Trade Law Daily is a Warren News publication.

Comments Seek FCC Flexibility in SIM Fraud Prevention

Don't get too prescriptive in rules to prevent SIM swap and port-out fraud, telecom interests said in FCC docket 21-341 replies that were due Tuesday. Comments last month requested flexibility (see 2111160036). Local number portability administrator (LNPA) interests said they…

Sign up for a free preview to unlock the rest of this article

Timely, relevant coverage of court proceedings and agency rulings involving tariffs, classification, valuation, origin and antidumping and countervailing duties. Each day, Trade Law Daily subscribers receive a daily headline email, in-depth PDF edition and access to all relevant documents via our trade law source document library and website.

don't have a role in verifying subscribers' identities. Saying the record doesn't show that SIM swap and port-out fraud is widespread, CTIA said the commission should expand its list of “secure authentication method" examples. "Enshrining authentication requirements into rigid regulations is not an effective way to fight the bad actors behind these fraudulent schemes," it said. It opposed prescribing specific authentication methods or being rigid in authentication requirements. Opus Research urged looking at other authentication methods, such as voice biometrics. Carrier Bandwidth said creating rules solely oriented to wireless services and numbers is "unlikely to effectuate the Commission’s stated objectives." It said the FCC should "lead the industry to develop and adopt improved competitively neutral text enablement methods and procedures that are consistent with established solutions in the toll free texting space." North American Portability Management said the agency should reject proposals for the LNPA to play a role in disputes between carriers and in identification of numbers. Iconectiv said the Number Portability Administration Center service management service and LNPA aren't involved in the pre-port process, nor do they have access to customer information, and thus don't have a role in identification of a customer or the request and response of information exchanged between current and new service providers.