$166k worth of telecom fraud hits small firm

This small architectural firm got hit with a telecom fraud attack. $166,000 losses. In one weekend. Don't let this be you.

Block telecom fraud faster

Blocking telecom fraud attacks can impose a difficult decision: block faster and inflict more false positives or block slower and incur greater fraud losses. You don’t have to settle for these choices.

Carrier solutions for the enterprise

Global health conglomerate Johnson & Johnson reached a vital crossroads in 2005. Its ability to manage a sophisticated telecommunication network and keep expenses in line had become a source of concern.

Certificate management for STIR/SHAKEN

This whitepaper explains the basics of creating and managing keys and certificates in the STIR/SHAKEN framework for secure caller ID. It also recommends certificate management features that enhance a STIR/SHAKEN solution’s reliability and performance.

Deciphering rates

Least cost routing is concerned with analyzing dial codes and the rates carriers charge to complete calls to those dial codes. Unfortunately, most carriers to not quote rates for US termination by dial code. Instead they quotes rate in terms of OCN, LATA and Tier. Read how to handle this for least cost routing.

How to get a Location Routing Number

Getting a Location Routing Number can be complicated. Here are some tips.

How to obtain access to numbering resources

This document describes the requirements that interconnected VoIP providers must obtain to qualify as a service provider according to the STI Policy Administrator guidelines.

Innovation in the outbound dialer market

This white paper shows how and why the market is growing once again, and how smart companies are using dialers.

Intercarrier compensation

Intercarrier compensation refers to the charges that one carrier pays to another carrier to originate, transport, and/or terminate telecommunications traffic.

International premium rate number market

The presence of many premium rate number service providers competing with attractive payouts and easy terms makes the business model for IRSF fraud lucrative and easy to implement.

Introduction to geo-intelligent routing

Today, many telecommunications companies are expanding their VoIP service by acquiring new networks. This can be an excellent strategy for quick growth. However, it comes with the challenge of integrating the new networks and equipment while keeping costs low.

Introduction to telecom fraud

This guide will help you learn about the different types of telecom fraud and industry best practices for detection and prevention.

Introduction to VoIP fraud

VoIP devices are the primary tools used by fraudsters. In the first half of 2012, 46% of fraudulent calls were made from VoIP phones.

Jurisdictional routing

Jurisdictional routing is telephone call routing logic based upon the locations of the calling and called number and regulatory considerations.

Least cost routing challenges

Least Cost Routing, or LCR, is a process to find the most inexpensive way to route phone calls. It is the process of analyzing, selecting and directing the path of outbound and inbound communications traffic depending on which path delivers the best rates. For example, if a telecom company in Ontario is looking for a calling path to Chicago, they will assess the calling rates for a selection of telecom companies operating in Chicago, then choose the provider that offers the cheapest rate.

Number pooling

Partitioning of NPA-NXX blocks, also known as number pooling, dramatically increased the supply of new numbers for expanding carriers. Learn all about it in this paper.

Out-of-Band STIR/SHAKEN call authentication

By authenticating and verifying caller ID, STIR/SHAKEN offers relief from spam robocalls with fake caller ID. But the effectiveness of this approach depends on whether caller ID authentication information survives transit over the telephone network.

Premium rate numbers are begging to be used for telecom fraud

Premium rate numbers have a higher than normal rate, and part of that extra charge is paid to the service provider, enabling businesses to be funded by the calls. Internet calls make it easy to use these numbers to monetize telecom fraud. This paper will show you how it works, and how to prevent it.

Rich Call Data and STIR/SHAKEN

Unwanted robocalls have made consumers reluctant to answer the telephone. Enterprises struggle to reach their customers—even with calls that their customers want.

Session Border Controller basics

What exactly is a session border controller? Read this whitepaper to get the basics.

SIP INVITE header fields

The SIP INVITE is the foundation for every SIP phone call. It is simple and flexible, but often poorly understood by users. The purpose of this article is to provide a quick and easy reference to the critical headers in a SIP INVITE.

STIR/SHAKEN authentication service

In the STIR/SHAKEN framework, originating service providers, or carriers who provide gateway authentication services for originating service providers, are responsible for authenticating calls. This paper gives a detailed review of how the authentication service works.

STIR/SHAKEN overview

STIR (Secure Telephony Identity Revisited) and SHAKEN (Secure Handling of Asserted information using toKENs) are the frameworks that promise to prevent the completion of illegally spoofed calls.

STIR/SHAKEN verification service

The STIR/SHAKEN framework enables telephone service providers to authenticate and verify caller identities to mitigate caller ID spoofing, a common tactic used in unwanted robocalls. This paper explains how the verification service uses the SIP Identity header and signature provided in a signed call.

Telecom fraud detection

VoIP is about convergence, saving money and resources. However, these types of systems also create more inroads for attack.

Telecom fraud prevention guide

According to the Federal Trade Commission, telecom fraud continues to account for more fraud complaints each year. New technology has led to an onslaught of new telecom fraud tactics. The latest schemes are difficult to track and investigate because of their frequency, layers of anonymity and global nature.

The rise of SIP trunking

SIP trunking provides measurable benefits to enterprises by simplifying network elements, enabling new services, and reducing expenses. This paper explains how it works and the benefits it provides.

Understanding STIR/SHAKEN

Criminals and unscrupulous robocallers often alter or spoof the calling number of their outbound telephone calls in order to deceive the called party. This deception can be as simple as changing the calling number so it appears that a neighbor is calling.

Unified Communications

The rise of internet technologies like Voice over Internet Protocol (VoIP) has driven businesses to switch to Unified Communications (UC). Learn the benefits and how it works.

VoIP theft of service

Fraudulent activity across VoIP networks is increasing, and will continue to be a major problem for service providers in the coming years. However, with proper planning and maintenance, as well as the proper monitoring tools, this threat can be successfully managed.

What to do when telecom fraud occurs

You’ve been hit with a telecom fraud attack. Now what? We asked Mark Palchick, an attorney and industry expert with a deep understanding of telecom laws and regulations.