Spoof-proofing the telecom industry
The method is simple. A fraudster can change the A-number (caller ID) of an outgoing call to mimic a number that is familiar to the recipient. Normally, there would be no way for either the originating or terminating operator to realize what had occurred. However, with AB Handshake, the originating operator sends a verification request directly to the terminating operator, and the terminating switch sends the call details to the terminating call registry. The terminating operator then reaches out to the owner of the spoofed range but, in the case of CLI spoofing, does not get call verification. The call is also not verified by the originating operator. It is automatically identified as fraudulent in real time and either blocked or labelled as fraud with all details available in a validated log that can be used to raise a complaint with the carriers.
It’s a win-win proposition. Wholesale carriers and retail operators have a clear incentive to join the community so as not to exchange traffic with operators whose traffic cannot be verified. Customers benefit from the elimination of nuisance and privacy violations, so it’s a win for them too. The only losers in the equation are the fraudsters, and actually, that’s a win too.