December 1, 2022

Volume XII, Number 335


December 01, 2022

Subscribe to Latest Legal News and Analysis

November 30, 2022

Subscribe to Latest Legal News and Analysis

November 29, 2022

Subscribe to Latest Legal News and Analysis

GROUNDBREAKING (IN A BAD WAY): New FCC NPRM Asks Whether SHAKEN/STIR Framework Can/Should be Applied to Texts and We ALL Just Rolled Our Eyes

Well here we go again.

After living through the outlandish roll outs first of caller attestation requirements, and then of the TCR and 10DLC registration–neither of which successfully prevent legitimate traffic from being blocked or labeled–the FCC appears to be on the cusp of imposing an entirely new certification process on SMS senders, this time based on the STIR/SHAKEN protocols applicable to voice traffic.

In a new NPRM out today–which is being covered for all the wrong reasons (more on that below)–the FCC asks a series of very telling (scary?) questions:

B. Applying Caller ID Authentication Requirements to Text Messages

28. In order to facilitate blocking for certain types of illegal texts, we seek comment on whether to require providers to implement caller ID authentication for text messages.

29. Industry technologists developed caller ID authentication—specifically, the STIR/SHAKEN framework for IP networks—to combat spoofing of voice calls. We seek comment on the progress of efforts to extend authentication to text messages. A working group of the Internet Engineering Task Force (IETF) is currently considering a draft standard regarding application of some components of the STIR/SHAKEN framework to text messages. What additional work needs to be done on the draft standard currently under consideration? How long might it take to complete such work? Beyond that document, what if any additional standards work is necessary before authentication for text messages is operational?

30. Would the current STIR/SHAKEN governance system be able to accommodate authentication for text messages, or would it need to be modified or a new governance system established? Once standards work is sufficiently complete, what steps must providers take to implement authentication for text messages in their network? Can existing network upgrades to meet the June 30, 2021, STIR/SHAKEN implementation mandate for voice calls be used in whole or in part to support authentication for text messages? Or would authentication for text messages require more comprehensive technological network upgrades? If so, what is the estimated amount of time it would take to install the technology and what would be the projected costs?

31. We tentatively conclude that providers should implement caller ID authentication for text messages. We believe such a requirement would spur standards groups to complete development of standards promptly. Do commenters agree? What timeline should we establish for implementation that accounts for the time needed both to finish standards and for providers to perform any necessary network upgrades? Would two years be sufficient time to complete standards development and implement necessary technology? Should we instead require providers to implement caller ID for text messages when technically feasible, without setting a time-certain deadline? If so, how should we define “technically feasible”? Would this approach better account for uncertainty in the development process? Would it create a perverse incentive to delay development?

What do you think TCPAWorld? Fun? Smart? Thoughts?


Feels like a lot of needless pain being inflicted here because the issue with spam texts isn’t–by and large–a lack of accurate transmission of the source of the texts. It is largely an issue of consumers signing up for messages they didn’t really want to sign up for–i.e. more consumer empowerment needed–or texts being sent that are entirely legal–i.e. P2P messages for non-marketing (political?) purposes–that consumers may not want but that are, nonetheless, completely legal.

Forcing folks who are responsible members of the SMS ecosystem to jump through yet another set of wild hoops to send texts is NOT what this country needs. Bad idea. Don’t do it.

And I must say–the current state of telecom law in this nation is already abysmal. Access to the CRITICAL carrier networks–which used to be assured to all Americans–is now subject to roadblocks and speed bumps and outages imposed by ad hoc decision-making by single individuals within large carrier enterprises. Whether your traffic gets through literally depends who is manning the levers that day and what they had for breakfast. IT IS NUTS!

And obviously this proposal seems certain to make things even worse.

So it’ll probably pass.

But none of this will be discussed in the mainstream media because the idea of a completely ILLEGAL and UNCONSTITUTIONAL licensing scheme limiting free speech doesn’t bother anyone anymore. What we care about is blocking robotexts!

Of course the order is getting covered because it also compels carriers to block text messages originating from fake numbers. Not exactly groundbreaking though:

we propose to require mobile wireless providers to block texts, at the network level, that purport to be from invalid, unallocated, or unused numbers, and numbers on a Do-Not-Originate (DNO) list.

I mean, yeah sure. great. But why not just leave it there? Why try to destroy access to the entire SMS universe?

I love how this works though. DC can never just give the people something good without inflicting a greater or equal amount of pain.

Read the proposal here.

© 2022 Troutman FirmNational Law Review, Volume XII, Number 271

About this Author

Eric Troutman TCPA Lawyer Troutman Law Firm Orange County, CA

Eric J Troutman is known as one of the country’s prominent class action defense lawyers and is nationally recognized in Telephone Consumer Protection Act (TCPA) litigation and compliance. He has served as lead defense counsel in more than 70 national TCPA class actions and has litigated nearly a thousand individual TCPA cases in his role as national strategic litigation counsel for major banks and finance companies. Eric also helps industry participants build TCPA-compliant processes, policies, and systems.

Eric's perspective allows him to...