IAB EY Report
IAB EY Report
untrustworthy supply
chain costing the US
digital advertising
industry?
IAB US benchmarking study
November 2015
Table of contents
Study background 1
Key findings 3
Infringed content 4
Malvertising+ 16
Invalid traffic 26
ii
Study background
In 2015, the Interactive Advertising Bureau (IAB) The research methodology for the study included:
commissioned EY’s Media & Entertainment Advisory
practice to perform a comprehensive study that estimated • Study of studies — We assessed a number of studies
the cost impact of an untrustworthy digital advertising that other organizations have conducted in relevant
supply chain in the US. MediaLink, a strategic consulting supply chain areas over the last several years. We have
firm, assisted the IAB in organizing and administering referenced key reports to estimate certain costs.
the study. • Voice of the industry — We selected and contacted 90
A supply chain is a complex economic system of people, supply chain companies, including both publishers and ad
processes and resources from different companies tech companies, to complete a comprehensive 13-page
involved in moving a product from the start of the system questionnaire that included qualitative and quantitative
through the delivery to the consumer. For the purposes areas. Of the 90 contacted, 30 companies completed the
of this study, we considered the digital advertising supply questionnaire.
chain (i.e., moving an advertising creative through the • Data analytics — For several specific areas, we obtained
internet until it reaches a consumer’s browser) and the data directly from third-party measurement and analytic
digital media supply chain (moving content through the organizations to estimate certain costs.
internet until it reaches a consumer’s browser).
EY conducted this study independently on behalf of the
The IAB wanted to better understand the impact of IAB. EY did not audit the information provided to us and
deliberate activities designed to exploit the current state provides no opinion or other forms of assurance with
of the supply chain for illicit gain. It also wanted to know respect to the report’s findings.
more about the repercussions of unintentional activities
by businesses that have put digital advertising as a Finally, we wish to say thank you and express our gratitude
legitimate business in jeopardy. to the following IAB sponsors of this study:
EY conducted part one of the study between March and Premier Supporting Participating
September 2015. This included areas that have a high AppNexus PubMatic OpenX
degree of illegal activity — infringed content, malvertising MediaMath Xaxis PulsePoint
and invalid traffic. We will undertake part two of the study Rocket Fuel Inc. YuMe Videology
in early 2016, when we will focus on media transparency,
reputational impact and brand safety.
Based on the results of phase one of the survey, EY has:
1. I dentified areas of corruption in the digital
advertising supply chain
stimated the commercial cost impact to
2. E
the ecosystem
1
Cost impact summary — $8.2b*
Ma
fic
raf
lve
Invalid t
Cost rtisi
summary Types of ng+
by type corruption
Incurred costs
$4.8b
Inf n t
estimated cost
ring conte
ed
59%
Lost revenue
opportunity costs Cost impact — $2.5b/31%
• Lost ad and pay-for-content revenue: $2.4b (page 8)
$3.4b • Lost revenue from password sharing: $48m (page 12)
estimated cost • Cost to fight: $33m (page 14)
41%
Note: The page numbers above contain a detailed explanation of our estimation approaches.
2
Key findings
• Each studied category has an estimated cost impact above • At $2.4 billion, infringed content represents the most
$1 billion. Individually, they represent significant costs to significant portion of lost revenue opportunity costs. One
the industry that should not be ignored. However, as each key feature that drives consumers to infringed content is
category can be interrelated, they need to be considered the desire and ability to access recently distributed content
collectively and equally when being addressed by the at no direct cost in the convenience of their homes. It
industry. An excellent example is a consumer who visits is hard to say what the impact would be to distribution
an infringed content site containing malware that infects channels if access were eliminated. Would consumers
the consumer’s browser with a robot that is later used turn to ad-supported or pay-for-content channels? How
to drive invalid traffic. If the industry can eliminate the many would actually become paying customers? There’s
profits earned by serving ads next to infringed content, it no conclusive way of knowing. However, our approach
can reduce the amount of money available to drive illegal suggests a potential advertising revenue increase of $456
activities in the supply chain. It also has the opportunity to million and a potential pay-for-content revenue increase
disrupt the corruption life cycle related to invalid traffic. To of $2 billion for the industry. The $2 billion represents
help the industry reclaim some of the $8.2 billion in costs, approximately 21 million US consumers who would be
EY believes that an improvement in some fundamental willing to spend $8 a month on what is currently classified
practices, such as knowing your business partners and as infringed content. Unless the industry collectively takes
investigating new relationships using address information, significant steps, there is a likelihood that the number of
tax IDs and background checks, is critical. infringed content consumers will continue to increase.
Improving technology and bandwidth that make it easier for
• At $4.4 billion, costs to advertisers from invalid traffic
consumers to obtain content, aids to protect the anonymity
represent the most significant portion of incurred costs.
of users, and an increasing culture of moral acceptance
In terms of distribution, 70% of the costs relate to
by consumers are all contributing factors. At the same
performance-based pricing models, such as cost-per-click
time, it is becoming increasingly difficult for consumers to
(CPC) and 30% relate to cost per month (CPM) based pricing
determine whether content is truly infringed. And even if
models’ costs. Related to consumer consumption, currently
they can tell the difference, they have a diminishing fear of
72% of the costs are from desktop and 28% are from
legal repercussions.
mobile. We also noted a range of rates (e.g., CPM-based
mobile video has a 12.1% invalid traffic rate while CPM- • The remaining areas representing 16% of the total are
based display desktop has a rate of 6.6%). As the digital estimated at $1.4 billion. These areas include the cost to
advertising industry continues to be dynamic related fight illegal activities, lost revenue from password sharing,
to pricing models, consumer consumption by delivery lost revenue from search engine blacklisting when a website
platforms and pricing by ad units, assessing the invalid is impacted by malware and lost revenue from malware-
traffic costs to advertisers, should holistically consider related ad blocking.
the rapid changes to business and fraud approaches.
3
Infringed
content
4
Infringed content landscape
Ad injection P2P community
This is a toolbar or adware that alters the site HTML A peer-to-peer (P2P) community
prior to the browser rendering a served impression. allows users to browse for files on
Primary revenue: Advertising websites linking to content hosted
Major content: Display content by other connected computers
or servers via a peer-to-peer
distribution system.
Embedded streaming
games, text and TV programs
5
Comprehensive description • P2P community. This allows users to browse for files on
websites that link to content hosted by other connected
Online digital piracy is the illegal practice of using the computers or servers via a peer-to-peer distribution system.
internet (via mobile, PC or other device) to access infringed Users can generally download the desired content files for
content via websites and peer-to-peer networks. Content free as the communities are largely ad-supported, although
may include videos, live events, music, video games, text, some also accept donations from users for financial support.
software and applications. From a business perspective, The industry should pay special attention to newer infringed
copyright infringement operators generate revenue through content distribution platforms that combine P2P and
advertising, subscriptions, donations and transactions. streaming characteristics and allow users to access video
and music content using a clean and legitimate-looking
Broad digital infringed content categories include:1
application. These platforms differ from traditional P2P
• Ad injection. This is a toolbar or adware that alters the site platforms in that they stream as components are delivered
HTML prior to the browser rendering a served impression by other P2P participants rather than assembling a chosen
without permission or compensation to the website or file first and then storing it on a user’s PC hard drive.
content owner. • Storefront community. In a storefront community, users
• Embedded streaming. Embedded streaming offers a can purchase and download digital media from the site’s own
hosting site where users can upload and directly stream servers. These sites are generally ad-supported or fee-based.
video content. Generally, these sites are financially • Subscription community. Subscription communities allow
supported by digital advertising, subscriptions and users to browse for files on websites linking to content
donations. hosted by other connected computers or servers via a P2P
• Freemium community. Freemium communities give users distribution system. They provide links or direct downloads of
access to P2P links or direct downloads of curated digital curated digital media content (with the exception of free-to-
media content for free. They also enable users to pay or air and pay TV) typically for a subscription fee. Alternatively,
contribute content to the site for additional content access these communities may be ad-supported.
and/or quality. • VPN and proxy piracy. VPN and proxy piracy enables users
• Live TV streaming. Live TV streaming provides links to access content illegally by giving global users access to
to direct streams of live free-to-air and pay-per-view certain US-based digital content illegally (e.g., video content
TV, including sporting events. These sites are largely from OTT services) by paying the subscription fee and then
ad-supported, although some also accept donations bypassing geolocation restrictions. This corruption area is
from users for financial support. exacerbated by complicated video licensing agreements in
which a legal OTT service will have a different content library
depending on the country.
1. The six business models for copyright infringement — A data-driven study of websites considered to be infringing copyright, a Google and PRS for Music
commissioned report with research conducted by BAE Systems Detica, 27 June 2012.
6
Infringed content
Key drivers of infringed content Industry initiatives to combat
Factors that impact the growth of infringed content infringed content
consumption can be divided into two groups:
To fight back, some current industry initiatives include:2
• Infringed content site factors:
• Participate in the Association of National Advertisers
• Profitable with a low cost of entry (ANA) and American Association of Advertising Agencies’
• W
ell-organized business models that new entrants can (4A’s) Statement of Best Practices to Address Online Piracy
easily replicate and Counterfeiting. These leading practices recommend
• A
n expanding digital universe that brings more potential that marketers and their agencies include the following
consumers who may use the infringed content market for conditions in media placement contracts and insertion
some of their own content orders with ad networks and other intermediaries involved
in their US-originated digital advertising campaigns on both
• I mproving bandwidth that makes it easier for certain
infringed content approaches domestic and foreign internet sites:
• A
growing acceptance of infringed content use by • All such intermediaries shall use commercially reasonable
consumers measures to prevent ads from being placed on those sites
dedicated to the infringement of the intellectual property
• An increasing number of support-oriented companies rights of others because they have no significant, or only
that provide tools to users limited, use or purpose other than engaging in, enabling
or facilitating such infringement.
• Infringed content user factors:
• All such intermediaries should implement commercially
• Increasing demand for content without waiting for a reasonable processes for removing or excluding
release or the next episode such sites from their services and for expeditiously
• Desire for lower content costs terminating noncompliant ad placements in response to
reasonable and sufficiently detailed complaints or notices
• Desire to access content remotely
from rights holders and advertisers.
• Improving technology and bandwidth making it easier to
• All such intermediaries should refund or credit the
obtain infringed content
advertiser for the fees, costs and/or value associated
• Resistance to paying for content with advertisements with noncompliant ad placements or provide alternative
• Easy availability of tools that protect the anonymity of remediation.
infringed content users • Participate in best practices for ad networks to address
• An increasing culture of moral acceptance built on years piracy and counterfeiting, which recommends ad networks:
of receiving a high degree of free content in other areas • Maintain policies that prohibit websites dedicated to
• Difficulty identifying whether content is truly infringed selling counterfeit goods or engaging in copyright
piracy from participating in the ad network’s advertising
• Lack of fear of legal repercussions
programs.
• Maintain and post the best practices guidelines on the ad
network’s website.
• Include in ad network policies language indicating that
websites should not engage in violations of law.
2. Statement of Best Practices to Address Online Piracy and Counterfeiting, The Association of National Advertisers (ANA) and the American Association of Advertising
Agencies (4A’s), 3 May 2012.
7
• Participate in an ongoing dialogue with content creators, For DAAPs to achieve TAG certification, companies must
rights holders, consumer organizations and free speech demonstrate they can provide their advertising ecosystems
advocates. (agencies and advertisers) with tools to limit their exposure
• Agree to be certified against the inventory quality to undesirable websites or other properties. They must also
guidelines from the Trustworthy Accountability Group meet one or more of the established Core Criteria for Digital
(TAG). Alternatively, maintain independent quality Advertising Effectiveness. These criteria include:3
assurance vetting and auditing processes and work to
• Identifying ad risk entities (AREs). This involves assessing
support such measures across the industry.
and identifying websites or other media properties that
• Accept and process valid, and sufficiently detailed, have a discernible risk of enabling the unauthorized
notices from rights holders or their designated agents
or illegal distribution of copyrighted materials and/or
regarding infringed content websites that may be
counterfeit goods.
participating in the ad network. Upon receipt of a valid
notice, perform an appropriate investigation into the • Preventing advertisements on undesired ad risk entities.
complaint. Take appropriate steps, such as requesting Advertisers and agencies need to be able to restrict the
the website no longer sell counterfeit goods or engage in display of their advertising on undesirable sites or other
copyright piracy, cease to place advertisements on the media properties that do not meet each advertiser’s or
website, or remove the website from the ad network. agency’s standards.
• Participation in the Digital Assurance Advertising Providers • Detecting, preventing or disrupting fraudulent or deceptive
(DAAPs) certification program of TAG. This program is for transactions. This means implementing protocols and
those ad networks and other intermediaries involved in US- capabilities to find and limit ad placements on AREs that
originated digital advertising campaigns on both domestic use fraud or deception to avoid the standards set by the
and foreign internet sites. advertiser or agency.
• Monitoring and assessing the compliance of ad placements.
This includes detecting and reporting AREs that are not in
their ads are fueling the • Eliminating payments to undesired ad risk entities by using
technology and protocols to prevent payments to undesired
profits of the pirate sites.” sites and other media properties.
This program was officially launched in February 2015. As of
John Montgomery, GroupM Connect North America October 2015, no DAAPs are TAG certified.
Chairman, interviewed by Beet.tv,
16 September 2015.
3. Core Criteria for Effective Digital Advertising Assurance, Trustworthy Accountability Group, https://tagtoday.net/wp-content/uploads/2015/02/
Core-criteria_final.pdf, accessed November 2015.
8
Infringed content
Cost impact to industry Estimation approach 1: We utilized the following May 2015
usage metrics obtained directly from an analytics company
Infringed content segmentation that measures websites for purposes of identifying content
infringement related to movies, television and music:
There are four main types of digital infringed content sites:
1) direct download (DDL) sites; 2) linking sites; 3) P2P sites;
DDL Linking sites P2P Video
and 4) video streaming host sites.
streaming
In terms of estimating the cost impact, we obtained usage
data (e.g., number of downloads, unique visitors or unique 16,371,716 36,020,713 18,111,399 12,454,597
IPs) from three different sources and then applied certain rate
data (e.g., CPMs or monthly pay-for-content costs) under the The analytics company calculated the usage (surrogate for a
two principal revenue models (i.e., ad revenue model and a monthly unique visitor reach) metrics above by multiplying
pay-for-content model). For the monthly pay-for-content cost, a monthly global reach estimate (per million users across all
we used $8. This represents the additional revenue obtained sites in each category) by the estimated number of global
if infringed content was 100% eliminated. The additional internet users of 3,188,000,000 by the percentage of US
revenue could come from monthly streaming service, direct users divided by 100.
downloads of music or videos from an online store, purchased We multiplied the usage data above by an estimated monthly
video on demand, an additional cable box adapter or a ticket cost of $8 by 12 months (replicating the annual revenue from
to the movie theater. a pay-for-content revenue model) to calculate the following:
Often, consumers are attracted to infringed content
distribution channels because of the immediate access to DDL $1,571,684,736
recently distributed media, such as a new movie, song or
television series. We used multiple sources and approaches Linking $3,457,988,448
to triangulate the cost impact range to the industry. Our P2P $1,738,694,304
goal was to estimate the potential revenue that could be
earned if this content usage data was consumed at legal sites Video streaming $1,195,641,312
as opposed to infringed sites. For example, DDL sites are
Total estimated revenue $7,964,008,800
generally subscription-based with minimal advertisements. As
a result, we treated the DDL content as a legitimate channel
and assumed some banner and video ad impression activity. The analytics company also provided the following May 2015
estimated visits. These were defined as an entry to a web
domain from a different web domain or from the beginning of
an empty browsing session which expires after 30 minutes of
inactivity:
9
We calculated the banner ad revenue below assuming an advertising revenue that year.7 The goal of the MediaLink
$11.35 CPM4 for 12 months (to annualize the May 2015 data studies was to estimate the revenue and profit earned at
obtained) for one viewed impression per visit (a conservative the top infringing content study. For this study, we used the
assumption). The video/audio ad impression revenue volume metrics and then assumed commensurate CPMs were
estimated below assumes: a) a $21.28 CPM5 for each visitor earned for the content involved (i.e., normal CPMs for quality
(uses the usage metric above) to a content hosting site; b) an content as opposed to low-dollar CPMs, which the infringing
average usage of four times a week for 12 months; c) three content sites typically earn).
ad units viewed per half hour; and d) an average of a full hour
of consumption based on the content (e.g., movies, television DDL Linking sites P2P Video
programming). streaming
4. IAB internet advertising revenue report: 2014 full year results — April 2015, IAB, http://www.iab.com/wp-content/uploads/2015/05/IAB_Internet_Advertising_
Revenue_FY_2014.pdf, accessed November 2015.
5 . Ibid.
6. Good Money Still Going Bad: Digital Thieves and the Hijacking of the Online Ad Business, Digital Citizens Alliance, https://media.gractions.com/
314A5A5A9ABBBBC5E3BD824CF47C46EF4B9D3A76/298a8ec6-ceb0-4543-bb0a-edc80b63f511.pdf, accessed November 2015.
7 . Ibid.
8. IAB internet advertising revenue report: 2014 full year results — April 2015, IAB, http://www.iab.com/wp-content/uploads/2015/05/IAB_Internet_Advertising_
Revenue_FY_2014.pdf, accessed November 2015.
10
Infringed content
revenue estimated below assumes (a) a $21.28 CPM9 for each We calculated the banner ad revenue below assuming an
visitor (uses the usage metric above) to a content hosting site; $11.35 CPM12 for one viewed impression related to each
(b) the usage is an average of four times a week for 12 months; download (a conservative assumption). The video/audio ad
(c) there are three ad units viewed per half hour; and (d) an impression revenue estimated below assumes a $21.28
average of a full hour of consumption based on the content. CPM13 be applied to the P2P downloads considering a likely
number of spots for the media type (e.g., three ad units
Banner Video/audio for a 30-minute TV show, 12 ad units for a 2-hour movie
ad revenue ad revenue Total ad and six ad units for an hour of audio play). For example, the
on sites on sites revenue
$33,362,912 estimated video ad impression revenue for TV
DDL $26,095,920 $91,375,571 $117,471,491 was calculated by dividing 522,600,000 downloads by 1,000
and then multiplying it by a CPM of $21.28 per ad unit and
Linking $24,897,360 $60,180,180 $85,077,540
then multiplying it by three spots per hour.
P2P $52,273,560 $130,611,737 $182,885,297
Banner Video/audio
Video $25,891,620 $57,143,439 $83,035,059 ad revenue ad revenue Total ad
streaming on sites on sites revenue
9. Ibid.
10. Regional Internet Registries Number of IP Addresses Per Country, BGP Expert, www.bgpexpert.com/addressespercountry.php, accessed September 2015.
11. Internet Usage and 2015 Population in North America, Internet World Stats, www.internetworldstats.com/stats14.htm, accessed September 2015.
12. IAB internet advertising revenue report: 2014 full year results — April 2015, IAB, http://www.iab.com/wp-content/uploads/2015/05/IAB_Internet_Advertising_
Revenue_FY_2014.pdf, accessed November 2015.
13. Ibid.
11
EY summary To calculate our final rounded estimate, we applied a 70% and
30% weight to the midpoint of the ad-supported and pay-for-
Our goal was to estimate the potential revenue that content model, respectively.
companies could earn if the industry eliminated infringed The ad-supported revenue model represented $456,144,899
content distribution channels and diverted the content of our final estimate, whereas the pay-for-content revenue
usage data and consumption to legal distribution channels. model represented $1,989,585,893 (this component of
Immediate access to recently distributed media is a key the calculation represents approximately 21 million US
driver that propels consumers toward infringed content. If consumers spending $8 per month under a pay-for-content
the industry eliminated access to the free infringed content, model with the elimination of infringed content).
consumers would likely look to different channels to fill their
We used a 30% weight for the pay-for-content model for
void. However, we cannot definitively determine the exact
conservative purposes because the price elasticity for this
mix between ad-supported and pay-for-content revenue
area is not known (i.e., quantity demand decreases as price
models (we used a 70-30 split for our calculations). As such,
increases, and it is not known absent the availability of free
to estimate the cost impact across the four categories, we
infringed content how many consumers would become a
calculated a low end, midpoint and high end under our two
paying customer).
revenue models:
To assist in evaluating the different quantity metrics above,
Pay-for-content revenue model we note the following:
• Data. Approach 1 sources provided a monthly average as
Users consuming
Dollar value infringed content* of May 2015 based on March, April and May. In Approach 2,
MediaLink provided a monthly average as of Q3 2014.
Low end $4,992,668,256 52,000,000 Approach 3 sources provided 2014 data.
Midpoint $6,631,952,976 69,000,000 • Coverage. Approach 1 sources measured tens of thousands
of sites. In Approach 2, MediaLink focused on the top
High end $8,271,237,696 86,000,000
596 infringing sites based on removal request data from
*Note: With our data sources, we were unable to de-duplicate a search engine transparency report. Approach 3 sources
individuals across segmentation (e.g., one individual included a P2P census capturing the majority of that
may consume content from P2P, DDL, linking and video universe.
streaming). As a result, the exact number of infringed content • Measurement. Approach 1 sources used Alexa data.
consumers may be lower. In Approach 2, MediaLink used comScore, Integral Ad
Science, Veri-Site and Incopro. Approach 3 sources did not
Ad-supported revenue model use any additional measurement data.
Dollar value
Midpoint $651,635,571
12
Infringed content
VPN piracy and password sharing • VPN server users skew younger (27% of ages 16 to 24
and 36% of ages 25 to 34 vs. 11% of ages 55 to 64), male
Consumers are able to illegally access digital content through (31% of males vs. 21% of females) and upper income (38%
password sharing. In some cases, this action is compounded of top quarter of income group vs. 27% of the bottom
when consumers bypass their actual geolocation by using a quarter of income group).
virtual VPN located in another geolocation. A negative side
effect of VPN usage is the accuracy impact to some passive According to a recent research report from Parks Associates,
digital measurement approaches, as well as country-based the practice of password sharing will cost the subscription
digital ad targeting. Absent a change to complex content video-on-demand (SVOD) industry more than $500 million
agreements, the corruption impact is likely to grow as servers worldwide in 2015. Six percent of US broadband subscribers
become more accessible, bandwidth strength increases and indicated they access a subscription OTT video service paid
global internet access penetration increases. for by someone outside their home.15
To estimate the cost impact, we used publicly available studies To estimate the cost impact of password sharing to the SVOD
or certain estimates quoted publicly. According to research industry in the US, we considered the following:
issued by GlobalWebIndex in the first quarter of 2015 (32 • Consumer price elasticity is not known (e.g., quantity
countries were measured):14 demand decreases as price increases, and it is not known
how many consumers would become a paying customer if
• 51% of users cited access to better entertainment content
they are currently accessing content for free).
as the number one reason for VPN usage. Many of the
other reasons related to anonymity and accessing restricted • OTT services likely already consider password sharing when
sites; however, the 7th overall reason at 22% was to access establishing their pricing strategy (e.g., monthly fee can
restricted download sites such as torrent sites (which are increase based on the number of concurrent streams).
generally used to obtain infringed content). As a result, we conservatively applied a 9.58% factor
• The highest percentage of users of VPN/proxy servers at (this factor represents the approximate percentage of
35% live in Latin America. EY considers these estimates people connected to the internet who live in the US) to the
relevant to the infringed content assessment in the US media $500 million from the Parks Associates global estimate to
market because of the growing number of people migrating calculate an estimated rounded cost impact of $48 million for
from Latin America to the US. It is possible that some family the US only.16
members remain behind and can access content remotely
EY was unable to obtain an estimate on the impact of VPN
using a VPN and a shared password.
and proxy pirates.
• There are approximately 28 million VPN server users
in the US. This puts the US in a tie with Brazil for third
place in terms of VPN server users. Only China at 157
million and India at 45 million have higher numbers of
users. EY considers these estimates relevant to infringed
content assessment in the US media market because these
individuals tend to use these servers to access torrent sites
to obtain infringed content.
14. Jason Mander and Felim McGrath, “VPNs and Proxy Servers,” GlobalWebIndex, http://www.globalwebindex.net/, accessed November 2015.
15. OTT Password Sharing Will Impact Pay-TV Network Revenue, Too, Parks Associates, www.parksassociates.com/blog/article/ott-password-sharing-will-impact-pay-tv-
network-revenue, accessed September 2015.
16. Internet Users by Country (2014), Internet Live Stats, http://www.internetlivestats.com/internet-users-by-country/, accessed September 2015.
13
Cost to fight Attitudes from publishers and ad tech organizations
The Digital Millennium Copyright Act (DMCA) is a US law that As it relates to our “voice of the industry study,” the combined
provides qualifying online service providers with a safe harbor publisher and ad tech responses identified strong support
from monetary liability for copyright infringement claims. One related to combating the issue of infringed content:
of the requirements of these safe harbor provisions is that
• 99% of respondents indicated that the placement of
the service provider remove or disable access to allegedly
advertising on sites hosting infringed content hurts the
infringing material upon receiving a request that meets
digital advertising ecosystem.
certain requirements.
• 99% say that the ad tech companies have a responsibility to
In January 2015, TorrentFreak, an online news publication
eliminate advertising on sites hosting infringed content.
dedicated to infringed content, reported that copyright
holders asked one search engine to remove more than • 99% suggest that advertisers care whether their ads appear
345,169,134 allegedly infringing links from its search engine on sites that include mainstream infringed content.
in 2014 — a 75% increase compared to the previous year.17
The overwhelming and rapid increase of takedown requests
has led content owners to rely on technology (e.g., bots),
including those used by outside agencies, to scan the internet
“It is largely useless …
for infringed content. where illegal links that
To estimate the cost impact of DMCA takedown requests,
we applied a 9.58% factor (representing the approximate are taken down reappear
percentage of people connected to the internet who live in
the US) to the 2014 requests of 345,169,134 and multiplied
instantaneously. The
it by $1 per request to estimate an overall industry estimated
rounded cost of $33,000,000.18
result is … both costly and
We conservatively selected a cost of $1 per request for increasingly pointless.”
our estimate because actual costs are not available. It also
Cary Sherman, Recording Industry Association
has been reported that for many companies, the process
of America Chairman and CEO, “Valuing Music
is automated.
in a Digital World,” Forbes.com, accessed
September 2015.
17. Google Asked to Remove 345 Million ‘Pirate’ Links in 2014, TorrentFreak, https://torrentfreak.com/google-asked-remove-345-million-pirate-links-2014-150105/,
accessed September 2015.
18. Ibid.
14
Infringed content
Furthermore, the study results for the ad tech respondents
indicated that their attitudes and initiatives were moving in “Internet usage
the right direction to combat infringed content:
• 100% indicated that their organization includes
continues to grow at a
commitments in their contracts not to purchase inventory rapid pace, and with it,
so does internet-based
on sites with infringed content.
• 99% said that their organization performs measures aimed
at excluding sites with infringed content in response to
reasonable and sufficiently detailed complaints from
infringement.”
copyright holders and advertisers. David Price, NetNames Director of Piracy
• 81% noted that their organization performs measures Analysis, “Sizing the piracy universe,” NetNames,
specifically aimed at removing or excluding sites with September 2013.
infringed content from platforms that use fraud or
deception to avoid the requirements set by the advertiser
or agency.
• 79% indicated that their organization’s leadership is against
advertisements being served to sites with infringed content.
• 79% said that they have witnessed their staff discussing
concerns regarding advertisements appearing on sites with
infringed content.
• 42% suggested that their organization has designated
an individual or role responsible for mitigating risk of ads
appearing on sites with infringed content.
15
Malvertising+
16
Malvertising+
threat landscape
Malvertising+ How an attacker
Delivery methods views the landscape
• Deceptive download: tricked into download
• Drive-by download: unintended software download Creating fraudulent content
1
(fraudulent ads, fraudulent agencies,
• Link hijacking: redirection to unintended site
drive-by download ads, deceptive
• Watering hole: targeted drive-by download download ads, bad scripts, spyware,
ransomware, scareware, viruses)
Uses and purpose
• Ad bot creation: uses infected machine for ad fraud
Altering good content (code injection,
• Nuisanceware: adds unwanted features 2
link hijacking, repository compromise)
• Ransomware: alters system until payment is made
• Scareware: scares user to pay for unneeded “fix”
• Spyware: collects consumer activity without consent Content mining (cookie hijacking,
3
• Virus/infection: has ability to use consumers’ device watering hole targeting)
Computer
Third parties 1 2 3
1 1 1 1 2 2 2
2 2 2 2 3 3
3
Advertiser Agency DSP Exchange SSP Network Publisher
Data aggregators 3
17
Comprehensive description The following are broad malware categories based on
delivery methods:
Malvertising+ (from “malicious advertising”) uses the digital
• Link hijacking results in an advertisement or script
advertising ecosystem to inject malware onto consumers’
automatically redirecting users to a website that they have
devices, where the digital advertising ecosystem includes ad
not decided to visit. These sites then often deliver malware
content (malvertising from malicious advertising). The “+”
to a consumer’s browser.
in the term malvertising+ refers to compromised third-party
scripts intended for measurement or related purposes. • A drive-by download advertisement or script leads users
Malvertising+ refers to the potential distribution of malware to unintentionally download software to their device
across a larger population of consumers by compromising without their knowledge.
a single advertisement or script than would be possible • A watering hole attack is similar to a drive-by download
through compromising a single website or content source. advertisement or script. However, it targets a specific
The sites themselves are generally not infected; instead, the audience, drawing users to a site where they have a shared
malware arrives through infected ad content or compromised interest or pattern of visitation that has been designed to,
third-party scripts delivered to the browser along with the or compromised to, deliver the malware to the consumer’s
website content. device.
In addition to malvertising+, other malware approaches • A deceptive download advertisement or script attempts to
include phishing emails, social media and content separated lure users to authorize a download without understanding
from any advertising. These are outside of the scope of the consequences. For example, a Trojan Horse can
this study. disguise itself as a legitimate program and provide remote
In the two categories that follow (based on delivery method access to carry out malicious activities (e.g., generate ad
and purpose), the lists pertain to all forms of malware, impressions, relay spam, steal data and monitor activity).
including malvertising+. In the first three categories, the user does not need to click
on the advertisement to be infected. The need to click on the
malware to become infected is a common misconception.
the public.
• Ransomware alters the user’s system (e.g., locking the user
out) and then displays a message demanding payment to
return the system to the previous state.
• Scareware is software that appears legitimate (e.g., tool to
fix the user’s PC). However, when it runs, it informs the user
(attempting to scare) of an issue and asks for payment in
return for fixing the issue.
• Nuisanceware adds unwanted or unintended features to a
user’s PC (e.g., toolbars, widgets, etc.).
18
Malvertising+
• A virus infects the user’s device and takes over part or all of or real-time bidding systems to further target consumers
its functions for malicious purposes (e.g., relay spam, harm with specific operating systems, browser versions, Flash
computers, steal data and monitor activity). versions, geographic locations, or IP addresses that may
indicate residential, university or corporate users, and
• Ad bot creation uses the infected machine as a bot for
potentially the institution or business the consumer is
impression and click fraud.
within; 5) launching attacks on weekends or holidays
The following are ways malvertising+ can be established: when it is likely ad operations personnel are away from
the office or will take longer to respond to malware
• Creating fake advertisers or advertising agencies that attacks; and 6) embedding malware in HTML headers, and
pretend to represent legitimate clients in a buy. steganographically embedding malicious code fragments
• Gaining access to a library of affiliate marketing ad in image and SWF files that are linked together to form an
creatives and hijacking them to deliver malware. attack string at run time.
• Compromising third-party scripts delivered with the ad or To fight back, some key preventive measures include:
page content that are intended for measurement or related
purposes. • Using ad-serving tools and controls that can scan the
creative to detect and disable injected or unintended code
• Attaching malware to a selected download that appears
(i.e., malware) before allowing ads to launch. This would
legitimate to the consumer.
entail scanning Flash or JavaScript files, either manually
For several of the methods listed above, nefarious malware or by using sites that provide malware scanning tools.
attackers use malware delivery kits (available for relatively Companies should run these analyses on systems outside of
inexpensive price via the web) and advertising to infect a their system to prevent infection of their internal systems
consumer’s device. and to prevent the identification of the environment as
a test environment in which the malware should remain
Malvertising+ is able to exist and prosper in an ecosystem hidden and dormant.
for many reasons, including:
• Evaluating business partners, including advertisers,
• Not prioritizing security within the creative quality agencies and third parties with whom companies work
assurance function, or having insufficient tools and (background checks, credit checks, etc.), to determine if
resources to fight it. they are reputable and legitimate companies.
• A single weak link in the digital advertising ecosystem that • Assessing third-party tech partners’ diligence regarding
can be compromised to inject malware. their evaluation of business partners, internal security
framework, and quality assurance over ad content and
• Traditional PC defenses like antivirus and other tools are
scripts received from partners.
unable to determine in time whether a compromised third-
party script or advertisement, such as a Flash-powered • Identifying and closing holes on sites or internal systems.
banner ad (which is not defined as malicious itself), is simply • Reporting business partners involved in the ad-serving
serving ad content or something more sinister. transaction that handle the ad content or provide third-
• Attackers who use tactics to slip past the filtering systems. party scripts in support of the transaction to the advertiser
This may include: 1) enabling the malicious trigger after a and agency.
delay of several days following the approval of the ad; 2) • Finding a way for the good actors in the industry to share
only serving the bad ad or script to every nth consumer; information to help reduce the level of malvertising+.
3) targeting to, or away from, specific consumers based on
identifier information such as IP address, operating system,
browser and other parameters; 4) leveraging programmatic
19
Cost impact to industry Cost to fight
19. Leigh Metcalf and Jonathan Spring, “Blacklist Ecosystem Analysis Update: 2014,” Carnegie Mellon University/Software Engineering Institute,
http://resources.sei.cmu.edu/asset_files/WhitePaper/2015_019_001_428614.pdf), accessed November 2015.
20
Malvertising+
As it relates to blacklisting, our voice of the industry For purposes of estimating the cost impact of blacklisting, our
study noted the following: study was interested in legitimate websites whose businesses
were impacted by a malware security incident. During 2014,
As it relates to the cost impact of a US-based nonprofit anti-malware organization received
20. Small Business at a Glance, Entrepreneur.com, http://www.entrepreneur.com/page/216022, accessed September 2015; EY analysis.
21
Blacklisting Ad blocking related to malvertising+
listing, behavior analysis, installation, such as Chrome, Firefox and Opera. Conversely,
ad blocking is very low on pre-installed browsers like Internet
22
Malvertising+
As it relates to ad blocking, our voice of the industry For purposes of estimating the cost impact of ad blocking
study noted the following: related to malvertising+, we calculated an estimated cost
of $781,000,000 as follows:
49%
of the companies in the study indicated that
they measure the level of ad blocking at their was $209.09 based on 2014 digital ad spend
websites or via their platforms for the ad of $49.5 billion divided by 236,739,760
technology companies. (279,834,232 US digital population multiplied by
84.6% of the US internet population estimated to
be not blocking ads).22
• Missed ad revenue was estimated at $9,025,447,009
For those measuring the ad blocking based on $209.09 multiplied by 43,165,369 ad blockers
87% 2% 11%
(279,834,232 multiplied by 15.4% of the US population
estimated to be ad blocking).
indicated the indicated the indicated the • As 17% of the PageFair respondents attributed the reason
level was less level was level was 20% for ad blocking to privacy (directly related to security and
than 10% 10% to 20% or greater malware), we calculated an estimate of $1,534,325,991.
• We also weighted and projected our voice of the
industry data to estimate an overall ad-blocking cost of
As it relates
to the cost 72% 8% $157,675,000 and then applied the 17% factor from the
PageFair study to estimate a cost of $26,804,750 (ad
impact of indicated the indicated a range
blocking associated with malvertising+).
ad blocking cost was under of $200,000 to
$200,000 $499,000 • The $781,000,000 estimated rounded cost was based on
to their
the midpoint between $26,804,750 and $1,534,325,991.
organization
12% 8%
“Ad blocking is beginning to
indicated a range indicated a range
of $500,000 to of $1,000,000
$999,000 or more
have a material impact on
publisher revenues.”
Mike Zaneis, CEO Trustworthy Accountability Group,
“Publishers and adblockers are in a battle for online
advertising,” FT.com, 29 March 2015, http://www.
ft.com/intl/cms/s/2/c84a647e-d3af-11e4-99bd-
00144feab7de.html#axzz3rmaUjreu, accessed
November 2015.
22. IAB internet advertising revenue report: 2014 full year results — April 2015, IAB, http://www.iab.com/wp-content/uploads/2015/05/IAB_Internet_Advertising_
Revenue_FY_2014.pdf, accessed November 2015.
23
Attitudes from publishers and ad tech organizations
24
Malvertising+
25
Invalid
traffic
26
Invalid traffic
landscape
Ad traffic is typically designed to deliver the right ad
at the right time to the right user. Fraudulent invalid
traffic generates ad-related actions to extract the
maximum amount of money from the digital advertising
Invalid traffic can enter ecosystem, regardless of the presence of an audience.
Legitimate invalid traffic generates actions in the
the ecosystem in several normal course of internet maintenance by non-human
ways, and for several actors: search engine spiders, brand safety bots and
purposes, including: competitive intelligence gathering tools.
The above methods affect searches, displays, videos, audio, mobile (web and
in-application) and social.
27
Comprehensive description IVT does not in any way represent legitimate traffic. As such,
it is difficult to identify and prevent its monetization. Current
Invalid traffic (IVT) induces systems to generate ad-related studies vary widely in dimensioning the true impact of IVT.
actions for purposes other than support of the delivery of However, the general consensus is that IVT has a material
the right ad at the right time to the right user. This includes cost impact. Impacts may include: depressed inventory CPMs
actions occurring across the ecosystem, which impact the and a reluctance to invest and allocate digital media spend;
search, display, video, mobile, audio and social areas. IVT damaged reputation to organizations susceptible to exposure
may take the form of legitimate activity, as well as activity to fraudulent IVT; and the overall cost to fight.
generated by bad actors for fraudulent purposes. With the rise of automation and ever-increasing complexity
• Fraudulent IVT activity typically extracts the maximum of the digital supply chain, the prevalence of IVT is expected
amount of money from the digital advertising ecosystem, to persist. Fraudulent IVT in this environment is exacerbated
regardless of the presence of an audience. in ad transactions involving unknown sources, such as
publishers purchasing low-cost traffic or open ad exchanges.
• Legitimate IVT tends to generate actions during the normal
course of internet maintenance by non-human actors, In general, IVT has the potential to have a direct monetary
including actions executed by search engine spiders, brand impact to buy-side organizations. Fraudulent IVT’s impact may
safety bots and competitive intelligence gathering tools. be the result of fraudulent publisher sites selling inventory
to advertisers against known robotic traffic directed to the
The Media Rating Council (MRC) further defines IVT in terms
inventory. Alternatively, bad actors may operate fraudulent
of the methods by which IVT may be detected:23
publisher sites in addition to perpetrating illegitimate cookie
• General IVT is traffic identified through routine means of enrichment. Through cookies, bots are directed toward
filtration. Key examples include data center traffic; bots reputable sites to build cookie profiles that mimic traits of
and spiders or other crawlers masquerading as legitimate desirable consumers for ad targeting. The bad actor then
users; non-browser user-agent headers; hidden/stacked/ sells inventory on the fraudulent site against these enriched
covered or otherwise never-viewable ad serving, pre-fetch cookies at a higher CPM. In the latter scenario, the publisher’s
or browser pre-rendering traffic; and invalid proxy traffic. reputation may be impacted as the intermediate steps of the
• Sophisticated IVT is more difficult to detect and requires cookie enrichment process involve the presence of IVT across
advanced analytics, multipoint corroboration/coordination premium or otherwise reputable publisher content sites.
or significant human intervention, etc., to analyze
and identify. Key examples include: hijacked devices,
hijacked tags, adware, malware, incentivized browsing, “The digital advertising
industry must stop
misappropriated content (if applicable), falsified viewable
impression decisions and cookie stuffing.
23. Invalid Traffic Detection and Filtration Guidelines Addendum, Draft Version 5.0 — Public Comment Version, Media Rating Council, June 30, 2015.
28
Invalid traffic
Actions taken by publishers to maximize ad revenue may also A similar example regarding publisher-driven (potentially)
inadvertently (if not blatantly) support and encourage the fraudulent IVT relates to the practice of audience extension.
proliferation of fraudulent IVT within the digital supply chain. In these situations, a publisher may represent to sell inventory
Although sell-side organizations may not be immediately under the publisher’s ownership, but ultimately fulfill the ad
monetarily impacted by fraudulent IVT, the reputational buy through inventory placed on other sites owned by the
repercussion may ultimately result in a shift in ad spend publisher, affiliate sites or third parties. Although many of
away from publishers with practices that may facilitate these transactions are conducted through legitimate means
fraudulent IVT. One such example includes traffic sourcing, when the site placement of the sold inventory is transparent
whereby publishers sell more inventory than currently to the advertiser, lack of transparency in these transactions
available. They subsequently seek out third-party publishers may lead to the serving of ads outside of the audience target
to purchase additional traffic to drive the audience toward of the media plan.
sold inventory to fulfill the ad buy. In these situations, the
third party may likewise seek additional third parties to
fulfill the audience demands of the first-party publisher. In
these situations, third-party sources may resort to using bot
traffic to generate the necessary volume to meet inventory
demands. The initial intent of the first-party publisher
may not have been to perpetrate fraud in these situations.
However, the environment of the ad buy transaction and
third-party relationships increases the difficulty of maintaining
transparency and accountability related to the quality of the
audience fulfilling the ad buy.
29
Types of IVT
The following are additional examples of the specific sources of IVT present within the digital supply chain.
Tag hijacking
Ad tag hijacking Ad tags are taken from a publisher’s site and onto another site without the publisher’s knowledge.
Creative hijacking Creative tags are taken from a legitimately served ad so they can be rendered at a later time,
without the consent of the advertiser or the contracted service provider.
Site/ad/audience attributes
Auto-refresh A page or ad unit may be enabled to request a new rendered asset more than once and at
periodic intervals.
Incentivized browsing A human user may be offered payment or benefits to view or interact with ads.
Hidden ads Ads are placed in such a manner that they cannot ever be viewable (e.g., stacked ads, ads
clipped by iframes, zero opacity ads).
Misappropriated content Sites may contain copyrighted content or links to copyrighted content without the rights to
monetize such content.
Illegitimate sites Websites are built primarily to collect advertising revenue and offer little to no content to
human audiences. These sites are often part of a network where each individual site collects a
small amount of revenue to avoid suspicion.
Falsely represented/ HTML or ad requests attempt to represent another site or device or other attribute, other than
domain spoofing/ the actual placement. Additionally, a publisher’s content management system (CMS) may be
laundered impressions compromised when a fake page is created using a legitimate publisher’s domain and markup
code.
30
Invalid traffic
Current response to address IVT The addendum also calls for organizations to maintain
a business partner qualification process. The goal is to
In response to IVT, industry participants have historically determine that upstream and downstream partners are
focused on standardization and developing technology that legitimate entities, and that they themselves have similar
can help identify IVT within the ecosystem. processes to vet partners, and identify and remove invalid
traffic from the transactions.
Industry standards
In addition to industry standards serving as guidelines to
Within the current digital supply chain ecosystem, commonly participants within the digital supply chain to detect and
accepted practices to address the presence of IVT include address IVT, all supply chain participants (publishers, ad
adherence to filtration guidelines established by the industry. exchanges, agencies) have a shared responsibility in this
The MRC is expected to formally release the Invalid Traffic effort. Agencies should be aware of the legitimacy of the
Detection and Filtration Guidelines Addendum in October publishers to whom ads are being served and scale reparation
2015. The addendum establishes minimum requirements when impressions are identified as the result of IVT.
to identify and remove invalid traffic from advertising Publishers should be aware of the risks posed to the value of
transactions. their inventory and avoid practices that may incent IVT. Ad
Specifically, the addendum establishes two categories of exchanges should work to detect and avoid, including IVT
invalid traffic. The first, “General Invalid Traffic,” consists of within sales transactions.
traffic identified through routine means of filtration executed Third-party vendors
through application of lists or with other standardized
parameter checks. Key examples include: known data-center To support transparency and accountability, and the need of
traffic, bots and spiders or other crawlers masquerading as buy-side organizations for additional intelligence regarding
legitimate users; activity-based filtration using campaign or the activities of participants within the digital supply
application data and transaction parameters from campaign chain, third-party vendors have developed and marketed
or application data; non-browser user-agent headers or other verification and fraud detection technologies. These
forms of unknown browsers; and pre-fetch or browser pre- technologies can validate ad delivery according to media
rendered traffic. plan, whether the ad content was ultimately viewable within
a user’s browser, and in certain cases support the detection
The second category, “Sophisticated Invalid Traffic,” consists
of fraudulent activity. Through the availability of this data,
of more difficult to detect situations that require advanced
participants within the digital supply chain gain additional
analytics, multipoint corroboration/coordination or significant
tools and resources to police the ecosystem and spotlight
human intervention, etc., to analyze and identify. Key
the presence of IVT beyond what limited capabilities may
examples include: hijacked devices; hijacked sessions within
have been available to services adhering to industry-
hijacked devices; hijacked ad tags; hijacked creative; hidden/
standard filtration methodologies.
stacked/covered or otherwise intentionally obfuscated ad
serving; invalid proxy traffic; adware; malware; incentivized Verification and fraud services in particular allow advertisers
manipulation of measurements; misappropriated content; to measure the risk relating to the placement of inventory
falsified viewable impression decisions; falsely represented to which ads are ultimately delivered. Such services identify
sites or impressions; cookie stuffing, recycling or harvesting; the nature of the environments in which the advertisements
manipulation or falsification of location data or related are served. Using the information, verification services
attributes; and differentiating human and IVT traffic when can typically confirm whether the ad was delivered on plan
originating from the same or similar source in certain closely (i.e., delivered to the sites, devices, geographies or target
intermingled circumstances. audience), whether the environment of the publisher site may
impact the prominence of the advertising (i.e., ad clutter,
presence of competitor ads) or whether the content of the
31
publisher page may damage the reputation of the advertiser
(i.e., brand safety). In certain cases, verification services
Evolving efforts to further reduce
allow for the blocking of ad content, in addition to reporting the impacts of IVT
situations in which ad serving is attempted to inventory that is
less desirable to the advertiser. As standardization and IVT detection technology continue to
evolve, the shift in focus to minimize the impact of IVT has
Fraud services, in contrast, place additional focus on the been toward fostering industry-wide participation in practices
inspection and review of data through proprietary means to that use transparency and accountability to establish an
unveil fraudulent traffic masquerading as legitimate traffic. increased level of trust within the buying and selling of
Using verification and fraud detection service providers allows online advertising. These initiatives vary from macro-focused
advertisers the additional opportunity to identify participants efforts, such as setting standards related to the methods
in fraudulent IVT practices and seek make-goods for IVT in which buyers and sellers transact business, to micro-
through the remediation process executed by advertisers (or focused efforts, such as individual business practices within
verification and fraud services on behalf of the advertiser) organizations to foster an environment focused on identifying
with publishers or middleware providers. and addressing IVT.
Similar to verification services, viewability services provide
additional data to advertisers regarding the quality of the Trustworthy Accountability Group
ad delivery in terms of whether the user requesting the ad
Through a cross-industry joint initiative, the IAB, the 4A’s and
content had an opportunity to see the content based on the
ANA formed TAG to combat malware, fight internet piracy,
ad placement within the browser’s viewport. As advertisers
eliminate fraudulent traffic and promote transparency.
shift toward using viewable impressions as the currency
metric during the ad buy, the ability to monetize IVT is further As it relates specifically to IVT and ad fraud, TAG has
minimized (since ad content is not typically rendered viewable developed an Anti-Fraud Working Group with a mission to
within a browser). improve trust, transparency and accountability by developing
tools, standards and technologies to eliminate fraud.
TAG is working to combat the negative impact of fraudulent
traffic in several ways.
• TAG recently announced plans to create, maintain and
“Invalid traffic is posing share the TAG Fraud Threat List. The list is actually a
database of domains that have been identified as known
a serious threat to sources of fraudulent bot traffic for digital ads. The initial
pilot phase of the program is already underway, with
marketplace confidence in several major advertising platforms participating. Broader
a healthy and vibrant digital deployment of the final program is expected in the third
quarter of 2015. TAG has joined with several leading ad
advertising ecosystem.” platforms in an effort to block illegitimate and non-human
ad traffic originating from data centers. In launching the
George Ivie, CEO “Media Rating Council Issues Invalid pilot program, TAG will initially use a large ad server’s
Traffic Detection and Filtration Guidelines for Public database of data center IP addresses and enhance it based
Comment Period,” PR Newswire, 1 July 2015. upon broader industry intelligence.
32
Invalid traffic
Long-tail publisher sites had a higher concentration of
IVT, in comparison to premium and highly trafficked
publisher sites.
24. Eliminate Fraudulent Traffic, Trustworthy Accountability Group, https://www.tagtoday.net/traffic/, accessed November 2015.
25. IAB internet advertising revenue report: 2014 full year results — April 2015, IAB, http://www.iab.com/wp-content/uploads/2015/05/IAB_Internet_Advertising_
Revenue_FY_2014.pdf, accessed November 2015.
33
Our analysis provided the following estimated percentage (invalid traffic rate applied to the 2014 revenue) and cost impact of IVT
across pricing models and ad formats delivered to desktop and mobile platforms:
34
Invalid traffic
Cost to fight Within the production impression data analyzed across our
vendor participants, our research identified trends regarding
We weighted and projected our voice of the industry data to the concentration of IVT consistent with many recent industry
calculate the internal cost to fight impact for organizations studies. These trends include:
within the digital advertising ecosystem and estimated a
• The inventory represented within our analyses primarily
rounded cost of $169,000,000. This cost was based on an
consisted of display content (>95% of impressions
average of 91 hours per week spent identifying, processing
analyzed). However, we noted that video ad impressions
and analyzing invalid traffic. To project to a full year, we used
contained higher concentrations of IVT in comparison to
a fully loaded wage hourly rate of $62 for supervisory-level
display impressions (11.4% in video versus 7.6% in display).
IT security practitioners in US-based organizations derived
from Ponemon Institute’s 2014 IT security spending tracking • IVT continues to increase in prevalence within the mobile
study.26 There are also several third-party vendors that are ad ecosystem. The cost impact of IVT in mobile may
available for hire to assist in identifying and eliminating invalid continue to rise, although the levels of IVT within mobile
traffic for advertisers. EY was unable to estimate a cost for advertising inventory may decline slightly as the levels of
this initial study but will attempt to estimate a cost in any human traffic rise.
future studies. • The inventory represented within our analyses primarily
EY summary: Through our study, we identified the estimated consisted of ad network and ad-exchange-traded inventory
cost impact of IVT on the digital advertising supply chain to (>75% of impressions analyzed). When assessed at a
be $4,600,000,000. This includes the costs from fraudulent domain or sub-domain level, rates of detected IVT tended
traffic ($4,400,000,000) and costs to fight associated with to cluster at either the low or high end of the continuum.
identifying and addressing IVT ($169,000,000). That is, there were a number of domains and sub-domains
noted with relatively low rates of IVT, as well as a number of
The majority, if not all, participants in the ecosystem, are
domains and sub-domains noted with relatively high rates
aware that invalid traffic exists. These participants make
of IVT. Interestingly, there were relatively few domains and
decisions while considering these issues. If invalid traffic
sub-domains noted with moderate rates of detected IVT.
were to be significantly reduced or eliminated, the supply and
demand relationship would change. There would be both a • Within our analyses, we noted that IVTs were distributed
reduction of available inventory, and over time as confidence similarly across the ad network and ad-exchange-traded
on the buy side improved, an increase in demand for the inventory in comparison to direct publisher buys. As a
available inventory. While eliminating invalid traffic would reference point, however, we saw only a slight increase in
not likely produce immediate material increases in CPMs, the the prevalence of IVT as a percentage of ad network and
change in the supply and demand relationship would increase exchange-traded inventory, relative to direct publisher buys.
CPMs over time. • Long-tail publisher sites had a higher concentration of IVT
(greater than 4:1), in comparison to premium and highly
trafficked publisher sites.
26. The Cost of Malware Containment, Ponemon Institute, sponsored by Damballa, January 2015.
35
Attitudes from publishers and ad tech organizations
36
Invalid traffic
37
For more information, contact: EY | Assurance | Tax | Transactions | Advisory
About EY
Jackson Bazley EY is a global leader in assurance, tax, transaction and
Executive Director advisory services. The insights and quality services we
Ernst & Young LLP deliver help build trust and confidence in the capital markets
Media & Entertainment Advisory Services and in economies the world over. We develop outstanding
+1 813 425 3650 leaders who team to deliver on our promises to all of our
stakeholders. In so doing, we play a critical role in building a
[email protected]
better working world for our people, for our clients and for
our communities.
Nick Terlizzi
Partner EY refers to the global organization, and may refer to one or
Ernst & Young LLP more, of the member firms of Ernst & Young Global Limited,
each of which is a separate legal entity. Ernst & Young Global
Media & Entertainment Advisory Services
Limited, a UK company limited by guarantee, does not
+1 813 225 4854
provide services to clients. For more information about our
[email protected] organization, please visit ey.com.
ED None
This material has been prepared for general informational purposes
only and is not intended to be relied upon as accounting, tax or other
professional advice. Please refer to your advisors for specific advice.
www.ey.com