ITU Workshop on “Caller ID Spoofing” (Geneva, Switzerland, 2 June 2014) The UK experience and approach to damage mitigation Huw Saunders, Director, Network Infrastructure, Ofcom Huw.Saunders@Ofcom.gov.uk Geneva, Switzerland, 2 June 2014 Outline Nuisance calls and spoofed CLI – metrics, motives and policy actions Mitigating the risk through regulatory and industry initiatives The role of international collaboration Longer term technical solutions and implementation challenges Geneva, Switzerland, 2 June 2014 2 CLI spoofing and nuisance calls in the UK – the size of the problem 80%+ of UK consumers report regularly receiving “nuisance calls” with some getting 20+ weekly Most such calls have spoofed CLI – either deliberately malformed or using a genuine CLI unconnected with the caller to disguise their identity and location Network traffic sampling suggests that overall call attempts from such sources may be of the order of 1 – 2 billion per annum across all networks in the UK Geneva, Switzerland, 2 June 2014 3 Motives, impact and policy responses Most calls are unsolicited live marketing calls or automated messages from “lead generators” – little evidence to date of “Voice DDOS” problems seen in North America Calls create significant consumer concern and undermine trust – some cases of exploitation for fraud through “social engineering” Clear breaches of regulation and law – coordinated action being taken by Ofcom and ICO, and a UK Government Action Plan was announced by DCMS in March, 2014 https://www.gov.uk/government/news/nuisancecalls-action-plan-unveiled Geneva, Switzerland, 2 June 2014 4 Short term mitigation Aim to stop Nuisance Calls at source Requires an agreed call tracing process and appropriate action when the source has been identified – NICC ND1437 – http://www.niccstandards.org.uk/files/current/ND1437 V1.1.1.pdf - now in use by Ofcom Use clear regulatory guidelines on CLI to identify calls which are problematic NICC producing revised rules dealing with VoIP and VoIP to SS7 transition Should allow national regulatory, commercial interconnect and network based mitigation actions Geneva, Switzerland, 2 June 2014 5 ND1437 tracing process Stage 0 Basic data to trace call is assembled • Ofcom obtains information required for a call trace from the terminating CP, e.g. - Time of call, CLI of calling/called parties, presentation number, incoming route id, CP contact number Stage 1 Contact the CP hosting the calling CLI (i.e. the originating CP) for caller information • If CLI is missing/inaccurate, this step will definitely/probably fail • Even with valid CLI, it may be international, subcontracted to a reseller, ported out, misallocated – all of which may lead to failure of this step Stage 2 Trace the call through the upstream networks • This step occurs if Step 1 fails Ofcom 8. Trace Response (identity of caller) Originating CP Stage 3 6 7. Trace request 6. Trace Response (speak to OCP) Transit CP1 5. Trace request 4. Trace Response (speak to CP1) 1. Trace request 3. Trace request Transit CP2 2. Trace Response (speak to CP2) Transit CP3 Obtain caller information from originating CP • If this network CP is also retail CP, then customer identity = caller identity • If there is a reseller then a further request(s) may be needed to obtain caller identity A sample trace Example 2: 128 complaints about calls using 039393939 CP1 asked to trace Calls routed through CP2 via CP3 in UK who routed calls from CP4 in Vancouver via a VoIP call centre in Kolkota, India who have been unwilling or unable to say on whose behalf the calls were being made or why they were made. Geneva, Switzerland, 2 June 2014 7 The need for international collaboration Call tracing often requires international co-operation to be successful – need for regulatory/administrative Code of Practice? Existing MoU between USA, Canada, Australia, UK etc regulators complemented by London Action Plan and M3AAWG initiatives to share best practice and take effective action could form template Standards bodies need to ensure they are responsive to emerging problems and provide appropriate technical framework Problems may get worse as transition from legacy SS7 based “PSTN” to VoIP future through SIP, VoLTE and other technologies is completed Geneva, Switzerland, 2 June 2014 8 Longer term solutions? Key enabler of the problem is the lack of control over CLI in VoIP, particularly SIP, and the much lower cost of call generation these technologies have delivered. Whilst greater regulatory clarity over acceptable practice and effective enforcement will help, a more systemic means of providing caller identity assurance is needed IETF STIR project seems to offer a promising route to providing such assurance but many issues need to be resolved both in the technical domain and in ensuring rapid and effective adoption Geneva, Switzerland, 2 June 2014 9 Implementation issues The existing E164 administration and allocation processes will need to be integrated with any identity certification methodology adopted Such certification, RPKI based or otherwise, will need to be encouraged if not mandated on an international basis to have significant effect Regulators and administrations have key roles in ensuring and policing adoption but, ultimately, wider telco and Internet “communications community” needs to take collective ownership Key test of governance over next 5 years+ Geneva, Switzerland, 2 June 2014 10 Conclusions and Recommendations CLI spoofing problem is growing Current mitigations unlikely to be fully effective Longer term solutions will take time Implementation will be complex Geneva, Switzerland, 2 June 2014 International cooperation and collaboration must be made more effective Implementation of longer term solutions needs to be considered in parallel to technical work 11