FCC Chairman Ajit Pai issued a statement on August 14 about progress by major phone companies in implementing caller ID authentication. His statement was a reaction to news that AT&T and T-Mobile are beginning to roll out SHAKEN/STIR.
AT&T and T-Mobile announced yesterday, August 14, that they have begun to rollout cross-network call authentication using STIR/SHAKEN.
The FCC issued a call for comments on proposed rulemaking for robocall blocking. TransNexus responded to share our experience in deploying STIR/SHAKEN and robocall prevention solutions in telecom service provider networks. Here are highlights.
The U.S. House of Representatives passed the Stopping Bad Robocalls Act (HR 3375) on July 24 by a vote of 429–3. The legislation now moves to the Senate for consideration.
The Energy and Commerce Committee favorably reported the Stopping Bad Robocalls Act (HR 3375), as amended, out of committee today to the full U.S. House of Representatives by a vote of 48–0.
TransNexus CEO Jim Dalton participated in the FCC SHAKEN/STIR Robocall Summit in Washington D.C. on July 11, 2019. FCC Chairman Ajit Pai announced this summit to review progress made toward deploying SHAKEN/STIR and identify challenges to deployment and how to overcome them.
FCC Commissioner Geoffrey Starks released responses to his inquiries to 14 voice service providers about their plans to block suspected spam robocalls by default, on an opt-out basis. Here are highlights and excerpts from their responses.
We noticed a spike in attempted telecom fraud attacks in the U.S. during the Fourth of July holiday week. Here’s an overview of the attack profiles. The more you know about telecom fraud attacks, the better you can keep your network and subscribers safe.
The FCC today announced proposed rules banning malicious caller ID spoofing of text messages and foreign robocalls.
The Communications Subcommittee of the House Energy and Commerce Committee yesterday voted to consolidate four other bills into the Stopping Bad Robocalls Act. This omnibus legislation will next be considered by the full committee.
On June 20, a bipartisan version of the Stopping Bad Robocalls Act (HR 3375) was announced in the U.S. House of Representatives. Frank Pallone (D-NJ), chairman of the Energy and Commerce committee, and ranking member Greg Walden (R-OR) made the announcement.
TransNexus recently presented a webinar on Effective STIR/SHAKEN and Robocall Solutions that Work Today. Here’s a recording of this webinar.
On the heels of the recent FCC declaratory ruling to allow voice service providers to block suspected spam robocalls by default, Commissioner Geoffrey Starks sent letters to 14 providers asking about their planned response to the ruling.
The FCC today voted to allow voice service providers to block robocalls by default based upon reasonable call analytics. Consumers could request to opt out of default robocall blocking. By allowing default opt-in, blocking programs could be applied to more calls to more consumers, reducing their exposure to unwanted robocalls.
FCC chairman Ajit Pai’s proposed ruling to allow telecom service providers to block robocalls by default has been a hot topic. Here’s a summary of responses we’ve seen so far.
The STI-GA (Secure Telephone Identity Governance Authority) announced that they have selected iconectiv as the STI-PA (Policy Administrator). This is an important milestone in the rollout of STIR/SHAKEN in the U.S.
The U.S. Senate voted 97–1 in favor of the TRACED Act on Thursday, May 23, 2019. The Telephone Robocall Abuse Criminal Enforcement and Deterrence Act instructs the FCC to require voice service providers to implement STIR/SHAKEN not later than 18 months after the enactment of the legislation.
One of our customers recently defeated an International Revenue Sharing Fraud (IRSF) attack. We thought it would be useful to share with you some information about the attack profile and demonstrate how a modern telecom fraud detection system can prevent such attacks.
FCC chairman Ajit Pai today proposed a new declaratory ruling that, if adopted, would permit telecom service providers to block robocalls by default. Such call blocking would be based upon call analytics or contact lists in customer phones.
In 2018, the FCC proposed changes to the Intercarrier Compensation Scheme to prevent access stimulation (i.e., domestic traffic pumping). CenturyLink recommended a modification to the FCC proposal, and recently they filed an ex parte study with data to support their ideas.
FCC chairman Ajit Pai today announced that a SHAKEN/STIR Robocall Summit will be held on Thursday, July 11, 2019, in Washington D.C. to review industry progress in implementing SHAKEN/STIR.
The House Energy and Commerce Committee held a hearing on Legislating to Stop the Onslaught of Annoying Robocalls. Here’s a review of testimony provided by four witnesses.
The FCC issued a consumer alert in response to a reported wave of Wangiri scam robocalls. These calls ring once, then hang up. The scammer hopes that the called party will return the call. The return call would go to a high-cost number with charges billed to the victim.
The STIR/SHAKEN standards did not dictate how verification service (STI-VS) results should be displayed for users. This has been under discussion for a while, and standards are emerging.
Update: On April 15, 2019, we reported that the TRACED Act picked up eighteen more cosponsors, for a total of 53 sponsors and cosponsors. Since then, the proposed legislation to prevent spam robocalls has gained seven more cosponsors, for a total of 60 cosponsors plus one sponsor.
T-Mobile announced that caller ID verification with STIR/SHAKEN is now available for T-Mobile customers for calls that originate from Comcast Xfinity Voice home phone service.
There’s been some activity stirring in the U.S. Senate on prevention of spam robocalls, including a potential STIR/SHAKEN mandate. Here’s a recap of recent and upcoming events.
The Communications Fraud Control Association (CFCA) will host a webinar on April 11, 2019: Restoring Trust in the Telephone Network—A Tutorial on SHAKEN. This session will be facilitated by TransNexus.
Verizon announced recently that they have completed calls using STIR/SHAKEN technology within their network. The company issued a statement that this exchange of STIR/SHAKEN-enabled calls is a critical step in restoring trust in caller ID.
The TRACED Act (Telephone Robocall Abuse Criminal Enforcement and Deterrence Act), has been scheduled for consideration at a meeting of the US Senate Committee on Commerce, Science and Transportation on April 3, 2019.
We’ve gathered the most frequently-asked questions about STIR/SHAKEN, and we’re going to present and discuss the answers in an upcoming webinar. Join us!
AT&T and Comcast today announced that they’ve exchanged calls between their landline networks using caller ID authentication with STIR/SHAKEN.
We’ve noticed an uptick in inquiries about solutions to prevent TDoS (Telephony Denial of Service) attacks. Such attacks are bad news: they can target and overwhelm critical telephone systems, such as emergency response numbers or call centers. The good news: effective solutions are available.
A large telephone service provider was recently evaluating SIP Analytics® fraud prevention alongside their incumbent CDR-based telecom fraud management system. Then a telecom fraud attack hit.
On February 19, 2019, TransNexus and TelcoBridges teamed up to present an educational webinar, How to Implement STIR/SHAKEN. A recording of this presentation is now available. The session includes a live demonstration.
The Federal Communications Commission Consumer and Governmental Affairs Bureau today released a Report on Robocalls. This report fulfills a requirement to describe progress made in combatting illegal robocalls and the remaining challenges.
Frank Pallone Jr., chairman of the House Energy and Commerce committee and House representative from New Jersey, announced today that he has reintroduced the Stopping Bad Robocalls Act (HR 946) into the House of Representatives to stop abusive robocall practices.
ATIS conducted a webinar on Wednesday, January 30, 2019, “SHAKEN 101: Mitigating Illegal Robocalling and Caller ID Scams.” In this webinar, STI-GA director Brent Struthers shared his expectations for when the STI Policy Administrator (STI-PA) might be in place.
T-Mobile announced yesterday that they have launched its new Caller Verified technology to give their customers relief from unwanted robocalls and caller ID spoofing. This service is their branded name for their STIR/SHAKEN deployment. Here’s how they describe it:
The CRTC (Canadian Radio-television and Telecommunications Commission) recently mandated specific call-blocking measures. Canadian telecommunications service providers must implement a system to perform these blocks by 19 December 2019.
The Federal Communications Commission recently issued a notice of proposed rulemaking to comply with legislation enacted in the RAY BAUM’s Act, which was signed into law in March 2018. Here’s a summary of the proposed changes.
On December 12, 2018, the Federal Communications Commission issued a report and order for the creation of a reassigned numbers database. This database is intended to reduce the number of phone calls intended for someone else. Here’s how it will work.
The Federal Communications Commission today issued a new rule to prevent spam robotext messages.
ATIS announced the appointment of the director of the Secure Telephone Identity Governance Authority (STI-GA). This will be a critical role in the deployment of the SHAKEN/STIR framework.
Fourteen carriers have replied to FCC Chairman Pai’s call to implement SHAKEN without delay. Read this post to find out who replied and what they said.
The Federal Communications Commission (FCC) has proposed rules to prevent robotexting and robocalls to reassigned numbers. Here are the details.
A new piece of legislation to mandate STIR/SHAKEN, provide safe harbor for providers to block calls, and increase criminal penalties for unlawful robocall perpetrators has been introduced in the U.S. Senate. The TRACED Act is designed to provide every person with a phone much needed relief from unwanted, illegal robocalls.
The U.S. Secure Telephone Identity Governance Authority (STI-GA) today issued a request for proposal (RFP) for selection of a Secure Telephone Identity Policy Administrator (STI-PA). The STI-PA will be a key role in enforcing rules for smooth operation of STIR/SHAKEN to enable secure caller ID, which will prevent caller ID spoofing, a tactic used with unwanted robocalls.
TransNexus teamed up with TelcoBridges to develop content on Battling Robocalls with STIR/SHAKEN, which Alan Percy, Senior Director of Product Marking for TelcoBridges, presented at the AstriCon 2018 conference in Orlando. Check out this video to learn how STIR/SHAKEN will tackle the problem of unwanted robocalls and the scams they perpetrate.
Federal Communications Commission (FCC) chairman Ajit Pai yesterday called on telecom carriers to implement SHAKEN as quickly as possible to protect consumers from caller ID spoofing and unwanted robocalls.
The Federal Communications Commission recently issued a proposed rule that is designed to remove the financial incentive for domestic traffic pumping from the intercarrier compensation regime. Here’s how it works, and why it’s needed.
We have received several inquiries from telecom service providers who are interested in the new ClearIP least cost routing feature. This service provides an easy, effective way to manage jurisdictional least cost routing. This blog post provides a quick overview to help you learn how it works.
Google recently announced a new call screening feature for its Pixel phone. This feature is intended to help customers screen unwanted robocalls. Here’s what it will do.
Thirty-five state attorneys general filed a comment with the FCC supporting efforts to combat unwanted robocalls. In this filing, they encouraged aggressive implementation on several fronts.
Many telecom billing and fraud analysts are experts on Call Detail Records (CDRs) but might be less familiar with Session Initiation Protocol (SIP) records. This blog post provides a quick introduction to SIP records and compares them to CDRs.
The FCC yesterday levied a large fine against a robocaller for using caller ID spoofing. The number of calls made by this perpetrator is astounding.
“A virtual explosion in annoying robocalls…” That’s how NBC news reporter Kevin Tibbles began his television news story on the problem of unwanted robocalls. Tibbles interviewed TransNexus as part of his story to tell viewers how STIR-SHAKEN technology will solve this problem.
Call centers are at risk from social engineering fraud scams. SHAKEN will help call centers eliminate some of the risk.
A new ClearIP customer enabled call forward blacklisting. They experienced a telecom fraud call forwarding attack over the weekend. Here’s what happened:
Most ClearIP customers connect their telecom network to ClearIP using TCP. Some may want to use TLS for the additional encryption security it provides.
Call-forwarding fraud is a common telecom fraud attack. This blog post explains how ClearIP blacklisting can be used to easily prevent call-forwarding telecom fraud.
The FCC issued a call for comments on robocalling activity and prevention, including progress on SHAKEN/STIR. Here are highlights of comments offered.
ATIS published a technical report that describes a proposed architecture for a centralized signing and signature validation services used in a SHAKEN/STIR deployment. This blog post summarizes the rationale for this architecture.
ATIS has published a technical report on a framework for the display of verified caller ID. This report addresses the question “How should we tell a subscriber that caller ID has been verified, or that the caller ID is fake?” Specifically, what should be displayed on the subscriber’s telephone after SHAKEN/STIR processing? This blog post summarizes usability testing and framework proposals described in the report.
SIP Analytics® is a method to detect and prevent telecom fraud and unwanted robocalls. It checks each call in less than a second, before the call begins. It’s incredibly fast.
This blog post provides instructions on how to configure FreeSWITCH to interoperate with the TransNexus OSPrey server. We’ve tested this configuration in the development and testing of SHAKEN/STIR. We’re sharing this information with the community of telecommunications network engineers who are preparing their company’s FreeSWITCH for testing and deployment of SHAKEN/STIR functionality.
The recording of the Battling Robocalls webinar, presented by TransNexus and Telco Bridges, is now available online.
New York Magazine recently ran an article on increasing robocall volume. They reported that there were 3.4 billion robocalls placed in April 2018, up from 2.5 billion in April of 2017—a 36% increase. Furthermore, while in 2014 the average American received 15 spam phone calls a month, by 2018 the average American was getting slammed with 23 spam phone calls a month.
On May 14, 2018, the FCC announced that chairman Ajit Pai has accepted the recommendations of the North American Numbering Council (NANC) for industry to quickly establish a Governance Authority for implementing the SHAKEN/STIR framework.
On May 10, 2018, the Federal Communications Commission voted to fine a robocall perpetrator $120 million.
The North American Numbering Council (NANC) issued their report to the Federal Communications Commission (FCC) on May 3 with a proposal for governance arrangements and timelines to implement STIR/SHAKEN, which would provide secure caller ID to prevent unwanted robocalls and reduce telecom fraud.
On May 3, representatives from Verizon met with members of the Federal Communications Commission (FCC) to share Verizon’s plans to combat robocalls. On May 7, Verizon representatives followed up on this meeting with an ex parte letter to the FCC outlining the discussion, including Verizon’s plans and expected timeline to implement Secure Telephone Identity using the STIR/SHAKEN framework.
On May 3, the North American Numbering Council (NANC) issued a report to the Federal Communications Commission (FCC) with recommendations for governance arrangements and implementation timelines for secure caller ID, or Secure Telephone Identity (STI), in the United States using the SHAKEN/STIR framework.
Jim Dalton, CEO of TransNexus, and Gary Audin, Senior Technology Analyst with Telecom Reseller, recorded a 15-minute EDUcast to discuss telecom fraud risks and the best ways to prevent it. This EDUcast was hosted by Telecom Reseller.
The U.S. Senate Committee on Commerce, Science, and Transportation will conduct a hearing on “Abusive Robocalls and How We Can Stop Them.” The hearing will be held on Wednesday, April 18, 2018, at 10:00 a.m. EDT. A live video of the hearing will be broadcast online at www.commerce.senate.gov.
Today the Federal Communications Commission and Federal Trade Commission announced two upcoming events to address the illegal robocall problem:
Several Canadian telecommunications service providers have warned their customers to avoid answering or returning calls from unknown international numbers. This type of telecom fraud is called “Wangiri,” which is Japanese for “one and cut.” Here’s how it works.
The Federal Communications Commission (FCC) recently issued their report on Voice Telephone Services: Status as of December 31, 2016, which showed continued growth of VoIP and mobile subscriptions and a decline in subscribership to traditional wired telephone services.
On 7 December 2017, the Federal Communications Commission (FCC) asked the North American Numbering Council (NANC) to provide advice on how the Trusted Anchor function should be defined and implemented in the pending STIR/SHAKEN call authentication system for Secure Telephone Identity.
On 22–23 January 2018, CTIA, a group that represents the U.S. wireless communications industry, met with the Federal Communications Commission (FCC) to discuss how to prevent nuisance robocalls.
Robocalls are a nuisance for telephone customers. Government regulators have set up Do Not Call lists and rules to keep robocalls at bay, but it isn’t working. There’s money to be made from robocalling, and technology makes it easy to conceal the caller’s true identity.
The Washington Post (WP) recently reported some startling facts about robocalling:
On January 3, 2018, news broke that security flaws had been discovered in computer processor hardware and the low-level code that controls how these processors work.
TransNexus has added Secure Telephone Identity authentication and verification features to its call routing and fraud control products. By authenticating and verifying caller ID, this technology can provide relief from unwanted robocalls.
The FCC (Federal Communications Commission) recently unanimously passed a resolution that allows carriers to block caller ID-spoofed numbers.
Telecom fraud management systems that rely on CDR analysis can allow thousands of dollars in fraud losses even when they work properly. The problem is simple: CDR analysis is too slow.
TransNexus Proves Effectiveness of Caller Authentication Standards with the ATIS Robocalling Testbed Hosted by the Neustar Trust Lab
TransNexus, Inc. announced today it has completed testing with the ATIS Robocalling Testbed that proves the effectiveness of caller authentication standards.
Recently TransNexus spoke with Don Witt of the Channel Daily News, a Telecom Reseller publication, about the continuing problem of telephony fraud and how to prevent it. They discuss how TransNexus solutions, using SIP Analytics, prevent fraud before it happens.
Readers of this blog are familiar with the problem of robocalls and caller ID spoofing that are plaguing the country’s phone network. In the newest twist to caller ID spoofing, criminals are spoofing the toll free number of the FTC in order to trick recipients into thinking the call is coming from a trusted government number.
The FTC (Federal Trade Commission) has reported that it's already received 3.5 million complaints around robocalls in the first eight months of 2017.
On October 3, 2017, the Federal Communications Commission (FCC) issued a new Notice of Proposed Rule Making (NPRM) and Notice of Inquiry (NOI) for implementing nationwide number portability (NNP).
What is one of the scariest sounds in the business world? How about when you pick up your phone on a busy Monday morning and there is NO DIAL TONE!
Criminals using robocalls to target citizens is nothing new. The American public is overwhelmed every day with the number of robocalls they receive.
When the Los Angeles Times writes about STIR and SHAKEN, it starts to look like the proposed solutions for stopping spoofed robocalls are getting wider attention.
If you or a family member are impacted by the flooding in Texas, please beware of criminals using robocalls to scam victims of the flood.
TransNexus has announced the launch of ClearIP, a cloud-based platform for advanced telecom management services.
Kim France, a real estate agent in Hilton Head, was recently harassed by 700 robocalls a day for five days. As a real estate agent, France relies on her phone, and has to often answer calls from unknown numbers. But when she went to bed one night, she didn't realize she would wake up to a robocall nightmare.
Robocalls have, sadly, become a reality in our personal and business lives, and most of us have experienced the “you’ve won a free cruise” robocall. If you have received that robocall, you may be able to get a settlement check of up to $900!
There’s no shortage of stories around companies making the move to the cloud. There are many reasons why an organization would want to manage their IT in the cloud; however, the same can be said for managing solutions in house.
The FCC announced late last week that it’s levied a fine against a North Carolina man, Philip Roesel, owner of Best Insurance Contracts. Roesel allegedly made more than 21 million spoofed robocalls in a few months to vulnerable individuals in an effort to sell health insurance.
SIMbox fraud is alive and well. Some who are subject matter experts argue it is alive and is thriving because of corruption within some telecom companies.
The FCC just released 833 as the newest toll free prefix. They typically release a new toll free prefix to meet demand from the business community. It's been three years since the FCC has released a new toll free number. The first toll free prefix, 800, was released in 1967 and has been followed by five other numbers: 888, 866, 877, 855, and 844.
In late March 2017, the FCC adopted a Notice of Inquiry (NOI) and a Notice of Proposed Rulemaking (NPRM) to begin the process around blocking illegal robocalls by service providers, asking for feedback on emerging protocols, STIR and SHAKEN, as well as other options for blocking illegal robocalls before they are completed.
The FCC under the current administration, led by Chairman Ajit Pai, seems determined to reverse net neutrality. Net neutrality and its underlying provisions in the Open Internet Order of 2015 ensure that a handful of companies cannot influence what you search for and see online.
TransNexus has written extensively about the scourge of robocalls and fraud in the telecom network. Americans are reminded daily about the illegal, spoofed robocalls that are afflicting all of us.
The FCC recently asked for public comment around the advanced methods (STIR and SHAKEN) to eliminate robocalls. In response, 30 state attorneys general commented to show their support for the methods as well as the push by the FCC to actively address robocalls.
In May, comedian John Oliver urged viewers of his show to express their dislike around Chairman Ajit Pai’s proposed reversal of net neutrality by writing comments on the FCC’s Electronic Comment Filing System (ECFS). Many viewers did go to the site and expressed their views. However, the FCC comments site was quickly brought down by what looks like a Distributed Denial of Service (DDoS). The site was receiving 160 requests per second with traffic mainly coming from a cloud service, not IP addresses which would be common if the traffic was legitimate.
The FCC has proposed its largest ever fine, $120 million, on a man from Florida accused of making 96 million illegal, spoofed robocalls over only three months. Adrian Abramovich, from Miami, made the spoofed robocalls “selling” timeshares and vacations.
The Local Number Portability Administrator (LNPA) for the US, iconectiv, announced that industry testing has begun around the new Number Portability Administration Center (NPAC). The first phase of testing enables vendors, service providers, and service bureaus that access the NPAC to validate that their systems interact properly with the iconectiv NPAC.
New technology has been recently developed to deliver messages straight to a subscriber’s voicemail, without the phone ringing at all. All About the Message has developed this technology and has recently petitioned the FCC to declare these types of messages to be outside of the umbrella of the TCPA (Telephone Consumer Protection Act). The TCPA protects consumers from certain robocalls to their wireless phones, except for emergencies or in cases where the subscriber has pre-authorized the calls.
TransNexus is proud to celebrate twenty years of providing quality VoIP network management solutions. Since 1997 TransNexus has been a pioneer in fraud and operations support software for VoIP networks.
Everyone has accidently dialed a wrong number. Most of us, however, don’t become a victim of fraud when we misdial.
The Department of Defense (DoD)) is currently considering moving to commercial SIP and away from the DoD-specific version of SIP known as AS-SIP.
Alexa, Amazon’s voice-controlled device and operating system, is already proving very successful in the market place. Based on a recent patent filed May 2, 2017, it appears that Amazon is looking to take the Alexa software even further, specifically into the VoIP phone market.
Last week, a Florida district judge sentenced Ramon Batista, owner and operator of Arymyx, to 75 months in prison. Batista pled guilty to one count of conspiracy to defraud the US, one count of wire fraud, and one count of aggravated identity theft.
A new survey from Truecaller shows that nearly one in ten American adults (9%) has been victimized and lost money from a phone scam in the last twelve months. The average loss is $430 per person, up 56% from the last survey in 2015, costing Americans $9.5 billion!
Last week the FCC voted two to one to eliminate price caps for business data services (BDS) provided by phone companies like AT&T, Verizon, and CenturyLink.
In 2013, the FCC proposed relaxing rules that banned voice calls on cell phones from airplanes. After opening up the proposal to public comment, Chairman Wheeler was met with a wave of derision from consumers and travelers who wanted silence while they were on an airplane. The FCC under the previous administration noted that the ban was “technologically unfounded” and should be open to public comment.
When the FCC approved the Charter-Time Warner Cable merger in 2016, it required the new company to deploy high speed broadband to at least two million locations (residential and business) and at least half needed to be in areas already served by one other broadband provider.
The FCC (Federal Communications Commission) reports that American households receive 2.4 billion robocalls every month. Roger Anderson is acutely aware of that fact.
Ooma, a leading business and consumer communications provider, and TransNexus customer, has been recognized as providing the best business VoIP service by PCMag.
Today, the FCC Chairman, Ajit Pai, announced that on March 23, 2017, the FCC will hold an open meeting for the Commissioners vote on six proposals and orders. The first action will be a decision on how the FCC should address robocalls. Below are the chairman’s words.
The new FCC (Federal Communications Commission) Chairman, Ajit Pai has, until recently, been mostly quiet since being appointed by the new president. However, last week he gave a couple of television interviews on CNBC and Fox Business and he spoke this week at Mobile World Congress in Spain.
We hate to be a broken record but TransNexus isn’t going to let you forget about the seriousness of VoIP fraud. Take a look:
With the advent of the new administration, companies that collect student loan debt wasted no time in their attempt to roll back regulation protecting consumers. In 2016 the FCC (Federal Communications Commission) limited the number of calls these organizations can make to mobile phones to three a month and barred them from contacting the borrower’s friends, family, and colleagues. Eighteen consumer advocacy organizations filed a petition with the FCC that would oppose any revision to the current rules in place, arguing they protect consumers from undue harassment.
Atlanta, Georgia US: February 8, 2017 – TransNexus, a pioneering software development company specializing in applications for managing VoIP networks, announces the newest system integration partnership with TelcoBridges. TelcoBridges is a leading designer and manufacturer of carrier-grade VoIP media gateways and session border controllers (SBC) based in Canada. The combination of both vendor’s technologies brings enhanced fraud detection capabilities, local number portability, least-cost routing, and a wide range of QoS analytics to VoIP carriers around the globe.
There’s a new telephone scam that starts with just a couple of lines. You answer your phone with a hello. The person on the other line says, “can you hear me? Can you hear me now?” When you say yes, that’s all the scammer on the other end of the call needs.
Last week, the President announced the promotion of Ajit Pai from commissioner to Chairman of the FCC (Federal Communications Commission). Pai’s promotion immediately led those in the telecom industry to speculate what his promotion means for some of the FCC’s recent rulings including the 2015 Omnibus TCPA (Telephone Consumer Protection Act) Order.
Canada struggles, like the US and other countries, with mounting telephone fraud. Most countries, including Canada, are encouraging industry leaders to become engaged in solving telecom fraud issues, especially caller id spoofing, in order to protect their citizens.
Justin Ramsey and Aaron Michael Jones, who ran multiple telemarketing companies, have just settled with the FTC for more than $500,000. The individuals have agreed to never make another robocall, make a call to a number that is on the Do Not Call Registry, violate the Telemarketing Sales Rule (TSR), or help any other person in doing any of these things.
Not exactly the type of headline we like to see about our fair city. In just November of last year, there were nearly 50 billion robocalls to the 404 area code, according to the YouMail Robocall Index. Incredible!
IBM recently warned the technology industry that “cyber attacks using the VoIP protocol Session Initiation Protocol (SIP) have been growing this year accounting for over 51% of the security event activity analyzed in the last 12 months.”
The recently formed Robocall Strike Force by the FCC hopes telecom companies can help develop solutions to stop the bad guys. Legitimate telemarketers won’t call consumers if they’re on the Do Not Call List. But criminal spammers don’t care about the Do Not Call list and it’s pretty easy for them to evade any law enforcement.
India has one of the fastest growing telecommunications industry in the world. As such, it has become a ripe target for fraudsters, especially with the emergence of new technologies such as 3G and Voice over IP (VoIP).
The risk of traffic pumping, or International Revenue Sharing Fraud (IRSF), has been limited to business phone systems that get hacked and allow a fraudster to generate thousands of calls to high cost destinations. Residential customers, with a single phone line, have not been a risk for traffic pumping fraud. However, that has now changed with residential phone apps.
The Federal Communications Commission (FCC) reports that "month after month, unwanted robocalls and texts, both telemarketing and informational, top the list of consumer complaints received by the Commission." The Federal Trade Commission (FTC) reports that in the fourth quarter of 2012, robocall complaints exceeded over 200,000 per month.
Fraud scams perpetrated over the telephone are a growing menace. A common technique used by fraudsters is to spoof the calling number so the caller-ID field can be whatever the fraudster wants.
The August 2015 edition of CIO Review magazine includes feature coverage of "The 20 Most Promising Telecom Solution Providers". TransNexus is included in the list and is highlighted in an article entitled "Next Generation Telecom Fraud Detection".
Revenue sharing from international premium rate numbers is the powerful incentive that drives a global, billion dollar telecom fraud racket. The question we hear from victims is "who are these fraudsters and what is the incentive for international revenue sharing fraud (IRSF)?"
SIP trunking is appealing for several reasons, such as decreased costs, improved scalability, better disaster recovery options, and productivity benefit accessibility. A recent article highlights one area that companies underestimate the importance of and frequently overlook to be security. Threats of different types of telecom fraud loom over businesses who are also liable if a fraud attack were to breach their system.
Cyber attacks on several Canadian federal government websites last week are leading to increasing concerns in regards to the Canadian government’s plan to change many of its landlines to Voice over Internet (VoIP) phones.
If your business has become subjected to telecom fraud, it is important to file a complaint and register your fraud losses to the Internet Crime Complaint Center (IC3) online on their website.
A commission document released on June 18, 2015 discloses a proposal adoption by the Federal Communications Commission (FCC) to safeguard consumers against unwanted robocalls and spam texts.
Researchers at the University of Alabama at Birmingham (UAB) are working to improve the end-to-end VoIP security, thanks to a two-year, $150,000 grant from Cisco Systems.
Reports of toll fraud are on the rise. In this scheme, fraudsters hack into a company’s phone network and route calls to premium-rate numbers. It is also sometimes called international revenue sharing fraud (IRSF), because fraudsters arrange to take a share of the profits on a premium rate number in exchange for directing traffic to it.
TransNexus, an innovator in VoIP management solutions since 1997, has released Shield, a dynamic new tool for preventing telecom fraud attacks stemming from the use of premium rate numbers.
The Fourth Circuit Court of Appeals ruled in October that calls made to residential lines using an autodialer can violate the Telephone Consumer Protection Act (TCPA), but only if the residential line service charges for incoming calls.
In a filing with the FCC on November 12, 2014, CenturyLink asked the FCC to allow it to conduct a TDM-to-IP transition trial in Las Vegas.
One small doctor’s office in Maryland is reeling after receiving a $2 million phone bill.
What is an ANAC, and why is awareness of when users dial an ANAC an important fraud prevention technique?
We’re in the business of preventing telecom fraud, but too often we hear from people who are looking into fraud protection after losing a significant amount of money in an attack. For those who have been burned by telecom fraud, what are the best ways to prosecute a fraudster?
There is a new tool available on the black market that makes telecom fraud even easier. The tool, known as ‘TNT Instant Up,’ was developed by fraudsters to use in Telephony Denial of Service Attacks (TDoS).
On February 11, the FCC issued a declaratory ruling meant to clarify some issues in the ongoing debate surrounding intercarrier compensation.
Winter Storms have been bearing down on the US, which means many workers have been out of the office for snow days. Though it may be nice to get a day off, businesses should stay alert for fraudulent telecom activity. Fraudsters take advantage of holidays, weekends, and even snow storms to hide their hacking for as long as possible.
The recently released CentOS openssl-1.0.1e-30.el6_6.5.x86_64 file will cause the software license key for the OSPrey routing server to become invalid and STOP ROUTING CALLS.
It is no secret that business owners face vulnerability on their computer networks to attacks from hackers. One common oversight is that phone systems are just as open to attacks from hackers.
Cisco recently released their annual security report. While the focus of the Cisco report is on data security, the principles described in the report also apply to managing telecom fraud.
TransNexus announced today that TMC, a global, integrated media company, has named NexOSSas a recipient of the 2015 INTERNET TELEPHONY Product of the Year Award.
ATLANTA, GA – January 6, 2015 – TransNexus is proud to announce the upcoming release of NexOSS-FC.
VoIP has become so ubiquitous a solution that even banks are beginning to use it. But there are criminals to match every new technology out there, and VoIP has not been an exception.
The New York Times has published an article describing the threat of telecom traffic pumping fraud and the risk it poses for small businesses. TransNexus is cited in the article.
The IP-Network to Network Interface (NNI) Joint Task Force is a cooperative effort between the Alliance for Telecommunications Industry Solutions (ATIS) and the SIP Forum. This task force has completed a proposed profile for SIP-based Service Provider to Service Provider IP Interconnection.
Yesterday, the FCC revealed the details ofa major 911 outage that occurred last April.
TransNexus software applications are not directly vulnerable to the recently announced "ShellShock" Linux Bash vulnerability, but the CentOS and RedHatLinux operating systems that host TransNexus applications are vulnerable.
In telecom networks, “spoofing” is the practice of misrepresenting the caller ID of a phone call. It is a practice often used by criminals trying to commit telecom fraud.
On September 4, 2014, the seven person architectural firm, Foreman Seeley Fountain Inc], or FSF,filed a complaint with the Federal Communications Commission against its former telephone service provider, TW Telecom.
Traffic pumping fraud to international numbers is driving more carriers to block international calling. This telecom fraud, also known as International Revenue Sharing Fraud (IRSF) occurs when a fraudster hacks a victim’s phone system and then makes thousands of calls to an international premium rate number. The cost of telecom fraud for the victim can exceed $100,000.
Small companies beware: telephone traffic pumping fraud has no mercy, especially for the little guys.
Building on commitments made by America’s four largest wireless carriers to provide text-to-911 service, the FCC adopted rules to ensure that all remaining wireless carriers and certain IP-based text application providers are prepared to support text-to-911 by the end of the year.
Surveys of consumer and business voice communication trends have shown a steady decline in wireline usage, replaced by Voice over Internet Protocol (VoIP) subscriptions and wireless adoption.
While 911 call centers have been struggling to stay on top of new communications technologies for some time now, it seems they are getting closer to bridging the gap—thanks to communities working together in order to make sure first responders have what they need.
A new report from TransNexus examines the schemes being used for telecom fraud today and industry best practices for prevention.
On July 23, the FCC released its E-rate Modernization Order and Further Notice of Proposed Rulemaking (FNPRM), which adopts a number of the proposals made in its NPRM and begins the process of re-focusing the E-rate program on providing the necessary support to ensure the nation's schools and libraries have affordable access to high-speed broadband.
The FCC wants rate-of-return telecom companies to transition to model-based support as today’s voice-focused high-cost Universal Service Fund is phased out and converted to a broadband-focused Connect America Fund program.
A new report from TransNexus examines the growing problem of telecom fraud stemming from the use of premium rate numbers.
How important is your business phone? Do you need access to your voicemail, business contacts and even the number when you’re out on the road? While you may be able to have your calls transferred to your mobile device, can you also have the number sent there as well so you make a call as if you are sitting at your desk?
IP communications and SIP have revolutionized the way that businesses communicate with their customers and each other, but very few people understand what these technologies really do.
Level3 Communications wants the FCC to impose interconnection requirements on internet service providers—a move the company said is necessary to “fully protect the free and open Internet.”
Often we talk about unified communications and business VoIP as if they were two separate products. And they are, to a point.
The open-source cryptographic library OpenSSL showed the world that it had a major vulnerability this past April. Known as the “Heartbleed” bug, OpenSSL proved itself vulnerable to hackers who wished to exploit its process that functioned to keep two computers in communication with one another.
Recently, current and former Members of Congress, consumer advocates and CEOs from the nation's leading competitive broadband providers joined with customers to discuss the enduring benefits of competition forged in the landmark 1996 Telecom Act.
It’s becoming fairly common knowledge that switching over to a VoIP system for your phone calls can save significant money, whether it’s at the office or at home. But now the technology has taken another leap forward, yet not many people are aware of it. VoIP has gone mobile.
SIP trunking, a VoIP and streaming media service by which providers can deliver telephone services and unified communications to customers, has been touted as a reliable, scalable, and very dynamic alternative to running PRIs through a PSTN network.
At its June 13 open meeting, the FCC's Wireline Competition Bureau made a presentation on the status of the AT&T service-based experiments in the Technology Transitions proceeding.
A recent article in PrintWeek caught our attention for its story about a small printing company’s phone system getting hacked.
Software defined networking (SDN), network function virtualization (NFV), and the PSTN sunset were hot topics at the Big Telecom Event in Chicago this week.
A recent study, conducted by Neural Technologies, has determined that subscription/identity fraud is still the leading method for users attempting to fraudulently gain access to services.
Business VoIP is woefully misunderstood for its voice quality in that too many are under the impression that it is inferior.
IP communications has gone from a radical, forward-thinking technology that improved communications performance and cut costs, to a mainstream technology that is being adopted at a rapid clip and is one of the megatrends of the past 15 years.
Today, IP communications can allow companies to save money on their bottom line, allowing room in the budget to expand when necessary, and if they prefer to operate out of one office, reaching clients across the globe is easy.
A new report from telecommunications and DNS service provider Neustar indicates a growing trend of using DDoS as a cover for malware attacks resulting in significant monetary losses for not only enterprises, but consumers as well.
TransNexus, a developer of VoIP network management software, today announced that it has achieved Gold Partner status in Oracle PartnerNetwork
VoIP has become so ubiquitous a solution that even banks are beginning to use it. But there are criminals to match every new technology out there, and VoIP has not been an exception.
Unified communications, VoIP and the cloud tend to mingle with each other quite a bit in technology, but there are some misconceptions when it comes to these communication tools, particularly when it comes to VoIP and unified communications (UC).
TransNexus is headquartered in Atlanta, Georgia – a city that made the news earlier this year for an epic traffic jam caused by mid-day snow and ice. The snow hit the city unexpectedly, causing everyone to leave their offices for home at about the same time. This Atlanta worker can tell you that it was not pretty.
TransNexus is pleased to announce that we now support both Taqua and Sansay brand switches.
As virtual PBX and IP communications become more widespread, businesses as well as the general public are becoming more aware of its many benefits. Some of these benefits mean that people who need immediate medical attention or a quick response from firefighters or police officers can now get it, thanks to the technology.
The world is not a safe place, and anyone who watches the news or checks Facebook is aware that recently we’ve all become a little less safe thanks to the Heartbleed secure socket layer flaw that compromises internet security.
Over-the-top (OTT) VoIP services such as WhatsApp and Viber have become popular during the last few years. This popularity of OTT apps is fueled in part by the availability of low-cost smartphones and the emergence of cheap data plans.
The move to migrate communications to an all-IP network from a legacy system is one of the most talked about debates in telecom these days.
News headlines can worry a lot of parents about the safety of their children while they are at school.
Voice-over-IP (VoIP) is a growing telecom segment, and a plethora of VoIP providers and resellers have cropped up to service businesses and consumers that are looking to lower their phone costs and provide added mobility to their calling.
When companies are looking to establish a business phone system, they now have many more options than simply going with a landline telephone provider.
Today, the FCC is in the process of making one of the largest technological transformations that has taken place in the U.S., ending the analog telephone network.
AT&T’s plans for TDM-to-IP transition trials are clashing with efforts to de-regulate telecom – an initiative the company also has been championing.
TransNexus today announced that Vocal IP Networx has chosen the TransNexus SDReporter solution to provide telecom fraud detection to complement their BroadWorks based network.
The latest issue to face the telecom industry is the rural call completion order the FCC released last year. The FCC initiated the rural call completion order to address concerns such as attempts not reaching the called party, unusually long delays in call setup and poor quality once connected.
According to the Federal Trade Commission, telecom fraud accounted for 34% of fraud complaints in 2012, up from 20% in 2010. These numbers continue to grow, as new technology has led to an onslaught of new telecom fraud tactics.The latest schemes are difficult to tract and investigate because of their frequency, their layers of anonymity, and their global nature.
Presicent Worldwide needed Least Cost Routing and telecom fraud prevention. They chose NexOSS, which does both. Result: “NexOSS helped us tighten up our network and route calls more safely and efficiently. There’s no negative to the NexOSS platform. We’re very happy with our results.”
TransNexus, top developer of VoIP network management software, today announced that Bee Global, an Over the Top (OTT) VoIP application that enables free calling between smart phones, and cheap calls to the PSTN, has chosen the TransNexus NexOSS solution to provide dynamic least cost routing.
Voice over Internet Protocol (VoIP) is a methodology and group of technologies that have been designed for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.
When the world’s enterprises began sending and receiving important information via the Internet, their move to the future was soon followed by a plague of hackers seeking their valuable contents.
U.S. Senator Tim Johnson (D-S.D.) introduced a bill last week aimed at preventing long-distance carriers from blocking or disrupting calls to rural areas.
TransNexus today announced that Spirit Communications has chosen the TransNexus NexOSS and SDReporter solutions to provide dynamic least cost routing and telecom fraud detection to complement their BroadWorks-based network.
A quick Google search of the Telephone Consumer Protection Act of 1991 (TCPA) will certainly yield a lot of court cases.
Voice communications is changing rapidly, and in your research you’ve probably run across something called SIP trunking. What is SIP trunking and why do you care?
In the wake of a judge explaining the FCC’s ability to regulate broadband services for Net neutrality, many have feared that over-the-top (OTT) services, like VoIP services, would be throttled by ISPs looking to beat down competition. But now the FCC is proposing new measures to prevent such things happening.
ATIS and the SIP Forum today announced the formation of a Joint Task Force to fully specify an IP communications network-to-network interface (NNI) between North American service providers.
The revenue-cost model is broken for the traditional communications services operator. Something needs to change.
The telecommunications industry is in the midst of a big transition as it moves from the legacy public switched telephone network (PSTN) to newer session-initiation protocol (SIP) and IP-based communication.
At its open meeting, the FCC approved an order that sets the stage for technology transition experiments.
Although in many ways VoIP looks and feels like the plain old telephone service of old, according the U.S. government, it is quite different.
Toll free traffic pumping is a growing problem in the telecom industry. What is it, and how does it work?
TransNexus announced today that TMC, a global, integrated media company, has named NexOSS 6 as a recipient of a 2014 INTERNET TELEPHONY Product of the Year Award.
The IP transition has been a primary focus for the Federal Communications Commission (FCC), as well as telecommunications providers seeking the benefits of moving all subscribers to new platforms. A recent announcement by AT&T to advance this initiative should have been met with fanfare, but was instead met with an announcement of investigation by the FCC.
By now, most businesses are aware of Voice over Internet Protocol (VoIP) phone systems, which route calls through the Internet for more efficient communication than landlines provide. The result is hyper-efficient phone calls that include more free features, for a lower monthly price.
The buzz in the telecommunications space is that VoIP is the end-all for seamless communications, but the hype surrounding the benefits often overshadows some real threats that exist.
The old public switched telephone network (PSTN) has served its purpose for the past 125 years, and it is now time to adopt the next technology and retire this dinosaur; but moving forward when the government is involved is easier said than done.
Targeted Internet traffic misdirection is a growing concern, says security monitoring firm Renesys. Specifically, an increasing amount of information is being hijacked by man-in-the-middle attacks.
When it comes to regulation, there’s usually a lot to be gained—and lost. That’s the scene with the debate over potential new Federal Communications Commission rules for voice-over-IP (VoIP).
NexOSS V6.1 is now available and includes the following enhancements.
On December 3rd, I attended the New Telecoms Summit in New York City. Much of the discussion was focused on policy changes needed to hasten the transition from traditional telephone technology to an all IP network.
Research study findings from Eastern Management predict that toll traffic on SIP trunks will hit 42 percent by 2018. Involving more than 17,000 IT managers in seven world regions and 22 vertical markets, the study “SIP Market Size Analysis and Forecast 2013 – 2018” shows that more than 80 percent of companies with 20,000 employees say SIP is very important to their business. This is also true of companies with 100 to 500 employees.
According to the Global State of Information Security Survey from PricewaterhouseCoopers, UK businesses have increased the amount they are spending on protecting themselves from cyber-attacks and are putting in place better protection from risks to their cybersecurity.
The benefits surrounding Voice over IP are so well known that companies throughout the world continue to migrate to the platform where voice and data connections share the same network. Those benefits are easily extended to the mobile user as well, driving the demand for mobile VoIP. The challenge for the market is that this growing demand is eating into mobile operator revenues.
Getting a Location Routing Number can be complicated. Here are some tips.
Since the Communications Act of 1934, only telephone carriers who had a state certification and/or an FCC license could directly access local numbers. However, these regulations have not translated into the world of IP.
Recently, Google has brought in a new feature to its Hangouts app: VoIP calling capability.
On October 28, 2013, the FCC adopted a Report and Order and a Further Notice of Proposed Rulemaking (FNPRM) in its proceeding designed to develop rules to address problems in the completion of long-distance calls to rural end user customers.
Rapid technology growth is ensuring financial safety, but fraudsters too are coming up with new techniques to exploit the loopholes in the system. Recent example is “Vishing”, a new form of financial fraud which is gaining popularity these days.
The Wireless Internet Service Providers Association (WISPA), a membership organization that promotes the development, advancement and unity of the wireless ISP industry, has been stepping up its lobbying and advocacy efforts for its membership, a collection of operators that began by bringing broadband to rural and underserved areas where true broadband wasn’t available from the local copper-based telco.
Recent press surrounding the Federal Communications Commission’s 2012 declaratory ruling that carriers who deliberately fail to complete calls to rural areas could face cease and desist orders, forfeiture, license revocations and fines of up to $1.5 million has led to much discussion of Least Cost Routing and its role in rural call completion.
Recent press surrounding the Federal Communications Commission’s 2012 declaratory ruling that carriers who deliberately fail to complete calls to rural areas could face cease and desist orders, forfeiture, license revocations and fines of up to $1.5 million has led to much discussion of Least Cost Routing and its role in rural call completion.
TransNexus announced today the latest release of its industry leading VoIP Routing, Operations, and Billing Support System, NexOSS 6.0.
One of the challenges that security teams face is the problem of measuring, evaluating and mitigating risk in the enterprise. A study sponsored by Tripwire and conducted by the Ponemon institute found that while 81% of security and risk professionals in the U.S. said their organizations have a significant commitment to risk-based security management, fewer than 30% actually have a formal security risk management strategy that is applied consistently across the enterprise.
The CFCA today announced the results of a comprehensive worldwide communications industry fraud loss survey.
A new white paper from TransNexus is a primer on how to improve quality of service and network efficiency for those looking to expand their VoIP service by acquiring new networks.
CDRAnalyzer, an established feature in NexOSS, is now available as a stand-alone product for SDReporter users.
This release includes important new credit control triggers, which help identify wholesale SIP trunking fraud.
In a market where consumers are increasingly mobile, the demand for VoIP is changing the industry landscape. Consumers are no longer bound by minute plans or data ceilings and without a strategy to push out a new revenue model, the operator without mobile VoIP may be facing a bleak future.
TransNexus today announced that Finger Lakes Technologies Group has chosen NexOSS to provide dynamic least cost routing and telecom fraud prevention to complement their Oracle Acme Packet based network.
TransNexus announced today the release of CDRAnalyzer, a simple, high performance application for archiving and locating Call Detail Records (CDRs).
TransNexus today announced that PingTone, a provider of innovative telecommunications and unified communications solutions, has chosen the TransNexus NexOSS solution to provide least cost routing and telecom fraud detection.
Eric Bash, associate chief of the FCC's Enforcement Bureau, testifying at a hearing of the Senate Commerce, Science, and Transportation Subcommittee on Consumer Protection, Product Safety, and Insurance, recently brought up the problem of VoIP enabled robocalls. “The prevalence of robocalls is on the rise,” Bash said in his testimony. “This is because of the ready availability and low cost of phone service and the software needed to make the calls, as well as the ability of callers to spoof the number from which they are calling in an attempt to disguise who they are and avoid detection.
The unified communications market continues to get more than its fair share of research attention. Two recent reports paint a healthy future for the segment for the next five years.
TransNexus, the leaders in VoIP network management solutions, announced today that it will be showcasing its NexOSS Least Cost Routing and Telecom Fraud Detection product at the CCA Annual Convention, to be held September 15-18, 2013 at the Cosmopolitan Las Vegas.
A new report from TransNexus examines the recent explosion of growth in enterprise telecommunication networks, as well as the strategies innovative companies are using to manage them.
Telecom fraud remains a significant problem for any business that relies on phone systems. Fraudsters continue to develop new and difficult to deter schemes. One of the latest to hit the news is Toll Free Telecom Fraud. Toll Free fraud can affect any business that uses a toll free number. For many businesses, this type of fraud is impossible to completely stop. Let’s take a look at how it works.
Businesses that implement VOIP (voice over IP) telephony systems in their local area networks must ensure they have effective protection against the growing incidences of VOIP hacking. Most people are not aware of the dangers of VOIP, and many others only become aware of the risks when the damage has already been done.
The Unified Communications market is projected to grow at a rate of just over 4 percent through 2016, according to a new report from TechNavio. "One of the key factors contributing to this market growth is the increasing requirement for affordable enterprise communication medium in the country," according to authors of the report, Telecommunication Services Industry: Enterprise Unified Communication Market. "The market has also been witnessing a rising demand for enterprise mobility. However, the requirement for high initial investment for unified communication systems could pose a challenge to the growth of this market." The TechNavio study looks at the enterprise unified communications market in the United States and the prospects for growth in this sector for the next three years.
TransNexus announced today that it will be showcasing its NexOSS Least Cost Routing and Telecom Fraud Detection product at ITEXPO Las Vegas, to be held August 27-29, 2013 at the Mandalay Bay.
The Federal Trade Commission has settled with a set of defendants associated with the A+ Financial Center scheme. They were charged in last year’s joint law enforcement sweep against five companies that made millions of illegal pre-recorded robocalls claiming to be from “Rachel” and “Cardholder Services” and pitching credit card interest rate reduction services.
We keep waiting for SIP trunking to become simple to adopt and implement—at which point, it will presumably no longer be a hot topic. That keeps not happening.
In this release, Credit Control reports with triggers have been added for customer accounts identified by static IP address. This new feature is especially beneficial for Acme Packet SBC users offering SIP trunking services to enterprise customers.
In a post on the VoIP Innovations blog, Natalie DeCario discusses VoIP Enhanced 911 (E911) service and its impact on VoIP service providers.
Every major IP communications vendor has a UC section on its website with hyperbolic statements like, “UC is changing the way you do business.” or “Reinvent your productivity capacity with UC!” Given the seeming proliferation of this term, potential UC customers rarely bring up the term.
Perfect weather after days of rain, and the picturesque course at Trump National made for a beautiful round of golf for the attendees of the 2013 Ronald McDonald House Celebrity Golf Tournament.
A drill-down examination of the telecommunications space could easily uncover information regarding the softswitch. You may hear all about the benefits and why you want to have one in place, but that doesn’t help to explain what a softswitch is, or what it means to your organization.
Initially, the ubiquitous Internet was used only for data communications between nodes on the network using the Internet Protocol or IP, the communications protocol for relaying datagrams across network boundaries. With advances in digital communications, analog calls can now be converted into packets of data that can travel like any other type of data, such as e-mail, over the public Internet and/or any private IP network, resulting in voice over IP (VoIP).
Once upon a time, a sip meant taking a quick drink. Today, SIP means something totally different and it’s delivering value in the business environment.
There are real challenges of interoperation among multivendor gear. This is part of the reason why SIP Trunking hasn’t been more widely adopted.
Telecom fraud remains a significant problem for any business that relies on phone systems. Fraudsters continue to develop new and difficult to deter schemes. One of the latest to hit the news is Toll Free Telecom Fraud. Toll Free fraud can affect any business that uses a toll free number. For many businesses, this type of fraud is impossible to completely stop.
As long as there have been telephones and charges for conducting calls, there has been toll fraud.
TransNexus has recently added a hot potato routing feature to our popular NexOSS product. Essentially the new feature adds intelligent egress selection to our least cost routing, allowing companies to choose destinations based both on cost and proximity to the calling source.
This version introduces new Credit Control reports that will benefit BroadWorks users.
A ReMax real estate office in St. Peters is reeling from a $600,000 phone bill.
I recently had a conversation with a fellow who is in the business of pumping traffic to rural destinations in the US with high terminating access fees. He claimed that his business generates 100 million minutes of traffic each month and that his terminating CLEC partnersshare an average of $0.002 for each minute of traffic he sends to them. That is $200,000 of gross revenue per month.
When Congress last overhauled U.S. telecom rules -- the 1996 Telecommunications Act -- many of today's technologies were closer to science fiction than fact. Speaking at the Media Institute, Craig Silliman, Verizon's senior vice president of public policy and government relations, called for a proactive, flexible policy approach to replace outdated regulations.
The FCC's Technology Transitions Policy Task Force (Task Force) authorized a 6-month trial to examine providing interconnected VoIP providers direct access to telephone numbers. The goal is to speed the transition away from TDM to all-IP infrastructure while ensuring resiliency.
Ever wondered how traffic pumpers create so much bogus telecomtraffic without getting shutdown? They perform this scam by by gettingsuckers to do the traffic pumping for them.
Today’s VoIP-enabled phones combine the features of a computer and a network router in one. The power and accessibility of these phones can be turned against them.
TransNexus is pleased to announce that intelligent LCR routing can now be deployed at the edge of your Metaswitch network.
CDRAnalyzer has been expanded to create Traffic, Billing and Billing Analysis reports from archived rated CDRs without impacting the performance of the NexOSS production database.
TransNexus is pleased to announce that SDReporter is now available for the IBM PureFlex System.
A new white paper from TransNexus describes a recently discovered security flaw in a widely used Analog Telephone Adaptor (ATA) that enables hackers to secretly steal the SIP credentials of hundreds of thousands of SIP subscribers. The credentials can then be resold to enable wholesale telecom fraud.
The truth is you just aren’t a phone company until you’ve had a run-in with telecom fraud. Understanding the threat is the first step in preventing fraud.
The FCC has adopted a Notice of Proposed Rulemaking (NPRM) on direct access to telephone numbers for VoIP providers, a process that they say will streamline the process to roll out services.
There are now more than 2 trillion (2 x 1012) objects stored in Amazon S3 and that the service is regularly peaking at over 1.1 million requests per second.
False Answer Supervision is yet another type of VoIP fraud scenario. It basically refers to a situation where the answer signal is deliberately modified to charge for non-conversational time.
We’ve been hearing the term Wangiri fraud thrown around lately, and thought it merited a post to explain what exactly it means.
Remember when endpoints were called phones? Now endpoints can be hard or soft; SIP, proprietary, or analog; video-enabled; HD-audio capable; wireless (DECT or Wi-Fi); or desktop or mobile (iOS, Android, BB, Win8, tablet, or smartphone).
Yesterday we discussed how criminals go about creating a TDoS attack. Today, let’s look at some enterprise best practices for dealing with this type of attack.
VoIP security expert, Marc Collier, has written an excellent article on the basics of today's TDoS attacks on his blog.
Things have been heating up between the Federal Communications Commission (FCC) and the VoIP industry lately.
This release offers the major improvement that all fraud detection is based on fraud scores, rather than just call statistics.
As hype surrounding Web RTC continues to grow, many have begun to notice similarities between web-based real time communications (WebRTC) and session initiation protocol (SIP). Both offer collaboration and communication simply and over the internet. So, just what is the difference?
Unified communications presents unique security challenges because it brings together disparate technologies. Using VoIP, video, chat and presence together has proven to provide productivity gains for businesses, but also presents security risks.
The benefits of Voice over IP (VoIP) and unified communications (UC) start to lose their luster when the basics – such as being able to hear the other party during a voice call – don’t perform reliably.
As hype surrounding Web RTC continues to grow, many have begun to notice similarities between web-based real time communications (WebRTC) and session initiation protocol (SIP). Both offer collaboration and communication simply and over the internet. So, just what is the difference?
You can live in a single vendor world, where your solution options and pricing are determined entirely by one vendor, or not. Interoperation is the key to the “or not” option.
Acme Packet announced that the company has achieved Microsoft Gold Certified Partner status in the Microsoft Partner Program, and its Net-Net Enterprise Session Director has been fully qualified by Microsoft under the Unified Communications Open Interoperability Program (UCOIP) to ensure interoperability with Microsoft Lync 2013.
As VoIP call centers increase in popularity all over the world due to the key benefits they can offer companies big and small including reduced costs, increased efficiency and better collaboration and communication overall, they are now being targeted by cyber masterminds looking to access confidential information.
This release of NexOSS includes a new Blacklisted Numbers fraud detection feature.
CDRAnalyzer in a new feature introduced in this NexOSS release. This powerful new feature exports Rated CDRs from the NexOSS database to an external database for long term archiving and analysis.
Reports are now surfacing that criminals have learned to take advantage of VoIP fraud schemes to launder money across international borders. Money laundering is the process of concealing the source of money obtained by illicit means.
You’ve seen us write about revenue sharing VoIP fraudon this blog before. But here’s a new application we’ve been hearing about: money laundering.
Signs are pointing to business markets making the switch from legacy public switch telephone networks (PSTN) to IP phone services. The FCC recently reported that between 2008 and 2011, VoIP subscriptions increased at a compound annual growth rate of 19%, while switched acccess lines declined nearly 9% per year.
Acme Packet announced recently that the Net-Net 6300 has been named a recipient of the 2012 Internet Telephony Product of the Year Award by TMC, a global, integrated media company.
Even AT&T sees the future is dim for the traditional telephone network.
I met an interesting fellow last week at the IT-Expo in Miami. He’s a traffic pumper and operates a successful business exploiting the price arbitrages created by policies of the Federal Communications Commission (FCC).
It’s that time of year again. We’ve rounded up the hottest VoIP trends that should be on your radar this year. Look for new technologies and old technologies to be applied in new ways in the coming months. This year we’ll see the role VoIP technology plays evolve into a more unified communication system. Companies who stand to integrate a VoIP strategy into traditional telecommunications will see real returns this year.
TransNexus announced today that it will be showcasing its industry leading VoIP routing and reporting solutions at ITEXPO Miami 2013, to be held January 29-February 1, 2013, at the Miami Beach Convention Center.
Acme Packet's security expert, Patrick McNeil, has recently posted an interesting article addressing E-SBC Security Architecture Considerations for SIP Trunking.
Ensuring your VoIP infrastructure is providing quality service is vital. In fact, its worth a New Year’s Resolution. When dealing with customer expectations, failure is the last option you want, but why is it that only 52 percent of IT support teams successfully support IP voice platforms?
Jim Dalton, president of TransNexus, recently sat down for an exclusive interview with TMCnet about technology trends affecting the market today and in the near future.
The FBI’s Internet Crime Complaint Center (IC3) is reporting a recent uptick in Telephony Denial of Services (TDoS) fraud. Perpetrators are suspected of using hacked VoIP automated dialing programs to overwhelm the phone lines of their victims, harassing them with thousands of calls.
In the communications space, there’s a lot of talk about convergence ROI. Moving to a converged network can substantially reduce an organization’s total cost of ownership (TCO) for its network, as well as reduce the ongoing costs required to maintain and upgrade the network.
Fraudsters are continuing to exploit high termination rates for certain countries by inflating traffic and sharing revenue. Number aggregator websites openly advertise revenue share opportunities in many countries, inviting visitors to sign up immediately.
Forbes magazine is reporting on the latest telecom fraud threat in the VoIP community.
The following is a nice summary of local telephone routing written by Mary Lou Carey at BackUP Telecom Consulting.
In the wake of Hurricane Sandy, a disaster with losses topping $50 billion, we are seeing not only the expected economic and financial consequences, but also an uptick in telecom fraud.
BroadSoft, Inc. recently announced the addition of Rich Communications Services (RCS) to its BroadCloud Software-as-a-Service (SaaS) platform, providing mobile operators with managed service delivery of converged messaging, presence, media sharing, voice and video calling.
How much is the iPhone 5 affecting tech infrastructure businesses?
VoIP has opened a multitude of possibilities for companies, both in service and cost. But it has also enticed predatory activity that results in VoIP fraud.
This release includes a new feature for determining a fraud score for each call. The score is determined by destination dial code and greatly simplifies the process of provisioning fraud detection triggers.
Acme Packet recently announced that Gartner has positioned them in the Leaders Quadrant of the Magic Quadrant for Session Border Controllers.
RCR Wireless news recently published a reader editorial on how to control Quality of Service (QoS) in least cost routing.
Sometimes security risk is obvious. The need for hacker detection and prevention is obvious when it comes to online ordering. Sometimes the risk is present but more subtle, however. Such is the case with telecom fraud.
TransNexus and BroadSoft have teamed on offering Unified Communications over their Internet Protocol network.
TransNexus has recently released a new white paper, An Introduction to VoIP Fraud.
VoIP is about convergence, saving money and resources. However, these types of systems also create more inroads for attack.
TransNexus today announced that SyncGlobal Telecom has chosen the TransNexus NexOSS solution to provide dynamic least cost and quality of service routing and rating to complement their Metaswitch based network.
As businesses throughout the global market continue to adopt new innovations in communications technology, several of them are measuring the clear benefits of moving to the cloud. Still others are hanging out in the wait-and-see stage, hoping to learn from the pitfalls and successes of those who blazed the trail.
Pipline Magazine has recently published an article asking “Where is the all-IP network?”
VoIP fraud is a significant and growing problem in the telecommunications industry. Because fraudsters often attack during weekends, fraud events often go undetected for many hours.
In 2007, TransNexus published a performance study of SIP Express Router(SER) compared to OpenSER. Kamailio is a fork from the OpenSER project, which was a fork of the SER project. Since then Kamailio, and SER have merged to create the SIP Router project.
According to a recent article in Forbes, California is now set to join 24 other states in prohibiting its Public Utilities Commission from imposing new regulations on VoIP and other Internet services without explicit authority from the state legislature.
The major new feature added to this release is charts.
According to a recent blog post from Acme Packet, the first immutable law of IP communications is, trust no one.
Voice-over-Internet-Protocol can offer great cost savings for many companies, but some unscrupulous individuals have decided that the best way to save on their telephony bills is to steal from others. Fortunately, at least two criminals who committed high-volume VoIP fraud were recently sentenced to do hard time behind bars.
Acme Packet has recently released a list of six trends that will affect the future of IP communications. The evolution from TDM to IP interactive communications introduces significantly more communication service choices and application possibilities. These trends are:
TransNexus is excited to announce we have become a member of the Communication Fraud Control Association (CFCA).
A new report from Pindrop Security’s State of Phone Fraud Report, 1H 2012 brings to light several new startling statistics concerning the growing prevalence of fraud in the communications industry:
This release of NexOSS has several important new fraud detection features.
With the help of TransNexus, Ooma has recently reduced their routing costs by 10% with LRN route optimization.
On June 15, 2012, Jim Cicconi, Senior Executive Vice President-External and Legislative Affairs with AT&T, gave a thoughtful talk about telecom regulation and how it is thwarting development of the innovative benefits of an all-IP network.
By Micah Singer, CEO, VoIP Logic
Acme Packet, a session border control products provider and TransNexus partner, has recently unveiled a series of products for its session delivery network portfolio at its annual Interconnect customer conference.
Telecom fraud detection by calling number has been added. This feature is important for detecting fraud from individual subscribers who have a dynamic IP address, or for systems like Broadworks that do not report IP addresses in CDRs.
In a recent article Hamid Qayyum, VP MSO Sales at Metaswitch, discusses how SIP trunking is now the fastest-growing area of the VoIP marketplace, and how all indications point to sustained growth for the foreseeable future, making it a very attractive business for both telco and cable providers.
What steps should businesses take to protect themselves from fraudulent activity and hacking as they receive their communications services from cloud and hosted providers?
This release features routing for Direct Peering as a complement to Dynamic Least Cost and Quality of Service routing. Direct Peering is designed for a federation of VoIP networks that want end to end IP transport between their subscribers.
PCWorld recently interviewed Broadsoft CFO, James Tholen.
A new report by Jupiter Research has estimated that VoIP operators may lose up to $300 billion to fraud and billing error by 2016. That would account for nearly a quarter of the revenues for VoIP operators today.
Acme Packet held its annual customer conference, Acme Packet Interconnect, last week in Miami. Having attended the last four events, Jim Dalton reports that this was the largest and most impressive so far.
With the help of TransNexus, FUSE 3 Communications has recently expanded their business to include a hosted PBX offering. FUSE 3 had a goal of providing complete hosted technology infrastructure for their customers, and one area of technology that they were lacking was telephony.
This release provides a really convenient way to quickly locate call detail records (CDRs).
A salesman at a Bangor, Maine auto parts store arrived at the office on the morning of February 22 and noticed that all 11 of the company’s phone lines were lit up. As he was the first to arrive, and the only person in the building, he knew that something was amiss.
A new survey, released by inetwork and ATLANTIC-ACM, is making big claims about communications technology.
As worldwide growth in the use of session-based IP communications continues to grow, Acme Packet is looking to the future of the session border controller (SBC) market.
The discussion about high definition (HD) voice services enabled by IP networks has been going on for years.
Here’s an interesting story about a recent PBX hacking incident in Maine.
This month TransNexus is proud to be celebrating 15 years of business, providing quality VoIP network management solutions.
This release includes detailed monitoring of server memory and hard disk resources with automated alerts.
TransNexus, the leader in VoIP network management software, recently helped the Canadian telecom company, RapidTel, reduce their operating costs by over fifty percent.
It’s no secret that the nation’s rural areas are continuously plagued by dead zones and lack of broadband connectivity. But, as more and more telcos increasingly lose customers to frustrations with network connectivity, other call-related issues—namely call routing and termination—are also coming to the forefront.
The dates for this year’s Acme Packet Interconnect were announced this week. Everyone at TransNexus is looking forward to attending this year’s event.
Telecom fraud detection has become a major issue for carriers offering SIP trunking services to enterprise customers.
January 30, 2012 – Atlanta, GA - TransNexus announced today the latest release of its industry leading VoIP Least Cost Routing software, NexOSS 5.0. The software now includes an innovative new telecom fraud detection module, which tackles the growing problem of traffic-pumping fraud in the VoIP industry.
Much like many of the Patriots’ and Giants’ die-hard fans wouldn’t miss this year’s Super Bowl XLVI for the world, TransNexus won’t be skipping out on next week’s communications conference ITEXPO East 2012, where the telecom software solution company will be making its appearance for the 14th consecutive year.
As advancements continue to be made in today’s telephone systems, and mobility carries on as one of the premier methods in which we communicate, the importance of call quality and affordable communication remains at the forefront.
Phone companies know about fraud, from the old Captain Crunch whistle hack -- people discovered that the whistles given away free in Captain Crunch cereal boxes were the same frequency, exactly 2600 hertz, as the phone company used to authorize open lines for calls -- and VoIP is a victim of it.
This release enables lights-out management of telecom fraud control and network issues.
TransNexus is proud to announce that we have achieved premier software partner status with Intel for 2012. We believe our new partner status with Intel is a testament to superior interoperability between TransNexus and Intel products.
Consumer awareness is growing, but a Canadian agency is finding that it’s not enough to keep subscribers happy. Complaints regarding wireless and land-based phone services more than doubled in 2010-2011, and most of the complaints covered billing errors or contract disputes between wireless providers and the customer, indicating a need for an enhanced focus on least cost routing.
In all the talk surrounding least cost routing, number portability, network connections and seamless transfers, it can be easy to get wrapped up in the technology descriptions without truly understanding the technology. This Neustar blog attempts to better explain the Number Portability Administration Center (NPAC) and what it can do for the average person.
This release features a greatly-improved Traffic Analyzer with many new reports for analyzing and troubleshooting.
The release includes advanced mediation features, which enable the mediation of CDRs for Inter-Working Function (IWF) calls and calls that generate multiple call legs.
An important new feature in this release is the expanded flexibility for determining the calling party. The calling party, or calling number, can be determined by five different information elements in SIP.
TransNexus has been an Oracle partner since 1999. All of our customers have used Oracle, but now we see a small, but growing group of service providers using MySQL. To serve those customer, we have now expanded NexOSS to support MySQL.
This release includes a complete overhaul of Quality of Service reports for the Traffic Analyzer. Working closely with a couple of major customer to satisfy their detailed requirements, we have a completely different reporting model for QoS data.
Jim Dalton was recently interviewed by Rich Terani, the CEO of TMC. The text of that interview is below.
TransNexus has contributed a new module, mod_osp, to FreeSWITCH. The new module enables FreeSWITCH to use the Open Settlement Protocol (OSP) to query an external route server and to report XML based Call Detail Records (CDRs). The new module uses the OSP Toolkit available from SourceForge.
TransNexus will be one of a selected group of Acme Packet Pinnacle Partners participating at Interconnect 2010 in San Diego CA on May 16-19.
TransNexus will be attending the Metaswitch Forum 2010 in Nashville, TN on May 19. At TransNexus, we are very pleased to be a MetaSwitch partner.
International Telecoms Week (ITW) 2010
Not too long ago, optimizing least cost routing was a relatively straight-forward exercise that could be managed part time by an industrious billing or switch technician. This is no longer the case and this article will describes the major developments that have increased the scope and complexity of least cost routing for the North American telephone network.
The ETSI Open Settlement Protocol, or OSP, has been assigned TCP port 5045 by IANA.
The LERG, or Local Exchange Routing Guide, has been the routing table for the North American telephone companies for decades. But two forces are driving the LERG toward irrelevance.
Last night I attended the “Start-up Camp” at the IT-Expo in Miami. It was a showcase for four start-ups to make their pitch.
"PathFinder is the GSMA’s multi-tiered, fully extensible number resolution system. It is designed to facilitate the efficient global interoperability of new and existing IP services using telephone numbers—all within a business framework consistent with operator needs. It provides a comprehensive suite of services designed to enable IP-to-IP interconnections between interconnect partners for voice, messaging, video, and other IP services."
In Andy Ory’s opening speech at the Acme Interconnect 2009 conference he made the point that the emergence of new market segments requires disruptive change. But he added that it has to be just the right amount of disruption.
I was at the Comptel show in Orlando, FL earlier this week and everything appeared to be pretty much business as usual. The number of exhibitors were down about 10% from the last Comptel show, but overall the quantity and quality of business activity was good.
I am happy to announce that we have been working closely with Covad Communications since the beginning of 2009 as they have expanded their VoIP services.
On October 1, the GSMA announced the launch of its PathFinder Number Portability Discovery Service. The GSMA is the global wireless organization consisting of nearly 800 wireless carriers in 219 countries.
Last Friday, I had the pleasure of presenting to FISPA, the Federation of Internet Solution Providers of the Americas. FISPA had its annual meeting in Atlanta last week and I was invited to provide a tutorial on how Number Portability impacts VoIP service providers.
Recently I was interviewed by Erik Linask, TMC’s Editorial Director for Astricon 2009. Below is a transcript of that interview.
Rich Tehrani is CEO of TMC, which publishes Internet Telephony magazine.
I had an interesting discussion yesterday with Dave Gilbert (SimpleSignal), Dave Cullerot (Acme Packet) and Kevin Groth (XConnect) about the current state of VoIP peering and how it will evolve.
I just returned from the Internet Telephony Expo in Los Angeles where I gave a tutorial on Number Portability. Overall the conference was good. I am always interested in trade show attendance and vibrance since it is a good business indicator for our market.
Telecom service provider rate plans come in a variety of formats, most of which are confusing.
In early January I was interviewed by Rich Tehrani, TMC President and Editor-in-Chief. TMC has published that interview which is posted below.
At the IT Expo in Miami, I had the opportunity to speak with Dan York about a presentation I gave on Next Generation Network Peer to Peer Settlement Billing.
Last week, I was at the Telephony Expo in Miami, Florida. Given the overall direction of the general economy, my expectations for the conference were low. I expected low attendance and a generally negative outlook from most attendees.
We recently ran a performance test of Asterisk configured as a SIP Back to Back User Agent (B2BUA). The test platform hosting Asterisk was a $1000 Dell PowerEdge 840 with a Quad Core Xeon X3220, 2x4M cache, 2.40 GHz, 1066 MHz FSB and 4 GB RAM. Redhat V5 was the operating system. The test was configured to simulate a wholesale VoIP operation with three minute call durations and an average of two call retries for every completed call. This was an “out-of-the-box” Asterisk configuration with default settings and no optimizations.
TransNexus has joined the Intel® Certified Solutions Program and will certify its NexOSS software for Intel processors. This is a good program with real technical benefits, not just a marketing gimmick. Given the $25,000 price to join the program, we did our homework to make certain the program offered more than just a rubber stamp certification logo. Admission to this program provides TransNexus with software tools that will assist us in our efforts to boost the performance of our software and reduce security threats. As part of the process, Intel will certify the performance of TransNexus software based on hard data and provide feedback on how our software can be made more secure.
There has been a lot of confusion and angst in the OpenSER community this week. It all started on July 28th when the OpenSER project renamed itself to Kamailio. According to the announcement, “Kamailio is a Hawaiian word. Kama'ilio means talk, to converse.”
I am at the closing plenary of the Voice Peering Forum in San Francisco. It has been a very interesting two days with a lot of informative and thought provoking conversations and presentations.
Like other folks involved with VoIP, we ponder how the new interconnect model for future IP services will evolve.
Well a lot of blogging from me last week about activities in the field of Next Generation Network (NGN) Interconnection.
There is no shortage of new organizations focusing IP Interconnection standards. The latest organization to be formed is the IP Internetworking Alliance or IPIA. IPIA has been established by the GSMA to be the not for profit, governing body of the GSMA IPX. The IPIA mission statement is: " To provide an environment whereby stakeholders from mobile operators, fixed operators and carriers can agree to technical specifications and commercial templates for the IPX, which will facilitate the global interworking of IP services." The inaugural IPIA Board members are:
The migration to an all IP world takes another small step forward. This week ATIS is holding a workshop in Washington D.C. to discuss Inter-Carrier VoIP Call Routing (ICVR).
I just returned from the MetaSwitch Customer Forum V in New Orleans. The MetaSwitch folks ran a great a conference for for their customers. A lot of good information and a good time.
The opening plenary at PTC ’08 offered an interesting perspective from regulators about what they expect for the future. The plenary included regulatory officials from Germany, Japan, Singapore and an ITU representative.
What's an ISN? An ISN is an ITAD Server Number. What the heck is an ITAD? An ITAD is an Internet Telephony Administrative Domain.
Over the last couple of months we have been stress testing Asterisk V1.4 to understand its performance. We started using V1.4.4 and advanced to V1.4.11 as new releases were made available. We have been stress testing Asterisk configured as a SIP Back to Back User Agent (B2BUA) installed on a server with two, dual core, Xeon 5140 CPUs running at 2.33 GHz.
On August 6th 2007, NueStar (www.home.neustar) issued a press release announcing that they have partnered with NetNumber (www.netnumber.com) "in response to customer demand for interoperability between NeuStar’s SIP-IX service and NetNumber’s SPIDER and TITAN technology platforms."This announcement is significant because it is the first coordination between two companies on a common approach for VoIP peering.
Last week the Asterisk Developers Conference, or AstriDevCon 2007, was held at the Georgia Institute of Technology Information Security Center in Atlanta, Georgia. Since a couple of TransNexus developers were attending, I visited the conference as a non-technical observer to see what was going on. I have to say that I was impressed with what I saw. Kevin Fleming has cultivated a productive relationship with Georgia Tech which has a long history of nurturing innovative new technologies and start-ups and Asterisk is a perfect fit with the Georgia Tech environment.
NexSRS OSP Peering Server V3.0 is now available for download from the TransNexus website. New Features Include:
At the Spring VON show in San Jose, CA, I had the opportunity to give a presentation on Secure VoIP Peering. The presentation is an overview tutorial on how standard Public Key Infrastructure (PKI) services and the OSP protocol are being used today to enable secure peer to peer VoIP calls.
By John L. Guerra
Free STIR/SHAKEN offer!
Process up to a million calls for no charge until the PA and CAs are live.
This information will only be used to send newsletters and occasional announcements. TransNexus will not share your data with any third parties. We will retain your information for as long as you wish to continue receiving our newsletters and announcements. You may unsubscribe at any time by selecting the unsubscribe link at the bottom of the email. For more information about how we use personal data, please see our privacy statement.