Whether on distribution mains, service lines, or at customer residences, leaks can cost utilities considerable time and money. But at least those leaks occur by happenstance, perhaps due to weather or aging infrastructure. In addition to real losses (i.e. leaks), there's another danger to revenue - apparent losses (i.e. theft or metering inaccuracies).
Less than a decade ago, if a customer was clever enough, it could be difficult for a utility to detect, let alone prove, theft of water services. For example, a homeowner could reverse the meter to have water flow the wrong way - much like trying to roll back a car's odometer by running the car in reverse, only the water theft works. If a meter reader had a regular walk-by route, the customer could anticipate read times and make sure to reverse the meter for only a few days or even a couple of weeks between those times when the reader came by. Using this method, the customer could plan days to fill a swimming pool, water the lawn, wash the cars, or other usage-intensive tasks. By the time the utility's reader manually checked the reading, the flow would again be in the right direction, and the consumption might not appear any higher than that of other meters in the neighborhood.
Reversing meter flows, and other forms of unauthorized water usage, are much more difficult to hide these days since the advent of Neptune Technology Group's E-Coder® Solid State Absolute Encoder. This smart encoder with 8-digit resolution registers flow rates down to a tenth of a gallon (as opposed to a standard 6-digit encoder's 10-gallon resolution), with 15-minute-interval flow monitoring. But more important for theft detection are the flags that are automatically generated by the register to mark alarm conditions.
E-Coder® Flags for Cut Wire, Reverse Flow, and Zero Consumption
E-Coder functionality is the cornerstone for all Neptune ARB® Utility Management Systems™-ARB® Mobile™, ARB® FixedBase™ AMR, and ARB® FixedBase™ AMI. The more advanced the System, the more extensive and proactive the theft-and-tamper detection capabilities become.