Price: $2,999.00

Course Number: 2206
Length: 2 Days
Print Friendly, PDF & Email

Telecom Fraud Training

Telecom Fraud Training or Telecommunications fraud training covers all the aspects of telecom fraud including legacy PSTN, International, IP Network, VoIP, Mobile, Prepaid, 3G, 4G, IMS, VoLTE, 5G, VoNR, OTT, IPTV, IoT, gaming, and content.

Who Should Attend

Operators, Fraud vendors, Software Vendors, Auditors, Consultants, Accountants and Investment Banks

Course Agenda

Executive Summary

  • What is Fraud?
  • What Is Telecommunications Fraud?
  • General overview of telecommunication fraud
  • Losses experienced by operators
  • Pressures to deal effectively with crime
  • The motivation behind crime
  • Analysis different types of telecom fraud
  • Telecom fraud detection and prevention
  • Telecom fraud Trends
  • Integration of fraud and Revenue Assurance
  • Telecommunications Fraud Solutions

The Evolution of Fraud

  • Traditional types of fraud
  • Common frauds
  • Operators risk exposure
  • Multiple new and immature services
  • Increased numbers of business transactions
  • Open, distributed networks
  • Entrance of new, non traditional’ players
  • Mergers and acquisitions
  • New methods of access
  • New billing systems and processes
  • Huge increase in amount of data generated by users
  • How do fraudsters benefit from fraud?
  • Using a service without paying.
  • Call Selling to others

Subscription Fraud

  • Why subscription fraud is the most prevalent type of telecoms fraud
  • How operators can recognize it
  • Techniques required to minimize the impact and loss
  • Vendor tools for eliminating subscription fraud

Internal Fraud

  • The scale and impact of internal fraud
  • Internal fraud motivation
  • Methods to highlight internal losses
  • Effective methods of mitigating risk
  • Conducting internal investigations

Partnership Fraud

  • Includes wholesale, partner and distributor fraud
  • How to effectively manage relationships with:
  • Operators
  • Third party providers
  • Commercial dealers
  • The threat of interconnect fraud

Fixed Network Fraud

  • The development of fixed networks
  • Common types of fraud affecting fixed line telcos
  • Subscription fraud
  • Physical attacks on the network
  • Premium rate fraud
  • PBX/DISA fraud
  • Threat of SS7/Diameter attacks
  • Threat to IP based services
  • Methods of mitigating the risk these practices present

Mobile Network Fraud

  • The security of mobile networks: 3G, 4G and 5G
  • SDN/NFV and IoT security and fraud
  • IMS/VoLTE attacks
  • Encryption methods employed by operators and handset/SIM card manufacturers.
  • How network security needs to change with the move to 5G
  • Cloning, tumbling and other ways of compromising mobile networks and mobile devices
  • International Revenue Sharing Fraud (IRSF)
  • Interconnect Bypass Fraud
  • Traffic Pumping
  • The best ways to reduce the risk of mobile network fraud

Prepaid Fraud

  • How fraudsters take advantage of prepaid services
  • How operators can curtail these efforts
  • Regulating prepaid users
  • Developments from the vendor community
  • Risks associated with recharge methods

Roaming Fraud

  • The roaming market
  • The risks telcos are exposed to by roaming fraud
  • Typical methods used by criminals
  • Efforts of the GSM Association
  • New developments from the vendor community

Content and Value Added services Fraud

  • Content risks and liability
  • The culture of content theft
  • Managing the risk represented by players in the content value chain
  • Payment mechanisms
  • Watermarking, encryption and DRM
  • Maintaining revenue streams through secure delivery channels

Fraud Detection and Prevention

  • Overview of the fraud processes
  • All known fraud activities
  • Optimal use of internal systems and intelligence
  • External knowledge and experience

Data Mining and Machine Learning Applied to Fraud Detection and Prevention

  • Data Warehouse Data Modeling
  • Data mining techniques
  • Application of data mining to fraud
  • Application of CNN algorithms to 5G fraud

Tools and Techniques

  • All known fraud activities
  • Optimal use of internal systems and intelligence
  • External knowledge and experience

 Case Study

  • 4G and 5G Fraud Detection Using Convolutional Neural Networks (CNN)
  • IPTV and OTT Fraud Detection

 

Who Should Attend

Operators, Fraud vendors, Software Vendors, Auditors, Consultants, Accountants and Investment Banks

Request More Information

Please enter contact information followed by your questions, comments and/or request(s):
  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.