linkedin
menu-close
search-icon
banner
Interconnect-Bypass-fraud

Dealing with Bypass Fraud : Think beyond the boundaries

Amid the fierce competition facing the telecom industry, sometimes we listen to stories how lack of forethought of one Telco brings on illegal traffic on the network, leading to aggressive open wars and blame games among the operators affected by the fraud. The Telecom Regulatory Authority could intervene in such scenarios and encourage a competitor to block suspicious outgoing traffic if it finds out that not enough care is being taken to avert the fraud.

Interconnect Bypass fraud is one such telecom scam costing the industry several billion dollars every year. It brings collateral damage to the networks involved, and the impact will be huge. The Telco could be imposed hefty penalty for its failure to detect and resolve the issue on time. Further, it could bring serious business implications for all participating telcos. In the process of rampant blocking of suspicious traffic, sometimes traffic of genuine customers could get blocked, leading to customer dissonance and dissatisfaction along with loss of other business opportunities.

Here’s an example of a West African Telco who suffered massively due to Bypass fraud.

Why did this happen?

The West African telecom operator had been massively impacted by off-net Bypass fraud where the network of the operator was being misused to land fraudulent calls on the competitor’s network. Over time, the problem became so grave that the Regulatory Authority of the country had to step in and take charge of things. This eventually ended with the competitors blocking both fraudulent and genuine traffic from the Telco affected by the interconnection fraud.

Investigations conducted confirmed that the huge differences between the International termination rates and local termination rates made the environment suitable for fraudsters to run their schemes. There aren’t enough KYC controls in the country to facilitate certain onboarding checks which distinguish a genuine customer from a fraudulent one.

Impact on business

There were multiple warnings and memos issued to the operator from the Regulator, indicating that the operator would have to face penalties if amendments are not made in time.

Customers flooded the operator with complaints saying that their off-net calls were being barred without prior notice and for no fault of theirs and threatened that they would eventually churn out of the network if their services weren’t restored.

The atmosphere grew so tense that instead of cooperating, the operators became more aggressive and indulged in a rat-race in trying to prove a point to the Regulator as to how better and efficient they were from the rivals in terms of detecting Bypass fraud cases.

The solution

With the understanding that Bypass scams are rampant, Telcos need to direct their efforts towards building knowledge-sharing forums where they can share insights on fraudster behavior and geographical locations from where most of the fraudulent calls are generated and what kind of products tend to get misused by these fraudsters to nip things in the bud.

Telcos should understand that indulging in rat race or blaming each other will not help solve issues arising from such frauds; rather they should adopt a proactive approach to identify and prevent such scenarios in future. Instead of the Regulatory authority dictating terms to the operators, the operators must drive the authority to create nationalized framework for user identity governance.

Vijay Amirthraj

Vijay is a Principal Consultant in Subex’s Managed Services vertical, focusing on Fraud Management. He has over 12+ years of experience in Telecom fraud, & Revenue Assurance management professional with  progressive experience in process management and managing risks in telecom business.

Related Post

  • GDPR – A New Road to Trust

    As the May 25th deadline for the European General Data Protection Regulation (GDPR) looms closer many organisations still haven’t made...

  • The GDPR Countdown

    It’s only a few short months till May 25th when the European Union’s GDPR (General Data Protection Regulations) become law. ...

Get Started with Subex