Email a colleague    

June 2012

Converging Criminal and Technical Intelligence: Secret to Combating the Explosion in Telecom Fraud and Security Threats

Converging Criminal and Technical Intelligence: Secret to Combating the Explosion in Telecom Fraud and Security Threats

Fraud threats in the circuit switched world of only 15 years ago were relatively tame.  Phone hackers stealing voice minutes were a minor annoyance.  The biggest threat was probably on the credit side: a seemingly promising startup business racking up 30 to 60 days of long distance minute charges then skipping town before paying the bill.

But those sleepy days of “small town” fraud are gone forever.  Today, the fraudsters have long since packed their smartphones, routers, and fake IDs for the Big City.

Threats are exploding, in part, because today’s communications world is a candy store for the fraudster — so many mouth-watering opportunities to steal a fortune: errant SIM cards, on-line banking accounts, mobile banking, and hacking into a VPN when an employee logs on at Starbucks.

The new threat gateways are so numerous that we can no longer afford to develop technical solutions for every threat.  And understanding where to focus a telco’s fraud and security energies and resources is no easy task.

Making the right choices requires a broader intelligence: an understanding of fraud and security infrastructure such as traffic usage data, IP intrusion appliances, and physical barriers, but also real-life experience in fighting criminals and devising strategies to anticipate their next moves.

Mark Johnson, chairman of The Risk Management Group (TRMG), is a guy who cuts across these very different knowledge domains and in this exclusive Black Swan interview, he gives us a preview of the insights he delivers in the consulting and training services he brings to worldwide clients.

Dan Baker: Mark, I understand you came into the telecom risk business from a non-traditional path?

Mark Johnson: Dan, my entry into fraud and security didn‘t come from the technical side at all.  I was originally an intelligence officer in drug enforcement with my first assignment being on the island of Jamaica.  It was at that time I realized how key the intelligence activity is to crime fighting of all types.  And intelligence is really about collecting data and looking for patterns.  It could be the pattern of enemy patrolling, or the pattern of vessel movement, or the pattern of containerized cargo movement, or the pattern of phone calls, or the pattern of data packages coming in through the firewalls.  The basic concepts are essentially the same.

You can take those principles and apply them across the board to all facets of security and fraud.

One of the things that struck me when I finished TRI’s latest research study was that the subjects of insider fraud, revenue assurance, and cyber security are very related, but you would never know that by looking at the sales literature of the vendor companies.

Revenue assurance and fraud vendors rarely pay any attention to cyber security, and I don‘t think they fully recognize just how far convergence is going to push things -- how hard it’s going to be to make a distinction between different types of security incident.  We need to get beyond the silos and look at the total picture.

A good example: many fraud cases involve changes to rules or activating accounts on a platform somewhere.  So the revenue assurance guy will reconcile and find 5.3 million people activated on the HLR, when the billing system says there should only be 5.25 million.  But what’s often never explored are the platform security and cyber security issues that may be the root causes of those particular issues.  They often just focus on the revenue leakage and the reconciliation rather than the true root cause.

Likewise, the cyber security guys focus on authentication, access rights, and data classification, but don‘t seem to address the question: what are the revenue assurance implications of these cyber breaches?  So a stronger business case needs to be built to understand the end-to-end issues, root causes, and costs.  And I think they are really missing a trick there.

The only company I can think of that made the leap from usage analysis to cyber security is the mediation vendor Narus, who had Japan’s KDDI as a mediation customer.  Narus was ultimately acquired by Boeing Information Systems.

Yes, unfortunately, people want to remain in their comfort zones, and they fear, once you start using acronyms that they are not familiar with, that it sounds like too much hard work or it’s not “core business” for them, so they avoid it.

I suppose one indicator that things are converging is that assurance professionals increasingly struggle with industry terminology.  Now with the “Risk Management” term in your organization’s name, I’m curious what you mean by the term “risk management”.  Is it the traditional corporate use of the term that looks at issues like: what business are we in? and where should we go next?  Or conversely, are you referring to more systems-, IT- and threat-oriented kinds of risk management?

I find the best term to clarify things is “revenue risk management”.  If you lose a dollar through fraud or through revenue leakage, and you are making a 20% profit, it cost you 4 dollars to make that one dollar.  But if you can lock down the fraud and revenue leakage, you are making a direct contribution to the bottom line, which means cutting the level of investment required.  That’s a very tangible financial benefit, but I find that argument is very often not articulated well by the fraud and revenue assurance team because they haven‘t got the confidence to express it, but it is very real.  Revenue risks are strategic business risks if they occur frequently and involve big numbers.

Mark, when you consult with or provide training to clients, what are some of the things you focus on at the outset.

The most important starting point is always an assessment of how risks and controls map against each other — where are the main gaps today.  Personally, I usually end up talking to my clients about the future of risk, which is really where I like to be personally, as opposed to dealing with today’s risks.  After I understand the big picture and provide visioning inputs, my team comes in to cover current operational fraud and revenue assurance topics.  I am happiest working in the blue sky area, because that’s more exciting.

Another one of the first things we look at is how risks are going to map onto a client’s business model.  So, for example, if the business model is evolving towards more data and less voice traffic, then controlling monthly or fixed payments for data services, or looking at new charging options in the pipeline, will become more important than examining current transaction-based charging accuracy.  A changing business model implies that your risks are going to take on a different form very soon.

A key point I make to them is that 50% of risk management is about user awareness — having an aware group of users, both employees and customers.  If you have that, a lot of your problems are going to be dealt with very early on.  But here’s the challenge: as the number of users on the network of networks — all the networks combined — grows, the mean level of education, competence, and awareness of those users falls.

I also use a diagram that illustrates the observation that as the number of different devices and users grows and as the number of vulnerabilities grows because the service mix gets more complex, the overall risk is sure to rise overall.  It really is primarily a function of the lack of the awareness and lack of education multiplied by the rising number of unaware consumers and employees.

So risk is very much a part of our future and we have to understand it and how it’s evolving.  If we don‘t do that, we’re wasting our time.

You’ve been involved with many of the fraud software vendors over the years, How would you characterize the kind of solutions being offered today versus those in the past?

The biggest shift, I think, has been away from the sort of subscriber centric, CDR centric view which is great if you looking for a guy in a phone booth.  Today the picture has moved far more towards enterprise-level fraud -- somebody setting up a bypass operation or international revenue share — plus all the data challenges.  So, while you still need to keep a lid on the older cases, the general trend is towards more sophisticated cases where the fraudster looks more like a professional businessman than a teen hacker.

As everything moves to IP and IP is accessible to everybody, you can set up a fraud operation in a garage with fairly cheap, high-tech equipment.  That’s what I envision for the future and so the vendors have to move in that direction as well.  It’s away from CDR-based analysis of individual records towards much more of a trending, profiling and macro-level statistical analysis approach.

A big issue in fraud solutions today is in-house vs. a service bureau or managed services solution.  The service bureaus argue you can lower costs and leverage off-premises expertise while the in-house champions figure it’s better to build and maintain an in-house expertise in fraud.  Now an operator can certainly straddle both worlds, but what’s your take on this issue?

That’s a difficult question.  And it kind of runs parallel to the whole discussion around cloud and security in the cloud.  Regulation is an important consideration as well.  If you go with a service bureau, then questions come up about protecting sensitive, personalized data.  You also need to ensure the service bureau is going be effective in fraud control and that may be a challenge where different cultures are involved — just look at the consumer push back against call centres that has been going on for a while now.  So, there are many facets to this question.

I think both options are valid however.  I don‘t think that there’s any one-size-fits-all solution in this market.  There will be operators who don’t have the headcount or the budget to run a proper fraud team, but they still recognize their risks and they will opt to outsource.  And they will do that in a way that makes them compliant with local law.  On the other hand, there are other operators who have the budget and see internal fraud expertise as part of their operating model, so they will want to maintain and keep an in-house team.

What about insider fraud?  Do you feel that threat has increased?

The insider as a risk has always been predominant, though not always recognized as such.  Even in the retail market, in the pre-cyber days, it was a big threat.  I remember at the conferences I attended in the 1980s when experts were saying that 70% to 80% of all losses stemmed from insider activity.  I don‘t know what the percentage is today, but I suspect it hasn’t changed dramatically.

And this isn‘t all malicious-insider activity either.  Much of it has to do with neglect, ignorance, a lack of appropriate training, or awareness.  So, there is a sort of 50/50 split between an insider deliberately stealing something and someone just facilitating theft through sheer ignorance or disinterest.  But as we get more and more technical and everything moves to a platform somewhere — almost every aspect of life these days is controlled by an electronic system somewhere — the opportunity for the people who control or have access to management systems to do bad things will continue to increase.  And because there are more and more boxes, it all becomes more and more complex and thus more risky — it’s Murphy’s Law writ large.

But the other side of the coin we have to consider the democratization of access and control — the whole Web 2.0 idea of managing customers and giving them access rights.  Any way you look at it, lots of power is in the hands of users right now, inside and outside the business.

Right, the Bring Your Own Device or BYOD issue.  In many cases, I understand the iPhone is being brought into a company and it isn‘t necessarily supported by the IT department or overseen.

People have traditionally viewed security as a series of layers like an onion.  And you can imagine you’ve got your assets in the center, and then around that you have many concentric rings of defense.  Some of those will be virtual, others will be things like awareness.  Still others will be physical fences and gates; and some will be electronic barriers.  But you’ve got these rings of defense around the main assets and the whole psychology behind the onion analogy is that you perceive the threats as being external and the assets as being internal.

That’s the traditional view and many people still have that view — a good example of that is the firewall or intrusion detection system, or antivirus software.  But now there’s a shift where we have the Cloud or Web 2.0, social media, outsourcing and so forth, which means the assets are no longer always internal — many of the key ones are external.  On the other hand the threats themselves are not solely external: many of them are internal which could as simple as an employee leaking something through Twitter -- or malicious activity.

So the whole idea of likening security to an onion has been turned inside out.  Yes, we still have the traditional threats from external sources, but the threats are bi-directional now instead of being in a single direction as was previously conceived; assets are internal AND external, while the threats are external, AND internal.  It’s a 360 degree, real time picture viewed through 4D glasses!

I think a botnet is a good example of that.  It penetrates a company and starts gathering intelligence, then starts feeding the information to outside people.

Yes, and you can include in that list: worms like STUXNET and FLAME — all those sorts of things.  I read that the STUXNET worm was possibly inserted into the Iranian nuclear facility by people who left USB sticks lying around that employees innocently used for storage.  That’s how one commentator thought the infection spread.

In another interesting case, a GSM operator had a trial which involved putting GSM SIM cards into traffic lights for remote management purposes.  The SIM cards were not locked down and when hundreds of them were stolen, the fraudsters were able to make thousands and thousands of free calls, costing the operator a fairly significant amount of money.

So, that is a good example of how there is disconnect really between the technology guys and the fraud/risk guys.  One meeting would have revealed that risk and sorted the problem out.  In other words, in this complex world you can easily lose a few million dollars overnight through a failure to have a 30-minute discussion between risk control and the product development teams.

And in our training courses, we have dozens of examples of fraud, and many of them can be traced to this lack of internal communication and follow up.  But while cross-departmental communications is key, assurance people must learn to communicate up the executive chain as well.  And if you can go to a telecom CEO and show him how he can increase his shareholder value or his market cap by merely one percentage point, that’s a huge strategic benefit that he is likely to become very, very focused on.  Unfortunately, the fraud and revenue assurance teams -- and the vendors, too -- have struggled to get that message across.

Copyright 2012 Black Swan Telecom Journal

 
Mark Johnson

Mark Johnson

Mark Johnson is a former drug enforcement operative and a corporate fraud manager for several major international communications firms, including Ericsson and Cable & Wireless.  He is the author of two books on communications and cyber security, and another two on Second World War history.

Mark now provides training and consultancy for UK Police forces, the UK Home Office, the financial services sector and a number of global compliance and risk training organisations.   Contact Mark via

Black Swan Solution Guides & Papers

cSwans of a Feather

  • Insider Fraud: How to Create an Anti-Fraud Culture in Your Telecom Organization interview with Mark Yelland — Thirteen years after the WorldCom scandal, experts generally agree that insider fraud remains a massive problem in telecom.  In this article you’ll learn the outlines of building a program to instill an anti-fund culture at your telecoms organization.
  • Converging Criminal and Technical Intelligence: Secret to Combating the Explosion in Telecom Fraud and Security Threats interview with Mark Johnson — A fraud and security expert gives a big picture talk on why industry convergence is driving the need for a broader “revenue risk intelligence.”  His prescription?  Yes, telecoms surely need to excel in technical  infrastructure such as traffic usage data, IP intrusion appliances, and physical barriers.  But just as important is the need to pair that knowledge with the real-life lessons of fighting criminals in general.
  • Insider Fraud: Detecting Criminal Activity in the Telecom Sales Process interview with Tal Eisner — One of the biggest problems telecoms now face is fraud done inside their offices, dealer stores and firewalls.  This type of fraud is especially dangerous because it’s performed by people fully authorized to transact for the company.  The story dicusses the major causes of insider fraud, presents a case study, and explains basic techniques that software uses to detect insider fraud.

Related Articles

  • Subex’s New HyperSense AI-Platform Aims to Turn Telcos into Agile, Analytics-Driven Ubers and Rakutens interview with Rohit Maheshwari — An expert explains why telcos must swiftly adopt the AI/analytics methods of hyperscaler firms.  Giving telco examples where cross-company data sharing can make a difference, he explains the 12 key features of a new platform designed to deliver more agile and collaborative intelligence across a telco.
  • Subex’s COO: Machine Learning, Disruption & Adaptive Biz Models to Impact Telecoms in 2020 interview with Shankar Roddam — In our dynamic and digital-driven world, telecoms and enterprises face many business risks.  So what can you do to plot a successful future?  Hear 5 prophecies on 2020 telecom trends from the Chief Operating Officer of Subex.
  • TELUS Analytics Users Get Productivity Boost from Internal Team of Data Access & Showcasing Experts-for-Hire interview with Mange Kumarasamy — How a large organization with hundreds of analytics users gets help from an  internal Big Data team who sources multiple back-end databases; builds tailored reports; and drives campaigns that answer strategic questions for users.
  • Non-Verbal Speech Analytics: Monitoring Voice Calls in Real-Time for Customer Care, Sales, Retention & Onboarding interview with Yoav Degani — Non-verbal speech analysis studies the emotional context of voice qualities like intonation, tone, emphasis and rhythm.  A pioneer in voice analytics explains how its technology benefits customer care, sales, retention and onboarding.
  • Telecom CVM: From Scattered Campaigns to Unified & Consistent Communication with Customers interview with Cretièn Brandsma — Despite the many failures Customer Value Management has faced in telecom, CVM’s future is very hopeful.  A carrier expert explains why telecoms have faltered, how customer experience programs can be revitalized, and where telecoms should invest in better tactics and technology.
  • The Key to Driving 4G Profit: Sell Value, Not Bandwidth by Miri Duenias — Are you struggling to earn a profit on your 4G investments?  Many operators are failing today on the marketing side.  But aligning 4G products with a customer’s personal preferences and desires provides the necessary sizzle to boost sales and earn a handsome ROI.
  • Will Real-Time Decisioning Save Big Data Analytics from Overblown Hype? interview with Tom Erskine — Telecom analytics is more than just collecting and analyzing data.  It’s also about taking action — correct action — often in real-time and across a complex provisioning environment.  In this interview you’ll hear how next best actions are creating value in retention and upselling through a more flexible, business-process driven approach.
  • A Big Data Starter Kit in the Cloud: How Smaller Operators Can Get Rolling with Advanced Analytics interview with Ryan Guthrie — Medium to small operators know “big data” is out there alright, but technical staffing and cost issues have held them back from implementing it.  This interview discusses the advantages of moving advanced analytics to the cloud where operators can get up and running faster and at lower cost.
  • The Customer Engagement Era: How Personalization & Backend Integration Leads to a Richer Mobile Biz interview with Rita Tochner — How does a mobile operator move its subscribers to higher levels of spending and profit?  Fierce competition, social media scrutiny, and the high cost of new networks all conspire against these goals.  In this interview, however, you’ll learn how engaging better with customers, getting more personal, and being more sensitive to their individual needs is the path forward.
  • Telecoms Failing Badly in CAPEX: The Desperate Need for Asset Management & Financial Visibility interview with Ashwin Chalapathy — A 2012 PwC report put the telecom industry on the operating table, opened the patient up, and discovered a malignant cancer: poor network CAPEX management, a problem that puts telecoms in grave financial risk.  In this interview, a supplier of network analytics solutions provides greater detail on the problem and lays out its prescription for deeper asset management, capacity planning and data integrity checks.
  • Batting for More Churn Reduction and Revenue Assurance Home Runs interview with Peter Mueller — What’s it like to transform an IT shop to big data and cloud?  In this interview, the CTO of a boutique revenue assurance explains how his firm made the leap.  He shows how project-oriented programs and working with carrier customers to explore RA and churn reduction “hunches” is where much of the action is.
  • History Repeats: The Big Data Revolution in Telecom Service Assurance interview with Olav Tjelflaat — The lessons of telecom software history teach that new networks and unforeseen industry developments have an uncanny knack for disrupting business plans.  A service assurance incumbent reveals its strategy for becoming a leader in the emerging network analytics and assurance market.
  • From Alarms to Analytics: The Paradigm Shift in Service Assurance interview with Kelvin Hall — In a telecom world with millions of smart devices, the service assurance solutions of yesteryear are not getting the job done.  So alarm-heavy assurance is now shifting to big data solutions that deliver visual, multi-layered, and fine-grained views of network issues.  A data architect who works at large carriers provides an inside view of the key service provider problems driving this analytics shift.
  • The Shrink-Wrapped Search Engine: Why It’s Becoming a Vital Tool in Telecom Analytics interview with Tapan Bhatt — Google invented low cost, big data computing with its distributed search engine that lives in mammoth data centers populated with thousands of commodity CPUs and disks.  Now search engine technology is available as “shrink wrapped” enterprise software.  This article explains how this new technology is solving telecom analytics problems large and small.
  • Sharing Intelligence, Services, and Infrastructure across the Telecom Galaxy interview with Gary Zimmerman — The telecom industry is an industry of sharing.  In fact, the rise of mobile broadband is driving a greater reliance on real-time intelligence, services trading, and infrastructure exchange.  In this article, a leading info exchange provider explains the value of its services portfolio and points to other interoperability and sharing ideas under development.
  • Data Monetization: Why Selling Intelligence is a Hot New Revenue Stream for Mobile Carriers interview with Joe Levy — Data monetization is a revenue dream come true for mobile carriers: a highly profitable sideshow where the carrier analyzes and sells data it already collects for other purposes.  In this article you’ll learn how operators monetize their data through use cases in corporate advertising and media branding.
  • Harvesting Big Data Riches in Retailer Partnering, Actionable CEM & Network Optimization interview with Oded Ringer — In the analytics market there’s plenty of room for small solution firms to add value through a turnkey service or cloud/licensed solution.  But what about large services firms: where do they play?  In this article you’ll learn how a global services giant leverages data of different types to help telcos: monetize retail partnerships, optimize networks, and make CEM actionable.
  • Raising a Telco’s Value in the Digital Ecosystem: One Use Case at a Time interview with Jonathon Gordon — The speed of telecom innovation is forcing software vendors to radically adapt and transform their business models.  This article shows how a deep packet inspection company has  expanded into revenue generation, particularly  for mobile operators.  It offers a broad palette of value-adding use cases from video caching and parental controls to application-charging and DDoS security protection.
  • Radio Access Network Data: Why It’s Become An Immensely Useful Analytics Source interview with Neil Coleman — It’s hard to overstate the importance of Radio Access Network (RAN) analytics to a mobile operator’s business these days.  This article explains why the RAN data, which lives in the air interface between the base station and the handset --  can be used for a business benefit in network optimization and customer experience.
  • Back Office Streamlining to Enterprise Support: The Many Flavors of Wireline Analytics interview with Tom Nolting — Mobile analytics gets plenty of press coverage, but analytics is just as crucial for wireline operators.  In this article, a billing VP at a leading wireline operator discusses several diverse uses of analytics in billing, enterprise sales/retention, and network partner margin assurance.
  • Analytics Biology: The Power of Evolving to New Data Sources and Intelligence Gathering Methods interview with Paul Morrissey — Data warehouses create great value, yet it’s now time to let loose non-traditional big data platforms that create value in countless pockets of operational efficiency that have yet to be fully explored.  This article explains why telecoms must expand their analytics horizons and bring on all sorts of new data sources and novel intelligence gathering techniques.
  • B/OSS Mathematics: The Quest to Analyze Business Problems & Drive Operating Decisions interview with Matti Aksela — Analytics is the glory of mathematics brought to practical use.  And in telecom, analytics has merely stratched the surface of its full potential.  In this article, you’ll learn how machine learning is being combined with the power of CDR number crunching to optimize mobile top-ups, control churn — and in the future, help telecoms make critical network and operating decisions.
  • Leveraging the RA/FM Platform to Deliver Business Insights to Finance & Marketing by Amit Daniel — Carrier professionals using RA and fraud management tools are getting requests from internal customers who want the role of RA/FM platforms expanded to deliver up-to-date analytics data for finance and marketing purposes.  This article advocates a cross-product layer to serve such broader use cases.  The effect would be to transform the existing RA/FM platform into a combined business protection and business growth analytics engine.
  • A Mobile Marketer Service: Bridging Personalization & B/OSS Flowthrough interview with Efrat Nakibly — Marketing analytics is a prescriptive program for driving  actions such as sending a timely promotion to a mobile subscriber.  But completeness demands that you also be able to provision that treatment, qualify the promotion, and keep billing fully in the loop.  This article shows how a managed services program can deliver such an end-to-end process and manage customer life cycles on a one-to-one basis.
  • Science of Analytics: Bringing Prepaid Top Ups & Revenue Maximization under the Microscope interview with Derek Edwards — Prepaid subscribers are the customers that carriers know the least about.  The operator is not interacting with prepaid customers on a monthly basis.  You’re not sending a bill, nor do you have detailed profiles on these customers, especially in the developing world where customers are buying SIMs at a grocery store.  This interview explains how contextual marketing meets the unique analytics challenge of prepaid customers.
  • Connecting B/OSS Silos and Linking Revenue Analytics with the Customer Experience by Anssi Tauriainen — Customer experience analytics is a complex task that flexes B/OSS data to link the customer’s network experience and actions to improve it and drive greater revenue.  In this article, you’ll gain an understanding of how anayltics data needs to be managed across various customer life cycle stages and why it’s tailored for six specific user groups at the operator.
  • Profitable 3G: China’s Mobile Operators Monetize Networks with Retailers & Partners interview with Kevin Xu — Mobile operators are at the center of explosive growth in wireless services.  But to exploit this opportunity requires IT ingenuity and a broader view on how the mobile user can be served.  In this article you’ll learn the innovative techniques Chinese operators use to monetize 3G networks via analytics and partnerships with retailers, social networks, and advertisers.
  • Customer Analytics: Making the Strategic Leap From Hindsight to Foresight interview with Frank Bernhard — Are your company’s analytics programs scattered?  Is there a strategy in place for customer analytics?  This interview with a leading telecom analytics consultant explains why strategy and planning around the analytics function is crucial to getting your money’s worth.  Topics discussed include: hindsight vs. foresight; an advanced analytics program; and the interface sophistication required to support high end vs. low end analytics users.
  • Meeting the OTT Video Challenge: Real-Time, Fine-Grain Bandwidth Monitoring for Cable Operators interview with Mark Trudeau — Cable operators in North America are being overwhelmed by the surge in video and audio traffic.  In this article you’ll learn how Multi Service Operators (MSOs) are now monitoring their traffic to make critical decisions to protect QoS service and monetize bandwidth.  Also featured is expert perspective on trends in: network policy; bandwidth caps; and  customer care issues.
  • Analytics Meditations: The Power of Low-Cost Hardware and the Social Network Within interview with Ken King — Analytics didn‘t arrive yesterday.  Data warehousing and BI have been in the telecom vocabulary for twenty-five or more years.  In this interview, you’ll gain a perspective on why “big data” changes the game and why social network (or social circles) analysis promises the next level of insights.  Other interesting topics include: segmenting the analytics market, engaging with carrier clients, and upgrading from older- to newer-style methodologies.
  • LTE Analytics:  Learning New Rules in Real-Time Network Intelligence, Roaming and Customer Assurance interview with Martin Guilfoyle — LTE is telecom’s latest technology darling, and this article goes beyond the network jargon, to explain the momentous changes LTE brings.  The interview delves into the marriage of IMS, high QoS service delivery via IPX, real-time intelligence and roaming services, plus the new customer assurance hooks that LTE enables.
  • Shared Data Plans: The Challenge of Managing a Family of Pricing, Revenue Assurance, Fraud, and Network Policy Issues by Amit Daniel — Verizon Wireless‘ recent announcement of its move to shared data plans for families shook the mobile industry.  In this column, cVidya’s Amit Daniel shines a spotlight on the knowhow and analytics tools that operators now deperately need to offer the right  shared data price plans, ensure bandwidth throttling is handled correctly, and address new fraud concerns.
  • Analytics Guru: Are Telecoms Ready for the Biz Intelligence Explosion? interview with John Meyers — Business intelligence is evolving from the creation of dashboards and reports to taking action based on a deep knowledge of the environmental context.  The article explores the implications of “big data” in terms of IPTV, storage requirements, hardware, event collection, and deep packet inspection.
  • Social Networking for Telecoms: How To Enlist Friends and Family as Mobile Marketers interview with Simon Rees — Social Network Analysis (SNA) is about exploiting data on “friends and family” connections to combat churn and win new CSP business.  The article explores how an analysis of the ebb and flow of CDRs, phone calls, and messages, can identify key influencers and drive powerful marketing campaigns.
  • Making the Strategic Leap From Billing to Merchandising interview with Humera Malik — Today billing/charging technology has progressed to the point where the usage intelligence, the charges, the user behaviors, and the analytics can all come together in near real-time.  This article discusses the organizational and marketing strategies that enable a operator to create a true “merchandising” system that can revolutionize a CSP’s business.