%% You should probably cite rfc7375 instead of this I-D. @techreport{ietf-stir-threats-03, number = {draft-ietf-stir-threats-03}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-ietf-stir-threats/03/}, author = {Jon Peterson}, title = {{Secure Telephone Identity Threat Model}}, pagetotal = 12, year = 2014, month = jun, day = 12, abstract = {As the Internet and the telephone network have become increasingly interconnected and interdependent, attackers can impersonate or obscure calling party numbers when orchestrating bulk commercial calling schemes, hacking voicemail boxes or even circumventing multi- factor authentication systems trusted by banks. This document analyzes threats in the resulting system, enumerating actors, reviewing the capabilities available to and used by attackers, and describing scenarios in which attacks are launched.}, }