
The use of mobile phone financial services (mobile money) has become an essential part of daily life for many citizens. However, alongside these technological advancements, there has also been an increase in cases of financial fraud carried out through mobile phones.
According to various studies on digital financial security, including analysis presented in the book Fraud in Mobile Financial Services, mobile money fraud can generally be categorized into the following main types:
1. Consumer-Driven Fraud
This type of fraud is committed by some mobile service users who have malicious intentions. In many cases, criminals try to exploit system loopholes or provide false information in order to obtain money illegally.examples include:Falsely claiming that a transaction was not received in order to demand a refund, sending deceptive messages to others to obtain money and pretending to be victims of fraud in order to receive illegitimate compensation.
2. Agent-Driven Fraud
Mobile money agents act as an important link between customers and telecommunications companies. However, in some situations, certain agents misuse their positions to commit fraudulent activities.
Examples include:Using customers’ phone numbers or personal information without their consent,manipulating the amount of money involved in transactions and conducting transactions without the customer’s authorization in order to earn additional commissions.
3. Business Partner-Driven Fraud
This form of fraud occurs when certain partners involved in financial services or payment systems misuse their role within the system. Examples include:Misrepresenting financial transaction records, misleading customers about service terms or transaction costs and altering payment records for personal gain.
4. System Administration and Operator-Driven Fraud
This type of fraud occurs within the technological systems that manage mobile financial services. It often happens when there are security weaknesses or when someone with authorized system access abuses their privileges.Examples include:Altering or deleting transaction records (data manipulation), hacking mobile money systems and transferring funds illegally and exploiting security vulnerabilities within mobile payment platforms.
Digital security experts emphasize that reducing mobile financial fraud requires close cooperation between telecommunications companies, financial institutions, and law enforcement authorities such as the Tanzania Police Force.
In addition, citizens are advised to remain cautious by protecting their personal identification numbers (PINs), verifying transactions before completing them, and reporting immediately if they suspect any form of mobile phone financial fraud.
