SlideShare a Scribd company logo
1 of 34
2
Introductions
Alan D Percy
Chief Marketing Officer
alan.percy@telcobridges.com
@AlanDPercy
Mike Rudolph
CTO, YouMail
mrudolph@youmail.com
3
Agenda
• Introductions
• The Problem
• Government Actions
• YouMail Robocall Detection
• RoboCall Mitigation with ProSBC and YouMail
• Where to Learn More
• Your Questions
A
D
N
E
G
A
TelcoBridges Inc.
• Manufacturer of VoIP gateways, signaling
gateways, and SBC software for carriers and
enterprises
• Employee Owned
• Founded in 2002
• Employees: ~40
• Headquarters: Montreal, Canada
• Hardware & software R&D as well as
production of its products in Montreal
• Sales/Support offices:
Montreal, Turkey, Hong Kong, Italy
• 24/7 technical support
4
TelcoBridges HQ
© YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY.
5
▷ Originally known for consumer call answering services
▷ Recent expansion into safe communications for carriers
& enterprises
▷ Venture-backed : Series A & B rounds
▷ Founded in 2007
▷ ~50 employees
▷ Headquarters in Irvine, California.
▷ Operations in USA, Canada & UK.
6
The Problem
© YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY.
58.5 billion unwanted, unsafe calls in 2019
This is bad news for making calls, too!
7
© YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY.
www.youmail.com © 2020 YouMail, Inc
Let’s Listen To A Few
8
Hello, this is just a test call. Time
to stay safe and stay home.
The Corona Virus Response Act has
made coronavirus testing more
accessible immediately. If you want to
receive a free testing kit delivered
overnight to your home,press 1..
We've been trying to reach you
concerning your car's extended
warranty. You should have received
something in the mail about your car's
extended warranty ..
This message from the Social Security
Administration is regarding an
enforcement action filed by the Department
of Treasury on your social security
number..
Stay Safe Stay Home – election interference?
COVID “Free Testing” – pandemic-related opportunities Car Warranty – the most infamous (180M monthly calls)
SSA Imposter – never real!! (30M monthly calls peak)
© YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY.
9
https://www.ftc.gov/reports/consumer-sentinel-network-data-book-2020
How bad are illegal calls?
2
1
3
10
Government
Actions
Government Actions
• TRACED Act – Dec 2019
• Adds penalties for violations
• Requires STIR/SHAKEN for anti-spoofing
• FCC 17-59 Public Notice Report on Robocalling
• Allows blocking for “reasonable cause”
• FCC 2042 TRACED Act Mandate
• Requires STIR/SHAKEN implementation by June 30, 2021
• Small & TDM carriers can secure an extension,
but …
11
Government Actions
Robocall Mitigation Program
Requirements for Providers Granted
Extension
All voice service providers that rely on an
extension and do not completely implement
STIR/SHAKEN by June 30, 2021, must
implement and document a robocall
mitigation program designed to reduce
unlawful robocalls originating on their
networks. The FCC requires all programs to
include:
(1) Detailed practices that can reasonably be
expected to significantly reduce the
origination of illegal robocalls;
(2) Compliance with the described practices;
and
(3) Participation in industry traceback efforts.
• STIR/SHAKEN
extensions are
available, but…
• Robocall mitigation and
Traceback is required
12
Source: https://www.jdsupra.com/legalnews/fcc-requires-all-voice-providers-to-91437/
13
YouMail
Robocall Detection
© YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY.
www.youmail.com © 2020 YouMail, Inc
14
YouMail? We Know All The Bad Calls
YouMail shows the estimated national volume of [as] 47,839,232,200 in 2018. 28. YouMail further
reports the number of calls per month, day, hour, second and per person to illustrate how pervasive
robocalls are [..] YouMail identified 5.1 billion calls placed for the month, 169.6 million calls per day,
7.1 million calls per hour, 2,000 calls per second and an average of 15.7 calls per person. 29
© YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. 15
3M+ 2.5M+ 3.2M+ 150K+
200K+ 100K+
100+ more
carriers w/
direct users
Call Platform as a Service
Live consumer calls to carriers. Real consumer devices.
How? YouMail Answers For America
SP/Carrier
Integrations
Billions of annual calls to over 10 million direct YouMailers
1M+
America’s top rated
call answering & protection apps
~1 trillion annual call
attempts analyzed
indirectly
© YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. 16
YouMail Monitors Bulk Branded Calls
© YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY.
17
… And Brand Call Anomalies
When a consumer brand
spikes in calls
with a volume of previously
unseen content…
Is the new content legitimate?
.. or an illegal imposter?
We hope you enjoyed your recent stay
with [REDACTED]. Based on your recent
business with [REDACTED], we are
pleased to offer you an all expenses paid
week long complimentary vacation at one
of our five start resorts…
The YouMail Investigations team works in
partnership with top brands and enforcement
to monitor and mitigate campaigns.
CALL INVESTIGATION
© YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY.
18
Content-based capture of bad actors
as they start their daily/hourly behavior
and on the first calls they are making
( .. independent of volumes, durations, DNC/DNO )
YouMail find bad actors by what’s said
This message from the Social Security Administration
is regarding an enforcement action filed by the
Department of Treasury on your social security number.
This will be recorded second avoidance of appearance
before a magistrate judge ordered jury for a criminal
offense…
© YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY.
19
Known
Fraud
Call
Sample
Call
#1
Sample
Call
#2
Cold : the calls match!
Heat : these are NOT the same call!
Fingerprinting
algorithms perform
private comparisons
Machine learning respects privacy
A
B
C
© YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY.
20
Sensor Network
Consumer mobile numbers
answered by YouMail
Call Content + AI: the best mitigation
AI
AI This message from the Social Security Administration
is regarding an enforcement action filed by the
Department of Treasury on your social security number.
This will be recorded second avoidance of appearance
before a magistrate judge ordered jury for a criminal
offense…
Call Fingerprinting identifies bad calls typically within 1-5 minutes
AI
YouMail
Call
Platform
Zero-Hour Illegal Call Data
Enables Enforcement + Mitigation
Embeddable In Network
21
Robocall Mitigation
with
ProSBC and YouMail
Mitigation at OSP?
Why is Robocall mitigation
required at the Originating
Service Provider?
1. Source of calling party is
likely known
a. Wireline customer/Subscriber
b. Trunking customer
c. International gateway
2. Traceback is easier
3. Enforcement
22
OSP Use Case:
• ProSBC inserted into call route
• As calls arrive, reputation is
checked
• Based on reputation score:
• 503 – SVC Unavailable
(Route advance)
• 603 – Decline
(Drop the call)
Originating Service Provider - SIP
23
Carrier
Reputation
Analytics
Soft Switch
Originating Service Provider
INVITE
503
603
Subscribers
Call Flow – Low Risk of Robocaller
24
Subscriber Softswitch ProSBC YouMail Carrier
INVITE
INVITE
API
Good Score
503 Unavailable
(Route Advance)
INVITE
Call Flow – HIGH Risk of Robocaller
25
Subscriber Softswitch ProSBC YouMail Carrier
INVITE
INVITE
API
Bad Score
603 Decline
(Drop the Call)
OSP Use Case:
• Tmedia Gateway inserted into
call route
• As calls arrive, reputation is
checked
• Based on reputation score:
• REL 34 No Circuits Available
(Good call - Route advance)
• REL 23 Call Rejected
(Bad call - Drop the call)
• ISDN is an alternative
Originating Service Provider - TDM
26
Carrier
Reputation
Analytics
TDM Switch
ISUP IAM
REL-34
REL-23
Subscribers
Originating Service Provider
CPaaS and UCaaS Providers
27
SIP
Carrier
CPaaS or UCaaS Provider
Protecting XaaS platforms
• SBC in the cloud, integrated
with reputation analytics
• As calls arrive, reputation is
checked
• Based on reputation score:
• Calls are completed
• Dropped
• Redirected to Voicemail
Reputation
Analytics
UCaaS Subscribers
Enterprise Premises
28
SIP
Carrier
Reputation
Analytics
IP-PBX
Enterprise
Enterprise Customers
• SBC on premises, integrated
with reputation analytics
• As calls arrive, reputation is
checked
• Based on reputation score:
• Calls are completed
• Dropped
• Redirected to Voicemail
29
Learn More
Further Reading
30
Web Site
• Product information/Pricing
• Case studies
• www.prosbc.com
TB wiki
• Product Documentation
• Installation Instructions
• docs.telcobridges.com
TB Forums
• Community support
• Use case descriptions
• forums.freesbc.com
YouTube
• Instructional videos
• Recorded training/events
• www.youtube.com/telcobridges
Implementation Notes
On Tbwiki at:
https://docs.telcobridges.com/tb
wiki/ProSBC:Youmail
31
Video Library on YouTube
• ProSBC Training Modules
• Recorded webinars
• How-to Tutorials
• Customer interviews
• Frequently Asked Questions
• Recorded podcasts
• And more…
32
youtube.com/telcobridges
Enabling the Migration to
Cloud Communications
33
www.telcobridges.com
www.prosbc.com
sales@telcobridges.com
Youtube.com/telcobridges
Q/A
YouMail.com
View the Full-Length Video at:
www2.telcobridges.com/videolibrary
34

More Related Content

What's hot

Understanding Session Border Controllers
Understanding Session Border ControllersUnderstanding Session Border Controllers
Understanding Session Border Controllers
stefansayer
 
Migrating to sip trunking with audio codes
Migrating to sip trunking with audio codesMigrating to sip trunking with audio codes
Migrating to sip trunking with audio codes
ScanSource, Inc.
 
StarTelecom Product Catalogue
StarTelecom Product CatalogueStarTelecom Product Catalogue
StarTelecom Product Catalogue
Brad Swift
 
Offre revendeurs UC
Offre  revendeurs   UCOffre  revendeurs   UC
Offre revendeurs UC
Rachid ZINE
 

What's hot (20)

Understanding Session Border Controllers
Understanding Session Border ControllersUnderstanding Session Border Controllers
Understanding Session Border Controllers
 
IP PBX
IP PBXIP PBX
IP PBX
 
LeadDesk Software Platform & Ecosystem
LeadDesk Software Platform & EcosystemLeadDesk Software Platform & Ecosystem
LeadDesk Software Platform & Ecosystem
 
Advantages of Cloud PBX Over Onsite PBX
Advantages of Cloud PBX Over Onsite PBX Advantages of Cloud PBX Over Onsite PBX
Advantages of Cloud PBX Over Onsite PBX
 
Complete VoIP Software Solution to fulfill Your VoIP Business needs
Complete VoIP Software Solution to fulfill Your VoIP Business needsComplete VoIP Software Solution to fulfill Your VoIP Business needs
Complete VoIP Software Solution to fulfill Your VoIP Business needs
 
PLNOG 4: Ido Miran - Service Provider Class 5 VoIP - An Integrated Approach
PLNOG 4: Ido Miran - Service Provider Class 5 VoIP - An Integrated ApproachPLNOG 4: Ido Miran - Service Provider Class 5 VoIP - An Integrated Approach
PLNOG 4: Ido Miran - Service Provider Class 5 VoIP - An Integrated Approach
 
Migrating to sip trunking with audio codes
Migrating to sip trunking with audio codesMigrating to sip trunking with audio codes
Migrating to sip trunking with audio codes
 
net2phone Business VoIP Solutions
net2phone Business VoIP Solutionsnet2phone Business VoIP Solutions
net2phone Business VoIP Solutions
 
Cloud pbx with office 365
Cloud pbx with office 365Cloud pbx with office 365
Cloud pbx with office 365
 
Sip trunking - future of tomorrow communications
Sip trunking  -  future of tomorrow communicationsSip trunking  -  future of tomorrow communications
Sip trunking - future of tomorrow communications
 
AudioCodes Session Border Controller Update
AudioCodes Session Border Controller UpdateAudioCodes Session Border Controller Update
AudioCodes Session Border Controller Update
 
How IBM and Dialogic Are Making Conferencing Smarter with AI
How IBM and Dialogic Are Making Conferencing Smarter with AIHow IBM and Dialogic Are Making Conferencing Smarter with AI
How IBM and Dialogic Are Making Conferencing Smarter with AI
 
Six ways to get more from SIP trunks
Six ways to get more from SIP trunksSix ways to get more from SIP trunks
Six ways to get more from SIP trunks
 
Integrated Media Gateway and the Transition to IP
Integrated Media Gateway and the Transition to IPIntegrated Media Gateway and the Transition to IP
Integrated Media Gateway and the Transition to IP
 
StarTelecom Product Catalogue
StarTelecom Product CatalogueStarTelecom Product Catalogue
StarTelecom Product Catalogue
 
Business VoIP data sheet
Business VoIP data sheetBusiness VoIP data sheet
Business VoIP data sheet
 
Use cases in radisys speech recognition in call voice services presentation
Use cases in radisys speech recognition in call voice services presentationUse cases in radisys speech recognition in call voice services presentation
Use cases in radisys speech recognition in call voice services presentation
 
Offre revendeurs UC
Offre  revendeurs   UCOffre  revendeurs   UC
Offre revendeurs UC
 
Benefits of switching to a cloud based VoIP phone system.
Benefits of switching to a cloud based VoIP phone system.Benefits of switching to a cloud based VoIP phone system.
Benefits of switching to a cloud based VoIP phone system.
 
Pbx presentation ingate_itexpoeast2014
Pbx presentation ingate_itexpoeast2014Pbx presentation ingate_itexpoeast2014
Pbx presentation ingate_itexpoeast2014
 

Similar to Robocall Mitigation with YouMail and ProSBC

Security and governance
Security and governanceSecurity and governance
Security and governance
DataWorks Summit
 

Similar to Robocall Mitigation with YouMail and ProSBC (20)

Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom Fraud
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQ
 
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQ
 
Future of Programmable Telecoms at Restconn 2017
Future of Programmable Telecoms at Restconn 2017Future of Programmable Telecoms at Restconn 2017
Future of Programmable Telecoms at Restconn 2017
 
Call Termination: Seeking Solutions
Call Termination: Seeking SolutionsCall Termination: Seeking Solutions
Call Termination: Seeking Solutions
 
Delpa Wireless - Broadband Reimagined
Delpa Wireless - Broadband ReimaginedDelpa Wireless - Broadband Reimagined
Delpa Wireless - Broadband Reimagined
 
Implementing AI powered NBO programs exacaster vivacom
Implementing AI powered NBO programs exacaster vivacomImplementing AI powered NBO programs exacaster vivacom
Implementing AI powered NBO programs exacaster vivacom
 
BeyondVoice with SIPconnect Training
BeyondVoice with SIPconnect TrainingBeyondVoice with SIPconnect Training
BeyondVoice with SIPconnect Training
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKEN
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKEN
 
SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023
SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023
SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023
 
IIT RTC 2016 Telecoms is now Democratized
IIT RTC 2016 Telecoms is now DemocratizedIIT RTC 2016 Telecoms is now Democratized
IIT RTC 2016 Telecoms is now Democratized
 
TalkTalk Data Breach Case Study
TalkTalk Data Breach Case StudyTalkTalk Data Breach Case Study
TalkTalk Data Breach Case Study
 
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
 
The enterprise of subscription tv piracy
The enterprise of subscription tv piracyThe enterprise of subscription tv piracy
The enterprise of subscription tv piracy
 
Security and governance
Security and governanceSecurity and governance
Security and governance
 

More from Alan Percy

More from Alan Percy (20)

Network Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptxNetwork Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptx
 
The Role of SBC in Fraud Protection
The Role of SBC in Fraud ProtectionThe Role of SBC in Fraud Protection
The Role of SBC in Fraud Protection
 
Tmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ SessionTmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ Session
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 Tips
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
 
What is SS7? An Introduction to Signaling System 7
What is SS7?  An Introduction to Signaling System 7What is SS7?  An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked Questions
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBC
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media Gateways
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A Tutorial
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
 
ProSBC introduction
ProSBC introductionProSBC introduction
ProSBC introduction
 
Extending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANExtending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRAN
 
The Intelligent Edge - Managing Network Traffic at the Edge
The Intelligent Edge - Managing Network Traffic at the EdgeThe Intelligent Edge - Managing Network Traffic at the Edge
The Intelligent Edge - Managing Network Traffic at the Edge
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Robocall Mitigation with YouMail and ProSBC

  • 1.
  • 2. 2 Introductions Alan D Percy Chief Marketing Officer alan.percy@telcobridges.com @AlanDPercy Mike Rudolph CTO, YouMail mrudolph@youmail.com
  • 3. 3 Agenda • Introductions • The Problem • Government Actions • YouMail Robocall Detection • RoboCall Mitigation with ProSBC and YouMail • Where to Learn More • Your Questions A D N E G A
  • 4. TelcoBridges Inc. • Manufacturer of VoIP gateways, signaling gateways, and SBC software for carriers and enterprises • Employee Owned • Founded in 2002 • Employees: ~40 • Headquarters: Montreal, Canada • Hardware & software R&D as well as production of its products in Montreal • Sales/Support offices: Montreal, Turkey, Hong Kong, Italy • 24/7 technical support 4 TelcoBridges HQ
  • 5. © YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. 5 ▷ Originally known for consumer call answering services ▷ Recent expansion into safe communications for carriers & enterprises ▷ Venture-backed : Series A & B rounds ▷ Founded in 2007 ▷ ~50 employees ▷ Headquarters in Irvine, California. ▷ Operations in USA, Canada & UK.
  • 7. © YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. 58.5 billion unwanted, unsafe calls in 2019 This is bad news for making calls, too! 7
  • 8. © YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. www.youmail.com © 2020 YouMail, Inc Let’s Listen To A Few 8 Hello, this is just a test call. Time to stay safe and stay home. The Corona Virus Response Act has made coronavirus testing more accessible immediately. If you want to receive a free testing kit delivered overnight to your home,press 1.. We've been trying to reach you concerning your car's extended warranty. You should have received something in the mail about your car's extended warranty .. This message from the Social Security Administration is regarding an enforcement action filed by the Department of Treasury on your social security number.. Stay Safe Stay Home – election interference? COVID “Free Testing” – pandemic-related opportunities Car Warranty – the most infamous (180M monthly calls) SSA Imposter – never real!! (30M monthly calls peak)
  • 9. © YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. 9 https://www.ftc.gov/reports/consumer-sentinel-network-data-book-2020 How bad are illegal calls? 2 1 3
  • 11. Government Actions • TRACED Act – Dec 2019 • Adds penalties for violations • Requires STIR/SHAKEN for anti-spoofing • FCC 17-59 Public Notice Report on Robocalling • Allows blocking for “reasonable cause” • FCC 2042 TRACED Act Mandate • Requires STIR/SHAKEN implementation by June 30, 2021 • Small & TDM carriers can secure an extension, but … 11
  • 12. Government Actions Robocall Mitigation Program Requirements for Providers Granted Extension All voice service providers that rely on an extension and do not completely implement STIR/SHAKEN by June 30, 2021, must implement and document a robocall mitigation program designed to reduce unlawful robocalls originating on their networks. The FCC requires all programs to include: (1) Detailed practices that can reasonably be expected to significantly reduce the origination of illegal robocalls; (2) Compliance with the described practices; and (3) Participation in industry traceback efforts. • STIR/SHAKEN extensions are available, but… • Robocall mitigation and Traceback is required 12 Source: https://www.jdsupra.com/legalnews/fcc-requires-all-voice-providers-to-91437/
  • 14. © YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. www.youmail.com © 2020 YouMail, Inc 14 YouMail? We Know All The Bad Calls YouMail shows the estimated national volume of [as] 47,839,232,200 in 2018. 28. YouMail further reports the number of calls per month, day, hour, second and per person to illustrate how pervasive robocalls are [..] YouMail identified 5.1 billion calls placed for the month, 169.6 million calls per day, 7.1 million calls per hour, 2,000 calls per second and an average of 15.7 calls per person. 29
  • 15. © YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. 15 3M+ 2.5M+ 3.2M+ 150K+ 200K+ 100K+ 100+ more carriers w/ direct users Call Platform as a Service Live consumer calls to carriers. Real consumer devices. How? YouMail Answers For America SP/Carrier Integrations Billions of annual calls to over 10 million direct YouMailers 1M+ America’s top rated call answering & protection apps ~1 trillion annual call attempts analyzed indirectly
  • 16. © YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. 16 YouMail Monitors Bulk Branded Calls
  • 17. © YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. 17 … And Brand Call Anomalies When a consumer brand spikes in calls with a volume of previously unseen content… Is the new content legitimate? .. or an illegal imposter? We hope you enjoyed your recent stay with [REDACTED]. Based on your recent business with [REDACTED], we are pleased to offer you an all expenses paid week long complimentary vacation at one of our five start resorts… The YouMail Investigations team works in partnership with top brands and enforcement to monitor and mitigate campaigns. CALL INVESTIGATION
  • 18. © YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. 18 Content-based capture of bad actors as they start their daily/hourly behavior and on the first calls they are making ( .. independent of volumes, durations, DNC/DNO ) YouMail find bad actors by what’s said This message from the Social Security Administration is regarding an enforcement action filed by the Department of Treasury on your social security number. This will be recorded second avoidance of appearance before a magistrate judge ordered jury for a criminal offense…
  • 19. © YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. 19 Known Fraud Call Sample Call #1 Sample Call #2 Cold : the calls match! Heat : these are NOT the same call! Fingerprinting algorithms perform private comparisons Machine learning respects privacy A B C
  • 20. © YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. 20 Sensor Network Consumer mobile numbers answered by YouMail Call Content + AI: the best mitigation AI AI This message from the Social Security Administration is regarding an enforcement action filed by the Department of Treasury on your social security number. This will be recorded second avoidance of appearance before a magistrate judge ordered jury for a criminal offense… Call Fingerprinting identifies bad calls typically within 1-5 minutes AI YouMail Call Platform Zero-Hour Illegal Call Data Enables Enforcement + Mitigation Embeddable In Network
  • 22. Mitigation at OSP? Why is Robocall mitigation required at the Originating Service Provider? 1. Source of calling party is likely known a. Wireline customer/Subscriber b. Trunking customer c. International gateway 2. Traceback is easier 3. Enforcement 22
  • 23. OSP Use Case: • ProSBC inserted into call route • As calls arrive, reputation is checked • Based on reputation score: • 503 – SVC Unavailable (Route advance) • 603 – Decline (Drop the call) Originating Service Provider - SIP 23 Carrier Reputation Analytics Soft Switch Originating Service Provider INVITE 503 603 Subscribers
  • 24. Call Flow – Low Risk of Robocaller 24 Subscriber Softswitch ProSBC YouMail Carrier INVITE INVITE API Good Score 503 Unavailable (Route Advance) INVITE
  • 25. Call Flow – HIGH Risk of Robocaller 25 Subscriber Softswitch ProSBC YouMail Carrier INVITE INVITE API Bad Score 603 Decline (Drop the Call)
  • 26. OSP Use Case: • Tmedia Gateway inserted into call route • As calls arrive, reputation is checked • Based on reputation score: • REL 34 No Circuits Available (Good call - Route advance) • REL 23 Call Rejected (Bad call - Drop the call) • ISDN is an alternative Originating Service Provider - TDM 26 Carrier Reputation Analytics TDM Switch ISUP IAM REL-34 REL-23 Subscribers Originating Service Provider
  • 27. CPaaS and UCaaS Providers 27 SIP Carrier CPaaS or UCaaS Provider Protecting XaaS platforms • SBC in the cloud, integrated with reputation analytics • As calls arrive, reputation is checked • Based on reputation score: • Calls are completed • Dropped • Redirected to Voicemail Reputation Analytics UCaaS Subscribers
  • 28. Enterprise Premises 28 SIP Carrier Reputation Analytics IP-PBX Enterprise Enterprise Customers • SBC on premises, integrated with reputation analytics • As calls arrive, reputation is checked • Based on reputation score: • Calls are completed • Dropped • Redirected to Voicemail
  • 30. Further Reading 30 Web Site • Product information/Pricing • Case studies • www.prosbc.com TB wiki • Product Documentation • Installation Instructions • docs.telcobridges.com TB Forums • Community support • Use case descriptions • forums.freesbc.com YouTube • Instructional videos • Recorded training/events • www.youtube.com/telcobridges
  • 31. Implementation Notes On Tbwiki at: https://docs.telcobridges.com/tb wiki/ProSBC:Youmail 31
  • 32. Video Library on YouTube • ProSBC Training Modules • Recorded webinars • How-to Tutorials • Customer interviews • Frequently Asked Questions • Recorded podcasts • And more… 32 youtube.com/telcobridges
  • 33. Enabling the Migration to Cloud Communications 33 www.telcobridges.com www.prosbc.com sales@telcobridges.com Youtube.com/telcobridges Q/A YouMail.com
  • 34. View the Full-Length Video at: www2.telcobridges.com/videolibrary 34

Editor's Notes

  1. Some introductions to get started: I’m Alan Percy, Senior Director of Product Marketing for TelcoBridges and today’s event moderator. Joining us again is Luc Morissette, Director of Customer Support and one of the founders of TelcoBridges. Luc, thanks for being a part of today’s event. Before we begin, a little housekeeping: As a live event participant, you’ll have the opportunity to interact with today’s speakers and hope you do pose your questions and comments on today’s topic using the Q/A panel. To pose a question or comment, open the Q/A panel by clicking on the box in the upper left of your screen. We’ll cover your questions toward the end of the session. We’ve found that some attendees may need to adjust the webinar View Options to see the full slide on your screen. If you are not seeing a full slide, move your mouse to the top of the webinar window and a View Option selection will appear – choose an option that best fits your screen. Also, today’s event is being recorded and all those that have registered will received a link to the recording for on-demand playback. We hope you share the link with your co-workers and others that would find the discussion valuable. And we’re glad to have you, our attendees, with us today and encourage you to use the opportunity to interact with our speakers by posing your questions and comments.
  2. https://www.fcc.gov/document/report-robocalls
  3. https://www.fcc.gov/document/report-robocalls