Telecom Fraud
Telecom Fraud
Telecom Fraud
HAILU TSEGA
APRIL 18, 2017
Agenda
Introduction
Ways Telecom pirates
What is Telecom Fraud
Attempt to Avoid Detection
Factors Leading to Telecom Fraud Methods Used to Detect
Types of Telecom Network Fraud Fraud
Who Benefits from Fraud
What is a Bypass Fraud? Detection and Elimination?
Existence of Bypass Fraud Six Steps Regulators Should
Take to Control SIM Box Fraud
Bypass Fraud Network Conclusion
Architecture
Hardware Used to Facilitate
Bypass Fraud
Introduction
Telecom Fraud Offence Proclamation No. 761/2012
WHEREAS, considering that telecom fraud is increasing
and wide-spreading from time to time thereby
encumbering the telecom industry to play an essential
role in the implementation of peace, democratization and
development programs of the country;
WHEREAS, recognizing that telecom fraud is a serious
threat to the national security beyond economic losses;
WHEREAS, it has became imperative to legislate
adequate legal provisions since the laws presently in
force in the country are not sufficient to prevent and
control telecom fraud;
What is Telecom Fraud?
Telecom fraud most often refers to the illegal use
of network operator resources without paying the
service provider
It is an unceasing risk to network operators
revenue and it remains difficult to predict exactly
how, when, or where new fraud settings will
attempt to attack services.
It has created severe international problems for
GSM and PSTN service providers and its annual
impact has been observed to be billions of US
dollars
Factors Leading to Telecom
Fraud
Failure to understand the complexity of new technologies
Dissatisfaction of employees due to a lack of experience with
new technology
Weaknesses in operation systems
Irresponsible business models
Money laundering
Political and ideological factors
Ineffective audit systems; a lack of follow up relating to
compliance reports presents opportunities for telecom pirates
Free financial Gain
Types of Telecom Network Fraud
Telecommunication fraud encompasses a variety of illegal activities.
There are types of frauds, which adversely affect the carrier providers,
not only financially but also in terms of extensive voice bandwidth and
network resources.
These may include roaming, premium service (phishing), and
subscription frauds,
The most prevalent types of network frauds :
Bypass Fraud,
International Revenue Sharing Fraud (IRSF)
False Answer Fraud
What is a Bypass Fraud?
Bypass Fraud is used to describe the use of various least cost
call termination techniques like SIM Boxes, Leakey (hacked)
PBXs etc. to bypass the legal call interconnection and
diverting international incoming calls to on or of network
GSM/CDMA/Fixed calls through the use of VoIP or Satellite
gateway, thus evading revenue for international call
termination which operators and government regulators are
entitled to
Existence of Bypass Fraud
Bypass fraud occurs when international termination charges
become larger than the local mobile call charges.
It is also popular in the countries where international
gateways are monopolized by government operators.
As a result, calls are produced at the user end with either a
Calling Line Identity (CLI) manipulation number or with no
CLI.
Mostly, SIM Box operators use pre-paid SIMs to perform
these illegitimate acts because the ownership and address
of a pre-paid SIM is difficult to know.
Bypass Fraud Evolution
Infrastructure needed
An internet connection
-1Mb allows for +- 60 concurrent
calls
-DSL
-VSAT (satellite)
-Datacenter
Router to connect to internet
GSM Gateway to convert calls into
mobile calls
SIM cards
Typical companies
Small 2 person operations
Carriers sometimes also deploy SIM Boxes
Some companies use PBX also for
terminating traffic
VoIP Gateways
VoIP Gateways are telecommunication devices
through which calls from fixed or mobile
telephone networks are routed directly over
VoIP to the targeted GSM network.
A modern GSM VoIP gateway installation can
support hundreds of mobile SIM cards,
functional SIM rotation, pre-paid recharging
and off-site SIM card storing
Session Internet Protocol Devices
Session Internet Protocol devices are used to
enable VoIP.
They are employed to connect a cellular network
directly to an Internet Telephony Service Provider
(ITSP).
This permits VoIP to function as well as other real-
time media such as voice, video, and web
conference without the requirement of any IP-
PSTN Gateway or Digital gateway.
Ways Telecom pirates Attempt to
Avoid Detection
Detection avoiding schemes may become
troublesome for telecom pirates as they
often demand large investments.
There are a number of ways that telecom
pirates use to intercept phone calls and
texts. Some of these are explained below
Bit Stuffing of False CLI
Telecom pirates use different methodologies to
manipulate the caller ID.
Within telecommunications, bit stuffing is the
insertion of non-information bits.
Therefore, if a number is dialed showing the
country code, the telecom pirate can manipulate
that number by adding or deleting digits from it.
As a consequence, the called party cannot
recognize the actual number.
CLI Stuffing
Deletion of CLI
CLI Deletion is another type of telecom
fraud in which telecom pirates remove the
CLI of the incoming call.
In this way, the telephone number of the
originating party will not be shown on the
Caller ID Box.
Accordingly, the immediate affected parties
are: the operators, end users, and
regulators.
CLI Detection
Methods Used to Detect Fraud
Operators and regulators have devised several
fraud detection schemes for generated
revenue assurance