The FCC announced that it will host an online event, Quantum Internet Forum, to present and discuss developments in quantum computing and its implications for communications networks. Here’s an overview.
The FCC Second Report and Order was published in the Federal Register today, which sets its effective date, at which point it will be written into the rules, at December 17, 2020. These rules contain several deadline dates. Here’s a quick overview.
The U.S. STI Governance Authority (STI-GA) today announced an update to the Service Provider Code (SPC) token access policy. This policy determines the requirements that a voice service provider (SP) must meet to obtain SHAKEN certificates used to authenticate calls. Here’s an overview.
New information from Hiya, a provider of robocall prevention, questions whether the “stay home, stay safe” robocalls reported recently were a political plot to undermine the election. Let’s review this information.
The Federal Communications Commission announced today that they will host a one-hour webinar to help protect consumers from scams during the upcoming holidays. This would be of interest to enterprises and service providers that want to offer similar guidance to their customers.
Call authentication and analytics can identify potential spam calls. There isn’t yet a standard for display relevant information to the called party, but standards are emerging. Here’s an overview.
The CATA Working Group of the NANC issued a best practices document, and the FCC asked for comments. Here’s a summary of the feedback they received.
The TRACED Act and FCC orders require service providers to use STIR/SHAKEN or robocall mitigation for calls that they originate. There are many ways to catch robocalls at origination. One of the most effective is using dynamic traffic analysis. Here’s an overview.
As STIR/SHAKEN becomes used more widely, callers will want their calls authenticated with full attestation, and called parties will be more likely to answer calls with full attestation. There are many arrangements in the telecom ecosystem that will make this difficult. Participants need to understand their options and develop a strategy.
A few organizations have filed comments on the progress of caller ID authentication implementation, as required by the TRACED Act. Here’s a summary.
The FCC fined Affordable Enterprises of Arizona $37.5 million for making more than 2.3 million illegal robocalls over a 14 month period in 2016-17. The calls spoofed caller ID with calls intended to obtain something of value, a violation of the Truth in Caller ID Act.
What is a standards-compliant STIR/SHAKEN system, and why does it matter? Here’s a quick overview.
There’s a landmark case before the Supreme Court of the United States regarding autodialers and robocalls. Twenty-one members of the U.S. Congress have recently joined to file an amici brief on the case. Here’s a review of the pending case and what this brief adds.
You probably know about the benefits STIR/SHAKEN call authentication will provide to consumers: by identifying caller ID spoofing, it will help bring unwanted and illegal robocalls under control. But what about enterprise callers? How will SHAKEN help you? Let’s look.
CNAM, caller ID name, can be a valuable service that makes subscribers more likely to answer incoming calls. Traditional CNAM, however, has some limitations. There are newer alternatives that promise better benefits. Here’s a quick overview.
STIR/SHAKEN uses PASSporTs to carry information about caller identity. There are different types of PASSporTs, and it can be confusing to keep it straight. Here’s a simple overview.
Registering with the STI-PA to authenticate calls with STIR/SHAKEN is a strategic capability that every service provider should control. Some may be tempted to outsource this to another organization, but we encourage you to do it yourself for three simple reasons:
The TRACED Act directed the FCC to allow voice service providers to file for a Voluntary STIR/SHAKEN Implementation Exemption in 2020. Should you do that? We cannot and would not offer legal advice, but we can share some information that might be useful as you ponder this situation.
Initially, STIR/SHAKEN will be rolled out country-by-country. Ever wonder how these separate deployments might be joined together? Here’s a quick overview of a roadmap for that.
The FCC second report and order on STIR/SHAKEN, adopted September 29, 2020, provided four extensions on the STIR/SHAKEN implementation deadline for certain scenarios. However, any voice service provider taking an extension must use an appropriate robocall mitigation program for calls that it originates. What does that mean? In this blog post, we review various techniques that could be used.
The FCC adopted a report and order to change the rules for intercarrier compensation on toll free calls. The rule changes are designed to remove underlying incentives for 8YY arbitrage schemes, for example, fraud schemes that exploit the intercarrier compensation rules. Here’s an overview.
The FCC asked the Call Authentication Trust Anchor (CATA) working group to recommend best practices for the implementation of call authentication. The TRACED Act required this step. The CATA has recently issued a report with proposed best practices. Here’s a summary overview.
CNN reporter Faith Karimi wrote an article about Covid-19 contact tracers and their struggle to get people to answer the phone. Subscribers are wary of spam robocalls and are reluctant to answer calls from a number they don’t recognize. Solutions are available, but not yet widely deployed. Let’s have a look.
There’s a lot to read and digest in the FCC first and second report and order for SHAKEN. Wading through the rules and exemptions, we’ve identified three simple rules that will apply to most voice service providers in the U.S. Here we go…
The FCC released the final approved version of their Second Report and Order on SHAKEN implementation. There was a major deadline change, along with a few minor changes from the draft version released three weeks earlier. Here’s an overview of what the second order contains and what changed in the final version.
The FCC announced on September 29, 2020 that they have adopted new rules to promote implementation of STIR/SHAKEN caller ID authentication. Here’s what we know so far.
The USTelecom Industry Traceback Group (ITG) has become increasingly effective in speeding up the traceback of illegal robocalls. Ever wonder how it works? Here’s an overview.
In the U.S., the TRACED Act, and FCC orders that come from it, will require voice service providers to deploy and certify their use of STIR/SHAKEN call authentication or, in certain circumstances, a robocall mitigation program, by June 30, 2021. Here’s an overview of what this means.
What is an autodialer? Seems like an easy question, but disagreements over the definition have caused conflicting decisions in important court cases. Now the U.S. Supreme Court is going to address the issue in an upcoming case, and their decision could have a big impact on robocall and telemarketing law. Here’s an overview.
Globex Telecom, a VoIP service provider, and its subsidiary companies and associates will pay $2.1 million in fines to settle charges brought by the FTC and State of Ohio. This is the FTC’s first consumer protection case against a VoIP service provider. Here’s the story.
A few organizations have met with the FCC on their Second Report and Order Promoting Caller ID Authentication to Combat Spoofed Robocalls, i.e., second SHAKEN order. Here’s what they had to say.
Bad actors often spoof caller ID with numbers that are like the called number, a tactic called neighbor spoofing. Here’s a simple method to block such calls that we’ve found can be quite effective.
The FCC’s Second Report and Order on SHAKEN deployment extended deadlines to deploy STIR/SHAKEN in some situations. However, any provider that accepts one of these extensions must deploy a robocall mitigation program by June 30, 2021. Enforcement is strict. Here’s what that means.
The Reassigned Numbers Database (RND) will enable callers to verify whether a telephone number has been permanently disconnected, and potentially reassigned, before calling that number. The intent is to reduce the number of unwanted calls made to reassigned telephone numbers. Here’s how it will work.
The FCC today published the next round of rules for robocalls and STIR/SHAKEN deployment. There’s quite a lot in this 93-page document. We’ve summarized it for you here.
A consumer credit consultant in McKinney, Texas, has figured out a way to turn annoying robocalls into cash. Here’s how it works.
Comments were filed on the FCC’s fourth further notice of proposed rulemaking on robocall blocking issued on July 17, 2020. Comments were received from 32 organizations. We’ve summarized these comments for you.
A recent robocall study report from researchers at North Carolina State University has shattered some myths about robocalls. The report describes the results of an 11-month study using a honeypot with over 60,000 numbers to log robocall activity.
The SHAKEN standards are changing for calls that are diverted by features such as call forwarding. This blog post briefly explains how this brings the benefits of SHAKEN authentication to diverted calls, and what’s changed in this new version of the standards.
After a sharp decline in monthly robocalls in March and April, the numbers are trending upward over the past three months. Here’s an overview.
New legislation was introduced in the U.S. Senate to expand funding for telecom service providers and educational institutions to rip-and-replace prohibited equipment from dangerous resources, including Huawei and ZTE. Here’s an overview.
The FCC Consumer and Government Affairs Bureau issued a public notice to clarify rules of the emergency exception to the Telephone Consumer Protection Act (TCPA) for calls related to the COVID-19 pandemic. Here’s an overview.
The FCC announced that they have designated the USTelecom Industry Traceback Group as the registered traceback consortium to coordinate and lead efforts to trace back the origin of illegal robocalls. This appointment fulfills a requirement in the TRACED Act. Here are the details.
The FCC today voted to approve new robocall blocking rules required by the TRACED Act and published by the FCC in their rulemaking on March 31, 2020. These rules involve safe harbor. Here’s an overview.
The FCC announced the formation of the Hospital Robocall Protection Group, its members and first meeting date. Here’s an overview.
The FCC received comments and reply comments on their initiative to combat one-ring scams as required by the TRACED Act. Here’s an overview.
The Supreme Court issued their findings on a legal challenge to the Telephone Consumer Protection Act of 1991 (TCPA), which prohibits robocalls to cellphones and home phones. The Court decided the ban should remain, with some changes.
The FCC announced that, beginning July 27, 2020, voice service providers must start maintaining data for the Reassigned Numbers Database. This database will be used to reduce the number of phone calls intended for someone else.
The FCC has issued a 41-page staff report on the availability and effectiveness of robocall blocking tools. This report follows the FCC 2019 Call Blocking Declaratory Ruling, which authorized blocking by default. The order also directed the Consumer and Governmental Affairs Bureau to prepare a report to help the Commission and consumers understand how the ruling is impacting the call blocking tools ecosystem.
Robocalls aren’t just annoying—they’re an existential threat to your voice service provider business. You need to protect your customers from robocalls and TDoS attacks to protect your business.
The FCC announced a Notice of Apparent Liability for Forfeiture, or NAL, against Texas-based telemarketers. They made approximately 1 billion illegally spoofed robocalls in early 2019 to sell health insurance plans. The proposed fine would be the largest ever.
In response to the FCC public notice on April 20, USTelecom filed a letter of intent on May 21 to serve as the registered traceback consortium required by the TRACED Act. USTelecom currently administers the Industry Traceback Group, a collaborative effort of voice service providers to trace the source of illegal robocalls.
The FCC and FTC sent letters to three gateway providers to demand that they cut off illegal robocalls originated overseas. If they don’t cut off these robocalls, then the FCC and FTC ask USTelecom members to block all calls from these gateway providers.
The SIP Forum has announced that it will host a STIR/SHAKEN Virtual Summit during the week of June 22, 2020. This series of webinars will provide educational content and facilitate discussion focused on the challenges and opportunities related to STIR/SHAKEN call authentication.
An interesting article was recently published in CFCA Communicator about strong demand by businesses and consumers in Latin America for telecom fraud prevention solutions. This is a huge market opportunity for voice service providers operating in the region.
The Federal Communications Commission announced it will no longer warn robocallers before issuing penalties. This change was enabled by the TRACED Act.
We invite you to join the next monthly online KNOW Session focused on STIR/SHAKEN, hosted by the CFCA. This call will provide a forum to share information, ask questions, and network with experts.
The FCC today issued a Notice of Proposed Rulemaking (NPRM) to protect Americans from one-ring (also known as Wangiri) scam telephone calls. Here’s an overview.
The FCC has directed the Enforcement Bureau to select a single entity to serve as the registered traceback consortium required by the Pallone-Thune TRACED Act. Today, the Enforcement Bureau requested letters of intent for parties that wish to be considered for selection in this role.
Here’s a surprising side effect of widespread shelter in place during the pandemic: telephone pollsters are getting more responses to their calls and having longer conversations than they did before.
What’s the hot new app during widespread shelter in place? Zoom? Google Hangouts? Actually, it’s plain old voice phone calls.
STIR/SHAKEN provides a way to authenticate caller ID as a safeguard against spoofing, a common robocall tactic. The framework relies on a governance structure that vets and approves who can authenticate calls. This blog post gives an overview of the current policy around authentication approval in the U. S.
We invite you to join the next monthly online KNOW Session focused on STIR/SHAKEN, hosted by the CFCA. This call will provide a forum to share information, ask questions, and network with experts.
The FCC and the FTC demanded that voice service providers block coronavirus-related scam robocalls from reaching U.S. consumers within 48 hours. If they don’t, other phone companies will be able to begin blocking all traffic from these gateway provider networks. Here’s an overview.
On March 31, 2020, the FCC issued a mandate for telephone companies to implement STIR/SHAKEN call authentication to combat spoofed robocalls. Here are the highlights.
Comments were filed by 33 organizations, with a total 215 page of commentary. We’ve summarized it for you.
On March 6, 2020, FCC Chairman Ajit Pai proposed new rules requiring implementation of call authentication using STIR/SHAKEN. The Commission will vote on these rules during its Open Meeting on March 31, 2020.
We presented a webinar recently, Get Ready for the STIR/SHAKEN Call Authentication Mandate. This one-hour presentation reviews the requirements of the recently enacted TRACED Act and shows how some NTCA members are quickly getting ready today. Here’s a recording of the webcast for your review.
We want to share with you highlights of updates to our NexOSS software product during the past year. There have been many, but there are a few performance and functionality enhancements that we want to highlight.
In December 2019, the Canadian regulator asked Canadian telephone service providers to submit an action plan to it by 24 February 2020 describing progress in implementing STIR/SHAKEN. Here’s an overview of the background leading up to this request and the information they want.
On February 6, 2020, the FCC issued a notice of proposed rules for the registration of a single consortium to conduct private-led traceback of suspected unlawful robocalls. The FCC is required by the newly enacted TRACED Act to establish these rules by a prescribed timetable. Here’s a quick overview.
The FCC Enforcement Bureau asked seven gateway voice service providers for their support in stopping the flow of illegal robocalls that originate outside the U.S. To this end, the Commission asked the these providers the following six questions about their business practices:
In December 2019, the FCC issued a call for comments on robocall blocking. These comments were due January 29, 2020. Twenty-eight responses were filed. Don’t have time to read them all? We’ve provided a brief summary of each response.
The U.S. Department of Justice (USDJ) has filed landmark legal actions in two cases against five U.S.-based VoIP carriers for serving as gateway carriers for robocalls to U.S. subscribers. This is the first time that authorities have brought legal action against the carriers of robocalls, in addition to the perpetrators.
The Pallone-Thune TRACED Act, which was signed into law on December 30, 2019, includes requirements for the FCC to initiate a proceeding to protect called parties from one-ring scams (also known as Wangiri, Japanese for one-and-cut). Here’s an overview of one-ring scams, the roadmap for this FCC directive, and what protection looks like.
TransNexus contributed an article on Restoring Telecom Trust to Pipeline Magazine. This article reviews three emerging technologies that, when combined, will give consumers relief from unwanted robocalls and make telephone service a more effective and enjoyable means of communication.
In a meeting with the FCC on January 14, 2020, the NTCA explained that 93% of its members have IP-enabled switches, yet most are unable to participate in STIR/SHAKEN. The problem is not a lack of IP-enabled equipment. The problem, says the NTCA, is that upstream carriers are unwilling to exchange voice traffic with rural carriers over IP.
Here’s a list of the top ten telecom stories and whitepapers we published in 2019—the year in review!
President Trump signed the Pallone-Thune TRACED Act into law on December 30, 2019. This legislation includes several measures to combat unwanted robocalls, including a mandate for voice service providers to use STIR/SHAKEN call authentication.
The U. S. Senate passed the Pallone-Thune Telephone Robocall Abuse Criminal Enforcement and Deterrence (TRACED) Act on December 19, 2019, with a unanimous vote.
The Federal Communications Commission on December 12, 2019 issued a $9,997,750 fine against a robocall perpetrator for making 47,610 calls on May 30–31, 2018. The Commission based this fine upon its evaluation of several laws that were violated.
The U.S. Secure Telephone Identity Governance Authority (STI-GA) today announced that the nation’s Calling Number Verification Service, which is based on the SHAKEN framework, will launch Monday, December 16, 2019. Here’s what they said.
FCC Chairman Ajit Pai and CRTC Chairperson and CEO Ian Scott completed the first official cross-border call using STIR/SHAKEN call authentication. The call took place on December 9, 2019. Pai and Scott issued a joint statement about this call.
The Canadian Radio-television and Telecommunications Commission (CRTC) today announced that it’s stepping up efforts to combat spoofed calls. To that end, the regulator issued three regulatory statements. Here an overview.
The Pallone-Thune TRACED Act (S.151) passed the U.S. House of Representatives on Wednesday, December 4, 2019, by a vote of 417–3. This bill mandates STIR/SHAKEN and other measures to combat unwanted robocalls. The next stop for the legislation is the U.S. Senate.
Alec Fenichel, TransNexus Senior Software Architect, appeared at the SkySwitch Vectors 2019 conference in Orlando in late October 2019 to present a session on “What the VoIP Industry Can Do About Robocalls.” SkySwitch published a recent blog post on this topic, including an interview with Alec by Erik Linask, Group Editorial Director of TMC.
Committees in the House and Senate have released the text of the Pallone-Thune TRACED Act, proposed legislation to combat unwanted robocalls with tougher penalties and a mandate for call authentication in both VoIP and non-VoIP networks. Let’s take a look.
Eric Burger has accepted a position as Assistant Director for the White House Office of Science and Technology Policy (OSTP). In this role, he will take responsibility for the telecommunications and cybersecurity portfolios. Mr. Burger is a former Chief Technology Officer with the FCC and a Research Professor of Computer Science at Georgetown University.
T-Mobile, Comcast and Inteliquent on November 21, 2019 announced that they have completed end-to-end STIR/SHAKEN call verification across three networks. The announcement represents further progress in attaining readiness for caller ID authentication and verification in the battle against unwanted robocalls.
November 17-23, 2019 is International Fraud Awareness Week. The Communications Fraud Control Association (CFCA) has encouraged members to share information so we can work together to combat it. So, we’re sharing three case studies of a series of domestic telecom robocalls and TDoS attacks we observed just last month, in October 2019. Here’s what happened.
Six legislative leaders announced on Friday, November 15, 2019, that they have reached an “agreement in principle” on legislation to combat the robocall epidemic. The legislation is called the Pallone-Thune Traced Act. Here’s what we know so far.
Pindrop, a provider of voice security solutions that analyze audio, issued their annual Voice Intelligence Report. In this report, they found that 90 voice fraud attacks occur every minute.
The numbers are in, and they show that robocall activity spiked in October 2019 to an all-time high. Here’s an overview.
AT&T recently announced three new features to its Call Protect application. These enhancements give subscribers more options for preventing unwanted robocalls.
FCC Chairman Ajit Pai announced proposed rules to protect communications networks from national security threats. The proposed rules aim to prevent eligible companies either from purchasing or continuing to use network equipment from Huawei or ZTE.
The FCC Wireline Competition Bureau on October 25, 2019 denied a stay requested by five petitioners for the FCC Access Arbitrage Order issued on September 26, 2019. Here’s an overview.
The Canadian Anti-Fraud Centre has reported a recent wave of Wangiri telecom fraud calls to Canadian telephone subscribers in the Montreal area. Here’s what’s happening.
The conventional wisdom is that younger generations don’t like to talk on the phone—they’d rather text or use social media. A recent article in the Wall Street Journal paints a different picture: research suggests that the phone call isn’t dead—it’s evolving.
We’ve noticed an uptick in the number of businesses contacting us for help in preventing Telephony Denial of Service (TDoS) attacks. This seems to be an increasing threat. Here’s how you can protect your organization.
Representatives of the CTIA, NCTA, and USTelecom met with members of the FCC on October 8, 2019 to urge the adoption of a broad safe harbor for robocall blocking. Here’s why.
The governor of California, Gavin Newsom, signed the Consumer Call Protection Act of 2019 on October 2, 2019. This law requires telecommunications service providers to implement STIR/SHAKEN on or before January 1, 2021.
Researchers from Check Point Software recently identified a vulnerability in Asterisk FreePBX software that hackers used to gain control of the PBX server, read call files, listen to recorded calls, and make spoofed calls with complete anonymity.
STIR/SHAKEN can identify caller ID spoofing, a robocall tactic. It’s an important tool to deliver relief from unwanted robocalls. But it won’t work unless the SHAKEN Identity token survives transit across the telephone network. In today’s network, it won’t. That’s why several organizations have filed comments with the FCC urging support for Out-of-Band STIR/SHAKEN call authentication.
We’ve been reporting many discussions and filings with the FCC about their proposed rule to redefine access stimulation. Today, the FCC issued an Order to enact the rule changes. The intention is to prevent access stimulation, which often presents as domestic traffic pumping.
On September 5, 2019, the FCC issued a draft order with a proposal to change the definition of access stimulation. In their meeting and ex parte filing with the FCC, the NTCA showed the impact that this definition would have on carriers who would become inadvertently swept up in this definition.
The Apple iOS 13 features list includes a feature for “carrier-verified calls.” This feature will indicate calls that have been verified by STIR/SHAKEN.
Representatives of HD Tandem, a provider of virtual tandem and termination services, met with several FCC Commissioners, their staff, and Chairman Pai on September 11–12, 2019 to discuss access stimulation. Here’s a recap.
The SIP Forum released the conference topics and schedule for the ninth annual SIP Network Operators Conference, SIPNOC 2019, to be held December 3–5, 2019 in Herndon, Virginia. This conference will focus exclusively on STIR/SHAKEN call authentication framework to prevent caller ID spoofing, a common tactic used with unwanted robocalls.
The FCC Consumer and Government Affairs Bureau and Wireline Competition Bureau responded to the NANC request for another delay on the Reassigned Numbers Database (RND) project. They granted a part, but not all, of what the NANC requested.
Hiya, a maker of robocall prevention software for mobile phones, released their State of the Call robocall report for the half-year 2019. There are some interesting findings in this report.
In a story reported by the WSJ, fraudsters created fake voice recordings of a German CEO using Artificial Intelligence (AI). Then they called the CEO of a British subsidiary and convinced him to wire USD $243,000 to a Hungarian supplier within the hour. The British CEO sent the money. Why? Because the AI-generated recording was that convincing.
This was an interesting round of ex parte filings to document discussions with the FCC over their Notice of Proposed Rulemaking (NPRM) to address access stimulation, i.e., domestic traffic pumping. Three organizations, NTCA, Sprint, and HD Tandem, presented three markedly different views.
Inteliquent filed an ex parte presentation with the FCC recently in which they proposed rule changes to prevent access stimulation, e.g., domestic traffic pumping. Their suggestions address a new form of access arbitrage that’s been growing lately.
The CRTC issued a mandate on 19 December 2018, CRTC 2018-484, that requires Canadian carriers and other telecommunications service providers to block calls terminating on their networks with invalid calling numbers. The implementation deadline is twelve months from the date of this decision, 19 December 2019.
Somos, a registry management and data solutions company and the administrator of the Toll-Free Number database registry, submitted an ex parte filing with the FCC in response to the NANC NAOWG’s request for a 7-month extension on the technical requirements document and funding report for the Reassigned Numbers Database (RND). In their filing, Somos stated that the delay was unwarranted.
The STI-GA Governance Authority announced that they have executed the contract naming iconectiv as the STI-PA Policy Administrator. In their policy administrator role, iconectiv will enforce the rules defined by the governance authority to put SHAKEN into operation.
Thirty-four organizations filed replies to the first round of comments on the FCC Declaratory Ruling and Third Further Notice of Proposed Rulemaking (FNPRM) regarding robocall blocking and SHAKEN/STIR deployment. Here’s a summary of their replies.
North Carolina attorney general Josh Stein announced a coalition of 12 telephone companies and 51 attorneys general to adopt a program to fight unwanted robocalls. This program includes 8 principles to protect phone users from unwanted robocalls and make it easier to prosecute unlawful robocall perpetrators.
In a letter dated August 14, 2019, the North American Numbering Council (NANC) formerly requested a 7-month extension to develop a technical requirements document and a report outlining the fee structure, pricing, and funding mechanism for the Reassigned Numbers Database (RND).
FCC Chairman Ajit Pai issued a statement on August 14 about progress by major phone companies in implementing caller ID authentication. His statement was a reaction to news that AT&T and T-Mobile are beginning to roll out SHAKEN/STIR.
AT&T and T-Mobile announced yesterday, August 14, that they have begun to rollout cross-network call authentication using STIR/SHAKEN.
The FCC issued a call for comments on proposed rulemaking for robocall blocking. TransNexus responded to share our experience in deploying STIR/SHAKEN and robocall prevention solutions in telecom service provider networks. Here are highlights.
The U.S. House of Representatives passed the Stopping Bad Robocalls Act (HR 3375) on July 24 by a vote of 429–3. The legislation now moves to the Senate for consideration.
The Energy and Commerce Committee favorably reported the Stopping Bad Robocalls Act (HR 3375), as amended, out of committee today to the full U.S. House of Representatives by a vote of 48–0.
TransNexus CEO Jim Dalton participated in the FCC SHAKEN/STIR Robocall Summit in Washington D.C. on July 11, 2019. FCC Chairman Ajit Pai announced this summit to review progress made toward deploying SHAKEN/STIR and identify challenges to deployment and how to overcome them.
FCC Commissioner Geoffrey Starks released responses to his inquiries to 14 voice service providers about their plans to block suspected spam robocalls by default, on an opt-out basis. Here are highlights and excerpts from their responses.
We noticed a spike in attempted telecom fraud attacks in the U.S. during the Fourth of July holiday week. Here’s an overview of the attack profiles. The more you know about telecom fraud attacks, the better you can keep your network and subscribers safe.
The FCC today announced proposed rules banning malicious caller ID spoofing of text messages and foreign robocalls.
The Communications Subcommittee of the House Energy and Commerce Committee yesterday voted to consolidate four other bills into the Stopping Bad Robocalls Act. This omnibus legislation will next be considered by the full committee.
On June 20, a bipartisan version of the Stopping Bad Robocalls Act (HR 3375) was announced in the U.S. House of Representatives. Frank Pallone (D-NJ), chairman of the Energy and Commerce committee, and ranking member Greg Walden (R-OR) made the announcement.
TransNexus recently presented a webinar on Effective STIR/SHAKEN and Robocall Solutions that Work Today. Here’s a recording of this webinar.
On the heels of the recent FCC declaratory ruling to allow voice service providers to block suspected spam robocalls by default, Commissioner Geoffrey Starks sent letters to 14 providers asking about their planned response to the ruling.
The FCC today voted to allow voice service providers to block robocalls by default based upon reasonable call analytics. Consumers could request to opt out of default robocall blocking. By allowing default opt-in, blocking programs could be applied to more calls to more consumers, reducing their exposure to unwanted robocalls.
FCC chairman Ajit Pai’s proposed ruling to allow telecom service providers to block robocalls by default has been a hot topic. Here’s a summary of responses we’ve seen so far.
The STI-GA (Secure Telephone Identity Governance Authority) announced that they have selected iconectiv as the STI-PA (Policy Administrator). This is an important milestone in the rollout of STIR/SHAKEN in the U.S.
The U.S. Senate voted 97–1 in favor of the TRACED Act on Thursday, May 23, 2019. The Telephone Robocall Abuse Criminal Enforcement and Deterrence Act instructs the FCC to require voice service providers to implement STIR/SHAKEN not later than 18 months after the enactment of the legislation.
One of our customers recently defeated an International Revenue Sharing Fraud (IRSF) attack. We thought it would be useful to share with you some information about the attack profile and demonstrate how a modern telecom fraud detection system can prevent such attacks.
FCC chairman Ajit Pai today proposed a new declaratory ruling that, if adopted, would permit telecom service providers to block robocalls by default. Such call blocking would be based upon call analytics or contact lists in customer phones.
In 2018, the FCC proposed changes to the Intercarrier Compensation Scheme to prevent access stimulation (i.e., domestic traffic pumping). CenturyLink recommended a modification to the FCC proposal, and recently they filed an ex parte study with data to support their ideas.
FCC chairman Ajit Pai today announced that a SHAKEN/STIR Robocall Summit will be held on Thursday, July 11, 2019, in Washington D.C. to review industry progress in implementing SHAKEN/STIR.
The House Energy and Commerce Committee held a hearing on Legislating to Stop the Onslaught of Annoying Robocalls. Here’s a review of testimony provided by four witnesses.
The FCC issued a consumer alert in response to a reported wave of Wangiri scam robocalls. These calls ring once, then hang up. The scammer hopes that the called party will return the call. The return call would go to a high-cost number with charges billed to the victim.
The STIR/SHAKEN standards did not dictate how verification service (STI-VS) results should be displayed for users. This has been under discussion for a while, and standards are emerging.
Update: On April 15, 2019, we reported that the TRACED Act picked up eighteen more cosponsors, for a total of 53 sponsors and cosponsors. Since then, the proposed legislation to prevent spam robocalls has gained seven more cosponsors, for a total of 60 cosponsors plus one sponsor.
T-Mobile announced that caller ID verification with STIR/SHAKEN is now available for T-Mobile customers for calls that originate from Comcast Xfinity Voice home phone service.
There’s been some activity stirring in the U.S. Senate on prevention of spam robocalls, including a potential STIR/SHAKEN mandate. Here’s a recap of recent and upcoming events.
The Communications Fraud Control Association (CFCA) will host a webinar on April 11, 2019: Restoring Trust in the Telephone Network—A Tutorial on SHAKEN. This session will be facilitated by TransNexus.
Verizon announced recently that they have completed calls using STIR/SHAKEN technology within their network. The company issued a statement that this exchange of STIR/SHAKEN-enabled calls is a critical step in restoring trust in caller ID.
The TRACED Act (Telephone Robocall Abuse Criminal Enforcement and Deterrence Act), has been scheduled for consideration at a meeting of the US Senate Committee on Commerce, Science and Transportation on April 3, 2019.
We’ve gathered the most frequently-asked questions about STIR/SHAKEN, and we’re going to present and discuss the answers in an upcoming webinar. Join us!
AT&T and Comcast today announced that they’ve exchanged calls between their landline networks using caller ID authentication with STIR/SHAKEN.
A large telephone service provider was recently evaluating SIP Analytics® fraud prevention alongside their incumbent CDR-based telecom fraud management system. Then a telecom fraud attack hit.
On February 19, 2019, TransNexus and TelcoBridges teamed up to present an educational webinar, How to Implement STIR/SHAKEN. A recording of this presentation is now available. The session includes a live demonstration.
The Federal Communications Commission Consumer and Governmental Affairs Bureau today released a Report on Robocalls. This report fulfills a requirement to describe progress made in combatting illegal robocalls and the remaining challenges.
Frank Pallone Jr., chairman of the House Energy and Commerce committee and House representative from New Jersey, announced today that he has reintroduced the Stopping Bad Robocalls Act (HR 946) into the House of Representatives to stop abusive robocall practices.
ATIS conducted a webinar on Wednesday, January 30, 2019, “SHAKEN 101: Mitigating Illegal Robocalling and Caller ID Scams.” In this webinar, STI-GA director Brent Struthers shared his expectations for when the STI Policy Administrator (STI-PA) might be in place.
T-Mobile announced yesterday that they have launched its new Caller Verified technology to give their customers relief from unwanted robocalls and caller ID spoofing. This service is their branded name for their STIR/SHAKEN deployment. Here’s how they describe it:
The CRTC (Canadian Radio-television and Telecommunications Commission) recently mandated specific call-blocking measures. Canadian telecommunications service providers must implement a system to perform these blocks by 19 December 2019.
The Federal Communications Commission recently issued a notice of proposed rulemaking to comply with legislation enacted in the RAY BAUM’s Act, which was signed into law in March 2018. Here’s a summary of the proposed changes.
On December 12, 2018, the Federal Communications Commission issued a report and order for the creation of a reassigned numbers database. This database is intended to reduce the number of phone calls intended for someone else. Here’s how it will work.
The Federal Communications Commission today issued a new rule to prevent spam robotext messages.
ATIS announced the appointment of the director of the Secure Telephone Identity Governance Authority (STI-GA). This will be a critical role in the deployment of the SHAKEN/STIR framework.
Fourteen carriers have replied to FCC Chairman Pai’s call to implement SHAKEN without delay. Read this post to find out who replied and what they said.
The Federal Communications Commission (FCC) has proposed rules to prevent robotexting and robocalls to reassigned numbers. Here are the details.
A new piece of legislation to mandate STIR/SHAKEN, provide safe harbor for providers to block calls, and increase criminal penalties for unlawful robocall perpetrators has been introduced in the U.S. Senate. The TRACED Act is designed to provide every person with a phone much needed relief from unwanted, illegal robocalls.
The U.S. Secure Telephone Identity Governance Authority (STI-GA) today issued a request for proposal (RFP) for selection of a Secure Telephone Identity Policy Administrator (STI-PA). The STI-PA will be a key role in enforcing rules for smooth operation of STIR/SHAKEN to enable secure caller ID, which will prevent caller ID spoofing, a tactic used with unwanted robocalls.
TransNexus teamed up with TelcoBridges to develop content on Battling Robocalls with STIR/SHAKEN, which Alan Percy, Senior Director of Product Marking for TelcoBridges, presented at the AstriCon 2018 conference in Orlando. Check out this video to learn how STIR/SHAKEN will tackle the problem of unwanted robocalls and the scams they perpetrate.
Federal Communications Commission (FCC) chairman Ajit Pai yesterday called on telecom carriers to implement SHAKEN as quickly as possible to protect consumers from caller ID spoofing and unwanted robocalls.
The Federal Communications Commission recently issued a proposed rule that is designed to remove the financial incentive for domestic traffic pumping from the intercarrier compensation regime. Here’s how it works, and why it’s needed.
We have received several inquiries from telecom service providers who are interested in the new ClearIP least cost routing feature. This service provides an easy, effective way to manage jurisdictional least cost routing. This blog post provides a quick overview to help you learn how it works.
Google recently announced a new call screening feature for its Pixel phone. This feature is intended to help customers screen unwanted robocalls. Here’s what it will do.
Thirty-five state attorneys general filed a comment with the FCC supporting efforts to combat unwanted robocalls. In this filing, they encouraged aggressive implementation on several fronts.
Many telecom billing and fraud analysts are experts on Call Detail Records (CDRs) but might be less familiar with Session Initiation Protocol (SIP) records. This blog post provides a quick introduction to SIP records and compares them to CDRs.
The FCC yesterday levied a large fine against a robocaller for using caller ID spoofing. The number of calls made by this perpetrator is astounding.
“A virtual explosion in annoying robocalls…” That’s how NBC news reporter Kevin Tibbles began his television news story on the problem of unwanted robocalls. Tibbles interviewed TransNexus as part of his story to tell viewers how STIR-SHAKEN technology will solve this problem.
Call centers are at risk from social engineering fraud scams. SHAKEN will help call centers eliminate some of the risk.
A new ClearIP customer enabled call forward blacklisting. They experienced a telecom fraud call forwarding attack over the weekend. Here’s what happened:
Most ClearIP customers connect their telecom network to ClearIP using TCP. Some may want to use TLS for the additional encryption security it provides.
Call-forwarding fraud is a common telecom fraud attack. This blog post explains how ClearIP blacklisting can be used to easily prevent call-forwarding telecom fraud.
The FCC issued a call for comments on robocalling activity and prevention, including progress on SHAKEN/STIR. Here are highlights of comments offered.
ATIS published a technical report that describes a proposed architecture for a centralized signing and signature validation services used in a STIR/SHAKEN deployment. This blog post summarizes the rationale for this architecture.
ATIS has published a technical report on a framework for the display of verified caller ID. This report addresses the question “How should we tell a subscriber that caller ID has been verified, or that the caller ID is fake?” Specifically, what should be displayed on the subscriber’s telephone after STIR/SHAKEN processing? This blog post summarizes usability testing and framework proposals described in the report.
SIP Analytics® is a method to detect and prevent telecom fraud and unwanted robocalls. It checks each call in less than a second, before the call begins. It’s incredibly fast.
This blog post provides instructions on how to configure FreeSWITCH to interoperate with the TransNexus OSPrey server. We’ve tested this configuration in the development and testing of SHAKEN/STIR. We’re sharing this information with the community of telecommunications network engineers who are preparing their company’s FreeSWITCH for testing and deployment of SHAKEN/STIR functionality.
The recording of the Battling Robocalls webinar, presented by TransNexus and Telco Bridges, is now available online.
New York Magazine recently ran an article on increasing robocall volume. They reported that there were 3.4 billion robocalls placed in April 2018, up from 2.5 billion in April of 2017—a 36% increase. Furthermore, while in 2014 the average American received 15 spam phone calls a month, by 2018 the average American was getting slammed with 23 spam phone calls a month.
On May 14, 2018, the FCC announced that chairman Ajit Pai has accepted the recommendations of the North American Numbering Council (NANC) for industry to quickly establish a Governance Authority for implementing the SHAKEN/STIR framework.
On May 10, 2018, the Federal Communications Commission voted to fine a robocall perpetrator $120 million.
The North American Numbering Council (NANC) issued their report to the Federal Communications Commission (FCC) on May 3 with a proposal for governance arrangements and timelines to implement STIR/SHAKEN, which would provide secure caller ID to prevent unwanted robocalls and reduce telecom fraud.
On May 3, representatives from Verizon met with members of the Federal Communications Commission (FCC) to share Verizon’s plans to combat robocalls. On May 7, Verizon representatives followed up on this meeting with an ex parte letter to the FCC outlining the discussion, including Verizon’s plans and expected timeline to implement Secure Telephone Identity using the STIR/SHAKEN framework.
On May 3, the North American Numbering Council (NANC) issued a report to the Federal Communications Commission (FCC) with recommendations for governance arrangements and implementation timelines for secure caller ID, or Secure Telephone Identity (STI), in the United States using the SHAKEN/STIR framework.
Jim Dalton, CEO of TransNexus, and Gary Audin, Senior Technology Analyst with Telecom Reseller, recorded a 15-minute EDUcast to discuss telecom fraud risks and the best ways to prevent it. This EDUcast was hosted by Telecom Reseller.
The U.S. Senate Committee on Commerce, Science, and Transportation will conduct a hearing on “Abusive Robocalls and How We Can Stop Them.” The hearing will be held on Wednesday, April 18, 2018, at 10:00 a.m. EDT. A live video of the hearing will be broadcast online at www.commerce.senate.gov.
Today the Federal Communications Commission and Federal Trade Commission announced two upcoming events to address the illegal robocall problem:
Several Canadian telecommunications service providers have warned their customers to avoid answering or returning calls from unknown international numbers. This type of telecom fraud is called “Wangiri,” which is Japanese for “one and cut.” Here’s how it works.
The Federal Communications Commission (FCC) recently issued their report on Voice Telephone Services: Status as of December 31, 2016, which showed continued growth of VoIP and mobile subscriptions and a decline in subscribership to traditional wired telephone services.
On 7 December 2017, the Federal Communications Commission (FCC) asked the North American Numbering Council (NANC) to provide advice on how the Trusted Anchor function should be defined and implemented in the pending STIR/SHAKEN call authentication system for Secure Telephone Identity.
On 22–23 January 2018, CTIA, a group that represents the U.S. wireless communications industry, met with the Federal Communications Commission (FCC) to discuss how to prevent nuisance robocalls.
Robocalls are a nuisance for telephone customers. Government regulators have set up Do Not Call lists and rules to keep robocalls at bay, but it isn’t working. There’s money to be made from robocalling, and technology makes it easy to conceal the caller’s true identity.
The Washington Post (WP) recently reported some startling facts about robocalling:
On January 3, 2018, news broke that security flaws had been discovered in computer processor hardware and the low-level code that controls how these processors work.
TransNexus has added Secure Telephone Identity authentication and verification features to its call routing and fraud control products. By authenticating and verifying caller ID, this technology can provide relief from unwanted robocalls.
The FCC (Federal Communications Commission) recently unanimously passed a resolution that allows carriers to block caller ID-spoofed numbers.
TransNexus Proves Effectiveness of Caller Authentication Standards with the ATIS Robocalling Testbed Hosted by the Neustar Trust Lab
TransNexus, Inc. announced today it has completed testing with the ATIS Robocalling Testbed that proves the effectiveness of caller authentication standards.
Telecom fraud management systems that rely on CDR analysis can allow thousands of dollars in fraud losses even when they work properly. The problem is simple: CDR analysis is too slow.
Recently TransNexus spoke with Don Witt of the Channel Daily News, a Telecom Reseller publication, about the continuing problem of telephony fraud and how to prevent it. They discuss how TransNexus solutions, using SIP Analytics, prevent fraud before it happens.
Readers of this blog are familiar with the problem of robocalls and caller ID spoofing that are plaguing the country’s phone network. In the newest twist to caller ID spoofing, criminals are spoofing the toll free number of the FTC in order to trick recipients into thinking the call is coming from a trusted government number.
The FTC (Federal Trade Commission) has reported that it's already received 3.5 million complaints around robocalls in the first eight months of 2017.
On October 3, 2017, the Federal Communications Commission (FCC) issued a new Notice of Proposed Rule Making (NPRM) and Notice of Inquiry (NOI) for implementing nationwide number portability (NNP).
What is one of the scariest sounds in the business world? How about when you pick up your phone on a busy Monday morning and there is NO DIAL TONE!
Criminals using robocalls to target citizens is nothing new. The American public is overwhelmed every day with the number of robocalls they receive.
When the Los Angeles Times writes about STIR and SHAKEN, it starts to look like the proposed solutions for stopping spoofed robocalls are getting wider attention.
TransNexus has announced the launch of ClearIP, a cloud-based platform for advanced telecom management services.
If you or a family member are impacted by the flooding in Texas, please beware of criminals using robocalls to scam victims of the flood.
Kim France, a real estate agent in Hilton Head, was recently harassed by 700 robocalls a day for five days. As a real estate agent, France relies on her phone, and has to often answer calls from unknown numbers. But when she went to bed one night, she didn't realize she would wake up to a robocall nightmare.
Robocalls have, sadly, become a reality in our personal and business lives, and most of us have experienced the “you’ve won a free cruise” robocall. If you have received that robocall, you may be able to get a settlement check of up to $900!
There’s no shortage of stories around companies making the move to the cloud. There are many reasons why an organization would want to manage their IT in the cloud; however, the same can be said for managing solutions in house.
The FCC announced late last week that it’s levied a fine against a North Carolina man, Philip Roesel, owner of Best Insurance Contracts. Roesel allegedly made more than 21 million spoofed robocalls in a few months to vulnerable individuals in an effort to sell health insurance.
SIMbox fraud is alive and well. Some who are subject matter experts argue it is alive and is thriving because of corruption within some telecom companies.
The FCC just released 833 as the newest toll free prefix. They typically release a new toll free prefix to meet demand from the business community. It's been three years since the FCC has released a new toll free number. The first toll free prefix, 800, was released in 1967 and has been followed by five other numbers: 888, 866, 877, 855, and 844.
In late March 2017, the FCC adopted a Notice of Inquiry (NOI) and a Notice of Proposed Rulemaking (NPRM) to begin the process around blocking illegal robocalls by service providers, asking for feedback on emerging protocols, STIR and SHAKEN, as well as other options for blocking illegal robocalls before they are completed.
The FCC under the current administration, led by Chairman Ajit Pai, seems determined to reverse net neutrality. Net neutrality and its underlying provisions in the Open Internet Order of 2015 ensure that a handful of companies cannot influence what you search for and see online.
TransNexus has written extensively about the scourge of robocalls and fraud in the telecom network. Americans are reminded daily about the illegal, spoofed robocalls that are afflicting all of us.
The FCC recently asked for public comment around the advanced methods (STIR and SHAKEN) to eliminate robocalls. In response, 30 state attorneys general commented to show their support for the methods as well as the push by the FCC to actively address robocalls.
In May, comedian John Oliver urged viewers of his show to express their dislike around Chairman Ajit Pai’s proposed reversal of net neutrality by writing comments on the FCC’s Electronic Comment Filing System (ECFS). Many viewers did go to the site and expressed their views. However, the FCC comments site was quickly brought down by what looks like a Distributed Denial of Service (DDoS). The site was receiving 160 requests per second with traffic mainly coming from a cloud service, not IP addresses which would be common if the traffic was legitimate.
The FCC has proposed its largest ever fine, $120 million, on a man from Florida accused of making 96 million illegal, spoofed robocalls over only three months. Adrian Abramovich, from Miami, made the spoofed robocalls “selling” timeshares and vacations.
The Local Number Portability Administrator (LNPA) for the US, iconectiv, announced that industry testing has begun around the new Number Portability Administration Center (NPAC). The first phase of testing enables vendors, service providers, and service bureaus that access the NPAC to validate that their systems interact properly with the iconectiv NPAC.
New technology has been recently developed to deliver messages straight to a subscriber’s voicemail, without the phone ringing at all. All About the Message has developed this technology and has recently petitioned the FCC to declare these types of messages to be outside of the umbrella of the TCPA (Telephone Consumer Protection Act). The TCPA protects consumers from certain robocalls to their wireless phones, except for emergencies or in cases where the subscriber has pre-authorized the calls.
TransNexus is proud to celebrate twenty years of providing quality VoIP network management solutions. Since 1997 TransNexus has been a pioneer in fraud and operations support software for VoIP networks.
Everyone has accidently dialed a wrong number. Most of us, however, don’t become a victim of fraud when we misdial.
The Department of Defense (DoD)) is currently considering moving to commercial SIP and away from the DoD-specific version of SIP known as AS-SIP.
Alexa, Amazon’s voice-controlled device and operating system, is already proving very successful in the market place. Based on a recent patent filed May 2, 2017, it appears that Amazon is looking to take the Alexa software even further, specifically into the VoIP phone market.
Last week, a Florida district judge sentenced Ramon Batista, owner and operator of Arymyx, to 75 months in prison. Batista pled guilty to one count of conspiracy to defraud the US, one count of wire fraud, and one count of aggravated identity theft.
A new survey from Truecaller shows that nearly one in ten American adults (9%) has been victimized and lost money from a phone scam in the last twelve months. The average loss is $430 per person, up 56% from the last survey in 2015, costing Americans $9.5 billion!
Last week the FCC voted two to one to eliminate price caps for business data services (BDS) provided by phone companies like AT&T, Verizon, and CenturyLink.
In 2013, the FCC proposed relaxing rules that banned voice calls on cell phones from airplanes. After opening up the proposal to public comment, Chairman Wheeler was met with a wave of derision from consumers and travelers who wanted silence while they were on an airplane. The FCC under the previous administration noted that the ban was “technologically unfounded” and should be open to public comment.
When the FCC approved the Charter-Time Warner Cable merger in 2016, it required the new company to deploy high speed broadband to at least two million locations (residential and business) and at least half needed to be in areas already served by one other broadband provider.
The FCC (Federal Communications Commission) reports that American households receive 2.4 billion robocalls every month. Roger Anderson is acutely aware of that fact.
Ooma, a leading business and consumer communications provider, and TransNexus customer, has been recognized as providing the best business VoIP service by PCMag.
Today, the FCC Chairman, Ajit Pai, announced that on March 23, 2017, the FCC will hold an open meeting for the Commissioners vote on six proposals and orders. The first action will be a decision on how the FCC should address robocalls. Below are the chairman’s words.
The new FCC (Federal Communications Commission) Chairman, Ajit Pai has, until recently, been mostly quiet since being appointed by the new president. However, last week he gave a couple of television interviews on CNBC and Fox Business and he spoke this week at Mobile World Congress in Spain.
With the advent of the new administration, companies that collect student loan debt wasted no time in their attempt to roll back regulation protecting consumers. In 2016 the FCC (Federal Communications Commission) limited the number of calls these organizations can make to mobile phones to three a month and barred them from contacting the borrower’s friends, family, and colleagues. Eighteen consumer advocacy organizations filed a petition with the FCC that would oppose any revision to the current rules in place, arguing they protect consumers from undue harassment.
Atlanta, Georgia US: February 8, 2017 – TransNexus, a pioneering software development company specializing in applications for managing VoIP networks, announces the newest system integration partnership with TelcoBridges. TelcoBridges is a leading designer and manufacturer of carrier-grade VoIP media gateways and session border controllers (SBC) based in Canada. The combination of both vendor’s technologies brings enhanced fraud detection capabilities, local number portability, least-cost routing, and a wide range of QoS analytics to VoIP carriers around the globe.
There’s a new telephone scam that starts with just a couple of lines. You answer your phone with a hello. The person on the other line says, “can you hear me? Can you hear me now?” When you say yes, that’s all the scammer on the other end of the call needs.
Last week, the President announced the promotion of Ajit Pai from commissioner to Chairman of the FCC (Federal Communications Commission). Pai’s promotion immediately led those in the telecom industry to speculate what his promotion means for some of the FCC’s recent rulings including the 2015 Omnibus TCPA (Telephone Consumer Protection Act) Order.
Canada struggles, like the US and other countries, with mounting telephone fraud. Most countries, including Canada, are encouraging industry leaders to become engaged in solving telecom fraud issues, especially caller id spoofing, in order to protect their citizens.
Justin Ramsey and Aaron Michael Jones, who ran multiple telemarketing companies, have just settled with the FTC for more than $500,000. The individuals have agreed to never make another robocall, make a call to a number that is on the Do Not Call Registry, violate the Telemarketing Sales Rule (TSR), or help any other person in doing any of these things.
Not exactly the type of headline we like to see about our fair city. In just November of last year, there were nearly 50 billion robocalls to the 404 area code, according to the YouMail Robocall Index. Incredible!
IBM recently warned the technology industry that “cyber attacks using the VoIP protocol Session Initiation Protocol (SIP) have been growing this year accounting for over 51% of the security event activity analyzed in the last 12 months.”
The recently formed Robocall Strike Force by the FCC hopes telecom companies can help develop solutions to stop the bad guys. Legitimate telemarketers won’t call consumers if they’re on the Do Not Call List. But criminal spammers don’t care about the Do Not Call list and it’s pretty easy for them to evade any law enforcement.
India has one of the fastest growing telecommunications industry in the world. As such, it has become a ripe target for fraudsters, especially with the emergence of new technologies such as 3G and Voice over IP (VoIP).
The risk of traffic pumping, or International Revenue Sharing Fraud (IRSF), has been limited to business phone systems that get hacked and allow a fraudster to generate thousands of calls to high cost destinations. Residential customers, with a single phone line, have not been a risk for traffic pumping fraud. However, that has now changed with residential phone apps.
The Federal Communications Commission (FCC) reports that "month after month, unwanted robocalls and texts, both telemarketing and informational, top the list of consumer complaints received by the Commission." The Federal Trade Commission (FTC) reports that in the fourth quarter of 2012, robocall complaints exceeded over 200,000 per month.
Fraud scams perpetrated over the telephone are a growing menace. A common technique used by fraudsters is to spoof the calling number so the caller-ID field can be whatever the fraudster wants.
The August 2015 edition of CIO Review magazine includes feature coverage of "The 20 Most Promising Telecom Solution Providers". TransNexus is included in the list and is highlighted in an article entitled "Next Generation Telecom Fraud Detection".
Revenue sharing from international premium rate numbers is the powerful incentive that drives a global, billion dollar telecom fraud racket. The question we hear from victims is "who are these fraudsters and what is the incentive for international revenue sharing fraud (IRSF)?"
SIP trunking is appealing for several reasons, such as decreased costs, improved scalability, better disaster recovery options, and productivity benefit accessibility. A recent article highlights one area that companies underestimate the importance of and frequently overlook to be security. Threats of different types of telecom fraud loom over businesses who are also liable if a fraud attack were to breach their system.
Cyber attacks on several Canadian federal government websites last week are leading to increasing concerns in regards to the Canadian government’s plan to change many of its landlines to Voice over Internet (VoIP) phones.
If your business has become subjected to telecom fraud, it is important to file a complaint and register your fraud losses to the Internet Crime Complaint Center (IC3) online on their website.
A commission document released on June 18, 2015 discloses a proposal adoption by the Federal Communications Commission (FCC) to safeguard consumers against unwanted robocalls and spam texts.
Researchers at the University of Alabama at Birmingham (UAB) are working to improve the end-to-end VoIP security, thanks to a two-year, $150,000 grant from Cisco Systems.
Reports of toll fraud are on the rise. In this scheme, fraudsters hack into a company’s phone network and route calls to premium-rate numbers. It is also sometimes called international revenue sharing fraud (IRSF), because fraudsters arrange to take a share of the profits on a premium rate number in exchange for directing traffic to it.
TransNexus, an innovator in VoIP management solutions since 1997, has released Shield, a dynamic new tool for preventing telecom fraud attacks stemming from the use of premium rate numbers.
The Fourth Circuit Court of Appeals ruled in October that calls made to residential lines using an autodialer can violate the Telephone Consumer Protection Act (TCPA), but only if the residential line service charges for incoming calls.
In a filing with the FCC on November 12, 2014, CenturyLink asked the FCC to allow it to conduct a TDM-to-IP transition trial in Las Vegas.
One small doctor’s office in Maryland is reeling after receiving a $2 million phone bill.
What is an ANAC, and why is awareness of when users dial an ANAC an important fraud prevention technique?
We’re in the business of preventing telecom fraud, but too often we hear from people who are looking into fraud protection after losing a significant amount of money in an attack. For those who have been burned by telecom fraud, what are the best ways to prosecute a fraudster?
There is a new tool available on the black market that makes telecom fraud even easier. The tool, known as ‘TNT Instant Up,’ was developed by fraudsters to use in Telephony Denial of Service Attacks (TDoS).
On February 11, the FCC issued a declaratory ruling meant to clarify some issues in the ongoing debate surrounding intercarrier compensation.
Winter Storms have been bearing down on the US, which means many workers have been out of the office for snow days. Though it may be nice to get a day off, businesses should stay alert for fraudulent telecom activity. Fraudsters take advantage of holidays, weekends, and even snow storms to hide their hacking for as long as possible.
The recently released CentOS openssl-1.0.1e-30.el6_6.5.x86_64 file will cause the software license key for the OSPrey routing server to become invalid and STOP ROUTING CALLS.
It is no secret that business owners face vulnerability on their computer networks to attacks from hackers. One common oversight is that phone systems are just as open to attacks from hackers.
Cisco recently released their annual security report. While the focus of the Cisco report is on data security, the principles described in the report also apply to managing telecom fraud.
TransNexus announced today that TMC, a global, integrated media company, has named NexOSSas a recipient of the 2015 INTERNET TELEPHONY Product of the Year Award.
ATLANTA, GA – January 6, 2015 – TransNexus is proud to announce the upcoming release of NexOSS-FC.
VoIP has become so ubiquitous a solution that even banks are beginning to use it. But there are criminals to match every new technology out there, and VoIP has not been an exception.
The IP-Network to Network Interface (NNI) Joint Task Force is a cooperative effort between the Alliance for Telecommunications Industry Solutions (ATIS) and the SIP Forum. This task force has completed a proposed profile for SIP-based Service Provider to Service Provider IP Interconnection.
The New York Times has published an article describing the threat of telecom traffic pumping fraud and the risk it poses for small businesses. TransNexus is cited in the article.
Yesterday, the FCC revealed the details ofa major 911 outage that occurred last April.
TransNexus software applications are not directly vulnerable to the recently announced "ShellShock" Linux Bash vulnerability, but the CentOS and RedHatLinux operating systems that host TransNexus applications are vulnerable.
In telecom networks, “spoofing” is the practice of misrepresenting the caller ID of a phone call. It is a practice often used by criminals trying to commit telecom fraud.
On September 4, 2014, the seven person architectural firm, Foreman Seeley Fountain Inc], or FSF,filed a complaint with the Federal Communications Commission against its former telephone service provider, TW Telecom.
Traffic pumping fraud to international numbers is driving more carriers to block international calling. This telecom fraud, also known as International Revenue Sharing Fraud (IRSF) occurs when a fraudster hacks a victim’s phone system and then makes thousands of calls to an international premium rate number. The cost of telecom fraud for the victim can exceed $100,000.
Small companies beware: telephone traffic pumping fraud has no mercy, especially for the little guys.
Building on commitments made by America’s four largest wireless carriers to provide text-to-911 service, the FCC adopted rules to ensure that all remaining wireless carriers and certain IP-based text application providers are prepared to support text-to-911 by the end of the year.
Surveys of consumer and business voice communication trends have shown a steady decline in wireline usage, replaced by Voice over Internet Protocol (VoIP) subscriptions and wireless adoption.
While 911 call centers have been struggling to stay on top of new communications technologies for some time now, it seems they are getting closer to bridging the gap—thanks to communities working together in order to make sure first responders have what they need.
A new report from TransNexus examines the schemes being used for telecom fraud today and industry best practices for prevention.
On July 23, the FCC released its E-rate Modernization Order and Further Notice of Proposed Rulemaking (FNPRM), which adopts a number of the proposals made in its NPRM and begins the process of re-focusing the E-rate program on providing the necessary support to ensure the nation's schools and libraries have affordable access to high-speed broadband.
The FCC wants rate-of-return telecom companies to transition to model-based support as today’s voice-focused high-cost Universal Service Fund is phased out and converted to a broadband-focused Connect America Fund program.
A new report from TransNexus examines the growing problem of telecom fraud stemming from the use of premium rate numbers.
How important is your business phone? Do you need access to your voicemail, business contacts and even the number when you’re out on the road? While you may be able to have your calls transferred to your mobile device, can you also have the number sent there as well so you make a call as if you are sitting at your desk?
IP communications and SIP have revolutionized the way that businesses communicate with their customers and each other, but very few people understand what these technologies really do.
Level3 Communications wants the FCC to impose interconnection requirements on internet service providers—a move the company said is necessary to “fully protect the free and open Internet.”
Often we talk about unified communications and business VoIP as if they were two separate products. And they are, to a point.
The open-source cryptographic library OpenSSL showed the world that it had a major vulnerability this past April. Known as the “Heartbleed” bug, OpenSSL proved itself vulnerable to hackers who wished to exploit its process that functioned to keep two computers in communication with one another.
Recently, current and former Members of Congress, consumer advocates and CEOs from the nation's leading competitive broadband providers joined with customers to discuss the enduring benefits of competition forged in the landmark 1996 Telecom Act.
It’s becoming fairly common knowledge that switching over to a VoIP system for your phone calls can save significant money, whether it’s at the office or at home. But now the technology has taken another leap forward, yet not many people are aware of it. VoIP has gone mobile.
SIP trunking, a VoIP and streaming media service by which providers can deliver telephone services and unified communications to customers, has been touted as a reliable, scalable, and very dynamic alternative to running PRIs through a PSTN network.
At its June 13 open meeting, the FCC's Wireline Competition Bureau made a presentation on the status of the AT&T service-based experiments in the Technology Transitions proceeding.
A recent article in PrintWeek caught our attention for its story about a small printing company’s phone system getting hacked.
Software defined networking (SDN), network function virtualization (NFV), and the PSTN sunset were hot topics at the Big Telecom Event in Chicago this week.
A recent study, conducted by Neural Technologies, has determined that subscription/identity fraud is still the leading method for users attempting to fraudulently gain access to services.
Business VoIP is woefully misunderstood for its voice quality in that too many are under the impression that it is inferior.
IP communications has gone from a radical, forward-thinking technology that improved communications performance and cut costs, to a mainstream technology that is being adopted at a rapid clip and is one of the megatrends of the past 15 years.
Today, IP communications can allow companies to save money on their bottom line, allowing room in the budget to expand when necessary, and if they prefer to operate out of one office, reaching clients across the globe is easy.
A new report from telecommunications and DNS service provider Neustar indicates a growing trend of using DDoS as a cover for malware attacks resulting in significant monetary losses for not only enterprises, but consumers as well.
TransNexus, a developer of VoIP network management software, today announced that it has achieved Gold Partner status in Oracle PartnerNetwork
VoIP has become so ubiquitous a solution that even banks are beginning to use it. But there are criminals to match every new technology out there, and VoIP has not been an exception.
Unified communications, VoIP and the cloud tend to mingle with each other quite a bit in technology, but there are some misconceptions when it comes to these communication tools, particularly when it comes to VoIP and unified communications (UC).
TransNexus is headquartered in Atlanta, Georgia – a city that made the news earlier this year for an epic traffic jam caused by mid-day snow and ice. The snow hit the city unexpectedly, causing everyone to leave their offices for home at about the same time. This Atlanta worker can tell you that it was not pretty.
TransNexus is pleased to announce that we now support both Taqua and Sansay brand switches.
As virtual PBX and IP communications become more widespread, businesses as well as the general public are becoming more aware of its many benefits. Some of these benefits mean that people who need immediate medical attention or a quick response from firefighters or police officers can now get it, thanks to the technology.
The world is not a safe place, and anyone who watches the news or checks Facebook is aware that recently we’ve all become a little less safe thanks to the Heartbleed secure socket layer flaw that compromises internet security.
Over-the-top (OTT) VoIP services such as WhatsApp and Viber have become popular during the last few years. This popularity of OTT apps is fueled in part by the availability of low-cost smartphones and the emergence of cheap data plans.
The move to migrate communications to an all-IP network from a legacy system is one of the most talked about debates in telecom these days.
News headlines can worry a lot of parents about the safety of their children while they are at school.
Voice-over-IP (VoIP) is a growing telecom segment, and a plethora of VoIP providers and resellers have cropped up to service businesses and consumers that are looking to lower their phone costs and provide added mobility to their calling.
When companies are looking to establish a business phone system, they now have many more options than simply going with a landline telephone provider.
Today, the FCC is in the process of making one of the largest technological transformations that has taken place in the U.S., ending the analog telephone network.
AT&T’s plans for TDM-to-IP transition trials are clashing with efforts to de-regulate telecom – an initiative the company also has been championing.
TransNexus today announced that Vocal IP Networx has chosen the TransNexus SDReporter solution to provide telecom fraud detection to complement their BroadWorks based network.
The latest issue to face the telecom industry is the rural call completion order the FCC released last year. The FCC initiated the rural call completion order to address concerns such as attempts not reaching the called party, unusually long delays in call setup and poor quality once connected.
According to the Federal Trade Commission, telecom fraud accounted for 34% of fraud complaints in 2012, up from 20% in 2010. These numbers continue to grow, as new technology has led to an onslaught of new telecom fraud tactics.The latest schemes are difficult to tract and investigate because of their frequency, their layers of anonymity, and their global nature.
Presicent Worldwide needed Least Cost Routing and telecom fraud prevention. They chose NexOSS, which does both. Result: “NexOSS helped us tighten up our network and route calls more safely and efficiently. There’s no negative to the NexOSS platform. We’re very happy with our results.”
TransNexus, top developer of VoIP network management software, today announced that Bee Global, an Over the Top (OTT) VoIP application that enables free calling between smart phones, and cheap calls to the PSTN, has chosen the TransNexus NexOSS solution to provide dynamic least cost routing.
Voice over Internet Protocol (VoIP) is a methodology and group of technologies that have been designed for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.
When the world’s enterprises began sending and receiving important information via the Internet, their move to the future was soon followed by a plague of hackers seeking their valuable contents.
U.S. Senator Tim Johnson (D-S.D.) introduced a bill last week aimed at preventing long-distance carriers from blocking or disrupting calls to rural areas.
TransNexus today announced that Spirit Communications has chosen the TransNexus NexOSS and SDReporter solutions to provide dynamic least cost routing and telecom fraud detection to complement their BroadWorks-based network.
A quick Google search of the Telephone Consumer Protection Act of 1991 (TCPA) will certainly yield a lot of court cases.
Voice communications is changing rapidly, and in your research you’ve probably run across something called SIP trunking. What is SIP trunking and why do you care?
In the wake of a judge explaining the FCC’s ability to regulate broadband services for Net neutrality, many have feared that over-the-top (OTT) services, like VoIP services, would be throttled by ISPs looking to beat down competition. But now the FCC is proposing new measures to prevent such things happening.
ATIS and the SIP Forum today announced the formation of a Joint Task Force to fully specify an IP communications network-to-network interface (NNI) between North American service providers.
The revenue-cost model is broken for the traditional communications services operator. Something needs to change.
The telecommunications industry is in the midst of a big transition as it moves from the legacy public switched telephone network (PSTN) to newer session-initiation protocol (SIP) and IP-based communication.
At its open meeting, the FCC approved an order that sets the stage for technology transition experiments.
Although in many ways VoIP looks and feels like the plain old telephone service of old, according the U.S. government, it is quite different.
Toll free traffic pumping is a growing problem in the telecom industry. What is it, and how does it work?
TransNexus announced today that TMC, a global, integrated media company, has named NexOSS 6 as a recipient of a 2014 INTERNET TELEPHONY Product of the Year Award.
The IP transition has been a primary focus for the Federal Communications Commission (FCC), as well as telecommunications providers seeking the benefits of moving all subscribers to new platforms. A recent announcement by AT&T to advance this initiative should have been met with fanfare, but was instead met with an announcement of investigation by the FCC.
By now, most businesses are aware of Voice over Internet Protocol (VoIP) phone systems, which route calls through the Internet for more efficient communication than landlines provide. The result is hyper-efficient phone calls that include more free features, for a lower monthly price.
The buzz in the telecommunications space is that VoIP is the end-all for seamless communications, but the hype surrounding the benefits often overshadows some real threats that exist.
The old public switched telephone network (PSTN) has served its purpose for the past 125 years, and it is now time to adopt the next technology and retire this dinosaur; but moving forward when the government is involved is easier said than done.
Targeted Internet traffic misdirection is a growing concern, says security monitoring firm Renesys. Specifically, an increasing amount of information is being hijacked by man-in-the-middle attacks.
When it comes to regulation, there’s usually a lot to be gained—and lost. That’s the scene with the debate over potential new Federal Communications Commission rules for voice-over-IP (VoIP).
NexOSS V6.1 is now available and includes the following enhancements.
On December 3rd, I attended the New Telecoms Summit in New York City. Much of the discussion was focused on policy changes needed to hasten the transition from traditional telephone technology to an all IP network.
Research study findings from Eastern Management predict that toll traffic on SIP trunks will hit 42 percent by 2018. Involving more than 17,000 IT managers in seven world regions and 22 vertical markets, the study “SIP Market Size Analysis and Forecast 2013 – 2018” shows that more than 80 percent of companies with 20,000 employees say SIP is very important to their business. This is also true of companies with 100 to 500 employees.
According to the Global State of Information Security Survey from PricewaterhouseCoopers, UK businesses have increased the amount they are spending on protecting themselves from cyber-attacks and are putting in place better protection from risks to their cybersecurity.
The benefits surrounding Voice over IP are so well known that companies throughout the world continue to migrate to the platform where voice and data connections share the same network. Those benefits are easily extended to the mobile user as well, driving the demand for mobile VoIP. The challenge for the market is that this growing demand is eating into mobile operator revenues.
Getting a Location Routing Number can be complicated. Here are some tips.
Since the Communications Act of 1934, only telephone carriers who had a state certification and/or an FCC license could directly access local numbers. However, these regulations have not translated into the world of IP.
Recently, Google has brought in a new feature to its Hangouts app: VoIP calling capability.
On October 28, 2013, the FCC adopted a Report and Order and a Further Notice of Proposed Rulemaking (FNPRM) in its proceeding designed to develop rules to address problems in the completion of long-distance calls to rural end user customers.
Rapid technology growth is ensuring financial safety, but fraudsters too are coming up with new techniques to exploit the loopholes in the system. Recent example is “Vishing”, a new form of financial fraud which is gaining popularity these days.
The Wireless Internet Service Providers Association (WISPA), a membership organization that promotes the development, advancement and unity of the wireless ISP industry, has been stepping up its lobbying and advocacy efforts for its membership, a collection of operators that began by bringing broadband to rural and underserved areas where true broadband wasn’t available from the local copper-based telco.
Recent press surrounding the Federal Communications Commission’s 2012 declaratory ruling that carriers who deliberately fail to complete calls to rural areas could face cease and desist orders, forfeiture, license revocations and fines of up to $1.5 million has led to much discussion of Least Cost Routing and its role in rural call completion.
Recent press surrounding the Federal Communications Commission’s 2012 declaratory ruling that carriers who deliberately fail to complete calls to rural areas could face cease and desist orders, forfeiture, license revocations and fines of up to $1.5 million has led to much discussion of Least Cost Routing and its role in rural call completion.
TransNexus announced today the latest release of its industry leading VoIP Routing, Operations, and Billing Support System, NexOSS 6.0.
One of the challenges that security teams face is the problem of measuring, evaluating and mitigating risk in the enterprise. A study sponsored by Tripwire and conducted by the Ponemon institute found that while 81% of security and risk professionals in the U.S. said their organizations have a significant commitment to risk-based security management, fewer than 30% actually have a formal security risk management strategy that is applied consistently across the enterprise.
The CFCA today announced the results of a comprehensive worldwide communications industry fraud loss survey.
A new white paper from TransNexus is a primer on how to improve quality of service and network efficiency for those looking to expand their VoIP service by acquiring new networks.
CDRAnalyzer, an established feature in NexOSS, is now available as a stand-alone product for SDReporter users.
This release includes important new credit control triggers, which help identify wholesale SIP trunking fraud.
In a market where consumers are increasingly mobile, the demand for VoIP is changing the industry landscape. Consumers are no longer bound by minute plans or data ceilings and without a strategy to push out a new revenue model, the operator without mobile VoIP may be facing a bleak future.
TransNexus today announced that Finger Lakes Technologies Group has chosen NexOSS to provide dynamic least cost routing and telecom fraud prevention to complement their Oracle Acme Packet based network.
TransNexus announced today the release of CDRAnalyzer, a simple, high performance application for archiving and locating Call Detail Records (CDRs).
TransNexus today announced that PingTone, a provider of innovative telecommunications and unified communications solutions, has chosen the TransNexus NexOSS solution to provide least cost routing and telecom fraud detection.
Eric Bash, associate chief of the FCC's Enforcement Bureau, testifying at a hearing of the Senate Commerce, Science, and Transportation Subcommittee on Consumer Protection, Product Safety, and Insurance, recently brought up the problem of VoIP enabled robocalls. “The prevalence of robocalls is on the rise,” Bash said in his testimony. “This is because of the ready availability and low cost of phone service and the software needed to make the calls, as well as the ability of callers to spoof the number from which they are calling in an attempt to disguise who they are and avoid detection.
The unified communications market continues to get more than its fair share of research attention. Two recent reports paint a healthy future for the segment for the next five years.
TransNexus, the leaders in VoIP network management solutions, announced today that it will be showcasing its NexOSS Least Cost Routing and Telecom Fraud Detection product at the CCA Annual Convention, to be held September 15-18, 2013 at the Cosmopolitan Las Vegas.
A new report from TransNexus examines the recent explosion of growth in enterprise telecommunication networks, as well as the strategies innovative companies are using to manage them.
Telecom fraud remains a significant problem for any business that relies on phone systems. Fraudsters continue to develop new and difficult to deter schemes. One of the latest to hit the news is Toll Free Telecom Fraud. Toll Free fraud can affect any business that uses a toll free number. For many businesses, this type of fraud is impossible to completely stop. Let’s take a look at how it works.
Businesses that implement VOIP (voice over IP) telephony systems in their local area networks must ensure they have effective protection against the growing incidences of VOIP hacking. Most people are not aware of the dangers of VOIP, and many others only become aware of the risks when the damage has already been done.
TransNexus announced today that it will be showcasing its NexOSS Least Cost Routing and Telecom Fraud Detection product at ITEXPO Las Vegas, to be held August 27-29, 2013 at the Mandalay Bay.
The Unified Communications market is projected to grow at a rate of just over 4 percent through 2016, according to a new report from TechNavio. "One of the key factors contributing to this market growth is the increasing requirement for affordable enterprise communication medium in the country," according to authors of the report, Telecommunication Services Industry: Enterprise Unified Communication Market. "The market has also been witnessing a rising demand for enterprise mobility. However, the requirement for high initial investment for unified communication systems could pose a challenge to the growth of this market." The TechNavio study looks at the enterprise unified communications market in the United States and the prospects for growth in this sector for the next three years.
The Federal Trade Commission has settled with a set of defendants associated with the A+ Financial Center scheme. They were charged in last year’s joint law enforcement sweep against five companies that made millions of illegal pre-recorded robocalls claiming to be from “Rachel” and “Cardholder Services” and pitching credit card interest rate reduction services.
We keep waiting for SIP trunking to become simple to adopt and implement—at which point, it will presumably no longer be a hot topic. That keeps not happening.
In this release, Credit Control reports with triggers have been added for customer accounts identified by static IP address. This new feature is especially beneficial for Acme Packet SBC users offering SIP trunking services to enterprise customers.
In a post on the VoIP Innovations blog, Natalie DeCario discusses VoIP Enhanced 911 (E911) service and its impact on VoIP service providers.
Every major IP communications vendor has a UC section on its website with hyperbolic statements like, “UC is changing the way you do business.” or “Reinvent your productivity capacity with UC!” Given the seeming proliferation of this term, potential UC customers rarely bring up the term.
Perfect weather after days of rain, and the picturesque course at Trump National made for a beautiful round of golf for the attendees of the 2013 Ronald McDonald House Celebrity Golf Tournament.
A drill-down examination of the telecommunications space could easily uncover information regarding the softswitch. You may hear all about the benefits and why you want to have one in place, but that doesn’t help to explain what a softswitch is, or what it means to your organization.
Initially, the ubiquitous Internet was used only for data communications between nodes on the network using the Internet Protocol or IP, the communications protocol for relaying datagrams across network boundaries. With advances in digital communications, analog calls can now be converted into packets of data that can travel like any other type of data, such as e-mail, over the public Internet and/or any private IP network, resulting in voice over IP (VoIP).
Once upon a time, a sip meant taking a quick drink. Today, SIP means something totally different and it’s delivering value in the business environment.
There are real challenges of interoperation among multivendor gear. This is part of the reason why SIP Trunking hasn’t been more widely adopted.
Telecom fraud remains a significant problem for any business that relies on phone systems. Fraudsters continue to develop new and difficult to deter schemes. One of the latest to hit the news is Toll Free Telecom Fraud. Toll Free fraud can affect any business that uses a toll free number. For many businesses, this type of fraud is impossible to completely stop.
As long as there have been telephones and charges for conducting calls, there has been toll fraud.
This version introduces new Credit Control reports that will benefit BroadWorks users.
TransNexus has recently added a hot potato routing feature to our popular NexOSS product. Essentially the new feature adds intelligent egress selection to our least cost routing, allowing companies to choose destinations based both on cost and proximity to the calling source.
A ReMax real estate office in St. Peters is reeling from a $600,000 phone bill.
I recently had a conversation with a fellow who is in the business of pumping traffic to rural destinations in the US with high terminating access fees. He claimed that his business generates 100 million minutes of traffic each month and that his terminating CLEC partnersshare an average of $0.002 for each minute of traffic he sends to them. That is $200,000 of gross revenue per month.
When Congress last overhauled U.S. telecom rules -- the 1996 Telecommunications Act -- many of today's technologies were closer to science fiction than fact. Speaking at the Media Institute, Craig Silliman, Verizon's senior vice president of public policy and government relations, called for a proactive, flexible policy approach to replace outdated regulations.
The FCC's Technology Transitions Policy Task Force (Task Force) authorized a 6-month trial to examine providing interconnected VoIP providers direct access to telephone numbers. The goal is to speed the transition away from TDM to all-IP infrastructure while ensuring resiliency.
Ever wondered how traffic pumpers create so much bogus telecomtraffic without getting shutdown? They perform this scam by by gettingsuckers to do the traffic pumping for them.
Today’s VoIP-enabled phones combine the features of a computer and a network router in one. The power and accessibility of these phones can be turned against them.
TransNexus is pleased to announce that intelligent LCR routing can now be deployed at the edge of your Metaswitch network.
CDRAnalyzer has been expanded to create Traffic, Billing and Billing Analysis reports from archived rated CDRs without impacting the performance of the NexOSS production database.
TransNexus is pleased to announce that SDReporter is now available for the IBM PureFlex System.
A new white paper from TransNexus describes a recently discovered security flaw in a widely used Analog Telephone Adaptor (ATA) that enables hackers to secretly steal the SIP credentials of hundreds of thousands of SIP subscribers. The credentials can then be resold to enable wholesale telecom fraud.
The truth is you just aren’t a phone company until you’ve had a run-in with telecom fraud. Understanding the threat is the first step in preventing fraud.
The FCC has adopted a Notice of Proposed Rulemaking (NPRM) on direct access to telephone numbers for VoIP providers, a process that they say will streamline the process to roll out services.
There are now more than 2 trillion (2 x 1012) objects stored in Amazon S3 and that the service is regularly peaking at over 1.1 million requests per second.
False Answer Supervision is yet another type of VoIP fraud scenario. It basically refers to a situation where the answer signal is deliberately modified to charge for non-conversational time.
We’ve been hearing the term Wangiri fraud thrown around lately, and thought it merited a post to explain what exactly it means.
Remember when endpoints were called phones? Now endpoints can be hard or soft; SIP, proprietary, or analog; video-enabled; HD-audio capable; wireless (DECT or Wi-Fi); or desktop or mobile (iOS, Android, BB, Win8, tablet, or smartphone).
Yesterday we discussed how criminals go about creating a TDoS attack. Today, let’s look at some enterprise best practices for dealing with this type of attack.
VoIP security expert, Marc Collier, has written an excellent article on the basics of today's TDoS attacks on his blog.
Things have been heating up between the Federal Communications Commission (FCC) and the VoIP industry lately.
This release offers the major improvement that all fraud detection is based on fraud scores, rather than just call statistics.
As hype surrounding Web RTC continues to grow, many have begun to notice similarities between web-based real time communications (WebRTC) and session initiation protocol (SIP). Both offer collaboration and communication simply and over the internet. So, just what is the difference?
Unified communications presents unique security challenges because it brings together disparate technologies. Using VoIP, video, chat and presence together has proven to provide productivity gains for businesses, but also presents security risks.
The benefits of Voice over IP (VoIP) and unified communications (UC) start to lose their luster when the basics – such as being able to hear the other party during a voice call – don’t perform reliably.
As hype surrounding Web RTC continues to grow, many have begun to notice similarities between web-based real time communications (WebRTC) and session initiation protocol (SIP). Both offer collaboration and communication simply and over the internet. So, just what is the difference?
You can live in a single vendor world, where your solution options and pricing are determined entirely by one vendor, or not. Interoperation is the key to the “or not” option.
Acme Packet announced that the company has achieved Microsoft Gold Certified Partner status in the Microsoft Partner Program, and its Net-Net Enterprise Session Director has been fully qualified by Microsoft under the Unified Communications Open Interoperability Program (UCOIP) to ensure interoperability with Microsoft Lync 2013.
As VoIP call centers increase in popularity all over the world due to the key benefits they can offer companies big and small including reduced costs, increased efficiency and better collaboration and communication overall, they are now being targeted by cyber masterminds looking to access confidential information.
CDRAnalyzer in a new feature introduced in this NexOSS release. This powerful new feature exports Rated CDRs from the NexOSS database to an external database for long term archiving and analysis.
This release of NexOSS includes a new Blacklisted Numbers fraud detection feature.
You’ve seen us write about revenue sharing VoIP fraudon this blog before. But here’s a new application we’ve been hearing about: money laundering.
Reports are now surfacing that criminals have learned to take advantage of VoIP fraud schemes to launder money across international borders. Money laundering is the process of concealing the source of money obtained by illicit means.
Signs are pointing to business markets making the switch from legacy public switch telephone networks (PSTN) to IP phone services. The FCC recently reported that between 2008 and 2011, VoIP subscriptions increased at a compound annual growth rate of 19%, while switched acccess lines declined nearly 9% per year.
Acme Packet announced recently that the Net-Net 6300 has been named a recipient of the 2012 Internet Telephony Product of the Year Award by TMC, a global, integrated media company.
Even AT&T sees the future is dim for the traditional telephone network.
I met an interesting fellow last week at the IT-Expo in Miami. He’s a traffic pumper and operates a successful business exploiting the price arbitrages created by policies of the Federal Communications Commission (FCC).
It’s that time of year again. We’ve rounded up the hottest VoIP trends that should be on your radar this year. Look for new technologies and old technologies to be applied in new ways in the coming months. This year we’ll see the role VoIP technology plays evolve into a more unified communication system. Companies who stand to integrate a VoIP strategy into traditional telecommunications will see real returns this year.
TransNexus announced today that it will be showcasing its industry leading VoIP routing and reporting solutions at ITEXPO Miami 2013, to be held January 29-February 1, 2013, at the Miami Beach Convention Center.
Acme Packet's security expert, Patrick McNeil, has recently posted an interesting article addressing E-SBC Security Architecture Considerations for SIP Trunking.
Jim Dalton, president of TransNexus, recently sat down for an exclusive interview with TMCnet about technology trends affecting the market today and in the near future.
Ensuring your VoIP infrastructure is providing quality service is vital. In fact, its worth a New Year’s Resolution. When dealing with customer expectations, failure is the last option you want, but why is it that only 52 percent of IT support teams successfully support IP voice platforms?
The FBI’s Internet Crime Complaint Center (IC3) is reporting a recent uptick in Telephony Denial of Services (TDoS) fraud. Perpetrators are suspected of using hacked VoIP automated dialing programs to overwhelm the phone lines of their victims, harassing them with thousands of calls.
In the communications space, there’s a lot of talk about convergence ROI. Moving to a converged network can substantially reduce an organization’s total cost of ownership (TCO) for its network, as well as reduce the ongoing costs required to maintain and upgrade the network.
Fraudsters are continuing to exploit high termination rates for certain countries by inflating traffic and sharing revenue. Number aggregator websites openly advertise revenue share opportunities in many countries, inviting visitors to sign up immediately.
Forbes magazine is reporting on the latest telecom fraud threat in the VoIP community.
The following is a nice summary of local telephone routing written by Mary Lou Carey at BackUP Telecom Consulting.
In the wake of Hurricane Sandy, a disaster with losses topping $50 billion, we are seeing not only the expected economic and financial consequences, but also an uptick in telecom fraud.
BroadSoft, Inc. recently announced the addition of Rich Communications Services (RCS) to its BroadCloud Software-as-a-Service (SaaS) platform, providing mobile operators with managed service delivery of converged messaging, presence, media sharing, voice and video calling.
How much is the iPhone 5 affecting tech infrastructure businesses?
VoIP has opened a multitude of possibilities for companies, both in service and cost. But it has also enticed predatory activity that results in VoIP fraud.
This release includes a new feature for determining a fraud score for each call. The score is determined by destination dial code and greatly simplifies the process of provisioning fraud detection triggers.
Acme Packet recently announced that Gartner has positioned them in the Leaders Quadrant of the Magic Quadrant for Session Border Controllers.
RCR Wireless news recently published a reader editorial on how to control Quality of Service (QoS) in least cost routing.
Sometimes security risk is obvious. The need for hacker detection and prevention is obvious when it comes to online ordering. Sometimes the risk is present but more subtle, however. Such is the case with telecom fraud.
TransNexus and BroadSoft have teamed on offering Unified Communications over their Internet Protocol network.
TransNexus has recently released a new white paper, An Introduction to VoIP Fraud.
VoIP is about convergence, saving money and resources. However, these types of systems also create more inroads for attack.
TransNexus today announced that SyncGlobal Telecom has chosen the TransNexus NexOSS solution to provide dynamic least cost and quality of service routing and rating to complement their Metaswitch based network.
As businesses throughout the global market continue to adopt new innovations in communications technology, several of them are measuring the clear benefits of moving to the cloud. Still others are hanging out in the wait-and-see stage, hoping to learn from the pitfalls and successes of those who blazed the trail.
Pipline Magazine has recently published an article asking “Where is the all-IP network?”
VoIP fraud is a significant and growing problem in the telecommunications industry. Because fraudsters often attack during weekends, fraud events often go undetected for many hours.
In 2007, TransNexus published a performance study of SIP Express Router(SER) compared to OpenSER. Kamailio is a fork from the OpenSER project, which was a fork of the SER project. Since then Kamailio, and SER have merged to create the SIP Router project.
According to a recent article in Forbes, California is now set to join 24 other states in prohibiting its Public Utilities Commission from imposing new regulations on VoIP and other Internet services without explicit authority from the state legislature.
The major new feature added to this release is charts.
According to a recent blog post from Acme Packet, the first immutable law of IP communications is, trust no one.
Voice-over-Internet-Protocol can offer great cost savings for many companies, but some unscrupulous individuals have decided that the best way to save on their telephony bills is to steal from others. Fortunately, at least two criminals who committed high-volume VoIP fraud were recently sentenced to do hard time behind bars.
Acme Packet has recently released a list of six trends that will affect the future of IP communications. The evolution from TDM to IP interactive communications introduces significantly more communication service choices and application possibilities. These trends are:
TransNexus is excited to announce we have become a member of the Communication Fraud Control Association (CFCA).
A new report from Pindrop Security’s State of Phone Fraud Report, 1H 2012 brings to light several new startling statistics concerning the growing prevalence of fraud in the communications industry:
This release of NexOSS has several important new fraud detection features.
With the help of TransNexus, Ooma has recently reduced their routing costs by 10% with LRN route optimization.
On June 15, 2012, Jim Cicconi, Senior Executive Vice President-External and Legislative Affairs with AT&T, gave a thoughtful talk about telecom regulation and how it is thwarting development of the innovative benefits of an all-IP network.
By Micah Singer, CEO, VoIP Logic
Acme Packet, a session border control products provider and TransNexus partner, has recently unveiled a series of products for its session delivery network portfolio at its annual Interconnect customer conference.
Telecom fraud detection by calling number has been added. This feature is important for detecting fraud from individual subscribers who have a dynamic IP address, or for systems like Broadworks that do not report IP addresses in CDRs.
In a recent article Hamid Qayyum, VP MSO Sales at Metaswitch, discusses how SIP trunking is now the fastest-growing area of the VoIP marketplace, and how all indications point to sustained growth for the foreseeable future, making it a very attractive business for both telco and cable providers.
What steps should businesses take to protect themselves from fraudulent activity and hacking as they receive their communications services from cloud and hosted providers?
This release features routing for Direct Peering as a complement to Dynamic Least Cost and Quality of Service routing. Direct Peering is designed for a federation of VoIP networks that want end to end IP transport between their subscribers.
PCWorld recently interviewed Broadsoft CFO, James Tholen.
A new report by Jupiter Research has estimated that VoIP operators may lose up to $300 billion to fraud and billing error by 2016. That would account for nearly a quarter of the revenues for VoIP operators today.
Acme Packet held its annual customer conference, Acme Packet Interconnect, last week in Miami. Having attended the last four events, Jim Dalton reports that this was the largest and most impressive so far.
With the help of TransNexus, FUSE 3 Communications has recently expanded their business to include a hosted PBX offering. FUSE 3 had a goal of providing complete hosted technology infrastructure for their customers, and one area of technology that they were lacking was telephony.
This release provides a really convenient way to quickly locate call detail records (CDRs).
A salesman at a Bangor, Maine auto parts store arrived at the office on the morning of February 22 and noticed that all 11 of the company’s phone lines were lit up. As he was the first to arrive, and the only person in the building, he knew that something was amiss.
A new survey, released by inetwork and ATLANTIC-ACM, is making big claims about communications technology.
As worldwide growth in the use of session-based IP communications continues to grow, Acme Packet is looking to the future of the session border controller (SBC) market.
The discussion about high definition (HD) voice services enabled by IP networks has been going on for years.
Here’s an interesting story about a recent PBX hacking incident in Maine.
This month TransNexus is proud to be celebrating 15 years of business, providing quality VoIP network management solutions.
This release includes detailed monitoring of server memory and hard disk resources with automated alerts.
TransNexus, the leader in VoIP network management software, recently helped the Canadian telecom company, RapidTel, reduce their operating costs by over fifty percent.
It’s no secret that the nation’s rural areas are continuously plagued by dead zones and lack of broadband connectivity. But, as more and more telcos increasingly lose customers to frustrations with network connectivity, other call-related issues—namely call routing and termination—are also coming to the forefront.
The dates for this year’s Acme Packet Interconnect were announced this week. Everyone at TransNexus is looking forward to attending this year’s event.
Telecom fraud detection has become a major issue for carriers offering SIP trunking services to enterprise customers.
January 30, 2012 – Atlanta, GA - TransNexus announced today the latest release of its industry leading VoIP Least Cost Routing software, NexOSS 5.0. The software now includes an innovative new telecom fraud detection module, which tackles the growing problem of traffic-pumping fraud in the VoIP industry.
Much like many of the Patriots’ and Giants’ die-hard fans wouldn’t miss this year’s Super Bowl XLVI for the world, TransNexus won’t be skipping out on next week’s communications conference ITEXPO East 2012, where the telecom software solution company will be making its appearance for the 14th consecutive year.
This release enables lights-out management of telecom fraud control and network issues.
Phone companies know about fraud, from the old Captain Crunch whistle hack -- people discovered that the whistles given away free in Captain Crunch cereal boxes were the same frequency, exactly 2600 hertz, as the phone company used to authorize open lines for calls -- and VoIP is a victim of it.
As advancements continue to be made in today’s telephone systems, and mobility carries on as one of the premier methods in which we communicate, the importance of call quality and affordable communication remains at the forefront.
TransNexus is proud to announce that we have achieved premier software partner status with Intel for 2012. We believe our new partner status with Intel is a testament to superior interoperability between TransNexus and Intel products.
Consumer awareness is growing, but a Canadian agency is finding that it’s not enough to keep subscribers happy. Complaints regarding wireless and land-based phone services more than doubled in 2010-2011, and most of the complaints covered billing errors or contract disputes between wireless providers and the customer, indicating a need for an enhanced focus on least cost routing.
In all the talk surrounding least cost routing, number portability, network connections and seamless transfers, it can be easy to get wrapped up in the technology descriptions without truly understanding the technology. This Neustar blog attempts to better explain the Number Portability Administration Center (NPAC) and what it can do for the average person.
This release features a greatly-improved Traffic Analyzer with many new reports for analyzing and troubleshooting.
The release includes advanced mediation features, which enable the mediation of CDRs for Inter-Working Function (IWF) calls and calls that generate multiple call legs.
An important new feature in this release is the expanded flexibility for determining the calling party. The calling party, or calling number, can be determined by five different information elements in SIP.
TransNexus has been an Oracle partner since 1999. All of our customers have used Oracle, but now we see a small, but growing group of service providers using MySQL. To serve those customer, we have now expanded NexOSS to support MySQL.
This release includes a complete overhaul of Quality of Service reports for the Traffic Analyzer. Working closely with a couple of major customer to satisfy their detailed requirements, we have a completely different reporting model for QoS data.
Jim Dalton was recently interviewed by Rich Terani, the CEO of TMC. The text of that interview is below.
TransNexus has contributed a new module, mod_osp, to FreeSWITCH. The new module enables FreeSWITCH to use the Open Settlement Protocol (OSP) to query an external route server and to report XML based Call Detail Records (CDRs). The new module uses the OSP Toolkit available from SourceForge.
TransNexus will be one of a selected group of Acme Packet Pinnacle Partners participating at Interconnect 2010 in San Diego CA on May 16-19.
TransNexus will be attending the Metaswitch Forum 2010 in Nashville, TN on May 19. At TransNexus, we are very pleased to be a MetaSwitch partner.
International Telecoms Week (ITW) 2010
Not too long ago, optimizing least cost routing was a relatively straight-forward exercise that could be managed part time by an industrious billing or switch technician. This is no longer the case and this article will describes the major developments that have increased the scope and complexity of least cost routing for the North American telephone network.
The ETSI Open Settlement Protocol, or OSP, has been assigned TCP port 5045 by IANA.
The LERG, or Local Exchange Routing Guide, has been the routing table for the North American telephone companies for decades. But two forces are driving the LERG toward irrelevance.
Last night I attended the “Start-up Camp” at the IT-Expo in Miami. It was a showcase for four start-ups to make their pitch.
"PathFinder is the GSMA’s multi-tiered, fully extensible number resolution system. It is designed to facilitate the efficient global interoperability of new and existing IP services using telephone numbers—all within a business framework consistent with operator needs. It provides a comprehensive suite of services designed to enable IP-to-IP interconnections between interconnect partners for voice, messaging, video, and other IP services."
In Andy Ory’s opening speech at the Acme Interconnect 2009 conference he made the point that the emergence of new market segments requires disruptive change. But he added that it has to be just the right amount of disruption.
I was at the Comptel show in Orlando, FL earlier this week and everything appeared to be pretty much business as usual. The number of exhibitors were down about 10% from the last Comptel show, but overall the quantity and quality of business activity was good.
I am happy to announce that we have been working closely with Covad Communications since the beginning of 2009 as they have expanded their VoIP services.
On October 1, the GSMA announced the launch of its PathFinder Number Portability Discovery Service. The GSMA is the global wireless organization consisting of nearly 800 wireless carriers in 219 countries.
Last Friday, I had the pleasure of presenting to FISPA, the Federation of Internet Solution Providers of the Americas. FISPA had its annual meeting in Atlanta last week and I was invited to provide a tutorial on how Number Portability impacts VoIP service providers.
Recently I was interviewed by Erik Linask, TMC’s Editorial Director for Astricon 2009. Below is a transcript of that interview.
I had an interesting discussion yesterday with Dave Gilbert (SimpleSignal), Dave Cullerot (Acme Packet) and Kevin Groth (XConnect) about the current state of VoIP peering and how it will evolve.
Rich Tehrani is CEO of TMC, which publishes Internet Telephony magazine.
I just returned from the Internet Telephony Expo in Los Angeles where I gave a tutorial on Number Portability. Overall the conference was good. I am always interested in trade show attendance and vibrance since it is a good business indicator for our market.
Telecom service provider rate plans come in a variety of formats, most of which are confusing.
At the IT Expo in Miami, I had the opportunity to speak with Dan York about a presentation I gave on Next Generation Network Peer to Peer Settlement Billing.
In early January I was interviewed by Rich Tehrani, TMC President and Editor-in-Chief. TMC has published that interview which is posted below.
Last week, I was at the Telephony Expo in Miami, Florida. Given the overall direction of the general economy, my expectations for the conference were low. I expected low attendance and a generally negative outlook from most attendees.
We recently ran a performance test of Asterisk configured as a SIP Back to Back User Agent (B2BUA). The test platform hosting Asterisk was a $1000 Dell PowerEdge 840 with a Quad Core Xeon X3220, 2x4M cache, 2.40 GHz, 1066 MHz FSB and 4 GB RAM. Redhat V5 was the operating system. The test was configured to simulate a wholesale VoIP operation with three minute call durations and an average of two call retries for every completed call. This was an “out-of-the-box” Asterisk configuration with default settings and no optimizations.
TransNexus has joined the Intel® Certified Solutions Program and will certify its NexOSS software for Intel processors. This is a good program with real technical benefits, not just a marketing gimmick. Given the $25,000 price to join the program, we did our homework to make certain the program offered more than just a rubber stamp certification logo. Admission to this program provides TransNexus with software tools that will assist us in our efforts to boost the performance of our software and reduce security threats. As part of the process, Intel will certify the performance of TransNexus software based on hard data and provide feedback on how our software can be made more secure.
There has been a lot of confusion and angst in the OpenSER community this week. It all started on July 28th when the OpenSER project renamed itself to Kamailio. According to the announcement, “Kamailio is a Hawaiian word. Kama'ilio means talk, to converse.”
I am at the closing plenary of the Voice Peering Forum in San Francisco. It has been a very interesting two days with a lot of informative and thought provoking conversations and presentations.
Like other folks involved with VoIP, we ponder how the new interconnect model for future IP services will evolve.
Well a lot of blogging from me last week about activities in the field of Next Generation Network (NGN) Interconnection.
There is no shortage of new organizations focusing IP Interconnection standards. The latest organization to be formed is the IP Internetworking Alliance or IPIA. IPIA has been established by the GSMA to be the not for profit, governing body of the GSMA IPX. The IPIA mission statement is: " To provide an environment whereby stakeholders from mobile operators, fixed operators and carriers can agree to technical specifications and commercial templates for the IPX, which will facilitate the global interworking of IP services." The inaugural IPIA Board members are:
The migration to an all IP world takes another small step forward. This week ATIS is holding a workshop in Washington D.C. to discuss Inter-Carrier VoIP Call Routing (ICVR).
I just returned from the MetaSwitch Customer Forum V in New Orleans. The MetaSwitch folks ran a great a conference for for their customers. A lot of good information and a good time.
The opening plenary at PTC ’08 offered an interesting perspective from regulators about what they expect for the future. The plenary included regulatory officials from Germany, Japan, Singapore and an ITU representative.
What's an ISN? An ISN is an ITAD Server Number. What the heck is an ITAD? An ITAD is an Internet Telephony Administrative Domain.
Over the last couple of months we have been stress testing Asterisk V1.4 to understand its performance. We started using V1.4.4 and advanced to V1.4.11 as new releases were made available. We have been stress testing Asterisk configured as a SIP Back to Back User Agent (B2BUA) installed on a server with two, dual core, Xeon 5140 CPUs running at 2.33 GHz.
On August 6th 2007, NueStar (www.home.neustar) issued a press release announcing that they have partnered with NetNumber (www.netnumber.com) "in response to customer demand for interoperability between NeuStar’s SIP-IX service and NetNumber’s SPIDER and TITAN technology platforms."This announcement is significant because it is the first coordination between two companies on a common approach for VoIP peering.
Last week the Asterisk Developers Conference, or AstriDevCon 2007, was held at the Georgia Institute of Technology Information Security Center in Atlanta, Georgia. Since a couple of TransNexus developers were attending, I visited the conference as a non-technical observer to see what was going on. I have to say that I was impressed with what I saw. Kevin Fleming has cultivated a productive relationship with Georgia Tech which has a long history of nurturing innovative new technologies and start-ups and Asterisk is a perfect fit with the Georgia Tech environment.
NexSRS OSP Peering Server V3.0 is now available for download from the TransNexus website. New Features Include:
At the Spring VON show in San Jose, CA, I had the opportunity to give a presentation on Secure VoIP Peering. The presentation is an overview tutorial on how standard Public Key Infrastructure (PKI) services and the OSP protocol are being used today to enable secure peer to peer VoIP calls.
By John L. Guerra
This information will only be used to send newsletters and occasional announcements. TransNexus will not share your data with any third parties. We will retain your information for as long as you wish to continue receiving our newsletters and announcements. You may unsubscribe at any time by selecting the unsubscribe link at the bottom of the email. For more information about how we use personal data, please see our privacy statement.