$166k worth of telecom fraud hits small firm

This small architectural firm got hit with a telecom fraud attack. $166,000 losses. In one weekend. Don't let this be you.

Block telecom fraud faster

Blocking telecom fraud attacks can impose a difficult decision: block faster and inflict more false positives or block slower and incur greater fraud losses. You don’t have to settle for these choices.

Carrier solutions for the enterprise

Global health conglomerate Johnson & Johnson reached a vital crossroads in 2005. Its ability to manage a sophisticated telecommunication network and keep expenses in line had become a source of concern.

Certificate management for STIR/SHAKEN

This whitepaper explains the basics of creating and managing keys and certificates in the STIR/SHAKEN framework for secure caller ID. It also recommends certificate management features that enhance a STIR/SHAKEN solution’s reliability and performance.

Deciphering rates

Least cost routing is concerned with analyzing dial codes and the rates carriers charge to complete calls to those dial codes. Unfortunately, most carriers to not quote rates for US termination by dial code. Instead they quotes rate in terms of OCN, LATA and Tier. Read how to handle this for least cost routing.

Delegate certificates improve STIR/SHAKEN

STIR/SHAKEN allows originating service providers to attest to the calling party’s authorization to use a calling number for a call. But what happens in customer-of-customer scenarios, where the provider that issued the number doesn’t know the end customer who was ultimately assigned the number? That’s a situation where delegate certificates can help.

How to get a Location Routing Number

Getting a Location Routing Number can be complicated. Here are some tips.

Innovation in the outbound dialer market

This white paper shows how and why the market is growing once again, and how smart companies are using dialers.

Intercarrier compensation

Intercarrier compensation refers to the charges that one carrier pays to another carrier to originate, transport, and/or terminate telecommunications traffic.

International premium rate number market

The presence of many premium rate number service providers competing with attractive payouts and easy terms makes the business model for IRSF fraud lucrative and easy to implement.

Introduction to geo-intelligent routing

Today, many telecommunications companies are expanding their VoIP service by acquiring new networks. This can be an excellent strategy for quick growth. However, it comes with the challenge of integrating the new networks and equipment while keeping costs low.

Introduction to telecom fraud

This guide will help you learn about the different types of telecom fraud and industry best practices for detection and prevention.

Introduction to VoIP fraud

VoIP devices are the primary tools used by fraudsters. Studies have shown that 46% of fraudulent calls were made from VoIP phones.

Jurisdictional routing

Jurisdictional routing is telephone call routing logic based upon the locations of the calling and called number and regulatory considerations.

Least cost routing challenges

Least Cost Routing, or LCR, is a process to find the most inexpensive way to route phone calls. It is the process of analyzing, selecting and directing the path of outbound and inbound communications traffic depending on which path delivers the best rates. For example, if a telecom company in Ontario is looking for a calling path to Chicago, they will assess the calling rates for a selection of telecom companies operating in Chicago, then choose the provider that offers the cheapest rate.

Number pooling

Partitioning of NPA-NXX blocks, also known as number pooling, dramatically increased the supply of new numbers for expanding carriers. Learn all about it in this paper.

Out-of-Band SHAKEN

Out-of-Band SHAKEN extends the current SHAKEN framework to include service providers using TDM. This enables widespread participation in the SHAKEN ecosystem, which makes it much more effective for everyone.

Rich Call Data and STIR/SHAKEN

Unwanted robocalls have made consumers reluctant to answer the telephone. Enterprises struggle to reach their customers—even with calls that their customers want.

Session Border Controller basics

What exactly is a session border controller? Read this whitepaper to get the basics.

SIP Analytics—The fastest, most precise fraud prevention

It always happens at the worst time. On a holiday weekend. When you are enjoying time with your family, or on a date, or in the middle of the night when you are dead asleep. You get an alert; a fraud attack is in progress.

SIP INVITE header fields

The SIP INVITE is the foundation for every SIP phone call. It is simple and flexible, but often poorly understood by users. The purpose of this article is to provide a quick and easy reference to the critical headers in a SIP INVITE.

STIR/SHAKEN authentication service

In the STIR/SHAKEN framework, originating service providers, or carriers who provide gateway authentication services for originating service providers, are responsible for authenticating calls. This paper gives a detailed review of how the authentication service works.

STIR/SHAKEN overview

STIR (Secure Telephony Identity Revisited) and SHAKEN (Secure Handling of Asserted information using toKENs) are the frameworks that promise to prevent the completion of illegally spoofed calls.

STIR/SHAKEN verification service

The STIR/SHAKEN framework enables telephone service providers to authenticate and verify caller identities to mitigate caller ID spoofing, a common tactic used in unwanted robocalls. This paper explains how the verification service uses the SIP Identity header and signature provided in a signed call.

Telecom fraud detection

VoIP is about convergence, saving money and resources. However, these types of systems also create more inroads for attack.

Telecom fraud prevention guide

According to the Federal Trade Commission, telecom fraud continues to account for more fraud complaints each year. New technology has led to an onslaught of new telecom fraud tactics. The latest schemes are difficult to track and investigate because of their frequency, layers of anonymity and global nature.

The rise of SIP trunking

SIP trunking provides measurable benefits to enterprises by simplifying network elements, enabling new services, and reducing expenses. This paper explains how it works and the benefits it provides.

Understanding STIR/SHAKEN

Criminals and unscrupulous robocallers often alter or spoof the calling number of their outbound telephone calls in order to deceive the called party. This deception can be as simple as changing the calling number so it appears that a neighbor is calling.

Unified Communications

The rise of internet technologies like Voice over Internet Protocol (VoIP) has driven businesses to switch to Unified Communications (UC). Learn the benefits and how it works.

VoIP theft of service

Fraudulent activity across VoIP networks is increasing, and will continue to be a major problem for service providers in the coming years. However, with proper planning and maintenance, as well as the proper monitoring tools, this threat can be successfully managed.

What to do when telecom fraud occurs

You’ve been hit with a telecom fraud attack. Now what? We asked Mark Palchick, an attorney and industry expert with a deep understanding of telecom laws and regulations.