Price: $2,999.00
Course Number: 2206
Length: 2 Days
Print Friendly, PDF & Email

Telecommunications fraud training covers all the aspects of telecom fraud including PSTN, International, VoIP, Mobile, Prepaid, 3G/UMTS, LTE, 5G, OTT, IPTV, gaming, and content.

Executive Summary

  • What is Fraud?
  • General overview of telecommunication fraud
  • Losses experienced by operators
  • Pressures to deal effectively with crime
  • The motivation behind crime
  • Fraud and Revenue Assurance

The Evolution of Fraud

  • Traditional types of fraud
  • Common Frauds
  • Operators risk exposure
  • Multiple new and immature services
  • Increased numbers of business transactions
  • Open, distributed networks
  • Entrance of new, non traditional’ players
  • Mergers and acquisitions
  • New methods of access
  • New billing systems and processes
  • Huge increase in amount of data generated by users
  • How do fraudsters benefit from fraud?
  • Using a service without paying.
  • Call Selling to others

Subscription Fraud

  • Why subscription fraud is the most prevalent type of telecoms fraud
  • How operators can recognize it
  • Techniques required to minimize the impact and loss
  • Vendor tools for eliminating subscription fraud

Internal Fraud

  • The scale and impact of internal fraud
  • Internal fraud motivation
  • Methods to highlight internal losses
  • Effective methods of mitigating risk
  • Conducting internal investigations

Partnership Fraud

  • Includes wholesale, partner and distributor fraud
  • How to effectively manage relationships with:
  • Operators
  • Third party providers
  • Commercial dealers
  • The threat of interconnect fraud

FixNetwork Fraud

  • The development of fixed networks
  • Common types of fraud affecting fixed line telcos
  • Subscription fraud
  • Physical attacks on the network
  • Premium rate fraud
  • PBX/DISA fraud
  • Threat of SS7/Diameter attacks
  • Threat to IP based services
  • Methods of mitigating the risk these practices present

Mobile Network Fraud

  • The security of mobile networks
  • Encryption methods employed by operators and handset/SIM card manufacturers
  • How network security needs to change with the move to 5G
  • The rise in mobile phone related theft and how operators can combat this
  • Cloning, tumbling and other ways of compromising mobile networks and handsets
  • The best ways to reduce the risk of mobile network fraud

Prepaid Fraud

  • How fraudsters take advantage of prepaid services
  • How operators can curtail these efforts
  • Regulating prepaid users
  • Developments from the vendor community
  • Risks associated with recharge methods

Roaming Fraud

  • The roaming market
  • The risks telcos are exposed to by roaming fraud
  • Typical methods used by criminals
  • Efforts of the GSM Association
  • New developments from the vendor community

Content and Value Added services Fraud

  • Content risks and liability
  • The culture of content theft
  • Managing the risk represented by players in the content value chain
  • Payment mechanisms
  • Watermarking, encryption and DRM
  • Maintaining revenue streams through secure delivery channels

Fraud Detection and Prevention

  • Overview of the fraud processes
  • All known fraud activities
  • Optimal use of internal systems and intelligence
  • External knowledge and experience

Data Mining Applied to Fraud Detection and Prevention

  • Data Warehouse Data Modeling
  • Data mining techniques
  • Application of data mining to fraud

Tools and Techniques

  • All known fraud activities
  • Optimal use of internal systems and intelligence
  • External knowledge and experienceExecutive Summary
    • What is Fraud?
    • General overview of telecommunication fraud
    • Losses experienced by operators
    • Pressures to deal effectively with crime
    • The motivation behind crime
    • Fraud and Revenue Assurance

    The Evolution of Fraud

    • Traditional types of fraud
    • Common Frauds
    • Operators risk exposure
    • Multiple new and immature services
    • Increased numbers of business transactions
    • Open, distributed networks
    • Entrance of new, non traditional’ players
    • Mergers and acquisitions
    • New methods of access
    • New billing systems and processes
    • Huge increase in amount of data generated by users
    • How do fraudsters benefit from fraud?
    • Using a service without paying.
    • Call Selling to others

    Subscription Fraud

    • Why subscription fraud is the most prevalent type of telecoms fraud
    • How operators can recognize it
    • Techniques required to minimize the impact and loss
    • Vendor tools for eliminating subscription fraud

    Internal Fraud

    • The scale and impact of internal fraud
    • Internal fraud motivation
    • Methods to highlight internal losses
    • Effective methods of mitigating risk
    • Conducting internal investigations

    Partnership Fraud

    • Includes wholesale, partner and distributor fraud
    • How to effectively manage relationships with:
    • Operators
    • Third party providers
    • Commercial dealers
    • The threat of interconnect fraud

    FixNetwork Fraud

    • The development of fixed networks
    • Common types of fraud affecting fixed line telcos
    • Subscription fraud
    • Physical attacks on the network
    • Premium rate fraud
    • PBX/DISA fraud
    • Threat of SS7/Diameter attacks
    • Threat to IP based services
    • Methods of mitigating the risk these practices present

    Mobile Network Fraud

    • The security of mobile networks
    • Encryption methods employed by operators and handset/SIM card manufacturers
    • How network security needs to change with the move to 5G
    • The rise in mobile phone related theft and how operators can combat this
    • Cloning, tumbling and other ways of compromising mobile networks and handsets
    • The best ways to reduce the risk of mobile network fraud

    Prepaid Fraud

    • How fraudsters take advantage of prepaid services
    • How operators can curtail these efforts
    • Regulating prepaid users
    • Developments from the vendor community
    • Risks associated with recharge methods

    Roaming Fraud

    • The roaming market
    • The risks telcos are exposed to by roaming fraud
    • Typical methods used by criminals
    • Efforts of the GSM Association
    • New developments from the vendor community

    Content and Value Added services Fraud

    • Content risks and liability
    • The culture of content theft
    • Managing the risk represented by players in the content value chain
    • Payment mechanisms
    • Watermarking, encryption and DRM
    • Maintaining revenue streams through secure delivery channels

    Fraud Detection and Prevention

    • Overview of the fraud processes
    • All known fraud activities
    • Optimal use of internal systems and intelligence
    • External knowledge and experience

    Data Mining Applied to Fraud Detection and Prevention

    • Data Warehouse Data Modeling
    • Data mining techniques
    • Application of data mining to fraud

    Tools and Techniques

    • All known fraud activities
    • Optimal use of internal systems and intelligence
    • External knowledge and experience

Who Should Attend

Operators, Fraud vendors, Consultants, Investment Banks

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.