SlideShare a Scribd company logo
1 of 34
Download to read offline
2
Introductions
Alan D Percy
Chief Marketing Officer
alan.percy@telcobridges.com
@AlanDPercy
Mike Rudolph
CTO, YouMail
mrudolph@youmail.com
3
Agenda
• Introductions
• The Problem
• Government Actions
• YouMail Robocall Detection
• RoboCall Mitigation with ProSBC and YouMail
• Where to Learn More
• Your Questions
A
D
N
E
G
A
TelcoBridges Inc.
• Manufacturer of VoIP gateways, signaling
gateways, and SBC software for carriers and
enterprises
• Employee Owned
• Founded in 2002
• Employees: ~40
• Headquarters: Montreal, Canada
• Hardware & software R&D as well as
production of its products in Montreal
• Sales/Support offices:
Montreal, Turkey, Hong Kong, Italy
• 24/7 technical support
4
TelcoBridges HQ
© YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY.
5
▷ Originally known for consumer call answering services
▷ Recent expansion into safe communications for carriers
& enterprises
▷ Venture-backed : Series A & B rounds
▷ Founded in 2007
▷ ~50 employees
▷ Headquarters in Irvine, California.
▷ Operations in USA, Canada & UK.
6
The Problem
© YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY.
58.5 billion unwanted, unsafe calls in 2019
This is bad news for making calls, too!
7
© YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY.
www.youmail.com © 2020 YouMail, Inc
Let’s Listen To A Few
8
Hello, this is just a test call. Time
to stay safe and stay home.
The Corona Virus Response Act has
made coronavirus testing more
accessible immediately. If you want to
receive a free testing kit delivered
overnight to your home,press 1..
We've been trying to reach you
concerning your car's extended
warranty. You should have received
something in the mail about your car's
extended warranty ..
This message from the Social Security
Administration is regarding an
enforcement action filed by the Department
of Treasury on your social security
number..
Stay Safe Stay Home – election interference?
COVID “Free Testing” – pandemic-related opportunities Car Warranty – the most infamous (180M monthly calls)
SSA Imposter – never real!! (30M monthly calls peak)
© YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY.
9
https://www.ftc.gov/reports/consumer-sentinel-network-data-book-2020
How bad are illegal calls?
2
1
3
10
Government
Actions
Government Actions
• TRACED Act – Dec 2019
• Adds penalties for violations
• Requires STIR/SHAKEN for anti-spoofing
• FCC 17-59 Public Notice Report on Robocalling
• Allows blocking for “reasonable cause”
• FCC 2042 TRACED Act Mandate
• Requires STIR/SHAKEN implementation by June 30, 2021
• Small & TDM carriers can secure an extension,
but …
11
Government Actions
Robocall Mitigation Program
Requirements for Providers Granted
Extension
All voice service providers that rely on an
extension and do not completely implement
STIR/SHAKEN by June 30, 2021, must
implement and document a robocall
mitigation program designed to reduce
unlawful robocalls originating on their
networks. The FCC requires all programs to
include:
(1) Detailed practices that can reasonably be
expected to significantly reduce the
origination of illegal robocalls;
(2) Compliance with the described practices;
and
(3) Participation in industry traceback efforts.
• STIR/SHAKEN
extensions are
available, but…
• Robocall mitigation and
Traceback is required
12
Source: https://www.jdsupra.com/legalnews/fcc-requires-all-voice-providers-to-91437/
13
YouMail
Robocall Detection
© YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY.
www.youmail.com © 2020 YouMail, Inc
14
YouMail? We Know All The Bad Calls
YouMail shows the estimated national volume of [as] 47,839,232,200 in 2018. 28. YouMail further
reports the number of calls per month, day, hour, second and per person to illustrate how pervasive
robocalls are [..] YouMail identified 5.1 billion calls placed for the month, 169.6 million calls per day,
7.1 million calls per hour, 2,000 calls per second and an average of 15.7 calls per person. 29
© YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. 15
3M+ 2.5M+ 3.2M+ 150K+
200K+ 100K+
100+ more
carriers w/
direct users
Call Platform as a Service
Live consumer calls to carriers. Real consumer devices.
How? YouMail Answers For America
SP/Carrier
Integrations
Billions of annual calls to over 10 million direct YouMailers
1M+
America’s top rated
call answering & protection apps
~1 trillion annual call
attempts analyzed
indirectly
© YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. 16
YouMail Monitors Bulk Branded Calls
© YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY.
17
… And Brand Call Anomalies
When a consumer brand
spikes in calls
with a volume of previously
unseen content…
Is the new content legitimate?
.. or an illegal imposter?
We hope you enjoyed your recent stay
with [REDACTED]. Based on your recent
business with [REDACTED], we are
pleased to offer you an all expenses paid
week long complimentary vacation at one
of our five start resorts…
The YouMail Investigations team works in
partnership with top brands and enforcement
to monitor and mitigate campaigns.
CALL INVESTIGATION
© YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY.
18
Content-based capture of bad actors
as they start their daily/hourly behavior
and on the first calls they are making
( .. independent of volumes, durations, DNC/DNO )
YouMail find bad actors by what’s said
This message from the Social Security Administration
is regarding an enforcement action filed by the
Department of Treasury on your social security number.
This will be recorded second avoidance of appearance
before a magistrate judge ordered jury for a criminal
offense…
© YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY.
19
Known
Fraud
Call
Sample
Call
#1
Sample
Call
#2
Cold : the calls match!
Heat : these are NOT the same call!
Fingerprinting
algorithms perform
private comparisons
Machine learning respects privacy
A
B
C
© YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY.
20
Sensor Network
Consumer mobile numbers
answered by YouMail
Call Content + AI: the best mitigation
AI
AI This message from the Social Security Administration
is regarding an enforcement action filed by the
Department of Treasury on your social security number.
This will be recorded second avoidance of appearance
before a magistrate judge ordered jury for a criminal
offense…
Call Fingerprinting identifies bad calls typically within 1-5 minutes
AI
YouMail
Call
Platform
Zero-Hour Illegal Call Data
Enables Enforcement + Mitigation
Embeddable In Network
21
Robocall Mitigation
with
ProSBC and YouMail
Mitigation at OSP?
Why is Robocall mitigation
required at the Originating
Service Provider?
1. Source of calling party is
likely known
a. Wireline customer/Subscriber
b. Trunking customer
c. International gateway
2. Traceback is easier
3. Enforcement
22
OSP Use Case:
• ProSBC inserted into call route
• As calls arrive, reputation is
checked
• Based on reputation score:
• 503 – SVC Unavailable
(Route advance)
• 603 – Decline
(Drop the call)
Originating Service Provider - SIP
23
Carrier
Reputation
Analytics
Soft Switch
Originating Service Provider
INVITE
503
603
Subscribers
Call Flow – Low Risk of Robocaller
24
Subscriber Softswitch ProSBC YouMail Carrier
INVITE
INVITE
API
Good Score
503 Unavailable
(Route Advance)
INVITE
Call Flow – HIGH Risk of Robocaller
25
Subscriber Softswitch ProSBC YouMail Carrier
INVITE
INVITE
API
Bad Score
603 Decline
(Drop the Call)
OSP Use Case:
• Tmedia Gateway inserted into
call route
• As calls arrive, reputation is
checked
• Based on reputation score:
• REL 34 No Circuits Available
(Good call - Route advance)
• REL 23 Call Rejected
(Bad call - Drop the call)
• ISDN is an alternative
Originating Service Provider - TDM
26
Carrier
Reputation
Analytics
TDM Switch
ISUP IAM
REL-34
REL-23
Subscribers
Originating Service Provider
CPaaS and UCaaS Providers
27
SIP
Carrier
CPaaS or UCaaS Provider
Protecting XaaS platforms
• SBC in the cloud, integrated
with reputation analytics
• As calls arrive, reputation is
checked
• Based on reputation score:
• Calls are completed
• Dropped
• Redirected to Voicemail
Reputation
Analytics
UCaaS Subscribers
Enterprise Premises
28
SIP
Carrier
Reputation
Analytics
IP-PBX
Enterprise
Enterprise Customers
• SBC on premises, integrated
with reputation analytics
• As calls arrive, reputation is
checked
• Based on reputation score:
• Calls are completed
• Dropped
• Redirected to Voicemail
29
Learn More
Further Reading
30
Web Site
• Product information/Pricing
• Case studies
• www.prosbc.com
TB wiki
• Product Documentation
• Installation Instructions
• docs.telcobridges.com
TB Forums
• Community support
• Use case descriptions
• forums.freesbc.com
YouTube
• Instructional videos
• Recorded training/events
• www.youtube.com/telcobridges
Implementation Notes
On Tbwiki at:
https://docs.telcobridges.com/tb
wiki/ProSBC:Youmail
31
Video Library on YouTube
• ProSBC Training Modules
• Recorded webinars
• How-to Tutorials
• Customer interviews
• Frequently Asked Questions
• Recorded podcasts
• And more…
32
youtube.com/telcobridges
Enabling the Migration to
Cloud Communications
33
www.telcobridges.com
www.prosbc.com
sales@telcobridges.com
Youtube.com/telcobridges
Q/A
YouMail.com
View the Full-Length Video at:
www2.telcobridges.com/videolibrary
34

More Related Content

Similar to Robocall Mitigation Strategies with ProSBC and YouMail

Call Termination: Seeking Solutions
Call Termination: Seeking SolutionsCall Termination: Seeking Solutions
Call Termination: Seeking SolutionsOnvoy
 
Delpa Wireless - Broadband Reimagined
Delpa Wireless - Broadband ReimaginedDelpa Wireless - Broadband Reimagined
Delpa Wireless - Broadband ReimaginedPiro Arroyo, PMP
 
Implementing AI powered NBO programs exacaster vivacom
Implementing AI powered NBO programs exacaster vivacomImplementing AI powered NBO programs exacaster vivacom
Implementing AI powered NBO programs exacaster vivacomJolita Bernotiene
 
BeyondVoice with SIPconnect Training
BeyondVoice with SIPconnect TrainingBeyondVoice with SIPconnect Training
BeyondVoice with SIPconnect TrainingGreg Rothman
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENTelcoBridges Inc.
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENAlan Percy
 
SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023
SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023
SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023lindsey601888
 
IIT RTC 2016 Telecoms is now Democratized
IIT RTC 2016 Telecoms is now DemocratizedIIT RTC 2016 Telecoms is now Democratized
IIT RTC 2016 Telecoms is now DemocratizedAlan Quayle
 
TalkTalk Data Breach Case Study
TalkTalk Data Breach Case StudyTalkTalk Data Breach Case Study
TalkTalk Data Breach Case StudyCharlie Pownall
 
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Carl Blume
 
The enterprise of subscription tv piracy
The enterprise of subscription tv piracyThe enterprise of subscription tv piracy
The enterprise of subscription tv piracySabastion Forward
 
Iron Mountain Training 3
Iron Mountain Training 3Iron Mountain Training 3
Iron Mountain Training 3Al Ewers
 
BONNEVILLE CONTRACTING AND TECHNOLOGY GROUP LLC
BONNEVILLE CONTRACTING AND TECHNOLOGY GROUP LLCBONNEVILLE CONTRACTING AND TECHNOLOGY GROUP LLC
BONNEVILLE CONTRACTING AND TECHNOLOGY GROUP LLCmigbcsepr
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed Great Bay Software
 
Macario John
Macario JohnMacario John
Macario JohnCarl Ford
 
Macario John
Macario JohnMacario John
Macario JohnCarl Ford
 
Business Continuity New
Business Continuity NewBusiness Continuity New
Business Continuity NewRoy Allen
 
Top 10 Inbound And Outbound Calling Compliance Issues
Top 10 Inbound And Outbound Calling Compliance IssuesTop 10 Inbound And Outbound Calling Compliance Issues
Top 10 Inbound And Outbound Calling Compliance IssuesRyan Thurman
 

Similar to Robocall Mitigation Strategies with ProSBC and YouMail (20)

Call Termination: Seeking Solutions
Call Termination: Seeking SolutionsCall Termination: Seeking Solutions
Call Termination: Seeking Solutions
 
Delpa Wireless - Broadband Reimagined
Delpa Wireless - Broadband ReimaginedDelpa Wireless - Broadband Reimagined
Delpa Wireless - Broadband Reimagined
 
Implementing AI powered NBO programs exacaster vivacom
Implementing AI powered NBO programs exacaster vivacomImplementing AI powered NBO programs exacaster vivacom
Implementing AI powered NBO programs exacaster vivacom
 
BeyondVoice with SIPconnect Training
BeyondVoice with SIPconnect TrainingBeyondVoice with SIPconnect Training
BeyondVoice with SIPconnect Training
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKEN
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKEN
 
SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023
SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023
SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023
 
IIT RTC 2016 Telecoms is now Democratized
IIT RTC 2016 Telecoms is now DemocratizedIIT RTC 2016 Telecoms is now Democratized
IIT RTC 2016 Telecoms is now Democratized
 
TalkTalk Data Breach Case Study
TalkTalk Data Breach Case StudyTalkTalk Data Breach Case Study
TalkTalk Data Breach Case Study
 
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
 
The enterprise of subscription tv piracy
The enterprise of subscription tv piracyThe enterprise of subscription tv piracy
The enterprise of subscription tv piracy
 
Security and governance
Security and governanceSecurity and governance
Security and governance
 
Iron Mountain Training 3
Iron Mountain Training 3Iron Mountain Training 3
Iron Mountain Training 3
 
BONNEVILLE CONTRACTING AND TECHNOLOGY GROUP LLC
BONNEVILLE CONTRACTING AND TECHNOLOGY GROUP LLCBONNEVILLE CONTRACTING AND TECHNOLOGY GROUP LLC
BONNEVILLE CONTRACTING AND TECHNOLOGY GROUP LLC
 
Lttc 6262013
Lttc 6262013Lttc 6262013
Lttc 6262013
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
Macario John
Macario JohnMacario John
Macario John
 
Macario John
Macario JohnMacario John
Macario John
 
Business Continuity New
Business Continuity NewBusiness Continuity New
Business Continuity New
 
Top 10 Inbound And Outbound Calling Compliance Issues
Top 10 Inbound And Outbound Calling Compliance IssuesTop 10 Inbound And Outbound Calling Compliance Issues
Top 10 Inbound And Outbound Calling Compliance Issues
 

More from TelcoBridges Inc.

Network Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best PracticesNetwork Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best PracticesTelcoBridges Inc.
 
The Role of SBCs in Fraud Protection
The Role of SBCs in Fraud ProtectionThe Role of SBCs in Fraud Protection
The Role of SBCs in Fraud ProtectionTelcoBridges Inc.
 
Tmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ SessionTmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ SessionTelcoBridges Inc.
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsTelcoBridges Inc.
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and SuccessesContact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and SuccessesTelcoBridges Inc.
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityTelcoBridges Inc.
 
What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7TelcoBridges Inc.
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsTelcoBridges Inc.
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToTelcoBridges Inc.
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media GatewaysTelcoBridges Inc.
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksTelcoBridges Inc.
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialTelcoBridges Inc.
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsTelcoBridges Inc.
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsTelcoBridges Inc.
 
Extending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANExtending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANTelcoBridges Inc.
 

More from TelcoBridges Inc. (20)

Network Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best PracticesNetwork Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best Practices
 
The Role of SBCs in Fraud Protection
The Role of SBCs in Fraud ProtectionThe Role of SBCs in Fraud Protection
The Role of SBCs in Fraud Protection
 
Tmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ SessionTmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ Session
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 Tips
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and SuccessesContact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
 
What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7
 
RESTful APIs and SBCs
RESTful APIs and SBCsRESTful APIs and SBCs
RESTful APIs and SBCs
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked Questions
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBC
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media Gateways
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A Tutorial
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
 
ProSBC Introduction
ProSBC IntroductionProSBC Introduction
ProSBC Introduction
 
Extending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANExtending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRAN
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Robocall Mitigation Strategies with ProSBC and YouMail

  • 1.
  • 2. 2 Introductions Alan D Percy Chief Marketing Officer alan.percy@telcobridges.com @AlanDPercy Mike Rudolph CTO, YouMail mrudolph@youmail.com
  • 3. 3 Agenda • Introductions • The Problem • Government Actions • YouMail Robocall Detection • RoboCall Mitigation with ProSBC and YouMail • Where to Learn More • Your Questions A D N E G A
  • 4. TelcoBridges Inc. • Manufacturer of VoIP gateways, signaling gateways, and SBC software for carriers and enterprises • Employee Owned • Founded in 2002 • Employees: ~40 • Headquarters: Montreal, Canada • Hardware & software R&D as well as production of its products in Montreal • Sales/Support offices: Montreal, Turkey, Hong Kong, Italy • 24/7 technical support 4 TelcoBridges HQ
  • 5. © YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. 5 ▷ Originally known for consumer call answering services ▷ Recent expansion into safe communications for carriers & enterprises ▷ Venture-backed : Series A & B rounds ▷ Founded in 2007 ▷ ~50 employees ▷ Headquarters in Irvine, California. ▷ Operations in USA, Canada & UK.
  • 7. © YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. 58.5 billion unwanted, unsafe calls in 2019 This is bad news for making calls, too! 7
  • 8. © YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. www.youmail.com © 2020 YouMail, Inc Let’s Listen To A Few 8 Hello, this is just a test call. Time to stay safe and stay home. The Corona Virus Response Act has made coronavirus testing more accessible immediately. If you want to receive a free testing kit delivered overnight to your home,press 1.. We've been trying to reach you concerning your car's extended warranty. You should have received something in the mail about your car's extended warranty .. This message from the Social Security Administration is regarding an enforcement action filed by the Department of Treasury on your social security number.. Stay Safe Stay Home – election interference? COVID “Free Testing” – pandemic-related opportunities Car Warranty – the most infamous (180M monthly calls) SSA Imposter – never real!! (30M monthly calls peak)
  • 9. © YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. 9 https://www.ftc.gov/reports/consumer-sentinel-network-data-book-2020 How bad are illegal calls? 2 1 3
  • 11. Government Actions • TRACED Act – Dec 2019 • Adds penalties for violations • Requires STIR/SHAKEN for anti-spoofing • FCC 17-59 Public Notice Report on Robocalling • Allows blocking for “reasonable cause” • FCC 2042 TRACED Act Mandate • Requires STIR/SHAKEN implementation by June 30, 2021 • Small & TDM carriers can secure an extension, but … 11
  • 12. Government Actions Robocall Mitigation Program Requirements for Providers Granted Extension All voice service providers that rely on an extension and do not completely implement STIR/SHAKEN by June 30, 2021, must implement and document a robocall mitigation program designed to reduce unlawful robocalls originating on their networks. The FCC requires all programs to include: (1) Detailed practices that can reasonably be expected to significantly reduce the origination of illegal robocalls; (2) Compliance with the described practices; and (3) Participation in industry traceback efforts. • STIR/SHAKEN extensions are available, but… • Robocall mitigation and Traceback is required 12 Source: https://www.jdsupra.com/legalnews/fcc-requires-all-voice-providers-to-91437/
  • 14. © YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. www.youmail.com © 2020 YouMail, Inc 14 YouMail? We Know All The Bad Calls YouMail shows the estimated national volume of [as] 47,839,232,200 in 2018. 28. YouMail further reports the number of calls per month, day, hour, second and per person to illustrate how pervasive robocalls are [..] YouMail identified 5.1 billion calls placed for the month, 169.6 million calls per day, 7.1 million calls per hour, 2,000 calls per second and an average of 15.7 calls per person. 29
  • 15. © YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. 15 3M+ 2.5M+ 3.2M+ 150K+ 200K+ 100K+ 100+ more carriers w/ direct users Call Platform as a Service Live consumer calls to carriers. Real consumer devices. How? YouMail Answers For America SP/Carrier Integrations Billions of annual calls to over 10 million direct YouMailers 1M+ America’s top rated call answering & protection apps ~1 trillion annual call attempts analyzed indirectly
  • 16. © YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. 16 YouMail Monitors Bulk Branded Calls
  • 17. © YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. 17 … And Brand Call Anomalies When a consumer brand spikes in calls with a volume of previously unseen content… Is the new content legitimate? .. or an illegal imposter? We hope you enjoyed your recent stay with [REDACTED]. Based on your recent business with [REDACTED], we are pleased to offer you an all expenses paid week long complimentary vacation at one of our five start resorts… The YouMail Investigations team works in partnership with top brands and enforcement to monitor and mitigate campaigns. CALL INVESTIGATION
  • 18. © YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. 18 Content-based capture of bad actors as they start their daily/hourly behavior and on the first calls they are making ( .. independent of volumes, durations, DNC/DNO ) YouMail find bad actors by what’s said This message from the Social Security Administration is regarding an enforcement action filed by the Department of Treasury on your social security number. This will be recorded second avoidance of appearance before a magistrate judge ordered jury for a criminal offense…
  • 19. © YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. 19 Known Fraud Call Sample Call #1 Sample Call #2 Cold : the calls match! Heat : these are NOT the same call! Fingerprinting algorithms perform private comparisons Machine learning respects privacy A B C
  • 20. © YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. 20 Sensor Network Consumer mobile numbers answered by YouMail Call Content + AI: the best mitigation AI AI This message from the Social Security Administration is regarding an enforcement action filed by the Department of Treasury on your social security number. This will be recorded second avoidance of appearance before a magistrate judge ordered jury for a criminal offense… Call Fingerprinting identifies bad calls typically within 1-5 minutes AI YouMail Call Platform Zero-Hour Illegal Call Data Enables Enforcement + Mitigation Embeddable In Network
  • 22. Mitigation at OSP? Why is Robocall mitigation required at the Originating Service Provider? 1. Source of calling party is likely known a. Wireline customer/Subscriber b. Trunking customer c. International gateway 2. Traceback is easier 3. Enforcement 22
  • 23. OSP Use Case: • ProSBC inserted into call route • As calls arrive, reputation is checked • Based on reputation score: • 503 – SVC Unavailable (Route advance) • 603 – Decline (Drop the call) Originating Service Provider - SIP 23 Carrier Reputation Analytics Soft Switch Originating Service Provider INVITE 503 603 Subscribers
  • 24. Call Flow – Low Risk of Robocaller 24 Subscriber Softswitch ProSBC YouMail Carrier INVITE INVITE API Good Score 503 Unavailable (Route Advance) INVITE
  • 25. Call Flow – HIGH Risk of Robocaller 25 Subscriber Softswitch ProSBC YouMail Carrier INVITE INVITE API Bad Score 603 Decline (Drop the Call)
  • 26. OSP Use Case: • Tmedia Gateway inserted into call route • As calls arrive, reputation is checked • Based on reputation score: • REL 34 No Circuits Available (Good call - Route advance) • REL 23 Call Rejected (Bad call - Drop the call) • ISDN is an alternative Originating Service Provider - TDM 26 Carrier Reputation Analytics TDM Switch ISUP IAM REL-34 REL-23 Subscribers Originating Service Provider
  • 27. CPaaS and UCaaS Providers 27 SIP Carrier CPaaS or UCaaS Provider Protecting XaaS platforms • SBC in the cloud, integrated with reputation analytics • As calls arrive, reputation is checked • Based on reputation score: • Calls are completed • Dropped • Redirected to Voicemail Reputation Analytics UCaaS Subscribers
  • 28. Enterprise Premises 28 SIP Carrier Reputation Analytics IP-PBX Enterprise Enterprise Customers • SBC on premises, integrated with reputation analytics • As calls arrive, reputation is checked • Based on reputation score: • Calls are completed • Dropped • Redirected to Voicemail
  • 30. Further Reading 30 Web Site • Product information/Pricing • Case studies • www.prosbc.com TB wiki • Product Documentation • Installation Instructions • docs.telcobridges.com TB Forums • Community support • Use case descriptions • forums.freesbc.com YouTube • Instructional videos • Recorded training/events • www.youtube.com/telcobridges
  • 31. Implementation Notes On Tbwiki at: https://docs.telcobridges.com/tb wiki/ProSBC:Youmail 31
  • 32. Video Library on YouTube • ProSBC Training Modules • Recorded webinars • How-to Tutorials • Customer interviews • Frequently Asked Questions • Recorded podcasts • And more… 32 youtube.com/telcobridges
  • 33. Enabling the Migration to Cloud Communications 33 www.telcobridges.com www.prosbc.com sales@telcobridges.com Youtube.com/telcobridges Q/A YouMail.com
  • 34. View the Full-Length Video at: www2.telcobridges.com/videolibrary 34