Short Term Task Order – Fast Response Technical Expertise ... · power lines, electrical ......

115
November 2009 This publication was produced for review by the United States Agency for International Development. under Contract No. EPP-I-03-03-00007-00 Sub Activity 10. “Short Term Task Order – Fast Response Technical Expertise to EGAT/I&E, Optimal Feeder Loss Reduction Toolkit” Short Term Task Order – Fast Response Technical Expertise to EGAT/I&E OPTIMAL FEEDER LEVEL CONNECTION TRAINING AND FIELD SUPPORT TOOLKIT (LONG VERSION)

Transcript of Short Term Task Order – Fast Response Technical Expertise ... · power lines, electrical ......

November 2009 This publication was produced for review by the United States Agency for International Development. under Contract No. EPP-I-03-03-00007-00 Sub Activity

10. “Short Term Task Order – Fast Response Technical Expertise to EGAT/I&E, Optimal Feeder Loss Reduction Toolkit”

Short Term Task Order – Fast Response Technical Expertise to EGAT/I&E

OPTIMAL FEEDER LEVEL CONNECTION TRAINING AND FIELD SUPPORT TOOLKIT

(LONG VERSION)

November 2009This publication was produced for review by the United States Agency for International Development. Information included in this presentation was provided by subcontractor Connie Smyser of Smyser Associates under the direction of Nexant, Inc. under Contract No. EPP-I-03-03-00007-00, Sub Activity 10. “Short Term Task Order – Fast Response Technical Expertise to EGAT/I&E, Optimal Feeder Loss Reduction Toolkit”

DISCLAIMERThe author’s views expressed in this publication do not necessarily reflect the views of the United States Agency for International Development or the United States Government.

Short Term Task Order – Fast Response Technical Expertise to EGAT/I&E

OPTIMAL FEEDER LEVEL CONNECTION TRAINING AND FIELD SUPPORT TOOLKIT

(LONG VERSION)

OPTIMAL FEEDER LEVEL CONNECTION TRAINING AND FIELD SUPPORT TOOLKIT

(LONG VERSION)

USAID/EGAT/ OFFICE OF INFRASTRUCTURE AND ENGINEERING, ENERGY TEAMNovember 2009

This study was produced for the review by the United States Agency for International Developmentby Nexant, Inc. under Contract No. EPP-I-03-00007-00 Work Order 10

Disclaimer

Information presented in this study is based primarily onpublicly available information. Verifications through interviews were conducted when possible. Description of the utilities in Case Studies is not officialinformation released by those particular utilities, butrather data collected through research and interviews.

4

Table of Contents

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

5

6

Part I

From Generation to Consumption

How Power Comes to our Homes

7

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Electric Power DistributionA distribution network carries electricity from thetransmission system to the consumers.

8

– The network includes medium-voltage (<110 kV) power lines, electrical substations and pole-mounted transformers, low-voltage (< 1 kV) distribution wiring.

– Typically deliver voltages as high as 34 kV & as low as 120 V to consumers.

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

How Electricity is Measured?

• Volts (V) measure the “pressure” under which electricity flows.

• Amps (A) measure the amount of electric current flow.

• Watts (W) measures amount of power.– 1 watt = 1 amp multiplied by 1 volt

• Electric meters measure energy consumption in Kilo Watt-hour (kWh).– 1kWh energy consumption is equal to 1 kW of power

consumed over a period of one hour.

9

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

What is Electric Utility Business?

• The main function of an Electric Distribution Company is Electricity/Power Service Provisionthrough:– Connection of new customers– Maintaining Customer Database– Metering kWh consumed– Billing and Collections– Disconnection for non-payment and reconnections– Provision of Customer Services by installing, operating and

maintaining the required equipment in a safe manner and by enabling system for dispute resolution

10

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Impact of Electricity Theft on Utilities

• Lack of funds to operate and to manage the facilities• Damaged equipment • Lack of exposure to new technologies• Lack of resources for management and field staff

training • Deep staff complicity• Corruption practices

11

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Impact of Electricity Theft on Economy• In some cases losses from theft can be as high as

70% and cost millions of dollars in lost revenues• Viability of distribution companies is threatened• Poor service quality resulting in safety concerns

for consumers• Reduced overall economic productivity that also

results in negative impact on domestic and foreign investments

• States have to make up the difference in power subsidies, impacting more social investments, such as health and education

12

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

13

Part II

What Constitutes Electricity Theft?

14

Non-Technical Losses

Energy Supplied to the Distribution

Network

Energy Consumed and Paid for by

Customers= -Energy

Losses

Technical Losses

Non-Technical/Commercial Losses

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Where Does Electricity Theft Occur Most Commonly?

15Low voltage linesTransformer Meter

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Electricity Theft Methods • Meters:

– Tampering with meters and seals – By-passing the meters – Damaging or removing meters

• Wires/Cables:– Illegal tapping to bare wires or underground cables

• Transformers:– Illegal terminal taps of overhead lines on the low side of the

transformer

• Billing irregularities, including by meter readers.• Unpaid bills by individuals, government institutions

and “untouchable” VIPs. 16

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Theft Occurs When:

• An illegal consumer (not a registered customer) steals directly from the distribution lines or from another legal customer.

• A legal customer (registered customer) steals either bypassing the meter (connecting around the meter to a live cable on the company side of the meter) or tampering with the meter to make it read less or no consumption.

• There is a collusion between the customer and a company employee to reduce the amount paid to the company (with lower side payments to the employee in return).

17

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Loss Sources

18

Imp / Exp metering errorsTechnical losses (66 & 33KV)Technical losses (11 kV & below)Theft/ illegal connections CT ratio/MF errorStopped meterSlow meterDefective meterMeters not readConsumers not billedUnregistered consumersBills not deliveredMisuse of customer category

Consumers billed but not creditedPartial paymentDeliberate under billingProvisional billingBills on a/c of old meter when changedLine disconnected consumer

Example of Losses Pie from “Delhi Privatization Process” BSES Experience, by J P Chalasani

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

19

Meter Tampering

Placing magnetsMechanical impediment to rotating disk

Meter tilting

Meter by pass by illegally connecting to switch before meter

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Illegal Wiring

20

Circuit wire is disconnected/broken from circuit terminal block

Triple breaker inserted in the circuit

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Other ways to steal electricity

21

Equipment used to falsify meter seals

Falsified meter gear parts

Who needs a meter?

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

22

Wire Tapping

Flying connectionsFishing pole connections

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

How can electricity theft be reduced?

23

Public OutreachUnique

Solutions for each

case

Technical Solutions Non-Technical Solutions

Meters and Meter Enhancements

Cables

Specialized Software and Advanced Technologies

Load Limiters

Unique Configurations and Techniques

Management

Legal and Regulatory

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

24

Part III

Technology Overview

Terminology is Confusing and InconsistentEach utility or manufacturer comes up with its own terminology for the same or similar concepts!

25

AMM/AMI

AMR/RMR

MDM Concentric Aerial Distribution (DAC)

Theft Detection Devices

Shielded Anti-theft Meter Box/Meter Encasements

Macro Metering/ Power Balancing/ Feeder Metering

Induction Meters/ Electromechanical/ Electromagnetic/Analog Meters

InfoPOD/AMPLA Chip/AMR

Power Cost Monitors/Split Meters/Energy Demand Feedback Device/Power Monitor

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

26

Technology OverviewMeters and Anti-Theft Meter Enhancements

Anti-Theft Cables and Cable Connection Equipment

Load Limiters

Specialized Software and Advanced Technologies

Unique Configurations and Other Techniques

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Section I. Meters and Anti-Theft Meter Enhancements

• Electromechanical• Electronic:

– Tamper Detection Meters– Prepayment Meters– Meters in Automatic Meter Reading (AMR) Systems– Smart Meters/Advanced Metering Infrastructure (AMI)

• Meters: Anti-Theft Meter Enhancements:– Meter/Security Seals– Power Monitors/Split Meters– Plastic Meter Encasements – AMR Compatible Communications Modules

27

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

I. Meters and Meter Enhancements

28

Meters

Electromechanical Electronic

Power Monitors/Split MetersMeter/Security Seals Plastic

Meter Encasements

Automatic Meter Reading (AMR) System Meters

Anti-Theft Meter Enhancements

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Electromechanical Meters

Record total consumption in kW/h as a single number read bya human meter reader and reported to a utility.

29

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Electronic MetersSolid State meters are microprocessor based metersthat register consumption and perform other functions:• Tamper Detection Meters communicate deviation

from the normal usage patterns to the utility.• Prepayment Meters allow credit to be added by token, smart

card or a keypad.• Meters in an Automatic Meter Reading (AMR) System

broadcast meter identification information and consumption totals, and provide remote disconnection.

• Smart Meter in Automated Metering Infrastructure (AMI) is an electronic meter with continuous two-way communication, measures consumption real time, power outage notification, able to remotely disconnect the customer and send price/rate updates. 30

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Electronic Tamper Detection Meters are Enhanced with Communication AbilityMay include automatic detection of:• Meter Tamper• Meter Bypass• Meter Disconnection • Removal of a meter

from a meter socket

31

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Tamper Detection Meters (Continued)

The meter’s tampering detection scheme indicates the fault or missing neutral conditions and allows the meter to continue accurate billing by continuous monitoring of the phase and neutral (return) currents.

• A fault is indicated where these currents differ by more than a fixed % ( for example 6.25%), and billing continues using the larger of the two currents.

• A missing neutral condition is detected when no voltage input is present, and billing is continued based on the active current signal.

32

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Example - Missing Neutral Connection

Normal Neutral Condition Missing Neutral Conditions

33

34

Pre-Payment MetersPre-payment Options:1. Credit added to the meter on a keypad.2. Credit is purchased on a rechargeable token or a

card and entered into the meter with disconnection ability.

Meter Configurations:1. Split Keypad – metering and keypad are separate. If

metering part is in an enclosed box or on a pole, there less tamper attempts.

2. Non Split Keypad –metering and keypad are in a single housing. Ready

board meter used in Africa

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Meters in Automatic Meter Reading (AMR) systems

AMR is a system where power and telecommunication infrastructures work together.

A typical AMR system consists of: 1) Meters to measure customer consumption,2) Telecommunication technologies to read

meter data and transfer it (meter readings, tamper detection, disconnection/ connection, and outages) to the utility.

3) Computers and software at the utility to analyze the data and use it to bill customers.

35

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

36

AMR Meter Telecommunication Technologies• Touch Technology is where meter reader carries handheld computer

or data collection device with a wand or probe.

• Radio Frequency Handheld are either two-way RF systems and one-way RF systems that use both licensed and unlicensed RF bands.

• ‘Drive-by’ mobile meter reading is done from a utility vehicle.

• Fixed Network AMR is where a network is permanently installed to capture meter readings from AMR capable meters and get the data to a central computer without a person in the field to collect it.

• Power Line Carrier (PLC) AMR is a method where electronic data is transmitted over power lines back to the central computer.

• GSM based remote metering system with data enabled SIM card which is more secure & has less monthly recurring expenses.

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Example: Costs Associated with AMR upgrade in Dominican Republic

TOTAL COST OF PROJECT: $1,544,800 (US)A. Cost per industrial customer : $515 (US)

B. Cost for residential customerfor remote metering and remote disconnection: $54.00 (US)• Cost of electronic meter: $21.00 • Cost of R/F modem card: $18.00• Cost of disconnection device: $15.00

STAR DDS26E Meter

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

37

Smart Meters/Automated Metering Infrastructure (AMI)

• Smart metering is next step from AMR and is a system that enables a two-way communication, using the meter as the real time sender of meter data and the receptor of control or price signals.

• Smart meters differ from AMR meters because they can communicate directly to the utility and on a continued basis.

38

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Anti-Theft Meter Enhancements:

• Meter/Security Seals• Power Monitors/Split Meters• Plastic Meter Encasements • AMR Compatible Communication Modules

39

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

An Electronic Meter can become a Smart Meter At the heart of the smart meter is a single-chip meter – a microprocessor that does the calculation, sends the information to a display, and stores the information to be sent.Depending on the applications and software, capabilities of electronic meter can be increased from displaying power consumption to:1. Meter polling during outages2. Remote programming 3. Remote disconnects4. Ability to pinpoint the size and source of an outage5. Lower risk to public safety6. Better accuracy in the actual meter readings

40

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Meter/Security SealsA Meter Seal also called Security Seal is a passive, one time locking device, with a unique number/identification/bar-code that provides a reliable indication of tampering (unauthorized removal or attempted removal) or entry.

Seals require inspection to indicate whether tampering has occurred or entry has been attempted. By having unique bar codes on each seal, and scanning them each time they are used, utilities are able to keep a database of when and where each seal was installed, and who used it.

It provides limited resistance to an intentional, pre-meditated attempt to open it and gain access to the meter or metering equipment that is sealed with the seal.

41

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Power Monitors/ Split Meters

• Power Monitors/Split Meters display electricity use in home, minute by minute, in dollars or kW. They consist of:

Sensor Power Consumption Displays

42

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Plastic Meter EncasementsHard plastic encasements are a type of a meter seal. These transparent plastic covers serve as a warning and therefore reduce electricity theft.

43

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

AMR Compatible Meter Communication Modules

Old retrofitted meters or manufacturer installedcommunication modules can make electromechanicalmeters AMR compatible

44

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Electronic Meters v. Electromechanical MetersPros of Electronic Meters:• Remote monitoring• No meter reader is required • Additional tampering detection sensor may be added and act together

with the disconnection of the service in cases of tampering attempts• May take instantaneous reading at any time of day • May be programmed to disconnect if bill not paid within a specified time

and reconnect customer’s service connection• May be programmed for pre-payment• Meter may be connected online to customer’s bank account for

automatic payment of bills • Memory data may be downloaded remotely to study customer

consumption pattern • Technically capable to become “smarter” with additional software

Part II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

45

Electronic Meters v. Electromechanical MetersCons of Electronic Meters:• Relatively costly compared to electromechanical meters• Specific skills required to monitor and analyze the system• Central computer and server station with special software is required• A minimum number of customers may be required to cover the cost of

server and software• Electronic meters have a shorter life (15 years) than electromechanical

meters, which will lead to a higher volume of replacements due to shorter age and a higher cost due to their higher price

• The battery-operated AMR meters which send signals to special hand-carried or vehicle-mounted receivers require battery replacement

• Meter manufacturers and AMR system vendors offer proprietary systems that are often not interoperable; so the selection of one AMR vendor limits options for the use of other vendors’ equipment.

Part II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

46

Section II. Anti-Theft Cables and Cable Connection Equipment• Bare Wires • Aerial Bundled Cables (ABC)• Coaxial Cables • Connection Equipment Associated with Anti-Theft

Cables

47

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Bare Wires

The cheapest option for theutilities, but they are alsothe most easily tapped.

48

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Anti-Theft Cable Types

Two main types of aerial cables: • Bundled and Twisted cables

are one or more single phase cables bundled together with the neutral conductor. They are easier to tap than coaxial, but more difficult than bare wires.

• Coaxial (or Concentric) cables have a neutral conductor that wraps around one or more inside phase conductors.

49

Bundled and twisted

Coaxial

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

• Insulation and twisting makes cables more resistant to weathering, abrasion, tearing, cutting and chemicals

Bundled and Twisted Cables

50

Three phase twisted cable with un-insulated ground wire

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Sealed Cables

• Sealing makes bundled cables more resistant to theft • Internal cover is made of conductor, so illegal

connection to phase conductor provides short-circuit to the neutral conductor

51

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Coaxial Cables

52

• Cable consisting of an inner conductor, surrounded by a tubular insulating layer all of which could be surrounded by another conductive layer, and then finally covered again with a thin insulating layer on the outside.

• Term coaxial comes from the inner conductor and the outer shield sharing the same geometric axis

• Inside cover is made of conductor, so in the case of an illegal connection to the phase conductor, there is a short-circuit to the neutral conductor

• Outside cover provides shielding and additional strength

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Coaxial Cables - Examples

53

Two Phase Coaxial Cable With One Central Conductor

Two Phase Coaxial Cable With Two Central Conductors

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Cable Connection Equipment

• Distribution Boxes for cable connections minimize unauthorized consumer access and give a well-organized appearance to the connection point and also improve service quality and reduce technical losses

54

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Anti-Theft Cables Pros• Key benefit – make illegal connections very difficult• Safety and fewer risks of short-circuit, except for in cases of illegal

tampering • Mechanical strength• Resistance to corrosion and lightning• Installation on walls

Part II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Cons• Substantially more expensive than bare wire

55

Section III. Load Limiters

• Positive Temperature Co-efficient Thermistors (PTCs)

• Fuse • Miniature Circuit Breaker (MCB)• Electronic Current Cut-Out (ECC)• Electronic Circuit Breaker (ECB)• Load Limiting Meter Technology

56

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Load Limiters

• Load Limiters are also called Current Limiters. • They allow a prescribed level of maximum current to

be supplied to the customers. • Useful for households with very small electricity

consumption: – E.g. rural consumers in Nepal, where average demand is

less than 100 W per household.

• The consumer is charged a fixed monthly fee irrespective of the total amount of energy consumed.

57

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Types of Load Limiters

• Basic Load Limiters:– Positive Temperature Co-efficient Thermistors (PTCs)– Fuse – Miniature Circuit Breaker (MCB)– Electronic Current Cut-Out (ECC)

• Advanced Load Limiters– Electronic Circuit Breaker (ECB)– Load Limiting Meter Technology

58

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Positive Temperature Co-Efficient Thermistors (PTCs)

• A PTC is a type of a resistor whose resistance increases with increase in temperature.

• If load increases above the prescribed level, the device heats up, causing its resistance to increase.

• The increase in resistance results in reducing the current flow in the circuit to a level below the prescribed level.

• Only available in 0.01A to 0.7A sizes.

• Useful as load limiters for very low electricity consumption households.

59

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Fuse

• Fuse is a type of an over-current protection device.

• It consists of a metal wire or strip that melts when the current flows through it exceeds its rating, thus disconnecting the circuit.

• The blown fuse has to be replaced with a new one every time a customer exceeds the fuse rating.

• This issue makes fuses difficult to be used as Load Limiters.

60

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Miniature Circuit Breaker (MCB)

• Automatically-operated electrical switch designed to limit the current below its preset value.

• If load exceeds the prescribed level, the circuit breaker disconnects the customer.

• It has to be reset manually to resume normal operation.

61

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Electronic Current Cut-Out (ECC)

• When the switch, S, is closed, the customer load is connected. • The voltage across the resistor R indicates the amount of electricity

consumption and is used to turn off the electronic switch if the current exceeds the prescribed level.

• The customer is automatically connected again when his consumption falls below the prescribed level.

62

• Only available in 0.5A to 3A sizes. • Useful as load limiters for very

low electricity consumption households.

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Electronic Circuit Breaker (ECB)

• Functionality is similar to that of the miniature circuit breaker.

• Capable of automatically reconnecting the load once the consumption falls below the maximum allowable consumption level.

63

Weather proof ECB

Distribution pole mounting minimizes possibility of tampering

Source: http://www.sustainablecontrol.com

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Electronic Circuit Breaker (ECB)

– Utility transmits load limit signal;– The meter informs consumer of

pending degradation;– User disconnects nonessential

appliances until complies;– Failure to comply leads to

disconnection as per normal meter operation;

– Reconnection if some load is subsequently shed.

64

If the maximum limit is exceeded, the meter trips.It is used for reducing maximum consumption:

Source: http://www.sarpa.co.za/events/folder.2008-02-8.4259943945/presentations2008/Gary%20Moor.pdf

User Interface Unit

MeteringDevice

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Load Limiters

Pros:• Lower revenue collection costs• Effective demand side management• Easier Demand Forecasting• Low initial capital cost• Cash up front for the electricity utility• Reduction in theft of electricity• Easier budgeting of payments by consumer

Part I What Constitutes Electricity Theft? Part II Technology OverviewPart III Case StudiesPart IV Lessons Learned

65

Load Limiters

Cons:• Increased opportunities for fraud and theft for easily accessible load

limiters• Lack of acceptance by customers• Poor reliability• Poor accuracy• Limited ability to use electricity which may constrain economic

development

Part I What Constitutes Electricity Theft? Part II Technology OverviewPart III Case StudiesPart IV Lessons Learned

66

Section IV. Specialized Software and Advanced Technologies• Traditional Investigation Methods• Data Mining/Analysis for Detecting Electricity Theft• Meter Data Management (MDM)• Combination of Software and Communication

Technology• Geographic Information System (GIS)

67

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Software Solutions For Theft Detection

• Software is used to expand and automate theft detection processes

• Software is designed to apply data and knowledge gathered from different types of meters regarding customers’ load profiles and consumption to identify, to detect, and to predict behavior irregularities or abnormalities that may be due to electricity theft and to offer solutions to deal with non-payment.

68

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Examples of Software Technologies

• Remote meter control (remote disconnect or demand limiting) for non-payment.

• Prepayment, as a customer service option to help customers manage their cash flows.

• Revenue assurance analysis consisting of several capabilities: • Usage patterns based on history or customer class• Usage analysis for vacant houses, vacation houses etc.• Reverse energy flow where none is expected• Load side for disconnected meters• Notification for tamper indicators and events from meters (such as tilt,

reverse rotation, test mode status, and other tamper indicators) and • Advanced analysis for potential taps in high-incidence areas such as

looking at transformer primary versus secondary energy flow, feeder energy import and export, feeder voltage drop analysis, momentary outage count analysis, etc.

69

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Traditional Investigation Methods

• Peer models compare information about similar customers within similar geographical and environmental settings. Deviation from expected consumption can indicate electricity theft.

• Feature analysis looks for anomalies in a customer’s consumption pattern that might indicate theft. Pattern could be obtained using data-mining techniques, pattern recognition, and statistical techniques.

• Utilities’ IT groups develop specialized software that is designed to utilize collected information.

70

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

71

Data Mining/ Analysis For Detecting Electricity Theft

• Electronic meters in Automated Metering Systems (such as AMI (Advanced Metering Infrastructure)/AMR (Automatic Meter Reading)) provide a number of tamper codes that are designed to identify cases of electricity theft. Sometimes these tamper codes are a result of non-tamper related events.

• Abnormal electrical conditions are detected by meter and other data are inputted into software program.

• Software program analyzes tamper codes and links them with feature detection analysis to provide and report combined tamper scores

• Score allows for the prioritization of probability of theft and to isolate highest value cases

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Meter Data Management (MDM)

• The industry move toward smart metering has established meter data management (MDM) as a critical component to realizing the full potential of advanced metering infrastructure (AMI), especially when implemented prior to a large-scale residential AMI rollout.

• As smart meters or AMI are deployed, the MDM must also handle the storage and distribution of non-billing data and messaging such as: two-way commands, outage alarms, tamper alarms and demand response events.

72

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

MDM Example from Oracle consists of 3 Stages:

1. Data Management, info coming from the meter.

2. Meter Data Processes is when data is analyzed and regrouped.

3. Optional Process which indicates additional further data analysis options.

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

73

Combination of Software & Communication Technologies• Coupling software detection methods, especially

involving meters, with advanced anti-tampering communication systems.

• Anti-tampering system could consist of wireless transmitters, a wireless Central Processing Unit (CPU) module, and a server to manage two-way communication and monitor key data

• Theft detection is achieved by comparing consumption data between high-voltage lines and a smart meter

74

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Combination of Software & Communication Technologies -Advanced Metering Infrastructure (AMI) - Example

• AMI is a hardware and software system that includes meters, communication and data analysis

75

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Combination of Software and Communication Technologies - Example• Output Tampering is evident before 8 a.m. and after 7 p.m.

76

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Geographic Information System (GIS)

• GIS is a tool that combines mapping with electrical network layouts. • GSI allows utilities to visualize the data through intelligent maps in their

multiple systems

77

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Geographic Information System (GIS)

GIS offers utilities a number of advantages including:• Improving outage management response. • Improving service call and fleet management work • Improving 'Customer Complaints' logs in Trouble Call

Management.• Long-standing faults brought to a minimum.• Improving collection & billing system.• Reducing outage time.• Identifying and reducing power theft.• Providing better services to the consumers.• Automating process for everyday work tasks

78

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Software Solutions

Pros:• Data analysis is one of the biggest advantages for utilities in

implementing electronic meters. Meters record the electrical parameters of the system in addition to metering, so utility can use intelligence to detect abnormal electrical conditions. Complete data can be downloaded and studied in the office without the need for site visits and alerting the consumer.

Cons:• This approach is based on the use of expensive electronic meters,

sophisticated software and advanced technologies such as GIS. • Compatibility of communication protocols from different manufacturers

in collecting data may pose a problem. • Data storage and ownership of it may become a source of battles.

Part I What Constitutes Electricity Theft? Part II Technology OverviewPart III Case StudiesPart IV Lessons Learned

79

Section V. Unique Configurations and Other Techniques

• Feeder Meter Power Balancing/Macro Metering• Locked Meter Cabinets• Elevated Metering Systems:

– Elevated Meter Centers (EMC)– Service Drop in Maypole Configuration– Service Drop in Conduit

• Transverse Areal Distribution (DAT)• Placement of LV over MV lines (REDE)

80

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Feeder Level Power Balancing/ Macro MeteringIt is based on balancing of power measurements, identifying and removing illegalconnections until that feeder’s balance is reached:

input = output - technical lossesMeters are installed at three levels: 1. 10 kV feeders that serve several 0.4 kV transformer substations; 2. 0.4 kV transformer substations that serve customers; and3. Individual houses, apartments, and commercial enterprises.

81

0.4 kV transformer substation

110/35 kV metering point10 kV feeder metering point

0.4 kV substation metering points

0.4 – 0.22 kV customer metering points

Three and single phase customers

Level 1

Level 2

Level 3

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Locked Metal Cabinets

82

These metal cabinets reduce the ability of consumers to tamper with the meters inside. However, they do not prevent tampering by meter readers.

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

83

Elevated Metering Centers (EMC)

Conventional meters are raised on poles

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

84

Elevated Metering System with Service Drop in Maypole Configuration

Service drop with maypole

A very tall pole is used to place meters at the top of the pole in difficult to reach residential areas and individual service drop links the meters with individual homes

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Elevated Metering System with Service Drop in ConduitService Drop is used to reduce the distances between the pole with meter and the cables are encased in PVC or other hard conduit to prevent neighbors stealing from each other

Encased Shortest Service Drop

85

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

86

Transverse Aerial Distribution (DAT)

This is a configuration developed by Ampla distribution Company in Brazil designed specifically for difficult to serve areas, and slums in the state of Rio De Janeiro, Brazil.

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

87

Placement of LV lines over MV lines (REDE Ampla)

Interior of Meter “Concentrator”

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Unique Configurations and Other Techniques

Pros:• Simple solutions such as meter relocation into Locked Meter

Cabinets or Elevated Metering Systems may result in noticeable reduction of theft.

• Each configuration is designed specifically for the location and to address the existing problem.

• Configurations can be upgraded to the next level, based on the results achieved or not achieved.

Cons:• Can be expensive, depending on the configuration.• May not work for all locations

Part I What Constitutes Electricity Theft? Part II Technology OverviewPart III Case StudiesPart IV Lessons Learned

88

89

Part IV

Case Studies and Examples of Applications and Strategies

Case Studies

• AES Eletropaulo, Brazil• Reliance Energy Ltd (REL), India• ESKOM, South Africa• United Energy Distribution Company (UEDC),

Republic of Georgia• Dhaka Electric Distribution Company (DESCO),

Bangladesh • AMPLA, Brazil

90

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

AES ELETROPAULO, BRAZIL

Large informalcommunities ofconsumers illegallyconnected to the grid.Commercialcustomers alsotaking advantage offree electricity.

Almost 100% reduction of theft in the pilot area where technology applied. However, up to halfof new customershad difficulty payingtheir bills in the beginning.In 2009 non-payment was reduced to 11 % for the pilot area with 8.5% of payment defaults over 30 days.

Residential customers: 1. Meters encased in plastic

and sealed2. Re-metering with

electromechanical meters with service drop using bi-concentric coaxial cables

Commercial customers:1. Electronic meters

programmed with remote reading, disconnection and to limit consumption in case of nonpayment.

ResultsTechnology/Strategy Applied

Problem

91

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

RELIANCE ENERGY Ltd (REL), INDIA

In 2002-2003 in someareas of Delhi theftby metered andUnmeteredconsumers washigher that 60%.

Poor metering andbilling overloaded the distribution network.

Two subsidiaries ofREL reduced losseswithin the period of2003-2007:1. BRPL servingMumbai reduced theftfrom 51.5% to27.92%, and 2. BYPL serving Delhireduced theft form63.16% to 36.03 %

1. Installed Locked Meter Cabinets.

2. Re-metering with electronic meters.

3. Applied Data Mining Analysis for theft detection

4. GIS5. Area audits and

regularization and amnesty of illegal customers.

6. Theft Detection Devices (TDD) – AMI.

ResultsTechnology/Strategy Applied

Problem

92

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

ESKOM, SOUTH AFRICA

Eskom's total electricitylosses due to theft equal 10% ofthe current nationaldemand. The challenge was toEnsure utility’s abilityto monitor customersand to maintaincustomer servicefor more than 3.7million customersconnectedto the grid.

In the pilot areasTheft was reducedfrom 60% to 3-5% andwas attributedprimarily to theinstallation of SplitPrepayment meters

1. Split Prepayment Meters2. Aerial bundled and

Coaxial Cables3. Automated Remote

Metering – InfoPOD4. Service Drop in Maypole5. Locked meter boxes with

alarm notification to the utility data centers.

6. Mid-Block Electrification-Feeder Level Check Meter Principle Power Balancing

ResultsTechnology/Strategy Applied

Problem

93

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

UNITED ENERGY DISTRIBUTION COMPANY (UEDC), REPUBLIC OF GEORGIA

The largestutility serving70% of thepopulation had 70% nontechnical losses withcollection rate below20% due to poormanagementPractices and oldequipment.

Since 2002, UEDCreduced losses from70% to 13% in 2007and to 4% in 2009 withcomparatively small investments intechnology, but strong emphasis onenforcement ofthe rules. CollectionsIncreased from below20% to 80%.

1. Re-Metered with electromechanical and electronic meters.

2. Placed meters in Locked Meter Cabinets.

3. Meter/Security Seals installed.4. Feeder Level Power

Balancing.5. Software for Data

Mining/Analysis and billing.6. Communal Metering.7. Tamper detection electronic

meters on non-residential levels.

ResultsTechnology/Strategy Applied

Problem

94

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

DHAKA ELECTRIC SUPPLY COMPANY (DESCO), BANGLADESH

Low electrification.Unauthorizedconnectionsand meter by-pass inlow income areas.Poor customeraccounting.Irregularities in meterreading and billing

Since 1996 DESCOreduced overalltechnical andnon technical losses from 47% to 13.4% in2007 and to 9,55%in 2009.

1. Elevated Metering System with service drop with aerial bundled cables and secure cable connections,

2. Electronic pre-payment meters with meter seals

3. Feeder Level Power Balancing/Macro Metering

ResultsTechnology/Strategy Applied

Problem

95

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

AMPLA, BRAZIL

From 1995 to 2005an 80% increase inconsumption as aresult of large informalcommunities of consumers illegallyconnected to the grid.Non-technicallosses comprised 58% of total losses. 59% of non-technicallosses and 65% ofnon-payments were inslum areas.

Total losses werereduced from 24% of total consumption in2003 to below 20% ofIn 2007.Theft was reducedfrom 59% to 2% in theareas where thetechnology wasapplied. Non payment reducedto from 65% to 1%.

Stage 1: Transverse AerialDistribution (DAT) with Twistedand Shielded cables. Feederlevel power balancingStage 2: REDEAMPLA/Placement of LV linesover MV lines.Stage 3: Ampla Chip/AMR withPower Monitors, and Plastic Meter Encasements fornon-Ampla Chip customers.

ResultsTechnology/Strategy Applied

Problem

96

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Summary Case Studies

97

AES EP REC ESKOM UEDC AMPLA DESCO

Non-Technical (NT) Losses prior

98% 51% 60% 70% 100% 47%

Non-Technical (NT) Resulting Losses

1% 28% 3-5% 4% 1-2% 9.55%

Technology Used

1)Plastic Meter Encasements

2) AMR3) Service Drop

with Coaxial Cables

1) Locked Meter Cabinets2) Theft Detection Devices/AMI 3) Bundled and Shielded Cables4) Data Analytics 5) GIS6) AMI

1) Split Prepayment Metering 2) AMR-InfoPOD3) Aerial Bundled and Coaxial Cables4) Feeder Level Power Balancing

1) Re-metering: ElectromechanicalElectronic and CommunalMetering2) Locked MeterCabinets 3) Meter Seals 4) Feeder LevelPower Balancing

1)TransverseAerial Distribution1)Placement of LV

over MV lines2)AMR 3)Coaxial Cables 4)Power Balancing5)PlasticEncasement of

Meters

1) EMS withService Dropwith ABC andSecure CableConnections, 2) ElectronicPrepayment Meters withMeter Seals3) Feeder LevelPower Balancing

Disclaimer: This table is compiled based on data from various available sources

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Average Monthly Consumption in Studied Utilities

0

50

100

150

200

250

kWh/month

RelianceMumbai ESKOM

UEDC

DESCO

AMPLA

AESBrazil

98

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

99

KPI Category or KPI KPI Category 1: Financial Viability of the Business Model for the Company Investment Requirements Change in revenue (in terms of losses or debt reduction) Payback KPI Category 2: Affordability and Acceptability for the Customer Change in affordability of electricity service Reduction in inefficient consumption achieved Improvement in the reliability of electricity service Improved legal and institutional status within society Improvement in personal safety and physical environment Satisfaction with customer service including Community Agents KPI Category 3: Society and Community Acceptance of the Project Community and Other Stakeholder Acceptance Regulator and Ratepayer Acceptance Improved Area-wide Security and Safety

AES EP Key Performance Indicators (KPI) to measure their progress through three categories - Example

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Example: Chilectra Long Term, Multi-prong Effort Required to Meet Permanent Challenge

100

May 198422.6% Losses

Pilot project on Economic Aerial Distribution

Economic Aerial Distribution (DAE)

Important Client Project

Concentric Aerial Distribution (DAC)

Focus on Problem Areas

Shielded Anti-theft Meter Box with Tamper Shut Down

Work in Slums; Ethnographic Studies

Acme Grid and Company Social Responsibility

12-month indicator of electricity losses at Chilectra (from 1981-October 2007)

Technical Measures Implemented (PIMT)

Source: Chilectra, Chile

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

101

Part V

Lessons Learned

Part IV: Lessons Learned - No One Solution Fits All!

102

Part I What Constitutes Electricity Theft? Part II Technology OverviewPart III Case StudiesPart IV Lessons Learned

• In low income neighborhoods, technology alone is rarely sufficient to stop theft. Integrated anti-theft programs including community outreach, publicity about apprehensions and criminal proceedings against theft, as well as information about how to consume electricity more efficiently and within the budget available to the customer were used.

• Utilities identify the largest source of losses among their consumer categories.

• Each company evaluates the reasons for the sources, types and degree of their non-technical losses and develops a unique strategy for addressing those losses.

Lessons Learned (Cont’d)

103

Part I What Constitutes Electricity Theft? Part II Technology OverviewPart III Case StudiesPart IV Lessons Learned

• Utilities implement their programs in stages, checking at each stage whether it was adequate or whether more technology, management or outreach is needed.

• Utilities reduce their costs by focusing their efforts on the worst cases rather than putting in anti-theft technology system wide.

• Those companies with consumers that have relatively high consumption have more motivation to install anti-theft technology.

Lessons Learned (Cont’d)

104

% of Non-Technical Losses Reduced

ROI on AT tech

Investments in Anti-Theft (AT) Technology

Optimal point of investment in AT

technology

>1

Part I What Constitutes Electricity Theft? Part II Technology OverviewPart III Case StudiesPart IV Lessons Learned

• Optimal Point of Investment in Anti-Theft (AT) Technology Relatively low cost techniques and technologies that yield high ROI could be implemented first. Generally, if there are theft problems associated with larger consumers (e.g. commercial), then technology investments would be prioritized, so that the largest sources of loss are addressed first, as the ROI will most likely be higher.

Benefits of Metering and System Upgrades

Replacing faulty meters and LV lines most often leadsto readings that are larger and more accurate thanprevious meter indicated.

0

50000

100000

150000

200000

250000

300000

November December January February March April

kWh

before the projectafter the project

105

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Benefits of Metering and System Upgrades (continued)

• Therefore the amount billed goes up based on the true consumption.

• Individual actual consumption may either: – decrease over time and the supply purchase requirements

for the company will go down as a result,– or it may increase improving the consumers’ quality of life

and increasing distribution company’s revenues.

106

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Benefits of Metering and System Upgrades (continued)

• Example 1: United Energy Distribution Company (UEDC) in the Republic of Georgia, reported reduced consumption by 30 % that benefited the grid load during peak hours.

• Example 2: 40% of Ampla, Brazil, consumers reduced their consumption while the rest increased by varying amounts (some as much as 50% more). The average increase in consumption per client is 25%. Ampla’s experience shows that customers who used to steal power, increased their consumption, probably because of better power quality and reliability that comes with a legal connection and allows the use of appliances without fear of them burning out.

107

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Technology investments need to be coupled with:

Operational Procedures with Legal and Regulatory SupportUtility staff and customers need to be disciplined to comply with therules and procedures and to know that illegal tapping andtampering will be identified, disconnected, reported and punished.

Management Practices with Customer Oriented ApproachCustomer hot lines, public outreach activities and publishedinformation on electricity services, safety and billing and paymentoptions is an important investment that leads to sustainableconsumer behavior change.

108

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Non-Technology Based SolutionsManagement:• Separating metering, billing and collection functions. • Computerization of consumer accounts, enabling monitoring of each account.• Bill payment through banks.• Incentive and punishment based pay schemes for meter readers.• Government subsidies made transparent.• Spot checks and audits.Legal and Regulatory:• Permitting disconnections for nonpayment, • Requiring 100% billing, imposition of fines and penalties for electricity theft, • Establishment of a dispute resolution system Community Outreach and Public Awareness:• Investing in public education on electricity theft and dangers.• Establishment by utilities an easy communication with their customers on tariffs,

laws and understanding meter readings.109

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Items to Consider in Assessing Expected Commercial Net Benefits and Costs of Investing in Anti-Theft Technologies

Determining the cost-benefit ratio

Regulatory approvalsand how much utilities

can charge

Meter reader retraining and costs associated with it

Ability to dealing with increased customer service

Potential for future upgrades

How long will the investment last and under what conditions

Determining the likelihood and ease of

equipment damage

Number of Customers or kWh needed to make

investments break even

Anti-Theft Technology Investments?

110

Part I From Generation to ConsumptionPart II What Constitutes Electricity Theft? Part III Technology OverviewPart IV Case StudiesPart V Lessons Learned

Steps to Sustainable Anti-Theft Programs by Utility Companies

111

Part I What Constitutes Electricity Theft? Part II Technology OverviewPart III Case StudiesPart IV Lessons Learned

5. Set operational procedures with regular monitoring.

6. Introduce new management practices towards a more customer oriented approach.

4. Assess the expected commercial net benefits and costs of investing in anti-theft technologies.

3. Determine if metering and system upgrades are needed.

2. Identify if consumers have a legal or illegal connection.

1. Conduct field assessment/ inspection of the existing infrastructure, such as cables, meters and etc.

7. Implementation.

Appendix A: Acronyms

112

ABC Aerial Bundled CablesAES EP AES Eletropaulo, BrazilAMI Advanced Metering InfrastructureAMM Automated Meter ManagementAMR Automated Meter ReadingAT Anti-TheftCPU Central Processing UnitDAT Transverse Areal DistributionDESCO Dhaka Electric Distribution Company, Bangladesh ECC Electronic Current Cut-OutECB Electronic Circuit BreakerEMC Elevated Meter CentersGIS Geographic information SystemGSM Global System for Mobile CommunicationLV Low Voltage (in the case of cables)MCB Miniature Circuit BreakerMDM Meter Data ManagementMV Medium Voltage (in the case of cables)NT Non-Technical (in the case of losses)PLC Power Line CarrierPTCs Positive Temperature Co-efficient ThermistorsPVC Polyvinyl chlorideREL Reliance Energy Ltd, IndiaRF Radio FrequencyROI Return on InvestmentSIM Subscriber Identity ModuleUEDC United Energy Distribution Company, Republic of Georgia

113

Appendix B: Sources

• Sources – Presentations• Sources – Technology Overview• Sources – Case Studies

114

Appendix C: Sample list of Meter Manufacturers and VendorsElectronic Meters:• Actaris www.actaris.com• Analog Devices

http://www.analog.com/en/index.html• Cashpower Suprima

http://www.za.landisgyr.com/za/prepay/catalogues/vending_catalogue.pdf

• Circuit Breaker Industries www.cbi.co.za• Conlog www.conlog.co.za• Contour Technology www.contour.co.za• EAS Elektronik San Tic http://www.eas-

tr.com/default-en.asp• Elektromed http://www.elektromed.com.tr• Elster Metering http://www.elstermetering.com• http://old.metering.com/archive/014/25_1.htm

Grupa Apator http://www.apator.eu/en/ff_home?set_lang=en

• JDS Uniphase Corporation, http://www.jdsu.com• Landis + Gyr www.cashpower.com

• Laser LaserPoint s.r.l., http://www.laserpoint.it• Laser Probe Inc., http://www.laserprobeinc.com• Malaysian Intelligence Meters www.mim.net.my• Meter Mate http://www.metermate.co.za• MetroLux GmbH, Germany

http://www.metrolux.de• Open Architecture Systems (OAS)

www.oas.co.za• Ophir Optronics Ltd., Israel

http://www.ophiropt.com• PN Energy Services www.pn.co.za• PRI Liberty meter http://www.pri.co.uk• Prism Payment Technologies supplier of the

STS encryption modules. www.prism.co.zaShenzhen Star Instruments Company Limited http://www.szstar.com/english/index.asp

• Syntell http://www.syntell.co.za• Ultima System and Powerhouse Solar• http://www.actaris.com/html/products-1588.html• http: www.alibaba.com

Appendix D: Sample List of Meter Manufacturers and Vendors Prepaid Meter Manufacturers• Actaris www.actaris.com• Cashpower Suprima www.za.landisgyr.com/za/prepay/catalogues/vending_catalogue.pdf• Circuit Breaker Industries www.cbi.co.za• Conlog www.conlog.co.za• Contour Technology www.contour.co.za• EAS Elektronik San Tic www.eas-tr.com/default-en.asp• Elektromed www.elektromed.com.tr• Grupa Apator www.apator.eu/en/ff_home?set_lang=en• Landis + Gyr www.cashpower.com• Malaysian Intelligence Meters www.mim.net.my• Meter Mate www.metermate.co.za• Open Architecture Systems (OAS) www.oas.co.za• PN Energy Services www.pn.co.za• PRI Liberty meter www.pri.co.uk• Prism Payment Technologies supplier of the STS encryption modules. www.prism.co.za

– Shenzhen Star Instruments Company Limited www.szstar.com/english/index.asp– Syntell www.syntell.co.za– Ultima System and Powerhouse Solar old.metering.com/archive/014/25_1.htm

115