Technical information
Detecting Toll Fraud
Issue 7 June 2001
4-49
Change Override Restrictions on 3-way
COR Check
For G3V2 and later releases, the Restriction Override feature is used with the
3-way COR check on transfer and/or conference calls. The default is
none.
See “Restriction Override” on page 4-14 for more information.
Detecting Toll Fraud
After you have taken the appropriate security measures, use the monitoring
techniques described in this section to routinely review system activity. Here are
some signals of possible hacker activity:
Employees cannot get outside trunks
Customers have difficulty getting through to your 800 number
Usage is higher than normal
Nights and weekends have heavy call volume
Attendants report frequent “no one there” or “sorry, wrong number” calls
Bill shows calls were made to strange places
NOTE:
If you should suspect toll fraud in your system, you may call one of the
numbers in the ‘‘Toll Fraud Contact List’’ in Chapter 15 in the back of this
manual.
Table 4-4 shows the reports and monitoring techniques that track system activity
and help detect unauthorized use:
Table 4-4. Reports and Monitoring Techniques
Monitoring Technique Switch Page #
Administration Security All 4-50
Call Detail Recording (CDR) / Station
Message Detail Recording (SMDR)
All 4-52
Traffic Measurements/Performance All 4-53
Automatic Circuit Assurance All 4-55
BCMS Measurements G1 and G3 4-56
CMS Measurements All 4-57
Security Violations Measurement Report All 4-60
Continued on next page