Advertisement

Detecting and Combating Internet Telephony Fraud

  • Colin DuffyEmail author
  • Richard Timothy Coupe
Chapter
  • 138 Downloads

Abstract

The purpose of this chapter is to understand the characteristics of two forms of internet telephony fraud: remote hacking of telephones that are connected to the internet and the use of stolen credit and debit cards to register as an internet telephone customer. In both types, fraudsters call revenue-sharing numbers, which are often located in overseas countries with high levels of corruption. The fraudsters themselves own or take a share of the revenues, generated when charges are paid, as they must be according to international telephonic agreements. The chapter compares the principal characteristics of fraudulent and non-fraudulent calls in order to further our understanding of how to prevent this crime. The potential for exploiting these offences’ solvability in order to identify and arrest offenders is also considered.

Keywords

Internet telephony fraud Hacking Debit and credit card fraud Cybercrime 

References

  1. Body of European Regulators for Electronic Communications. (2013). Article 28(2) USD Universal Service Directive: A harmonised BEREC cooperation process—BEREC Guidance Paper. BoR, 13, 37.Google Scholar
  2. BT Group. (2015). International tariff guide for residential customers. http://www.bt.com/static/wa/account/pricechanges/International_Tariff_Guide.pdf?s_cid=con_FURL_internationalpricing. Accessed February 2, 2015.
  3. Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588–608.CrossRefGoogle Scholar
  4. CommsBusiness. (2015). BT set firm date to switch off ISDN network! http://commsbusiness.co.uk/news/bt-set-firm-date-to-switch-off-isdn-network/. Accessed August 24, 2015.
  5. Communications Fraud Control Association. (2013). 2013 global fraud loss survey. http://www.cfca.org. Accessed June 10, 2014.
  6. Fossi, M., Johnson, E., Turner, D., Mack, T., Blackbird, J., McKinney, D., et al. (2008). Symantec report on the underground economy July 07–June 08. http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_underground_economy_report_11-2008-14525717.en-us.pdf. Accessed February 4, 2018.
  7. Gauci, S. (2008). Storming SIP security. https://resources.enablesecurity.com/resources/22_29_storming_sip.pdf. Accessed November 9, 2014.
  8. GSM Association. (2007). GSMA speeds up the transfer of roaming call records. Press release. http://www.gsma.com/newsroom/press-release/gsma-speeds-up-the-transfer-of-roaming-call-records/. Accessed October 7, 2015.
  9. Holt, T., & Lampke, J. (2010). Exploring stolen data markets online: Products and market forces. Criminal Justice Studies: A Critical Journal of Crime, Law and Society, 23(1), 33–50.CrossRefGoogle Scholar
  10. International Telecommunication Union, Telecommunication Standardization Sector. (2012). Resolution 61—Countering and combating misappropriation and misuse of international telecommunication numbering resources. Resolution approved at World Telecommunication Standardization Assembly, November 20–29, 2012, Dubai.Google Scholar
  11. Internet World Statistics. (2004, Q4). World internet usage and population statistics. http://www.internetworldstats.com/stats.htm. Accessed August 23, 2014.
  12. National Fraud Authority. (2013). Annual fraud indicator. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/206552/nfa-annual-fraud-indicator-2013.pdf. Accessed March 30, 2015.
  13. SIPVicious. (2012). Blog. http://blog.sipvicious.org. Accessed January 29, 2015.
  14. Telecommunications UK Fraud Forum. (2015). www.tuff.co.uk. About Us. Accessed April 10, 2015.
  15. Transparency International. (2014). Corruption Perceptions Index 2013. https://www.transparency.org/cpi2013/results. Accessed June 22, 2014.
  16. Wall, D. S. (2003). Mapping out cybercrimes in a cyberspatial surveillant assemblage. In F. Webster & K. Ball (Eds.), The intensification of surveillance: Crime, terrorism, and warfare in the information age (pp. 112–136). London: Pluto.Google Scholar
  17. Wood, N. (2014). Telekom Austria migrates to VoIP. http://www.totaltele.com/view.aspx?ID=485461. Accessed June 6, 2014.

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.iNet Telecom Ltd. (Voipfone)LondonUK
  2. 2.University of CambridgeCambridgeUK

Personalised recommendations