ICMI is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Advertisement

Telemarketing Fraud Presents an Unacceptable Risk to Businesses

sadA fuller version of this article originally appeared in No Jitter, a partner publication.

For consumers, telemarketing may only be a nuisance, but wearing our various industry hats, there’s a much bigger story that needs to be told. No Jitter speaks to many audiences, including those in IT, contact center, C-Suite, Finance, Marketing, Consultants and Compliance, and they all need to understand the risks that arise from the dark side of telemarketing.

To set the stage, consider a voicemail recently left on my business phone line – here’s the gist:

Hi, this is Robert calling you back. Based on your business’s Dunn & Bradstreet score of 76, we still have you pre-approved for up to a $500,000 line of credit, starting at 4.8%. Now the funds can be available in just 24 hours, but the offer does expire soon, so please call me back at 949-XXX-XXXX. I hope you have a blessed day, and thank you.

This call was unsolicited, I have no idea who the caller is, and I most certainly did not call the number back. So, why did this call happen, and what are the bigger implications?

Why is this call happening?

There are both legitimate and fraudulent forms of telemarketing. All types of businesses use telemarketing to communicate with customers, as well as to initiate engagement with prospects – both via telephony and text messaging.

I have long wondered how, in this day and age, the 10-digit phone number is still our most important form of identity. The public switched telephone network (PTSN) may be viewed as an archaic communications network, but it remains a vital channel for most of us.

Since the advent of VoIP, mobile messaging, and digital channels, we’ve been using the PSTN a lot less now for human-to-human communication, and a case can be made that most of that traffic is now automated forms of telemarketing. As a result, most of us now no longer trust telephony except among those we know, so there’s a bigger problem at hand here. While legitimate forms of telemarketing can be effective, there are all kinds of bad actors that exploit the PSTN in ways that few of us understand.

Scam calls expose network carriers to legal risk

Telecom-related technology is very much at the heart of this story, but so is the realm of regulators and the legal system. To counter the whack-a-mole world of telemarketing fraud, there is an extensive web of regulations with far-reaching enforcement mandates, with much of it driven by well-intentioned policies to protect consumers.

This shouldn’t be surprising given telecom’s roots as a regulated utility, and if this is new for you, a good starting point would be the FCC’s Telephone Consumer Protection Act (TCPA). At face value, this provides recourse for consumers who are victims of telemarketing fraud. However, the scope of TCPA violations is broad, creating a litigation-heavy climate where both carriers and companies behind well-known brands are the targets of both small-scale and class action lawsuits.

The regulatory landscape is complex, and a key reason why these are targets is that the perpetrators of telemarketing fraud - entities known as lead gen farms - tend to be offshore, beyond the FCC’s jurisdiction. Compounding this is the equally complex carrier world, where call flows often take several hops between fraudsters and their targets, making it very difficult to pinpoint which carrier is essentially enabling these calls to happen.

This barely scratches the surface of how these carriers operate, but an important takeaway is that these carriers are not the ones perpetrating the fraud, and in many cases, they aren’t even aware it’s happening until the legal claims arise, and the call flows are traced back to their network.

We need better technology for mitigating telemarketing fraud

When TCPA violations arise, aside from the monetary fines, the regulators can revoke their operating license, so the implications for carriers are major. This brings us back to the role of technology, as most carriers don’t have the financial means or ability to deploy the monitoring tools that can help defend them against litigation asserting their network is enabling the fraud.

Since the FCC cannot directly prosecute the perpetrators, the carriers and the brands are the targets to seek compensation when consumer claims arise. The rationale is clear since these entities are domestic and within the FCC’s jurisdiction, but also because many of them have the financial means to settle these claims. This litigation-based approach may be financially sound – although many of these carriers, known as intermediaries, are small, and these fines could put them out of business - but it doesn’t address the root of the problem.

Again, this is where technology comes back into play, as the perpetrators are simply using more advanced technology than what the carriers and the regulators are using to support these claims.

The oxygen for telemarketing fraud is the easy accessibility of phone numbers, the sale of which is a big revenue driver for carriers. When a carrier’s numbers are blocked from accessing the PSTN – as a result of a claim labeling them as enabling fraud – the perpetrators will simply move on to another carrier to buy their numbers. During my research, I spoke with Omar Luna, CEO of Voyce Telecom, who described the telecom scamming environment thusly: “The traffic is like water – it goes to the least resistant path. Blocking our numbers doesn’t work, unless the regulators want to shut down the intermediaries. I might go out of business, but the scammers will always follow the easiest, least costly route.”

The legal landscape is equally daunting. I spoke with Michele Shuster, Partner at Mac Murray & Shuster LLP, a law firm that helps businesses be compliant with telecom regulations and defend against TCPA violations. She told me, “Telecom carriers are a major channel for marketers, but it’s become difficult for consumers to distinguish between legitimate and illegitimate offers. The risks are real, not just for consumer fraud, but also for entities connected to TCPA violations. Compliance requirements are complex, and business operators should not underestimate this to protect against harm done by bad actors.”

Conclusion

This is a just peek behind the curtain for understanding the scope of telemarketing fraud, and as a conclusion, I hope you now see why this is much more than a public nuisance. When regulators implicate brands and carriers for TCPA violations, they may be doing exactly the right thing, but just as likely, they’re not getting the bad guys.

Regulatory bodies will levy fines, lawyers will do well and fraud victims will get some degree of compensation, but telemarketing fraud will continue – there are just too many leaks in the dam to eradicate it, and the regulatory framework does not get to the root of the problem

What’s really needed is an industry-based response, where the carriers collectively devise policies and solutions to prevent fraudsters from accessing their phone numbers. Tied to this is the need for better technology – namely AI-based – that can intelligently track call flows at scale to block these calls, but also let legitimate calls pass. Currently, it’s all-or-nothing – either all the calls are allowed through, or they’re all blocked – and since carriers are in the business of routing calls, they’re not terribly inclined to do the latter. That might solve the telemarketing fraud problem, but at the cost of them staying in business.

I’m oversimplifying things here, but the reality is that these problems will not be resolved any time soon. For the foreseeable future, all the roles I cited at the outset above should recognize the risk facing them as the repercussions unfold once consumers file claims with the FCC.

For contact center leaders, mitigating fraud with your customers needs to be viewed right up there with PCI compliance. For CFOs, the financial risks for TCPA violation claims are real, especially since they are open-ended and not fixed. CEOs need to worry about brand reputation management when their company has been tied to a phony scheme like an Amazon gift card scam.

Marketers need to clearly communicate that customers provide informed consent when third-party marketing agencies contact them on their behalf. When consumers don’t read the fine print, consent is implied, giving these agencies free reign to contact them repeatedly, and not just for your legitimate campaign.

Whether you’re buying or selling telephony-related technology, the risk exposure is real, and by the time any legal allegations or claims cross your desk, it’s too late and you’ll need to connect the dots I’ve been talking about here really fast to figure out your next steps. So, the next time you get a shady-sounding call or a voicemail like I did, hopefully, this article will come to mind. Ignore the call – but don't ignore the risk.