Geneva, Switzerland, 2 June 2014 The UK experience and approach to damage mitigation Huw Saunders, Director, Network Infrastructure, Ofcom

Slides:



Advertisements
Similar presentations
ICT Services Suppliers Briefing Thursday, 17 September 2009.
Advertisements

International Telecommunication Union ENUM Issues and Solutions Houlin Zhao Director Telecommunication Standardization Bureau International Telecommunication.
Emergency Services Workshop UK VoIP 999/112s John Medland – BT 999/112 Policy Manager.
A Unified Approach to Combat Counterfeiting: Use of the Digital Object Architecture and ITU-T Recommendation X.1255 Robert E. Kahn President & CEO CNRI,
Does the Third Package provide the European TSO associations with the tools necessary to find solutions to the European energy challenge ? Pierre BORNARD.
Geneva, Switzerland, 2 June 2014 The Regulatory aspects of CPND, CLI and OI “the ITRs” Sherif Guinena SG2 Chairman ITU Workshop on “Caller ID Spoofing”
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Online advertising standards Dr Oliver Gray 26 October 2004.
(Geneva, Switzerland, September 2014)
Interconnection and Regulation of IP-Networks Ass. Sven Tschoepe, LL.M 15/5/04 ITS 15th Biennial Conference Berlin, Germany September, Internationalisation.
Geneva, Switzerland, 2 June 2014 Study on Spoofed Call Detection and Prevention in 3GPP China Mobile ITU Workshop on “Caller ID Spoofing” (Geneva, Switzerland,
Geneva, Switzerland, 2 June 2014 Experience of an inbound telephony provider Anne-Valérie Heuschen, Head of legal & regulatory affairs, Voxbone, Belgium.
Chapter 11 Purchasing, innovation and quality management
Session 3 - Plenary on implementing Principle 1 on an Explicit Policy on Regulatory Quality, Principle 3 on Regulatory Oversight, and Principle 6 on Reviewing.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
The economic regulation of gas processing services Key issues and initial thoughts Ofgem presentation 18 June 2007.
Geneva, Switzerland, 2 June 2014 SG2: WTSA and PP Resolutions “Recommendation E.157” Sherif Guinena SG2 Chairman ITU Workshop on “Caller ID Spoofing” (Geneva,
What is Business Analysis Planning & Monitoring?
Premium Rate Services: Review of Scope of Regulation Bradley Brady October 2007.
ESW – May 2010 UK Architecture for VoIP 999/112s John Medland – BT 999/112 Policy Manager.
What is internet telephony?  IP telephony uses the Internet to send audio, video, fax etc between two or more users in real time, so the users can converse.
Number Portability and Telecommunications Liberalization CANTO 2005.
Investment Funds Conference “Collective Investment Funds in the Qatar Financial Centre – Confidence and Opportunity” November 26-27, 2007 Michael Webb.
Smart Grid Forum - Update DCMF Meeting – 7 February 2013 Gareth Evans Head of Profession – Engineering Ofgem.
How will the Third Liberalization package influence the framework of the regulators? Dr. Annegret Groebel Managing Director and Head of International Coordination.
Standards and innovation What is a standard? How do standards promote innovation? What is the role of governments and the UN?
INNOWATER Introduction to Business Proposition Toolkit July 2013.
© Copyright 2007 Arbinet-thexchange, Inc. All Rights Reserved. Voice Peering Steve Heap Chief Technology Officer.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
ENUM Services and their Provisioning Submitted by VeriSign, Inc and Telcordia Technologies, Inc Available at
Advanced Next gEneration Mobile Open NEtwork Tridentcom th International Conference on Testbeds and Research Infrastructures for the Development.
Anti-Spam update Unsolicited Electronic Messages Bill and ISP Spam Code of Practice 2 February 2006 Keith Davidson Executive Director.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All SMART GRID ICT: SECURITY, INTEROPERABILITY & NEXT STEPS John O’Neill, Senior Project Manager CSA.
International Telecommunication Union ENUM Implementation Robert Shaw ITU Internet Strategy and Policy Advisor International Telecommunication Union ICANN.
Communication Paper on Smart Regulation COM(2010) 543, 8 October 2010 Presentation by Savia Orphanidou 3 rd November 2010.
September 15, 2003FG3 Report FOCUS GROUP 3 Interoperability Report to NRIC VI Council September 15, 2003 Cliff Naughton (Boeing)
Regulatory Transparency and Efficiency in the Communications Industry in Australia Jennifer Bryant Office of Regulation Review Australia.
1 GSC: Standardization Advancing Global Communications ISACC Opening Plenary Presentation GSC-11 SOURCE:ISACC TITLE:ISACC Opening Plenary Presentation.
Overview of Issues and Interests in Standards and Interoperability Mary Saunders Chief, Standards Services Division NIST.
Does the Third Package provide the European TSO associations with the tools necessary to find solutions to the European energy challenge ? Nigel Sisman,
MEDIN Work Plan for By March 2011 MEDIN will be 3 years into the original 5 year development plan started in Would normally ask for continued.
Osborneclarke.de OBA Breakfast Seminar 22 January 2013 Stephen Groom OC London Action points for UK advertisers.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
WP1: IP charter Geneva – 23rd June 2009 Contribution from CERN.
Future of the UK mail market: regulatory perspective CWU Forum 9 February 2006 RICHARD MORIARTY POSTCOMM.
Durban, South Africa, 8 July 2013 Outcome of WTSA-12 on spam Xiaoya Yang, Head, WTSA Programmes Division ITU-TSB ITU Workshop on “Countering.
Requirements for SIP-based VoIP Interconnection (BCP) draft-natale-sip-voip-requirements-00.txt Bob Natale For Consideration by the.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
IMPLEMENTING THE AID: OFTEL CONSULTATION ON GUIDELINES BT’S PERSPECTIVE PAUL RICHARDS RAD July 8th 2002.
International Telecommunication Union ENUM: Convergence of Technology and Interests? ITU Tutorial Workshop on ENUM Geneva, February 8, 2002 Robert Shaw.
Connect. Communicate. Collaborate Click to edit Master title style PERT OPERATIONS.
Jackie Voss Manager, Global Standards Development ATIS All-IP Transition Initiatives December 1, 2015.
Detection and Mitigation of Spam in IP Telephony Networks using Signaling Protocol Analysis MacIntosh, R Vinokurov, D Advances in Wired and Wireless Communication,
Article 28(2) USD Introduction. The Problem Fraud and Misuse scale Evolving risks Impact on end users –Direct financial impact –Direct inconvenience Indirect.
Geneva, Switzerland, 2 June 2014 Collaborative policy development at M3AAWG VTASIG and LAP DNC Hein Dries-Ziekenheiner VIGILO ITU Workshop.
The Data Sharing Working Group 24 th meeting of the GEO Executive Committee Geneva, Switzerland March 2012 Report of the Data Sharing Working Group.
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
International Telecommunication Union ENUM Organizational Perspectives Richard Hill, for Houlin Zhao Director Telecommunication Standardization Bureau.
Prevention & Protection SAME ENDS DIFFERENT MEANS? THE FUTURE STRUCTURE AND PURPOSE OF CFOA’ s PREVENTION AND PROTECTION ACTIVITIES.
COMESA MONETARY INSTITUTE TRAINING ON MACROPRUDENTIAL POLICY TOOLS RELEVANT FOR COMESA MEMBER COUNTRIES WORKSHOP II: DSIBS FRAMEWORK SOLUTIONS.
Agenda The problem – where are we now?
Regulatory challenges and perspectives for positive growth
Internet Interconnection
Developing a joint agenda on Water + Agriculture
ENUM: Convergence of Technology and Interests?
Ofcom’s role in cyber security
Presentation transcript:

Geneva, Switzerland, 2 June 2014 The UK experience and approach to damage mitigation Huw Saunders, Director, Network Infrastructure, Ofcom ITU Workshop on “Caller ID Spoofing” (Geneva, Switzerland, 2 June 2014)

Geneva, Switzerland, 2 June Outline Nuisance calls and spoofed CLI – metrics, motives and policy actions Mitigating the risk through regulatory and industry initiatives The role of international collaboration Longer term technical solutions and implementation challenges

CLI spoofing and nuisance calls in the UK – the size of the problem 80%+ of UK consumers report regularly receiving “nuisance calls” with some getting 20+ weekly Most such calls have spoofed CLI – either deliberately malformed or using a genuine CLI unconnected with the caller to disguise their identity and location Network traffic sampling suggests that overall call attempts from such sources may be of the order of 1 – 2 billion per annum across all networks in the UK Geneva, Switzerland, 2 June

Motives, impact and policy responses Most calls are unsolicited live marketing calls or automated messages from “lead generators” – little evidence to date of “Voice DDOS” problems seen in North America Calls create significant consumer concern and undermine trust – some cases of exploitation for fraud through “social engineering” Clear breaches of regulation and law – coordinated action being taken by Ofcom and ICO, and a UK Government Action Plan was announced by DCMS in March, calls-action-plan-unveiled Geneva, Switzerland, 2 June

Short term mitigation Aim to stop Nuisance Calls at source Requires an agreed call tracing process and appropriate action when the source has been identified – NICC ND1437 – V1.1.1.pdf - now in use by Ofcom Use clear regulatory guidelines on CLI to identify calls which are problematic NICC producing revised rules dealing with VoIP and VoIP to SS7 transition Should allow national regulatory, commercial interconnect and network based mitigation actions Geneva, Switzerland, 2 June

6 Stage 0 Stage 1 Stage 2 Stage 3 Basic data to trace call is assembled Ofcom obtains information required for a call trace from the terminating CP, e.g. - Time of call, CLI of calling/called parties, presentation number, incoming route id, CP contact number Contact the CP hosting the calling CLI (i.e. the originating CP) for caller information If CLI is missing/inaccurate, this step will definitely/probably fail Even with valid CLI, it may be international, subcontracted to a reseller, ported out, misallocated – all of which may lead to failure of this step Trace the call through the upstream networks This step occurs if Step 1 fails Obtain caller information from originating CP If this network CP is also retail CP, then customer identity = caller identity If there is a reseller then a further request(s) may be needed to obtain caller identity Ofcom Transit CP3Transit CP2Transit CP1 Originating CP 1. Trace request 2. Trace Response (speak to CP2) 3. Trace request 5. Trace request 7. Trace request 4. Trace Response (speak to CP1) 6. Trace Response (speak to OCP) 8. Trace Response (identity of caller) ND1437 tracing process

A sample trace Geneva, Switzerland, 2 June Example 2: 128 complaints about calls using CP1 asked to trace Calls routed through CP2 via CP3 in UK who routed calls from CP4 in Vancouver via a VoIP call centre in Kolkota, India who have been unwilling or unable to say on whose behalf the calls were being made or why they were made.

The need for international collaboration Call tracing often requires international co-operation to be successful – need for regulatory/administrative Code of Practice? Existing MoU between USA, Canada, Australia, UK etc regulators complemented by London Action Plan and M3AAWG initiatives to share best practice and take effective action could form template Standards bodies need to ensure they are responsive to emerging problems and provide appropriate technical framework Problems may get worse as transition from legacy SS7 based “PSTN” to VoIP future through SIP, VoLTE and other technologies is completed Geneva, Switzerland, 2 June

Longer term solutions? Key enabler of the problem is the lack of control over CLI in VoIP, particularly SIP, and the much lower cost of call generation these technologies have delivered. Whilst greater regulatory clarity over acceptable practice and effective enforcement will help, a more systemic means of providing caller identity assurance is needed IETF STIR project seems to offer a promising route to providing such assurance but many issues need to be resolved both in the technical domain and in ensuring rapid and effective adoption Geneva, Switzerland, 2 June

Implementation issues The existing E164 administration and allocation processes will need to be integrated with any identity certification methodology adopted Such certification, RPKI based or otherwise, will need to be encouraged if not mandated on an international basis to have significant effect Regulators and administrations have key roles in ensuring and policing adoption but, ultimately, wider telco and Internet “communications community” needs to take collective ownership Key test of governance over next 5 years+ Geneva, Switzerland, 2 June

Conclusions and Recommendations CLI spoofing problem is growing Current mitigations unlikely to be fully effective Longer term solutions will take time Implementation will be complex International cooperation and collaboration must be made more effective Implementation of longer term solutions needs to be considered in parallel to technical work Geneva, Switzerland, 2 June