Verify

Verify and validate customers globally using their phone number.

Velocity

Discover the network provider for every mobile number globally.

Authenticate

Protect customers, accounts, and transactions within your app.

Live

Discover if a mobile number is assigned to a subscriber.

Score

A real time phone number credibility score.

TeleShield™

Identify if a number has the propensity to be used for fraud.

Banks and Financial Services
E-Commerce
Insurance
Mobile Messaging
Gaming & Gambling
Communication and Service Providers
Identity & Verification Providers
eBooks
News
Developers
Viteza
FAQ
About us
Events
Careers
Contact us
Articles

Going Behind Enemy Lines

Peter Taylor

4 min read
Advertisement for a book titled "Going Behind Enemy Lines: Cybercrime Chronicles" by Peter Taylor, featured on the TMT ID platform with a call to action to read now.

An Introduction to Cybercrime

In 2017 I started to research into organised cybercrime. As part of these investigations, which later resulted in this series, as well as numerous others, I spoke to reformed fraudsters. During these exchanges I learned how they committed fraud, how fraud has evolved, particularly since the COVID pandemic began, and, what effect it had on victims. I also frequented sites on the dark web, obtained copies of fraud ‘manuals’ and examined what was openly being bought and sold. My findings have since been shared with law enforcement, fraud solutions providers, finance companies, online retailers, and numerous other organisations. In 2020, Phronesis Technologies invited me to re-visit my research and to provide updated information, to share with other like-minded individuals, in the combined fight against fraud. As it turns out, it was perfect timing, as the global pandemic that is COVID-19 caused fraud to increase exponentially. The resulting five-part article series includes: Cybercrime, The Identity Arms Race, SIM Swap Fraud, Account Takeover and Mobile Phone Security.

Keep Your Enemies Close

A fraud investigator’s knowledge often originates after catching a fraudster and having their cybercrime techniques revealed. Conversely, a fraudsters knowledge comes from how they were able to commit a fraud unbeknownst to the victim and law enforcement. Only when we combine both sides of the coin can we see the full picture, and identify opportunities to close gaps.

The Fraudster Toolkit

Professional fraudsters use strict controls, commonly referred to as OPSEC (Operations Security) to remain hidden. Part of this process is creation of a fixed, permanent secure location – gone are the days of the infamous internet café residing criminals. Regarding devices, laptops are preferred, due to their ease of transportation. Accompanying this will often be a burner mobile phone, on a PAYG service. The use of VPN’s is essential, ensuring that they cannot be tracked back to their own ISP address. However, VPN’s are not 100% reliable – this protection can sometimes be lost, providing a weakness that can be exploited when considering fraud prevention techniques. Organised cybercriminals utilise free email addresses to undertake transactions and applications. However, these email addresses will have little, or even zero history – this, if noted by an organisation, can also be a potential weakness. If transactions include software protection that can identify social media accounts associated with an email address, the fraudster could face further problems conducting their ‘work’.

Tips and Tricks

Through the combination of knowledge from investigators and fraudsters themselves, as well as specific product knowledge, robust and innovative anti-fraud solutions can be identified and created. Yet, despite our understanding of the topic, and an admirable show of community spirit, organisations still need better research, training, auditing, investigative techniques, and advice, with regards to fraud. This includes, but is not limited to: Financial Institutions, e.g., banks, insurers, building societies, lenders Online retailers Aggregators Claims Companies Technology Providers Collaboration and sharing of data/findings is crucial, as is the need to ensure that whilst customer satisfaction through frictionless services is important, it must not come at the cost of encouraging or even allowing, fraud. After all, if a customer is the victim of an attack courtesy of a company, they are likely to use a competitor going forward. Therefore, fraud prevention and early detection are beneficial to all. Most cybercriminals are well-versed in which companies or even industries, are easy targets – do not let your organisation be one of them! Invest in robust fraud prevention / enhanced KYC solutions and ensure all potential areas of weakness are counter-acted by specific solutions.

Peter Taylor Reports for Phronesis Technologies – Now TMT ID Peter Taylor is an accomplished and distinguished fraud expert and investigator. He begun his career with Greater Manchester Police, before obtaining the position of Head of Fraud for Major Loss Adjusters. Since founding a consultancy firm, Peter has expanded his areas of expertise and is a cross-industry specialist in and cybercrime and counter-fraud measures. As Phronesis continues to expand, now offering our Mobile Identity and Fraud Prevention services directly to enterprise, we wanted to commission research into cybercrime, and the many facets within, to both add to our understanding, and to share with our growing network of partners, clients, followers, and of course to those who generally operate in the sector. Edits and afterword by Toni Pickering

 

Last updated on September 18, 2024

Contents

Related Articles

Promotional graphic for an article on victim of fraud by Edward Glasscote with a zoomed-in view of figures representing people.

Who are the Victims of Fraud?

An informative graphic on mobile security, featuring an article about preventing becoming a victim of mobile fraud.

Mobile Fraud – And How To Avoid Becoming A Victim

Man wearing a mask while working on a laptop, highlighting a report on online frauds and scams.

Identity Fraud has Reached Record Levels


What Our Customers Are Saying

"Phone number verification plays a critical role in helping to detect and prevent online fraud. TMT ID’s TeleShield product provides easy access to global mobile data, enabling us to enhance the actionable results of our MaxMind minFraud® services."

MaxMind

"BTS (Business Telecommunications Services) is successfully using TMT’s Velocity and Live services to check the status of mobile numbers. This way we make sure we optimize the performance of the service offered to our customers and ensure the quality of terminating traffic to all countries.”

Business Telecommunications Services

"Working with TMT’s TeleShield service has expanded our ability to detect fraud and minimise the risk to our business. TeleShield brings peace of mind and the opportunity to stop fraud before it affects our customers’ bottom line or the service."

Six Degrees Labs

"LATRO relies on TMT’s TeleShield to provide the most up to date and reliable numbering qualification information within our fraud reporting tools, enabling us to protect our customer’s revenues and empowering them to defend themselves against fraudulent numbers."

LATRO

"TMT is a valued partner that enables us to manage our routing costs effectively. They proactively and continuously expand their operator and country coverage while delivering exceptional customer service. We can always count on them to achieve high-quality results and look forward to our continued collaboration."

Global Message Service

"TMT provides us with the most comprehensive numbering intelligence data through their fast and reliable Velocity and Live services. TMT is a trusted partner for us, their products ensure that we continue to optimise the best performance and service to our customers."

Global Voice

"TeleShield from TMT gives 42com the power to detect and target telephony fraud scams internationally, thereby protecting our company from the financial and customer experience impacts of telecommunications fraud."

Alberto Grunstein - CEO

"It has been a pleasure to work with the team at TMT. They have become an essential provider of accurate numbering data information and Number Portability services globally."

Luisa Sanchez - VP of SMS and Messaging Solutions, Identidad Technologies

"Deutsche Telekom Global Carrier uses TMT ID as one of their key suppliers for Mobile Number Portability Data services. Deutsche Telekom Global Carrier uses TMT ID’s Velocity MNP solution. This is an ultra-fast query service that optimises the routing of international voice calls and A2P messaging."

Deutsche Telekom Global Carrier

Ready to get started?

We provide the most comprehensive device, network and mobile numbering data available

Contact us > Chat to an expert >