We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published bySteven Alvarez
Modified over 3 years ago
© Pure Revenue LTDA. 2005 A Vision for Combating Fraud in the Competitive Environment of Brazil CFCA Conference Rio de Janeiro April 29, 2005
© Pure Revenue LTDA. 2005 Telecom Competition Fraudster Advantages A competitive environment provides some very real advantages to the fraudster: 1.Carriers Fighting for New Fraudsters: –The Vulnerability: In a competitive environment competitors are fighting for new subscribers in an effort to gain market share. In order to attract new customers, security controls, such as document and identity validations are relaxed in order to facilitate and speed up the subscription process. –The Exploit: Subscription Fraud with either False or Stolen Identification and/or with False Billing Information. –The Fraudsters: Oftentimes professional fraudsters with the objective of turning free calls into cash. Hardened Criminals with the objective of remaining anonymous. Non-professional fraudsters simply wanting free service.
© Pure Revenue LTDA. 2005 Telecom Competition Fraudster Advantages 2.Non-Cooperation Between Carriers: –The Vulnerability: In order to gain or maintain a competitive edge carriers often do not share individual fraudster information with the intent of allowing the fraudsters to cause losses to the competitor. –The Exploits: Fraudsters will travel from network to network, attacking each one until ALL have suffered the losses and ALL have blocked them. (CSP Surfing) Fraudsters will chain fraudulent calls through networks knowing that will difficult the investigation process even more. –The Fraudsters: Professional fraudsters with the objective of turning free calls into cash. Non-professional fraudsters simply wanting free service.
© Pure Revenue LTDA. 2005 Telecom Competition Fraudster Advantages 3.Regulatory Controls - Spurning Growth and Competition: –The Vulnerability: In order to provide equal access to Telecommunications among the classes of society, Regulatory Controls dictate the non-sharing of critical information needed for the control of Fraud such as detailed information regarding the Bad Debt customers. –The Exploit: Fraudsters will fly under the radar to appear as a Bad Debt customer. And then they will travel from network to network, causing losses, knowing that they cannot be detected. (CSP Surfing) –The Fraudsters: Professional fraudsters with the objective of turning free calls into cash. Non-professional fraudsters simply wanting free service.
© Pure Revenue LTDA. 2005 Telecom Competition Fraudster Advantages t Començo do trafego Fraudador faturadoFraudador bloqueado por inadimplencia 15 a 45 dias 30 dias 45 a 75 dias total CSP ou Carrier Surfing – fraudador surfando um CSP debaixo o radar... t 45 dias 60 dias 55 dias 75 dias 50 dias 62 dias 74dias 49 dias Tel1 Tel2 Tel3 Tel4 Tel5 Tel6 Tel7 Tel8... 1 ano A Fraudster surfing under the radar can go as long as 2 years without ever paying a long distance bill, mobile, or local bill. If that fraudster has 10 such phones, he could easily re- sell service without ever getting caught.
© Pure Revenue LTDA. 2005 Telecom Competition Fighting Back at the Fraud How to Fight Back: 1.Sharing of data between carriers globally and locally. Schemes, Exploits, Vulnerabilities, and Fraudster Profiles This is the objective of International and Local Fraud Forums. http://www.cfca.org/ http://www.fiina.org/ http://www.gsmworld.com
© Pure Revenue LTDA. 2005 Telecom Competition Fighting Back at the Fraud How to Fight Back: 1.Sharing of data between carriers globally and locally. ADVANTAGES: Learn of new fraud schemes and exploits BEFORE they attack. Learn of new ways to fight new and existing schemes and exploits Learn best practices for fraud prevention And much more... http://www.cfca.org/ http://www.fiina.org/ http://www.gsmworld.com
© Pure Revenue LTDA. 2005 Telecom Competition Fighting Back at the Fraud How to Fight Back: 2.Sharing of specific fraud data between carriers locally. Schemes, Exploits, Vulnerabilities, and Fraudster Profiles Specific data on individual fraudsters. 3.Cooperation between fraud and legal departments of carriers locally. Objectives of performing investigations, gathering evidence, and taking legal action against known fraudsters.
© Pure Revenue LTDA. 2005 Telecom Competition Fighting Back at the Fraud How to Fight Back: ADVANTAGES: Recognize fraudster before he causes losses. Identify fraudsters hiding under radar. Greater source of legal evidence against fraudster. Greater pressure on legal system. Greater pressure on regulatory agency (Anatel)
© Pure Revenue LTDA. 2005 Telecom Competition Fighting Back at the Fraud Five Variables to Consider Before Sharing: Company Confidentiality Ethics Short Term Vision vs. Long Term Vision Value of the Fraud Data Methods of Trading Data
© Pure Revenue LTDA. 2005 Telecom Competition Fighting Back at the Fraud Short Term Vision: Gain as much as possible in the short term by improving my revenue and hurting my competitors. Fraudsters LOVE this vision!
© Pure Revenue LTDA. 2005 Telecom Competition Fighting Back at the Fraud Long Term Vision: Rid the industry of the fraudsters altogether. Fraudsters HATE this vision!
© Pure Revenue LTDA. 2005 Telecom Competition How to Share Discovered Fraud Data 1.Support an Active Brazilian Fraud Forum. –GGRT, FONAT 2.Adopt a Fraud Data Sharing Model: –Peer to Peer Model Advantages: Initially easier to organize in a competitive environment. –Centralized Model Advantages: United Force against fraud, easier to impact the industry, easier to change regulations and laws.
© Pure Revenue LTDA. 2005 Telecom Competition How to DISCOVER NEW FRAUD in Bad Debt Banco de Dados Cada empresa manda para o BD as informações sobre seus inadimplentes que tem uma fatura em aberto maior que X reais e que está aberta a mais de Y dias. Bancos de Dados de Inadimplencia
© Pure Revenue LTDA. 2005 Telecom Competition How to DISCOVER NEW FRAUD in Bad Debt Banco de Dados Suspeitos de Fraude Regras Periódicamente (semanalmente) o Gerente do BD gerará um relatório mostrando os altos suspeitos de fraude baseado em regras que todos os participantes definirão. Exemplos de Regras: 1.Um cliente que é inadimplênte para 3 ou mais empresas. 2.Um cliente Res que tem um dêbito total maior que R$1000 3.Um cliente SB que tem um dêbito total maior que R$2000 4.Um cliente de Goiás inadimplênte para 2 empresas.
© Pure Revenue LTDA. 2005 Telecom Competition How to DISCOVER NEW FRAUD in Bad Debt Banco de Dados Regras Suspeitos de Fraude Este relatório seria mandado somente para as telcos participantes. Cada telco decide como usar os dados.
© Pure Revenue LTDA. 2005 Telecom Competition How to DISCOVER NEW FRAUD in Bad Debt Banco de Dados Firewall Nenhuma telco terá acesso direto aos dados do BD, por tanto, não poderá ver quem está inadimplente para qual empresa, de forma a cumprir as regras de Anatel.
© Pure Revenue LTDA. 2005 Telecom Competition How to DISCOVER NEW FRAUD in Bad Debt Banco de Dados Firewall Who would manage the Fraud/BadDebt Database? Possible Managers: ABR Credit Bureau New Company formed by Participating Telcos
© Pure Revenue LTDA. 2005 Telecom Competition How to DISCOVER NEW FRAUD in Bad Debt Banco de Dados Want Cost Justification? 1.Run a Trial Program with FONAT. 2.Consulting Firm could be tasked to receive input for 3 – 6 months of Bad Debt from each participant. 3.Consulting Firm would analyze data and return individual reports to each company showing what fraud that company would have discovered and losses prevented. © Pure Revenue LTDA. 2005
Telecom Competition A Vision of Controlling Fraud in Brazil 1.100% Participation in Intl Forums such as CFCA. 2.100% Executive Support of Local Fraud Forum – FONAT 3.All Brazilian Telecoms Preventing MORE FRAUD by: a)All Brazilian Telecoms learning and preventing new types of fraud BEFORE they come to Brazil b)Sharing data between them all regarding ALL local fraudsters c)Collectively detecting CSP Surfer Fraudsters hiding in the Bad Debt 4.Collectively creating a Social and Business case for Anatel to reconsider the regulations in light of alarming amounts of Fraud and Bad Debt. 5.Collectively strengthening anti-fraud legislation. © Pure Revenue LTDA. 2005
Contact Information: Clifford M. Jordan, President Av. Genaro de Carvalho 620, Suite 104 Recreio dos Bandeirantes, RJ CEP: 22790-070 Brasil Phone: 55-21-8105-0325 Email: email@example.com Website: www.purerevenue.net © Pure Revenue LTDA. 2005
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Amerisource Funding, Inc. (800) US MONEY JUST ASK YOUR CLIENTS IF THEY NEED CASH. WE PROVIDE SHORT-TERM, CASH FLOW SOLUTIONS. WE GIVE COMPANIES THE FREEDOM.
Chapter 15 Conflicts of Interest in the Financial Industry.
1 Chapter 2: The External Environment: Opportunities, Threats, Industry Competition and Competitor Analysis Overview: The firm’s external environment External.
Cleve L. Freeman – Los Angeles, CA USA Energy Loss Reduction Programs & Profits, Rio de Janeiro, Brazil 11 – 13 August 2004.
1 Non-Cash Assets Chapter 9. 2 List the five categories of tangible non-cash misappropriations discussed in this chapter. Discuss the data on non-cash.
CSE/ISE 312 Freedom of Speech (Part 3). The Global Net: Censorship and Political Freedom The Global Impact of Censorship Global nature of the Internet.
The IT Industry, Its Primary Challenges and Perceived Trends: A Survey of 9 Countries with IT Professionals Rio de Janeiro 7th of July Local Economic Development.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Fraudulent and Questioned Documents. Top 5 Countries Originating Fraud.
Exactta Communications Sales Training Part One Everything you need to know about Exactta and the Exactta SIM Card.
ITIC PERSPECTIVE ON THE EFFECTIVE IMPLEMENTATION OF THE FCTC PROTOCOL ELIZABETH ALLEN ITIC – JULY 2014.
1 The Second Step of Starting a Business: Writing a Business Plan 119 Technology Center, University Park, PA
Stakeholders Forum on QoS and Consumer Experience (Nairobi, Kenya, 23 to 25 November 2015) Role of Global & Regional Communities, Policy Makers, Regulators.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
Prison Inmate Telephone Fraud in Brazil by clifford m jordan.
10b.1 Van Horne and Wachowicz, Fundamentals of Financial Management, 13th edition. © Pearson Education Limited Created by Gregory Kuhlemeyer. Chapter.
2008 Making Money on the International Top-Up. 2 The world is changing There were the times when it was possible to earn 5-10% on.
IMPACT OF INFORMATION TECHNOLOGY ON ORGANIZATIONS, SOCIETY, AND INDIVIDUALS Author: Bernarda Minov Petkov Mentor: Jasna Soldić-Aleksić, PhD Belgrade, May.
Chapter 3 Business Organizations. Sole Proprietorship A business that is owned and managed by one individual who receives all the profits and bears all.
Economic Gardening The Role of Competitive Market Intelligence Michael W. Trahan 25 September 2011.
João Cox CEO – Telemig Celular & Amazônia Celular CFO – Telemig Celular Part. & Tele Norte Celular Part. Telecommunications Panel Five Years After Privatization.
TELE NORTE LESTE PARTICIPAÇÕES S.A. Conference Call Third Quarter, 2001.
U.S. Telecommunications Regulation and Market Developments September 2008.
Credit Control ( AR Management) Dr Clive Vlieland-Boddy.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Security in Banking Emmanuel van de Geer Senior Architect Governance, Risk,
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
Global trends in telecom development Dr Tim Kelly (ITU) Future development of Telecoms and Strategic Initiatives of the ITU HKUST, 7 th December 2000 The.
October 2004 Presented to:. Copyright © 2004 Fragomen, Del Rey, Bernsen & Loewy, LLP 2 Ellen G. Yost, Partner Fragomen, Del Rey, Bernsen.
Stock Market Game Mrs. Heinze. Table of Content 1234 Short sell/short cover rules Portfolios Additional Rules 5 Code of participation Rules of the Stock.
Chapter 4 Risk Assessment. Audit Risk The risk that an auditor expresses an inappropriate audit opinion when the financial statements are materially misstated.
S tatistics Processing in ITU Esperanza C. Magpantay Telecommunication Data and Statistics Unit (TDS) Telecommunication Development Bureau.
Santa Clara, CA (408)
1 FPEG Identity theft & payment fraud point December 2007.
Click Fraud Forensics Dean Qudah Pace University DPS 2010.
Unconventional Gas and EU Energy Policy
Fraud Prevention / Meta Backman 1 DT Fraud Conference – Banking and Payments rd & 24 th March 2016 Grange Hotel - Tower Bridge – London Fraud Prevention.
MULTINATIONAL STRATEGIES AND THE GLOBAL-- LOCAL DILEMMA u The local responsiveness solution u The global solution.
About ONLINE Industry leader for more than 50 years Headquartered in North Carolina Originally a small merchant credit bureau In 1997, focus shifted from.
Chris Gravatt Mallory De Kovessey Tina Vargas Tim Hogenhouser The ChoicePoint Attack.
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Combat of Counterfeit, Substandard and Unauthorized ICT devices in Brazil João Alexandre Zanon Regulatory Specialist, Regulatory.
IT security Sherana Kousar 11a/ib1 A virus is a file written with the intention of doing harm, or for criminal activity Example of viruses are:
2004 Brazilian Telecommunications Conference September Rio de Janeiro, Brazil.
1.5.3 Pure Monopoly Unit Overview Assumptions of the Pure Monopoly Model A single seller No close substitutes Significant entry barriers Barriers to entry.
1 The Second Step of Starting a Business: Writing a Business Plan 119 Technology Center University Park, PA
Obtaining Evidence through Discovery & Witnesses John W. McReynolds Assistant Chief New York Field Office Antitrust Division U.S. Department of Justice.
The Challenges for Ensuring Transparency and Accountability in specific Areas of Public Financial Management presented by Mr.Abdluaziz Yousef Al-Adsani.
Module 6 Reporting and Analyzing Intercorporate Investments.
© 2017 SlidePlayer.com Inc. All rights reserved.