Price: $2,999.00
Course Number: 2206
Length: 2 Days
Telecom Fraud Training
Telecom Fraud Training or Telecommunications fraud training covers all the aspects of telecom fraud including legacy PSTN, International, IP Network, VoIP, Mobile, Prepaid, 3G/UMTS, LTE, IMS, 5G, OTT, IPTV, gaming, and content.
Executive Summary
- What is Fraud?
- General overview of telecommunication fraud
- Losses experienced by operators
- Pressures to deal effectively with crime
- The motivation behind crime
- Fraud and Revenue Assurance
The Evolution of Fraud
- Traditional types of fraud
- Common Frauds
- Operators risk exposure
- Multiple new and immature services
- Increased numbers of business transactions
- Open, distributed networks
- Entrance of new, non traditional’ players
- Mergers and acquisitions
- New methods of access
- New billing systems and processes
- Huge increase in amount of data generated by users
- How do fraudsters benefit from fraud?
- Using a service without paying.
- Call Selling to others
Subscription Fraud
- Why subscription fraud is the most prevalent type of telecoms fraud
- How operators can recognize it
- Techniques required to minimize the impact and loss
- Vendor tools for eliminating subscription fraud
Internal Fraud
- The scale and impact of internal fraud
- Internal fraud motivation
- Methods to highlight internal losses
- Effective methods of mitigating risk
- Conducting internal investigations
Partnership Fraud
- Includes wholesale, partner and distributor fraud
- How to effectively manage relationships with:
- Operators
- Third party providers
- Commercial dealers
- The threat of interconnect fraud
Fixed Network Fraud
- The development of fixed networks
- Common types of fraud affecting fixed line telcos
- Subscription fraud
- Physical attacks on the network
- Premium rate fraud
- PBX/DISA fraud
- Threat of SS7/Diameter attacks
- Threat to IP based services
- Methods of mitigating the risk these practices present
Mobile Network Fraud
- The security of mobile networks: 3G, 4G and 5G
- Encryption methods employed by operators and handset/SIM card manufacturers
- How network security needs to change with the move to 5G
- The rise in mobile phone related theft and how operators can combat this
- Cloning, tumbling and other ways of compromising mobile networks and handsets
- The best ways to reduce the risk of mobile network fraud
Prepaid Fraud
- How fraudsters take advantage of prepaid services
- How operators can curtail these efforts
- Regulating prepaid users
- Developments from the vendor community
- Risks associated with recharge methods
Roaming Fraud
- The roaming market
- The risks telcos are exposed to by roaming fraud
- Typical methods used by criminals
- Efforts of the GSM Association
- New developments from the vendor community
Content and Value Added services Fraud
- Content risks and liability
- The culture of content theft
- Managing the risk represented by players in the content value chain
- Payment mechanisms
- Watermarking, encryption and DRM
- Maintaining revenue streams through secure delivery channels
Fraud Detection and Prevention
- Overview of the fraud processes
- All known fraud activities
- Optimal use of internal systems and intelligence
- External knowledge and experience
Data Mining Applied to Fraud Detection and Prevention
- Data Warehouse Data Modeling
- Data mining techniques
- Application of data mining to fraud
Tools and Techniques
- All known fraud activities
- Optimal use of internal systems and intelligence
- External knowledge and experience
Who Should Attend
Operators, Fraud vendors, Software Vendors, Auditors, Consultants, Accountants and Investment Banks