telephone preference service: the launch of tps protect
Post on 06-Dec-2021
2 Views
Preview:
TRANSCRIPT
1
TELEPHONE
PREFERENCE SERVICE:
The launch of TPS
Protect and the future
of Nuisance Call
Management.
NICC London 8 November 2017NICC London 8 November 2017NICC London 8 November 2017NICC London 8 November 2017
Robert BakerRobert BakerRobert BakerRobert Baker
European Managing DirectorEuropean Managing DirectorEuropean Managing DirectorEuropean Managing Director
First Orion First Orion First Orion First Orion
rbaker@firstorion.comrbaker@firstorion.comrbaker@firstorion.comrbaker@firstorion.com
07983612843079836128430798361284307983612843
2
TPS Protect TPS Protect TPS Protect TPS Protect –––– The LaunchThe LaunchThe LaunchThe Launch
How does this
enhance the TPS
services?
What Does the App
do ?
Allows TPS registration
Provides a consolidated
complaint flow
Protect Consumers from
scam callers
Provide Consumers
information about
telemarketers
Why do this now?
234 15
Trust ScoreScamUnobtrusive
TPS legislation from 1999
TPS successfully prevents
telemarketing calls ~40%
Lack of official mobile
solutions left market open
for many unscrupulous
OTTs / OEMs
Scam and nuisance calls
increasing on mobile.
App Data Engine / FONES CLOUD
TPS Complaint
s
TPS Register
Register Subscribers for TPS
Subscribers file complaints
Collect call data – realtime
3
Number, email, postcode
Complaint data
Registration Data, number and date
Register:Number ->Pseudo- Number
Data Stored on App- Number- Pseudo-Number
If user files a complaint- Email- Postcode
Calling Party Number
Contact Details (Dependent on report flow)
Contact Number, Email, Address.
key:In clearAnonymized
Blocks, Approves, Lookups, Reports, Complaint DataCalls received, Disposition, Duration, who hung up.
TPS Protect - Android version
App Data Engine / FONES CLOUD
TPS Complaint
s
TPS Register
Register Subscribers for TPS
Subscribers file complaints
Collect call data – realtime
4
Number, email, postcode
Blocks, Approves, Lookups, Reports, Complaint data
Complaint data
Registration Data, number and date
Register:Number ->Pseudo- Number
Data Stored on App- Number- Pseudo-Number
If user files a complaint- Email- Postcode
Calling Party Number
Contact Details (Dependent on report flow)
Contact Number, Email, Address.
key:In clearAnonymized
TPS Protect - IOS Version – provides less data
Big Data Solution Big Data Solution Big Data Solution Big Data Solution –––– producing a scoreproducing a scoreproducing a scoreproducing a score
Selected Raw Data Selected Refined Data Real-time ScoresEvery 10 Minutes
Complaint
Score
Block
Score
Volume Spike
Score
Answer /
Delivery Rates
Hourly
Nuisance
Value
Scores
30-Day
Volume
Look-
ups
Robo
Complaint
Flag
Peak
Hour
Peak
Day
Unique
Individuals
called
FCC
Complaint
Volume
Complaint
Volume
FCC
Robo
Flag
Time of
Call
Answer
Rate
Call
Duration
Complaint
Ratio
Volume by
Minimum
Threshold
Telcom Files
(e.g. LERG)
R&VT
info
Failed Call Rate
Category
Complaint
Volume
Geo
Distribution
In Block
List Vol
30-Day
BlocksScam Indicators
Block
RatioTotal
Blocks
Data Sources Real-Time Scoring Call Categories
Patented Algorithm Data ScientistsInformational Call
Registry
Research &
Verification Team
TPS Protect ollects and analyzes the disparate data points, distilling that data down into
comprehensive and insightful consumable output units
5
A glimpse into the future of Scam calls in the UK?
6
Issues today
OTT apps that over-rate calls as scams based on user feedback alone
Carriers doing their own blocking
Lack of transparency – who blocked my calls? – Who do I complain to?
Focus on reducing quantity
Scams the most difficult to protect against but do the most damage
Data is king – the big carriers have an advantage
CLI is meaningless
Enable scam notification by default. Allow users to opt-in to scam blocking via feature codes, apps and portals.
T-Mobile (USA) Scam ID, Scam Block and NAME ID
� ScamID and ScamBlock – all users are eligible
� USSD Code – easy to access
� No application required – all network based
� Reporting & feedback loop for users (web portal)
� Industry Portal to register legitimate numbers
� Report phone harassment directly to the FTC / FCC
Headline numbers / facts
76.5 Million usersMissing ~10 in 1 Million scam calls
Over tagging ~2 in 1 million scam callsAnd Improving
Finger Printing techniquePassive layer 2 traffic mirror
How does this work?
8
ConnectConnectConnectConnect
INDEPENDEN
T THIRD PARTY
Research team
User report ing through Apps & Portals
3rd party other Carrier data
User Preferences
Number act ivity data
( SIP, CAMEL, INAP, AIN, ISUP, ENUM, HTTP/REST, CNAM )
Carrier Call Processing Flow
ProtectProtectProtectProtect
Traffic Traffic Traffic Traffic mirrormirrormirrormirror
QueryQueryQueryQuery ResponseResponseResponseResponse
TDR & Suspicious Traffic
Carrier Network
Cloud Analytics / Scoring / Cloud Analytics / Scoring / Cloud Analytics / Scoring / Cloud Analytics / Scoring / CategorizationCategorizationCategorizationCategorization
Run-time updates & Preferences
Termination optionsOrigination options
Block
Alert
Answer
VM
CAPTCHA
or
Whisper
Regulatory Data
No Longer Rely on CLI – Passive Layer 2 taps allows characteristics of a scam call to be modelled in real-time
TPS
Data Engine
Score and Category
Solution that identifies scams
regardless of spoofing
Level playing field for all carriers
Highly transparent – why are my
calls being blocked? One stop shop
Independent solution, carriers no
longer making their own decisions
Consistent with approach in
Canada (CRTC and Carrier
Consortium)
Make use of DoNotOriginate and
industry portal for legitimate
numbers
ABOVE ALL – THIS IS THE BEST
Simplified view
Create a central independent number reputation database
Carrier ACarrier B
Carrier DCarrier C
Call Data aggregated and anonymized
STIR/SHAKEN will help thwart Spoofing. Analytics are a MUST to identify Scams.
M3AAWG 41st General Meeting | Toronto | October 2017
• Phone numbers can be good and bad – at the same time
• SHAKEN does not change this• Fingerprinting/analytics can discern
good from bad in both signed and unsigned traffic
• The same number can make signed good calls, unsigned good calls, and spoofed scam calls
• SHAKEN allows call scoring to be more definitive for verified calls
• If IXCs implement SHAKEN it will be a huge help
• SHAKEN offers protection for good users of good numbers
Signed/VerifiedSigned/Verified
Not Signed/VerifiedNot Signed/Verified
NotScamNotScam
ScamScam
Bad
Good
Good
Bad
Scammers response to STIR/SHAKEN?
M3AAWG 41st General Meeting | Toronto | October 2017
SIM Boxes
PBX/RTP Hacking“Survey” Call Centers
Multi-User VoIP
This caller is Evil (his number is a
tool)
M3AAWG 41st General Meeting | Toronto | October 2017
SHAKEN• Added protection for good callers• Verifies a CLI is not spoofed• Cannot attest to caller intent• Doesn’t prove the caller is who
they say they are• Traceback is a must
Analytics• Needed to identify Scam calls
with or without SHAKEN• Needs to include signaling
fingerprinting• May need to include RTP
fingerprinting in the future
What can I do?
13
Recommend TPS Protect to your mobile customersIt is free for scam identificationEnhances the TPS Service by providing
protection
Consider the future for eradicating scam calls• TPS Protect in-network gets better with more data
and the more carriers that use it
• SHAKEN/STIR provides more data but does not solve the problem of scam and nuisance calls on its own
• A shared number reputation database provides the best solution for YOUR customers
top related