Email a colleague    

November 2015

SIM Box Bypass: The Threat to Developing Nations and the Actions Regulators Must Take

SIM Box Bypass: The Damage to Developing Nations and the Actions Regulators Must Take

Bypass and SIM Box fraud continue to cause huge financial damage to telecoms.  In a 2015 survey, the CFCA estimated annual bypass losses of $6 billion globally.

But what are the losses to the nations affected by bypass?  Well, that’s a tough question to answer.  In fact, no international body — ITU, United Nations, etc. — appears to be actually quantifying the global damage to nations.

Many critical questions are not being adequately discussed.  For instance, what are the various kinds of damage — financial, economic, and social — that bypass fraud inflicts on a nation?  And what’s the proper role of policy makers and law enforcement?  Should they take a hands-off approach and let the telecom operators drive the solution, or should governments get more actively involved?

Well, for some perspective on these issues, I interviewed Lex Wilkinson, CEO of LATRO Services, a boutique solutions firm who specializes in solving telecom bypass problems.  Lex provides a clear explanation of the many subtle problems associated with bypass and SIM box fraud causes.  And he also discusses a case study in Jordan that shows how regulators, operators and solution vendors can successfully work together to contain the problem.

Dan Baker, Black Swan Editor: Lex, I think a good starting point is to better understand the full scope of the bypass and SIM box issue.  What kind of damage does bypass cause?  And what are the issues that regulators and other government officials need to be concerned about?

Lex Wilkinson: Dan, the global damage that illegal bypass causes is substantial and it goes far beyond the loss of tax or operator revenue.  At LATRO, we categorize SIM box bypass damage under three main categories:

  • financial and revenue damage;
  • infrastructure and service quality damage; and,
  • security and privacy damage.

It’s worth spending a couple minutes discussing these issues one by one.  So here we go:

Financial & Revenue Loss

  1. Tax revenue loss — First and foremost, of course, international phone calls are a big source of tax revenue and foreign exchange currency, especially for nations in the developing world.  The tax revenue is used to fund national infrastructure and many other things.  But if 20% of a nation’s foreign incoming calls are being bypassed, then 20% of tax revenue is lost.
  2. Operator revenue loss — The licensed telecom operators of the country also lose revenue, which could kill their business and at the least cause them to earn a much lower return on their investments.  Instead, the revenue lost goes to enrich criminal organizations usually in foreign lands.

National Infrastructure & Service Quality Damage

  1. Damage to a Nation’s Economic Infrastructure — Communications infrastructure is vital to a nation’s economic prosperity and growth.  And it’s becoming more and more vital today as the information technology that drives business — and economic development — is migrating to cloud networks. 

    So protecting the licensed operators and preventing bypass competition is sound public policy.  If SIM Box fraudsters destroy the incentive for private telecom operators to invest and grow their infrastructure, great damage is done to the larger society.  Another important issue is that bypass causes the licensed operators to invest wastefully in wireless and backhaul infrastructure in locations where SIM box bypass occurs.
  2. The Quality of Phone Service Suffers — To boost their revenue, fraudsters cut corners on voice call quality wherever possible.  They use low rate voice encoders that deliver low quality of service calls.  Plus much of the revenue for driving fraudulent traffic comes from low-priced calling cards sold in foreign countries.  In short, the average quality of voice service in a country is significantly reduced by SIM Box bypass.

Security & Privacy Damage

  1. Lawful Intercept Systems are Bypassed — When an international phone call terminates through a SIM box, it not only bypasses the international gateway of the telecom operator, it also sidesteps the nation’s Lawful Intercept systems, the legal surveillance means police and intelligence agencies use to track criminals and terrorists. 

    So why does that occur?  Well, when a call is diverted through an illegal SIM box, the originating phone number is stripped away.  What the telecom system sees is the phone number of the illegal SIM card, not the actual originating number from the foreign country. 

    So, for example, if the authorities in U.A.E. want to legally wiretap a known terrorist in Yemen making calls into the U.A.E., they risk missing any calls that are redirected through a SIM Box.
  2. Phone Calls Lose their Privacy and Security Protections --  Public networks have a high degree of security and privacy built-in.  GSM mobile networks, for instance, are encrypted to protect the subscriber’s privacy.  Normal VoIP traffic also passes through the secure networks of interconnect carriers. 

    But when calls are redirected through an illegal SIM box, these security measures are often not there, meaning the phone calls can be tapped into by criminals or hackers in the path of those IP connections.  Now the reason the SIM box fraudsters don’t protect the calls is to avoid extra costs: a simpler network means they don’t need to hire security equipment and experts.
  3. SMS Messages are Compromised — In addition to phone calls, the security of SMS messages is also compromised by SIM Box bypass.  This issue is especially troubling today now that bank notices and other confidential information are regularly being passed to mobile subscribers via SMS.
Great, Lex.  Your discussion of the various kinds of damage shows how multi-faceted and dangerous the bypass problem truly is.  But what about the threat itself?  The problem has existed for many years now.  Is it increasing or decreasing?

Dan, despite the high investments operators have made in controlling bypass, we at LATRO strongly suspect that the SIM Box problem is actually increasing worldwide.  LATRO serves operators in many countries, and in many of these places international voice revenue has declined sharply due to SIM box bypass.  After we enter a market and insert our technology and work with the operators, regulators, and police, international voice revenue goes back up again.

So what’s causing the increase in SIM Box bypass?  Certainly one of the chief causes is that fraudsters are more sophisticated today.  They’ve become experts at avoiding detection and using stealth technology.

Managing and controlling SIM box bypass has evolved over time.  And control techniques that worked well only a couple years ago have been neutralized.  For instance, many nations have launched government programs to control the purchase of SIM cards on the local market.

Now initially these programs did their job: they caused the fraudsters some headaches and made getting a fresh supply of SIM cards much harder.  But recently — with the rise of SIM Server technology — SIM card purchasing controls are steadily losing their effectiveness.

Here’s why: the SIM Server allows the fraudsters to centralize the command and control of bypass operations.  What they do is drop their SIM Server in a country like Monaco, Jamaica, or anywhere actually.  Then they use that one Server to control bypass across multiple countries.

Here’s another key advantage they gain with SIM servers: the SIM cards themselves no longer need to live in the local infected network.  The SIM cards can be consumed in a large bank of SIM cards adjacent to the SIM Server in the criminal’s country halfway around the world.  So today, the only things they require in the local network are the antennas that retransmit the fraudulent traffic onto the local mobile network.

Now perhaps the biggest concern of all is that, with the help of SIM Servers, the fraudsters can lower the telltale usage of any single SIM card to the point where it flies “below the radar” of easy detection by fraud management systems.

NOTE: For a interesting discussion of the SIM Server challenge, and current methods used to detect and block bypass, we recommend you download and read TRI’s white paper on the subject.

OK, if SIM box bypass is now harder to combat — and government SIM card controls no longer work like they used to — what’s the proper role of governments and regulatory bodies in the fight?  Sounds like the SIM box problem has become a more technical issue, suggesting operators need to solve it on their own.

Though it may sound counter-intuitive, the exact opposite is true, Dan.  Since the fraudsters are now more technically savvy at their deception game, governments must actually step up and play a more active role in protecting their country from bypass.  Here’s why:

  • Fraudsters Seek the Path of Least Resistance in a Country.  The fraudsters usually locate their SIM boxes in highly populated areas served by multiple carriers.  Now operators vary quite a bit in their competence, focus, and resources to deal with bypass fraud. 

    Let’s say there are three operators in a region.  Operators 1 and 2 have a relatively good SIM box detection program, but Operator 3 is weak.  Well, the fraudster can push more traffic toward Operator 3 because it has the weakest defenses.  But notice, because the fraudsters have diverted their fraud toward the weak operator’s networks, the amount of actual bypass within the country remains the same: government tax losses remain the same as before!
  • The Regulator is in the Best Position to Optimize the Deployment of SIM Box Detection & Blocking Resources — LATRO Services has developed a patented Protocol Signature detection method based on network signaling probes that detect and block SIM Boxes as soon as they sign onto the network.  Now a resource like that is best deployed in a single city area served by multiple operators.  To deploy that technology in one operator’s network alone is less effective, because the fraudster simply redirects its traffic to mobile operator not protected by LATRO’s probe.
  • Law Enforcement’s Effectiveness is Enhanced — Since a key goal is to seize SIM boxes that affect multiple operators in a region, it’s more effective if the government regulator coordinates the use of LATRO’s technology to pinpoint the actual location of the SIM boxes and work with the police to go in to confiscate equipment and make arrests in one fell swoop and surprise the fraudsters.
So what can be done, Lex?  What’s a typical SIM box control strategy?  How have regulators worked with you in the past to make a dent in the problem?

Well, we recently worked with the Telecommunications Regulatory Commission (TRC) in the country of Jordan.  The project was a big success because SIM box bypass was substantially reduced and a total of 16 SIM box operations were prosecuted. 

The project’s success was largely due to the coordinated effort of: government regulators, local law enforcement, the mobile operators in Jordan, and LATRO’s unique SIM Box locating technology.  Here are the four main steps in that operation:

  1. SIM Boxes were Detected & Revenue Losses were Stopped — Intelligence from LATRO’s SIM Box detection systems and the Jordanian operators were combined allowing TRC to successfully block SIM card use and prevent further financial loss to the operators and the Jordanian government.
  2. The Fraudsters’ SIM Box Deployments & Strategies were Exposed — Running all the detection data through LATRO’s Versalytics analysis platform provided TRC with a comprehensive view of fraud activities in Jordan.  Individual SIM Box fraud operations were then further analyzed through LATRO’s proprietary pattern recognition technology.
  3. SIM Box Locations were Precisely Pinpointed — Using the network intelligence on SIM Box activity as a starting point, the TRC team uses LATRO’s Radio Frequency (RF) investigation tool to identify the exact location of the actual SIM Boxes.
  4. SIM Box Operations were Busted — TRC then mobilized its law enforcement resources to take action.  In just a few months, Jordanian police forces seized and confiscated 449 SIM Box modems representing 646,000 potential minutes of fraudulently terminated calls.  This produced an estimated revenue savings in Jordan of $1.36 million.

So this gives you an idea what can be done.  Now I emphasized the revenue savings because that’s the easiest benefit to calculate, but Jordan certainly also saw improvements in the telecom service quality and security/privacy areas we discussed before.

Lex, thanks for this fine briefing.  Your discussion not only educates regulators on what’s at stake, you’ve also shown that much can still be done to attack this bypass and SIM Box cancer that afflicts so many nations.

Copyright 2015 Black Swan Telecom Journal

 
Lex Wilkinson

Lex Wilkinson

William “Lex” Wilkinson is the Chief Executive Officer of LATRO Services, Inc., a privately funded company based in Easton, PA.  He was a pioneer in fighting fraud during the cellular market explosion of the early 1990’s and was an original member/founder of the CTIA Fraud Task Force in 1991.  As a security consultant to industry associations and wireless operators around the world, Lex has seen first-hand the many ways fraud can affect organizations and cost millions in lost revenue.

Later as an executive with Rural Cellular Corporation, he participated in the sale and integration of RCC to Verizon Wireless where he remained until 2010.  Based on his years of experience in the industry and as a Tier 1 telecom executive, he created LATRO Services, a company that develops and implements next generation fraud analysis tools and managed services for wireless operators around the world.

Mr.  Wilkinson is a U.S.  Army Veteran, retired Police Detective and a graduate of DeSales University in Center Valley, Pennsylvania.  Today, LATRO Services operates in over twenty-five markets on four continents.   Contact Lex via

Black Swan Solution Guides & Papers

cSwans of a Feather

Related Articles

  • Tokopedia, Indonesia’s E-Commerce King, Partners with 11 Million Merchants; Adopts Multi-Cloud to Drive Innovation interview with Warren Aw & Ryan de Melo — Indonesia’s Tokopedia, founded in 2009, has grown to become one of world’s leading e-commerce players.  Read about its success, technology direction, and multi-cloud connectivity adoption.
  • Bridge Alliance: Knocking Down Regional & Mobile Connectivity Barriers so Connected Car Markets Get Rolling in Asia interview with Kwee Kchwee — The CEO of an Asian consortium of mobile operators explains how they  help simplify and harmonize their members‘ operations in support of multi-national corporations.  This integration is enabling two huge industries to come together in Asia: auto manufacturing and telco.
  • Epsilon’s Infiny NaaS Platform Brings Global Connection, Agility & Fast Provision for IoT, Clouds & Enterprises in Southeast Asia, China & Beyond interview with Warren Aw — Network as a Service, powered by Software Defined Networks, are a faster, more agile, and more partner-friendly way of making data global connections.  A leading NaaS provider explains the benefits for cloud apps, enterprise IT, and IoT.
  • PCCW Global: On Leveraging Global IoT Connectivity to Create Mission Critical Use Cases for Enterprises interview with Craig Price — A leading wholesale executive explains the business challenges of the current global IoT scene as it spans many spheres: technical, political, marketing, and enterprise customer value creation.
  • Senet’s Cloud & Shared Gateways Drive LoRaWAN IoT Adoption for Enterprise Businesses, Smart Cities & Telecoms interview with Bruce Chatterley — An IoT netowork pioneer explains how LoRaWAN tech fits in the larger IoT ecosystem.  He gives use case examples, describes deployment restraints/costs, and shows how partnering, gateway sharing, and flexible deployment options are stimulating growth.
  • ARM Data Center Software’s Cloud-Based Network Inventory Links Network, Operations, Billing, Sales & CRM to One Database interview with Joe McDermott & Frank McDermott — A firm offering a cloud-based network inventory system explains the virtues of: a single underlying database, flexible conversions, task-checking workflow, new software business models, views that identify stranded assets, and connecting to Microsoft’s cloud platform.
  • Pure Play NFV: Lessons Learned from Masergy’s Virtual Deployment for a Global Enterprise interview with Prayson Pate — NFV is just getting off the ground, but one cloud provider to enterprises making a stir in virtual technology waters is Masergy.  Here are lessons learned from Masergy’s recent global deployment using a NFV pure play software approach.
  • The Digital Enabler: A Charging, Self-Care & Marketing Platform at the Core of the Mobile Business interview with Jennifer Kyriakakis — The digital enabler is a central platform that ties together charging, self-care, and marketing.  The article explains why leading operators consider digital enablers pivotal to their digital strategies.
  • Delivering Service Assurance Excellence at a Reduced Operating Cost interview with Gregg Hara — The great diversity and complexity of today’s networks make service assurance a big challenge.  But advances in off-the-shelf software now permit the configuring and visualizing of services across multiple technologies on a modest operating budget.
  • Are Cloud-Based Call Centers the Next Hot Product for the SMB Market? interview with Doron Dovrat — Quality customer service can improve a company’s corporate identity and drive business growth.  But many SMBs are priced out of acquiring modern call center technology.  This article explains the benefits of affordable and flexible cloud-based call centers.
  • Flexing the OSS & Network to Support the Digital Ecosystem interview with Ken Dilbeck — The need for telecoms to support a broader digital ecosystem requires an enormous change to OSS infrastructures and the way networks are being managed.  This interview sheds light on these challenges.
  • Crossing the Rubicon: Is it Time for Tier Ones to Move to a Real-Time Analytics BSS? interview with Andy Tiller — Will tier one operators continue to maintain their quilt works of legacy and adjunct platforms — or will they radically transform their BSS architecture into a new  system designed to address the new telecom era?  An advocate for radical transformation discusses: real-time analytics, billing for enterprises, partnering mashups, and on-going transformation work at Telenor.
  • Paradigm Shift in OSS Software: Network Topology Views via Enterprise-Search interview with Benedict Enweani — Enterprise-search is a wildly successful technology on the web, yet its influence has not yet rippled to the IT main stream.  But now a large Middle Eastern operator has deployed a major service assurance application using enterprise-search.  The interview discusses this multi-dimensional topology solution and compares it to traditional network inventory.
  • The Multi-Vendor MPLS: Enabling Tier 2 and 3 Telecoms to Offer World-Class Networks to SMBs interview with Prabhu Ramachandran — MPLS is a networking technology that has caught fire in the last decade.  Yet the complexity of MPLS has relegated to being mostly a large carrier solution.  Now a developer of a multi-vendor MPLS solutions explains why the next wave of MPLS adoption will come from tier 2/3 carriers supporting SMB customers.
  • Enabling Telecoms & Utilities to Adapt to the Winds of Business Change interview with Kirill Rechter — Billing is in the midst of momentous change.  Its value is no longer just around delivering multi-play services or sophisticated rating.  In this article you’ll learn how a billing/CRM supplier has adapted to the times by offering deeper value around the larger business issues of its telecom and utility clients.
  • Driving Customer Care Results & Cost Savings from Big Data Facts interview with Brian Jurutka — Mobile broadband and today’s dizzying array of app and network technology present a big challenge to customer care.  In fact, care agents have a hard time staying one step ahead of customers who call to report problems.  But network analytics comes to the rescue with advanced mobile handset troubleshooting and an ability to put greater intelligence at the fingertips of highly trained reps.
  • Hadoop and M2M Meet Device and Network Management Systems interview with Eric Wegner — Telecom big-data in networks is more than customer experience managment: it’s also about M2M plus network and element management systems.  This interview discusses the explosion in machine-to-machine devices, the virtues and drawbacks of Hadoop, and the network impact of shrink-wrapped search.
  • The Data Center & Cloud Infrastructure Boom: Is Your Sales/Engineering Team Equipped to Win? by Dan Baker — The build-out of enterprise clouds and data centers is a golden opportunity for systems integrators, carriers, and cloud providers.  But the firms who win this business will have sales and engineering teams who can drive an effective and streamlined requirements-to-design-to-order process.  This white paper points to a solution — a collaborative solution designs system — and explains 8 key capabilities of an ideal platform.
  • Big Data: Is it Ready for Prime Time in Customer Experience Management? interview with Thomas Sutter — Customer experience management is one of the most challenging of OSS domains and some suppliers are touting “big data” solutions as the silver bullet for CEM upgrades and consolidation.  This interview challenges the readiness of big data soluions to tackle OSS issues and deliver the cost savings.  The article also provides advice on managing technology risks, software vendor partnering, and the strategies of different OSS suppliers.
  • Calculated Risk: The Race to Deliver the Next Generation of LTE Service Management interview with Edoardo Rizzi — LTE and the emerging heterogeneous networks are likely to shake up the service management and customer experience management worlds.  Learn about the many new network management challenges LTE presents, and how a small OSS software firm aims to beat the big established players to market with a bold new technology and strategy.
  • Decom Dilemma: Why Tearing Down Networks is Often Harder than Deploying Them interview with Dan Hays — For every new 4G LTE and IP-based infrastructure deployed, there typically a legacy network that’s been rendered obsolete and needs to be decommissioned.  This article takes you through the many complexities of network decom, such as facilities planning, site lease terminations, green-safe equipment disposal, and tax relief programs.
  • Migration Success or Migraine Headache: Why Upfront Planning is Key to Network Decom interview with Ron Angner — Shutting down old networks and migrating customers to new ones is among the most challenging activities a network operators does today.  This article provides advice on the many network issues surrounding migration and decommissioning.  Topics discussed include inventory reconciliation, LEC/CLEC coordination, and protection of customers in the midst of projects that require great program management skills.
  • Navigating the Telecom Solutions Wilderness: Advice from Some Veteran Mountaineers interview with Al Brisard — Telecom solutions vendors struggle mightily to position their solutions and figure out what to offer next in a market where there’s considerable product and service crossover.  In this article, a veteran order management specialist firm lays out its strategy for mixing deep-bench functional expertise with process consulting, analytics, and custom API development.
  • Will Telecoms Sink Under the Weight of their Bloated and Out-of-Control Product Stacks? interview with Simon Muderack — Telecoms pay daily for their lack of product integration as they constantly reinvent product wheels, lose customer intelligence, and waste time/money.  This article makes the case of an enterprise product catalog.  Drawing on central catalog cases at a few Tier 1 operators, the article explains the benefits: reducing billing and provisioning costs, promoting product reuse, and smoothing operations.
  • Virtual Operator Life: Enabling Multi-Level Resellers Through an Active Product Catalog interview with Rob Hill — The value of product distribution via virtual operators is immense.  They enable a carrier to sell to markets it cannot profitably serve directly.  Yet the need for greater reseller flexibility in the bundling and pricing of increasingly complex IP and cloud services is now a major channel barrier.  This article explains what’s behind an innovative product catalog solution that doubles as a service creation environment for resellers in multiple tiers.
  • Telecom Blocking & Tackling: Executing the Fundamentals of the Order-to-Bill Process interview with Ron Angner — Just as football teams need to be good at the basics of blocking and tackling, telecoms need to excel at their own fundamental skillset: the order-to-cash process.  In this article, a leading consulting firm explains its methodology for taking operators on the path towards order-to-cash excellence.  Issues discussed include: provisioning intervals; standardization and simplicity; the transition from legacy to improved process; and the major role that industry metrics play.
  • Wireline Act IV, Scene II: Packaging Network & SaaS Services Together to Serve SMBs by John Frame — As revenue from telephony services has steadily declined, fixed network operators have scrambled to support VoIP, enhanced IP services, and now cloud applications.  This shift has also brought challenges to the provisioning software vendors who support the operators.  In this interview, a leading supplier explains how it’s transforming from plain ol‘ OSS software provider to packager of on-net and SaaS solutions from an array of third party cloud providers.
  • Telecom Merger Juggling Act: How to Convert the Back Office and Keep Customers and Investors Happy at the Same Time interview with Curtis Mills — Billing and OSS conversions as the result of a merger are a risky activity as evidenced by famous cases at Fairpoint and Hawaiian Telcom.  This article offers advice on how to head off problems by monitoring key operations checkpoints, asking the right questions, and leading with a proven conversion methodology.
  • Is Order Management a Provisioning System or Your Best Salesperson? by John Konczal — Order management as a differentiator is a very new concept to many CSP people, but it’s become a very real sales booster in many industries.  Using electronics retailer BestBuy as an example, the article points to several innovations that can — and are — being applied by CSPs today.  The article concludes with 8 key questions an operator should ask to measure advanced order management progress.
  • NEC Takes the Telecom Cloud from PowerPoint to Live Customers interview with Shinya Kukita — In the cloud computing world, it’s a long road from technology success to telecom busness opportunity.  But this story about how NEC and Telefonica are partnering to offer cloud services to small and medium enterprises shows the experience of early cloud adoption.  Issues discussed in the article include: customer types, cloud application varieties, geographic region acceptance, and selling challenges.
  • Billing As Enabler for the Next Killer Business Model interview with Scott Swartz — Facebook, cloud services, and Google Ads are examples of innovative business models that demand unique or non-standard billing techniques.  The article shows how flexible, change-on-the-fly, and metadata-driven billing architectures are enabling CSPs to offer truly ground breaking services.
  • Real-Time Provisioning of SIM Cards: A Boon to GSM Operators interview with Simo Isomaki — Software-controlled SIM card configuration is revolutionizing the activation of GSM phones.  The article explains how dynamic SIM management decouples the selection of numbers/services and delivers new opportunities to market during the customer acquisition and intial provisoining phase.
  • A Cynic Converted: IN/Prepaid Platforms Are Now Pretty Cool interview with Grant Lenahan — Service delivery platforms born in the IN era are often painted as inflexible and expensive to maintain.  Learn how modern SDPs with protocol mediation, high availability, and flexible Service Creation Environments are delivering value for operators such as Brazil’s Oi.
  • Achieving Revenue Maximization in the Telecom Contact Center interview with Robert Lamb — Optimizing the contact center offers one of the greatest returns on investment for a CSP.  The director of AT&T’s contact center services business explains how telecoms can strike an “artful balance” between contact center investment and cost savings.  The discussion draws from AT&T’s consulting with world class customers like Ford, Dell, Discover Financial, DISH Network, and General Motors.
  • Mobile Broadband: The Customer Service Assurance Challenge interview with Michele Campriani — iPhone and Android traffic is surging but operators struggle with network congestion and dropping ARPUs.  The answer?  Direct  resources and service quality measures to ensure VIPs are indeed getting the quality they expect.  Using real-life examples that cut to the chase of technical complexities, this article explains the chief causes of service quality degradation and describes efficient ways to deal with the problem.
  • Telco-in-a-Box: Are Telecoms Back in the B/OSS Business? interview with Jim Dunlap — Most telecoms have long since folded their merchant B/OSS software/services businesses.  But now Cycle30, a subsidiary of Alaskan operator GCI, is offering a order-to-cash managed service for other operators and utilities.  The article discusses the company’s unique business model and contrasts it with billing service bureau and licensed software approaches.
  • Bricks, Mortar & Well-Trained Reps Make a Comeback in Customer Management interview with Scott Kohlman — Greater industry competition, service complexity, and employee turnover have raised the bar in the customer support.  Indeed, complex services are putting an emphasis on quality care interactions in the store, on the web, and through the call center.  In this article you’ll learn about innovations in CRM, multi-tabbed agent portals,  call center agent training, customer treatment philosophies, and the impact of  self-service.
  • 21st Century Order Management: The Cross-Channel Sales Conversation by John Konczal — Selling a mobile service is generally not a one-and-done transaction.  It often involves several interactions — across the web, call center, store, and even kiosks.  This article explains the power of a “cross-channel hub” which sits above all sales channels, interacts with them all, and allows a CSP to keep the sales conversation moving forward seamlessly.
  • Building a B/OSS Business Through Common Sense Customer Service by David West — Delivering customer service excellence doesn‘t require mastering some secret technique.  The premise of this article is that plain dealing with customers and employees is all that’s needed for a winning formula.  The argument is spelling out in a simple 4 step methodology along with some practical examples.