Liaison statement
LS on technologies involved in countering voice spam in telecommunication organizations
Additional information about IETF liaison relationships is available on the
IETF webpage
and the
Internet Architecture Board liaison webpage.
State | Posted |
---|---|
Submitted Date | 2014-10-03 |
From Group | ITU-T-SG-17 |
From Contact | Martin Euchner |
To Group | stir |
To Contacts | Robert Sparks <rjsparks@nostrum.com> Russ Housley <housley@vigilsec.com> |
Cc | Richard Barnes <rlb@ipv.sx> Alissa Cooper <alissa@cooperw.in> stir@ietf.org A Kremer <kremer@rans.ru> Koji Nakao <ko-nakao@kddi.com> Anthony Rutkowski <tony@yaanatech.com> Scott Mansfield <Scott.Mansfield@Ericsson.com> |
Purpose | For comment |
Deadline | 2015-03-31 Action Taken |
Attachments | COM17_LS150 |
Liaisons referring to this one |
STIR WG response to LS on technologies involved in countering voice spam in telecommunication organizations
|
Body |
ITU-T Study Group 17, Security, in its Question 5/17, Countering spam by technical means, is pleased to inform you that our draft Recommendation ITU-T X.ticvs on technologies involved in countering voice spam in telecommunication organizations was close to being finalized. The work item was established in September 2011 and proceeded in the recent three years. We kindly invite the experts of IETF WG STIR to review the text of X.ticvs (see attachment 1) giving full considerations of the following: - X.ticvs focuses on the technologies on countering voice spam initiated from the circuit-switched network with the consideration that the technologies on countering voice spam initiated from the IP-based network have been recommended in Recommendations ITU-T X.1245 and X.1244. - With the respect to WTSA-12 Resolution 52 (Rev. Dubai, 2012), Countering and combating spam, X.ticvs avoided recommending technologies which may bring potential privacy arguments. Therefore, for example, X.ticvs does not recommend the technologies that can identify whether the caller ID (or calling Line ID) of a voice spammer is spoofed /impersonated or not. We would like to hear whether recent activities of IETF WG STIR regarding technologies involved in countering voice spam in telecommunication organizations are impacted before we will be proceeding the work item to go through ITU-T TAP determination procedure. We appreciate your feedback in this regard. Attachment: 1 -Draft Recommendation ITU-T X.ticvs, Technologies involved in countering voice spam in telecommunication organizations. |