Fraud Assurance that helps you search, detect and act against fraud using our global TCG footprint

Telecom Fraud

For many years, the telecommunications industry has suffered enormous losses due to fraudulent activities which continues to grow and evolve. Fraudster attack vectors can include weak processes, missing controls, technical weaknesses and of course by exploiting people.

Roscom have supported many global clients with Fraud Assurance activities. Below are the risk areas we currently assure…

Fraud Assurance - Management

Fraud Assurance Risk Areas

International Revenue Share Fraud

International Revenue Share Fraud (IRSF) costs businesses nearly five billion dollars each year. Fraudsters make money by generating bogus phone calls to international premium rate numbers you have paid for as a business.

Premium rate number services are a popular business model because they are so easy to use and simple to put in place. But it’s the simplicity which makes them a lucrative target for fraudsters. The caller is faced with a large bill for the unauthorised calls while the cheats collect a pay-out from the company that owns the premium rate number. They win You lose.

Top 5 International Revenue Share Fraud scams:

  • Taking advantage of an unintended or misconfigured cheap calling rate to the terminating party, allowing the terminating party to collect more revenue than the originating party spends making the call.
  • Making the call on someone else’s account. Typically using a stolen handset or hacked PBX.
  • Tricking a normal subscriber into calling a revenue share number (E.g. Wangiri)
  • Setting up a post-pay subscriber with no intention of ever paying the bill.
  • Acquiring free airtime through stolen top-ups or internal fraud.
Country arrows graphic

International & Domestic Bypass Fraud & SIM Box Activity

Bypass fraud is the deliberate routing of voice traffic for in-country termination to avoid international toll gateway interconnection points. Calls are diverted over alternate routes and placed on the terminating network at the cheapest call rate possible.

The presence of bypass prevents the destination network from collecting valid billable incoming international minutes. The bypass network (BPN) is established as an unlicensed operation, thus operating outside regulatory, legal, commercial and other government controls.

Bypass Fraud Types

  • OTT Application – Originating subscriber calls an E164 number but the call is hijacked and terminated on an OTT application.
  • Preferred Partner Refiling – Where a CLI is changed by one of the interconnect partners / fraudster to mislead the terminating network.
  • Re-Originating Calling – Traditional MSC SIM box bypass. International call is hijacked and the final leg is terminated as a local call.
  • Unsanctioned or Ghost Routing – Call passed to the terminating network via a misconfigured or unsanctioned route.
Bypass fraud scaled graphic

Wangiri Fraud

Did you know that Wangiri is a Japanese word meaning ‘one (ring) and cut’?

This phone scam has probably affected more people around the world than you’d think… have you received a call from an unknown number…. and called it back? Well, there you go, you’ll find the number you have called is connected to an expensive (often international or premium) number therefore costly to you. This needs to be eradicated to ensure each and everyone of us protected form this scamming, especially in these challenging times.

How can Roscom help you?

This type of fraud has been around for many years, and it’s not reducing. This is where Roscom can help. Our Osprey™ Analytics module can monitor the common traits associated with these calls:

  • Incoming calls from these high risk countries
  • Large short call volumes from the same originator
  • Outgoing calls from multiple subs to high risk countries
  • Customer complaints

And once validated Osprey™ can create a list of incoming and outgoing number ranges calls to be blocked.

Fraud Alert diagram

Our Fraud Assurance Solution

The Process

Our Solution

Identify and report complex fraud issues using our in-house developed technology & techniques. It’s all in the detail – Big-data Analytics, end to end reconciliation, independent tracking/monitoring, delivering unique anomaly identification and much more.

Our Tools

Osprey™ Analytics

Uses your data to enrich and quantify your fraud testing landscape with real customer journeys.

Osprey™ TCG

Generate independent analytic-driven traffic, verifying the routing and termination of real events.

Osprey™ Reconciliation

Uses end to end data sources to reconcile and validate traffic against consumer and wholesales revenue streams that are commonly exploited by fraudsters.