We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published bySteven Alvarez
Modified over 2 years ago
© Pure Revenue LTDA A Vision for Combating Fraud in the Competitive Environment of Brazil CFCA Conference Rio de Janeiro April 29, 2005
© Pure Revenue LTDA Telecom Competition Fraudster Advantages A competitive environment provides some very real advantages to the fraudster: 1.Carriers Fighting for New Fraudsters: –The Vulnerability: In a competitive environment competitors are fighting for new subscribers in an effort to gain market share. In order to attract new customers, security controls, such as document and identity validations are relaxed in order to facilitate and speed up the subscription process. –The Exploit: Subscription Fraud with either False or Stolen Identification and/or with False Billing Information. –The Fraudsters: Oftentimes professional fraudsters with the objective of turning free calls into cash. Hardened Criminals with the objective of remaining anonymous. Non-professional fraudsters simply wanting free service.
© Pure Revenue LTDA Telecom Competition Fraudster Advantages 2.Non-Cooperation Between Carriers: –The Vulnerability: In order to gain or maintain a competitive edge carriers often do not share individual fraudster information with the intent of allowing the fraudsters to cause losses to the competitor. –The Exploits: Fraudsters will travel from network to network, attacking each one until ALL have suffered the losses and ALL have blocked them. (CSP Surfing) Fraudsters will chain fraudulent calls through networks knowing that will difficult the investigation process even more. –The Fraudsters: Professional fraudsters with the objective of turning free calls into cash. Non-professional fraudsters simply wanting free service.
© Pure Revenue LTDA Telecom Competition Fraudster Advantages 3.Regulatory Controls - Spurning Growth and Competition: –The Vulnerability: In order to provide equal access to Telecommunications among the classes of society, Regulatory Controls dictate the non-sharing of critical information needed for the control of Fraud such as detailed information regarding the Bad Debt customers. –The Exploit: Fraudsters will fly under the radar to appear as a Bad Debt customer. And then they will travel from network to network, causing losses, knowing that they cannot be detected. (CSP Surfing) –The Fraudsters: Professional fraudsters with the objective of turning free calls into cash. Non-professional fraudsters simply wanting free service.
© Pure Revenue LTDA Telecom Competition Fraudster Advantages t Començo do trafego Fraudador faturadoFraudador bloqueado por inadimplencia 15 a 45 dias 30 dias 45 a 75 dias total CSP ou Carrier Surfing – fraudador surfando um CSP debaixo o radar... t 45 dias 60 dias 55 dias 75 dias 50 dias 62 dias 74dias 49 dias Tel1 Tel2 Tel3 Tel4 Tel5 Tel6 Tel7 Tel ano A Fraudster surfing under the radar can go as long as 2 years without ever paying a long distance bill, mobile, or local bill. If that fraudster has 10 such phones, he could easily re- sell service without ever getting caught.
© Pure Revenue LTDA Telecom Competition Fighting Back at the Fraud How to Fight Back: 1.Sharing of data between carriers globally and locally. Schemes, Exploits, Vulnerabilities, and Fraudster Profiles This is the objective of International and Local Fraud Forums.
© Pure Revenue LTDA Telecom Competition Fighting Back at the Fraud How to Fight Back: 1.Sharing of data between carriers globally and locally. ADVANTAGES: Learn of new fraud schemes and exploits BEFORE they attack. Learn of new ways to fight new and existing schemes and exploits Learn best practices for fraud prevention And much more...
© Pure Revenue LTDA Telecom Competition Fighting Back at the Fraud How to Fight Back: 2.Sharing of specific fraud data between carriers locally. Schemes, Exploits, Vulnerabilities, and Fraudster Profiles Specific data on individual fraudsters. 3.Cooperation between fraud and legal departments of carriers locally. Objectives of performing investigations, gathering evidence, and taking legal action against known fraudsters.
© Pure Revenue LTDA Telecom Competition Fighting Back at the Fraud How to Fight Back: ADVANTAGES: Recognize fraudster before he causes losses. Identify fraudsters hiding under radar. Greater source of legal evidence against fraudster. Greater pressure on legal system. Greater pressure on regulatory agency (Anatel)
© Pure Revenue LTDA Telecom Competition Fighting Back at the Fraud Five Variables to Consider Before Sharing: Company Confidentiality Ethics Short Term Vision vs. Long Term Vision Value of the Fraud Data Methods of Trading Data
© Pure Revenue LTDA Telecom Competition Fighting Back at the Fraud Short Term Vision: Gain as much as possible in the short term by improving my revenue and hurting my competitors. Fraudsters LOVE this vision!
© Pure Revenue LTDA Telecom Competition Fighting Back at the Fraud Long Term Vision: Rid the industry of the fraudsters altogether. Fraudsters HATE this vision!
© Pure Revenue LTDA Telecom Competition How to Share Discovered Fraud Data 1.Support an Active Brazilian Fraud Forum. –GGRT, FONAT 2.Adopt a Fraud Data Sharing Model: –Peer to Peer Model Advantages: Initially easier to organize in a competitive environment. –Centralized Model Advantages: United Force against fraud, easier to impact the industry, easier to change regulations and laws.
© Pure Revenue LTDA Telecom Competition How to DISCOVER NEW FRAUD in Bad Debt Banco de Dados Cada empresa manda para o BD as informações sobre seus inadimplentes que tem uma fatura em aberto maior que X reais e que está aberta a mais de Y dias. Bancos de Dados de Inadimplencia
© Pure Revenue LTDA Telecom Competition How to DISCOVER NEW FRAUD in Bad Debt Banco de Dados Suspeitos de Fraude Regras Periódicamente (semanalmente) o Gerente do BD gerará um relatório mostrando os altos suspeitos de fraude baseado em regras que todos os participantes definirão. Exemplos de Regras: 1.Um cliente que é inadimplênte para 3 ou mais empresas. 2.Um cliente Res que tem um dêbito total maior que R$ Um cliente SB que tem um dêbito total maior que R$ Um cliente de Goiás inadimplênte para 2 empresas.
© Pure Revenue LTDA Telecom Competition How to DISCOVER NEW FRAUD in Bad Debt Banco de Dados Regras Suspeitos de Fraude Este relatório seria mandado somente para as telcos participantes. Cada telco decide como usar os dados.
© Pure Revenue LTDA Telecom Competition How to DISCOVER NEW FRAUD in Bad Debt Banco de Dados Firewall Nenhuma telco terá acesso direto aos dados do BD, por tanto, não poderá ver quem está inadimplente para qual empresa, de forma a cumprir as regras de Anatel.
© Pure Revenue LTDA Telecom Competition How to DISCOVER NEW FRAUD in Bad Debt Banco de Dados Firewall Who would manage the Fraud/BadDebt Database? Possible Managers: ABR Credit Bureau New Company formed by Participating Telcos
© Pure Revenue LTDA Telecom Competition How to DISCOVER NEW FRAUD in Bad Debt Banco de Dados Want Cost Justification? 1.Run a Trial Program with FONAT. 2.Consulting Firm could be tasked to receive input for 3 – 6 months of Bad Debt from each participant. 3.Consulting Firm would analyze data and return individual reports to each company showing what fraud that company would have discovered and losses prevented. © Pure Revenue LTDA. 2005
Telecom Competition A Vision of Controlling Fraud in Brazil 1.100% Participation in Intl Forums such as CFCA % Executive Support of Local Fraud Forum – FONAT 3.All Brazilian Telecoms Preventing MORE FRAUD by: a)All Brazilian Telecoms learning and preventing new types of fraud BEFORE they come to Brazil b)Sharing data between them all regarding ALL local fraudsters c)Collectively detecting CSP Surfer Fraudsters hiding in the Bad Debt 4.Collectively creating a Social and Business case for Anatel to reconsider the regulations in light of alarming amounts of Fraud and Bad Debt. 5.Collectively strengthening anti-fraud legislation. © Pure Revenue LTDA. 2005
Contact Information: Clifford M. Jordan, President Av. Genaro de Carvalho 620, Suite 104 Recreio dos Bandeirantes, RJ CEP: Brasil Phone: Website: © Pure Revenue LTDA. 2005
1 Chapter 13 Information Technology Economics. 2 Learning Objectives Identify the major aspects of the economics of information technology. Explain the.
How to secure an information security environment January 15, 2014 Lance P. Hawk CFE, CGEIT, CISA, CISM, CRISC
Conflicts of Interest- a type of moral hazard problem that occurs when a person or institution has multiple objectives (interests) and as a result has.
1 Information Systems Using Information (Higher).
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
UNIT-l Conceptual foundation of Business Process reengineering 1.
A Publication of Bridgemark Solutions Six Keys to Generating More Sales Leads AND WINNING MORE MARKET RESEARCH PROJECTS.
2013 PCI Data Security Awareness Training. What is PCI-DSS? The Payment Card Industry Data Security Standards (PCI-DSS) are regulations that were created.
1 ©2008 by the Association of Certified Fraud Examiners, Inc.
Evaluating Future Technology Assessment Jonathan Calof and France Bouthilller Telfer School of Management, University of Ottawa and McGill University The.
PwC Rogue Trading How to successfully manage this risk Informational presentation for our clients February 2008 Strictly private and confidential *connectedthinking.
AN OVERVIEW OF ISSUES TO DO WITH WEBDESPIX (WDP) This is only a start look at your booklets and notes! WebDesPix.
Community Empower Preparedness and Interaction Training.
UNIT I FUNDAMENTAL OF E-COMMERCE 1.1INTRODUCTION TO E-COMMERCE 1.2 DRIVING FORCES OF E-COMMERCE 1.3 BENEFITS AND LIMITATIONS OF E-COMMERCE 1.4 DATA MINING.
« In Confidence » Putting in Place a Trade Secret Protection Program in an SME Najmia Rahimi Senior Program Officer, SMEs Division, World Intellectual.
1 US Department of State STCU – Science and Technology Center in Ukraine Commercializing Intellectual Property Workshop September 27 – 28, 2005 Baku, Azerbaijan.
Logical IT Security By Prashant Mali.
Using Advanced Information Technology to Increase Performance McGraw-Hill/Irwin Contemporary Management, 5/e Copyright © 2008 The McGraw-Hill Companies,
Intelligent Risk Management & Compliance Cost Reduction Creating a sustainable risk and compliance organization while reducing inefficiency and improving.
Best Practices in Revenue Collections Chad Wilson Senior Director of Operations Contingency Services, Pioneer.
1 CS5038 The Electronic Society 1. Overview of Electronic Commerce Background Definitions Perspectives Variations Business Models Pressures on businesses.
©2009 Profiles International, Inc. All rights reserved. Expert Insights Seven Factors for Building Extreme Customer Loyalty.
Fair Market Value and Payments to Healthcare Professionals – How Should We Determine What We Pay? © Huron Consulting Services LLC. All rights reserved.
1 Security Awareness 101 ……and Beyond 20th Annual Computer Security Applications Conference December 6, 2004 Tucson, Arizona Kelley Bogart Melissa Guenther.
The Importance of Trade Secrets for Businesses Small and Medium Sized Enterprises (SMEs) Division World Intellectual Property Organization (WIPO)
Doha, Qatar – Friday, April 20 th, PRONicaraguas Background Who We Are PRONicaragua is the Official Nicaraguan Investment Promotion Agency. The.
0 Welcome! Closer Look at AT Exchange Programs Carolyn P. Phillips Georgia Department of Labor – Tools for Life
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin Copyright © 2008 The McGraw-Hill Companies, Inc.
© 2016 SlidePlayer.com Inc. All rights reserved.