Email a colleague    

April 2015

Insider Fraud: How to Create an Anti-Fraud Culture in Your Telecom Organization

Insider Fraud: How to Create an Anti-Fraud Culture in Your Telecom Organization

Insider fraud is as old as man himself.  After all, stealing that apple from the Forbidden Garden was an insider’s job.  Eve came up with the plan and Adam happily joined in: together they conspired to con the Big Boss.  The rest is history :- )

Thirteen years after the WorldCom scandal, experts generally agree that insider fraud remains a massive problem in telecom, though no one, not even the CFCA has published an estimate of how big the problem is.

And that news can be rather disturbing to revenue assurance and fraud managers who have successfully stopped external fraudsters and claimed the credit for it.  Another uncomfortable fact is that insider fraud is much harder to detect than external frauds such as IRSF or International Bypass.

So where to begin?  Well perhaps the best place to start is to speak with a true expert, such as Mark Yelland, a man who regularly consults with and trains the staff at telecom operators on the matter of insider fraud.

The interview below is the first of two Black Swan interviews with Mark on the subject.  In the article below, he gives tips on how telecoms can begin to build the right methodologies and company culture to combat insider fraud.  In the second article (to be published in a few weeks) he delves into the tactics of the fraudsters: how they avoid detection, and the telltale mistakes that often lead to their discovery.

Dan Baker: What’s your take on human nature, Mark?  Have we made any progress on insider fraud since Adam and Eve?

Mark Yelland: Well, I’m not sure we have!  People remain rather self-serving and cunning.  They have their own vested interests at heart.  I don’t think I’ve ever met anyone who said, “Oh, I am being paid too much.” On the contrary, people say all the time, “I could do with some extra money.”

Just a couple weeks ago, we have the example on the British Television where Malcolm Rifkind and Jack Straw were selling access to the government and politicians.  And yet they make 67,000 pounds a year in salary in a country where the average working wage is 24,000 pounds.  So, they were well over the average working wage, but still felt compelled to make money by selling access.

Now, of course, we in the telecom industry have big issues of our own .  One of the more interesting examples of a fraud culture I’ve heard about was the case of some switch engineers who committed fraud and said, “Yes, my manager knows I do this.  He would like to pay us more but because the company doesn’t have the budget to pay us what we’re worth, he lets us do this as a way of compensating for our lower wages.”

Now, whether the manager did or didn’t actually approve this fraud doesn’t really matter.  The point is: how do you fight that as a culture?  Because if that’s what all the people around him believe, how does he know it’s not okay?  He can justify to himself that what he is doing is perfectly acceptable.

That says you really need to be careful in your HR and hire the right people who are honest and respect their employer.

I actually think it goes deeper than that, Dan.  If you look at the various national cultures around the world, there are some where doing favors for people and being rewarded is a way of life.  This is prevalent in places like the Middle East, Afghanistan, India, and Pakistan, for example.

Places like the U.S. and the U.K. have tried to address this with their new rules on financial conduct not accepting bribes.  Even still, business people need to be careful because you may end up not succeeding in certain countries because that is the way business is done in, say, the Middle East: they do business with people who they know because you build relationships with them.  You scratch my back, and I scratch yours.

The Middle East does business with people it has done business with before.  So, it doesn’t matter whether your money is good or bad, if they know you and trust you, that is all that matters.  You might get a little thank you.  It is the culture.  I suppose that is one of our main concerns about internal fraud, is it fraud or is it the culture?  You can tackle fraud, but you cannot tackle the culture.

What can be done if the culture encourages fraud?

Well, whether the culture is specific to a country or to a business, you have to make sure that you operate inside the restrictions of that culture.  There is no right or wrong culture, but still, you cannot turn a blind eye to fraud.

And fraud these days is not just happening in sales, of course.  Fraud happens in all departments, we have seen people in the billing department selling billing records to private investigators because they were investigating potential divorce cases.  We have seen senior management claiming expenses for things that they shouldn’t have been claiming.  We had instances where someone got imprisoned because they were collecting credit card information and passing it on to relatives for them to exploit.

These people did their time in prison, and in many cases, they come back, take a similar type of job at another company and commit the exact same fraud again.  And the reason they were put in that position a second time indicates a lack of proper HR screening and not doing thorough background checks.

I see, to win in combating insider fraud, you need to be very methodical in your procedures.  Now, when you go in and consult with a client about internal fraud, what’s the first thing you look at?

It’s ironic, I suppose, but the first thing I look at are the people in the fraud department who are responsible are fighting the fraud.

I can’t emphasize enough: you cannot break the law yourself.  It doesn’t matter what the other guy does, someone in the fraud department cannot embarrass the company by doing something illegal himself.

And that means: don’t fudge your expenses, don’t take a company pen home with you.  People think these things are inconsequential, but when people see you have a criminal capability, they figure you can be exploited.

“Why did you take the pad of paper?  Well, it just lying around and I needed some paper, so I took it.” Once you start explaining that as your motivation, you are compromised.  The easiest thing for the fraudster to say is that you are a criminal too, and in that way divert all your attention away from themselves so that you become the subject of investigation for some alleged comment that was made.  You have to be squeaky clean and it maybe difficult and it may be painful, but you have to do it, otherwise, if you are compromised, your whole work is threatened.

You see it in cases in the States.  There have been cases involving people on death row where the investigating officer has been found to have fabricated evidence or withheld evidence, so all his cases need to be reviewed.

It doesn‘t matter: if his reputation has been sullied, all his other decisions are now being questioned.  It’s much better not to put yourself in a position where you are at risk.  That’s my philosophy.

OK, once you’re satisfied that the right people are fighting fraud, what’s next?  What procedures do you usually put in place in a service provider organization?

I tend to start on the HR procedures needed for dealing with someone who has committed fraud.  Every organization needs to decide how they are going to handle these cases and what the outcome is going to be.  What you don’t want is an ad-hoc process whereby someone from HR walks down the hallway, has a conversation, and as a result of that, there is a disciplinary action.

You’ve got to make sure that everything is above board, legitimate, and cannot be challenged.  Employees need a clear understanding of what behavior is acceptable and what is not — and what the penalty is for deviation from that behavior.

The next thing is to set up a network so it’s easy for people to report suspicious behavior without compromising themselves.  In the classic whistleblower scenario, you’re sending an email.  The problem is that when you send an email, everyone knows who sent it.  Picking up the phone and dialing to a free phone number is reasonably okay, but then people have to act on it.

My concern is having the right person in the place to deal with the fraud first.  So, if you haven’t got the right person in place and if you sack someone for an offence and you don’t take action for the same offence by someone else, you are on dangerous ground to fight a claim for unfair dismissal.  What you don’t want to do is set yourself up to be sued by someone who has committed a fraud.

So there’s quite a bit of planning and setup before you can establish a solid an anti-fraud culture and program.

Yes, and unfortunately, a lot of organizations only take their anti-fraud measures halfway.  They’ve got the processes and procedures in place for instant dismissal for certain types of offences.  What they haven’t thought deeply about is the evidence they need to collect to be able to show that the fraud was committed.

How should you hold this evidence?  And how do you make sure that the evidence doesn’t get lost, destroyed — or whatever — should the case eventually go to court?

Have you got people who are trained to interview properly?  And what are the proper ways of getting people to talk about what they are doing?  In some respects, finding the fraudster is the easy part: the hard part is making sure you can do something with the evidence.

Knowing what steps to take and when is key.  If you waste time or bungle the interviews, you maybe give the fraudster enough time to destroy the evidence or to resign from the company.

So the hard part is the preparation — make sure things are in place.  And the other thing you don’t do is change your tactics based on who you are interviewing.  So, if you boot out a low-level maintenance engineer, he should get the exact same treatment as if it’s the head of operations.  If they both commit a fraud, they should both be treated with the same level of respect and given the same opportunities.

Sounds like senior management needs to have an active role in the anti-fraud program.

Absolutely, and one of the reasons their support is vital is that the senior execs are responsible for how the business is perceived in the local community.  If the community sees the company as treating its employees poorly, that has serious business consequence, such as the inability to hire quality people.

But much of what senior management needs to shepherd is ensuring the right people and processes are in place in fraud management.  And that includes knowing where you would store the information, who you would notify, how you notify them.  And also understanding the outcomes you want to achieve: have you decided to get rid of the guy, discipline him, or take him to court?

If you take him to court, it becomes public knowledge, so you have reputation issues.  If you sack him, are you guilty of an unfair dismissal by taking away his pension rights?  Lots of employee rights issues to nail down.

Mark, your insights are wonderful and highly interesting.  What are your final thoughts about growing an anti-fraud culture?

Dan, educating employees about the seriousness of fraud issues is certainly key.  You have got to get people to understand what is at stake.  And what’s at stake is the ethics of the company.

Now to show that you mean business, you must plan your anti-fraud strategy upfront — and in great detail.  You can’t make these decisions on a day-by-day basis.

And when you plan properly, it allows you to win on the fairness issue.  People need to see that your anti-fraud program is being applied consistently and fairly.  People need to know: it doesn’t matter how high up in the organization you are, you still get treated the same if you are a fraudster.  It gives confidence to the whistleblower and others whose support you need.

When the policy is ingrained in the culture, then people start respecting what people in the fraud and security department do.  But if the guy at the top gets away with fraud, and the guy at the bottom doesn’t, what does it say about you?

Copyright 2015 Black Swan Telecom Journal

 
Mark Yelland

Mark Yelland

Mark Yelland has been working in the revenue assurance and fraud space for over 20 years.  For the last five, he has run a small consultancy firm, RAAIIM, targeting the smaller and newer operators, helping them get started or improve their revenue leakage and risk management.  Showing them what can be achieved with minimal spend — getting more out of their existing systems, or developing tools using open-source products.

Like all engineers, he enjoys solving problems of all types, trying to find elegant, cost effective and simple solutions to big problems.  His engineering training comes from the degree course at Cambridge University and his business skills come from the Open University MBA.   Contact Mark via

Black Swan Solution Guides & Papers

cSwans of a Feather

  • Insider Fraud: How to Create an Anti-Fraud Culture in Your Telecom Organization interview with Mark Yelland — Thirteen years after the WorldCom scandal, experts generally agree that insider fraud remains a massive problem in telecom.  In this article you’ll learn the outlines of building a program to instill an anti-fund culture at your telecoms organization.
  • Converging Criminal and Technical Intelligence: Secret to Combating the Explosion in Telecom Fraud and Security Threats interview with Mark Johnson — A fraud and security expert gives a big picture talk on why industry convergence is driving the need for a broader “revenue risk intelligence.”  His prescription?  Yes, telecoms surely need to excel in technical  infrastructure such as traffic usage data, IP intrusion appliances, and physical barriers.  But just as important is the need to pair that knowledge with the real-life lessons of fighting criminals in general.
  • Insider Fraud: Detecting Criminal Activity in the Telecom Sales Process interview with Tal Eisner — One of the biggest problems telecoms now face is fraud done inside their offices, dealer stores and firewalls.  This type of fraud is especially dangerous because it’s performed by people fully authorized to transact for the company.  The story dicusses the major causes of insider fraud, presents a case study, and explains basic techniques that software uses to detect insider fraud.

Related Articles

  • Tokopedia, Indonesia’s E-Commerce King, Partners with 11 Million Merchants; Adopts Multi-Cloud to Drive Innovation interview with Warren Aw & Ryan de Melo — Indonesia’s Tokopedia, founded in 2009, has grown to become one of world’s leading e-commerce players.  Read about its success, technology direction, and multi-cloud connectivity adoption.
  • Bridge Alliance: Knocking Down Regional & Mobile Connectivity Barriers so Connected Car Markets Get Rolling in Asia interview with Kwee Kchwee — The CEO of an Asian consortium of mobile operators explains how they  help simplify and harmonize their members‘ operations in support of multi-national corporations.  This integration is enabling two huge industries to come together in Asia: auto manufacturing and telco.
  • Epsilon’s Infiny NaaS Platform Brings Global Connection, Agility & Fast Provision for IoT, Clouds & Enterprises in Southeast Asia, China & Beyond interview with Warren Aw — Network as a Service, powered by Software Defined Networks, are a faster, more agile, and more partner-friendly way of making data global connections.  A leading NaaS provider explains the benefits for cloud apps, enterprise IT, and IoT.
  • PCCW Global: On Leveraging Global IoT Connectivity to Create Mission Critical Use Cases for Enterprises interview with Craig Price — A leading wholesale executive explains the business challenges of the current global IoT scene as it spans many spheres: technical, political, marketing, and enterprise customer value creation.
  • Senet’s Cloud & Shared Gateways Drive LoRaWAN IoT Adoption for Enterprise Businesses, Smart Cities & Telecoms interview with Bruce Chatterley — An IoT netowork pioneer explains how LoRaWAN tech fits in the larger IoT ecosystem.  He gives use case examples, describes deployment restraints/costs, and shows how partnering, gateway sharing, and flexible deployment options are stimulating growth.
  • ARM Data Center Software’s Cloud-Based Network Inventory Links Network, Operations, Billing, Sales & CRM to One Database interview with Joe McDermott & Frank McDermott — A firm offering a cloud-based network inventory system explains the virtues of: a single underlying database, flexible conversions, task-checking workflow, new software business models, views that identify stranded assets, and connecting to Microsoft’s cloud platform.
  • Pure Play NFV: Lessons Learned from Masergy’s Virtual Deployment for a Global Enterprise interview with Prayson Pate — NFV is just getting off the ground, but one cloud provider to enterprises making a stir in virtual technology waters is Masergy.  Here are lessons learned from Masergy’s recent global deployment using a NFV pure play software approach.
  • The Digital Enabler: A Charging, Self-Care & Marketing Platform at the Core of the Mobile Business interview with Jennifer Kyriakakis — The digital enabler is a central platform that ties together charging, self-care, and marketing.  The article explains why leading operators consider digital enablers pivotal to their digital strategies.
  • Delivering Service Assurance Excellence at a Reduced Operating Cost interview with Gregg Hara — The great diversity and complexity of today’s networks make service assurance a big challenge.  But advances in off-the-shelf software now permit the configuring and visualizing of services across multiple technologies on a modest operating budget.
  • Are Cloud-Based Call Centers the Next Hot Product for the SMB Market? interview with Doron Dovrat — Quality customer service can improve a company’s corporate identity and drive business growth.  But many SMBs are priced out of acquiring modern call center technology.  This article explains the benefits of affordable and flexible cloud-based call centers.
  • Flexing the OSS & Network to Support the Digital Ecosystem interview with Ken Dilbeck — The need for telecoms to support a broader digital ecosystem requires an enormous change to OSS infrastructures and the way networks are being managed.  This interview sheds light on these challenges.
  • Crossing the Rubicon: Is it Time for Tier Ones to Move to a Real-Time Analytics BSS? interview with Andy Tiller — Will tier one operators continue to maintain their quilt works of legacy and adjunct platforms — or will they radically transform their BSS architecture into a new  system designed to address the new telecom era?  An advocate for radical transformation discusses: real-time analytics, billing for enterprises, partnering mashups, and on-going transformation work at Telenor.
  • Paradigm Shift in OSS Software: Network Topology Views via Enterprise-Search interview with Benedict Enweani — Enterprise-search is a wildly successful technology on the web, yet its influence has not yet rippled to the IT main stream.  But now a large Middle Eastern operator has deployed a major service assurance application using enterprise-search.  The interview discusses this multi-dimensional topology solution and compares it to traditional network inventory.
  • The Multi-Vendor MPLS: Enabling Tier 2 and 3 Telecoms to Offer World-Class Networks to SMBs interview with Prabhu Ramachandran — MPLS is a networking technology that has caught fire in the last decade.  Yet the complexity of MPLS has relegated to being mostly a large carrier solution.  Now a developer of a multi-vendor MPLS solutions explains why the next wave of MPLS adoption will come from tier 2/3 carriers supporting SMB customers.
  • Enabling Telecoms & Utilities to Adapt to the Winds of Business Change interview with Kirill Rechter — Billing is in the midst of momentous change.  Its value is no longer just around delivering multi-play services or sophisticated rating.  In this article you’ll learn how a billing/CRM supplier has adapted to the times by offering deeper value around the larger business issues of its telecom and utility clients.
  • Driving Customer Care Results & Cost Savings from Big Data Facts interview with Brian Jurutka — Mobile broadband and today’s dizzying array of app and network technology present a big challenge to customer care.  In fact, care agents have a hard time staying one step ahead of customers who call to report problems.  But network analytics comes to the rescue with advanced mobile handset troubleshooting and an ability to put greater intelligence at the fingertips of highly trained reps.
  • Hadoop and M2M Meet Device and Network Management Systems interview with Eric Wegner — Telecom big-data in networks is more than customer experience managment: it’s also about M2M plus network and element management systems.  This interview discusses the explosion in machine-to-machine devices, the virtues and drawbacks of Hadoop, and the network impact of shrink-wrapped search.
  • The Data Center & Cloud Infrastructure Boom: Is Your Sales/Engineering Team Equipped to Win? by Dan Baker — The build-out of enterprise clouds and data centers is a golden opportunity for systems integrators, carriers, and cloud providers.  But the firms who win this business will have sales and engineering teams who can drive an effective and streamlined requirements-to-design-to-order process.  This white paper points to a solution — a collaborative solution designs system — and explains 8 key capabilities of an ideal platform.
  • Big Data: Is it Ready for Prime Time in Customer Experience Management? interview with Thomas Sutter — Customer experience management is one of the most challenging of OSS domains and some suppliers are touting “big data” solutions as the silver bullet for CEM upgrades and consolidation.  This interview challenges the readiness of big data soluions to tackle OSS issues and deliver the cost savings.  The article also provides advice on managing technology risks, software vendor partnering, and the strategies of different OSS suppliers.
  • Calculated Risk: The Race to Deliver the Next Generation of LTE Service Management interview with Edoardo Rizzi — LTE and the emerging heterogeneous networks are likely to shake up the service management and customer experience management worlds.  Learn about the many new network management challenges LTE presents, and how a small OSS software firm aims to beat the big established players to market with a bold new technology and strategy.
  • Decom Dilemma: Why Tearing Down Networks is Often Harder than Deploying Them interview with Dan Hays — For every new 4G LTE and IP-based infrastructure deployed, there typically a legacy network that’s been rendered obsolete and needs to be decommissioned.  This article takes you through the many complexities of network decom, such as facilities planning, site lease terminations, green-safe equipment disposal, and tax relief programs.
  • Migration Success or Migraine Headache: Why Upfront Planning is Key to Network Decom interview with Ron Angner — Shutting down old networks and migrating customers to new ones is among the most challenging activities a network operators does today.  This article provides advice on the many network issues surrounding migration and decommissioning.  Topics discussed include inventory reconciliation, LEC/CLEC coordination, and protection of customers in the midst of projects that require great program management skills.
  • Navigating the Telecom Solutions Wilderness: Advice from Some Veteran Mountaineers interview with Al Brisard — Telecom solutions vendors struggle mightily to position their solutions and figure out what to offer next in a market where there’s considerable product and service crossover.  In this article, a veteran order management specialist firm lays out its strategy for mixing deep-bench functional expertise with process consulting, analytics, and custom API development.
  • Will Telecoms Sink Under the Weight of their Bloated and Out-of-Control Product Stacks? interview with Simon Muderack — Telecoms pay daily for their lack of product integration as they constantly reinvent product wheels, lose customer intelligence, and waste time/money.  This article makes the case of an enterprise product catalog.  Drawing on central catalog cases at a few Tier 1 operators, the article explains the benefits: reducing billing and provisioning costs, promoting product reuse, and smoothing operations.
  • Virtual Operator Life: Enabling Multi-Level Resellers Through an Active Product Catalog interview with Rob Hill — The value of product distribution via virtual operators is immense.  They enable a carrier to sell to markets it cannot profitably serve directly.  Yet the need for greater reseller flexibility in the bundling and pricing of increasingly complex IP and cloud services is now a major channel barrier.  This article explains what’s behind an innovative product catalog solution that doubles as a service creation environment for resellers in multiple tiers.
  • Telecom Blocking & Tackling: Executing the Fundamentals of the Order-to-Bill Process interview with Ron Angner — Just as football teams need to be good at the basics of blocking and tackling, telecoms need to excel at their own fundamental skillset: the order-to-cash process.  In this article, a leading consulting firm explains its methodology for taking operators on the path towards order-to-cash excellence.  Issues discussed include: provisioning intervals; standardization and simplicity; the transition from legacy to improved process; and the major role that industry metrics play.
  • Wireline Act IV, Scene II: Packaging Network & SaaS Services Together to Serve SMBs by John Frame — As revenue from telephony services has steadily declined, fixed network operators have scrambled to support VoIP, enhanced IP services, and now cloud applications.  This shift has also brought challenges to the provisioning software vendors who support the operators.  In this interview, a leading supplier explains how it’s transforming from plain ol‘ OSS software provider to packager of on-net and SaaS solutions from an array of third party cloud providers.
  • Telecom Merger Juggling Act: How to Convert the Back Office and Keep Customers and Investors Happy at the Same Time interview with Curtis Mills — Billing and OSS conversions as the result of a merger are a risky activity as evidenced by famous cases at Fairpoint and Hawaiian Telcom.  This article offers advice on how to head off problems by monitoring key operations checkpoints, asking the right questions, and leading with a proven conversion methodology.
  • Is Order Management a Provisioning System or Your Best Salesperson? by John Konczal — Order management as a differentiator is a very new concept to many CSP people, but it’s become a very real sales booster in many industries.  Using electronics retailer BestBuy as an example, the article points to several innovations that can — and are — being applied by CSPs today.  The article concludes with 8 key questions an operator should ask to measure advanced order management progress.
  • NEC Takes the Telecom Cloud from PowerPoint to Live Customers interview with Shinya Kukita — In the cloud computing world, it’s a long road from technology success to telecom busness opportunity.  But this story about how NEC and Telefonica are partnering to offer cloud services to small and medium enterprises shows the experience of early cloud adoption.  Issues discussed in the article include: customer types, cloud application varieties, geographic region acceptance, and selling challenges.
  • Billing As Enabler for the Next Killer Business Model interview with Scott Swartz — Facebook, cloud services, and Google Ads are examples of innovative business models that demand unique or non-standard billing techniques.  The article shows how flexible, change-on-the-fly, and metadata-driven billing architectures are enabling CSPs to offer truly ground breaking services.
  • Real-Time Provisioning of SIM Cards: A Boon to GSM Operators interview with Simo Isomaki — Software-controlled SIM card configuration is revolutionizing the activation of GSM phones.  The article explains how dynamic SIM management decouples the selection of numbers/services and delivers new opportunities to market during the customer acquisition and intial provisoining phase.
  • A Cynic Converted: IN/Prepaid Platforms Are Now Pretty Cool interview with Grant Lenahan — Service delivery platforms born in the IN era are often painted as inflexible and expensive to maintain.  Learn how modern SDPs with protocol mediation, high availability, and flexible Service Creation Environments are delivering value for operators such as Brazil’s Oi.
  • Achieving Revenue Maximization in the Telecom Contact Center interview with Robert Lamb — Optimizing the contact center offers one of the greatest returns on investment for a CSP.  The director of AT&T’s contact center services business explains how telecoms can strike an “artful balance” between contact center investment and cost savings.  The discussion draws from AT&T’s consulting with world class customers like Ford, Dell, Discover Financial, DISH Network, and General Motors.
  • Mobile Broadband: The Customer Service Assurance Challenge interview with Michele Campriani — iPhone and Android traffic is surging but operators struggle with network congestion and dropping ARPUs.  The answer?  Direct  resources and service quality measures to ensure VIPs are indeed getting the quality they expect.  Using real-life examples that cut to the chase of technical complexities, this article explains the chief causes of service quality degradation and describes efficient ways to deal with the problem.
  • Telco-in-a-Box: Are Telecoms Back in the B/OSS Business? interview with Jim Dunlap — Most telecoms have long since folded their merchant B/OSS software/services businesses.  But now Cycle30, a subsidiary of Alaskan operator GCI, is offering a order-to-cash managed service for other operators and utilities.  The article discusses the company’s unique business model and contrasts it with billing service bureau and licensed software approaches.
  • Bricks, Mortar & Well-Trained Reps Make a Comeback in Customer Management interview with Scott Kohlman — Greater industry competition, service complexity, and employee turnover have raised the bar in the customer support.  Indeed, complex services are putting an emphasis on quality care interactions in the store, on the web, and through the call center.  In this article you’ll learn about innovations in CRM, multi-tabbed agent portals,  call center agent training, customer treatment philosophies, and the impact of  self-service.
  • 21st Century Order Management: The Cross-Channel Sales Conversation by John Konczal — Selling a mobile service is generally not a one-and-done transaction.  It often involves several interactions — across the web, call center, store, and even kiosks.  This article explains the power of a “cross-channel hub” which sits above all sales channels, interacts with them all, and allows a CSP to keep the sales conversation moving forward seamlessly.
  • Building a B/OSS Business Through Common Sense Customer Service by David West — Delivering customer service excellence doesn‘t require mastering some secret technique.  The premise of this article is that plain dealing with customers and employees is all that’s needed for a winning formula.  The argument is spelling out in a simple 4 step methodology along with some practical examples.