Sponsored By

Telecom Fraud, Bigger than You ThoughtTelecom Fraud, Bigger than You Thought

The old problems still exist, and the emergence of more mobile services and devices has compounded the problem.

Gary Audin

September 10, 2012

3 Min Read
No Jitter logo in a gray background | No Jitter

The old problems still exist, and the emergence of more mobile services and devices has compounded the problem.

Telecom fraud is equal to the annual revenue of Disney or the GDP of Costa Rica--$40 billion. I would have thought that the hacking of PBXs and subscription fraud would be reduced by now since we have had these fraud problems for years. Not so. They are still highest on the list.

This is according to the Heavy Reading report: "Bigger Than Disney: Telecom Fraud Tops $40 Billion a Year". The $40 billion figure of about 2% of the telecom revenue loss is an estimate generated by the Communications Fraud Control Association (CFCA).

There is a galaxy of fraud, abuse, security and revenue assurance problems, as shown in the diagram below from the report. The number of operators, the wide range of devices and operating systems and the range of offered services compound the problem. The perpetrators use the access to multiple networks to confound the operators, especially for mobile services.

Telecom fraud has become more pervasive and sophisticated as more means of communicating have been introduced. The report states that many experts believe that networks have actually become less secure. The old TDM world was centrally controlled. Not so in the IP world. Besides outsiders perpetrating fraud, employees, dealers and sometimes operators have added risk to the telecom business. The report authors also learned that telecom managers and the providers have decreased their vigilance, not increased it. This reduction of vigilance appears to be one of the root causes of the success of fraud.

So what are the vulnerabilities that lead to the fraud problem?

* PBX hacking (I did not expect this since we have had the problem for decades and there are many solutions on the market)
* Subscription fraud
* International revenue share fraud by operators
* Network bypass
* Credit card fraud

These five vulnerabilities account for about half the problems. The other half involves things like "premium services", international wholesale abuses, and domestic traffic pumping, among about another dozen categories of fraud.

Subscription fraud is quite old in application. This is performed by opening a fake account (easy to do online with stolen credit cards). The fake account can be used to access services and receive equipment (wireless routers as an example). As long as the fake account is not detected, the fraud can last for months, maybe even years.

As the report says, "Operators hasten to close gaps in subscription fraud because of the cascading nature of the loss. 'Subscription fraud is a gateway problem,' says Subex Group VP Vinod Kumar. 'Operators don't just lose the retail revenues. They still have to pay their international partners, device manufacturers, and possibly digital content partners, so they are losing on all fronts.'" Even though the provider is absorbing the cost, eventually this cost of doing business trickles down to enterprises and consumers.

The sections I liked in the report were "Next-Gen Networks, Next-Gen Losses" and "Internal Fraud: The Dirty Not-So-Little Secret" The report continues with how the industry is fighting back and a list of the vendors of solutions to mitigate the fraud problems.

What I took away from this report was that although fraud has been around for decades, the old problems still exist with considerable losses. Further, the emergence of more mobile services and devices has compounded the problem. It appears that the industry is lagging the fraud problem when it comes to solutions, not really preventing it.

About the Author

Gary Audin

Gary Audin is the President of Delphi, Inc. He has more than 40 years of computer, communications and security experience. He has planned, designed, specified, implemented and operated data, LAN and telephone networks. These have included local area, national and international networks as well as VoIP and IP convergent networks in the U.S., Canada, Europe, Australia, Asia and Caribbean. He has advised domestic and international venture capital and investment bankers in communications, VoIP, and microprocessor technologies.

For 30+ years, Gary has been an independent communications and security consultant. Beginning his career in the USAF as an R&D officer in military intelligence and data communications, Gary was decorated for his accomplishments in these areas.

Mr. Audin has been published extensively in the Business Communications Review, ACUTA Journal, Computer Weekly, Telecom Reseller, Data Communications Magazine, Infosystems, Computerworld, Computer Business News, Auerbach Publications and other magazines. He has been Keynote speaker at many user conferences and delivered many webcasts on VoIP and IP communications technologies from 2004 through 2009. He is a founder of the ANSI X.9 committee, a senior member of the IEEE, and is on the steering committee for the VoiceCon conference. Most of his articles can be found on www.webtorials.com and www.acuta.org. In addition to www.nojitter.com, he publishes technical tips at www.Searchvoip.com.