Fraud in Telecoms
Fraud in Telecoms
Fraud in Telecoms
2
A FEW RA & FRAUD ISSUES
Revenue Assurance Fraud
Internal systems B Employees
& processes
Invoicing Number porting
accuracy Product mix
complexity Metallic
number resale
Profitability
“Goodwill” credits
Incorrect
pricing tables Passing on of
Real-time vs customer details
batch processing Box breaking
Internal
Channel D Call & port
incentivisation forwarding
Pricing signals Theft SIMs ,
driving behaviour handsets &
Slamming
subscriptions
Process
Accuracy of interfaces SIM Gateways
data flows
Roaming
Accuracy of customer
information at touchpoints Bad debt & Credit
worthiness
External
3
FRAUD
Fraudulent activities tend to fall into one of 7 categories:
4
EXAMPLE OF FRAUDULENT ACTIVITIES
Subscription fraud Roaming fraud (I)
Call selling using GSM conference calling Where operators have roaming agreements
feature where fraudster acts as an ‘operator’ Operator A must pay Operator B for the time
setting up calls between parties and then used by their customers on Operator’s B network
dropping out to set up another regardless of whether Operator A is paid for the
GSM call forwarding where fraudster sets call time
forward to required number. Caller calls the Principle problem is the time it takes for billing
fraudster’s phone and is transferred. Caller only from Operator B to Operator A - used to be 72
pays for the call to the fraudster’s phone number. hours now down to 24 hours using EDI
Fraudsters using a gateway to provide an GSM MoU states that any user exceeding 100
international ‘call box’ from shops Special Drawing Rights (SDR) must be billed
within 24 hours
Internal Fraud But, when is collection actually made?
Mobile markets are very competitive with
operators subsidising handsets to entice new Roaming fraud (II)
customers to subscribe. Dealer or gangs often SIM cards are taken out of phones acquired with
sell these handsets on to overseas buyers. And false identities and sent abroad where they are
of course pre-paid handsets can be unlocked used in call selling fraud. Call lengths of over 10
and used on any network hours typical
5
THE CHALLENGE
The ‘natural’ order of tasks for revenue assurance is to:
monitor for evidence of loss
investigate where & why there is loss
resolve the problems so loss does not occur again
Service Provider
Content
Collaborative methods of working Services
Enterprise
Customer
Gamma Telecom
Virtual Contracting End-user
Network party
Fixed Operator
are essential to mutually assure Carrier
Services
Enabler
Mobile Operator
Bearer
Services
6
SUMMARY
The major sources of revenue Follow the cash
loss continue to be: Understand the processes
Fraud Audit rights with partners
Credit management
Strength & enforceability of
Least-cost-routing errors commercial agreements
Interconnect / partner-payment
Traceability of products in the
errors
distribution chain
Poor processes & systems
Integrity of interfaces – human &
automated
All adds up to a loss of
Training & culture
customer confidence in your
business… Who has access to customer
data?
7
TECHNIQUES FOR AUDITING
Track-Back Approach The Grid Approach
Audit works backwards from a The key mobile revenue streams &
convenient point, such as the logical operations for each stream
customer invoice, to the first source are identified and set out in a grid
of data capture (e.g. voice, sms, interconnect streams versus
switch, mediation, rating, invoicing operations)