TCG BYPASS DETECTION
Search, detect and act against bypass fraud using our global TCG footprint
THE CHALLENGE
The telecommunications industry continues to suffer enormous financial losses due to bypass operator activity. The rapid detection of bypass fraud is essential to blocking and disrupting the bypass operators activities.
International Bypass Fraud & SIM Box Activity
Bypass fraud is the deliberate routing of voice traffic for in-country termination to avoid international toll gateway interconnection points. Calls are diverted over alternate routes and placed on the terminating network at the cheapest call rate possible.
The presence of bypass prevents the destination network from collecting valid billable incoming international minutes. The bypass network (BPN) is established as an unlicensed operation, thus operating outside regulatory, legal, commercial and other government controls.
Bypass Fraud Types
- OTT Application – Originating subscriber calls an E164 number but the call is hijacked and terminated on an OTT application.
- Preferred Partner Refiling – Where a CLI is changed by one of the interconnect partners / fraudster to mislead the terminating network.
- Re-Originating Calling – Traditional MSC SIM box bypass. International call is hijacked and the final leg is terminated as a local call.
- Unsanctioned or Ghost Routing – Call passed to the terminating network via a misconfigured or unsanctioned route.
Our Answer to Bypass Detection
Osprey™ TCG
Generate independent data-driven traffic, verifying the routing and termination of real test events. Detect voice and SMS bypass MSISDNs, integrating with your FMS. Bypass testing with TCG is available as a standalone service.
Osprey™ TCG Powered by Imperium™ Analytics
Use Imperium™ CDR data analytics to intelligently seed Osprey™ TCG testing. Quantify the positive impact of bypass detection and blocking.
Request A TCG Bypass Demonstration
Due to the sensitive nature of bypass detection, unfortunately we cannot expand on how we detect bypass. For example, our countermeasures to avoid detection, our investigation techniques etc. We recommend instead that you get in touch with us directly so that we can demonstrate how it works.