A method for detecting fraud in a wireless communication system (100). During a first access to the system using a subscriber account, the system stores data identifying the first access in a database. During a second subsequent access to the system using the same subscriber account, the system retrieves the stored data identifying the first access and transmits at least a portion of the retrieved data to the wireless device used for the second access. The user of the device reviews the data, determines whether the first access was authorized, and sends a response to the system indicative of whether the first access was fraudulent. If the response indicates that the first access may have been fraudulent, the wireless service provider may take appropriate action.
展开▼