TELECOMMUNICATIONS FRAUD ANALYSIS

A 2 day workshop focusing on the analysis of telecoms fraud analysis. Students will be introduced to advanced critical thinking skills and practical charting methods to uncover meaning from complex data.

This course follows the original Anacapa Science Analysis theory and enables the student to apply critical thinking skills to complex telecom fraud scenarios. Students will receive content drawn from the Industry Qualification in Telecommunications Fraud (IQTF) qualification. This qualification was originally designed by the GSMA and has been running continuously since 2001. Students will be taught appropriate strategies to tackle specific telecommunication frauds, various charting techniques and hypothesis development.

Course Aims

Who Should Attend

Designed for those tasked with the prevention, investigation or analysis of telecoms fraud whether internal or external.

Learning Outcomes

  • At the conclusion of the course the student should be able to:-
  • • Identify elements of the fraud triangle
  • o By understanding the three critical elements required to commit a fraud analysts are able to identify opportunities to prevent and detect issues.
  • • Use the intelligence cycle
  • o This internationally recognised model is the corner stone of all fraud intelligence work. Students will be taught how to set appropriate strategies in line with competing demands of the business.
  • o Production of collections plans and gathering quality data in a more timely fashion.
  • o Critically evaluate data to establish its validity and integrity.
  • o Identify the various products of analysis and establish the most appropriate method to tackle specific telecom frauds.
  • • Work with the analysis cycle
  • o The analysis cycle teaches students to use an internationally recognised method of analysing data to enable business decisions to be made with the best available data.
  • • Produce charts from complex data including
  • o Link association/network
  • ? Establishing the persons/partners or business involved in a fraud is the first step to understanding the complex relationships involved in many frauds. Once it is established what entities are involved and where gaps in the intelligence exist analysts can target information gaps to establish the full extent of the network.
  • o Commodity flow
  • ? Whether dealing with IRSF, PRS or subscription fraud understanding the flow of the money and or goods often identifies key players within complex frauds. The saying ‘Follow the money’ has the same significance today as it has always had.
  • o Event/timeline
  • ? If the business suffers a fraudulent act then understanding what happened and when it happened is vital in establishing key vulnerabilities, identifying evidence and highlighting process weaknesses. This technique pieces together the timeline producing a forensic map of the incident allowing the current investigation to establish every fact and, post incident, decision makers can identify areas of process improvement to prevent subsequent losses.
  • o Activity/process analysis
  • ? This technique analyses the question of ‘What happened and How it was achieved. A detailed analysis of the fraudulent process, for example PRS fraud or identity fraud will reveal the critical path of the fraudster and identify opportunities to prevent future losses and tighten procedures.
  • • Identify between Inductive and Deductive logic and use both
  • o Key to analysis is the ability to make sense out of complexity and confusion. Telecoms fraud is complex and often very technical, fraudsters rely of their ability to confuse, hide and layer their activity. Traditional thinking often comes up short in these circumstances. Advanced critical thinking skills in the form of Inductive and Deductive logic will enable analysts to cut through the complexity suggesting solutions unseen using traditional thinking.
  • • Produce Premises
  • o Analysis is ultimately part of the decision making process and decision makers are either convinced of an argument, unconvinced or undecided. An effective analyst will construct their argument in a logical way building on key propositions (Premises) leading the decision maker along a logical path constructed from the best data available at that time.
  • • Construct an Inference (Hypothesis, Conclusion, Prediction or Estimation)
  • o The ultimate product of analysis is an inference, what is inferred from the analytical process? If the case does not present an obvious solution, decision makers are faced with an uncertain task. An analyst who can present their finding in a well-constructed Inference will present the business with a clearer picture upon which to make decisions.
  • • Assign a probability to their inference
  • o Management want certainty in decision making however it is not always possible to wait long enough to obtain it. In these circumstances assigning a probability to the suggested course of action will enable calculated risks to be taken or action modified in line with the business risk appetite.
  • • Report findings to management.
  • o The final stage in any analysis is to report your findings, be that internally or externally. This may have to be done quickly in a fast moving fraud so the analyst needs a model which is flexible and effective and which can delivered face to face or in a more traditional way. Our report writing method will give the analyst a proven model to enhance their reporting ability.
Private Courses

This course is available to be run privately at your discretion.

Click here to fill in our enquiry form.

Telecom Fraud, RAG Telecom Fraud, Rag conference Sydney, Fraud Analysis

Telecommunications Fraud Analysis