Email a colleague    

June 2012

Converging Criminal and Technical Intelligence: Secret to Combating the Explosion in Telecom Fraud and Security Threats

Converging Criminal and Technical Intelligence: Secret to Combating the Explosion in Telecom Fraud and Security Threats

Fraud threats in the circuit switched world of only 15 years ago were relatively tame.  Phone hackers stealing voice minutes were a minor annoyance.  The biggest threat was probably on the credit side: a seemingly promising startup business racking up 30 to 60 days of long distance minute charges then skipping town before paying the bill.

But those sleepy days of “small town” fraud are gone forever.  Today, the fraudsters have long since packed their smartphones, routers, and fake IDs for the Big City.

Threats are exploding, in part, because today’s communications world is a candy store for the fraudster — so many mouth-watering opportunities to steal a fortune: errant SIM cards, on-line banking accounts, mobile banking, and hacking into a VPN when an employee logs on at Starbucks.

The new threat gateways are so numerous that we can no longer afford to develop technical solutions for every threat.  And understanding where to focus a telco’s fraud and security energies and resources is no easy task.

Making the right choices requires a broader intelligence: an understanding of fraud and security infrastructure such as traffic usage data, IP intrusion appliances, and physical barriers, but also real-life experience in fighting criminals and devising strategies to anticipate their next moves.

Mark Johnson, chairman of The Risk Management Group (TRMG), is a guy who cuts across these very different knowledge domains and in this exclusive Black Swan interview, he gives us a preview of the insights he delivers in the consulting and training services he brings to worldwide clients.

Dan Baker: Mark, I understand you came into the telecom risk business from a non-traditional path?

Mark Johnson: Dan, my entry into fraud and security didn‘t come from the technical side at all.  I was originally an intelligence officer in drug enforcement with my first assignment being on the island of Jamaica.  It was at that time I realized how key the intelligence activity is to crime fighting of all types.  And intelligence is really about collecting data and looking for patterns.  It could be the pattern of enemy patrolling, or the pattern of vessel movement, or the pattern of containerized cargo movement, or the pattern of phone calls, or the pattern of data packages coming in through the firewalls.  The basic concepts are essentially the same.

You can take those principles and apply them across the board to all facets of security and fraud.

One of the things that struck me when I finished TRI’s latest research study was that the subjects of insider fraud, revenue assurance, and cyber security are very related, but you would never know that by looking at the sales literature of the vendor companies.

Revenue assurance and fraud vendors rarely pay any attention to cyber security, and I don‘t think they fully recognize just how far convergence is going to push things -- how hard it’s going to be to make a distinction between different types of security incident.  We need to get beyond the silos and look at the total picture.

A good example: many fraud cases involve changes to rules or activating accounts on a platform somewhere.  So the revenue assurance guy will reconcile and find 5.3 million people activated on the HLR, when the billing system says there should only be 5.25 million.  But what’s often never explored are the platform security and cyber security issues that may be the root causes of those particular issues.  They often just focus on the revenue leakage and the reconciliation rather than the true root cause.

Likewise, the cyber security guys focus on authentication, access rights, and data classification, but don‘t seem to address the question: what are the revenue assurance implications of these cyber breaches?  So a stronger business case needs to be built to understand the end-to-end issues, root causes, and costs.  And I think they are really missing a trick there.

The only company I can think of that made the leap from usage analysis to cyber security is the mediation vendor Narus, who had Japan’s KDDI as a mediation customer.  Narus was ultimately acquired by Boeing Information Systems.

Yes, unfortunately, people want to remain in their comfort zones, and they fear, once you start using acronyms that they are not familiar with, that it sounds like too much hard work or it’s not “core business” for them, so they avoid it.

I suppose one indicator that things are converging is that assurance professionals increasingly struggle with industry terminology.  Now with the “Risk Management” term in your organization’s name, I’m curious what you mean by the term “risk management”.  Is it the traditional corporate use of the term that looks at issues like: what business are we in? and where should we go next?  Or conversely, are you referring to more systems-, IT- and threat-oriented kinds of risk management?

I find the best term to clarify things is “revenue risk management”.  If you lose a dollar through fraud or through revenue leakage, and you are making a 20% profit, it cost you 4 dollars to make that one dollar.  But if you can lock down the fraud and revenue leakage, you are making a direct contribution to the bottom line, which means cutting the level of investment required.  That’s a very tangible financial benefit, but I find that argument is very often not articulated well by the fraud and revenue assurance team because they haven‘t got the confidence to express it, but it is very real.  Revenue risks are strategic business risks if they occur frequently and involve big numbers.

Mark, when you consult with or provide training to clients, what are some of the things you focus on at the outset.

The most important starting point is always an assessment of how risks and controls map against each other — where are the main gaps today.  Personally, I usually end up talking to my clients about the future of risk, which is really where I like to be personally, as opposed to dealing with today’s risks.  After I understand the big picture and provide visioning inputs, my team comes in to cover current operational fraud and revenue assurance topics.  I am happiest working in the blue sky area, because that’s more exciting.

Another one of the first things we look at is how risks are going to map onto a client’s business model.  So, for example, if the business model is evolving towards more data and less voice traffic, then controlling monthly or fixed payments for data services, or looking at new charging options in the pipeline, will become more important than examining current transaction-based charging accuracy.  A changing business model implies that your risks are going to take on a different form very soon.

A key point I make to them is that 50% of risk management is about user awareness — having an aware group of users, both employees and customers.  If you have that, a lot of your problems are going to be dealt with very early on.  But here’s the challenge: as the number of users on the network of networks — all the networks combined — grows, the mean level of education, competence, and awareness of those users falls.

I also use a diagram that illustrates the observation that as the number of different devices and users grows and as the number of vulnerabilities grows because the service mix gets more complex, the overall risk is sure to rise overall.  It really is primarily a function of the lack of the awareness and lack of education multiplied by the rising number of unaware consumers and employees.

So risk is very much a part of our future and we have to understand it and how it’s evolving.  If we don‘t do that, we’re wasting our time.

You’ve been involved with many of the fraud software vendors over the years, How would you characterize the kind of solutions being offered today versus those in the past?

The biggest shift, I think, has been away from the sort of subscriber centric, CDR centric view which is great if you looking for a guy in a phone booth.  Today the picture has moved far more towards enterprise-level fraud -- somebody setting up a bypass operation or international revenue share — plus all the data challenges.  So, while you still need to keep a lid on the older cases, the general trend is towards more sophisticated cases where the fraudster looks more like a professional businessman than a teen hacker.

As everything moves to IP and IP is accessible to everybody, you can set up a fraud operation in a garage with fairly cheap, high-tech equipment.  That’s what I envision for the future and so the vendors have to move in that direction as well.  It’s away from CDR-based analysis of individual records towards much more of a trending, profiling and macro-level statistical analysis approach.

A big issue in fraud solutions today is in-house vs. a service bureau or managed services solution.  The service bureaus argue you can lower costs and leverage off-premises expertise while the in-house champions figure it’s better to build and maintain an in-house expertise in fraud.  Now an operator can certainly straddle both worlds, but what’s your take on this issue?

That’s a difficult question.  And it kind of runs parallel to the whole discussion around cloud and security in the cloud.  Regulation is an important consideration as well.  If you go with a service bureau, then questions come up about protecting sensitive, personalized data.  You also need to ensure the service bureau is going be effective in fraud control and that may be a challenge where different cultures are involved — just look at the consumer push back against call centres that has been going on for a while now.  So, there are many facets to this question.

I think both options are valid however.  I don‘t think that there’s any one-size-fits-all solution in this market.  There will be operators who don’t have the headcount or the budget to run a proper fraud team, but they still recognize their risks and they will opt to outsource.  And they will do that in a way that makes them compliant with local law.  On the other hand, there are other operators who have the budget and see internal fraud expertise as part of their operating model, so they will want to maintain and keep an in-house team.

What about insider fraud?  Do you feel that threat has increased?

The insider as a risk has always been predominant, though not always recognized as such.  Even in the retail market, in the pre-cyber days, it was a big threat.  I remember at the conferences I attended in the 1980s when experts were saying that 70% to 80% of all losses stemmed from insider activity.  I don‘t know what the percentage is today, but I suspect it hasn’t changed dramatically.

And this isn‘t all malicious-insider activity either.  Much of it has to do with neglect, ignorance, a lack of appropriate training, or awareness.  So, there is a sort of 50/50 split between an insider deliberately stealing something and someone just facilitating theft through sheer ignorance or disinterest.  But as we get more and more technical and everything moves to a platform somewhere — almost every aspect of life these days is controlled by an electronic system somewhere — the opportunity for the people who control or have access to management systems to do bad things will continue to increase.  And because there are more and more boxes, it all becomes more and more complex and thus more risky — it’s Murphy’s Law writ large.

But the other side of the coin we have to consider the democratization of access and control — the whole Web 2.0 idea of managing customers and giving them access rights.  Any way you look at it, lots of power is in the hands of users right now, inside and outside the business.

Right, the Bring Your Own Device or BYOD issue.  In many cases, I understand the iPhone is being brought into a company and it isn‘t necessarily supported by the IT department or overseen.

People have traditionally viewed security as a series of layers like an onion.  And you can imagine you’ve got your assets in the center, and then around that you have many concentric rings of defense.  Some of those will be virtual, others will be things like awareness.  Still others will be physical fences and gates; and some will be electronic barriers.  But you’ve got these rings of defense around the main assets and the whole psychology behind the onion analogy is that you perceive the threats as being external and the assets as being internal.

That’s the traditional view and many people still have that view — a good example of that is the firewall or intrusion detection system, or antivirus software.  But now there’s a shift where we have the Cloud or Web 2.0, social media, outsourcing and so forth, which means the assets are no longer always internal — many of the key ones are external.  On the other hand the threats themselves are not solely external: many of them are internal which could as simple as an employee leaking something through Twitter -- or malicious activity.

So the whole idea of likening security to an onion has been turned inside out.  Yes, we still have the traditional threats from external sources, but the threats are bi-directional now instead of being in a single direction as was previously conceived; assets are internal AND external, while the threats are external, AND internal.  It’s a 360 degree, real time picture viewed through 4D glasses!

I think a botnet is a good example of that.  It penetrates a company and starts gathering intelligence, then starts feeding the information to outside people.

Yes, and you can include in that list: worms like STUXNET and FLAME — all those sorts of things.  I read that the STUXNET worm was possibly inserted into the Iranian nuclear facility by people who left USB sticks lying around that employees innocently used for storage.  That’s how one commentator thought the infection spread.

In another interesting case, a GSM operator had a trial which involved putting GSM SIM cards into traffic lights for remote management purposes.  The SIM cards were not locked down and when hundreds of them were stolen, the fraudsters were able to make thousands and thousands of free calls, costing the operator a fairly significant amount of money.

So, that is a good example of how there is disconnect really between the technology guys and the fraud/risk guys.  One meeting would have revealed that risk and sorted the problem out.  In other words, in this complex world you can easily lose a few million dollars overnight through a failure to have a 30-minute discussion between risk control and the product development teams.

And in our training courses, we have dozens of examples of fraud, and many of them can be traced to this lack of internal communication and follow up.  But while cross-departmental communications is key, assurance people must learn to communicate up the executive chain as well.  And if you can go to a telecom CEO and show him how he can increase his shareholder value or his market cap by merely one percentage point, that’s a huge strategic benefit that he is likely to become very, very focused on.  Unfortunately, the fraud and revenue assurance teams -- and the vendors, too -- have struggled to get that message across.

Copyright 2012 Black Swan Telecom Journal

Mark Johnson

Mark Johnson

Mark Johnson is a former drug enforcement operative and a corporate fraud manager for several major international communications firms, including Ericsson and Cable & Wireless.  He is the author of two books on communications and cyber security, and another two on Second World War history.

Mark now provides training and consultancy for UK Police forces, the UK Home Office, the financial services sector and a number of global compliance and risk training organisations.   Contact Mark via

Black Swan Solution Guides & Papers

cSwans of a Feather

  • Insider Fraud: How to Create an Anti-Fraud Culture in Your Telecom Organization interview with Mark Yelland — Thirteen years after the WorldCom scandal, experts generally agree that insider fraud remains a massive problem in telecom.  In this article you’ll learn the outlines of building a program to instill an anti-fund culture at your telecoms organization.
  • Converging Criminal and Technical Intelligence: Secret to Combating the Explosion in Telecom Fraud and Security Threats interview with Mark Johnson — A fraud and security expert gives a big picture talk on why industry convergence is driving the need for a broader “revenue risk intelligence.”  His prescription?  Yes, telecoms surely need to excel in technical  infrastructure such as traffic usage data, IP intrusion appliances, and physical barriers.  But just as important is the need to pair that knowledge with the real-life lessons of fighting criminals in general.
  • Insider Fraud: Detecting Criminal Activity in the Telecom Sales Process interview with Tal Eisner — One of the biggest problems telecoms now face is fraud done inside their offices, dealer stores and firewalls.  This type of fraud is especially dangerous because it’s performed by people fully authorized to transact for the company.  The story dicusses the major causes of insider fraud, presents a case study, and explains basic techniques that software uses to detect insider fraud.

Related Articles

  • Black Swan Guide: Araxxe’s Revenue Assurance Consulting, Testing, and High Definition Billing Analysis Service by Dan Baker — How Araxxe’s end-to-end revenue assurance complements switch-to-bill RA  through telescope RA (external and partner data) and microscope RA (high-definition analysis of complex services like bundling and digital services).
  • Subex’s IDcentral Monetizes Telco & Enterprise Data to Deliver Digital ID & Risk Metric Services for Financing, KYC & More interview with Shankar Roddam — A new digital intelligence service that monetizes the idle data of telecoms and enterprises while also earning a good return for the owner of the data.
  • Opportunities & Obstacles: Consultant Luke Taylor Muses on the State of the Telecom Risk Assurance Business interview with Luke Taylor — A rambling discussion on the state of the risk assurance business with Luke Taylor, independent consultant in telecom revenue/fraud assurance and solution requirements and marketing.
  • LATRO’s Tips for Launching a Successful Revenue & Fraud Assurance Program for Mobile Money Operations in Developing Countries interview with Don Reinhart — A company building mobile money RA/FM tools and  managed services gives a concise, but detailed tutorial on how the Mobile Money Ecosystem works.  Revenue assurance pros will get tips on  what to look for in analytics/assurance tools, controls, and professional services.
  • A WeDo Conference Talk: Consulting & Analytics: Improving your Business Today, Enhancing it Tomorrow interview with Carla Cardoso & Bernado Lucas & Thomas Steagall — Leading risk management consultants explain their mission and walk-through RA, subscription fraud, and collections cases.  They also explain how analytics and machine learning can supplement process optimization.
  • PrologMobile’s Simple and Brilliant Plan to Save US MNOs Billions a Year in Recovered Phones & Retained Customers interview with Seth Heine — An expert in the mobile phone reverse supply chain explains how MNOs — via a neutral third party information exchange — can recover their original phones on the used market and save huge sums in multi-year customer retention.
  • WeDo Explores the IoT Ecosystem in Search of Tomorrow’s Pivotal Fraud & Business Assurance Solutions interview with Carlos Marques — A veteran product manager scans the IoT terrain, discusses key fraud and assurance challenges, and explains the preparatory steps WeDo is taking to become a key player in this emerging market.
  • New Report: Telecom Fraud & Business Assurance Solutions, Services & Strategies by Dan Baker & Luke Taylor & Colin Yates — TRI publishes a new market research report, Telecom Fraud & Business Assurance Solutions, Services & Strategies.  Free executive summary available.
  • Subex Juggles a Wide Variety of Business Assurance and Big Data Analytics Use Cases interview with Rohit Maheshwari — A expert in business assurance solutions explains top use cases such as: IoT security, big data analytics/AI, network asset optimization, multi-player gaming assurance, onboarding mobile subs, and AI customer analytics.
  • MTN Agility: Mastering Exponential Technologies in Revenue/Fraud Assurance and Beyond interview with Danie Maritz & Tony Sani & Luke Taylor — An in-depth look at RAFM operations and innovation at the MTN Group.  Topics discussed include RA/fraud control challenges, strategies, and MTN’s journey to exploit exponential tech (AI, robotics, and ML) in its RAFM program and support of internal non-telco businesses.
  • From Byzantine Software Contracts to Simple & Flexible RA Managed Services interview with Philippe Orsini — Is the way B2B/enterprise software is sold and delivered today progressive — or is it Byzantine in the age of cloud?  An expert lays out the case for managed services in RA and billing verification.
  • Premiere Experts Set to Speak at Summer RAG Conference in London, July 7th and 8th by Dan Baker — The Risk and Assurance Group (RAG) has announced that its 2016 summer conference will expand into a two-day event and feature many premiere experts. 
  • WeDo Hosts Revenue Assurance & Fraud Management Conference in Washington DC by Dan Baker — Black Swan is pleased to announce what looks to be a first class revenue assurance and fraud management conference being put on by WeDo Technologies, on October 1st and 2nd in beautiful Washington DC.
  • Test Call Generators: An Essential Test & Debugging Tool in Mobile Billing Assurance interview with Steffen Öftring — An “active” test call generator (TCG) can see problems that a “passive” revenue assurance system is blind to.  Here’s a discussion on the test call RA  process, over-the-air calls versus core call injection, and test call networks in global roaming RA.
  • The Revenue Assurance Game: How the Rules Change in the Era of IoT & Mobile Broadband interview with Rene Felber & Gadi Solotorevsky — Revenue assurance is perhaps the hardest of telecom functions to define because the term is used in so many different senses.  This discussion on the evolving role of revenue assurance was catalyzed by a survey of experts in the profession.
  • Day in the Life of a Revenue Assurance Analyst interview with Michael Lazarou — Revenue assurance is much more than a software category.  It’s individual analysts struggling to help their larger organizations get a handle on system errors and coordination problems.  In this interview, an analyst reveals the many challenges of getting the revenue assurance job done at a small GSM operator in Europe.
  • Revenue Assurance: History and New Beginnings in RA Maturity interview with Daniela Giacomantonio & Gadi Solotorevsky — The Roman Forum was the center of commercial life in ancient Rome.  Now, two millennia later, the Forum lives on in the exchange of ideas across countless professions and  media.  In this interview, two Revenue Assurance experts discuss both the new RA Maturity initiative of the TM Forum and the value of telco/solution vendor collaboration.
  • Migrating systems or launching LTE next year?  Don‘t forget transformation assurance & optimisation by Efrat Nissimov — System transformations and network migrations are major  revenue impacting events and they should raise a big red flag.  Why?  Because data integrity issues are bound to crop up as CSPs move vital data from a legacy system to something new.  It’s time for transformation assurance.
  • How can Cable/DSL Internet Providers Meet the Usage-Based Billing Mandate? interview with Ryan Guthrie — The popularity of YouTube, Netflix, and Hulu other video outlets has turned the tables on service profitability for cable/DSL service providers.  Many are moving to usage-based billing, but that largely unprepared for the revenue assurance aspects of this move.  This interview explains the technical challenge and points to solutions in billing, speed caps, and traffic revenue monitoring.
  • CABS Revenue Assurance: How Rural LECs can Recover $284 Million in Revenue Shortfalls interview with Kelly Cannon & Darrell Merschak — Independent rural LECs in the U.S. still rely on the AMA/EMI billing formats for CABS billing, even as that format has proven to be highly inaccurate as a source of inter-carrier records.  This interview includes an analysis and discussion of revenue recovery techniques ILECs can use by leveraging SS7 probes.  Also discussed are billing strategies, traffic dumping threats, and the possible fallout from the FCC’s bill-and-keep mandate.
  • Make Business Assurance Progress Every Day: How to Set Goals, Automate, and Energize Your Team interview with Kathleen Romano — Business assurance (BA) skills have wide applicability outside the revenue assurance and fraud mangement domains.  In this article, a telecom executive explains how she’s applying her BA skills in the Payments area.  In addition to discussing the key operational challenges in Payments, the interview also provides keen insights on setting goals in business assurance, leading a team, and making critical decisions.
  • LTE Rollout: Make it a Smashing Success with Risk Assessment, Controls, and Marketing Offer Analytics by Gadi Solotorevsky — LTE brings splendid new capabilities to mobile users.  But like 2G and 3G deployments before, operators can only make money if they successfuly plan, coordinate, deploy fast, and pay attention to pricing plans and the customer experience.  This article lays out a 3-phase tactical guide on  how revenue analytics professionals can add value in LTE service risk assessment, controls, and marketing offer analytics.
  • RA Prevention: How to Manage Revenue Risks and Communicate RA’s Value to Senior Execs by Shaul Moav — The era of revenue assurance prevention and risk assessment is here.  Several of the mature operators of the world have developed their own methodologies and tools.  Using firefighting and fire prevention as a metaphor, the article details a new commercial software approach explaining the goals, method of risk evaluation, and senior executive dashboards developed for the process.
  • Precision Clockworks: How Revenue Assurance Synchronizes with the Business at Swisscom interview with Marco Pollinger — An expert revenue assurance department is one whose work dovetails well with the lines of businesses it supports.  In this interview you’ll learn how Swisscom manages its revenue assurance function for maximum effect.  The article discusses: the operator’s innovative RA organization, the screening and RA approval of new services, its pre-production bill audits, and its coordination with corporate risk management.
  • Versatile, Portable & Corrections-Savvy: Quest for the Swiss Army Knife of Revenue Assurance Software by Mark Yelland — Revenue assurance maturity models are not cast in stone.  Since  best practices will change over time, it’s healthy to explore moving maturity models forward.  For example, great gains have been made in leakage detection, but RA corrections has been harder to master.  The author dreams about seven functions that should ideally come together in a single all-purpose revenue assurance software tool.
  • Bringing Strategic Planning & Value Engineering to Revenue Assurance interview with Maged Fawzy — Engineering and architectural techniques have a role in revenue assurance.  This interview with a top Egyptian RA consultant explains how continuous risk assessment and long range — yet flexible — RA planning can sharpen a carrier’s RA program and lead to better use of revenue assurance software and integration services.
  • Forensic Fossils: Is Your Revenue Assurance Shop Fit for Display at a Natural History Museum? interview with Jim Marsh — Without the continuous guiding light of seasoned revenue assurance leaders, even the best teams of RA professionals, technology, and business processes can fossilize and lose their vitality.
  • Revenue Assurance: The Magical Market Cap Multiplier by Van Howard & Curtis Mills — Many operators today consider revenue assurance yesterday’s opportunity.  But this article shows why significant revenue and cost leakage can still go undetected, even in companies with dedicated RA departments.  Also discussed are the benefits of a broader or more “forensic” approach to revenue assurance, an approach that boosts the bottom line regardless of the automated tools already in place.
  • From Risk to Robust: Turning the Big Picture Into a Real Agenda for Change in Telecoms by Eric Priezkalns — Inspired by a Financial Times article written by Nassim Taleb, author of “The Black Swan”, here is an insightful and entertaining primer on telecom risk management.  The article takes ten risk management lessons from Taleb and applies them specifically to the communications industry.  You’ll learn about the value of small scale trials, organization accountability, cures for a blame culture, incentives that work, the power of simplicity, and more.
  • Synthesizing the Telecom Business Assurance Practice With the Analytics World by Dan Baker — Business assurance is a wrapper term that allows you to draw a circle around various telecom assurance, control, and optimization activities.  This article maps business assurance as a subset of telecom analytics, constrasting it with marketing analytics while a diagram shows where biz assurance fits in the larger B/OSS world.
  • CABS Revenue Assurance Disputes: May the Carrier With the Best Data Win by Cheryl Smith Rardin & David West — Revenue assurance innovation is far easier when partners cooperate to make it happen.  This articles shows how a U.S. operator, software vendor, and consultant teamed to develop a breakthrough in Carrier Access Billing (CABS) assurance.  Learn about: the dispute resolution data gap that needed to be filled, the partnering strategy, the implementation challenges, and payback results.
  • Revenue Assurance vs.  Business Assurance: Who’s the Rightful King of Controls Software? interview with Sergio Luis Silvestre — Business controls software, originally developed for RA, is finding application in other areas of the business such as internal audit, collections, security and risk management.  This article argues that “business assurance” is the best term to describe this broader set of  controls software that can find a home in numerous departments or functions of a CSP’s business.
  • PwC on the Business of Revenue Assurance Consulting & Mentoring interview with Tim Banks & Dan Stevens — Revenue assurance consulting firms offer a broad range of services to clients these days.  The article explains the practice of mentoring RA mangers and providing a CFO with visibility on the status of an operator’s business controls.  Perspective is also offered on the value of RA software and the opportunity to broaden the RA practice scope.
  • Robots for Hire: Verifying Accuracy In the Age of Complex Mobile Billing/Charging interview with Xavier Lesage — As real-time charging and complex lifestyle calling plans gain credence across the globe in wireless, billing quality issues will rise in importance.  This article discusses a unique managed services approach to invoice testing and roaming fraud protection that checks results against advertised or published source data for the utmost accuracy.
  • Ericsson: Revenue Assurance Consulting With an NGN Flavor interview with Thomas Steagall — Helping operators detect billing and provisioning problem is merely table stakes in the RA services business these days.  The article discuss why operators need to ramp up their RA function with service experience and group-wide financial health monitoring.  Advise is also offered on: key RA maturity questions, risk-and-reward contracts, and how to extract greater value from software investments.
  • Do-It-Yourself RA for Small Operators and MVNOs interview with Mark Yelland — Budget-minded small operators and MVNOs are no longer hamstrung in RA capability anymore.  This article offers high-leverage strategies for operators who cannot afford expensive RA software tools.  With  data access, brains, and a DIY philosophy, any small operator can map a  path to greater RA savings, maturity, and program growth.
  • Revenue Assurance Maturity: Report From the Arena interview with Eric Nelson — Revenue assurance maturity can‘t be easily computed.  How do you  compare the KPIs of Comcast billing with that of mobile money RA in Western Africa?  Even still, this article offers some universal RA wisdom from a straight-shooting veteran of carriers large and small.  Topics discussed include: dashboard or process, COTS vs. inhouse solutions, and tips on gaining internal support for the RA practice.