Unit 1: Frauds in IT

  • IT Frauds (Theft of Proprietary Information, Insider abuse of internet access, system penetration, unauthorized access to information, laptop/mobile theft, financial fraud, misuse of public web application, viruses, abuse of wireless network)
  • Countermeasures

  • IT Frauds:
    • Theft of Proprietary Information: Unauthorized acquisition of confidential business data.
    • Insider Abuse of Internet Access: Misuse of internal network privileges by employees.
    • System Penetration: Unauthorized access to secure systems or networks.
    • Unauthorized Access to Information: Illegitimate retrieval of sensitive data.
    • Laptop/Mobile Theft: Physical theft of mobile devices or laptops containing valuable information.
    • Financial Fraud: Manipulation of financial data or transactions for illicit gains.
    • Misuse of Public Web Application: Exploitation of vulnerabilities in publicly accessible web applications.
    • Virus: Malicious software designed to harm systems or steal information.
    • Abuse of Wireless Network: Unauthorized access or misuse of wireless network resources.
  • Countermeasures:
    • Data Encryption: Protecting sensitive information by converting it into unreadable code.
    • Access Control Policies: Restricting access to systems based on user roles and permissions.
    • Intrusion Detection Systems (IDS): Monitoring and alerting for suspicious activities.
    • Multi-Factor Authentication (MFA): Adding an extra layer of identity verification for access.
    • Physical Security Measures: Securing laptops and mobile devices to prevent theft.
    • Firewalls: Establishing a barrier between a private internal network and external networks.
    • Regular Security Audits: Assessing vulnerabilities and ensuring compliance with security policies.
    • Employee Training:* Educating staff about security risks and best practices.
    • Endpoint Security Solutions: Protecting individual devices from security threats.
    • Incident Response Plan: A structured approach to managing and mitigating security incidents.
    • Wireless Network Security Measures: Implementing encryption and access controls for wireless networks.

Unit 2: Frauds in Software Development and Management

  • Software industry frauds
  • Countermeasures

  • Software Industry Frauds:
    • Code Theft: Unauthorized acquisition or use of proprietary source code.
    • Software Piracy: Distribution or use of software without proper licensing.
    • Bait and Switch: Introducing a different, substandard product than advertised.
    • False Representation of Features: Misleading claims about software capabilities.
    • Kickbacks and Bribery: Illicit payments to influence software procurement decisions.
    • Data Manipulation: Unauthorized alterations to software code or data.
    • Insider Threats: Employees exploiting their position for fraudulent activities.
    • Plagiarism: Presenting someone else’s work as one’s own in the software development process.
  • Countermeasures:
    • Code Version Control: Implementing tools to track changes and manage code versions.
    • License Management: Ensuring proper licensing for all software used in the development process.
    • Strict Access Controls: Restricting access to sensitive code repositories and development environments.
    • Code Reviews and Audits: Regularly reviewing and auditing software code for integrity.
    • Vendor Due Diligence: Thoroughly vetting third-party vendors and their software products.
    • Whistleblower Programs: Providing channels for reporting unethical practices internally.
    • Secure Development Practices: Integrating security into the software development life cycle.
    • Employee Training on Ethics:* Educating software developers on ethical conduct and consequences.
    • Use of Open Source Scanning Tools: Identifying and addressing security vulnerabilities in open-source components.
    • Legal Safeguards: Drafting contracts and agreements to protect against fraud and plagiarism.
    • Data Encryption in Software Development: Protecting sensitive data within the development environment.

Unit 3: Introduction to Telecom Frauds

  • What is ‘Telecommunication Fraud’?
  • Telecommunication Technologies referred (GSM, CDMA, GPRS, PBX, NGN Networks, Analog Networks)
  • About Fraudsters
  • Benefits to Fraudsters
  • Using a service without – Call selling to others
  • Root Causes of Fraud
  • Mitigation and Demographics
  • Penetration of new technology
  • Staff Dissatisfaction – Illustrative cases

  • What is ‘Telecommunication Fraud’?
    • Definition: Illicit activities involving the unauthorized use or manipulation of telecommunication services for personal gain.
  • Telecommunication Technologies Referred:
    • GSM (Global System for Mobile Communications): Widely used standard for mobile communication.
    • CDMA (Code Division Multiple Access): Another mobile communication standard.
    • GPRS (General Packet Radio Service): Mobile data service for 2G and 3G networks.
    • PBX (Private Branch Exchange): Telephone exchange within an organization.
    • NGN Networks (Next-Generation Networks): Advanced communication infrastructures.
    • Analog Networks: Traditional voice communication systems.
  • About Fraudsters:
    • Characteristics: Individuals or groups exploiting vulnerabilities in telecommunication systems.
    • Motivations: Financial gain, unauthorized access, or disruption of services.
  • Benefits to Fraudsters:
    • Monetary Gain: Profits from unauthorized usage or resale of telecommunication services.
    • Anonymity: Exploiting services without being easily traced.
  • Using a Service Without – Call Selling to Others:
    • Unauthorized Usage: Fraudsters may use telecommunication services without paying.
    • Call Selling: Selling access to telecommunication services to others.
  • Root Causes of Fraud:
    • Security Gaps: Vulnerabilities in telecommunication networks and technologies.
    • Weak Authentication: Inadequate user verification measures.
    • Insider Threats: Employees involved in fraudulent activities.
  • Mitigation and Demographics:
    • Fraud Detection Systems: Implementing tools to identify and prevent fraudulent activities.
    • Demographic Analysis: Studying patterns and demographics of fraud incidents for targeted mitigation.
  • Penetration of New Technology:
    • Emerging Risks: Assessing vulnerabilities introduced by the adoption of new telecommunication technologies.
    • Security Measures: Proactive measures to secure evolving networks.
  • Staff Dissatisfaction – Illustrative Cases:
    • Employee Involvement: Cases where dissatisfied staff may participate in fraudulent activities.
    • Preventive Measures: Ensuring employee satisfaction and implementing measures to prevent insider threats.

Unit 4: Classification of Telecommunication Fraud

  • Frauds in different segments of Telco operations (such as Customer Care, Operational Support Systems, Network Management Systems)
  • Organizational or Non-Technical Fraud (involving Administration services, processes)
  • Human Fraud
  • Insider Fraud
  • Call-sell Fraud
  • Facilitation Fraud
  • Creeping Fraud
  • Chaining Fraud
  • Calling-Card Fraud
  • Phantom Account
  • Partnership Fraud
  • Process Fraud
  • Ghosting
  • Abuse of test or emergency lines or accounts
  • Unauthorized Feature/Service Activation – Accounting
  • Dealer or Reseller Fraud
  • Subscription Fraud
  • Roaming Subscription Fraud
  • Premium-Rate Services Fraud- Illustrative Cases
  • Technical Fraud (involving Network Systems, Billing Systems)
  • Cloning – Tumbling
  • Voice-mail Hacking
  • PBX Hacking
  • SIM Stuffing- Clip-on Fraud
  • Line Tapping
  • War Dialing
  • Handset Fraud

  • Frauds in Different Segments of Telco Operations:
    • Customer Care: Manipulation or exploitation of customer service channels.
    • Operational Support Systems: Frauds related to support systems for network operations.
    • Network Management Systems: Exploitation of systems overseeing network functionalities.
  • Organizational or Non-Technical Fraud:
    • Administration Services, Processes: Manipulation or abuse of administrative services and processes.
    • Human Fraud: Fraudulent activities involving human interactions within the organization.
    • Insider Fraud: Unethical activities perpetrated by individuals within the organization.
    • Call-Sell Fraud: Unauthorized selling of telecommunication services.
    • Facilitation Fraud: Assisting or facilitating fraudulent activities.
    • Creeping Fraud: Gradual and subtle fraudulent activities.
  • Chaining Fraud:
    • Calling-Card Fraud: Unauthorized use or manipulation of calling-card services.
    • Phantom Account: Creation of non-existent accounts for fraudulent purposes.
    • Partnership Fraud: Fraud involving collusion between individuals or entities.
    • Process Fraud: Manipulation of telecommunication processes for illicit gains.
    • Ghosting: Falsifying identity or accounts to operate undetected.
    • Abuse of Test or Emergency Lines or Accounts: Unauthorized use of testing or emergency functionalities.
  • Unauthorized Feature/Service Activation – Accounting:
    • Unauthorized activation of telecommunication features or services for financial exploitation.
    • Dealer or Reseller Fraud: Frauds involving distributors or resellers within the telecommunication ecosystem.
    • Subscription Fraud: Acquiring telecommunication services through deceitful means.
    • Roaming Subscription Fraud: Fraudulent activities related to roaming services.
    • Premium-Rate Services Fraud – Illustrative Cases: Unauthorized access or manipulation of premium-rate services.
  • Technical Fraud:
    • Cloning – Tumbling: Duplicating a mobile device’s identity to commit fraud.
    • Voice-Mail Hacking: Unauthorized access to voicemail systems.
    • PBX Hacking: Exploiting Private Branch Exchange systems.
    • SIM Stuffing – Clip-on Fraud: Unauthorized SIM card manipulations.
    • Line Tapping: Illicit interception of communication lines.
    • War Dialing: Automated dialing to find vulnerabilities in communication systems.
    • Handset Fraud: Frauds involving manipulation or misuse of mobile handsets.

Unit 5: Frauds in Fixed Network & Mobile Network

  • Fixed network Fraud
  • The development of Fixed Networks
  • Common types of Frauds affecting Fixed-line telcos
  • Subscription Fraud
  • Physical attacks on networks
  • Premium rate fraud
  • PBX/DISA fraud
  • Threat of SS7 attacks
  • Methods of mitigating the risks these practices present
  • Mobile network Fraud
  • The security of mobile networks
  • Frauds in wireless domain
  • Before Pre-Call Validation
  • After Pre-Call Validation
  • Fraud Detection Systems
  • Subscription Fraud
  • The best ways to reduce the risk of mobile network fraud

  • Fixed Network Fraud:
    • The Development of Fixed Networks: Evolution of infrastructure supporting landline telecommunication.
    • Common Types of Frauds Affecting Fixed Line Telcos:
      • Subscription Fraud: False or stolen identity used to obtain telecom services.
      • Physical Attacks on Networks: Vandalism or sabotage to disrupt services.
      • Premium Rate Fraud: Unauthorized access to premium-rate services for financial gain.
      • PBX/DISA Fraud: Exploitation of Private Branch Exchange or Direct Inward System Access.
      • Threat of SS7 Attacks: Vulnerabilities in Signaling System No. 7 protocol.
    • Methods of Mitigating the Risks These Practices Present:
      • Advanced Authentication: Implementing robust identity verification measures.
      • Network Monitoring: Surveillance to detect and respond to unusual activities.
      • Security Protocols: Enhancing protocols to withstand physical attacks.
      • Encryption: Protecting sensitive communications from interception.
      • SS7 Security Measures: Implementing safeguards against SS7 vulnerabilities.
  • Mobile Network Fraud:
    • The Security of Mobile Networks: Ensuring the integrity and confidentiality of mobile communications.
    • Frauds in Wireless Domain:
      • Before Pre-Call Validation: Assessing risks before initiating communication.
      • After Pre-Call Validation: Evaluating risks during or after the call.
      • Fraud Detection Systems: Implementing tools to identify and prevent fraudulent activities.
      • Subscription Fraud: Unauthorized acquisition of mobile services using false information.
    • The Best Ways to Reduce the Risk of Mobile Network Fraud:
      • Enhanced User Verification: Implementing multi-factor authentication.
      • Regular Audits: Periodic reviews of user accounts and activities.
      • Real-time Monitoring: Surveillance for suspicious patterns in call and data usage.
      • Collaboration with Law Enforcement: Reporting and cooperating in investigations.
      • User Education: Educating users about security best practices.

Unit 6: Common Telecommunication Frauds

  • Clip-on and Boxing Fraud
  • EPABX Hacking
  • Unauthorized disclosure of information
  • Unauthorized amendment of data
  • Denial of Service attack
  • Toll Fraud (call theft)
  • Mailbox abuse
  • Fax abuse
  • Vulnerabilities and their Impact
  • Controls
  • Security Policy
  • Managing the Risks
  • Awareness Training
  • Controlling Physical Access
  • Controlling Logical Access
  • Illustrative Cases
  • Calling-Card Theft
  • Call Forwarding Scams – Cloning
  • Cloning in GSM Networks
  • Tumbling or Magic Phones
  • Dealer or Reseller Fraud
  • Pre-paid Fraud
  • Social Engineering and Friendly Fraud
  • Insider Fraud
  • Identity Theft – Delinquency
  • Local Subscription Fraud
  • Roaming Subscription Fraud
  • Content and Value Added Services (VAS) Fraud
  • Common Fraud Techniques used today
  • Frauds in 3G Networks
  • Introduction to 3G Technology and Services
  • The 3G Business Model
  • Telecom Frauds in a 3G environment
  • Subscription Fraud
  • Credit-card Fraud on M-commerce
  • Micro-payment Fraud
  • Premium rate Services (PRS) Frauds
  • Copyright Infringement and content resale frauds (‘piracy’)
  • IP Security issues in 3G – Hacking
  • DOS Attacks
  • Virus, Worms and Trojans
  • Data Interception
  • Database attacks – Spam
  • How network security needs to change with the move to 3G
  • Security and Law Enforcement Issues in 3G – Fraud Management Perspective – A Strategic Perspective
  • Telecom Laws – Domestic and International
  • Fraud Management System
  • Architecture of an FMS solution

  • Clip-on and Boxing Fraud:
    • Unauthorized manipulation or attachment to communication lines for fraudulent activities.
  • EPABX Hacking:
    • Exploiting vulnerabilities in Electronic Private Automatic Branch Exchange systems.
  • Unauthorized Disclosure of Information:
    • Improper release of confidential information to unauthorized individuals.
  • Unauthorized Amendment of Data:
    • Illicit changes or alterations to telecommunication data.
  • Denial of Service Attack:
    • Disrupting telecommunication services to prevent legitimate use.
  • Toll Fraud (Call Theft):
    • Unauthorized use of telecommunication services, resulting in financial losses.
  • Mailbox Abuse:
    • Improper use or manipulation of voicemail systems.
  • Fax Abuse:
    • Unauthorized use or manipulation of fax services.
  • Vulnerabilities and Their Impact:
    • Identification of weaknesses in telecommunication systems and the potential consequences.
  • Controls:
    • Implementation of security measures to mitigate vulnerabilities.
  • Security Policy:
    • Established guidelines and rules to safeguard telecommunication operations.
  • Managing the Risks:
    • Strategies and actions to proactively address and mitigate risks.
  • Awareness Training:
    • Educating stakeholders about security risks and best practices.
  • Controlling Physical Access:
    • Restricting physical entry to critical telecommunication infrastructure.
  • Controlling Logical Access:
    • Managing digital access to telecommunication systems.
  • Illustrative Cases:
    • Real-life examples illustrating various telecommunication fraud scenarios.
  • Calling-Card Theft:
    • Unauthorized acquisition or manipulation of calling-card services.
  • Call Forwarding Scams – Cloning:
    • Fraudulent activities related to call forwarding and mobile device cloning.
  • Cloning in GSM Networks:
    • Unauthorized duplication of mobile device identities in GSM networks.
  • Tumbling or Magic Phones:
    • Techniques involving frequent changes of mobile identities to evade detection.
  • Dealer or Reseller Fraud:
    • Fraudulent activities involving distributors or resellers within the telecommunication ecosystem.
  • Pre-paid Fraud:
    • Frauds related to manipulation of pre-paid telecommunication services.
  • Social Engineering and Friendly Fraud:
    • Deceptive practices exploiting human psychology for fraudulent purposes.
  • Insider Fraud:
    • Unethical activities perpetrated by individuals within the telecommunication organization.
  • Identity Theft – Delinquency:
    • Illicit acquisition and use of someone’s identity for fraudulent activities.
  • Local Subscription Fraud:
    • Unauthorized acquisition of local telecommunication services.
  • Roaming Subscription Fraud:
    • Fraudulent activities related to roaming telecommunication services.
  • Content and Value Added Services (VAS) Fraud:
    • Fraudulent manipulation of content and value-added services.
  • Common Fraud Techniques Used Today:
    • Overview of prevalent fraud techniques in contemporary telecommunication environments.
  • Frauds in 3G Networks:
    • Introduction to frauds specific to 3G networks.
  • Introduction to 3G Technology and Services:
    • Overview of 3G technology and services.
  • The 3G Business Model:
    • Understanding the business model associated with 3G technology.
  • Telecom Frauds in a 3G Environment:
    • Fraud scenarios specific to 3G telecommunication networks.
  • Subscription Fraud:
    • Unauthorized acquisition of telecommunication services in a 3G context.
  • Credit-Card Fraud on M-commerce:
    • Unauthorized credit card transactions in mobile commerce.
  • Micro-payment Fraud:
    • Fraudulent activities related to small-value transactions.
  • Premium Rate Services (PRS) Frauds:
    • Unauthorized manipulation of premium-rate services.
  • Copyright Infringement and Content Resale Frauds (‘Piracy’):
    • Fraudulent activities related to copyright infringement and content resale.
  • IP Security Issues in 3G – Hacking:
    • Security vulnerabilities and hacking threats in 3G networks.
  • DoS Attacks:
    • Denial of Service attacks targeting 3G networks.
  • Virus, Worms and Trojans:
    • Malicious software threats in the context of 3G telecommunication.
  • Data Interception:
    • Unauthorized access to and interception of telecommunication data.
  • Database Attacks – Spam:
    • Manipulation of databases and the threat of spam in 3G networks.
  • How Network Security Needs to Change With the Move to 3G:
    • Adaptations required in network security measures in the transition to 3G.
  • Security and Law Enforcement Issues in 3G – Fraud Management Perspective – A Strategic Perspective:
    • Strategic considerations in managing security and law enforcement in 3G environments.
  • Telecom Laws – Domestic and International:
    • Overview of domestic and international laws governing telecommunication.
  • Fraud Management System:
    • Architecture and components of a Fraud Management System (FMS) solution.

 


Leave a Reply