Completed
Reveal
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Lifecycle of a Phone Fraudster - Exposing Fraud Activity
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Overview
- 3 Call Center Fraud
- 4 IVR
- 5 Call Center
- 6 Reveal
- 7 Mode of Operation
- 8 Analysis
- 9 Voice over IP
- 10 Shortterm energy
- 11 Packetization
- 12 IRS Scam
- 13 Electrical Grid Interference
- 14 Acoustical Anomalies
- 15 Distribution of Fraudsters
- 16 Anomalies
- 17 Separating Good and Bad Calls
- 18 Creating Fraudster Profiles
- 19 Plotting Fraudster Profiles
- 20 Voice Distortion
- 21 Red Pockets
- 22 CDR Data
- 23 Reputation Velocity Behavior
- 24 Reputation Example
- 25 Velocity Example
- 26 Reconnaissance Example
- 27 Overall Result
- 28 Example
- 29 Key takeaways
- 30 Time gap between fraud stages
- 31 False positive rate
- 32 Changing vectors of attack
- 33 How common is this technology