||The IMEI (International Mobile Equipment Identity) is a unique serial number on all mobile phones. If the mobile is blacklisted the IMEI appears on a central register and the phone will not work on any network. A fraudster will change the IMEI number and the handset will function normally.
|Call forwarding fraud
||The victim will be persuaded to forward a call from the fraudster. With specific instructions from the fraudster the victim will unwittingly activate call forwarding, all subsequent incoming calls to the victims phone will be forwarded, allowing the fraudster to use the victims phone as a relay for long distance calls without the victim knowing until receiving the bill.
|Call conference/multi party calls
||A fraudster will set up a conference call on a stolen or cloned handset/SIM card. This will increase the revenue before the detection by the network. International Revenue Share Fraud (IRSF) uses this method to artificially inflate revenue into a premium rate service (PRS). The high cost calls are not paid for resulting in loss of revenue for the CSP.
|Spamming SMS – MSC
||This is when mobile phone spam or junk mail is delivered to a mobile phone as a text message. The
recipient may be charged for receiving messages, and a high volume may cause screen freezes or
automatic dialling to emergency numbers. Advances in technology allows SMS spam to be sent through
internet SMS portals with minimal cost to the spammer. |
||When CSP bills the subscriber, then gives commission or revenue to the content provider, there is a risk
of PRS fraud. Content providers can increase revenue with subscription fraud and artificially generate
uncollectable bills. Traffic generation is possible with trojan software, for example, by sending SMSs to
| Proxy Fraud
||This refers to when an individual hides their true identity and location with an anonymous IP address. It
allows the impersonator to bypass location detection software where the IP address is used to authenticate
online transactions. The impersonator can track, redirect and block calls. It also allows selective and
wholesale Denial of Service (DoS). Click Fraud.
| Next Generation Fraud
||This relates to fraud threats which affect next generation IP based communication or mobile and wireless
networks to gain financial profit at the cost of a third party. Smartphones provide powerful capabilities
involving code execution which leave them open to regular internet fraud along with emerging attacks. the cost of a third party. Smart phone provide powerful capabilities involving code execution which leave them open to regular internet fraud along with emerging attacks.
|SIM card cloning
||This is the cloning of SIM cards and International Mobile Equipment Identities (IMEIs) which causes
inaccurate billing of legitimate subscribers, delays in call setup and reduced call quality. Calling Line
Identity (CLI) shows up as unavailable.
| False Answer Supervision (FAS)
||This is the incorrect billing of calls. Billing starts before the call receiver is picked up. Calls are simulated to
numbers outside network coverage thus providing false billable airtime. The subscriber will be billed even if
the call is said to be out of network or reaches voicemail.
||Fraudsters hack into the server that connects traffic from an office local area network (LAN) to a CSP. Guessing a valid phone extension, they proceed to run ‘attack’ software. Having gained access the fraudster can scam customers and create a massive phone bill for the CSP. VoIP systems are vulnerable as they allow users to have unlimited guesses at the password.