Dialer
   HOME

TheInfoList



OR:

A dialer (
American English American English, sometimes called United States English or U.S. English, is the set of varieties of the English language native to the United States. English is the most widely spoken language in the United States and in most circumstances ...
) or dialler (
British English British English (BrE, en-GB, or BE) is, according to Oxford Dictionaries, "English as used in Great Britain, as distinct from that used elsewhere". More narrowly, it can refer specifically to the English language in England, or, more broadl ...
) is an electronic device that is connected to a
telephone A telephone is a telecommunications device that permits two or more users to conduct a conversation when they are too far apart to be easily heard directly. A telephone converts sound, typically and most efficiently the human voice, into e ...
line to monitor the dialed numbers and alter them to seamlessly provide services that otherwise require lengthy National or International access codes to be dialed. A dialer automatically inserts and modifies the numbers depending on the time of day, country or area code dialed, allowing the user to subscribe to the service providers who offer the best rates. For example, a dialer could be programmed to use one service provider for international calls and another for cellular calls. This process is known as prefix insertion or least cost routing. A line powered dialer does not need any external power but instead takes the power it needs from the telephone line. Another type of dialer is a
computer program A computer program is a sequence or set of instructions in a programming language for a computer to Execution (computing), execute. Computer programs are one component of software, which also includes software documentation, documentation and oth ...
which creates a connection to the
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, p ...
or another
computer network A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are ...
over the analog
telephone A telephone is a telecommunications device that permits two or more users to conduct a conversation when they are too far apart to be easily heard directly. A telephone converts sound, typically and most efficiently the human voice, into e ...
or
Integrated Services Digital Network Integrated Services Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the digitalised circuits of the public switched telephone network. Work ...
(ISDN). Many
operating system An operating system (OS) is system software that manages computer hardware, software resources, and provides common daemon (computing), services for computer programs. Time-sharing operating systems scheduler (computing), schedule tasks for ef ...
s already contain such a program for connections through the Point-to-Point Protocol (PPP), such as WvDial. Many
internet service provider An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise priva ...
s offer installation CDs to simplify the process of setting up a proper
Internet connection Internet access is the ability of individuals and organizations to connect to the Internet using computer terminals, computers, and other devices; and to access services such as email and the World Wide Web. Internet access is sold by Internet ...
. They either create an entry in the OS's dialer or install a separate dialer (as the
AOL AOL (stylized as Aol., formerly a company known as AOL Inc. and originally known as America Online) is an American web portal and online service provider based in New York City. It is a brand marketed by the current incarnation of Yahoo! Inc. ...
software does). In recent years, the term "dialer" often refers specifically to dialers that connect without the user's full knowledge as to cost, with the creator of the dialer intending to commit
fraud In law, fraud is intentional deception to secure unfair or unlawful gain, or to deprive a victim of a legal right. Fraud can violate civil law (e.g., a fraud victim may sue the fraud perpetrator to avoid the fraud or recover monetary compen ...
.


Dialing modes

In Call Centers there are several dialing modes depending on how the call is placed. 'Manual Dialing' refers to calls that are placed manually by an agent. There are 4 different dialing modes depending on how software dialers selects the contacts that are going to be called and starts making the calls. Automated dialers such as those sold by Noble Systems,
Avaya Avaya Holdings Corp., often shortened to Avaya (), is an American multinational technology company headquartered in Durham, North Carolina, that provides cloud communications and workstream collaboration services. The company's platform inclu ...
, Ricochet360 (formerly known as Speed To Contact), and Convoso (formerly SafeSoft Solutions) can place calls using *preview*, *power*,
auto dialing Auto may refer to: * An automaton * An automobile * An autonomous car * An automatic transmission * An auto rickshaw * Short for automatic * Auto (art), a form of Portuguese dramatic play * ''Auto'' (film), 2007 Tamil comedy film * Auto (play), ...
, or predictive dialing. The dialing modes are defined according to the campaign and type of business.


Preview

Preview dialing enables agents to first view the available information about the customer and decide when to place the call. In addition to the information about the customer, agents may also view all the history of the customer with the contact center. After viewing the information about the customer, the agent requests the system to make the call. For example, preview dialing is useful in debt collection campaigns to allow agents to view information about the customer and define a strategy before starting to talk to the customer. The system delivers preview calls to agents automatically, taking into account the priority of the call and the skills of the agent to handle the call. Preview dialing keeps agents from dialing calls manually.


Predictive

Predictive dialing is a state-of-the-art pacing mode used to call a large number of customers within a short period of time. Predictive dialing optimizes the time of agents by reducing the idle times between connected calls and freeing agents from dialing calls. Predictive dialing gathers statistics concerning the duration of calls, how long it takes for calls to be answered, and how often are calls answered. When an agent is about to become idle, the system places several calls. Predictive dialing campaigns can achieve agent productivity of 50 minutes per hour and nuisance ratios of 3% or less. The system is continually updating predictive dialing probabilities and monitoring nuisance ratios for performance and compliance with legislation. For example, predictive dialing is useful in sales campaigns to call a large number of contacts and maximizing the working time of agents. The performance of predictive dialing takes into consideration the accuracy of the contact lists and the policies on nuisance calls. If the contact list is poor, the performance of the predictive dialing campaign is at risk as agents are not connected to live contacts and are not able to do business.


Power IVR

Power IVR is used to deliver a pre-recorded message to a large call list. When a call is answered, Power IVR will play the audio file, and then collect touch tone key responses or speech command at the end of the message, and then transfer the call to an agent or remove the caller from the call list. In other words, IVR is a technology that allows a computer to interact with humans through the use of voice and DTMF tones input via keypad.


Voice Drop

Voice drop is same as Power IVR, except it will not wait for the touch tone key responses or speech command at the end of the message, after playing the message, call is dropped, mostly this is used for payment reminders and similar.


Fraudulent dialer

Dialers are necessary to connect to the internet (at least for non- broadband connections), but some dialers are designed to connect to premium-rate numbers. The providers of such dialers often search for security holes in the
operating system An operating system (OS) is system software that manages computer hardware, software resources, and provides common daemon (computing), services for computer programs. Time-sharing operating systems scheduler (computing), schedule tasks for ef ...
installed on the user's computer and use them to set the computer up to dial up through their number, so as to make money from the calls. Alternatively, some dialers inform the user what it is that they are doing, with the promise of special content, accessible only via the special number. Examples of this content include software for download, (usually illegal)
trojans Trojan or Trojans may refer to: * Of or from the ancient city of Troy * Trojan language, the language of the historical Trojans Arts and entertainment Music * ''Les Troyens'' ('The Trojans'), an opera by Berlioz, premiered part 1863, part 189 ...
posing as
MP3 MP3 (formally MPEG-1 Audio Layer III or MPEG-2 Audio Layer III) is a coding format for digital audio developed largely by the Fraunhofer Society in Germany, with support from other digital scientists in the United States and elsewhere. Origin ...
s, trojans posing as
pornography Pornography (often shortened to porn or porno) is the portrayal of sexual subject matter for the exclusive purpose of sexual arousal. Primarily intended for adults,
, or ' underground' programs such as cracks and keygens. The cost of setting up such a service is relatively low, amounting to a few thousand dollars for telecommunications equipment, whereupon the unscrupulous operator will typically take 90% of the cost of a premium rate call, with very few overheads of their own. Users with DSLs (or similar broadband connections) are usually not affected. A dialer can be downloaded and installed, but dialing in is not possible as there are no regular phone numbers in the DSL network and users will not typically have their dial-up modem, if any, connected to a phone line. However, if an
ISDN Integrated Services Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the digitalised circuits of the public switched telephone network. Work ...
adapter or additional analog
modem A modulator-demodulator or modem is a computer hardware device that converts data from a digital format into a format suitable for an analog transmission medium such as telephone or radio. A modem transmits data by modulating one or more c ...
is installed, the dialer might still be able to get a connection. Malicious dialers can be identified by the following characteristics: *A
download In computer networks, download means to ''receive'' data from a remote system, typically a server such as a web server, an FTP server, an email server, or other similar system. This contrasts with uploading, where data is ''sent to'' a remote ...
popup opens when opening a website. *On the website there is only a small hint, if any, about the price. *The download starts even if the cancel button has been clicked. *The dialer installs as default connection without any notice. *The dialer creates unwanted connections by itself and without user interaction. *The dialer does not show any notice about the price (only few do) before dialing in. *The high price of the connection is not being shown while connected *The dialer cannot be uninstalled, or only with serious effort.


Installation routes

Computers running Microsoft Windows without anti-virus software or proper updates could be vulnerable to
Visual Basic Visual Basic is a name for a family of programming languages from Microsoft. It may refer to: * Visual Basic .NET (now simply referred to as "Visual Basic"), the current version of Visual Basic launched in 2002 which runs on .NET * Visual Basic ( ...
-
script Script may refer to: Writing systems * Script, a distinctive writing system, based on a repertoire of specific elements or symbols, or that repertoire * Script (styles of handwriting) ** Script typeface, a typeface with characteristics of ha ...
s which install a
trojan horse The Trojan Horse was a wooden horse said to have been used by the Greeks during the Trojan War to enter the city of Troy and win the war. The Trojan Horse is not mentioned in Homer's ''Iliad'', with the poem ending before the war is concluded, ...
which changes values in the
Windows Registry The Windows Registry is a hierarchical database that stores low-level settings for the Microsoft Windows operating system and for applications that opt to use the registry. The kernel, device drivers, services, Security Accounts Manager, and ...
and sets
Internet Explorer Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly abbreviated IE or MSIE) is a series of graphical web browsers developed by Microsoft which was used in the Windows line of operating systems (in ...
security settings in a way that
ActiveX ActiveX is a deprecated software framework created by Microsoft that adapts its earlier Component Object Model (COM) and Object Linking and Embedding (OLE) technologies for content downloaded from a network, particularly from the World Wide We ...
controls can be downloaded from the Internet without warning. After this change is made, when a user accesses a malicious page or email message, it can start installing the dialer. The script also disables the
modem A modulator-demodulator or modem is a computer hardware device that converts data from a digital format into a format suitable for an analog transmission medium such as telephone or radio. A modem transmits data by modulating one or more c ...
speaker Speaker may refer to: Society and politics * Speaker (politics), the presiding officer in a legislative assembly * Public speaker, one who gives a speech or lecture * A person producing speech: the producer of a given utterance, especially: ** In ...
and messages that normally come up while dialing into a
network Network, networking and networked may refer to: Science and technology * Network theory, the study of graphs as a representation of relations between discrete objects * Network science, an academic field that studies complex networks Mathematic ...
. Users of
Microsoft Office Outlook Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft Office and Microsoft 365 software suites. Though primarily an email client, Outlook also includes such functions as cale ...
,
Outlook Express Outlook Express, formerly known as Microsoft Internet Mail and News, is a discontinued email and news client included with Internet Explorer versions 3.0 through to 6.0. As such, it was bundled with several versions of Microsoft Windows, from ...
and
Internet Explorer Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly abbreviated IE or MSIE) is a series of graphical web browsers developed by Microsoft which was used in the Windows line of operating systems (in ...
are especially affected if running
ActiveX ActiveX is a deprecated software framework created by Microsoft that adapts its earlier Component Object Model (COM) and Object Linking and Embedding (OLE) technologies for content downloaded from a network, particularly from the World Wide We ...
controls and
JavaScript JavaScript (), often abbreviated as JS, is a programming language that is one of the core technologies of the World Wide Web, alongside HTML and CSS. As of 2022, 98% of websites use JavaScript on the client side for webpage behavior, of ...
is allowed and the latest security patches from
Microsoft Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washi ...
have not been installed. In March 2004, there were malicious dialers that could be installed through fake anti-virus software.
E-mail spam Email spam, also referred to as junk email, spam mail, or simply spam, is unsolicited messages sent in bulk by email (spamming). The name comes from a Monty Python sketch in which the name of the canned pork product Spam is ubiquitous, unavoida ...
from a so-called "AntiVirus Team" for example, contained download links to programs named "downloadtool.exe" or "antivirus.exe", which are malicious dialers. Other ways of transmission include electronic greeting cards that link to pages that tricks the user to install
ActiveX ActiveX is a deprecated software framework created by Microsoft that adapts its earlier Component Object Model (COM) and Object Linking and Embedding (OLE) technologies for content downloaded from a network, particularly from the World Wide We ...
controls, which in turn install dialers in the background. Therefore, links in
spam emails Email spam, also referred to as junk email, spam mail, or simply spam, is unsolicited messages sent in bulk by email (spamming). The name comes from a Monty Python sketch in which the name of the canned pork product Spam is ubiquitous, unavoida ...
should never be opened, automatically started
downloads In computer networks, download means to ''receive'' data from a remote system, typically a server such as a web server, an FTP server, an email server, or other similar system. This contrasts with uploading, where data is ''sent to'' a remote ...
should be canceled as soon as discovered, and one should check on each dial-up to the Internet to see whether the displayed phone number is unchanged. Another way to protect oneself is to disable premium numbers through one's
phone A telephone is a telecommunications device that permits two or more users to conduct a conversation when they are too far apart to be easily heard directly. A telephone converts sound, typically and most efficiently the human voice, into ele ...
services, but of course this disables all such services. One should never run foreign code in a privileged environment unless the source is trustworthy. It is also advisable to protect oneself with anti-malware programs.


German regulatory law

On 15 August 2003, a new law came into effect in
Germany Germany,, officially the Federal Republic of Germany, is a country in Central Europe. It is the second most populous country in Europe after Russia, and the most populous member state of the European Union. Germany is situated betwee ...
called "Gesetz zur Bekämpfung des Missbrauchs von (0)190er/(0)900er Mehrwertdiensterufnummern" ("Law for the combat of misuse of (0)190/(0)900 value added service numbers"). The law contains the following regulations: *Forced price notices for service providers. *Maximum price limits, legitimacy checks and automatic disconnects. *Registration of dialers. *Blocking of dialers. *Right of information for consumers from the RegTP. On 4 March 2004 the
German German(s) may refer to: * Germany (of or related to) **Germania (historical use) * Germans, citizens of Germany, people of German ancestry, or native speakers of the German language ** For citizens of Germany, see also German nationality law **Ge ...
Federal Supreme Court in
Karlsruhe Karlsruhe ( , , ; South Franconian: ''Kallsruh'') is the third-largest city of the German state (''Land'') of Baden-Württemberg after its capital of Stuttgart and Mannheim, and the 22nd-largest city in the nation, with 308,436 inhabitants. ...
decided that fees for the usage of dialers do not have to be paid if it was used without the user's knowledge.


United Kingdom regulatory law

In December 2016, Ofcom (The Office of Communications) announced changes to their call centre regulations. These focused on the persistent use of dialers to make call to residential telephone numbers. They also added extra clarity to how call centres should approach the issue of silent and abandoned calls.https://www.ofcom.org.uk/phones-telecoms-and-internet/advice-for-consumers/problems/tackling-nuisance-calls-and-messages/abandoned-and-silent-calls Abandoned and silent calls Ofcom, now also regulate how abandoned call messages should work. A message should now state the company name, reason for calling but importantly not be used as an opportunity to market the business. https://bluetelecoms.com/staying-compliant-in-2018-abandoned-call-messages/ Staying compliant in 2018 - Abandoned Call Messages


See also

* Predictive dialer System for dialing many numbers, typically used by call centers *
War dialing Wardialing (or war dialing) is a technique to automatically scan a list of telephone numbers, usually dialing every number in a local area code to search for modems, computers, bulletin board systems ( computer servers) and fax machines. Hac ...
Automatically scanning a list of telephone numbers to detect computers, usually for nefarious purposes *
Dialer management platform A dialer management platform (DMP) is used to dynamically update the information held within a least cost routing dialler. The dialler is programmed to call into the DMP periodically, when it does it can supply the service provider with informati ...
*
XXXDial XXXDial is a spyware/ dialer application which created a number of problems for UK internet users in December 2004. It changes a victim's point-to-point protocol (PPP) settings so that it automatically tries to reconnect to a premium rate number, ...
— historical example of dialer/
spyware Spyware (a portmanteau for spying software) is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their priv ...


References

{{Reflist Telephony Types of malware