Lifecycle of a Phone Fraudster - Exposing Fraud Activity

Lifecycle of a Phone Fraudster - Exposing Fraud Activity

Black Hat via YouTube Direct link

Reconnaissance Example

26 of 33

26 of 33

Reconnaissance Example

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Lifecycle of a Phone Fraudster - Exposing Fraud Activity

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Overview
  3. 3 Call Center Fraud
  4. 4 IVR
  5. 5 Call Center
  6. 6 Reveal
  7. 7 Mode of Operation
  8. 8 Analysis
  9. 9 Voice over IP
  10. 10 Shortterm energy
  11. 11 Packetization
  12. 12 IRS Scam
  13. 13 Electrical Grid Interference
  14. 14 Acoustical Anomalies
  15. 15 Distribution of Fraudsters
  16. 16 Anomalies
  17. 17 Separating Good and Bad Calls
  18. 18 Creating Fraudster Profiles
  19. 19 Plotting Fraudster Profiles
  20. 20 Voice Distortion
  21. 21 Red Pockets
  22. 22 CDR Data
  23. 23 Reputation Velocity Behavior
  24. 24 Reputation Example
  25. 25 Velocity Example
  26. 26 Reconnaissance Example
  27. 27 Overall Result
  28. 28 Example
  29. 29 Key takeaways
  30. 30 Time gap between fraud stages
  31. 31 False positive rate
  32. 32 Changing vectors of attack
  33. 33 How common is this technology

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.