Skip to content
LATRO: Leaders in RAFM Solutions, SIM Box Bypass Fraud, Revenue Assurance and more Logo LATRO: Leaders in RAFM Solutions, SIM Box Bypass Fraud, Revenue Assurance and more Logo LATRO: Leaders in RAFM Solutions, SIM Box Bypass Fraud, Revenue Assurance and more Logo
  • Solutions
    • Revenue Assurance
      • Network & Usage Assurance
      • Rating and Billing Assurance
      • Order Entry & Provisioning 
      • Partner Management
      • Customer Management
      • Mobile Money Assurance
    • Fraud Management
      • Types of Bypass Fraud
        • SIM Box Bypass Fraud
        • Off-Net SIM Box Bypass Fraud
        • CLI Refiling Fraud
      • Geolocate Fraud SIM Box Operations
      • Wangiri Fraud
      • Wholesale Rate Analytics
      • LATRO Guarantee for Fraud Management
    • Data Analytics
      • Versalytics Intelligence
    • Specialized Services
      • Regulator Services
      • Managed Services
      • Managed Services VAS / IN
      • Consulting Services
      • Cellular Forensics
  • Knowledge Center
    • Blog
    • Whitepapers & Datasheets
    • Webinars
    • Videos
    • Events
  • Company
    • About us
    • Executive Advisory Board
    • Newsroom
    • Partners
    • Careers
  • HAVE A QUESTION?

CALL SIGNING ANALYTICS: A Proactive Approach to Getting the Most from STIR/SHAKEN

By Ihab Al-Shayeb|2022-01-06T10:35:48-05:00January 7th, 2022|
  • View Larger Image

CALL SIGNING ANALYTICS: A Proactive Approach to Getting the Most from STIR/SHAKEN

By Ihab Al Shayeb, VP Technology

Since the telecommunications industry adopted packetized voice communications in the early 2000s, the global telephony infrastructure has shifted from circuit-switched networks, also called Time-Division Multiplexing (TDM) networks, to Internet Protocol (IP) based networks. Specialized IP protocols were developed to support Voice Over IP (VOIP) services and Session Initiated Protocol (SIP) and Real-Time Transport Protocol (RTP) emerged as the ubiquitous technology to connect voice calls around the world.

Today, the majority of voice communications services rely on SIP/RTP connectivity including mobile phone calls, and almost all international voice calls connect through SIP/RTP. Packet networks have significant benefits over legacy TDM infrastructure, namely cost. The global voice communications networks have grown substantially due to the simplicity and lower cost nature of IP-based packet networks.

Unfortunately, when it comes to transmission and presentation of phone numbers to user devices and within telecommunications internal call records, VOIP and SIP lack the inherently secure nature of legacy TDM based networks. In VOIP and SIP networks, the calling party phone number is easily manipulated or changed without affecting the call routing and connectivity.

As a result, phone number manipulation has become a rampant problem in the global voice communications ecosystem. Fraudulent or malicious actors routinely manipulate phone numbers to enable billing fraud, social engineering, and surveillance evasion. In the United States, dodgy marketing companies use automated “robocalls” to systematically call through phone number ranges, seeking to prompt vulnerable consumer action.

Unwanted robocalls are the number one complaint from US consumers about communication services. The Federal Communications Commission (FCC) and Federal Trade Commission (FTC) received approximately six million complaints in 2018 and, more disturbingly, Americans reported $1.48 billion in 2018 lost to fraud originated from robocalls.

In response, on March 31, 2020, the FCC approved the mandate for licensed telecommunication voice carriers to implement STIR/SHAKEN. As of June 30, 2021, large carriers (those with more than 100,000 subscribers) must be compliant or face regulatory fines. Smaller carriers have until June 30, 2022.

At a high level, STIR provides the ability within SIP to authenticate caller ID and SHAKEN defines the end-to-end architecture to implement caller ID authentication using STIR. A list of relevant standards and specifications is published at https://www.1routegroup.com/resources/.

A key part of the phone number spoofing problem is that bad actors are continually changing their calling behavior, such as the numbers they call from and who they are calling. The way to make STIR/SHAKEN truly valuable is to incorporate analytics-based solutions for real-time action. LATRO’s Versalytics is a highly versatile analytics solution that consists of multiple detection methods. It integrates with the STIR/SHAKEN STI-Authentication Service and/or STI-Verification Service interfaces, performing deep analysis on the calling and called phone numbers, proactively detecting fraudulent activity, and preventing revenue damaging call manipulation attacks.

STIR/SHAKEN protects the network from caller ID spoofing but does not tell you whether a call is good or bad (i.e. legitimate or fraudulent in nature). It is the job of Versalytics real-time analytics to help you determine whether the call is good or bad. But STIR/SHAKEN is important because it significantly improves the quality of Real-Time Analytics. Take the following example to show this in action.

Suppose an enterprise customer, Jimmy’s Bakery, uses +966 11 222 3333 as the number they call from (their enterprise pilot line). Now imagine there is a fraudster who is spoofing Jimmy’s number.

Using STIR/SHAKEN, Jimmy’s calls are signed with a digital signature and the fraudster’s calls are not. Without the STIR SHAKEN certificate, it is hard for Real-Time Analytics to tell the difference between Jimmy’s genuine calls and the fraudster’s calls. With the signature, Real-Time Analytics can easily tell the difference and distinguish between Jimmy’s calls (allowing them through) and the fraudster’s calls (blocking them).

Telecom operators implementing the FCC-mandated STIR/SHAKEN framework should consider an incremental investment in Call Signing Analytics. With an additional, small budget, the benefit of analyzing voice traffic in real-time will pay back many times over in stopping fraud.

Share This Story, Choose Your Platform!

FacebookTwitterLinkedInPinterest

About the Author: Ihab Al-Shayeb

Ihab Al Shayeb is the Director of Solutions Architecture and senior technical advisor to LATRO’s executive management team, based in Jordan. He enjoys spending time with his wife and two children and watching football.

Related Posts

Will Artificial Intelligence Replace Rules-Based Fraud Detection?
Will Artificial Intelligence Replace Rules-Based Fraud Detection?
Gallery

Will Artificial Intelligence Replace Rules-Based Fraud Detection?

March 14th, 2023 | 0 Comments
What has the biggest effect on stopping international bypass fraud?
What has the biggest effect on stopping international bypass fraud?
Gallery

What has the biggest effect on stopping international bypass fraud?

July 28th, 2022 | 0 Comments
Versalytics Intelligence – Simple Solution for Complex Business
Versalytics Intelligence – Simple Solution for Complex Business
Gallery

Versalytics Intelligence – Simple Solution for Complex Business

June 7th, 2022 | 0 Comments
Device Characterization: Getting Help from Your Network to Detect SIM Box Fraud
Device Characterization: Getting Help from Your Network to Detect SIM Box Fraud
Gallery

Device Characterization: Getting Help from Your Network to Detect SIM Box Fraud

January 5th, 2022 | 0 Comments
An Introduction to Cellular Forensics
An Introduction to Cellular Forensics
Gallery

An Introduction to Cellular Forensics

December 9th, 2021 | 0 Comments

Leave A Comment Cancel reply

LATRO Logo

Understand. Innovate. Solve.

Talk to us
LATRO helps telecommunication operators, service providers, and national regulators solve complex business problems through the creative use of advanced technology and techniques.
Solutions – Revenue Assurance
  • Revenue Assurance
  • Network & Usage Assurance
  • Rating and Billing Assurance
  • Order Entry & Provisioning 
  • Partner Management
  • Customer Management
  • Mobile Money Assurance
Solutions – Fraud Management
  • Fraud Management
  • Types of Bypass Fraud
  • SIM Box Bypass Fraud
  • Off-Net SIM Box Bypass Fraud
  • CLI Refiling Fraud
  • Geolocate Fraud SIM Box Operations
  • Wholesale Rate Analytics
  • Wangiri Fraud
  • Regulator Services
Resources
  • Knowledge Center
  • Newsroom
  • Blog
  • Webinars
  • Partners
  • Careers
  • Company

© Copyright 2012 – 2022, LATRO Services Inc. All rights reserved. Privacy Policy

Page load link
Go to Top