Gary Audin
Gary Audin is the President of Delphi, Inc. He has more than 40 years of computer, communications and security...
Read Full Bio >>

Gary Audin | September 10, 2012 |


Telecom Fraud, Bigger than You Thought

Telecom Fraud, Bigger than You Thought The old problems still exist, and the emergence of more mobile services and devices has compounded the problem.

The old problems still exist, and the emergence of more mobile services and devices has compounded the problem.

Telecom fraud is equal to the annual revenue of Disney or the GDP of Costa Rica--$40 billion. I would have thought that the hacking of PBXs and subscription fraud would be reduced by now since we have had these fraud problems for years. Not so. They are still highest on the list.

This is according to the Heavy Reading report: "Bigger Than Disney: Telecom Fraud Tops $40 Billion a Year". The $40 billion figure of about 2% of the telecom revenue loss is an estimate generated by the Communications Fraud Control Association (CFCA).

There is a galaxy of fraud, abuse, security and revenue assurance problems, as shown in the diagram below from the report. The number of operators, the wide range of devices and operating systems and the range of offered services compound the problem. The perpetrators use the access to multiple networks to confound the operators, especially for mobile services.

Telecom fraud has become more pervasive and sophisticated as more means of communicating have been introduced. The report states that many experts believe that networks have actually become less secure. The old TDM world was centrally controlled. Not so in the IP world. Besides outsiders perpetrating fraud, employees, dealers and sometimes operators have added risk to the telecom business. The report authors also learned that telecom managers and the providers have decreased their vigilance, not increased it. This reduction of vigilance appears to be one of the root causes of the success of fraud.

So what are the vulnerabilities that lead to the fraud problem?

* PBX hacking (I did not expect this since we have had the problem for decades and there are many solutions on the market)
* Subscription fraud
* International revenue share fraud by operators
* Network bypass
* Credit card fraud

These five vulnerabilities account for about half the problems. The other half involves things like "premium services", international wholesale abuses, and domestic traffic pumping, among about another dozen categories of fraud.

Subscription fraud is quite old in application. This is performed by opening a fake account (easy to do online with stolen credit cards). The fake account can be used to access services and receive equipment (wireless routers as an example). As long as the fake account is not detected, the fraud can last for months, maybe even years.

As the report says, "Operators hasten to close gaps in subscription fraud because of the cascading nature of the loss. 'Subscription fraud is a gateway problem,' says Subex Group VP Vinod Kumar. 'Operators don't just lose the retail revenues. They still have to pay their international partners, device manufacturers, and possibly digital content partners, so they are losing on all fronts.'" Even though the provider is absorbing the cost, eventually this cost of doing business trickles down to enterprises and consumers.

The sections I liked in the report were "Next-Gen Networks, Next-Gen Losses" and "Internal Fraud: The Dirty Not-So-Little Secret" The report continues with how the industry is fighting back and a list of the vendors of solutions to mitigate the fraud problems.

What I took away from this report was that although fraud has been around for decades, the old problems still exist with considerable losses. Further, the emergence of more mobile services and devices has compounded the problem. It appears that the industry is lagging the fraud problem when it comes to solutions, not really preventing it.


Enterprise Connect Orlando 2017
March 27-30 | Orlando, FL
Connect with the Entire Enterprise Communications & Collaboration Ecosystem

Stay Up-to-Date: Hear industry visionaries in Keynotes and General Sessions delivering the latest insight on UC, mobility, collaboration and cloud

Grow Your Network: Connect with the largest gathering of enterprise IT and business leaders and influencers

Learn From Industry Leaders: Attend a full range of Conference Sessions, Free Programs and Special Events

Evaluate All Your Options: Engage with 190+ of the leading equipment, software and service providers

Have Fun! Mingle with sponsors, exhibitors, attendees, guest speakers and industry players during evening receptions

Special Offer - Save $200 Off Advance Rates

Register now with code NOJITTEREB to save $200 Off Advance Rates or get a FREE Expo Pass!

April 5, 2017

Its no secret that the cloud offers significant benefits to enterprises - including cost reduction, scalability, higher efficiency, and more flexibility. If your phone system and contact center are

March 22, 2017

As today's competitive business environments push workforces into overdrive, many enterprises are seeking ways of streamlining workflows while optimizing productivity, business agility, and speed.

March 8, 2017

Enterprise IT's ability to innovate is critical to the success of the business -- 80% of CIOs agree. But the CIO role has never been more challenging than it is today, with rising operational respo

March 23, 2017
Tim Banting, of Current Analysis, gives us a peek into what the next three years will bring in advance of his Enterprise Connect session exploring the question: Will there be a new model for enterpris....
March 15, 2017
Andrew Prokop, communications evangelist with Arrow Systems Integration, discusses the evolving role of the all-important session border controller.
March 9, 2017
Organizer Alan Quayle gives us the lowdown on programmable communications and all you need to know about participating in this pre-Enterprise Connect hackathon.
March 3, 2017
From protecting against new vulnerabilities to keeping security assessments up to date, security consultant Mark Collier shares tips on how best to protect your UC systems.
February 24, 2017
UC analyst Blair Pleasant sorts through the myriad cloud architectural models underlying UCaaS and CCaaS offerings, and explains why knowing the differences matter.
February 17, 2017
From the most basics of basics to the hidden gotchas, UC consultant Melissa Swartz helps demystify the complex world of SIP trunking.
February 7, 2017
UC&C consultant Kevin Kieller, a partner at enableUC, shares pointers for making the right architectural choices for your Skype for Business deployment.
February 1, 2017
Elka Popova, a Frost & Sullivan program director, shares a status report on the UCaaS market today and offers her perspective on what large enterprises need before committing to UC in the cloud.
January 26, 2017
Andrew Davis, co-founder of Wainhouse Research and chair of the Video track at Enterprise Connect 2017, sorts through the myriad cloud video service options and shares how to tell if your choice is en....
January 23, 2017
Sheila McGee-Smith, Contact Center/Customer Experience track chair for Enterprise Connect 2017, tells us what we need to know about the role cloud software is playing in contact centers today.