Call Authentication Trust Anchor, 73360-73397 [2020-24904]
Download as PDF
73360
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
announcement of the effective date of
the rules. The total number of
respondents and total annual responses
are 817, the total annual burden hours
are 2,451 and no costs are associated
with this information collection. At a
later time, the Commission will seek
OMB approval of §§ 64.6303(b),
64.6305(b), and 64.6306(e) and the
information collection requirements
contained therein.
FEDERAL COMMUNICATIONS
COMMISSION
47 CFR Part 64
[WC Docket No. 17–97; FCC 20–136; FRS
17172]
Call Authentication Trust Anchor
Federal Communications
Commission.
ACTION: Final rule.
AGENCY:
In this document, the Federal
Communications Commission
(Commission) adopts rules
implementing the Pallone-Thune
Telephone Robocall Abuse Criminal
Enforcement and Deterrence Act
(TRACED Act), promoting the
deployment of caller ID authentication
technology, and combatting the practice
of illegal caller ID spoofing. In doing so,
the Second Report and Order adopts
rules governing intermediate providers
and caller ID authentication in non-IP
networks, implementing the exceptions
and extensions established by the
TRACED Act, and prohibiting line-item
charges for caller ID authentication.
DATES: Effective December 17, 2020,
except for instruction 10 (§ 64.6306)
which is effective November 17, 2020
and instruction 6 (§ 64.6303(b)),
instruction 9 (§ 64.6305(b) and (c)), and
instruction 11 (§ 64.6306(e)) which are
delayed indefinitely. The Commission
will publish a document in the Federal
Register announcing the effective date
of these instructions.
FOR FURTHER INFORMATION CONTACT: For
further information, please contact
Mason Shefa, Competition Policy
Division, Wireline Competition Bureau,
at Mason.Shefa@fcc.gov.
SUPPLEMENTARY INFORMATION: This is a
summary of the Commission’s Second
Report and Order in WC Docket Nos.
17–97, FCC 20–136, adopted on
September 29, 2020, and released on
October 1, 2020. The full text of this
document is available for public
inspection on the Commission’s website
at: https://docs.fcc.gov/public/
attachments/FCC-20-136A1.pdf.
The Commission received approval
from the Office of Management and
Budget (OMB) on November 2, 2020, for
a period of six months, of the
information collection requirements
relating to the voluntary
implementation exemption certification
rules contained in § 64.6306, which
shall be effective upon publication in
the Federal Register pursuant to 5
U.S.C. 553(d)(1). The OMB Control
Number is 3060–1278. The Commission
publishes this document as an
SUMMARY:
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
I. Introduction
1. Protecting Americans from the
dangers of unwanted and illegal
robocalls is our top consumer protection
priority. More than just an annoyance,
these calls are a tool for scammers to
take advantage of unsuspecting
Americans. Bad actors often ‘‘spoof’’ or
falsify caller ID information and deceive
call recipients into believing they are
trustworthy. Even in the midst of the
COVID–19 pandemic, bad actors have
continued their attempts to use illegal
spoofing to target American consumers,
once again illustrating the pervasiveness
of this problem.
2. As part of our multi-pronged
approach to combat this vexing issue,
we have made it a priority to stop the
practice of illegal caller ID spoofing. For
instance, we have issued hundreds of
millions of dollars in fines for violations
of our Truth in Caller ID rules. We
recently proposed a forfeiture of $225
million—the largest in the
Commission’s history—for a company
that made approximately one billion
spoofed robocalls, and we proposed two
forfeiture actions of almost $13 million
and $10 million apiece against other
entities for apparent spoofing violations.
We have expanded our Truth in Caller
ID rules to reach foreign calls and text
messages. Pursuant to the TRACED Act,
we have selected a consortium to
conduct private-led traceback efforts of
suspected illegal robocalls, which is
particularly useful in instances where
the caller ID information transmitted
with a call has been maliciously
spoofed. We have clarified and
bolstered our call blocking rules to give
voice service providers new latitude to
block calls, including spoofed calls.
3. One key part of our broad efforts to
thwart illegal caller ID spoofing has
been our work to promote
implementation of the STIR/SHAKEN
caller ID authentication framework. The
STIR/SHAKEN framework allows voice
service providers to verify that the caller
ID information transmitted with a
particular call matches the caller’s
number, while protecting consumer
privacy and promoting the ability to
complete lawful calls. Widespread
implementation of STIR/SHAKEN will
PO 00000
Frm 00002
Fmt 4701
Sfmt 4700
reduce the effectiveness of illegal
spoofing, allow law enforcement to
identify bad actors more easily, and
help voice service providers identify
calls with illegally spoofed caller ID
information before those calls reach
their subscribers. We have worked over
the course of multiple years to promote
caller ID authentication, and in 2019
Congress amplified our efforts by
passing the Pallone-Thune Telephone
Robocall Abuse Criminal Enforcement
and Deterrence (TRACED) Act, which
directs the Commission to take
numerous steps to promote and require
STIR/SHAKEN implementation. In
March of this year, building on the
foundation laid by our prior work and
by Congress, we adopted rules requiring
voice service providers to implement
the STIR/SHAKEN call authentication
technology in the internet protocol (IP)
portions of their phone networks by
June 30, 2021 (85 FR 22029, April 21,
2020).
4. In this document, we continue our
work to promote the deployment of
caller ID authentication technology and
to implement the TRACED Act. After
consideration of the record, we adopt
rules implementing many of the
proposals we made in the First Caller ID
Authentication Report and Order and
Further Notice of Proposed Rulemaking
(FNPRM) (85 FR 22029, April 21, 2020
and 85 FR 22099, April 21, 2020).
Among other things, we adopt rules
governing intermediate providers and
caller ID authentication in non-IP
networks, we implement the exceptions
and extensions established by the
TRACED Act, and we prohibit line-item
charges for caller ID authentication.
II. Background
5. As the telecommunications
industry has advanced and expanded
into IP-based telephony, costs have
decreased as competition increased,
benefitting consumers greatly. These
benefits, however, have eroded the
chains of trust that previously bound
voice service providers together. Partly
due to the rise of the Voice over internet
Protocol (VoIP) software, the telephony
industry no longer consists only of a
limited number of carriers that all
trusted each other to provide accurate
caller ID information. Because there are
now a multitude of voice service
providers and entities originating and
transiting calls, bad actors can more
easily take advantage of these weakened
chains of trust to target consumers with
illegally spoofed calls.
6. Recognizing this vulnerability,
technologists from the internet
Engineering Task Force (IETF) and the
Alliance for Telecommunications
E:\FR\FM\17NOR2.SGM
17NOR2
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
Industry Solutions (ATIS) developed
standards to allow the authentication
and verification of caller ID information
for calls carried over IP networks using
the Session Initiation Protocol (SIP).
Since voice service providers could no
longer count on the multitude of entities
in each call path to accurately pass the
caller ID information, the goal was to
create a system that allowed the
identification information to safely and
securely travel with the call itself. The
result is the STIR/SHAKEN call
authentication framework.
7. The framework is comprised of
several different standards and
protocols. The Secure Telephony
Identity Revisited (STIR) working group,
formed by the IETF, has produced
several protocols for authenticating
caller ID information. ATIS, together
with the SIP Forum, produced the
Signature-based Handling of Asserted
information using toKENs (SHAKEN)
specification, which standardizes how
the protocols produced by STIR are
implemented across the industry using
digital ‘‘certificates.’’ At a high-level, the
STIR/SHAKEN framework consists of
two components: (1) The technical
process of authenticating and verifying
caller ID information; and (2) the
certificate governance process that
maintains trust in the caller ID
authentication information transmitted
along with a call.
8. Technology. The STIR/SHAKEN
technical authentication and
verification processes rely on public key
cryptography to securely transmit the
information that the originating voice
service provider knows about the
identity of the caller and its relationship
to the phone number it is using
throughout the entire length of the call
path, allowing the terminating voice
service provider to verify the
information on the other end. In this
Report and Order, we use the term
‘‘caller’’ to broadly refer to the person or
entity originating a voice call. We
recognize that for the purpose of
industry standards or other technical
documents, this relationship may be
described using more exact language
suited to the specific technical scenarios
described. The encrypted caller ID
information is contained within a
unique header to the message used to
initiate a SIP call (the SIP INVITE
message), called an ‘‘Identity’’ header.
While there is no technical mechanism
within the STIR/SHAKEN framework
that ensures this Identity header travels
the entire length of the call path
unaltered, the unbroken transmission of
an unaltered Identity header from the
originating voice service provider,
through each intermediate provider, to
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
the terminating voice service provider is
critical to creating the end-to-end chain
of trust that allows a terminating
provider to know it has received
accurate caller ID information.
9. Because providers transmit the
Identity header in a SIP INVITE and
because SIP is IP-based, STIR/SHAKEN
only operates in the IP portions of a
provider’s network. If a call originates
on a non-IP network, that voice service
provider cannot authenticate the caller
ID information; if it terminates on a nonIP network, that voice service provider
cannot verify the caller ID
authentication information. And if a call
is routed at any point over an
interconnection point or intermediate
provider network that does not support
the transmission of SIP calls, the
Identity header will be lost. While
standards bodies are currently working
on non-IP call authentication solutions,
and some vendors are developing
potential non-IP solutions, there is yet
to be an industry consensus on the path
forward.
10. In the STIR/SHAKEN framework,
the provider adding the Identity header
to the SIP INVITE can use three
different levels of attestation to signify
what it knows about the identity of the
calling party. The highest level of
attestation is called full or A-level
attestation. A provider assigns an Alevel attestation when it is the entry
point of the call onto the IP network, it
can confirm the identity of the
subscriber making the call, and the
subscriber is using its associated
telephone number. The method or
process a provider uses to determine the
legitimacy of the caller’s use of a
telephone number is specific to each
provider. As a result, a provider’s
reputation is tied to the rigor of its
evaluation process. The middle level of
attestation is called partial or B-level
attestation. A provider uses a B-level
attestation to indicate that it is the entry
point of the call onto the IP network and
can confirm the identity of the
subscriber but not the telephone
number. The lowest level of attestation
is called gateway or C-level attestation.
A provider uses a C-level attestation
when it is the point of entry to the IP
network for a call that originated
elsewhere but has no relationship with
the initiator of a call, such as when a
provider is acting as an international
gateway. A downstream provider can
make use of a C-level attestation to trace
a call back to an interconnecting service
provider or the call’s entry point into
the IP network. The STIR/SHAKEN
standards envision these various
attestation levels as information that can
facilitate traceback and to enhance the
PO 00000
Frm 00003
Fmt 4701
Sfmt 4700
73361
spam identification solutions that
terminating voice service providers
enable for their customers.
11. Governance. The STIR/SHAKEN
framework relies on digital
‘‘certificates’’ to ensure trust. The voice
service provider adding the Identity
header includes its assigned certificate
which says, in essence, that the voice
service provider is the entity it claims
to be and that it has the right to
authenticate the caller ID information.
To maintain trust and accountability in
the voice service providers that vouch
for the caller ID information, a neutral
governance system issues the
certificates. The STIR/SHAKEN
governance model requires several roles
in order to operate: (1) A Governance
Authority, which defines the policies
and procedures for which entities can
issue or acquire certificates; (2) a Policy
Administrator, which applies the rules
set by the Governance Authority,
confirms that certification authorities
are authorized to issue certificates, and
confirms that voice service providers are
authorized to request and receive
certificates; (3) Certification Authorities,
which issue the certificates used to
authenticate and verify calls; and (4) the
voice service providers themselves,
which, as call initiators, select an
approved certification authority from
which to request a certificate, and
which, as call recipients, check with
certification authorities to ensure that
the certificates they receive were issued
by the correct certification authority.
Voice service providers use the digital
certificates to indicate that they are
trusted members of the ecosystem and
their assertions to a calling party’s
identity should be accepted.
12. Under the current Governance
Authority rules, a voice service provider
must meet certain requirements to
receive a certificate. Specifically, a voice
service provider must have a current
FCC Form 499A on file with the
Commission, have been assigned an
Operating Company Number (OCN), and
have direct access to telephone numbers
from the North American Numbering
Plan Administrator (NANPA) and the
National Pooling Administrator. The
Governance Authority reviews this
policy ‘‘at least on a quarterly basis,’’ or
as needed.
13. Commission Action to Promote
STIR/SHAKEN. In 2017, the
Commission released a Notice of Inquiry
into STIR/SHAKEN, launching a broad
examination of how to expedite its
development and implementation. The
Commission directed its expert advisory
committee on numbering, the North
American Numbering Council (NANC),
to recommend ‘‘criteria by which a
E:\FR\FM\17NOR2.SGM
17NOR2
73362
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
[Governance Authority] should be
selected’’ and ‘‘a reasonable timeline or
set of milestones for adoption and
deployment’’ of STIR/SHAKEN. In its
May 2018 report, the NANC made a
number of recommendations regarding
establishing and organizing a
governance system and promoting STIR/
SHAKEN implementation, which
Chairman Pai then accepted. In
November 2018, Chairman Pai sent
letters to 14 major voice service
providers urging them to implement a
robust caller ID authentication
framework by the end of 2019, asking
providers for specific details on their
progress and plans. In June 2019, the
Commission adopted a Declaratory
Ruling and Third Further Notice of
Proposed Rulemaking (84 FR 29387,
June 24, 2019, and 84 FR 29478, June
24, 2019) that proposed and sought
comment on mandating implementation
of STIR/SHAKEN in the event that
major voice service providers did not
voluntarily implement the framework
by the end of 2019. Commission staff
closely tracked the implementation
progress of major voice service
providers. In December 2019, Congress
enacted the TRACED Act, which
contains numerous provisions directed
at addressing robocalls, including
through implementation of STIR/
SHAKEN. Among other provisions
regarding caller ID authentication, the
TRACED Act directed the Commission
to require, no later than 18 months from
enactment, all voice service providers to
implement STIR/SHAKEN in the IP
portions of their networks and
implement an effective caller ID
authentication framework in the non-IP
portions of their networks.
14. In March of this year, we released
the First Caller ID Authentication
Report and Order and FNPRM in which
we adopted rules requiring voice service
providers to implement the STIR/
SHAKEN caller ID authentication
framework in the IP portions of their
networks by June 30, 2021. We also
proposed and sought comment on
requirements to strengthen STIR/
SHAKEN to implement the TRACED
Act. First, we proposed to extend the
STIR/SHAKEN implementation
mandate to intermediate providers and
require them to both pass authenticated
caller ID information unaltered and to
authenticate unauthenticated calls they
receive. Second, turning to TRACED Act
implementation, we proposed to grant
an extension for compliance with the
implementation mandate for certain
categories of voice service providers,
specifically small voice service
providers and voice service providers
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
that materially rely on non-IP networks.
Third, we proposed to require voice
service providers using non-IP
technology, which cannot support STIR/
SHAKEN, to either (i) upgrade their
networks to IP to enable STIR/SHAKEN
implementation or (ii) work to develop
non-IP caller ID authentication
technology. Fourth, we proposed to
implement a process, as directed by the
TRACED Act, pursuant to which voice
service providers may become exempt
from the STIR/SHAKEN
implementation mandate if we
determine that they have achieved
certain implementation benchmarks.
Fifth, we proposed to prohibit voice
service providers from imposing
additional line item charges on
consumer and small business
subscribers for caller ID authentication.
Sixth, we sought comment on how to
address consumer confusion or
competition issues related to call
labeling. We are continuing to monitor
when and how terminating voice service
providers label calls based on STIR/
SHAKEN information and will not act
on this matter at this time. Finally, we
sought comment, as directed by the
TRACED Act, on whether and how to
modify our policies regarding access to
numbering resources to help reduce
illegal robocallers’ access. We are
continuing to review the record
regarding access to numbering resources
and will not act on this matter at this
time.
15. Implementation Progress. As
reported previously, major voice service
providers fell into one of three
categories regarding their
implementation progress by the end of
2019: (1) Voice service providers that
upgraded their networks to support
STIR/SHAKEN and began exchanging
authenticated traffic with other voice
service providers; (2) voice service
providers that upgraded their networks
to support STIR/SHAKEN but had not
yet begun exchanging authenticated
traffic with other voice service
providers; and (3) voice service
providers that had achieved limited, if
any, progress towards upgrading their
networks to support STIR/SHAKEN.
Since the end of 2019, several major
voice service providers have announced
further progress in STIR/SHAKEN
implementation. In February 2020, TMobile announced that it began
exchanging authenticated traffic with
Sprint, and in March 2020, Bandwidth
announced that it has begun exchanging
authenticated traffic with T-Mobile. In
addition to the 14 major voice service
providers discussed in detail in the First
Caller ID Authentication Report and
PO 00000
Frm 00004
Fmt 4701
Sfmt 4700
Order and FNPRM, other voice service
providers and intermediate providers
have made progress toward STIR/
SHAKEN implementation as well. The
Governance Authority reports that 34
voice service providers have been
approved to participate in the STIR/
SHAKEN framework through the
governance system; 9 providers have
completed the testing process and are
finalizing their approval; and 52
providers have begun registration and
are in some stage of the testing process.
III. Second Report and Order
16. In this document, we take the next
steps to promote the widespread
deployment of caller ID authentication
technology and implement the TRACED
Act. In the Report and Order, we first
address the definitions and scope of
several terms used in the TRACED Act.
Next, we adopt rules on caller ID
authentication in non-IP networks. We
assess the burdens and barriers to
implementation faced by various
categories of voice service providers and
adopt extensions to the STIR/SHAKEN
mandate based on our assessment. We
also establish the required robocall
mitigation program that voice service
providers with an extension must
implement and elaborate on the annual
reevaluation process for extensions
required by the TRACED Act. We then
adopt rules implementing the
exemption mechanism established by
the TRACED Act for voice service
providers that meet certain criteria
regarding early STIR/SHAKEN
implementation. We prohibit voice
service providers from imposing
additional line item charges for call
authentication technology. Finally, to
avoid gaps in a call path that could lead
to the loss of caller ID authentication
information, we expand our STIR/
SHAKEN implementation mandate to
encompass intermediate providers.
A. TRACED Act Definitions and Scope
17. In the First Caller ID
Authentication Report and Order and
FNPRM, we adopted definitions of
several terms used in the TRACED Act.
Specifically, we adopted definitions of
‘‘STIR/SHAKEN authentication
framework’’ and ‘‘voice service’’ that
closely align with the statutory language
enacted by Congress. To provide an
opportunity for further refinement of the
definitions we adopted, we sought
comment in the FNPRM on whether to
alter or add to them. We also proposed
in the FNPRM to interpret ‘‘providers of
voice service’’ on a call-by-call basis
rather than a provider-by-provider basis
in order to best effectuate Congressional
direction. In other words, we proposed
E:\FR\FM\17NOR2.SGM
17NOR2
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
evaluating whether a specific entity is a
voice service provider (i.e., ‘‘provider of
voice service’’) within the meaning of
the TRACED Act on the basis of the
entity’s role with respect to a particular
call, rather than based on the entity’s
characteristics as a whole. In this
document, we reaffirm our definitions
of ‘‘STIR/SHAKEN authentication
framework’’ and ‘‘voice service,’’ and
adopt a rule codifying our proposed
interpretation of ‘‘providers of voice
service.’’
18. Definition of ‘‘STIR/SHAKEN
Authentication Framework.’’ The
definition of ‘‘STIR/SHAKEN
authentication framework’’ that we
adopted in the First Caller ID
Authentication Report and Order and
FNPRM closely tracks the language
Congress used in the TRACED Act. In
the Report and Order, we defined
‘‘STIR/SHAKEN authentication
framework’’ as ‘‘the secure telephone
identity revisited and signature-based
handling of asserted information using
tokens standards.’’ We did not receive
any comments in the record seeking
clarification, so we reaffirm the
definition we adopted previously.
19. Definition of ‘‘Voice Service.’’ We
next reaffirm the definition of ‘‘voice
service’’ that we adopted in the First
Caller ID Authentication Report and
Order and FNPRM. Specifically, we
defined ‘‘voice service’’ as a service
‘‘that is interconnected with the public
switched telephone network and that
furnishes voice communications to an
end user,’’ and which includes ‘‘without
limitation, any service that enables realtime, two-way voice communications,
including any service that requires [IP]compatible customer premises
equipment . . . and permits out-bound
calling, whether or not the service is
one-way or two-way voice over [IP].’’
The definition we adopted is identical
to the language Congress included in the
TRACED Act. We explained in the First
Caller ID Authentication Report and
Order and FNPRM that, based on the
definition of ‘‘voice service’’ we
adopted, our STIR/SHAKEN rules apply
to ‘‘all types of voice service providers—
wireline, wireless, and Voice over
internet Protocol (VoIP) providers,’’
including both two-way and one-way
interconnected VoIP providers. And we
clarified that voice service providers
which lack control over the network
infrastructure necessary to implement
STIR/SHAKEN are not subject to our
implementation requirements.
Commenters that address the issues
nearly unanimously support our
definition and interpretation of ‘‘voice
service,’’ though several commenters
seek further clarification. Noble Systems
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
argues that the Commission should
interpret our definition of ‘‘voice
service’’ broadly to encompass
intermediate providers. We maintain
our belief that the statutory language of
the TRACED Act forecloses this
interpretation by specifying that ‘‘voice
service’’ means a service that ‘‘furnishes
voice communications to an end user.’’
20. First, NCTA and CenturyLink
advocate for us to interpret our rules to
apply to ‘‘over-the-top (OTT) service
that possess technical control over the
origination of calls on their platforms.’’
No commenter opposed these requests.
We reiterate our belief that for STIR/
SHAKEN to be successful, every service
provider capable of implementing the
framework must participate. We
therefore conclude that to the extent a
provider of OTT service provides ‘‘voice
service,’’ and has control of the relevant
network infrastructure to implement
STIR/SHAKEN, it is subject to our rules.
21. NCTA further encourages us to
revise the current definition of
‘‘interconnected VoIP’’ found in § 9.3 of
our rules in order to ‘‘harmonize’’ it
with our caller ID authentication
regulations. Section 9.3 generally limits
‘‘interconnected VoIP service’’ to twoway interconnected VoIP and only
includes one-way VoIP as
‘‘interconnected VoIP’’ in the context of
the Commission’s 911 obligations. We
understand the definition of ‘‘voice
service’’ that Congress adopted in the
TRACED Act to encompass both twoway and one-way interconnected VoIP.
Because we rely on the statutory term
‘‘voice service’’ and because the
meaning of that term is not limited by
the definition of ‘‘interconnected VoIP’’
in § 9.3 of our rules, we see no reason
to revisit of the definition of
interconnected VoIP in § 9.3 in this
proceeding.
22. Second, Microsoft argues that the
definition of ‘‘voice service’’ should be
read to exclude inbound-only VoIP
service. Microsoft argues that this
service is outside the scope of the STIR/
SHAKEN standards, and that the
reference to service that ‘‘permits outbound calling’’ in the TRACED Act
definition precludes application of our
requirement to inbound-only VoIP
service. We disagree. We understand the
TRACED Act—which defines ‘‘voice
service’’ to mean ‘‘any service that is
interconnected with the public switched
telephone network and that furnishes
voice communications to an end user’’
and includes, ‘‘without limitation, any
service that enables real-time, two-way
voice communications, including any
service that . . . permits out-bound
calling’’—to establish a broad concept of
voice service. We read the phrase
PO 00000
Frm 00005
Fmt 4701
Sfmt 4700
73363
‘‘without limitation’’ as indicating that
the subsequent phrase ‘‘permits outbound calling’’ is not a limitation on the
initial, general definition of ‘‘voice
service,’’ which encompasses in-bound
VoIP. Similarly, in the context of our
Truth in Caller ID rules, we interpreted
the term ‘‘interconnected’’ as used in a
substantially similar definition of ‘‘voice
service’’ in the RAY BAUM’s Act to
include any service that allows voice
communications either to or from the
public switched telephone network
(PSTN), regardless of whether inbound
and outbound communications are both
enabled within the same service.
Because our STIR/SHAKEN rules
impose obligations on both the
originating and terminating side of a
call, we believe that this broad reading
of ‘‘interconnected’’ is also appropriate
here. Further, reaching in-bound VoIP
advances the purposes of the TRACED
Act and widespread caller ID
authentication. Our rules, consistent
with the ATIS standards, require a voice
service provider terminating a call with
authenticated caller ID information to
verify that information according to the
STIR/SHAKEN framework. We thus
reject Microsoft’s argument that
reaching in-bound VoIP is unnecessary
because the standards comprising STIR/
SHAKEN do not assign actions to be
taken when terminating a call.
23. Definition of ‘‘Providers of Voice
Service’’—Call-by-Call Basis. Congress
directed many of the TRACED Act caller
ID authentication requirements to
‘‘providers of voice service.’’ We
proposed in the First Caller ID
Authentication Report and Order and
FNPRM to interpret ‘‘providers of voice
service’’ on a call-by-call—rather than
entity-by-entity—basis. Under this
interpretation, a provider of voice
service is not subject to TRACED Act
requirements for all services simply
because some of its services fall under
the definition of ‘‘voice service.’’
Instead, only those services that meet
the TRACED Act definition of ‘‘voice
service’’ are subject to TRACED Act
obligations. We adopt our proposal.
Both commenters that addressed the
issue support our proposal. We find that
the call-by-call approach best fits the
TRACED Act’s structure because it gives
meaning to Congress’s inclusion of a
definition for ‘‘voice service’’ and
because it best comports with the
TRACED Act’s allocation of duties on
the basis of call technology, e.g.,
differentiating duties between calls over
IP and non-IP networks.
E:\FR\FM\17NOR2.SGM
17NOR2
73364
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
B. Caller ID Authentication in Non-IP
Networks
24. The TRACED Act directs us, not
later than June 30, 2021, to require voice
service providers to take ‘‘reasonable
measures’’ to implement an effective
caller ID authentication framework in
the non-IP portions of their networks.
Given the large proportion of TDMbased networks still in use, we expect
a significant number of calls to be
outside the STIR/SHAKEN
authentication framework in the near
term. In light of this, it is critically
important that we take strong action to
address the issue of caller ID
authentication in non-IP networks. To
that end, we interpret the TRACED Act’s
requirement that a voice service
provider take ‘‘reasonable measures’’ to
implement an effective caller ID
authentication framework in the non-IP
portions of its network as being satisfied
only if the voice service provider is
actively working to implement a caller
ID authentication framework on those
portions of its network. A voice service
provider satisfies this obligation by
either (1) completely upgrading its nonIP networks to IP and implementing the
STIR/SHAKEN authentication
framework on its entire network, or (2)
working to develop a non-IP
authentication solution. We adopt rules
accordingly, and find that this approach
best balances our goal of promoting the
IP transition while simultaneously
encouraging the development of a nonIP authentication solution for the benefit
of those networks that cannot be
speedily or easily transitioned. By
adopting rules that are not overly
burdensome, we leave voice service
providers free to prioritize transitioning
to IP, and we strongly encourage voice
service providers to take advantage of
this opportunity to do so.
25. In the First Caller ID
Authentication Report and Order and
FNPRM, we proposed that a voice
service provider satisfies the
‘‘reasonable measures’’ requirement
under section 4(b)(1)(B) of the TRACED
Act if it is able to provide us, upon
request, with documented proof that it
is participating, either on its own or
through a representative, as a member of
a working group, industry standards
group, or consortium that is working to
develop a non-IP solution, or actively
testing such a solution. We explained
that this proposal was consistent with
our proposed approach to assessing
whether a voice service provider is
making ‘‘reasonable efforts’’ to develop
a caller ID authentication protocol in the
context of determining whether to limit
or terminate an extension of compliance
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
granted under section 4(b)(5)(B) for nonIP networks. We adopt a new rule
reflecting this proposal and clarify its
specific requirements.
26. Under our rule, a voice service
provider satisfies its obligations if it
participates through a third-party
representative, such as a trade
association of which it is a member or
vendor. While our proposal did not
include mention of trade associations or
vendors, we agree with CCA that it
would be best to broaden the scope of
this requirement by including such
representatives within the bounds of our
requirement. Some industry groups
have already established working
groups dedicated to examining potential
non-IP call authentication technologies.
Allowing for such representatives will
reduce the burden of this obligation on
individual voice service providers and
minimize the potential negative impact
of broad and inexpert participation
identified in the record, while ensuring
that all voice service providers remain
invested in developing a solution for
non-IP caller ID authentication. A wider
range of efforts will encourage a greater
number of industry partnerships,
increasing resource and information
sharing and speeding the development
of a non-IP solution.
27. We expect the benefits of this
approach to be numerous, and the costs
to voice service providers comparatively
small. While some commenters
provided estimates of the cost of
replacing their non-IP networks, none
provided estimates of the cost of
working to develop a caller ID
authentication solution for non-IP
networks. Given that our firm but
flexible approach permits voice service
providers to satisfy this obligation by
participating either on their own or
through a representative, as members of
a working group or consortium that is
working to develop or actively testing a
non-IP solution, we expect that any
related compliance costs will be quite
limited. By comparison, the benefits of
voice service providers either upgrading
their non-IP networks to IP to support
STIR/SHAKEN or working to develop a
caller ID authentication solution for
non-IP networks will be considerable,
not only in the less tangible benefits
they will have for consumers by
reducing the waste and frustration
resulting from illegal robocalls, but in
terms of actual monetary savings.
Indeed, as we found in the First Caller
ID Authentication Report and Order and
FNPRM, the monetary benefits of STIR/
SHAKEN are likely to be in the billions
of dollars. The greater the number of
voice service providers that implement
an effective caller ID authentication
PO 00000
Frm 00006
Fmt 4701
Sfmt 4700
framework—either by upgrading their
non-IP networks to IP and implementing
STIR/SHAKEN, or by developing and
implementing an effective non-IP
solution—the more effective these
frameworks will be in combatting illegal
robocalls, and the more of the expected
benefits will be realized. Thus, the rules
we adopt in this document will help
achieve these savings while
simultaneously minimizing the cost of
compliance.
28. We disagree with ATIS’s
contention that we should not adopt
rules governing non-IP caller ID
authentication until the joint ATIS/SIP
Forum IP–NNI Task Force concludes its
work investigating the viability of nonIP caller ID authentication frameworks.
Given that this task force is precisely the
kind expressly contemplated, and
indeed, mandated, by our order in this
document, we see no reason to delay
these rules. Indeed, the Task Force’s
existence is confirmation that we have
construed the ‘‘reasonable measures’’
standard in a manner that appropriately
dovetails with current industry efforts to
develop a non-IP solution. Further, the
rules we adopt in this document are
required by Congressional direction to
mandate voice service providers to take
‘‘reasonable measures’’ to implement a
non-internet Protocol no later than June
30, 2021; we have no discretion to wait
until a given task force has concluded
its work to adopt rules.
29. Although CTIA argues that
requiring voice service providers to
participate in industry standards groups
committed to developing or actively
testing a non-IP solution ‘‘may not
improve the development’’ of such
solutions, and would in fact ‘‘divert
resources from STIR/SHAKEN
deployment and other robocalls
mitigation efforts,’’ it offers no
alternative interpretation of the
‘‘reasonable measures’’ standard
mandated by Congress in the TRACED
Act. We must impose a meaningful
mandate to fulfill Congress’s direction
to require ‘‘reasonable measures to
implement’’ a non-IP caller ID
authentication solution. Requiring voice
service providers that choose not to
upgrade their non-IP networks to IP to
contribute to groups and organizations
that are working to test or develop a
non-IP solution strikes a balance
between promoting caller ID
authentication solutions for TDM
networks, as required by the TRACED
Act, and leaving resources free to invest
in IP networks. By allowing
participation through a working group,
consortium, or trade association, we
allow voice service providers to
efficiently pool their expertise and
E:\FR\FM\17NOR2.SGM
17NOR2
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
resources with the goal of not
replicating one another’s efforts and
more efficiently developing a non-IP
solution. We therefore are not
convinced by CTIA’s arguments that the
requirement we adopt will unduly stunt
STIR/SHAKEN deployment or that
voice service providers will have ‘‘few
resources left to dedicate to industry
standards groups.’’
30. We are likewise unconvinced by
TransNexus’s conclusory claim that
participating in a working group would
not constitute a ‘‘reasonable effort’’ to
implement an effective caller ID
authentication framework on non-IP
networks. Contributing to an industryled body dedicated to pooling expertise
and resources in the hopes of
developing and/or testing non-IP
solutions is a reasonable and efficient
strategy for encouraging the creation
and deployment of such solutions.
31. Out-of-Band STIR. We decline to
mandate out-of-band STIR for non-IP
networks. Out-of-band STIR is a
proposed non-IP solution whereby
caller ID authentication information is
sent across the internet, out-of-band
from the call path. Commenters have
widely divergent views as to the
viability of out-of-band STIR as a
method of effective caller ID
authentication in non-IP networks.
While a handful advocate for the
implementation of out-of-band STIR as
the best method of ensuring effective
call authentication in non-IP networks,
with Neustar even claiming that this
solution should be widely available in
advance of the June 30, 2021
implementation deadline, many others
contend that out-of-band STIR is not yet
a viable solution. Comcast claims that
out-of-band STIR is an untested, timeconsuming, and costly solution that
would require the re-creation of
multiple network functions in parallel
to IP networks. Given the undeniably
sharp divide between commenters and
the absence of sufficient testing and
implementation to demonstrate the
viability of out-of-band STIR as an
industrywide solution, we find that it is
not possible to conclude, based on the
record before us, that out-of-band STIR
is an effective non-IP solution. We find
that significant industry consensus is an
important predicate to deeming a nonIP solution ‘‘effective,’’ given that crossnetwork exchange of authenticated
caller ID information is a central
component to caller ID authentication.
Thus, we cannot at this time mandate
adoption of out-of-band STIR by voice
service providers in the non-IP portions
of their networks. At the same time, we
observe that opponents of this
technology have offered no meaningful
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
alternative solutions. To those that
would oppose this possible solution
without mention of an alternative, we
take this opportunity to note that
standards work requires both
constructive input and compromise on
the part of all parties and stakeholders.
32. Effective Non-IP Caller ID
Authentication Framework. As we
explain in the context of the extension
of the implementation deadline for
certain non-IP networks, we will
continue to evaluate whether an
effective non-IP caller ID authentication
framework emerges from the ongoing
work that we require. Consistent with
that section, we will consider a non-IP
caller ID authentication framework to be
effective only if it is: (1) Fully
developed and finalized by industry
standards; and (2) reasonably available
such that the underlying equipment and
software necessary to implement such
protocol is available on the commercial
market. An effective framework would
exist when the fundamental aspects of
the protocol are standardized and
implementable by industry and the
equipment and software necessary for
implementation is commercially
available. If and when we identify an
effective framework, we expect to revisit
our ‘‘reasonable measures’’ requirement
and shift it from focusing on
development to focusing on
implementation. We encourage voice
service providers and others to put
forward a framework they view as
effective for our consideration. We also
will continue to monitor progress in
developing a non-IP authentication
solution and may revisit our approach
to the TRACED Act’s ‘‘reasonable
measures’’ requirement if we find that
industry has failed to make sufficient
progress in either transitioning to IP or
developing a consensus non-IP
authentication solution. We stand ready
to pursue additional steps to ensure
more fulsome caller ID authentication in
non-IP networks, including by revisiting
our non-prescriptive development-based
approach if needed.
33. Legal Authority. We find authority
for these rules under section 4(b)(1)(B)
of the TRACED Act. That section
expressly directs us to obligate voice
service providers to take ‘‘reasonable
measures’’ to implement an effective
caller ID authentication framework in
the non-IP portions of their networks
and is a clear source of authority for
these non-IP obligations.
34. We also conclude that section
251(e) of the Communications Act of
1934, as amended (the Act), provides
additional independent authority to
adopt these rules. Section 251(e)
provides us ‘‘exclusive jurisdiction over
PO 00000
Frm 00007
Fmt 4701
Sfmt 4700
73365
those portions of the North American
Numbering Plan (NANP) that pertain to
the United States.’’ Pursuant to this
provision, we retain ‘‘authority to set
policy with respect to all facets of
numbering administration in the United
States.’’ Our exclusive jurisdiction over
numbering policy enables us to act
flexibly and expeditiously with regard
to important numbering matters. When
bad actors unlawfully falsify or spoof
the caller ID that appears on a
subscriber’s phone, they are using
numbering resources to advance an
illegal scheme. Mandating that voice
service providers take ‘‘reasonable
measures’’ to deploy an effective caller
ID authentication framework in the nonIP portions of their networks will help
to prevent the fraudulent exploitation of
NANP resources by permitting those
providers and their subscribers to
identify when caller ID information has
been spoofed. Section 251(e) thus grants
us authority to mandate that voice
service providers take ‘‘reasonable
measures’’ to implement an effective
caller ID authentication framework in
the non-IP portions of their networks in
order to prevent the fraudulent
exploitation of numbering resources.
Moreover, as the Commission has
previously found, section 251(e) extends
to ‘‘the use of . . . unallocated and
unused numbers’’; it thus gives us
authority to mandate that voice service
providers implement an effective caller
ID authentication framework to address
the spoofing of unallocated and unused
numbers.
35. Finally, we find authority under
the Truth in Caller ID Act. Congress
charged us with prescribing regulations
to implement that Act, which made
unlawful the spoofing of caller ID
information ‘‘in connection with any
voice service or text messaging service
. . . with the intent to defraud, cause
harm, or wrongfully obtain anything of
value.’’ Given the constantly evolving
tactics by malicious callers to use
spoofed caller ID information to commit
fraud, we find that the rules we adopt
in this document are necessary to enable
voice service providers to help prevent
these unlawful acts and to protect voice
service subscribers from scammers and
bad actors. Thus, section 227(e)
provides additional independent
authority for these rules.
C. Extension of Implementation
Deadline
36. The TRACED Act includes two
provisions for extension of the June 30,
2021 implementation date for caller ID
authentication frameworks. First, the
TRACED Act states that we ‘‘may, upon
a public finding of undue hardship,
E:\FR\FM\17NOR2.SGM
17NOR2
73366
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
delay required compliance’’ with the
June 30, 2021 date for caller ID
authentication framework
implementation for a ‘‘reasonable period
of time.’’ Second, we ‘‘shall grant a
delay of required compliance’’ with the
June 30, 2021 implementation date ‘‘to
the extent that . . . a provider or class
of providers of voice services, or type of
voice calls, materially relies on a non[IP] network for the provision of such
service or calls’’ ‘‘until a call
authentication protocol has been
developed for calls developed over non[IP] networks and is reasonably
available.’’
37. Under either extension provision,
an extension may be provider-specific
or apply to a ‘‘class of providers of voice
service, or type of voice calls.’’ We must
annually reevaluate any granted
extension for compliance. When
granting an extension of the
implementation deadline under either
provision, we must require impacted
voice service providers to ‘‘implement
an appropriate robocall mitigation
program to prevent unlawful robocalls
from originating on the network of the
provider.’’
38. Based on these directives and for
the reasons discussed below, we grant
the following extensions from
implementation of caller ID
authentication: (1) A two-year extension
to small, including small rural, voice
service providers; (2) an extension to
voice service providers that cannot
obtain a certificate due to the
Governance Authority’s token access
policy until such provider is able to
obtain a certificate; (3) a one-year
extension to services scheduled for
section 214 discontinuance; and (4) as
required by the TRACED Act, an
extension for the parts of a voice service
provider’s network that rely on
technology that cannot initiate,
maintain, and terminate SIP calls until
a solution for such calls is reasonably
available. If at any point after receiving
an extension a voice service provider no
longer meets the extension criteria set
for in this Second Report and Order, the
extension will terminate. Upon
termination of an extension, a voice
service provider will be required to
comply with our STIR/SHAKEN
implementation mandate immediately.
We further direct the Wireline
Competition Bureau (Bureau) to
reevaluate extensions annually, and we
require any voice service provider that
receives an extension to implement and
certify that it has implemented a
robocall mitigation program by June 30,
2021.
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
1. Assessment of Burdens and Barriers
to Implementation and Extensions for
Undue Hardship
39. The TRACED Act grants us the
discretion to extend a voice service
provider’s obligation to comply with the
June 30, 2021 caller ID authentication
implementation mandate upon a public
finding of undue hardship. It states that
the extension may be ‘‘for a reasonable
period of time . . . as necessary . . . to
address the identified burdens and
barriers.’’ In connection with our
determination of whether to grant an
extension, the TRACED Act specifically
directs us, not later than December 30,
2020 ‘‘and as appropriate thereafter,’’ to
assess any burdens and barriers to
implementation of caller ID
authentication technology by (1) voice
service providers that use time-division
multiplexing network technology
(TDM), a non-IP network technology; (2)
small voice service providers; and (3)
rural voice service providers. It further
directs us to assess burdens and barriers
created by the ‘‘inability to purchase or
upgrade equipment to support the call
authentication frameworks . . . or lack
of availability of such equipment.’’ The
TRACED Act does not require us to
grant undue hardship extensions to the
categories of entities for which we must
evaluate burdens and barriers to
implementation, nor does it limit us to
granting undue hardship extensions to
entities within the categories for
evaluation that it identifies. Based upon
our review of the record, including our
evaluation of burdens and barriers to
implementation by certain categories of
entities as directed by the TRACED Act,
we grant extensions to: (1) Small,
including small rural, voice service
providers; (2) voice service providers
that cannot obtain the certificate
necessary for STIR/SHAKEN; and (3)
services subject to a discontinuance
application. We decline to grant
requested extensions for non-IP
services, for larger rural voice service
providers, due to equipment
unavailability, for enterprise calls, for
intra-network calls, or due to
compatibility issues.
40. Extension for Small Voice Service
Providers. The TRACED Act specifically
directs us to evaluate whether to grant
an extension based on undue hardship
for small voice service providers. In the
First Caller ID Authentication Report
and Order and FNPRM, we proposed
granting a one-year implementation
extension due to undue hardship for
small, including small rural, voice
service providers. After reviewing the
record, we grant a two-year extension
for small voice service providers, which
PO 00000
Frm 00008
Fmt 4701
Sfmt 4700
we define as those with 100,000 or
fewer voice subscriber lines.
41. The record reflects that a barrier
to STIR/SHAKEN implementation for
small voice service providers is the
substantial cost, despite resource
constraints, to implement STIR/
SHAKEN. For instance, according to
CTIA, ‘‘many small providers face
financial and resource constraints that
other providers do not’’ as ‘‘[s]mall
providers are driving toward the
mandate deadline, but with fewer
employees and smaller budgets, they
may require more time to transition to
STIR/SHAKEN.’’ Small voice service
providers must also balance limited
resources and expenses with other
required technology transitions. Most
recently, commenters explain that the
COVID–19 pandemic has monopolized
substantial available resources,
increasing the burden on small voice
service providers.
42. Relatedly, the record demonstrates
that equipment availability issues
specifically impact small voice service
providers. Such providers rely on thirdparty vendor solutions, particularly
software solutions, to implement STIR/
SHAKEN, and these solutions may be
prohibitively expensive for some small
voice service providers. For instance,
WISPA asserts that ‘‘[s]ome vendor’s
minimum fees could exceed a small
provider’s entire voice revenues.’’ WTA
agrees that the upfront expenses ‘‘could
cause a budget shortage for small
providers that have a limited, set multiyear budget that is already dedicated to
new deployments, staff, etc.’’ Further,
ACA Connects expresses concern over a
lack of transparency regarding the costs
and relative advantages of available
vendor solutions as its smaller voice
service provider members, with limited
budgets, must carefully apportion funds
for STIR/SHAKEN deployment. Indeed,
small voice service providers report
they have ‘‘been quoted annual rates
from different vendors that range from
the low five figures to the low six
figures, not including any upfront costs
to install the solution,’’ with no
explanation for the rate disparity. The
record reflects that as medium and large
voice service providers start to widely
deploy STIR/SHAKEN, new and
improved solutions will emerge,
increasing competition among vendors
and decreasing costs. In addition,
multiple commenters contend that small
voice service providers are unable ‘‘to
procure ready-to-install solutions’’ from
a variety of vendors ‘‘on the same
timeframe as the nation’s largest voice
service providers.’’ According to NTCA,
its members ‘‘are typically ‘at the mercy’
of vendors that respond to the larger
E:\FR\FM\17NOR2.SGM
17NOR2
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
operator community muc[h] faster,
likely based on the latter’s market share
and buying power.’’ As a result, timing
and availability of these vendor
solutions may be out of the control and
reach of small voice service providers.
Further, commenters contend that these
vendor solutions remain at an early
stage of development and ‘‘far from
‘ready to install’ solutions.’’
43. We are convinced by this record
that an extension is appropriate for
small voice service providers. The
record largely supports our proposal for
an implementation extension for small
voice service providers, and we agree
with these commenters that an
extension is warranted to allow small
providers sufficient time to address
challenges such as equipment cost and
availability. For instance, according to
ACA Connects, NTCA, WISPA, and
WTA, vendor costs may be prohibitively
expensive for small voice service
providers and could result in budget
shortages. Additional time will allow
voice service providers confronted with
budget shortages to spread costs over a
longer time horizon. Further, small
voice service providers claim vendor
solutions are still in nascent stages of
development, and an extension will
allow vendors that work with small
voice service providers more time to
develop solutions and offer those
solutions at a lower cost as the market
matures. Some small voice service
providers also describe the inability to
exchange traffic at non-IP
interconnection points as a barrier to the
exchange of calls with authenticated
caller ID information after
implementation of STIR/SHAKEN. In
addition, to the extent that it uses TDM
technology, a small voice service
provider must contend with the
associated technical and resource
constraints to implementation. We
address these issues separately.
44. Transaction Network Services and
AT&T contend that we should not grant
a blanket extension for small voice
service providers. These commenters
claim that such an extension would be
overinclusive because not all small
voice service providers face identical
hardships, and allege that illegal
robocalls may originate from these
providers. We disagree. The
overwhelming record support persuades
us that small voice service providers, as
a class, face undue hardship, and
supports the need for a blanket
implementation extension for such
providers to give them the necessary
time to implement STIR/SHAKEN. The
TRACED Act also identifies small voice
service providers as a class for which
the Commission should assess burdens
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
and barriers to implementation. Further,
as ACA Connects contends, granting
extensions on a case-by-case basis for
small voice service providers would
‘‘inundate the Commission with
extension requests from a multitude of
small providers, many of them
presenting evidence of the same or
similar implementation burdens’’ and
‘‘consume funds that would be better
spent working towards implementation
of STIR/SHAKEN.’’ We do not find that
this extension will unduly undermine
the effectiveness of STIR/SHAKEN. As
small voice service providers account
for only a small percentage of voice
subscribers, an extension covering these
providers will account for the unique
burdens they face while ensuring that
many subscribers benefit from STIR/
SHAKEN. Further, the prevalence of
STIR/SHAKEN will encourage small
voice service providers that can afford
to do so to implement the framework as
soon as possible to provide the
protections it offers to their subscribers.
And small voice service providers—like
all providers subject to an extension—
are obligated to implement a robocall
mitigation program to combat the
origination of illegal robocalls during
the course of the extension.
45. We conclude that the extension
we grant should run for two years,
subject to possible extension pursuant
to the evaluation discussed below.
Multiple commenters advocated for an
extension longer than one year. For
instance, WISPA and Atheral contend
that small voice service providers
require an extension of at least two
years beyond the implementation
deadline to ‘‘budget for and absorb the
cost of needed upgrades’’ and to ‘‘allow
for the development of vendor solutions
and reduction in cost to more affordable
levels as volume scales.’’ We expect this
extension for small voice service
providers will drive down
implementation costs by allowing these
providers to benefit from a more mature
market for equipment and software
solutions necessary to implement STIR/
SHAKEN. Small voice service providers
have also filed estimates of the cost of
implementing STIR/SHAKEN on their
networks. The additional
implementation time will allow these
providers to spread the cost of
implementation across a longer time
horizon. We find that an
implementation deadline of two-years
allows for sufficient time—but no more
than necessary—for small voice service
providers to meet the challenges of
implementing STIR/SHAKEN on their
networks. Our guiding principle in
setting this deadline is to achieve
PO 00000
Frm 00009
Fmt 4701
Sfmt 4700
73367
ubiquitous STIR/SHAKEN
implementation to combat the scourge
of illegal caller ID spoofing as quickly as
possible. This extension should also
ease the additional burdens placed on
small voice service providers by the
COVID–19 pandemic, which has
consumed significant resources.
46. We decline at this time NTCA’s
requests to tie an implementation
extension until June 30, 2023 to ‘‘the
vendor community delivering solutions
in 2020,’’ and to grant additional
implementation time for small voice
service providers ‘‘unable to obtain
vendor solutions by the end of 2020.’’
NTCA contends that the two-year
extension may be insufficient to resolve
the issues presented by the lack of IP
interconnection if vendor solutions are
not available to small voice service
providers by the end of 2020. We
separately address the issue of non-IP
interconnection. In the interest of
promoting ubiquitous STIR/SHAKEN
implementation, we decline at this time
to grant a longer extension for small
voice service providers that may face
continued implementation challenges in
the future. We find that a longer
extension would discourage the swift
development of effective vendor
solutions and slow the deployment of
STIR/SHAKEN to the detriment of
consumers. We also find that a longer
extension would unnecessarily rely on
speculation about marketplace realities
several years from now. The Bureau
may grant a further extension if it
determines such an extension is
appropriate in its annual reevaluation.
47. Finally, we establish that, as
proposed in the First Caller ID
Authentication Report and Order and
FNPRM, a provider is a ‘‘small
provider[] of voice service’’ for purposes
of this extension if it has 100,000 or
fewer voice subscriber lines (counting
the total of all business and residential
fixed subscriber lines and mobile
phones and aggregated over all of a
provider’s affiliates). In the First Rural
Call Completion Order (78 FR 76218,
Dec. 17, 2013), the Commission
determined that the 100,000-subscriberline threshold ensured that many
subscribers would continue to benefit
from our rules while also limiting the
burden on smaller voice service
providers. Similarly, we find that, in the
caller ID authentication context,
limiting the implementation extension
for small voice service providers to
those that have 100,000 or fewer voice
subscriber lines balances the needs of
these providers and the importance of
widespread and effective STIR/
SHAKEN implementation. We received
E:\FR\FM\17NOR2.SGM
17NOR2
73368
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
support in the record for this definition
of ‘‘small providers of voice service.’’
48. We decline at this time
USTelecom’s post-circulation request to
exclude voice service providers within
the 100,000-subscriber-line threshold
that ‘‘originate a disproportionate
amount of traffic relative to their
subscriber base, namely voice service
providers that serve enterprises and
other heavy callers through their IP
networks.’’ While we see value in the
policy goals that underlie USTelecom’s
request, implementing its suggestion
would require a difficult line-drawing
exercise. USTelecom did not offer any
support for its proposed criteria to
identify parties that originate a
disproportionate amount of traffic, nor
are we able to identify criteria in the
limited time available in which we have
confidence. We are open to revisiting
this issue should we determine that the
extension creates an unreasonable risk
of unsigned calls from a specific subset
of small voice service providers.
49. Extension for Voice Service
Providers That Cannot Obtain a
Certificate. In the First Caller ID
Authentication Report and Order, we
acknowledged the concerns raised by
Cloud Communications Alliance
regarding whether all voice service
providers are able to obtain the
certificates used for the intercarrier
exchange of authenticated caller ID
information under the Governance
Authority’s current policies. And in the
FNPRM, we asked whether we should
grant an implementation extension for
any other voice service providers or
classes of voice service providers, or
types of calls. In response, commenters
advocated for an extension for voice
service providers that cannot obtain a
certificate because they are ineligible to
file FCC Form 499A, obtain an
Operating Company Number, or obtain
direct access to telephone numbers—
each of which is a prerequisite to
obtaining a certificate under current
Governance Authority policy.
50. Because it is impossible for a
service provider to participate in STIR/
SHAKEN without access to the required
certificate and because some voice
service providers are unable to obtain a
certificate at this time, we determine
that a limited extension is necessary.
Multiple commenters contend that the
Governance Authority’s policy excludes
voice service providers that lease
numbers rather than obtain them
directly from NANPA. In particular,
one-way VoIP voice service providers
have no means to obtain direct access to
numbers, so they cannot obtain the
certificate necessary to comply with
their duty to implement STIR/SHAKEN.
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
Only carriers and interconnected VoIP
providers may obtain direct access to
telephone numbers. Therefore, we grant
an extension to voice service providers
that cannot obtain a certificate due to
the token access policy. We grant this
extension until it is feasible for a
provider to participate in STIR/
SHAKEN due either to the possibility of
compliance with the Governance
Authority policy or a change in the
Governance Authority policy. We
recognize that a voice service provider
may not be able to immediately come
into compliance with its caller ID
authentication obligations after it
becomes eligible to receive a certificate,
and we will not consider a voice service
provider that diligently pursues a
certificate once it is able to receive one
in violation of our rules. PACE also
requests that we determine whether a
voice service provider subject to this
extension may comply with our caller
ID authentication requirements ‘‘by
relying on a 3rd party service provider.’’
In the absence of a more complete
record to guide our decision, we decline
to accept this request at this time. We
expect the extension we establish will
decrease costs by relieving such
providers from the obligation to upgrade
their networks until they can
meaningfully participate in STIR/
SHAKEN. We recognize that industry
has made progress on resolving the gap
between Governance Authority
certificate access policies and the scope
of duties we have established pursuant
to the TRACED Act, and we continue to
urge speedy resolution of these issues.
We decline Noble Systems’ request for
us to direct the Governance Authority to
‘‘revisit its policies that were defined
prior to passage of the TRACED Act’’
and ‘‘revisit the makeup of the
[Governance Authority] membership in
light of the broad scope of ‘‘voice
service’’ in the TRACED Act.’’ In the
First Caller ID Authentication Report
and Order and FNPRM, we declined to
intervene in or impose new regulations
on the STIR/SHAKEN governance
structure and maintain that position. We
reiterate that because the Governance
Authority is made up of a variety of
stakeholders representing many
perspectives, we have no reason to
believe it will not operate on a neutral
basis.
51. Extension for Services Scheduled
for Section 214 Discontinuance. In the
First Caller ID Authentication Report
and Order and FNPRM, we also sought
comment on whether to consider any
additional categories of extensions. In
response to AT&T’s request, we grant a
one-year extension based on undue
PO 00000
Frm 00010
Fmt 4701
Sfmt 4700
hardship to cover services for which a
provider has filed a pending section 214
discontinuance application on or before
the June 30, 2021, STIR/SHAKEN
implementation deadline. Verizon and
CenturyLink advocate for removing
discontinuance obligations that ‘‘require
[voice service] providers to obtain
permission prior to replacing TDM
voice services with VoIP’’ to ‘‘help make
network transitions to IP more
straightforward and efficient.’’ We
decline to grant this request as it is
outside the scope of the current
proceeding. This extension will allow
voice service providers time to either
complete the discontinuance process
and ‘‘avoid incurring unnecessary
expense and burden to implement STIR/
SHAKEN’’ for services ‘‘that are
scheduled to sunset,’’ or to implement
STIR/SHAKEN for any such services
that are not discontinued. We agree with
AT&T that voice service provider
resources ‘‘are better spent upgrading
networks that will have the potential to
reap the full benefits of the IP transition
and STIR/SHAKEN.’’ We expect that
this extension will decrease costs by
obviating the need to upgrade
components of a voice service
provider’s network that will be sunset.
We underscore that a one-year extension
means that voice service providers have
until June 30, 2022, to either
discontinue the legacy service or
implement STIR/SHAKEN if the service
has not actually been discontinued,
unless the provider obtains a waiver of
this requirement for good cause shown.
If we determine that a voice service
provider filed a discontinuance
application in bad faith to receive this
extension, we will terminate the
extension and take appropriate action.
52. Voice Service Providers That Use
TDM—An Extension Would Be
Superfluous. The TRACED Act
specifically directs us to evaluate
whether to grant an extension to voice
service providers that use TDM network
technology. The record reflects that a
major barrier to implementation of a
caller ID authentication framework for
voice service providers that use TDM
technology is the lack of a standardized
caller ID authentication framework for
non-IP networks. Because the STIR/
SHAKEN framework is an IP-only
solution, these voice service providers
must expend substantial resources
upgrading network software and
hardware to be IP compatible in order
to implement the only currently
available standardized caller ID
authentication solution. According to
commenters, voice service providers
that use TDM networks also face
E:\FR\FM\17NOR2.SGM
17NOR2
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
availability and cost issues regarding
necessary equipment to upgrade the
software and hardware to convert their
networks to IP. Further, small or rural
voice service providers that use TDM
technology may have fewer resources
and require additional time for
transitioning their networks to IP
technology. Multiple commenters agree
that ‘‘[e]ven if a [voice service provider]
has upgraded its own network to all-IP
technology, if that [voice service
provider] exchanges substantial traffic
through legacy TDM tandems, such
tandems will similarly present obstacles
to STIR/SHAKEN deployment.’’
53. Although we proposed in the First
Caller ID Authentication Report and
Order and FNPRM to grant the same
extension to voice service providers that
use TDM technology under the undue
hardship standard that we grant to
providers that materially rely on non-IP
technology, we conclude that a separate
and identical extension is redundant
and creates administrative duplication.
We want to avoid granting two separate
extensions, with associated filing and
review requirements, that serve
identical purposes. Because the
TRACED Act includes a required
extension for voice service providers
that ‘‘materially rel[y]’’ on non-IP
technology, we decline to grant a
separate extension to voice service
providers that use TDM technology
under the undue hardship standard.
This extension (1) applies to those parts
of a voice service provider’s network
that materially rely on technology that
cannot initiate, maintain, and terminate
SIP calls; (2) lasts ‘‘until a call
authentication protocol has been
developed for calls delivered over non[IP] networks and is reasonably
available’’; and (3) may be terminated if
the Commission determines that a voice
service provider ‘‘is not making
reasonable efforts to develop the call
authentication protocol’’ for non-IP
networks. Although AT&T contends that
‘‘an extension for TDM networks is
independently warranted,’’ it does not
explain its position. In fact, AT&T
concedes that ‘‘the extension outcomes
are the same.’’ We find the non-IP
extension sufficiently addresses AT&T’s
concern that there is not yet a STIR/
SHAKEN-equivalent solution for TDM
networks. To the extent there is any lack
of clarity, we confirm that TDM
networks are included in the non-IP
extension established below, and
subject to its terms.
54. Rural Voice Service Providers—A
Separate Extension Is Unnecessary. The
TRACED Act specifically directs us to
evaluate whether to grant an extension
based on undue hardship to rural voice
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
service providers. The record reflects
that the burdens and barriers to STIR/
SHAKEN implementation for rural voice
service providers are often encompassed
by those for small voice service
providers or voice service providers that
use non-IP network technology because
these voice service providers also tend
to be rural. To the extent rural voice
service providers rely on non-IP
technology, which is incompatible with
STIR/SHAKEN, they encounter the
burdens already described for such
providers. Similarly, the rural voice
service providers that describe specific
burdens to implementation—such as
availability of vendor solutions that may
be prohibitively expensive with few
reasonable alternatives—are small voice
service providers. Although CTIA
generally states that there are potential
financial and resource constraints for
larger rural voice service providers, it
does not identify any specific
implementation challenges faced by
these providers. Indeed, at least one
larger rural voice service provider, TDS
Communications, a Wisconsin-based
voice service provider that serves nearly
900 rural, suburban, and metropolitan
communities throughout the United
States, has begun to invest in STIR/
SHAKEN deployment.
55. In the First Caller ID
Authentication Report and Order and
FNPRM, we sought comment on our
proposed view that it would be
unnecessary to grant a separate
implementation extension for rural
voice service providers as the challenges
faced by these providers are already
addressed by the small voice service
provider extension and the extension for
voice service providers that materially
rely on a non-IP network. After review
of the record, we adopt our proposal
and decline to adopt a separate
extension for rural providers. While we
decline to grant an extension to this
class of voice service providers, a voice
service provider that believes that it
faces an undue hardship may submit a
filing that details its specific
circumstances. The majority of
commenters in the record did not
differentiate rural voice service
providers from those that are small and
referred to them interchangeably. As
noted above, the rural voice service
providers that called for an extension
are themselves small voice service
providers. NCTA contends that a
dedicated extension for rural providers
is ‘‘unnecessary’’ because ‘‘the vast
majority of rural providers will qualify
for the small provider extension’’ or the
extension for voice service providers
that rely on non-IP networks. We agree
PO 00000
Frm 00011
Fmt 4701
Sfmt 4700
73369
with NCTA that ‘‘there does not seem to
be a strong basis for granting any form
of relief’’ to rural voice service providers
that do not qualify as small voice
service providers. Further, TDS reports
that it had completed work in 2019 to
evaluate, select, and lab test a vendor
solution to allow it to integrate STIR/
SHAKEN into the IP portions of its
network. Because one large rural voice
service provider has already invested in
STIR/SHAKEN deployment to best serve
its customers, we expect that other
similarly situated rural voice service
providers have also begun or would be
capable of having begun the
implementation process. We conclude
that it would be improper to reach a
blanket finding of undue hardship for
rural voice service providers because (1)
the record does not show that larger
rural providers face undue hardship;
and (2) our separate finding of undue
hardship for small voice service
providers relieves small rural voice
service providers of the obligation to
implement, such that they will no
longer face undue hardship for the
duration of the extension. Further, an
extension for rural voice service
providers would not only be
unnecessary, but also harmful to the
goal of widespread implementation.
56. We also decline the request by
CTIA and USTelecom for an extension
for vaguely-defined ‘‘regional’’ voice
service providers that do not fall within
our 100,000 or fewer voice subscriber
line threshold. CTIA only generally
describes potential financial and
resource constraints for these voice
service providers, and neither
commenter sufficiently defines this
class of providers or explains why we
should grant an extension on the basis
of undue hardship to providers with the
resources that are necessary for serving
a large number of subscribers. We
similarly decline the request by
Madison Telephone Networks for an
extension until 2024 or 2025 for rural
providers in high cost areas to ‘‘relieve
financial pressure.’’ We decline to grant
this extension as Madison Telephone
Networks does not demonstrate why
this is a unique class of providers
requiring an extension of this length.
Further, we expect the majority of these
voice service providers are also small or
materially rely on non-IP technology
and therefore will be covered by either
or both of those extensions. If a voice
service provider in this category is not
covered by an extension and requires
additional time for STIR/SHAKEN
implementation, it may file an
individual petition requesting an
extension, as discussed below.
E:\FR\FM\17NOR2.SGM
17NOR2
73370
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
57. Equipment Availability—A
Separate Extension Is Unnecessary. In
the First Caller ID Authentication
Report and Order and FNPRM, we
sought comment on Congress’s direction
to consider whether to grant a separate
extension on the basis of ‘‘the inability
to purchase or upgrade equipment to
support the call authentication
frameworks under this section, or lack
of availability of such equipment.’’ We
conclude that our extension for small
voice service providers adequately
addresses challenges with regard to
obtaining necessary equipment and that
a separate or additional extension is
unnecessary. As discussed above, the
record reflects that equipment
availability specifically impacts small
voice service providers. This is not a
surprise, as it is likely that larger voice
service providers have the resources and
negotiating leverage to obtain the
equipment they need much more
quickly than small providers. Granting
an extension solely for equipment
unavailability may discourage larger
voice service providers from putting
forward sufficient effort to obtain
necessary equipment. Further, no
commenter has identified any specific
equipment availability issue for large
voice service providers—commenters
merely speak in general terms. Granting
an ex ante extension on this basis would
introduce difficult line-drawing
questions as to when equipment is
‘‘unavailable’’ for which the record does
not suggest a solution and that are not
necessary to resolve in light of the
extension for small voice service
providers. We note that under our rules
any voice service provider—large or
otherwise—that encounters a specific
equipment availability issue may
request a waiver of the deadline.
58. Enterprise Calls—An Extension
Would Be Counterproductive. In the
First Caller ID Authentication Report
and Order and FNPRM, we sought
comment on whether we should grant
an extension for undue hardship for
enterprise calls. We described the
concerns of some commenters that the
standards for attestation do not fully
account for the situation where an
enterprise subscriber places outbound
calls through a voice service provider
other than the voice service provider
that assigned the telephone number. In
such enterprise calling scenarios,
commenters claimed, it would be
difficult for an outbound call to receive
A-level attestation because the
outbound call ‘‘will not pass through
the authentication service of the [voice]
service provider that controls th[e]
numbering resource.’’ To provide A-
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
level attestation, the voice service
provider must be able to confirm the
identity of the subscriber making the
call, and that the subscriber is using its
associated telephone number. The
record developed in response to our
Further Notice reflects challenges for
voice service providers to attest to
enterprise calls with A-attestation in
this and other circumstances, meaning
that such calls would be authenticated
with B- or C-level attestation. Based on
these challenges, some commenters
argue that we should grant an extension
in compliance with the STIR/SHAKEN
implementation mandate for enterprise
calls so that these calls will not receive
caller ID authentication until industry
standards groups resolve the enterprise
issue, rather than receiving a lower level
of attestation in the interim. We agree
with the record opposition, and we
decline to grant an implementation
extension to enterprise calling cases.
59. First, we agree with those
commenters that argue that an
implementation extension may
discourage the swift development of
technical solutions for enterprise calls.
Although commenters offer different
perspectives on the timing of a solution
that would allow enterprise calls to
receive A-level attestation, the record
reflects that industry is ‘‘working hard
to achieve authentication with A-level
attestation this year.’’ It is our goal to
encourage this work, rather than remove
the beneficial incentive created by the
STIR/SHAKEN mandate. We decline,
however, to go so far as some
commenters suggest and ‘‘[r]equir[e] the
prompt finalization of standards that
will enable voice providers that
originate enterprise calls to provide an
A-level attestation.’’ As industry
stakeholders, standards bodies, and the
Governance Authority are actively
working to finalize standards and
solutions to complex enterprise calling
cases, we do not wish to intervene in
the process. At the same time, we
continue to encourage—and expect—
industry to promptly resolve the
outstanding challenges for complex
enterprise use cases and business
models, and we will closely monitor
progress on this issue.
60. We are also not persuaded by
claims that authenticating enterprise
calls with B- or C-level attestation poses
a major problem. These commenters
contend that enterprise calls without an
A-level attestation may be blocked,
mislabeled as potentially fraudulent, or
lead to illegal robocallers authenticating
their own calls. However, they fail to
explain how the alternative—an
enterprise call without authenticated
caller ID information—is preferable to
PO 00000
Frm 00012
Fmt 4701
Sfmt 4700
one that receives B- or C-level
attestation. Cloud Communications
Alliance addresses this question, but
states only that ‘‘[i]t is difficult to
answer this question in the abstract
without knowing the call validation
treatment of B or C level attestations.’’
It adds that if voice service providers or
the industry ‘‘only value an ‘A’ level
attestation when deciding call
treatment, while wholly discounting a
lower level of attestation, the ability to
sign with a B or C level attestation will
be of little benefit, perhaps apart from
providing information for trace back
purposes.’’ Notably, NCTA reports that
‘‘[i]n [its] members’ experiences, partial
(‘B’) attestation can be achieved more
quickly than complete (‘A’) attestation
for enterprise calls,’’ and accordingly,
partial attestation is ‘‘a reasonable
implementation approach in this
context.’’ Similarly, Hiya, an analytics
company, commits that it ‘‘currently has
no plans—nor is it aware of any plans
by other parties in the industry—to
either block calls or label them as
potentially fraudulent solely due to lack
of ‘full’ or ‘A’ level attestation.’’ It also
asserts ‘‘that voice service providers and
analytics engines will not use attestation
level as the sole determinant for
reputation scoring of a caller,’’ and
instead, ‘‘attestation information is one
of the many data points that inform
analytics-driven call labeling and call
blocking.’’ Vonage contends that
attestation may provide a ‘‘potentially’’
‘‘dispositive data point,’’ but fails to
support this claim. Transaction Network
Services also explains that ‘‘STIR/
SHAKEN attestations—‘good’ or ‘bad’—
will not have the effects that some
commenters suggest’’ as it ‘‘endeavors to
incorporate STIR/SHAKEN attestations
as one factor in its analysis’’ and ‘‘does
not recommended making call-blocking
decisions based on the failure of STIR/
SHAKEN authentication.’’ Indeed, we
have previously stated that ‘‘a callblocking program might block calls
based on a combination of factors.’’ In
the Third Call Blocking Report and
Order (85 FR 56530, September 14,
2020), we also explained that ‘‘[i]f the
terminating voice service provider has
identified that calls with ‘A’ attestation
previously originating from that number
are nevertheless illegal or unwanted
based on reasonable analytics, [it] may
block those calls despite the attestation
level.’’ Even assuming that calls with Bor C-level attestation will be treated
meaningfully worse than calls without
authenticated caller ID information—a
conclusion that, again, is not
substantiated by the record—concerns
over the treatment of calls authenticated
E:\FR\FM\17NOR2.SGM
17NOR2
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
consistent with current STIR/SHAKEN
standards does not amount to an undue
hardship in the implementation of
STIR/SHAKEN technology, which is the
standard by which Congress directed us
to evaluate undue hardship extension
requests. In light of these conclusions
and our and Congress’s goal of
ubiquitous STIR/SHAKEN
implementation in IP networks, we will
not grant an extension for enterprise
calls.
61. Intra-Network Calls—An
Extension Would Be Counterproductive.
In the First Caller ID Authentication
Report and Order and FNPRM, we
established distinct authentication
requirements for inter-network calls and
for intra-network calls. In the case of
inter-network calls, an originating voice
service provider must ‘‘authenticate
caller [ID] information for all SIP calls
it originates and that [it] will exchange
with another voice service provider or
intermediate provider.’’ This duty
applies only ‘‘to the extent technically
feasible.’’ In the First Caller ID
Authentication Report and Order and
FNPRM we specifically recognized this
fact, explaining that ‘‘transmission of
STIR/SHAKEN authentication
information over a non-IP
interconnection point is not technically
feasible at this time.’’ Because
establishing trust between providers is
not necessary for calls that transit a
single network, we adopted a different
obligation for intra-network calls that
solely transit the network of the
originating voice service provider.
Specifically, in recognition of the fact
that ‘‘certain components of the STIR/
SHAKEN framework . . . are not
necessary for calls that a voice service
provider originates and terminates on its
own network,’’ we concluded a voice
service provider satisfies its intranetwork authentication obligation so
long as it authenticates and verifies ‘‘in
a manner consistent with the STIR/
SHAKEN framework, such as by
including origination and attestation
information in the SIP INVITE used to
establish the call.’’
62. A number of commenters that
exchange all traffic with other providers
through non-IP interconnection points—
and thus have no obligation under our
rules to implement STIR/SHAKEN with
respect to inter-network calls—seek an
extension from the intra-network
authentication requirement. These voice
service providers seek such relief
because compliance requires network
upgrades, and they would prefer to
delay investing in these necessary
upgrades until they are able to
participate in STIR/SHAKEN both
within their own network and with
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
regard to calls exchanged with other
voice service providers, which require
many of the same upgrades.
63. We decline to grant the requested
extension because we do not find that
it rises to the level of undue hardship.
Commenters favoring an extension
contend that requiring them to invest in
compliance solely as to intra-network
calls would require unreasonably
burdensome network upgrades that, in
their view, produce limited benefits. But
these commenters fail to explain why
implementation would be more
burdensome for them than for other
voice service providers. In fact,
implementation maybe less costly
because our standard for intra-network
IP calls is only that they are
authenticated ‘‘in a manner consistent
with the STIR/SHAKEN framework’’
which does not require those upgrades
necessary to enable cross-provider
authentication and verification. The
TRACED Act requires an assessment of
burdens and barriers, not a cost-benefit
analysis, and parties seeking an
extension have failed to show that they
face atypical burdens and barriers on
the basis of the intra-network
authentication requirement. We
nonetheless note that the benefits of our
intra-network requirement are greater
than parties favoring an extension
contend. As we have explained, STIR/
SHAKEN implementation provides
benefits to consumers even at the intranetwork level. Specifically,
implementing STIR/SHAKEN within a
voice service provider’s own network
directly benefits consumers as it enables
a voice service provider to authenticate
all calls among its customers. To that
end, we agree with commenters that
while voice service providers work
toward IP interconnection, ‘‘[t]here is no
reason to deny consumers’’ the
‘‘immediate benefits’’ of authenticated
caller ID information for calls on their
voice service provider’s own network.
Further, the record reflects that many
providers that face challenges regarding
IP interconnection are small providers,
to which we have granted a two-year
extension in compliance with the STIR/
SHAKEN mandate. Providers so situated
will therefore have additional time to
negotiate IP interconnection agreements
before being subject to the intra-network
mandates. Various commenters in the
record argue that the Commission
should more directly resolve the issue of
non-IP interconnection. While we
refrain from directly addressing the
issue of non-IP interconnection in this
Order, which focuses largely on
completing TRACED Act
PO 00000
Frm 00013
Fmt 4701
Sfmt 4700
73371
implementation as to STIR/SHAKEN,
we will continue to monitor the issue.
64. Further, granting such an
extension would impede the progress of
the IP transition and further delay STIR/
SHAKEN implementation—contrary to
our goal of ubiquitous deployment of
caller ID authentication technology.
Atheral and WISPA request that we
establish a waiver process for providers
with non-IP interconnection points that
need to upgrade media gateways in
order to exchange SIP calls. We decline
to establish a unique process in this
context, as these parties do not explain
why our existing procedures are
insufficient. Parties that wish to seek a
waiver are free to do so pursuant to our
existing procedures. We agree with
Comcast that it is essential to
‘‘encourage the IP transition by, among
other things, adopting policies in this
proceeding that induce providers to
prioritize the implementation of IPenabled call authentication through
STIR/SHAKEN.’’ Comcast proposes that
we ‘‘consider[ ] a provider’s efforts to
transition to . . . IP-to-IP voice
interconnection[ ] when determining
whether to grant or renew a limited
extension.’’ Because we do not grant an
extension for the inability to exchange
traffic at IP-enabled interconnection
points, we see no need to adopt this
suggestion. As AT&T observes, an
extension for intra-network calls of
providers that do not interconnect in IP
would ‘‘discourag[e] voice service
providers from coming to a negotiated
resolution and transitioning to IP’’ at the
interconnection point. By denying this
extension, we ‘‘increase the[ ] incentive
to negotiate creative and commercially
reasonable interconnection agreements’’
to ensure that customers receive STIR/
SHAKEN benefits.
65. Provider-Specific Extensions. We
decline at this time to grant any
extensions to individual voice service
providers. We recognize, as INCOMPAS
and CenturyLink suggest, that some
providers may face specific
circumstances in all or part of their IP
networks that constitute undue
hardship. The Commission will be in a
better position to evaluate those
requests, however, in response to
specific petitions that establish in detail
the basis for the requested extension,
rather than through establishing a
general principle in response to the
vague and general concerns about
technology or compatibility issues that
INCOMPAS and CenturyLink set forth.
A voice service provider that believes
that it faces an undue hardship within
the meaning of the TRACED Act may
file in this docket an individual petition
requesting an extension. We direct the
E:\FR\FM\17NOR2.SGM
17NOR2
73372
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
Bureau to seek comment on any such
petitions and to issue an order
determining whether to grant the voice
service provider an extension. We
expect any voice service provider
seeking an extension to file its request
by November 20, 2020, and we direct
the Bureau to issue a decision no later
than March 30, 2021. We find it
appropriate to direct the Bureau to issue
provider-specific extension
determinations by March 30, 2021, so
that the Bureau has adequate time to
seek comment on and consider timelyfiled petitions and petitioners have
adequate time, before the June 30, 2021,
implementation deadline, to act in
response to the Bureau’s determination.
Although we expect voice service
providers to file extension requests by
November 20, 2020, we note that parties
seeking additional extensions after this
date are free to seek a waiver of our
deadline under § 1.3 of the
Commission’s rules. This is consistent
with the TRACED Act’s mandate that
the Commission consider the burdens
and barriers to implementation ‘‘as
appropriate’’ beyond the 12-month
period specified in the Act. Of course,
in determining whether it is
‘‘appropriate’’ to consider such late-filed
requests, we expect that the
Commission will not look favorably on
requests that rely on facts that could
have been presented to the Commission
prior to November 20, 2020 with
reasonable diligence. Given the
importance of widespread STIR/
SHAKEN implementation, to be granted
an extension a voice service provider
must demonstrate in detail the specific
undue hardships, including financial
and resource constraints, that it has
experienced and explain why any
challenges it faces meet the high
standard of undue hardship to STIR/
SHAKEN implementation within the
timeline required by Congress.
2. Extension for Certain Non-Internet
Protocol Networks
66. Section 4(b)(5)(B) of the TRACED
Act directs that ‘‘the Commission shall
grant a delay of required compliance
. . . for any provider or class of
providers of voice service, or type of
voice calls, only to the extent that such
a provider or class of providers of voice
service, or type of voice calls, materially
relies on a non-[IP] network for the
provision of such service or calls . . .
until a call authentication protocol has
been developed for calls delivered over
non-[IP] networks and is reasonably
available.’’ In implementing this
provision, we impose the same
obligations on voice service providers
that receive the extension as we impose
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
in the mandate requiring voice service
providers to implement an effective
caller ID authentication framework in
the non-IP portions of their networks.
We note that, along with the obligations
we impose for recipients of the non-IP
extension, such recipients are also
subject to the robocall mitigation
requirements shared by all other
recipients of extensions. We find that
doing so ensures that all voice service
providers with non-IP network
technology are subject to the same
burdens and are working together to
develop a non-IP solution as envisioned
by the TRACED Act. We also find that
such action most efficiently carries out
the goals of protecting consumers from
illegal robocalls on non-IP networks,
and encourages a general transition to IP
and the wider implementation of STIR/
SHAKEN.
67. Eligibility for This Extension.
Under the TRACED Act, we must grant
an extension for voice service providers
or types of voice calls that ‘‘materially
rel[y] on a non-[IP] network.’’ We
interpret this provision to mean that
those portions of a voice service
provider’s network that do not use SIP
technology are eligible for an extension
of the implementation deadline of June
30, 2021. The TRACED Act states that
we shall grant this extension ‘‘under
section 4(b)(5)(A)(ii),’’ which governs
extensions granted upon a public
finding of undue hardship. We interpret
this clause to mean that undue hardship
is presumed where a voice service
provider materially relies on a non-IP
network for the provision of such
service or calls. We also interpret ‘‘until
a call authentication protocol has been
developed . . . and is reasonably
available’’ to be a statutorily-defined
‘‘reasonable period of time’’ for the
purposes of this extension. In the First
Caller ID Authentication Report and
Order and FNPRM, we proposed
defining ‘‘non-[IP] network[s]’’ as those
portions of a voice service provider’s
network that rely on technology that
cannot initiate, maintain, and terminate
SIP calls. We adopt our proposal
because we believe this to be a
straightforward implementation of
Congress’s direction in the TRACED
Act, which also provides that extensions
may be voice service provider-specific
or apply to a class of voice service
providers or type of voice calls. In
determining whether a voice service
provider or type of voice calls
‘‘materially relies’’ on such a non-SIP
capable network, we proposed to
interpret ‘‘material[ ]’’ to mean
‘‘important or having an important
effect’’ and, consistent with our call-by-
PO 00000
Frm 00014
Fmt 4701
Sfmt 4700
call interpretation of the TRACED Act,
we proposed to read ‘‘reli[ance]’’ with
reference to the particular portion of the
network in question. We adopt these
proposed interpretations, which
received no opposition in the record,
and we therefore consider reliance on a
non-IP network as material if that
portion of the network is incapable of
using SIP. Comcast argues that we
should refrain from ‘‘applying new
regulatory mandates to the entire voice
industry,’’ and should instead
‘‘consider[ ] a provider’s efforts to
transition to IP . . . when determining
whether to grant or renew a limited
extension of the STIR/SHAKEN
implementation deadlines.’’ We decline
to take this approach, as we believe the
approach we take in this document—
imposing a broad mandate and granting
an extension where necessary—better
comports with the TRACED Act’s
mandatory extension for providers that
‘‘materially rely’’ on non-IP technology.
Put another way, if a SIP-incompatible
portion of a voice service provider’s
network is used for the provision of
voice service, that portion of the
network is eligible for an extension of
the implementation deadline. The
record reflects support for this
interpretation. After noting that our
definition’s scope is consistent with the
concept of material reliance, AT&T
suggests that we add to our definition of
‘‘non-[IP] network’’ ‘‘all ‘TDM in the
middle’ services—that is, those utilizing
TDM switching/transport as well as
those exchanged over TDM
interconnection points.’’ We decline to
do so because we are only obligated
under the TRACED Act to provide
extensions for originating and
terminating voice service providers, and
not intermediate providers. We also
note that the rules we adopt in this
document regarding intermediate
providers only apply to networks which
support SIP signaling. We acknowledge
the concerns raised by AT&T and others
regarding the prevalence of non-IP
networks, and find that their prevalence
only increases the importance of taking
action to encourage widespread caller
ID authentication across all networks
while the IP transition is ongoing.
68. Duration of Extension. The
TRACED Act directs that the non-IP
extension shall end once ‘‘a call
authentication protocol has been
developed for calls delivered over non[IP] networks and is reasonably
available.’’ We also note that the
TRACED Act grants us the authority to
limit or terminate any granted non-IP
extension if we determine that a voice
service provider ‘‘is not making
E:\FR\FM\17NOR2.SGM
17NOR2
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
reasonable efforts to develop’’ a caller ID
authentication protocol for non-IP
networks. As noted later, we interpret
‘‘reasonable efforts’’ to mean that a voice
service provider is participating, either
on its own, in concert with a vendor, or
through a representative, as a member of
a working group, industry standards
group, consortium, or trade association
that is working to develop a non-IP
solution, or actively testing such a
solution. In determining whether a
caller ID authentication protocol meets
this standard, we adopt the test
proposed by Alaska Communications,
with some modifications. Consistent
with Alaska Communications’ proposal,
we conclude that a caller ID
authentication protocol ‘‘has been
developed’’ if we determine that the
protocol is fully developed and
finalized by industry standards. By
‘‘fully developed’’ and ‘‘finalized’’ we
do not require that the protocol must
have achieved a status whereby no
future development or progress is
possible. Under that interpretation, the
STIR/SHAKEN framework itself would
not meet this standard. Instead, our
standard does not foreclose the
possibility of further development and
improvement, but would only
determine a protocol has been
developed if at least all fundamental
aspects of the protocol which enable its
effectiveness are standardized by
industry, and the protocol is
implementable by voice service
providers. We agree with commenters
that such a protocol must be standardsbased and ready for implementation.
Although some commenters advocate
for mandating out-of-band STIR, we find
that this solution is not yet
standardized. We thus conclude that, at
this time, no caller ID authentication
protocols exist which have been
developed and are reasonably available
for calls delivered over non-IP networks.
We also find that a caller ID
authentication protocol is ‘‘reasonably
available’’ if the underlying equipment
and software necessary to implement
such protocol is available on the
commercial market. We decline to adopt
Alaska Communications’ requirement
that the underlying equipment and
software be ‘‘widely available and
affordable on the commercial market,’’
because the terms ‘‘widely’’ and
‘‘affordable,’’ in the context of
sophisticated businesses negotiating for
specialized equipment and software, are
too broad and indefinite to administer
readily; and Alaska Communications
does not provide enough further
guidance on these terms to adopt them
as part of a workable standard. We
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
believe this approach is a workable and
clear standard, and has support from the
record. And as we have explained, we
adopt the same standard for determining
whether a caller ID authentication
protocol is ‘‘effective’’ for purposes of
our mandate on non-IP networks,
ensuring a harmonious approach to our
rules regarding non-IP caller ID
authentication technology. Alaska
Communications suggests that we adopt
an additional requirement for
determining whether a caller ID
authentication protocol is ‘‘reasonably
available.’’ Specifically, Alaska
Communications suggests that the
‘‘knowledge, training, and expertise
necessary to operate the equipment and
implement the standard [must be]
sufficiently widespread among the
small, rural, and other non-IP service
providers’’ in receipt of an extension in
order for the standard to be ‘‘reasonably
available.’’ We decline to adopt this
requirement because doing so could
create a perverse incentive for voice
service providers to be willfully
ignorant of newly developed protocols
so as to prolong an extension. It also
would require an unreasonably
complicated inquiry into the knowledge
and practices of numerous small voice
service providers. We further find such
a requirement to be unnecessary ex ante
without a specific protocol and
associated requirements in front of us.
69. As we explained in the context of
the mandate on non-IP networks, we
will continue to monitor industry
progress towards the development of a
non-IP caller ID authentication solution.
If we find after providing notice and an
opportunity for comment that a non-IP
solution meets these criteria, we will
both modify the non-IP implementation
mandate and phase out the non-IP
implementation extension to account for
this new solution. Cooperative
Telephone Company suggests that we
grant a limited five-year extension of the
June 30, 2021, deadline for
implementing a caller ID authentication
framework ‘‘for those service providers
currently using a TDM network that
have less than 1,000 subscriber lines.’’
Cooperative Telephone Company argues
that such small and rural telephone
companies have ‘‘scarce resources’’
which would not cover both the
demands of their customers and new
regulations for non-IP technology. We
decline to do so given that such an
extension would not be consistent with
the timeframe that Congress established
in the TRACED Act for the non-IP
extension—which is to last until a nonIP solution becomes reasonably
available—not for a fixed period of
PO 00000
Frm 00015
Fmt 4701
Sfmt 4700
73373
years. Alaska Communications suggests
that we ‘‘grant a permanent exemption
for the few non-SS7-connected switches
remaining’’ because such switches are
unique. We find adopting this proposal
unnecessary at this time. In the absence
of a developed solution, we are not yet
in a position to determine whether any
technical exceptions could be necessary
and appropriate.
70. Obligations of Voice Service
Providers Receiving an Extension. The
TRACED Act provides that we should
limit or terminate an extension of
compliance if we determine in a future
assessment that a voice service provider
‘‘is not making reasonable efforts to
develop the call authentication
protocol’’ for non-IP networks. To be
consistent with our approach in
mandating that voice service providers
take ‘‘reasonable measures’’ to
implement an effective caller ID
authentication framework in the non-IP
portions of their networks, we find that
a voice service provider satisfies the
‘‘reasonable efforts’’ requirement under
section 4(b)(5)(D) if it is able to provide
the Commission, upon request, with
documented proof that it is
participating, either on its own, in
concert with a vendor, or through a
representative, as a member of a
working group, industry standards
group, consortium, or trade association
that is working to develop a non-IP
solution, or actively testing such a
solution. We also conclude this
requirement both promotes the IP
transition and encourages the
development of a non-IP authentication
solution for the benefit of those
networks that cannot be speedily or
easily transitioned.
3. Reevaluating Granted Extensions
71. Section 4(b)(5)(F) of the TRACED
Act requires us annually to reevaluate
and revise as necessary any granted
extension, and ‘‘to issue a public notice
with regard to whether such [extension]
remains necessary, including why such
[extension] remains necessary; and
when the Commission expects to
achieve the goal of full participation.’’
As we proposed in our First Caller ID
Authentication Report and Order and
FNPRM, we direct the Bureau to
reevaluate the extensions we have
established annually, and to revise or
extend them as necessary. We adopt this
proposal because the Bureau is in the
best position to undertake this factintensive and case-by-case evaluation,
particularly in the context of evaluating
extensions for undue hardship.
Pursuant to the TRACED Act, we direct
the Bureau to issue a Public Notice
seeking comment to inform its annual
E:\FR\FM\17NOR2.SGM
17NOR2
73374
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
review and consider the comments it
receives before issuing a Public Notice
of its decision as to whether to revise or
extend an extension. The record reflects
support, and no opposition, for this
reevaluation process.
72. Scope of Bureau’s Authority. We
permit the Bureau to decrease, but not
to expand, the scope of entities that are
entitled to a class-based extension based
on its assessment of burdens and
barriers to implementation. Specifically,
if the Bureau concludes in its review
that a class-based extension should be
extended beyond the original end date
set by the Commission, it may choose to
do so for all or some recipients of the
extension, as it deems appropriate,
based on its assessment and after
providing notice and an opportunity for
comment. As suggested by ACA
Connects, we clarify that the Bureau
may not, however, terminate an
extension for some or all recipients
prior to the extension’s originally set or
newly extended end date.
73. Assessment of Burdens and
Barriers. The TRACED Act directs the
Commission to assess burdens and
barriers to implementation by December
30, 2020, and ‘‘as appropriate
thereafter.’’ We find it appropriate to
reassess burdens and barriers to
implementation by voice service
providers that we granted an extension
in conjunction with evaluating whether
to maintain, modify, or terminate the
extension. Accordingly, we direct the
Bureau to assess burdens and barriers to
implementation faced by those
categories of voice service providers
subject to an extension when it reviews
those extensions on an annual basis or
on petition. Coordinating an assessment
of burdens and barriers to
implementation with our extension
reevaluations will inform the Bureau’s
decision to extend or revise any granted
extensions. It will also provide a basis
for the Bureau to revise the scope of
entities that are entitled to an extension.
We find that aligning the periodic
reassessment of burdens and barriers to
implementation with any review of
extensions is the best reading of the
relevant statutory language. We read
‘‘appropriate’’ in this section to tie the
timing of our future assessments to our
annual extension reevaluations. We
received no comments in the record to
our proposal in this regard.
4. Robocall Mitigation Program
74. Section 4(b)(5)(C)(i) of the
TRACED Act directs us to require any
voice service provider that has been
granted an extension to implement,
during the time of the extension, ‘‘an
appropriate robocall mitigation program
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
to prevent unlawful robocalls from
originating on the network of the
provider.’’ In the First Caller ID
Authentication Report and Order and
FNPRM, we sought comment on
USTelecom’s proposal to obligate voice
service providers to file certifications
describing their robocall mitigation
programs in lieu of a prescriptive
approach. In this Report and Order, we
adopt this proposal and give voice
service providers the flexibility to
decide the specific contours of an
effective robocall mitigation program
that best suits the needs of their
networks and customers. We
additionally create a certification
process and database to aid in
enforcement efforts and prohibit
intermediate providers and terminating
voice service providers from accepting
voice traffic from voice service
providers not listed in the database.
These steps will ensure that the only
voice traffic to traverse voice networks
in the U.S. is from those voice service
providers that have either fully
implemented STIR/SHAKEN on their
entire networks or that have
implemented a robocall mitigation
program on those portions of their
networks that are not STIR/SHAKENenabled.
75. Providers Subject to the TRACED
Act’s Robocall Mitigation Program
Requirement. Based on the statutory
text, we read the requirement to
implement a robocall mitigation
program to apply to all voice service
providers that receive an extension on
the basis of undue hardship or material
reliance on a non-IP network. The
TRACED Act states that extensions for
material reliance on a non-IP network
are ‘‘[s]ubject to subparagraphs (C)
through (F),’’ and paragraph (C)(i) sets
forth the robocall mitigation program
requirement. The record reflects support
for this approach. Securus argues that
we should not impose a robocall
mitigation program requirement on
voice service providers—even voice
service providers granted an
extension—whose networks uniquely
pose ‘‘nearly zero’’ risk of originating
high volumes of illegal robocalls. We
decline to adopt this suggestion because
the TRACED Act obligates us to require
‘‘any provider subject to such [extension
to] implement an appropriate robocall
mitigation program.’’ Neustar
recommends that we require ‘‘all voice
service providers [to] utilize robocall
mitigation solutions, regardless of
whether they implement STIR/SHAKEN
in their networks,’’ and ZipDX argues
that providers which have implemented
STIR/SHAKEN should institute robocall
PO 00000
Frm 00016
Fmt 4701
Sfmt 4700
mitigation programs for any calls they
authenticate with C-level attestation.
ZipDX also argues that we should
require voice service providers to
document and share with the
Commission information on how they
assign the A-, B-, or C-level attestations.
We decline to adopt such a reporting
requirement at this time, as we have no
reason to believe the existing
mechanisms for policing use of
attestation levels within the STIR/
SHAKEN framework are insufficient.
We decline to adopt these suggestions.
We agree with commenters that under
the TRACED Act robocall mitigation ‘‘is
intended to be an interim approach for
addressing potential unlawful robocalls
until the provider has implemented
STIR/SHAKEN.’’ Consistent with this
view, in the case of voice service
providers that have neither complied
with the STIR/SHAKEN mandate by
June 30, 2021, nor are subject to any
extension, we expect such
noncompliant voice service providers to
implement robocall mitigation on the
non-STIR/SHAKEN-enabled portions of
their networks. Doing so does not free
the provider from enforcement of its
violation of our STIR/SHAKEN
implementation mandate, but will
protect consumers by ensuring that no
portion of the voice network is left
without an implementation of either
caller ID authentication or a robocall
mitigation program. While USTelecom
argues we can find authority under
other provisions of the Act, we need not
reach that issue. First, regardless of
whether we could rely on an alternative
source of authority, we find it
appropriate to defer to Congress’s
recent, specific guidance on the subject.
Moreover, while USTelecom argues that
such a requirement ‘‘will provide
benefits independent of call
authentication solutions, including
before and after full deployment of such
solutions,’’ we find such a requirement
to be inappropriate at this juncture. We
cannot yet know whether requiring
voice service providers to expend
additional resources on robocall
mitigation even after STIR/SHAKEN
implementation would be an efficient
use of their resources, and we do not
wish to place additional burdens on
voice service providers already working
to comply with the June 30, 2021, STIR/
SHAKEN implementation deadline. We
will revisit this conclusion if we
determine that additional robocall
mitigation efforts are necessary in
addition to STIR/SHAKEN after the
caller ID authentication technology is
more widespread.
E:\FR\FM\17NOR2.SGM
17NOR2
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
76. Robocall Mitigation Program
Requirements. The TRACED Act directs
us to require all voice service providers
granted an extension—whether on the
basis of undue hardship or material
reliance on a non-IP network—to
‘‘implement an appropriate robocall
mitigation program to prevent unlawful
robocalls from originating on the[ir]
network[s].’’ As suggested by
USTelecom, we require voice service
providers subject to an extension to
‘‘take[] reasonable steps to avoid
originating illegal robocall traffic.’’
USTelecom outlines examples of such
‘‘reasonable steps,’’ which could
include ‘‘[a]nalyz[ing] high-volume
voice network traffic to identify and
monitor patterns consistent with
robocall campaigns,’’ ‘‘[a]nalyz[ing]
traffic for patterns indicative of
fraudulent calls—for example,
identifying short duration calls with low
completion rates,’’ and ‘‘[t]ak[ing]
reasonable steps to confirm the identity
of new commercial VoIP customers by
collecting information such as physical
business location, contact person(s),
state or country of incorporation, federal
tax ID, and the general nature of the
customer’s business.’’ We decline to
opine at this time on whether such
practices meet our sufficiency standard,
so as to promote experimentation with
a wide variety of practices by voice
service providers in their robocall
mitigation programs. In a different
proceeding, we propose requiring voice
service providers to respond to
traceback requests, mitigate illegal
traffic when notified of such traffic, and
take affirmative, effective measures to
prevent new and renewing customers
from using their networks to originate
illegal calls; we also seek comment on
whether we should prescribe specific
steps. As our action in this proceeding
is concerned with implementing section
4(b)(5)(C) of the TRACED Act, we do not
preclude the possibility of requiring all
voice service providers to take
affirmative, effective measures to
prevent the origination of unlawful
calls—whether specific or not—
pursuant to different legal authority,
such as section 201(b) of the
Communications Act of 1934, as
amended. With one exception noted
below, we find that a non-prescriptive
approach to robocall mitigation
requirements gives voice service
providers ‘‘the flexibility to react to
traffic trends they view on their own
networks and react accordingly.’’ This
approach also allows voice service
providers to innovate and ‘‘draw from
the growing diversity and sophistication
of anti-robocall tools and approaches
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
available.’’ In a separate proceeding, we
proposed requiring voice service
providers to take affirmative, effective
measures to prevent new and renewing
customers from using their networks to
originate illegal calls, and seek comment
on whether we should prescribe specific
steps. As our analysis here is concerned
with implementing section 4(b)(5)(C) of
the TRACED Act, we do not preclude
the possibility of requiring all voice
service providers to take affirmative,
effective measures to prevent the
origination of unlawful calls—whether
specific or not—pursuant to different
legal authority, such as section 201(b) of
the Act.
77. We require voice service providers
subject to an extension to document and
publicly certify how they are complying
with these requirements. We find that
such a requirement will encourage voice
service providers to ensure that they are
taking ‘‘reasonable steps.’’ We have
previously found that requiring selfevaluation is an effective means of
promoting compliance with our rules. In
the rural call completion context, the
Commission adopted a rule requiring
covered providers to monitor the rural
call completion performance of the calls
they pass on to intermediate providers,
and take action to address poor
performance. We concluded that such a
monitoring rule ‘‘will ensure better call
completion to rural areas by covered
providers, . . . reduce the necessity for
enforcement action, and aid our
enforcement efforts when needed.’’
Such a requirement also enables us to
evaluate a voice service provider’s
‘‘reasonable steps’’ to determine
whether they are sufficient. This public
certification requirement will facilitate
our ability to enforce a prohibition on
intermediate providers and terminating
voice service providers from accepting
voice traffic from voice service
providers with insufficient or ineffective
robocall mitigation programs.
78. While we adopt a non-prescriptive
approach to voice service providers’
robocall mitigation programs, we find it
necessary to articulate general
standards, both to guide voice service
providers in preparing their programs
and to ensure that the statutory
obligation to implement a robocall
mitigation program is enforceable. We
clarify that a robocall mitigation
program is sufficient if it includes
detailed practices that can reasonably be
expected to significantly reduce the
origination of illegal robocalls. This is
not to say that a voice service provider
may not engage in practices, as part of
its robocall mitigation program, that are
experimental or cutting edge, and whose
effectiveness is not yet proven. Rather,
PO 00000
Frm 00017
Fmt 4701
Sfmt 4700
73375
we encourage industry experimentation
and only require that robocall mitigation
programs include proven practices
alongside experimental ones. In
addition, for its mitigation program to
be sufficient, the voice service provider
must comply with the practices it
describes. We will also consider a
mitigation program insufficient if a
provider knowingly or through
negligence serves as the originator for
unlawful robocall campaigns. We
decline to adopt ZipDX’s proposal that
a robocall mitigation program merely be
‘‘effective’’ because ZipDX provides no
elaboration of how to define the term,
and we think the more detailed
requirement we adopt will be both
clearer and more successful than a nonspecific ‘‘effective’’ standard. At the
same time, we agree with Verizon that
‘‘different types of network providers
should have different types of robocall
mitigation programs,’’ and we welcome
voice service providers adopting
approaches that are innovative, varied,
and adapted to their networks.
79. The record also convinces us that
participation in industry traceback
efforts is of utmost importance in the
absence of STIR/SHAKEN
implementation. To that end, we require
voice service providers, as part of their
robocall mitigation programs, to commit
to cooperating with the Commission,
law enforcement, and the industry
traceback consortium in investigating
and stopping any illegal robocallers that
it learns are using its service to originate
calls. We underscore that this
requirement does not supersede any
existing legal processes. We also
encourage law enforcement to make
traceback requests through the industry
traceback consortium. We find that this
baseline requirement to participate in
traceback efforts is a necessary aspect of
any attempt to mitigate illegal robocalls,
as it permits voice service providers and
enforcement agencies to identify illegal
robocallers and prevent them from
further abusing the voice network.
Without a means to identify and bring
enforcement actions against the sources
of illegal robocalls, such bad actors will
continue their operations unchecked
and emboldened. We underscore that
this is a necessary, but not sufficient,
component of a voice service provider’s
robocall mitigation program which, as
we have explained, must include other
steps to ensure that a provider is not the
source of illegal robocalls.
80. We decline at this time to impose
other more prescriptive requirements for
robocall mitigation programs, such as
mandating an analytics-based robocall
mitigation program, as proposed by
Transaction Network Services, or know-
E:\FR\FM\17NOR2.SGM
17NOR2
73376
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
your-customer policies, as suggested by
Consumer Groups. While we
acknowledge that such practices and
policies may be effective aspects of a
robocall mitigation program—and we
encourage voice service providers to
incorporate them into their own
robocall mitigation programs—we
decline specifically to mandate them, as
we agree with commenters that argue
that there is no one-size-fits-all robocall
mitigation solution that accounts for the
variety and scope of voice service
provider networks. For example, a small
voice service provider with few
subscribers may not have a need to
implement comprehensive analytics
given its small size. Similarly, a voice
service provider with limited means
may choose a solution suited to its
budget and business model. We also
decline Neustar’s suggestion that we
‘‘ensure that providers implement
robocall mitigation solutions for both
originating and terminating calls.’’ The
TRACED Act’s mandate plainly requires
only robocall mitigation programs that
‘‘prevent unlawful robocalls from
originating on the network of the
provider.’’
81. Deficient Robocall Mitigation
Programs. If we find that our nonprescriptive approach to robocall
mitigation is not satisfactorily stemming
the origination of illegal robocalls, we
agree with NTCA and Verizon that we
should be ready to impose more
prescriptive obligations on any voice
service provider whose robocall
mitigation program has failed to prevent
high volumes of illegal robocalls. We
thus direct the Enforcement Bureau to
prescribe more specific robocall
mitigation obligations for any voice
service provider it finds has
implemented a deficient robocall
mitigation program. Such robocall
mitigation obligations would be chosen
as appropriate to resolve the specific
voice service provider’s prior
shortcomings. In such instances, the
Enforcement Bureau will release an
order explaining why a particular
mitigation program is deficient and,
among other things, prescribe the new
obligations needed to rectify those
deficiencies, including any milestones
or deadlines. We find that action by the
Enforcement Bureau is appropriate in
responding to issues on a case-by-case
basis. As part of the penalties it may
impose, the Enforcement Bureau may
de-list a voice service provider from the
robocall mitigation database we
establish. If we find that our nonprescriptive approach to robocall
mitigation programs is falling short on
a widespread basis, we will not hesitate
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
to revisit the obligations we impose
through rulemaking at the Commission
level.
82. Voice Service Provider
Certification and Database. To promote
transparency and effective robocall
mitigation, we require all voice service
providers—not only those granted an
extension—to file certifications with the
Commission regarding their efforts to
stem the origination of illegal robocalls
on their networks. Specifically, as
proposed by USTelecom, and with the
support of all parties that commented
on the issue in the record, we require all
voice service providers to certify that
their traffic is either ‘‘signed with STIR/
SHAKEN or . . . subject to a robocall
mitigation program’’ that includes
‘‘tak[ing] reasonable steps to avoid
originating illegal robocall traffic,’’ and
committing to cooperating with the
Commission, law enforcement, and the
industry traceback consortium in
investigating and stopping any illegal
robocallers that it learns are using its
service to originate calls. For those voice
service providers that certify that some
or all of their traffic is ‘‘subject to a
robocall mitigation program,’’ we
require such voice service providers to
detail in their certifications the specific
‘‘reasonable steps’’ that they have taken
‘‘to avoid originating illegal robocall
traffic.’’ This requirement will promote
transparency and accountability in light
of our non-prescriptive approach to the
robocall mitigation program
requirements. While only voice service
providers with an extension will be
obligated to implement a robocall
mitigation program, we impose the
certification requirement on all voice
service providers because doing so will
help us and others to hold all voice
service providers accountable for the
voice traffic they originate, and give us
and others a snapshot of the progress of
STIR/SHAKEN implementation and the
variety of robocall mitigation practices
adopted by voice service providers.
83. Voice service providers must file
certifications via a portal on the
Commission’s website that we will
establish for this purpose. We will also
establish a publicly accessible database
in which we will list such certifications.
Establishing a database will aid in
monitoring compliance with our
robocall mitigation requirement and
facilitate enforcement action should
such action be necessary. We direct the
Bureau to establish this portal and
database, provide appropriate filing
instructions and training materials, and
release a Public Notice when voice
service providers may begin filing
certifications. We direct the Bureau to
release this Public Notice no earlier than
PO 00000
Frm 00018
Fmt 4701
Sfmt 4700
March 30, 2021, and to establish a
deadline for the filing of certifications
no earlier than June 30, 2021. Verizon
argues that we ‘‘need not wait until
2021 to establish a registry with a
certification requirement and issue rules
imposing robocall mitigation obligations
on all traffic originated by any service
provider.’’ We disagree and instead find
it appropriate to harmonize this
requirement—which is tied by statute to
receiving an extension from the STIR/
SHAKEN implementation mandate—to
the date the STIR/SHAKEN mandate
goes into effect. However, we agree with
Verizon that ‘‘consumers should get the
benefits of the registration framework
and the robocall mitigation rules this
year,’’ and encourage providers to take
efforts toward robocall mitigation as
soon as possible. We also direct the
Bureau to issue guidance and a
protective order regarding the treatment
of any confidential and highly
confidential information included in
certifications. We do so to protect voice
service providers that are worried that
public disclosure of their robocall
mitigation programs may give bad actors
the information they need to undermine
their programs, or necessitate disclosure
of competitively sensitive information.
If we find that a certification is deficient
in some way, such as if the certification
describes a robocall mitigation program
that is ineffective, or if we find that a
provider nonetheless knowingly or
negligently originates illegal robocall
campaigns, we may take enforcement
action as appropriate. Enforcement
actions may include, among others,
removing a defective certification from
the database after providing notice to
the voice service provider and an
opportunity to cure the filing, or
requiring the voice service provider to
submit to more specific robocall
mitigation requirements, and/or
imposition of a forfeiture.
84. We also require voice service
providers filing certifications to provide
the following identification information
in the portal on the Commission’s
website:
(1) The voice service provider’s
business name(s) and primary address;
(2) other business names in use by the
voice service provider;
(3) all business names previously
used by the voice service provider;
(4) whether a voice service provider is
a foreign voice service provider; and
(5) the name, title, department,
business address, telephone number,
and email address of a central point of
contact within the company responsible
for addressing robocall-mitigationrelated issues.
E:\FR\FM\17NOR2.SGM
17NOR2
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
85. This information will be made
publicly available in the database, and
reporting such information presents a
minimal burden on voice service
providers. We find that requiring a voice
service provider to report contact
information for the person responsible
for addressing robocall-mitigationrelated issues will facilitate interprovider cooperation and enforcement
actions should issues arise. We also
require voice service providers to
submit to the Commission via the
appropriate portal any necessary
updates to the information they filed in
the certification process within 10
business days. This requirement will
ensure that we and all voice service
providers have up-to-date data without
overburdening voice service providers
with unnecessary filings.
86. Obligations on Intermediate
Providers and Terminating Voice
Service Providers. As suggested by
multiple commenters, we prohibit
intermediate providers and terminating
voice service providers from accepting
voice traffic directly from any voice
service provider that does not appear in
the database, including a foreign voice
service provider that uses NANP
resources that pertain to the United
States to send voice traffic to residential
or business subscribers in the United
States. ZipDX suggests that we prohibit
intermediate providers and terminating
voice service providers from accepting
voice traffic from foreign voice service
providers using U.S. numbers unless the
foreign voice service provider is listed
in the robocall mitigation database and
the domestic provider can provide an Alevel attestation for the call. We decline
to take this approach at this time as
industry has not yet coalesced around
an approach to A-level attestations for
foreign-originated calls. Effective 90
days after the deadline for robocall
mitigation program certifications set
forth in the Bureau Public Notice
establishing the robocall mitigation
database and portal, intermediate
providers and terminating voice service
providers are subject to this prohibition.
The record reflects support for this
requirement.
87. We agree with Verizon that, ‘‘by
prohibiting downstream service
providers from accepting traffic from
providers that are not in [the database],
the Commission can deny a service
provider access to the regulated U.S.
voice network if it determines that the
service provider’s STIR/SHAKEN or
robocall mitigation practices are
inadequate.’’ In this way, we can police
the voice traffic that voice service
providers originate by removing or
restoring a voice service provider’s
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
listing on the database, after providing
notice of any certification defects and
providing an opportunity to cure.
Furthermore, as voice service providers
monitor the database to ensure they
remain compliant with our rules, they
must necessarily review the listings of
voice service providers with which they
interconnect to ensure that such
certifications are sufficient. In so doing,
industry continually reviews itself to
ensure compliance with our rules,
amplifying the effectiveness of our own
review. This rule will further encourage
all voice service providers to implement
meaningful and effective robocall
mitigation programs on their networks
during the period of extension from the
STIR/SHAKEN mandate. In turn, this
rule will help prevent illegal robocall
traffic from reaching terminating voice
service providers and their subscribers.
To ease compliance with this obligation,
we will import all listings from the
Intermediate Provider Registry into the
Robocall Mitigation Database on a
rolling basis so that all registered
intermediate providers are represented
therein. Because intermediate providers
that do not originate any traffic are not
subject to our certification requirements,
they would not otherwise be listed in
the database. By affirmatively adding
such providers we give intermediate
and terminating voice service providers
confidence that any provider not listed
in the Robocall Mitigation Database is
out of compliance with our rules, rather
than leaving the potential for
uncertainty about whether a provider is
noncompliant or simply was not
required to be included in the database
because it does not originate traffic. A
provider that serves as both an
intermediate provider and originating
voice service provider must file a
certification with respect to the traffic
for which it serves as an originating
voice service provider, even if its listing
has been imported from the
Intermediate Provider Registry.
88. NTCA and ACA argue that we
should require intermediate providers
and terminating voice service providers
to give notice to an originating voice
service provider whose traffic they will
block because it is not listed in the
robocall mitigation database. NTCA
argues that this will ‘‘enable legitimate
providers to cure honest mistakes on
their part or ‘glitches’ in the database.’’
We decline to adopt this suggestion as
we find that the framework we adopt
provides adequate notice to voice
service providers of the need to file
sufficient certifications, including a 90day period between the deadline for
certifications and the prohibition on
PO 00000
Frm 00019
Fmt 4701
Sfmt 4700
73377
intermediate and terminating voice
service providers accepting traffic from
originating voice service providers not
in the database. Second, adopting this
suggestion would place potentially
costly obligations on compliant
intermediate providers and terminating
voice service providers to provide
adequate notice to noncompliant
originating voice service providers.
Such compliant providers may be
unable to provide notice for lack of
having or being able to obtain a
noncompliant provider’s contact
information—opening themselves up to
potential enforcement action for lack of
compliance. Lastly, we will give notice
and an opportunity to cure to voice
service providers whose certifications
are deficient before we take enforcement
action such as de-listing the provider
from the database.
89. We decline to adopt to
USTelecom’s proposal that we require
intermediate providers to file a
certification to their compliance with
this rule. We see no clear need to
impose a burdensome belt-andsuspenders paperwork requirement on
providers that are already subject to this
obligation by rule. We similarly decline
ZipDX’s proposal that intermediate
providers must ‘‘[i]mplement[] a
Robocall Mitigation Program applicable
to calls [they do] not authenticate.’’ This
includes intermediate providers acting
as domestic gateway providers for
foreign-originated calls. Pursuant to the
TRACED Act, robocall mitigation is
meant to stem the origination of illegal
robocalls, and ZipDX does not explain
specifically how an intermediate
provider could itself prevent the
origination of illegal robocalls. We find
the rule we establish—whereby
intermediate providers are prohibited
from accepting traffic from an
originating voice service provider that
has not certified to a robocall mitigation
program—best leverages the role of
intermediate providers to combat illegal
robocalls within our greater robocall
mitigation scheme.
90. Foreign Voice Service Providers.
In the First Caller ID Authentication
Report and Order and FNPRM, we
sought comment on mechanisms to
combat robocalls originating abroad.
The record contains several comments
expressing support for combating
robocalls originating abroad by
requiring foreign voice service providers
that wish to appear in the database to
follow the same requirements as
domestic voice service providers, and
we do so in this document. Thus,
foreign voice service providers that use
NANP numbers that pertain to the
United States to send voice traffic to
E:\FR\FM\17NOR2.SGM
17NOR2
73378
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
residential and business subscribers in
the United States must follow the same
certification requirements as domestic
voice service providers in order to be
listed in the database. Because we
prohibit domestic intermediate
providers and terminating voice service
providers from accepting traffic from
foreign voice service providers that use
NANP numbers that pertain to the
United States and are not listed in the
database, we create a strong incentive
for such foreign voice service providers
to file certifications. We note for the
sake of clarity, however, that we do not
require foreign voice service providers
to file a certification; though
intermediate providers and terminating
voice service providers are prohibited
from accepting traffic from foreign voice
service providers who do not appear in
the robocall mitigation database.
91. We find that this result will
encourage foreign service providers to
choose to institute robocall mitigation
programs and file certifications to be
listed in the database and thus have
their traffic be accepted by domestic
intermediate and terminating voice
service providers. The measures we
adopt in this document will also enable
foreign voice service providers to
continue using U.S. telephone numbers
to send voice traffic to U.S. subscribers
under the same certification procedures
that will apply to U.S. voice service
providers and thereby help prevent the
fraudulent exploitation of NANP
resources and reduce the volume of
illegal voice traffic entering the United
States. Ensuring that foreign voice
service providers using U.S. telephone
numbers comply with the certification
requirements prior to being listed in the
database is especially important in light
of the prevalence of foreign-originated
illegal robocalls aimed at U.S.
consumers and the difficulty in
eliminating such calls.
92. We find persuasive the argument
by ZipDX that the definition in the
initially circulated and publicly
released draft Order, which defined
‘‘foreign voice service provider’’ as ‘‘any
entity that is authorized within a foreign
country to provide international voice
service,’’ was unduly narrow and
excluded non-U.S. providers that do not
possess any authorization to provide
service from being able to file
certifications and be listed in the
database. In response, we revise our
rules to establish that an entity is a
‘‘foreign voice service provider’’ if such
entity has the ability to originate voice
service that terminates in a point
outside a foreign country or terminate
voice service that originates from points
outside that foreign country.
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
Specifically, we define ‘‘foreign voice
service provider’’ to mean ‘‘any entity
providing voice service outside the
United States that has the ability to
originate voice service that terminates in
a point outside that foreign country or
terminate voice service that originates
from points outside that foreign
country.’’ We find that this approach
captures voice traffic originating from a
broader range of foreign voice service
providers than the one that initially
appeared in the draft.
93. Under the rules we adopt, foreign
voice service providers that use U.S.
telephone numbers to send voice traffic
to U.S. subscribers must file the same
certification as U.S. voice service
providers in order to be listed in the
database. Specifically, to be listed in the
database, these providers must certify
either that they have implemented
STIR/SHAKEN or comply with the
robocall mitigation program
requirements outlined above by
‘‘tak[ing] reasonable steps to avoid
originating illegal robocall traffic’’ and
committing to cooperating with the
Commission, U.S. law enforcement, and
the industry traceback consortium in
investigating and stopping any illegal
robocallers that it learns are using its
service to originate calls. If we find that
a voice service provider’s certification is
deficient or the provider fails to meet
the standards of its certification, we will
pursue enforcement including de-listing
the provider from the database. We
further note that, as discussed above, we
require voice service providers—
including foreign voice service
providers that wish to be listed in the
database—to submit to the Commission
any necessary updates regarding any of
the information they filed in the
certification process within 10 business
days.
94. Although USTelecom, following
circulation and public release of a draft
of this Order, has changed its position
and now suggests seeking further
comment on this approach, we
nevertheless take action in this
document given the crucial and urgent
importance of protecting Americans
from illegal and fraudulent foreignoriginated robocalls. USTelecom, along
with CTIA, suggest that our action in
this document could result in
unforeseen technical issues, or the
blocking of legitimate calls. ZipDX
disagrees with this suggestion, arguing
that any impact that could arise would
be minimal and could be promptly
resolved. As our rules related to foreignoriginated voice traffic that we take in
this document will not begin to affect
such voice traffic until June 2021, we
are optimistic that voice service
PO 00000
Frm 00020
Fmt 4701
Sfmt 4700
providers will have time to resolve any
identified issues before the deadline.
Should voice service providers identify
concrete evidence of technical problems
or likely blocking of legitimate calls, we
encourage them to provide us such
information so that we can consider
whether to make any modifications to
this rule.
5. Alternative Methodologies During an
Extension
95. The TRACED Act directs us to
‘‘identify, in consultation with small
providers of voice service, and those in
rural areas, alternative effective
methodologies to protect consumers
from unauthenticated calls during any’’
extension from compliance with our
STIR/SHAKEN implementation
mandate. The TRACED Act does not
specify that voice service providers may
substitute such methods for the robocall
mitigation program that it requires, and
we read the TRACED Act as merely
calling for us to identify additional
options for voice service providers
subject to extension that wish to better
serve their customers and the public by
going above and beyond their legal
obligations. Given that caller ID
authentication frameworks are not yet
ubiquitous—and thus most calls that
transit U.S. voice networks are
unauthenticated—we understand
Congress’s concern in this provision to
be about protecting consumers from
unauthenticated, illegally spoofed
robocalls. We therefore interpret a
methodology to be ‘‘effective’’ if it is
likely to substantially reduce the
volume of illegal robocalls reaching
subscribers. In our Third Call Blocking
Report and Order, we adopted a safe
harbor in our call blocking rules for
voice service providers that use
reasonable analytics that include caller
ID authentication information to inform
their call blocking services. We find that
these types of call blocking services
would likely reduce the volume of
unauthenticated illegal robocalls
reaching subscribers, and thus include
them in this definition. We find that this
definition tracks the overall purpose of
the TRACED Act which is ‘‘to reduce
illegal and unwanted robocalls’’ through
various mechanisms. We sought
comment in the First Caller ID
Authentication Report and Order and
FNPRM from small and rural voice
service providers on such alternative
effective methodologies. The record we
received in response demonstrates that
such alternative methodologies either
already exist or are in development. To
fulfill this obligation, we identify the
following alternative effective
methodologies recommended by small
E:\FR\FM\17NOR2.SGM
17NOR2
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
and rural voice service providers, as
well as other commenters:
• Innovative Systems reports that its
landline call blocking service is ‘‘fully
developed and currently installed at 207
landline providers’’ and, in the last nine
years, ‘‘has challenged over 19 million
suspected spam calls and blocked
another 12 million calls that were from
phone numbers off the FCC’s weekly
robocall and telemarketing consumer
complaint data reports.’’ It states that
‘‘greater consumer protection can be
achieved by having this alternative
Business
name
AT&T—Wireless.
AT&T—VoIP ..
Call Control
(third-party
analytics
company).
Comcast—
Wireline.
Cox ................
First Orion
(third-party
analytics
company).
Hiya (thirdparty analytics company).
Nomorobo
(third-party
analytics
company).
T-Mobile .........
Verizon—Wireless.
Verizon—
Wireline.
number of the problematic calls being
transmitted today. . . . Reasonable call
analytics are widely available from
multiple vendors, many of which offer
low-investment services that can be
deployed in smaller networks at a
reasonable cost.’’
96. Additionally, the recent call
blocking report released by the
Consumer and Governmental Affairs
Bureau identified various available
effective methodologies for protecting
subscribers from illegal calls, a sample
of which is reproduced below:
Blocking/labeling services
offered
Estimate on number of calls blocked or labeled
Network-level blocking ......
Call Protect or Call Protect
Basic, free.
Call Protect Plus.
Network-level blocking ......
Digital Phone Call Protect,
free.
Software-based call blocking.
Call Protect and Call Protect Plus, since 2016,
blocked fraudulent calls or labeled suspicious calls;
nearly 1.3 billion suspected fraud and over 3 billion
other calls blocked or labeled.
Blocked over 46 million and spam warnings for 36 million.
Network-level blocking is default.
Call Protect is opt-out, since 2019.
Call Protect Plus is opt-in.
Blocked over one billion calls ........................................
N/A.
Network-level blocking ......
Anonymous Call Rejection,
Selective Call Rejection,
free.
Customers can sign up for
Nomorobo blocking service, free.
Edge Blocking, free ...........
Anonymous Call Rejection,
Selective Call Rejection,
free.
Customers can sign up for
Nomorobo blocking service, free.
Scam ID and Scam Block
Over 158 million calls blocked in Dec. 2019. Anonymous Call Rejection blocked nearly 37 million calls
in Dec. 2019. Selective Call Rejection blocked over
five million calls in Dec. 2019.
Network-level blocking is default.
Anonymous Call Rejection is opt-in, but
will be offered opt-out; Selective Call
Rejection is opt-in.
Nomorobo is opt-in.
14.6% of calls are blocked through one of these tools;
Edge Blocking is 65% of the blocked calls and
Anonymous Call Rejection is 29%t.
Edge Blocking is opt-out.
Anonymous Call Rejection and Selective
Call Rejection are opt-in.
Since 2017, identified over 22 billion scam calls ..........
N/A.
Call blocking ......................
Since 2016, blocked or labeled nearly 1.3 billion suspected fraud calls and over 3 billion other suspect
calls.
N/A.
Call blocking ......................
As of April 30, 2020, blocked over 1.6 billion robocalls
N/A.
Scam ID, free ....................
Scam Block, free.
Name ID, free for some
plans.
Network-level blocking ......
Call Filter, free.
Network-level blocking ......
Spam Alert, free.
VoIP customers can sign
up for Nomorobo blocking service, free.
Since 2017, identified over 21 billion scam calls and
blocked over 5 billion of those calls.
Scam ID is opt-out for post-paid customers.
Scam Block is opt-in.
Since 2017, blocked hundreds of millions of calls ........
Network-level blocking is default.
Call Filter is opt-out.
Network-level blocking is default.
Spam Alert is default.
Nomorobo is opt-in.
6. Legal Authority
97. The TRACED Act expressly
directs us to grant extensions for
compliance with the STIR/SHAKEN
VerDate Sep<11>2014
methodology installed on all landlines
using an opt-out strategy at no cost,
versus a purchase to opt-in by the
customer.’’
• Neustar reports that its robocall
mitigation service ‘‘helps voice service
providers block calls from illegal
robocallers and helps end users identify
robocalls . . . . [b]y combining
authoritative data . . . with behavior
insights.’’
• Transaction Network Services
reports that ‘‘[c]all analytics have
proven successful in identifying a large
73379
19:47 Nov 16, 2020
Jkt 253001
Default, opt-in, or opt-out
Since 2017, blocked hundreds of millions of calls ........
implementation mandate, require any
voice service provider subject to such an
extension to implement a robocall
mitigation program to prevent unlawful
robocalls from originating on its
PO 00000
Frm 00021
Fmt 4701
Sfmt 4700
Network-level blocking is default.
Digital Phone Call Protect is opt-in.
network, and place unique obligations
on providers that receive an extension
due to material reliance on non-IP
network technology. The TRACED Act
E:\FR\FM\17NOR2.SGM
17NOR2
73380
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
thus provides a clear source of authority
for the rules we adopt in this document.
98. We conclude that section 251(e) of
the Act provides additional,
independent authority to adopt the
extensions and associated requirements.
That section gives us exclusive
jurisdiction over numbering policy and
enables us to act flexibly and
expeditiously with regard to important
numbering matters. When bad actors
unlawfully falsify or spoof the caller ID
that appears on a subscriber’s phone,
they are using numbering resources to
advance an illegal scheme. The
extensions and associated requirements
will help to prevent the fraudulent
exploitation of NANP resources by
permitting those providers and their
subscribers to identify when caller ID
information has been spoofed.
99. We conclude that section 251(e)
gives us authority to prohibit
intermediate providers and voice
service providers from accepting traffic
from both domestic and foreign voice
service providers that do not appear in
our newly established database. We
emphasize that the rule we adopt in this
document does not constitute the
exercise of jurisdiction over foreign
voice service providers. We
acknowledge that this rule will have an
indirect effect on foreign voice service
providers by incentivizing them to
certify to be listed in the database. An
indirect effect on foreign voice service
providers, however, ‘‘does not militate
against the validity of rules that only
operate directly on voice service
providers within the United States.’’ As
we concluded in the First Caller ID
Authentication Report and Order, our
exclusive jurisdiction over numbering
policy provides authority to take action
to prevent the fraudulent abuse of
NANP resources. Illegally spoofed calls
exploit numbering resources whenever
they transit any portion of the voice
network—including the networks of
intermediate providers. Our action
preventing such calls from entering an
intermediate provider’s or terminating
voice service provider’s network is
designed to protect consumers from
illegally spoofed calls, even while STIR/
SHAKEN is not yet ubiquitous. Verizon
agrees that section 251(e) gives us ample
authority to ensure foreign VoIP
providers ‘‘submit to the proposed
registration and certification regime by
prohibiting regulated U.S. carriers from
accepting their traffic if they do not.’’
100. We additionally find authority in
the Truth in Caller ID Act. We find that
the rules we adopt in this document are
necessary to enable voice service
providers to help prevent these
unlawful acts and to protect voice
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
service subscribers from scammers and
bad actors, and that section 227(e)
provides additional independent
authority for the rules we adopt in this
document.
D. Voluntary STIR/SHAKEN
Implementation Exemption
101. While the TRACED Act directs
us to require each voice service provider
to implement STIR/SHAKEN in its IP
network, section 4(b)(2) of the TRACED
Act frees a voice service provider from
this requirement if we determine, by
December 30, 2020, that ‘‘such provider
of voice service’’: (A) ‘‘in [IP]
networks’’—(i) ‘‘has adopted the STIR/
SHAKEN authentication framework for
calls on the [IP] networks of the
provider of voice service; (ii) has agreed
voluntarily to participate with other
providers of voice service in the STIR/
SHAKEN authentication framework; (iii)
has begun to implement the STIR/
SHAKEN authentication framework;
and (iv) will be capable of fully
implementing the STIR/SHAKEN
authentication framework’’ not later
than June 30, 2021; and (B) ‘‘in non-[IP]
networks’’—(i) ‘‘has taken reasonable
measures to implement an effective call
authentication framework; and (ii) will
be capable of fully implementing an
effective call authentication framework’’
not later than June 30, 2021.
102. Below, we read section 4(b)(2) of
the TRACED Act as creating two
exemptions: one for IP calls and one for
non-IP calls. To ensure that the
exemption only applies where
warranted and to provide parties with
adequate guidance, we expand on each
of the prongs that a voice service
provider must meet to obtain an
exemption, and adopt rules accordingly.
We find that the best way to implement
the TRACED Act’s exemption provision
in a timely manner is via a certification
process and thus adopt rules requiring
that a voice service provider that wishes
to receive an exemption submit a
certification that it meets the criteria for
the exemptions that we have established
pursuant to section 4(b)(2)(A), section
4(b)(2)(B), or both. To guard against the
risk of gaps and improper claims of the
exemption, we require voice service
providers that receive an exemption to
file a second certification after June 30,
2021, stating whether they, in fact,
achieved the implementation goal to
which they previously committed in
their initial certification. Last, we find
that the TRACED Act’s exemption
provision does not extend to
intermediate providers. We adopt these
rules pursuant to the authority expressly
granted us by section 4(b)(2) of the
TRACED Act.
PO 00000
Frm 00022
Fmt 4701
Sfmt 4700
1. Relationship of IP Networks and NonIP Networks Provisions
103. As proposed in the Further
Notice of Proposed Rulemaking, we read
section 4(b)(2) of the TRACED Act as
creating two exemptions: One for IP
calls and one for non-IP calls. Thus, a
voice service provider may seek the
exemption for its ‘‘IP networks’’ if it
meets all four criteria for all calls it
originates or terminates in SIP, and a
voice service provider may seek the
exemption for its ‘‘non-IP networks’’ if
it meets both the criteria for all non-SIP
calls it originates or terminates. This
approach is consistent with the views of
the commenters that touched upon this
issue in the record.
104. We find that this reading best
implements Congress’s policy and is
consistent with principles of statutory
construction when considering the
statute as a whole. As AT&T observes,
the structure of the TRACED Act
‘‘recognizes that implementation of a
caller ID authentication framework will
differ for IP networks and non-IP
networks.’’ Given the presence of the
word ‘‘and’’ between the IP and non-IP
networks criteria, we recognize that the
exemption could potentially be read as
applying only if the voice service
provider meets both the IP and non-IP
networks criteria. Yet such a reading
would render the exemption an empty
set or nearly so because of the absence
of an effective solution for non-IP caller
ID authentication at present, such that
few, if any, voice service providers will
be able to claim that they will be
capable of ‘‘fully implementing’’ an
effective non-IP caller ID authentication
framework by June 30, 2021. Our
reading cabins the nullity risk more
narrowly, thus better effectuating
Congress’s goal of creating a meaningful
exemption.
105. Our approach also further
encourages prompt deployment of STIR/
SHAKEN. We understand the statutory
exemption to both encourage and
reward early progress in deployment.
Therefore, by giving voice service
providers a path to exemption solely for
their IP networks—the only types of
networks on which STIR/SHAKEN can
effectively operate—our approach will
effectuate Congress’s intent to encourage
faster progress in STIR/SHAKEN
deployment. And by separating IP and
non-IP calls in this way, we align our
exemption process with the call-by-call
vision of a caller ID authentication
implementation mandate that subjects
different parts of a voice service
provider’s network to different
requirements.
E:\FR\FM\17NOR2.SGM
17NOR2
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
2. Threshold for IP Networks Exemption
106. To ensure that the exemption
only applies where warranted and to
provide parties with adequate guidance,
we expand on each of the four
substantive prongs laid out in the
TRACED Act that a voice service
provider must meet to obtain an
exemption.
107. Prong (i)—Adoption of STIR/
SHAKEN. In the Further Notice of
Proposed Rulemaking, we proposed to
interpret the phrase ‘‘has adopted the
STIR/SHAKEN authentication
framework for calls on the [IP] networks
of the provider of voice service’’ in
prong (A)(i) to mean that the voice
service provider has publicly
committed, via a certification, to
complete implementation of STIR/
SHAKEN by June 30, 2021. In light of
the comments in the record, we modify
this proposal to require that the voice
service provider has completed the
network preparations necessary to
deploy the STIR/SHAKEN protocols on
its network, including, but not limited
to, by participating in test beds and lab
testing, or completing commensurate
network adjustments to enable the
authentication and validation of calls on
its network consistent with the STIR/
SHAKEN framework.
108. We agree with commenters that
focusing on network preparations will
provide significant concrete evidence
that a voice service provider is taking
the necessary steps in its STIR/SHAKEN
implementation, and will thus offer
confirmation that a provider has
adopted the STIR/SHAKEN
authentication framework. We further
agree with AT&T that our original
certification-based proposal would not
provide specific measurable criteria by
which to assess a provider’s progress.
Simply issuing a commitment will not
do as much to ensure that voice service
providers are actually doing so as will
an obligation to undertake the network
preparations necessary to operationalize
the STIR/SHAKEN protocols on their
networks. Taking the necessary first
steps to participate in STIR/SHAKEN
more affirmatively demonstrates a voice
service provider’s commitment and
preparedness to implement an effective
caller ID authentication framework than
a general declaration of intent that may
or may not be accompanied by concrete
steps. We disagree with T-Mobile’s
unsupported contention that our
previous proposal would be preferable.
While a public commitment to complete
implementation of STIR/SHAKEN by
June 30, 2021 would be a welcome
initial step, we conclude that the better
approach is to require voice service
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
providers to undertake the preparations
necessary to implement this framework,
rather than merely issuing a pledge to
do so.
109. Prong (ii)—Participation with
Other Providers. In the Further Notice of
Proposed Rulemaking, we proposed to
read the phrase ‘‘has agreed voluntarily
to participate with other providers of
voice service in the STIR/SHAKEN
authentication framework’’ in prong
(A)(ii) to require that the voice service
provider has written, signed agreements
with at least two other voice service
providers to exchange calls with
authenticated caller ID information.
After reviewing the record, we revise
this proposal to require that the voice
service provider has demonstrated its
voluntary agreement to participate with
other voice service providers in the
STIR/SHAKEN framework by
completing formal registration
(including payment) and testing with
the Policy Administrator.
110. We agree with commenters that
such an action would signal both a
public and financial commitment to
working with other voice service
providers sufficient to confirm a
provider’s coordination efforts.
Registering with the Policy
Administrator is a necessary predicate
to participation with other voice service
providers in the STIR/SHAKEN
framework, and was formulated by the
industry to allow the exchange of
authenticated traffic without requiring
dedicated agreements between voice
service providers. Completing formal
registration and testing with the Policy
Administrator thus signals both a voice
service provider’s technical readiness
and willingness to participate with
other providers in the STIR/SHAKEN
framework. We further agree with
AT&T, CTIA, and CCA that our initial
proposal ignores certain market realities
by assuming that every provider of voice
services will require multiple
agreements to exchange traffic destined
to every point on the PSTN. Given that
some voice service providers may not
require two or more interconnection
arrangements, let alone multiple
agreements with other providers, to
exchange their IP-based traffic,
imposing a two-agreement requirement
to demonstrate voluntary participation
in the STIR/SHAKEN framework would
be arbitrary and might even inject
artificial inefficiencies into such
arrangements. Our revised
interpretation of prong (A)(ii) more
closely aligns with the language and
intended purpose of the statute, and
better encourages STIR/SHAKEN
implementation without introducing
potential inefficiencies. Exchanging
PO 00000
Frm 00023
Fmt 4701
Sfmt 4700
73381
traffic using certificates assigned
through the governance system is
exactly the way STIR/SHAKEN is
designed to work. Encouraging voice
service providers to complete formal
registration and testing with the Policy
Administrator is thus the most
appropriate and reasonable
interpretation of the requirement in
prong (A)(ii).
111. Prong (iii)—Begun to Implement.
As proposed in the Further Notice of
Proposed Rulemaking, we implement
the phrase ‘‘has begun to implement the
STIR/SHAKEN authentication
framework’’ in prong (A)(iii) by
requiring that the voice service provider
has completed the necessary network
upgrades to at least one network
element (e.g., a single switch or session
border controller) to enable the
authentication and verification of caller
ID information consistent with the
STIR/SHAKEN standards. This
interpretation requires a voice service
provider to make meaningful progress
on implementation by the time of
certification, while taking into account
that voice service providers will have
limited time between adoption of this
Order and the December 30, 2020
deadline for exemption determinations.
While CCA argues that our approach is
unachievable and overly prescriptive,
we disagree. To the contrary, our
approach accounts for the abbreviated
timeframe by giving voice service
providers the flexibility to choose to
complete upgrades on the network
element which they can upgrade most
efficiently.
112. In this case, we find
USTelecom’s suggestion that we require
voice service providers to establish the
capability to authenticate originated
traffic and/or validate such traffic
terminating on their networks to be
excessively vague, and it is unclear how
little or how much voice service
providers would be required to do
under such a rule. Depending on the
voice service provider, simply
‘‘establishing’’ the capability to
authenticate originated traffic and/or
validate such traffic terminating on their
networks could consist of fully
implementing this capability or merely
attaining this capability without
actually deploying it in one’s network.
To the extent that USTelecom—which
does not provide a rationale for its
proposal—is concerned that the
standard we adopt will be too easily
met, we are confident that the
opportunity to verify implementation of
an effective authentication framework
will help identify any voice service
providers that fail to meet their STIR/
E:\FR\FM\17NOR2.SGM
17NOR2
73382
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
SHAKEN implementation
commitments.
113. Prong (iv)—Capable of Fully
Implementing. Last, and as proposed in
the Further Notice of Proposed
Rulemaking, we implement the
obligation to ‘‘be capable of fully
implementing the STIR/SHAKEN
authentication framework’’ not later
than June 30, 2021, in prong (A)(iv) so
as to require that the voice service
provider reasonably foresees that it will
have completed all necessary network
upgrades to its network infrastructure to
be able to authenticate and verify caller
ID information for all SIP calls
exchanged with STIR/SHAKEN-enabled
partners by June 30, 2021. After
considering the arguments in the record,
we agree with T-Mobile that our
proposal is preferable to USTelecom’s
narrower alternative of requiring a
certification that all consumer VoIP and
VoLTE traffic originating or terminating
on a voice service provider’s network
either is or will be capable of
authentication and validation by June
30, 2021. This requirement falls short of
our implementation mandate, which
requires that all calls be subject to caller
ID authentication and verification—not
just consumer VoIP and VoLTE traffic—
except for those subject to the narrow
and time-limited extensions we adopt in
this document. To grant an exemption
for voice service providers that will be
capable of anything short of full
compliance would indefinitely leave out
calls the TRACED Act and our rules
thereunder require to be subject to caller
ID authentication. Such an approach
also is inconsistent with the statute,
which requires ‘‘full[]
implementation[]’’ by June 30, 2021, so
it is appropriate for us to demand that
a provider reasonably foresee that it will
meet that standard, rather than set a bar
that is more easily cleared at the twelvemonth mark but that heightens the risk
of a voice service provider ultimately
falling short just six months later. While
we understand AT&T’s point that voice
service providers with more complex,
diverse networks will necessarily have
more complicated and costly STIR/
SHAKEN implementation requirements,
we do not think that our proposal is
‘‘overly rigid’’ or ‘‘ambiguous.’’ Nor do
we agree with CCA that it is ‘‘overly
prescriptive.’’ Rather, we institute a
clear requirement that voice service
providers ‘‘reasonably foresee’’ that they
will be able to meet the standard
Congress established by the deadline
that Congress established. This
interpretation gives as much latitude to
voice service providers as possible to
achieve the desired benchmarks while
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
still requiring some basis for the claim
that a provider is ‘‘capable of fully
implementing the STIR/SHAKEN
authentication framework.’’
3. Threshold for Non-IP Networks
Exemption
114. Under the TRACED Act, a voice
service provider is excused from the
requirement to take reasonable measures
to implement an effective caller ID
authentication framework in the non-IP
portions of its network if the
Commission finds that it: (1) Has taken
reasonable measures to implement an
effective caller ID authentication
framework in the non-IP portions of its
network; and (2) will be capable of fully
implementing an effective caller ID
authentication framework in the non-IP
portions of its network not later than
June 30, 2021. While we anticipate that
in the non-IP context few if any voice
service providers will seek to take
advantage of this exemption because of
the difficulties in ‘‘fully implementing
an effective caller ID authentication
framework’’ by June 30, 2021, we
nevertheless adopt standards for
determining whether a voice service
provider has met both requirements
necessary to receive an exemption
under section 4(b)(2)(B) of the TRACED
Act for the non-IP portions of its
network, as required by the TRACED
Act.
115. In the Further Notice of Proposed
Rulemaking, we sought comment on
section 4(b)(2)(B) and whether there was
an ‘‘acceptable interpretation of the
‘fully implementing’ prong that would
make it more achievable for voice
service providers to qualify for the
exemption.’’ We further sought
comment on what constitutes an
‘‘effective’’ call authentication
framework and ‘‘reasonable measures’’
for purposes of this section. We now
find that a voice service provider
satisfies the first prong—requiring
reasonable measures to implement an
effective caller ID authentication
framework—if it can certify that it is
working to develop a non-IP
authentication solution. Because the
statutory language is similar to that used
to establish the non-IP mandate, we find
it appropriate to harmonize our
interpretation of these two provisions.
Section 4(b)(1)(B) of the TRACED Act
requires a voice service provider ‘‘to
take reasonable measures to implement
an effective call authentication
framework’’ in the non-IP portions of its
networks, while section 4(b)(2)(B)(i)
requires that a voice service provider
‘‘has taken reasonable measures to
implement an effective call
authentication framework’’ in the non-
PO 00000
Frm 00024
Fmt 4701
Sfmt 4700
IP portions of its network. While we
recognize the difference in tenses
between the two provisions—one refers
to taking reasonable measures, while the
other states that such measures must
have already been taken—the remaining
language is identical. Thus, we find that
the two provisions are similar enough to
implement the same standard in order
to quantify what constitutes ‘‘reasonable
measures’’ in both instances. Further,
adopting a uniform approach allows us
to avoid creating unnecessarily
burdensome overlapping, but distinct,
requirements. While we harmonize
these provisions, we do not include the
first method of compliance with our
non-IP mandate, which a provider
satisfies by completely upgrading its
non-IP networks to IP and implementing
the STIR/SHAKEN authentication
framework. A provider that has
completely upgraded its non-IP
networks to IP would be subject to the
exemption for IP networks, rather than
the exemption for non-IP networks, and
would be required to satisfy the
requirements laid out for that
exemption.
116. AT&T supports a proposal to
require providers to participate in either
standards development for a TDM call
authentication framework or implement
a robust robocall mitigation program as
two options for satisfying the
‘‘reasonable measures’’ prong of this
section. We agree as to the former
suggestion, but we find the latter
suggestion unduly overlaps with the
distinct robocall mitigation program
requirement under the statute.
117. We implement the provision in
section 4(b)(2)(B)(ii) of the TRACED Act
that voice service providers be ‘‘capable
of fully implementing an effective caller
ID authentication framework in the nonIP portions of their networks not later
than [June 30, 2021]’’ by requiring that
the voice service provider reasonably
foresees that it will have completed all
necessary network upgrades to its
infrastructure to be able to authenticate
and verify caller ID information for all
non-IP calls originating or terminating
on its network as provided by a
standardized caller ID authentication
framework for non-IP networks. This
approach is consistent with our
approach to the fourth prong of the IP
network exemption, in which we
construe ‘‘fully implementing’’ to mean
that caller ID information is able to be
authenticated and verified for all calls
exchanged with technically-able
partners. Further, it is consistent with
our evaluation of when a non-IP caller
ID authentication framework is
‘‘reasonably available,’’ and we
consistently consider such a framework
E:\FR\FM\17NOR2.SGM
17NOR2
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
to be ‘‘effective’’ only when it is
standardized. We find that this
approach gives as much latitude to
voice service providers as possible to
achieve the desired result within the
prescribed timeframe while again
requiring some basis for the claim—
here, that the provider be ‘‘capable of
fully implementing an effective caller ID
authentication framework.’’
4. Compliance Certifications
118. As proposed in the Further
Notice of Proposed Rulemaking, we find
that the best way to implement the
TRACED Act’s exemption provision is
via a certification process. Specifically,
we require a voice service provider that
seeks to receive an exemption to submit
a certification that it meets the criteria
for the IP networks exemption that we
have established pursuant to section
4(b)(2)(A), the criteria for the non-IP
networks exemption that we have
established pursuant to section
4(b)(2)(B), or both, as appropriate for its
network(s). Given the inherent and
obvious difficulty of making
individualized determinations of
whether providers qualify for the IP
networks exemption on such a
truncated timeframe, we find that a
certification process is necessary to
allow us to meet Congress’s deadline for
completion of exemption
determinations by December 30, 2020.
This approach is unopposed, and both
T-Mobile and AT&T support the use of
a certification process ‘‘as the
appropriate vehicle for a voice service
provider to assert its qualification for
either or both of the statutory
exemptions.’’
119. Each voice service provider that
seeks to qualify for either the section
4(b)(2)(A) or the section 4(b)(2)(B)
exemption, or both, must have an officer
of the voice service provider sign a
compliance certificate stating under
penalty of perjury that the officer has
personal knowledge that the company
meets each of the stated criteria. Such
an attestation is necessary to ensure the
accuracy of the underlying certification.
We also require the voice service
provider to submit an accompanying
statement explaining, in detail, how the
company meets each of the prongs of
each applicable exemption so that the
Commission can verify the accuracy of
the certification.
120. As proposed in the Further
Notice of Proposed Rulemaking, all
certifications submitted pursuant to this
requirement must be filed no later than
December 1, 2020. All certifications and
supporting statements must be filed
electronically in WC Docket No. 20–68,
Exemption from Caller ID
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
Authentication Requirements, in the
Commission’s Electronic Comment
Filing System (ECFS). We direct the
Bureau to provide additional directions
and filing information regarding the
certifications—including issuing
protective orders governing the
submission and review of confidential
and highly confidential information,
where necessary—by November 9, 2020,
or in the Public Notice announcing
Office of Management and Budget
approval of this process, whichever
comes sooner. And we direct the Bureau
to review the certifications and
accompanying documents for
completeness and to determine whether
the certifying party has met the
requirements we have established. We
further direct the Bureau to issue a list
of parties that have filed complete, valid
compliance certifications and that will
thus receive the exemption(s) on or
before December 30, 2020.
121. Because of the limited time for
review of certifications, we proposed in
the Further Notice of Proposed
Rulemaking that any voice service
providers that file inadequate
certifications would not receive an
opportunity to cure and instead would
be subject to the general duty we
established to implement STIR/
SHAKEN by June 30, 2021. We adopt
this proposal here. We find this
consequence to be reasonable and
appropriate because the purpose of the
certification is merely to determine
which voice service providers would, in
the absence of the STIR/SHAKEN
obligation, nonetheless be able to
implement STIR/SHAKEN in a timely
manner. While we are sympathetic to
AT&T’s suggestion that we permit voice
service providers a chance to cure and
revise their certifications should they be
found deficient, the extremely truncated
timeline for review of certifications
prevents us from allowing such options.
Simply put, there is insufficient time to
permit voice service providers to revise
and resubmit certifications that the
Bureau has deemed deficient and for the
Bureau to review such resubmitted
certifications prior to the statutory
December 30, 2020 deadline for
completion of exemption
determinations. Voice service providers
must do their best to demonstrate in
their initial certifications that they have
met all the statutory requirements
necessary to qualify for an exemption.
Moreover, as stated above, we find the
inability of voice service providers to
‘‘cure’’ deficient certifications to be
insignificant given the purpose of the
certification.
122. Implementation Verification. The
section 4(b)(2)(A) and (B) exemptions
PO 00000
Frm 00025
Fmt 4701
Sfmt 4700
73383
are, by their nature, based on a voice
service provider’s prediction of its
future ability to implement STIR/
SHAKEN by June 30, 2021. As we
explained in the Further Notice of
Proposed Rulemaking, we believe that
Congress intended for us to verify, after
the fact, that voice service providers
claiming the exemption completed full
implementation in accordance with
their commitments. Such a review is
consistent with the TRACED Act both
because the broad structure of section 4
aims toward full implementation of
caller ID authentication and because
sections 4(b)(2)(A)(iv) and 4(b)(2)(B)(ii)
each state that a voice service provider
may receive the exemption only if it
‘‘will’’ be capable of ‘‘fully’’
implementing a caller ID authentication
framework (STIR/SHAKEN or ‘‘an
effective call authentication
framework,’’ respectively). This
approach is unopposed in the record,
and T-Mobile correctly notes that
without such verification, the voluntary
exemption could be misused as a
loophole by voice service providers,
thereby diminishing the ultimate
effectiveness of STIR/SHAKEN
implementation, the success of which
depends on the participation of a
critical mass of voice service providers.
To guard against the risk of gaps and
abusive claims of the exemption, and as
proposed in the Further Notice of
Proposed Rulemaking, we therefore
require voice service providers that
receive an exemption to file a second
certification after June 30, 2021, stating
whether they, in fact, achieved the
implementation goal to which they
previously committed.
123. As proposed in the Further
Notice of Proposed Rulemaking, the
certification must be filed electronically
in WC Docket No. 20–68, Exemption
from Caller ID Authentication
Requirements, in ECFS subject to the
same allowance for confidentiality and
requirements for sworn signatures and
detailed support as the initial
certifications. This process will not only
help the Bureau to verify the accuracy
of the certification, but will assist it in
conducting its review while at the same
time ensuring that any confidential or
proprietary information included by
filers remains safe from disclosure. We
direct the Bureau to issue a Public
Notice no later than three months after
June 30, 2021, setting a specific
deadline for the certifications and
providing detailed filing requirements.
We direct the Bureau to seek public
comment on these certifications.
Following review of the certifications,
supporting materials, and responsive
E:\FR\FM\17NOR2.SGM
17NOR2
73384
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
comments, we direct the Bureau to issue
a Public Notice, no later than four
months after the date of filing of the
certifications, identifying which voice
service providers achieved the
implementation goal to which they
previously committed. As suggested in
the record, we clarify that voice service
providers that certified in December of
2020 that they have already fully
implemented the necessary STIR/
SHAKEN requirements, and for which
the Bureau accepted the certification,
need not file a second certification. This
second filing is required only from those
voice service providers that have not yet
‘‘fully implemented’’ STIR/SHAKEN by
the time of their initial December 2020
certification, but have committed to
doing so by June 30, 2021.
124. We disagree with T-Mobile’s
assertion that there is little value is
seeking public comment on voice
service providers’ certifications. While
T-Mobile is correct that a review of
whether a voice service provider has
conformed to the terms of its exemption
declarations and implemented STIR/
SHAKEN will require a technical
analysis, we anticipate that the
considered comments of market
participants, technical and trade
associations, and industry professionals
can inform and enrich the Bureau’s
analysis of any such technical issues.
Further, allowing comments is critical
to maintaining a clear and transparent
process. Moreover, to the extent that
parties must submit confidential
information, the Bureau will issue
protective orders governing submission
and review akin to those we have
employed in numerous other contexts.
There is thus no risk that any voice
service provider will be obligated to
publicly disclose ‘‘sensitive network
information’’ as part of this certification
and comment process.
125. As proposed in the Further
Notice of Proposed Rulemaking, if a
voice service provider cannot certify to
full implementation upon the filing of
the second certification but
demonstrates to the Bureau that (1) it
filed its initial certification in good
faith—i.e., with a reasonable
expectation that it would be able to
achieve full implementation as
certified—and (2) made similarly good
faith efforts to complete
implementation, the consequence for
such a shortcoming is the loss of the
exemption and application of the
general rule requiring full STIR/
SHAKEN implementation, effective
immediately upon release of the Bureau
Public Notice identifying which voice
service providers achieved the
implementation goal to which they
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
previously committed. We find that an
immediate effective date is required to
ensure that certain voice service
providers do not receive an extension
not granted to similarly situated voice
service providers simply because they
filed a certification they later failed to
meet. If the Bureau finds that a voice
service provider filed its initial
certification in bad faith or failed to take
good faith steps toward implementation,
we will not only require that voice
service provider to fully implement
STIR/SHAKEN immediately, but will
further direct the Bureau to refer the
voice service provider to the
Enforcement Bureau for possible
enforcement action based on filing a
false initial certification.
5. Voice Service Providers Eligible for
Exemption
126. We proposed in the Further
Notice of Proposed Rulemaking to
interpret the TRACED Act’s exemption
process to apply only to voice service
providers and to exclude intermediate
providers. We adopt that approach here.
No commenters addressed this issue in
the record. In the TRACED Act,
Congress directs the Commission to
require ‘‘provider[s] of voice service’’ to
implement STIR/SHAKEN in the IP
portions of their networks. The
exemption provisions in section 4(b)(2)
of the TRACED Act similarly refer to
‘‘provider[s] of voice service.’’ Because
the obligation on intermediate providers
to implement the STIR/SHAKEN
authentication framework is being
adopted pursuant to our authority in the
Truth in Caller ID Act and section
251(e), we do not believe that the
exemption process, which is mandated
under and governed by the TRACED
Act, needs to apply to such intermediate
providers. We do not find that there is
a compelling policy argument in favor
of extending the TRACED Act’s
exemption process to intermediate
providers. The exemption process as
laid out in the TRACED Act will not
have long-term benefits to providers,
since even those that qualify for the
exemption must be capable of fully
implementing either the STIR/SHAKEN
authentication framework or an effective
call authentication framework not later
than June 30, 2021. Given this, we are
disinclined to add further
administrative and regulatory
complication where not required by the
TRACED Act.
E. Line Item Charges
127. We adopt our proposal in the
First Caller ID Authentication Report
and Order and FNPRM to prohibit voice
service providers from imposing
PO 00000
Frm 00026
Fmt 4701
Sfmt 4700
additional line item charges on
consumer or small business subscribers
for caller ID authentication. The record
reflects support for this proposal, and
we believe adopting it is a
straightforward implementation of
Congress’s direction and authority in
the TRACED Act to ‘‘prohibit providers
of voice service from adding any
additional line item charges to
consumer or small business customer
subscribers for the effective call
authentication technology.’’
128. We are unconvinced by
arguments opposed to the rule we adopt
in this document. MT Networks argues
that we should instead affirmatively
permit voice service providers to list
caller ID authentication ‘‘as a billable
feature on their line.’’ Because MT
Networks fails to explain how such an
alternative course of action would be
consistent with the text of the TRACED
Act, we decline to adopt such a
suggestion. Securus argues that the
prohibition on line item charges should
not apply to inmate calling service
providers. We similarly decline to adopt
such an exemption for these providers,
as the TRACED Act’s prohibition on line
item charges extends to all ‘‘providers of
voice service,’’ which includes inmate
calling service providers.
129. Other commenters argue that we
should go even further than the
TRACED Act and prohibit voice service
providers from recouping costs of caller
ID authentication and other robocall
mitigation solutions entirely. Some
commenters argue that we should also
prohibit charges for call blocking
services. We decline to do so at this
time because we do not address call
blocking-related issues in this Report
and Order. We decline to take such
action because doing so would go
beyond the directive in the TRACED
Act, and because we recognize that
implementation of caller ID
authentication imposes cost on voice
service providers. Additionally, the
record shows that some voice service
providers may not have enough
resources simply to absorb the cost of
implementing caller ID authentication.
By not prohibiting cost recovery through
alternate means, we promote the
investment by all voice service
providers in caller ID authentication
solutions for their networks.
130. As proposed, we interpret
‘‘consumer’’ in this context to mean
residential mass market subscribers, and
adopt a rule consistent with this
interpretation. We interpret ‘‘consumer’’
to refer to individual subscribers
because we believe this interpretation
will protect individuals from receiving
line item charges on their bills. We
E:\FR\FM\17NOR2.SGM
17NOR2
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
received no opposition in the record to
our proposal. We also adopt our
proposal to interpret ‘‘small business’’
to refer to business entities that meet the
Small Business Administration
definition of ‘‘small business.’’ We
adopt this definition of ‘‘small
business’’ because it reflects the
judgment of the Small Business
Administration, which has expertise in
this area. We received no opposition in
the record for this interpretation. We
decline to adopt RadNet’s proposal that
we prohibit voice service providers
‘‘from charging healthcare facilities and
providers, regardless of size, for call
authentication technology,’’ because the
TRACED Act establishes the classes of
entities that Congress intended to
protect from additional line item
charges for caller ID authentication:
Consumers and small business
subscribers. Additionally, healthcare
facilities that meet the standard for
‘‘small business’’ that we establish are
covered by our rule, and so separate
protection for such healthcare facilities
would be redundant. Healthcare
facilities that exceed the definition of
‘‘small business’’ are in a better position
to negotiate billing arrangements with
voice service providers than small
businesses and residential mass market
subscribers. Thus, providing them with
the same protections would be
unnecessary.
131. We also adopt our proposal to
implement this section of the TRACED
Act by prohibiting voice service
providers from imposing a line item
charge for the cost of upgrading network
elements that are necessary to
implement caller ID authentication, for
any recurring costs associated with the
authentication and verification of calls,
or for any display of caller ID
authentication information on their
subscribers’ phones. Caller ID
authentication solutions work by
allowing the originating voice service
provider to authenticate the caller ID
information transmitted with a call it
originates, and the terminating provider
to verify that the caller ID information
transmitted with a call it receives is
authentic and act on the information
provided after verification. The record
reflects that voice service providers
must upgrade their existing network
elements to enable caller ID
authentication, and pay recurring
maintenance and other operating fees in
order to actively authenticate caller ID
information. And, for caller ID
authentication technology to be
meaningful for subscribers, voice
service providers may choose to display
caller ID authentication information to
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
their end users. We find that the
prohibition as adopted covers the full
scope of costs ‘‘for’’ providing caller ID
authentication to consumer and small
business subscribers.
132. CenturyLink argues that this is
too expansive a reading of the TRACED
Act’s language. Instead, CenturyLink
suggests that, to be more aligned with
the language of the TRACED Act, we
only prohibit line items for costs
‘‘related to the basic signing of calls and
verifying of Identity headers.’’ We fail to
see how costs associated with, for
example, network upgrades that are
necessary to implement caller ID
authentication are not ‘‘for’’ such
technology, and CenturyLink does not
explain why we should read ‘‘for’’ in
this context so narrowly. We also note
that we do not prohibit cost recovery for
such costs by alternative means.
F. Intermediate Providers
133. To further promote effective,
network-wide caller ID authentication,
we adopt the proposal from our First
Caller ID Authentication Report and
Order and FNPRM to extend our STIR/
SHAKEN implementation mandate to
intermediate providers. The STIR/
SHAKEN framework enables an end-toend system for authenticating the
identity of the caller. For this system to
work, the Identity header must travel
the entire length of the call path—even
when a call transits the networks of
intermediate providers. Thus,
intermediate providers play a crucial
role in this system. In the First Caller ID
Authentication Report and Order and
FNPRM, we proposed imposing
obligations on intermediate providers
for calls they receive with authenticated
and unauthenticated caller ID
information. For calls with
authenticated caller ID information that
an intermediate provider receives and
will exchange in SIP, we proposed
requiring an intermediate provider to
pass any Identity header associated with
that call, unaltered, to the subsequent
provider in the call path. And for calls
an intermediate provider receives
without authenticated caller ID
information that it will exchange in SIP,
we proposed requiring the intermediate
provider to authenticate that call with
‘‘gateway’’ or ‘‘C’’-level attestation
before passing it to the subsequent
intermediate or voice service provider
in the call path. With modifications, we
adopt both of these proposals.
1. Authenticated Calls
134. We adopt our proposal to require
intermediate providers to pass any
Identity header that they receive to the
terminating voice service provider or
PO 00000
Frm 00027
Fmt 4701
Sfmt 4700
73385
subsequent intermediate provider in the
call path. This means, technically, that
the intermediate provider must forward
the Identity header downstream in the
SIP INVITE. By placing this requirement
on intermediate providers, we ensure
that SIP calls can benefit from STIR/
SHAKEN regardless of what provider
transits the call. This proposal received
wide support, and no opposition, in the
record. INCOMPAS, which notes that it
represents a number of entities that act
as intermediate providers, agrees that
‘‘[t]he success of STIR/SHAKEN
ultimately depends on the broad
participation of voice service providers,
including, wherever technically
feasible, intermediate providers.’’
AT&T, Comcast, and Verizon also all
confirm the importance of adopting this
rule. AT&T notes that ‘‘requiring
intermediate providers to pass through
Identity header information is necessary
to ensure that calls retain authentication
information across the entire call path.’’
Comcast writes that ‘‘[a]chieving truly
nationwide call authentication requires
the participation of all providers
involved in transmitting voice calls,
including intermediate providers.’’ And
Verizon emphasizes that regulatory
action is necessary to ensure
intermediate provider involvement in
the system. We agree with these
assertions.
135. Additionally, we further adopt
our proposal to require intermediate
providers to pass the Identity header
unaltered. We find that this requirement
is necessary to prevent a downstream
provider from tampering with the
Identity header and thus undermining
the end-to-end chain of trust between
the originating and terminating voice
service providers. Commenters support
this approach, with NCTA stating that it
is necessary to ‘‘maintain the integrity of
the authentication information and
reduce the potential for inadvertent
error or intentional manipulation,’’ and
Hiya noting that ‘‘having access to
untampered identity headers will
significantly aid analytics and, as a
result, the detection of illegal
robocalls.’’ This requirement ensures
that all SIP calls benefit from STIR/
SHAKEN, increasing the effectiveness of
STIR/SHAKEN in combating illegally
spoofed robocalls and fraudulent
robocall schemes. And although entities
acting as intermediate providers will
face implementation costs in order to
forward unaltered Identity headers, they
will not face the recurring costs
necessary to authenticate and verify
caller ID information. Moreover, we
expect these one-time implementation
costs to be far less than the benefits of
E:\FR\FM\17NOR2.SGM
17NOR2
73386
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
this intermediate provider requirement
because the inclusion of intermediate
providers is important to achieving the
benefits discussed in the First Caller ID
Authentication Report and Order.
Requiring intermediate providers to
pass the Identity headers that they
receive to the subsequent intermediate
provider in the call path or the
terminating voice service provider is
crucial to ensuring end-to-end caller ID
authentication and unlocking these
benefits for consumers and providers
alike.
136. The record convinces us,
however, to modify our proposal to
allow an intermediate provider to strip
the Identity header in two narrow
circumstances: (1) For technical reasons
where necessary to complete the call,
and (2) for security reasons where an
intermediate provider reasonably
believes the Identity header presents a
threat to its network security. Several
commenters explain that these are
legitimate reasons why an intermediate
provider might need to strip the Identity
header.
137. In identifying the limited
technical reasons an intermediate
provider may need to strip the Identity
header, the industry standards group
ATIS explains that it may be necessary
to strip an Identity header for call
completion in cases such as
Government Emergency
Telecommunications Service (GETS)
call processing; INCOMPAS identifies
instances where the Identity header may
be too large to successfully transit the
network; and we recognize it may be
necessary to strip the Identity header
before exchanging a call with a non-IP
provider or at a non-IP interconnection
point. We emphasize that the technical
necessity exception is narrow and
limited to circumstances that are
necessary to complete the call. The
technical necessity exception does not
extend to failures or inadequacies in an
intermediate provider’s network. As the
technology supporting STIR/SHAKEN
advances and improves, it may be
possible to transmit headers in
circumstances where it previously was
not. As such, we will continue to
monitor the use of this exception and
adjust its outer limits as needed.
Commission staff will not hesitate to
refer reports of intermediate providers
abuse of this exception to the
Enforcement Bureau.
138. Regarding the security exception,
Verizon advocates that we allow
intermediate providers to act should
Identity headers become ‘‘an attack
vector used by bad actors.’’ We agree
and so do not prohibit an intermediate
provider from stripping the Identity
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
header when it reasonably believes the
header presents an imminent threat to
its network security. We do not,
however, permit an intermediate
provider to strip the header if it believes
the Identity header has been tampered
with or is fraudulent short of presenting
an imminent security threat. This
narrow exception does not empower the
intermediate provider to make
determinations on behalf of other
providers in the call path or to interfere
with the verification process defined in
the SHAKEN standards. Instead, our
goal is to permit an intermediate
provider to act in the face of an
imminent security threat to its network.
We emphasize that intermediate
providers must employ this exception
sparingly, and the exception will not
apply where an intermediate provider
strips Identity headers routinely instead
of maintaining reasonable network
security. Furthermore, since no
commenter identified a circumstance
where an intermediate provider would
need to alter the Identity header, we
specify that intermediate providers may
not alter Identity headers under any
circumstance.
139. Relatedly, we prohibit an
originating voice service provider from
sending excessively large headers with
the goal of evading STIR/SHAKEN
compliance by forcing an intermediate
provider to strip the header before
exchanging the call with a subsequent
downstream provider. We would
consider such conduct a violation of our
rule requiring an originating voice
service provider to authenticate caller
ID information for calls it originates and
exchanges with another voice service
provider or intermediate provider.
140. ACA Connects proposes that we
prohibit intermediate providers from
passing a call they have received in SIP
to a downstream provider in TDM when
there is a downstream IP option
available. We decline to adopt this
proposal because, at this early stage, we
do not wish to interfere with call
routing decisions for the sake of
promoting STIR/SHAKEN. Providers
must consider a variety of factors when
routing calls, including cost and
reliability, and we do not believe at this
stage that preserving STIR/SHAKEN
headers should swamp all other
considerations. For the same reason, we
decline to adopt USTelecom’s
suggestion to require gateway providers
to pass international traffic only to
downstream providers that have
implemented STIR/SHAKEN. Finally,
while we do not require intermediate
providers to append duplicative Identity
headers to calls that they transit, we
decline to prohibit this practice at this
PO 00000
Frm 00028
Fmt 4701
Sfmt 4700
stage of STIR/SHAKEN deployment
across the voice network. AT&T
contends that, if intermediate providers
append duplicative Identity headers, it
would add additional complexity and
consume bandwidth for other providers.
However, this issue received little
attention in the record and, at this time,
we have no reason to think it is a
practice industry will adopt widely. We
decline to be overly prescriptive at this
early stage of deployment, and we will
monitor this issue for any problems that
develop.
2. Unauthenticated Calls
141. We also adopt a modified version
of the proposed authentication
requirement on intermediate providers
for unauthenticated calls. Specifically,
we require that an intermediate provider
authenticate the caller ID information of
a call that it receives with
unauthenticated caller ID information
that it will exchange with another
intermediate provider or terminating
voice service provider as a SIP call.
However, a provider is relieved of this
obligation if it (i) cooperatively
participates with the industry traceback
consortium and (ii) responds to all
traceback requests it receives from the
Commission, law enforcement, or the
industry traceback consortium regarding
calls for which it acts as an intermediate
provider. Our final requirement differs
from our proposed requirement in two
ways. First, we do not require an
intermediate provider to authenticate
with a C-level or gateway attestation.
Instead, if a provider chooses to
authenticate the caller ID information of
an unauthenticated call that it receives,
we require only that a provider
authenticate the caller ID information
consistent with industry standards. And
second, our modified requirement
allows participation with the industry
traceback consortium as an alternative
option for compliance.
142. In the First Caller ID
Authentication Report and Order and
FNPRM, we proposed requiring
intermediate providers to authenticate
caller ID information for
unauthenticated traffic that they receive
with a C-level attestation, and
tentatively concluded this requirement
would improve traceback efforts and
analytics. Some commenters—including
major voice service providers that have
reported substantial progress in STIR/
SHAKEN implementation—endorse our
reasoning that such a rule is in
compliance with the industry standards,
would enhance traceback capabilities,
and would benefit call analytics.
Neustar argues that intermediate
providers should authenticate caller ID
E:\FR\FM\17NOR2.SGM
17NOR2
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
information for calls that they transmit
that lack such information because ‘‘it
allows the terminating voice service
provider to more easily traceback
otherwise unauthenticated calls, and
provides additional information that can
be used to facilitate innovation in the
robocall analytics space.’’ And T-Mobile
explains that intermediate provider
authentication would be useful to
terminating voice service providers
because ‘‘[h]aving some information
regarding this large subset of calls to
enable traceback and strengthen
analytics is preferable to having no
information on which to make blocking
and labeling decisions.’’ T-Mobile
further explains that even ‘‘C-attested
calls all contain an origination ID
(‘origid’)’’ which is ‘‘a globally unique
identifier that represents the originating
point of the call, such as the telephone
switch where the call started, or a trunk
group, which can be useful in tracing
back the origin of a call.’’ And T-Mobile
notes that ‘‘[w]hile USTelecom’s
Industry Traceback Group (‘ITG’) can do
its work without relying on origid, this
does not obviate the need for origid,
which would further advance ITG’s
goals.’’
143. We modify our proposal to
require attestation consistent with
industry standards rather than
specifically requiring C-level attestation
because this approach better aligns with
our goal of promoting implementation
of the industry-defined caller ID
authentication standards rather than
interfering with their technical
application. This modification brings
our intermediate provider rules in line
with the STIR/SHAKEN obligations we
imposed on originating and terminating
voice service providers. In the First
Caller ID Authentication Report and
Order and FNPRM, we explained that
for compliance with our rules it would
be sufficient to adhere to the three
standards that comprise the foundation
of the STIR/SHAKEN framework—
ATIS–1000074, ATIS–1000080, and
ATIS–1000084—and all documents
referenced therein. Recognizing that
industry standards are not static, we
framed the most recent versions of these
standards as the baseline requirements
for compliance. We follow that
approach here and establish that
compliance with the most current
version of these three standards as of
September 30, 2020, including any
errata as of that date or earlier,
represents the minimum requirement
for intermediate providers to satisfy our
rules. We encourage innovation and
improvement to the STIR/SHAKEN
framework, so long as any changes or
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
additions do not compromise the
baseline call authentication
functionality envisioned by ATIS–
1000074, ATIS–1000080, and ATIS–
1000084. An example of such an
innovation is the recent technical report
ATIS and the SIP Forum released
providing guidelines for originating
providers on the population of the
SHAKEN attestation indicator and
origination identifier.
144. Beyond harmonizing our
requirements on intermediate providers
and originating and terminating voice
service providers, this modification
responds to record interest in allowing,
where possible, intermediate providers
to authenticate caller ID information
with a higher level of attestation than a
C-level attestation. It is not our intent to
preclude or interfere with efforts to
accommodate this interest; only to
ensure the caller ID information for such
calls be authenticated. To that end, we
agree with commenters that argue we
should not require intermediate
providers to authenticate calls with a
specific level of attestation, and require
instead that intermediate providers
authenticate the caller ID information
for unauthenticated calls consistent
with industry standards as described
above. This clarification allows for and
encourages industry progress, and we
look forward to seeing progress on the
numerous proposals in the record to
allow for more robust authentication of
such calls. We decline to require any
specific solution, as some commenters
suggest, or to impose a specific timeline.
We encourage interested parties to
continue this work promptly, but the
record does not include enough
information on which to base a
deadline, and industry standards bodies
are better-suited to modify the standards
they have created.
145. Although we establish this
requirement, in response to arguments
that our proposal was unduly
burdensome in some cases, we allow for
an intermediate provider to register and
participate with the industry traceback
consortium as an alternative means of
complying with our rules. Several
commenters claim that a requirement
for intermediate providers to
authenticate the caller ID information of
all unauthenticated calls that they
receive would cause bandwidth
problems within provider networks.
Several commenters also express
concern that an attestation requirement
would undermine the efficacy of STIR/
SHAKEN by ‘‘pollut[ing] the ecosystem’’
with ‘‘billions of useless attestations,’’
causing customer harm and confusion.
Further, some commenters contend that
such a requirement would not lead to
PO 00000
Frm 00029
Fmt 4701
Sfmt 4700
73387
the benefits that we proposed would
accrue. Other commenters in the record
push back on these concerns, and
because of the potential value of more
ubiquitous authentication, we do not
find that these concerns justify the
elimination of this requirement entirely.
We find that attestation of previously
unauthenticated calls will provide
significant benefits in facilitating
analytics, blocking, and traceback by
offering all parties in the call ecosystem
more information, and we thus allow
attestation of unauthenticated calls as
one method for compliance. This
conclusion is consistent with our
analysis in the First Caller ID
Authentication Report and Order, where
we found that the benefits of requiring
providers to authenticate calls will
substantially outweigh the costs.
146. While we make this conclusion,
we acknowledge record concerns about
the cost of requiring intermediate
provider authentication and thus offer
an alternative method of compliance
that we anticipate will be less
burdensome and will nonetheless
facilitate traceback of calls. Specifically,
establish that an entity acting as an
intermediate provider is relieved of the
requirement to authenticate the caller ID
information of unauthenticated calls it
receives if it (i) cooperatively
participates with the industry traceback
consortium, and (ii) responds to all
traceback requests it receives from the
Commission, law enforcement, or the
industry traceback consortium for calls
for which it acts as an intermediate
provider. We again underscore that this
requirement does not supersede any
existing legal processes, and we
encourage law enforcement to make
traceback requests through the industry
traceback consortium.
147. Providing this option addresses
intermediate provider concerns over the
burden that an authentication
requirement would place on their
networks. It further allows for continued
evaluation of the role intermediate
providers play in authenticating the
caller ID information of the
unauthenticated calls that they receive
amid the continued deployment of the
STIR/SHAKEN framework. By ensuring
that all calls which transit the voice
network either receive some form of
attestation or are carried by an
intermediate provider that is registered
with the industry traceback consortium,
terminating voice service providers will
have more data about a call that can be
used to support traceback efforts and
call analytics, and prevent future illegal
robocalls—further increasing the net
benefits offered by STIR/SHAKEN.
Additionally, providing this option for
E:\FR\FM\17NOR2.SGM
17NOR2
73388
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
intermediate providers aligns with the
robocall mitigation requirements we
adopt in this document. By requiring
intermediate providers and many
originating voice service providers to
engage in practices that promote
traceback, we will ensure broad
participation through the entire call
path to determine the source of illegal
robocalls. Although the obligation to
either authenticate or participate in the
industry traceback consortium with
respect to unauthenticated calls will
place costs on intermediate providers,
we have no reason to believe that our
additional mandate will fundamentally
disturb our cost-benefit calculus for
STIR/SHAKEN implementation. AT&T
argues that ‘‘[t]he initial estimates of the
major providers’ costs to implement
STIR/SHAKEN grossly underestimate
reality,’’ and that STIR/SHAKEN
implementation costs ‘‘easily will
exceed hundreds of millions of dollars.’’
We are not convinced by this assertion
as AT&T does not provide concrete
evidence to support such claims, nor
any explanation as to why initial
estimates were inaccurate.
148. We find it unnecessary to adopt
CTIA’s suggestion to require
intermediate providers serving as
international gateways to register with
the Commission. Under the rules we
adopt, such providers are required
either to authenticate the caller ID
information of the foreign-originated
calls that they receive and will transit
on their networks or to register with the
industry traceback consortium and
participate in traceback efforts. Both
options we adopt address call tracing
more directly than a mere registration
requirement, and we are reluctant to
create multiple overlapping registration
requirements for providers that choose
the latter option. We can revisit CTIA’s
suggestion should the measures we
adopt prove insufficient.
3. Limiting Intermediate Provider
Requirements to IP Networks
149. In the First Caller ID
Authentication Report and Order and
FNPRM, we proposed limiting our caller
ID authentication obligations on
intermediate providers to IP calls. We
adopt our proposal with modifications.
First, we adopt this proposal for calls
with authenticated caller ID information
that an intermediate provider receives.
In so doing, we limit the requirement
that intermediate providers pass any
received Identity header unaltered to IP
calls, that is, calls that the intermediate
provider receives in SIP and exchanges
with a terminating provider or another
intermediate provider in SIP.
Commenters support limiting our rule to
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
IP calls, and doing so harmonizes our
rules for intermediate providers with
our rules applying to originating and
terminating voice service providers.
150. Second, we modify this proposal
for calls with unauthenticated caller ID
information that an intermediate
provider receives. To the extent that an
intermediate provider chooses to
comply with the rules we adopt in this
document by authenticating the caller
ID information of the unauthenticated
calls that it receives, as Comcast
suggests, we clarify that this
requirement applies to all
unauthenticated calls an intermediate
provider receives that it will exchange
with a subsequent provider in SIP,
regardless of whether the intermediate
provider receives the call in SIP. In
other words, if the intermediate
provider chooses to authenticate the
caller ID information of unauthenticated
calls, the obligation applies if the
intermediate provider transmits the call
downstream in SIP. We make this
modification in recognition of the fact
that calls without authenticated caller
ID information may have originated on
non-IP networks or have been
exchanged at non-IP interconnection
points and thus do not have an existing
Identity header. In those instances, the
obligation to authenticate the caller ID
information according to industry
standards applies whether or not the
call was received by the intermediate
provider in SIP.
151. We decline to adopt Comcast’s
proposal that intermediate providers
exchanging traffic in TDM install TDMto-VoIP gateways. At this time, we
believe that such a requirement would
be unduly burdensome. Furthermore, it
would go beyond both Congress’s and
our approach to addressing the issues
around non-IP technology and caller ID
authentication, which aim to strike a
balance between encouraging the IP
transition and the development of nonIP solutions for the benefit of those
networks that cannot be speedily or
easily transitioned. We will continue to
monitor the development of technical
solutions to the issue of TDM exchange
and are prepared to return to this
proposal if circumstances warrant.
4. Definition of Intermediate Provider
152. We adopt our proposal from the
First Caller ID Authentication Report
and Order and FNPRM to use the
definition of ‘‘intermediate provider’’
found in § 64.1600(i) of our rules. This
section provides that an ‘‘intermediate
provider’’ is ‘‘any entity that carries or
processes traffic that traverses or will
traverse the [PSTN] at any point insofar
as that entity neither originates nor
PO 00000
Frm 00030
Fmt 4701
Sfmt 4700
terminates that traffic.’’ We further
determine that as with our
interpretation of ‘‘providers of voice
service,’’ we assess the definition of
‘‘intermediate provider’’ on a call-bycall basis for the purpose of our call
authentication rules. A single entity
therefore may act as a voice service
provider for some calls on its network
and an intermediate provider for others.
Intermediate providers play a critical
role in ensuring end-to-end call
authentication. We believe that this
broad definition will best promote the
widespread deployment of the STIR/
SHAKEN framework that is necessary to
benefit consumers.
153. We sought comment in the First
Caller ID Authentication Report and
Order and FNPRM on whether we
should use a narrower definition of
intermediate provider, such as the one
we use in the context of rural call
completion. One commenter advocates
for a narrower definition that would
‘‘not include in its scope an ISP that is
only incidentally transmitting voice
traffic,’’ because this ‘‘could place a
substantial burden on small, rural ISPs
transmitting Non-Interconnected VoIP
or Interconnected VoIP via a third-party
service provider they have no
relationship with.’’ As we explained in
the First Caller ID Authentication
Report and Order and FNPRM, the
STIR/SHAKEN framework relies on the
transmission of information in the
Identity header of a SIP INVITE. We
understand that there are circumstances
where a call set up using SIP signaling
will then use other paths to exchange
the media packets containing voice data.
Because we have limited our rules to the
exchanging of SIP calls, to the extent
that an ISP is only transmitting voice
traffic of a call that does not involve the
exchange of a SIP INVITE, we believe it
is already excluded from our rules.
5. Legal Authority
154. We find that we have the
authority to place caller ID
authentication obligations on
intermediate providers and alternatively
to require that they register and
participate with the industry traceback
consortium under section 251(e) of the
Act. In the First Caller ID
Authentication Report and Order, we
concluded that our exclusive
jurisdiction over numbering policy
provides authority to require voice
service providers to implement STIR/
SHAKEN in order to prevent the
fraudulent abuse of NANP resources. In
the FNPRM, we proposed that this same
analysis provides the Commission
authority to impose STIR/SHAKEN
implementation requirements on
E:\FR\FM\17NOR2.SGM
17NOR2
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
intermediate providers. Several
commenters support this view. Calls
that transit the networks of intermediate
providers with illegally spoofed caller
ID are exploiting numbering resources
in the same manner as spoofed calls on
the networks of originating and
terminating providers, and so we find
authority under section 251(e).
Consistent with the First Caller ID
Authentication Report and Order and
FNPRM, we adopt our proposal
concluding that the section 251(e)(2)
requirements do not apply in the
context of our establishing STIR/
SHAKEN requirements. Because STIR/
SHAKEN implementation is not a
‘‘numbering administration
arrangement,’’ section 251(e)(2), which
provides that ‘‘[t]he cost of establishing
telecommunications numbering
administration arrangements . . . shall
be borne by all telecommunications
carriers on a competitively neutral
basis,’’ does not apply here. Even if
section 251(e)(2) does apply, we
conclude that because each carrier is
responsible for bearing its own
implementation costs, the requirement
is satisfied. Each carrier’s costs will be
proportional to the size and quality of
its network.
155. We find additional, independent
authority under the Truth in Caller ID
Act. The Truth in Caller ID Act charged
the Commission with prescribing rules
to make unlawful the spoofing of caller
ID information ‘‘in connection with any
voice service or text messaging service
. . . with the intent to defraud, cause
harm, or wrongfully obtain anything of
value.’’ We agree with T-Mobile that
this provides us with authority to
mandate that intermediate providers
adopt ‘‘a framework that will minimize
the frequency with which illegally
spoofed scam calls will reach
consumers.’’ We found authority in the
First Caller ID Authentication Report
and Order for our STIR/SHAKEN
implementation mandate on originating
and terminating voice service providers
under the Truth in Caller ID Act. We
explained that ‘‘the rules we adopt
today are necessary to enable voice
service providers to help prevent these
unlawful acts and to protect voice
service subscribers from scammers and
bad actors.’’ That same analysis applies
to intermediate providers that, as noted,
play an integral role in the success of
STIR/SHAKEN across the voice
network.
156. Verizon, the only commenter to
challenge our legal authority, argues
that we lack authority under either
section 251(e) or the Truth in Caller ID
Act to require an intermediate provider
to authenticate with a C-level attestation
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
the caller ID information for
unauthenticated calls it receives. It
asserts that ‘‘ ‘C’ attestations do not
attest to the accuracy of numbers and
indeed have nothing to do with
numbering resources,’’ and
consequently that section 251(e) does
not provide us with authority; it further
argues that ‘‘ ‘C’ attestations have
nothing to do with the spoofing
problem’’ and so could not be required
under the Truth in Caller ID Act.
Verizon also argues that we may not ‘‘go
beyond the scope of the legal authority
granted by the TRACED Act,’’ but
overlooks language in that very Act
providing that ‘‘[n]othing in this section
shall preclude the Commission from
initiating a rulemaking pursuant to its
existing statutory authority.’’ As an
initial matter, Verizon’s objections are
less pressing because of the
modifications we made to our final
rule—requiring only authentication
consistent with industry standards or
registration and participation with the
industry traceback consortium.
Furthermore, we do not agree that Clevel attestations ‘‘have nothing to do
with’’ numbering resources or spoofing.
The STIR/SHAKEN standards expressly
include the option of C-level attestation,
and we think it apparent that this
component of ‘‘a technology specifically
designed to counteract misuse of
numbering resources’’ through spoofing
relates both to our authority under
section 251(e) and the Truth in Caller ID
Act. When bad actors unlawfully falsify
or spoof the caller ID that appears on a
subscriber’s phone, they are using
numbering resources to advance an
illegal scheme. Mandating that
intermediate providers authenticate
unauthenticated calls or participate in
traceback efforts will help to prevent
and remediate the fraudulent
exploitation of NANP resources and
illegal spoofing of caller ID information.
G. Other Issues
157. No Additional Exceptions from
Originating Voice Service Provider
Caller ID Authentication Mandate. We
reject the record requests to grant
limited exceptions from our caller ID
authentication rules. We construe these
requests, which do not respond to any
part of the FNPRM, as petitions for
reconsideration of the rules adopted in
the First Caller ID Authentication
Report and Order and FNPRM. Verizon
argues that we should free a voice
service provider from our caller ID
authentication rules in certain
circumstances where, in its view, it
would be ‘‘inadvisable or inappropriate
for the originating carrier to place a
signature on a call.’’ Verizon,
PO 00000
Frm 00031
Fmt 4701
Sfmt 4700
73389
USTelecom, and CTIA argue that these
circumstances include ‘‘periods of
substantial network congestion,’’ such
as national emergencies or natural
disasters, or during periods of network
maintenance. Verizon further argues
that a voice service provider should not
be required to authenticate caller ID
information in certain complicated
calling cases. We decline to grant these
categorical exceptions from our
mandate. Our goal is ubiquitous
deployment of caller ID authentication
technology, and no commenter explains
with specificity why its concerns
outweigh that goal. To the contrary,
national emergencies and natural
disasters are among the times when
caller ID authentication is most
important. In those instances, affected
individuals must be able to rely on the
caller ID information they receive and
avoid bad actors taking advantage of an
ongoing emergency or its aftermath.
And while we do not grant an exception
for complicated calling cases, we
underscore that, to the extent a certain
calling case is not accounted for by
industry standards, application of caller
ID authentication is not called for by our
rules. We explained in the First Caller
ID Authentication Report and Order that
‘‘[c]ompliance with the most current
versions of . . . three standards as of
March 31, 2020, including any errata as
of that date or earlier, represents the
minimum requirement to satisfy our
rules.’’ USTelecom and CTIA argue that,
because we provide intermediate
providers limited exceptions to our
requirement that they transit Identity
headers unaltered, we must also provide
an exception for originating voice
service providers from our call
authentication mandate. But these
commenters fail to explain why
adopting narrowly tailored exceptions
for intermediate providers justifies
adopting the far broader exception that
they seek. Beyond generalized concerns
over network congestion and
maintenance, no commenter provides a
specific technical rationale for when
originating voice service providers
should receive an exception from our
caller ID authentication requirements.
158. Non-Substantive Rule Revision.
We revise § 64.6301(a)(2) of our rules to
make two non-substantive changes.
First, the adopted rule inadvertently
omitted the word ‘‘it.’’ Second, the
adopted rule referred to ‘‘caller ID
authentication information,’’
inconsistent with other terms in the
rules. The rule as revised provides that
a voice service provider shall
‘‘authenticate caller identification
information for all SIP calls it originates
E:\FR\FM\17NOR2.SGM
17NOR2
73390
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
and that it will exchange with another
voice service provider or intermediate
provider and, to the extent technically
feasible, transmit that call with
authenticated caller identification
information to the next voice service
provider or intermediate provider in the
call path.’’ We make these revisions
without seeking notice and comment
pursuant to section 553(b)(3)(B) of the
Administrative Procedure Act, which
states that an agency for good cause may
dispense with rulemaking if it finds that
notice and comment are ‘‘impracticable,
unnecessary, or contrary to the public
interest.’’ Here, notice and comment are
unnecessary because correcting the rule
does not have a detrimental effect on the
parties regulated by rule and does not
alter the regulatory framework
established by the First Caller ID
Authentication Report and Order.
IV. Procedural Matters
159. Final Regulatory Flexibility
Analysis. As required by the Regulatory
Flexibility Act of 1980 (RFA), an Initial
Regulatory Flexibility Analysis (IRFA)
was incorporated into the First Caller ID
Authentication Report and Order and
FNPRM. The Commission sought
written public comment on the possible
significant economic impact on small
entities regarding the proposals
addressed in the First Caller ID
Authentication Report and Order and
FNPRM, including comments on the
IRFA. No comments were filed
addressing the IRFA. This present Final
Regulatory Flexibility Analysis (FRFA)
conforms to the RFA. The Commission’s
Consumer and Governmental Affairs
Bureau, Reference Information Center,
will send a copy of this Second Report
and Order, including the FRFA, to the
Chief Counsel for Advocacy of the Small
Business Administration (SBA).
A. Need for, and Objectives of, the Rules
160. In this Second Report and Order
(Order), we continue the Commission’s
efforts to combat illegal spoofed
robocalls. Specifically, the Order
implements the provisions of section 4
of the Pallone-Thune Telephone
Robocall Abuse Criminal Enforcement
and Deterrence (TRACED) Act as
follows: requiring providers to take
‘‘reasonable measures’’ to implement an
effective caller ID authentication
framework in their non-IP networks by
either completely upgrading non-IP
networks to IP or by actively working to
develop a non-IP authentication
solution; granting extensions of varying
lengths from implementation of caller
ID authentication for (1) small,
including small rural, voice service
providers; (2) voice service providers
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
that cannot obtain a certificate due to
the Governance Authority’s token access
policy until such provider is able to
obtain a certificate; (3) services
scheduled for section 214
discontinuance; and (4) as required by
the TRACED Act, an extension for the
parts of a voice service provider’s
network that rely on technology that
cannot initiate, maintain, and terminate
SIP calls until a solution for such calls
is reasonably available; granting an
exemption from our implementation
mandate for providers which have
certified that they have reached certain
implementation goals; and prohibiting
providers from imposing additional line
item charges on consumer and small
business subscribers for caller ID
authentication technology. The Order
also adopts rules requiring intermediate
providers to (1) pass any Identity header
that they receive to the terminating
voice service provider or subsequent
intermediate provider in the call path;
and (2) either (i) authenticate the caller
ID information of a call that it receives
with unauthenticated caller ID
information that it will exchange with
another intermediate provider or
terminating voice service provider as a
SIP call, or (ii) cooperatively participate
with the Commission-selected
consortium to conduct traceback efforts.
These rules will help promote effective
caller ID authentication and fulfill our
obligations under the TRACED Act.
B. Summary of Significant Issues Raised
by Public Comments in Response to the
IRFA
161. There were no comments filed
that specifically addressed the proposed
rules and policies presented in the
IRFA.
C. Response to Comments by the Chief
Counsel for Advocacy of the SBA
162. Pursuant to the Small Business
Jobs Act of 2010, which amended the
RFA, the Commission is required to
respond to any comments filed by the
Chief Counsel for Advocacy of the Small
Business Administration (SBA), and to
provide a detailed statement of any
change made to the proposed rules as a
result of those comments.
163. The Chief Counsel did not file
any comments in response to the
proposed rules in this proceeding.
D. Description and Estimate of the
Number of Small Entities to Which the
Rules Will Apply
164. The RFA directs agencies to
provide a description and, where
feasible, an estimate of the number of
small entities that may be affected by
the final rules adopted pursuant to the
PO 00000
Frm 00032
Fmt 4701
Sfmt 4700
Order. The RFA generally defines the
term ‘‘small entity’’ as having the same
meaning as the terms ‘‘small business,’’
‘‘small organization,’’ and ‘‘small
governmental jurisdiction.’’ In addition,
the term ‘‘small business’’ has the same
meaning as the term ‘‘small-business
concern’’ under the Small Business Act.
A ‘‘small-business concern’’ is one
which: (1) Is independently owned and
operated; (2) is not dominant in its field
of operation; and (3) satisfies any
additional criteria established by the
SBA.
1. Wireline Carriers
165. Wired Telecommunications
Carriers. The U.S. Census Bureau
defines this industry as ‘‘establishments
primarily engaged in operating and/or
providing access to transmission
facilities and infrastructure that they
own and/or lease for the transmission of
voice, data, text, sound, and video using
wired communications networks.
Transmission facilities may be based on
a single technology or a combination of
technologies. Establishments in this
industry use the wired
telecommunications network facilities
that they operate to provide a variety of
services, such as wired telephony
services, including VoIP services, wired
(cable) audio and video programming
distribution, and wired broadband
internet services. By exception,
establishments providing satellite
television distribution services using
facilities and infrastructure that they
operate are included in this industry.’’
The SBA has developed a small
business size standard for Wired
Telecommunications Carriers, which
consists of all such companies having
1,500 or fewer employees. U.S. Census
Bureau data for 2012 show that there
were 3,117 firms that operated that year.
Of this total, 3,083 operated with fewer
than 1,000 employees. Thus, under this
size standard, the majority of firms in
this industry can be considered small.
166. Local Exchange Carriers (LECs).
Neither the Commission nor the SBA
has developed a size standard for small
businesses specifically applicable to
local exchange services. The closest
applicable NAICS Code category is
Wired Telecommunications Carriers.
Under the applicable SBA size standard,
such a business is small if it has 1,500
or fewer employees. U.S. Census Bureau
data for 2012 show that there were 3,117
firms that operated for the entire year.
Of that total, 3,083 operated with fewer
than 1,000 employees. Thus under this
category and the associated size
standard, the Commission estimates that
the majority of local exchange carriers
are small entities.
E:\FR\FM\17NOR2.SGM
17NOR2
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
167. Incumbent Local Exchange
Carriers (incumbent LECs). Neither the
Commission nor the SBA has developed
a small business size standard
specifically for incumbent local
exchange services. The closest
applicable NAICS Code category is
Wired Telecommunications Carriers.
Under the applicable SBA size standard,
such a business is small if it has 1,500
or fewer employees. U.S. Census Bureau
data for 2012 indicate that 3,117 firms
operated the entire year. Of this total,
3,083 operated with fewer than 1,000
employees. Consequently, the
Commission estimates that most
providers of incumbent local exchange
service are small businesses that may be
affected by our actions. According to
Commission data, one thousand three
hundred and seven (1,307) Incumbent
Local Exchange Carriers reported that
they were incumbent local exchange
service providers. Of this total, an
estimated 1,006 have 1,500 or fewer
employees. Thus, using the SBA’s size
standard the majority of incumbent
LECs can be considered small entities.
168. Competitive Local Exchange
Carriers (Competitive LECs),
Competitive Access Providers (CAPs),
Shared-Tenant Service Providers, and
Other Local Service Providers. Neither
the Commission nor the SBA has
developed a small business size
standard specifically for these service
providers. The appropriate NAICS Code
category is Wired Telecommunications
Carriers and under that size standard,
such a business is small if it has 1,500
or fewer employees. U.S. Census Bureau
data for 2012 indicate that 3,117 firms
operated during that year. Of that
number, 3,083 operated with fewer than
1,000 employees. Based on these data,
the Commission concludes that the
majority of Competitive LECS, CAPs,
Shared-Tenant Service Providers, and
Other Local Service Providers, are small
entities. According to Commission data,
1,442 carriers reported that they were
engaged in the provision of either
competitive local exchange services or
competitive access provider services. Of
these 1,442 carriers, an estimated 1,256
have 1,500 or fewer employees. In
addition, 17 carriers have reported that
they are Shared-Tenant Service
Providers, and all 17 are estimated to
have 1,500 or fewer employees. Also, 72
carriers have reported that they are
Other Local Service Providers. Of this
total, 70 have 1,500 or fewer employees.
Consequently, based on internally
researched FCC data, the Commission
estimates that most providers of
competitive local exchange service,
competitive access providers, Shared-
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
Tenant Service Providers, and Other
Local Service Providers are small
entities.
169. We have included small
incumbent LECs in this present RFA
analysis. As noted above, a ‘‘small
business’’ under the RFA is one that,
inter alia, meets the pertinent smallbusiness size standard (e.g., a telephone
communications business having 1,500
or fewer employees) and ‘‘is not
dominant in its field of operation.’’ The
SBA’s Office of Advocacy contends that,
for RFA purposes, small incumbent
LECs are not dominant in their field of
operation because any such dominance
is not ‘‘national’’ in scope. We have
therefore included small incumbent
LECs in this RFA analysis, although we
emphasize that this RFA action has no
effect on Commission analyses and
determinations in other, non-RFA
contexts.
170. Interexchange Carriers (IXCs).
Neither the Commission nor the SBA
has developed a small business size
standard specifically for Interexchange
Carriers. The closest applicable NAICS
Code category is Wired
Telecommunications Carriers. The
applicable size standard under SBA
rules is that such a business is small if
it has 1,500 or fewer employees. U.S.
Census Bureau data for 2012 indicate
that 3,117 firms operated for the entire
year. Of that number, 3,083 operated
with fewer than 1,000 employees.
According to internally developed
Commission data, 359 companies
reported that their primary
telecommunications service activity was
the provision of interexchange services.
Of this total, an estimated 317 have
1,500 or fewer employees.
Consequently, the Commission
estimates that the majority of
interexchange service providers are
small entities.
171. Cable System Operators
(Telecom Act Standard). The
Communications Act of 1934, as
amended, also contains a size standard
for small cable system operators, which
is ‘‘a cable operator that, directly or
through an affiliate, serves in the
aggregate fewer than one percent of all
subscribers in the United States and is
not affiliated with any entity or entities
whose gross annual revenues in the
aggregate exceed $250,000,000.’’ As of
2019, there were approximately
48,646,056 basic cable video subscribers
in the United States. Accordingly, an
operator serving fewer than 486,460
subscribers shall be deemed a small
operator if its annual revenues, when
combined with the total annual
revenues of all its affiliates, do not
exceed $250 million in the aggregate.
PO 00000
Frm 00033
Fmt 4701
Sfmt 4700
73391
Based on available data, we find that all
but five cable operators are small
entities under this size standard. We
note that the Commission neither
requests nor collects information on
whether cable system operators are
affiliated with entities whose gross
annual revenues exceed $250 million.
Therefore, we are unable at this time to
estimate with greater precision the
number of cable system operators that
would qualify as small cable operators
under the definition in the
Communications Act.
2. Wireless Carriers
172. Wireless Telecommunications
Carriers (except Satellite). This industry
comprises establishments engaged in
operating and maintaining switching
and transmission facilities to provide
communications via the airwaves.
Establishments in this industry have
spectrum licenses and provide services
using that spectrum, such as cellular
services, paging services, wireless
internet access, and wireless video
services. The appropriate size standard
under SBA rules is that such a business
is small if it has 1,500 or fewer
employees. For this industry, U.S.
Census Bureau data for 2012 show that
there were 967 firms that operated for
the entire year. Of this total, 955 firms
employed fewer than 1,000 employees
and 12 firms employed of 1,000
employees or more. Thus under this
category and the associated size
standard, the Commission estimates that
the majority of Wireless
Telecommunications Carriers (except
Satellite) are small entities.
173. The Commission’s own data—
available in its Universal Licensing
System—indicate that, as of August 31,
2018 there are 265 Cellular licensees
that will be affected by our actions. The
Commission does not know how many
of these licensees are small, as the
Commission does not collect that
information for these types of entities.
Similarly, according to internally
developed Commission data, 413
carriers reported that they were engaged
in the provision of wireless telephony,
including cellular service, Personal
Communications Service (PCS), and
Specialized Mobile Radio (SMR)
Telephony services. Of this total, an
estimated 261 have 1,500 or fewer
employees, and 152 have more than
1,500 employees. Thus, using available
data, we estimate that the majority of
wireless firms can be considered small.
174. Satellite Telecommunications.
This category comprises firms
‘‘primarily engaged in providing
telecommunications services to other
establishments in the
E:\FR\FM\17NOR2.SGM
17NOR2
73392
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
telecommunications and broadcasting
industries by forwarding and receiving
communications signals via a system of
satellites or reselling satellite
telecommunications.’’ Satellite
telecommunications service providers
include satellite and earth station
operators. The category has a small
business size standard of $35 million or
less in average annual receipts, under
SBA rules. For this category, U.S.
Census Bureau data for 2012 show that
there were a total of 333 firms that
operated for the entire year. Of this
total, 299 firms had annual receipts of
less than $25 million. Consequently, we
estimate that the majority of satellite
telecommunications providers are small
entities.
3. Resellers
175. Local Resellers. The SBA has not
developed a small business size
standard specifically for Local Resellers.
The SBA category of
Telecommunications Resellers is the
closest NAICs code category for local
resellers. The Telecommunications
Resellers industry comprises
establishments engaged in purchasing
access and network capacity from
owners and operators of
telecommunications networks and
reselling wired and wireless
telecommunications services (except
satellite) to businesses and households.
Establishments in this industry resell
telecommunications; they do not
operate transmission facilities and
infrastructure. Mobile virtual network
operators (MVNOs) are included in this
industry. Under the SBA’s size
standard, such a business is small if it
has 1,500 or fewer employees. U.S.
Census Bureau data from 2012 show
that 1,341 firms provided resale services
during that year. Of that number, all
operated with fewer than 1,000
employees. Thus, under this category
and the associated small business size
standard, the majority of these resellers
can be considered small entities.
According to Commission data, 213
carriers have reported that they are
engaged in the provision of local resale
services. Of these, an estimated 211
have 1,500 or fewer employees and two
have more than 1,500 employees.
Consequently, the Commission
estimates that the majority of local
resellers are small entities.
176. Toll Resellers. The Commission
has not developed a definition for Toll
Resellers. The closest NAICS Code
Category is Telecommunications
Resellers. The Telecommunications
Resellers industry comprises
establishments engaged in purchasing
access and network capacity from
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
owners and operators of
telecommunications networks and
reselling wired and wireless
telecommunications services (except
satellite) to businesses and households.
Establishments in this industry resell
telecommunications; they do not
operate transmission facilities and
infrastructure. MVNOs are included in
this industry. The SBA has developed a
small business size standard for the
category of Telecommunications
Resellers. Under that size standard, such
a business is small if it has 1,500 or
fewer employees. 2012 U.S. Census
Bureau data show that 1,341 firms
provided resale services during that
year. Of that number, 1,341 operated
with fewer than 1,000 employees. Thus,
under this category and the associated
small business size standard, the
majority of these resellers can be
considered small entities. According to
Commission data, 881 carriers have
reported that they are engaged in the
provision of toll resale services. Of this
total, an estimated 857 have 1,500 or
fewer employees. Consequently, the
Commission estimates that the majority
of toll resellers are small entities.
177. Prepaid Calling Card Providers.
Neither the Commission nor the SBA
has developed a small business
definition specifically for prepaid
calling card providers. The most
appropriate NAICS code-based category
for defining prepaid calling card
providers is Telecommunications
Resellers. This industry comprises
establishments engaged in purchasing
access and network capacity from
owners and operators of
telecommunications networks and
reselling wired and wireless
telecommunications services (except
satellite) to businesses and households.
Establishments in this industry resell
telecommunications; they do not
operate transmission facilities and
infrastructure. Mobile virtual networks
operators (MVNOs) are included in this
industry. Under the applicable SBA size
standard, such a business is small if it
has 1,500 or fewer employees. U.S.
Census Bureau data for 2012 show that
1,341 firms provided resale services
during that year. Of that number, 1,341
operated with fewer than 1,000
employees. Thus, under this category
and the associated small business size
standard, the majority of these prepaid
calling card providers can be considered
small entities. According to the
Commission’s Form 499 Filer Database,
86 active companies reported that they
were engaged in the provision of
prepaid calling cards. The Commission
does not have data regarding how many
PO 00000
Frm 00034
Fmt 4701
Sfmt 4700
of these companies have 1,500 or fewer
employees, however, the Commission
estimates that the majority of the 86
active prepaid calling card providers
that may be affected by these rules are
likely small entities.
4. Other Entities
178. All Other Telecommunications.
The ‘‘All Other Telecommunications’’
category is comprised of establishments
primarily engaged in providing
specialized telecommunications
services, such as satellite tracking,
communications telemetry, and radar
station operation. This industry also
includes establishments primarily
engaged in providing satellite terminal
stations and associated facilities
connected with one or more terrestrial
systems and capable of transmitting
telecommunications to, and receiving
telecommunications from, satellite
systems. Establishments providing
internet services or voice over internet
protocol (VoIP) services via clientsupplied telecommunications
connections are also included in this
industry. The SBA has developed a
small business size standard for ‘‘All
Other Telecommunications’’, which
consists of all such firms with annual
receipts of $35 million or less. For this
category, U.S. Census Bureau data for
2012 show that there were 1,442 firms
that operated for the entire year. Of
those firms, a total of 1,400 had annual
receipts less than $25 million and 15
firms had annual receipts of $25 million
to $49, 999,999. Thus, the Commission
estimates that the majority of ‘‘All Other
Telecommunications’’ firms potentially
affected by our action can be considered
small.
E. Description of Projected Reporting,
Recordkeeping, and Other Compliance
Requirements for Small Entities
179. The Order adopts rules that
obligate voice service providers that use
non-IP network technology to be able to
provide the Commission, upon request,
with documented proof that the
provider is participating, either on its
own or through a representative, as a
member of a working group, industry
standards group, or consortium that is
working to develop a non-IP solution, or
actively testing such a solution. Under
this rule, a voice service provider
satisfies its obligations if it participates
through a third-party representative,
such as a trade association of which it
is a member or vendor.
180. Section 4(b)(5)(C)(i) of the
TRACED Act directs the Commission to
require any voice service provider that
has been granted an extension in
compliance with the caller ID
E:\FR\FM\17NOR2.SGM
17NOR2
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
authentication implementation
mandates to implement, during the time
of the extension, ‘‘an appropriate
robocall mitigation program to prevent
unlawful robocalls from originating on
the network of the provider.’’ The Order
requires voice service providers to file
certifications documenting and
describing their robocall mitigation
programs. Specifically, the Order
requires all voice service providers—not
only those granted an extension—to
certify on or before June 30, 2021, that
their traffic is either signed with STIR/
SHAKEN or subject to a robocall
mitigation program that includes taking
reasonable steps to avoid originating
illegal robocall traffic, and committing
to cooperating with law enforcement
and the industry traceback consortium
in investigating and stopping any illegal
robocallers that it learns are using its
service to originate calls. For those voice
service providers that certify that some
or all of their traffic is subject to a
robocall mitigation program, the Order
requires such voice service providers to
detail in their certifications the specific
‘‘reasonable steps’’ that they have taken
to avoid originating illegal robocall
traffic. While only voice service
providers with an extension will be
obligated to implement a robocall
mitigation program, the Order imposes
the certification requirement on all
voice service providers because doing so
will help the Commission and others to
hold all voice service providers
accountable for the voice traffic they
originate, and give the Commission and
others a snapshot of the progress of
STIR/SHAKEN implementation and the
variety of robocall mitigation practices
adopted by voice service providers.
181. Voice service providers must file
robocall mitigation certifications via a
portal on the Commission’s website that
we will establish for this purpose. The
Order also requires voice service
providers filing certifications to provide
the following identification information
in the portal on the Commission’s
website:
(1) The voice service provider’s
business name(s) and primary address;
(2) other business names in use by the
voice service provider;
(3) all business names previously
used by the voice service provider;
(4) whether a voice service provider is
a foreign voice service provider; and
(5) the name, title, department,
business address, telephone number,
and email address of a central point of
contact within the company responsible
for addressing robocall-mitigationrelated issues.
182. The Order also requires voice
service providers to submit to the
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
Commission any necessary updates
regarding any of the information they
filed in the certification process within
10 business days. The Order extends
this certification requirement to foreign
voice service providers that use U.S.
North American Numbering Plan
numbers that pertain to the United
States to send voice traffic to residential
and business subscribers in the United
States and wish to be listed in the
database.
183. The Order also adopts rules in
accordance with our proposal to require
that, in order to receive a voluntary
exemption from our implementation
mandate, a voice service provider must
file a certification reflecting that it is in
a reasonably foreseeable position to
meet certain implementation goals, and
that, in order to maintain that
exemption, a provider must make a later
filing reflecting its achievement of those
goals it stated it was in a reasonably
foreseeable position to meet. The
requirement of such certifications
entails new reporting, recordkeeping,
and other compliance requirements for
voice service providers. Specifically, we
require that each voice service provider
that wishes to qualify for the voluntary
exemption from our implementation
mandate must have an officer of the
voice service provider sign a
compliance certificate stating, under
penalty of perjury, that the officer has
personal knowledge that the company
meets each of the stated criteria. We also
require the voice service provider to
submit an accompanying statement
explaining, in detail, how the company
meets each of the prongs of each
applicable exemption so that the
Commission can verify the accuracy of
the certification. We also require that
these certifications be filed no later than
December 1, 2020, and that all
certifications and supporting statements
be filed electronically in WC Docket No.
20–68, Exemption from Caller ID
Authentication Requirements, in the
Commission’s Electronic Comment
Filing System (ECFS). Voice service
providers that receive an exemption are
further required to file a second
certification by a deadline specified in
a Public Notice issued by the Wireline
Competition Bureau no later than three
months after June 30, 2021, stating
whether they, in fact, achieved the
implementation goal to which they
previously committed. The certification
must be filed electronically in WC
Docket No. 20–68, Exemption from
Caller ID Authentication Requirements,
in ECFS subject to the same allowance
for confidentiality and requirements for
sworn signatures and detailed support
PO 00000
Frm 00035
Fmt 4701
Sfmt 4700
73393
as the initial certifications. Voice service
providers that certified in December of
2020 that they have already fully
implemented the necessary STIR/
SHAKEN requirements, and for which
the Bureau accepted the certification,
need not file a second certification. This
second filing is required only from those
voice service providers that have not yet
‘‘fully implemented’’ STIR/SHAKEN by
the time of their initial December 2020
certification, but have committed to
doing so by June 30, 2021.
F. Steps Taken To Minimize the
Significant Economic Impact on Small
Entities, and Significant Alternatives
Considered
184. The RFA requires an agency to
describe any significant, specifically
small business, alternatives that it has
considered in reaching its approach,
which may include the following four
alternatives (among others): ‘‘(1) The
establishment of differing compliance or
reporting requirements or timetables
that take into account the resources
available to small entities; (2) the
clarification, consolidation, or
simplification of compliance and
reporting requirements under the rule
for such small entities; (3) the use of
performance rather than design
standards; and (4) an exemption from
coverage of the rule, or any part thereof
for such small entities.’’
185. The rules we adopt in this Order
permit providers to satisfy the
requirement under section 4(b)(1)(B) of
the TRACED Act to take ‘‘reasonable
measures’’ to implement an effective
caller ID authentication framework in
the non-IP portions of their networks, by
participating as a member of a working
group, industry standards group, or
consortium that is working to develop a
non-IP solution, or actively testing such
a solution. A voice service provider
satisfies this obligation if it participates
through a third-party representative,
such as a trade association of which it
is a member or vendor. As the record in
this proceeding shows, some industry
groups have already established
working groups dedicated to examining
potential non-IP call authentication
technologies. Allowing for such
representatives will reduce the burden
of this obligation on individual voice
service providers, including those
which are smaller, and minimize the
potential negative impact of broad and
inexpert participation identified in the
record, while ensuring that all voice
service providers remain invested in
developing a solution for non-IP caller
ID authentication.
186. In addition, the Order grants a
two-year extension from
E:\FR\FM\17NOR2.SGM
17NOR2
73394
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
implementation of caller ID
authentication to small, including small
rural, voice service providers. The Order
also grants an exemption from our
implementation mandate for voice
service providers, including small
providers, which certify that they have
reached certain implementation goals,
and prohibits voice service providers
from imposing additional line item
charges on consumer or small business
subscribers for caller ID authentication.
In these ways, we have taken steps to
minimize the economic impact of the
rules adopted in this Order on small
entities.
Report to Congress
187. The Commission will send a
copy of the Order, including this FRFA,
in a report to Congress pursuant to the
Congressional Review Act. In addition,
the Commission will send a copy of the
Order, including this FRFA, to the Chief
Counsel for Advocacy of the SBA.
188. Paperwork Reduction Act. This
document contains new or modified
information collection requirements
subject to the Paperwork Reduction Act
of 1995 (PRA), Public Law 104–13. It
will be submitted to the Office of
Management and Budget (OMB) for
review under Section 3507(d) of the
PRA. OMB, the general public, and
other Federal agencies will be invited to
comment on the new or modified
information collection requirements
contained in this proceeding. In
addition, we note that pursuant to the
Small Business Paperwork Relief Act of
2002, Public Law 107–198, we
previously sought comment on how the
Commission might further reduce the
information collection burden for small
business concerns with fewer than 25
employees.
189. Congressional Review Act. The
Commission has determined, and the
Administrator of the Office of
Information and Regulatory Affairs,
Office of Management and Budget,
concurs that this rule is ‘‘non-major’’
under the Congressional Review Act, 5
U.S.C. 804(2). The Commission will
send a copy of this Second Report and
Order to Congress and the Government
Accountability Office pursuant to 5
U.S.C. 801(a)(1)(A).
V. Ordering Clauses
190. Accordingly, it is ordered,
pursuant to sections 4(i), 4(j), 227(e),
227b, 251(e), and 303(r), of the
Communications Act of 1934, as
amended (the Act), 47 U.S.C. 154(i),
154(j), 227(e), 227b, 251(e), and 303(r),
that this Second Report and Order is
adopted.
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
191. It is further ordered that part 64
of the Commission’s rules is amended as
set forth in the Final Rules, and that any
such rule amendments that contain new
or modified information collection
requirements that require approval by
the Office of Management and Budget
under the Paperwork Reduction Act
shall be effective after announcement in
the Federal Register of Office of
Management and Budget approval of the
rules, and on the effective date
announced therein.
192. It is further ordered that,
pursuant to §§ 1.4(b)(1) and 1.103(a) of
the Commission’s rules, 47 CFR
1.4(b)(1), 1.103(a), this Second Report
and Order shall be effective 30 days
after publication in the Federal
Register, except for the addition of
§§ 64.6303(b) and 64.6305(b), to the
Commission’s rules that have not been
approved by OMB. The Federal
Communications Commission will
publish documents in the Federal
Register announcing the effective dates
of these provisions.
193. It is further ordered that the
Commission shall send a copy of this
Report and Order to Congress and to the
Government Accountability Office
pursuant to the Congressional Review
Act, see 5 U.S.C. 801(a)(1)(A).
194. It is further ordered that the
Commission’s Consumer and
Governmental Affairs Bureau, Reference
Information Center, shall send a copy of
this Second Report and Order,
including the Final Regulatory
Flexibility Analysis (FRFA), to the Chief
Counsel for Advocacy of the Small
Business Administration.
List of Subjects in 47 CFR Part 64
Common carriers.
Federal Communications Commission.
Marlene Dortch,
Secretary.
Final Rules
For the reasons discussed in the
preamble, the Federal Communications
Commission amends 47 CFR part 64 as
follows:
PART 64—MISCELLANEOUS RULES
RELATING TO COMMON CARRIERS
1. The authority citation for part 64
continues to read as follows:
■
Authority: 47 U.S.C. 154, 201, 202, 217,
218, 220, 222, 225, 226, 227, 227b, 228,
251(a), 251(e), 254(k), 262, 403(b)(2)(B), (c),
616, 620, 1401–1473, unless otherwise noted;
Pub. L. 115–141, Div. P, sec. 503, 132 Stat.
348, 1091.
2. Effective December 17, 2020,
amend § 64.6300 by redesignating
paragraphs (e) through (g) as paragraphs
■
PO 00000
Frm 00036
Fmt 4701
Sfmt 4700
(j) through (l) and paragraphs (c) and (d)
as paragraphs (f) and (h), respectively,
and adding new paragraphs (c) through
(e), (g), and (i) to read as follows:
§ 64.6300
Definitions.
*
*
*
*
*
(c) Foreign voice service provider. The
term ‘‘foreign voice service provider’’
refers to any entity providing voice
service outside the United States that
has the ability to originate voice service
that terminates in a point outside that
foreign country or terminate voice
service that originates from points
outside that foreign country.
(d) Governance Authority. The term
‘‘Governance Authority’’ refers to the
Secure Telephone Identity Governance
Authority, the entity that establishes
and governs the policies regarding the
issuance, management, and revocation
of Service Provider Code (SPC) tokens to
intermediate providers and voice
service providers.
(e) Industry traceback consortium.
The term ‘‘industry traceback
consortium’’ refers to the consortium
that conducts private-led efforts to trace
back the origin of suspected unlawful
robocalls as selected by the Commission
pursuant to § 64.1203.
*
*
*
*
*
(g) Robocall Mitigation Database. The
term ‘‘Robocall Mitigation Database’’
refers to a database accessible via the
Commission’s website that lists all
entities that make filings pursuant to
§ 64.6305(b).
*
*
*
*
*
(i) SPC token. The term ‘‘SPC token’’
refers to the Service Provider Code
token, an authority token validly issued
to an intermediate provider or voice
service provider that allows the
provider to authenticate and verify
caller identification information
consistent with the STIR/SHAKEN
authentication framework in the United
States.
*
*
*
*
*
■ 3. Effective December 17, 2020,
amend § 64.6301 by revising paragraphs
(a) introductory text and (a)(2) to read as
follows:
§ 64.6301
Caller ID authentication.
(a) STIR/SHAKEN implementation by
voice service providers. Except as
provided in §§ 64.6304 and 64.6306, not
later than June 30, 2021, a voice service
provider shall fully implement the
STIR/SHAKEN authentication
framework in its internet Protocol
networks. To fulfill this obligation, a
voice service provider shall:
*
*
*
*
*
E:\FR\FM\17NOR2.SGM
17NOR2
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
(2) Authenticate caller identification
information for all SIP calls it originates
and that it will exchange with another
voice service provider or intermediate
provider and, to the extent technically
feasible, transmit that call with
authenticated caller identification
information to the next voice service
provider or intermediate provider in the
call path; and
*
*
*
*
*
■ 4. Effective December 17, 2020, add
§ 64.6302 to read as follows:
§ 64.6302 Caller ID authentication by
intermediate providers.
Not later than June 30, 2021, each
intermediate provider shall fully
implement the STIR/SHAKEN
authentication framework in its internet
Protocol networks. To fulfill this
obligation, an intermediate provider
shall:
(a) Pass unaltered to the subsequent
intermediate provider or voice service
provider in the call path any
authenticated caller identification
information it receives with a SIP call,
subject to the following exceptions
under which it may remove the
authenticated caller identification
information:
(1) Where necessary for technical
reasons to complete the call; or
(2) Where the intermediate provider
reasonably believes the caller
identification authentication
information presents an imminent threat
to its network security; and
(b) Authenticate caller identification
information for all calls it receives for
which the caller identification
information has not been authenticated
and which it will exchange with another
provider as a SIP call, except that the
intermediate provider is excused from
such duty to authenticate if it:
(1) Cooperatively participates with the
industry traceback consortium; and
(2) Responds fully and in a timely
manner to all traceback requests it
receives from the Commission, law
enforcement, and the industry traceback
consortium regarding calls for which it
acts as an intermediate provider.
■ 5. Effective December 17, 2020, add
§ 64.6303 to read as follows:
§ 64.6303 Caller ID authentication in nonIP networks.
Except as provided in §§ 64.6304 and
64.6306, not later than June 30, 2021, a
voice service provider shall:
(a) Upgrade its entire network to
allow for the initiation, maintenance,
and termination of SIP calls and fully
implement the STIR/SHAKEN
framework as required in § 64.6301
throughout its network.
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
(b) [Reserved]
6. Delayed indefinitely, amend
§ 64.6303 by:
■ a. Adding the word ‘‘either’’ at the end
of the introductory text;
■ b. Removing the period at the end of
paragraph (a) and adding ‘‘; or’’ in its
place; and
■ c. Adding paragraph (b).
The addition reads as follows:
■
§ 64.6303 Caller ID authentication in nonIP networks.
*
*
*
*
*
(b) Maintain and be ready to provide
the Commission on request with
documented proof that it is
participating, either on its own or
through a representative, including
third party representatives, as a member
of a working group, industry standards
group, or consortium that is working to
develop a non-internet Protocol caller
identification authentication solution,
or actively testing such a solution.
■ 7. Effective December 17, 2020, add
§ 64.6304 to read as follows:
§ 64.6304
deadline.
Extension of implementation
(a) Small voice service providers. (1)
Small voice service providers are
exempt from the requirements of
§ 64.6301 through June 30, 2023.
(2) For purposes of this paragraph (a),
‘‘small voice service provider’’ means a
provider that has 100,000 or fewer voice
service subscriber lines (counting the
total of all business and residential fixed
subscriber lines and mobile phones and
aggregated over all of the provider’s
affiliates).
(b) Voice service providers that
cannot obtain a SPC token. Voice
service providers that are incapable of
obtaining a SPC token due to
Governance Authority policy are
exempt from the requirements of
§ 64.6301 until they are capable of
obtaining a SPC token.
(c) Services scheduled for section 214
discontinuance. Services which are
subject to a pending application for
permanent discontinuance of service
filed as of June 30, 2021, pursuant to the
processes established in 47 CFR 63.60
through 63.100, as applicable, are
exempt from the requirements of
§ 64.6301 through June 30, 2022.
(d) Non-IP networks. Those portions
of a voice service provider’s network
that rely on technology that cannot
initiate, maintain, and terminate SIP
calls are deemed subject to a continuing
extension. A voice service provider
subject to the foregoing extension shall
comply with the requirements of
§ 64.6303 as to the portion of its
network subject to the extension.
PO 00000
Frm 00037
Fmt 4701
Sfmt 4700
73395
(e) Provider-specific extensions. The
Wireline Competition Bureau may
extend the deadline for compliance with
§ 64.6301 for voice service providers
that file individual petitions for
extensions by November 20, 2020. The
Bureau shall seek comment on any such
petitions and issue an order determining
whether to grant the voice service
provider an extension no later than
March 30, 2021.
(f) Annual reevaluation of granted
extensions. The Wireline Competition
Bureau shall, in conjunction with an
assessment of burdens and barriers to
implementation of caller identification
authentication technology, annually
review the scope of all previously
granted extensions and, after issuing a
Public Notice seeking comment, may
extend or decline to extend each such
extension, and may decrease the scope
of entities subject to a further extension.
■ 8. Effective December 17, 2020, add
§ 64.6305 to read as follows:
§ 64.6305 Robocall mitigation and
certification.
(a) Robocall mitigation program
requirements. (1) Any voice service
provider subject to an extension granted
under § 64.6304 that has not fully
implemented the STIR/SHAKEN
authentication framework on its entire
network shall implement an appropriate
robocall mitigation program as to those
portions of its network on which it has
not implemented the STIR/SHAKEN
authentication framework.
(2) Any robocall mitigation program
implemented pursuant to paragraph
(a)(1) of this section shall include
reasonable steps to avoid originating
illegal robocall traffic and shall include
a commitment to respond fully and in
a timely manner to all traceback
requests from the Commission, law
enforcement, and the industry traceback
consortium, and to cooperate with such
entities in investigating and stopping
any illegal robocallers that use its
service to originate calls.
(b)–(c) [Reserved]
■ 9. Delayed indefinitely, amend
§ 64.6305 by adding paragraphs (b) and
(c) to read as follows:
§ 64.6305 Robocall mitigation and
certification.
*
*
*
*
*
(b) Certification and database. (1) Not
later than the date established in a
document released by the Wireline
Competition Bureau establishing the
Robocall Mitigation Database and portal
(amending this paragraph (b)), a voice
service provider, regardless of whether
it is subject to an extension granted
E:\FR\FM\17NOR2.SGM
17NOR2
73396
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
under § 64.6304, shall certify to one of
the following:
(i) It has fully implemented the STIR/
SHAKEN authentication framework
across its entire network and all calls it
originates are compliant with
§ 64.6301(a)(1) and (2);
(ii) It has implemented the STIR/
SHAKEN authentication framework on a
portion of its network and calls it
originates on that portion of its network
are compliant with § 64.6301(a)(1) and
(2), and the remainder of the calls that
originate on its network are subject to a
robocall mitigation program consistent
with paragraph (a) of this section; or
(iii) It has not implemented the STIR/
SHAKEN authentication framework on
any portion of its network, and all of the
calls that originate on its network are
subject to a robocall mitigation program
consistent with paragraph (a) of this
section.
(2) A voice service provider that
certifies that some or all of the calls that
originate on its network are subject to a
robocall mitigation program consistent
with paragraph (a) of this section shall
include the following information in its
certification:
(i) Identification of the type of
extension or extensions the voice
service provider received under
§ 64.6304, if the voice service provider
is not a foreign voice service provider;
(ii) The specific reasonable steps the
voice service provider has taken to
avoid originating illegal robocall traffic
as part of its robocall mitigation
program; and
(iii) A statement of the voice service
provider’s commitment to respond fully
and in a timely manner to all traceback
requests from the Commission, law
enforcement, and the industry traceback
consortium, and to cooperate with such
entities in investigating and stopping
any illegal robocallers that use its
service to originate calls.
(3) All certifications made pursuant to
paragraphs (b)(1) and (2) of this section
shall:
(i) Be filed in the appropriate portal
on the Commission’s website; and
(ii) Be signed by an officer in
conformity with 47 CFR 1.16.
(4) A voice service provider filing a
certification shall submit the following
information in the appropriate portal on
the Commission’s website.
(i) The voice service provider’s
business name(s) and primary address;
(ii) Other business names in use by
the voice service provider;
(iii) All business names previously
used by the voice service provider;
(iv) Whether the voice service
provider is a foreign voice service
provider; and
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
(v) The name, title, department,
business address, telephone number,
and email address of one person within
the company responsible for addressing
robocall mitigation-related issues.
(5) A voice service provider shall
update its filings within 10 business
days of any change to the information it
must provide pursuant to paragraphs
(b)(2) through (4) of this section.
(c) Intermediate provider and voice
service provider obligations. Beginning
ninety days after the deadline for
certifications filed pursuant to
paragraph (b) of this section,
intermediate providers and voice
service providers shall only accept calls
directly from a voice service provider,
including a foreign voice service
provider that uses North American
Numbering Plan resources that pertain
to the United States to send voice traffic
to residential or business subscribers in
the United States, if that voice service
provider’s filing appears in the Robocall
Mitigation Database in accordance with
paragraph (b) of this section.
■ 10. Effective November 17, 2020, add
§ 64.6306 to read as follows:
§ 64.6306
Exemption.
(a) Exemption for IP networks. A voice
service provider may seek an exemption
from the requirements of § 64.6301 by
certifying on or before December 1,
2020, that, for those portions of its
network served by technology that
allows for the transmission of SIP calls,
it:
(1) Has adopted the STIR/SHAKEN
authentication framework for calls on
the Internet Protocol networks of the
voice service provider, by completing
the network preparations necessary to
deploy the STIR/SHAKEN protocols on
its network including but not limited to
participation in test beds and lab
testing, or completion of commensurate
network adjustments to enable the
authentication and validation of calls on
its network consistent with the STIR/
SHAKEN framework;
(2) Has agreed voluntarily to
participate with other voice service
providers in the STIR/SHAKEN
authentication framework, as
demonstrated by completing formal
registration (including payment) and
testing with the STI Policy
Administrator;
(3) Has begun to implement the STIR/
SHAKEN authentication framework by
completing the necessary network
upgrades to at least one network
element—e.g., a single switch or session
border controller—to enable the
authentication and verification of caller
identification information consistent
with the STIR/SHAKEN standards; and
PO 00000
Frm 00038
Fmt 4701
Sfmt 4700
(4) Will be capable of fully
implementing the STIR/SHAKEN
authentication framework not later than
June 30, 2021, which it may only
determine if it reasonably foresees that
it will have completed all necessary
network upgrades to its network
infrastructure to enable the
authentication and verification of caller
identification information for all SIP
calls exchanged with STIR/SHAKENenabled partners by June 30, 2021.
(b) Exemption for non-IP networks. A
voice service provider may seek an
exemption from the requirement to
upgrade its network to allow for the
initiation, maintenance, and termination
of SIP calls and fully implement the
STIR/SHAKEN framework as required
by § 64.6301 throughout its network by
June 30, 2021, and from associated
recordkeeping and reporting
requirements, by certifying on or before
December 1, 2020, that, for those
portions of its network that do not allow
for the transmission of SIP calls, it:
(1) Has taken reasonable measures to
implement an effective call
authentication framework by either:
(i) Upgrading its entire network to
allow for the initiation, maintenance,
and termination of SIP calls, and fully
implementing the STIR/SHAKEN
framework as required in § 64.6301
throughout its network; or
(ii) Maintaining and being ready to
provide the Commission on request
with documented proof that it is
participating, either on its own or
through a representative, including
third party representatives, as a member
of a working group, industry standards
group, or consortium that is working to
develop a non-internet Protocol caller
identification authentication solution,
or actively testing such a solution; and
(2) Will be capable of fully
implementing an effective call
authentication framework not later than
June 30, 2021, because it reasonably
foresees that it will have completed all
necessary network upgrades to its
network infrastructure to enable the
authentication and verification of caller
identification information for all noninternet Protocol calls originating or
terminating on its network as provided
by a standardized caller identification
authentication framework for noninternet Protocol networks by June 30,
2021.
(c) Certification submission
procedures. All certifications that a
voice service provider is eligible for
exemption shall be:
(1) Filed in the Commission’s
Electronic Comment Filing System
(ECFS) in WC Docket No. 20–68,
Exemption from Caller ID
E:\FR\FM\17NOR2.SGM
17NOR2
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 / Rules and Regulations
Authentication Requirements, no later
than December 1, 2020;
(2) Signed by an officer in conformity
with 47 CFR 1.16; and
(3) Accompanied by detailed support
as to the assertions in the certification.
(d) Determination timing. The
Wireline Competition Bureau shall
determine whether to grant or deny
timely requests for exemption on or
before December 30, 2020.
(e) [Reserved]
■ 11. Effective December 17, 2020,
adding paragraph (e) to read as follows:
§ 64.6306
Exemption.
*
*
*
*
*
(e) Implementation verification. All
voice service providers granted an
exemption under paragraphs (a) and (b)
of this section shall file an additional
certification consistent with the
requirements of paragraph (c) of this
section on or before a date specified in
a document issued by the Wireline
Competition Bureau (amending this
paragraph (e)) that attests to whether the
voice service provider fully
implemented the STIR/SHAKEN
authentication framework because it
completed all necessary network
upgrades to its network infrastructure to
enable the authentication and
verification of caller identification
information for all SIP calls exchanged
with STIR/SHAKEN-enabled partners
by June 30, 2021. The Wireline
Competition Bureau, after issuing a
VerDate Sep<11>2014
19:47 Nov 16, 2020
Jkt 253001
Public Notice seeking comment on the
certifications, will, not later than four
months after the deadline for filing of
the certifications, issue a Public Notice
identifying which voice service
providers achieved complete
implementation of the STIR/SHAKEN
authentication framework.
(1) If a voice service provider cannot
certify to full implementation upon the
filing of this second certification, but
demonstrates to the Wireline
Competition Bureau that:
(i) It filed its initial certification in
good faith—i.e., with a reasonable
expectation that it would be able to
achieve full implementation as initially
certified; and
(ii) It made a good faith effort to
complete implementation, the
consequence for such a shortcoming is
the loss of the exemption and the
application of the implementation
requirements of §§ 64.6301 and 64.6303,
effective immediately upon release by
the Wireline Competition Bureau of the
Public Notice identifying which voice
service providers achieved full
implementation of the STIR/SHAKEN
authentication framework.
(2) If a voice service provider cannot
certify to full implementation upon the
filing of this second certification, and
the Wireline Competition Bureau finds
that the voice service provider filed its
initial certification in bad faith or failed
PO 00000
Frm 00039
Fmt 4701
Sfmt 9990
73397
to make a good faith effort to complete
implementation, then:
(i) The voice service provider is
required to fully implement the STIR/
SHAKEN authentication framework
immediately upon release by the
Wireline Competition Bureau of the
Public Notice identifying which voice
service providers achieved full
implementation of the STIR/SHAKEN
authentication framework; and
(ii) The Wireline Competition Bureau
shall refer the voice service provider to
the Enforcement Bureau for possible
enforcement action based on filing a
false initial certification.
■ 12. Effective December 17, 2020, add
§ 64.6307 to read as follows:
§ 64.6307
Line item charges.
Providers of voice service are
prohibited from adding any additional
line item charges to consumer or small
business customer subscribers for the
effective call authentication technology
required by §§ 64.6301 and 64.6303.
(a) For purposes of this section,
‘‘consumer subscribers’’ means
residential mass-market subscribers.
(b) For purposes of this section,
‘‘small business customer subscribers’’
means subscribers that are business
entities that meet the size standards
established in 13 CFR part 121, subpart
A.
[FR Doc. 2020–24904 Filed 11–16–20; 8:45 am]
BILLING CODE 6712–01–P
E:\FR\FM\17NOR2.SGM
17NOR2
Agencies
[Federal Register Volume 85, Number 222 (Tuesday, November 17, 2020)]
[Rules and Regulations]
[Pages 73360-73397]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2020-24904]
[[Page 73359]]
Vol. 85
Tuesday,
No. 222
November 17, 2020
Part II
Federal Communications Commission
-----------------------------------------------------------------------
47 CFR Part 64
Call Authentication Trust Anchor; Final Rule
Federal Register / Vol. 85, No. 222 / Tuesday, November 17, 2020 /
Rules and Regulations
[[Page 73360]]
-----------------------------------------------------------------------
FEDERAL COMMUNICATIONS COMMISSION
47 CFR Part 64
[WC Docket No. 17-97; FCC 20-136; FRS 17172]
Call Authentication Trust Anchor
AGENCY: Federal Communications Commission.
ACTION: Final rule.
-----------------------------------------------------------------------
SUMMARY: In this document, the Federal Communications Commission
(Commission) adopts rules implementing the Pallone-Thune Telephone
Robocall Abuse Criminal Enforcement and Deterrence Act (TRACED Act),
promoting the deployment of caller ID authentication technology, and
combatting the practice of illegal caller ID spoofing. In doing so, the
Second Report and Order adopts rules governing intermediate providers
and caller ID authentication in non-IP networks, implementing the
exceptions and extensions established by the TRACED Act, and
prohibiting line-item charges for caller ID authentication.
DATES: Effective December 17, 2020, except for instruction 10 (Sec.
64.6306) which is effective November 17, 2020 and instruction 6 (Sec.
64.6303(b)), instruction 9 (Sec. 64.6305(b) and (c)), and instruction
11 (Sec. 64.6306(e)) which are delayed indefinitely. The Commission
will publish a document in the Federal Register announcing the
effective date of these instructions.
FOR FURTHER INFORMATION CONTACT: For further information, please
contact Mason Shefa, Competition Policy Division, Wireline Competition
Bureau, at [email protected].
SUPPLEMENTARY INFORMATION: This is a summary of the Commission's Second
Report and Order in WC Docket Nos. 17-97, FCC 20-136, adopted on
September 29, 2020, and released on October 1, 2020. The full text of
this document is available for public inspection on the Commission's
website at: https://docs.fcc.gov/public/attachments/FCC-20-136A1.pdf.
The Commission received approval from the Office of Management and
Budget (OMB) on November 2, 2020, for a period of six months, of the
information collection requirements relating to the voluntary
implementation exemption certification rules contained in Sec.
64.6306, which shall be effective upon publication in the Federal
Register pursuant to 5 U.S.C. 553(d)(1). The OMB Control Number is
3060-1278. The Commission publishes this document as an announcement of
the effective date of the rules. The total number of respondents and
total annual responses are 817, the total annual burden hours are 2,451
and no costs are associated with this information collection. At a
later time, the Commission will seek OMB approval of Sec. Sec.
64.6303(b), 64.6305(b), and 64.6306(e) and the information collection
requirements contained therein.
I. Introduction
1. Protecting Americans from the dangers of unwanted and illegal
robocalls is our top consumer protection priority. More than just an
annoyance, these calls are a tool for scammers to take advantage of
unsuspecting Americans. Bad actors often ``spoof'' or falsify caller ID
information and deceive call recipients into believing they are
trustworthy. Even in the midst of the COVID-19 pandemic, bad actors
have continued their attempts to use illegal spoofing to target
American consumers, once again illustrating the pervasiveness of this
problem.
2. As part of our multi-pronged approach to combat this vexing
issue, we have made it a priority to stop the practice of illegal
caller ID spoofing. For instance, we have issued hundreds of millions
of dollars in fines for violations of our Truth in Caller ID rules. We
recently proposed a forfeiture of $225 million--the largest in the
Commission's history--for a company that made approximately one billion
spoofed robocalls, and we proposed two forfeiture actions of almost $13
million and $10 million apiece against other entities for apparent
spoofing violations. We have expanded our Truth in Caller ID rules to
reach foreign calls and text messages. Pursuant to the TRACED Act, we
have selected a consortium to conduct private-led traceback efforts of
suspected illegal robocalls, which is particularly useful in instances
where the caller ID information transmitted with a call has been
maliciously spoofed. We have clarified and bolstered our call blocking
rules to give voice service providers new latitude to block calls,
including spoofed calls.
3. One key part of our broad efforts to thwart illegal caller ID
spoofing has been our work to promote implementation of the STIR/SHAKEN
caller ID authentication framework. The STIR/SHAKEN framework allows
voice service providers to verify that the caller ID information
transmitted with a particular call matches the caller's number, while
protecting consumer privacy and promoting the ability to complete
lawful calls. Widespread implementation of STIR/SHAKEN will reduce the
effectiveness of illegal spoofing, allow law enforcement to identify
bad actors more easily, and help voice service providers identify calls
with illegally spoofed caller ID information before those calls reach
their subscribers. We have worked over the course of multiple years to
promote caller ID authentication, and in 2019 Congress amplified our
efforts by passing the Pallone-Thune Telephone Robocall Abuse Criminal
Enforcement and Deterrence (TRACED) Act, which directs the Commission
to take numerous steps to promote and require STIR/SHAKEN
implementation. In March of this year, building on the foundation laid
by our prior work and by Congress, we adopted rules requiring voice
service providers to implement the STIR/SHAKEN call authentication
technology in the internet protocol (IP) portions of their phone
networks by June 30, 2021 (85 FR 22029, April 21, 2020).
4. In this document, we continue our work to promote the deployment
of caller ID authentication technology and to implement the TRACED Act.
After consideration of the record, we adopt rules implementing many of
the proposals we made in the First Caller ID Authentication Report and
Order and Further Notice of Proposed Rulemaking (FNPRM) (85 FR 22029,
April 21, 2020 and 85 FR 22099, April 21, 2020). Among other things, we
adopt rules governing intermediate providers and caller ID
authentication in non-IP networks, we implement the exceptions and
extensions established by the TRACED Act, and we prohibit line-item
charges for caller ID authentication.
II. Background
5. As the telecommunications industry has advanced and expanded
into IP-based telephony, costs have decreased as competition increased,
benefitting consumers greatly. These benefits, however, have eroded the
chains of trust that previously bound voice service providers together.
Partly due to the rise of the Voice over internet Protocol (VoIP)
software, the telephony industry no longer consists only of a limited
number of carriers that all trusted each other to provide accurate
caller ID information. Because there are now a multitude of voice
service providers and entities originating and transiting calls, bad
actors can more easily take advantage of these weakened chains of trust
to target consumers with illegally spoofed calls.
6. Recognizing this vulnerability, technologists from the internet
Engineering Task Force (IETF) and the Alliance for Telecommunications
[[Page 73361]]
Industry Solutions (ATIS) developed standards to allow the
authentication and verification of caller ID information for calls
carried over IP networks using the Session Initiation Protocol (SIP).
Since voice service providers could no longer count on the multitude of
entities in each call path to accurately pass the caller ID
information, the goal was to create a system that allowed the
identification information to safely and securely travel with the call
itself. The result is the STIR/SHAKEN call authentication framework.
7. The framework is comprised of several different standards and
protocols. The Secure Telephony Identity Revisited (STIR) working
group, formed by the IETF, has produced several protocols for
authenticating caller ID information. ATIS, together with the SIP
Forum, produced the Signature-based Handling of Asserted information
using toKENs (SHAKEN) specification, which standardizes how the
protocols produced by STIR are implemented across the industry using
digital ``certificates.'' At a high-level, the STIR/SHAKEN framework
consists of two components: (1) The technical process of authenticating
and verifying caller ID information; and (2) the certificate governance
process that maintains trust in the caller ID authentication
information transmitted along with a call.
8. Technology. The STIR/SHAKEN technical authentication and
verification processes rely on public key cryptography to securely
transmit the information that the originating voice service provider
knows about the identity of the caller and its relationship to the
phone number it is using throughout the entire length of the call path,
allowing the terminating voice service provider to verify the
information on the other end. In this Report and Order, we use the term
``caller'' to broadly refer to the person or entity originating a voice
call. We recognize that for the purpose of industry standards or other
technical documents, this relationship may be described using more
exact language suited to the specific technical scenarios described.
The encrypted caller ID information is contained within a unique header
to the message used to initiate a SIP call (the SIP INVITE message),
called an ``Identity'' header. While there is no technical mechanism
within the STIR/SHAKEN framework that ensures this Identity header
travels the entire length of the call path unaltered, the unbroken
transmission of an unaltered Identity header from the originating voice
service provider, through each intermediate provider, to the
terminating voice service provider is critical to creating the end-to-
end chain of trust that allows a terminating provider to know it has
received accurate caller ID information.
9. Because providers transmit the Identity header in a SIP INVITE
and because SIP is IP-based, STIR/SHAKEN only operates in the IP
portions of a provider's network. If a call originates on a non-IP
network, that voice service provider cannot authenticate the caller ID
information; if it terminates on a non-IP network, that voice service
provider cannot verify the caller ID authentication information. And if
a call is routed at any point over an interconnection point or
intermediate provider network that does not support the transmission of
SIP calls, the Identity header will be lost. While standards bodies are
currently working on non-IP call authentication solutions, and some
vendors are developing potential non-IP solutions, there is yet to be
an industry consensus on the path forward.
10. In the STIR/SHAKEN framework, the provider adding the Identity
header to the SIP INVITE can use three different levels of attestation
to signify what it knows about the identity of the calling party. The
highest level of attestation is called full or A-level attestation. A
provider assigns an A-level attestation when it is the entry point of
the call onto the IP network, it can confirm the identity of the
subscriber making the call, and the subscriber is using its associated
telephone number. The method or process a provider uses to determine
the legitimacy of the caller's use of a telephone number is specific to
each provider. As a result, a provider's reputation is tied to the
rigor of its evaluation process. The middle level of attestation is
called partial or B-level attestation. A provider uses a B-level
attestation to indicate that it is the entry point of the call onto the
IP network and can confirm the identity of the subscriber but not the
telephone number. The lowest level of attestation is called gateway or
C-level attestation. A provider uses a C-level attestation when it is
the point of entry to the IP network for a call that originated
elsewhere but has no relationship with the initiator of a call, such as
when a provider is acting as an international gateway. A downstream
provider can make use of a C-level attestation to trace a call back to
an interconnecting service provider or the call's entry point into the
IP network. The STIR/SHAKEN standards envision these various
attestation levels as information that can facilitate traceback and to
enhance the spam identification solutions that terminating voice
service providers enable for their customers.
11. Governance. The STIR/SHAKEN framework relies on digital
``certificates'' to ensure trust. The voice service provider adding the
Identity header includes its assigned certificate which says, in
essence, that the voice service provider is the entity it claims to be
and that it has the right to authenticate the caller ID information. To
maintain trust and accountability in the voice service providers that
vouch for the caller ID information, a neutral governance system issues
the certificates. The STIR/SHAKEN governance model requires several
roles in order to operate: (1) A Governance Authority, which defines
the policies and procedures for which entities can issue or acquire
certificates; (2) a Policy Administrator, which applies the rules set
by the Governance Authority, confirms that certification authorities
are authorized to issue certificates, and confirms that voice service
providers are authorized to request and receive certificates; (3)
Certification Authorities, which issue the certificates used to
authenticate and verify calls; and (4) the voice service providers
themselves, which, as call initiators, select an approved certification
authority from which to request a certificate, and which, as call
recipients, check with certification authorities to ensure that the
certificates they receive were issued by the correct certification
authority. Voice service providers use the digital certificates to
indicate that they are trusted members of the ecosystem and their
assertions to a calling party's identity should be accepted.
12. Under the current Governance Authority rules, a voice service
provider must meet certain requirements to receive a certificate.
Specifically, a voice service provider must have a current FCC Form
499A on file with the Commission, have been assigned an Operating
Company Number (OCN), and have direct access to telephone numbers from
the North American Numbering Plan Administrator (NANPA) and the
National Pooling Administrator. The Governance Authority reviews this
policy ``at least on a quarterly basis,'' or as needed.
13. Commission Action to Promote STIR/SHAKEN. In 2017, the
Commission released a Notice of Inquiry into STIR/SHAKEN, launching a
broad examination of how to expedite its development and
implementation. The Commission directed its expert advisory committee
on numbering, the North American Numbering Council (NANC), to recommend
``criteria by which a
[[Page 73362]]
[Governance Authority] should be selected'' and ``a reasonable timeline
or set of milestones for adoption and deployment'' of STIR/SHAKEN. In
its May 2018 report, the NANC made a number of recommendations
regarding establishing and organizing a governance system and promoting
STIR/SHAKEN implementation, which Chairman Pai then accepted. In
November 2018, Chairman Pai sent letters to 14 major voice service
providers urging them to implement a robust caller ID authentication
framework by the end of 2019, asking providers for specific details on
their progress and plans. In June 2019, the Commission adopted a
Declaratory Ruling and Third Further Notice of Proposed Rulemaking (84
FR 29387, June 24, 2019, and 84 FR 29478, June 24, 2019) that proposed
and sought comment on mandating implementation of STIR/SHAKEN in the
event that major voice service providers did not voluntarily implement
the framework by the end of 2019. Commission staff closely tracked the
implementation progress of major voice service providers. In December
2019, Congress enacted the TRACED Act, which contains numerous
provisions directed at addressing robocalls, including through
implementation of STIR/SHAKEN. Among other provisions regarding caller
ID authentication, the TRACED Act directed the Commission to require,
no later than 18 months from enactment, all voice service providers to
implement STIR/SHAKEN in the IP portions of their networks and
implement an effective caller ID authentication framework in the non-IP
portions of their networks.
14. In March of this year, we released the First Caller ID
Authentication Report and Order and FNPRM in which we adopted rules
requiring voice service providers to implement the STIR/SHAKEN caller
ID authentication framework in the IP portions of their networks by
June 30, 2021. We also proposed and sought comment on requirements to
strengthen STIR/SHAKEN to implement the TRACED Act. First, we proposed
to extend the STIR/SHAKEN implementation mandate to intermediate
providers and require them to both pass authenticated caller ID
information unaltered and to authenticate unauthenticated calls they
receive. Second, turning to TRACED Act implementation, we proposed to
grant an extension for compliance with the implementation mandate for
certain categories of voice service providers, specifically small voice
service providers and voice service providers that materially rely on
non-IP networks. Third, we proposed to require voice service providers
using non-IP technology, which cannot support STIR/SHAKEN, to either
(i) upgrade their networks to IP to enable STIR/SHAKEN implementation
or (ii) work to develop non-IP caller ID authentication technology.
Fourth, we proposed to implement a process, as directed by the TRACED
Act, pursuant to which voice service providers may become exempt from
the STIR/SHAKEN implementation mandate if we determine that they have
achieved certain implementation benchmarks. Fifth, we proposed to
prohibit voice service providers from imposing additional line item
charges on consumer and small business subscribers for caller ID
authentication. Sixth, we sought comment on how to address consumer
confusion or competition issues related to call labeling. We are
continuing to monitor when and how terminating voice service providers
label calls based on STIR/SHAKEN information and will not act on this
matter at this time. Finally, we sought comment, as directed by the
TRACED Act, on whether and how to modify our policies regarding access
to numbering resources to help reduce illegal robocallers' access. We
are continuing to review the record regarding access to numbering
resources and will not act on this matter at this time.
15. Implementation Progress. As reported previously, major voice
service providers fell into one of three categories regarding their
implementation progress by the end of 2019: (1) Voice service providers
that upgraded their networks to support STIR/SHAKEN and began
exchanging authenticated traffic with other voice service providers;
(2) voice service providers that upgraded their networks to support
STIR/SHAKEN but had not yet begun exchanging authenticated traffic with
other voice service providers; and (3) voice service providers that had
achieved limited, if any, progress towards upgrading their networks to
support STIR/SHAKEN. Since the end of 2019, several major voice service
providers have announced further progress in STIR/SHAKEN
implementation. In February 2020, T-Mobile announced that it began
exchanging authenticated traffic with Sprint, and in March 2020,
Bandwidth announced that it has begun exchanging authenticated traffic
with T-Mobile. In addition to the 14 major voice service providers
discussed in detail in the First Caller ID Authentication Report and
Order and FNPRM, other voice service providers and intermediate
providers have made progress toward STIR/SHAKEN implementation as well.
The Governance Authority reports that 34 voice service providers have
been approved to participate in the STIR/SHAKEN framework through the
governance system; 9 providers have completed the testing process and
are finalizing their approval; and 52 providers have begun registration
and are in some stage of the testing process.
III. Second Report and Order
16. In this document, we take the next steps to promote the
widespread deployment of caller ID authentication technology and
implement the TRACED Act. In the Report and Order, we first address the
definitions and scope of several terms used in the TRACED Act. Next, we
adopt rules on caller ID authentication in non-IP networks. We assess
the burdens and barriers to implementation faced by various categories
of voice service providers and adopt extensions to the STIR/SHAKEN
mandate based on our assessment. We also establish the required
robocall mitigation program that voice service providers with an
extension must implement and elaborate on the annual reevaluation
process for extensions required by the TRACED Act. We then adopt rules
implementing the exemption mechanism established by the TRACED Act for
voice service providers that meet certain criteria regarding early
STIR/SHAKEN implementation. We prohibit voice service providers from
imposing additional line item charges for call authentication
technology. Finally, to avoid gaps in a call path that could lead to
the loss of caller ID authentication information, we expand our STIR/
SHAKEN implementation mandate to encompass intermediate providers.
A. TRACED Act Definitions and Scope
17. In the First Caller ID Authentication Report and Order and
FNPRM, we adopted definitions of several terms used in the TRACED Act.
Specifically, we adopted definitions of ``STIR/SHAKEN authentication
framework'' and ``voice service'' that closely align with the statutory
language enacted by Congress. To provide an opportunity for further
refinement of the definitions we adopted, we sought comment in the
FNPRM on whether to alter or add to them. We also proposed in the FNPRM
to interpret ``providers of voice service'' on a call-by-call basis
rather than a provider-by-provider basis in order to best effectuate
Congressional direction. In other words, we proposed
[[Page 73363]]
evaluating whether a specific entity is a voice service provider (i.e.,
``provider of voice service'') within the meaning of the TRACED Act on
the basis of the entity's role with respect to a particular call,
rather than based on the entity's characteristics as a whole. In this
document, we reaffirm our definitions of ``STIR/SHAKEN authentication
framework'' and ``voice service,'' and adopt a rule codifying our
proposed interpretation of ``providers of voice service.''
18. Definition of ``STIR/SHAKEN Authentication Framework.'' The
definition of ``STIR/SHAKEN authentication framework'' that we adopted
in the First Caller ID Authentication Report and Order and FNPRM
closely tracks the language Congress used in the TRACED Act. In the
Report and Order, we defined ``STIR/SHAKEN authentication framework''
as ``the secure telephone identity revisited and signature-based
handling of asserted information using tokens standards.'' We did not
receive any comments in the record seeking clarification, so we
reaffirm the definition we adopted previously.
19. Definition of ``Voice Service.'' We next reaffirm the
definition of ``voice service'' that we adopted in the First Caller ID
Authentication Report and Order and FNPRM. Specifically, we defined
``voice service'' as a service ``that is interconnected with the public
switched telephone network and that furnishes voice communications to
an end user,'' and which includes ``without limitation, any service
that enables real-time, two-way voice communications, including any
service that requires [IP]-compatible customer premises equipment . . .
and permits out-bound calling, whether or not the service is one-way or
two-way voice over [IP].'' The definition we adopted is identical to
the language Congress included in the TRACED Act. We explained in the
First Caller ID Authentication Report and Order and FNPRM that, based
on the definition of ``voice service'' we adopted, our STIR/SHAKEN
rules apply to ``all types of voice service providers--wireline,
wireless, and Voice over internet Protocol (VoIP) providers,''
including both two-way and one-way interconnected VoIP providers. And
we clarified that voice service providers which lack control over the
network infrastructure necessary to implement STIR/SHAKEN are not
subject to our implementation requirements. Commenters that address the
issues nearly unanimously support our definition and interpretation of
``voice service,'' though several commenters seek further
clarification. Noble Systems argues that the Commission should
interpret our definition of ``voice service'' broadly to encompass
intermediate providers. We maintain our belief that the statutory
language of the TRACED Act forecloses this interpretation by specifying
that ``voice service'' means a service that ``furnishes voice
communications to an end user.''
20. First, NCTA and CenturyLink advocate for us to interpret our
rules to apply to ``over-the-top (OTT) service that possess technical
control over the origination of calls on their platforms.'' No
commenter opposed these requests. We reiterate our belief that for
STIR/SHAKEN to be successful, every service provider capable of
implementing the framework must participate. We therefore conclude that
to the extent a provider of OTT service provides ``voice service,'' and
has control of the relevant network infrastructure to implement STIR/
SHAKEN, it is subject to our rules.
21. NCTA further encourages us to revise the current definition of
``interconnected VoIP'' found in Sec. 9.3 of our rules in order to
``harmonize'' it with our caller ID authentication regulations. Section
9.3 generally limits ``interconnected VoIP service'' to two-way
interconnected VoIP and only includes one-way VoIP as ``interconnected
VoIP'' in the context of the Commission's 911 obligations. We
understand the definition of ``voice service'' that Congress adopted in
the TRACED Act to encompass both two-way and one-way interconnected
VoIP. Because we rely on the statutory term ``voice service'' and
because the meaning of that term is not limited by the definition of
``interconnected VoIP'' in Sec. 9.3 of our rules, we see no reason to
revisit of the definition of interconnected VoIP in Sec. 9.3 in this
proceeding.
22. Second, Microsoft argues that the definition of ``voice
service'' should be read to exclude inbound-only VoIP service.
Microsoft argues that this service is outside the scope of the STIR/
SHAKEN standards, and that the reference to service that ``permits out-
bound calling'' in the TRACED Act definition precludes application of
our requirement to inbound-only VoIP service. We disagree. We
understand the TRACED Act--which defines ``voice service'' to mean
``any service that is interconnected with the public switched telephone
network and that furnishes voice communications to an end user'' and
includes, ``without limitation, any service that enables real-time,
two-way voice communications, including any service that . . . permits
out-bound calling''--to establish a broad concept of voice service. We
read the phrase ``without limitation'' as indicating that the
subsequent phrase ``permits out-bound calling'' is not a limitation on
the initial, general definition of ``voice service,'' which encompasses
in-bound VoIP. Similarly, in the context of our Truth in Caller ID
rules, we interpreted the term ``interconnected'' as used in a
substantially similar definition of ``voice service'' in the RAY BAUM's
Act to include any service that allows voice communications either to
or from the public switched telephone network (PSTN), regardless of
whether inbound and outbound communications are both enabled within the
same service. Because our STIR/SHAKEN rules impose obligations on both
the originating and terminating side of a call, we believe that this
broad reading of ``interconnected'' is also appropriate here. Further,
reaching in-bound VoIP advances the purposes of the TRACED Act and
widespread caller ID authentication. Our rules, consistent with the
ATIS standards, require a voice service provider terminating a call
with authenticated caller ID information to verify that information
according to the STIR/SHAKEN framework. We thus reject Microsoft's
argument that reaching in-bound VoIP is unnecessary because the
standards comprising STIR/SHAKEN do not assign actions to be taken when
terminating a call.
23. Definition of ``Providers of Voice Service''--Call-by-Call
Basis. Congress directed many of the TRACED Act caller ID
authentication requirements to ``providers of voice service.'' We
proposed in the First Caller ID Authentication Report and Order and
FNPRM to interpret ``providers of voice service'' on a call-by-call--
rather than entity-by-entity--basis. Under this interpretation, a
provider of voice service is not subject to TRACED Act requirements for
all services simply because some of its services fall under the
definition of ``voice service.'' Instead, only those services that meet
the TRACED Act definition of ``voice service'' are subject to TRACED
Act obligations. We adopt our proposal. Both commenters that addressed
the issue support our proposal. We find that the call-by-call approach
best fits the TRACED Act's structure because it gives meaning to
Congress's inclusion of a definition for ``voice service'' and because
it best comports with the TRACED Act's allocation of duties on the
basis of call technology, e.g., differentiating duties between calls
over IP and non-IP networks.
[[Page 73364]]
B. Caller ID Authentication in Non-IP Networks
24. The TRACED Act directs us, not later than June 30, 2021, to
require voice service providers to take ``reasonable measures'' to
implement an effective caller ID authentication framework in the non-IP
portions of their networks. Given the large proportion of TDM-based
networks still in use, we expect a significant number of calls to be
outside the STIR/SHAKEN authentication framework in the near term. In
light of this, it is critically important that we take strong action to
address the issue of caller ID authentication in non-IP networks. To
that end, we interpret the TRACED Act's requirement that a voice
service provider take ``reasonable measures'' to implement an effective
caller ID authentication framework in the non-IP portions of its
network as being satisfied only if the voice service provider is
actively working to implement a caller ID authentication framework on
those portions of its network. A voice service provider satisfies this
obligation by either (1) completely upgrading its non-IP networks to IP
and implementing the STIR/SHAKEN authentication framework on its entire
network, or (2) working to develop a non-IP authentication solution. We
adopt rules accordingly, and find that this approach best balances our
goal of promoting the IP transition while simultaneously encouraging
the development of a non-IP authentication solution for the benefit of
those networks that cannot be speedily or easily transitioned. By
adopting rules that are not overly burdensome, we leave voice service
providers free to prioritize transitioning to IP, and we strongly
encourage voice service providers to take advantage of this opportunity
to do so.
25. In the First Caller ID Authentication Report and Order and
FNPRM, we proposed that a voice service provider satisfies the
``reasonable measures'' requirement under section 4(b)(1)(B) of the
TRACED Act if it is able to provide us, upon request, with documented
proof that it is participating, either on its own or through a
representative, as a member of a working group, industry standards
group, or consortium that is working to develop a non-IP solution, or
actively testing such a solution. We explained that this proposal was
consistent with our proposed approach to assessing whether a voice
service provider is making ``reasonable efforts'' to develop a caller
ID authentication protocol in the context of determining whether to
limit or terminate an extension of compliance granted under section
4(b)(5)(B) for non-IP networks. We adopt a new rule reflecting this
proposal and clarify its specific requirements.
26. Under our rule, a voice service provider satisfies its
obligations if it participates through a third-party representative,
such as a trade association of which it is a member or vendor. While
our proposal did not include mention of trade associations or vendors,
we agree with CCA that it would be best to broaden the scope of this
requirement by including such representatives within the bounds of our
requirement. Some industry groups have already established working
groups dedicated to examining potential non-IP call authentication
technologies. Allowing for such representatives will reduce the burden
of this obligation on individual voice service providers and minimize
the potential negative impact of broad and inexpert participation
identified in the record, while ensuring that all voice service
providers remain invested in developing a solution for non-IP caller ID
authentication. A wider range of efforts will encourage a greater
number of industry partnerships, increasing resource and information
sharing and speeding the development of a non-IP solution.
27. We expect the benefits of this approach to be numerous, and the
costs to voice service providers comparatively small. While some
commenters provided estimates of the cost of replacing their non-IP
networks, none provided estimates of the cost of working to develop a
caller ID authentication solution for non-IP networks. Given that our
firm but flexible approach permits voice service providers to satisfy
this obligation by participating either on their own or through a
representative, as members of a working group or consortium that is
working to develop or actively testing a non-IP solution, we expect
that any related compliance costs will be quite limited. By comparison,
the benefits of voice service providers either upgrading their non-IP
networks to IP to support STIR/SHAKEN or working to develop a caller ID
authentication solution for non-IP networks will be considerable, not
only in the less tangible benefits they will have for consumers by
reducing the waste and frustration resulting from illegal robocalls,
but in terms of actual monetary savings. Indeed, as we found in the
First Caller ID Authentication Report and Order and FNPRM, the monetary
benefits of STIR/SHAKEN are likely to be in the billions of dollars.
The greater the number of voice service providers that implement an
effective caller ID authentication framework--either by upgrading their
non-IP networks to IP and implementing STIR/SHAKEN, or by developing
and implementing an effective non-IP solution--the more effective these
frameworks will be in combatting illegal robocalls, and the more of the
expected benefits will be realized. Thus, the rules we adopt in this
document will help achieve these savings while simultaneously
minimizing the cost of compliance.
28. We disagree with ATIS's contention that we should not adopt
rules governing non-IP caller ID authentication until the joint ATIS/
SIP Forum IP-NNI Task Force concludes its work investigating the
viability of non-IP caller ID authentication frameworks. Given that
this task force is precisely the kind expressly contemplated, and
indeed, mandated, by our order in this document, we see no reason to
delay these rules. Indeed, the Task Force's existence is confirmation
that we have construed the ``reasonable measures'' standard in a manner
that appropriately dovetails with current industry efforts to develop a
non-IP solution. Further, the rules we adopt in this document are
required by Congressional direction to mandate voice service providers
to take ``reasonable measures'' to implement a non-internet Protocol no
later than June 30, 2021; we have no discretion to wait until a given
task force has concluded its work to adopt rules.
29. Although CTIA argues that requiring voice service providers to
participate in industry standards groups committed to developing or
actively testing a non-IP solution ``may not improve the development''
of such solutions, and would in fact ``divert resources from STIR/
SHAKEN deployment and other robocalls mitigation efforts,'' it offers
no alternative interpretation of the ``reasonable measures'' standard
mandated by Congress in the TRACED Act. We must impose a meaningful
mandate to fulfill Congress's direction to require ``reasonable
measures to implement'' a non-IP caller ID authentication solution.
Requiring voice service providers that choose not to upgrade their non-
IP networks to IP to contribute to groups and organizations that are
working to test or develop a non-IP solution strikes a balance between
promoting caller ID authentication solutions for TDM networks, as
required by the TRACED Act, and leaving resources free to invest in IP
networks. By allowing participation through a working group,
consortium, or trade association, we allow voice service providers to
efficiently pool their expertise and
[[Page 73365]]
resources with the goal of not replicating one another's efforts and
more efficiently developing a non-IP solution. We therefore are not
convinced by CTIA's arguments that the requirement we adopt will unduly
stunt STIR/SHAKEN deployment or that voice service providers will have
``few resources left to dedicate to industry standards groups.''
30. We are likewise unconvinced by TransNexus's conclusory claim
that participating in a working group would not constitute a
``reasonable effort'' to implement an effective caller ID
authentication framework on non-IP networks. Contributing to an
industry-led body dedicated to pooling expertise and resources in the
hopes of developing and/or testing non-IP solutions is a reasonable and
efficient strategy for encouraging the creation and deployment of such
solutions.
31. Out-of-Band STIR. We decline to mandate out-of-band STIR for
non-IP networks. Out-of-band STIR is a proposed non-IP solution whereby
caller ID authentication information is sent across the internet, out-
of-band from the call path. Commenters have widely divergent views as
to the viability of out-of-band STIR as a method of effective caller ID
authentication in non-IP networks. While a handful advocate for the
implementation of out-of-band STIR as the best method of ensuring
effective call authentication in non-IP networks, with Neustar even
claiming that this solution should be widely available in advance of
the June 30, 2021 implementation deadline, many others contend that
out-of-band STIR is not yet a viable solution. Comcast claims that out-
of-band STIR is an untested, time-consuming, and costly solution that
would require the re-creation of multiple network functions in parallel
to IP networks. Given the undeniably sharp divide between commenters
and the absence of sufficient testing and implementation to demonstrate
the viability of out-of-band STIR as an industrywide solution, we find
that it is not possible to conclude, based on the record before us,
that out-of-band STIR is an effective non-IP solution. We find that
significant industry consensus is an important predicate to deeming a
non-IP solution ``effective,'' given that cross-network exchange of
authenticated caller ID information is a central component to caller ID
authentication. Thus, we cannot at this time mandate adoption of out-
of-band STIR by voice service providers in the non-IP portions of their
networks. At the same time, we observe that opponents of this
technology have offered no meaningful alternative solutions. To those
that would oppose this possible solution without mention of an
alternative, we take this opportunity to note that standards work
requires both constructive input and compromise on the part of all
parties and stakeholders.
32. Effective Non-IP Caller ID Authentication Framework. As we
explain in the context of the extension of the implementation deadline
for certain non-IP networks, we will continue to evaluate whether an
effective non-IP caller ID authentication framework emerges from the
ongoing work that we require. Consistent with that section, we will
consider a non-IP caller ID authentication framework to be effective
only if it is: (1) Fully developed and finalized by industry standards;
and (2) reasonably available such that the underlying equipment and
software necessary to implement such protocol is available on the
commercial market. An effective framework would exist when the
fundamental aspects of the protocol are standardized and implementable
by industry and the equipment and software necessary for implementation
is commercially available. If and when we identify an effective
framework, we expect to revisit our ``reasonable measures'' requirement
and shift it from focusing on development to focusing on
implementation. We encourage voice service providers and others to put
forward a framework they view as effective for our consideration. We
also will continue to monitor progress in developing a non-IP
authentication solution and may revisit our approach to the TRACED
Act's ``reasonable measures'' requirement if we find that industry has
failed to make sufficient progress in either transitioning to IP or
developing a consensus non-IP authentication solution. We stand ready
to pursue additional steps to ensure more fulsome caller ID
authentication in non-IP networks, including by revisiting our non-
prescriptive development-based approach if needed.
33. Legal Authority. We find authority for these rules under
section 4(b)(1)(B) of the TRACED Act. That section expressly directs us
to obligate voice service providers to take ``reasonable measures'' to
implement an effective caller ID authentication framework in the non-IP
portions of their networks and is a clear source of authority for these
non-IP obligations.
34. We also conclude that section 251(e) of the Communications Act
of 1934, as amended (the Act), provides additional independent
authority to adopt these rules. Section 251(e) provides us ``exclusive
jurisdiction over those portions of the North American Numbering Plan
(NANP) that pertain to the United States.'' Pursuant to this provision,
we retain ``authority to set policy with respect to all facets of
numbering administration in the United States.'' Our exclusive
jurisdiction over numbering policy enables us to act flexibly and
expeditiously with regard to important numbering matters. When bad
actors unlawfully falsify or spoof the caller ID that appears on a
subscriber's phone, they are using numbering resources to advance an
illegal scheme. Mandating that voice service providers take
``reasonable measures'' to deploy an effective caller ID authentication
framework in the non-IP portions of their networks will help to prevent
the fraudulent exploitation of NANP resources by permitting those
providers and their subscribers to identify when caller ID information
has been spoofed. Section 251(e) thus grants us authority to mandate
that voice service providers take ``reasonable measures'' to implement
an effective caller ID authentication framework in the non-IP portions
of their networks in order to prevent the fraudulent exploitation of
numbering resources. Moreover, as the Commission has previously found,
section 251(e) extends to ``the use of . . . unallocated and unused
numbers''; it thus gives us authority to mandate that voice service
providers implement an effective caller ID authentication framework to
address the spoofing of unallocated and unused numbers.
35. Finally, we find authority under the Truth in Caller ID Act.
Congress charged us with prescribing regulations to implement that Act,
which made unlawful the spoofing of caller ID information ``in
connection with any voice service or text messaging service . . . with
the intent to defraud, cause harm, or wrongfully obtain anything of
value.'' Given the constantly evolving tactics by malicious callers to
use spoofed caller ID information to commit fraud, we find that the
rules we adopt in this document are necessary to enable voice service
providers to help prevent these unlawful acts and to protect voice
service subscribers from scammers and bad actors. Thus, section 227(e)
provides additional independent authority for these rules.
C. Extension of Implementation Deadline
36. The TRACED Act includes two provisions for extension of the
June 30, 2021 implementation date for caller ID authentication
frameworks. First, the TRACED Act states that we ``may, upon a public
finding of undue hardship,
[[Page 73366]]
delay required compliance'' with the June 30, 2021 date for caller ID
authentication framework implementation for a ``reasonable period of
time.'' Second, we ``shall grant a delay of required compliance'' with
the June 30, 2021 implementation date ``to the extent that . . . a
provider or class of providers of voice services, or type of voice
calls, materially relies on a non-[IP] network for the provision of
such service or calls'' ``until a call authentication protocol has been
developed for calls developed over non-[IP] networks and is reasonably
available.''
37. Under either extension provision, an extension may be provider-
specific or apply to a ``class of providers of voice service, or type
of voice calls.'' We must annually reevaluate any granted extension for
compliance. When granting an extension of the implementation deadline
under either provision, we must require impacted voice service
providers to ``implement an appropriate robocall mitigation program to
prevent unlawful robocalls from originating on the network of the
provider.''
38. Based on these directives and for the reasons discussed below,
we grant the following extensions from implementation of caller ID
authentication: (1) A two-year extension to small, including small
rural, voice service providers; (2) an extension to voice service
providers that cannot obtain a certificate due to the Governance
Authority's token access policy until such provider is able to obtain a
certificate; (3) a one-year extension to services scheduled for section
214 discontinuance; and (4) as required by the TRACED Act, an extension
for the parts of a voice service provider's network that rely on
technology that cannot initiate, maintain, and terminate SIP calls
until a solution for such calls is reasonably available. If at any
point after receiving an extension a voice service provider no longer
meets the extension criteria set for in this Second Report and Order,
the extension will terminate. Upon termination of an extension, a voice
service provider will be required to comply with our STIR/SHAKEN
implementation mandate immediately. We further direct the Wireline
Competition Bureau (Bureau) to reevaluate extensions annually, and we
require any voice service provider that receives an extension to
implement and certify that it has implemented a robocall mitigation
program by June 30, 2021.
1. Assessment of Burdens and Barriers to Implementation and Extensions
for Undue Hardship
39. The TRACED Act grants us the discretion to extend a voice
service provider's obligation to comply with the June 30, 2021 caller
ID authentication implementation mandate upon a public finding of undue
hardship. It states that the extension may be ``for a reasonable period
of time . . . as necessary . . . to address the identified burdens and
barriers.'' In connection with our determination of whether to grant an
extension, the TRACED Act specifically directs us, not later than
December 30, 2020 ``and as appropriate thereafter,'' to assess any
burdens and barriers to implementation of caller ID authentication
technology by (1) voice service providers that use time-division
multiplexing network technology (TDM), a non-IP network technology; (2)
small voice service providers; and (3) rural voice service providers.
It further directs us to assess burdens and barriers created by the
``inability to purchase or upgrade equipment to support the call
authentication frameworks . . . or lack of availability of such
equipment.'' The TRACED Act does not require us to grant undue hardship
extensions to the categories of entities for which we must evaluate
burdens and barriers to implementation, nor does it limit us to
granting undue hardship extensions to entities within the categories
for evaluation that it identifies. Based upon our review of the record,
including our evaluation of burdens and barriers to implementation by
certain categories of entities as directed by the TRACED Act, we grant
extensions to: (1) Small, including small rural, voice service
providers; (2) voice service providers that cannot obtain the
certificate necessary for STIR/SHAKEN; and (3) services subject to a
discontinuance application. We decline to grant requested extensions
for non-IP services, for larger rural voice service providers, due to
equipment unavailability, for enterprise calls, for intra-network
calls, or due to compatibility issues.
40. Extension for Small Voice Service Providers. The TRACED Act
specifically directs us to evaluate whether to grant an extension based
on undue hardship for small voice service providers. In the First
Caller ID Authentication Report and Order and FNPRM, we proposed
granting a one-year implementation extension due to undue hardship for
small, including small rural, voice service providers. After reviewing
the record, we grant a two-year extension for small voice service
providers, which we define as those with 100,000 or fewer voice
subscriber lines.
41. The record reflects that a barrier to STIR/SHAKEN
implementation for small voice service providers is the substantial
cost, despite resource constraints, to implement STIR/SHAKEN. For
instance, according to CTIA, ``many small providers face financial and
resource constraints that other providers do not'' as ``[s]mall
providers are driving toward the mandate deadline, but with fewer
employees and smaller budgets, they may require more time to transition
to STIR/SHAKEN.'' Small voice service providers must also balance
limited resources and expenses with other required technology
transitions. Most recently, commenters explain that the COVID-19
pandemic has monopolized substantial available resources, increasing
the burden on small voice service providers.
42. Relatedly, the record demonstrates that equipment availability
issues specifically impact small voice service providers. Such
providers rely on third-party vendor solutions, particularly software
solutions, to implement STIR/SHAKEN, and these solutions may be
prohibitively expensive for some small voice service providers. For
instance, WISPA asserts that ``[s]ome vendor's minimum fees could
exceed a small provider's entire voice revenues.'' WTA agrees that the
upfront expenses ``could cause a budget shortage for small providers
that have a limited, set multi-year budget that is already dedicated to
new deployments, staff, etc.'' Further, ACA Connects expresses concern
over a lack of transparency regarding the costs and relative advantages
of available vendor solutions as its smaller voice service provider
members, with limited budgets, must carefully apportion funds for STIR/
SHAKEN deployment. Indeed, small voice service providers report they
have ``been quoted annual rates from different vendors that range from
the low five figures to the low six figures, not including any upfront
costs to install the solution,'' with no explanation for the rate
disparity. The record reflects that as medium and large voice service
providers start to widely deploy STIR/SHAKEN, new and improved
solutions will emerge, increasing competition among vendors and
decreasing costs. In addition, multiple commenters contend that small
voice service providers are unable ``to procure ready-to-install
solutions'' from a variety of vendors ``on the same timeframe as the
nation's largest voice service providers.'' According to NTCA, its
members ``are typically `at the mercy' of vendors that respond to the
larger
[[Page 73367]]
operator community muc[h] faster, likely based on the latter's market
share and buying power.'' As a result, timing and availability of these
vendor solutions may be out of the control and reach of small voice
service providers. Further, commenters contend that these vendor
solutions remain at an early stage of development and ``far from `ready
to install' solutions.''
43. We are convinced by this record that an extension is
appropriate for small voice service providers. The record largely
supports our proposal for an implementation extension for small voice
service providers, and we agree with these commenters that an extension
is warranted to allow small providers sufficient time to address
challenges such as equipment cost and availability. For instance,
according to ACA Connects, NTCA, WISPA, and WTA, vendor costs may be
prohibitively expensive for small voice service providers and could
result in budget shortages. Additional time will allow voice service
providers confronted with budget shortages to spread costs over a
longer time horizon. Further, small voice service providers claim
vendor solutions are still in nascent stages of development, and an
extension will allow vendors that work with small voice service
providers more time to develop solutions and offer those solutions at a
lower cost as the market matures. Some small voice service providers
also describe the inability to exchange traffic at non-IP
interconnection points as a barrier to the exchange of calls with
authenticated caller ID information after implementation of STIR/
SHAKEN. In addition, to the extent that it uses TDM technology, a small
voice service provider must contend with the associated technical and
resource constraints to implementation. We address these issues
separately.
44. Transaction Network Services and AT&T contend that we should
not grant a blanket extension for small voice service providers. These
commenters claim that such an extension would be overinclusive because
not all small voice service providers face identical hardships, and
allege that illegal robocalls may originate from these providers. We
disagree. The overwhelming record support persuades us that small voice
service providers, as a class, face undue hardship, and supports the
need for a blanket implementation extension for such providers to give
them the necessary time to implement STIR/SHAKEN. The TRACED Act also
identifies small voice service providers as a class for which the
Commission should assess burdens and barriers to implementation.
Further, as ACA Connects contends, granting extensions on a case-by-
case basis for small voice service providers would ``inundate the
Commission with extension requests from a multitude of small providers,
many of them presenting evidence of the same or similar implementation
burdens'' and ``consume funds that would be better spent working
towards implementation of STIR/SHAKEN.'' We do not find that this
extension will unduly undermine the effectiveness of STIR/SHAKEN. As
small voice service providers account for only a small percentage of
voice subscribers, an extension covering these providers will account
for the unique burdens they face while ensuring that many subscribers
benefit from STIR/SHAKEN. Further, the prevalence of STIR/SHAKEN will
encourage small voice service providers that can afford to do so to
implement the framework as soon as possible to provide the protections
it offers to their subscribers. And small voice service providers--like
all providers subject to an extension--are obligated to implement a
robocall mitigation program to combat the origination of illegal
robocalls during the course of the extension.
45. We conclude that the extension we grant should run for two
years, subject to possible extension pursuant to the evaluation
discussed below. Multiple commenters advocated for an extension longer
than one year. For instance, WISPA and Atheral contend that small voice
service providers require an extension of at least two years beyond the
implementation deadline to ``budget for and absorb the cost of needed
upgrades'' and to ``allow for the development of vendor solutions and
reduction in cost to more affordable levels as volume scales.'' We
expect this extension for small voice service providers will drive down
implementation costs by allowing these providers to benefit from a more
mature market for equipment and software solutions necessary to
implement STIR/SHAKEN. Small voice service providers have also filed
estimates of the cost of implementing STIR/SHAKEN on their networks.
The additional implementation time will allow these providers to spread
the cost of implementation across a longer time horizon. We find that
an implementation deadline of two-years allows for sufficient time--but
no more than necessary--for small voice service providers to meet the
challenges of implementing STIR/SHAKEN on their networks. Our guiding
principle in setting this deadline is to achieve ubiquitous STIR/SHAKEN
implementation to combat the scourge of illegal caller ID spoofing as
quickly as possible. This extension should also ease the additional
burdens placed on small voice service providers by the COVID-19
pandemic, which has consumed significant resources.
46. We decline at this time NTCA's requests to tie an
implementation extension until June 30, 2023 to ``the vendor community
delivering solutions in 2020,'' and to grant additional implementation
time for small voice service providers ``unable to obtain vendor
solutions by the end of 2020.'' NTCA contends that the two-year
extension may be insufficient to resolve the issues presented by the
lack of IP interconnection if vendor solutions are not available to
small voice service providers by the end of 2020. We separately address
the issue of non-IP interconnection. In the interest of promoting
ubiquitous STIR/SHAKEN implementation, we decline at this time to grant
a longer extension for small voice service providers that may face
continued implementation challenges in the future. We find that a
longer extension would discourage the swift development of effective
vendor solutions and slow the deployment of STIR/SHAKEN to the
detriment of consumers. We also find that a longer extension would
unnecessarily rely on speculation about marketplace realities several
years from now. The Bureau may grant a further extension if it
determines such an extension is appropriate in its annual reevaluation.
47. Finally, we establish that, as proposed in the First Caller ID
Authentication Report and Order and FNPRM, a provider is a ``small
provider[] of voice service'' for purposes of this extension if it has
100,000 or fewer voice subscriber lines (counting the total of all
business and residential fixed subscriber lines and mobile phones and
aggregated over all of a provider's affiliates). In the First Rural
Call Completion Order (78 FR 76218, Dec. 17, 2013), the Commission
determined that the 100,000-subscriber-line threshold ensured that many
subscribers would continue to benefit from our rules while also
limiting the burden on smaller voice service providers. Similarly, we
find that, in the caller ID authentication context, limiting the
implementation extension for small voice service providers to those
that have 100,000 or fewer voice subscriber lines balances the needs of
these providers and the importance of widespread and effective STIR/
SHAKEN implementation. We received
[[Page 73368]]
support in the record for this definition of ``small providers of voice
service.''
48. We decline at this time USTelecom's post-circulation request to
exclude voice service providers within the 100,000-subscriber-line
threshold that ``originate a disproportionate amount of traffic
relative to their subscriber base, namely voice service providers that
serve enterprises and other heavy callers through their IP networks.''
While we see value in the policy goals that underlie USTelecom's
request, implementing its suggestion would require a difficult line-
drawing exercise. USTelecom did not offer any support for its proposed
criteria to identify parties that originate a disproportionate amount
of traffic, nor are we able to identify criteria in the limited time
available in which we have confidence. We are open to revisiting this
issue should we determine that the extension creates an unreasonable
risk of unsigned calls from a specific subset of small voice service
providers.
49. Extension for Voice Service Providers That Cannot Obtain a
Certificate. In the First Caller ID Authentication Report and Order, we
acknowledged the concerns raised by Cloud Communications Alliance
regarding whether all voice service providers are able to obtain the
certificates used for the intercarrier exchange of authenticated caller
ID information under the Governance Authority's current policies. And
in the FNPRM, we asked whether we should grant an implementation
extension for any other voice service providers or classes of voice
service providers, or types of calls. In response, commenters advocated
for an extension for voice service providers that cannot obtain a
certificate because they are ineligible to file FCC Form 499A, obtain
an Operating Company Number, or obtain direct access to telephone
numbers--each of which is a prerequisite to obtaining a certificate
under current Governance Authority policy.
50. Because it is impossible for a service provider to participate
in STIR/SHAKEN without access to the required certificate and because
some voice service providers are unable to obtain a certificate at this
time, we determine that a limited extension is necessary. Multiple
commenters contend that the Governance Authority's policy excludes
voice service providers that lease numbers rather than obtain them
directly from NANPA. In particular, one-way VoIP voice service
providers have no means to obtain direct access to numbers, so they
cannot obtain the certificate necessary to comply with their duty to
implement STIR/SHAKEN. Only carriers and interconnected VoIP providers
may obtain direct access to telephone numbers. Therefore, we grant an
extension to voice service providers that cannot obtain a certificate
due to the token access policy. We grant this extension until it is
feasible for a provider to participate in STIR/SHAKEN due either to the
possibility of compliance with the Governance Authority policy or a
change in the Governance Authority policy. We recognize that a voice
service provider may not be able to immediately come into compliance
with its caller ID authentication obligations after it becomes eligible
to receive a certificate, and we will not consider a voice service
provider that diligently pursues a certificate once it is able to
receive one in violation of our rules. PACE also requests that we
determine whether a voice service provider subject to this extension
may comply with our caller ID authentication requirements ``by relying
on a 3rd party service provider.'' In the absence of a more complete
record to guide our decision, we decline to accept this request at this
time. We expect the extension we establish will decrease costs by
relieving such providers from the obligation to upgrade their networks
until they can meaningfully participate in STIR/SHAKEN. We recognize
that industry has made progress on resolving the gap between Governance
Authority certificate access policies and the scope of duties we have
established pursuant to the TRACED Act, and we continue to urge speedy
resolution of these issues. We decline Noble Systems' request for us to
direct the Governance Authority to ``revisit its policies that were
defined prior to passage of the TRACED Act'' and ``revisit the makeup
of the [Governance Authority] membership in light of the broad scope of
``voice service'' in the TRACED Act.'' In the First Caller ID
Authentication Report and Order and FNPRM, we declined to intervene in
or impose new regulations on the STIR/SHAKEN governance structure and
maintain that position. We reiterate that because the Governance
Authority is made up of a variety of stakeholders representing many
perspectives, we have no reason to believe it will not operate on a
neutral basis.
51. Extension for Services Scheduled for Section 214
Discontinuance. In the First Caller ID Authentication Report and Order
and FNPRM, we also sought comment on whether to consider any additional
categories of extensions. In response to AT&T's request, we grant a
one-year extension based on undue hardship to cover services for which
a provider has filed a pending section 214 discontinuance application
on or before the June 30, 2021, STIR/SHAKEN implementation deadline.
Verizon and CenturyLink advocate for removing discontinuance
obligations that ``require [voice service] providers to obtain
permission prior to replacing TDM voice services with VoIP'' to ``help
make network transitions to IP more straightforward and efficient.'' We
decline to grant this request as it is outside the scope of the current
proceeding. This extension will allow voice service providers time to
either complete the discontinuance process and ``avoid incurring
unnecessary expense and burden to implement STIR/SHAKEN'' for services
``that are scheduled to sunset,'' or to implement STIR/SHAKEN for any
such services that are not discontinued. We agree with AT&T that voice
service provider resources ``are better spent upgrading networks that
will have the potential to reap the full benefits of the IP transition
and STIR/SHAKEN.'' We expect that this extension will decrease costs by
obviating the need to upgrade components of a voice service provider's
network that will be sunset. We underscore that a one-year extension
means that voice service providers have until June 30, 2022, to either
discontinue the legacy service or implement STIR/SHAKEN if the service
has not actually been discontinued, unless the provider obtains a
waiver of this requirement for good cause shown. If we determine that a
voice service provider filed a discontinuance application in bad faith
to receive this extension, we will terminate the extension and take
appropriate action.
52. Voice Service Providers That Use TDM--An Extension Would Be
Superfluous. The TRACED Act specifically directs us to evaluate whether
to grant an extension to voice service providers that use TDM network
technology. The record reflects that a major barrier to implementation
of a caller ID authentication framework for voice service providers
that use TDM technology is the lack of a standardized caller ID
authentication framework for non-IP networks. Because the STIR/SHAKEN
framework is an IP-only solution, these voice service providers must
expend substantial resources upgrading network software and hardware to
be IP compatible in order to implement the only currently available
standardized caller ID authentication solution. According to
commenters, voice service providers that use TDM networks also face
[[Page 73369]]
availability and cost issues regarding necessary equipment to upgrade
the software and hardware to convert their networks to IP. Further,
small or rural voice service providers that use TDM technology may have
fewer resources and require additional time for transitioning their
networks to IP technology. Multiple commenters agree that ``[e]ven if a
[voice service provider] has upgraded its own network to all-IP
technology, if that [voice service provider] exchanges substantial
traffic through legacy TDM tandems, such tandems will similarly present
obstacles to STIR/SHAKEN deployment.''
53. Although we proposed in the First Caller ID Authentication
Report and Order and FNPRM to grant the same extension to voice service
providers that use TDM technology under the undue hardship standard
that we grant to providers that materially rely on non-IP technology,
we conclude that a separate and identical extension is redundant and
creates administrative duplication. We want to avoid granting two
separate extensions, with associated filing and review requirements,
that serve identical purposes. Because the TRACED Act includes a
required extension for voice service providers that ``materially
rel[y]'' on non-IP technology, we decline to grant a separate extension
to voice service providers that use TDM technology under the undue
hardship standard. This extension (1) applies to those parts of a voice
service provider's network that materially rely on technology that
cannot initiate, maintain, and terminate SIP calls; (2) lasts ``until a
call authentication protocol has been developed for calls delivered
over non-[IP] networks and is reasonably available''; and (3) may be
terminated if the Commission determines that a voice service provider
``is not making reasonable efforts to develop the call authentication
protocol'' for non-IP networks. Although AT&T contends that ``an
extension for TDM networks is independently warranted,'' it does not
explain its position. In fact, AT&T concedes that ``the extension
outcomes are the same.'' We find the non-IP extension sufficiently
addresses AT&T's concern that there is not yet a STIR/SHAKEN-equivalent
solution for TDM networks. To the extent there is any lack of clarity,
we confirm that TDM networks are included in the non-IP extension
established below, and subject to its terms.
54. Rural Voice Service Providers--A Separate Extension Is
Unnecessary. The TRACED Act specifically directs us to evaluate whether
to grant an extension based on undue hardship to rural voice service
providers. The record reflects that the burdens and barriers to STIR/
SHAKEN implementation for rural voice service providers are often
encompassed by those for small voice service providers or voice service
providers that use non-IP network technology because these voice
service providers also tend to be rural. To the extent rural voice
service providers rely on non-IP technology, which is incompatible with
STIR/SHAKEN, they encounter the burdens already described for such
providers. Similarly, the rural voice service providers that describe
specific burdens to implementation--such as availability of vendor
solutions that may be prohibitively expensive with few reasonable
alternatives--are small voice service providers. Although CTIA
generally states that there are potential financial and resource
constraints for larger rural voice service providers, it does not
identify any specific implementation challenges faced by these
providers. Indeed, at least one larger rural voice service provider,
TDS Communications, a Wisconsin-based voice service provider that
serves nearly 900 rural, suburban, and metropolitan communities
throughout the United States, has begun to invest in STIR/SHAKEN
deployment.
55. In the First Caller ID Authentication Report and Order and
FNPRM, we sought comment on our proposed view that it would be
unnecessary to grant a separate implementation extension for rural
voice service providers as the challenges faced by these providers are
already addressed by the small voice service provider extension and the
extension for voice service providers that materially rely on a non-IP
network. After review of the record, we adopt our proposal and decline
to adopt a separate extension for rural providers. While we decline to
grant an extension to this class of voice service providers, a voice
service provider that believes that it faces an undue hardship may
submit a filing that details its specific circumstances. The majority
of commenters in the record did not differentiate rural voice service
providers from those that are small and referred to them
interchangeably. As noted above, the rural voice service providers that
called for an extension are themselves small voice service providers.
NCTA contends that a dedicated extension for rural providers is
``unnecessary'' because ``the vast majority of rural providers will
qualify for the small provider extension'' or the extension for voice
service providers that rely on non-IP networks. We agree with NCTA that
``there does not seem to be a strong basis for granting any form of
relief'' to rural voice service providers that do not qualify as small
voice service providers. Further, TDS reports that it had completed
work in 2019 to evaluate, select, and lab test a vendor solution to
allow it to integrate STIR/SHAKEN into the IP portions of its network.
Because one large rural voice service provider has already invested in
STIR/SHAKEN deployment to best serve its customers, we expect that
other similarly situated rural voice service providers have also begun
or would be capable of having begun the implementation process. We
conclude that it would be improper to reach a blanket finding of undue
hardship for rural voice service providers because (1) the record does
not show that larger rural providers face undue hardship; and (2) our
separate finding of undue hardship for small voice service providers
relieves small rural voice service providers of the obligation to
implement, such that they will no longer face undue hardship for the
duration of the extension. Further, an extension for rural voice
service providers would not only be unnecessary, but also harmful to
the goal of widespread implementation.
56. We also decline the request by CTIA and USTelecom for an
extension for vaguely-defined ``regional'' voice service providers that
do not fall within our 100,000 or fewer voice subscriber line
threshold. CTIA only generally describes potential financial and
resource constraints for these voice service providers, and neither
commenter sufficiently defines this class of providers or explains why
we should grant an extension on the basis of undue hardship to
providers with the resources that are necessary for serving a large
number of subscribers. We similarly decline the request by Madison
Telephone Networks for an extension until 2024 or 2025 for rural
providers in high cost areas to ``relieve financial pressure.'' We
decline to grant this extension as Madison Telephone Networks does not
demonstrate why this is a unique class of providers requiring an
extension of this length. Further, we expect the majority of these
voice service providers are also small or materially rely on non-IP
technology and therefore will be covered by either or both of those
extensions. If a voice service provider in this category is not covered
by an extension and requires additional time for STIR/SHAKEN
implementation, it may file an individual petition requesting an
extension, as discussed below.
[[Page 73370]]
57. Equipment Availability--A Separate Extension Is Unnecessary. In
the First Caller ID Authentication Report and Order and FNPRM, we
sought comment on Congress's direction to consider whether to grant a
separate extension on the basis of ``the inability to purchase or
upgrade equipment to support the call authentication frameworks under
this section, or lack of availability of such equipment.'' We conclude
that our extension for small voice service providers adequately
addresses challenges with regard to obtaining necessary equipment and
that a separate or additional extension is unnecessary. As discussed
above, the record reflects that equipment availability specifically
impacts small voice service providers. This is not a surprise, as it is
likely that larger voice service providers have the resources and
negotiating leverage to obtain the equipment they need much more
quickly than small providers. Granting an extension solely for
equipment unavailability may discourage larger voice service providers
from putting forward sufficient effort to obtain necessary equipment.
Further, no commenter has identified any specific equipment
availability issue for large voice service providers--commenters merely
speak in general terms. Granting an ex ante extension on this basis
would introduce difficult line-drawing questions as to when equipment
is ``unavailable'' for which the record does not suggest a solution and
that are not necessary to resolve in light of the extension for small
voice service providers. We note that under our rules any voice service
provider--large or otherwise--that encounters a specific equipment
availability issue may request a waiver of the deadline.
58. Enterprise Calls--An Extension Would Be Counterproductive. In
the First Caller ID Authentication Report and Order and FNPRM, we
sought comment on whether we should grant an extension for undue
hardship for enterprise calls. We described the concerns of some
commenters that the standards for attestation do not fully account for
the situation where an enterprise subscriber places outbound calls
through a voice service provider other than the voice service provider
that assigned the telephone number. In such enterprise calling
scenarios, commenters claimed, it would be difficult for an outbound
call to receive A-level attestation because the outbound call ``will
not pass through the authentication service of the [voice] service
provider that controls th[e] numbering resource.'' To provide A-level
attestation, the voice service provider must be able to confirm the
identity of the subscriber making the call, and that the subscriber is
using its associated telephone number. The record developed in response
to our Further Notice reflects challenges for voice service providers
to attest to enterprise calls with A-attestation in this and other
circumstances, meaning that such calls would be authenticated with B-
or C-level attestation. Based on these challenges, some commenters
argue that we should grant an extension in compliance with the STIR/
SHAKEN implementation mandate for enterprise calls so that these calls
will not receive caller ID authentication until industry standards
groups resolve the enterprise issue, rather than receiving a lower
level of attestation in the interim. We agree with the record
opposition, and we decline to grant an implementation extension to
enterprise calling cases.
59. First, we agree with those commenters that argue that an
implementation extension may discourage the swift development of
technical solutions for enterprise calls. Although commenters offer
different perspectives on the timing of a solution that would allow
enterprise calls to receive A-level attestation, the record reflects
that industry is ``working hard to achieve authentication with A-level
attestation this year.'' It is our goal to encourage this work, rather
than remove the beneficial incentive created by the STIR/SHAKEN
mandate. We decline, however, to go so far as some commenters suggest
and ``[r]equir[e] the prompt finalization of standards that will enable
voice providers that originate enterprise calls to provide an A-level
attestation.'' As industry stakeholders, standards bodies, and the
Governance Authority are actively working to finalize standards and
solutions to complex enterprise calling cases, we do not wish to
intervene in the process. At the same time, we continue to encourage--
and expect--industry to promptly resolve the outstanding challenges for
complex enterprise use cases and business models, and we will closely
monitor progress on this issue.
60. We are also not persuaded by claims that authenticating
enterprise calls with B- or C-level attestation poses a major problem.
These commenters contend that enterprise calls without an A-level
attestation may be blocked, mislabeled as potentially fraudulent, or
lead to illegal robocallers authenticating their own calls. However,
they fail to explain how the alternative--an enterprise call without
authenticated caller ID information--is preferable to one that receives
B- or C-level attestation. Cloud Communications Alliance addresses this
question, but states only that ``[i]t is difficult to answer this
question in the abstract without knowing the call validation treatment
of B or C level attestations.'' It adds that if voice service providers
or the industry ``only value an `A' level attestation when deciding
call treatment, while wholly discounting a lower level of attestation,
the ability to sign with a B or C level attestation will be of little
benefit, perhaps apart from providing information for trace back
purposes.'' Notably, NCTA reports that ``[i]n [its] members'
experiences, partial (`B') attestation can be achieved more quickly
than complete (`A') attestation for enterprise calls,'' and
accordingly, partial attestation is ``a reasonable implementation
approach in this context.'' Similarly, Hiya, an analytics company,
commits that it ``currently has no plans--nor is it aware of any plans
by other parties in the industry--to either block calls or label them
as potentially fraudulent solely due to lack of `full' or `A' level
attestation.'' It also asserts ``that voice service providers and
analytics engines will not use attestation level as the sole
determinant for reputation scoring of a caller,'' and instead,
``attestation information is one of the many data points that inform
analytics-driven call labeling and call blocking.'' Vonage contends
that attestation may provide a ``potentially'' ``dispositive data
point,'' but fails to support this claim. Transaction Network Services
also explains that ``STIR/SHAKEN attestations--`good' or `bad'--will
not have the effects that some commenters suggest'' as it ``endeavors
to incorporate STIR/SHAKEN attestations as one factor in its analysis''
and ``does not recommended making call-blocking decisions based on the
failure of STIR/SHAKEN authentication.'' Indeed, we have previously
stated that ``a call-blocking program might block calls based on a
combination of factors.'' In the Third Call Blocking Report and Order
(85 FR 56530, September 14, 2020), we also explained that ``[i]f the
terminating voice service provider has identified that calls with `A'
attestation previously originating from that number are nevertheless
illegal or unwanted based on reasonable analytics, [it] may block those
calls despite the attestation level.'' Even assuming that calls with B-
or C-level attestation will be treated meaningfully worse than calls
without authenticated caller ID information--a conclusion that, again,
is not substantiated by the record--concerns over the treatment of
calls authenticated
[[Page 73371]]
consistent with current STIR/SHAKEN standards does not amount to an
undue hardship in the implementation of STIR/SHAKEN technology, which
is the standard by which Congress directed us to evaluate undue
hardship extension requests. In light of these conclusions and our and
Congress's goal of ubiquitous STIR/SHAKEN implementation in IP
networks, we will not grant an extension for enterprise calls.
61. Intra-Network Calls--An Extension Would Be Counterproductive.
In the First Caller ID Authentication Report and Order and FNPRM, we
established distinct authentication requirements for inter-network
calls and for intra-network calls. In the case of inter-network calls,
an originating voice service provider must ``authenticate caller [ID]
information for all SIP calls it originates and that [it] will exchange
with another voice service provider or intermediate provider.'' This
duty applies only ``to the extent technically feasible.'' In the First
Caller ID Authentication Report and Order and FNPRM we specifically
recognized this fact, explaining that ``transmission of STIR/SHAKEN
authentication information over a non-IP interconnection point is not
technically feasible at this time.'' Because establishing trust between
providers is not necessary for calls that transit a single network, we
adopted a different obligation for intra-network calls that solely
transit the network of the originating voice service provider.
Specifically, in recognition of the fact that ``certain components of
the STIR/SHAKEN framework . . . are not necessary for calls that a
voice service provider originates and terminates on its own network,''
we concluded a voice service provider satisfies its intra-network
authentication obligation so long as it authenticates and verifies ``in
a manner consistent with the STIR/SHAKEN framework, such as by
including origination and attestation information in the SIP INVITE
used to establish the call.''
62. A number of commenters that exchange all traffic with other
providers through non-IP interconnection points--and thus have no
obligation under our rules to implement STIR/SHAKEN with respect to
inter-network calls--seek an extension from the intra-network
authentication requirement. These voice service providers seek such
relief because compliance requires network upgrades, and they would
prefer to delay investing in these necessary upgrades until they are
able to participate in STIR/SHAKEN both within their own network and
with regard to calls exchanged with other voice service providers,
which require many of the same upgrades.
63. We decline to grant the requested extension because we do not
find that it rises to the level of undue hardship. Commenters favoring
an extension contend that requiring them to invest in compliance solely
as to intra-network calls would require unreasonably burdensome network
upgrades that, in their view, produce limited benefits. But these
commenters fail to explain why implementation would be more burdensome
for them than for other voice service providers. In fact,
implementation maybe less costly because our standard for intra-network
IP calls is only that they are authenticated ``in a manner consistent
with the STIR/SHAKEN framework'' which does not require those upgrades
necessary to enable cross-provider authentication and verification. The
TRACED Act requires an assessment of burdens and barriers, not a cost-
benefit analysis, and parties seeking an extension have failed to show
that they face atypical burdens and barriers on the basis of the intra-
network authentication requirement. We nonetheless note that the
benefits of our intra-network requirement are greater than parties
favoring an extension contend. As we have explained, STIR/SHAKEN
implementation provides benefits to consumers even at the intra-network
level. Specifically, implementing STIR/SHAKEN within a voice service
provider's own network directly benefits consumers as it enables a
voice service provider to authenticate all calls among its customers.
To that end, we agree with commenters that while voice service
providers work toward IP interconnection, ``[t]here is no reason to
deny consumers'' the ``immediate benefits'' of authenticated caller ID
information for calls on their voice service provider's own network.
Further, the record reflects that many providers that face challenges
regarding IP interconnection are small providers, to which we have
granted a two-year extension in compliance with the STIR/SHAKEN
mandate. Providers so situated will therefore have additional time to
negotiate IP interconnection agreements before being subject to the
intra-network mandates. Various commenters in the record argue that the
Commission should more directly resolve the issue of non-IP
interconnection. While we refrain from directly addressing the issue of
non-IP interconnection in this Order, which focuses largely on
completing TRACED Act implementation as to STIR/SHAKEN, we will
continue to monitor the issue.
64. Further, granting such an extension would impede the progress
of the IP transition and further delay STIR/SHAKEN implementation--
contrary to our goal of ubiquitous deployment of caller ID
authentication technology. Atheral and WISPA request that we establish
a waiver process for providers with non-IP interconnection points that
need to upgrade media gateways in order to exchange SIP calls. We
decline to establish a unique process in this context, as these parties
do not explain why our existing procedures are insufficient. Parties
that wish to seek a waiver are free to do so pursuant to our existing
procedures. We agree with Comcast that it is essential to ``encourage
the IP transition by, among other things, adopting policies in this
proceeding that induce providers to prioritize the implementation of
IP-enabled call authentication through STIR/SHAKEN.'' Comcast proposes
that we ``consider[ ] a provider's efforts to transition to . . . IP-
to-IP voice interconnection[ ] when determining whether to grant or
renew a limited extension.'' Because we do not grant an extension for
the inability to exchange traffic at IP-enabled interconnection points,
we see no need to adopt this suggestion. As AT&T observes, an extension
for intra-network calls of providers that do not interconnect in IP
would ``discourag[e] voice service providers from coming to a
negotiated resolution and transitioning to IP'' at the interconnection
point. By denying this extension, we ``increase the[ ] incentive to
negotiate creative and commercially reasonable interconnection
agreements'' to ensure that customers receive STIR/SHAKEN benefits.
65. Provider-Specific Extensions. We decline at this time to grant
any extensions to individual voice service providers. We recognize, as
INCOMPAS and CenturyLink suggest, that some providers may face specific
circumstances in all or part of their IP networks that constitute undue
hardship. The Commission will be in a better position to evaluate those
requests, however, in response to specific petitions that establish in
detail the basis for the requested extension, rather than through
establishing a general principle in response to the vague and general
concerns about technology or compatibility issues that INCOMPAS and
CenturyLink set forth. A voice service provider that believes that it
faces an undue hardship within the meaning of the TRACED Act may file
in this docket an individual petition requesting an extension. We
direct the
[[Page 73372]]
Bureau to seek comment on any such petitions and to issue an order
determining whether to grant the voice service provider an extension.
We expect any voice service provider seeking an extension to file its
request by November 20, 2020, and we direct the Bureau to issue a
decision no later than March 30, 2021. We find it appropriate to direct
the Bureau to issue provider-specific extension determinations by March
30, 2021, so that the Bureau has adequate time to seek comment on and
consider timely-filed petitions and petitioners have adequate time,
before the June 30, 2021, implementation deadline, to act in response
to the Bureau's determination. Although we expect voice service
providers to file extension requests by November 20, 2020, we note that
parties seeking additional extensions after this date are free to seek
a waiver of our deadline under Sec. 1.3 of the Commission's rules.
This is consistent with the TRACED Act's mandate that the Commission
consider the burdens and barriers to implementation ``as appropriate''
beyond the 12-month period specified in the Act. Of course, in
determining whether it is ``appropriate'' to consider such late-filed
requests, we expect that the Commission will not look favorably on
requests that rely on facts that could have been presented to the
Commission prior to November 20, 2020 with reasonable diligence. Given
the importance of widespread STIR/SHAKEN implementation, to be granted
an extension a voice service provider must demonstrate in detail the
specific undue hardships, including financial and resource constraints,
that it has experienced and explain why any challenges it faces meet
the high standard of undue hardship to STIR/SHAKEN implementation
within the timeline required by Congress.
2. Extension for Certain Non-Internet Protocol Networks
66. Section 4(b)(5)(B) of the TRACED Act directs that ``the
Commission shall grant a delay of required compliance . . . for any
provider or class of providers of voice service, or type of voice
calls, only to the extent that such a provider or class of providers of
voice service, or type of voice calls, materially relies on a non-[IP]
network for the provision of such service or calls . . . until a call
authentication protocol has been developed for calls delivered over
non-[IP] networks and is reasonably available.'' In implementing this
provision, we impose the same obligations on voice service providers
that receive the extension as we impose in the mandate requiring voice
service providers to implement an effective caller ID authentication
framework in the non-IP portions of their networks. We note that, along
with the obligations we impose for recipients of the non-IP extension,
such recipients are also subject to the robocall mitigation
requirements shared by all other recipients of extensions. We find that
doing so ensures that all voice service providers with non-IP network
technology are subject to the same burdens and are working together to
develop a non-IP solution as envisioned by the TRACED Act. We also find
that such action most efficiently carries out the goals of protecting
consumers from illegal robocalls on non-IP networks, and encourages a
general transition to IP and the wider implementation of STIR/SHAKEN.
67. Eligibility for This Extension. Under the TRACED Act, we must
grant an extension for voice service providers or types of voice calls
that ``materially rel[y] on a non-[IP] network.'' We interpret this
provision to mean that those portions of a voice service provider's
network that do not use SIP technology are eligible for an extension of
the implementation deadline of June 30, 2021. The TRACED Act states
that we shall grant this extension ``under section 4(b)(5)(A)(ii),''
which governs extensions granted upon a public finding of undue
hardship. We interpret this clause to mean that undue hardship is
presumed where a voice service provider materially relies on a non-IP
network for the provision of such service or calls. We also interpret
``until a call authentication protocol has been developed . . . and is
reasonably available'' to be a statutorily-defined ``reasonable period
of time'' for the purposes of this extension. In the First Caller ID
Authentication Report and Order and FNPRM, we proposed defining ``non-
[IP] network[s]'' as those portions of a voice service provider's
network that rely on technology that cannot initiate, maintain, and
terminate SIP calls. We adopt our proposal because we believe this to
be a straightforward implementation of Congress's direction in the
TRACED Act, which also provides that extensions may be voice service
provider-specific or apply to a class of voice service providers or
type of voice calls. In determining whether a voice service provider or
type of voice calls ``materially relies'' on such a non-SIP capable
network, we proposed to interpret ``material[ ]'' to mean ``important
or having an important effect'' and, consistent with our call-by-call
interpretation of the TRACED Act, we proposed to read ``reli[ance]''
with reference to the particular portion of the network in question. We
adopt these proposed interpretations, which received no opposition in
the record, and we therefore consider reliance on a non-IP network as
material if that portion of the network is incapable of using SIP.
Comcast argues that we should refrain from ``applying new regulatory
mandates to the entire voice industry,'' and should instead ``consider[
] a provider's efforts to transition to IP . . . when determining
whether to grant or renew a limited extension of the STIR/SHAKEN
implementation deadlines.'' We decline to take this approach, as we
believe the approach we take in this document--imposing a broad mandate
and granting an extension where necessary--better comports with the
TRACED Act's mandatory extension for providers that ``materially rely''
on non-IP technology. Put another way, if a SIP-incompatible portion of
a voice service provider's network is used for the provision of voice
service, that portion of the network is eligible for an extension of
the implementation deadline. The record reflects support for this
interpretation. After noting that our definition's scope is consistent
with the concept of material reliance, AT&T suggests that we add to our
definition of ``non-[IP] network'' ``all `TDM in the middle' services--
that is, those utilizing TDM switching/transport as well as those
exchanged over TDM interconnection points.'' We decline to do so
because we are only obligated under the TRACED Act to provide
extensions for originating and terminating voice service providers, and
not intermediate providers. We also note that the rules we adopt in
this document regarding intermediate providers only apply to networks
which support SIP signaling. We acknowledge the concerns raised by AT&T
and others regarding the prevalence of non-IP networks, and find that
their prevalence only increases the importance of taking action to
encourage widespread caller ID authentication across all networks while
the IP transition is ongoing.
68. Duration of Extension. The TRACED Act directs that the non-IP
extension shall end once ``a call authentication protocol has been
developed for calls delivered over non-[IP] networks and is reasonably
available.'' We also note that the TRACED Act grants us the authority
to limit or terminate any granted non-IP extension if we determine that
a voice service provider ``is not making
[[Page 73373]]
reasonable efforts to develop'' a caller ID authentication protocol for
non-IP networks. As noted later, we interpret ``reasonable efforts'' to
mean that a voice service provider is participating, either on its own,
in concert with a vendor, or through a representative, as a member of a
working group, industry standards group, consortium, or trade
association that is working to develop a non-IP solution, or actively
testing such a solution. In determining whether a caller ID
authentication protocol meets this standard, we adopt the test proposed
by Alaska Communications, with some modifications. Consistent with
Alaska Communications' proposal, we conclude that a caller ID
authentication protocol ``has been developed'' if we determine that the
protocol is fully developed and finalized by industry standards. By
``fully developed'' and ``finalized'' we do not require that the
protocol must have achieved a status whereby no future development or
progress is possible. Under that interpretation, the STIR/SHAKEN
framework itself would not meet this standard. Instead, our standard
does not foreclose the possibility of further development and
improvement, but would only determine a protocol has been developed if
at least all fundamental aspects of the protocol which enable its
effectiveness are standardized by industry, and the protocol is
implementable by voice service providers. We agree with commenters that
such a protocol must be standards-based and ready for implementation.
Although some commenters advocate for mandating out-of-band STIR, we
find that this solution is not yet standardized. We thus conclude that,
at this time, no caller ID authentication protocols exist which have
been developed and are reasonably available for calls delivered over
non-IP networks. We also find that a caller ID authentication protocol
is ``reasonably available'' if the underlying equipment and software
necessary to implement such protocol is available on the commercial
market. We decline to adopt Alaska Communications' requirement that the
underlying equipment and software be ``widely available and affordable
on the commercial market,'' because the terms ``widely'' and
``affordable,'' in the context of sophisticated businesses negotiating
for specialized equipment and software, are too broad and indefinite to
administer readily; and Alaska Communications does not provide enough
further guidance on these terms to adopt them as part of a workable
standard. We believe this approach is a workable and clear standard,
and has support from the record. And as we have explained, we adopt the
same standard for determining whether a caller ID authentication
protocol is ``effective'' for purposes of our mandate on non-IP
networks, ensuring a harmonious approach to our rules regarding non-IP
caller ID authentication technology. Alaska Communications suggests
that we adopt an additional requirement for determining whether a
caller ID authentication protocol is ``reasonably available.''
Specifically, Alaska Communications suggests that the ``knowledge,
training, and expertise necessary to operate the equipment and
implement the standard [must be] sufficiently widespread among the
small, rural, and other non-IP service providers'' in receipt of an
extension in order for the standard to be ``reasonably available.'' We
decline to adopt this requirement because doing so could create a
perverse incentive for voice service providers to be willfully ignorant
of newly developed protocols so as to prolong an extension. It also
would require an unreasonably complicated inquiry into the knowledge
and practices of numerous small voice service providers. We further
find such a requirement to be unnecessary ex ante without a specific
protocol and associated requirements in front of us.
69. As we explained in the context of the mandate on non-IP
networks, we will continue to monitor industry progress towards the
development of a non-IP caller ID authentication solution. If we find
after providing notice and an opportunity for comment that a non-IP
solution meets these criteria, we will both modify the non-IP
implementation mandate and phase out the non-IP implementation
extension to account for this new solution. Cooperative Telephone
Company suggests that we grant a limited five-year extension of the
June 30, 2021, deadline for implementing a caller ID authentication
framework ``for those service providers currently using a TDM network
that have less than 1,000 subscriber lines.'' Cooperative Telephone
Company argues that such small and rural telephone companies have
``scarce resources'' which would not cover both the demands of their
customers and new regulations for non-IP technology. We decline to do
so given that such an extension would not be consistent with the
timeframe that Congress established in the TRACED Act for the non-IP
extension--which is to last until a non-IP solution becomes reasonably
available--not for a fixed period of years. Alaska Communications
suggests that we ``grant a permanent exemption for the few non-SS7-
connected switches remaining'' because such switches are unique. We
find adopting this proposal unnecessary at this time. In the absence of
a developed solution, we are not yet in a position to determine whether
any technical exceptions could be necessary and appropriate.
70. Obligations of Voice Service Providers Receiving an Extension.
The TRACED Act provides that we should limit or terminate an extension
of compliance if we determine in a future assessment that a voice
service provider ``is not making reasonable efforts to develop the call
authentication protocol'' for non-IP networks. To be consistent with
our approach in mandating that voice service providers take
``reasonable measures'' to implement an effective caller ID
authentication framework in the non-IP portions of their networks, we
find that a voice service provider satisfies the ``reasonable efforts''
requirement under section 4(b)(5)(D) if it is able to provide the
Commission, upon request, with documented proof that it is
participating, either on its own, in concert with a vendor, or through
a representative, as a member of a working group, industry standards
group, consortium, or trade association that is working to develop a
non-IP solution, or actively testing such a solution. We also conclude
this requirement both promotes the IP transition and encourages the
development of a non-IP authentication solution for the benefit of
those networks that cannot be speedily or easily transitioned.
3. Reevaluating Granted Extensions
71. Section 4(b)(5)(F) of the TRACED Act requires us annually to
reevaluate and revise as necessary any granted extension, and ``to
issue a public notice with regard to whether such [extension] remains
necessary, including why such [extension] remains necessary; and when
the Commission expects to achieve the goal of full participation.'' As
we proposed in our First Caller ID Authentication Report and Order and
FNPRM, we direct the Bureau to reevaluate the extensions we have
established annually, and to revise or extend them as necessary. We
adopt this proposal because the Bureau is in the best position to
undertake this fact-intensive and case-by-case evaluation, particularly
in the context of evaluating extensions for undue hardship. Pursuant to
the TRACED Act, we direct the Bureau to issue a Public Notice seeking
comment to inform its annual
[[Page 73374]]
review and consider the comments it receives before issuing a Public
Notice of its decision as to whether to revise or extend an extension.
The record reflects support, and no opposition, for this reevaluation
process.
72. Scope of Bureau's Authority. We permit the Bureau to decrease,
but not to expand, the scope of entities that are entitled to a class-
based extension based on its assessment of burdens and barriers to
implementation. Specifically, if the Bureau concludes in its review
that a class-based extension should be extended beyond the original end
date set by the Commission, it may choose to do so for all or some
recipients of the extension, as it deems appropriate, based on its
assessment and after providing notice and an opportunity for comment.
As suggested by ACA Connects, we clarify that the Bureau may not,
however, terminate an extension for some or all recipients prior to the
extension's originally set or newly extended end date.
73. Assessment of Burdens and Barriers. The TRACED Act directs the
Commission to assess burdens and barriers to implementation by December
30, 2020, and ``as appropriate thereafter.'' We find it appropriate to
reassess burdens and barriers to implementation by voice service
providers that we granted an extension in conjunction with evaluating
whether to maintain, modify, or terminate the extension. Accordingly,
we direct the Bureau to assess burdens and barriers to implementation
faced by those categories of voice service providers subject to an
extension when it reviews those extensions on an annual basis or on
petition. Coordinating an assessment of burdens and barriers to
implementation with our extension reevaluations will inform the
Bureau's decision to extend or revise any granted extensions. It will
also provide a basis for the Bureau to revise the scope of entities
that are entitled to an extension. We find that aligning the periodic
reassessment of burdens and barriers to implementation with any review
of extensions is the best reading of the relevant statutory language.
We read ``appropriate'' in this section to tie the timing of our future
assessments to our annual extension reevaluations. We received no
comments in the record to our proposal in this regard.
4. Robocall Mitigation Program
74. Section 4(b)(5)(C)(i) of the TRACED Act directs us to require
any voice service provider that has been granted an extension to
implement, during the time of the extension, ``an appropriate robocall
mitigation program to prevent unlawful robocalls from originating on
the network of the provider.'' In the First Caller ID Authentication
Report and Order and FNPRM, we sought comment on USTelecom's proposal
to obligate voice service providers to file certifications describing
their robocall mitigation programs in lieu of a prescriptive approach.
In this Report and Order, we adopt this proposal and give voice service
providers the flexibility to decide the specific contours of an
effective robocall mitigation program that best suits the needs of
their networks and customers. We additionally create a certification
process and database to aid in enforcement efforts and prohibit
intermediate providers and terminating voice service providers from
accepting voice traffic from voice service providers not listed in the
database. These steps will ensure that the only voice traffic to
traverse voice networks in the U.S. is from those voice service
providers that have either fully implemented STIR/SHAKEN on their
entire networks or that have implemented a robocall mitigation program
on those portions of their networks that are not STIR/SHAKEN-enabled.
75. Providers Subject to the TRACED Act's Robocall Mitigation
Program Requirement. Based on the statutory text, we read the
requirement to implement a robocall mitigation program to apply to all
voice service providers that receive an extension on the basis of undue
hardship or material reliance on a non-IP network. The TRACED Act
states that extensions for material reliance on a non-IP network are
``[s]ubject to subparagraphs (C) through (F),'' and paragraph (C)(i)
sets forth the robocall mitigation program requirement. The record
reflects support for this approach. Securus argues that we should not
impose a robocall mitigation program requirement on voice service
providers--even voice service providers granted an extension--whose
networks uniquely pose ``nearly zero'' risk of originating high volumes
of illegal robocalls. We decline to adopt this suggestion because the
TRACED Act obligates us to require ``any provider subject to such
[extension to] implement an appropriate robocall mitigation program.''
Neustar recommends that we require ``all voice service providers [to]
utilize robocall mitigation solutions, regardless of whether they
implement STIR/SHAKEN in their networks,'' and ZipDX argues that
providers which have implemented STIR/SHAKEN should institute robocall
mitigation programs for any calls they authenticate with C-level
attestation. ZipDX also argues that we should require voice service
providers to document and share with the Commission information on how
they assign the A-, B-, or C-level attestations. We decline to adopt
such a reporting requirement at this time, as we have no reason to
believe the existing mechanisms for policing use of attestation levels
within the STIR/SHAKEN framework are insufficient. We decline to adopt
these suggestions. We agree with commenters that under the TRACED Act
robocall mitigation ``is intended to be an interim approach for
addressing potential unlawful robocalls until the provider has
implemented STIR/SHAKEN.'' Consistent with this view, in the case of
voice service providers that have neither complied with the STIR/SHAKEN
mandate by June 30, 2021, nor are subject to any extension, we expect
such noncompliant voice service providers to implement robocall
mitigation on the non-STIR/SHAKEN-enabled portions of their networks.
Doing so does not free the provider from enforcement of its violation
of our STIR/SHAKEN implementation mandate, but will protect consumers
by ensuring that no portion of the voice network is left without an
implementation of either caller ID authentication or a robocall
mitigation program. While USTelecom argues we can find authority under
other provisions of the Act, we need not reach that issue. First,
regardless of whether we could rely on an alternative source of
authority, we find it appropriate to defer to Congress's recent,
specific guidance on the subject. Moreover, while USTelecom argues that
such a requirement ``will provide benefits independent of call
authentication solutions, including before and after full deployment of
such solutions,'' we find such a requirement to be inappropriate at
this juncture. We cannot yet know whether requiring voice service
providers to expend additional resources on robocall mitigation even
after STIR/SHAKEN implementation would be an efficient use of their
resources, and we do not wish to place additional burdens on voice
service providers already working to comply with the June 30, 2021,
STIR/SHAKEN implementation deadline. We will revisit this conclusion if
we determine that additional robocall mitigation efforts are necessary
in addition to STIR/SHAKEN after the caller ID authentication
technology is more widespread.
[[Page 73375]]
76. Robocall Mitigation Program Requirements. The TRACED Act
directs us to require all voice service providers granted an
extension--whether on the basis of undue hardship or material reliance
on a non-IP network--to ``implement an appropriate robocall mitigation
program to prevent unlawful robocalls from originating on the[ir]
network[s].'' As suggested by USTelecom, we require voice service
providers subject to an extension to ``take[] reasonable steps to avoid
originating illegal robocall traffic.'' USTelecom outlines examples of
such ``reasonable steps,'' which could include ``[a]nalyz[ing] high-
volume voice network traffic to identify and monitor patterns
consistent with robocall campaigns,'' ``[a]nalyz[ing] traffic for
patterns indicative of fraudulent calls--for example, identifying short
duration calls with low completion rates,'' and ``[t]ak[ing] reasonable
steps to confirm the identity of new commercial VoIP customers by
collecting information such as physical business location, contact
person(s), state or country of incorporation, federal tax ID, and the
general nature of the customer's business.'' We decline to opine at
this time on whether such practices meet our sufficiency standard, so
as to promote experimentation with a wide variety of practices by voice
service providers in their robocall mitigation programs. In a different
proceeding, we propose requiring voice service providers to respond to
traceback requests, mitigate illegal traffic when notified of such
traffic, and take affirmative, effective measures to prevent new and
renewing customers from using their networks to originate illegal
calls; we also seek comment on whether we should prescribe specific
steps. As our action in this proceeding is concerned with implementing
section 4(b)(5)(C) of the TRACED Act, we do not preclude the
possibility of requiring all voice service providers to take
affirmative, effective measures to prevent the origination of unlawful
calls--whether specific or not--pursuant to different legal authority,
such as section 201(b) of the Communications Act of 1934, as amended.
With one exception noted below, we find that a non-prescriptive
approach to robocall mitigation requirements gives voice service
providers ``the flexibility to react to traffic trends they view on
their own networks and react accordingly.'' This approach also allows
voice service providers to innovate and ``draw from the growing
diversity and sophistication of anti-robocall tools and approaches
available.'' In a separate proceeding, we proposed requiring voice
service providers to take affirmative, effective measures to prevent
new and renewing customers from using their networks to originate
illegal calls, and seek comment on whether we should prescribe specific
steps. As our analysis here is concerned with implementing section
4(b)(5)(C) of the TRACED Act, we do not preclude the possibility of
requiring all voice service providers to take affirmative, effective
measures to prevent the origination of unlawful calls--whether specific
or not--pursuant to different legal authority, such as section 201(b)
of the Act.
77. We require voice service providers subject to an extension to
document and publicly certify how they are complying with these
requirements. We find that such a requirement will encourage voice
service providers to ensure that they are taking ``reasonable steps.''
We have previously found that requiring self-evaluation is an effective
means of promoting compliance with our rules. In the rural call
completion context, the Commission adopted a rule requiring covered
providers to monitor the rural call completion performance of the calls
they pass on to intermediate providers, and take action to address poor
performance. We concluded that such a monitoring rule ``will ensure
better call completion to rural areas by covered providers, . . .
reduce the necessity for enforcement action, and aid our enforcement
efforts when needed.'' Such a requirement also enables us to evaluate a
voice service provider's ``reasonable steps'' to determine whether they
are sufficient. This public certification requirement will facilitate
our ability to enforce a prohibition on intermediate providers and
terminating voice service providers from accepting voice traffic from
voice service providers with insufficient or ineffective robocall
mitigation programs.
78. While we adopt a non-prescriptive approach to voice service
providers' robocall mitigation programs, we find it necessary to
articulate general standards, both to guide voice service providers in
preparing their programs and to ensure that the statutory obligation to
implement a robocall mitigation program is enforceable. We clarify that
a robocall mitigation program is sufficient if it includes detailed
practices that can reasonably be expected to significantly reduce the
origination of illegal robocalls. This is not to say that a voice
service provider may not engage in practices, as part of its robocall
mitigation program, that are experimental or cutting edge, and whose
effectiveness is not yet proven. Rather, we encourage industry
experimentation and only require that robocall mitigation programs
include proven practices alongside experimental ones. In addition, for
its mitigation program to be sufficient, the voice service provider
must comply with the practices it describes. We will also consider a
mitigation program insufficient if a provider knowingly or through
negligence serves as the originator for unlawful robocall campaigns. We
decline to adopt ZipDX's proposal that a robocall mitigation program
merely be ``effective'' because ZipDX provides no elaboration of how to
define the term, and we think the more detailed requirement we adopt
will be both clearer and more successful than a non-specific
``effective'' standard. At the same time, we agree with Verizon that
``different types of network providers should have different types of
robocall mitigation programs,'' and we welcome voice service providers
adopting approaches that are innovative, varied, and adapted to their
networks.
79. The record also convinces us that participation in industry
traceback efforts is of utmost importance in the absence of STIR/SHAKEN
implementation. To that end, we require voice service providers, as
part of their robocall mitigation programs, to commit to cooperating
with the Commission, law enforcement, and the industry traceback
consortium in investigating and stopping any illegal robocallers that
it learns are using its service to originate calls. We underscore that
this requirement does not supersede any existing legal processes. We
also encourage law enforcement to make traceback requests through the
industry traceback consortium. We find that this baseline requirement
to participate in traceback efforts is a necessary aspect of any
attempt to mitigate illegal robocalls, as it permits voice service
providers and enforcement agencies to identify illegal robocallers and
prevent them from further abusing the voice network. Without a means to
identify and bring enforcement actions against the sources of illegal
robocalls, such bad actors will continue their operations unchecked and
emboldened. We underscore that this is a necessary, but not sufficient,
component of a voice service provider's robocall mitigation program
which, as we have explained, must include other steps to ensure that a
provider is not the source of illegal robocalls.
80. We decline at this time to impose other more prescriptive
requirements for robocall mitigation programs, such as mandating an
analytics-based robocall mitigation program, as proposed by Transaction
Network Services, or know-
[[Page 73376]]
your-customer policies, as suggested by Consumer Groups. While we
acknowledge that such practices and policies may be effective aspects
of a robocall mitigation program--and we encourage voice service
providers to incorporate them into their own robocall mitigation
programs--we decline specifically to mandate them, as we agree with
commenters that argue that there is no one-size-fits-all robocall
mitigation solution that accounts for the variety and scope of voice
service provider networks. For example, a small voice service provider
with few subscribers may not have a need to implement comprehensive
analytics given its small size. Similarly, a voice service provider
with limited means may choose a solution suited to its budget and
business model. We also decline Neustar's suggestion that we ``ensure
that providers implement robocall mitigation solutions for both
originating and terminating calls.'' The TRACED Act's mandate plainly
requires only robocall mitigation programs that ``prevent unlawful
robocalls from originating on the network of the provider.''
81. Deficient Robocall Mitigation Programs. If we find that our
non-prescriptive approach to robocall mitigation is not satisfactorily
stemming the origination of illegal robocalls, we agree with NTCA and
Verizon that we should be ready to impose more prescriptive obligations
on any voice service provider whose robocall mitigation program has
failed to prevent high volumes of illegal robocalls. We thus direct the
Enforcement Bureau to prescribe more specific robocall mitigation
obligations for any voice service provider it finds has implemented a
deficient robocall mitigation program. Such robocall mitigation
obligations would be chosen as appropriate to resolve the specific
voice service provider's prior shortcomings. In such instances, the
Enforcement Bureau will release an order explaining why a particular
mitigation program is deficient and, among other things, prescribe the
new obligations needed to rectify those deficiencies, including any
milestones or deadlines. We find that action by the Enforcement Bureau
is appropriate in responding to issues on a case-by-case basis. As part
of the penalties it may impose, the Enforcement Bureau may de-list a
voice service provider from the robocall mitigation database we
establish. If we find that our non-prescriptive approach to robocall
mitigation programs is falling short on a widespread basis, we will not
hesitate to revisit the obligations we impose through rulemaking at the
Commission level.
82. Voice Service Provider Certification and Database. To promote
transparency and effective robocall mitigation, we require all voice
service providers--not only those granted an extension--to file
certifications with the Commission regarding their efforts to stem the
origination of illegal robocalls on their networks. Specifically, as
proposed by USTelecom, and with the support of all parties that
commented on the issue in the record, we require all voice service
providers to certify that their traffic is either ``signed with STIR/
SHAKEN or . . . subject to a robocall mitigation program'' that
includes ``tak[ing] reasonable steps to avoid originating illegal
robocall traffic,'' and committing to cooperating with the Commission,
law enforcement, and the industry traceback consortium in investigating
and stopping any illegal robocallers that it learns are using its
service to originate calls. For those voice service providers that
certify that some or all of their traffic is ``subject to a robocall
mitigation program,'' we require such voice service providers to detail
in their certifications the specific ``reasonable steps'' that they
have taken ``to avoid originating illegal robocall traffic.'' This
requirement will promote transparency and accountability in light of
our non-prescriptive approach to the robocall mitigation program
requirements. While only voice service providers with an extension will
be obligated to implement a robocall mitigation program, we impose the
certification requirement on all voice service providers because doing
so will help us and others to hold all voice service providers
accountable for the voice traffic they originate, and give us and
others a snapshot of the progress of STIR/SHAKEN implementation and the
variety of robocall mitigation practices adopted by voice service
providers.
83. Voice service providers must file certifications via a portal
on the Commission's website that we will establish for this purpose. We
will also establish a publicly accessible database in which we will
list such certifications. Establishing a database will aid in
monitoring compliance with our robocall mitigation requirement and
facilitate enforcement action should such action be necessary. We
direct the Bureau to establish this portal and database, provide
appropriate filing instructions and training materials, and release a
Public Notice when voice service providers may begin filing
certifications. We direct the Bureau to release this Public Notice no
earlier than March 30, 2021, and to establish a deadline for the filing
of certifications no earlier than June 30, 2021. Verizon argues that we
``need not wait until 2021 to establish a registry with a certification
requirement and issue rules imposing robocall mitigation obligations on
all traffic originated by any service provider.'' We disagree and
instead find it appropriate to harmonize this requirement--which is
tied by statute to receiving an extension from the STIR/SHAKEN
implementation mandate--to the date the STIR/SHAKEN mandate goes into
effect. However, we agree with Verizon that ``consumers should get the
benefits of the registration framework and the robocall mitigation
rules this year,'' and encourage providers to take efforts toward
robocall mitigation as soon as possible. We also direct the Bureau to
issue guidance and a protective order regarding the treatment of any
confidential and highly confidential information included in
certifications. We do so to protect voice service providers that are
worried that public disclosure of their robocall mitigation programs
may give bad actors the information they need to undermine their
programs, or necessitate disclosure of competitively sensitive
information. If we find that a certification is deficient in some way,
such as if the certification describes a robocall mitigation program
that is ineffective, or if we find that a provider nonetheless
knowingly or negligently originates illegal robocall campaigns, we may
take enforcement action as appropriate. Enforcement actions may
include, among others, removing a defective certification from the
database after providing notice to the voice service provider and an
opportunity to cure the filing, or requiring the voice service provider
to submit to more specific robocall mitigation requirements, and/or
imposition of a forfeiture.
84. We also require voice service providers filing certifications
to provide the following identification information in the portal on
the Commission's website:
(1) The voice service provider's business name(s) and primary
address;
(2) other business names in use by the voice service provider;
(3) all business names previously used by the voice service
provider;
(4) whether a voice service provider is a foreign voice service
provider; and
(5) the name, title, department, business address, telephone
number, and email address of a central point of contact within the
company responsible for addressing robocall-mitigation-related issues.
[[Page 73377]]
85. This information will be made publicly available in the
database, and reporting such information presents a minimal burden on
voice service providers. We find that requiring a voice service
provider to report contact information for the person responsible for
addressing robocall-mitigation-related issues will facilitate inter-
provider cooperation and enforcement actions should issues arise. We
also require voice service providers to submit to the Commission via
the appropriate portal any necessary updates to the information they
filed in the certification process within 10 business days. This
requirement will ensure that we and all voice service providers have
up-to-date data without overburdening voice service providers with
unnecessary filings.
86. Obligations on Intermediate Providers and Terminating Voice
Service Providers. As suggested by multiple commenters, we prohibit
intermediate providers and terminating voice service providers from
accepting voice traffic directly from any voice service provider that
does not appear in the database, including a foreign voice service
provider that uses NANP resources that pertain to the United States to
send voice traffic to residential or business subscribers in the United
States. ZipDX suggests that we prohibit intermediate providers and
terminating voice service providers from accepting voice traffic from
foreign voice service providers using U.S. numbers unless the foreign
voice service provider is listed in the robocall mitigation database
and the domestic provider can provide an A-level attestation for the
call. We decline to take this approach at this time as industry has not
yet coalesced around an approach to A-level attestations for foreign-
originated calls. Effective 90 days after the deadline for robocall
mitigation program certifications set forth in the Bureau Public Notice
establishing the robocall mitigation database and portal, intermediate
providers and terminating voice service providers are subject to this
prohibition. The record reflects support for this requirement.
87. We agree with Verizon that, ``by prohibiting downstream service
providers from accepting traffic from providers that are not in [the
database], the Commission can deny a service provider access to the
regulated U.S. voice network if it determines that the service
provider's STIR/SHAKEN or robocall mitigation practices are
inadequate.'' In this way, we can police the voice traffic that voice
service providers originate by removing or restoring a voice service
provider's listing on the database, after providing notice of any
certification defects and providing an opportunity to cure.
Furthermore, as voice service providers monitor the database to ensure
they remain compliant with our rules, they must necessarily review the
listings of voice service providers with which they interconnect to
ensure that such certifications are sufficient. In so doing, industry
continually reviews itself to ensure compliance with our rules,
amplifying the effectiveness of our own review. This rule will further
encourage all voice service providers to implement meaningful and
effective robocall mitigation programs on their networks during the
period of extension from the STIR/SHAKEN mandate. In turn, this rule
will help prevent illegal robocall traffic from reaching terminating
voice service providers and their subscribers. To ease compliance with
this obligation, we will import all listings from the Intermediate
Provider Registry into the Robocall Mitigation Database on a rolling
basis so that all registered intermediate providers are represented
therein. Because intermediate providers that do not originate any
traffic are not subject to our certification requirements, they would
not otherwise be listed in the database. By affirmatively adding such
providers we give intermediate and terminating voice service providers
confidence that any provider not listed in the Robocall Mitigation
Database is out of compliance with our rules, rather than leaving the
potential for uncertainty about whether a provider is noncompliant or
simply was not required to be included in the database because it does
not originate traffic. A provider that serves as both an intermediate
provider and originating voice service provider must file a
certification with respect to the traffic for which it serves as an
originating voice service provider, even if its listing has been
imported from the Intermediate Provider Registry.
88. NTCA and ACA argue that we should require intermediate
providers and terminating voice service providers to give notice to an
originating voice service provider whose traffic they will block
because it is not listed in the robocall mitigation database. NTCA
argues that this will ``enable legitimate providers to cure honest
mistakes on their part or `glitches' in the database.'' We decline to
adopt this suggestion as we find that the framework we adopt provides
adequate notice to voice service providers of the need to file
sufficient certifications, including a 90-day period between the
deadline for certifications and the prohibition on intermediate and
terminating voice service providers accepting traffic from originating
voice service providers not in the database. Second, adopting this
suggestion would place potentially costly obligations on compliant
intermediate providers and terminating voice service providers to
provide adequate notice to noncompliant originating voice service
providers. Such compliant providers may be unable to provide notice for
lack of having or being able to obtain a noncompliant provider's
contact information--opening themselves up to potential enforcement
action for lack of compliance. Lastly, we will give notice and an
opportunity to cure to voice service providers whose certifications are
deficient before we take enforcement action such as de-listing the
provider from the database.
89. We decline to adopt to USTelecom's proposal that we require
intermediate providers to file a certification to their compliance with
this rule. We see no clear need to impose a burdensome belt-and-
suspenders paperwork requirement on providers that are already subject
to this obligation by rule. We similarly decline ZipDX's proposal that
intermediate providers must ``[i]mplement[] a Robocall Mitigation
Program applicable to calls [they do] not authenticate.'' This includes
intermediate providers acting as domestic gateway providers for
foreign-originated calls. Pursuant to the TRACED Act, robocall
mitigation is meant to stem the origination of illegal robocalls, and
ZipDX does not explain specifically how an intermediate provider could
itself prevent the origination of illegal robocalls. We find the rule
we establish--whereby intermediate providers are prohibited from
accepting traffic from an originating voice service provider that has
not certified to a robocall mitigation program--best leverages the role
of intermediate providers to combat illegal robocalls within our
greater robocall mitigation scheme.
90. Foreign Voice Service Providers. In the First Caller ID
Authentication Report and Order and FNPRM, we sought comment on
mechanisms to combat robocalls originating abroad. The record contains
several comments expressing support for combating robocalls originating
abroad by requiring foreign voice service providers that wish to appear
in the database to follow the same requirements as domestic voice
service providers, and we do so in this document. Thus, foreign voice
service providers that use NANP numbers that pertain to the United
States to send voice traffic to
[[Page 73378]]
residential and business subscribers in the United States must follow
the same certification requirements as domestic voice service providers
in order to be listed in the database. Because we prohibit domestic
intermediate providers and terminating voice service providers from
accepting traffic from foreign voice service providers that use NANP
numbers that pertain to the United States and are not listed in the
database, we create a strong incentive for such foreign voice service
providers to file certifications. We note for the sake of clarity,
however, that we do not require foreign voice service providers to file
a certification; though intermediate providers and terminating voice
service providers are prohibited from accepting traffic from foreign
voice service providers who do not appear in the robocall mitigation
database.
91. We find that this result will encourage foreign service
providers to choose to institute robocall mitigation programs and file
certifications to be listed in the database and thus have their traffic
be accepted by domestic intermediate and terminating voice service
providers. The measures we adopt in this document will also enable
foreign voice service providers to continue using U.S. telephone
numbers to send voice traffic to U.S. subscribers under the same
certification procedures that will apply to U.S. voice service
providers and thereby help prevent the fraudulent exploitation of NANP
resources and reduce the volume of illegal voice traffic entering the
United States. Ensuring that foreign voice service providers using U.S.
telephone numbers comply with the certification requirements prior to
being listed in the database is especially important in light of the
prevalence of foreign-originated illegal robocalls aimed at U.S.
consumers and the difficulty in eliminating such calls.
92. We find persuasive the argument by ZipDX that the definition in
the initially circulated and publicly released draft Order, which
defined ``foreign voice service provider'' as ``any entity that is
authorized within a foreign country to provide international voice
service,'' was unduly narrow and excluded non-U.S. providers that do
not possess any authorization to provide service from being able to
file certifications and be listed in the database. In response, we
revise our rules to establish that an entity is a ``foreign voice
service provider'' if such entity has the ability to originate voice
service that terminates in a point outside a foreign country or
terminate voice service that originates from points outside that
foreign country. Specifically, we define ``foreign voice service
provider'' to mean ``any entity providing voice service outside the
United States that has the ability to originate voice service that
terminates in a point outside that foreign country or terminate voice
service that originates from points outside that foreign country.'' We
find that this approach captures voice traffic originating from a
broader range of foreign voice service providers than the one that
initially appeared in the draft.
93. Under the rules we adopt, foreign voice service providers that
use U.S. telephone numbers to send voice traffic to U.S. subscribers
must file the same certification as U.S. voice service providers in
order to be listed in the database. Specifically, to be listed in the
database, these providers must certify either that they have
implemented STIR/SHAKEN or comply with the robocall mitigation program
requirements outlined above by ``tak[ing] reasonable steps to avoid
originating illegal robocall traffic'' and committing to cooperating
with the Commission, U.S. law enforcement, and the industry traceback
consortium in investigating and stopping any illegal robocallers that
it learns are using its service to originate calls. If we find that a
voice service provider's certification is deficient or the provider
fails to meet the standards of its certification, we will pursue
enforcement including de-listing the provider from the database. We
further note that, as discussed above, we require voice service
providers--including foreign voice service providers that wish to be
listed in the database--to submit to the Commission any necessary
updates regarding any of the information they filed in the
certification process within 10 business days.
94. Although USTelecom, following circulation and public release of
a draft of this Order, has changed its position and now suggests
seeking further comment on this approach, we nevertheless take action
in this document given the crucial and urgent importance of protecting
Americans from illegal and fraudulent foreign-originated robocalls.
USTelecom, along with CTIA, suggest that our action in this document
could result in unforeseen technical issues, or the blocking of
legitimate calls. ZipDX disagrees with this suggestion, arguing that
any impact that could arise would be minimal and could be promptly
resolved. As our rules related to foreign-originated voice traffic that
we take in this document will not begin to affect such voice traffic
until June 2021, we are optimistic that voice service providers will
have time to resolve any identified issues before the deadline. Should
voice service providers identify concrete evidence of technical
problems or likely blocking of legitimate calls, we encourage them to
provide us such information so that we can consider whether to make any
modifications to this rule.
5. Alternative Methodologies During an Extension
95. The TRACED Act directs us to ``identify, in consultation with
small providers of voice service, and those in rural areas, alternative
effective methodologies to protect consumers from unauthenticated calls
during any'' extension from compliance with our STIR/SHAKEN
implementation mandate. The TRACED Act does not specify that voice
service providers may substitute such methods for the robocall
mitigation program that it requires, and we read the TRACED Act as
merely calling for us to identify additional options for voice service
providers subject to extension that wish to better serve their
customers and the public by going above and beyond their legal
obligations. Given that caller ID authentication frameworks are not yet
ubiquitous--and thus most calls that transit U.S. voice networks are
unauthenticated--we understand Congress's concern in this provision to
be about protecting consumers from unauthenticated, illegally spoofed
robocalls. We therefore interpret a methodology to be ``effective'' if
it is likely to substantially reduce the volume of illegal robocalls
reaching subscribers. In our Third Call Blocking Report and Order, we
adopted a safe harbor in our call blocking rules for voice service
providers that use reasonable analytics that include caller ID
authentication information to inform their call blocking services. We
find that these types of call blocking services would likely reduce the
volume of unauthenticated illegal robocalls reaching subscribers, and
thus include them in this definition. We find that this definition
tracks the overall purpose of the TRACED Act which is ``to reduce
illegal and unwanted robocalls'' through various mechanisms. We sought
comment in the First Caller ID Authentication Report and Order and
FNPRM from small and rural voice service providers on such alternative
effective methodologies. The record we received in response
demonstrates that such alternative methodologies either already exist
or are in development. To fulfill this obligation, we identify the
following alternative effective methodologies recommended by small
[[Page 73379]]
and rural voice service providers, as well as other commenters:
Innovative Systems reports that its landline call blocking
service is ``fully developed and currently installed at 207 landline
providers'' and, in the last nine years, ``has challenged over 19
million suspected spam calls and blocked another 12 million calls that
were from phone numbers off the FCC's weekly robocall and telemarketing
consumer complaint data reports.'' It states that ``greater consumer
protection can be achieved by having this alternative methodology
installed on all landlines using an opt-out strategy at no cost, versus
a purchase to opt-in by the customer.''
Neustar reports that its robocall mitigation service
``helps voice service providers block calls from illegal robocallers
and helps end users identify robocalls . . . . [b]y combining
authoritative data . . . with behavior insights.''
Transaction Network Services reports that ``[c]all
analytics have proven successful in identifying a large number of the
problematic calls being transmitted today. . . . Reasonable call
analytics are widely available from multiple vendors, many of which
offer low-investment services that can be deployed in smaller networks
at a reasonable cost.''
96. Additionally, the recent call blocking report released by the
Consumer and Governmental Affairs Bureau identified various available
effective methodologies for protecting subscribers from illegal calls,
a sample of which is reproduced below:
----------------------------------------------------------------------------------------------------------------
Blocking/labeling Estimate on number of calls Default, opt-in, or
Business name services offered blocked or labeled opt-out
----------------------------------------------------------------------------------------------------------------
AT&T--Wireless..................... Network-level blocking Call Protect and Call Network-level blocking
Call Protect or Call Protect Plus, since 2016, is default.
Protect Basic, free.. blocked fraudulent calls Call Protect is opt-
Call Protect Plus..... or labeled suspicious out, since 2019.
calls; nearly 1.3 billion Call Protect Plus is
suspected fraud and over 3 opt-in.
billion other calls
blocked or labeled.
AT&T--VoIP......................... Network-level blocking Blocked over 46 million and Network-level blocking
Digital Phone Call spam warnings for 36 is default.
Protect, free.. million. Digital Phone Call
Protect is opt-in.
Call Control (third-party analytics Software-based call Blocked over one billion N/A.
company). blocking. calls.
Comcast--Wireline.................. Network-level blocking Over 158 million calls Network-level blocking
Anonymous Call blocked in Dec. 2019. is default.
Rejection, Selective Anonymous Call Rejection Anonymous Call
Call Rejection, free.. blocked nearly 37 million Rejection is opt-in,
Customers can sign up calls in Dec. 2019. but will be offered
for Nomorobo blocking Selective Call Rejection opt-out; Selective
service, free.. blocked over five million Call Rejection is opt-
calls in Dec. 2019. in.
Nomorobo is opt-in.
Cox................................ Edge Blocking, free... 14.6% of calls are blocked Edge Blocking is opt-
Anonymous Call through one of these out.
Rejection, Selective tools; Edge Blocking is Anonymous Call
Call Rejection, free.. 65% of the blocked calls Rejection and
Customers can sign up and Anonymous Call Selective Call
for Nomorobo blocking Rejection is 29%t. Rejection are opt-in.
service, free..
First Orion (third-party analytics Scam ID and Scam Block Since 2017, identified over N/A.
company). 22 billion scam calls.
Hiya (third-party analytics Call blocking......... Since 2016, blocked or N/A.
company). labeled nearly 1.3 billion
suspected fraud calls and
over 3 billion other
suspect calls.
Nomorobo (third-party analytics Call blocking......... As of April 30, 2020, N/A.
company). blocked over 1.6 billion
robocalls.
T-Mobile........................... Scam ID, free......... Since 2017, identified over Scam ID is opt-out for
Scam Block, free...... 21 billion scam calls and post-paid customers.
Name ID, free for some blocked over 5 billion of Scam Block is opt-in.
plans.. those calls.
Verizon--Wireless.................. Network-level blocking Since 2017, blocked Network-level blocking
Call Filter, free..... hundreds of millions of is default.
calls. Call Filter is opt-
out.
Verizon--Wireline.................. Network-level blocking Since 2017, blocked Network-level blocking
Spam Alert, free...... hundreds of millions of is default.
VoIP customers can calls. Spam Alert is default.
sign up for Nomorobo Nomorobo is opt-in.
blocking service,
free..
----------------------------------------------------------------------------------------------------------------
6. Legal Authority
97. The TRACED Act expressly directs us to grant extensions for
compliance with the STIR/SHAKEN implementation mandate, require any
voice service provider subject to such an extension to implement a
robocall mitigation program to prevent unlawful robocalls from
originating on its network, and place unique obligations on providers
that receive an extension due to material reliance on non-IP network
technology. The TRACED Act
[[Page 73380]]
thus provides a clear source of authority for the rules we adopt in
this document.
98. We conclude that section 251(e) of the Act provides additional,
independent authority to adopt the extensions and associated
requirements. That section gives us exclusive jurisdiction over
numbering policy and enables us to act flexibly and expeditiously with
regard to important numbering matters. When bad actors unlawfully
falsify or spoof the caller ID that appears on a subscriber's phone,
they are using numbering resources to advance an illegal scheme. The
extensions and associated requirements will help to prevent the
fraudulent exploitation of NANP resources by permitting those providers
and their subscribers to identify when caller ID information has been
spoofed.
99. We conclude that section 251(e) gives us authority to prohibit
intermediate providers and voice service providers from accepting
traffic from both domestic and foreign voice service providers that do
not appear in our newly established database. We emphasize that the
rule we adopt in this document does not constitute the exercise of
jurisdiction over foreign voice service providers. We acknowledge that
this rule will have an indirect effect on foreign voice service
providers by incentivizing them to certify to be listed in the
database. An indirect effect on foreign voice service providers,
however, ``does not militate against the validity of rules that only
operate directly on voice service providers within the United States.''
As we concluded in the First Caller ID Authentication Report and Order,
our exclusive jurisdiction over numbering policy provides authority to
take action to prevent the fraudulent abuse of NANP resources.
Illegally spoofed calls exploit numbering resources whenever they
transit any portion of the voice network--including the networks of
intermediate providers. Our action preventing such calls from entering
an intermediate provider's or terminating voice service provider's
network is designed to protect consumers from illegally spoofed calls,
even while STIR/SHAKEN is not yet ubiquitous. Verizon agrees that
section 251(e) gives us ample authority to ensure foreign VoIP
providers ``submit to the proposed registration and certification
regime by prohibiting regulated U.S. carriers from accepting their
traffic if they do not.''
100. We additionally find authority in the Truth in Caller ID Act.
We find that the rules we adopt in this document are necessary to
enable voice service providers to help prevent these unlawful acts and
to protect voice service subscribers from scammers and bad actors, and
that section 227(e) provides additional independent authority for the
rules we adopt in this document.
D. Voluntary STIR/SHAKEN Implementation Exemption
101. While the TRACED Act directs us to require each voice service
provider to implement STIR/SHAKEN in its IP network, section 4(b)(2) of
the TRACED Act frees a voice service provider from this requirement if
we determine, by December 30, 2020, that ``such provider of voice
service'': (A) ``in [IP] networks''--(i) ``has adopted the STIR/SHAKEN
authentication framework for calls on the [IP] networks of the provider
of voice service; (ii) has agreed voluntarily to participate with other
providers of voice service in the STIR/SHAKEN authentication framework;
(iii) has begun to implement the STIR/SHAKEN authentication framework;
and (iv) will be capable of fully implementing the STIR/SHAKEN
authentication framework'' not later than June 30, 2021; and (B) ``in
non-[IP] networks''--(i) ``has taken reasonable measures to implement
an effective call authentication framework; and (ii) will be capable of
fully implementing an effective call authentication framework'' not
later than June 30, 2021.
102. Below, we read section 4(b)(2) of the TRACED Act as creating
two exemptions: one for IP calls and one for non-IP calls. To ensure
that the exemption only applies where warranted and to provide parties
with adequate guidance, we expand on each of the prongs that a voice
service provider must meet to obtain an exemption, and adopt rules
accordingly. We find that the best way to implement the TRACED Act's
exemption provision in a timely manner is via a certification process
and thus adopt rules requiring that a voice service provider that
wishes to receive an exemption submit a certification that it meets the
criteria for the exemptions that we have established pursuant to
section 4(b)(2)(A), section 4(b)(2)(B), or both. To guard against the
risk of gaps and improper claims of the exemption, we require voice
service providers that receive an exemption to file a second
certification after June 30, 2021, stating whether they, in fact,
achieved the implementation goal to which they previously committed in
their initial certification. Last, we find that the TRACED Act's
exemption provision does not extend to intermediate providers. We adopt
these rules pursuant to the authority expressly granted us by section
4(b)(2) of the TRACED Act.
1. Relationship of IP Networks and Non-IP Networks Provisions
103. As proposed in the Further Notice of Proposed Rulemaking, we
read section 4(b)(2) of the TRACED Act as creating two exemptions: One
for IP calls and one for non-IP calls. Thus, a voice service provider
may seek the exemption for its ``IP networks'' if it meets all four
criteria for all calls it originates or terminates in SIP, and a voice
service provider may seek the exemption for its ``non-IP networks'' if
it meets both the criteria for all non-SIP calls it originates or
terminates. This approach is consistent with the views of the
commenters that touched upon this issue in the record.
104. We find that this reading best implements Congress's policy
and is consistent with principles of statutory construction when
considering the statute as a whole. As AT&T observes, the structure of
the TRACED Act ``recognizes that implementation of a caller ID
authentication framework will differ for IP networks and non-IP
networks.'' Given the presence of the word ``and'' between the IP and
non-IP networks criteria, we recognize that the exemption could
potentially be read as applying only if the voice service provider
meets both the IP and non-IP networks criteria. Yet such a reading
would render the exemption an empty set or nearly so because of the
absence of an effective solution for non-IP caller ID authentication at
present, such that few, if any, voice service providers will be able to
claim that they will be capable of ``fully implementing'' an effective
non-IP caller ID authentication framework by June 30, 2021. Our reading
cabins the nullity risk more narrowly, thus better effectuating
Congress's goal of creating a meaningful exemption.
105. Our approach also further encourages prompt deployment of
STIR/SHAKEN. We understand the statutory exemption to both encourage
and reward early progress in deployment. Therefore, by giving voice
service providers a path to exemption solely for their IP networks--the
only types of networks on which STIR/SHAKEN can effectively operate--
our approach will effectuate Congress's intent to encourage faster
progress in STIR/SHAKEN deployment. And by separating IP and non-IP
calls in this way, we align our exemption process with the call-by-call
vision of a caller ID authentication implementation mandate that
subjects different parts of a voice service provider's network to
different requirements.
[[Page 73381]]
2. Threshold for IP Networks Exemption
106. To ensure that the exemption only applies where warranted and
to provide parties with adequate guidance, we expand on each of the
four substantive prongs laid out in the TRACED Act that a voice service
provider must meet to obtain an exemption.
107. Prong (i)--Adoption of STIR/SHAKEN. In the Further Notice of
Proposed Rulemaking, we proposed to interpret the phrase ``has adopted
the STIR/SHAKEN authentication framework for calls on the [IP] networks
of the provider of voice service'' in prong (A)(i) to mean that the
voice service provider has publicly committed, via a certification, to
complete implementation of STIR/SHAKEN by June 30, 2021. In light of
the comments in the record, we modify this proposal to require that the
voice service provider has completed the network preparations necessary
to deploy the STIR/SHAKEN protocols on its network, including, but not
limited to, by participating in test beds and lab testing, or
completing commensurate network adjustments to enable the
authentication and validation of calls on its network consistent with
the STIR/SHAKEN framework.
108. We agree with commenters that focusing on network preparations
will provide significant concrete evidence that a voice service
provider is taking the necessary steps in its STIR/SHAKEN
implementation, and will thus offer confirmation that a provider has
adopted the STIR/SHAKEN authentication framework. We further agree with
AT&T that our original certification-based proposal would not provide
specific measurable criteria by which to assess a provider's progress.
Simply issuing a commitment will not do as much to ensure that voice
service providers are actually doing so as will an obligation to
undertake the network preparations necessary to operationalize the
STIR/SHAKEN protocols on their networks. Taking the necessary first
steps to participate in STIR/SHAKEN more affirmatively demonstrates a
voice service provider's commitment and preparedness to implement an
effective caller ID authentication framework than a general declaration
of intent that may or may not be accompanied by concrete steps. We
disagree with T-Mobile's unsupported contention that our previous
proposal would be preferable. While a public commitment to complete
implementation of STIR/SHAKEN by June 30, 2021 would be a welcome
initial step, we conclude that the better approach is to require voice
service providers to undertake the preparations necessary to implement
this framework, rather than merely issuing a pledge to do so.
109. Prong (ii)--Participation with Other Providers. In the Further
Notice of Proposed Rulemaking, we proposed to read the phrase ``has
agreed voluntarily to participate with other providers of voice service
in the STIR/SHAKEN authentication framework'' in prong (A)(ii) to
require that the voice service provider has written, signed agreements
with at least two other voice service providers to exchange calls with
authenticated caller ID information. After reviewing the record, we
revise this proposal to require that the voice service provider has
demonstrated its voluntary agreement to participate with other voice
service providers in the STIR/SHAKEN framework by completing formal
registration (including payment) and testing with the Policy
Administrator.
110. We agree with commenters that such an action would signal both
a public and financial commitment to working with other voice service
providers sufficient to confirm a provider's coordination efforts.
Registering with the Policy Administrator is a necessary predicate to
participation with other voice service providers in the STIR/SHAKEN
framework, and was formulated by the industry to allow the exchange of
authenticated traffic without requiring dedicated agreements between
voice service providers. Completing formal registration and testing
with the Policy Administrator thus signals both a voice service
provider's technical readiness and willingness to participate with
other providers in the STIR/SHAKEN framework. We further agree with
AT&T, CTIA, and CCA that our initial proposal ignores certain market
realities by assuming that every provider of voice services will
require multiple agreements to exchange traffic destined to every point
on the PSTN. Given that some voice service providers may not require
two or more interconnection arrangements, let alone multiple agreements
with other providers, to exchange their IP-based traffic, imposing a
two-agreement requirement to demonstrate voluntary participation in the
STIR/SHAKEN framework would be arbitrary and might even inject
artificial inefficiencies into such arrangements. Our revised
interpretation of prong (A)(ii) more closely aligns with the language
and intended purpose of the statute, and better encourages STIR/SHAKEN
implementation without introducing potential inefficiencies. Exchanging
traffic using certificates assigned through the governance system is
exactly the way STIR/SHAKEN is designed to work. Encouraging voice
service providers to complete formal registration and testing with the
Policy Administrator is thus the most appropriate and reasonable
interpretation of the requirement in prong (A)(ii).
111. Prong (iii)--Begun to Implement. As proposed in the Further
Notice of Proposed Rulemaking, we implement the phrase ``has begun to
implement the STIR/SHAKEN authentication framework'' in prong (A)(iii)
by requiring that the voice service provider has completed the
necessary network upgrades to at least one network element (e.g., a
single switch or session border controller) to enable the
authentication and verification of caller ID information consistent
with the STIR/SHAKEN standards. This interpretation requires a voice
service provider to make meaningful progress on implementation by the
time of certification, while taking into account that voice service
providers will have limited time between adoption of this Order and the
December 30, 2020 deadline for exemption determinations. While CCA
argues that our approach is unachievable and overly prescriptive, we
disagree. To the contrary, our approach accounts for the abbreviated
timeframe by giving voice service providers the flexibility to choose
to complete upgrades on the network element which they can upgrade most
efficiently.
112. In this case, we find USTelecom's suggestion that we require
voice service providers to establish the capability to authenticate
originated traffic and/or validate such traffic terminating on their
networks to be excessively vague, and it is unclear how little or how
much voice service providers would be required to do under such a rule.
Depending on the voice service provider, simply ``establishing'' the
capability to authenticate originated traffic and/or validate such
traffic terminating on their networks could consist of fully
implementing this capability or merely attaining this capability
without actually deploying it in one's network. To the extent that
USTelecom--which does not provide a rationale for its proposal--is
concerned that the standard we adopt will be too easily met, we are
confident that the opportunity to verify implementation of an effective
authentication framework will help identify any voice service providers
that fail to meet their STIR/
[[Page 73382]]
SHAKEN implementation commitments.
113. Prong (iv)--Capable of Fully Implementing. Last, and as
proposed in the Further Notice of Proposed Rulemaking, we implement the
obligation to ``be capable of fully implementing the STIR/SHAKEN
authentication framework'' not later than June 30, 2021, in prong
(A)(iv) so as to require that the voice service provider reasonably
foresees that it will have completed all necessary network upgrades to
its network infrastructure to be able to authenticate and verify caller
ID information for all SIP calls exchanged with STIR/SHAKEN-enabled
partners by June 30, 2021. After considering the arguments in the
record, we agree with T-Mobile that our proposal is preferable to
USTelecom's narrower alternative of requiring a certification that all
consumer VoIP and VoLTE traffic originating or terminating on a voice
service provider's network either is or will be capable of
authentication and validation by June 30, 2021. This requirement falls
short of our implementation mandate, which requires that all calls be
subject to caller ID authentication and verification--not just consumer
VoIP and VoLTE traffic--except for those subject to the narrow and
time-limited extensions we adopt in this document. To grant an
exemption for voice service providers that will be capable of anything
short of full compliance would indefinitely leave out calls the TRACED
Act and our rules thereunder require to be subject to caller ID
authentication. Such an approach also is inconsistent with the statute,
which requires ``full[] implementation[]'' by June 30, 2021, so it is
appropriate for us to demand that a provider reasonably foresee that it
will meet that standard, rather than set a bar that is more easily
cleared at the twelve-month mark but that heightens the risk of a voice
service provider ultimately falling short just six months later. While
we understand AT&T's point that voice service providers with more
complex, diverse networks will necessarily have more complicated and
costly STIR/SHAKEN implementation requirements, we do not think that
our proposal is ``overly rigid'' or ``ambiguous.'' Nor do we agree with
CCA that it is ``overly prescriptive.'' Rather, we institute a clear
requirement that voice service providers ``reasonably foresee'' that
they will be able to meet the standard Congress established by the
deadline that Congress established. This interpretation gives as much
latitude to voice service providers as possible to achieve the desired
benchmarks while still requiring some basis for the claim that a
provider is ``capable of fully implementing the STIR/SHAKEN
authentication framework.''
3. Threshold for Non-IP Networks Exemption
114. Under the TRACED Act, a voice service provider is excused from
the requirement to take reasonable measures to implement an effective
caller ID authentication framework in the non-IP portions of its
network if the Commission finds that it: (1) Has taken reasonable
measures to implement an effective caller ID authentication framework
in the non-IP portions of its network; and (2) will be capable of fully
implementing an effective caller ID authentication framework in the
non-IP portions of its network not later than June 30, 2021. While we
anticipate that in the non-IP context few if any voice service
providers will seek to take advantage of this exemption because of the
difficulties in ``fully implementing an effective caller ID
authentication framework'' by June 30, 2021, we nevertheless adopt
standards for determining whether a voice service provider has met both
requirements necessary to receive an exemption under section 4(b)(2)(B)
of the TRACED Act for the non-IP portions of its network, as required
by the TRACED Act.
115. In the Further Notice of Proposed Rulemaking, we sought
comment on section 4(b)(2)(B) and whether there was an ``acceptable
interpretation of the `fully implementing' prong that would make it
more achievable for voice service providers to qualify for the
exemption.'' We further sought comment on what constitutes an
``effective'' call authentication framework and ``reasonable measures''
for purposes of this section. We now find that a voice service provider
satisfies the first prong--requiring reasonable measures to implement
an effective caller ID authentication framework--if it can certify that
it is working to develop a non-IP authentication solution. Because the
statutory language is similar to that used to establish the non-IP
mandate, we find it appropriate to harmonize our interpretation of
these two provisions. Section 4(b)(1)(B) of the TRACED Act requires a
voice service provider ``to take reasonable measures to implement an
effective call authentication framework'' in the non-IP portions of its
networks, while section 4(b)(2)(B)(i) requires that a voice service
provider ``has taken reasonable measures to implement an effective call
authentication framework'' in the non-IP portions of its network. While
we recognize the difference in tenses between the two provisions--one
refers to taking reasonable measures, while the other states that such
measures must have already been taken--the remaining language is
identical. Thus, we find that the two provisions are similar enough to
implement the same standard in order to quantify what constitutes
``reasonable measures'' in both instances. Further, adopting a uniform
approach allows us to avoid creating unnecessarily burdensome
overlapping, but distinct, requirements. While we harmonize these
provisions, we do not include the first method of compliance with our
non-IP mandate, which a provider satisfies by completely upgrading its
non-IP networks to IP and implementing the STIR/SHAKEN authentication
framework. A provider that has completely upgraded its non-IP networks
to IP would be subject to the exemption for IP networks, rather than
the exemption for non-IP networks, and would be required to satisfy the
requirements laid out for that exemption.
116. AT&T supports a proposal to require providers to participate
in either standards development for a TDM call authentication framework
or implement a robust robocall mitigation program as two options for
satisfying the ``reasonable measures'' prong of this section. We agree
as to the former suggestion, but we find the latter suggestion unduly
overlaps with the distinct robocall mitigation program requirement
under the statute.
117. We implement the provision in section 4(b)(2)(B)(ii) of the
TRACED Act that voice service providers be ``capable of fully
implementing an effective caller ID authentication framework in the
non-IP portions of their networks not later than [June 30, 2021]'' by
requiring that the voice service provider reasonably foresees that it
will have completed all necessary network upgrades to its
infrastructure to be able to authenticate and verify caller ID
information for all non-IP calls originating or terminating on its
network as provided by a standardized caller ID authentication
framework for non-IP networks. This approach is consistent with our
approach to the fourth prong of the IP network exemption, in which we
construe ``fully implementing'' to mean that caller ID information is
able to be authenticated and verified for all calls exchanged with
technically-able partners. Further, it is consistent with our
evaluation of when a non-IP caller ID authentication framework is
``reasonably available,'' and we consistently consider such a framework
[[Page 73383]]
to be ``effective'' only when it is standardized. We find that this
approach gives as much latitude to voice service providers as possible
to achieve the desired result within the prescribed timeframe while
again requiring some basis for the claim--here, that the provider be
``capable of fully implementing an effective caller ID authentication
framework.''
4. Compliance Certifications
118. As proposed in the Further Notice of Proposed Rulemaking, we
find that the best way to implement the TRACED Act's exemption
provision is via a certification process. Specifically, we require a
voice service provider that seeks to receive an exemption to submit a
certification that it meets the criteria for the IP networks exemption
that we have established pursuant to section 4(b)(2)(A), the criteria
for the non-IP networks exemption that we have established pursuant to
section 4(b)(2)(B), or both, as appropriate for its network(s). Given
the inherent and obvious difficulty of making individualized
determinations of whether providers qualify for the IP networks
exemption on such a truncated timeframe, we find that a certification
process is necessary to allow us to meet Congress's deadline for
completion of exemption determinations by December 30, 2020. This
approach is unopposed, and both T-Mobile and AT&T support the use of a
certification process ``as the appropriate vehicle for a voice service
provider to assert its qualification for either or both of the
statutory exemptions.''
119. Each voice service provider that seeks to qualify for either
the section 4(b)(2)(A) or the section 4(b)(2)(B) exemption, or both,
must have an officer of the voice service provider sign a compliance
certificate stating under penalty of perjury that the officer has
personal knowledge that the company meets each of the stated criteria.
Such an attestation is necessary to ensure the accuracy of the
underlying certification. We also require the voice service provider to
submit an accompanying statement explaining, in detail, how the company
meets each of the prongs of each applicable exemption so that the
Commission can verify the accuracy of the certification.
120. As proposed in the Further Notice of Proposed Rulemaking, all
certifications submitted pursuant to this requirement must be filed no
later than December 1, 2020. All certifications and supporting
statements must be filed electronically in WC Docket No. 20-68,
Exemption from Caller ID Authentication Requirements, in the
Commission's Electronic Comment Filing System (ECFS). We direct the
Bureau to provide additional directions and filing information
regarding the certifications--including issuing protective orders
governing the submission and review of confidential and highly
confidential information, where necessary--by November 9, 2020, or in
the Public Notice announcing Office of Management and Budget approval
of this process, whichever comes sooner. And we direct the Bureau to
review the certifications and accompanying documents for completeness
and to determine whether the certifying party has met the requirements
we have established. We further direct the Bureau to issue a list of
parties that have filed complete, valid compliance certifications and
that will thus receive the exemption(s) on or before December 30, 2020.
121. Because of the limited time for review of certifications, we
proposed in the Further Notice of Proposed Rulemaking that any voice
service providers that file inadequate certifications would not receive
an opportunity to cure and instead would be subject to the general duty
we established to implement STIR/SHAKEN by June 30, 2021. We adopt this
proposal here. We find this consequence to be reasonable and
appropriate because the purpose of the certification is merely to
determine which voice service providers would, in the absence of the
STIR/SHAKEN obligation, nonetheless be able to implement STIR/SHAKEN in
a timely manner. While we are sympathetic to AT&T's suggestion that we
permit voice service providers a chance to cure and revise their
certifications should they be found deficient, the extremely truncated
timeline for review of certifications prevents us from allowing such
options. Simply put, there is insufficient time to permit voice service
providers to revise and resubmit certifications that the Bureau has
deemed deficient and for the Bureau to review such resubmitted
certifications prior to the statutory December 30, 2020 deadline for
completion of exemption determinations. Voice service providers must do
their best to demonstrate in their initial certifications that they
have met all the statutory requirements necessary to qualify for an
exemption. Moreover, as stated above, we find the inability of voice
service providers to ``cure'' deficient certifications to be
insignificant given the purpose of the certification.
122. Implementation Verification. The section 4(b)(2)(A) and (B)
exemptions are, by their nature, based on a voice service provider's
prediction of its future ability to implement STIR/SHAKEN by June 30,
2021. As we explained in the Further Notice of Proposed Rulemaking, we
believe that Congress intended for us to verify, after the fact, that
voice service providers claiming the exemption completed full
implementation in accordance with their commitments. Such a review is
consistent with the TRACED Act both because the broad structure of
section 4 aims toward full implementation of caller ID authentication
and because sections 4(b)(2)(A)(iv) and 4(b)(2)(B)(ii) each state that
a voice service provider may receive the exemption only if it ``will''
be capable of ``fully'' implementing a caller ID authentication
framework (STIR/SHAKEN or ``an effective call authentication
framework,'' respectively). This approach is unopposed in the record,
and T-Mobile correctly notes that without such verification, the
voluntary exemption could be misused as a loophole by voice service
providers, thereby diminishing the ultimate effectiveness of STIR/
SHAKEN implementation, the success of which depends on the
participation of a critical mass of voice service providers. To guard
against the risk of gaps and abusive claims of the exemption, and as
proposed in the Further Notice of Proposed Rulemaking, we therefore
require voice service providers that receive an exemption to file a
second certification after June 30, 2021, stating whether they, in
fact, achieved the implementation goal to which they previously
committed.
123. As proposed in the Further Notice of Proposed Rulemaking, the
certification must be filed electronically in WC Docket No. 20-68,
Exemption from Caller ID Authentication Requirements, in ECFS subject
to the same allowance for confidentiality and requirements for sworn
signatures and detailed support as the initial certifications. This
process will not only help the Bureau to verify the accuracy of the
certification, but will assist it in conducting its review while at the
same time ensuring that any confidential or proprietary information
included by filers remains safe from disclosure. We direct the Bureau
to issue a Public Notice no later than three months after June 30,
2021, setting a specific deadline for the certifications and providing
detailed filing requirements. We direct the Bureau to seek public
comment on these certifications. Following review of the
certifications, supporting materials, and responsive
[[Page 73384]]
comments, we direct the Bureau to issue a Public Notice, no later than
four months after the date of filing of the certifications, identifying
which voice service providers achieved the implementation goal to which
they previously committed. As suggested in the record, we clarify that
voice service providers that certified in December of 2020 that they
have already fully implemented the necessary STIR/SHAKEN requirements,
and for which the Bureau accepted the certification, need not file a
second certification. This second filing is required only from those
voice service providers that have not yet ``fully implemented'' STIR/
SHAKEN by the time of their initial December 2020 certification, but
have committed to doing so by June 30, 2021.
124. We disagree with T-Mobile's assertion that there is little
value is seeking public comment on voice service providers'
certifications. While T-Mobile is correct that a review of whether a
voice service provider has conformed to the terms of its exemption
declarations and implemented STIR/SHAKEN will require a technical
analysis, we anticipate that the considered comments of market
participants, technical and trade associations, and industry
professionals can inform and enrich the Bureau's analysis of any such
technical issues. Further, allowing comments is critical to maintaining
a clear and transparent process. Moreover, to the extent that parties
must submit confidential information, the Bureau will issue protective
orders governing submission and review akin to those we have employed
in numerous other contexts. There is thus no risk that any voice
service provider will be obligated to publicly disclose ``sensitive
network information'' as part of this certification and comment
process.
125. As proposed in the Further Notice of Proposed Rulemaking, if a
voice service provider cannot certify to full implementation upon the
filing of the second certification but demonstrates to the Bureau that
(1) it filed its initial certification in good faith--i.e., with a
reasonable expectation that it would be able to achieve full
implementation as certified--and (2) made similarly good faith efforts
to complete implementation, the consequence for such a shortcoming is
the loss of the exemption and application of the general rule requiring
full STIR/SHAKEN implementation, effective immediately upon release of
the Bureau Public Notice identifying which voice service providers
achieved the implementation goal to which they previously committed. We
find that an immediate effective date is required to ensure that
certain voice service providers do not receive an extension not granted
to similarly situated voice service providers simply because they filed
a certification they later failed to meet. If the Bureau finds that a
voice service provider filed its initial certification in bad faith or
failed to take good faith steps toward implementation, we will not only
require that voice service provider to fully implement STIR/SHAKEN
immediately, but will further direct the Bureau to refer the voice
service provider to the Enforcement Bureau for possible enforcement
action based on filing a false initial certification.
5. Voice Service Providers Eligible for Exemption
126. We proposed in the Further Notice of Proposed Rulemaking to
interpret the TRACED Act's exemption process to apply only to voice
service providers and to exclude intermediate providers. We adopt that
approach here. No commenters addressed this issue in the record. In the
TRACED Act, Congress directs the Commission to require ``provider[s] of
voice service'' to implement STIR/SHAKEN in the IP portions of their
networks. The exemption provisions in section 4(b)(2) of the TRACED Act
similarly refer to ``provider[s] of voice service.'' Because the
obligation on intermediate providers to implement the STIR/SHAKEN
authentication framework is being adopted pursuant to our authority in
the Truth in Caller ID Act and section 251(e), we do not believe that
the exemption process, which is mandated under and governed by the
TRACED Act, needs to apply to such intermediate providers. We do not
find that there is a compelling policy argument in favor of extending
the TRACED Act's exemption process to intermediate providers. The
exemption process as laid out in the TRACED Act will not have long-term
benefits to providers, since even those that qualify for the exemption
must be capable of fully implementing either the STIR/SHAKEN
authentication framework or an effective call authentication framework
not later than June 30, 2021. Given this, we are disinclined to add
further administrative and regulatory complication where not required
by the TRACED Act.
E. Line Item Charges
127. We adopt our proposal in the First Caller ID Authentication
Report and Order and FNPRM to prohibit voice service providers from
imposing additional line item charges on consumer or small business
subscribers for caller ID authentication. The record reflects support
for this proposal, and we believe adopting it is a straightforward
implementation of Congress's direction and authority in the TRACED Act
to ``prohibit providers of voice service from adding any additional
line item charges to consumer or small business customer subscribers
for the effective call authentication technology.''
128. We are unconvinced by arguments opposed to the rule we adopt
in this document. MT Networks argues that we should instead
affirmatively permit voice service providers to list caller ID
authentication ``as a billable feature on their line.'' Because MT
Networks fails to explain how such an alternative course of action
would be consistent with the text of the TRACED Act, we decline to
adopt such a suggestion. Securus argues that the prohibition on line
item charges should not apply to inmate calling service providers. We
similarly decline to adopt such an exemption for these providers, as
the TRACED Act's prohibition on line item charges extends to all
``providers of voice service,'' which includes inmate calling service
providers.
129. Other commenters argue that we should go even further than the
TRACED Act and prohibit voice service providers from recouping costs of
caller ID authentication and other robocall mitigation solutions
entirely. Some commenters argue that we should also prohibit charges
for call blocking services. We decline to do so at this time because we
do not address call blocking-related issues in this Report and Order.
We decline to take such action because doing so would go beyond the
directive in the TRACED Act, and because we recognize that
implementation of caller ID authentication imposes cost on voice
service providers. Additionally, the record shows that some voice
service providers may not have enough resources simply to absorb the
cost of implementing caller ID authentication. By not prohibiting cost
recovery through alternate means, we promote the investment by all
voice service providers in caller ID authentication solutions for their
networks.
130. As proposed, we interpret ``consumer'' in this context to mean
residential mass market subscribers, and adopt a rule consistent with
this interpretation. We interpret ``consumer'' to refer to individual
subscribers because we believe this interpretation will protect
individuals from receiving line item charges on their bills. We
[[Page 73385]]
received no opposition in the record to our proposal. We also adopt our
proposal to interpret ``small business'' to refer to business entities
that meet the Small Business Administration definition of ``small
business.'' We adopt this definition of ``small business'' because it
reflects the judgment of the Small Business Administration, which has
expertise in this area. We received no opposition in the record for
this interpretation. We decline to adopt RadNet's proposal that we
prohibit voice service providers ``from charging healthcare facilities
and providers, regardless of size, for call authentication
technology,'' because the TRACED Act establishes the classes of
entities that Congress intended to protect from additional line item
charges for caller ID authentication: Consumers and small business
subscribers. Additionally, healthcare facilities that meet the standard
for ``small business'' that we establish are covered by our rule, and
so separate protection for such healthcare facilities would be
redundant. Healthcare facilities that exceed the definition of ``small
business'' are in a better position to negotiate billing arrangements
with voice service providers than small businesses and residential mass
market subscribers. Thus, providing them with the same protections
would be unnecessary.
131. We also adopt our proposal to implement this section of the
TRACED Act by prohibiting voice service providers from imposing a line
item charge for the cost of upgrading network elements that are
necessary to implement caller ID authentication, for any recurring
costs associated with the authentication and verification of calls, or
for any display of caller ID authentication information on their
subscribers' phones. Caller ID authentication solutions work by
allowing the originating voice service provider to authenticate the
caller ID information transmitted with a call it originates, and the
terminating provider to verify that the caller ID information
transmitted with a call it receives is authentic and act on the
information provided after verification. The record reflects that voice
service providers must upgrade their existing network elements to
enable caller ID authentication, and pay recurring maintenance and
other operating fees in order to actively authenticate caller ID
information. And, for caller ID authentication technology to be
meaningful for subscribers, voice service providers may choose to
display caller ID authentication information to their end users. We
find that the prohibition as adopted covers the full scope of costs
``for'' providing caller ID authentication to consumer and small
business subscribers.
132. CenturyLink argues that this is too expansive a reading of the
TRACED Act's language. Instead, CenturyLink suggests that, to be more
aligned with the language of the TRACED Act, we only prohibit line
items for costs ``related to the basic signing of calls and verifying
of Identity headers.'' We fail to see how costs associated with, for
example, network upgrades that are necessary to implement caller ID
authentication are not ``for'' such technology, and CenturyLink does
not explain why we should read ``for'' in this context so narrowly. We
also note that we do not prohibit cost recovery for such costs by
alternative means.
F. Intermediate Providers
133. To further promote effective, network-wide caller ID
authentication, we adopt the proposal from our First Caller ID
Authentication Report and Order and FNPRM to extend our STIR/SHAKEN
implementation mandate to intermediate providers. The STIR/SHAKEN
framework enables an end-to-end system for authenticating the identity
of the caller. For this system to work, the Identity header must travel
the entire length of the call path--even when a call transits the
networks of intermediate providers. Thus, intermediate providers play a
crucial role in this system. In the First Caller ID Authentication
Report and Order and FNPRM, we proposed imposing obligations on
intermediate providers for calls they receive with authenticated and
unauthenticated caller ID information. For calls with authenticated
caller ID information that an intermediate provider receives and will
exchange in SIP, we proposed requiring an intermediate provider to pass
any Identity header associated with that call, unaltered, to the
subsequent provider in the call path. And for calls an intermediate
provider receives without authenticated caller ID information that it
will exchange in SIP, we proposed requiring the intermediate provider
to authenticate that call with ``gateway'' or ``C''-level attestation
before passing it to the subsequent intermediate or voice service
provider in the call path. With modifications, we adopt both of these
proposals.
1. Authenticated Calls
134. We adopt our proposal to require intermediate providers to
pass any Identity header that they receive to the terminating voice
service provider or subsequent intermediate provider in the call path.
This means, technically, that the intermediate provider must forward
the Identity header downstream in the SIP INVITE. By placing this
requirement on intermediate providers, we ensure that SIP calls can
benefit from STIR/SHAKEN regardless of what provider transits the call.
This proposal received wide support, and no opposition, in the record.
INCOMPAS, which notes that it represents a number of entities that act
as intermediate providers, agrees that ``[t]he success of STIR/SHAKEN
ultimately depends on the broad participation of voice service
providers, including, wherever technically feasible, intermediate
providers.'' AT&T, Comcast, and Verizon also all confirm the importance
of adopting this rule. AT&T notes that ``requiring intermediate
providers to pass through Identity header information is necessary to
ensure that calls retain authentication information across the entire
call path.'' Comcast writes that ``[a]chieving truly nationwide call
authentication requires the participation of all providers involved in
transmitting voice calls, including intermediate providers.'' And
Verizon emphasizes that regulatory action is necessary to ensure
intermediate provider involvement in the system. We agree with these
assertions.
135. Additionally, we further adopt our proposal to require
intermediate providers to pass the Identity header unaltered. We find
that this requirement is necessary to prevent a downstream provider
from tampering with the Identity header and thus undermining the end-
to-end chain of trust between the originating and terminating voice
service providers. Commenters support this approach, with NCTA stating
that it is necessary to ``maintain the integrity of the authentication
information and reduce the potential for inadvertent error or
intentional manipulation,'' and Hiya noting that ``having access to
untampered identity headers will significantly aid analytics and, as a
result, the detection of illegal robocalls.'' This requirement ensures
that all SIP calls benefit from STIR/SHAKEN, increasing the
effectiveness of STIR/SHAKEN in combating illegally spoofed robocalls
and fraudulent robocall schemes. And although entities acting as
intermediate providers will face implementation costs in order to
forward unaltered Identity headers, they will not face the recurring
costs necessary to authenticate and verify caller ID information.
Moreover, we expect these one-time implementation costs to be far less
than the benefits of
[[Page 73386]]
this intermediate provider requirement because the inclusion of
intermediate providers is important to achieving the benefits discussed
in the First Caller ID Authentication Report and Order. Requiring
intermediate providers to pass the Identity headers that they receive
to the subsequent intermediate provider in the call path or the
terminating voice service provider is crucial to ensuring end-to-end
caller ID authentication and unlocking these benefits for consumers and
providers alike.
136. The record convinces us, however, to modify our proposal to
allow an intermediate provider to strip the Identity header in two
narrow circumstances: (1) For technical reasons where necessary to
complete the call, and (2) for security reasons where an intermediate
provider reasonably believes the Identity header presents a threat to
its network security. Several commenters explain that these are
legitimate reasons why an intermediate provider might need to strip the
Identity header.
137. In identifying the limited technical reasons an intermediate
provider may need to strip the Identity header, the industry standards
group ATIS explains that it may be necessary to strip an Identity
header for call completion in cases such as Government Emergency
Telecommunications Service (GETS) call processing; INCOMPAS identifies
instances where the Identity header may be too large to successfully
transit the network; and we recognize it may be necessary to strip the
Identity header before exchanging a call with a non-IP provider or at a
non-IP interconnection point. We emphasize that the technical necessity
exception is narrow and limited to circumstances that are necessary to
complete the call. The technical necessity exception does not extend to
failures or inadequacies in an intermediate provider's network. As the
technology supporting STIR/SHAKEN advances and improves, it may be
possible to transmit headers in circumstances where it previously was
not. As such, we will continue to monitor the use of this exception and
adjust its outer limits as needed. Commission staff will not hesitate
to refer reports of intermediate providers abuse of this exception to
the Enforcement Bureau.
138. Regarding the security exception, Verizon advocates that we
allow intermediate providers to act should Identity headers become ``an
attack vector used by bad actors.'' We agree and so do not prohibit an
intermediate provider from stripping the Identity header when it
reasonably believes the header presents an imminent threat to its
network security. We do not, however, permit an intermediate provider
to strip the header if it believes the Identity header has been
tampered with or is fraudulent short of presenting an imminent security
threat. This narrow exception does not empower the intermediate
provider to make determinations on behalf of other providers in the
call path or to interfere with the verification process defined in the
SHAKEN standards. Instead, our goal is to permit an intermediate
provider to act in the face of an imminent security threat to its
network. We emphasize that intermediate providers must employ this
exception sparingly, and the exception will not apply where an
intermediate provider strips Identity headers routinely instead of
maintaining reasonable network security. Furthermore, since no
commenter identified a circumstance where an intermediate provider
would need to alter the Identity header, we specify that intermediate
providers may not alter Identity headers under any circumstance.
139. Relatedly, we prohibit an originating voice service provider
from sending excessively large headers with the goal of evading STIR/
SHAKEN compliance by forcing an intermediate provider to strip the
header before exchanging the call with a subsequent downstream
provider. We would consider such conduct a violation of our rule
requiring an originating voice service provider to authenticate caller
ID information for calls it originates and exchanges with another voice
service provider or intermediate provider.
140. ACA Connects proposes that we prohibit intermediate providers
from passing a call they have received in SIP to a downstream provider
in TDM when there is a downstream IP option available. We decline to
adopt this proposal because, at this early stage, we do not wish to
interfere with call routing decisions for the sake of promoting STIR/
SHAKEN. Providers must consider a variety of factors when routing
calls, including cost and reliability, and we do not believe at this
stage that preserving STIR/SHAKEN headers should swamp all other
considerations. For the same reason, we decline to adopt USTelecom's
suggestion to require gateway providers to pass international traffic
only to downstream providers that have implemented STIR/SHAKEN.
Finally, while we do not require intermediate providers to append
duplicative Identity headers to calls that they transit, we decline to
prohibit this practice at this stage of STIR/SHAKEN deployment across
the voice network. AT&T contends that, if intermediate providers append
duplicative Identity headers, it would add additional complexity and
consume bandwidth for other providers. However, this issue received
little attention in the record and, at this time, we have no reason to
think it is a practice industry will adopt widely. We decline to be
overly prescriptive at this early stage of deployment, and we will
monitor this issue for any problems that develop.
2. Unauthenticated Calls
141. We also adopt a modified version of the proposed
authentication requirement on intermediate providers for
unauthenticated calls. Specifically, we require that an intermediate
provider authenticate the caller ID information of a call that it
receives with unauthenticated caller ID information that it will
exchange with another intermediate provider or terminating voice
service provider as a SIP call. However, a provider is relieved of this
obligation if it (i) cooperatively participates with the industry
traceback consortium and (ii) responds to all traceback requests it
receives from the Commission, law enforcement, or the industry
traceback consortium regarding calls for which it acts as an
intermediate provider. Our final requirement differs from our proposed
requirement in two ways. First, we do not require an intermediate
provider to authenticate with a C-level or gateway attestation.
Instead, if a provider chooses to authenticate the caller ID
information of an unauthenticated call that it receives, we require
only that a provider authenticate the caller ID information consistent
with industry standards. And second, our modified requirement allows
participation with the industry traceback consortium as an alternative
option for compliance.
142. In the First Caller ID Authentication Report and Order and
FNPRM, we proposed requiring intermediate providers to authenticate
caller ID information for unauthenticated traffic that they receive
with a C-level attestation, and tentatively concluded this requirement
would improve traceback efforts and analytics. Some commenters--
including major voice service providers that have reported substantial
progress in STIR/SHAKEN implementation--endorse our reasoning that such
a rule is in compliance with the industry standards, would enhance
traceback capabilities, and would benefit call analytics. Neustar
argues that intermediate providers should authenticate caller ID
[[Page 73387]]
information for calls that they transmit that lack such information
because ``it allows the terminating voice service provider to more
easily traceback otherwise unauthenticated calls, and provides
additional information that can be used to facilitate innovation in the
robocall analytics space.'' And T-Mobile explains that intermediate
provider authentication would be useful to terminating voice service
providers because ``[h]aving some information regarding this large
subset of calls to enable traceback and strengthen analytics is
preferable to having no information on which to make blocking and
labeling decisions.'' T-Mobile further explains that even ``C-attested
calls all contain an origination ID (`origid')'' which is ``a globally
unique identifier that represents the originating point of the call,
such as the telephone switch where the call started, or a trunk group,
which can be useful in tracing back the origin of a call.'' And T-
Mobile notes that ``[w]hile USTelecom's Industry Traceback Group
(`ITG') can do its work without relying on origid, this does not
obviate the need for origid, which would further advance ITG's goals.''
143. We modify our proposal to require attestation consistent with
industry standards rather than specifically requiring C-level
attestation because this approach better aligns with our goal of
promoting implementation of the industry-defined caller ID
authentication standards rather than interfering with their technical
application. This modification brings our intermediate provider rules
in line with the STIR/SHAKEN obligations we imposed on originating and
terminating voice service providers. In the First Caller ID
Authentication Report and Order and FNPRM, we explained that for
compliance with our rules it would be sufficient to adhere to the three
standards that comprise the foundation of the STIR/SHAKEN framework--
ATIS-1000074, ATIS-1000080, and ATIS-1000084--and all documents
referenced therein. Recognizing that industry standards are not static,
we framed the most recent versions of these standards as the baseline
requirements for compliance. We follow that approach here and establish
that compliance with the most current version of these three standards
as of September 30, 2020, including any errata as of that date or
earlier, represents the minimum requirement for intermediate providers
to satisfy our rules. We encourage innovation and improvement to the
STIR/SHAKEN framework, so long as any changes or additions do not
compromise the baseline call authentication functionality envisioned by
ATIS-1000074, ATIS-1000080, and ATIS-1000084. An example of such an
innovation is the recent technical report ATIS and the SIP Forum
released providing guidelines for originating providers on the
population of the SHAKEN attestation indicator and origination
identifier.
144. Beyond harmonizing our requirements on intermediate providers
and originating and terminating voice service providers, this
modification responds to record interest in allowing, where possible,
intermediate providers to authenticate caller ID information with a
higher level of attestation than a C-level attestation. It is not our
intent to preclude or interfere with efforts to accommodate this
interest; only to ensure the caller ID information for such calls be
authenticated. To that end, we agree with commenters that argue we
should not require intermediate providers to authenticate calls with a
specific level of attestation, and require instead that intermediate
providers authenticate the caller ID information for unauthenticated
calls consistent with industry standards as described above. This
clarification allows for and encourages industry progress, and we look
forward to seeing progress on the numerous proposals in the record to
allow for more robust authentication of such calls. We decline to
require any specific solution, as some commenters suggest, or to impose
a specific timeline. We encourage interested parties to continue this
work promptly, but the record does not include enough information on
which to base a deadline, and industry standards bodies are better-
suited to modify the standards they have created.
145. Although we establish this requirement, in response to
arguments that our proposal was unduly burdensome in some cases, we
allow for an intermediate provider to register and participate with the
industry traceback consortium as an alternative means of complying with
our rules. Several commenters claim that a requirement for intermediate
providers to authenticate the caller ID information of all
unauthenticated calls that they receive would cause bandwidth problems
within provider networks. Several commenters also express concern that
an attestation requirement would undermine the efficacy of STIR/SHAKEN
by ``pollut[ing] the ecosystem'' with ``billions of useless
attestations,'' causing customer harm and confusion. Further, some
commenters contend that such a requirement would not lead to the
benefits that we proposed would accrue. Other commenters in the record
push back on these concerns, and because of the potential value of more
ubiquitous authentication, we do not find that these concerns justify
the elimination of this requirement entirely. We find that attestation
of previously unauthenticated calls will provide significant benefits
in facilitating analytics, blocking, and traceback by offering all
parties in the call ecosystem more information, and we thus allow
attestation of unauthenticated calls as one method for compliance. This
conclusion is consistent with our analysis in the First Caller ID
Authentication Report and Order, where we found that the benefits of
requiring providers to authenticate calls will substantially outweigh
the costs.
146. While we make this conclusion, we acknowledge record concerns
about the cost of requiring intermediate provider authentication and
thus offer an alternative method of compliance that we anticipate will
be less burdensome and will nonetheless facilitate traceback of calls.
Specifically, establish that an entity acting as an intermediate
provider is relieved of the requirement to authenticate the caller ID
information of unauthenticated calls it receives if it (i)
cooperatively participates with the industry traceback consortium, and
(ii) responds to all traceback requests it receives from the
Commission, law enforcement, or the industry traceback consortium for
calls for which it acts as an intermediate provider. We again
underscore that this requirement does not supersede any existing legal
processes, and we encourage law enforcement to make traceback requests
through the industry traceback consortium.
147. Providing this option addresses intermediate provider concerns
over the burden that an authentication requirement would place on their
networks. It further allows for continued evaluation of the role
intermediate providers play in authenticating the caller ID information
of the unauthenticated calls that they receive amid the continued
deployment of the STIR/SHAKEN framework. By ensuring that all calls
which transit the voice network either receive some form of attestation
or are carried by an intermediate provider that is registered with the
industry traceback consortium, terminating voice service providers will
have more data about a call that can be used to support traceback
efforts and call analytics, and prevent future illegal robocalls--
further increasing the net benefits offered by STIR/SHAKEN.
Additionally, providing this option for
[[Page 73388]]
intermediate providers aligns with the robocall mitigation requirements
we adopt in this document. By requiring intermediate providers and many
originating voice service providers to engage in practices that promote
traceback, we will ensure broad participation through the entire call
path to determine the source of illegal robocalls. Although the
obligation to either authenticate or participate in the industry
traceback consortium with respect to unauthenticated calls will place
costs on intermediate providers, we have no reason to believe that our
additional mandate will fundamentally disturb our cost-benefit calculus
for STIR/SHAKEN implementation. AT&T argues that ``[t]he initial
estimates of the major providers' costs to implement STIR/SHAKEN
grossly underestimate reality,'' and that STIR/SHAKEN implementation
costs ``easily will exceed hundreds of millions of dollars.'' We are
not convinced by this assertion as AT&T does not provide concrete
evidence to support such claims, nor any explanation as to why initial
estimates were inaccurate.
148. We find it unnecessary to adopt CTIA's suggestion to require
intermediate providers serving as international gateways to register
with the Commission. Under the rules we adopt, such providers are
required either to authenticate the caller ID information of the
foreign-originated calls that they receive and will transit on their
networks or to register with the industry traceback consortium and
participate in traceback efforts. Both options we adopt address call
tracing more directly than a mere registration requirement, and we are
reluctant to create multiple overlapping registration requirements for
providers that choose the latter option. We can revisit CTIA's
suggestion should the measures we adopt prove insufficient.
3. Limiting Intermediate Provider Requirements to IP Networks
149. In the First Caller ID Authentication Report and Order and
FNPRM, we proposed limiting our caller ID authentication obligations on
intermediate providers to IP calls. We adopt our proposal with
modifications. First, we adopt this proposal for calls with
authenticated caller ID information that an intermediate provider
receives. In so doing, we limit the requirement that intermediate
providers pass any received Identity header unaltered to IP calls, that
is, calls that the intermediate provider receives in SIP and exchanges
with a terminating provider or another intermediate provider in SIP.
Commenters support limiting our rule to IP calls, and doing so
harmonizes our rules for intermediate providers with our rules applying
to originating and terminating voice service providers.
150. Second, we modify this proposal for calls with unauthenticated
caller ID information that an intermediate provider receives. To the
extent that an intermediate provider chooses to comply with the rules
we adopt in this document by authenticating the caller ID information
of the unauthenticated calls that it receives, as Comcast suggests, we
clarify that this requirement applies to all unauthenticated calls an
intermediate provider receives that it will exchange with a subsequent
provider in SIP, regardless of whether the intermediate provider
receives the call in SIP. In other words, if the intermediate provider
chooses to authenticate the caller ID information of unauthenticated
calls, the obligation applies if the intermediate provider transmits
the call downstream in SIP. We make this modification in recognition of
the fact that calls without authenticated caller ID information may
have originated on non-IP networks or have been exchanged at non-IP
interconnection points and thus do not have an existing Identity
header. In those instances, the obligation to authenticate the caller
ID information according to industry standards applies whether or not
the call was received by the intermediate provider in SIP.
151. We decline to adopt Comcast's proposal that intermediate
providers exchanging traffic in TDM install TDM-to-VoIP gateways. At
this time, we believe that such a requirement would be unduly
burdensome. Furthermore, it would go beyond both Congress's and our
approach to addressing the issues around non-IP technology and caller
ID authentication, which aim to strike a balance between encouraging
the IP transition and the development of non-IP solutions for the
benefit of those networks that cannot be speedily or easily
transitioned. We will continue to monitor the development of technical
solutions to the issue of TDM exchange and are prepared to return to
this proposal if circumstances warrant.
4. Definition of Intermediate Provider
152. We adopt our proposal from the First Caller ID Authentication
Report and Order and FNPRM to use the definition of ``intermediate
provider'' found in Sec. 64.1600(i) of our rules. This section
provides that an ``intermediate provider'' is ``any entity that carries
or processes traffic that traverses or will traverse the [PSTN] at any
point insofar as that entity neither originates nor terminates that
traffic.'' We further determine that as with our interpretation of
``providers of voice service,'' we assess the definition of
``intermediate provider'' on a call-by-call basis for the purpose of
our call authentication rules. A single entity therefore may act as a
voice service provider for some calls on its network and an
intermediate provider for others. Intermediate providers play a
critical role in ensuring end-to-end call authentication. We believe
that this broad definition will best promote the widespread deployment
of the STIR/SHAKEN framework that is necessary to benefit consumers.
153. We sought comment in the First Caller ID Authentication Report
and Order and FNPRM on whether we should use a narrower definition of
intermediate provider, such as the one we use in the context of rural
call completion. One commenter advocates for a narrower definition that
would ``not include in its scope an ISP that is only incidentally
transmitting voice traffic,'' because this ``could place a substantial
burden on small, rural ISPs transmitting Non-Interconnected VoIP or
Interconnected VoIP via a third-party service provider they have no
relationship with.'' As we explained in the First Caller ID
Authentication Report and Order and FNPRM, the STIR/SHAKEN framework
relies on the transmission of information in the Identity header of a
SIP INVITE. We understand that there are circumstances where a call set
up using SIP signaling will then use other paths to exchange the media
packets containing voice data. Because we have limited our rules to the
exchanging of SIP calls, to the extent that an ISP is only transmitting
voice traffic of a call that does not involve the exchange of a SIP
INVITE, we believe it is already excluded from our rules.
5. Legal Authority
154. We find that we have the authority to place caller ID
authentication obligations on intermediate providers and alternatively
to require that they register and participate with the industry
traceback consortium under section 251(e) of the Act. In the First
Caller ID Authentication Report and Order, we concluded that our
exclusive jurisdiction over numbering policy provides authority to
require voice service providers to implement STIR/SHAKEN in order to
prevent the fraudulent abuse of NANP resources. In the FNPRM, we
proposed that this same analysis provides the Commission authority to
impose STIR/SHAKEN implementation requirements on
[[Page 73389]]
intermediate providers. Several commenters support this view. Calls
that transit the networks of intermediate providers with illegally
spoofed caller ID are exploiting numbering resources in the same manner
as spoofed calls on the networks of originating and terminating
providers, and so we find authority under section 251(e). Consistent
with the First Caller ID Authentication Report and Order and FNPRM, we
adopt our proposal concluding that the section 251(e)(2) requirements
do not apply in the context of our establishing STIR/SHAKEN
requirements. Because STIR/SHAKEN implementation is not a ``numbering
administration arrangement,'' section 251(e)(2), which provides that
``[t]he cost of establishing telecommunications numbering
administration arrangements . . . shall be borne by all
telecommunications carriers on a competitively neutral basis,'' does
not apply here. Even if section 251(e)(2) does apply, we conclude that
because each carrier is responsible for bearing its own implementation
costs, the requirement is satisfied. Each carrier's costs will be
proportional to the size and quality of its network.
155. We find additional, independent authority under the Truth in
Caller ID Act. The Truth in Caller ID Act charged the Commission with
prescribing rules to make unlawful the spoofing of caller ID
information ``in connection with any voice service or text messaging
service . . . with the intent to defraud, cause harm, or wrongfully
obtain anything of value.'' We agree with T-Mobile that this provides
us with authority to mandate that intermediate providers adopt ``a
framework that will minimize the frequency with which illegally spoofed
scam calls will reach consumers.'' We found authority in the First
Caller ID Authentication Report and Order for our STIR/SHAKEN
implementation mandate on originating and terminating voice service
providers under the Truth in Caller ID Act. We explained that ``the
rules we adopt today are necessary to enable voice service providers to
help prevent these unlawful acts and to protect voice service
subscribers from scammers and bad actors.'' That same analysis applies
to intermediate providers that, as noted, play an integral role in the
success of STIR/SHAKEN across the voice network.
156. Verizon, the only commenter to challenge our legal authority,
argues that we lack authority under either section 251(e) or the Truth
in Caller ID Act to require an intermediate provider to authenticate
with a C-level attestation the caller ID information for
unauthenticated calls it receives. It asserts that `` `C' attestations
do not attest to the accuracy of numbers and indeed have nothing to do
with numbering resources,'' and consequently that section 251(e) does
not provide us with authority; it further argues that `` `C'
attestations have nothing to do with the spoofing problem'' and so
could not be required under the Truth in Caller ID Act. Verizon also
argues that we may not ``go beyond the scope of the legal authority
granted by the TRACED Act,'' but overlooks language in that very Act
providing that ``[n]othing in this section shall preclude the
Commission from initiating a rulemaking pursuant to its existing
statutory authority.'' As an initial matter, Verizon's objections are
less pressing because of the modifications we made to our final rule--
requiring only authentication consistent with industry standards or
registration and participation with the industry traceback consortium.
Furthermore, we do not agree that C-level attestations ``have nothing
to do with'' numbering resources or spoofing. The STIR/SHAKEN standards
expressly include the option of C-level attestation, and we think it
apparent that this component of ``a technology specifically designed to
counteract misuse of numbering resources'' through spoofing relates
both to our authority under section 251(e) and the Truth in Caller ID
Act. When bad actors unlawfully falsify or spoof the caller ID that
appears on a subscriber's phone, they are using numbering resources to
advance an illegal scheme. Mandating that intermediate providers
authenticate unauthenticated calls or participate in traceback efforts
will help to prevent and remediate the fraudulent exploitation of NANP
resources and illegal spoofing of caller ID information.
G. Other Issues
157. No Additional Exceptions from Originating Voice Service
Provider Caller ID Authentication Mandate. We reject the record
requests to grant limited exceptions from our caller ID authentication
rules. We construe these requests, which do not respond to any part of
the FNPRM, as petitions for reconsideration of the rules adopted in the
First Caller ID Authentication Report and Order and FNPRM. Verizon
argues that we should free a voice service provider from our caller ID
authentication rules in certain circumstances where, in its view, it
would be ``inadvisable or inappropriate for the originating carrier to
place a signature on a call.'' Verizon, USTelecom, and CTIA argue that
these circumstances include ``periods of substantial network
congestion,'' such as national emergencies or natural disasters, or
during periods of network maintenance. Verizon further argues that a
voice service provider should not be required to authenticate caller ID
information in certain complicated calling cases. We decline to grant
these categorical exceptions from our mandate. Our goal is ubiquitous
deployment of caller ID authentication technology, and no commenter
explains with specificity why its concerns outweigh that goal. To the
contrary, national emergencies and natural disasters are among the
times when caller ID authentication is most important. In those
instances, affected individuals must be able to rely on the caller ID
information they receive and avoid bad actors taking advantage of an
ongoing emergency or its aftermath. And while we do not grant an
exception for complicated calling cases, we underscore that, to the
extent a certain calling case is not accounted for by industry
standards, application of caller ID authentication is not called for by
our rules. We explained in the First Caller ID Authentication Report
and Order that ``[c]ompliance with the most current versions of . . .
three standards as of March 31, 2020, including any errata as of that
date or earlier, represents the minimum requirement to satisfy our
rules.'' USTelecom and CTIA argue that, because we provide intermediate
providers limited exceptions to our requirement that they transit
Identity headers unaltered, we must also provide an exception for
originating voice service providers from our call authentication
mandate. But these commenters fail to explain why adopting narrowly
tailored exceptions for intermediate providers justifies adopting the
far broader exception that they seek. Beyond generalized concerns over
network congestion and maintenance, no commenter provides a specific
technical rationale for when originating voice service providers should
receive an exception from our caller ID authentication requirements.
158. Non-Substantive Rule Revision. We revise Sec. 64.6301(a)(2)
of our rules to make two non-substantive changes. First, the adopted
rule inadvertently omitted the word ``it.'' Second, the adopted rule
referred to ``caller ID authentication information,'' inconsistent with
other terms in the rules. The rule as revised provides that a voice
service provider shall ``authenticate caller identification information
for all SIP calls it originates
[[Page 73390]]
and that it will exchange with another voice service provider or
intermediate provider and, to the extent technically feasible, transmit
that call with authenticated caller identification information to the
next voice service provider or intermediate provider in the call
path.'' We make these revisions without seeking notice and comment
pursuant to section 553(b)(3)(B) of the Administrative Procedure Act,
which states that an agency for good cause may dispense with rulemaking
if it finds that notice and comment are ``impracticable, unnecessary,
or contrary to the public interest.'' Here, notice and comment are
unnecessary because correcting the rule does not have a detrimental
effect on the parties regulated by rule and does not alter the
regulatory framework established by the First Caller ID Authentication
Report and Order.
IV. Procedural Matters
159. Final Regulatory Flexibility Analysis. As required by the
Regulatory Flexibility Act of 1980 (RFA), an Initial Regulatory
Flexibility Analysis (IRFA) was incorporated into the First Caller ID
Authentication Report and Order and FNPRM. The Commission sought
written public comment on the possible significant economic impact on
small entities regarding the proposals addressed in the First Caller ID
Authentication Report and Order and FNPRM, including comments on the
IRFA. No comments were filed addressing the IRFA. This present Final
Regulatory Flexibility Analysis (FRFA) conforms to the RFA. The
Commission's Consumer and Governmental Affairs Bureau, Reference
Information Center, will send a copy of this Second Report and Order,
including the FRFA, to the Chief Counsel for Advocacy of the Small
Business Administration (SBA).
A. Need for, and Objectives of, the Rules
160. In this Second Report and Order (Order), we continue the
Commission's efforts to combat illegal spoofed robocalls. Specifically,
the Order implements the provisions of section 4 of the Pallone-Thune
Telephone Robocall Abuse Criminal Enforcement and Deterrence (TRACED)
Act as follows: requiring providers to take ``reasonable measures'' to
implement an effective caller ID authentication framework in their non-
IP networks by either completely upgrading non-IP networks to IP or by
actively working to develop a non-IP authentication solution; granting
extensions of varying lengths from implementation of caller ID
authentication for (1) small, including small rural, voice service
providers; (2) voice service providers that cannot obtain a certificate
due to the Governance Authority's token access policy until such
provider is able to obtain a certificate; (3) services scheduled for
section 214 discontinuance; and (4) as required by the TRACED Act, an
extension for the parts of a voice service provider's network that rely
on technology that cannot initiate, maintain, and terminate SIP calls
until a solution for such calls is reasonably available; granting an
exemption from our implementation mandate for providers which have
certified that they have reached certain implementation goals; and
prohibiting providers from imposing additional line item charges on
consumer and small business subscribers for caller ID authentication
technology. The Order also adopts rules requiring intermediate
providers to (1) pass any Identity header that they receive to the
terminating voice service provider or subsequent intermediate provider
in the call path; and (2) either (i) authenticate the caller ID
information of a call that it receives with unauthenticated caller ID
information that it will exchange with another intermediate provider or
terminating voice service provider as a SIP call, or (ii) cooperatively
participate with the Commission-selected consortium to conduct
traceback efforts. These rules will help promote effective caller ID
authentication and fulfill our obligations under the TRACED Act.
B. Summary of Significant Issues Raised by Public Comments in Response
to the IRFA
161. There were no comments filed that specifically addressed the
proposed rules and policies presented in the IRFA.
C. Response to Comments by the Chief Counsel for Advocacy of the SBA
162. Pursuant to the Small Business Jobs Act of 2010, which amended
the RFA, the Commission is required to respond to any comments filed by
the Chief Counsel for Advocacy of the Small Business Administration
(SBA), and to provide a detailed statement of any change made to the
proposed rules as a result of those comments.
163. The Chief Counsel did not file any comments in response to the
proposed rules in this proceeding.
D. Description and Estimate of the Number of Small Entities to Which
the Rules Will Apply
164. The RFA directs agencies to provide a description and, where
feasible, an estimate of the number of small entities that may be
affected by the final rules adopted pursuant to the Order. The RFA
generally defines the term ``small entity'' as having the same meaning
as the terms ``small business,'' ``small organization,'' and ``small
governmental jurisdiction.'' In addition, the term ``small business''
has the same meaning as the term ``small-business concern'' under the
Small Business Act. A ``small-business concern'' is one which: (1) Is
independently owned and operated; (2) is not dominant in its field of
operation; and (3) satisfies any additional criteria established by the
SBA.
1. Wireline Carriers
165. Wired Telecommunications Carriers. The U.S. Census Bureau
defines this industry as ``establishments primarily engaged in
operating and/or providing access to transmission facilities and
infrastructure that they own and/or lease for the transmission of
voice, data, text, sound, and video using wired communications
networks. Transmission facilities may be based on a single technology
or a combination of technologies. Establishments in this industry use
the wired telecommunications network facilities that they operate to
provide a variety of services, such as wired telephony services,
including VoIP services, wired (cable) audio and video programming
distribution, and wired broadband internet services. By exception,
establishments providing satellite television distribution services
using facilities and infrastructure that they operate are included in
this industry.'' The SBA has developed a small business size standard
for Wired Telecommunications Carriers, which consists of all such
companies having 1,500 or fewer employees. U.S. Census Bureau data for
2012 show that there were 3,117 firms that operated that year. Of this
total, 3,083 operated with fewer than 1,000 employees. Thus, under this
size standard, the majority of firms in this industry can be considered
small.
166. Local Exchange Carriers (LECs). Neither the Commission nor the
SBA has developed a size standard for small businesses specifically
applicable to local exchange services. The closest applicable NAICS
Code category is Wired Telecommunications Carriers. Under the
applicable SBA size standard, such a business is small if it has 1,500
or fewer employees. U.S. Census Bureau data for 2012 show that there
were 3,117 firms that operated for the entire year. Of that total,
3,083 operated with fewer than 1,000 employees. Thus under this
category and the associated size standard, the Commission estimates
that the majority of local exchange carriers are small entities.
[[Page 73391]]
167. Incumbent Local Exchange Carriers (incumbent LECs). Neither
the Commission nor the SBA has developed a small business size standard
specifically for incumbent local exchange services. The closest
applicable NAICS Code category is Wired Telecommunications Carriers.
Under the applicable SBA size standard, such a business is small if it
has 1,500 or fewer employees. U.S. Census Bureau data for 2012 indicate
that 3,117 firms operated the entire year. Of this total, 3,083
operated with fewer than 1,000 employees. Consequently, the Commission
estimates that most providers of incumbent local exchange service are
small businesses that may be affected by our actions. According to
Commission data, one thousand three hundred and seven (1,307) Incumbent
Local Exchange Carriers reported that they were incumbent local
exchange service providers. Of this total, an estimated 1,006 have
1,500 or fewer employees. Thus, using the SBA's size standard the
majority of incumbent LECs can be considered small entities.
168. Competitive Local Exchange Carriers (Competitive LECs),
Competitive Access Providers (CAPs), Shared-Tenant Service Providers,
and Other Local Service Providers. Neither the Commission nor the SBA
has developed a small business size standard specifically for these
service providers. The appropriate NAICS Code category is Wired
Telecommunications Carriers and under that size standard, such a
business is small if it has 1,500 or fewer employees. U.S. Census
Bureau data for 2012 indicate that 3,117 firms operated during that
year. Of that number, 3,083 operated with fewer than 1,000 employees.
Based on these data, the Commission concludes that the majority of
Competitive LECS, CAPs, Shared-Tenant Service Providers, and Other
Local Service Providers, are small entities. According to Commission
data, 1,442 carriers reported that they were engaged in the provision
of either competitive local exchange services or competitive access
provider services. Of these 1,442 carriers, an estimated 1,256 have
1,500 or fewer employees. In addition, 17 carriers have reported that
they are Shared-Tenant Service Providers, and all 17 are estimated to
have 1,500 or fewer employees. Also, 72 carriers have reported that
they are Other Local Service Providers. Of this total, 70 have 1,500 or
fewer employees. Consequently, based on internally researched FCC data,
the Commission estimates that most providers of competitive local
exchange service, competitive access providers, Shared-Tenant Service
Providers, and Other Local Service Providers are small entities.
169. We have included small incumbent LECs in this present RFA
analysis. As noted above, a ``small business'' under the RFA is one
that, inter alia, meets the pertinent small-business size standard
(e.g., a telephone communications business having 1,500 or fewer
employees) and ``is not dominant in its field of operation.'' The SBA's
Office of Advocacy contends that, for RFA purposes, small incumbent
LECs are not dominant in their field of operation because any such
dominance is not ``national'' in scope. We have therefore included
small incumbent LECs in this RFA analysis, although we emphasize that
this RFA action has no effect on Commission analyses and determinations
in other, non-RFA contexts.
170. Interexchange Carriers (IXCs). Neither the Commission nor the
SBA has developed a small business size standard specifically for
Interexchange Carriers. The closest applicable NAICS Code category is
Wired Telecommunications Carriers. The applicable size standard under
SBA rules is that such a business is small if it has 1,500 or fewer
employees. U.S. Census Bureau data for 2012 indicate that 3,117 firms
operated for the entire year. Of that number, 3,083 operated with fewer
than 1,000 employees. According to internally developed Commission
data, 359 companies reported that their primary telecommunications
service activity was the provision of interexchange services. Of this
total, an estimated 317 have 1,500 or fewer employees. Consequently,
the Commission estimates that the majority of interexchange service
providers are small entities.
171. Cable System Operators (Telecom Act Standard). The
Communications Act of 1934, as amended, also contains a size standard
for small cable system operators, which is ``a cable operator that,
directly or through an affiliate, serves in the aggregate fewer than
one percent of all subscribers in the United States and is not
affiliated with any entity or entities whose gross annual revenues in
the aggregate exceed $250,000,000.'' As of 2019, there were
approximately 48,646,056 basic cable video subscribers in the United
States. Accordingly, an operator serving fewer than 486,460 subscribers
shall be deemed a small operator if its annual revenues, when combined
with the total annual revenues of all its affiliates, do not exceed
$250 million in the aggregate. Based on available data, we find that
all but five cable operators are small entities under this size
standard. We note that the Commission neither requests nor collects
information on whether cable system operators are affiliated with
entities whose gross annual revenues exceed $250 million. Therefore, we
are unable at this time to estimate with greater precision the number
of cable system operators that would qualify as small cable operators
under the definition in the Communications Act.
2. Wireless Carriers
172. Wireless Telecommunications Carriers (except Satellite). This
industry comprises establishments engaged in operating and maintaining
switching and transmission facilities to provide communications via the
airwaves. Establishments in this industry have spectrum licenses and
provide services using that spectrum, such as cellular services, paging
services, wireless internet access, and wireless video services. The
appropriate size standard under SBA rules is that such a business is
small if it has 1,500 or fewer employees. For this industry, U.S.
Census Bureau data for 2012 show that there were 967 firms that
operated for the entire year. Of this total, 955 firms employed fewer
than 1,000 employees and 12 firms employed of 1,000 employees or more.
Thus under this category and the associated size standard, the
Commission estimates that the majority of Wireless Telecommunications
Carriers (except Satellite) are small entities.
173. The Commission's own data--available in its Universal
Licensing System--indicate that, as of August 31, 2018 there are 265
Cellular licensees that will be affected by our actions. The Commission
does not know how many of these licensees are small, as the Commission
does not collect that information for these types of entities.
Similarly, according to internally developed Commission data, 413
carriers reported that they were engaged in the provision of wireless
telephony, including cellular service, Personal Communications Service
(PCS), and Specialized Mobile Radio (SMR) Telephony services. Of this
total, an estimated 261 have 1,500 or fewer employees, and 152 have
more than 1,500 employees. Thus, using available data, we estimate that
the majority of wireless firms can be considered small.
174. Satellite Telecommunications. This category comprises firms
``primarily engaged in providing telecommunications services to other
establishments in the
[[Page 73392]]
telecommunications and broadcasting industries by forwarding and
receiving communications signals via a system of satellites or
reselling satellite telecommunications.'' Satellite telecommunications
service providers include satellite and earth station operators. The
category has a small business size standard of $35 million or less in
average annual receipts, under SBA rules. For this category, U.S.
Census Bureau data for 2012 show that there were a total of 333 firms
that operated for the entire year. Of this total, 299 firms had annual
receipts of less than $25 million. Consequently, we estimate that the
majority of satellite telecommunications providers are small entities.
3. Resellers
175. Local Resellers. The SBA has not developed a small business
size standard specifically for Local Resellers. The SBA category of
Telecommunications Resellers is the closest NAICs code category for
local resellers. The Telecommunications Resellers industry comprises
establishments engaged in purchasing access and network capacity from
owners and operators of telecommunications networks and reselling wired
and wireless telecommunications services (except satellite) to
businesses and households. Establishments in this industry resell
telecommunications; they do not operate transmission facilities and
infrastructure. Mobile virtual network operators (MVNOs) are included
in this industry. Under the SBA's size standard, such a business is
small if it has 1,500 or fewer employees. U.S. Census Bureau data from
2012 show that 1,341 firms provided resale services during that year.
Of that number, all operated with fewer than 1,000 employees. Thus,
under this category and the associated small business size standard,
the majority of these resellers can be considered small entities.
According to Commission data, 213 carriers have reported that they are
engaged in the provision of local resale services. Of these, an
estimated 211 have 1,500 or fewer employees and two have more than
1,500 employees. Consequently, the Commission estimates that the
majority of local resellers are small entities.
176. Toll Resellers. The Commission has not developed a definition
for Toll Resellers. The closest NAICS Code Category is
Telecommunications Resellers. The Telecommunications Resellers industry
comprises establishments engaged in purchasing access and network
capacity from owners and operators of telecommunications networks and
reselling wired and wireless telecommunications services (except
satellite) to businesses and households. Establishments in this
industry resell telecommunications; they do not operate transmission
facilities and infrastructure. MVNOs are included in this industry. The
SBA has developed a small business size standard for the category of
Telecommunications Resellers. Under that size standard, such a business
is small if it has 1,500 or fewer employees. 2012 U.S. Census Bureau
data show that 1,341 firms provided resale services during that year.
Of that number, 1,341 operated with fewer than 1,000 employees. Thus,
under this category and the associated small business size standard,
the majority of these resellers can be considered small entities.
According to Commission data, 881 carriers have reported that they are
engaged in the provision of toll resale services. Of this total, an
estimated 857 have 1,500 or fewer employees. Consequently, the
Commission estimates that the majority of toll resellers are small
entities.
177. Prepaid Calling Card Providers. Neither the Commission nor the
SBA has developed a small business definition specifically for prepaid
calling card providers. The most appropriate NAICS code-based category
for defining prepaid calling card providers is Telecommunications
Resellers. This industry comprises establishments engaged in purchasing
access and network capacity from owners and operators of
telecommunications networks and reselling wired and wireless
telecommunications services (except satellite) to businesses and
households. Establishments in this industry resell telecommunications;
they do not operate transmission facilities and infrastructure. Mobile
virtual networks operators (MVNOs) are included in this industry. Under
the applicable SBA size standard, such a business is small if it has
1,500 or fewer employees. U.S. Census Bureau data for 2012 show that
1,341 firms provided resale services during that year. Of that number,
1,341 operated with fewer than 1,000 employees. Thus, under this
category and the associated small business size standard, the majority
of these prepaid calling card providers can be considered small
entities. According to the Commission's Form 499 Filer Database, 86
active companies reported that they were engaged in the provision of
prepaid calling cards. The Commission does not have data regarding how
many of these companies have 1,500 or fewer employees, however, the
Commission estimates that the majority of the 86 active prepaid calling
card providers that may be affected by these rules are likely small
entities.
4. Other Entities
178. All Other Telecommunications. The ``All Other
Telecommunications'' category is comprised of establishments primarily
engaged in providing specialized telecommunications services, such as
satellite tracking, communications telemetry, and radar station
operation. This industry also includes establishments primarily engaged
in providing satellite terminal stations and associated facilities
connected with one or more terrestrial systems and capable of
transmitting telecommunications to, and receiving telecommunications
from, satellite systems. Establishments providing internet services or
voice over internet protocol (VoIP) services via client-supplied
telecommunications connections are also included in this industry. The
SBA has developed a small business size standard for ``All Other
Telecommunications'', which consists of all such firms with annual
receipts of $35 million or less. For this category, U.S. Census Bureau
data for 2012 show that there were 1,442 firms that operated for the
entire year. Of those firms, a total of 1,400 had annual receipts less
than $25 million and 15 firms had annual receipts of $25 million to
$49, 999,999. Thus, the Commission estimates that the majority of ``All
Other Telecommunications'' firms potentially affected by our action can
be considered small.
E. Description of Projected Reporting, Recordkeeping, and Other
Compliance Requirements for Small Entities
179. The Order adopts rules that obligate voice service providers
that use non-IP network technology to be able to provide the
Commission, upon request, with documented proof that the provider is
participating, either on its own or through a representative, as a
member of a working group, industry standards group, or consortium that
is working to develop a non-IP solution, or actively testing such a
solution. Under this rule, a voice service provider satisfies its
obligations if it participates through a third-party representative,
such as a trade association of which it is a member or vendor.
180. Section 4(b)(5)(C)(i) of the TRACED Act directs the Commission
to require any voice service provider that has been granted an
extension in compliance with the caller ID
[[Page 73393]]
authentication implementation mandates to implement, during the time of
the extension, ``an appropriate robocall mitigation program to prevent
unlawful robocalls from originating on the network of the provider.''
The Order requires voice service providers to file certifications
documenting and describing their robocall mitigation programs.
Specifically, the Order requires all voice service providers--not only
those granted an extension--to certify on or before June 30, 2021, that
their traffic is either signed with STIR/SHAKEN or subject to a
robocall mitigation program that includes taking reasonable steps to
avoid originating illegal robocall traffic, and committing to
cooperating with law enforcement and the industry traceback consortium
in investigating and stopping any illegal robocallers that it learns
are using its service to originate calls. For those voice service
providers that certify that some or all of their traffic is subject to
a robocall mitigation program, the Order requires such voice service
providers to detail in their certifications the specific ``reasonable
steps'' that they have taken to avoid originating illegal robocall
traffic. While only voice service providers with an extension will be
obligated to implement a robocall mitigation program, the Order imposes
the certification requirement on all voice service providers because
doing so will help the Commission and others to hold all voice service
providers accountable for the voice traffic they originate, and give
the Commission and others a snapshot of the progress of STIR/SHAKEN
implementation and the variety of robocall mitigation practices adopted
by voice service providers.
181. Voice service providers must file robocall mitigation
certifications via a portal on the Commission's website that we will
establish for this purpose. The Order also requires voice service
providers filing certifications to provide the following identification
information in the portal on the Commission's website:
(1) The voice service provider's business name(s) and primary
address;
(2) other business names in use by the voice service provider;
(3) all business names previously used by the voice service
provider;
(4) whether a voice service provider is a foreign voice service
provider; and
(5) the name, title, department, business address, telephone
number, and email address of a central point of contact within the
company responsible for addressing robocall-mitigation-related issues.
182. The Order also requires voice service providers to submit to
the Commission any necessary updates regarding any of the information
they filed in the certification process within 10 business days. The
Order extends this certification requirement to foreign voice service
providers that use U.S. North American Numbering Plan numbers that
pertain to the United States to send voice traffic to residential and
business subscribers in the United States and wish to be listed in the
database.
183. The Order also adopts rules in accordance with our proposal to
require that, in order to receive a voluntary exemption from our
implementation mandate, a voice service provider must file a
certification reflecting that it is in a reasonably foreseeable
position to meet certain implementation goals, and that, in order to
maintain that exemption, a provider must make a later filing reflecting
its achievement of those goals it stated it was in a reasonably
foreseeable position to meet. The requirement of such certifications
entails new reporting, recordkeeping, and other compliance requirements
for voice service providers. Specifically, we require that each voice
service provider that wishes to qualify for the voluntary exemption
from our implementation mandate must have an officer of the voice
service provider sign a compliance certificate stating, under penalty
of perjury, that the officer has personal knowledge that the company
meets each of the stated criteria. We also require the voice service
provider to submit an accompanying statement explaining, in detail, how
the company meets each of the prongs of each applicable exemption so
that the Commission can verify the accuracy of the certification. We
also require that these certifications be filed no later than December
1, 2020, and that all certifications and supporting statements be filed
electronically in WC Docket No. 20-68, Exemption from Caller ID
Authentication Requirements, in the Commission's Electronic Comment
Filing System (ECFS). Voice service providers that receive an exemption
are further required to file a second certification by a deadline
specified in a Public Notice issued by the Wireline Competition Bureau
no later than three months after June 30, 2021, stating whether they,
in fact, achieved the implementation goal to which they previously
committed. The certification must be filed electronically in WC Docket
No. 20-68, Exemption from Caller ID Authentication Requirements, in
ECFS subject to the same allowance for confidentiality and requirements
for sworn signatures and detailed support as the initial
certifications. Voice service providers that certified in December of
2020 that they have already fully implemented the necessary STIR/SHAKEN
requirements, and for which the Bureau accepted the certification, need
not file a second certification. This second filing is required only
from those voice service providers that have not yet ``fully
implemented'' STIR/SHAKEN by the time of their initial December 2020
certification, but have committed to doing so by June 30, 2021.
F. Steps Taken To Minimize the Significant Economic Impact on Small
Entities, and Significant Alternatives Considered
184. The RFA requires an agency to describe any significant,
specifically small business, alternatives that it has considered in
reaching its approach, which may include the following four
alternatives (among others): ``(1) The establishment of differing
compliance or reporting requirements or timetables that take into
account the resources available to small entities; (2) the
clarification, consolidation, or simplification of compliance and
reporting requirements under the rule for such small entities; (3) the
use of performance rather than design standards; and (4) an exemption
from coverage of the rule, or any part thereof for such small
entities.''
185. The rules we adopt in this Order permit providers to satisfy
the requirement under section 4(b)(1)(B) of the TRACED Act to take
``reasonable measures'' to implement an effective caller ID
authentication framework in the non-IP portions of their networks, by
participating as a member of a working group, industry standards group,
or consortium that is working to develop a non-IP solution, or actively
testing such a solution. A voice service provider satisfies this
obligation if it participates through a third-party representative,
such as a trade association of which it is a member or vendor. As the
record in this proceeding shows, some industry groups have already
established working groups dedicated to examining potential non-IP call
authentication technologies. Allowing for such representatives will
reduce the burden of this obligation on individual voice service
providers, including those which are smaller, and minimize the
potential negative impact of broad and inexpert participation
identified in the record, while ensuring that all voice service
providers remain invested in developing a solution for non-IP caller ID
authentication.
186. In addition, the Order grants a two-year extension from
[[Page 73394]]
implementation of caller ID authentication to small, including small
rural, voice service providers. The Order also grants an exemption from
our implementation mandate for voice service providers, including small
providers, which certify that they have reached certain implementation
goals, and prohibits voice service providers from imposing additional
line item charges on consumer or small business subscribers for caller
ID authentication. In these ways, we have taken steps to minimize the
economic impact of the rules adopted in this Order on small entities.
Report to Congress
187. The Commission will send a copy of the Order, including this
FRFA, in a report to Congress pursuant to the Congressional Review Act.
In addition, the Commission will send a copy of the Order, including
this FRFA, to the Chief Counsel for Advocacy of the SBA.
188. Paperwork Reduction Act. This document contains new or
modified information collection requirements subject to the Paperwork
Reduction Act of 1995 (PRA), Public Law 104-13. It will be submitted to
the Office of Management and Budget (OMB) for review under Section
3507(d) of the PRA. OMB, the general public, and other Federal agencies
will be invited to comment on the new or modified information
collection requirements contained in this proceeding. In addition, we
note that pursuant to the Small Business Paperwork Relief Act of 2002,
Public Law 107-198, we previously sought comment on how the Commission
might further reduce the information collection burden for small
business concerns with fewer than 25 employees.
189. Congressional Review Act. The Commission has determined, and
the Administrator of the Office of Information and Regulatory Affairs,
Office of Management and Budget, concurs that this rule is ``non-
major'' under the Congressional Review Act, 5 U.S.C. 804(2). The
Commission will send a copy of this Second Report and Order to Congress
and the Government Accountability Office pursuant to 5 U.S.C.
801(a)(1)(A).
V. Ordering Clauses
190. Accordingly, it is ordered, pursuant to sections 4(i), 4(j),
227(e), 227b, 251(e), and 303(r), of the Communications Act of 1934, as
amended (the Act), 47 U.S.C. 154(i), 154(j), 227(e), 227b, 251(e), and
303(r), that this Second Report and Order is adopted.
191. It is further ordered that part 64 of the Commission's rules
is amended as set forth in the Final Rules, and that any such rule
amendments that contain new or modified information collection
requirements that require approval by the Office of Management and
Budget under the Paperwork Reduction Act shall be effective after
announcement in the Federal Register of Office of Management and Budget
approval of the rules, and on the effective date announced therein.
192. It is further ordered that, pursuant to Sec. Sec. 1.4(b)(1)
and 1.103(a) of the Commission's rules, 47 CFR 1.4(b)(1), 1.103(a),
this Second Report and Order shall be effective 30 days after
publication in the Federal Register, except for the addition of
Sec. Sec. 64.6303(b) and 64.6305(b), to the Commission's rules that
have not been approved by OMB. The Federal Communications Commission
will publish documents in the Federal Register announcing the effective
dates of these provisions.
193. It is further ordered that the Commission shall send a copy of
this Report and Order to Congress and to the Government Accountability
Office pursuant to the Congressional Review Act, see 5 U.S.C.
801(a)(1)(A).
194. It is further ordered that the Commission's Consumer and
Governmental Affairs Bureau, Reference Information Center, shall send a
copy of this Second Report and Order, including the Final Regulatory
Flexibility Analysis (FRFA), to the Chief Counsel for Advocacy of the
Small Business Administration.
List of Subjects in 47 CFR Part 64
Common carriers.
Federal Communications Commission.
Marlene Dortch,
Secretary.
Final Rules
For the reasons discussed in the preamble, the Federal
Communications Commission amends 47 CFR part 64 as follows:
PART 64--MISCELLANEOUS RULES RELATING TO COMMON CARRIERS
0
1. The authority citation for part 64 continues to read as follows:
Authority: 47 U.S.C. 154, 201, 202, 217, 218, 220, 222, 225,
226, 227, 227b, 228, 251(a), 251(e), 254(k), 262, 403(b)(2)(B), (c),
616, 620, 1401-1473, unless otherwise noted; Pub. L. 115-141, Div.
P, sec. 503, 132 Stat. 348, 1091.
0
2. Effective December 17, 2020, amend Sec. 64.6300 by redesignating
paragraphs (e) through (g) as paragraphs (j) through (l) and paragraphs
(c) and (d) as paragraphs (f) and (h), respectively, and adding new
paragraphs (c) through (e), (g), and (i) to read as follows:
Sec. 64.6300 Definitions.
* * * * *
(c) Foreign voice service provider. The term ``foreign voice
service provider'' refers to any entity providing voice service outside
the United States that has the ability to originate voice service that
terminates in a point outside that foreign country or terminate voice
service that originates from points outside that foreign country.
(d) Governance Authority. The term ``Governance Authority'' refers
to the Secure Telephone Identity Governance Authority, the entity that
establishes and governs the policies regarding the issuance,
management, and revocation of Service Provider Code (SPC) tokens to
intermediate providers and voice service providers.
(e) Industry traceback consortium. The term ``industry traceback
consortium'' refers to the consortium that conducts private-led efforts
to trace back the origin of suspected unlawful robocalls as selected by
the Commission pursuant to Sec. 64.1203.
* * * * *
(g) Robocall Mitigation Database. The term ``Robocall Mitigation
Database'' refers to a database accessible via the Commission's website
that lists all entities that make filings pursuant to Sec. 64.6305(b).
* * * * *
(i) SPC token. The term ``SPC token'' refers to the Service
Provider Code token, an authority token validly issued to an
intermediate provider or voice service provider that allows the
provider to authenticate and verify caller identification information
consistent with the STIR/SHAKEN authentication framework in the United
States.
* * * * *
0
3. Effective December 17, 2020, amend Sec. 64.6301 by revising
paragraphs (a) introductory text and (a)(2) to read as follows:
Sec. 64.6301 Caller ID authentication.
(a) STIR/SHAKEN implementation by voice service providers. Except
as provided in Sec. Sec. 64.6304 and 64.6306, not later than June 30,
2021, a voice service provider shall fully implement the STIR/SHAKEN
authentication framework in its internet Protocol networks. To fulfill
this obligation, a voice service provider shall:
* * * * *
[[Page 73395]]
(2) Authenticate caller identification information for all SIP
calls it originates and that it will exchange with another voice
service provider or intermediate provider and, to the extent
technically feasible, transmit that call with authenticated caller
identification information to the next voice service provider or
intermediate provider in the call path; and
* * * * *
0
4. Effective December 17, 2020, add Sec. 64.6302 to read as follows:
Sec. 64.6302 Caller ID authentication by intermediate providers.
Not later than June 30, 2021, each intermediate provider shall
fully implement the STIR/SHAKEN authentication framework in its
internet Protocol networks. To fulfill this obligation, an intermediate
provider shall:
(a) Pass unaltered to the subsequent intermediate provider or voice
service provider in the call path any authenticated caller
identification information it receives with a SIP call, subject to the
following exceptions under which it may remove the authenticated caller
identification information:
(1) Where necessary for technical reasons to complete the call; or
(2) Where the intermediate provider reasonably believes the caller
identification authentication information presents an imminent threat
to its network security; and
(b) Authenticate caller identification information for all calls it
receives for which the caller identification information has not been
authenticated and which it will exchange with another provider as a SIP
call, except that the intermediate provider is excused from such duty
to authenticate if it:
(1) Cooperatively participates with the industry traceback
consortium; and
(2) Responds fully and in a timely manner to all traceback requests
it receives from the Commission, law enforcement, and the industry
traceback consortium regarding calls for which it acts as an
intermediate provider.
0
5. Effective December 17, 2020, add Sec. 64.6303 to read as follows:
Sec. 64.6303 Caller ID authentication in non-IP networks.
Except as provided in Sec. Sec. 64.6304 and 64.6306, not later
than June 30, 2021, a voice service provider shall:
(a) Upgrade its entire network to allow for the initiation,
maintenance, and termination of SIP calls and fully implement the STIR/
SHAKEN framework as required in Sec. 64.6301 throughout its network.
(b) [Reserved]
0
6. Delayed indefinitely, amend Sec. 64.6303 by:
0
a. Adding the word ``either'' at the end of the introductory text;
0
b. Removing the period at the end of paragraph (a) and adding ``; or''
in its place; and
0
c. Adding paragraph (b).
The addition reads as follows:
Sec. 64.6303 Caller ID authentication in non-IP networks.
* * * * *
(b) Maintain and be ready to provide the Commission on request with
documented proof that it is participating, either on its own or through
a representative, including third party representatives, as a member of
a working group, industry standards group, or consortium that is
working to develop a non-internet Protocol caller identification
authentication solution, or actively testing such a solution.
0
7. Effective December 17, 2020, add Sec. 64.6304 to read as follows:
Sec. 64.6304 Extension of implementation deadline.
(a) Small voice service providers. (1) Small voice service
providers are exempt from the requirements of Sec. 64.6301 through
June 30, 2023.
(2) For purposes of this paragraph (a), ``small voice service
provider'' means a provider that has 100,000 or fewer voice service
subscriber lines (counting the total of all business and residential
fixed subscriber lines and mobile phones and aggregated over all of the
provider's affiliates).
(b) Voice service providers that cannot obtain a SPC token. Voice
service providers that are incapable of obtaining a SPC token due to
Governance Authority policy are exempt from the requirements of Sec.
64.6301 until they are capable of obtaining a SPC token.
(c) Services scheduled for section 214 discontinuance. Services
which are subject to a pending application for permanent discontinuance
of service filed as of June 30, 2021, pursuant to the processes
established in 47 CFR 63.60 through 63.100, as applicable, are exempt
from the requirements of Sec. 64.6301 through June 30, 2022.
(d) Non-IP networks. Those portions of a voice service provider's
network that rely on technology that cannot initiate, maintain, and
terminate SIP calls are deemed subject to a continuing extension. A
voice service provider subject to the foregoing extension shall comply
with the requirements of Sec. 64.6303 as to the portion of its network
subject to the extension.
(e) Provider-specific extensions. The Wireline Competition Bureau
may extend the deadline for compliance with Sec. 64.6301 for voice
service providers that file individual petitions for extensions by
November 20, 2020. The Bureau shall seek comment on any such petitions
and issue an order determining whether to grant the voice service
provider an extension no later than March 30, 2021.
(f) Annual reevaluation of granted extensions. The Wireline
Competition Bureau shall, in conjunction with an assessment of burdens
and barriers to implementation of caller identification authentication
technology, annually review the scope of all previously granted
extensions and, after issuing a Public Notice seeking comment, may
extend or decline to extend each such extension, and may decrease the
scope of entities subject to a further extension.
0
8. Effective December 17, 2020, add Sec. 64.6305 to read as follows:
Sec. 64.6305 Robocall mitigation and certification.
(a) Robocall mitigation program requirements. (1) Any voice service
provider subject to an extension granted under Sec. 64.6304 that has
not fully implemented the STIR/SHAKEN authentication framework on its
entire network shall implement an appropriate robocall mitigation
program as to those portions of its network on which it has not
implemented the STIR/SHAKEN authentication framework.
(2) Any robocall mitigation program implemented pursuant to
paragraph (a)(1) of this section shall include reasonable steps to
avoid originating illegal robocall traffic and shall include a
commitment to respond fully and in a timely manner to all traceback
requests from the Commission, law enforcement, and the industry
traceback consortium, and to cooperate with such entities in
investigating and stopping any illegal robocallers that use its service
to originate calls.
(b)-(c) [Reserved]
0
9. Delayed indefinitely, amend Sec. 64.6305 by adding paragraphs (b)
and (c) to read as follows:
Sec. 64.6305 Robocall mitigation and certification.
* * * * *
(b) Certification and database. (1) Not later than the date
established in a document released by the Wireline Competition Bureau
establishing the Robocall Mitigation Database and portal (amending this
paragraph (b)), a voice service provider, regardless of whether it is
subject to an extension granted
[[Page 73396]]
under Sec. 64.6304, shall certify to one of the following:
(i) It has fully implemented the STIR/SHAKEN authentication
framework across its entire network and all calls it originates are
compliant with Sec. 64.6301(a)(1) and (2);
(ii) It has implemented the STIR/SHAKEN authentication framework on
a portion of its network and calls it originates on that portion of its
network are compliant with Sec. 64.6301(a)(1) and (2), and the
remainder of the calls that originate on its network are subject to a
robocall mitigation program consistent with paragraph (a) of this
section; or
(iii) It has not implemented the STIR/SHAKEN authentication
framework on any portion of its network, and all of the calls that
originate on its network are subject to a robocall mitigation program
consistent with paragraph (a) of this section.
(2) A voice service provider that certifies that some or all of the
calls that originate on its network are subject to a robocall
mitigation program consistent with paragraph (a) of this section shall
include the following information in its certification:
(i) Identification of the type of extension or extensions the voice
service provider received under Sec. 64.6304, if the voice service
provider is not a foreign voice service provider;
(ii) The specific reasonable steps the voice service provider has
taken to avoid originating illegal robocall traffic as part of its
robocall mitigation program; and
(iii) A statement of the voice service provider's commitment to
respond fully and in a timely manner to all traceback requests from the
Commission, law enforcement, and the industry traceback consortium, and
to cooperate with such entities in investigating and stopping any
illegal robocallers that use its service to originate calls.
(3) All certifications made pursuant to paragraphs (b)(1) and (2)
of this section shall:
(i) Be filed in the appropriate portal on the Commission's website;
and
(ii) Be signed by an officer in conformity with 47 CFR 1.16.
(4) A voice service provider filing a certification shall submit
the following information in the appropriate portal on the Commission's
website.
(i) The voice service provider's business name(s) and primary
address;
(ii) Other business names in use by the voice service provider;
(iii) All business names previously used by the voice service
provider;
(iv) Whether the voice service provider is a foreign voice service
provider; and
(v) The name, title, department, business address, telephone
number, and email address of one person within the company responsible
for addressing robocall mitigation-related issues.
(5) A voice service provider shall update its filings within 10
business days of any change to the information it must provide pursuant
to paragraphs (b)(2) through (4) of this section.
(c) Intermediate provider and voice service provider obligations.
Beginning ninety days after the deadline for certifications filed
pursuant to paragraph (b) of this section, intermediate providers and
voice service providers shall only accept calls directly from a voice
service provider, including a foreign voice service provider that uses
North American Numbering Plan resources that pertain to the United
States to send voice traffic to residential or business subscribers in
the United States, if that voice service provider's filing appears in
the Robocall Mitigation Database in accordance with paragraph (b) of
this section.
0
10. Effective November 17, 2020, add Sec. 64.6306 to read as follows:
Sec. 64.6306 Exemption.
(a) Exemption for IP networks. A voice service provider may seek an
exemption from the requirements of Sec. 64.6301 by certifying on or
before December 1, 2020, that, for those portions of its network served
by technology that allows for the transmission of SIP calls, it:
(1) Has adopted the STIR/SHAKEN authentication framework for calls
on the Internet Protocol networks of the voice service provider, by
completing the network preparations necessary to deploy the STIR/SHAKEN
protocols on its network including but not limited to participation in
test beds and lab testing, or completion of commensurate network
adjustments to enable the authentication and validation of calls on its
network consistent with the STIR/SHAKEN framework;
(2) Has agreed voluntarily to participate with other voice service
providers in the STIR/SHAKEN authentication framework, as demonstrated
by completing formal registration (including payment) and testing with
the STI Policy Administrator;
(3) Has begun to implement the STIR/SHAKEN authentication framework
by completing the necessary network upgrades to at least one network
element--e.g., a single switch or session border controller--to enable
the authentication and verification of caller identification
information consistent with the STIR/SHAKEN standards; and
(4) Will be capable of fully implementing the STIR/SHAKEN
authentication framework not later than June 30, 2021, which it may
only determine if it reasonably foresees that it will have completed
all necessary network upgrades to its network infrastructure to enable
the authentication and verification of caller identification
information for all SIP calls exchanged with STIR/SHAKEN-enabled
partners by June 30, 2021.
(b) Exemption for non-IP networks. A voice service provider may
seek an exemption from the requirement to upgrade its network to allow
for the initiation, maintenance, and termination of SIP calls and fully
implement the STIR/SHAKEN framework as required by Sec. 64.6301
throughout its network by June 30, 2021, and from associated
recordkeeping and reporting requirements, by certifying on or before
December 1, 2020, that, for those portions of its network that do not
allow for the transmission of SIP calls, it:
(1) Has taken reasonable measures to implement an effective call
authentication framework by either:
(i) Upgrading its entire network to allow for the initiation,
maintenance, and termination of SIP calls, and fully implementing the
STIR/SHAKEN framework as required in Sec. 64.6301 throughout its
network; or
(ii) Maintaining and being ready to provide the Commission on
request with documented proof that it is participating, either on its
own or through a representative, including third party representatives,
as a member of a working group, industry standards group, or consortium
that is working to develop a non-internet Protocol caller
identification authentication solution, or actively testing such a
solution; and
(2) Will be capable of fully implementing an effective call
authentication framework not later than June 30, 2021, because it
reasonably foresees that it will have completed all necessary network
upgrades to its network infrastructure to enable the authentication and
verification of caller identification information for all non-internet
Protocol calls originating or terminating on its network as provided by
a standardized caller identification authentication framework for non-
internet Protocol networks by June 30, 2021.
(c) Certification submission procedures. All certifications that a
voice service provider is eligible for exemption shall be:
(1) Filed in the Commission's Electronic Comment Filing System
(ECFS) in WC Docket No. 20-68, Exemption from Caller ID
[[Page 73397]]
Authentication Requirements, no later than December 1, 2020;
(2) Signed by an officer in conformity with 47 CFR 1.16; and
(3) Accompanied by detailed support as to the assertions in the
certification.
(d) Determination timing. The Wireline Competition Bureau shall
determine whether to grant or deny timely requests for exemption on or
before December 30, 2020.
(e) [Reserved]
0
11. Effective December 17, 2020, adding paragraph (e) to read as
follows:
Sec. 64.6306 Exemption.
* * * * *
(e) Implementation verification. All voice service providers
granted an exemption under paragraphs (a) and (b) of this section shall
file an additional certification consistent with the requirements of
paragraph (c) of this section on or before a date specified in a
document issued by the Wireline Competition Bureau (amending this
paragraph (e)) that attests to whether the voice service provider fully
implemented the STIR/SHAKEN authentication framework because it
completed all necessary network upgrades to its network infrastructure
to enable the authentication and verification of caller identification
information for all SIP calls exchanged with STIR/SHAKEN-enabled
partners by June 30, 2021. The Wireline Competition Bureau, after
issuing a Public Notice seeking comment on the certifications, will,
not later than four months after the deadline for filing of the
certifications, issue a Public Notice identifying which voice service
providers achieved complete implementation of the STIR/SHAKEN
authentication framework.
(1) If a voice service provider cannot certify to full
implementation upon the filing of this second certification, but
demonstrates to the Wireline Competition Bureau that:
(i) It filed its initial certification in good faith--i.e., with a
reasonable expectation that it would be able to achieve full
implementation as initially certified; and
(ii) It made a good faith effort to complete implementation, the
consequence for such a shortcoming is the loss of the exemption and the
application of the implementation requirements of Sec. Sec. 64.6301
and 64.6303, effective immediately upon release by the Wireline
Competition Bureau of the Public Notice identifying which voice service
providers achieved full implementation of the STIR/SHAKEN
authentication framework.
(2) If a voice service provider cannot certify to full
implementation upon the filing of this second certification, and the
Wireline Competition Bureau finds that the voice service provider filed
its initial certification in bad faith or failed to make a good faith
effort to complete implementation, then:
(i) The voice service provider is required to fully implement the
STIR/SHAKEN authentication framework immediately upon release by the
Wireline Competition Bureau of the Public Notice identifying which
voice service providers achieved full implementation of the STIR/SHAKEN
authentication framework; and
(ii) The Wireline Competition Bureau shall refer the voice service
provider to the Enforcement Bureau for possible enforcement action
based on filing a false initial certification.
0
12. Effective December 17, 2020, add Sec. 64.6307 to read as follows:
Sec. 64.6307 Line item charges.
Providers of voice service are prohibited from adding any
additional line item charges to consumer or small business customer
subscribers for the effective call authentication technology required
by Sec. Sec. 64.6301 and 64.6303.
(a) For purposes of this section, ``consumer subscribers'' means
residential mass-market subscribers.
(b) For purposes of this section, ``small business customer
subscribers'' means subscribers that are business entities that meet
the size standards established in 13 CFR part 121, subpart A.
[FR Doc. 2020-24904 Filed 11-16-20; 8:45 am]
BILLING CODE 6712-01-P