This Supplement describes a methodology for evaluation systems of security controls for preventing fraudulent activities, and criteria for selection of these systems, with regard to architectural characteristics of communications service provider (CSP) networks at their present-day level of development. The Supplement includes technical methods for addressing security controls and estimating losses caused by fraudulent activities, and also provides guidelines for the exchange of information related to fraudulent activities.