Email a colleague    

June 2015

Device Intelligence and Big Data Linkage: Guarding Consumer Access Points from the Fraudsters

Device Intelligence and Big Data Linkage: Guarding Consumer Access Points from the Fraudsters

In the latest prominent breach of a company’s computer network, hackers have infiltrated the online marketplace eBay, gaining access to the personal data of 145 million customers.         New York Times, May 2014

Our communications-driven world is blessed and cursed by greater access and “convenience”.

The blessing of convenience is that information is at our fingertips.  We’ve moved from checking messages once a day by smart computer. . to once an hour by smart phone. . . to once every 10 minutes via smart watch.

But the curse of convenience is we’ve made it much easier for fraudsters, con artists, and hackers to rob us.  The bad guys are only too happy to exploit our Facebook-inspired openness and the many communication devices we use to manage our banking and telecom service accounts.

Luckily there are companies out there like Experian whose mission is to protect businesses and consumers and throw inconvenient roadblocks in the path of the fraudsters.  Experian believes in customer-experience friendly fraud prevention tactics, such as predictive scores, device risk assessment, and linkage analysis.  It applies intrusive methods such as knowledge-based authentication only when the risk and circumstances warrant it.

Staying ahead of the fraudsters is a constant challenge that involves supplementing traditional identity checks with a host of new processes, technology, and big data analytics.

Here to explain how credit and fraud prevention programs are keeping pace today is Matt Ehrlich, product director for Experian’s Decision Analytics Fraud and Identity Solutions.

Dan Baker: Matt, thank for joining us.  Could you give us a quick snapshot of how Experian helps protect telecom operators?

Matt Ehrlich: Sure, Dan.  Experian’s business is really on the front end, on the activation side — helping telecom operators keep the bad actors from getting on their networks or stealing equipment.  We help some of the largest telecoms companies in the US and around the world.

If you have a Verizon Wireless account, for example, we can help prevent the takeover of that account — stop criminals from obtaining handsets, shipping them overseas, and selling them at a much higher price in countries where the phones are not subsidized by customer contracts.

What techniques do you use to establish identity?  And how is that practice evolving?

As you’d expect, we use traditional identity-based fraud prevention, things like name, address, social security number, phone number, and data of birth — matching that with information we have on file for that customer.

But these days, it’s important to supplement traditional identity checks with data about the velocity and consistency of information presented by people.  For example, if we are verifying an identity, is there anything suspicious about the information presented to us?  Third party identity theft is all over the news in the US — a retail firm has a data breach and millions of credit cards are compromised, for instance.

But third party fraud is not the only issue.  There’s also plenty of first party fraud, often called true party fraud.  And here the actual person committing the fraud uses their own identity: they do not pose as someone else.  However they still obtain handsets or services with no intent to pay for those things.  The crime is made to look like simple credit default or credit delinquency.

To get approval, the fraudster needs to misrepresent something about himself: his email address, physical address — perhaps slightly changing his social security number.

Protecting the Customer Life Cycle

Yet another popular identity spoofing scheme is “muling”.  This is where the ring leader of a fraud ring will pay cash to someone (the mule) for committing part of the fraud scheme.

In telecom, the mules are often recruited on college campuses, through internet sites such as Craigslist, and as crazy as it sounds — even outside a wireless provider’s retail store.  And the mule is instructed to go in the store, apply for credit, and obtain as many handsets as they can.  Upon exiting the store, the ring leader will pay the mule a small amount of cash for the handsets.

What kind of people are recruited as mules?

Students are one of the more popular groups of people to be targeted.  The fraudsters consider them ideal for two reasons: 1) there is typically less credit information on students; and 2) students are more incented to getting quick cash.

Unfortunately, these students fail to understand the long-term consequences of sacrificing their credit.

Certainly one of the biggest risk challenges today is the many avenues for fraudsters to obtain private identify data thanks to all the desktop computers, laptops, tablets, and smart phone devices out there.

Yes, convenience and the effort to promote a better customer experience can get in the way of security.

Luckily we’ve found that information collected about all these devices can be very predictive in highlighting risky transactions.

A year and a half ago, we acquired a company called 41st Parameter, experts in collecting information on devices and assessing risks based on the device.  This gives us a whole new lens for looking at fraud risk and we have a whole new set of big data to combine with that traditional approach of identity assessment.

Device intelligence is about maintaining a history of activities associated with a particular device.  So we recognize whenever that device visits a website or opens up a mobile app.  Then, through big data, we investigate any potential linkage of that device to other websites and behaviors.  This helps us understand the risks based on past performance and create fraud alerts appropriate to the device.

For example, through an IP address we can recognize that a device is accessing a website from outside the US, yet the user name logged in as a customer who lives in the US.  So this will raise an alert.  Criminals can even make it look like their inquiry to our client’s website is originating from Austin, Texas but our technology detects that spoofing and knows that access is being made, say, from Eastern Europe.

The nice thing about device intelligence is it allows you to keep the customer experience friendly.  For example, when a telecom or wireless customer visits your website or your mobile app, because we can collect and evaluate many points of information on the device and compare it to what we know of its behavior historically, we don’t have to ask the consumer to provide additional information.

Complete and Accurate Picture

The challenge of keeping the customer experience convenient rings true for me.  When I call my bank, I am constantly asked questions to verify my identity.  It’s frustrating to keep repeating information they already have access to.

Dan, a major paradigm shift has occurred in customer care.  In the past, you assumed that the person calling you at the call center to make an account change to his wireless account was indeed the legitimate person — because they provided the right identity information.

But in today’s world, we now have to assume that everyone has been the victim of some data breach and that their information is out there for criminals to find.

So I can no longer trust the information I am seeing as they visit my website or as they call into my call center.  I am going to assume a position that this identity has been compromised and now look for positive information to support the fact that it is truly them.

You now have to prove to me that you are who you say you are.  Now as you experienced, Dan, that kind of treatment is going to turn customers off and they are going to go to your competitor.  So you have to verify identity in clever ways and tie that back to your technology and big data.

One of the techniques in common use today is voice biometrics.  It’s an emerging technology that has improved a lot over the last few years.  The idea is to capture a voice print of you and then check that against a whitelist or blacklist database to ask, “Is this really Dan Baker?”

Given all of the data breaches and security vulnerabilities we hear about in the news nearly every day, it’s no surprise that all identity verification methods are being scrutinized.  Take knowledge-based authentication for example.  It’s still considered sound practice to screen someone using unique questions that only they should know the answer to.  But increasingly, even that has become more and more at risk as a method because of consumers’ openness in social media, the ubiquity of malware, and the extent of breached personal information.

Thanks, Matt.  It is indeed a financially risky world out there.  We can liken the situation to security checks at the airport.  Sure, they’re a waste of time and are inconvenient.  But the technology and careful processes are there to protect us.

Copyright 2015 Black Swan Telecom Journal

Matt Ehrlich

Matt Ehrlich

Matt Ehrlich, Product Management Director for Experian’s Fraud and Identity Solutions team, works daily with clients and partners to support their anti-fraud efforts through Experian’s fraud risk and identity verification products.

This includes aligning the product roadmaps with fraud prevention best practices and emerging technologies.  He has responsibility for fraud prevention and authentication strategy in the financial services and Telecom/Energy/Cable sectors, among others.

An avid runner, Ehrlich appreciates the challenge presented in “keeping pace” with the latest fraud threats and anti-fraud tactics.   Contact Matt via

Black Swan Solution Guides & Papers

cSwans of a Feather

Related Articles

  • Tokopedia, Indonesia’s E-Commerce King, Partners with 11 Million Merchants; Adopts Multi-Cloud to Drive Innovation interview with Warren Aw & Ryan de Melo — Indonesia’s Tokopedia, founded in 2009, has grown to become one of world’s leading e-commerce players.  Read about its success, technology direction, and multi-cloud connectivity adoption.
  • Bridge Alliance: Knocking Down Regional & Mobile Connectivity Barriers so Connected Car Markets Get Rolling in Asia interview with Kwee Kchwee — The CEO of an Asian consortium of mobile operators explains how they  help simplify and harmonize their members‘ operations in support of multi-national corporations.  This integration is enabling two huge industries to come together in Asia: auto manufacturing and telco.
  • Epsilon’s Infiny NaaS Platform Brings Global Connection, Agility & Fast Provision for IoT, Clouds & Enterprises in Southeast Asia, China & Beyond interview with Warren Aw — Network as a Service, powered by Software Defined Networks, are a faster, more agile, and more partner-friendly way of making data global connections.  A leading NaaS provider explains the benefits for cloud apps, enterprise IT, and IoT.
  • PCCW Global: On Leveraging Global IoT Connectivity to Create Mission Critical Use Cases for Enterprises interview with Craig Price — A leading wholesale executive explains the business challenges of the current global IoT scene as it spans many spheres: technical, political, marketing, and enterprise customer value creation.
  • Senet’s Cloud & Shared Gateways Drive LoRaWAN IoT Adoption for Enterprise Businesses, Smart Cities & Telecoms interview with Bruce Chatterley — An IoT netowork pioneer explains how LoRaWAN tech fits in the larger IoT ecosystem.  He gives use case examples, describes deployment restraints/costs, and shows how partnering, gateway sharing, and flexible deployment options are stimulating growth.
  • ARM Data Center Software’s Cloud-Based Network Inventory Links Network, Operations, Billing, Sales & CRM to One Database interview with Joe McDermott & Frank McDermott — A firm offering a cloud-based network inventory system explains the virtues of: a single underlying database, flexible conversions, task-checking workflow, new software business models, views that identify stranded assets, and connecting to Microsoft’s cloud platform.
  • Pure Play NFV: Lessons Learned from Masergy’s Virtual Deployment for a Global Enterprise interview with Prayson Pate — NFV is just getting off the ground, but one cloud provider to enterprises making a stir in virtual technology waters is Masergy.  Here are lessons learned from Masergy’s recent global deployment using a NFV pure play software approach.
  • The Digital Enabler: A Charging, Self-Care & Marketing Platform at the Core of the Mobile Business interview with Jennifer Kyriakakis — The digital enabler is a central platform that ties together charging, self-care, and marketing.  The article explains why leading operators consider digital enablers pivotal to their digital strategies.
  • Delivering Service Assurance Excellence at a Reduced Operating Cost interview with Gregg Hara — The great diversity and complexity of today’s networks make service assurance a big challenge.  But advances in off-the-shelf software now permit the configuring and visualizing of services across multiple technologies on a modest operating budget.
  • Are Cloud-Based Call Centers the Next Hot Product for the SMB Market? interview with Doron Dovrat — Quality customer service can improve a company’s corporate identity and drive business growth.  But many SMBs are priced out of acquiring modern call center technology.  This article explains the benefits of affordable and flexible cloud-based call centers.
  • Flexing the OSS & Network to Support the Digital Ecosystem interview with Ken Dilbeck — The need for telecoms to support a broader digital ecosystem requires an enormous change to OSS infrastructures and the way networks are being managed.  This interview sheds light on these challenges.
  • Crossing the Rubicon: Is it Time for Tier Ones to Move to a Real-Time Analytics BSS? interview with Andy Tiller — Will tier one operators continue to maintain their quilt works of legacy and adjunct platforms — or will they radically transform their BSS architecture into a new  system designed to address the new telecom era?  An advocate for radical transformation discusses: real-time analytics, billing for enterprises, partnering mashups, and on-going transformation work at Telenor.
  • Paradigm Shift in OSS Software: Network Topology Views via Enterprise-Search interview with Benedict Enweani — Enterprise-search is a wildly successful technology on the web, yet its influence has not yet rippled to the IT main stream.  But now a large Middle Eastern operator has deployed a major service assurance application using enterprise-search.  The interview discusses this multi-dimensional topology solution and compares it to traditional network inventory.
  • The Multi-Vendor MPLS: Enabling Tier 2 and 3 Telecoms to Offer World-Class Networks to SMBs interview with Prabhu Ramachandran — MPLS is a networking technology that has caught fire in the last decade.  Yet the complexity of MPLS has relegated to being mostly a large carrier solution.  Now a developer of a multi-vendor MPLS solutions explains why the next wave of MPLS adoption will come from tier 2/3 carriers supporting SMB customers.
  • Enabling Telecoms & Utilities to Adapt to the Winds of Business Change interview with Kirill Rechter — Billing is in the midst of momentous change.  Its value is no longer just around delivering multi-play services or sophisticated rating.  In this article you’ll learn how a billing/CRM supplier has adapted to the times by offering deeper value around the larger business issues of its telecom and utility clients.
  • Driving Customer Care Results & Cost Savings from Big Data Facts interview with Brian Jurutka — Mobile broadband and today’s dizzying array of app and network technology present a big challenge to customer care.  In fact, care agents have a hard time staying one step ahead of customers who call to report problems.  But network analytics comes to the rescue with advanced mobile handset troubleshooting and an ability to put greater intelligence at the fingertips of highly trained reps.
  • Hadoop and M2M Meet Device and Network Management Systems interview with Eric Wegner — Telecom big-data in networks is more than customer experience managment: it’s also about M2M plus network and element management systems.  This interview discusses the explosion in machine-to-machine devices, the virtues and drawbacks of Hadoop, and the network impact of shrink-wrapped search.
  • The Data Center & Cloud Infrastructure Boom: Is Your Sales/Engineering Team Equipped to Win? by Dan Baker — The build-out of enterprise clouds and data centers is a golden opportunity for systems integrators, carriers, and cloud providers.  But the firms who win this business will have sales and engineering teams who can drive an effective and streamlined requirements-to-design-to-order process.  This white paper points to a solution — a collaborative solution designs system — and explains 8 key capabilities of an ideal platform.
  • Big Data: Is it Ready for Prime Time in Customer Experience Management? interview with Thomas Sutter — Customer experience management is one of the most challenging of OSS domains and some suppliers are touting “big data” solutions as the silver bullet for CEM upgrades and consolidation.  This interview challenges the readiness of big data soluions to tackle OSS issues and deliver the cost savings.  The article also provides advice on managing technology risks, software vendor partnering, and the strategies of different OSS suppliers.
  • Calculated Risk: The Race to Deliver the Next Generation of LTE Service Management interview with Edoardo Rizzi — LTE and the emerging heterogeneous networks are likely to shake up the service management and customer experience management worlds.  Learn about the many new network management challenges LTE presents, and how a small OSS software firm aims to beat the big established players to market with a bold new technology and strategy.
  • Decom Dilemma: Why Tearing Down Networks is Often Harder than Deploying Them interview with Dan Hays — For every new 4G LTE and IP-based infrastructure deployed, there typically a legacy network that’s been rendered obsolete and needs to be decommissioned.  This article takes you through the many complexities of network decom, such as facilities planning, site lease terminations, green-safe equipment disposal, and tax relief programs.
  • Migration Success or Migraine Headache: Why Upfront Planning is Key to Network Decom interview with Ron Angner — Shutting down old networks and migrating customers to new ones is among the most challenging activities a network operators does today.  This article provides advice on the many network issues surrounding migration and decommissioning.  Topics discussed include inventory reconciliation, LEC/CLEC coordination, and protection of customers in the midst of projects that require great program management skills.
  • Navigating the Telecom Solutions Wilderness: Advice from Some Veteran Mountaineers interview with Al Brisard — Telecom solutions vendors struggle mightily to position their solutions and figure out what to offer next in a market where there’s considerable product and service crossover.  In this article, a veteran order management specialist firm lays out its strategy for mixing deep-bench functional expertise with process consulting, analytics, and custom API development.
  • Will Telecoms Sink Under the Weight of their Bloated and Out-of-Control Product Stacks? interview with Simon Muderack — Telecoms pay daily for their lack of product integration as they constantly reinvent product wheels, lose customer intelligence, and waste time/money.  This article makes the case of an enterprise product catalog.  Drawing on central catalog cases at a few Tier 1 operators, the article explains the benefits: reducing billing and provisioning costs, promoting product reuse, and smoothing operations.
  • Virtual Operator Life: Enabling Multi-Level Resellers Through an Active Product Catalog interview with Rob Hill — The value of product distribution via virtual operators is immense.  They enable a carrier to sell to markets it cannot profitably serve directly.  Yet the need for greater reseller flexibility in the bundling and pricing of increasingly complex IP and cloud services is now a major channel barrier.  This article explains what’s behind an innovative product catalog solution that doubles as a service creation environment for resellers in multiple tiers.
  • Telecom Blocking & Tackling: Executing the Fundamentals of the Order-to-Bill Process interview with Ron Angner — Just as football teams need to be good at the basics of blocking and tackling, telecoms need to excel at their own fundamental skillset: the order-to-cash process.  In this article, a leading consulting firm explains its methodology for taking operators on the path towards order-to-cash excellence.  Issues discussed include: provisioning intervals; standardization and simplicity; the transition from legacy to improved process; and the major role that industry metrics play.
  • Wireline Act IV, Scene II: Packaging Network & SaaS Services Together to Serve SMBs by John Frame — As revenue from telephony services has steadily declined, fixed network operators have scrambled to support VoIP, enhanced IP services, and now cloud applications.  This shift has also brought challenges to the provisioning software vendors who support the operators.  In this interview, a leading supplier explains how it’s transforming from plain ol‘ OSS software provider to packager of on-net and SaaS solutions from an array of third party cloud providers.
  • Telecom Merger Juggling Act: How to Convert the Back Office and Keep Customers and Investors Happy at the Same Time interview with Curtis Mills — Billing and OSS conversions as the result of a merger are a risky activity as evidenced by famous cases at Fairpoint and Hawaiian Telcom.  This article offers advice on how to head off problems by monitoring key operations checkpoints, asking the right questions, and leading with a proven conversion methodology.
  • Is Order Management a Provisioning System or Your Best Salesperson? by John Konczal — Order management as a differentiator is a very new concept to many CSP people, but it’s become a very real sales booster in many industries.  Using electronics retailer BestBuy as an example, the article points to several innovations that can — and are — being applied by CSPs today.  The article concludes with 8 key questions an operator should ask to measure advanced order management progress.
  • NEC Takes the Telecom Cloud from PowerPoint to Live Customers interview with Shinya Kukita — In the cloud computing world, it’s a long road from technology success to telecom busness opportunity.  But this story about how NEC and Telefonica are partnering to offer cloud services to small and medium enterprises shows the experience of early cloud adoption.  Issues discussed in the article include: customer types, cloud application varieties, geographic region acceptance, and selling challenges.
  • Billing As Enabler for the Next Killer Business Model interview with Scott Swartz — Facebook, cloud services, and Google Ads are examples of innovative business models that demand unique or non-standard billing techniques.  The article shows how flexible, change-on-the-fly, and metadata-driven billing architectures are enabling CSPs to offer truly ground breaking services.
  • Real-Time Provisioning of SIM Cards: A Boon to GSM Operators interview with Simo Isomaki — Software-controlled SIM card configuration is revolutionizing the activation of GSM phones.  The article explains how dynamic SIM management decouples the selection of numbers/services and delivers new opportunities to market during the customer acquisition and intial provisoining phase.
  • A Cynic Converted: IN/Prepaid Platforms Are Now Pretty Cool interview with Grant Lenahan — Service delivery platforms born in the IN era are often painted as inflexible and expensive to maintain.  Learn how modern SDPs with protocol mediation, high availability, and flexible Service Creation Environments are delivering value for operators such as Brazil’s Oi.
  • Achieving Revenue Maximization in the Telecom Contact Center interview with Robert Lamb — Optimizing the contact center offers one of the greatest returns on investment for a CSP.  The director of AT&T’s contact center services business explains how telecoms can strike an “artful balance” between contact center investment and cost savings.  The discussion draws from AT&T’s consulting with world class customers like Ford, Dell, Discover Financial, DISH Network, and General Motors.
  • Mobile Broadband: The Customer Service Assurance Challenge interview with Michele Campriani — iPhone and Android traffic is surging but operators struggle with network congestion and dropping ARPUs.  The answer?  Direct  resources and service quality measures to ensure VIPs are indeed getting the quality they expect.  Using real-life examples that cut to the chase of technical complexities, this article explains the chief causes of service quality degradation and describes efficient ways to deal with the problem.
  • Telco-in-a-Box: Are Telecoms Back in the B/OSS Business? interview with Jim Dunlap — Most telecoms have long since folded their merchant B/OSS software/services businesses.  But now Cycle30, a subsidiary of Alaskan operator GCI, is offering a order-to-cash managed service for other operators and utilities.  The article discusses the company’s unique business model and contrasts it with billing service bureau and licensed software approaches.
  • Bricks, Mortar & Well-Trained Reps Make a Comeback in Customer Management interview with Scott Kohlman — Greater industry competition, service complexity, and employee turnover have raised the bar in the customer support.  Indeed, complex services are putting an emphasis on quality care interactions in the store, on the web, and through the call center.  In this article you’ll learn about innovations in CRM, multi-tabbed agent portals,  call center agent training, customer treatment philosophies, and the impact of  self-service.
  • 21st Century Order Management: The Cross-Channel Sales Conversation by John Konczal — Selling a mobile service is generally not a one-and-done transaction.  It often involves several interactions — across the web, call center, store, and even kiosks.  This article explains the power of a “cross-channel hub” which sits above all sales channels, interacts with them all, and allows a CSP to keep the sales conversation moving forward seamlessly.
  • Building a B/OSS Business Through Common Sense Customer Service by David West — Delivering customer service excellence doesn‘t require mastering some secret technique.  The premise of this article is that plain dealing with customers and employees is all that’s needed for a winning formula.  The argument is spelling out in a simple 4 step methodology along with some practical examples.