This small architectural firm got hit with a telecom fraud attack. $166,000 losses. In one weekend. Don't let this be you.
Blocking telecom fraud attacks can impose a difficult decision: block faster and inflict more false positives or block slower and incur greater fraud losses. You don’t have to settle for these choices.
Global health conglomerate Johnson & Johnson reached a vital crossroads in 2005. Its ability to manage a sophisticated telecommunication network and keep expenses in line had become a source of concern.
This whitepaper explains the basics of creating and managing keys and certificates in the STIR/SHAKEN framework for secure caller ID. It also recommends certificate management features that enhance a STIR/SHAKEN solution’s reliability and performance.
Least cost routing is concerned with analyzing dial codes and the rates carriers charge to complete calls to those dial codes. Unfortunately, most carriers to not quote rates for US termination by dial code. Instead they quotes rate in terms of OCN, LATA and Tier. Read how to handle this for least cost routing.
Getting a Location Routing Number can be complicated. Here are some tips.
This document describes the requirements that interconnected VoIP providers must obtain to qualify as a service provider according to the STI Policy Administrator guidelines.
This white paper shows how and why the market is growing once again, and how smart companies are using dialers.
Intercarrier compensation refers to the charges that one carrier pays to another carrier to originate, transport, and/or terminate telecommunications traffic.
The presence of many premium rate number service providers competing with attractive payouts and easy terms makes the business model for IRSF fraud lucrative and easy to implement.
Today, many telecommunications companies are expanding their VoIP service by acquiring new networks. This can be an excellent strategy for quick growth. However, it comes with the challenge of integrating the new networks and equipment while keeping costs low.
This guide will help you learn about the different types of telecom fraud and industry best practices for detection and prevention.
VoIP devices are the primary tools used by fraudsters. In the first half of 2012, 46% of fraudulent calls were made from VoIP phones.
Jurisdictional routing is telephone call routing logic based upon the locations of the calling and called number and regulatory considerations.
Least Cost Routing, or LCR, is a process to find the most inexpensive way to route phone calls. It is the process of analyzing, selecting and directing the path of outbound and inbound communications traffic depending on which path delivers the best rates. For example, if a telecom company in Ontario is looking for a calling path to Chicago, they will assess the calling rates for a selection of telecom companies operating in Chicago, then choose the provider that offers the cheapest rate.
Partitioning of NPA-NXX blocks, also known as number pooling, dramatically increased the supply of new numbers for expanding carriers. Learn all about it in this paper.
By authenticating and verifying caller ID, STIR/SHAKEN offers relief from spam robocalls with fake caller ID. But the effectiveness of this approach depends on whether caller ID authentication information survives transit over the telephone network.
Premium rate numbers have a higher than normal rate, and part of that extra charge is paid to the service provider, enabling businesses to be funded by the calls. Internet calls make it easy to use these numbers to monetize telecom fraud. This paper will show you how it works, and how to prevent it.
Unwanted robocalls have made consumers reluctant to answer the telephone. Enterprises struggle to reach their customers—even with calls that their customers want.
What exactly is a session border controller? Read this whitepaper to get the basics.
The SIP INVITE is the foundation for every SIP phone call. It is simple and flexible, but often poorly understood by users. The purpose of this article is to provide a quick and easy reference to the critical headers in a SIP INVITE.
In the STIR/SHAKEN framework, originating service providers, or carriers who provide gateway authentication services for originating service providers, are responsible for authenticating calls. This paper gives a detailed review of how the authentication service works.
STIR (Secure Telephony Identity Revisited) and SHAKEN (Secure Handling of Asserted information using toKENs) are the frameworks that promise to prevent the completion of illegally spoofed calls.
The STIR/SHAKEN framework enables telephone service providers to authenticate and verify caller identities to mitigate caller ID spoofing, a common tactic used in unwanted robocalls. This paper explains how the verification service uses the SIP Identity header and signature provided in a signed call.
VoIP is about convergence, saving money and resources. However, these types of systems also create more inroads for attack.
According to the Federal Trade Commission, telecom fraud continues to account for more fraud complaints each year. New technology has led to an onslaught of new telecom fraud tactics. The latest schemes are difficult to track and investigate because of their frequency, layers of anonymity and global nature.
SIP trunking provides measurable benefits to enterprises by simplifying network elements, enabling new services, and reducing expenses. This paper explains how it works and the benefits it provides.
Criminals and unscrupulous robocallers often alter or spoof the calling number of their outbound telephone calls in order to deceive the called party. This deception can be as simple as changing the calling number so it appears that a neighbor is calling.
The rise of internet technologies like Voice over Internet Protocol (VoIP) has driven businesses to switch to Unified Communications (UC). Learn the benefits and how it works.
Fraudulent activity across VoIP networks is increasing, and will continue to be a major problem for service providers in the coming years. However, with proper planning and maintenance, as well as the proper monitoring tools, this threat can be successfully managed.
You’ve been hit with a telecom fraud attack. Now what? We asked Mark Palchick, an attorney and industry expert with a deep understanding of telecom laws and regulations.