Contact us today!

Network Solutions Unlimited Blog

Those Irritating Spam Calls May Not Last Much Longer

Those Irritating Spam Calls May Not Last Much Longer

While the phone is still a useful communication tool, it lately has been the cause of a large amount of stress from businesses and users alike. While caller ID was once also a useful tool to help stop spam calls, we now cannot trust the numbers it provides. Letting personal calls go to voicemail to check them is one thing, but a business shouldn’t do that. What can they do?

With any luck, it won’t be long before they won't have to do anything.

These kinds of scams are terribly familiar by now.

At this point, most people have encountered this scam in one of two ways.

Many have been a recipient of a scam call. They’ll have their phone ring, and habitually checked the caller ID. Seeing that the call came from a local number, and possibly even one they knew, they’ve answered with a “Hello?” However, instead of a familiar voice returning the greeting, they are answered with a brief pause, followed by a prerecorded message.

Only one thing is certain: that call didn't come from a local number, much less someone the user knew.

Many have also received unexpected calls from furious people, spitting fire as they rage about being called, repeatedly, from “this number!” even though no calls were ever made.

How often have you experienced either, or heard that it happened to someone you know?

You aren’t the only one to fall for this scam, perpetrated by clever scammers.
These calls have exploded in popularity, as scammers have found some way to cheat the system and leverage its flaws. This has enabled them to defy the controls put in place by the FCC (the Federal Communications Commission).

The FCC has already tried to end these calls by utilizing the 2017 Call Blocking Order. This order gave telephone providers the ability to block calls that they identified as fraudulent, judged based on assorted criteria. These criteria included invalid numbers and numbers that weren’t assigned to a service. Unfortunately, these rules didn’t impede robocall scams for nearly as long as we would have liked.

Instead, now we have neighbor spoofing, which has proved to be a very real annoyance to a huge segment of the population. Chances are, you’ve been involved with one of these calls, and if you’ve been lucky enough to avoid them, someone close to you have experienced their effects.

Of course, before we continue, it would help to explain what “neighbor spoofing” is.

Caller ID is a common enough thing now that many people have gotten in the habit of checking the number before they answer the phone. The rule of thumb essentially dictated that a local number was safe to answer.

Unfortunately, neighbor spoofing has broken that rule, and makes it feel like our thumbs are broken with it.

Spammers have largely abandoned calling from fake numbers, and now make their calls utilizing an actual, in-service number from the target’s area. In some cases, people have thought their neighbors were calling them, but it turned out to be another instance of neighbor spoofing. Of course, this tactic has had the added effect of people receiving actual, angry calls from people, raging about the calls they have repeatedly received from the person’s number, that person’s number having been spoofed.

Some people have even seemed to have their phone call itself, supposedly as the phone company’s method of reaching them to “verify a hacked account.”

Neighbor spoofing is now immensely popular because the protections currently enacted to stop scam calls are effectively fooled, just like a human target would be, and renders the Do Not Call list ineffective.

While some apps may help, they don’t come without concerns as well.

Smartphone application developers have released titles that are meant to stop robocalls in their tracks. RoboKiller, one of these apps, takes a twofold approach.

RoboKiller’s first step is to block all calls that come from the application’s list of confirmed spam numbers. It goes a step further by actually analyzing the audio ‘fingerprint’ of the call, and with a patented process, compares it to the fingerprints of known spam calls. No matter where this call originates, Robokiller steps in. If it wasn’t for the app’s notification, you’d never know about it.

Robokiller goes one step further by taking over the spam call itself, occupying the scammer and wasting their time with a prerecorded message.

Using the app, you can then go and review the blocked calls by listening to a recording that RoboKiller saves. If one turns out to be a false positive (like a friend’s number that was spoofed by a robocall, for instance) the user can whitelist that number by pressing Allow.

Going another step further, RoboKiller allows users to add numbers to a permitted callers list. This means that these calls will always come through, whether or not they were spoofed, so you won’t risk blocking an important call just because that number had been spoofed before.

RoboKiller ($2.99 per month, $24.99 for an annual subscription) describes itself thusly: “With RoboKiller, you don’t stop neighbor spoofing. You take action in the fight against the robocall epidemic.”

This doesn’t mean that this method of fighting robocalls doesn’t bring up some additional worries.

Let’s consider the cost of admission, first - and this isn’t in reference to the $2.99 price of the app. Instead, it’s referencing the need of the much larger cost of a smartphone. Many people with a mobile device still don’t use smartphones, especially among older generations. It isn’t as though these users can download the app.

Even some of the smarter devices that people still use may not be compatible with the requirements that an app presents - and even if they are, some groups may not fully understand how an app works.

These all could prevent someone from usefully utilizing an application, but with any luck, it won’t be a concern for very much longer.

It’s gotten bad enough that the US federal government is stepping in further.

Shortly after the release of the 2017 Call Blocking Order, the attorneys general from 40 states assembled into the Robocall Technologies Working Group. This bipartisan commission intended to work alongside service providers so that robocalls could be better understood and ultimately neutralized.

35 of those attorneys general signed a letter to the FCC on October 8th. This letter made it clear that law enforcement would not be capable of stopping the abuse of spam calls alone. They outlined their position with some facts that provide a better look at the actual size of this problem:

  • In 2017, there were a total of 30.5 billion illegal robocalls placed, up from 2016 estimates of 29.3 billion.
  • Projections for 2018 place the total at year’s end to be close to 40 billion.
  • $9.5 billion was stolen through phone scams in 2017.
  • In August of 2018, there were 4 billion illegal robocalls placed, 1.8 billion of them being scam attempts.

Clearly, these calls are a big problem. Big enough that the Federal Communications Commission has delivered an ultimatum to mobile providers: come up with a standardized system to stop these calls within the next year, or we will.

In the letter that introduced this, FCC Commissioner Ajit Pai demanded that the telecoms create a system that used call authentication to stop any illegitimate calls, with source verification stopping all spoofed calls in their tracks. This system was even given a title by the FCC: the SHAKEN/STIR network (Secure Handling of Asserted information using toKENs/Secure Telephone Identity Revisted).

These demands were sent to the press, as well as to the CEOs of 14 telecom companies, some of which being:

  • John Donovan, of AT&T
  • John Legere, of T-Mobile
  • Sundar Pichai, of Google
  • Brian Roberts, of Comcast
  • Tom Rutledge, of Charter
  • Hans Vesterburg, of Verizon

The attorneys general approved of these actions, urging the FCC “to implement additional reforms, as necessary, to respond to technological advances that make illegal robocalls and illegal spoofing such a difficult problem to solve.” They went on to state the following:

“Only by working together, and utilizing every tool at our disposal, can we hope to eradicate this noxious intrusion on consumers’ lives.”

Luckily, this won’t exactly hurt businesses, either.

In the meantime, the robocalls will have to continue, just as other detriments to your business’ productivity and security will. However, as far as those other detriments are concerned, there is another option to help stop them. Network Solutions Unlimited has the solutions and experience using them to help you achieve and retain optimal operating conditions, including the security to keep most threats out. Call us at 217-428-6449 to learn more.

Tip of the Week: How to Dominate OneNote
This Scammer Raid Proves Just How Useful Monitorin...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, March 20 2019

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Samsung Google Maps End of Support Patch Management Monitors Worker Administration Google Drive Public Cloud Applications Disaster Recovery SMB intranet Entertainment Miscellaneous Collaboration iPhone CrashOverride Save Time Downtime WiFi Network Office Two Factor Authentication Automation Spam Blocking Peripheral Data Theft Managing Stress OneNote Spam Redundancy Video Games Emails IT Solutions Streaming Media Windows 10 Saving Time Tech Term Payment Cards Efficiency Training Productivity Information Technology Co-Managed Services Saving Money Solid State Drive Virtual Private Network Computers Mobile Device Management Automobile HaaS WannaCry Chromebook Tech Support Data Protection Instant Messaging Hacking Blockchain Vendor Management PDF Websites Humor Windows Ink Alert Memory Upgrades Internet of Things Data Storage Company Culture Black Market Internet Exlporer Facebook Computing Holiday Books Benefits Management Devices Education Transportation Flexibility BYOD Reputation Telephone Internet exploMicrosoft Access Control History Language Government Battery Unified Communications Encryption IT Service Content Sync Wireless Technology IT Services Windows 10s Backup Private Cloud The Internet of Things HIPAA Customer Legal Audiobook Gamification Hyperlink Business Fraud Commerce Testing Security Computer Fan Meetings Unsupported Software Smartphone Public Computer Dark Web Hardware Users Webinar Operating System Television Touchscreen Licensing Best Practice Scam Audit Outlook Virtual Assistant User Error IT solutions Smart Tech Retail Physical Security Law Enforcement Sports Microsoft Office Employer Employee Relationship Mobile Internet Wasting Time Identity Data storage Data Management Computer Care Two-factor Authentication Accessory Mobility VPN Employee Cast Information Spyware Maintenance Human Resources Electronic Medical Records Screen Mirroring Vendor Files Backup and Disaster Recovery eWaste Wi-Fi Students Wasting Money Cleaning Chrome Upgrade Mobile Device Risk Management Google Assistant Professional Services Managed Service Provider Printers Google IT Support Social Engineering iOS Managed IT Services Microsoft Excel Tip of the Week Save Money Adobe Work/Life Balance Search MSP Proactive IT Office 365 Cloud Lifestyle Hackers Computer Forensics HBO Excel Software as a Service Recovery Google Docs Compliance Data Backup Data Recovery Apps Computing Infrastructure Employer-Employee Relationship How to Comparison Microsoft Word BDR File Storage Hard Disk Drive Small Business Passwords Regulation Relocation Nanotechnology hacker Managed IT Experience Business Owner Root Cause Analysis Hosted Solution Worker Commute Unified Threat Management Mobile Devices Business Technology Update Workers Cybersecurity Phishing Computer Accessories Analysis Communication Bandwidth Financial Technology WPA3 Business Management Data Privacy Server How To Managed IT Services Touchpad Hiring/Firing Proactive Monitoring Troubleshooting Twitter Technology Identity Theft Business Computing Budget Vulnerability Ciminal Content Filter Congratulations Business Continuity Gadgets Cloud Computing NFL User Tips Cache App Alexa for Business Business Intelligence Paperless Office Advertising Techology Android Data Security Cost Management Managed IT Service Thank You SaaS Network Security Marketing FAQ Smartphones Mobile Security Credit Cards Storage Assessment Hosted Solutions Bring Your Own Device Social Media Device Security Smart Technology WIndows Server 2008 Identities Machine Learning Microsoft PowerPoint Virtualization Chromecast Data IoT Managed Service Networking Windows 10 Projects Settings VoIP Productivity Keyboard Charger E-Commerce Hard Drive Hybrid Cloud Ransomware Laptop Emergency Value Loyalty Printing Project Management Office Tips Remote Computing Gifts Gmail App store Personal Information Wireless Innovation USB Password Robot Phone System Shortcut Best Practices Privacy Windows 7 IT budget Politics Remote Monitoring Break/Fix Malware Cortana Word Sales Virus Utility Computing Money Connectivity Bluetooth Tablets Edge Scalability Communications Going Green Hard Drives Rootkit Health Camera Safety Telephone Systems Evernote Travel Shadow IT Quick Tips Artificial Intelligence Outsourced IT Data Loss Medical IT Conferencing Document Management File Sharing Amazon Computer Financial Software Virtual Reality Windows Analytics IT Management Monitor Cybercrime Browser Application Remote Workers Email Avoiding Downtime Apple Colocation Data Breach Router Security Cameras Legislation Content Filtering Keyboard Shortcuts Workplace Tips Augmented Reality Firewall Payroll Updates Big Data IT Support Wireless Internet Display Wireless Charging Specifications Consultant Admin Antivirus Employee-Employer Relationship