{"id":13457,"date":"2018-09-27T12:10:03","date_gmt":"2018-09-27T20:10:03","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/09\/27\/news-7224\/"},"modified":"2018-09-27T12:10:03","modified_gmt":"2018-09-27T20:10:03","slug":"news-7224","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/09\/27\/news-7224\/","title":{"rendered":"Phone spampocalypse: fighting back in the age of unwanted calls"},"content":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Thu, 27 Sep 2018 18:58:27 +0000<\/strong><\/p>\n<p>When Nigel Guest, then president of the Council of Neighborhood Associations (CNA), sent an email with the subject line, \u201ctest,\u201d and the small letter \u201cx\u201d in its message body, the city of Berkeley, CA, went into a frenzy. You see, Mr. Guest <em>thought<\/em> he sent it only to himself, but he actually posted that terse email by accident to thousands of registered voters in the area. And thus, what is now known to locals as the Berkeley Spampocalypse was born.<\/p>\n<p>Some were understandably annoyed, angry\u2014even threatening\u2014while others took it with grace. Those in the latter group were able to organize <a href=\"https:\/\/www.berkeleyside.com\/2015\/03\/24\/berkeley-email-spam-mishap-spawns-community-spirit\" target=\"_blank\" rel=\"noopener\">a potluck picnic<\/a>\u00a0they called \u201cCNA Survivor Picnic\u201d that weekend at Ohlone Park. 70 residents turned up, had a blast, and capped off the event by handing Mr. Guest a can of Spam as a thank-you gift.<\/p>\n<p>Granted, not many spam stories have a happily ever after. In fact, many of us know that a positive outcome like typically doesn\u2019t happen at all. When it comes to spam, faces flush red, pupils dilate, and people force a smile behind gritted teeth.<\/p>\n<p>Bulk unwanted email spam was once the bane of society before the technology of filtering was introduced. Although email spam can still cost someone else&#8217;s productivity, we can genuinely say that at this point in time, we have, at least, come to manage bulk email spam.<\/p>\n<p>Sadly, we can&#8217;t say the same about phone spam.<\/p>\n<h3>Spampocalypse reborn<\/h3>\n<p>Users have found themselves at war with a constantly burgeoning trend of unwanted calls that plagues smartphones, traditional landlines, and VoIP devices. And while there are tools to help consumers address robocalls, scam calls, and spoofed calls, contrary to popular opinion, US telecommunications companies have the technology to protect customers themselves\u2014they just haven&#8217;t done it yet.<\/p>\n<p>To this day, some of these companies are still <a href=\"https:\/\/www.consumerreports.org\/consumerist\/phone-companies-can-filter-out-robocalls-they-just-arent-doing-it\/\" target=\"_blank\" rel=\"noopener\">hemming and hawing<\/a> about aggressively block robocalls, putting technology on the back burner. Another roadblock to the adoption of new blocking technologies is the existence of legacy phone systems that may not be up to the task. As a result, addressing the robocall problem is left mostly in the hands of consumers.<\/p>\n<p>But the spam problem isn&#8217;t going to go away on its own.\u00a0According to <a href=\"https:\/\/www.washingtonpost.com\/technology\/2018\/09\/19\/nearly-half-cellphone-calls-will-be-scams-by-report-says\/\" target=\"_blank\" rel=\"noopener\">a report from First Orion<\/a>, a company that provides call blocking, by 2019 almost half of cellphone calls in the US will be scams. We\u2019re also seeing a <a href=\"https:\/\/www.washingtonpost.com\/technology\/2018\/06\/25\/those-chinese-language-robocalls-are-scam-get-your-bank-information-officials-say\/?utm_term=.150826dcda46\" target=\"_blank\" rel=\"noopener\">new and emerging trend of non-English speaking robocallers<\/a>\u00a0targeting immigrant communities. Thankfully, lawmakers have taken note of the rising tide of phone spam and decided to do something about it.<\/p>\n<h3>The long arm of the law<\/h3>\n<p>Many might feel that the fight is like David (stone and slingshot in hand) versus 10 Goliaths in chariots, but what users must realize is that they are not alone.<\/p>\n<hr \/>\n<p style=\"text-align: center\"><em> Read: <\/em><a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/02\/stop-telephoning-me-robocalls-explained\/\" target=\"_blank\" rel=\"noopener\"><em>Stop telephoning me-eh-eh-eh-eh: robocalls explained<\/em><\/a><\/p>\n<hr \/>\n<p>Regulators and lawmakers have long recognized that consumers cannot solve this seemingly impossible problem. After all, they are just as affected by the deluge of unwanted calls as the average Joe, and have similarly witnessed the consistent surge of phone spam over the last few years. Thus, several new legislation and rules have been passed and\/or introduced to help address robocalls and other illegal calls. They include:<\/p>\n<h4>DNO list<\/h4>\n<p>In the fourth quarter of 2017, the FCC approved <a href=\"https:\/\/www.fcc.gov\/document\/fcc-adopts-rules-help-block-illegal-robocalls-0\" target=\"_blank\" rel=\"noopener\">rules<\/a> that authorize voice service providers\u2014mobile phone carriers, landline carriers, and VoIP carriers\u2014to instantly block telephone numbers in a \u201cDo-Not-Originate\u201d (DNO) list. A DNO is a set of phone numbers that do not or cannot make outgoing calls. The nature of calls received from numbers that belong in the DNO are always fraudulent, and instantly blocking them can curb unwanted calls. While those in the telecommunications profession agreed that a DNO list would help, they also believed that <a href=\"https:\/\/www.consumerreports.org\/robocalls\/block-robocalls-new-fcc-rules\/\" target=\"_blank\" rel=\"noopener\">scammers would eventually find a way around it<\/a>.<\/p>\n<h4>RAY BAUM&#8217;S Act<\/h4>\n<p>Officially designated as H.R. 4986, the Repack Airwaves Yielding Better Access for Users of Modern Services, or <a href=\"https:\/\/energycommerce.house.gov\/news\/press-release\/walden-blackburn-house-passage-ray-baums-act\/\" target=\"_blank\" rel=\"noopener\">RAY BAUM\u2019S Act<\/a>, gives power to the Federal Communications Commission (FCC) to strengthen the US\u2019s critical telecommunications services and increase the deployment of <a href=\"https:\/\/searchnetworking.techtarget.com\/definition\/5G\" target=\"_blank\" rel=\"noopener\">5G<\/a>. RAY BAUM\u2019S Act, which was passed in March 2018, is also meant to \u201cadvance proposals that would help the FCC and law enforcement protect consumers from fraudulent telephone calls, and to educate Americans about their options to stop these illegal calls.\u201d<\/p>\n<h4>Florida Call-Blocking Act<\/h4>\n<p>Bill number CS\/HB 1267, or the\u00a0<a href=\"https:\/\/www.myfloridahouse.gov\/Sections\/Bills\/billsdetail.aspx?BillId=62534\" target=\"_blank\" rel=\"noopener\">Florida Call-Blocking Act<\/a>, gives power to telecommunications service providers to block calls from bogus numbers, spoofed numbers, and numbers that impersonate local numbers. It also authorizes telecoms to stop blocking certain calls, such as emergency calls.<\/p>\n<h4>ROBOCOP Act<\/h4>\n<p>The Repeated Objectionable Bothering Of Consumers On Phones, or <a href=\"https:\/\/www.govtrack.us\/congress\/bills\/115\/s2705\" target=\"_blank\" rel=\"noopener\">ROBOCOP Act<\/a>, if passed, will give more power to telecom customers to pick and choose the type of calls they want to receive and block. It will also give users the right to take legal action against telecoms that violate this act. Telecoms will also be required to verify the accuracy of caller IDs and offer free, optional robocall-blocking technology to their customers.<\/p>\n<p>In an April 2018 blog post, Contact Center Compliance noted that <a href=\"https:\/\/www.dnc.com\/news\/robocop-act-creates-roadblock-debt-collectors\" target=\"_blank\" rel=\"noopener\">the ROBOCOP Act may do harm<\/a> to legitimate debt collectors and to those reliant on collection calls. As we all know, consumers aren\u2019t particularly keen on receiving calls from debt collectors. The ROBOCOP Act would make it easy to simply block them and forget their troubles.<\/p>\n<h3>Mitigate, mitigate, mitigate<\/h3>\n<p>Since the publication of our <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/02\/stop-telephoning-me-robocalls-explained\/\" target=\"_blank\" rel=\"noopener\">last post on robocalls<\/a>, additional technologies and strategies have resurfaced that some consumers use and swear by their success in blocking unwanted calls. The list below supplements the mitigation steps we have already provided:<\/p>\n<p>Consider using a <a href=\"https:\/\/voice.google.com\/about\" target=\"_blank\" rel=\"noopener\">Google Voice<\/a> number to screen and forward calls. Google Voice has been around for almost a decade, and users have found that using Google\u2019s free phone number as their primary number instead of their real number has helped <a href=\"https:\/\/www.digitaltrends.com\/mobile\/google-voice-spam-filtering\/\" target=\"_blank\" rel=\"noopener\">filter out unwanted calls<\/a>. Unfortunately, Google Voice is only available in the US. Google advises that those outside the US can use Hangouts.<\/p>\n<p>Use your phone\u2019s \u201cDo Not Disturb\u201d feature. Doing so, in effect, will whitelist calls from your contacts and block everything else. You can do this on iOS by opening the Settings app, flipping on Do Not Disturb\u2014don\u2019t give it a schedule\u2014and then tap \u201cAllow Calls From\u201d and pick \u201cAll Contacts.\u201d On <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/android\/\" target=\"_blank\" rel=\"noopener\">Android<\/a>, you can do this by going to Settings &gt; Sound &gt; Do Not Disturb.<\/p>\n<p>Note that while this is a blanket workaround, it might be wise to regularly add numbers you trust, such as those used by your child\u2019s school, to your contact list to avoid missing any important calls from them. And remember: calls from potential employers, doctor&#8217;s offices, or anyone with a phone number that hasn&#8217;t been entered in your contacts list will not get through to you.<\/p>\n<p>Android also has <a style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif\" href=\"https:\/\/support.google.com\/phoneapp\/answer\/3459196?hl=en\" target=\"_blank\" rel=\"noopener\">a built-in caller ID &amp; spam feature<\/a><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif\">\u00a0that you may want to enable.<\/span><\/p>\n<p>Consider using an external robocall-blocking device. Traditional landline and VoIP phone users may find these nifty gadgets helpful. If you\u2019re wondering what these devices are, Consumer Reports already has\u00a0<a href=\"https:\/\/www.consumerreports.org\/cro\/magazine\/2015\/07\/robocall-blocker-review\/index.htm\" target=\"_blank\" rel=\"noopener\">a review<\/a> out for specific products you can start off with, like CPR Call Blocker Protect (a device geared towards more vulnerable users like those who have Alzheimer&#8217;s), Nomorobo, Digitone Call Blocker Plus, HQTelecom.com Landline Call Blocker, and Sentry Dual Mode Call Blocker.<\/p>\n<p>Think about purchasing a phone spam-blocking security app for your smartphone, such as <a href=\"https:\/\/www.malwarebytes.com\/ios\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes for iOS<\/a>\u00a0or <a href=\"https:\/\/www.malwarebytes.com\/android\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes for Android<\/a>, both of which will block spammy or malicious text messages as well.<\/p>\n<p>Get ready for STIR and SHAKEN. STIR (Secure Telephone Identity Revisited) and SHAKEN (Signature-based Handling of Asserted information using toKENs) is a standard created and currently being tested by the <a href=\"https:\/\/www.atis.org\/\" target=\"_blank\" rel=\"noopener\">Alliance for Telecommunications Industry Solutions (ATIS)<\/a>. The general idea of STIR\/SHAKEN is borrowed from the textbook of modern cryptography. New York Magazine <a href=\"https:\/\/nymag.com\/selectall\/2018\/05\/how-to-stop-spam-robocalls-with-stir-shaken.html\" target=\"_blank\" rel=\"noopener\">has illustrated<\/a> what this would look like once implemented, and we have duplicated it below for your convenience:<br \/> <em><br \/> Someone would place an outbound call. That call would contain a certificate verifying that the call is indeed coming from the number it claims to be coming from. The phone call is passed along to the incoming carrier (e.g., AT&amp;T), which would then check the certificate&#8217;s public key against a heavily encrypted private key. A policy administrator, run by the telecom industry with oversight from the FCC, would be in charge of handing out certificates and making sure everything is on the level.<br \/> <\/em><br \/> While the technology has yet to take off, some of the downsides of STIR\/SHAKE are already identified. For one, STIR\/SHAKE can only work in the US, and robocalling is a global problem. It may also take time for all US carriers to adapt to the new system, and if they do, it could cost them millions. As such, it\u2019s likely that they would pass along the cost to existing customers. Lastly, malicious callers could get and use a verified number to call their targets, the same way phishers use HTTPS certificates to make their phishing sites more believable.<\/p>\n<h3>When the dust settles<\/h3>\n<p>More unwanted call tactics will spring up in the future, no doubt\u2014experience has taught us to expect it. Thankfully, we see a lot more movement from regulators, law enforcement, and several telecoms and private companies to address the problem of unwanted calls.<\/p>\n<p>It\u2019s great to know we\u2019re not entirely defenseless in this fight against phone spam. So, let\u2019s make use of the tools available to us, take advantage of protection services offered by your phone provider, and continue to hold telecom companies accountable for preemptively blocking unwanted calls. Remember that the dust will settle eventually. And if we really think happy thoughts, maybe there\u2019ll be a potluck picnic for survivors of unwanted calls, too.<\/p>\n<p>Additional reading:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.comparitech.com\/blog\/vpn-privacy\/phone-spam-case-study-data\/\" rel=\"noopener\">Case study: 365 days of phone spam shows just how bad it\u2019s getting<\/a><\/li>\n<li><a href=\"https:\/\/eu.usatoday.com\/story\/tech\/2018\/07\/06\/robocalls-top-10-scams-led-fake-comcast-capital-one-calls\/759945002\/\" rel=\"noopener\">Comcast or Capital One calling? It may be a robocall scam. Here are the top 10<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/09\/phone-spampocalypse-fighting-back-in-the-age-of-unwanted-calls\/\">Phone spampocalypse: fighting back in the age of unwanted calls<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/09\/phone-spampocalypse-fighting-back-in-the-age-of-unwanted-calls\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Thu, 27 Sep 2018 18:58:27 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/101\/2018\/09\/phone-spampocalypse-fighting-back-in-the-age-of-unwanted-calls\/' title='Phone spampocalypse: fighting back in the age of unwanted calls'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/09\/shutterstock_30799204.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>US telecommunications companies have the technology to protect customers against the rising tide of unwanted calls\u2014they just haven&#8217;t done it yet. So it&#8217;s up to lawmakers and consumers themselves to fight back against phone spampocalypse. Here&#8217;s how they&#8217;re doing it.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/\" rel=\"category tag\">101<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/fyi\/\" rel=\"category tag\">FYI<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/berkley\/\" rel=\"tag\">Berkley<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/call-blocking-act\/\" rel=\"tag\">call-blocking act<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cna\/\" rel=\"tag\">CNA<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/dno\/\" rel=\"tag\">DNO<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/dno-list\/\" rel=\"tag\">DNO list<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mitigate\/\" rel=\"tag\">Mitigate<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/nigel-guest\/\" rel=\"tag\">Nigel Guest<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phone-spam\/\" rel=\"tag\">phone spam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ray-baums-act\/\" rel=\"tag\">RAY BAUM&#8217;S Act<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/robocalls\/\" rel=\"tag\">robocalls<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/robocop-act\/\" rel=\"tag\">ROBOCOP Act<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spam\/\" rel=\"tag\">spam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spampocalypse\/\" rel=\"tag\">spampocalypse<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/unwanted-calls\/\" rel=\"tag\">unwanted calls<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/101\/2018\/09\/phone-spampocalypse-fighting-back-in-the-age-of-unwanted-calls\/' title='Phone spampocalypse: fighting back in the age of unwanted calls'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/09\/phone-spampocalypse-fighting-back-in-the-age-of-unwanted-calls\/\">Phone spampocalypse: fighting back in the age of unwanted calls<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10519,19605,19606,19607,19608,19609,10520,19610,19611,19612,19613,12789,19614,10518,19615,19616],"class_list":["post-13457","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-10519","tag-berkley","tag-call-blocking-act","tag-cna","tag-dno","tag-dno-list","tag-fyi","tag-mitigate","tag-nigel-guest","tag-phone-spam","tag-ray-baums-act","tag-robocalls","tag-robocop-act","tag-spam","tag-spampocalypse","tag-unwanted-calls"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13457","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13457"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13457\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13457"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13457"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}