https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • MSP 501 Rankings
    • NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Channel Futures 20: Top Tech Providers
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2023 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Technology Advisor 101 (TA 101)
    • Channel Leaders Lists
  • Events
    • Back
    • 2023 Call for Speakers
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • MSP 501 Rankings
    • NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Channel Futures 20: Top Tech Providers
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2023 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Technology Advisor 101 (TA 101)
    • Channel Leaders Lists
  • Events
    • Back
    • 2023 Call for Speakers
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Agents
  • Cloud Service Providers
  • Channel Partners Events
 Channel Futures

Telephony/UC/Collaboration


Cutting Telecom Fraud May Impede Terrorists

  • Written by Channel
  • June 30, 2004




By Frances Feld, CAE

The fight against telecommunications

fraud is not solely about staving off substantial revenue losses - $35 billion to $40 billion, according the Communications Fraud Control Association’s 2003 survey of carriers in 26 countries. It also is about preventing telephone companies from being unwitting accessories to crimes and terrorism.

If it were possible to stop telecom fraud tomorrow, many criminals and terrorists would find their anonymous communications for planning, funding, recruiting and procuring supplies severely restricted. The tighter and faster the clamps on subscription fraud, the more exposed are those who require anonymity.

This is not a plea for greater governmental surveillance. That complex matter will be debated in other venues. But the sharp point of government’s sword must have enough power - in the hands of law-abiding enforcement officers - to rapidly pin down the criminal. Wiretapping rightfully raises some warning flags, but it remains a powerful lawenforcement tool for stopping the myriad subsequent crimes that stolen phone time enables. The enemy is no glibly identifiable demographic group.

It is a perilous combination of technical capability and malicious mindset. In the late 1990s, hackers broke into Massachusetts phone systems to disconnect an airport control tower. Another jammed emergency 911 phone lines in Florida. There was no political or monetary gain. These vandals knowingly put human lives at risk for cyber-glory among peers.

HOW DOES THE CRIMINAL NET WORK?

What terrorist would coordinate his work from a home or cell phone he obtained using his own name, driver’s license, address and Social Security number? Obviously, the answer is none. So identity theft is one way a terrorist can establish anonymous phone service he can use for harmful ends. The new identity, now backed by a phone number, enables the subsequent crime of credit-card fraud for lodging, transport and supplies.

In a presentation for a 2000 symposium, Dr. Peter Grabowsky of the Australian Institute of Criminology called PBX/PABX hijacking “a major criminal industry.”

“Information technology,” he said, “has begun to provide criminal opportunities of which Willie Sutton would never have dreamed.” Those opportunities have proved to be equally clear to domestic terrorists, Al Qaeda and organized crime.

The fraudster may be a simple reseller of time hijacked from a local PBX. Hired hackers, for example, once broke into AT&T Corp., GTE, Sprint Corp. and other carriers to harvest calling-card numbers that eventually were sold to organized crime in Italy. The FBI estimated these phone companies were robbed of $2 million in calls. This estimate does not include the incalculable cost of havoc wreaked as a result of anonymous phone time used by criminals or Italian terrorist cells.

Sometimes the fraudsters are themselves terrorists: In the summer of 2002, The Detroit Free Press reported four men arrested that year were members of a “sleeper combat cell that conspired to help plot terrorist attacks.” A fifth conspirator “Abdella,” an expert in the fraudulent use of telephone calling cards, remains at large. More recently, London’s Telegraph newspaper reported that terrorists responsible for Madrid’s March 11 train attacks “used stolen telephone and credit cards for communications back to Pakistan, Afghanistan, Lebanon, etc.”

With the help of diligent carriers, such perpetrators can be stymied. In Brazil, for example, electronics store owner Mohammed Hassan Atwi was arrested in 2002 for selling calls from his clandestine switch. The collar was made possible through the aid of Cliff Jordan, manager of fraud control prevention at Embratel SA, who worked with the Brazilian federal police. Atwi is suspected of paying extortion money to convicted mobster-terrorist Assad Amad Barakat who ran the Lebanese mafia in the tri-border area of Argentina, Brazil and Paraguay. When Interpol raided Barakat’s residence in Ciudad del Este, Paraguay, they found pro-terrorist pamphlets, training videos and bank records showing Barakat had transferred $50 million to Hezbollah. Atwi’s phone fraud proceeds are believed to have been funneled through Barakat to fund Hezbollah’s work.

Even before the Sept. 11, 2001, attacks on the United States, Embratel’s Jordan reports his team fought rising fraudulent call volumes to Saudi Arabia, Iraq, Iran, Lebanon, Kenya, India, Pakistan and Bangladesh. “We knew they were selling our stolen network time to buy drugs for resale and to coordinate illegal arms traffic,” says Jordan. Immediately after 9/11, Brazilian federal police asked Embratel and competitor Intelig for help, Jordan says. He said police response time on phone fraud busts dropped from three weeks to two hours. These “telecom fraudsters” primarily were terrorists, funders of terrorism and drug traffickers. Accordingly, arresting them for telecom fraud choked off related crimes.

WHERE’S THE BUDGET?

Just when telco security budgets should be increased, many are shrinking. Some carriers willingly “live with” a certain amount of fraud because “it’s too expensive to stop the rest.” There are two problems with that view. One, the remaining fraud problem may seem small precisely because those carriers do not have the resources to know how much red ink is bleeding from veins they do not know are cut. And, two, it is now more clear there is a public safety aspect to squelching phone fraud; the remaining decimal points of stolen time might be the hours used by terrorists.

Strangling those apparent “last few hundredths of a percent” may catch more fraudsters than carriers suspect are hiding in their network. Considering ROI alone, the money saved may well justify replenishing security budgets.

Stiffer penalties also may be a deterrent. Cybercrime penalties are often greater because they can be far more expensive than other white-collar crimes. In Georgia, for example, computer crimes carry up to 15 years incarceration and a $50,000 fine, while in Minnesota first-degree cellular counterfeiting may draw a maximum of five years and a $10,000  fine. If telephone fraud can be classified more often as cybercrime to invoke tougher laws, perhaps fewer opportunists will take up telecom fraud.

Widening the usual definition of “data” - as defined in anti-computer-hacking laws - to include telephone signals is well justified empirically; the common denominators between voice and alphanumeric text outweigh distinctions. Emotionally, however, it is more unsettling to many for lawmakers to enable access to voice communications than to financial records or even e-mail.

Civil liberty concerns arise, but I believe they can be overcome with proper safeguards.

As with many laws, sentencing bodies would need to draw a distinction between a precocious adolescent out to impress misguided friends, versus a money-motivated criminal, versus a knowing and malicious terrorist.

Many foreign governments are taking up the charge. Brazil’s police developed an immediate response time to phone fraud after 9/11. The Associated Press reports that, after Daniel Pearl’s assassination, a Pakistani security agency launched a special wing to combat cyber crimes partially because local agencies were unable to trace emails from Pearl’s kidnappers without help from U.S. investigators.

Despite these commendable efforts, no government has the resources to pursue every instance. The U.S. Department of Justice in 2002 investigated 814 computer intrusions or hackers, but their pending list contained 1,956.

WHAT CAN BE DONE?

Slowing any crime involves public education.

Today, in many circles, it’s a winking crime to use stolen telephone time. Instead, stealing telephone time should be associated in the public’s mind with crimes that accompany it, including terrorism. The same fraudster who sells stolen time to a rowdy teenager will sell the next hour to a militant racist.

Police departments and private anti-drug groups give lectures in schools and set up educational kiosks at fairs or malls. Many carriers also have invested in consumer fraud awareness campaigns that have included bill inserts, newspaper, radio, television and special sections on their Web sites that inform consumers of the latest scams.

To fill the information gap, CFCA provides educational resources and conferences to equip carriers and law enforcement organizations to identify illegal long-distance storefronts and other telecom thieves. The CFCA’s educational conferences have addressed topics that range from identifying fraudulent calling patterns through billing anomalies, neural network technology and SS7 driven fraud systems. Some educational sessions aid carriers and law enforcement in capturing and presenting specific Title 18 violations for criminal prosecution of fraudsters.

Improved cross-border information sharing also could help. In May 2004, when ministers for justice and home affairs of the G8 - Japan, Russia, United Kingdom, France, Italy, Germany, United States and Canada - met in Washington D.C., they focused on the need for cooperation and intelligence- sharing to tackle international terrorism, organized crime and corruption. British Home Office Minister Hazel Blears said, “Close cooperation is vital if we are to succeed against those people who seek to destroy our freedoms and way of life.” Recommendations included “improved cross-border sharing of intelligence information to prevent and disrupt terrorist activities.”

In this capacity, CFCA also seeks to help carriers cross competitive barriers that sometimes arise. Its memberships, continuing professional education and certification are open to industry professionals. Members-only sections of the CFCA Web site, weekly Fraud Alerts, conferences and meetings give telecom carriers an open and non-competitive venueand the newest tools and strategies-for secure “crossborder sharing of intelligence.”

Frances Feld, CAE has served as executive director of CFCA for 11 years. She can be reached at + 1 602 265 2322.

Links

Communications Fraud Control Association  www.cfca.org

Tags: Agents Telephony/UC/Collaboration

Most Recent


  • call for speakers
    Channel Futures Leadership Summit Call for Speakers Open
    Speaker applications for “The New Style of Leadership” are open until July 3.
  • Microsoft Teams
    UJET Contact Center Platform Integrates with Microsoft Teams
    The aim is to enhance first contact resolution and customer satisfaction.
  • Dell Technologies World
    Dell Technologies World: 5 Top Customer Challenges
    There are five big challenges that customers are grappling with, according to Dell Technologies’ co-COO, Chuck Whitten.
  • endpoint security
    Endpoint Protection Provider Signs Avant in TSD Expansion
    Xcitium's vice president of strategic partnerships said Avant is leading the TSD channel in cybersecurity.

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • Welcome Mat
    Ex-Telarus Exec Scott Forbush Leaves Upstack for PPT Solutions After 5 Months
  • Woman with questions
    Should We Just Call Master Agents Distributors?
  • Benefit, Plus Sign
    TBI, Avant Add New Cloud, Security Suppliers to Lineups
  • CIO
    ScanSource Hires New CIO to Lead Global IT Strategy

Upcoming Events

View all

Channel Partners Europe

June 13, 2023 - June 14, 2023

Channel Futures Leadership Summit

October 30, 2023 - November 2, 2023

Channel Partners Conference & Expo

March 11, 2024 - March 14, 2024

Galleries

View all

Survey: Backups Are Prime Targets for Ransomware Attacks, Most Remain Exposed

May 26, 2023

Faces of the Partner: 6 New Tech Advisors Entering the Channel

May 26, 2023

Broadcom-VMware, Alibaba Cloud, Red Hat, Google Cloud: A Hefty Roundup

May 24, 2023

Industry Perspectives

View all

Dell Technologies World: Dell Apex Expanded Across On-Premises, Cloud and Edge

May 22, 2023

Identity Is Increasingly Valuable – and Targeted

May 18, 2023

Gaining a Competitive Advantage through AV Managed Services

May 10, 2023

Webinars

View all

From Problem to Profit: Mastering the Science of Selling Using Business Outcomes

May 9, 2023

Meet the 2023 Channel Futures Channel Influencers

April 13, 2023

DE&I Dialogue: How the Right DE&I Initiatives Can Propel Your Business

April 5, 2023

White Papers

View all

6 UCaaS Reseller Challenges and How Real World Businesses Solved Them

February 1, 2023

Frost Radar: North American UCaaS Market, 2022

February 1, 2023

The Complete Guide to White-Label UCaaS for Reseller Success

February 1, 2023

Channel Futures TV

View all

Coffee with Craig and James Episode No. 123: MartinWolf M&A Advisors, CP Expo Preview

UScellular Takes On Rivals with Partner Program Simplicity

April 21, 2023

OpenText Simplifying Deal Registration, Doubling Down on MDF

April 21, 2023

Everything-as-a-Service: CloudBlue Touts Critical Customer Transition

April 18, 2023

Twitter

ChannelFutures

Who has been a diversity, equity & inclusion role model in your career? Take a moment to honor their initiatives in… twitter.com/i/web/status/1…

May 29, 2023
ChannelFutures

Paul Green @msp_voice will help MSPs gain more #customers and #sales at @ChannelEurop June 13.… twitter.com/i/web/status/1…

May 26, 2023
ChannelFutures

.@coalesceIO unveils revamped partner program. #datatransformation dlvr.it/SphJm4 https://t.co/s7fYAVmFGD

May 26, 2023
ChannelFutures

.@Veeam #Ransomeware survey: backups are not adequately protected, 85% suffered at least 1 attack in past year… twitter.com/i/web/status/1…

May 26, 2023
ChannelFutures

.@MSPSummit call for speakers is open now through July 3. The theme for this year’s summit is “The New Style of Lea… twitter.com/i/web/status/1…

May 26, 2023
ChannelFutures

Channel Futures interviewed six individuals who started an agency in the last two years. dlvr.it/SpgV6l https://t.co/JXKhJcw31A

May 26, 2023
ChannelFutures

Channel Futures interviewed six individuals who started an agency in the last two years. dlvr.it/SpgTQg https://t.co/7eIp0XgwQ2

May 26, 2023
ChannelFutures

Channel Futures interviewed six individuals who started an agency in the last two years. dlvr.it/Spg7JZ https://t.co/ETaeFysCYO

May 26, 2023

MSP 501

The industry's largest and most comprehensive partner awards program.

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Galleries

Educational slide shows and images from live events.

Media Kit And Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Events
  • Telecoms.com
  • MSP 501
  • Black Hat
  • IoT World Today
  • Omdia

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X