Network Protocol Analysis: A New Tool for Blocking International Bypass Fraud Before Revenue is Lost How to Defend Your Network Against the New SIM Server Threat A WHITEPAPER BY SPONSORED BY “The international bypass of telecom operators via the SIM box is a costly and highly destructive type of fraud”. In the advanced industrial nations of the world, subscription fraud and International Revenue Share Fraud (IRSF) are the fraud types that take the greatest revenue toll. And that only makes sense, since postpaid subscription accounts, smartphone subsidies, and IRSF-vulnerable PBX machines abound in those nations. But the main target of bypass or SIM box fraud is quite different. In bypass fraud, the fraudsters prey primarily on the developing nations, those regions of the world where the banking, commerce, and communications infrastructure are relatively immature. And it’s in these nations where prepaid GSM phones serve a large percentage of the population. The SIM Box bypass fraud is not a new one. Most telecom operators around the world have detection and control solutions in place. So, why does the fraud continue to cause such massive losses? We’ll take a look at how new technologies are exposing the need for operators to reexamine their approach to this problem. But probably the most destructive effect of bypass is its reverse Robin Hood effect. Robin Hood stole from the rich to give to the local poor. But bypass steals from relatively poor nations to enrich largely foreign criminals. Robust telecom infrastructure and services are vital for growing the economic prosperity of a nation’s people. Governments have neither the money nor skills to invest, build, and run communications networks on their own. They rely on private firms to do that. And for this very reason, regulators in each nation strictly control the number of telecoms who are licensed to operate there. But when major revenue from international voice calls is stolen by fraudsters, the legal operators who play by the rules are severely hurt. Criminals in faroff places like Miami and Monaco steal a fortune, but the legal operators -- who struggle to make payroll and earn a return on their investment -- are discouraged from expanding their business and thereby helping the national economy to grow. Traditional Detection Techniques are No Longer Stopping the Fraudsters So how much revenue can a lone SIM box steal? The Loss to Telecoms, Governments, and a Nation’s Prosperity Well, the experts at LATRO Services estimate that fraudsters can easily generate over $100/day per modem in a SIM Box. And if a typical SIM box has 30 to 60 modems, that’s a revenue loss of $6,000/day or over $2 million per year. Imagine the financial gain for the fraudster! So how much telecom revenue is being lost from international bypass fraud globally? The answer varies and is often based on industry association reports from a limited number of telecom operators. And while we can’t detect the precise monetary value of bypass (fraudsters don’t report their income), the evidence that SIM boxers are succeeding can be plainly seen from a carrier’s international interconnect revenue. In 2013 the CFCA estimated the telecom loss through bypass to be about $2 billion a year. Other reports claim over $3 billion to $5 billion per year. If SIM box mitigation is truly working, international revenue should see a dramatic increase. But that’s usually not the case. In fact, operators in some countries will privately tell you that their international inbound traffic have decreased by as much as 50% in recent years! Billions of dollars is a huge figure for telecom operators to lose. Plus in many nations, bypass also greatly reduces the government tax revenues that are added to inbound international calls. Yet the irony is these same operators have invested heavily in anti-fraud campaigns, and they actually do detect and block fairly large volumes of SIM boxes on a daily basis. So what does this mean? It means the fraudsters are succeeding despite the anti-fraud efforts of the carriers. They are replacing the blocked SIM cards with fresh supplies of SIMs and continue their bypass. Test Call Generation technology worked very successfully for many years, but recently fraudsters are succeeding in frustrating the test call method. Here’s why: To the fraudster, current anti-fraud measures are nothing more than a minor annoyance – a speed bump on their way to multi-million dollar riches. • SIM Boxers can Identify the Test Calls - The fraudsters analyze the voice The History of Anti-Fraud Methods: Why the Fraudsters are Winning So why are current anti-fraud solutions no longer stopping SIM box fraud like they used to? Well, to answer that question, we need to look at the methods used to block and frustrate the fraudsters. The major methods used today are three: 1) Test Call Generators (TCGs), 2) Fraud Management Systems (FMS), and 3) SIM Card Distribution Control. Let’s now discuss the strengths and weaknesses of these methods: 1. Test Call Generation Systems When the SIM box bypass problem was first identified in the late 2000’s, Test Call Generation (TCG) was the first detection technique that proved effective. Here’s how test calls work. Test phone numbers are set up within the local market where the bypass fraud is occurring. Then test calls are generated from many different countries via various interconnect voice routes around the world including VOIP services, Calling Cards, wireless and fixed line services. This establishes from where the grey routes are originating and the paths they use to reach SIM boxes in the affected country. Test Call Generation is all about probability. The more routes you test and the more test calls you make, the higher the chance of finding SIM boxes. Once you find routes that have a high volume of SIM box terminations, you can focus your call campaigns on those routes to maximize detection. call traffic coming toward their SIM boxes. Then based on usage and other patterns, they can determine which calls are real subscriber calls and which are originating from a TCG system. They can then either block the test calls and prevent them from reaching the SIM box to begin with, or reroute the calls to a legitimate route so as to avoid detection. • SIM Boxers are using Pools of SIM Cards as Decoys - Fraudsters are even allocating pools of their SIM Box cards as decoys to be sacrificed. That is, they allow certain SIM cards to be detected to deceive the wireless operators into thinking its anti-fraud measures are producing good results. This ploy is a diversion that allows pools of undetected SIM cards to drive the major bypass revenue losses. • SIM Boxers are using Very Large Volumes of SIM Cards - Since the test call method is all about probability, fraudsters are provisioning the latest SIM Server systems to automatically manage hundreds of SIM cards per fraud operation. By increasing the number of SIM cards used and decreasing the usage per SIM card, they are making it increasingly improbable that a given SIM card will be detected by test calls. 2. Fraud Management Systems (FMS) and CDR Analysis The second technique used to detect/block SIM boxes is the Fraud Management System (FMS), an enterprise-wide data analysis platform that works well in detecting many different types of fraud. In SIM box detection, the FMS uses Call Data Records (CDRs) to create usagebased profiles that distinguish the SIMs used in SIM boxes versus those used in legitimate subscriber handsets. FMS and similar CDR analysis platforms have also been effective in detecting SIM boxes, but in recent years, fraudsters have found clever ways to evade usage profile detection. • Human Behavior Simulation – Go to a SIM box manufacturer’s website and you’ll see they advertise a Human Behavior Simulation (HBS) software capability. This means that the SIM boxes are programmed to mimic real mobile subscriber behavior. HBS techniques involve automating features on the SIM Box such as SMS messaging, self-calling, and international dialing in order to frustrate detection algorithms used by FMS and CDR analysis. • Growing the Pool of SIM Cards – Another scheme is to rotate the use of a large volume of SIM cards through a SIM Server system. When you do that, the volume of traffic going across any one SIM card is reduced to the point where they fall off the usage analysis radar. Now in both cases -- test calls and the FMS -- by nature of their methodology, the fraud has been committed by the time you detect it. So you are already losing money before the detections occur. 3. SIM Card Distribution Control And then finally, the third major mitigation strategy is controlling the distribution of SIM cards in the nation affected. The SIM Server: Fraudster’s Powerful New Stealth Technology SIM box fraudsters are often characterized as small-time crooks who buy their equipment on eBay and keep their SIM boxes and antennas in a small apartment. Such a simplistic picture of the SIM box fraudsters may be true in certain regions of the world, but the unmistakable trend among fraudsters is toward large-scale automation and the use of advanced technology on a global scale. There’s no better example of this than the recent rise of the SIM Server and its associated banks of thousands of SIM cards. The SIM Server, which was developed in the early 2000’s, was first used as a central test platform for various end-to-end quality of service and roaming test automation. Unfortunately, it also proved a major breakthrough for fraudsters because it “virtualizes” the SIM card. The server could be located in Singapore or Los Angeles, but it can manage multiple SIM box operations on multiple continents simultaneously. SIM cards, of course, are the enabler of international bypass fraud: to complete a call, every device on a GSM network needs to have an IMSI Subscriber ID number that resides on the SIM card. Here’s a quick rundown on the major challenges that SIM Servers bring to the bypass battlefront: Now over the years, as carriers got better at SIM Box detection, fraudsters needed to obtain thousands more SIM cards to replace those already detected or “burned” and made no longer usable on the network. technology arrived, fraudsters would typically run out of SIM cards in a week since the SIMs would be detected and “burned”. But by virtualizing the SIM card’s use, fraudsters no longer need to maintain a local supply of SIM cards in the country where their SIM boxes operate. So a pool of 1,000 SIM cards can last a month or two. • The Supply of SIM Cards are No Longer an Issue – Before SIM server At first, fraudsters had no trouble obtaining SIMs in large quantities. This is why nations experiencing bypass introduced measures to control SIM card distribution and block fraudsters from buying SIMs. These measures include requiring government IDs to buy SIMs, cross-checking multiple SIMs registered by the same person, and preventing the sale of pre-activated SIMs. • The SIM Box becomes an Empty Shell – The net effect of SIM virtualization Yet despite these control efforts, the fraudsters in most countries have -- through identify theft, fake IDs, and other schemes -- been able to get their hands on the volumes of cards needed to keep their SIM box operations humming. • SIM Detection via Test Calls Becomes a Lot Harder – With the expanded is that the local SIM box no longer needs to have any SIM cards at all! It’s a box with only modems inside. This means that in-country SIM distribution control programs will rapidly become obsolete. pool of SIMs in SIM Servers, massive volumes of test calls are needed to detect the hundreds to thousands of SIMs in the SIM banks. SIM Server The Battle To Stop International Bypass Why the Fraudsters are Winning SIM Servers, a recent fraudster innovaRon, can control SIM boxes from anywhere in the world. SIM Servers can: TCG interconnect "grey route" AutomaDcally manage & replace hundreds of SIM cards. Test Call Generators (TCGs) Test calls are made from many countries to test numbers in the country where SIM boxes operate. The interconnect grey routes to the SIM boxes are discovered, so the paths can be blocked. Test Call defense.. . Virtualize SIM cards so that SIMs can be quickly assigned to modems and rotated between calls. Fraudsters spot test calls from their usage paPerns, so the test calls are blocked or traffic is redirected to avoid detecRon. Enable IMEI & IMSI pairing in a database so every SIM has a unique IMEI. They use pools of SIMs as decoys. They are sacrifaced to give false hope that SIM blocking efforts are working. Look like hundreds of unique mobile subscribers, rather than a central machine cycling many SIMs through a small set of modem hardware. SIM Card Control SIM cards enable bypass fraud, but as SIM cards are "burned" (detected & blocked), the fraudsters need a fresh supply of SIMs. So governments control the distribuRon of SIMs by requiring IDs to obtain them at stores where they are sold. SIM Card Control defense Fake IDs o/en enable fraudsters to maintain a big supply of SIMs on hand. SIM Servers are making SIM control obsolete because SIMs can be obtained and consumed in large quanRRes in another country. The local SIM box becomes merely a box with modems. Large pools of reserve SIMs at SIM Servers means a huge number of test calls are needed to detect all the SIMs. Fraud Management System (FMS) SIM Box CDR Switch SIM Box deployment & carrier revenue loss SIM boxes are o/en deployed at 5 to 10 gateways in a city so as to serve a large numbers of mobile users. Fraudsters can make $100/day per modem (aka channel) in a SIM Box. With 30 to 60 modems in a SIM Box, they can generate a loss of $6,000/day or $2 million a year. If a SIM box miRgaRon is truly working, regular internaRonal revenue should go up. But some countries are experiencing 50% loss of internaRonal traffic even with acRve SIM box defense soluRons in place. It's proof that the fraudsters are succeeding despite the many efforts to detect and block them. The FMS uses Call Data Records (CDRs) off the switch to create usage-‐based analysis profiles to detect SIMs being used in SIM boxes versus those used in legiRmate subscriber handsets. FMS defense.. . Simulate human behavior: SIMs call & SMS each other & move between modem geographic locaRons. These make it very hard to detect them. Distribute huge volumes of voice calls across a high volume of SIM cards, keeping the calls per SIM very low. This is achieved using a SIM Server. Losing money before detecDons occur. In both FMS and TCG soluRons, significant revenue losses occur before any SIM boxes are detected. • A Vast Number of Fake Mobile Subscribers - SIM Servers can change IMEIs with every call, enabling a database of paired IMEI and IMSI so that every SIM card has a unique IMEI. Hence, the SIM Server looks to the network like a collection of hundreds of unique subscribers rather than a centralized machine cycling many SIMs through a small set of modem hardware. • Huge SIM Card Reserves Enable a Flexible Usage Strategy - The SIM banks that live in remote countries are large enough to allow fraudsters to employ a very flexible strategy. The latest electronic chassis can carry 6,500 SIMs inside. So they can drive multi-national campaigns. And as SIM cards are burned, they are automatically replaced. • Detecting SIMs with an FMS Becomes an Order of Magnitude Tougher - Consider this: To detect SIM boxes, FMS systems rely primarily on volumetric data. Their algorithms hone in on usage that is statistically significant, or rises above the number of calls an average mobile caller makes. Yet we know that FMS systems are already having a hard time detecting SIM boxes with 60 SIM cards inside. So imagine how hard it is to detect SIM cards from a remotely controlled bank of 6,500 cards! Not only that, the virtual IMSIs and IMEIs are automatically rotated and served up across multiple modems and perhaps multiple countries where the SIM fraudsters operate! In other words, the usage footprint of any individual SIM card at a single modem is exceeding small – so small that the SIM can easily hide in the noise of other traffic. Network Protocol Signatures – A New Detection Solution for the SIM Server Threat The introduction of the SIM Server has given fraudsters a new stealth technology allowing them to leapfrog carrier efforts to detect and block bypass. But all is not lost. Carriers have a new technological trick up their sleeves that can help them meet the SIM Server challenge. The new technology to leverage is Network Protocol Analysis, and its main virtue is that it recognizes the signature (or fingerprint) of the SIM Box as it comes onto the network, blocking the use of any SIM card used on the box’s modem. Network Protocol Analysis performs its magic through network signaling data -- a set of data never before used to detect SIM box fraud. To understand how it works, you can think of signaling as the computer operating system of the mobile network. It’s the lower level protocol messages being exchanged between the mobile device, cell towers, base stations, and the like. SIM boxes, including SIM Servers, generate a characteristic set of these protocol messages, allowing the fraudulent devices to be distinguished from other users on the mobile network. By the way, this rich set of data goes far beyond the information that’s captured in CDRs. In all, the data set tracks the information contained in dozens of protocol messages that are exchanged to set up a single GSM call – and before the first CDR is even cut on the switch. These signaling data provide the key to distinguish calls made by a SIM box modem from those made from regular mobile handset or smartphone. In fact, the technology works without having to know the IMSI of the SIM card or the IMEI of the modem hardware at all. When you power up your mobile phone, the first thing the device does is register itself and authenticate the SIM card that’s in the phone. So the Protocol Signature of the mobile device is the set of messages and data passed back and forth when the device signs onto the network. It is subsequently used for calls, texts, and data. And no matter how a fraudster tries to hide its SIM Box’s identity or play the human simulation game, the fingerprint of the modem in the SIM box cannot be masked because the messages it sends to the network reveal its true identity. Not surprisingly, the engineers who developed this SIM Box detecting mechanism are experts in the radio network domain. Their solution detects SIM box modems coming onto the network in real-time and also includes a strong big data capability enabling the analysis of millions of mobile network calls per day. The key advantages that Network Protocol Signatures bring to the SIM box battle are as follows: A. SIM Boxes are Detected as Soon as They Come onto the Network There’s nothing the fraudsters can do to prevent detection. Before they generate any bypass, the SIM modem announces itself in the signaling layers. As soon as the modem communicates, a network protocol signature is created. Even if the SIM Box attempts to disguise itself as a Samsung S5 smartphone, the Network Protocol Signature technology is not fooled and detects the SIM Box or SIM Server immediately. B. It Stops Fraud Before Revenue is Lost - Other means of SIM box detection such as test calls and FMS require considerable time to collect the usage, analyze it, and take action on the usage data. In that time, the fraudsters can do a lot of bypass. But protocol signatures detect the modems and block the bypass as soon as they sign onto the network – and before revenue is lost. C. It’s Fully Passive - Unlike active detection technology such as test call generation, network protocol signatures are captured passively so the fraudster is not aware of the method of detection. How to Stop the SIM Server: Use a Coordinated Attack Strategy OK, here are our recommendations on how to fight SIM box fraud in the coming era of global SIM Server deployments: 1. Use Protocol Signature Analysis as the First Line of Defense - Protocol signatures are desperately needed to regain the edge over SIM box fraudsters. So fraud and revenue assurance experts need to quickly get up to speed on this new, unfamiliar technology so they can deploy it wisely and rapidly. 2. Employ a Multi-Pronged Defense Strategy - Protocol Signature Analysis is a powerful technology, but it’s not a “silver bullet”. It needs to be used in concert with the fraud management tools already in place. For instance, the intelligence gained from FMS systems enable Protocol Analysis systems to be deployed in the most fraud infected parts of the network. Likewise, TCG systems are critical for pinpointing the interconnect carriers who are sending bypass traffic toward its networks. And the more interconnect routes you can send test calls through, the better. For this reason, working with multiple TCG vendors – each employing different test routes -- is very useful. 3. Invite All Solution Parties to the Integration Table – Fraudsters know full well that it’s advantageous if the anti-fraud solutions of a carrier remain siloed solutions that fail to coordinate and pass information freely between each other. Therefore, it’s the carrier’s responsibility to see that vendors truly open up their APIs and make a concerted effort to defeat the common enemy. As we’ve seen, the arrival of the SIM Server has made the battle to stop international bypass much harder. The SIM Server has enabled fraudsters to leapfrog conventional FMS and TCG solutions’ ability to keep a lid on bypass. In fact, carriers who have their SIM box fraud problems under control today are now quite vulnerable to the new SIM Server threat. It’s likely these carriers will see a resurgence of bypass due to the formidable stealth power and deployment flexibility that SIM Servers enables. To survive and thrive in the new era of SIM Server-led bypass, carriers must add protocol signature analysis to create an integrated and effective anti-SIM box defense. Technology Research Institute (TRI) is an analyst firm that has been following the market for telecom systems and software since 1995. TRI is also the publisher of Black Swan Telecom Journal. For more information about Protocol Signature™ detection and advanced bypass fraud control, contact LATRO Services, Inc [email protected] Copyright 2015 Technology Research Institute and LATRO Services, Inc. 1550 Lehigh Drive, West Easton, PA 18042 www.latroservices.com
© Copyright 2024