SlideShare a Scribd company logo
2
Introductions
Alan D Percy
Chief Marketing Officer
alan.percy@telcobridges.com
@AlanDPercy
Gerry Christensen
VP of BD, YouMail
gchristensen@youmail.com
@GTChristensen
3
Agenda
• Introductions
• Background on STIR/SHAKEN
• Where do we Stand?
• Beyond Robocall Mitigation
• Where to Learn More
• Your Questions
A
D
N
E
G
A
TelcoBridges Inc.
• Manufacturer of VoIP gateways, signaling
gateways, and SBC software for carriers and
enterprises
• Employee Owned
• Founded in 2002
• Employees: ~40
• Headquarters: Montreal, Canada
• Hardware & software R&D as well as
production of its products in Montreal
• Sales/Support offices:
Montreal, Turkey, Hong Kong, Italy
• 24/7 technical support
4
TelcoBridges HQ
© YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY.
5
▷ Originally known for consumer call answering services
▷ Recent expansion into safe communications for carriers
& enterprises
▷ Venture-backed : Series A & B rounds
▷ Founded in 2007
▷ ~50 employees
▷ Headquarters in Irvine, California.
▷ Operations in USA, Canada & UK.
6
State of
STIR/SHAKEN
STIR/SHAKEN in 1 Slide
7
I know the subscriber, can attest
that they have permission to
use the number, and I have
permission to pass calls with
STIR/SHAKEN
Originating
Service Provider
Terminating
Service Provider
The originating SP is valid,
attested that the caller ID
is legitimate and has not
been manipulated
Intermediate
Service Providers
STIR/SHAKEN “Security”
STIR/SHAKEN
What it Does Do:
• Secures the Caller-ID information
• The originating operator attests as
to whether the caller has permission
to use the number
• Defines three levels of attestation
(A, B, C)
• Tell subscriber if the call has an
attestation (but not the level)
• Provides traceback
What it Does Not do:
8
• Pass the level of attestation to the
called party
• Monitor patterns of calling or abuse
• Know the intent of the caller
• Differentiate between legitimate and
fraudulent behavior
• Redirect suspicious traffic
• Terminate known fraudulent calls
Timeline
9
Do Not Call
Act
Truth in
Caller ID
Act
FCC Calls for
STIR/SHAKEN
implementation
TRACED Act
signed into law
Robocall
Mitigation
Database
Filings Due
“May-not-
accept”
2003 2009 2019 June 30,
2021
Sept 28,
2021
Security Swiss Cheese
10
Know your
Customer
STIR/
SHAKEN
Analytics
11
YouMail
Robocall Analytics
Will STIR/SHAKEN solve the Illegal
Robocall Problem?
Presented by:
13
https://www.ftc.gov/reports/
consumer-sentinel-network-data-book-2020
Call attacks rising & top source! - FTC
2
1
www.youmail.com © 2021 YouMail, Inc
14
YouMail: Definitive Source On Bad Calls
YouMail shows the estimated national volume of ..
47,839,232,200 in 2018. 28. YouMail further reports … how
pervasive robocalls are .. YouMail identified 5.1 billion calls ..
15
Unique answering data + fingerprinting
captures bad actors as they start their behavior –
within minutes of the first call
We ID call attacks by what they say
This message from the Social Security Administration
is regarding an enforcement action filed by the
Department of Treasury on your social security number.
This will be recorded second avoidance of appearance
before a magistrate judge ordered jury for a criminal
offense…
Hello… John is not currently available, please
leave a message.
Campaign:
Caller Phone Number:
Caller ID:
Caller Carrier:
Call Time (UTC):
Callee Phone Number:
Callee Carrier:
Social Security Imposter Attack
240-587-5386
IRS
AcmeLEC CLEC, LLC
2020-10-13T20:23:05Z
210-884-xxxx
T-Mobile
16
Sensor Network
Consumer mobile numbers
answered by YouMail
instead of carrier
Call content + AI = Zero-hour protection
AI
AI This message from the Social Security Administration
is regarding an enforcement action filed by the
Department of Treasury on your social security number.
This will be recorded second avoidance of appearance
before a magistrate judge ordered jury for a criminal
offense…
YouMail Call Fingerprinting identifies bad calls typically
within 1-5 minutes based on answering billions of annual calls
AI
YouMail
Call
Platform
Zero-hour protection
Protection and mitigation available for
mobile clients, carrier networks
and consumer brands
Sensor Network & Protection capabilities powered by an
extensive patent portfolio covering our unique
call fingerprinting, handling and quarantining
technologies.
#
#
#
Impact on Enterprise: IP-PBXs and UCaaS
17
• Enterprise organizations
desire calls from
customers, colleagues,
and partners
• Unwanted robocalls tie
up enterprise resources
and represent lost
productivity for
employees
Desired calls…
Unwanted calls…
More Information…
18
Gerry Christensen
VP BD and Strategic Partnerships
p: 206-472-7060 e: gchristensen@youmail.com
Try YouMail Now: iPhone,Android
Ground-Truth Identification → Zero-Hour Detection + Action
https://www.linkedin.com/in/gerrychristensen/
Every call should be
safe & productive.
19
20
Robocall Mitigation
with
ProSBC and YouMail
Points of Mitigation
Four Points for Mitigation:
1. Originating Service Provider
2. Terminating Service Provider
3. As a Service
4. Subscriber
21
SP Use Case:
• ProSBC inserted into call route
• As calls arrive, reputation is
checked
• Based on reputation score:
• 503 – SVC Unavailable
(Route advance)
• 603 – Decline
(Drop the call)
Originating Service Provider
22
Carrier
Reputation
Analytics
Soft Switch
Originating Service Provider
INVITE
503
603
Subscribers
CPaaS and UCaaS Providers
25
SIP
Carrier
CPaaS or UCaaS Provider
Protecting XaaS platforms
• SBC in the cloud, integrated
with reputation analytics
• As calls arrive, reputation is
checked
• Based on reputation score:
• Calls are completed
• Dropped
• Redirected to Voicemail
Reputation
Analytics
UCaaS Subscribers
Enterprise Premises
26
SIP
Carrier
Reputation
Analytics
IP-PBX
Enterprise
Enterprise Customers
• SBC on premises, integrated
with reputation analytics
• As calls arrive, reputation is
checked
• Based on reputation score:
• Calls are completed
• Dropped
• Redirected to Voicemail
Mitigation as a Service
27
SIP
Carrier
IP-PBX
Enterprise
Enterprise Customers
• Full service is in cloud,
integrated SBC with reputation
analytics
• SIP Trunk from carrier is sent
to service
• Mitigated SIP Trunk then sent
to enterprise
• No on-premises equipment
• Seamless integration
28
Learn More
Solution Brief
BENEFITS:
The benefits of the TelcoBridges/YouMail
integration includes:
• Ease of Implementation – Inserting ProSBC
into the call flow eliminates the need for
major upgrades to existing systems
• Compliance – Quickly meet FCC robocaller
mitigation requirements
• Flexible Deployment Options – can be
deployed in the service provider network or
cloud
• Scalable Business Model – allowing
businesses to “ramp up” their robocaller
mitigation as they grow
• Highly reliable – based on carrier-class
reliable software and hardware systems
29
https://freesbc.telcobridges.com/youmail/
Know Your Customer Whitepaper
30
Get your copy from: https://freesbc.telcobridges.com/lp-youmail-wp/
Video Library on YouTube
• ProSBC Training Modules
• Recorded webinars
• How-to Tutorials
• Customer interviews
• Frequently Asked Questions
• Recorded podcasts
• And more…
31
youtube.com/telcobridges
Enabling the Migration to
Cloud Communications
32
www.telcobridges.com
www.prosbc.com
sales@telcobridges.com
Youtube.com/telcobridges
Q/A
www.YouMail.com
gchristensen@youmail.com
View the Full-Length Video at:
www2.telcobridges.com/videolibrary
33

More Related Content

Similar to Will STIR/SHAKEN Solve the Illegal Robocall Problem?

How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom Fraud
JeraSoft
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
TelcoBridges Inc.
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
Alan Percy
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
TelcoBridges Inc.
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
TelcoBridges Inc.
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
Alan Percy
 
Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKEN
Alan Percy
 
Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKEN
TelcoBridges Inc.
 
Security and governance
Security and governanceSecurity and governance
Security and governance
DataWorks Summit
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
Lucy Denver
 
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP SecurityPLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
PROIDEA
 
Deliver solutions cv_vebtech
Deliver solutions cv_vebtechDeliver solutions cv_vebtech
Deliver solutions cv_vebtech
SvetlanaUsikava
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKEN
TelcoBridges Inc.
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKEN
Alan Percy
 
TalkTalk Data Breach Case Study
TalkTalk Data Breach Case StudyTalkTalk Data Breach Case Study
TalkTalk Data Breach Case Study
Charlie Pownall
 
Webinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWebinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the Trenches
Withum
 
2000-12 CTI Newsletter
2000-12 CTI  Newsletter2000-12 CTI  Newsletter
2000-12 CTI NewsletterTed Zapletal
 
Automate Lawsuit Filing? The Brave New World of "Anti Robocall Apps
Automate Lawsuit Filing?  The Brave New World of "Anti Robocall AppsAutomate Lawsuit Filing?  The Brave New World of "Anti Robocall Apps
Automate Lawsuit Filing? The Brave New World of "Anti Robocall Apps
Jeff Martinez
 
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
SaraPia5
 
Implementing AI powered NBO programs exacaster vivacom
Implementing AI powered NBO programs exacaster vivacomImplementing AI powered NBO programs exacaster vivacom
Implementing AI powered NBO programs exacaster vivacom
Jolita Bernotiene
 

Similar to Will STIR/SHAKEN Solve the Illegal Robocall Problem? (20)

How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom Fraud
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKEN
 
Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKEN
 
Security and governance
Security and governanceSecurity and governance
Security and governance
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP SecurityPLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
 
Deliver solutions cv_vebtech
Deliver solutions cv_vebtechDeliver solutions cv_vebtech
Deliver solutions cv_vebtech
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKEN
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKEN
 
TalkTalk Data Breach Case Study
TalkTalk Data Breach Case StudyTalkTalk Data Breach Case Study
TalkTalk Data Breach Case Study
 
Webinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWebinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the Trenches
 
2000-12 CTI Newsletter
2000-12 CTI  Newsletter2000-12 CTI  Newsletter
2000-12 CTI Newsletter
 
Automate Lawsuit Filing? The Brave New World of "Anti Robocall Apps
Automate Lawsuit Filing?  The Brave New World of "Anti Robocall AppsAutomate Lawsuit Filing?  The Brave New World of "Anti Robocall Apps
Automate Lawsuit Filing? The Brave New World of "Anti Robocall Apps
 
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
 
Implementing AI powered NBO programs exacaster vivacom
Implementing AI powered NBO programs exacaster vivacomImplementing AI powered NBO programs exacaster vivacom
Implementing AI powered NBO programs exacaster vivacom
 

More from TelcoBridges Inc.

Network Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best PracticesNetwork Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best Practices
TelcoBridges Inc.
 
Tmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ SessionTmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ Session
TelcoBridges Inc.
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 Tips
TelcoBridges Inc.
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and SuccessesContact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes
TelcoBridges Inc.
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
TelcoBridges Inc.
 
What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7
TelcoBridges Inc.
 
RESTful APIs and SBCs
RESTful APIs and SBCsRESTful APIs and SBCs
RESTful APIs and SBCs
TelcoBridges Inc.
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked Questions
TelcoBridges Inc.
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBC
TelcoBridges Inc.
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media Gateways
TelcoBridges Inc.
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A Tutorial
TelcoBridges Inc.
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
TelcoBridges Inc.
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
TelcoBridges Inc.
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
TelcoBridges Inc.
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
TelcoBridges Inc.
 
ProSBC Introduction
ProSBC IntroductionProSBC Introduction
ProSBC Introduction
TelcoBridges Inc.
 
Extending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANExtending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRAN
TelcoBridges Inc.
 
Session Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQSession Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQ
TelcoBridges Inc.
 
Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?
TelcoBridges Inc.
 
The Intelligent Edge - Managing Network Traffic at the Edge at SIPNOC 2018
The Intelligent Edge - Managing Network Traffic at the Edge at SIPNOC 2018The Intelligent Edge - Managing Network Traffic at the Edge at SIPNOC 2018
The Intelligent Edge - Managing Network Traffic at the Edge at SIPNOC 2018
TelcoBridges Inc.
 

More from TelcoBridges Inc. (20)

Network Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best PracticesNetwork Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best Practices
 
Tmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ SessionTmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ Session
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 Tips
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and SuccessesContact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
 
What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7
 
RESTful APIs and SBCs
RESTful APIs and SBCsRESTful APIs and SBCs
RESTful APIs and SBCs
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked Questions
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBC
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media Gateways
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A Tutorial
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
 
ProSBC Introduction
ProSBC IntroductionProSBC Introduction
ProSBC Introduction
 
Extending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANExtending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRAN
 
Session Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQSession Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQ
 
Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?
 
The Intelligent Edge - Managing Network Traffic at the Edge at SIPNOC 2018
The Intelligent Edge - Managing Network Traffic at the Edge at SIPNOC 2018The Intelligent Edge - Managing Network Traffic at the Edge at SIPNOC 2018
The Intelligent Edge - Managing Network Traffic at the Edge at SIPNOC 2018
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 

Recently uploaded (20)

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 

Will STIR/SHAKEN Solve the Illegal Robocall Problem?

  • 1.
  • 2. 2 Introductions Alan D Percy Chief Marketing Officer alan.percy@telcobridges.com @AlanDPercy Gerry Christensen VP of BD, YouMail gchristensen@youmail.com @GTChristensen
  • 3. 3 Agenda • Introductions • Background on STIR/SHAKEN • Where do we Stand? • Beyond Robocall Mitigation • Where to Learn More • Your Questions A D N E G A
  • 4. TelcoBridges Inc. • Manufacturer of VoIP gateways, signaling gateways, and SBC software for carriers and enterprises • Employee Owned • Founded in 2002 • Employees: ~40 • Headquarters: Montreal, Canada • Hardware & software R&D as well as production of its products in Montreal • Sales/Support offices: Montreal, Turkey, Hong Kong, Italy • 24/7 technical support 4 TelcoBridges HQ
  • 5. © YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. 5 ▷ Originally known for consumer call answering services ▷ Recent expansion into safe communications for carriers & enterprises ▷ Venture-backed : Series A & B rounds ▷ Founded in 2007 ▷ ~50 employees ▷ Headquarters in Irvine, California. ▷ Operations in USA, Canada & UK.
  • 7. STIR/SHAKEN in 1 Slide 7 I know the subscriber, can attest that they have permission to use the number, and I have permission to pass calls with STIR/SHAKEN Originating Service Provider Terminating Service Provider The originating SP is valid, attested that the caller ID is legitimate and has not been manipulated Intermediate Service Providers STIR/SHAKEN “Security”
  • 8. STIR/SHAKEN What it Does Do: • Secures the Caller-ID information • The originating operator attests as to whether the caller has permission to use the number • Defines three levels of attestation (A, B, C) • Tell subscriber if the call has an attestation (but not the level) • Provides traceback What it Does Not do: 8 • Pass the level of attestation to the called party • Monitor patterns of calling or abuse • Know the intent of the caller • Differentiate between legitimate and fraudulent behavior • Redirect suspicious traffic • Terminate known fraudulent calls
  • 9. Timeline 9 Do Not Call Act Truth in Caller ID Act FCC Calls for STIR/SHAKEN implementation TRACED Act signed into law Robocall Mitigation Database Filings Due “May-not- accept” 2003 2009 2019 June 30, 2021 Sept 28, 2021
  • 10. Security Swiss Cheese 10 Know your Customer STIR/ SHAKEN Analytics
  • 12. Will STIR/SHAKEN solve the Illegal Robocall Problem? Presented by:
  • 14. www.youmail.com © 2021 YouMail, Inc 14 YouMail: Definitive Source On Bad Calls YouMail shows the estimated national volume of .. 47,839,232,200 in 2018. 28. YouMail further reports … how pervasive robocalls are .. YouMail identified 5.1 billion calls ..
  • 15. 15 Unique answering data + fingerprinting captures bad actors as they start their behavior – within minutes of the first call We ID call attacks by what they say This message from the Social Security Administration is regarding an enforcement action filed by the Department of Treasury on your social security number. This will be recorded second avoidance of appearance before a magistrate judge ordered jury for a criminal offense… Hello… John is not currently available, please leave a message. Campaign: Caller Phone Number: Caller ID: Caller Carrier: Call Time (UTC): Callee Phone Number: Callee Carrier: Social Security Imposter Attack 240-587-5386 IRS AcmeLEC CLEC, LLC 2020-10-13T20:23:05Z 210-884-xxxx T-Mobile
  • 16. 16 Sensor Network Consumer mobile numbers answered by YouMail instead of carrier Call content + AI = Zero-hour protection AI AI This message from the Social Security Administration is regarding an enforcement action filed by the Department of Treasury on your social security number. This will be recorded second avoidance of appearance before a magistrate judge ordered jury for a criminal offense… YouMail Call Fingerprinting identifies bad calls typically within 1-5 minutes based on answering billions of annual calls AI YouMail Call Platform Zero-hour protection Protection and mitigation available for mobile clients, carrier networks and consumer brands Sensor Network & Protection capabilities powered by an extensive patent portfolio covering our unique call fingerprinting, handling and quarantining technologies. # # #
  • 17. Impact on Enterprise: IP-PBXs and UCaaS 17 • Enterprise organizations desire calls from customers, colleagues, and partners • Unwanted robocalls tie up enterprise resources and represent lost productivity for employees Desired calls… Unwanted calls…
  • 18. More Information… 18 Gerry Christensen VP BD and Strategic Partnerships p: 206-472-7060 e: gchristensen@youmail.com Try YouMail Now: iPhone,Android Ground-Truth Identification → Zero-Hour Detection + Action https://www.linkedin.com/in/gerrychristensen/
  • 19. Every call should be safe & productive. 19
  • 21. Points of Mitigation Four Points for Mitigation: 1. Originating Service Provider 2. Terminating Service Provider 3. As a Service 4. Subscriber 21
  • 22. SP Use Case: • ProSBC inserted into call route • As calls arrive, reputation is checked • Based on reputation score: • 503 – SVC Unavailable (Route advance) • 603 – Decline (Drop the call) Originating Service Provider 22 Carrier Reputation Analytics Soft Switch Originating Service Provider INVITE 503 603 Subscribers
  • 23. CPaaS and UCaaS Providers 25 SIP Carrier CPaaS or UCaaS Provider Protecting XaaS platforms • SBC in the cloud, integrated with reputation analytics • As calls arrive, reputation is checked • Based on reputation score: • Calls are completed • Dropped • Redirected to Voicemail Reputation Analytics UCaaS Subscribers
  • 24. Enterprise Premises 26 SIP Carrier Reputation Analytics IP-PBX Enterprise Enterprise Customers • SBC on premises, integrated with reputation analytics • As calls arrive, reputation is checked • Based on reputation score: • Calls are completed • Dropped • Redirected to Voicemail
  • 25. Mitigation as a Service 27 SIP Carrier IP-PBX Enterprise Enterprise Customers • Full service is in cloud, integrated SBC with reputation analytics • SIP Trunk from carrier is sent to service • Mitigated SIP Trunk then sent to enterprise • No on-premises equipment • Seamless integration
  • 27. Solution Brief BENEFITS: The benefits of the TelcoBridges/YouMail integration includes: • Ease of Implementation – Inserting ProSBC into the call flow eliminates the need for major upgrades to existing systems • Compliance – Quickly meet FCC robocaller mitigation requirements • Flexible Deployment Options – can be deployed in the service provider network or cloud • Scalable Business Model – allowing businesses to “ramp up” their robocaller mitigation as they grow • Highly reliable – based on carrier-class reliable software and hardware systems 29 https://freesbc.telcobridges.com/youmail/
  • 28. Know Your Customer Whitepaper 30 Get your copy from: https://freesbc.telcobridges.com/lp-youmail-wp/
  • 29. Video Library on YouTube • ProSBC Training Modules • Recorded webinars • How-to Tutorials • Customer interviews • Frequently Asked Questions • Recorded podcasts • And more… 31 youtube.com/telcobridges
  • 30. Enabling the Migration to Cloud Communications 32 www.telcobridges.com www.prosbc.com sales@telcobridges.com Youtube.com/telcobridges Q/A www.YouMail.com gchristensen@youmail.com
  • 31. View the Full-Length Video at: www2.telcobridges.com/videolibrary 33