SHARE



ABOUT THE AUTHOR


Gary Audin
Gary Audin is the President of Delphi, Inc. He has more than 40 years of computer, communications and security...
Read Full Bio >>
SHARE



Gary Audin | September 10, 2012 |

 
   

Telecom Fraud, Bigger than You Thought

Telecom Fraud, Bigger than You Thought The old problems still exist, and the emergence of more mobile services and devices has compounded the problem.

The old problems still exist, and the emergence of more mobile services and devices has compounded the problem.

Telecom fraud is equal to the annual revenue of Disney or the GDP of Costa Rica--$40 billion. I would have thought that the hacking of PBXs and subscription fraud would be reduced by now since we have had these fraud problems for years. Not so. They are still highest on the list.

This is according to the Heavy Reading report: "Bigger Than Disney: Telecom Fraud Tops $40 Billion a Year". The $40 billion figure of about 2% of the telecom revenue loss is an estimate generated by the Communications Fraud Control Association (CFCA).

There is a galaxy of fraud, abuse, security and revenue assurance problems, as shown in the diagram below from the report. The number of operators, the wide range of devices and operating systems and the range of offered services compound the problem. The perpetrators use the access to multiple networks to confound the operators, especially for mobile services.

Telecom fraud has become more pervasive and sophisticated as more means of communicating have been introduced. The report states that many experts believe that networks have actually become less secure. The old TDM world was centrally controlled. Not so in the IP world. Besides outsiders perpetrating fraud, employees, dealers and sometimes operators have added risk to the telecom business. The report authors also learned that telecom managers and the providers have decreased their vigilance, not increased it. This reduction of vigilance appears to be one of the root causes of the success of fraud.

So what are the vulnerabilities that lead to the fraud problem?

* PBX hacking (I did not expect this since we have had the problem for decades and there are many solutions on the market)
* Subscription fraud
* International revenue share fraud by operators
* Network bypass
* Credit card fraud

These five vulnerabilities account for about half the problems. The other half involves things like "premium services", international wholesale abuses, and domestic traffic pumping, among about another dozen categories of fraud.

Subscription fraud is quite old in application. This is performed by opening a fake account (easy to do online with stolen credit cards). The fake account can be used to access services and receive equipment (wireless routers as an example). As long as the fake account is not detected, the fraud can last for months, maybe even years.

As the report says, "Operators hasten to close gaps in subscription fraud because of the cascading nature of the loss. 'Subscription fraud is a gateway problem,' says Subex Group VP Vinod Kumar. 'Operators don't just lose the retail revenues. They still have to pay their international partners, device manufacturers, and possibly digital content partners, so they are losing on all fronts.'" Even though the provider is absorbing the cost, eventually this cost of doing business trickles down to enterprises and consumers.

The sections I liked in the report were "Next-Gen Networks, Next-Gen Losses" and "Internal Fraud: The Dirty Not-So-Little Secret" The report continues with how the industry is fighting back and a list of the vendors of solutions to mitigate the fraud problems.

What I took away from this report was that although fraud has been around for decades, the old problems still exist with considerable losses. Further, the emergence of more mobile services and devices has compounded the problem. It appears that the industry is lagging the fraud problem when it comes to solutions, not really preventing it.





COMMENTS



May 31, 2017

In the days of old, people in suits used to meet at a boardroom table to update each other on their work. Including a remote colleague meant setting a conference phone on the table for in-person pa

April 19, 2017

Now more than ever, enterprise contact centers have a unique opportunity to lead the way towards complete, digital transformation. Moving your contact center to the cloud is a starting point, quick

April 5, 2017

Its no secret that the cloud offers significant benefits to enterprises - including cost reduction, scalability, higher efficiency, and more flexibility. If your phone system and contact center are

May 24, 2017
Mark Winther, head of IDC's global telecom consulting practice, gives us his take on how CPaaS providers evolve beyond the basic building blocks and address maturing enterprise needs.
May 18, 2017
Diane Myers, senior research director at IHS Markit, walks us through her 2017 UC-as-a-service report... and shares what might be to come in 2018.
April 28, 2017
Change isn't easy, but it is necessary. Tune in for advice and perspective from Zeus Kerravala, co-author of a "Digital Transformation for Dummies" special edition.
April 20, 2017
Robin Gareiss, president of Nemertes Research, shares insight gleaned from the firm's 12th annual UCC Total Cost of Operations study.
March 23, 2017
Tim Banting, of Current Analysis, gives us a peek into what the next three years will bring in advance of his Enterprise Connect session exploring the question: Will there be a new model for enterpris....
March 15, 2017
Andrew Prokop, communications evangelist with Arrow Systems Integration, discusses the evolving role of the all-important session border controller.
March 9, 2017
Organizer Alan Quayle gives us the lowdown on programmable communications and all you need to know about participating in this pre-Enterprise Connect hackathon.
March 3, 2017
From protecting against new vulnerabilities to keeping security assessments up to date, security consultant Mark Collier shares tips on how best to protect your UC systems.
February 24, 2017
UC analyst Blair Pleasant sorts through the myriad cloud architectural models underlying UCaaS and CCaaS offerings, and explains why knowing the differences matter.
February 17, 2017
From the most basics of basics to the hidden gotchas, UC consultant Melissa Swartz helps demystify the complex world of SIP trunking.
February 7, 2017
UC&C consultant Kevin Kieller, a partner at enableUC, shares pointers for making the right architectural choices for your Skype for Business deployment.
February 1, 2017
Elka Popova, a Frost & Sullivan program director, shares a status report on the UCaaS market today and offers her perspective on what large enterprises need before committing to UC in the cloud.
January 26, 2017
Andrew Davis, co-founder of Wainhouse Research and chair of the Video track at Enterprise Connect 2017, sorts through the myriad cloud video service options and shares how to tell if your choice is en....
January 23, 2017
Sheila McGee-Smith, Contact Center/Customer Experience track chair for Enterprise Connect 2017, tells us what we need to know about the role cloud software is playing in contact centers today.