Commonly referred to as robocalls, computer-generated phone calls are used by legitimate organizations such as schools, churches, and public safety agencies to place calls to registered constituents. Public safety agencies will make reverse 9-1-1 robocalls in the event of a natural disaster or some catastrophe such as a train derailment. However, some Bad Actors use robocalling to trick or even defraud consumers in a random manner. According to YouMail, Americans received over 4 billion such calls in June 2018 alone.
The typical scenario involves a Bad Actor calling a consumer with some type of story about a special offer or concern that the called party is compelled to act upon immediately. In these instances, the calling party is seeking to either extort money directly or obtain identity information (such as credit card info) necessary to steal from the consumer. Technology tricks are used to gain the trust of the consumer such as local number spoofing, which is a technique that involves manipulating the calling party’s number to appear different than the actual number.
This leading analyst firm has coined the term “Problematic” to refer to any telephone number that that is identified as a cause for concern including spam, abusive telemarketer or debt collector, scam or fraud. Leading Robocall Detection and Unwanted Call Management solutions use various technologies such as advanced data analytics and artificial intelligence to determine if a number is problematic, and if so, the degree of concern (e.g. Spam, Scam, or Fraud).
Robocall Research, First Edition evaluates the current state of automated calling (robocalls), technologies for dealing with unwanted calls, leading companies and solutions. This report also analyzes industry challenges and the future outlook for robocall technologies and solutions to defeat spammers, scammers, and fraudsters. It also provides a look into the future of robocall detection including evolution of telecom data analytics, network-based authentication (such as STIR/SHAKEN) and network-based intelligence (such as call origination identification).
Vendor solutions covered in this report include: First Orion, Hiya, and TNS
Carrier solutions covered in this report include: AT&T Wireless’s “Call Protect”, T-Mobile’s “SCAM ID in combination with Name ID”, Verizon Wireless’s “Enhanced Caller Name ID
Purchasers of this report will receive a briefing with the analyst team to answer questions about the technologies, companies, solutions, and the market outlook. The publisher is also planning to release a market-focused report entitled Robocall and Unwanted Call Management: Solution Assessment and Market Outlook 2018 – 2023
Who Will Benefit from this Report?
- Robocall Solution Providers
- Communications Service Providers
- Software and Application Developers
- Telecommunications Infrastructure Providers
With the purchase of this report at the Multi-user License or greater level, you will have access to one hour with an expert analyst who will help you link key findings in the report to the business issues you're addressing. This will need to be used within three months of purchase.
This report also includes a complimentary Excel file with data from the report for purchasers at the Site License or greater level.
1.1. What is a Robocall?
1.2. Current State of the Problem
1.3. About the First Edition of Robocall Research
2. How Robocalls Work
3. Who Uses Robocalling
3.1. The Illegal, Unethical Minority
3.1.1. Spammers, Scammers, and Fraudsters
3.1.2. Who are the Bad Actors?
3.1.3. Bad Actor Practices
188.8.131.52. Number Spoofing
3.2. The Legal and Legitimate Majority
3.2.1. Relationship Based and Legally Authorized
3.2.2. Who are the Good Actors?
3.2.3. When Legal and Ethical Lines are Crossed
4. Detection and Management Approaches
4.1. Method Types
4.1.1. Heuristic Methods
4.1.2. Identification and Verification Methods
4.2. Crowd Sourcing
4.2.1. How is Works
4.2.2. Advantages and Disadvantages
4.3. Data Analytics
4.3.1. Call Velocity
4.3.2. Call Volume
4.3.3. Behavior Changes
4.4. Network Diagnostics
4.4.1. Call Origination
4.4.2. Call Path
4.4.3. Call Termination
4.5. Future Technologies
4.5.1. Authentication and Verification
5. The Market
5.1. The Good, the Bad, and the Ugly
5.1.1. The Above Board Market
5.1.2. The Gray Market
5.1.3. The Black Market
5.2. Consumer Market
5.2.1. Call Identification
5.2.2. Unwanted Call Management
5.3. Business Market
5.3.1. Data Sourcing
5.3.2. Verified Business
6. Industry Challenges
6.1. Awareness of Issues: Solution Availability and Usage
6.2. The Backlash of Neighborhood Spoofing
6.3. When Solutions Getting it Right and Get it Wrong
6.3.1. False Positives
6.3.2. False Negatives
6.4. Consumer Issues
6.4.1. When is it Really Safe to Answer
184.108.40.206. Annoyance vs. Real Risks
220.127.116.11. Actual Personal and Financial Risks
6.4.2. Data Privacy Concerns
18.104.22.168. Who has Control of your Private Data?
22.214.171.124. Who knows your Call Habits?
6.5. Business Backlash
6.5.1. Take me off that List: “I am Not a Bad Actor!”
6.5.2. My Calls are Always Legitimate: “White List My Business”
7. Solution Provider Analysis
7.1. What Characterizes a Market Leader
7.2. The Long Tail of Solution Providers
7.3. What our Latest Testing Indicates
7.3.1. Recognizing the issue of Problematic Calls
7.3.2. Conformance among Leading Solutions
7.3.3. Accuracy among Leading Solutions
7.3.4. Needed Areas of Improvement
7.3.5. The Need for Periodic Testing
8. The Future Outlook
8.1. Regulatory Actions
8.2. Technology Advancements
8.3. Continuous Solution Improvements
8.4. Mind Commerce Point of View Areas
8.4.1. Vetting Solution Providers is Important
8.4.2. Data Privacy and the Need for Encrypted Data
- First Orion
- Verizon Wireless