Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
SHAKEN/STIR: Finally! A Solution to Caller ID Spoofing?
- This topic has 0 replies, 1 voice, and was last updated 1 year, 3 months ago by .
-
Topic
-
Robocalling and illegally spoofed calling is the number 1 complaint to the Federal Communications Commission. It has become such a problem that robocalls make up half of all phone calls and consumers are just refusing to pick up phone call outright. FCC chairman Ajit Pai challenged the telecommunications industry in November 2018 to adopt a caller authentication system to combat this growing nuisance or face regulatory intervention. So far a the telecommunications industry has presented a framework of interconnected standards called SHAKEN/STIR. Generally speaking the standards will make telephone providers to be responsible for confirming whether a caller is legitimate by requiring them to acquire certificates that allows them to make that verification. This could also turn out to be a big waste of time and resources because if this new framework will not be implemented industry wide relatively quickly it will give robocallers the opportunity to find new weaknesses to exploit.
You must be logged in to reply to this topic.