mobile-bg

Dealer Fraud

Stop deceptive and fraudulent practices in your partner dealer network

Telecom dealers - friends or foes?

Managing the administration of indirect sales channels can be a challenge, given their contribution of up to 80% of overall sales. Nevertheless, unscrupulous dealers can sometimes directly exploit flaws in partner agreements for their own benefit by inflating sales volumes to claim fraudulent commissions. Cases of abuse of commission and incentive schemes, may include the creation of false subscriptions; reactivation of old accounts (flipping); exploitation of weak or non-existent claw back controls up to the stock itself, such as stealing and selling of stock, cloning of SIMs, handset unlocking and IMEI identity changing.
Telecom dealers - friends or foes?
RAID, a targeted approach to dealer fraud

RAID, a targeted approach to dealer fraud

The RAID for Dealer Fraud module uses a prebuilt rule-based approach, combined with an AI-based anomaly detection, to uncover advanced dealer fraud threats. RAID adds an extra layer of protection to your incentives compensation strategy to keep your business safe from dealer fraud. Deploy RAID and gain greater control of dealer fraud in order to accomplish goals related to acquisition, market share, revenues, and operational efficiency.

Trust but Verify. Why incentives performance management isn’t enough

Many CSPs rely on a dealer fraud strategy in addition to incentive compensation management (ICM) systems, as these systems have been designed in a vertically agnostic approach to business. In other words, these ICM systems were not designed to ingest telecom proprietary data across the many points of the value chain and then put it all together to see patterns to detect dealer fraud. Typically, vertically agnostic solutions receive data inputs from a limited source of reference points or directly from the data warehouse and ERP. This may work in a more traditional environment, but in the telecom industry, multiple data sources need to be checked and verified – preferably in real-time – in order to detect dealer fraud.

All The Necessary Tools Integrated Into One Platform To Handle The Entire Risk Management Lifecycle

Case Management
Drill down on data and alerts with ad-hoc analysis to find the root cause of fraud and make better decisions faster.
Fully configurable
Use easy-to-apply configurations, workflows and dashboards to enable simple and transparent mirroring of your required business processes. Automations and migrations let you execute this in days instead of months
Hybrid Solution
React to and stop known and unknown fraud patterns in a repeatable and auditable way by combining an extensive rules library with machine learning.
All-In-One Software
Manage the teleco fraud management lifecycle autonomously, from data loading to mitigation actions, with RAID’s complete suite of tools for fraud analysts.
Link Analysis
Quickly uncover fraudulent activities by highlighting key individuals, connections and patterns in a unique visual way. Gain a deeper understanding of data within different entity and relationship types, as well as attributes that can help uncover hidden fraud patterns.
Real Time Data Processing
Address the problem of matching continuously income events to evolving patterns like bypass fraud with RAID's complex event processing (CEP).Accelerate fraud detection and react faster to emerging threats with real time data stream analysis.

Fight Dealers Fraud with a Turnkey Approach

RAID is a pre-packaged solution that allows CSPs to evaluate their network traffic and detect fraudulent behaviours and deviations of service usage.

The solution makes use of a complex rule library, combined with machine learning techniques, plus a wide range of integrated data sources, gathered from the telecommunications network in real time, combines this information with that from external systems and aggregates it. By correlating data from all these sources, RAID can produce comprehensive, real-time analysis, providing valuable insights for telecom fraud management.

RAID risk management software is easy to use and highly configurable

Schedule a meeting with us and see what RAID can do for your business.

Having a multi-channel fraud prevention strategy should be your the first line of defense

Both online and offline partner channels rely on the interaction with several participants in the value chain, including retailers, distributors, logistics companies and others. These interactions can contribute to a significant percentage in fraudulent sale transactions initiated by a reseller. As an example of this type of fraudulent scheme: a reseller places a bulk order for smartphones devices that are in great demand and turn around to sell them offline, taking advantage of a specific online promotion as well as the non-availability of such specific models online after the flash sales are over.

How Nar Mobile is Leveraging RAID For Fraud Management

Nar Mobile launched its commercial activities on 21 March 2007 under brand name Azerconnect. Today the network coverage of Nar Mobile claims to reach 80% of the territory of the Azerbaijan Republic (essentially all given that some 20% of the territory is under occupation). In certain remote areas (e.g. Qarxun and Sohub villages of Quba district) Nar is the only provider offering service. Currently, over 2,100,000 subscribers use the network. In 2009 a non-stock partnership agreement was signed between Nar Mobile and Vodafone Company.
A Hybrid Approach To Telecom Fraud

A Hybrid Approach To Telecom Fraud

At WeDo Technologies we believe that the best approach to telecom fraud is the hybrid one: combining models and rules. Rules can be very effective in mitigating fraud risk, and telecom fraud analysts are comfortable with this approach because they can inject human intelligence and set common-sense parameters for the telecom business. However, not having the right rule in place can result in false positives, false negatives or even in a fraudulent attack getting bellow the radar. Unlike rules, machine-learning models can account for changing fraudulent behaviours as they evolve over time. Our fraud management solution is leveraged by a combination of rules, and supervised and unsupervised Machine Learning algorithms, to detect the widest range of telecom fraud scenarios in the telecom industry.

Can't see the forest for the trees?

Harness the power of your data to connect the dots between strategy, risk and performance.

Don’t mistake fake activations as churn

In heavy acquisition environments it is common practice to see sales and distribution channels illegitimately benefiting from the creation of fake activations of services and pushing SIMs to the market. These illicit practices, done simply for the sake of earning more commissions, take advantage of poorly designed incentive schemes or lack of proper fraud controls. What can initially be perceived as subscriber churn can quickly be uncovered by a fraud management system (FMS), such as RAID. These fake activations can quickly be understood for what they really are- these clients never really existed and were virtually created by the distribution and sales channels with the clear objective of getting the commissions and channel incentives in a fraudulent scheme.

Future-Proof Your Fraud Management Strategy by Adopting A Hybrid Technology

Rule Based Approach
An extensive rules library provides immediate fraud awareness and increased accuracy
  • Optimize rules according to your needs
  • Greater accuracy and lower error rate
  • Immediate results
AI/Machine Learning
AI and Machine learning algorithms leverage data analysis processes to detect deviations and unknown fraud patterns
  • Rapid prediction and processing analysis
  • Past customer behaviors evaluation
  • Unlimited traffic analysis
Hybrid Solution
A hybrid approach designed to combine rules with machine learning to detect and predict fraud
  • Early and accurate fraud cases detection
  • High risk deviations identified in real time
  • Outlines new fraud patterns and emerging operating methods

Stop Dealer Misappropriation of Discounts and Offers

Communication service provides tend to present bold promotions and special discounts to attract consumers, especially in mature markets or when device-innovation slows and consumers become less obsessed with having the latest model. These discounts are developed for the end-users, many of whom start their online transaction and gradually buy more products. However, when dealer fraud is present, this discount benefit is absorbed by the dealer who subsequently sells devices and products at Market Operating Price (MoP), forms bundle splitting, or in some cases charges premium for making a device available in an ‘out of stock’ period.

End-to-end Platform for Risk Management

Built from the ground up and completely owned by WeDo Technologies, RAID is a robust platform on which all our risk management products are built. With a range of prebuilt auditing and monitoring packages, built for Revenue Assurance, Fraud Management and Business Assurance, RAID delivers a full-service solution from data collection all the way through to risk detection and traceability of case resolution.

Fraud managers too can aid in the support to sales

Fraud managers are in prime position to help to drive the control of dealer’s sales and support checkout conversion rates. Fraud managers have unique access to a rich array of data – information that has been gathered from customer touchpoints and service usage across the OSS/BSS, as well as through external sources. Taking into consideration the amount of data that they can leverage, and their understanding of the business, this can be the starting point for fraud managers in the mission to support sales. Fraud analysts can also play a vital part in protecting sales during the release of new products through the proactive preparation of fraud management strategies that cater to planned changes and the monitoring of dealers performance.

Choose How You Want Your Dealer Fraud App Deployed

Adopt the RAID platform and chose the deployment option that best fits your business needs, budget, and resources. If your company still doesn’t have a full public cloud policy due to security and compliance issues, WeDo Technologies provides an alternative in private and hybrid cloud models to deploy RAID with its prebuilt risk management modules or apps.