 
Ict2005 fms
Ict2005 fmsIct2005 fms
Ict2005 fmskkvences
 
Identity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms SessionIdentity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms SessionAlan Quayle
 
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...Ryan Thurman
 

Tendances (20)

Ethics in Telecom Sector
Ethics in Telecom SectorEthics in Telecom Sector
Ethics in Telecom Sector
 
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
 
Wholesale Fraud - Jason Lane-Sellers of cVidya
Wholesale Fraud - Jason Lane-Sellers of cVidyaWholesale Fraud - Jason Lane-Sellers of cVidya
Wholesale Fraud - Jason Lane-Sellers of cVidya
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23
 
Fraud in Telecoms
Fraud in TelecomsFraud in Telecoms
Fraud in Telecoms
 
Fraud Management Industry Update Webinar
Fraud Management Industry Update WebinarFraud Management Industry Update Webinar
Fraud Management Industry Update Webinar
 
Dubai 1
Dubai 1Dubai 1
Dubai 1
 
The Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersThe Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact Centers
 
Fonreg presentation - official
Fonreg presentation - officialFonreg presentation - official
Fonreg presentation - official
 
Cybercriminality
CybercriminalityCybercriminality
Cybercriminality
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKEN
 
Effective STIR/SHAKEN and Robocall Solutions that Work Today
Effective STIR/SHAKEN and Robocall Solutions that Work TodayEffective STIR/SHAKEN and Robocall Solutions that Work Today
Effective STIR/SHAKEN and Robocall Solutions that Work Today
 
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQ
 
Alternative Finance & Payments stream - Stuart Sykes slides
Alternative Finance & Payments stream - Stuart Sykes slidesAlternative Finance & Payments stream - Stuart Sykes slides
Alternative Finance & Payments stream - Stuart Sykes slides
 
Mobile Device: Regulation and Reality
Mobile Device: Regulation and RealityMobile Device: Regulation and Reality
Mobile Device: Regulation and Reality
 
Ict2005 fms
Ict2005 fmsIct2005 fms
Ict2005 fms
 
Intro to SHAKEN/STIR
Intro to SHAKEN/STIRIntro to SHAKEN/STIR
Intro to SHAKEN/STIR
 
Identity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms SessionIdentity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms Session
 
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
 

Similaire à Reveneu frauds and telcos

S K Ashikur Rahman (072874556)
S K Ashikur Rahman (072874556)S K Ashikur Rahman (072874556)
S K Ashikur Rahman (072874556)mashiur
 
Airtel-Investor-PPT-March-2019_
Airtel-Investor-PPT-March-2019_Airtel-Investor-PPT-March-2019_
Airtel-Investor-PPT-March-2019_factSky
 
Protecting your phone verification flow from fraud & abuse
Protecting your phone verification flow from fraud & abuseProtecting your phone verification flow from fraud & abuse
Protecting your phone verification flow from fraud & abuseKelley Robinson
 
Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13Olya Saiko
 
MTN negotiating $5.2b fine for security failure
MTN negotiating $5.2b fine for security failureMTN negotiating $5.2b fine for security failure
MTN negotiating $5.2b fine for security failureArun Shankar
 
Annual Report 2009
Annual Report 2009Annual Report 2009
Annual Report 2009traoman
 
Wire and wireless_india_ltd_nov_2006
Wire and wireless_india_ltd_nov_2006Wire and wireless_india_ltd_nov_2006
Wire and wireless_india_ltd_nov_2006Nihad Baluch
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENTelcoBridges Inc.
 
Updated training presentation
Updated training presentationUpdated training presentation
Updated training presentationJawad Awan
 
End of Roaming Charges: Lessons from East Africa
End of Roaming Charges: Lessons from East AfricaEnd of Roaming Charges: Lessons from East Africa
End of Roaming Charges: Lessons from East AfricaResearch ICT Africa
 
Industry analysis of telecom
Industry analysis of telecomIndustry analysis of telecom
Industry analysis of telecomGovinda Rajulu
 
J-Telecom_V2
J-Telecom_V2J-Telecom_V2
J-Telecom_V2Jihad Dib
 
Managing Future Telematics Regulatory Environment
Managing Future Telematics Regulatory EnvironmentManaging Future Telematics Regulatory Environment
Managing Future Telematics Regulatory EnvironmentArief Gunawan
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCAlan Percy
 

Similaire à Reveneu frauds and telcos (20)

Telecom Industry in India
Telecom Industry in IndiaTelecom Industry in India
Telecom Industry in India
 
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQ
 
S K Ashikur Rahman (072874556)
S K Ashikur Rahman (072874556)S K Ashikur Rahman (072874556)
S K Ashikur Rahman (072874556)
 
Airtel-Investor-PPT-March-2019_
Airtel-Investor-PPT-March-2019_Airtel-Investor-PPT-March-2019_
Airtel-Investor-PPT-March-2019_
 
Protecting your phone verification flow from fraud & abuse
Protecting your phone verification flow from fraud & abuseProtecting your phone verification flow from fraud & abuse
Protecting your phone verification flow from fraud & abuse
 
Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13
 
MTN negotiating $5.2b fine for security failure
MTN negotiating $5.2b fine for security failureMTN negotiating $5.2b fine for security failure
MTN negotiating $5.2b fine for security failure
 
ccj1590 2
ccj1590 2ccj1590 2
ccj1590 2
 
ccj1590
ccj1590ccj1590
ccj1590
 
Annual Report 2009
Annual Report 2009Annual Report 2009
Annual Report 2009
 
Wire and wireless_india_ltd_nov_2006
Wire and wireless_india_ltd_nov_2006Wire and wireless_india_ltd_nov_2006
Wire and wireless_india_ltd_nov_2006
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKEN
 
Updated training presentation
Updated training presentationUpdated training presentation
Updated training presentation
 
End of Roaming Charges: Lessons from East Africa
End of Roaming Charges: Lessons from East AfricaEnd of Roaming Charges: Lessons from East Africa
End of Roaming Charges: Lessons from East Africa
 
Industry analysis of telecom
Industry analysis of telecomIndustry analysis of telecom
Industry analysis of telecom
 
J-Telecom_V2
J-Telecom_V2J-Telecom_V2
J-Telecom_V2
 
Managing Future Telematics Regulatory Environment
Managing Future Telematics Regulatory EnvironmentManaging Future Telematics Regulatory Environment
Managing Future Telematics Regulatory Environment
 
ccj1890
ccj1890ccj1890
ccj1890
 
Final project mobile sector taxation gsma online course
Final project  mobile sector taxation gsma online courseFinal project  mobile sector taxation gsma online course
Final project mobile sector taxation gsma online course
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBC
 

Dernier

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 

Dernier (20)

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 

Reveneu frauds and telcos

  • 1. Revenue Frauds and Telecom Operators Muhammad Rasheed Khan AD, CA
  • 2. Agenda g Background Fraud-Definitions Different Forms of Revenue Fraud Fraud Prevention Methods Conclusion Recommendations 2 Pakistan Telecommunication Authority
  • 3. Why? y Background ◘ Revenue F d against R Fraud i t licensed telecom operators What is visible is just the tip of the iceberg…….. 3 Pakistan Telecommunication Authority
  • 4. $$ Commercial Magnitude of Telecom Fraud ◘ $50 Billion 2004 Billi ◘ $60 Billion 2006 ◘ Estimates E ti t vary but probably stable around $50 - $60 Billion b t b bl t bl d Billi per annum worldwide according to a 2008 report of CFCA ◘ The fraud tends to increase during recession ◘ A value of up to 6% of total company revenue is not unusual in US ◘ In recently liberalised markets the figures are up to 20% Source: CFCA: Communications Fraud Control Association (CFCA) 4 Pakistan Telecommunication Authority
  • 5. $$ • Middle East > President of Telco confirmed over US $400million loss in 2006 • Mid Asia > Regulator and others publish loses over US $500million in 2006 • North Africa > PT&T measured loss at US $400million in 2006 • Sub Sahara Africa Sub­Sahara Africa > Measured at over US $60million losses in 2005 • Central America > Government officially recognizes loss over US $100million in 2006 • Europe > VoIP bypass calls exceeded $3bn in 2005 to Africa b ll d d$ b 5 f 5 Pakistan Telecommunication Authority
  • 6. $$ • Pakistan > No formal study carried out No formal study carried out > Estimates differ by vast amounts > In the range of  3   5 billion PKR    In the range of 3 ‐ 5 billion PKR annually (35 – 60 million USD) 6 Pakistan Telecommunication Authority
  • 7. Why? y Effects of revenue losses occurring from fraud > Reduced revenue to Licensed Telecom Operators by free/cheaper call offering by illegal telecom operators; stealing current and future revenues g > Loss of taxes and levies to the government exchequers (which are based on telecom operator’s revenues) > Financial loss to regulators (regulators are normally funded on a percentage of annual licence fees from licensed operators). Same for ICT R&D Fund and USF. > Telcos may end up paying PRS partners for fraudulent calls > Security threats posed by absence of lawful interception and non availability of caller identity information 7 Pakistan Telecommunication Authority
  • 8. What is Fraud? Fraud > “Intentional misrepresentation or concealment of information “I t ti l i t ti l t fi f ti in order to deceive or mislead.” Telecom Fraud > According to CFCA the use of the telecommunications CFCA, network with the intention of avoiding payment • without correct payment ith t t t • with no payment at all • someone else pays 8 Pakistan Telecommunication Authority
  • 9. Fraud Triangle g 9 Pakistan Telecommunication Authority
  • 10. Characteristics of Telecom Fraud > Telco fraud seen as victimless > Crime committed remotely - minimises detection risk > Often, Often no equipment is needed > Easy conversion to cash - eg call selling > Telecom products are complex and become more so with further interactions with other products p 10 Pakistan Telecommunication Authority
  • 11. Types of Revenue Frauds yp > There are more than 200 types of frauds and the number is on the rise > We briefly discuss only the most common types here • Subscription Fraud • Teeing-in or Clipping on • Internal Fraud-Magic Phones • GSM Interconnect Bypass • GSM International Gateway Bypass y y 11 Pakistan Telecommunication Authority
  • 12. Fraud Types Chronology yp gy > 50-70s: Teeing-in Payphone Tapping Teeing-in, > 70-90s: Meter tempering, 3rd party billing, > 90s onwards: PBX, Magic Phones, GSM bypass 12 Pakistan Telecommunication Authority
  • 13. Subscription Frauds (Mobile and Fixed) p ( ) > Customer has No Intention to Pay > Customer misrepresenting his/her identity (e.g. stolen electricity bills) > Use of forged salary slip to get high credit li it dit limits > Misuse of value-added, international roaming and PRS services g > Initial bills are paid on time “sleeper”, followed by heavy usage - default to pay - forced churn > Appears like bad debt > Almost always associated with call selling 13 Pakistan Telecommunication Authority
  • 14. Teeing- Teeing-In or Clipping On (Fixed Line) > Connecting an instrument “box” parallel to the telephone line > Divert the stolen line to fake subscriber > Legitimate user loses connection on and off when the fake subscriber is using the line. > May also be used against Public yp Payphones 14 Pakistan Telecommunication Authority
  • 15. Internal Frauds (Mobile and Fixed) ( ) > All telecom networks face the risk of being compromised from within > Providing value-added services to customers free of cost, un- authorised bill adjustments and discounted tariff to customers > Temptation of financial gain; or disgruntled employees may take their revenge > “Magic phones/SIMs” employ Magic phones/SIMs network vulnerabilities to provide certain services free of cost or to charge 3rd party for the services used by the magic phone user 15 Pakistan Telecommunication Authority
  • 16. GSM Interconnect Bypass ( yp (Mobile and Fixed) ) > Corporate customers use intelligent PBX to bypass the interconnection costs for Fixed to Mobile calls > The intelligent PBX can sense the number being dialled and doesn’t route it through fixed lines but through SIM box containing SIMS of the CMO being called. t i i SIMSs f th b i ll d > Calling from fixed terminal but CLI of called mobile shows the incoming call from mobile number (on-net call) > The mobile number seen on CLI cannot be called back …!!! !!! 16 Pakistan Telecommunication Authority
  • 17. GSM Interconnect Bypass ( yp (Mobile and Fixed) ) > Illustration Both outgoing No incoming call g and incoming 20 CMO lines 5 fixed (each CMO lines selected) 0345-XXXX calling 17 Pakistan Telecommunication Authority
  • 18. GSM Interconnect Bypass ( yp (Mobile and Fixed) ) > Cost savings for corporate fraudsters and revenue losses to telcos are huge > For a 30 second call to Mobile • Ordinary fixed line charges = PKR 2.5 (excluding tax) 25 • Using interconnect bypass cost = PKR 0.63 (excluding tax) • Saving / loss of PKR 1.87 PKR 1.6 Loss to fixed line operator PKR 0.27 Loss to CMO 2.5 – MTR (0.9) = PKR 1.6 tariff – MTR (0.9) = PKR 0.27 > Actual losses are even higher because of corporate discounts negotiated by such clients > On-net On net calls are also free in certain situations 18 Pakistan Telecommunication Authority
  • 19. International Gateway Bypass ( y yp (Mobile and Fixed) ) > Illegal gateway exchange terminate voice over internet protocol (VoIP) International calls over public switched telephone network (PSTN) or over the GSM network > Bypassing the legal International Gateways yp g g y > Fraudster receives international calls from foreign countries over VoIP (through an ISP) > Illegal operator collects revenue from foreign callers > Losses to telcos • LDI operator loses foreign revenue from carriers • LL operator loses APCL • Mobile operator loses MTR 19 Pakistan Telecommunication Authority
  • 20. International Gateway Bypass y yp 20 Pakistan Telecommunication Authority
  • 21. Fraud Prevention and Management g > Finding telecommunications fraud in masses of call records is more diffi lt th fi di a needle i a h difficult than finding dl in haystack. t k 21 Pakistan Telecommunication Authority
  • 22. Activities Required resources • Risk assessment review • Expertise in telecom Min • Define fraud management policy fraud management • Create awareness regarding g g • Expertise in risk assessment p fraud & its management • Perform customer vetting & Cr. • Tools to support authentication, rating Internal Cr. Rating & exposure • Set alerts based o Usage, C a e ts on Cr. Security • Experience of use of techniques Exposure, dealer performance & tools to manage telecom fraud • Tighten data & network security • Maintain audit trails • Capability to process CDR Fraud prevention to generate alerts • Process CDRs & monitor alerts and usage reports • Alerts monitoring experience • Reconciliation audits • Fraud analysis • Analyse alerts Fraud detection experience • Investigate • Knowledge of Max fraud & impact law enforcement • Take action Fraud investigation & prosecution COST 22 Pakistan Telecommunication Authority
  • 23. Fraud Detection > An average mobile p g phone operator p p produces 250 million CDRs every week. (CFCA estimate) > Gigantic d t b Gi ti databases; l large d t warehouses data h > Fraud Management Systems (FMS) rely on complex data mining techniques > $$$ 23 Pakistan Telecommunication Authority
  • 24. Conclusion > Revenue Fraud is a reality > This menace is continuously on the rise > It is not only affecting the telcos but the regulator and Government as well (since tax receipts and other subscriptions are based on teleco revenues) 24 Pakistan Telecommunication Authority
  • 25. Recommendations > Incentivise CMOs, being the biggest markets takers, to invest in FMS > Possible funding source % share from APC which must be spent on FMS for international bypass detection > This investment will be recovered when CMO revenues increase and consequently the subscriptions and levies received from CMOs are increased > Further benefits will emerge from shared responsibility of bypass detection between PTA and CMOs 25 Pakistan Telecommunication Authority
  • 26. Thank you for patience…….. Questions 26 Pakistan Telecommunication Authority