Language

31 Jul 2024in Business use cases

Identity Verification in Telecoms: Industry-Specific Obstacles & Solutions

Henry Patishman

Executive VP, Identity Verification solutions at Regula

The number of customers of an average Telecommunications company is frequently comparable to the population size of the country it operates in. Large nations like the US or India have more than one business in the industry. Global players, connecting people from dozens of locations worldwide, often boast the most impressive coverage.

For instance, in 2024, the market capitalization of T-Mobile US, the leading Telecom company in the world, reached $214.88 billion, and it continues to grow. To compare, the market capitalization of McDonald’s is $185.96 billion as of July 2024.

In this massive flow of subscribers, there are not only legitimate clients. From fraudsters to terrorist supporters, millions of lawbreakers hide under someone’s identities on the dark side of the market.

Identity verification (IDV), as a critical component of onboarding in Telecoms, is designed to detect bad actors, preventing the use of web and mobile channels for illegal communication.

But do regular IDV solutions meet specific needs of companies in this sector? Let’s find out in this post.

Stay Tuned!

Get more posts like this in your inbox

Identity verification in Telecoms: What are the pitfalls?

On the one hand, the verification process for telco operators is standard. To register as a new subscriber, a user must present their personal data, such as name, date of birth, address, etc., usually verified through their ID document.

However, the circumstances under which businesses in the industry act, as well as the challenges they have to address, are specific.

Telecommunications fraud

For starters, many scams targeting customers of businesses from other sectors involve using communication services to deceive people. For example, many users received phishing messages with malicious links or calls from scammers impersonating officials.

Fraud in Telecom industry itself takes many forms. Subscription fraud is one of them. It occurs when fraudsters obtain mobile devices and services using someone else's or synthetic identity with no intention of paying. This is possible because many operators now offer credit and non-personal shipping options.

High-end smartphones purchased this way can be resold after mobile OS jailbreaking, while pay-as-you-go vouchers can be exploited by criminals and never redeemed after purchase.

Vodafone Ireland delivery details

Fraudsters may use stolen identities to order a purchase for delivery. Sometimes, there is no identity verification step when receiving the order. For instance, somebody can sign for a delivery from Vodafone Ireland without proper verification. Source

The integration of telco services with finance-related businesses

Mobile numbers are one of the user identifiers not only in Telecom but also in many other industries, including e-Commerce, Financial Services, and Banking. This channel is frequently used for customer identification, authentication, or mobile identity verification.

As a result, Telecoms are connected to many other businesses via their customers. This is a double burden since they are at the forefront where the first contact with a client (who may be a criminal or imposter) occurs. Additionally, this circumstance makes them prime targets for bad actors aiming to exploit the identities of legitimate customers and gain illicit access to their funds.

Walmart registration form

A seller registration form on Walmart includes a field for the business phone number. Source

Strict KYC regulations

Telecom companies are under some form of government control almost everywhere. Typically, they must know their subscribers thoroughly. In addition to standard Know Your Customer (KYC) regulations set out in Anti-Money Laundering (AML) and anti-terrorism financing rules, there are also several specific technical requirements. For example:

  • The STIR/SHAKEN framework in the US: Adopted by the Federal Communication Commission (FCC) in 2020, this is a set of industry standards and protocols for the authentication and verification of caller ID information for calls carried over IP networks. In plain language, it means that telecoms need to ensure that “Mr.Smith” is actually “Mr. Smith” when his caller ID appears on your phone’s display.

  • The Calling Name Presentation (CNAP) in India:The CNAP allows users to always see caller names on their phones, even if the caller isn't on their contacts list. Presented by the Telecom Regulatory Authority of India, this feature should be available on all mobile devices sold in the country and provided upon subscriber request.

  • The Rich Call Data (RCD): This framework combines authenticated Caller ID and RCD powered by STIR/SHAKEN framework and protocols. The approach has been implemented by some major industry players, including T-Mobile and First Orion, as a proof-of-concept with the potential to become a new industry standard in the future. Subscribers within the network receive a verified call with the business name, logo, and a reason for calling displayed on their device, preventing scams and Telecom fraud.

Rich Call Data framework in T-Mobile

RCD enables call verification by showing customers all critical details about a caller. Source

The prevalence of online interactions with customers

Most Telecom operators interact with their subscribers remotely. Typically, there is one offline interaction between a company and a new client when they buy a SIM card or subscribe to the service for the first time. All further interactions, such as topping up a balance or adding new services, occur online.

This means that the customer verification stage often involves presenting ID scans and selfies, creating a demand for a secure telco identity verification solution. With the strict KYC regulations, this process can be cumbersome for customers.

Identity verification form on Vodafone

Sometimes remote identity verification requires manual work from the user, such as filling out a detailed application form like this one from Vodafone UK.

Digital nomads and travelers among subscribers

Telecom companies frequently deal with non-residents, including tourists and digital nomads. These are a specific group of customers who change their residency several times per year. As temporary users, they subscribe to services to access the internet or make calls during their stay in a country.

As a result, many IDs issued abroad are submitted to companies’ systems. According to an identity verification survey conducted by Regula, 67% of businesses in the sector experienced an increase in foreign IDs when transferring a phone number to a new provider and another 65% when activating a new mobile phone or SIM card.

To manage this diverse document flow, some operators limit the types of IDs that can be submitted to one option. For example, Vodafone Turkey offers a tourist SIM card that users may apply for by presenting their passport identification number.

Vodafone tourist SIM card application form

In Turkey, tourists may acquire a special Vodafone SIM card by applying online and picking it up at a physical shop.

What might the Telecom-intended IDV process look like?

As the Regula survey shows, 9 out of 10 organizations in the Telecom industry consider IDV a crucial tool in combating the increasing threat of identity fraud. However, the process should also remain comfortable and smooth for customers. 

What components are nice to have in such a solution?

Identity document and biometric verification

Companies in the industry surveyed by Regula emphasize sophisticated types of identity theft and fraud as real threats. Synthetic identity fraud (highlighted by 87% of respondents) and video deepfakes (80%) concern the majority of Telecoms. To combat these and other forms of identity and Telecom fraud, companies need comprehensive IDV solutions that include both document and biometric verification components. 

Some telco operators have already adopted this approach. For instance, all new customers of Andorra Telecom must submit their ID document and take a selfie during registration. Additionally, the company notifies customers that the onboarding session will be recorded and their location will be detected.

Andorra Telecom registration process

The entire registration session on Andorra Telecom is recorded, requiring customers to give permission to access their camera and allowing the company to see their location. Source

Data entry automation

Customer verification in Telecoms frequently involves submitting personal details, such as name, address, date of birth, etc. Typically, this information is filled out manually, which slows down the process on the user’s end. Not a good sign for a very competitive industry!

This process can be streamlined through data entry automation, where all necessary details are captured and entered automatically during ID scanning. As a result, onboarding takes seconds instead of 5-10 minutes many mobile operators currently declare.

Proof of identification form on Base

Base, a Belgian Telecom company, asks all new users to fill out several application forms, including one with their ID details. Source

NFC verification

In a remote identification scenario, it’s challenging to ensure the user presents a physical ID for verification. As GenAI's capabilities become more impressive daily, fraudsters can create AI fakes that may look compelling enough to deceive the system. 

The use of electronic IDs with an RFID chip enhances the online verification process, as the chip is a much more fraud-resistant security feature. For this reason, more companies in Telecom are harnessing this technology, offering eID verification as an option for their customers. The procedure takes less time—users simply need to tap the chip on their NFC-enabled device to complete the verification.

Proximus eID verification form

Proximus, a Belgian telco company, offers eID card verification among other types of ID verification for online users. Source

A complete ID template database in the backend

Tourists, work travelers, and digital nomads make up a large part of Telecoms' target audience. Moreover, they serve non-residents in their domestic markets. As a result, their customers use various ID documents as proof of identity, which differ in layout, language, security features, etc. 

To effectively verify people from all over the world, an IDV solution used by Telecom businesses must rely on a large, regularly updated ID template database consisting of various types of IDs, including their multiple series.

Rely on Regula’s identity verification expertise

As a hardware and software developer with over 30 years of experience in IDV, Regula offers complete solutions for identity and biometric verification:

 

  • Regula Document Reader SDK for seamless integration into apps and web platforms to easily verify passports, visas, driver’s licenses, residence permits, and other ID documents.

  • Regula Face SDK for face recognition, identification, and matching to verify customers through selfies.

  • Liveness detection technology for ID documents and biometrics.

  • Over 14,000 ID templates from 251 countries and territories in the database.

  • A test-drive or pilot implementation for testing our solutions under your specific use cases.

Don't hesitate to get in touch with one of our representatives to learn more.

 

Make the Connected World a Safer Place

with the Regula identity verification solutions

Learn more

On our website, we use cookies to collect technical information. In particular, we process the IP address of your location to personalize the content of the site

Cookie Policy rules