Whitepapers

$166k worth of telecom fraud hits small firm

This small architectural firm got hit with a telecom fraud attack. $166,000 losses. In one weekend. Don't let this be you.

Carrier solutions for the enterprise

Global health conglomerate Johnson & Johnson reached a vital crossroads in 2005. Its ability to manage a sophisticated telecommunication network and keep expenses in line had become a source of concern.

Deciphering rates

Least cost routing is concerned with analyzing dial codes and the rates carriers charge to complete calls to those dial codes. Unfortunately, most carriers to not quote rates for US termination by dial code. Instead they quotes rate in terms of OCN, LATA and Tier. Read how to handle this for least cost routing.

Innovation in the outbound dialer market

This white paper shows how and why the market is growing once again, and how smart companies are using dialers.

International premium rate number market

The presence of many premium rate number service providers competing with attractive payouts and easy terms makes the business model for IRSF fraud lucrative and easy to implement.

Introduction to telecom fraud

This guide will help you learn about the different types of telecom fraud and industry best practices for detection and prevention.

Introduction to geo-intelligent routing

Today, many telecommunications companies are expanding their VoIP service by acquiring new networks. This can be an excellent strategy for quick growth. However, it comes with the challenge of integrating the new networks and equipment while keeping costs low.

Intercarrier compensation

Intercarrier compensation refers to the charges that one carrier pays to another carrier to originate, transport, and/or terminate telecommunications traffic.

Introduction to VoIP fraud

VoIP devices are the primary tools used by fraudsters. In the first half of 2012, 46% of fraudulent calls were made from VoIP phones.

Jurisdictional routing

Jurisdictional routing is another name for call routing decisions based on both the calling and called number. How a call gets rated depends on where the calling party is located and what regulatory body has jurisdiction. Paradoxically intra-state calls cost more than inter-state calls. For a service provider to optimize their least cost routing, they must have multiple tables, one for intra-state calls and a second for inter-state calls.

Least cost routing challenges

Least Cost Routing, or LCR, is a process to find the most inexpensive way to route phone calls. It is the process of analyzing, selecting and directing the path of outbound and inbound communications traffic depending on which path delivers the best rates. For example, if a telecom company in Ontario is looking for a calling path to Chicago, they will assess the calling rates for a selection of telecom companies operating in Chicago, then choose the provider that offers the cheapest rate.

Number pooling

Partitioning of NPA-NXX blocks, also known as number pooling, dramatically increased the supply of new numbers for expanding carriers. Learn all about it in this paper.

Premium rate numbers are begging to be used for telecom fraud

Premium rate numbers have a higher than normal rate, and part of that extra charge is paid to the service provider, enabling businesses to be funded by the calls. Internet calls make it easy to use these numbers to monetize telecom fraud. This paper will show you how it works, and how to prevent it.

SIP INVITE header fields

The SIP INVITE is the foundation for every SIP phone call. It is simple and flexible, but often poorly understood by users. The purpose of this article is to provide a quick and easy reference to the critical headers in a SIP INVITE.

STIR and SHAKEN Overview

STIR (Secure Telephony Identity Revisited) and SHAKEN (Secure Handling of Asserted information using toKENs) are the frameworks that promise to prevent the completion of illegally spoofed calls.

Session Border Controller basics

What exactly is a session border controller? Read this whitepaper to get the basics.

Telecom fraud prevention guide

According to the Federal Trade Commission, telecom fraud continues to account for more fraud complaints each year. New technology has led to an onslaught of new telecom fraud tactics. The latest schemes are difficult to track and investigate because of their frequency, layers of anonymity and global nature.

The rise of SIP trunking

SIP trunking provides measurable benefits to enterprises by simplifying network elements, enabling new services, and reducing expenses. This paper explains how it works and the benefits it provides.

Telecom fraud detection

VoIP is about convergence, saving money and resources. However, these types of systems also create more inroads for attack.

Understanding STIR/SHAKEN

Criminals and unscrupulous robocallers often alter the calling number of their outbound telephone calls in order to deceive the called party. This deception can be as simple as changing the calling number so it appears that a neighbor is calling.

Unified Communications

The rise of internet technologies like Voice over Internet Protocol (VoIP) has driven businesses to switch to Unified Communications (UC). Learn the benefits and how it works.

VoIP security best practices

Fraudulent activity across VoIP networks is increasing, and will continue to be a major problem for service providers in the coming years. However, with proper planning and maintenance, as well as the proper monitoring tools, this threat can be successfully managed.

VoIP theft of service

Fraudulent activity across VoIP networks is increasing, and will continue to be a major problem for service providers in the coming years. However, with proper planning and maintenance, as well as the proper monitoring tools, this threat can be successfully managed.

What to do when telecom fraud occurs

You've been hit with a telecom fraud attack. Now what? We asked Mark Palchick, an attorney and industry expert with a deep understanding of telecom laws and regulations.

 

Clicky