Changes

STIR/SHAKEN

2,259 bytes added, 20 January
The following lines were added (+) and removed (-):
Also known as Verified Caller ID.Also known as Verified Caller ID and Trusted Calling. == FCC Mandate ==The STIR/SHAKEN mandate was approved unanimously, and the order sets a June 30, 2021 implementation deadline for all originating and terminating voice service providers. The agency is seeking comment on a proposal to extend the deadline for small voice service providers, as well as to require caller ID verification on non-IP voice networks, and expand the STIR/SHAKEN mandate to include intermediate voice service providers.The FCC estimates eliminating wasted time and nuisance from illegal robocall scams could result in $3 billion in cost savings annually, and protect Americans from robocall schemes that take approximately $10 billion from consumers each year.== Verifying Calls ==Major carriers will start verifying calls with other carriers using STIR/SHAKEN.  March 2020 - The Federal Communications Commission adopted rules requiring phone companies implement the STIR/SHAKEN caller ID authentication protocol in their IP networks.March 2021 - Verizon has started authenticating caller IDs using STIR/SHAKEN in exchanges with other major wireless carriers, as well as Comcast.STIR/SHAKEN helps carriers verify that an incoming call is actually coming from the number that shows up on the caller ID and isn’t spoofed and originating from a different number.  STIR/SHAKEN aims to help prevent and fight against scams and robocalls.  == Limitations ==Even though the largest voice service providers are now using STIR/SHAKEN caller ID authentication standards it has yet to be deployed to any significant degree (2023) on landline phone networks.  Furthermore, most companies that carry a lot of robocalls aren't yet required to follow the rules because of an exemption for carriers with 100,000 or fewer customers.  They continue to operate because of an FCC exemption.Caller ID spoofing is used by robocallers to mask their identity or to make it appear the call is from a legitimate source, often a nearby phone number with the same area code and exchange.  They have been taking advantage of VoIP technology however now they may retreat into using FCC exempt telephone carriers so that they can continue to spoof their calls using fake or other people's phone number on the caller ID.
Bureaucrat, administrator
16,192
edits