European Communcations Office

ECC Work Programme Database

Responsible Groupv
Sort By: Records pr. page:  
Reference Deliverable Subject Related Item Scope Start / Target dates Comments Status
Last update: 28-03-2022
ECC Report ECC Report on CLI Spoofing
Calling/Caller ID spoofing is a technique where the information displayed in the CLI field is manipulated with the intention of deceiving the called party into thinking that the call originated from another person, entity or location. It is very often used by fraudsters to take advantage of the inherent trust that end-users have in the integrity of CLI information to facilitate scams. But also some operators use CLI spoofing for illegal rerouting/arbitrage schemes (e.g. roaming non EU- originated traffic). Manipulation of CLI can also be a part of a legitimate activity and this adds complexity.

In this work item the ECC will address :
- the legal aspects (prohibition, exceptions, appropriate legal instruments,…);
- the possible technical measures for the different technologies to verify and authenticate the CLI with pros and contras;
- the operational impact for the different stakeholders with cost aspects;
- different aspects of the rollout of the solutions;
- impact on regulatory authorities and possible measures.
S: 31-05-2018
T: 26-11-2021
In Progress
Last update: 25-05-2021
ECC Report CEPT cooperation process for withholding payments and/or blocking access to numbers or services in cases of cross-border fraud or misuse
One of the most effective long-term approaches to tackling fraud and misuse is greater cooperation and information sharing between regulators. This can help us to better understand the changing nature of fraud mechanisms and to develop ex-ante and ex-post measures to protect the interests of citizens and consumers. With this aim, it is proposed to define a process for cooperation in the investigation of cross-border cases of fraud and misuse. The process would assist any regulatory intervention in the withholding of payments and/or blocking of access to numbers or services where fraud or misuse has occurred.

As a starting point, we plan to review the BEREC cooperation process, as set out in report BoR (13)37. The BEREC cooperation process was developed to assist regulatory authorities in the effective application of powers provided by Article 28(2) of the Universal Service Directive (USD) to require the withholding of payments and/or blocking of access to numbers or services in cases of fraud or misuse. It is a cooperation and information sharing tool used to complement national processes in combating fraud and misuse. We would consider the strengths and weaknesses of the BEREC cooperation process in developing the CEPT process.

ECC Report 275 (2018) The role of E.164 numbers in international fraud and misuse of electronic communications services
BEREC Report BoR (13)37 Article 28(2) USD Universal Service Directive: A harmonised BEREC cooperation process, March 2013
S: 31-05-2018
On Hold
* Target dates are seen as the intended date for the final approval of the related deliverable by the responsible entity. Internal deadlines for project teams and dates for the start of Public Consultations can be reflected in the remarks column. In general this implies that the draft deliverable should be completed by the project team one WG meeting earlier for publication.
0 items selected         Remove         See Gantt Chart