Tech-invite   3GPPspecs   RFCs   Search in Tech-invite

Top   in Index   Prev   Next

TR 33.832 (SA3) ☆ (Rel-13 draft)
Study on IMS enhanced
Spoofed Call Prevention and Detection

use "3GPP‑Page" to get the Word version
for a better overview, the Table of Contents (ToC) is reproduced
V0.3.0 (Wzip)  2015/09  15 p.

Rapporteur:  Mr. Schumacher, Greg

Caller identity spoofing or malicious modification of caller information such as Calling Line Identification and Caller Name (Caller ID) has become a significant problem in many countries. The complaints regarding these calls range from nuisance calls, violations of various phone solicitation rules (such as the US Federal Trade Commission's Telemarketing Sales Rules) to being used as a platform for significant fraud, identity theft and social engineering. Various malicious uses of caller information spoofing include these categories: swatting, vishing, and TDOS.
Both IETF and 3GPP SA3 have dealt with aspects of this issue a number of times in the past. 3GPP SA3 has completed the study of spoofed call detection in TR 33.831, addressing spoofed calls in a CS environment, without recommending any specific approach. However the problem of spoofed calls is continuing to increase and growing attention is coming from consumers, journalists, and regulatory/legislative bodies demanding a solution.
The latest IETF effort supporting the detection of spoofed calls is taking place in the IETF STIR working group, and has progressed to a a point where evaluation of the use of STIR's active drafts to address the spoofed call problem can take place.

full Table of Contents for  TR 33.832  Word version:   0.3.0


Here   Top


1  ScopeWord-p. 4
2  ReferencesWord-p. 5
3  Definitions, symbols and abbreviations
4  History of past solutions
5  Spoofed call scenarios in IMS
6  Potential security requirementsWord-p. 9
7  Potential solutions
8  ConsiderationsWord-p. 13
9  Conclusions and recommendationsWord-p. 14
X  Change historyWord-p. 15

Up   Top