1261 lines
38 KiB
Plaintext
1261 lines
38 KiB
Plaintext
![]() |
TABLE OF CONTENTS BLUE BOX FRAUD DETECTION DESC
|
|||
|
1001-132
|
|||
|
NTP
|
|||
|
|
|||
|
|
|||
|
|
|||
|
NORTHERN TELECOM PRACTICE 297-1001-132
|
|||
|
ISSUED: 87 04 24
|
|||
|
RELEASE: 02.01 STANDARD
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
DIGITAL SWITCHING SYSTEMS
|
|||
|
|
|||
|
DMS*-100 FAMILY
|
|||
|
|
|||
|
BLUE BOX FRAUD DETECTION
|
|||
|
FEATURE DESCRIPTION
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
* DMS-100 is a trademark of Northern Telecom
|
|||
|
Page 1
|
|||
|
21 pages
|
|||
|
|
|||
|
|
|||
|
PRACTICE 297-1001-132
|
|||
|
RELEASE: 02.01
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
(c) Northern Telecom 1980, 1987
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Page 2
|
|||
|
|
|||
|
|
|||
|
PRACTICE 297-1001-132
|
|||
|
RELEASE: 02.01
|
|||
|
|
|||
|
CONTENTS
|
|||
|
PAGE
|
|||
|
1. INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . 4
|
|||
|
|
|||
|
General . . . . . . . . . . . . . . . . . . . . . . . . 4
|
|||
|
Practice Application . . . . . . . . . . . . . . . . . . 4
|
|||
|
Reason for Reissue . . . . . . . . . . . . . . . . . . . 5
|
|||
|
Software Identification . . . . . . . . . . . . . . . . 5
|
|||
|
Command Format Conventions . . . . . . . . . . . . . . . 5
|
|||
|
References . . . . . . . . . . . . . . . . . . . . . . . 5
|
|||
|
|
|||
|
2. DESCRIPTION . . . . . . . . . . . . . . . . . . . . . . 7
|
|||
|
|
|||
|
Testing for Fraudulent Calls . . . . . . . . . . . . . . 10
|
|||
|
Recording Fraudulent Calls . . . . . . . . . . . . . . . 11
|
|||
|
Disposing of Fraudulent Calls . . . . . . . . . . . . . 12
|
|||
|
Cut the Call . . . . . . . . . . . . . . . . . . . . 12
|
|||
|
Continue the Call . . . . . . . . . . . . . . . . . 12
|
|||
|
|
|||
|
3. OPERATIONAL MEASUREMENTS . . . . . . . . . . . . . . . . 13
|
|||
|
|
|||
|
|
|||
|
4. MAN-MACHINE INTERFACE . . . . . . . . . . . . . . . . . 14
|
|||
|
|
|||
|
Commands . . . . . . . . . . . . . . . . . . . . . . . . 14
|
|||
|
Alarms . . . . . . . . . . . . . . . . . . . . . . . . . 17
|
|||
|
Logs . . . . . . . . . . . . . . . . . . . . . . . . . . 17
|
|||
|
|
|||
|
5. GLOSSARY . . . . . . . . . . . . . . . . . . . . . . . . 20
|
|||
|
|
|||
|
FIGURES
|
|||
|
|
|||
|
FIG. TITLE PAGE
|
|||
|
|
|||
|
1 Fraudulent Call Setup . . . . . . . . . . . . . . . . . 8
|
|||
|
2 The Extra Wink . . . . . . . . . . . . . . . . . . . . 9
|
|||
|
3 The Reserved Multifrequency Receiver . . . . . . . . . 10
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Page 3
|
|||
|
|
|||
|
INTRODUCTION BLUE BOX FRAUD DETECTION DESC
|
|||
|
1001-132
|
|||
|
NTP
|
|||
|
PRACTICE 297-1001-132
|
|||
|
RELEASE: 02.01
|
|||
|
|
|||
|
1. INTRODUCTION
|
|||
|
|
|||
|
GENERAL
|
|||
|
|
|||
|
1.01 This Practice describes the Blue Box Fraud Detection fea-
|
|||
|
ture and its operation within the DMS-100 Family. A "blue
|
|||
|
box" is any device, connected illegally to a subscriber's line,
|
|||
|
that can produce both a 2600 Hz tone and multifrequency (MF) dig-
|
|||
|
its.
|
|||
|
|
|||
|
1.02 To place a fraudulent call, the perpetrator performs two
|
|||
|
steps:
|
|||
|
|
|||
|
1. Use a normal telephone to place a normal call. This call is
|
|||
|
usually a free or inexpensive call, and uses a Single Fre-
|
|||
|
quency (SF) trunk beyond the perpetrator's billing office.
|
|||
|
|
|||
|
2. Use a blue box to place the fraudulent call. This call uses
|
|||
|
the SF trunk seized for the original, normal call.
|
|||
|
|
|||
|
1.03 Calls placed with a blue box are typically undetected by
|
|||
|
the perpetrator's billing office, thus the term "blue box
|
|||
|
fraud."
|
|||
|
|
|||
|
1.04 The Blue Box Fraud Detection feature attempts to discover
|
|||
|
fraudulent MF signaling over Centralized Automatic Message
|
|||
|
Accounting (CAMA) and SuperCAMA trunks; it does not detect frau-
|
|||
|
dulent signaling over Traffic Operator Position System (TOPS)
|
|||
|
trunks. This feature can alert the operating company of a frau-
|
|||
|
dulent call attempt and either allow billing to be made for the
|
|||
|
call or disconnect the call.
|
|||
|
|
|||
|
1.05 This feature detects fraudulent MF signaling but does not
|
|||
|
detect fraudulent SF pulsing. No customer data schema is
|
|||
|
required, because the feature is activated and deactivated using
|
|||
|
the Command Interpreter (CI) facilities at the Maintenance and
|
|||
|
Administration Position (MAP1). The feature implements the meth-
|
|||
|
od of detection of fraudulent toll telephone calls described in
|
|||
|
U.S. patent 4,001,513.
|
|||
|
|
|||
|
|
|||
|
PRACTICE APPLICATION
|
|||
|
|
|||
|
1.06 The information contained in this Practice is applicable
|
|||
|
to offices having Batch Change Supplement release 22
|
|||
|
(BCS22) software. It is also applicable to offices having a BCS
|
|||
|
release greater than 22 unless reissued. The application of all
|
|||
|
Northern Telecom Practices (NTP) editions with respect to a given
|
|||
|
BCS release is given in 297-1001-001.
|
|||
|
|
|||
|
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
|
|||
|
1 MAP is a trademark of Northern Telecom.
|
|||
|
|
|||
|
Page 4
|
|||
|
|
|||
|
|
|||
|
PRACTICE 297-1001-132
|
|||
|
RELEASE: 02.01
|
|||
|
|
|||
|
REASON FOR REISSUE
|
|||
|
|
|||
|
1.07 This Practice has been reissued to revise the content and
|
|||
|
format of the existing document. Due to the extent of
|
|||
|
these changes, revision bars are not included in the text.
|
|||
|
|
|||
|
|
|||
|
SOFTWARE IDENTIFICATION
|
|||
|
|
|||
|
1.08 Software applicable to a specific DMS-100 Family office is
|
|||
|
identified by a BCS release number and by Northern Telecom
|
|||
|
(NT) Product Engineering Codes (PEC). The significance of the
|
|||
|
BCS number and the PEC is described in 297-1001-450 (section
|
|||
|
450/32) and in the Office Feature Record D-190.
|
|||
|
|
|||
|
1.09 A display of the BCS number and PEC for the NT feature
|
|||
|
packages available in a specific office can be obtained by
|
|||
|
entering the command string:
|
|||
|
|
|||
|
PATCHER;INFORM LIST;LEAVE
|
|||
|
|
|||
|
at a MAP.
|
|||
|
|
|||
|
|
|||
|
COMMAND FORMAT CONVENTIONS
|
|||
|
|
|||
|
1.10 In this Practice, a uniform system of notation is used to
|
|||
|
illustrate system commands and responses. It shows the
|
|||
|
order in which command elements appear, the punctuation, and the
|
|||
|
options. Where the conventions are not used, an explanation is
|
|||
|
given in the text.
|
|||
|
|
|||
|
CAPITAL letters or show constants, commands, or keywords that
|
|||
|
special characters the system accepts when entered as writ-
|
|||
|
ten.
|
|||
|
|
|||
|
lowercase letters show a user- or system-supplied para-
|
|||
|
meter. Definitions are given for each par-
|
|||
|
ameter.
|
|||
|
|
|||
|
Brackets [ ] or <20> <20> enclose optional parameters. A vertical
|
|||
|
<20> <20> list enclosed in brackets means that one
|
|||
|
<20> <20> or more of the parameters may be selected.
|
|||
|
|
|||
|
REFERENCES
|
|||
|
|
|||
|
1.11 References listed as prerequisites are essential for an
|
|||
|
understanding of this Practice. Those listed as inform-
|
|||
|
ative contain detailed information concerning other items men-
|
|||
|
tioned in this Practice, but are not essential. References are
|
|||
|
inserted at the appropriate places in the text.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Page 5
|
|||
|
|
|||
|
|
|||
|
PRACTICE 297-1001-132
|
|||
|
RELEASE: 02.01
|
|||
|
|
|||
|
Note: The documents listed may exist in more than one version.
|
|||
|
See 297-1001-001 to determine the release code of the version
|
|||
|
compatible with a specific release of software.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Prerequisite References
|
|||
|
|
|||
|
DOCUMENT
|
|||
|
NUMBER TITLE
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
297-1001-100 System Description
|
|||
|
|
|||
|
|
|||
|
Informative References
|
|||
|
|
|||
|
DOCUMENT
|
|||
|
NUMBER TITLE
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
GFXINDEX General Feature Description Index of Documents
|
|||
|
297-1001-001 Master Index of Practices
|
|||
|
297-1001-114 Operational Measurements (OM)
|
|||
|
297-1001-119 Automatic Message Accounting - Northern Telecom
|
|||
|
Format
|
|||
|
297-1001-450 Provisioning
|
|||
|
297-1001-510 Log Report Manual
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Page 6
|
|||
|
|
|||
|
DESCRIPTION BLUE BOX FRAUD DETECTION DESC
|
|||
|
1001-132
|
|||
|
NTP
|
|||
|
PRACTICE 297-1001-132
|
|||
|
RELEASE: 02.01
|
|||
|
|
|||
|
2. DESCRIPTION
|
|||
|
|
|||
|
2.01 The Blue Box Fraud Detection feature allows the DMS-200 to
|
|||
|
perform three fraud detection functions:
|
|||
|
|
|||
|
o test for fraudulent calls
|
|||
|
|
|||
|
o record fraudulent calls
|
|||
|
|
|||
|
o dispose of fraudulent calls (cut or continue).
|
|||
|
|
|||
|
2.02 Figure 1 on page 8 describes how a perpetrator initiates a
|
|||
|
fraudulent call. Figure 2 on page 9 describes how the
|
|||
|
system responds to a fraudulent call, and how the testing proce-
|
|||
|
dure is invoked. Figure 3 on page 10 describes how the DMS-200
|
|||
|
prepares to test for fraudulent calls.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Page 7
|
|||
|
|
|||
|
|
|||
|
PRACTICE 297-1001-132
|
|||
|
RELEASE: 02.01
|
|||
|
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20><><EFBFBD>Ŀ
|
|||
|
/O\ To place a fraudulent call,
|
|||
|
<20> the perpetrator first
|
|||
|
<20> places a normal call.
|
|||
|
<20>
|
|||
|
V The End Office sends the
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ digits to the CAMA office.
|
|||
|
<20> <20>
|
|||
|
<20> END <20> The CAMA office receives
|
|||
|
<20> OFFICE <20> and translates the digits
|
|||
|
<20> <20> from the End Office, and
|
|||
|
<20> <20> seizes an outgoing trunk.
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20> The office at the far end
|
|||
|
<20> of the outgoing trunk winks
|
|||
|
<20> in response, and the CAMA
|
|||
|
CAMA <20> office sends the called
|
|||
|
TRUNK <20> digits for this normal
|
|||
|
<20> call.
|
|||
|
<20>
|
|||
|
<20> No fraud has taken place
|
|||
|
V yet.
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
<20> CAMA <20>
|
|||
|
<20> OFFICE <20>
|
|||
|
<20> <20>
|
|||
|
<20> DMS <20>
|
|||
|
<20> 200 <20>
|
|||
|
<20> <20>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20>
|
|||
|
OUTGOING<4E> A
|
|||
|
TRUNK<4E> <20>WINK
|
|||
|
<20> <20>
|
|||
|
<20>
|
|||
|
V
|
|||
|
|
|||
|
|
|||
|
Fig. 1 - Fraudulent Call Setup
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Page 8
|
|||
|
|
|||
|
|
|||
|
PRACTICE 297-1001-132
|
|||
|
RELEASE: 02.01
|
|||
|
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20><><EFBFBD>Ŀ
|
|||
|
/O\ Either before or after the
|
|||
|
<20> original, normal call is
|
|||
|
<20> answered, the perpetrator
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD>Ŀ <20> uses the blue box to place
|
|||
|
<20>BLUE <20><><EFBFBD><EFBFBD><EFBFBD>><3E> a fraudulent call.
|
|||
|
<20>BOX <20> <20>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20> This fraudulent call causes
|
|||
|
<20> the office at the far end
|
|||
|
<20> of the outgoing trunk to
|
|||
|
V wink, again, in response.
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
<20> <20> To the office at the far
|
|||
|
<20> END <20> end of the outgoing trunk,
|
|||
|
<20> OFFICE <20> the wink is normal. To the
|
|||
|
<20> <20> CAMA office, however, the
|
|||
|
<20> <20> wink is unexpected.
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20> It is this extra wink that
|
|||
|
<20> invokes the blue box fraud
|
|||
|
CAMA <20> testing procedure.
|
|||
|
TRUNK <20>
|
|||
|
<20> Without the Blue Box Fraud
|
|||
|
<20> Detection feature, the CAMA
|
|||
|
<20> office ignores the wink.
|
|||
|
<20>
|
|||
|
<20>
|
|||
|
<20>
|
|||
|
<20>
|
|||
|
V
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
<20> CAMA <20>
|
|||
|
<20> OFFICE <20>
|
|||
|
<20> <20>
|
|||
|
<20> DMS <20>
|
|||
|
<20> 200 <20>
|
|||
|
<20> <20>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20>
|
|||
|
OUTGOING<4E> A
|
|||
|
TRUNK<4E> <20>
|
|||
|
<20> <20>
|
|||
|
<20> WINK
|
|||
|
V
|
|||
|
|
|||
|
Fig. 2 - The Extra Wink
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Page 9
|
|||
|
|
|||
|
|
|||
|
PRACTICE 297-1001-132
|
|||
|
RELEASE: 02.01
|
|||
|
|
|||
|
TESTING FOR FRAUDULENT CALLS
|
|||
|
|
|||
|
2.03 Triggered by the unexpected wink, the DMS-200 begins to
|
|||
|
test the suspected call.
|
|||
|
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20><><EFBFBD>Ŀ
|
|||
|
/O\ To test the call, the DMS-
|
|||
|
<20> 200 establishes a broadcast
|
|||
|
<20> network connection from the
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD>Ŀ <20> suspected incoming CAMA
|
|||
|
<20>BLUE <20><><EFBFBD><EFBFBD><EFBFBD>><3E> trunk to a reserved MF
|
|||
|
<20>BOX <20> <20> receiver (MFR).
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20>
|
|||
|
<20> These MFR are reserved when
|
|||
|
V the feature is activated.
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
<20> <20> As long as the feature is
|
|||
|
<20> END <20> active, the reserved MFR
|
|||
|
<20> OFFICE <20> are not available for
|
|||
|
<20> <20> standard call processing.
|
|||
|
<20> <20>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> NOTE: The number of MFR set
|
|||
|
<20> in reserve depends on the
|
|||
|
<20> number of simultaneous
|
|||
|
CAMA <20> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ fraud attempts expected.
|
|||
|
TRUNK <20> <20>reserved<65> For provisioning MFR refer
|
|||
|
<20>broadcast <20> <20> to 297-1001-450.
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ĵ MFR <20>
|
|||
|
<20>connection<6F> <20> Following is a description
|
|||
|
<20> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> of the events that occur
|
|||
|
<20> <20> after the MFR is attached.
|
|||
|
<20> d<>
|
|||
|
<20> i<>
|
|||
|
<20> g<>
|
|||
|
<20> i<>
|
|||
|
<20> t<>
|
|||
|
<20> s<>
|
|||
|
V V
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
<20> CAMA <20>
|
|||
|
<20> OFFICE <20>
|
|||
|
<20> DMS <20>
|
|||
|
<20> 200 <20>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20>
|
|||
|
OUTGOING<4E>
|
|||
|
TRUNK<4E>
|
|||
|
<20>
|
|||
|
<20>
|
|||
|
V
|
|||
|
|
|||
|
Fig. 3 - The Reserved Multifrequency Receiver
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
|
|||
|
|
|||
|
Page 10
|
|||
|
|
|||
|
|
|||
|
PRACTICE 297-1001-132
|
|||
|
RELEASE: 02.01
|
|||
|
|
|||
|
2.04 After attaching the MFR, the DMS-200 waits for one of the
|
|||
|
following events:
|
|||
|
|
|||
|
EVENT EXPLANATION AND SYSTEM RESPONSE
|
|||
|
|
|||
|
Wink Wink on the same trunk again.
|
|||
|
|
|||
|
System Response: Reset the MFR timeout and continue
|
|||
|
to wait.
|
|||
|
|
|||
|
Digits A fraudulent set of called digits has been
|
|||
|
received.
|
|||
|
|
|||
|
System Response: Provide the charge utility with
|
|||
|
these digits and use the Automatic Message Account-
|
|||
|
ing (AMA) Event Information Digit to flag this call
|
|||
|
as a Blue Box call.
|
|||
|
|
|||
|
Release the MFR.
|
|||
|
|
|||
|
If the CUT option was specified from the MAP, dis-
|
|||
|
connect the call. Refer to Commands on page 14 for
|
|||
|
information about the CUT option.
|
|||
|
|
|||
|
Call failure Mutilated digit(s) detected by the MFR. Several
|
|||
|
things could cause this:
|
|||
|
|
|||
|
o the call may have released
|
|||
|
|
|||
|
o there may be a real transmission problem
|
|||
|
|
|||
|
o the perpetrator may be using SF pulsing.
|
|||
|
|
|||
|
System Response: Release the MFR and assume no
|
|||
|
fraud has taken place.
|
|||
|
|
|||
|
MFR Timeout The time allowed to detect possible fraudulent MF
|
|||
|
digits has expired.
|
|||
|
|
|||
|
System Response: Release the MFR and assume no
|
|||
|
fraud has taken place.
|
|||
|
|
|||
|
|
|||
|
RECORDING FRAUDULENT CALLS
|
|||
|
|
|||
|
2.05 The DMS-200 performs the following actions after detecting
|
|||
|
a fraudulent call:
|
|||
|
|
|||
|
o If the CUT option was not specified, replace the original
|
|||
|
digits in the charge buffer with the fraudulent digits.
|
|||
|
|
|||
|
Note: If the perpetrator places more than one fraudulent
|
|||
|
call, only the last call appears in the charge buffer.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Page 11
|
|||
|
|
|||
|
|
|||
|
PRACTICE 297-1001-132
|
|||
|
RELEASE: 02.01
|
|||
|
|
|||
|
o Set the AMA event information digit to mark the call as a
|
|||
|
Blue Box call. See 297-1001-119.
|
|||
|
|
|||
|
o If the office is performing AMA recording for this call, gen-
|
|||
|
erate a log to alert the operating company office that a Blue
|
|||
|
Box call is in progress. See Logs on page 17.
|
|||
|
|
|||
|
o If the ALARM option was specified at the MAP, generate a
|
|||
|
visual/audible minor alarm.
|
|||
|
|
|||
|
|
|||
|
DISPOSING OF FRAUDULENT CALLS
|
|||
|
|
|||
|
2.06 There are two options for disposing of fraudulent calls:
|
|||
|
cut the call or continue the call.
|
|||
|
|
|||
|
Cut the Call
|
|||
|
|
|||
|
2.07 To cut a fraudulent call, the DMS-200 performs the follow-
|
|||
|
ing actions:
|
|||
|
|
|||
|
o releases the MFR
|
|||
|
|
|||
|
o releases the connection between the originating and terminat-
|
|||
|
ing agents of the call
|
|||
|
|
|||
|
o processes the AMA information
|
|||
|
|
|||
|
o deallocates the terminator
|
|||
|
|
|||
|
o sets treatment for the originator.
|
|||
|
|
|||
|
Continue the Call
|
|||
|
|
|||
|
2.08 If the CUT option was not specified, the DMS-200 releases
|
|||
|
the MFR and the call continues. The perpetrator is billed
|
|||
|
based on the fraudulent digits.
|
|||
|
|
|||
|
2.09 When the subscriber disconnects the call, the system gen-
|
|||
|
erates a log and turns off the alarm if the ALARM option
|
|||
|
was specified.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Page 12
|
|||
|
|
|||
|
OPERATIONAL MEASUREMENTS BLUE BOX FRAUD DETECTION DESC
|
|||
|
1001-132
|
|||
|
NTP
|
|||
|
PRACTICE 297-1001-132
|
|||
|
RELEASE: 02.01
|
|||
|
|
|||
|
3. OPERATIONAL MEASUREMENTS
|
|||
|
|
|||
|
3.01 The Operational Measurement BLUEBOX is associated with the
|
|||
|
Blue Box Fraud Detection feature (see 297-1001-114 for
|
|||
|
more information). The CI command OMSHOW BLUEBOX will display
|
|||
|
the contents of each field.
|
|||
|
|
|||
|
3.02 BLUEBOX has the following fields:
|
|||
|
|
|||
|
FIELD DESCRIPTION
|
|||
|
|
|||
|
BBWinks Number of unexpected winks detected on incoming CAMA
|
|||
|
trunks. These winks could indicate fraudulent calls.
|
|||
|
|
|||
|
BBAttach Number of successful MFR attachments to suspected
|
|||
|
trunks.
|
|||
|
|
|||
|
BBDetect Number of fraudulent calls detected.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Page 13
|
|||
|
|
|||
|
MAN-MACHINE INTERFACE BLUE BOX FRAUD DETECTION DESC
|
|||
|
1001-132
|
|||
|
|
|||
|
NTP
|
|||
|
PRACTICE 297-1001-132
|
|||
|
RELEASE: 02.01
|
|||
|
|
|||
|
4. MAN-MACHINE INTERFACE
|
|||
|
|
|||
|
4.01 The Blue Box Fraud Detection feature is activated by a CI
|
|||
|
command issued at the MAP. The same command can be used
|
|||
|
to query the status of the feature. The following section
|
|||
|
describes the syntax and options of the commands.
|
|||
|
|
|||
|
|
|||
|
COMMANDS
|
|||
|
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
<20> <20> <20>
|
|||
|
<20> <20> <20>
|
|||
|
<20> <20> <20> <20> <20><><EFBFBD> <20> <20>
|
|||
|
<20> BLUEBOX <20> <20>ACT [nmfr [timeout <20>ALARM<52><4D><EFBFBD> <20> <20>
|
|||
|
<20> <20> <20> <20>CUT <20><><EFBFBD> <20> <20>
|
|||
|
<20> <20> <20> <20> <20><><EFBFBD> <20> <20>
|
|||
|
<20> <20> <20>CLR <20> <20>
|
|||
|
<20> <20> <20> <20> <20>
|
|||
|
<20> <20> <20>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
|
|||
|
activates, clears, or queries the status of the Blue Box Fraud
|
|||
|
Detection feature. Activating the feature reserves the specified
|
|||
|
number of MFR. Clearing the feature returns the MFR to the common
|
|||
|
pool.
|
|||
|
|
|||
|
Where:
|
|||
|
|
|||
|
ACT activates the Blue Box feature and reserves the speci-
|
|||
|
fied number of MFR.
|
|||
|
|
|||
|
CLR deactivates the Blue Box feature and returns the MFR to
|
|||
|
the common pool.
|
|||
|
|
|||
|
nmfr specifies the number of MFR to be reserved.
|
|||
|
|
|||
|
o Range: 1 through 3.
|
|||
|
|
|||
|
o Default: 1.
|
|||
|
|
|||
|
timeout specifies the number of seconds the MFR will wait for
|
|||
|
digits.
|
|||
|
|
|||
|
o Range: 5 through 35.
|
|||
|
|
|||
|
o Default: 30.
|
|||
|
|
|||
|
ALARM specifies that an audible/visual alarm will be generated
|
|||
|
when a Blue Box call is detected.
|
|||
|
|
|||
|
CUT specifies that fraudulent calls will be disconnected.
|
|||
|
If this parameter is not specified, the fraudulent call
|
|||
|
will continue.
|
|||
|
Page 14
|
|||
|
|
|||
|
|
|||
|
PRACTICE 297-1001-132
|
|||
|
RELEASE: 02.01
|
|||
|
|
|||
|
Notes:
|
|||
|
|
|||
|
1. The activation parameters are position-dependent. That is,
|
|||
|
nmfr must be specified before timeout; both nmfr and timeout
|
|||
|
must be specified before ALARM or CUT.
|
|||
|
|
|||
|
2. The BLUEBOX command issued without any parameters queries the
|
|||
|
system for the feature status.
|
|||
|
|
|||
|
Examples
|
|||
|
|
|||
|
1. Activate the Blue Box feature using only the default parame-
|
|||
|
ters. The user inputs the following CI command:
|
|||
|
|
|||
|
BLUEBOX ACT
|
|||
|
|
|||
|
The system responds with the feature status and parameters:
|
|||
|
|
|||
|
Bluebox Fraud Detection Feature Status:
|
|||
|
Active.
|
|||
|
1 MFR reserved, timeout set to 30 seconds.
|
|||
|
|
|||
|
2. Activate the Blue Box feature and reserve two MFR. The user
|
|||
|
inputs the following CI command:
|
|||
|
|
|||
|
BLUEBOX ACT 2
|
|||
|
|
|||
|
The system responds with the feature status and parameters:
|
|||
|
|
|||
|
Bluebox Fraud Detection Feature Status:
|
|||
|
Active.
|
|||
|
2 MFR reserved, timeout set to 30 seconds.
|
|||
|
|
|||
|
3. Activate the Blue Box feature and reserve three MFR with a
|
|||
|
timeout of 22 seconds. The user inputs the following CI com-
|
|||
|
mand:
|
|||
|
|
|||
|
BLUEBOX ACT 3 22
|
|||
|
|
|||
|
The system responds with the feature status and parameters:
|
|||
|
|
|||
|
Bluebox Fraud Detection Feature Status:
|
|||
|
Active.
|
|||
|
3 MFR reserved, timeout set to 22 seconds.
|
|||
|
|
|||
|
4. Activate the Blue Box feature with the ALARM option. Reserve
|
|||
|
one MFR with a timeout of 30 seconds. The user inputs the
|
|||
|
following CI command:
|
|||
|
|
|||
|
BLUEBOX ACT 1 30 ALARM
|
|||
|
|
|||
|
The system responds with the feature status and parameters:
|
|||
|
|
|||
|
Page 15
|
|||
|
|
|||
|
|
|||
|
PRACTICE 297-1001-132
|
|||
|
RELEASE: 02.01
|
|||
|
|
|||
|
Blue Box Feature Status:
|
|||
|
Active.
|
|||
|
1 MFR reserved, timeout set to 30 seconds.
|
|||
|
Detection will report alarm.
|
|||
|
|
|||
|
5. Activate the Blue Box feature with the CUT option. Reserve
|
|||
|
two MFR with a timeout of 25 seconds. The user inputs the
|
|||
|
following CI command:
|
|||
|
|
|||
|
BLUEBOX ACT 2 25 CUT
|
|||
|
|
|||
|
The system responds with the feature status and parameters:
|
|||
|
|
|||
|
Bluebox Fraud Detection Feature Status:
|
|||
|
Active.
|
|||
|
2 MFR reserved, timeout set to 25 seconds.
|
|||
|
Detection will cut off call.
|
|||
|
|
|||
|
6. Determine the status of the Blue Box feature. The user inputs
|
|||
|
the following CI command:
|
|||
|
|
|||
|
BLUEBOX
|
|||
|
|
|||
|
If the feature is not active, the system responds with:
|
|||
|
|
|||
|
Bluebox Fraud Detection Feature Status:
|
|||
|
Inactive.
|
|||
|
|
|||
|
If the feature is active, the system responds with the fea-
|
|||
|
ture status and parameters:
|
|||
|
|
|||
|
Bluebox Fraud Detection Feature Status:
|
|||
|
Active.
|
|||
|
2 MFR Reserved, timeout set to 35 seconds.
|
|||
|
Detection will cut off call.
|
|||
|
|
|||
|
7. Deactivate the Blue Box feature and return the MFR to the
|
|||
|
common pool. The user inputs the following CI command:
|
|||
|
|
|||
|
BLUEBOX CLR
|
|||
|
|
|||
|
The system indicates command execution with the response:
|
|||
|
|
|||
|
Bluebox Detection Feature Cleared.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Page 16
|
|||
|
|
|||
|
|
|||
|
PRACTICE 297-1001-132
|
|||
|
RELEASE: 02.01
|
|||
|
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
<20> <20> <20>
|
|||
|
<20> Q <20> BLUEBOX <20>
|
|||
|
<20> <20> <20>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
|
|||
|
queries the system for the syntax of the BLUEBOX command.
|
|||
|
|
|||
|
|
|||
|
Example:
|
|||
|
|
|||
|
Display the BLUEBOX command syntax.
|
|||
|
The user inputs the following CI command:
|
|||
|
|
|||
|
Q BLUEBOX
|
|||
|
|
|||
|
The system responds with the following syntax diagram:
|
|||
|
|
|||
|
Parameters for Bluebox Fraud Detection
|
|||
|
Parms: [<Active Status> {CLR,
|
|||
|
ACT [<Number of MFRs> {1 TO 3}]
|
|||
|
[<Timeout Value> {5 TO 35}]
|
|||
|
[<Notification Option> {ALARM,
|
|||
|
CUT}]}]
|
|||
|
|
|||
|
|
|||
|
ALARMS
|
|||
|
|
|||
|
4.02 If the ALARM option is specified, a minor office alarm is
|
|||
|
activated whenever a Blue Box call is detected. The
|
|||
|
office alarm is deactivated at call disconnect.
|
|||
|
|
|||
|
|
|||
|
LOGS
|
|||
|
|
|||
|
4.03 The following six logs are associated with the Blue Box
|
|||
|
Fraud Detection feature:
|
|||
|
|
|||
|
o AUDT118
|
|||
|
|
|||
|
o EXT106
|
|||
|
|
|||
|
o TRK151
|
|||
|
|
|||
|
o TRK152
|
|||
|
|
|||
|
o TRK153
|
|||
|
|
|||
|
o TRK154.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Page 17
|
|||
|
|
|||
|
|
|||
|
PRACTICE 297-1001-132
|
|||
|
RELEASE: 02.01
|
|||
|
|
|||
|
4.04 The following is a brief description and example of each
|
|||
|
log. See 297-1001-510 for more detailed information.
|
|||
|
|
|||
|
LOG DESCRIPTION
|
|||
|
|
|||
|
AUDT118 The Audit subsystem generates this log when Blue Box
|
|||
|
Fraud Detection feature data is inconsistent with the
|
|||
|
corresponding MFR data. The identified MFR cannot be
|
|||
|
used for fraud detection until the problem is cleared.
|
|||
|
|
|||
|
Example:
|
|||
|
AUDT118 APR12 12:00:00 2112 FAIL BLUEBOX MFR LOST
|
|||
|
CKT RCVRMF 1
|
|||
|
|
|||
|
EXT106 The External Alarms subsystem generates this log when a
|
|||
|
fraudulent call is detected and when that call discon-
|
|||
|
nects.
|
|||
|
|
|||
|
Example:
|
|||
|
*EXT106 MAR14 12:00:00 2112 INFO BLUEBOX ON
|
|||
|
CALL DETECTED
|
|||
|
|
|||
|
|
|||
|
*EXT106 MAR14 12:05:00 2113 INFO BLUEBOX OFF
|
|||
|
CALL DISCONNECTED
|
|||
|
|
|||
|
TRK151 The Trunk Maintenance subsystem generates this log when
|
|||
|
the Bluebox Fraud Detection feature is activated.
|
|||
|
|
|||
|
Example:
|
|||
|
TRK151 APR11 12:00:00 2112 INFO BLUEBOX DETECTION ACTIVE
|
|||
|
# OF MFRS = 2 ALARM ENABLED
|
|||
|
CKT RCVRMF 0 CKT RCVRMF 1 CKT RCVRMF 2
|
|||
|
|
|||
|
TRK152 The Trunk Maintenance subsystem generates this log when
|
|||
|
the Bluebox Fraud Detection feature is deactivated.
|
|||
|
|
|||
|
Example:
|
|||
|
TRK152 APR04 12:00:00 2112 INFO BLUEBOX DETECTION CLEARED
|
|||
|
|
|||
|
TRK153 The Trunk Maintenance subsystem generates this log when
|
|||
|
the Bluebox Fraud Detection feature is active and a
|
|||
|
fraudulent call is detected.
|
|||
|
|
|||
|
Example:
|
|||
|
TRK153 APR16 12:00:00 2112 INFO BLUEBOX CALL DETECTED
|
|||
|
IC TRUNK = CKT RTP2W 1 CALLING # = 9197811199
|
|||
|
OG TRUNK = CKT CARY2W 2 CALLED # = 61247418888
|
|||
|
CALLED # REPLACED BY 3152651234
|
|||
|
CALLID = 123456
|
|||
|
|
|||
|
TRK154 The Trunk Maintenance subsystem generates this log when
|
|||
|
the Bluebox Fraud Detection feature is active and a
|
|||
|
fraudulent call is disconnected.
|
|||
|
|
|||
|
|
|||
|
Page 18
|
|||
|
|
|||
|
|
|||
|
PRACTICE 297-1001-132
|
|||
|
RELEASE: 02.01
|
|||
|
|
|||
|
Example:
|
|||
|
TRK154 APR11 12:00:00 2112 INFO BLUEBOX CALL DISCONNECT
|
|||
|
CKT APEX2W 1
|
|||
|
CALLING # = 6133628669 2 CALLED # = 6124741888
|
|||
|
CALLID = 123456
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Page 19
|
|||
|
|
|||
|
F0184 BLUE BOX FRAUD PREVENTIONN NTX044AA CAMA FDM
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
<EFBFBD> DMS ALL BCS27 Feature Description Manual <20>
|
|||
|
890120 <20>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
<EFBFBD> Package NTX044AA04 CENTRAL AUTOMATIC MESSAGE ACCOUNTING (CAMA)
|
|||
|
<20>
|
|||
|
<EFBFBD> Feature set ADMINISTRATION
|
|||
|
<20>
|
|||
|
<EFBFBD> Feature BLUE BOX FRAUD PREVENTIONN
|
|||
|
<20>
|
|||
|
<EFBFBD> Feature no F0184
|
|||
|
<20>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
<EFBFBD>
|
|||
|
<20>
|
|||
|
<EFBFBD>
|
|||
|
<20>
|
|||
|
<EFBFBD>
|
|||
|
<20>
|
|||
|
<EFBFBD> DESCRIPTION
|
|||
|
<20>
|
|||
|
<EFBFBD> -----------
|
|||
|
<20>
|
|||
|
<EFBFBD>
|
|||
|
<20>
|
|||
|
<EFBFBD> "Blue Box" fraude prevention depends upon an in-band signalling link
|
|||
|
(SF) <20>
|
|||
|
<EFBFBD> being present in an end-to-end call connection. This signalling link
|
|||
|
is <20>
|
|||
|
<EFBFBD> relealsed by the calling party using a blue box before or after the
|
|||
|
called <20>
|
|||
|
<EFBFBD> subscriber answers. The signalling link is then re-seized by the
|
|||
|
calling <20>
|
|||
|
<EFBFBD> party and a new destination directory number outpulsed (MF) using the
|
|||
|
blue <20>
|
|||
|
<EFBFBD> box. This operation, except for the wink start or delay dial signal,
|
|||
|
is <20>
|
|||
|
<EFBFBD> transparent to the offices preceding the in-band signalling link.
|
|||
|
<20>
|
|||
|
<EFBFBD>
|
|||
|
<20>
|
|||
|
<EFBFBD> In order to detect this type of fraud, DMS-200 will detect a seocnd
|
|||
|
pro- <20>
|
|||
|
<EFBFBD> ceed to send signal from the incoming SF unit at the distant office,
|
|||
|
i.e. <20>
|
|||
|
<EFBFBD> a signal having a nominal duration of 200 msec. (greater than 75 msec.
|
|||
|
and <20>
|
|||
|
<EFBFBD> less than 2 sec.). Upon detection of the second proceed to send
|
|||
|
signal, <20>
|
|||
|
<EFBFBD> DMS-200 will connect an MF receiver to the incoming CAMA trunk for a
|
|||
|
pe- <20>
|
|||
|
<EFBFBD> riod of 30 sec. If digits are not received within this 30 sec.
|
|||
|
period, <20>
|
|||
|
<EFBFBD> the second number is entered on tape, together with an identifying code.
|
|||
|
<20>
|
|||
|
<EFBFBD>
|
|||
|
<20>
|
|||
|
<EFBFBD> At this point the call may be dropped or allowed to proceed, the
|
|||
|
operating <20>
|
|||
|
<EFBFBD> company having the necessary data to correctly bill the call. There is
|
|||
|
no <20>
|
|||
|
<EFBFBD> danger of the fraudulent call proceeding after time-out of the DMS-200
|
|||
|
MF <20>
|
|||
|
<EFBFBD> receiver, as the MF receiver at the distant office will time out after
|
|||
|
25 <20>
|
|||
|
<EFBFBD> sec. If this occurs, the fraudulent call must re-instate his call,
|
|||
|
in <20>
|
|||
|
<EFBFBD> which case the detection is repeated.
|
|||
|
<20>
|
|||
|
<EFBFBD>
|
|||
|
<20>
|
|||
|
<EFBFBD>
|
|||
|
<20>
|
|||
|
<EFBFBD>
|
|||
|
<20>
|
|||
|
<EFBFBD>
|
|||
|
<20>
|
|||
|
<EFBFBD>
|
|||
|
<20>
|
|||
|
<EFBFBD>
|
|||
|
<20>
|
|||
|
<EFBFBD>
|
|||
|
<20>
|
|||
|
<EFBFBD>
|
|||
|
<20>
|
|||
|
<EFBFBD>
|
|||
|
<20>
|
|||
|
<EFBFBD>
|
|||
|
<20>
|
|||
|
<EFBFBD>
|
|||
|
<20>
|
|||
|
<EFBFBD>
|
|||
|
<20>
|
|||
|
<EFBFBD>
|
|||
|
<20>
|
|||
|
<EFBFBD>
|
|||
|
<20>
|
|||
|
<EFBFBD>
|
|||
|
<20>
|
|||
|
<EFBFBD>
|
|||
|
<20>
|
|||
|
<EFBFBD>
|
|||
|
<20>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
<EFBFBD> Section B Available Features NTX044AA04 Feat: F0184 <20> Page
|
|||
|
1093 <20>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
|
|||
|
|