FRAUD ASSURANCE
Fraud Assurance that helps you search, detect and act against fraud using our global TCG footprint
Telecom Fraud
For many years, the telecommunications industry has suffered enormous losses due to fraudulent activities which continues to grow and evolve. Fraudster attack vectors can include weak processes, missing controls, technical weaknesses and of course by exploiting people.
Roscom have supported many global clients with Fraud Assurance activities. Below are the risk areas we currently assure…

Fraud Assurance Risk Areas
International Revenue Share Fraud
International Revenue Share Fraud (IRSF) costs businesses nearly five billion dollars each year. Fraudsters make money by generating bogus phone calls to international premium rate numbers you have paid for as a business.
Premium rate number services are a popular business model because they are so easy to use and simple to put in place. But it’s the simplicity which makes them a lucrative target for fraudsters. The caller is faced with a large bill for the unauthorised calls while the cheats collect a pay-out from the company that owns the premium rate number. They win You lose.
Top 5 International Revenue Share Fraud scams:
- Taking advantage of an unintended or misconfigured cheap calling rate to the terminating party, allowing the terminating party to collect more revenue than the originating party spends making the call.
- Making the call on someone else’s account. Typically using a stolen handset or hacked PBX.
- Tricking a normal subscriber into calling a revenue share number (E.g. Wangiri)
- Setting up a post-pay subscriber with no intention of ever paying the bill.
- Acquiring free airtime through stolen top-ups or internal fraud.

International & Domestic Bypass Fraud & SIM Box Activity
Bypass fraud is the deliberate routing of voice traffic for in-country termination to avoid international toll gateway interconnection points. Calls are diverted over alternate routes and placed on the terminating network at the cheapest call rate possible.
The presence of bypass prevents the destination network from collecting valid billable incoming international minutes. The bypass network (BPN) is established as an unlicensed operation, thus operating outside regulatory, legal, commercial and other government controls.
Bypass Fraud Types
- OTT Application – Originating subscriber calls an E164 number but the call is hijacked and terminated on an OTT application.
- Preferred Partner Refiling – Where a CLI is changed by one of the interconnect partners / fraudster to mislead the terminating network.
- Re-Originating Calling – Traditional MSC SIM box bypass. International call is hijacked and the final leg is terminated as a local call.
- Unsanctioned or Ghost Routing – Call passed to the terminating network via a misconfigured or unsanctioned route.

Our Fraud Assurance Solution
The Process
- Establish a baseline of fraud activity
- Target, track and trace high profile anomalies
- Certify your compliance through independent verification and quantification
Our Solution
Identify and report complex fraud issues using our in-house developed technology & techniques. It’s all in the detail – Big-data Analytics, end to end reconciliation, independent tracking/monitoring, delivering unique anomaly identification and much more.
Our Tools
Osprey™ Analytics
Uses your data to enrich and quantify your fraud testing landscape with real customer journeys.
Osprey™ TCG
Generate independent analytic-driven traffic, verifying the routing and termination of real events.
Osprey™ Reconciliation
Uses end to end data sources to reconcile and validate traffic against consumer and wholesales revenue streams that are commonly exploited by fraudsters.