A Primer on STIR/SHAKEN
Have you ever gotten a phone call from what looks like a familiar number only to answer and find out that it's a call about your car warranty or some other potential scam? If you have, then you've probably been a victim of Caller ID spoofing where robocalls illegally spoof a local number to make it more likely you will pick up the phone, and to hide the actual number they are calling from.
With rampant fraud occurring, the FCC has been working with telecom companies to create and implement a set of standards and practices known as STIR/SHAKEN to aid in combating this type of fraud. The goal is to give consumers more confidence that the number they see on their Caller ID is the actual number of the caller, and to make it easier to track down the source of every call.
To learn more about this effort, we recently sat down with Rebekah Johnson, Founder & CEO of Numeracle, as she discussed STIR/SHAKEN and how these standards are being implemented.
Note: If you're considering offering VoIP service to your subscribers, and want to be sure that your service is compliant with STIR/SHAKEN requirements, visit VoiSelect.com to learn more about our cloud-based voice solution.
About the Author: Sheenika Wilson
Never miss a post.
Enter your email to subscribe:
- Blog (13)
- Ask an Expert (12)
- Technology (12)
- Hot Topics (9)
- ask a broadband expert (8)
- DOCSIS (7)
- PNM (5)
- proactive network maintenance (5)
- Customer Service (4)
- Industry Perspectives (4)
- interview (4)
- DDoS Attacks (3)
- Distributed Denial of Service Attacks (3)
- PreEqualization Analyzer (3)
- correlation groups (3)
- 5G (2)
- Codeword Errors (2)
- DOCSIS 3.1 (2)
- DOCSIS pre-equalization (2)
- Diagnostics (2)
- Distributed Access Architecture (2)
- FCC (2)
- GPoN (2)
- IPv6 migration (2)
- Marketing (2)
- Millimeter Wave (2)
- Voice Service (2)
- mid-band spectrum (2)
- mmWave (2)
- network virtualization (2)
- 10G (1)
- C-Band (1)
- CAF II Requirements (1)
- CAF II Testing (1)
- CBRS (1)
- CGNAT (1)
- Carrier Grade NAT (1)
- Citizens Broadband Radio (1)
- Connect America Fund (1)
- DAA (1)
- DOCSIS 4.0 (1)
- DPoE (1)
- DPoG (1)
- EPoN (1)
- Extended Spectrum DOCSIS (1)
- FTTH (1)
- FTTx (1)
- Fidelity Communications (1)
- Full Duplex (1)
- Group Delay (1)
- Hosted VoIP (1)
- ICFR (1)
- IPv4 (1)
- IPv4 Conservation (1)
- IPv6 (1)
- IPv6 Transition Plan (1)
- In Channel Frequency Response (1)
- LTE (1)
- Low Latency DOCSIS (1)
- MAC/PHY (1)
- Main Tap Compression (1)
- Micro Reflections (1)
- Mobile (1)
- Monitoring (1)
- Motivation for DDoS Attacks (1)
- NG-PON2 (1)
- Preventing DDoS attacks (1)
- Private Access License (PAL) (1)
- Purchase IPv4 Addresses (1)
- RDOF Auction (1)
- RDOF Voice Requirements (1)
- Remote MAC/PHY (1)
- Remote PHY (1)
- Robocalls (1)
- Rural Broadband (1)
- Rural Digital Opportunity Fund (1)
- STIR/SHAKEN (1)
- Small Cells (1)
- TV Viewership Analytics (1)
- TWDM-PON (1)
- TruVizion (1)
- Types of DDoS Attacks (1)
- Upstream Analyzer (1)
- Videos (1)
- VoIP (1)
- VoIP revenue (1)
- Wired Broadband (1)
- XGS-PON (1)
- cableLabs (1)
- caf ii (1)
- case study (1)
- cloud-based VoIP (1)
- commercial VoIP (1)
- commercial VoIP revenue (1)
- cpe spectrum capture (1)
- customer service (1)
- customer service tip (1)
- dhcp (1)
- downstream spectrum issues (1)
- dynamic spectrum sharing (1)
- fiber optics (1)
- forward path monitoring (1)
- free download (1)
- full band capture (1)
- ingress (1)
- net neutrality (1)
- pppoa (1)
- pppoe (1)
- pre-equalization (1)
- remote spectrum analyzer (1)
- return path (1)
- scott helms (1)
- technical paper (1)
- traffic scrubbing (1)
- vTDR (1)
.
About the Blog
Bloggers
Comments Policy
Guest Blogging
Privacy Policy
Leave a comment: