A serious threat to utilities is theft of services. There is also a large liability potential if tampering remains undetected. This scenario describes the process by which the utility detects tamper/theft through communication with the meter. It includes the methods by which the communication equipment detects the tampering/theft. Tamper methods include, for example, comparison of the load profile data against historical records, or a spontaneous report of a tamper switch being triggered at the customer site. This scenario excludes the actual reading of data required to support a determination of theft/tamper detection. This is covered by scenario B1. It also excludes the actual algorithms used to determine whether theft is occurring.