Verify

Verify and validate customers globally using their phone number.

Velocity

Discover the network provider for every mobile number globally.

Authenticate

Protect customers, accounts, and transactions within your app.

Live

Discover if a mobile number is assigned to a subscriber.

Score

A real time phone number credibility score.

TeleShield™

Identify if a number has the propensity to be used for fraud.

Banks and Financial Services
E-Commerce
Insurance
Mobile Messaging
Gaming & Gambling
Communication and Service Providers
Identity & Verification Providers
eBooks
News
Developers
FAQ
About us
Events
Careers
Contact us
Articles

Going Behind Enemy Lines

Peter Taylor

4 min read
Advertisement for a book titled "Going Behind Enemy Lines: Cybercrime Chronicles" by Peter Taylor, featured on the TMT ID platform with a call to action to read now.

An Introduction to Cybercrime

In 2017 I started to research into organised cybercrime. As part of these investigations, which later resulted in this series, as well as numerous others, I spoke to reformed fraudsters. During these exchanges I learned how they committed fraud, how fraud has evolved, particularly since the COVID pandemic began, and, what effect it had on victims. I also frequented sites on the dark web, obtained copies of fraud ‘manuals’ and examined what was openly being bought and sold. My findings have since been shared with law enforcement, fraud solutions providers, finance companies, online retailers, and numerous other organisations. In 2020, Phronesis Technologies invited me to re-visit my research and to provide updated information, to share with other like-minded individuals, in the combined fight against fraud. As it turns out, it was perfect timing, as the global pandemic that is COVID-19 caused fraud to increase exponentially. The resulting five-part article series includes: Cybercrime, The Identity Arms Race, SIM Swap Fraud, Account Takeover and Mobile Phone Security.

Keep Your Enemies Close

A fraud investigator’s knowledge often originates after catching a fraudster and having their cybercrime techniques revealed. Conversely, a fraudsters knowledge comes from how they were able to commit a fraud unbeknownst to the victim and law enforcement. Only when we combine both sides of the coin can we see the full picture, and identify opportunities to close gaps.

The Fraudster Toolkit

Professional fraudsters use strict controls, commonly referred to as OPSEC (Operations Security) to remain hidden. Part of this process is creation of a fixed, permanent secure location – gone are the days of the infamous internet café residing criminals. Regarding devices, laptops are preferred, due to their ease of transportation. Accompanying this will often be a burner mobile phone, on a PAYG service. The use of VPN’s is essential, ensuring that they cannot be tracked back to their own ISP address. However, VPN’s are not 100% reliable – this protection can sometimes be lost, providing a weakness that can be exploited when considering fraud prevention techniques. Organised cybercriminals utilise free email addresses to undertake transactions and applications. However, these email addresses will have little, or even zero history – this, if noted by an organisation, can also be a potential weakness. If transactions include software protection that can identify social media accounts associated with an email address, the fraudster could face further problems conducting their ‘work’.

Tips and Tricks

Through the combination of knowledge from investigators and fraudsters themselves, as well as specific product knowledge, robust and innovative anti-fraud solutions can be identified and created. Yet, despite our understanding of the topic, and an admirable show of community spirit, organisations still need better research, training, auditing, investigative techniques, and advice, with regards to fraud. This includes, but is not limited to: Financial Institutions, e.g., banks, insurers, building societies, lenders Online retailers Aggregators Claims Companies Technology Providers Collaboration and sharing of data/findings is crucial, as is the need to ensure that whilst customer satisfaction through frictionless services is important, it must not come at the cost of encouraging or even allowing, fraud. After all, if a customer is the victim of an attack courtesy of a company, they are likely to use a competitor going forward. Therefore, fraud prevention and early detection are beneficial to all. Most cybercriminals are well-versed in which companies or even industries, are easy targets – do not let your organisation be one of them! Invest in robust fraud prevention / enhanced KYC solutions and ensure all potential areas of weakness are counter-acted by specific solutions.

Peter Taylor Reports for Phronesis Technologies – Now TMT ID Peter Taylor is an accomplished and distinguished fraud expert and investigator. He begun his career with Greater Manchester Police, before obtaining the position of Head of Fraud for Major Loss Adjusters. Since founding a consultancy firm, Peter has expanded his areas of expertise and is a cross-industry specialist in and cybercrime and counter-fraud measures. As Phronesis continues to expand, now offering our Mobile Identity and Fraud Prevention services directly to enterprise, we wanted to commission research into cybercrime, and the many facets within, to both add to our understanding, and to share with our growing network of partners, clients, followers, and of course to those who generally operate in the sector. Edits and afterword by Toni Pickering

 

Last updated on April 11, 2024

Contents

Related Articles

Report highlights $68 million loss due to sim swap attacks in the U.S. in 2021, as discussed in an article by Fergal Parkinson.

$68m lost to Sim Swap attacks in the U.S. in 2021

Digital composite image of a handshake superimposed with circuit patterns, promoting a partnership between tmt id and six degrees labs to combat telephony fraud.

TMT partners with Six Degrees Labs to tackle telephony fraud

Promotional graphic for an article discussing uk fintech customers' concerns about security, featuring an overlay of a financial graph on a thoughtful individual's silhouette.

Why are so many UK Fintech customers concerned about security?


What Our Customers Are Saying

"BTS (Business Telecommunications Services) is successfully using TMT’s Velocity and Live services to check the status of mobile numbers. This way we make sure we optimize the performance of the service offered to our customers and ensure the quality of terminating traffic to all countries.”

Business Telecommunications Services

"TMT is a valued partner that enables us to manage our routing costs effectively. They proactively and continuously expand their operator and country coverage while delivering exceptional customer service. We can always count on them to achieve high-quality results and look forward to our continued collaboration."

Global Message Service

"TMT provides us with the most comprehensive numbering intelligence data through their fast and reliable Velocity and Live services. TMT is a trusted partner for us, their products ensure that we continue to optimise the best performance and service to our customers."

Global Voice

"TeleShield from TMT gives 42com the power to detect and target telephony fraud scams internationally, thereby protecting our company from the financial and customer experience impacts of telecommunications fraud."

Alberto Grunstein - CEO

"It has been a pleasure to work with the team at TMT. They have become an essential provider of accurate numbering data information and Number Portability services globally."

Luisa Sanchez - VP of SMS and Messaging Solutions, Identidad Technologies

"Deutsche Telekom Global Carrier uses TMT ID as one of their key suppliers for Mobile Number Portability Data services. Deutsche Telekom Global Carrier uses TMT ID’s Velocity MNP solution. This is an ultra-fast query service that optimises the routing of international voice calls and A2P messaging."

Deutsche Telekom Global Carrier

Ready to get started?

We provide comprehensive device, network and mobile numbering data available.

Contact us > Chat to an expert >