Fraud Management and - PowerPoint PPT Presentation

1 / 81
About This Presentation
Title:

Fraud Management and

Description:

Fraud Management and Operations Training SAMPLE ONLY Day 1: Executive Vision of a Fraud Prevention Unit Mission/Vision of the Fraud Department Threats ... – PowerPoint PPT presentation

Number of Views:1047
Avg rating:3.0/5.0
Slides: 82
Provided by: Cli469
Category:

less

Transcript and Presenter's Notes

Title: Fraud Management and


1
Fraud Management and Operations Training
SAMPLE ONLY
2
Topics Discussed
  • Day 1
  • Executive Vision of a Fraud Prevention Unit
  • Mission/Vision of the Fraud Department
  • Threats, vulnerabilities, exploits, and schemes
  • Fraud Management Responsibilities
  • Key responsibilities prevention detection
    analysis reaction measurement, and executive
    reporting
  • Facilitating cooperation from other departments
  • Facilitating cooperation from other companies

SAMPLE ONLY
3
Topics Discussed
  • Day 2
  • Fraud Management Structure
  • Fraud Control Department Where on the Company
    Org Chart does it belong?
  • Fraud Analysis Group Structure and objectives
    of both Basic and Advanced Fraud Analysis group
    (working by product type, fraud type or access
    type)
  • Fraud IT Group Advantages and Objectives of a
    dedicated IT group just for Fraud Control.
  • Fraud Engineering Group Using dedicated network
    engineers to help detect and control frauds
    including Ghosting Fraud.
  • Fraud Legal Group Ensuring legal and regulatory
    compliance, helping establish and enforce
    inter-carrier SLAs, and serving as interface for
    law enforcement issues.

SAMPLE ONLY
4
Topics Discussed
  • Day 3
  • Fraud Management Internal Processes
  • Detection An exploration of Information Sources
    that can used to detect fraud such as FraudView,
    CRM, Collections, and other internal and external
    sources.
  • Analysis An in-depth discussion on different
    types of Analyses used to detect fraud along with
    their individual advantages.
  • Reaction A lesson in the different options on
    how to react to fraud.
  • Prevention A discussion in the importance of
    Prevention as part of the Fraud Control Internal
    Processes.
  • Measurement A very detailed discussion on how to
    measure both fraud losses and losses prevented,
    and how to measure efficiency of the FMS, the
    analysts, and the department.

SAMPLE ONLY
5
Topics Discussed
  • Day 4
  • Fraud Management External Processes
  • A discussion on how the Fraud Control department
    should interface with other Telecom departments
    such as Marketing, Collections, Credit,
    Engineering and Operations, IT, Physical
    Security, and Finance.
  • Fraud Risk Assessments (Products Services)
  • An in-depth discussion on how to perform a Fraud
    Risk Assessment for an existing or a new product.

SAMPLE ONLY
6
  • Day 1
  • Executive Vision of a Fraud Prevention Unit
  • Mission/Vision of the Fraud Department
  • Threats, vulnerabilities, exploits, and schemes

SAMPLE ONLY
7
Mission of a Fraud Control Department
From Executive Point of View To Minimize Losses
in Revenue from Products and Services Due to
Fraud When Desired.
Why Minimize Losses?
Question Is it not possible to STOP ALL FRAUD
and LOSSES from Fraud? Answer It is no more
possible to stop ALL FRAUD than it is possible
for a Politician or a Police Chief to stop ALL
THEFT in a city. There will ALWAYS be Fraud! And
therefore, there will ALWAYS be Fraud Losses. The
best any person can do is MINIMIZE the losses.
SAMPLE ONLY
8
Mission of a Fraud Control Department
From Executive Point of View To Minimize Losses
in Revenue from Products and Services Due to
Fraud When Desired.
Why Revenue from Products and Services?
Question Why not include Financial Fraud or
other types of Fraud as well? Answer
Generally, the department(s) that audits
employees actions and insures that there is no
Internal Financial Fraud such as Embezzelment,
Theft, and Robbery are separate from the Fraud
department that oversees Fraud associated with
the Products and Services.
SAMPLE ONLY
9
Mission of a Fraud Control Department
From Executive Point of View To Minimize Losses
in Revenue from Products and Services Due to
Fraud When Desired.
Why Due to Fraud?
Question Why not include losses from other
problems such as programming errors, faulty
processes, incomplete customer data, network
outages, etc? Answer It is important to have a
department dedicated to fraud primarily because
of the focus on the customer. Losses due to these
other factors are most often handled better by a
Revenue Assurance department. (more on this later)
SAMPLE ONLY
10
Mission of a Fraud Control Department
From Executive Point of View To Minimize Losses
in Revenue from Products and Services Due to
Fraud When Desired.
Why When Desired?
Question Are there times when it would NOT be
desirable to minimize losses due to
fraud? Answer Yes. Here are some examples
  • In order to Preserve Customer Satisfaction
  • In order to Preserve Customer Satisfaction
  • In order to Improve the Company Revenue
    Statistics
  • In order to Give Priority to Other Higher
    Priority Losses

SAMPLE ONLY
11
Mission of a Fraud Control Department
From Executive Point of View To Minimize Losses
in Revenue from Products and Services Due to
Fraud When Desired.
Why When Desired?
  • In order to Preserve Customer Satisfaction

In order to Prevent and Detect Fraud, processes
must be put in place that will inherently...
  • Difficult the subscription process for the
    customer.
  • Bother him during the usage of the products and
    services.

Example Validation process. Most all customers
detest having their identity questioned.
Therefore, it is important to balance Customer
Satisfaction with Fraud Control. (This will be
discussed at greater length later in the course)
SAMPLE ONLY
12
Mission of a Fraud Control Department
From Executive Point of View To Minimize Losses
in Revenue from Products and Services Due to
Fraud When Desired.
Why When Desired?
Question Are there times when it would NOT be
desirable to minimize losses due to
fraud? Answer Yes. Here are some examples
  • In order to Improve the Company Revenue Statistics
  • In order to Preserve Customer Satisfaction
  • In order to Improve the Company Revenue
    Statistics
  • In order to Give Priority to Other Higher
    Priority Losses

SAMPLE ONLY
13
Mission of a Fraud Control Department
From Executive Point of View To Minimize Losses
in Revenue from Products and Services Due to
Fraud When Desired.
Why When Desired?
  • In order to Improve the Company Revenue Statistics

By reducing Fraud Controls, it is possible to
  • Grow the customer base more quickly.
  • Artificially grow the revenue numbers.

Examples Increase Share-holder confidence or
perhaps to Prepare for the Sale of the Company.
Fraud CONTROL means to be able to reduce or
increase the indicidence of fraud to serve the
purposes of the company. However, please note
that allowing fraud to increase by not monitoring
it is NOT considered Fraud CONTROL!
This would be Fraud OUT OF CONTROL!
SAMPLE ONLY
14
Mission of a Fraud Control Department
From Executive Point of View To Minimize Losses
in Revenue from Products and Services Due to
Fraud When Desired.
Why When Desired?
Question Are there times when it would NOT be
desirable to minimize losses due to
fraud? Answer Yes. Here are some examples
  • In order to Give Priority to Other Higher
    Priority Losses
  • In order to Preserve Customer Satisfaction
  • In order to Improve the Company Revenue
    Statistics
  • In order to Give Priority to Other Higher
    Priority Losses

SAMPLE ONLY
15
Mission of a Fraud Control Department
From Executive Point of View To Minimize Losses
in Revenue from Products and Services Due to
Fraud When Desired.
Why When Desired?
  • In order to Give Priority to Other Higher
    Priority Losses

In some countries, a Telecom company may not be
able or allowed by regulation to implement
certain Fraud Controls such as
  • Credit Checks.
  • Sharing of information on Fraudsters between
    companies
  • Blocking Completion of Calls

Going against Telecom Regulations can incur large
fines that could outweigh the losses due to the
fraud. In these cases, it makes financial sense
to not implement the controls.
SAMPLE ONLY
16
Mission of a Fraud Control Department
From Executive Point of View To Minimize Losses
in Revenue from Products and Services Due to
Fraud When Desired.
Question If we cannot prevent or stop ALL fraud,
what then is an acceptable amount of fraud for
a Telecom to have? Answer An acceptable
amount of fraud losses are those that are less
than or equal to the cost of controlling them.
The costs involved in controlling fraud are
real monies spent on an FMS, validation
processes, etc. But those costs also include the
cost (or loss) of good customer churn due to
excessive validations or lack of subscriptions
because of the excessive amount of documentation
required at subscription time. These negative
factors resulting from Fraud Control must be put
in the balance as well.
SAMPLE ONLY
17
  • Day 2
  • Fraud Management Structure
  • Fraud Control Department Where on the Company
    Org Chart does it belong?
  • Fraud Control Department Structure Structure
    and objectives of each of the subgroups of a
    Fraud Control Department.

SAMPLE ONLY
18
Fraud Control Department Structure
Finance Directory
Revenue Assurance
Fraud Control Manager
Fraud Analysis Group
Fraud Support Group
Level 1 Fraud Analysis Group
Level 2 Fraud Analysis Group
Fraud IT Group
Fraud Engineering Group
Fraud Legal Group
Prevent Fraud
Detect Fraud
Analyze Fraud
React to Fraud
Measure Fraud
Report to Executives
Fraud Control Manager Assumes all
Responsibilities!
SAMPLE ONLY
19
Fraud Control Department Structure
Finance Directory
Revenue Assurance
Fraud Control Manager
Fraud Analysis Group
Fraud Support Group
Level 1 Fraud Analysis Group
Level 2 Fraud Analysis Group
Fraud IT Group
Fraud Engineering Group
Fraud Legal Group
Prevent Fraud
Detect Fraud
Analyze Fraud
React to Fraud
Measure Fraud
Report to Executives
  • Level 2 Fraud Analysis Group Responsibilities
    (continued)
  • More Datamining and Trend Analysis used for
  • Configuring the FMS and other systems to Detect
    frauds earlier
  • Detecting frauds not caught by fraud group found
    in the Bad Debt
  • Working with Marketing to determine the best
    Fraud Prevention Procedures
  • Determining the best way to React to Frauds

SAMPLE ONLY
20
Fraud Control Department Structure
Level 2 Fraud Analysis Group
Discussion on Model Internal Structures of Level
2 Fraud Analysis Group
  • There are 3 basic Models that can be used for the
    internal structure of the Level 2 Fraud Analysis
    Group
  • Product Type Focus each individual member of
    the group is responsible for the fraud related to
    a product type.
  • Fraud Type Focus each individual member of the
    group is responsibile for a type of fraud
    independent of the product type.
  • Network Access Type Focus each individual
    member of the group is responsible for all fraud
    resulting from a network access type.

SAMPLE ONLY
21
Fraud Control Department Structure
Level 2 Fraud Analysis Group
Discussion on Model Internal Structures of Level
2 Fraud Analysis Group
Product Type Focus (example)
  • Advantages
  • Marketing Product Manager deals with only ONE
    representative from Fraud Control Department.
  • Makes for easier implementation of prevention
    processes when the vulnerability is a Process
    Vulnerability because Marketing is actively
    involved.
  • Makes it easy for product profitability
    evaluations. The fraud analyst has the fraud data
    specifically for the product.
  • Disadvantages
  • More difficult when implementing preventive
    measures against technical vulnerabilities.
    Network Engineering and Ops have to deal with
    multiple fraud analysts.
  • Requires product identification at time of fraud
    detection, which can be difficult at times.

Analyst B
Analyst A
Responsible for all Corp Long Distance Fraud
Responsible for all Prepaid Card Fraud
Analyst C
Analyst D
Responsible for all Local Access Fraud
Responsible for all Internet Product Fraud
SAMPLE ONLY
22
Fraud Control Department Structure
Level 2 Fraud Analysis Group
Discussion on Model Internal Structures of Level
2 Fraud Analysis Group
Fraud Type Focus (example)
  • Advantages
  • Easier for Analyst to become an expert in a fraud
    type than a product type.
  • Allows for an analyst to dig deeper into the
    vulnerabilities and the exploits thus creating
    better prevention and reaction processes.
  • Disadvantages
  • Each new fraud type discovered requires a new
    analyst. Therefore growth of department is
    controlled by fraudsters.
  • Marketing Product Manager must deal with several
    fraud analysts depending on the number of fraud
    vulnerabilities that exist for the product.

Analyst B
Analyst A
Responsible for all PABX Fraud
Responsible for all Subscription Fraud
Analyst C
Analyst D
Responsible for all Internet Hacking Fraud
Responsible for all Clip-on Fraud
SAMPLE ONLY
23
Fraud Control Department Structure
Level 2 Fraud Analysis Group
Discussion on Model Internal Structures of Level
2 Fraud Analysis Group
Network Access Type Focus (example)
  • Advantages
  • For vulnerabilities that are technical in nature,
    it is easier to deal with Network Engineering and
    Operations people because each Network Access
    type only has one Fraud Analyst responsible.
  • Easier for Analyst to become an expert in a
    Network Access type than a product type.
  • Allows for an analyst to dig deeper into the
    technical vulnerabilities and the exploits thus
    creating better prevention and reaction
    processes.
  • Disadvantages
  • Each new Network Access type created requires a
    new analyst.
  • Marketing Product Manager must deal with several
    fraud analysts depending on the number of
    different accesses a product may have.

Analyst B
Analyst A
Responsible for all PABX Fraud
Responsible for all 8xx TollFree Access Fraud
Analyst C
Analyst D
Responsible for all Public Telephone Access Fraud
Responsible for all Internet Access Fraud
SAMPLE ONLY
24
Fraud Control Department Structure
Level 2 Fraud Analysis Group
Discussion on Model Internal Structures of Level
2 Fraud Analysis Group
NOTE Fraud in Bad Debt Analysis could be divided
up among the individual fraud analysts however,
this can lead to a conflict of interest. The
fraud analyst is responsible for early detection
of all fraud for his focus (Product, Fraud Type,
or Network Access). But having him report on
fraud not found through early detection is like
allowing the fox to guard the chickens. An
Alternative Approach YING-YANG APPROACH...
SAMPLE ONLY
25
Fraud Control Department Structure
Level 2 Fraud Analysis Group
Discussion on Model Internal Structures of Level
2 Fraud Analysis Group
YING-YANG APPROACH...
Analyst A
Analyst B
This analysts performance is measured by the
amount of fraud detected in the bad debt that the
other analysts missed.
Analyst E
Each analysts performance is measured by the
overall decrrease in fraud for their area of
responsibility.
Analyst C
Analyst D
SAMPLE ONLY
26
  • Day 3
  • Fraud Management Internal Processes
  • Detection An exploration of Information Sources
    that can used to detect fraud.
  • Analysis An in-depth discussion on different
    types of Analyses used to detect fraud along with
    their individual advantages.
  • Reaction A lesson in the different options on
    how to react to fraud.
  • Prevention A discussion in the importance of
    Prevention as part of the Fraud Control Internal
    Processes.
  • Measurement A very detailed discussion on how to
    measure both fraud losses and losses prevented,
    and how to measure efficiency of the FMS, the
    analysts, and the department.

SAMPLE ONLY
27
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Detection Datasources
Generally, fraudsters do their best to hide the
fraud they are committing. By hiding it, they can
prolong the fraud and they can protect themselves
from the legal consequences. If the Telecom
operator only looks for the fraud in the obvious
places, the fraudster will hide in the
not-so-obvious places. The secret of keeping
ahead of the fraud is to make available as many
sources of relevant data as possible to the
analysts and search it all looking for
inconsistencies. In the case, where the data is
so great and the resources for performing the
investigations is small, then the data needs to
be prioritized to the likelihood of actually
finding fraud.
SAMPLE ONLY
28
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Detection Datasources
  • Here is a listing of some datasources in a
    general order of priority
  • FraudView System (FMS)
  • HLR System
  • CRM System
  • Collections System Bad Debt
  • Revenue Assurance System
  • Billing System
  • Network Management System
  • Inter-Company Fraud Reports
  • Fraud Association Reports (CFCA, FIINA, TUFFS,
    etc.)
  • Anti-Fraud Hotlines
  • Marketing Trending Systems

SAMPLE ONLY
29
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Detection Datasources
Using FraudView FMS as a Primary Source
  • Unlike all the other Telecom corporate systems in
    use, FraudView FMS is a system built specifically
    to detect fraud.
  • The many different engines it has were all
    developed to look for fraud in each in a
    different way.
  • Whenever possible, it is best to let the FMS
    perform the detection work feeding it data from
    as many relevant sources as possible. This is
    because of
  • The combination of data items from different
    sources can be a stronger indicator of fraud than
    any item alone.
  • The other systems were not designed for fraud
    detection and using them for detection can have
    negative impacts.
  • Prior to feeding more data to FraudView it will
    be important to perform an impact study to
    determine the performance impact the data will
    have.

SAMPLE ONLY
30
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Detection Datasources
FraudView FMS
FraudView Case Manager
FraudView Engines
Probe CDRs
Data Consolidation
Rule- Based Engine
Alerts
The more sand that you put in your sandbox, the
more bugs you will find hiding in the sand.
Case 1
Switch CDRs
Case 2
Profiler
HLR Data
CRM Data
Sub Fraud Package
Case 3
FraudView Interface Manager
FraudView Data Management
Collections Data
Rev Assurance Data
Other Engine
SAMPLE ONLY
Case n
Other Data
31
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Detection Datasources
Using of EXTERNAL Datasources
Examples of Fraud Forums
http//www.fraud.org/
http//www.cfca.org/
http//www.trmanet.org/
http//www.atis.org/tfpc/
http//www.tuff.co.uk/
SAMPLE ONLY
http//www.fiina.org/
http//www.gsmworld.com
http//www.travel-net.com/andrews/cinaa/findex.ht
ml
32
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Detection Datasources
Using of EXTERNAL Datasources
  • Using Fraud Hotlines as a Source of Data
  • One option to help detect fraud is through the
    use of a Fraud Hotline. There should be at least
    one for company employees and another for outside
    customers.
  • A hotline for outside customers will most often
    have a high percentage of false positives or will
    be used as a way to complain instead of reporting
    fraud. To solve this problem, an Fraud Forum can
    be used as an intermediary. For example, ATT
    uses the National Fraud Information Center
    (www.fraud.org) as a fraud hotline.
  • A hotline for internal employees should be
    communicated internally and made visible and
    available to all employees. The number of false
    positives from an internal hotline are much less.

SAMPLE ONLY
33
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools and Options
Speed of Case Analysis
One of the primary goals of the Fraud Control
Manager is to provide the means for his analysts
to do their case analyses as accurately as
possible and as quick as possible. To help
reach this goal, the fraud manager should try to
automate as much of the analysis as possible via
rules and thresholds. As much of this should be
performed within the FMS (FraudView) as was
discussed before. If there are datasources that
cannot be integrated with the FMS (FraudView)
then an easy to use and fast interface should be
created for quick access to those other
datasources in order to speed up the analysis
process as much as possible.
SAMPLE ONLY
34
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools and Options
Types of Analyses
  • In-depth Case Analysis
  • CDR (Event) Analysis analyze information in the
    CDRs
  • Client Data Analysis analyze the HLR or Billing
    Data
  • Profile/Behavioural Analysis analyze the
    profile or changes in the profile
  • Visualization Tool Analysis
  • Link Analysis find Friends of the Fraudster
  • Pattern Analysis find patterns that are
    indicative of fraud
  • Fraud Scheme Analysis Determine the Fraud
    Threat, the Scheme Used, and the Vulnerability
    Exploited.
  • Historical Analysis
  • Past Payment Analysis payment behaviors can
    indicate fraud or NOT fraud.
  • Past Calling Behavior Analysis past calling
    behavior helps confirm fraud and helps determine
    type of fraud.

SAMPLE ONLY
35
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools and Options
Types of Analyses (continued)
  • Analysis through Interaction with Client
  • Batch Analysis and Scoring
  • Automated Analyses via Datamining Engines
  • Trend Analysis

SAMPLE ONLY
36
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools and Options
In-depth Case Analysis
  • CDR (Event) Analysis
  • CDRs (or Event Records) should be a primary
    source for Fraud Analysis. The following types of
    analyses can be performed with CDRs (or Event
    Records)
  • Type of Calls (or Events)
  • What are the types of calls made? (eg. Local,
    Cellular to Fixed Line, Long Distance, SMS
    messaging, Internet usage, Purchases, etc.)
  • Are these types typical for this type of
    customer?
  • Destinations Called
  • What are the destinations called?
  • Are the destinations the same as other fraud
    cases?
  • Are the destinations called typical for this type
    of customer?
  • Call Durations
  • What are the durations of the calls?
  • Are these durations typical for this type of
    customer?

SAMPLE ONLY
37
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools and Options
In-depth Case Analysis
  • CDR (Event) Analysis (continued)
  • Time of Day of Calls
  • What are the times of the calls?
  • Are these times typical for this type of
    customer?
  • Call Overlap
  • Does there exist any overlap in the calls?
  • Is overlap typical for this type of customer?
  • Call Frequency
  • What is the frequency of the calls?
  • Is the frequency typical for this type of
    customer?
  • Velocity Check
  • In the case of cellular calls or other cellular
    events, was there any violation of velocity?

SAMPLE ONLY
38
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools and Options
In-depth Case Analysis
  • 2. Client Data Analysis
  • The HLR, Billing System, or CRM is often the
    source of all Client Registry. Part of the fraud
    analysis should include an indepth analysis of
    the Client information such as
  • Client Name Analysis
  • Is the name typical or non-sensical? (eg. Mickey
    Mouse, John Wayne, etc.)
  • Does the name belong to a known fraudster? Or is
    it similar to a known fraudster?
  • Client Address Analysis
  • Is the address appear complete?
  • Does the address belong to a known fraudster? Or
    is it similar to an address of a known fraudster?
  • Does the amount of usage correspond to the
    address?
  • Client Type Analysis
  • Does the calling behavior coorespond to the type
    of client?

SAMPLE ONLY
39
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools and Options
In-depth Case Analysis
  • 2. Client Data Analysis (continued)
  • Products/Services Ordered Analysis
  • Are the combination of the products and services
    ordered commonly ordered by fraudsters?
  • Is the client using the products and services
    that were ordered?
  • Are there better product and service options for
    the client? (this can come in handy when talking
    with client on phone)
  • Multiple Line Analysis
  • Are the number of phone lines owned by customer
    typical of this type of customer?
  • Are they in the same location?
  • Are they in radically different locations?
  • Any known fraudulent locations or addresses?

SAMPLE ONLY
40
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools and Options
In-depth Case Analysis
  • 3. Profile/Behavioral Analysis
  • Fraud is often detected by identifying a known
    fraud profile or behavior as in the case of
    subscription fraud. Fraud is also detected by
    identifying a change in the profile or behavior
    as in the case of account take-over and clip-on.
    The following are profiles and behaviors that
    should be monitored
  • Ratio of Types of Calls - eg. Local vs DDD
    vs IDD vs Opr Assist, etc.
  • Roaming Behavior - where and how often is the
    phone in roaming?
  • Data Usage how often and how much is this
    service used?
  • Messaging Usage how many messages are received
    and sent on average? Any messages to PRS
    services?
  • Types of Online Purchases made risky purchases
    (eg. PRS) should be closely monitored.

Note with the FraudView FMS risky profiles can
be configured to be recognized. Also, FraudView
has the ability to automatically determine the
profile of a good customer by looking at the long
term behavior of that customer and then if there
are any short term changes in that behavior, this
will alarm.
SAMPLE ONLY
41
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools and Options
In-depth Case Analysis
  • 4. Visualization Tool Analysis
  • Professional fraud is often conducted by more
    than one person or telephone line. In fact many
    times it is committed by a very organized and
    well structed group. In such cases, it is
    possible to find other fraudsters in the same
    organization by the use of visualization tools.
    Examples of Visualization tools are I2
    (ChoicePoint), Visualinks (Visual Analytics),
    GTAD (ID Analytics), Crimelink (PCI),
    Intelligence Analyst (Memex), OrionMagic (SRA).
    Through the use of a visualization tool the
    following types of analysis can be performed
  • Link Analysis - Link Analysis allows an analyst
    quickly identify patterns in the links between
    one fraudster and another. For example,
    oftentimes two or more fraudsters will
    communicate with each other through the phones
    that they are frauding. With the help of Link
    Analysis, the other fraudsters in the same
    organization or calling the same destinations can
    easily be identified.
  • Pattern Analysis through the use of
    visualization tools, calling patterns can be
    visually detected. For example, if cellphone
    fraudsters always call a certain phone numbers at
    certain times or for certain reasons, the
    patterns of these calls will be visible. When
    patterns are thus detected, filters to detect
    those patterns in realtime can be created.

SAMPLE ONLY
Note FraudView FMS uses I2 software.
42
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools and Options
In-depth Case Analysis
  1. Visualization Tool Analysis

Eample of I2 screenshot of a PABX Intrusion
SAMPLE ONLY
Note FraudView FMS uses I2 software.
43
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools and Options
In-depth Case Analysis
  • 5. Fraud Scheme Analysis
  • A very important part of the fraud case analysis
    is determining who the fraudster is (the fraud
    threat), which fraud scheme he used, and which
    vulnerability was exploited. It is through this
    analysis, the fraud manager will be able to
    convince his executives of the prevention/detectio
    n/reaction options he feels he needs to implement
    to stop the fraud losses.
  • Not all fraud threats and fraud schemes can be
    accurately determined. However, vulnerabilities
    generally are easy to determine and must be
    determined for each fraud case that is analyzed.
  • Generally, filters that feed cases are fraud
    scheme specific, thus facilitating the fraud
    scheme determination.
  • Once the Fraud Threat, Fraud Scheme, and
    Vulnerability has been determined for each case,
    this needs to be recorded in the case database.
    By recording this information, we can do trend
    and fraud impact analysis on vulnerabilities,
    schemes, or even fraud threats. This is important
    when trying to justify a Prevention/Detection/Reac
    tion option.

SAMPLE ONLY
44
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools and Options
In-depth Case Analysis
Our Fraud Intl Call Sell Scheme
5. Fraud Scheme Analysis (example)
Fraudsters of Gang XYZ use Subscription Fraud to
obtain new phone lines that they will never pay
for. They will sell international usage of the
phone lines.
Filters
Schemes associated with Filters
Case created by alerts from filters
No ID Validation Performed
Professional Fraudster
False IDs Used
Hot Destination Filter
  • Intl Call Sell Scheme
  • Arbitragem Scheme
  • Call Back Scheme

Intl Call Sell Scheme!
  • PRS Scheme
  • Intl Call Sell Scheme
  • Arbitragem Scheme

Long Duration IDD Calls
Case 1
High Volume ResidentialIDD
  • PRS Scheme
  • Intl Call Sell Scheme

SAMPLE ONLY
45
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools and Options
In-depth Case Analysis
  • 6. Historical Analysis
  • Many times some of the best customers will have
    calling patterns and profiles very similar to
    fraudsters. To avoid blocking these good
    customers, the case analysis should include an
    Historical Analysis. There are two major items
    that should analyzed
  • Past Payments If payments of equal or
    approximate amount of usage were made by the
    customer in the past, then it is reasonable to
    conclude that the customer can afford to pay for
    current usage and will do so.
  • Past Calling Behavior or Usage Behavior
  • If the customer has had similar or equal usage
    behavior (same destinations, same amount, etc)
    in the past AND has paid for it, then it is
    reasonable to assume that he is not a fraudster.
    Be careful of fraudsters that try to fool this
    analysis by making low volumes of similar calls
    and paying for those, but then later increase the
    volume dramitically.
  • If the customer has a different usage behavior,
    then this can indicate account take-over or can
    indicate clip-on fraud.

SAMPLE ONLY
46
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools and Options
Analysis through Interaction with Client
There are many times when the case data is
insufficient to make a decision as to whether the
case is fraudulent or not. In such cases, one
option is to converse with the customer and
through the results of that conversation make a
final decision.
  • Fraud Department Objectives of Interaction with
    the Customer
  • Validate that the customer is who is registered
    on the HLR and that the data is correct.
  • Determine if the suspicious activity on the
    account, phone calls, address change, SMS
    messages, purchases, etc., originated from the
    customer.

SAMPLE ONLY
47
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools and Options
Analysis through Interaction with Client
  • Take IMPORTANT NOTE
  • It is important NOT to offend GOOD customers
  • It is important NOT to pester GOOD customers
  • It is important NOT to panic GOOD customers
  • It is important to make the experience as
    pleasurable for the GOOD customer as possible.
  • It is important that in the process of making a
    contact with the customer NOT be perceived as a
    marketing ploy.
  • It is important that the process of making direct
    contact with the customer for the purpose of
    investigating a fraud case is within legal and
    regulatory guidelines.
  • The policy regarding contacting Corporate or
    other Special Customers should either be through
    the Corporate Account Rep or according to an
    agreed upon plan of action with Customer. (ie.
    Let the customer decide how he wants to be
    contacted in case of validating suspicious calls)

SAMPLE ONLY
48
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools and Options
Analysis through Interaction with Client
  • Methods of Connecting with Customer
  • Outbound call to either phoneline in analysis or
    other contact phone.
  • The difficulty in this approach is that the
    customer may not be available to talk at the time
    of the call.
  • Re-direction of next phone call made by customer
    to the fraud. The difficulties of this approach
    are
  • The customer maybe in a hurry to complete the
    call and may not want to cooperate at that time.
  • If many customers are re-directed at the same
    time, this could cause a queue which will
    INFURIATE a good customer.
  • This approach needs to have 24x7 support.
  • Send SMS or Email to Customer asking to call
    Customer Service.
  • If many customers are call at the same time, this
    could cause a queue which will INFURIATE a good
    customer.

SAMPLE ONLY
49
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools and Options
Analysis through Interaction with Client
  • Guidelines on How to Approach the Customer
  • Explain to the customer that this interruption
    has been made in order to protect the customer
    from unauthorized usage of his phone line. The
    GOOD customer has to feel that the Telecom has an
    interest in protecting the customer.
  • Another approach is to tell the customer that the
    Telecom is validating the usage and/or Billing
    Information of the customer to insure the
    accuracy of his next invoice.
  • It is best to avoid the words Fraud or Crime
    during the conversation.
  • Make the conversation as quick as possible.
  • In the case of re-directed calls, offer the
    customer to complete his next call for free.
  • In the case of confirmed NON-FRAUD, send the
    customer a thank you note or offer the customer
    some free usage in exchange for his time.
  • In the case of NON-FRAUD, be sure that you do NOT
    call or interrupt the customer again at least for
    a period of 6 months or more. Anyless time than
    this would be interpreted as pestering a GOOD
    customer.

SAMPLE ONLY
50
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools and Options
Analysis through Interaction with Client
  • How to Validate the Customer
  • When confirming the customer name and
    information, make it a partnership validation.
    The customer may be in doubt as to whether the
    operator is really from the Telecom. So he may
    want to validate the operator as much as he is
    being validated. To accomplish this two-way
    validation here are some options
  • Only ask for part of the information (like the
    last 4 digits of the SSN)
  • The Operator can give part of the information and
    ask the customer to give the rest.
  • If a PIN number is associated with the service
  • On Inbound calls, have the IVR prompt the
    customer for the PIN for a partial validation.
    Note It is also important to communicate via a
    message in the IVR that the customer should NEVER
    give the operator PIN number.
  • On re-directed calls, prompting for the PIN
    number is perceived as rude and should NOT be
    done.

SAMPLE ONLY
51
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools and Options
Analysis through Interaction with Client
  • How to Validate the Customer (sample
    conversation)
  • Sample Conversation for a Re-directed Call
  • Fraud Operator Good Afternoon, my name is John
    and I am a Customer Service Representative from
    ABC Telecom. Please do not hang up. I need to
    quickly ask you a couple of questions regarding
    your account and then I will complete your call
    for free. Is that okay?
  • Customer Okay.
  • Fraud Operator Sir, we have seen some activity
    on your account that we feel we should, for your
    protection, validate as being originated from
    you. But first, I need to validate that you are
    the owner of the phone line. Sir, in my system,
    your first name is Carl. Is that right?
  • Customer Yes, that is right.
  • Fraud Operator Carl, what is your last name?
  • Customer Smith. My last name is Smith.
  • Fraud Operator Thank you Carl. I am showing that
    your middle two digits of your Social Security
    Number are 56. Can you please tell me what the
    last 4 digits of your Social Security Number are?
  • Customer 1-2-3-4
  • Fraud Operator Thank you Carl. Lastly, I am
    showing that you live on Edinburgh Way. Can you
    please tell me in what city you live and your
    postal code?
  • Customer I live in Harlow. The postal code is
    CM20 2BN
  • Fraud Operator Thank you very much for you
    patience Carl. We have seen some calls
    originating from your telephone today to
    destinations in Saudi Arabia and Kuwait. We just
    need to validate that you made these calls.
  • Customer Yes, I did. I work for a petroluem
    company and I need to do business with colleagues
    in those countries.
  • Fraud Operator Thank you very much for you
    patience, Carl. This is what I needed to confirm.
    I will now complete your complementary call.

SAMPLE ONLY
52
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools and Options
Analysis through Interaction with Client
  • Social Engineering the Customer
  • What is it?
  • Social Engineering is defined by Dr.T of
    ebcvg.com as the art (not an attack) of getting
    people to comply to your wishes. It is the
    technique (used not only by hackers) for forcing
    a response or gaining information out of
    otherwise unwilling individuals. Basically, the
    social engineer manipulates others to gain
    information that would not normally be available.
    Social Engineering is what fraudsters use against
    Telecoms to commit their frauds.
  • When do you do it and for what?
  • Good fraudsters are usually prepared for
    validations from the Telecom and many times these
    validations do not detect the fraudster.
    Therefore, when the probability is high that the
    customer is actually a fraudster, another way to
    validate the customer is to NOT let him perceive
    the call as coming from the Telecom. In other
    words, a way to validate the customer and his
    true data is for the Telecom to Social Engineer
    the fraudster.
  • Is this legal?
  • In many countries like the United States, this is
    NOT legal.
  • Any precautions should be taken when doing
    Social Engineering?
  • Make sure the Caller ID number is untracible.
    This can be accomplished by programming a bogus
    Caller ID number in a PABX and/or by blocking the
    Caller ID.

SAMPLE ONLY
53
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools and Options
Batch Analysis and Scoring
  • In situations where a Telecom has few Fraud
    Analysts and MANY detected cases to investigate,
    one option is to perform Batch Analysis. Batch
    Analysis is similar in results to Automated
    Reactions which will be discussed in the Reaction
    section of this presentation. Batch Analysis is
    best used when Automated Reactions are not
    possible such as the case when an FMS does NOT
    contain enough data to make a Fraud / Not Fraud
    decision.
  • The idea of Batch Analysis is to perform analysis
    on many cases in batch mode or in large groups.
  • The advantages of Batch Analysis are
  • It allows for much quicker resolution of cases
    thus making for quicker reactions which decrease
    fraud losses.
  • It helps the Fraud Analyst visually see fraud
    trends that are not seen when looking at
    individual cases.
  • The disadvantages of Batch Analysis are
  • Generally, when cases are handled in Batch, there
    is less accuracy in the final decision of Fraud /
    Not Fraud.
  • Scoring is a way to analyze cases with many
    different independent indicators of fraud and is
    commonly used when doing Batch Analysis.

SAMPLE ONLY
54
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools and Options
Batch Analysis and Scoring (example exercise)
Case Name Phone Number Address International Usage Per Day Detected International Usage on Last Month's Invoice Due Date of Payment of Last Invoice Date of Payment of Last Invoice International Usage on Invoice from 2 months ago Due Date of Payment of Invoice from 2 months ago Date of Payment of Invoice from 2 months ago. PRS Alert? Hot Destination Alert?
1 John Smith 303-643-2354 72 Farther Way 250.00 7,250.00 12-Jan none 3,256.00 12-Dec none no yes
2 Dennis Johnson 320-648-1256 624 Sirrine Street 250.00 - 1-Feb none none none none no no
3 Elaine Alberts 303-745-8563 92304 Camelback Road 100.00 4,287.00 25-Jan none none none none no yes
4 Betty Graves 320-893-3965 100 Downtown Ave 250.00 750.00 25-Jan 25-Jan 1,003.00 24-Dec 24-Dec no no
5 Mickey Mouse 310-546-2321 123 Disney Lane 100.00 2,587.00 25-Jan none none none none no no
6 Steven Jordan 719-550-7321 1112 Gilfin Circle 100.00 - 12-Jan 10-Jan none none none yes no
7 Danny Karls 719-883-2395 35 North 7th Street 100.00 2,508.00 1-Feb none 1,200.00 1-Jan 1-Jan no no
8 Michael Bates 710-333-6503 888 Village Inn Way 100.00 574.00 12-Jan 10-Jan 732.00 12-Dec 10-Dec no no
9 Victoria Jordan 719-637-9267 1112 Gilfin Circle 250.00 23.00 12-Jan none - 12-Dec 28-Nov yes no
10 Olin Haskins 303-823-4302 932 Serendipity Lane 250.00 7,100.00 12-Jan none 3,545.00 12-Dec none no yes
11 Frank Zapata 320-593-3111 1287 35th Ave 250.00 7,538.00 25-Jan 24-Jan 6,735.00 24-Dec 24-Dec yes no
12 George Carpenter 310-943-2593 2747 Yellow Brick Road 250.00 - none none 4,600.00 12-Dec 12-Dec no no
13 John Wayne 310-546-2317 934 Western Drive 100.00 2,743.00 25-Jan none none none none no no
14 Peter Jordan 719-637-9384 1112 Gilfin Circle 100.00 - 12-Jan 10-Jan none none none yes no
15 D Thomas 303-678-7672 6365 Sleepy Cove Road 100.00 3,765.00 25-Jan none none none none no yes
16 Billy Gates 710-839-2383 7733 Billy Bob Path 250.00 21,642.00 1-Feb none 3,256.00 1-Jan 1-Jan no no
17 Tom Pines 719-883-5693 90 Barnes Ave 100.00 275.00 12-Jan 12-Jan 7,326.00 12-Dec 12-Dec no no
18 Angela Thors 320-834-0932 63 Hilgstreet Street 100.00 34.00 25-Jan 25-Jan 56.00 24-Dec 24-Dec no no
19 Elvis Presley 310-546-2320 567Elms Street 100.00 2,387.00 25-Jan none none none none no no
20 Bob Waters 320-573-2934 9090 Beautiful Gold Road 100.00 482.00 25-Jan none none none none no no
SAMPLE ONLY
55
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools and Options
Batch Analysis and Scoring
On-going Process
Continue to use same weights
Perform Sanity Check (audit) on samples from each
catagory
Separate into Catagories
Perform Batch Analysis on small sample to
determine weights.
Perform Batch Analysis on large group applying
the learned weights.
Fraud
no
Failed Sanity Check?
weights
Investigate
yes
Perform new weight determination
Not Fraud
SAMPLE ONLY
56
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools
Automated Analysis via Datamining Engines
Neural Networks
Cluster Analysis
Rule Induction
Regression Algorithms
SAMPLE ONLY
57
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools and Options
Automated Analysis via Datamining Engines
Many FMSs like FraudView have a Datamining
Engine thats main purpose is to do automated the
previous exercise of Batch Analysis and Scoring.
FraudViews ANM (Advanced Neural Models) take
as input the history of cases along with their
CDRs and learns what are the proper indicators
of fraud and the appropriate weights that should
be given these indicators. This allows FraudView
to detect fraud in realtime that is specific to a
Telecoms network. There are several types of
Datamining Engines that can be used to learn
fraud. Each type has its strengths and
weaknesses. FraudView ANM uses neural networks,
rule induction, cluster analysis and regression
algorithms. The main advantage of the use of
Datamining Engines is the ability to recognize
fraudulent patterns in realtime without having to
rely on filters. It is important to know that
Datamining Engines CANNOT and SHOULD NOT
substitute the filters. Filters are highly and
quickly configurable. Datamining engines are not.
They require a history of cases in order to be
taught the frauds. And the process of teaching
them can take weeks of work.
SAMPLE ONLY
58
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Analysis Tools and Options
Trend Analysis
  • Trend Analysis serves several purposes
  • It is necessary to measure the progress of the
    Fraud department.
  • The success of the implementation of
    Prevention/Detection/Reaction procedures
  • The success of the implementation of more
    efficient procedures
  • It is necessary in order to determine the
    migration of fraud.
  • It is also used to detect new frauds. Changes in
    traffic volume, duration, etc can indicate new
    frauds.
  • Example 1 Traffic to Moldovia is consistently
    between 800 and 1200 minutes per month but then
    jumps to 1800 minutes in the last month. Moldovia
    is known as a PRS haven. Therefore, this change
    strongly indicates additional PRS usage and
    possible fraud.
  • Example 2 Outgoing traffic destined to cellular
    phones in western Europe jumps dramitically from
    one month to the next. This could indicate that
    the Telecom is a victim of Arbitrage Fraud from
    other carriers.
  • Example 3 International outgoing traffic from
    the town of Victoria drops considerably. However,
    inbound International traffic increases to
    Victoria at the same time. This could indicate
    Call-Back activity in Victoria.
  • Note that oftentimes the trending that uncovers
    fraud comes from the Revenue Assurance
    department.

SAMPLE ONLY
59
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Prevention Tools and Options
  • The best way to Minimize Fraud Losses is the
    Prevent them altogether.
  • The following are Prevention Techniques that can
    be implemented
  • Prescreening at the time of subscription.
  • Check if name is similar or equal to that of a
    known fraudster
  • Check if address is similar or equal to that of a
    known fraudster
  • Check if SSN is equal to that of a known
    fraudster
  • Creation of a customer validation process with
    customer participation.
  • Secret code or question
  • Biometric Validation
  • Prescreening of new products and services for
    Fraud Vulnerabilities.
  • Ongoing review of product fraud with Marketing
    and Engineering. (aka. Fraud Review Board)
  • Open dialogue and data sharing with other
    competing Telecoms.
  • Participation in Professional Fraud
    Organizations.

SAMPLE ONLY
60
Fraud Control Operational Processes
Prevention
Detection
Analysis
Reaction
Measurement
Executive Reporting
Prevention Tools and Options
  • Customer Risk Analysis
  • One way of preventing bad debt and fraud is to
    perform a customer risk analysis throughout the
    lifetime of the customer. This risk analysis is
    similar to a credit score.
  • New Subscibers
  • Each new subscriber should be immediately scored
    for for fraud or bad debt risk. This is done by
    comparing their subscription profile to the known
    fraud and bad debt risk profiles. The profiles
    would include
  • External Credit Score
  • External Telecom Fraud and Bad Debt Data
  • Address what is the probability of this customer
    being a bad debt customer or fraudster (risk
Write a Comment
User Comments (0)
About PowerShow.com