Central to this STIR/SHAKEN security

Explore discuss data innovations to drive business efficiency forward.
Post Reply
tanjimajuha20
Posts: 575
Joined: Thu Jan 02, 2025 7:18 am

Central to this STIR/SHAKEN security

Post by tanjimajuha20 »

In principle, during a STIR-SHAKEN call, the originating service provider attests via data in the SIP header to their relationship with the caller and the caller’s right to use the calling number. A SIP Identity header relays a secure digital token which is verified and authenticated to ensure that the call origination information is accurate. This procedure helps to eliminate spoofed calls, since carriers cannot verify their source.

protocol is the kuwait telegram Attestation Level, which essentially corresponds to the level of trustworthiness of a particular call. There are three levels, as follows:

“A” Attestation — Full: Here, the voice service provider knows the end-user customer and their right to use the phone number. Having fully authenticated the customer initiating the call, it may be considered “safe”.
“B” Attestation — Partial: The voice service provider knows the end-user customer but not the source of the phone number. Here, the carrier has confidence in the caller’s identity, but not in their right to use caller ID information presented.
“C” Attestation — Gateway: The service provider has originated the call onto the network but cannot authenticate the call source e.g., an international gateway. In this case, the carrier knows nothing about the call and will likely block it.
What This Means for Call Centers
While other channels such as email, SMS text messaging, and web chat continue to gain traction for business communication, the phone remains crucial to customer service and high-priority interactions.

Since business-related phone numbers may not be immediately familiar to the consumer, blocking via STIR/SHAKEN has the potential to leave customers dissatisfied, if they are unable to receive vital information from the brands they deal with. Organizations may be unable to achieve their business goals, if a crucial avenue of communication with consumers (i.e., the phone) fails to connect.

At a micro level, the business may experience an increase in its operating costs, if repeat dialing becomes necessary to reach reluctant consumers. At a macro level, failure to communicate may lead to a significant decline in the organization’s customer base and overall revenue. After all, if you can’t even reach your potential and existing customers, it’s impossible to sell products or services to them.

Commercial organizations in the age of STIR/SHAKEN must also take into consideration the call architecture that they use. For example, many call centers use least call routing to reduce costs. However, this method of routing calls through several networks could potentially lead to blocking by carriers that assign them a C Attestation rating.

As with all new developments in communications and cybersecurity, bad actors are modifying their techniques in response to the new challenges they face. For example, with STIR/SHAKEN making it more difficult for spam calls to reach their destinations, some fraudsters and illegitimate call centers are using spam text messages as a way to contact consumers.
Post Reply