Whitepapers

$166k worth of telecom fraud hits small firm

This small architectural firm got hit with a telecom fraud attack. $166,000 losses. In one weekend. Don't let this be you.

Carrier solutions for the enterprise

Global health conglomerate Johnson & Johnson reached a vital crossroads in 2005. Its ability to manage a sophisticated telecommunication network and keep expenses in line had become a source of concern.

Certificate management for STIR/SHAKEN

This whitepaper explains the basics of creating and managing keys and certificates in the SHAKEN framework for secure caller ID. It also recommends certificate management features that enhance a SHAKEN solution’s reliability and performance.

Deciphering rates

Least cost routing is concerned with analyzing dial codes and the rates carriers charge to complete calls to those dial codes. Unfortunately, most carriers to not quote rates for US termination by dial code. Instead they quotes rate in terms of OCN, LATA and Tier. Read how to handle this for least cost routing.

Intercarrier compensation

Intercarrier compensation refers to the charges that one carrier pays to another carrier to originate, transport, and/or terminate telecommunications traffic.

Introduction to telecom fraud

This guide will help you learn about the different types of telecom fraud and industry best practices for detection and prevention.

Introduction to VoIP fraud

VoIP devices are the primary tools used by fraudsters. In the first half of 2012, 46% of fraudulent calls were made from VoIP phones.

Introduction to geo-intelligent routing

Today, many telecommunications companies are expanding their VoIP service by acquiring new networks. This can be an excellent strategy for quick growth. However, it comes with the challenge of integrating the new networks and equipment while keeping costs low.

International premium rate number market

The presence of many premium rate number service providers competing with attractive payouts and easy terms makes the business model for IRSF fraud lucrative and easy to implement.

Innovation in the outbound dialer market

This white paper shows how and why the market is growing once again, and how smart companies are using dialers.

Jurisdictional routing

Jurisdictional routing is telephone call routing logic based upon the locations of the calling and called number and regulatory considerations.

Least cost routing challenges

Least Cost Routing, or LCR, is a process to find the most inexpensive way to route phone calls. It is the process of analyzing, selecting and directing the path of outbound and inbound communications traffic depending on which path delivers the best rates. For example, if a telecom company in Ontario is looking for a calling path to Chicago, they will assess the calling rates for a selection of telecom companies operating in Chicago, then choose the provider that offers the cheapest rate.

Number pooling

Partitioning of NPA-NXX blocks, also known as number pooling, dramatically increased the supply of new numbers for expanding carriers. Learn all about it in this paper.

Premium rate numbers are begging to be used for telecom fraud

Premium rate numbers have a higher than normal rate, and part of that extra charge is paid to the service provider, enabling businesses to be funded by the calls. Internet calls make it easy to use these numbers to monetize telecom fraud. This paper will show you how it works, and how to prevent it.

STIR and SHAKEN Overview

STIR (Secure Telephony Identity Revisited) and SHAKEN (Secure Handling of Asserted information using toKENs) are the frameworks that promise to prevent the completion of illegally spoofed calls.

Session Border Controller basics

What exactly is a session border controller? Read this whitepaper to get the basics.

SIP INVITE header fields

The SIP INVITE is the foundation for every SIP phone call. It is simple and flexible, but often poorly understood by users. The purpose of this article is to provide a quick and easy reference to the critical headers in a SIP INVITE.

Telecom fraud prevention guide

According to the Federal Trade Commission, telecom fraud continues to account for more fraud complaints each year. New technology has led to an onslaught of new telecom fraud tactics. The latest schemes are difficult to track and investigate because of their frequency, layers of anonymity and global nature.

The rise of SIP trunking

SIP trunking provides measurable benefits to enterprises by simplifying network elements, enabling new services, and reducing expenses. This paper explains how it works and the benefits it provides.

Telecom fraud detection

VoIP is about convergence, saving money and resources. However, these types of systems also create more inroads for attack.

Understanding STIR/SHAKEN

Criminals and unscrupulous robocallers often alter the calling number of their outbound telephone calls in order to deceive the called party. This deception can be as simple as changing the calling number so it appears that a neighbor is calling.

Unified Communications

The rise of internet technologies like Voice over Internet Protocol (VoIP) has driven businesses to switch to Unified Communications (UC). Learn the benefits and how it works.

VoIP security best practices

Fraudulent activity across VoIP networks is increasing, and will continue to be a major problem for service providers in the coming years. However, with proper planning and maintenance, as well as the proper monitoring tools, this threat can be successfully managed.

VoIP theft of service

Fraudulent activity across VoIP networks is increasing, and will continue to be a major problem for service providers in the coming years. However, with proper planning and maintenance, as well as the proper monitoring tools, this threat can be successfully managed.

What to do when telecom fraud occurs

You've been hit with a telecom fraud attack. Now what? We asked Mark Palchick, an attorney and industry expert with a deep understanding of telecom laws and regulations.

 

Clicky