Overview
Syllabus
Introduction
Overview
Call Center Fraud
IVR
Call Center
Reveal
Mode of Operation
Analysis
Voice over IP
Shortterm energy
Packetization
IRS Scam
Electrical Grid Interference
Acoustical Anomalies
Distribution of Fraudsters
Anomalies
Separating Good and Bad Calls
Creating Fraudster Profiles
Plotting Fraudster Profiles
Voice Distortion
Red Pockets
CDR Data
Reputation Velocity Behavior
Reputation Example
Velocity Example
Reconnaissance Example
Overall Result
Example
Key takeaways
Time gap between fraud stages
False positive rate
Changing vectors of attack
How common is this technology
Taught by
Black Hat