2015/03 16 p.
Spoofing or malicious modification of caller information to hide the real caller identity provided by such capabilities as
Calling Line Identification and Caller Name (Caller ID) is growing into a significant problem in many countries. The
complaints to authorities and PLMN operators regarding these spoofed calls range from nuisance calls, violations of
various phone solicitation rules (such as the US Federal Trade Commission's Telemarketing Sales Rules) to being used
as a platform for significant fraud, identity theft and social engineering. Various malicious uses of caller information
spoofing include these categories: swatting, vishing, and TDOS.
There are several SDOs dealing with creating the ability to detect caller information spoofing within call setup
signalling including IETF's Stir working group, 3GPP's SA3 and ATIS's PTSC CSEC. However their focus is to define
automated mechanisms to identify whether the caller information is authentic and the caller is authorized to use the
presented caller information. What the user and network is able to control when spoofed calls are identified or mis-identified is not addressed in these activities.
The present document studies new service capabilities and enhancements to existing service capabilities needed to
allow the called user to control:
How spoofed calls are reported to the called user.
The treatment given to the spoofed call and calling user.
Provide the called user the ability to review the results of spoofed call detection.
Allow the called user to provide feedback to the network of incorrect detection decisions (false positive and false
New service network capabilities and enhancements to existing network capabilities needed to support network operator
policies regarding treatment of spoofed calls are also covered including:
Support for law enforcement and network operator fraud investigations into originators of spoofed calls.
Setting default or limiting spoofed call controls the user is able to access.
The present document also studies the interaction between spoofed call control capabilities available to users using
MTSI voice services.
full Table of Contents for TR 22.898 Word version: 14.0.0