More and more ECC countries are faced with fraud and misuse where E.164 numbers play a role.Parties misuse the trust users have in CLI (e.g. CLI spoofing) in order to steal money or to harass people. Very often these systems are automated and organised from low income countries and/or in unstable jurisdictions where parties deliberately do not follow the rules.
This work item starts with making an inventory of these fraud systems where CLI plays a role,followed by the description of the fraudulent ecosystems and a summary of the existing rules and regulations (national and international) to maintain trust in CLI.
Effective and efficient measures will be proposed to prevent fraud and to mitigate the negative effects taking into account that parties do not behave according to the rules. These measures can be based, amongst other things, on practices in the Internet ecosystem.One important aspect to study is the responsibility of the different operators in the value chain (in other words: what can be reasonably expected from the operators?) (“duty of care”).
Also a gap analysis will be made in order to assess if additional legislation, regulations or guidelines are needed.An international approach is necessary as the phenomena of fraud/misuse of E.164 CLI are almost always international.