Abstract
The purpose of this chapter is to understand the characteristics of two forms of internet telephony fraud: remote hacking of telephones that are connected to the internet and the use of stolen credit and debit cards to register as an internet telephone customer. In both types, fraudsters call revenue-sharing numbers, which are often located in overseas countries with high levels of corruption. The fraudsters themselves own or take a share of the revenues, generated when charges are paid, as they must be according to international telephonic agreements. The chapter compares the principal characteristics of fraudulent and non-fraudulent calls in order to further our understanding of how to prevent this crime. The potential for exploiting these offences’ solvability in order to identify and arrest offenders is also considered.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Body of European Regulators for Electronic Communications. (2013). Article 28(2) USD Universal Service Directive: A harmonised BEREC cooperation process—BEREC Guidance Paper. BoR, 13, 37.
BT Group. (2015). International tariff guide for residential customers. http://www.bt.com/static/wa/account/pricechanges/International_Tariff_Guide.pdf?s_cid=con_FURL_internationalpricing. Accessed February 2, 2015.
Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588–608.
CommsBusiness. (2015). BT set firm date to switch off ISDN network! http://commsbusiness.co.uk/news/bt-set-firm-date-to-switch-off-isdn-network/. Accessed August 24, 2015.
Communications Fraud Control Association. (2013). 2013 global fraud loss survey. http://www.cfca.org. Accessed June 10, 2014.
Fossi, M., Johnson, E., Turner, D., Mack, T., Blackbird, J., McKinney, D., et al. (2008). Symantec report on the underground economy July 07–June 08. http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_underground_economy_report_11-2008-14525717.en-us.pdf. Accessed February 4, 2018.
Gauci, S. (2008). Storming SIP security. https://resources.enablesecurity.com/resources/22_29_storming_sip.pdf. Accessed November 9, 2014.
GSM Association. (2007). GSMA speeds up the transfer of roaming call records. Press release. http://www.gsma.com/newsroom/press-release/gsma-speeds-up-the-transfer-of-roaming-call-records/. Accessed October 7, 2015.
Holt, T., & Lampke, J. (2010). Exploring stolen data markets online: Products and market forces. Criminal Justice Studies: A Critical Journal of Crime, Law and Society, 23(1), 33–50.
International Telecommunication Union, Telecommunication Standardization Sector. (2012). Resolution 61—Countering and combating misappropriation and misuse of international telecommunication numbering resources. Resolution approved at World Telecommunication Standardization Assembly, November 20–29, 2012, Dubai.
Internet World Statistics. (2004, Q4). World internet usage and population statistics. http://www.internetworldstats.com/stats.htm. Accessed August 23, 2014.
National Fraud Authority. (2013). Annual fraud indicator. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/206552/nfa-annual-fraud-indicator-2013.pdf. Accessed March 30, 2015.
SIPVicious. (2012). Blog. http://blog.sipvicious.org. Accessed January 29, 2015.
Telecommunications UK Fraud Forum. (2015). www.tuff.co.uk. About Us. Accessed April 10, 2015.
Transparency International. (2014). Corruption Perceptions Index 2013. https://www.transparency.org/cpi2013/results. Accessed June 22, 2014.
Wall, D. S. (2003). Mapping out cybercrimes in a cyberspatial surveillant assemblage. In F. Webster & K. Ball (Eds.), The intensification of surveillance: Crime, terrorism, and warfare in the information age (pp. 112–136). London: Pluto.
Wood, N. (2014). Telekom Austria migrates to VoIP. http://www.totaltele.com/view.aspx?ID=485461. Accessed June 6, 2014.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Duffy, C., Coupe, R.T. (2019). Detecting and Combating Internet Telephony Fraud. In: Coupe, R., Ariel, B., Mueller-Johnson, K. (eds) Crime Solvability Factors. Springer, Cham. https://doi.org/10.1007/978-3-030-17160-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-17160-5_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-17159-9
Online ISBN: 978-3-030-17160-5
eBook Packages: Law and CriminologyLaw and Criminology (R0)