Robocalling Blocking Cause and Effect

Slides:



Advertisements
Similar presentations
Industry Canada /strategis.ic.gc.ca Industrie Canada /strategis.ic.gc.ca March Canadian Experience with Suppliers Declaration of Conformity.
Advertisements

3SKey 3SKey.
Data-Sharing and Governance Consultation ANALYSIS OF RESPONSES.
Authentication & Kerberos
STIR Secure Telephone Identity. Context and drivers STIR Working Group Charter Problem Statement Threats Status of work Related work and links Introduction.
Finalize RESTful Application Programming Interface (API) Security Recommendations Transport & Security Standards Workgroup January 28, 2014.
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Open Standards for Network Access Control Trusted Network Connect.
DOCUMENT #:GSC15-PLEN-48 FOR:Presentation SOURCE: ATIS AGENDA ITEM: PLEN 6.10 CONTACT(S): James McEachern
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Presentation by Paul Vine In partnership with Version Sabre and Business Continuity Planning.
2008 New York - Member Forum Council for Responsible Jewellery Practices, Ltd. Overview of CRJP.
Industry Canada 1 Bob Leafloor Colman Ho Peter Chau Industry Canada January 2003 (ENUM) T E lephone NU mber M apping.
STIR Charter (discussion) STIR BoF Berlin, DE 7/30/2013.
DOCUMENT #: GSC15-GTSC8-06 FOR: Presentation SOURCE: ATIS AGENDA ITEM: GTSC8; 4.2 CONTACT(S): Art Reilly ATIS Cybersecurity.
1 Emergency Management Standards EM- XML Consortium & EM Technical Committee Presentation to Steve Cooper March 18,2003.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
ATIS Identity Management Standards Development DOCUMENT #:GSC13-PLEN-37 FOR:Presentation SOURCE:ATIS AGENDA ITEM:Plenary; IdM and Identification Systems;
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
Fostering worldwide interoperabilityGeneva, July 2009 ATIS Identity Management Standards Development James McEachern, Manager – Application Enabler.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
1 Southern Africa Telecoms Fraud Management, Revenue Assurance and Network Security Meeting.
Incorporating Privacy Into Systems Development Methodology Phil Moleski Director Corporate Information Technology Branch Saskatchewan Health
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
Jim McEachern Senior Technology Consultant ATIS July 8, 2015.
Henning Schulzrinne IETF 97
Timeline – Standards & Requirements
Presented by: Rebekah Johnson CEO/President Gloria-Mac
Status Update -- ATIS Robocalling and Caller ID Initiatives
SHAKEN Governance Authority Next Steps
Timeline - ATIS Involvement
Status Update -- ATIS Robocalling and Caller ID Initiatives
Data and Applications Security Developments and Directions
IP Phone Security Spoofing
Global Standards Collaboration (GSC) 14
SHAKEN Governance Authority Criteria
Unit 36: Internet Server Management
Module 8: Securing Network Traffic by Using IPSec and Certificates
ATIS Cybersecurity DOCUMENT #: GSC13-GTSC6-12 FOR: Presentation
Global Standards Collaboration (GSC) GSC-15
Chris Wendt, David Hancock (Comcast)
Timeline - ATIS Involvement
Verstat Related Best Practices
Presented by: Rebekah Johnson CEO/President Gloria-Mac
Interlake Hybrid Cloud Management Suite
NANC Call Authentication Trust Anchor (CATA) Working Group
ONC P2 FHIR Ecosystem Task Force
NAAS 2.0 Features and Enhancements
Regional Seminar for OIE National Focal Points on Animal Production Food Safety Importance of collaboration between the Veterinary Services and industry.
Doug Bellows – Inteliquent 10/4/2018
STI Display Implementation and Evolution
STIR/SHAKEN Display Implementation and Evolution
X-Road as a Platform to Exchange MyData
SHAKEN & Know Your Customer
ATIS Interoperability
TN-PoP Scenarios Jim McEachern Principal Technologist ATIS August 2018.
Operationalizing Export Certification and Regionalization Programmes
Module 8: Securing Network Traffic by Using IPSec and Certificates
IPNNI SHAKEN Enterprise Models: LEMON TWIST
STI-GA Update to the NANC
“Real World” METEOR Implementation Issues
Enterprise Structure For Use Case Application of Various Token/Cert Proposals Presented by: Rebekah Johnson.
STIR/Shaken: Mitigating Illegal Robocalling and Caller ID Scams
Calling Party Identity
ONC Update for HITSP Board
Calling Party Identity
Toll Fraud Prevention and STIR/SHAKEN
Presentation transcript:

Robocalling Blocking Cause and Effect

Robocalls - State of industry Robocalling, spamming, scamming, spoofing are scenarios that play out for consumers multiple times a week. 28.5 Billion US only number of robocall received 2018 FCC has received 3.7 million complaints in 2018 In the past year more than 740,000 Canadians have complained to the Canadian Anti-Fraud Centre about being targeted by a phone scam The CRTC receives more complaints about nuisance communications—specifically, spam and telemarketing than any other subject.

Robocalls - State of industry Unregulated call blocking and labeling solution providers are making the decisions on how to present legal enterprise calls to the consumer There are technologies to identify and block illegal robocalls, but they are getting it wrong in the U.S.

STIR/SHAKEN STIR: Secure Telephone Identity Revisited - defines a signature to verify the calling number, and specifies how it will be transported in SIP “on the wire”. SHAKEN: Signature-based Handling of Asserted information using toKENs - the framework document developed to provide an implementation profile for Service Providers implementing STIR. Together, STIR and SHAKEN represent the SIP protocol changes, signature standard, and interoperability framework.

Benefits & Limitations Consumers will have more information when deciding whether to answer a call. The identity of the originating carrier is included with the call authentication information. Knowing the originating carrier will accelerate illegal robocall tracebacks and enforcement. Limitations It can only identify if a call was not spoofed – not whether or not the caller is a scammer. It only works on an IP end-to-end call path. The benefits will not fully materialize until all service providers implement the STIR/SHAKEN standards

Analytics Server STIR/SHAKEN will provide crucial layer of protection, however, consensus is clear: a layered approach requiring access to an Analytics Server at the Verification point is also required.

Analytics issue example: Retail/Customer Service

Analytics issue example: Cable/Internet Provider

Analytics issue example: Collections/Account Resolution

Analytics Risk

Certify calling party trust Trusted Entity Certification A compliance module to certify the legal entity and call compliance status of your organization across the calling ecosystem Removes the need to verify your compliant calling practices individually with each call blocking & labeling solutions provider Trusted Entity status vetted, verified, and re-certified annually Results Verification across the analytics partner network that you are NOT a bad actor and calls originating from your numbers are NOT to be classified as fraudulent

Remove improper scam & fraud Phone Number Registration Register your numbers across the ecosystem Removes the need to register numbers individually with each call blocking & labeling solutions provider Review monthly ‘Health Check’ summaries of changes to number labeling Result Registered numbers distributed across analytics partner network to accompany your Trusted Enterprise status Numbers won’t be listed as scam or fraud

Presented by Marian Hearn – ATIS - The SHAKEN Governance Model Webinar Canadian STIR/SHAKEN January 2018 the CRTC Compliance and Enforcement Sector issued CRTC 2018-32, “Measures to reduce caller identification spoofing and to determine the origins of nuisance calls”. That decision directed the Canadian telecom industry to: Develop a traceback process at the CISC Network and Technical Working Group(NTWG), Report on the status of the industry readiness for “authentication and verification of caller ID information for IP voice calls” using STIR/SHAKEN, through NTWG Establish a governance framework Presented by Marian Hearn – ATIS - The SHAKEN Governance Model Webinar

Presented by Marian Hearn – ATIS - The SHAKEN Governance Model Webinar Canadian STIR/SHAKEN A small group of carriers have incorporated the CSTGA to fulfill the role of GA, based on the governance model in ATIS-1000080. The detailed corporate structure continues to be a work in progress. A technical advisory committee (TC) was established and has produced a Canadian technical requirements document (CTRD) for SHAKEN governance. TC is evaluating technical and operational issues relating to the PA and CA roles, including exchange of international certificates, beginning with Canada/U.S. Informal discussions are ongoing with a number of vendors who are interested in fulfilling the role of PA for Canada. There is ongoing dialogue with CRTC staff regarding formal endorsement of the CSTGA as the Canadian GA. Presented by Marian Hearn – ATIS - The SHAKEN Governance Model Webinar

Headquarters 70 East Beaver Creek, #19, Richmond Hill, ON, L4B 3B2 Ottawa (CNA) 150 Isabella Street, Suite 605, Ottawa, ON, K1S 5H3 www.comsolveinc.com