European Communcations Office
ECC Work Programme Database
Work Programme
Info
Responsible Group
All groups
WG SE
WG FM
ECC Plenary
ECC PT1
WG NaN
Closed Groups
STG
SE7
SE19
SE21
SE24
SE40
SE45
Plenary
FM22
FM44
FM51
FM56
FM57
FM58
FM59
EFIS/MG
SRD/MG
FM Radio Amateur FG
Plenary
SWG-A
SWG-C
SWG-E
Plenary
NaN1
NaN2
NaN3
NaN4
NaN SFG
Plenary
WG RA
SE42
SE43
SE44
JFG-PLT
FM52
FM53
FM55
FM45
JPT BWA
FM49
FM50
CG CRS
FM48
Sort By:
Reference
Status
Deliverable
Start Date
Target Date
Records pr. page:
10
20
50
100
200
500
Descending order
Show Finalised WI
Reference
Deliverable
Subject
Related Item
Scope
Start / Target dates
Comments
Status
NPS_06
Last update:
28-03-2022
ECC Report
ECC Report on CLI Spoofing
Calling/Caller ID spoofing is a technique where the information displayed in the CLI field is manipulated with the intention of deceiving the called party into thinking that the call originated from another person, entity or location. It is very often used by fraudsters to take advantage of the inherent trust that end-users have in the integrity of CLI information to facilitate scams. But also some operators use CLI spoofing for illegal rerouting/arbitrage schemes (e.g. roaming non EU- originated traffic). Manipulation of CLI can also be a part of a legitimate activity and this adds complexity.
In this work item the ECC will address :
- the legal aspects (prohibition, exceptions, appropriate legal instruments,…);
- the possible technical measures for the different technologies to verify and authenticate the CLI with pros and contras;
- the operational impact for the different stakeholders with cost aspects;
- different aspects of the rollout of the solutions;
- impact on regulatory authorities and possible measures.
S: 31-05-2018
T: 26-11-2021
In Progress
NPS_07
Last update:
25-05-2021
ECC Report
CEPT cooperation process for withholding payments and/or blocking access to numbers or services in cases of cross-border fraud or misuse
One of the most effective long-term approaches to tackling fraud and misuse is greater cooperation and information sharing between regulators. This can help us to better understand the changing nature of fraud mechanisms and to develop ex-ante and ex-post measures to protect the interests of citizens and consumers. With this aim, it is proposed to define a process for cooperation in the investigation of cross-border cases of fraud and misuse. The process would assist any regulatory intervention in the withholding of payments and/or blocking of access to numbers or services where fraud or misuse has occurred.
As a starting point, we plan to review the BEREC cooperation process, as set out in report BoR (13)37. The BEREC cooperation process was developed to assist regulatory authorities in the effective application of powers provided by Article 28(2) of the Universal Service Directive (USD) to require the withholding of payments and/or blocking of access to numbers or services in cases of fraud or misuse. It is a cooperation and information sharing tool used to complement national processes in combating fraud and misuse. We would consider the strengths and weaknesses of the BEREC cooperation process in developing the CEPT process.
References:
ECC Report 275 (2018) The role of E.164 numbers in international fraud and misuse of electronic communications services
BEREC Report BoR (13)37 Article 28(2) USD Universal Service Directive: A harmonised BEREC cooperation process, March 2013
S: 31-05-2018
T:
On Hold
1
Report Error
*
Target dates are seen as the intended date for the final approval of the related deliverable by the responsible entity. Internal deadlines for project teams and dates for the start of Public Consultations can be reflected in the remarks column. In general this implies that the draft deliverable should be completed by the project team one WG meeting earlier for publication.
0
items selected
Remove
See Gantt Chart