Appendix A - Federal Communications Commission

Transcription

Appendix AThis appendix provides a list of AT&T’s capabilities across the wireline,Uverse and wireless portfolio that support Call Blocking (Black list) Call Screening Call ID White List Do Not Disturb Call TracingPage 1

Summary for Wireline Call Block / Call Screen Fee Based 10 number block capacity Privacy Manager Forces anonymous, unavailable, out-of-area, and privateto identify themselves before call completes Anonymous Call Rejection/Blocking Callers are told to hang up, unblock delivery of their callerID and call back. Call Trace Allows the harassing, threatening, or annoyance call to betracedSummary for U-Verse Call Blocking 20 numbers can be blocked Anonymous Call Blocking Call Screening 20 numbers can ring through while all others blocked Do Not Disturb All calls blocked Call Trace Allows the harassing, threatening, or annoyance call to betracedPage 2

Summary for Wireless Smart Limits Block data and up to 30 numbers from text and calls Time Restrictions – Limit texting, outbound calls & cellular data use during specific times Text Limits - Set sensible limits on the number of texts sentand received Purchase Limits- Limit purchases for apps, music and gamesbilled to your AT&T accountSummary for AT&T Business Wireline IPFlex (SIP [Session Internet Protocol] offering) Call Screening (white list) Time of Day Blocking Call Blocking – Specific Numbers or Pattern Matching Do Not Disturb Anonymous Call Blocking Special Note Æ Available wherever AT&T sells AVPN (AT&TVirtual Private Network), EVPN Enhanced Virtual Private Network) and MIS (Managed Internet Service) All-in-One Call Screening Anonymous Call Rejection Call Blocking Selective Call Rejection Distinctive Ring Local / Long Distance Call Blocking for up to 10 specific numbers Ring Central This is a 3rd party product resold by AT&T As a cloud based PBX, this product has a robust set of capabilities.Page 3

Details on U-VerseName ofCapabilityCall Blocking(Black List)1WebLinkAnonymousCall BlockingLinkCall ScreeningLinkDo Not DisturbLinkGeneral DescriptionConsumers can block up to 20 numbers. The20 numbers are loaded online. After loadingthe 20 numbers, call blocking (black list) can beturned on and off through the online portal orfrom the phone.Anonymous Call Blocking helps you avoid unwanted calls from anyone whose caller ID information is blocked. Your phone does not ringand the caller is unable to leave a voice mailmessage. Callers who have their caller ID information blocked will hear, "The number you dialed does not accept calls without caller ID information." This can be turned on an off in theonline portal or directly with a customer’sphone.Call Screening allows calls to ring through froma list of up to 20 phone numbers specified byyou. If someone calls you from a number noton your list, the caller will hear, "The numberyou dialed will not accept your call." The callwill end, and the caller will not be able to leavea message. Setup your call screening list onlineand edit as often as you wish. You can turn callscreening on and off from the portal and thephone.The Do Not Disturb feature gives you the option to turn off the ringer on your home phone.When the service is activated, callers will heara busy signal. To activate by phone, dial *78#on your home phone. To deactivate, dial *79#.You can turn do not disturb on and off fromyour portal or your phone.Service is available only in U-Verse coverage area in 21 state footprint.Page 4LimitationsCall Blocking andCall Screeningcan't be active atthe same timeAvailability21 State Footprint1Call Blocking andCall Screeningcan't be active atthe same time21 State FootprintCall Blocking andCall Screeningcan't be active atthe same time21 State Footprint21 State Footprint

Call TraceLinkImmediately after you receive an annoying orharassing call, pick up the phone and dial *57.Follow the recorded instructions to invoke thisCall Trace feature - automatically tracing thelast call you received. You are responsible forfiling a complaint with the law enforcementagency. After three successful traces, we willrelease the call origination number to the lawPage 521 State Footprint

Details for WirelineName agerLinkAnonymous CallRejection/BlockingLinkGeneral DescriptionCall Block/Call Screening is a feature that isavailable at a low monthly rate. With CallScreening you can block up to 10 phonenumbers within your local calling area. Youcan also block the last incoming call received,even if the number is unknown (e.g., blocksolicitation calls). The blocked caller hearsthe message: We are sorry, the party you'recalling is not accepting calls at this time.Privacy Manager is a call screening servicethat works with Caller ID to identify all incoming calls that have no telephone numbersprovided and which are identified as Anonymous, Unavailable, Out-of-Area, or Private,and requires callers to identify themselves inorder to complete the call. You'll know who'scalling and have four options for handling thecall. You also have the option to provide frequent callers whose numbers are unidentified, with an access code/PIN feature whichwill allow them to ring through to yourphone without recording their name (ProfileManager).Anonymous Call Rejection (ACR) /Blocking orACR intercepts calls from people who haveused a blocking feature to prevent theirname or number from being provided topeople they call. When the ACR service is activated, callers hear a message telling themto hang up, unblock delivery of their phonenumber and call again. Your phone will notring unless the caller removes the block.Services listed are in the legacy coverage areas of our 21 state footprint.Page 6LimitationsAll 10-digits of the number, including the areacode, are needed whenadding a number. Somecellular numbers cannotbe blocked. 800 numbers cannot be blocked.This service is not available in all areas.Profile Manager notavailable in MW RegionAvailability21 State Footprint2ACR stays on until youturn it off. If a call comesin from a private numberon your PersonalizedRing or Selective Call Forwarding list, the call willbe accepted. ACR doesnot block Operator Assisted incoming calls.Caller ID is required insome areas.Does not intercept callsthat display as Unknownor Out-of-Area on theCaller ID. These designations usually mean thatthe call originated in an21 State Footprint21 State Footprint

area in which Caller ID isnot available.Call TraceLinkCall Trace helps to handle obscene, harassingor threatening calls. This feature should onlybe used to trace harassing or threateningcalls that warrant legal action. Successfultrace information is provided only to the customer's law enforcement agency and will beused when investigating harassment. Calltrace information is never divulged to thecustomer by AT&T.Call Trace allows customer to initiate an automatic trace of the last incoming call received. Customer must dial designated codeto activate the option each time want totrace the last call. Call Trace is a pay-per-useoption.Page 7This option is not available in all areas. All Regions have Call Trace as apay per use feature; CallTrace is also available asa feature in SE Region.21 State Footprint

Details for WirelessName ofCapabilityAT&TSmartLimits SMWeb General DescriptionLink Set Blocks:- Block Data - block access to cellular data- Block Numbers - block up to '30' numbersfrom unwanted calls and texts including 411.Set Limits:- Time Restrictions - Limit texting, outboundcalling and cellular data use during specifictimes- Text Limits - Set sensible limits on the number of texts your child sends and receives- Purchase Limits- Limit purchases for apps,music and games billed to your AT&T accountView Activity:- Daily Activity – Check your family’s phone activity with texting and calling activity graphs- Weekly Reports - Receive weekly reportssummarizing texting and calling activity- Alerts - Get customized alerts for text andcall activity and receive new contact alerts- Top Contacts - stay in touch by knowing whoand how often your child is communicatingwith Contacts. (Accessible from web and Android app. Not accessible through the app oniPhone at this time.)IndividualMobileDevicesLinkIn addition, many wireless devices offer thecapability to block unlimited calls and messages free-of-charge through the device settings. AT&T’s Device How-To Center providesconsumers information on device capabilitiesand instructions for blocking calls and texts.Page 8LimitationsCompatible phone w/eligible. data plan req'd. Data &messaging rates may applyfor app download & usage.Blocks: blocked numbersblocks 10 digit U.S. phonenumbers with valid areacodes and calls to 411.May not block other 10digit numbers like international numbers. Blockednumbers does not blockpicture/video messagingand/or 3rd party messagingservices. Data blocks applyto cellular data usageonly. Does not block Wi-Fiusage. Time Restrictions:are not guaranteed to beprecise. Incoming calls allowed at all times includingduring time restrictions, except from numbers designated as “Blocked Numbers.” General: Technical,network and other servicelimitations may apply. Coverage not available everywhere. Intended for US service only. App may use personal info. This use governed by AT&T's PrivacyPolicy found at att.com/privacy.AvailabilityCoverage notavailableeverywhere.Intended forUS serviceonly.The devicecapabilitiesare availableeven whenroaming Internationally.

Details for Business WirelineName of CapabilityIPFlex (InternetProtocol FlexibleReachWeblinkAll-In-One CallScreeningLinkLocal/Long DistanceLinkRing CentralLinkGeneral DescriptionIPFlex Call Screening Anonymous call blocking Call Acceptance (whitelist capability)o Accept calls from any numbero Accept calls only from specificnumbersWildcards are available. You can use a “?”for a single position or an “*” ?52* would accept any numberthat had 52 in the 2nd and 3rd position 8* would accept any numberstarting with 8 Schedule time of day blocking Reject calls from any number Reject calls from specific phone numbers(Blacklist capability)o Wildcards are available. You can use a “?”for a single position or an “*”§ ?52* would reject any number that had 52in the 2nd and 3rd position§ 8* would reject any number starting with8AT&T All In One Call Screening Features (target for Small and Medium Businesses(SMB)Anonymous Call Rejection, Caller Blocking,Selective Call Rejection, Distinctive RingCaller ID with Name and Number See thecaller's name and number displayed. CallScreening prevents you from receiving unwanted calls from up to 10 specific numberswithin your service area.RingCentral is a cloud based VoIP PBX soldby AT&T. You can block callers, providetime of day blocking, provide time of dayrouting to voicemail, require a caller without caller ID to say their name, refuse payphone calls, set do not disturb,Page 9LimitationsOutside of incumbentcoverage area, AVPN,EVPN, and MIS wouldhave to go through alocal incumbent carrier.AvailabilityCoverage areain 22 StateFootprint. PlusCoverage isavailable acrossall 50 stateswhen used withEVPN, AVPN,and MIS21 State Footprint

Appendix BThis appendix contains a technology survey of 3rd party products andprovides a summary of capabilities and cost ranges. There are thousands of 3rd party products and services. This survey is a sample of the3rd party vendors. Samples are across the following four categories:1. Inline – telephone line to the device and then to phoneIncoming line2. Phone/DeviceIncoming lineDevice has capabilities built-ine.g. Panasonic Dect 6.0 phone can black/white list3. ServiceCall is transferred to “sas” where it is screened. If approved, call is then sentto home phone. This service is configured via the web and requires the calltransfer capability *72 and *73Call has simultaneous ring at Nomorobo site and home. If number is on Nomorobo’s list of fraudulent calls, call is terminated at Nomorobo site. Requires the ability to have simultaneous ring. Configure at nomorobo.com.4. Wireless Smartphones Apps (applications on smart phones)Page 10

3rd Party SummaryThe black circle is an indicator of whether the solution complete supports a feature. For instance, Telezapper gives a “disconnected” tone to the caller to fool computer calling systems tobelieve the phone is disconnected and removed the number from their database. This productwill still allow calls. If the robocaller doesn’t remove the number from their database, the callcould still reoccur. 20 toID 50Robo Defeaters 25 toe.g. Telezapper* 35Call Blocker with 40 toManual Touch 60Call Blocker with 60 toLarger Display 90Call Blocker with 40 toCapabilities 60Call Blocker with 50 toMost Capabilities 1203rd PartyProvidedPriceRangeSmartphones*Free – inApps – e.g. iOSFree to& Android 10Wireless Carrier 5 to 10Services**recurringText BlockCall ScreenText ScreenRejectDo NotBlacklistBlacklistWhite ListWhite ListAnonymousDisturbCall BlockText BlockCall ScreenText ScreenRejectDo NotBlacklistBlacklistWhite ListWhite ListAnonymousDisturbSophisticationCallerCall BlockLowPriceRangeHigh3rd PartyDevicedevicePage 11

Appendix CThis appendix contains a list of initiatives outside of AT&TSummaryStudy group on security and spoofed caller IDVoice & Telephone Working GroupsPublished documents and GuidelinesStage 2 of Study on Spoofed Call Detection / PreventionSecurity Working Group active with specification FS SPOOFConducting workshops and seminars on Caller ID SpoofingEmbracing IETF Efforts and StandardsSeveral members are creating white papers on caller IDblocking and spoofing.Some members have implemented caller secure ID.ATIS-NGIIF has 4 working groups – many white papersx ATIS-I-0000034, PSTN Transition Focus Group Assessment section related to caller IDx PSTN transition working group related to Caller IDIETF has several initiatives STIR (Secure Telephony Identify Problem) whichproposes passing encrypted cert between SIP /PSTN to authenticate caller ID Caller Preferences for the Session Initiation Protocol (SIP) to add extensions for handling Private Extensions to the Session Initiation Protocol(SIP) for Asserted Identity within Trusted NetworksPage 12

Details on InitiativesOrgin2EPSOverviewIETF and 3GPP consolidated information to ease the knowledge ofthe 3GPP Evolved Packet SystemInitiative NameStudy on security on spoofedcall detectionand prevention(Stage 2)M3AAWGThe Messaging, Malware and Mobile Anti-Abuse Working Group(M3AAWG) is driven by marketneeds and the insight of its globalmembership. With member companies from Asia, Europe, NorthAmerica and South America, theorganization currently is working ona variety of initiatives addressingongoing and emerging messagingabuse issues, including bot mitigation, cooperative industry outreach,Web messaging abuse, DNSabuse, wireless messaging, senders issues and other topics.Voice and Telephony AntiAbuse WorkshopPage 13Initiative DescriptionsThis study item studies thedetection of a spoofed callas the first step, and prevention as a second step if detection is achievable. In particular, the goals of this document are:– Outline valid threat scenarios for spoofed calls comingto 2G and 3G CS domains;– Analyze and evaluate ifany tools in 3GPP can beused to counteract spoofedcall detection and prevention;– Study and identify anyother suitable techniques ormechanisms for spoofed calldetection and prevention.Open to the industry, government and academia, theupcoming Voice and Telephony Anti-Abuse Workshopwill feature leading industryand government speakersaddressing robocalls, callerID spoofing, voice phishingand other issues. Hosted bythe M3AAWG VTA SIG, itwill continue the work toidentify key threats and actions to help reduce telephone services exploitation.Other Important LinksPublishedDocuments

Org3GPPOverviewThe 3rd Generation Partnership Project(3GPP) unites [Six] telecommunicationsstandard development organizations(ARIB, ATIS, CCSA, ETSI, TTA, TTC),known as “Organizational Partners” andprovides their members with a stableenvironment to produce the Reportsand Specifications that define 3GPPtechnologies.Initiative NameStudy on security on spoofedcall detectionand prevention(Stage 2)The project covers cellular telecommunications network technologies, including radio access, the core transport network, and service capabilities - including work on codecs, security, quality ofservice - and thus provides completesystem specifications. The specifications also provide hooks for non-radioaccess to the core network, and for interworking with Wi-Fi networks.3GPPThe 3rd Generation Partnership Project(3GPP) unites [Six] telecommunicationsstandard development organizations(ARIB, ATIS, CCSA, ETSI, TTA, TTC),known as “Organizational Partners” andprovides their members with a stableenvironment to produce the Reportsand Specifications that define 3GPPtechnologies.Security Working GroupThe project covers cellular telecommunications network technologies, including radio access, the core transport network, and service capabilities - including work on codecs, security, and quality of service - and thus provides complete system specifications. The specifications also provide hooks for non-radioaccess to the core network, and for interworking with Wi-Fi networks.Page 14Initiative DescriptionsSA WG3 is responsiblefor security and privacy in3GPP systems, determining the security and privacy requirements, andspecifying the security architectures and protocols.The WG also ensures theavailability of cryptographic algorithms whichneed to be part of thespecificationsSA WG3 is responsiblefor security and privacy in3GPP systems, determining the security and privacy requirements, andspecifying the security architectures and protocols.The WG also ensures theavailability of cryptographic algorithms whichneed to be part of thespecifications.Other Important Links3GPP Specification DetailsDownloadSpecs fromworking groupSpecificationFS SPOOF

OrgITU-TOverviewThe Study Groups of ITU’s Telecommunication StandardizationSector (ITU-T) assemble expertsfrom around the world to developinternational standards known asITU-T Recommendations whichact as defining elements in theglobal infrastructure of informationand communication technologies(ICTs). Standards are critical tothe interoperability of ICTs andwhether we exchange voice,video or data messages, standards enable global communications by ensuring that countries’ICT networks and devices arespeaking the same language.InitiativeNameWorkshop on"Caller IDSpoofing"Initiative DescriptionsThe main objective of thisworkshop is to present thecurrent status of this issue inboth of the PSTN and IP environments, and the relevantactivities within and outsideITU-T, and to share experiences, analyze and discussthe issue from both technicaland regulatory aspects, andto consider proposals on future activities and the potential of cooperation, based ona comprehensive understanding of this issue that could beachieved through this workshop.Other sand-Seminars/callerid/Pages/default.aspxApproved IETFRecommendationon CertificatesGSMAGSMA is an industry alliance organization.MemberWhite Paperson Caller IDGo to http://www.gsma.comand type in "Secure CallerID." Several papers and documents can be downloadedon industry and alliance organization members’thoughts on Caller ID security.International Calling Party NumberDelivery, CallingLine IdentificationFinnish Mobile IDSome examples are on theright.Conference Callingand Caller IDEcosystem to secure contact withend-users and collect information(video calls, telephone calls, callerID, etc.)Page 15

OrgATISOverviewATIS NGIIFInitiative NameNext Generation Interconnection InteroperabilityForum (NGIIF)'s missionis to address next-generation network interconnection and interoperability issues associated withemerging tech

Uverse and wireless portfolio that support Call Blocking (Black list) Call Screening Call ID White List Do Not Disturb Call Tracing . Page 2 Summary for Wireline Call Block / Call Screen Fee Based 10 number block capacity .