a fair summary is: “a deception deliberately practiced in order to secure unfair or unlawful gain.” The Telecoms Management Forum defines Revenue Assurance as the: “data quality and process improvement methods that improve profits, revenues and cash flows without influencing demand.” Together the revenue losses from RA and Fraud can be significant
Call & port forwarding Product mix complexity Profitability Pricing signals driving behaviour Box breaking SIM Gateways Roaming Incorrect pricing tables Employees Bad debt & Credit worthiness Number porting Passing on of customer details Slamming Invoicing accuracy Theft SIMs , handsets & subscriptions “Goodwill” credits Process interfaces Accuracy of customer information at touchpoints A FEW RA & FRAUD ISSUES Real-time vs batch processing Accuracy of data flows Metallic number resale Channel incentivisation B D
7 categories: Voice – threat of impersonation for malicious or profitable motives Subscription – use of a legitimate subscriber’s network access for malicious or profitable motives Data – removal, inspection or insertion of data onto a network for malicious or profitable motives Internal – abuse of access to operator data by an employee for malicious or profitable motives Interconnection – exploitation of operator interconnection agreements for malicious or profitable motives Roaming – exploitation of operator roaming agreements for malicious or profitable motives Technical – use of counterfeiting or other technologies to duplicate, infiltrate or manipulate a mobile network for malicious or profitable motives
feature where fraudster acts as an ‘operator’ setting up calls between parties and then dropping out to set up another GSM call forwarding where fraudster sets call forward to required number. Caller calls the fraudster’s phone and is transferred. Caller only pays for the call to the fraudster’s phone number. Fraudsters using a gateway to provide an international ‘call box’ from shops Internal Fraud Mobile markets are very competitive with operators subsidising handsets to entice new customers to subscribe. Dealer or gangs often sell these handsets on to overseas buyers. And of course pre-paid handsets can be unlocked and used on any network Roaming fraud (I) Where operators have roaming agreements Operator A must pay Operator B for the time used by their customers on Operator’s B network regardless of whether Operator A is paid for the time Principle problem is the time it takes for billing from Operator B to Operator A - used to be 72 hours now down to 24 hours using EDI GSM MoU states that any user exceeding 100 Special Drawing Rights (SDR) must be billed within 24 hours But, when is collection actually made? Roaming fraud (II) SIM cards are taken out of phones acquired with false identities and sent abroad where they are used in call selling fraud. Call lengths of over 10 hours typical EXAMPLE OF FRAUDULENT ACTIVITIES
is to: monitor for evidence of loss investigate where & why there is loss resolve the problems so loss does not occur again However changing nature of business relationships means not clear where boundaries lie & hence where operational risk may arise process design & data integrity becomes even more important Collaborative methods of working are essential to mutually assure data, revenues & costs Service Provider Content Services Fixed Operator Carrier Services Mobile Operator Bearer Services Gamma Telecom Virtual Network Enabler Enterprise Contracting party Customer End-user THE CHALLENGE
to be: Fraud Credit management Least-cost-routing errors Interconnect / partner-payment errors Poor processes & systems All adds up to a loss of customer confidence in your business… Follow the cash Understand the processes Audit rights with partners Strength & enforceability of commercial agreements Traceability of products in the distribution chain Integrity of interfaces – human & automated Training & culture Who has access to customer data?
from a convenient point, such as the customer invoice, to the first source of data capture Allows the detail of how the data flows & is manipulated to be understood and data integrity / leakage risks quantified Can be a time consuming process The Grid Approach The key mobile revenue streams & logical operations for each stream are identified and set out in a grid (e.g. voice, sms, interconnect streams versus switch, mediation, rating, invoicing operations) Offers a useful visual framework to help identify common processes & enable a high-level understanding of how the processes work, the controls and checks, known leakages and the confidence that all leakages / fraud risks have been identified The issue is that this approach may not capture sufficient detail nor show the commonality of operations between revenue streams