Geneva, Switzerland, 2 June 2014 Experience of an inbound telephony provider Anne-Valérie Heuschen, Head of legal & regulatory affairs, Voxbone, Belgium.

Slides:



Advertisements
Similar presentations
Technical measures in the context of the Hadopi Law (France)
Advertisements

International Telecommunication Union ENUM Issues and Solutions Houlin Zhao Director Telecommunication Standardization Bureau International Telecommunication.
Northside I.S.D. Acceptable Use Policy
1 The Data Protection Officer at work Experience, good practices and lessons learnt Pierre Vernhes – former DPO at the Council of the EU Workshop on Data.
Wyn Lucas Independent Telecommunications Consultant.
EU regulatory framework for electronic communications - Introduction Richard Harris Independent EU telecommunications consultant ICTtrain workshop London.
Geneva, Switzerland, 2 June 2014 The UK experience and approach to damage mitigation Huw Saunders, Director, Network Infrastructure, Ofcom
Fabio Leite, IMT-2000 Project Manager International Telecommunication Union (ITU) Emergency Telecommunications Workshop February.
Geneva, Switzerland, 2 June 2014 The Regulatory aspects of CPND, CLI and OI “the ITRs” Sherif Guinena SG2 Chairman ITU Workshop on “Caller ID Spoofing”
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
AIMS Workshop Heidelberg, 9-11 March /20 A Telecom and IP Project from ETSI Gerald Meyer
International Telecommunication Union ITU Perspective on ENUM Robert Shaw ITU Internet Strategy and Policy Advisor ICANN Rio de Janeiro, Brazil March 25,
Framework for Global Electronic Commerce Communications 411 Relevant Site:
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Geneva, Switzerland, 2 June 2014 Study on Spoofed Call Detection and Prevention in 3GPP China Mobile ITU Workshop on “Caller ID Spoofing” (Geneva, Switzerland,
Geneva, Switzerland, 2 June 2014 Analysis of Caller ID delivery in China Hexian Huang CATR, China ITU Workshop on “Caller ID Spoofing”
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
The General Tax Law. General Tax Law was applicable from 1 January 2003 On 1 January 2009, a new General Tax Act (GTA) came into force. It was amended.
 Background  Why the ITRs are important  The need to revise the ITRs  Preparatory process  Some key proposals  Expectations for WCIT-12.
Credential Provider Operational Practices Statement CAMP Shibboleth June 29, 2004 David Wasley.
Geneva, Switzerland, 2 June 2014 SG2: WTSA and PP Resolutions “Recommendation E.157” Sherif Guinena SG2 Chairman ITU Workshop on “Caller ID Spoofing” (Geneva,
National Smartcard Project Work Package 8 – Security Issues Report.
UNITED NATIONS Economic and Social Commission for Asia and the Pacific Economic Commission for Europe Beijing, September 2005 Sub-regional Seminar.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
Caribbean Telecommunications Union. 6th Caribbean Internet Forum (CIF), Port of Spain, October Caribbean Telecommunications Union The Internet: Governance.
IMPLEMENTING THE WSIS ACTION PLAN NAIROBI, March 2004 Jose Toscano Director, External Affairs International Telecommunications Satellite Organization.
International Telecommunication Union Global ENUM Implementation Robert Shaw ITU Internet Strategy and Policy Advisor International Telecommunication Union.
International Telecommunication Union Geneva, 2 November 2009 Total Conversation – Meeting UN Convention and European Commission requirements for everyday.
International Telecommunication Union ENUM Implementation Robert Shaw ITU Internet Strategy and Policy Advisor International Telecommunication Union ICANN.
PSTN Numbering Plan Abdul Rahim Rahem Atayee Maqsood(dawood) Farhad (siddiqi) Besmullah (sirdash)
International Telecommunication Union ENUM: Convergence of Technology and Organizational Perspectives Swedish Administration Workshop on ENUM Stockholm,
International Telecommunication Union ENUM: Convergence of Technology and Interests? ITU Tutorial Workshop on ENUM Geneva, February 8, 2002 Robert Shaw.
Article 28(2) USD Introduction. The Problem Fraud and Misuse scale Evolving risks Impact on end users –Direct financial impact –Direct inconvenience Indirect.
The EU Directive on "Services in the internal market", COM(2004) 2 final/3 Agnese Knabe Project coordinator European Public Health Alliance Civic Alliance.
National INFOSEC Organisations and INFOSEC Management in Hungary.
Geneva, Switzerland, 2 June 2014 Collaborative policy development at M3AAWG VTASIG and LAP DNC Hein Dries-Ziekenheiner VIGILO ITU Workshop.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
International Telecommunication Union ITU Perspective on ENUM Robert Shaw ITU Internet Strategy and Policy Advisor ICANN Rio de Janeiro, Brazil March 25,
PRIVACY IN THE ELECTRONIC COMMUNICATIONS SECTOR IN BULGARIA.
International Telecommunication Union ENUM Organizational Perspectives Richard Hill, for Houlin Zhao Director Telecommunication Standardization Bureau.
Workshop on Privacy of Public Figures and Freedom of Information - Skopje, 9-10 October 2012.
1 Regional Commonwealth in the field of Communications RCC PREPARATION FOR THE WORLD CONFERENCE ON INTERNATIONAL TELECOMMUNICATIONS
-1- WORKSHOP ON DATA PROTECTION AND DATA TRANSFERS TO THIRD COUNTRIES Technical and organizational security measures Skopje, 16 May - 17 May 2011 María.
Workshop for West-African Telecommunication Regulators Abuja (Nigeria), September 21-22, 2000.
ENF/ERO ENUM Convergence Workshop Tony Holmes Chairman ETSI SPAN11 NAR BTexact Technologies Numbering Addressing & Routeing 9-10 January 2002 Standards.
Hallgrímur Snorrason Management seminar on global assessment Session 6: Institutional and legal framework of the national statistical system Yalta
Presented by: Rebekah Johnson CEO/President Gloria-Mac
What can we expect from the lawyers ?
Timeline - ATIS Involvement
Independent Telecommunications Consultant
RADIO SPECTRUM MANAGEMENT
The Tampere Convention: its importance, and challenges to its ratification and implementation Using ICT for Effective Disaster Management Egypt, Alexandria.
Timeline - ATIS Involvement
International Regulatory:
IS4550 Security Policies and Implementation
Learning Area 1 Information And Communication Technology and Society
Jean-François Mulé CableLabs
2016 Annual CPNI Training CPNI & PI Awareness Beth Slough,
Henning Schulzrinne Columbia University
Summary of issues and results from GSC-11 User Workshop
E-Commerce for Developing Countries (EC-DC)
ENUM: Convergence of Technology and Interests?
Stephen R Whitesell TR-41 Chair VTech Communications
ICT Policy سياسات تكنولوجيا المعلومات والاتصالات
WCIT12 Update Planning & International Relations Department
What can we expect from the lawyers ?
Robocalling Blocking Cause and Effect
UNODC and CYBERCRIME October 2009.
Toll Fraud Prevention and STIR/SHAKEN
Presentation transcript:

Geneva, Switzerland, 2 June 2014 Experience of an inbound telephony provider Anne-Valérie Heuschen, Head of legal & regulatory affairs, Voxbone, Belgium ITU Workshop on “Caller ID Spoofing” (Geneva, Switzerland, 2 June 2014)

Agenda Voxbone Meaning of Caller ID/ CLI Examples of Caller ID/ CLI regulations Caller ID/ CLI spoofing Caller ID/ CLI spoofing from an operator perspective (I and II) Conclusion Geneva, Switzerland, 2 June

Voxbone Company Founded in 2005 Offices in Brussels (HQ), San Francisco and Los Angeles Global IP backbone carrying 2 Gbps of voice traffic with 5 SuperPOPs Business and services Services in 50+ countries, inbound exclusively VoxDID : Voice inbound services through local or national phone numbers in 50+ countries covered (4000+ area codes) Vox800: Voice inbound services through toll free or free phone numbers in 25+ countries covered Geneva, Switzerland, 2 June

Meaning of Caller ID/ CLI Caller ID = Caller Identification refers to E164 number and/or name calling CLI = Calling Line Identification refers to the E164 number calling At network level, if CLI is provided by origination network (in SIP, under a “P- asserted identity”), it will be forwarded until termination network (presence in the CDRs) Geneva, Switzerland, 2 June

Examples of Caller ID/ CLI regulations US Truth in Caller ID Act protects the privacy of the person calling by requiring telephone companies to make available free, simple and uniform per-line blocking and unblocking procedures. EU Directive 2002/58/EC, article 8: CLIP= Calling Line Identification Presentation CLIR= Calling Line Identification Restriction Intl: Privacy right is a human right as approved in “The right to privacy in the digital age” by the UN General Assembly, 20 November => At network level CLI is forwarded (in SIP “P-asserted identity” header) but CLIP/CLIR is an end user privacy right (in SIP “privacy” header) Geneva, Switzerland, 2 June

Caller ID/ CLI spoofing To spoof = to deceive, to abuse, to fool Malicious intent is key: Not financial in the telecommunication sense (except in cases of premium rates numbers) Scam/ Identity theft, harassing calls CLIP/CLIR protects the privacy of one individual and CLIR should not be considered as spoofing by definition Spoofing= CLI transformation with malicious intent; flexibility of CLI transformation is and should not be considered as spoofing, as long as it is not in a wilful or illegal mean. Prohibition of caller ID/ CLI spoofing for the purposes of defrauding or otherwise causing harm (e.g. US Truth in Caller ID Act ). Geneva, Switzerland, 2 June

Caller ID/ CLI spoofing from an operator perspective (I) Spoofing is detrimental for the reputation of an entire industry Spoofing already existed in a non-IP world CLI is generally received by the terminating network but no mean of ensuring the authentication of the CLI Geneva, Switzerland, 2 June

Caller ID/ CLI spoofing from an operator perspective (II) Prevention: Authentication of CLI (i.e. calling party has an authorization to use the number) at origination is crucial; if CLI has not been authenticate by originating network, no call origination should be allowed, or only with the “primary” authenticated CLI on file Already a best industry practice at administrative level IETF/ STIR committee work at technical level Sanction: LEAs have in practice tremendous difficulties to find the offender(s) due to 1) misunderstanding of the principles and 2) international nature of offenses Geneva, Switzerland, 2 June

Conclusion  Technical standards : IETF/ STIR committee work  Regulations: spoofing prohibition (transformation of CLI with wilful intent)  Foster international cooperation  Practical level: training of national LEAs to have an understanding of spoofing Geneva, Switzerland, 2 June