Imagine you get a call from your spouse’s number and the caller informs that s/he has suffered a deadly accident on road. You immediately need to remit certain amount of money to a certain account for his immediate surgery to save his/her life. Also, they inform you that they are rushing your spouse to XYZ Hospital. What will you do now? An average person would remit the money instantly and if you have a strong nerve, you may call back to verify again before remitting the money. You call back and find the number switched off. Now? Would you take the chance and wait until you can confirm it OR take a risk and remit the money?
However you react, a Spoof Call has just bullied you. May be an old friend just played a prank with you or a gang of rogues have a genuine intention to make some money out of your pusillanimity. This one of the many ways technology can be exploited to con you. Caller ID Spoofing is the practice of causing the telephone network to indicate to the receiver of a call that the originator of the call is a station/number other than the true originating station/number. For example, a Caller ID display might display a phone number different from that of the telephone from which the call was actually placed. The term is commonly used to describe situations in which the motivation is considered malicious by the speaker or writer.1
Caller ID Spoofing is a smart way of gaining an illegitimate advantage and in areas/countries where Law & Order situation is not in its best and Spoof Callers have a higher chance of success. Usually due to lack of governance, international VOIP providers never restrict their subscribers to change their caller-ID number. International VOIP users can change caller-ID and International Gateway usually to forward the call without any restriction. This allows VOIP users to make spoof calls. Call Spoofing is a trick played in guise of international calls made from a number of the same operator.
Whatever the intention, there’s no reason you’ll love to have Spoof Calls…but Spoof Callers love to make it! So…who wins? The result of this game is decided by the existence (or absence!) of a tool with your telecom operator – Call Filter Application.
Call Filter Application blocks Spoof Calls based on some rules. This application is integrated with the core network of the telecom operator and before any call is finally forwarded to the intended receiver, Call Filter Application carries out an audit to check if the call is a spoof. The result is the lowest possible chance that the users of the operator will be a victim of intended social and legal offenses tried through Spoof Calls.
In simple terms, when user makes a call, the telecom operator sends the call to the Call Filter Application. The Call Filter Application then sends a request to the operator’s Location Registers – HLR and HLR to VLR – instructing to originate the status of the caller. VLR checks 2 things regarding the caller – Caller’s Location and Caller’s Status (if his number is busy or free). Based on the current status of the caller, Call Filter Application notifies the Gateway Mobile Switching Centre (GMSC) of the operator either to ‘Allow’ or ‘Deny’ the call by sending ‘Continue’ and ‘Release’ message.
With Call Filter Application of SSD-TECH integrated in the network of your telecom operator your susceptibility to Spoof Calls – prank or prejudiced to fraudulent – is negligible and you live a life free of, at least, the anxiety of being bullied by telecom tricks!
MD. EFTEKHAR UDDIN CHOWDHURY
Head of Infrastructure, SSD-TECH Ltd.