Geneva, Switzerland, 2 June 2014 Caller ID Spoofing, Egypt experience Dr. Hosam Abd Elmaoula NTRA EGYPT ITU Workshop on “Caller ID Spoofing” (Geneva, Switzerland,

Slides:



Advertisements
Similar presentations
Institutional Telecomms and Computer Network Monitoring Andrew Charlesworth University of Bristol 10 June 2002.
Advertisements

Intermediate 2 Computing
Introducing The IP550 IP Telephone. Things you should know about an IP Telephone system The IPitomy system has many of the same features of traditional.
Smart Personal Console (SPC). Smart Personal Console Overview SPC allows users more control over their personal communications settings. Users can view/set:
Setting Up Dropbox PCNA: HOW TO SETUP & SYNC FILES WITH DROPBOX.
Hosted Voice Quick Start Guide
Cisco Voice-over IP Telephony 4/27/2015 Model 7911 Model 7941 Model 7961.
TELUS Restricted and Confidential 1 Call Pilot 5.0 Voic Training AHS - ECS.
© 2005 Cable and Wireless plc Residential Services Menu Mango Walk Country Club
Hosted Voice Product Training
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Using the Cisco Technical Support & Documentation Website for Voice Issues.
Geneva, Switzerland, 2 June 2014 The Regulatory aspects of CPND, CLI and OI “the ITRs” Sherif Guinena SG2 Chairman ITU Workshop on “Caller ID Spoofing”
Internet Phishing Not the kind of Fishing you are used to.
Geneva, Switzerland, 2 June 2014 Analysis of Caller ID delivery in China Hexian Huang CATR, China ITU Workshop on “Caller ID Spoofing”
Voice over internet protocol (VOIP) November, 2007 SIM Mobile Services Ltd Phone , Mobile ,
Microsoft ® Lync ™ 2010 Review IM/Presence Basics.
Responding to an Everbridge Notification. Internet based notification system available 24/7/365 Multijurisdictional emergency and non-emergency notifications.
IP Telephony: Economic implications and impact on PTOs Dr Tim Kelly, International Telecommunication Union, IP Telephony Workshop, Geneva, 14 June 2000.
Salesforce.com Web to Leads. Unit Name Web to Leads A web to lead provides users the ability to gather information from their website visitors which automatically.
Winner Follow Me Presented by Telecom Transborder Services.
ICT Essential Skills. (electronic mail) Snail Mail.
A presentation created by David C.
Tutorial Video basic skills basic skills Next page -->
Social effect: Facebook is a site available to anyone. Many people use it in order to contact friends and relatives from all around the world, and to meet.
Geneva, Switzerland, 2 June 2014 SG2: WTSA and PP Resolutions “Recommendation E.157” Sherif Guinena SG2 Chairman ITU Workshop on “Caller ID Spoofing” (Geneva,
Introduction to Comcare’s Customer Information System Presentation.
Microsoft Outlook Web Application (OWA)
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
9/8/20151 Voice Mail Training for State Employees Presented by: Stacy Knickerbocker Telecommunications Specialist DOA/ITSD/NTSB
AG ProjectsDenic ENUM day Number portability Using ENUM and SIP Adrian Georgescu AG Projects
IPX-300 Series PBX with VIP-191 Install Procedure Copyright © PLANET Technology Corporation. All rights reserved. Internet Telephony.
NMU Voic Welcome to. This presentation will walk you through the setup and use of the NMU Voic system. Follow the step by step instructions.
Phone Tips Teresa Shibao & Paul Dial January 19, 2010.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
By Will Peeden.  Voice over Internet Protocol  A way to make phone calls over the internet.  A way to bypass the standard phone company and their charges.
Lead Management Tool Partner User Guide March 15, 2013
© Copyright 2007 Arbinet-thexchange, Inc. All Rights Reserved. Voice Peering Steve Heap Chief Technology Officer.
© Copyright 2007 Arbinet-thexchange, Inc. All Rights Reserved. VoIP Peering Pilot Using the Internet2 Backbone.
A Quick and Easy Guide to Skype Amazing Aardvarks of Alliteration Alex Hood Alex Huang John Milne Aaron Zell.
Dimensions of E – Commerce Security
Introducing The IP550 IP Telephone. What to expect from your new IPitomy IP telephone system The IPitomy system has many of the same features of traditional.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
 Jaden Terry.  To obtain privacy and protect data from other people. o Businesses Customer/Employee information Credit card numbers To gain a competitive.
EVALUATING SECURITY OF SMART PHONE MESSAGING APPLICATIONS PRESENTED BY SUDHEER AKURATHI.
How Phishing Works Prof. Vipul Chudasama.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
Detection and Mitigation of Spam in IP Telephony Networks using Signaling Protocol Analysis MacIntosh, R Vinokurov, D Advances in Wired and Wireless Communication,
Geneva, Switzerland, 2 June 2014 Collaborative policy development at M3AAWG VTASIG and LAP DNC Hein Dries-Ziekenheiner VIGILO ITU Workshop.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Pairus Admin Admin Panel Changes Required 1. Contents - Changes  Pairus Admin – Site Address Pairus Admin – Site Address  Fix logo at login screen –
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
1 AOL PICTURE FINDER Click FILE, Open My Picture Finder  Pictures on My Computer  My Pictures on AOL  Pictures I’ve Received Send via Order Prints.
Communication Methods
Any criminal action perpetrated primarily through the use of a computer.
SNG via Webinar. Where’s Webinar??  Double click Aflac 2000 folder  Highlight “SNGWebCommunicator”  Right Click and “Send To - Desktop”
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Eric Van Horn Cosc 356.  Nearly every organization in todays era uses computers and a network to send, receive, and store information  Very important.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Agenda Spoofing Types of Spoofing o IP Spoofing o URL spoofing o Referrer spoofing o Caller ID spoofing o Address Spoofing.
Done by… Hanoof Al-Khaldi Information Assurance
Introducing The IP550 IP Telephone
What is it? Why do I keep getting from Barracuda? SPAM.
Skype for Business Webinar Meeting
Smart Personal Console (SPC)
Simple, Flexible and Easy-to-Scale Cloud PBX Solution
Wireless Spoofing Attacks on Mobile Devices
Cybersecurity Simplified: Phishing
User Training for Yealink T4 desksets
Presentation transcript:

Geneva, Switzerland, 2 June 2014 Caller ID Spoofing, Egypt experience Dr. Hosam Abd Elmaoula NTRA EGYPT ITU Workshop on “Caller ID Spoofing” (Geneva, Switzerland, 2 June 2014)

Content Introduction o Definition of Spoofing o Types of Spoofing o Potential Impacts of Spoofing in Egypt Methods of ID-Spoofing in Egypt o Operator Procedures SIM box Re-file o Consumer Procedures Call Back SIM Card Applications mobile / website OTT Combating ID-Spoofing in Egypt Recommendations

Spoofing Spoofing is the act of one person pretending to be someone else

Types of Spoofing 1. Caller ID spoofing Is when a telephone's caller ID displays a number that does not belong to the person calling. 2.IP Spoofing A technique used to gain unauthorized access to computers. 3.URL Spoofing A website shows another website. 4. Address Spoofing A message coms from any address the sender chooses.

Impacts Inability to provide accuracy of charging, mutual settlements and accounting. Limiting the recipient ability to reject call attempts, which could have economic implications on the callee as well as the privacy. Inability to stop automated telemarketing calls. Callee deception, when he receives a call showing a local number, whereas the caller is outside of the callee country placed by international call. Impersonation, where a caller or message source can impersonate a known entity to the user by spoofing it’s number. Denial of services, route a huge number of calls to drop the services.

Methods of ID Spoofing in Egypt Operator procedures SIM BOX

Methods of ID Spoofing in Egypt Operator procedures Re-file occurs when the traffic is sent to a hub and then routed through a gateway that appears to re-originate the calls, so that they are not filed as “transit” traffic under international settlements.

Methods of ID Spoofing in Egypt Consumer procedures Traditional Call Back Step 1 – Registration Web Registration - enter account number, PIN and phone number in the web form sonatelco.com Mobile Registration - call the access number Step 2 - Make Calls Dial one of the callback access numbers provided in your panel. Listen for at least 1 ring and hang up and wait for call back. Pick up the hand set on the callback and listen for a 'BEEP'. Enter in the destination number you wish to call follow by #. Example #

Methods of ID Spoofing in Egypt Consumer procedures Advanced Call Back - SIM Card All what explained in the previous technique can be done by inserting a very slim SIM Card in the handset By using a SIM card you can make a call to anyone and hide or change your caller ID.

Methods of ID Spoofing in Egypt Consumer procedures Applications Mobile / Website ( ex. one leg call) Group spoofing Disguise your number Change your voice Add background noise 04

Methods of ID Spoofing in Egypt Consumer procedures Over The Top (OTT)

Fighting ID-Spoofing in Egypt SIM BOX Via Mobile 1. Test Call Generation (TCG) 2. Profiling 3. Group Killing 4. MSRN TGT

Fighting ID-Spoofing in Egypt SIM BOX Via Internet 1. Internet VoIP Filter (Operator Level /Country Level) 2. Detect and Stop/Throttle Bypassing IPs. Geneva, Switzerland, 2 June

Fighting ID-Spoofing in Egypt Re-file Fighting RE-file by modifying the commercial deals with carriers. Call Back and SIM card Fighting Call Back and SIM card by blocking the ranges of the numbers and IPs. OTT services Fighting the implications of OTT services by regulations including well defined SLA.

Proposed Actions To conduct studies to characterize possible types and ways of illegal ID spoofing. To develop Recommendations on regulatory measures to assist MSs and Operating Agencies to combat ID spoofing. To develop guides and bet practices, taking into account case studies from different regions of the world.

Thank You