System information

System Security and Toll Fraud
xxx Issue 1 October 1997
Trunk Group Report
This report tracks call traffic on trunk groups at hourly intervals. Since trunk traffic
is fairly predictable, you can easily establish over time what is normal usage for
each trunk group. Use this report to watch for abnormal traffic patterns, such as
unusually high off-hour loading.
ARS Measurement Selection
The ARS Measurement Selection can monitor up to 20 routing patterns for traffic
flow and usage.
Automatic Circuit Assurance
This monitoring technique detects a number of short holding time calls or a
single long holding time call which may indicate hacker activity. Long holding
times on Trunk-to-Trunk calls can be a warning sign. The ACA feature allows you
to establish time limit thresholds defining what is considered a short holding time
and a long holding time. When a violation occurs, a designated station is visually
notified.
When an alarm occurs, determine if the call is still active. If toll fraud is suspected
(for example, a long holding time alarm occurs on a Trunk-to-Trunk call), you may
want to use the busy verification feature (see "Busy Verification" below) to monitor
the call in progress.
For G2 and System 85:
Use P285 W1 F5 and P286 W1 F1 to enable ACA systemwide.
Use P120 W1 to set ACA call limits and number of calls thresholds.
Choose the appropriate option:
To send the alarms and/or reports to a designated maintenance
facility, use P497 W3.
To send the alarms and/or reports to an attendant, use P286 W1 F3.
Busy Verification
When toll fraud is suspected, you can interrupt the call on a specified trunk group
and monitor the call in progress. Callers will hear a long tone to indicate the call
is being monitored.
For G2 and System 85:
Administer a Busy Verification button on the attendant console.
To activate the feature, press the button and enter the trunk access code
and the member number.