Solving the SMS Revenue Leakage Challenge

Transcription

Solving the SMS Revenue Leakage Challenge
Whitepaper
Solving the SMS Revenue
Leakage Challenge
Table of Contents
1
Background
2
SMS fraud technical overview
3
Affected parties
4
Common methodologies
5
Ways to control the different
types of SMS fraud
Background
As mobile device usage became ubiquitous, marketing efforts to reach this population
segment exploded. Companies burst onto the mobile marketing scene attempting to carve
out a unique position, niche or vertical. Venture Capital funds fuelled such a growth of players
in this arena so that keeping track of who was doing what became difficult. The “Lumascape”
below from Luma Partners illustrates this sudden complexity in the mobile advertising or
mobile marketing ecosystem.
Figure 1 Sample of the complexity of companies in the mobile marketing ecosystem
SMS messages are typically read almost immediately and responded to very quickly which is normal
user behaviour on the mobile. However, for mobile marketers, this makes SMS-based marketing
a very powerful tool to exploit. As a result, there has been a wide range of activity to provide SMS
based marketing across the entire mobile marketing ecosystem. The majority of this activity has
been legitimate and within acceptable standards of behaviour, but sometimes it crosses the line of
legitimacy or blurs the distinction of what is acceptable and what is not. This is especially true when
it comes to the area of low-cost, bulk SMS delivery.
1
Solving the SMS Revenue Leakage Challenge
Low-cost SMS delivery providers are known as SMS aggregators and there are many legitimate
companies in this area. Their primary business model is to send message traffic at a lower price that
the network operator’s themselves offer. Typically, these companies partner with existing mobile
operators to purchase wholesale SMS services at a reduced price that they can then offer to their
customers. Mobile operators get a new revenue stream by selling bandwidth on their SS7 network
to SMS aggregators and the SMS aggregators re-sell that bandwidth to their customers. The quality
of service (such as SMS delivery success rate) is not always guaranteed, as these companies offer
different levels of price/performance, depending on the type of connection and agreement they have
with the mobile operators. This puts tremendous pricing pressure on the aggregators to seek every
opportunity to ‘optimise’ wherever they can. While this does not always result in illegal activities,
sometimes the pressure does result in pushing the boundaries of what is lawfully allowed.
Figure 2 Bulk SMS equipment for sale on Alibaba
SMS fraud technical overview
Let’s outline the technical aspects behind SMS fraud to help set the stage on how it occurs and
can be addressed.
At the highest quality level, SMS aggregators may have a “direct connection” to the mobile
operator’s SS7 network via a special signalling gateway. This direct connection to the SS7 network
is what enables SMS aggregators to provide a level of quality assurance to their customers.
SMS aggregators may also have an “indirect connection” to the SS7 network via a mobile operator’s
SMS centre. This kind of SMS connection is typically less expensive than a ‘direct connection’ but
provides a lower delivery rate or less delivery assurance.
Acision. Innovation. Assured.
2
Solving the SMS Revenue Leakage Challenge
Affected parties
As a result of the tremendous pricing pressure on the aggregators to be able to provide up to
75% discount SMS pricing or even free SMS, some SMS aggregators rely on “indirect connectivity”
known as grey routes or make use of SIM farms. The SIM farm is explained a bit further on.
SMS marketers may be lured into using an SMS aggregator that may not have a proven track
record or simply provide low quality services.
For the SMS marketers, the consequences of using an unproven aggregator may be:
• Marketing funds might result in messages not being sent and the funds be unrecoverable if the
SMS service provider is secretly blocked for fraudulent activities
• The SMS delivery rate may not be constant or even worse, sporadic if the service provider is not
able to provide a service level guarantee that they can deliver
• The SMS service provider may actually pirate the marketer’s own customer list and expose them
to uncontrolled fake, fraud or spam activity.
Mobile operators, on the other side, might also suffer depending on network infrastructure and
interconnect agreements with consequences such as:
• An imbalance in SMS interconnect traffic, resulting in high costs caused by the volume of
targeted subscribers exceeding the volume of the operator’s subscriber base
• SMS revenue leakage as a result of SMS traffic not being properly charged due to the exploited
interconnect routes
• Negatively affected brand image caused by unsolicited volumes of SMS traffic addressed to either
its own subscribers or towards the other mobile operators.
The subscriber or end-user is also negatively affected by:
• Unsolicited messages in the form of fakes; fraud or spam is considered harassment and intimidation
• Fraudulent fees or charges by mistakenly engaging “premium rate” services
• Mistakenly led to divulge or make use of the subscriber’s contact list
• Having the subscriber’s handset taken out of service by being flooded or subjected to denial-ofservice techniques.
The two major vectors of fraud in the SMS world are where the majority of activity and headaches
originate are grey routes attacks and SIM farms attacks.
Acision. Innovation. Assured.
3
Solving the SMS Revenue Leakage Challenge
Common methodologies
SIM Farms
By definition, a SIM Farm is a computer connected to a bank of hundreds of mobile phones SIM
cards. Each of the SIM cards is an account on mobile network operator that offers the tariff needed
by the SMS service provider. Routinely the
tariff exploited is an “unlimited SMS” bundle.
The SIM farm computer then cycles through
the bank of SIM cards to send bulk the SMS
traffic exploiting the operator’s consumer
based tariffs.
Figure 3 Sample SIM farm appliance
The use of SIM Farms is an example of how bulk SMS service providers push the limits of the
law. This method of SMS delivery is not technically illegal but clearly a breach of the operator’s
intent with a consumer based tariff. In many cases, the term and conditions forbid “unlimited
SMS” bundles being used for advertising, marketing or bulk delivery campaigns. But, the low
prices of these tariffs make it attractive for intermediate entities to provide bulk SMS delivery
service to SMS aggregators.
Grey Routes
Mobile operators in different countries use a variety of international telecoms routes to send
traffic to each over. These can be grouped into three types known as white routes, black routes
and grey routes.
White Route – A white route is where both the source and destination are standardised legally
agreed upon terminations. This generally means the operators have an agreement which outlines
the charges and the manner in which SMS traffic will be conveyed over their networks.
Black Route – Opposed to a white route, a black route is illegal on both source and destination
ends. This means that there has not been a contractual agreement between the parties involved to
provide SMS traffic and traffic from either party is therefore unlawful over such a route.
Grey Route – The last route type is referred to as grey route but also referred to as “special carrier
arrangements”, “settlement by-pass” or other unclear terms used by different groups. A grey route is
generally defined as a legal connection on one end but prohibited at the other end i.e. origination
or termination. Grey routes are another way that bulk SMS service providers push the limits of the
law. Not only do they present legal issues, they are difficult to evaluate, monitor and control and
come with a number of hidden costs. But, due to the low costs involved, they are very appealing to
bulk SMS providers.
Grey routes are non-interconnected routes currently unused and typically owned by
telecommunication providers. Bulk SMS providers exploit the difference in settlement rates, and
route traffic via intermediate networks while also re-originating the message to the network it
terminates in, making the message appear as national as opposed to international. This allows the
bulk SMS provider to incur the lowest cost possible and achieve their delivery needs.
Acision. Innovation. Assured.
4
Solving the SMS Revenue Leakage Challenge
In order to achieve the price advertised through a grey route, dispatches are run on a single delivery
option with no back up, which can ultimately compromise both the message quality and successful
delivery. These routes are used without the telecommunications company’s knowledge and as a
result can be terminated and turned off at any time. This means that any other traffic carried along
these routes, even if it is legitimate, may not be delivered to the recipients.
Grey routes also present an even bigger threat to business – a risk to customer data. Due to the
temporary nature of grey routes, it is impossible to guarantee the security of customer data or to
track any data breaches. Essentially using a grey route compromises your customer database and
puts your company at risk of breaching the data protection act.
Ways to control the different types of SMS fraud
Understanding the complexity of the mobile marketing ecosystem, Acision provides a holistic
approach to address the multitude of SMS fraud techniques. The comprehensive solution
provides 16 levels of fraud, fakes, spoof and spam control that range from basic functionalities
such as blacklisting and whitelisting of originators identifications on various layers of SS7
protocols, to more sophisticated engines that address the volumetric control of SMS traffic based
on multiple message parameters.
Acision’s solution also offers intelligent analytical tools based on traffic patterns detection to help
operators minimise their revenue leakage. This allows the operator to quickly respond to the
continuous exploitation of weaknesses in the mobile network and mobile devices,
Copyright © Acision BV 2007 - 2013
All rights reserved. This document is protected
by international copyright law and may not be
reprinted, reproduced, copied or utilised in whole
or in part by any means including electronic,
mechanical, or other means without the prior
written consent of Acision BV.
Whilst reasonable care has been taken by Acision
BV to ensure the information contained herein is
reasonably accurate, Acision shall not, under any
circumstances be liable for any loss or damage
(direct or consequential) suffered by any party as
a result of the contents of this publication or the
reliance of any party thereon or any inaccuracy
or omission therein. The information in this
document is therefore provided on an “as is”
basis without warranty and is subject to change
An important element of the mechanisms offered with Acision’s SMS Revenue Assurance
proposition is the accuracy of fraud detection, reducing the chance of false positives. Improving
accuracy further that is achieved via online detection, off-line reporting gives additional insights.
Using both the off and online detection mechanisms, provides a comprehensive protection from
revenue leakage.
Operator experience and our research clearly demonstrate that closing fraudulent access allows the
operator to:
• Minimise direct revenue leakage
• Encourage legitimate channels improving revenue potential
• Ensure market pricing is enforced and maintained
Revenue potential is greatly improved when SMS marketers interested in quality of service start
accessing the network infrastructure directly.
without further notice and cannot be construed
as a commitment by Acision BV.
The products mentioned in this document are
identified by the names, trademarks, service
marks and logos of their respective companies
or organisations and may not be used in any
advertising or publicity or in any other way
whatsoever without the prior written consent of
those companies or organisations and Acision BV.
Acision. Innovation. Assured.
5714/v3
5