| |
Chapter 1. Executive Summary (12 pages) |
|
Chapter 2. International Revenue Share (34 pages) |
|
A. How IRSF Predators are Evolving their Fraud Attacks |
– Predators in Nature vs. Telecom |
– The PRISM IPRN Test Number Database |
– Big Increase in IPRN Numbers and Aggregators |
– Why Fraudsters are Shifting IRSF to New Destinations |
– Fraudsters Target Valid Non-VAS & MSRN Numbers |
– Number Misappropriation or Number Hijacking |
– Legal Remedies for Controlling IPRN Aggregators? |
– Why Least Cost Routing is Causing Fraud to Spread |
– The Value of Trusted Networks |
– The i3 Forum Code of Conduct |
– Global Assessment of Fraud Management Practices |
– Tactics and Automation of the Fraudsters |
B. Machine Learning, Analytic Scans & Tailored Treatment |
– A Machine Learning View of Analytics |
– Mobileum Developing Full-Scale Fraud System |
– Profiling Traffic to Deliver Finer Grain Analytics |
– Deeper Traffic Knowledge Allows Better Treatment |
– Deep Analysis of Number Ranges |
– Mobileum Automates the Traffic Treatment |
– Better Accuracy and Less Chasing False Positives |
– An Advanced Diagnostics Tool for IRSF Fraud |
C. Protecting 900+ Global MVNOs from IRSF Fraud |
– Why IRSF Fraudsters are Targeting MVNOs |
– Light vs. Full MVNOs |
– Scarce Fraud Manager Attention at MVNOs |
– A Five-Point Plan for MVNO Protection |
– Consulting MVNOs on Fraud Concerns |
D. IRSF: Are We Winning Against Telecom Pirates? |
– IRSF – A History on the Threat’s Evolution |
– Tech Advancements Led to More Fraud Attack Avenues |
– The Roaming Gateway to IRSF |
– Why Certain Countries are IRSF Destinations |
– Bound by International Agreements |
– Impact of IRSF on all-IP networks and LTE |
– Industry Cooperation |
– The Special Case of the Pacific Islands |
– IRSF: Mobile Roaming Scenario |
– How Fraudsters Advertise Themselves |
– The IRSF Number Providers |
– Why It’s Hard to Detect and Reconstruct IRSF Cases |
– Consulting in the Fraud Business |
– A Shared Fraud Managment Model |
– Legislation to Stop the Fraud Money Flow |
Chapter 3. Mobile Roaming & SMS Fraud (23 pages) |
|
A. Safety in Numbers and NRTRDE: Syniverse's Fraud Intelligence |
– The Power of Safety in Numbers in Fraud Control |
– Why Fraudsters Love Roaming: The Value NRTRDE |
– Syniverse's Global Fraud Footprint |
– Details on the Intercarrier Process behind NRTRDE |
– Intercarrier Data Handoffs & GDPR Requirements |
– Global Fraud Practices & Law Enforcement's Role |
B. A2P Bypass: Arraxe Fights Schemes to Exploit Roam-Like-at-Home |
– Why Telecom's Darwinian Struggle Invites Fraud |
– The A2P SMS Revenue Bright Spot |
– How Fraudsters Play the A2P Game |
– Fraudsters Exploiting Roam-Like-at-Home |
– How Araxxe Combats SMS Fraud |
C. Protecting the Roaming Cash Cow: Global Testing of Advanced Networks |
– Overview of SIGOS Roaming Assurance |
– Tapping into a Global Roaming Test Platform |
– Many Roaming Processes Need to be Tested |
– Roaming Testing when Mobile Network Changes Occur |
– Financial Impact of Regulations on Roaming in Europe |
– The Huge Potential of Silent Roamers |
D. iconectiv's Fraud & Identity Solutions in Bypass & A2P Messaging |
– iconectiv's Revenue Assurance Business |
– The SIM Box Problem in A2P SMS Bypass |
– Nuances in the A2P Business |
– Operators Lack Control over A2P Termination |
– Why a Managed Service is Key to A2P Fraud Protection |
– Selection of the Right SMS Aggregators is Essential |
Chapter 4. Enterprise PBX Protection (23 pages) |
|
A. History of PBX Hijacking and Relations between Enterprises & Telcos |
– The History of Enterprise PBX Hijacking |
– Early Years: Phone Booth Calls from New York City |
– Ramping Down Weekday Fraud to Avoid Detection |
– Fraud Responsibility after Enterprises Bought Their Own PBXs |
– Why Operators Cannot Refuse IRSF Payments |
– Fraud Insurance Plans are Rare |
B. Oculeus Launches IRSF Cloud Defense-in-Depth for Enterprises |
– PBX Fraud Blocking is Now a Global Cloud Service |
– Set Up of the Managed Service via Central Registration |
– Almost Zero Administration & PBX Remains Secure |
– What Kind of Enterprises Need the Service? |
– How SIP IP has Opened Pandora's Box |
– Enterprises Want Great Control of Telecom Assets |
– Operators to Act as Distributors of Oculeus-Protect |
– Older Generation Signaling Also Supported |
C. PC Software that Blocks Telecom Fraud at the Enterprise PBX |
– Callista Group's PBX Blocking via PC Software |
– Genesis of the Control Phreak Product |
– Worst Case of Enterprise IRSF Fraud Seen |
– What Intelligence are Phreakers Looking? |
– Ingenious Ways Hackers Discover Weak Passwords |
– The Problem with Four Digit Passcodes |
– How Phreakers Work with Fraudsters |
– Fraudsters Hiding their Tracks by Chaining PBXs |
– How Control Phreak Works |
– Cost for Enterprise Protection |
– PXX Manufacturers Who Cooperate with Callista |
D. Automatic Fraud Blocking at the Enterprise PBX |
– Will Fraudster Play the Long Game in IRSF? |
– A Solution to Block Fraud at Enterprise PBX |
– System Under Development to Guard the PBX |
– A 100% Self-Maintained System |
– The Forensic vs. Network Side of Fraud Control |
– Anomaly Detection Today, Machine Learning Future |
– Many Sources of PBX Fraud |
– Oculeus Philosophy on Software Development |
Chapter 5. SIM Box Bypass Fraud (43 pages) |
|
A. LATRO Teams Up with Law Enforcement to Seize SIM Boxes |
– Three Systems Required to Curb SIM Box Bypass |
– Success in Geo-Locating SIM Boxes |
– Financial Impact of SIM Box Raids |
– Network Visualization of SIM Boxes |
– LATRO's Signaling Expertise |
– LATRO to Offer a Combined RA/FM Solution |
– Signaling to Billing Analytics |
– LATRO Develops an Expertise in IoT Analytics |
B. The Art of Deception and Analysis in SIM Box Bypass |
– Why Test Call Generators are Vital in Bypass Control |
– White List Defensive Tool |
– Making Test Calls to Genuine Subscribers |
– Why Using a Large White List is So Valuable |
– Interconnect Pricing as Measure of SIM Box Fraud Control |
– Reading the Pulse of SIM Box Fraud in a Country |
C. Stealth Test Calls: SIGOS Technique to Block SIM Box Bypass |
– The SIGOS Fraud Business |
– Optimized CDR Profiling for the SIM Box Bypass Problem |
– Regulators are Now Very Active in the SIM Box Fight |
– Three Reasons why Classical SIM Box Detection is Hard |
– SIGOS' Stealth Test Call Technology |
– Success of Stealth Mode in Many Countries |
– How Operator Supports the Stealth Mode |
– Key Advantages of the Stealth Mode |
– Why Stopping SIM Box Bypass is a High Challenge |
D. Outgoing SIM Box Bypass & Spikes in CLI-Tampering |
– Understanding the Psychology of the Fraudster |
– Outgoing SIM Box Fraud Example |
– A No-Revenue-Loss Kind of Fraud |
– Fraudulent CLI Re-Filing in Europe |
– Several Operators in the CLI Refiling Chain |
– Technical Platform Less Critical than Analyst |
E. Integrated Test Call & CDR Analysis in SIM Box and OTT Bypass Fraud |
– Combining FMS CDR Analysis and Test Calls |
– The SIGOS Acquisition of Meucci Solutions |
– Brief History of SIM Box Bypass Fraud |
– Bypass Detection via the Largest Test Call Network |
– Investing in Counter-Measures to Avoid Detection |
– A Cocktail of Medicines to Cure Bypass Disease |
– The Emergence of VIBER Bypass |
F. How a Global Robot Network Detects Voice and SMS Bypass |
– Why Bypass Fraud is Hard to Detect |
– The Araxxe Robot Network |
– The Root Causes of SIM Box Bypass Fraud |
– How Bypass Fraudsters Exploit Interconnect Paths |
– Coordinating FMS and Test Call Generation |
– Efficient Algorithms in Bypass Test Calls are Key |
– Strange Events in the SIM Box Bypass World |
– A Growing Number of Fraud Schemes in A2P SMS |
G. Test Call Generators: Their Use in Mobile Billing Assurance |
– Active Call Generation vs. Passive Revenue Assurance |
– The Value of a Test Calls in RA |
– Roaming Assurance and Global Coverage |
– How Operators Work with a TCG Vendor |
– The Complexity of Re-Rating Calls |
– Demand for Assuring Non-Recurring Charges |
– Regulators Monitor Local Operators for Overcharges |
– End-to-Testing vs. Over-the-Air Call Simulation |
– Quality KPIs Used to Calculate Bonuses |
H. Network Protocol Analysis in SIM Box Fraud |
– The Hotbeds of SIM Box Bypass |
– Why SIM Box Operations Run in Urban Areas |
– SIM Box Detection Technologies |
– The Correlation between Revenue Loss & SIM Box Bypass |
– Confiscating Equipment & Arresting Fraudsters |
Chapter 6. Insider, Dealer & Sales Fraud (22 pages) |
|
A. Insider Data Theft & Fraud: Veriato Monitors the Fraud Endpoints |
– Why Insider Threat Management Needs More Attention |
– On the Network vs. On the Endpoint |
– Why Machine Learning is Essential |
– Advice from the 2019 Insider Threat Maturity Report |
– Departments Who Need Access to Sensitive Monitoring Data |
– Coverage for Desktops and Android Cellphones |
– Combining User Activity Monitoring & Machine Learning |
B. Verizon Insider Threat Report — Summary of Key Findings |
– New Title |
– Summary Research Findings |
– The Five Types of Insider Data Breach Threats |
– Scenario 1: Insider Agent Working on Behalf of Outside Entity |
– Scenario 2: Data Collector Embedded in System Firmware |
– The People and Asset Elements of the Insider Threat |
– The Importance of Coordination Among Stakeholders |
– Eleven Threat Countermeasures |
– Making Full Use of the Verizon Report |
C. Create an Anti-Fraud Culture in Your Telecom Organization |
– Insider Fraud is a Massive Telecom Problem |
– Is There a Fraud Culture at Your Company? |
– Different Country Attitudes Toward Fraud |
– Insider Fraud Happens at All Department Levels |
– Screening the People Responsible for Fighting Fraud |
– Procedures to Put in Place to Fight Fraud |
– Preparation Around the Evidence to be Collected |
– Senior Management's Role |
– Consistency in the Anti-Fraud Program |
D. Detecting Criminal Activity in the Sales Process |
– Focus of Investigation: Systems Related to Sales |
– A Multi-Million Dollar Horror Story in Sales |
– Enabling Investigators to Detect Abnormal Activities |
– Fraud in the Dealer Change: An Example |
– Verifying the Salesperson's Activity |
– Give the Investigator as Much Info as Possible |
– The Fraud Challenge in Offices & Dealer Stores |
Chapter 7. Cross Industry Fraud & Identity Solutions (32 pages) |
|
A. NuData Sheds Light on Identity in a Fraud-Ridden World |
– Verifying Identity through Digital Behavior |
– Verifiying via Multiple Factors of Interaction |
– Defining Digital Behavior |
– The NuData System of Digital Behavior Analysis |
– NuData's Experience in the Business |
– International Differences |
– US Market is Strong in eTail Protection |
– NuData Services Offered Through Mastercard |
– 50% Protection & 50% Optimization & Retention |
B. Syniverse's Secure Global Access: A Neutral Third Party IoT Service |
– Why Digital Giants Have Delayed IoT Investment |
– The GRX Private IPX Network |
– High Security for the Largest IPX in the World |
– Daily Petabyte Consumption on the IPX |
– A Big Efficiency Play for Global Wireless Net |
– Secure Global Access for IoT |
– Supporting 50,000 Unique Non-Human Devices |
– Monitoring the Non-Human Use Cases in IoT |
– RCS Multimedia to Replace A2P Messaging |
C. Device Intelligence: Guarding Consumer Access Points from Fraudsters |
– Fraud Protection & Customer Experience Sensitive |
– Experian's Business |
– Stopping Identity Theft |
– Credit Mules |
– Collecting Device Intelligence |
– Assuming Identity is Compromised |
D. BT Americas: Why Security is a Major Board Room Concern |
– BT America's Security Practice |
– BT is the Sixth Largest Data Mover |
– Large Global Practice in Security Managed Services |
– Six Motivators of Data Security Protection |
– What a Security Assessment is About |
E. Cross-Industry "Know Your Customer" Biometrics to Verify Identity |
– The FRS Labs Business |
– Identity Verification in India |
– The Indian Government's UIDAI Identity Program |
– Know Your Customer and Verify Identity |
– Opportunities to Exploit the National Database |
– Facial Identification |
– Storing Facial Profiles Without Violating Privacy |
– Anti-Spoofing Measures for the Camera |
– Telecoms Must Buy Cross-Industry Solutions |
Chapter 8. The Fraud Control Role of Regulators & Law Enforcement (13 pages) |
|
A. Tracfone's Fraud Controls & Law Enforcement Actions to Stop Cell Phone Trafficking |
– Tracfone and the US Mobile Market |
– Tracfone: An Impressive MVNO and Retailer Partner |
– Excellent Subscriber per Employee Efficiency |
– A Simple IRSF Control Measure using 800 Numbers |
– Cellphone Trafficking: A Financial Burden & Deadly Game |
– TracFone’s Aggressive Law Enforcement Campaign |
– Conclusion |
B. Regulator Action to Stop SIM Box Damage to Developing Nations |
– The Costs of SIM Box Bypass Fraud to a Nation |
– Breakdown of 7 National Problems due to Bypass Fraud |
– How SIM Box Servers have Magnified the Bypass Problem |
– Why Regulators Must Step up Law Enforcement |
– Four Key Steps Regulators Must Take |
Chapter 9. Databases in Telecom Fraud (15 pages) |
|
A. The Early Warning Power of IPRN Test Call Detection |
– The Importance of IPRN Monitoring in IRSF |
– How IPRN Data Sets Up a Fraud Attack |
– The Flow of Criminal Operations in IRSF |
– IPRN Providers & Their Rate Cards |
– An Early Warning Database for IPRN Numbers |
– Customers Finding the IPRN Database Useful |
– Accessing the PRISM Database |
B. Bringing Telecom Reference Data to Fraud Management |
– Marrying Digital Tech with "Baroque" Tech |
– History of Biaas in Telecom Reference Data |
– A New Database Specific to IRSF Fraud Protection |
– Tracking Unallocated Numbers |
– Accurate List of Higher Tariff Destination Number Ranges |
– Pricing for the Fraud Number Database |
– Working with Fraud Control Solution Vendors |
Chapter 10. Wholesaler Fraud Strategies (32 pages) |
|
A. Coping with Chaos: The Copernican Revolution in Wholesale |
– Planning for Unpredictability in Wholesale |
– Wholesale Margins have Vaporized |
– Manual Gives Way to Automated Wholesale Ops |
– Price Pressure and Job Losses |
– Who Wins in Wholesale Traffic Routing? |
– The Retail Transition to Digital Services over Voice |
– Who Wins the Consolidation Game? |
– Strategies Wholesalers Use to Win Over Retailers |
– Helping Retailers Work with Wholesalers |
B. PCCW Global: First Tier 1 Carrier to Deliver SDN Connectivity as a Worldwide Enterprise Service |
– Software Define Networks are a Provisioning Innovation |
– PCCW, a Tier 1 Global IP Provider |
– The Console Connect Fast Connection |
– From Manual to Fully Automated Provisioning of Data Circuits |
– Enterprise Customers Provisioning Their Own Circuits |
– The LinkedIn-Like Console Connect Interface |
– How Fast-Connection Changes Wholesale |
– Telecom Moves to Software that Enables Customer Agility |
C. Wholesaler Fraud Prevention Strategies: Tata Communications |
– Tata Communication's Business |
– Taking the Fraud Concerns of Retails Head On |
– Making the Organization More Accountable |
– Doing Due Diligence on Suppliers |
– Recognizing the Red Flags of Questionable Suppliers |
– Steps Tata Communications Takes to Protect Customers |
– Identifying Number Ranges that are a Fraud Risk |
– Final Advice to Carriers |
D. iBasis Automates Wholesaler Protection of Retail Carriers |
– Telecom Price Competition puts the Emphasis on Fraud Protection |
– iBasis Protects Large and Small Providers |
– Blocking Fraud, but Keeping Retail Customer in Control |
– Two Forms of Controlling Fraud Disconnects |
– Benefits of Wholesaler Fraud Blocking |
– iBasis's Sophisticated Fraud Capability |
E. Fraud Management Collaboration: Real Intelligence Sharing |
– Cross-Operator Software & Processes |
– The BICS FraudGuard Protection Program |
– How Operators Help Each Other Through FraudGuard |
– The Global Fraud Intelligence of a Large Transit Carrier |
– Small Operators are Often Vulnerable to Fraud |
– Roll out of FraudGuard |
– FraudGuard is Also Valuable for Fraud-Mature Operators |
F. The Retail Operator Case for Anti-Fraud Protection from Wholesalers |
– Being Protective of Your OpCos and Partners |
– The Lack of Fraud Resources at Small Operators |
– Wholesalers Need to Take on the Responsibility |
– Problems When a Nation's Number Ranges are Blocked |
– Whoilesaler Deep Commitment to Retailers is Central |
– Consulting with Operators about Fraud |
– Why Retail Operators Should be Firm with Wholesalers |
Chapter 11. VoIP and Cloud Provider Fraud Control (19 pages) |
|
A. Cloud Player Evolve IP: Layered Defense to Control Fraud |
– Telecom/IP Player's View of Fraud Control |
– The Unique Evolve-IP Business Model |
– The Strategy: Cloud Play for Enterprises |
– A Layered Defense: Multiple Fraud Solutions |
– Fraud Alerting Before Call Closes |
– Fraud Management Staffing |
– The Network Engineering Operation |
– Customers Served & Market Positioning |
– Gravitating to Clients Who Require Customization |
– Mobile Integration |
– Fraud and Security Crossover |
– Provider Network's PBX is More Protected |
– Analyzing SIP-based Registrations |
– A Layered Strategy Works |
B. Telinta Hosted Softswitch: Affordable Entry for Comms Entrepreneurs |
– Hosting Telecom Businesses in the Cloud |
– VoIP Providers Selling the Full Range of Services |
– Hosted PBX Services for VoIP Providers |
– Telinta's Telicore Hosted Telecom Cloud Platform |
– Virtual Office Services for Telecom Entrepreneurs |
– Mobile Extensions to the Hosted PBX |
– A Telco Business for a Few Hundred Dolllars a Month |
– Entrepreneur Firm is Trained to Configure its Services |
– Partners Needed for Everything Outside Switching & Billing |
C. Blocking IRSF Fraud at the SIP Session Border Controller |
– Overview of the US VoIP Provider Market |
– TransNexus and its Ooma Customer |
– A $166,000 IRSF Charge to a Small Architecture Firm |
– How TransNexus Got in the Business |
– The Problem with CDR Analysis in Fraud Detection |
– The Virtues of Fraud Blocking via SIP-Signaling |
– TransNexus Manages its own IRSF Blacklist |
Chapter 12. Business & Revenue Assurance (46 pages) |
|
A. Subex Juggles a Variety of Business Assurance and Big Data Analytics Use Cases |
– The Variety of Business Assurance Cases |
– Subex Opportunities on the Horizon |
– The Shift from RA to Business Assurance |
– 1. Security for IoT |
– 2. Optimizing the Use of Network Assets |
– 3. Big Data Analytics & AI Use Cases |
– 4. Massive Multiplayer Online Gaming Assurance |
– 5. Assuring the Rapid Onboarding of Mobile Subscribers |
– 6. AI-Powered Customer Credits & Complaint Analysis |
– A Framework for Machine Learning |
B. TELUS Analytics Team Telemetry Delivers Internal Business Assurance Campaigns |
– Internal Team of Data Analytics Experts for Hire |
– Mission of the Telus Telemetry Team |
– What Telemetry Does to Benefit Internal Users |
– Why Telus Chose the WeDo RAID Platform |
– Engaging with Various Departments at Telus |
– Driving Predictive Analytics Campaigns for Users |
– The Evangelical Role of Telemetry's CMO |
– Telemetry's Growth Plans |
C. Dynamic Reference Data: Symmetry Helps O2 UK with Data Governance & Master Data Management |
– The Challenge of Synchronizing Legacy Platforms |
– Symmetry's Proven MDM Platform at O2 UK |
– The Scope of Reference Data Work at O2 UK |
– Reference Data and Enterprise Contracts |
– The Variety of Reference Data Use Cases |
– How a Reference Data Systems is Built for a Telco |
– Reference Data Uses in RA, Fraud & Risk |
– The Value of Reference Data |
– Turning Complex Processes into Managed Services |
– Cloud Based MDM Attractive to Group Operators |
– A Recipe for Managing Business Speed |
D. From Byzantine Software Contracts to Simple & Flexible RA Managed Services |
– Why Traditional B2B Software Delivery is Byzantine |
– The Value of a Mnaaged Service in RA/Billing Verification |
– A Managed Service vs. Internal Purchased Software |
– Is Operating Test Call Robots a Core Mission of RA? |
– Managing Full Billing Verification Campaigns |
– Contract Flexibility in Revenue Assurance |
– Six Factors to Look for in an RA Managed Service Provider |
E. Telecoms Failing CAPEX: The Need for Asset Management & Financial Visibility |
– CAPEX Spending Often Out of Control |
– Why Network Assets Must be Tracked Through Full Life Cycle |
– How Subex Solution Manages Network Assetrs |
F. Network Asset Choreography: Subex's Discovery & Life Cycle Management |
– Massive Intelligence Required to Manage Network Assets |
– Issues around Decommissioning Network Assets |
– Choreographing Network Equipment |
– Coordinating Network Assets & Warehouse Inventory |
– The Role of ROC Data Integrity Management |
– Insights & Predictions for Network Capital Strategies |
– Analytics Drives Optimal Asset Use & Capital Avoidance |
Chapter 13. Machine Learning & Exponential Technologies (35 pages) |
|
A. Mobileum Attracts Operators to its IRSF-Analyzing & Opex-Saving Machine |
B. Deep Fraud Investigations: Mavenir and the Role of Machine Learning in IRSF Control |
– Mavenir, the un-NEP Telecom Software Provider |
– Native Integration of Fraud and Security |
– Why Native Network Integration Has Value |
– The Difference between Rules and Machine Learning |
– Analyzing Roaming Records for NRTRDE Advantage |
– Finding Active Roaming Customers who are Fake |
– Why Behavioral Analysis has Power in Fraud |
– Network Element Monitoring for Security |
– Verifying Identity in 5G and IoT |
C. MTN Agility: Mastering Exponential Technologies in Revenue/Fraud Assurance and Beyond |
– Waht Computers Won't Do |
– Backgrounds of MTN Experts |
– MTN Group's Broad Business in Africa and ME |
– Key Challenges in Fraud and RA |
– Maturity Gains and Success in Assurance Ops |
– MTN on Monetizing the Benefits of RAFM |
– Organizing the Innovation Team |
– Bringing In Exponential Technologies |
– Redesigning Ways of Doing Risk/Assurance |
– Making All OPCOs Agile with Co-Design |
– Fast Prototyping Examples at MTN |
– The People Motivating Side of Innovation |
– Assessment of RAFM Solution Vendors |
– A Shift Targeted Platforms & Business Assurance |
– Will Big Digital Vendors Enter the Telecom Solution Biz? |
– The Strategy Moving Forward at MTN |
D. False Answer Supervision Solution by IPsoft |
– The History of Arbinet and IPSoft's Business |
– What is False Answer Supervision (FAS)? |
– Statistical Analysis is Required to Detect FAS |
– Tight Margins on Voice Traffic Raise the Importance of FAS |
– The IPSoft FAS Detection Process |
– Statistical Analysis Requires Data Scientists |
Chapter 14. Assurance & Fraud Control Best Practices (43 pages) |
|
A. How to Instill a Strong Telecom Risk & Anti-Fraud Culture |
– The Vital Role of Industry Consultants |
– The Challenges of the African Market |
– Financial Infrastructure on the African Continent |
– Educating Consumers on Mobile Device Security |
– Educating Telcos about Fraud/Risk Education |
– The Revenue Assurance and Marketing Partnership |
– Risk Reward Awards Recognizes Achievers |
– Perspectives on the Value of Industry Forums |
B. Nine Simple Strategies to Protect an Operator or MVNO from Telecom Fraud |
– Jim Bolzenius, Former Verizon Fraud Director |
– International and Domestic Fraud Methods |
– Subscription Fraud & Identity Issues |
– 1. Make Timely Detection & Blocking your Key Goal |
– 2. Use Social Network Analysis to Multiply Your Blocking Capability |
– 3. Don’t Make PBX Hacking Easy for the Fraudster |
– 4. Educate Customers & Call Center Reps about Social Engineering Schemes |
– 5. Implement Processes to Limit the Wangiri Fraud |
– 6. Control or Turn Off Dangerous Calling Features & Destinations |
– 7. Monitor and Test your International Roaming Rules |
– 8. Don’t Let Your Guard Down over the Holidays |
– 9. Recognize that a Fraud Management System Alone is Not Enough |
C. Telecoms Need to Improve Subscription Fraud and Customer Onboarding Control |
– Acquiring Customers at Low Cost & Minimum Risk |
– A Robust Onboarding Process for Mobile Subs |
– Mobile Phone Activity: a Great Risk Mitigating Tool |
– Demand for Money Laundering Controls |
– Managing Risks in Smaller Slices |
– Steps in a Successful Customer Engagement |
– Fraud vs. Revenue Assurance Data Management |
– Solving Integration Complexity Issues |
– The Vital Need to "Know Thy Customer" |
D. Applying Steve Jobs' Leadership Tenets to Telecoms and Business Assurance |
– Ed Shanahan RA Consultant |
– Simplicity, Organization Focus & Patience |
– Telecom as a Horizontal Business Flow |
– Maintaining Business Simplicity |
– Careful Hiring and Attention to Compensation |
– Alignment of Compensation with Company Goals |
– Compensation of Sales People |
– Getting Sponsors for Business Assurance Goals |
– How Would a Steve Jobs Run a Telecom? |
E. Make Business Assurance Progress Every Day: Set Goals, Automate, and Energize Your Team |
– Executives: a Driving Force in Assurance Excellence |
– Managing Payment Processes |
– Enabling Customers to Pay Any Way they Like |
– Keeping the Customer Informed |
– Reconcilation of Payments is Similar to RA |
– Energizing Staff to Grow and Make Things Better |
– A Healthy Skepticism over Full Automation |
– Putting Yourself in the Shoes of the Customer |
F. A Herculean Task: Battling Fraud in a Complex Comms World |
– Michalis Mavis, Former Head of Fraud Control at OTE, Greece |
– Fraud Losses Big During Year of Olympic Games |
– Brief History of Large Fraud Losses |
– Case of the Criminal Ring on the Island of Crete |
– Interconnect Fraud |
– Perspective on FMS Tools |
– Fraud Challenges Going Forward |
– Four Key Initiatives in Fraud Control |
Chapter 15. Mobile Monetization (38 pages) |
|
A. SIGOS's Purpose-Built Analytics Platform: Mobile Money, SIM Box Fraud, and More |
– Digital Business Market Change & Competition |
– The SIGOS Purpose-Built Approach to Telecom Analytics |
– Example of CDR Handling in Nigeria |
– Big Data without Querying a Database |
– The Privacy Problem with Cloud Solutions |
– Dedicated Use Cases Supported by SIGOS |
– Three Differentiators in SIM Box Bypass Solutions |
– Success in Ridding a Country of SIM Box Bypass |
– The Mobile Money Opportunity in Developing World |
– A Soup-to-Nuts Mobile Money Solution |
– The Goal of Being the Performance Leader |
B. Mavenir & Syniverse Platform for RCS Business Messaging |
– The Race to Deliver RCS Business Messaging |
– The Future is P2A Messaging |
– Mavenir's Messaging-as-a-Platform |
– Syniverse's Role in Securing the RCS Business |
– The Mavenir and Syniverse Partnership |
– Capex or Revenue Share Model for Operators |
– RBM Solves the Dumb Pipe Problem |
C. HGC Taking its Digital/Carrier Expertise to Asia's Emerging Markets |
– The Financial Success of Digital Companies |
– About the HGC Business |
– HGC's Value Proposition as a Telecom Firm |
– A Local & International Firm |
– The Economic & Digital Maturity of Asian Nations |
– Asia Adapts to Digital LIfe Very Quickly |
– Opportunities in Telecom Service Mix |
– The Role of Chief Digital Officer |
– Managing the Tough Projects is an Opportunity |
D. A Big Win/Win: Protecting Mobile Users While Boosting Revenue |
– Real-Time Cloud Services in Mobile |
– Allot's In-Line Malware Blocking and Web Protection for Consumers & SMBs |
– Details & Benefits of a Proven Cloud Security Service |
– The Business Challenge of Mobile |
E. Mavenir Merchandizes Data Rewards: A Clever Program that Creates Value for Brands, Users, and MNOs |
– Delivering Merchandizing Shrewdness in the Mobile World |
– A Brief History and Project Growth in Mobile Advertising |
– Creating a Win for Users, Brands, and Carriers |
– Rewards Programs Were Pioneered in the Gaming Industry |
– How a Data Rewards Campaign is Run |
– Engaging with Brands via Zero-Rating vs. Data Rewards |
– Coca Cola’s Branding Campaign using Data Rewards |
– A Campaign for Mondelez’s Candy Brand “5star” in Brazil |
– Exxon Mobil in Mexico – A Direct Response Survey |
Chapter 16. Free-Wheeling Discussions with Consultants Colin Yates & Luke Taylor (18 pages) |
|
A. Strategic Discussion with Consultant Colin Yates |
– Rules Based vs. Machine Learning IRSF Protection |
– IPRN Provider and IRSF Trends |
– IPRN Numbers & Arbitrage via “Unlimited” Calling Plans |
– How IPRN Provider Arbitrage Works with a Human Caller in Morocco |
– How to Control Arbitrage via “Unlimited” & Roam Like Home Packages |
– The Special Case of Protecting MVNOs |
– The Role of Fraud Analyst as the Machine Learning Age Dawns |
– Managing Fraud at Group Operators |
B. Strategic Discussion with Consultant Luke Taylor |
– AI/Machine Learning vs. Human Analysis |
– The Move Away from Big Bang Assurance and Analytics Solutions |
– Generic Assurance Platforms vs. Solving the Customer’s Key Issue |
– The Purpose-Built Platform and Working Across Silos |
– Why Telecom Needs Chief Data Officers |
– The Rising Importance of Data Governance & MDM |
– What Operating Agility Means in Today’s Competitive Telco World |
– The Power of a Modular Assurance & Analytics Platform |
– The Premium on Multi-Talented Business People and Experienced Teams |
Chapter 17. Market Analysis & Forecasts (22 pages) |
|
A. Research Objectives & Methodology |
– Research Scope, Contents & Expert Contributors |
– Research Methodology |
– Method of Forecasting and Estimating Market Size |
B. Big Picture Analysis and Overall Forecast |
– State of the BA/FM Profession & Solutions Market |
C. The Fraud Control Profession and Market |
– Telecom Fraud Management Solutions Market by Fraud Type |
– A Frequent Executive Blind Spot: Fraud is a Wind that Always Blows |
– The Fraud Solutions Market: Vendor Market Share |
D. Revenue Share Fraud |
– Defining Revenue Share Fraud |
– The Four Primary Solution Types Tackling the Fraud Today |
– CDR- and Usage Profile-based Solutions |
– Hybrid Revenue Share Solutions: CDRs and SIP |
– Machine Learning Solutions |
– Enterprise PBX Protection Resale |
– The Roaming/Global Network Connection |
E. Other Fraud Types |
– SIM Box Bypass Fraud |
– “Roam Like at Home” Services Open Up Voice & SMS Fraud |
– Battling Data Theft and the Insider Threat |
– The Importance of Law Enforcement to the Fraud Fight |
– Analyzing Digital Behaviors Key to Identity & Subscription |
– Reassessment for VIBER Mobile Bypass |
F. Business, Revenue, & Partner Assurance |
– The Rising Opportunities in Business Assurance & Analytics |
– The Business Assurance Market: Vendor Market Share |
G. Business Assurance Developments and Solutions |
– The Modular All-Purpose Platform |
– Customized Business Assurance Solutions |
– Large Carrier Efforts to Exponential Tech Inside |
– IoT Management of Device Identity and Use Case Profiles |
– High Performance Network-Resident System & Managed Services |
– Dynamic Reference Data Management |
H. Mobile Monetization and Mobile-to-Brand |
Chapter 18. Vendor Profiles (28 pages) |
|
– Arraxe |
– LATRO Services |
– Oculeus |
NOTE: More vendor profiles will be emailed to Report buyers as vendors purchase the Report and TRI completes their profiles. |