Classification of Telecommunication frauds

                                        Classification of Telecommunication frauds




  • Traffic Pumping Schemes - These schemes use "access stimulation" techniques to boost traffic to a high cost destination, which then shares the revenue with the fraudster.

  • Schemes to Defraud telecom service providers - These schemes are the most complicated, and exploit telecom service providers using SIP trunking, regulatory loopholes, and more.

  • Schemes Conducted Over the Telephone - Also known as " phone Fraud, " this category covers all types of general fraud that are perpetration over the telephone.

  • Premium rate numbers are usually to a high cost destination. The owner of the number will offer to share the revenue generated from calls to these numbers with anyone who sends them traffic. This means that a fraudster who generates bogus or stimulated traffic to that destination will received a kickback for each completed call.

  • The Call Forwarding hack is a common form of VoIP telecom fraud. In this case. fraudsters gain access to an enterprise PBX or the IVR of a voice mail system, They can then configure call forwarding to an expensive long distance destination to profit from a revenue sharing deal.

  • Wangiri, in Japanese, means " one and cut." That is, one ring method for a quick way to make money. A fraudster will set up a computer to dial a large number of phone number at random. Each rings just once, then hangs up. This leaves a number as a missed call on the recipients phone.

  • Toll Free fraud can affect any business that uses a toll free number, These call are often left up from hours at a time and automated so multiple calls will be made at once.

  • Location Routing Number Fraud or LRN fraud works based on the desire of some service providers to avoid extra charges from LRN "dips." Most providers will run an LRN dip to determine the correct LRN for a dialed number. However, some service providers will not perform an LRN dip is the LRN is already in the SIP message. Fraudsters take advantage of this  by inserting the LRN for a relatively cheap terminating  destination in their SIP INVITES, when the call is actually going to a high cost rural destination. The service provider will route and bill the fraudster using the LRN include in the SIP

  • Internet Bypass fraud is the unauthorized insertion of traffic onto another carrier's network. Inter/Intra State toll bypass fraud attempts to bypass the higher tolls of intra-state traffic by making it look like inter-state traffic.

  • Telecom Denial of Service (TDoS) attacks are similar to traditional data network denial of service (DDoS) attack, unauthorized users flood a system with too many access requests, preventing legitimate users from accessing network. For TDoS, fraudsters make a huge number of phone calls, keeping them up for long durations, and overwhelming the capacity of an organization's phone network.

Comments