2015/09 15 p.
Caller identity spoofing or malicious modification of caller information such as Calling Line Identification and Caller
Name (Caller ID) has become a significant problem in many countries. The complaints regarding these calls range from
nuisance calls, violations of various phone solicitation rules (such as the US Federal Trade Commission's
Telemarketing Sales Rules) to being used as a platform for significant fraud, identity theft and social engineering.
Various malicious uses of caller information spoofing include these categories: swatting, vishing, and TDOS.
Both IETF and 3GPP SA3 have dealt with aspects of this issue a number of times in the past. 3GPP SA3 has
completed the study of spoofed call detection in TR 33.831
, addressing spoofed calls in a CS environment, without
recommending any specific approach. However the problem of spoofed calls is continuing to increase and growing
attention is coming from consumers, journalists, and regulatory/legislative bodies demanding a solution.
The latest IETF effort supporting the detection of spoofed calls is taking place in the IETF STIR working group
has progressed to a a point where evaluation of the use of STIR's active drafts to address the spoofed call problem can
full Table of Contents for TR 33.832 Word version: 0.3.0