Studies user and network capabilities to control, report, and review spoofed calls, including user feedback mechanisms.
View the full specification with interactive table of contents, version history, and AI analysis.