Download presentation
Presentation is loading. Please wait.
Published byTerence Hodges Modified over 9 years ago
1
Geneva, Switzerland, 2 June 2014 Collaborative policy development at M3AAWG VTASIG and LAP DNC Hein Dries-Ziekenheiner VIGILO (itu@vigilo.nl) ITU Workshop on “Caller ID Spoofing” (Geneva, Switzerland, 2 June 2014)
2
Geneva, Switzerland, 2 June 2014 2 Introduction VIGILO www.vigilo.nl M3AAWG (Mobile Messaging Malware Anti Abuse Workgroup) www.m3aawg.org LAP (London Action Plan) www.londonactionplan.org
3
Geneva, Switzerland, 2 June 2014 3 VTASIG Formed out of M3AAWG membership Larger (North American, European carriers, ISPs, Senders) In co-operation with LAP (especially DNC group) Text book definition: public private partnership
4
Geneva, Switzerland, 2 June 2014 4 VTASIG Goal: bring down complaints on Voip abuse Robocalls Illegal telemarketing Fraud Policy development for three phases: Short term Mid term Long term
5
Geneva, Switzerland, 2 June 2014 5 Short term *50 -> CDRs to regulator Next hop Find Originator of abuse (enforcement) Charge back? Agency determines applicability Consumer Carrier “Charges Back” upstream carriers VoIP, Cable-Co, Telco and OTT must adhere to abuse reporting standard Honeypots Trace back (P-ANI)
6
Charge-Back Model *50 M3AAWG 30th General Meeting | San Francisco, February 2014 ConsumerMiscreantVoIP Provider International Carrier Telco / Cable Co Initiates *50 Agencies Regulators Agencies Regulators CDR Sharing Charge Back Bad CDR’s $10/call $12/call $15 / Call $5/call Charge Back In or Out of Band Abuse Reporting / Billing
7
Geneva, Switzerland, 2 June 2014 7 (P)Honey Pots Goal: gather intelligence using honey pots Currently: large data set gathered from TNs that were abandoned for abuse CDRs of incoming calls(+1) CRTC Working on receiving regular numbers from telco’s (more +1) Georgia Tech: currently working on data to gather information and actionable intelligence
8
Geneva, Switzerland, 2 June 2014 8 Honey Pots
9
Geneva, Switzerland, 2 June 2014 9 Honey Pots
10
Geneva, Switzerland, 2 June 2014 10 Mid term Do Not Call list Abuse from outside SS7 network Intended mostly for VOIP->SS7 gateways Compares CgPN to list of “Do not Spoof” (SS7 based consumer) numbers
11
Mid Term User initiated blocking? Taking away legal/regulatory barriers Geneva, Switzerland, 2 June 2014 11
12
Mid Term RFC 3325 P-Asserted-Identity PAI Header for carriers to assert identiy (CID) of user Also for privacy options Creates a Trusted domain Subject to common spec(T) Could even work in hybrid networks (SS7/VOIP with SS7/ISUP trust bits) Geneva, Switzerland, 2 June 2014 12
13
Mid Term Geneva, Switzerland, 2 June 2014 13
14
Mid Term User initiated blocking? Taking away legal/regulatory barriers Geneva, Switzerland, 2 June 2014 14
15
Geneva, Switzerland, 2 June 2014 15 Long term STIR Others will present on this M3AAWG/LAP follow development Consider implications
16
Geneva, Switzerland, 2 June 2014 16 Conclusions and recommendations No silver bullet International co- operation (PPP) required National level: keep eye out for complaint levels..And respond with Best Practices defined internationally For regulators: join LAP Industry: join M3AAWG Together:VTASIG Brussels, Montreal, Boston, SF Further info: itu@vigilo.nl www.vigilo.nl
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.