Content for  TR 22.898  Word version:  14.0.0

Top   Top   None   None   None
0…   2__$

0  IntroductionWord‑p. 5
Spoofing or malicious modification of caller information to hide the real caller identity provided by such capabilities as Calling Line Identification and Caller Name (Caller ID) is growing into a significant problem in many countries. The complaints to authorities and PLMN operators regarding these spoofed calls range from nuisance calls, violations of various phone solicitation rules (such as the US Federal Trade Commission's Telemarketing Sales Rules) to being used as a platform for significant fraud, identity theft and social engineering. Various malicious uses of caller information spoofing include these categories: swatting, vishing, and TDOS.
There are several SDOs dealing with creating the ability to detect caller information spoofing within call setup signalling including IETF's Stir working group, 3GPP's SA3 and ATIS's PTSC CSEC. However their focus is to define automated mechanisms to identify whether the caller information is authentic and the caller is authorized to use the presented caller information. What the user and network is able to control when spoofed calls are identified or mis-identified is not addressed in these activities.
1  ScopeWord‑p. 6
The present document studies new service capabilities and enhancements to existing service capabilities needed to allow the called user to control:
  • How spoofed calls are reported to the called user.
  • The treatment given to the spoofed call and calling user.
  • Provide the called user the ability to review the results of spoofed call detection.
  • Allow the called user to provide feedback to the network of incorrect detection decisions (false positive and false negative).
New service network capabilities and enhancements to existing network capabilities needed to support network operator policies regarding treatment of spoofed calls are also covered including:
  • Support for law enforcement and network operator fraud investigations into originators of spoofed calls.
  • Setting default or limiting spoofed call controls the user is able to access.
The present document also studies the interaction between spoofed call control capabilities available to users using MTSI voice services.

Up   Top