Call security and fraud prevention illustration



STIR/SHAKEN (Secure Telephony Identity Revisited/Signature-based Handling of Asserted Information Using Tokens) is a framework designed to combat caller ID spoofing and reduce fraudulent robocalls. As telecommunications technology advances, so do the methods used by scammers to deceive and defraud unsuspecting individuals. STIR/SHAKEN aims to address these challenges by implementing a system of authentication and verification for phone calls.

At its core, STIR/SHAKEN relies on digital certificates to verify the authenticity of caller ID information. When a call is placed, the originating service provider (OSP) generates a digital signature using a private key. This signature, along with other call details, is then passed through the network to the terminating service provider (TSP). The TSP uses the OSP's public key to verify the signature and ensure that the call has not been tampered with or spoofed.

By implementing STIR/SHAKEN, service providers can confidently authenticate incoming calls and assign them a "risk score" based on the level of certainty that the caller ID information is accurate. Calls with a high risk score, indicating a higher likelihood of spoofing or fraud, can be flagged or blocked outright, protecting consumers from potential scams and fraudulent activity.

Furthermore, STIR/SHAKEN helps restore trust in the phone system by providing consumers with more accurate caller ID information. With fewer fraudulent calls reaching their intended targets, individuals can answer their phones with greater confidence, knowing that the caller ID information displayed is more likely to be genuine.

While STIR/SHAKEN represents a significant step forward in the fight against caller ID spoofing and fraudulent robocalls, it is not a silver bullet solution. Scammers are continually evolving their tactics, and additional measures may be necessary to stay ahead of emerging threats. However, by implementing STIR/SHAKEN and collaborating with industry stakeholders, service providers can work together to create a more secure and trustworthy telecommunications ecosystem for all.