Tag Archives: LTE

Revenue Assurance and LTE

Emergence of LTE

Through the last one decade when telecommunication globally evolved from 2.5G to 3.5G taking along the subscribers from a mere 56 Kbps to streaming of HD videos & music on your handset, data and content has evolved by giant leaps far faster than anyone predicted. The evolution not only provided a broad variety of services to the end users but also magnified the economics of content provision, VoIP services and eCommerce by leaps and bounds.

A far cry from just using you mobile phone for voice and SMS, the thirst for data from the end users of today sends out a clear message that even the speeds offered by 3G networks fall short of the requirement. So much so that this evolution is slowly but steadily diminishing the traditional circuit switched voice traffic.

The below stats geographically indicated illustrates the current data evolution:


Risk Profiling

The evolution of LTE differs not only from an end user product offer perspective but also from the point of network architecture. This makes LTE evolution very different from the 3G evolution wherein only a few components changed along with minor adjustments in xDR formats. These minor changes resulted in majority of the core RA practices to accommodate a 3G risk mitigating process with minor adjustments to already existing controls.

However this would not be the case when it comes to LTE wherein majority of the network components are different with layers of complexity that originates from the perspective of how products are designed and offered.

  • Product Design

When it comes to how RA facilitates product design in an LTE network we must take note of the fact that very few RA practices today have a functioning RA process that contributes to marketing campaign, product offer development and change management in a 2G / 3G / fixed line / broadband environment. The primary reason being that majority of the RA operations still concentrate towards leakage detection and not revenue enhancement.

However in the case of LTE where subscribers have access to multitude of content and eCommerce in a market which is growing at a rate of 30% – 55% at any given geographical market coupled with thinning bottom lines, here RA processes for product design becomes far more important in the insights that can be generated through various multi-dimensional usage modeling.

  •  Order Management & Provisioning

Unlike a 2G & 3G environment wherein the subscriber service configuration is spread across the order management system, HLR, IN and billing in an LTE scenario the scope of risk is drastically amplified due to the dynamic allotment of service elements in the PCRF as per a designated service plan.

Herein any risk mitigation process begins with the analysis of services allocated at order management, subscriber’s historical usage and the subsequent policies that are dynamically enforced by the PCRF.

  • Rating and Billing

LTE brings in complexities within each service plan wherein the rating differs across each and every data session initiated by a subscriber. For instance, if a subscriber is streaming a video / music and simultaneously texting through a popular messaging service the corresponding rating will also differ specific to the plan associated to a session; in this case video stream will be rated differently from the messaging service. Here again to add another layer of complexity, rating can also differ on the QoS guaranteed to an end user.

Evolution of RA

It becomes fairly clear that majority of the traditional controls that has been used for a 2G & 3G scenario cannot be reused for RA in LTE thereby paving the way for RA evolution along with the corresponding LTE evolution.

One of the important takeaways in the evolution of RA is the importance of analytics for revenue reporting / projections through multi-dimensional data modelling which is a must in a LTE environment which thereby provides a multitude of insights on subscribers, products, network utilization and revenue generation.

LTE Fraud…. Evolution or Revolution?

“Long Term Evolution” (LTE)..… it was hardly the sexiest name that could have been pinned to a new standard for high speed wireless communication when the first service went live in Sweden and Norway back in 2009. However, on reflection, it is the perfect nomenclature for the technology itself because LTE does not rip up the past and start again but it does represent a series of forward steps which will continue for a long while. The stated objectives of LTE according to the LteTM Encyclopaedia are:-

  • Increased downlink and uplink peak data rates.
  • Scalable bandwidth
  • Improved spectral efficiency
  • All IP network
  • A standard’s based interface that can support a multitude of user types.

The Encyclopaedia goes on to say that LTE networks are intended to bridge the functional data exchange gap between very high data rate fixed wireless Local Area Networks (LAN) and very high mobility cellular networks.
Evolution also aptly describes the behaviour of the criminal fraternity who are changing their modus operandi in order to keep one step ahead as Operators, Carriers, Vendors, Content/Service Providers and Subscribers take those steps along the 4G LTE path. At the same time, the clever ones are also hoping to scavenge a few valuables that may be left unguarded in the old world, as 4G LTE prospectors redeploy their resources.
LTE is certainly not revolutionising fraud behaviour. The vast majority of the methodologies for obtaining fraudulent gain from LTE/4G services have been tried and trusted over many years through a number of earlier technologies. The scale of gain (or loss if you are the victim) may change for a specific fraud type, and the perpetrator may need to work smarter in order to find the angle of attack; but overall, LTE services are just as susceptible to fraud as the legacy platforms have proved to be.
The challenge for Telcos is to make sure that they too are fine-tuning their prevention, monitoring and detection capabilities accordingly so they are not left trailing in the wake of the perpetrator.
A good fraud manager will want to be alert to the nuances that LTE 4G technology bring and consider some fine tuning of their systems and operations to respond accordingly. For example:-

  • New LTE-based services are often separated from the bearer itself. Bearer and service data transactions/events will need to be fed into the FMS, but these will be in different streams. If they can be linked up in the system, that will give the analyst better visibility – and more control – of the end to end activity, thereby providing more context and greater detection capability.
  • Because of the split between the bearer and the service, it becomes far more important for the operator to know what service the customer should have access to. Operators must spend more time preventing provisioning fraud (perhaps facilitated by an employee) by checking the usage against the “bill of materials” for that subscriber.
  • Events will not necessarily be as simple as they used to be (with a start, an end, an A Number and a B Number), so thought needs to be given to maximising the fraud detection value contained in what may be a complex event (or collection of related events).
  • Billing models may change. E.g. There will be more “all you can eat” packages, and some packages may charge on packet sizes rather than minutes. Bills may also be split between different parties in complex revenue chains.
  • Working on trying to identify IMEIs on a far wider portfolio of CPEs, Smartphones (& applications) is important. As well as IMEIs, the FMS will need to be flexible enough to monitor numerous other “identifiers” that are useful in tracing fraud across the range of LTE services Eg. IMSI, MSISDN, MAC, IP address, PDP context, URLs, customer account ID etc.
  • Subscription Fraud. By definition, LTE devices tend to be more feature-rich and expensive, and are therefore more attractive to criminals. Real-time fraud checks before activation can prevent equipment losses. Checks can include subscriber validation, multiple subscriptions, payment instrument, dealer checks, etc before the customer receives the kit.
  • Much higher data speeds over 4G networks may well result in a proliferation of visible M2M events. If the specific M2M behaviours can be identified for each service, there is an opportunity to profile that usage in each scenario and flag where deviations occur. So, a security system might send a periodic short duration, low volume signal to confirm activation or heartbeat. If this device suddenly shows voice calls or high data volumes (such as video streaming), something fishy may be occurring.
  • VoLTE (Voice over LTE). This could be highly profitable to fraudsters using LTE for bypass, call selling etc.
  • IP-based Frauds such as Spoofing, Hacking, DoS and Malware may require closer monitoring of IP traffic and even content.

This does not mean that Telcos have to go out and replace their FMS tomorrow. But they should start asking questions of themselves and their vendor, such as:-

  • Is my FMS flexible enough to deal with a multifold increase in data types /sources and data volumes?
  • Does my FMS have solid profiling features?
  • Does my FMS have an “inline” or near-real time precheck capability to provide preactivation checks as a fraud prevention strategy.
  • Does my FMS have a robust workflow module to enable the analyst to make the right decisions when an alarm is raised?
  • How well do I know my customer?
  • Do I understand which services my customers are subscribed to?
  • Am I carrying out Fraud Risk Assessments on my LTE services before launch?
  • Are my analysts capable of interacting with other parts of the organisation that they may not previously have encountered (eg. IT Security)?

So, in summary, LTE is not a revolution in terms of new fraud but it is certainly altering the mix significantly. Operators must respond quickly to the changing landscape if they are to stay ahead of, or even just a short step behind, the fraudsters.

Get Started with Subex