Price: $2,999.00
Course Number: 2206
Length: 2 Days
Print Friendly, PDF & Email

Telecommunications fraud training covers all the aspects of telecom fraud including PSTN, International, VoIP, Mobile, Prepaid, 3G, UMTS, LTE, IPTV, gaming, and content.

Who Should Attend

Operators, Fraud vendors, Consultants, Investment Banks

Objectives

Telecommunications fraud is one of the largest causes of revenue loss for service providers, said Mr. Idelson. With the advent of new services such as 2.5G, 3G and VoIP, and as telecom fraud becomes increasingly sophisticated, this problem will only become compounded. To combat this, service providers will need advanced systems that can detect all types of fraud. Failure to do so may result in substantial revenue loss, and no operator can afford that today.

Outline

Executive Summary
  • What is Fraud?
  • General overview of telecommunication fraud
  • Losses experienced by operators
  • Pressures to deal effectively with crime
  • The motivation behind crime
  • Fraud and Revenue Assurance
The Evolution of Fraud
  • Traditional types of fraud
  • Common Frauds
  • Operators risk exposure
  • Multiple new and immature services
  • Increased numbers of business transactions
  • Open, distributed networks
  • Entrance of new, non traditional' players
  • Mergers and acquisitions
  • New methods of access
  • New billing systems and processes
  • Huge increase in amount of data generated by users
  • How do fraudsters benefit from fraud?
  • Using a service without paying.
  • Call Selling to others
Subscription fraud
  • Why subscription fraud is the most prevalent type of telecoms fraud
  • The modus operandi of the subscription fraudster
  • How operators can recognize it
  • Techniques required to minimize the impact and loss
  • Vendor tools for eliminating subscription fraud
Internal fraud
  • The scale and impact of internal fraud
  • Internal fraud motivation
  • Methods to highlight internal losses
  • Effective methods of mitigating risk
  • Conducting internal investigations
Partnership fraud
  • Includes wholesale, partner and distributor fraud
  • How to effectively manage relationships with:
  • Operators
  • Third party providers
  • Commercial dealers
  • The threat of interconnect fraud
Fixed network fraud
  • The development of fixed networks
  • Common types of fraud affecting fixed line telcos
  • Subscription fraud
  • Physical attacks on the network
  • Premium rate fraud
  • PBX/DISA fraud
  • Threat of SS7 attacks
  • Methods of mitigating the risk these practices present
Mobile network fraud
  • The security of mobile networks
  • Encryption methods employed by operators and handset/SIM card manufacturers
  • How network security needs to change with the move to 3G
  • The rise in mobile phone related theft and how operators can combat this
  • Cloning, tumbling and other ways of compromising mobile networks and handsets
  • The best ways to reduce the risk of mobile network fraud
Prepaid fraud
  • How fraudsters take advantage of prepaid services
  • How operators can curtail these efforts
  • Regulating prepaid users
  • Developments from the vendor community
  • Risks associated with recharge methods
Roaming fraud
  • The roaming market
  • The risks telcos are exposed to by roaming fraud
  • Typical methods used by criminals
  • Efforts of the GSM Association
  • New developments from the vendor community
Content and value added services fraud
  • Content risks and liability
  • The culture of content theft
  • Managing the risk represented by players in the content value chain
  • Payment mechanisms
  • Watermarking, encryption and DRM
  • Maintaining revenue streams through secure delivery channels
Fraud Detection and Prevention
  • Overview of the fraud processes
  • All known fraud activities
  • Optimal use of internal systems and intelligence
  • External knowledge and experience
Data Mining Applied to Fraud Detection and Prevention
  • Data Warehouse Data Modeling
  • Data mining techniques
  • Application of data mining to fraud
Tools and Techniques
  • All known fraud activities
  • Optimal use of internal systems and intelligence
  • External knowledge and experience

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.