Fraud Detection Solutions

Interconnect Trunks Abuse

Challenge
Employees and subcontractors have deep insider knowledge of networks and IT systems. They can use their knowledge to develop a lucrative business by setting technical configurations (interconnect ghost trunks) and using them to resell traffic to third parties.


Our solution
Performing in-depth health checks of your incoming traffic to detect sophisticated fraud cases and operational issues leading to termination revenue losses:

  • Detection calls generation from a unique portfolio of 3,700+ routes (including all types of operators/routes worldwide) 
  • Identification of the precise place where the calls enter your network, pinpointing the fraud even if trunks have been protected or hidden by the fraudsters. 
  • Quick detection of interconnect ghost trunks, pirate gateway, wrong switch configuration and interconnect trunks arbitrage.
  • Analysis and presentation of actionable findings with formal proofs of fraud and detailed technical trace.