Softpanorama

May the source be with you, but remember the KISS principle ;-)
Home Switchboard Unix Administration Red Hat TCP/IP Networks Neoliberalism Toxic Managers
(slightly skeptical) Educational society promoting "Back to basics" movement against IT overcomplexity and  bastardization of classic Unix

Fighting phone spam

News Recommended Links Working with computer sound VOIP Humor Etc

Many VOIP systems allow you block set of numbers that you extract from the logs. To determine whether the number is "toxic" you can use Reverse Phone Lookup

About CheckWhoCalled.com

CheckWhoCalled.com is a community supported reverse phone directory. Every time you receive a call from an unknown number, leave a comment and help others prevent unwanted phone calls.

Check Who Called is a free reverse phone lookup created by you! Every time you receive a phone call from a telemarketer, a business, or your grandmother, leave a quick note about it and help us create the most informative reverse phone directory.

616-613-5921 - 6166135921 Reverse Phone Lookup

201-499-0217 - 2014990217 Reverse Phone Lookup

616-613-2229 - 6166132229 Reverse Phone Lookup

Fighting Phone Spam - Washington Post

 

800notes.com

800notes is a FREE REVERSE PHONE NUMBER LOOKUP database built by YOU, its users. Our strength is in our numbers - by sharing pieces of information each of us has we are putting together a free and public phone number directory with information no other service can provide.

Who calls from 877-611-1815

  • Wow - "Carrie Smith" sure is busy!  Typical set up.  Asking help to locate so-and-so. Different number to call back 877-489-1148. No company name left,  Called over holiday to see if voicemail would id company. Was ESCBA.
  • Payin
    ATTENTION - LET ME MAKE A CORRECTION... I received a call from the same # you guys are reporting... but when I called back they did not say CCA they said EOCCA....So google who the hell is EOCCA and report it.  I already did.

    I called back and the girl Connie said they were a call center and did not answer my questions about their company, she just took the defensive attitude asking for my phone number over and over again. Then our call was hung up by her.  "She did say, I cannot speak to you since you are not giving me your number, you are just giving me the run around and I will terminate the call."
  • Melinda
    Got a automated call saying they were a debt collection agency & I needed to call this number.  When I returned the call, the person I spoke with said they were trying to contact (saying the name).  I told her that a lot of companies called looking for this person, that I didn't know this person, and I'd had this phone number for a little over 2 years.  The person at this agency said she would void my number.  We'll see if it works or if the file just gets bought by some other debt collection agency.
    Caller: EOS CCA

    Call Type: Debt Collector

 


Top Visited
Switchboard
Latest
Past week
Past month

NEWS CONTENTS

Old News ;-)

The Rise of Bullshit Jobs " naked capitalism

Geoff says:

August 22, 2013 at 11:35 am

"I can't imagine how a telemarketer can get anyone to talk to them"…….except when they call my house.

I look upon it as an opportunity to harvest information from them for my notebook and to radicalize them.

"You are getting benefits aren't you?" If a Filipino, "In America telemarketers make at least fifteen dollars an hour. How much you making?"

You work for XYZ company? Do you know how much their CEO is making?

The ultimate subversion: I refer the articulate American telemarketers to this website and tell them to read it to find out how they are being exploited and to tell all their friends!

Fighting Spam Callers on the iPhone - David Smith

This is the strategy I've come up with to mitigate their impact on my daily life. You can't prevent your phone from responding to a call (without crazy jailbreak hacks) but you can control how it responds.

  1. I have created an entry in my contact book with the name Spam Caller.
  2. I then attached a silent ringtone to that contact and set their vibration alert to None.
  3. Every time I get a call from a new spammer I add their number to this contact.
  4. Voilà my phone now essentially ignores their calls. The next time I pick up my phone I'll see a missed call from Spam Caller which I know I can safely ignore.

    Here is a silent ringtone I created for this purpose: Silent Ringtone

AT&T Shamed to Drop $1 Million Lawsuit Against Customer Over Fraudulent Calls Stop the Cap!

July 9, 2012

Michael Smith and his 14 employees can now sleep again after AT&T dropped a $1.15 million lawsuit against Smith's small manufacturing company after the story went viral.

The lawsuit was filed over fraudulent long distance calls placed through Smith's PBX phone system to the war-torn nation of Somalia over a four day period in 2009.

Smith discovered the fraud after getting long distance bills totaling $891,470 the following month.

More than $260,000 of additional charges were billed by Verizon, Smith's landline phone company, and Verizon forgave those charges a few months after Smith filed a billing dispute. Verizon noticed the unusual calling activity and temporarily suspended Smith's international long distance service. The phone hackers then simply used a "dial-around" long distance access code for AT&T to keep the calls going through, resulting in a huge bill from AT&T, which charged $22 a minute for the calls.

Unlike Verizon, AT&T wanted its money and despite multiple attempts to get credit for the fraudulent long distance calls, AT&T refused to relent, filing suit against Smith for the full cost of the fraudulent calls, plus interest.

Smith told a Salem, Mass. newspaper if he paid the bill, it would force his company into bankruptcy and put his 14 employees on the unemployment line.

The company claims in its lawsuit Smith should have known better - securing his PBX system more effectively against international long distance fraud and that under Federal Communications Commission regulations, AT&T is entitled to collect from the owner of the phone line, regardless of who actually made the call.

Smith told The Salem News he's tried to resolve the matter, even reaching out to the CEO of AT&T, but a secretary at the company called and said that once AT&T refers a case to outside counsel, they are done talking.

AT&T later offered to waive the accumulating interest charges on the unpaid balance (now $197,000 and growing) if Smith paid the company $891,470 for the phone calls to Somalia.

Smith filed a countersuit instead, claiming AT&T is abusing the legal process and violating Massachusetts consumer protection laws. A judge was pushing the case to mediation.

Smith's interview with the Salem newspaper came at additional risk: AT&T's lawyers threatened they would take action if he "disparaged" the company's name in the media.

After the story ran nationwide this morning on the Associated Press wire service, the company suddenly dropped the case.

In a statement sent to the media, AT&T writes it is no longer pursuing its claims against Michael Smith, of Ipswich, "though we are entitled by law to collect the amounts owed."

Consumerist

How To Fight Phone Bill Cramming

By Ben Popken May 29, 2008

ArsTechnica writer Nate Anderson was a recent "cramming" victim, and he wrote about his experience tracking down who was behind it. Cramming is a scam where third-party groups tell your phone company to bill you for "services," services you never signed up for, and the phone company happily obliges, taking a cut of the fee. The phone company does no verification and all the scammer needs is your phone number. In Nate's case, he was signed up for three different voicemail services and email-forwarding service, three at $14.95 per month, and one at $12.95, doubling his telephone bill. Snooping around, he found the companies behind it were ILD and ESBI, and scores of cramming complaints about these "companies" littered the internet. Luckily he was able to get refunds without difficulty (crammers often make it easy to cancel so you don't go complaining to any law enforcement bodies) only providing just as much information as these con-artists used to flimflam him in the first place: his phone number. So how can you fight a crammer?

1. Watch your bills for suspicious charges.
2. If you see a fee for a service you never ordered, contact the "service" provider and request a refund.
3. Ask your phone company about how to remove erroneous charges.
4. File an FTC complaint.
5. After you get your money back, ask your phone company to put a block against third-party charges on your account.

Cram this: a firsthand account of my recent cramming [Ars Technica] (Thanks to John!)

Fighting Phone Spam

March 14, 2008

There is one partial solution to the problem described in the March 10 front-page article "Advertising Sent to Cellphones Opens New Front in War on Spam": Allow customers to opt out of all text messaging. Not all of us use our cellphones as general communication devices; some people are satisfied to let a phone be just a phone.

I know more than 25 people who have asked their wireless providers to disable text messaging for their accounts, only to be told that it could not be done, which I doubt. A more likely explanation is that these companies like getting paid for mistaken text messages.

The companies should voluntarily institute an opt-out policy or, loath as I am to suggest a new law, Congress should require that they do so, with hefty fines for noncompliance.

There is also a more technologically complex solution to this problem. Instead of making recipients pay for the text messages, make the sender pay for them. Yes, it would cost banks, travel firms and other businesses that text useful information, but they could pass those charges on to their customers.

Tag Archive for telephone-based fraud - TRUSTID Automatic Caller Authentication

Re-establishing Caller ID as a trusted source for customer authentication

Posted on: August 29th, 2012 by art From a security standpoint, Caller ID, in recent years, has been dead in the water.

For decades, financial institutions relied on Caller ID and ANI to identify calling party numbers for things like new account applications, bank card activation, money transfers and servicing customers. But times have changed.

Today, criminals have access to too many tools, too many resources, and have gathered too much information they can use to socially engineer a bank's contact center. The Caller ID just happens to be the telephonic "mask" that crooks hide behind to fool unsuspecting call center agents into thinking they are someone else.

Criminals are so good at spoofing Caller ID and using personal information to defeat knowledge-based authentication (KBA) solutions that the Caller ID and ANI have become unvalidated claims that are no longer effective in customer identification. Yet, many banks still rely heavily on personally identifiable information (PII), including the Caller ID, to identify their customers.

Placing a high amount of trust in "what you know" methods of authentication today can leave your customers and confidential data vulnerable to sophisticated telephone-based scams. In fact, relying solely on KBA may be more dangerous than not using it at all. In other words, if a bank rep is fooled into believing the lie cooked up through Caller ID spoofing and social engineering, crooks have set the stage to commit fraud right under their nose. This alone should be enough to put financial institutions on guard, particularly as more and more studies find that telephone-based fraud is on the rise.

According to the recent Dark Reading article, "Phone Fraud Up 30 Percent," nine out of 10 U.S. banks have been targeted in one way or another by phone fraudsters. Apparently, it seems that criminals are using the telephone to defraud banks because it's easier to trick someone over the phone into divulging private information than getting passed a firewall or breaking into a website.

For some time now, Caller ID has not been a trustworthy source that banks can count on to validate their customers. But the TRUSTID® Physical Caller Authentication solution is changing all of that.

By automatically validating the physical location of the telephone calling into a contact center pre-answered, bank agents are no longer fooled by Caller ID spoofing or social engineering schemes because calls are validated before the phone is picked up. This innovative, proactive approach to customer authentication is helping re-establish Caller ID and ANI as trusted sources for authenticating customers and, once again, making the telephone channel a secure, cost-effective channel to do business and service customers.

Recommended Links

Google matched content

Softpanorama Recommended

Top articles

Sites

Top articles

Sites

Phone number spam

wireless.att.com What YOU can do to control cell phone spam

Caller ID and Spoofing | FCC.gov
It is sometimes offered as an optional service by landline and wireless telephone companies, ... is susceptible to fraud. ... Per-call blocking - To block your phone number and name from appearing on a recipient's Caller ID unit on a single phone call, ...



Etc

Society

Groupthink : Two Party System as Polyarchy : Corruption of Regulators : Bureaucracies : Understanding Micromanagers and Control Freaks : Toxic Managers :   Harvard Mafia : Diplomatic Communication : Surviving a Bad Performance Review : Insufficient Retirement Funds as Immanent Problem of Neoliberal Regime : PseudoScience : Who Rules America : Neoliberalism  : The Iron Law of Oligarchy : Libertarian Philosophy

Quotes

War and Peace : Skeptical Finance : John Kenneth Galbraith :Talleyrand : Oscar Wilde : Otto Von Bismarck : Keynes : George Carlin : Skeptics : Propaganda  : SE quotes : Language Design and Programming Quotes : Random IT-related quotesSomerset Maugham : Marcus Aurelius : Kurt Vonnegut : Eric Hoffer : Winston Churchill : Napoleon Bonaparte : Ambrose BierceBernard Shaw : Mark Twain Quotes

Bulletin:

Vol 25, No.12 (December, 2013) Rational Fools vs. Efficient Crooks The efficient markets hypothesis : Political Skeptic Bulletin, 2013 : Unemployment Bulletin, 2010 :  Vol 23, No.10 (October, 2011) An observation about corporate security departments : Slightly Skeptical Euromaydan Chronicles, June 2014 : Greenspan legacy bulletin, 2008 : Vol 25, No.10 (October, 2013) Cryptolocker Trojan (Win32/Crilock.A) : Vol 25, No.08 (August, 2013) Cloud providers as intelligence collection hubs : Financial Humor Bulletin, 2010 : Inequality Bulletin, 2009 : Financial Humor Bulletin, 2008 : Copyleft Problems Bulletin, 2004 : Financial Humor Bulletin, 2011 : Energy Bulletin, 2010 : Malware Protection Bulletin, 2010 : Vol 26, No.1 (January, 2013) Object-Oriented Cult : Political Skeptic Bulletin, 2011 : Vol 23, No.11 (November, 2011) Softpanorama classification of sysadmin horror stories : Vol 25, No.05 (May, 2013) Corporate bullshit as a communication method  : Vol 25, No.06 (June, 2013) A Note on the Relationship of Brooks Law and Conway Law

History:

Fifty glorious years (1950-2000): the triumph of the US computer engineering : Donald Knuth : TAoCP and its Influence of Computer Science : Richard Stallman : Linus Torvalds  : Larry Wall  : John K. Ousterhout : CTSS : Multix OS Unix History : Unix shell history : VI editor : History of pipes concept : Solaris : MS DOSProgramming Languages History : PL/1 : Simula 67 : C : History of GCC developmentScripting Languages : Perl history   : OS History : Mail : DNS : SSH : CPU Instruction Sets : SPARC systems 1987-2006 : Norton Commander : Norton Utilities : Norton Ghost : Frontpage history : Malware Defense History : GNU Screen : OSS early history

Classic books:

The Peter Principle : Parkinson Law : 1984 : The Mythical Man-MonthHow to Solve It by George Polya : The Art of Computer Programming : The Elements of Programming Style : The Unix Hater’s Handbook : The Jargon file : The True Believer : Programming Pearls : The Good Soldier Svejk : The Power Elite

Most popular humor pages:

Manifest of the Softpanorama IT Slacker Society : Ten Commandments of the IT Slackers Society : Computer Humor Collection : BSD Logo Story : The Cuckoo's Egg : IT Slang : C++ Humor : ARE YOU A BBS ADDICT? : The Perl Purity Test : Object oriented programmers of all nations : Financial Humor : Financial Humor Bulletin, 2008 : Financial Humor Bulletin, 2010 : The Most Comprehensive Collection of Editor-related Humor : Programming Language Humor : Goldman Sachs related humor : Greenspan humor : C Humor : Scripting Humor : Real Programmers Humor : Web Humor : GPL-related Humor : OFM Humor : Politically Incorrect Humor : IDS Humor : "Linux Sucks" Humor : Russian Musical Humor : Best Russian Programmer Humor : Microsoft plans to buy Catholic Church : Richard Stallman Related Humor : Admin Humor : Perl-related Humor : Linus Torvalds Related humor : PseudoScience Related Humor : Networking Humor : Shell Humor : Financial Humor Bulletin, 2011 : Financial Humor Bulletin, 2012 : Financial Humor Bulletin, 2013 : Java Humor : Software Engineering Humor : Sun Solaris Related Humor : Education Humor : IBM Humor : Assembler-related Humor : VIM Humor : Computer Viruses Humor : Bright tomorrow is rescheduled to a day after tomorrow : Classic Computer Humor

The Last but not Least Technology is dominated by two types of people: those who understand what they do not manage and those who manage what they do not understand ~Archibald Putt. Ph.D


Copyright © 1996-2021 by Softpanorama Society. www.softpanorama.org was initially created as a service to the (now defunct) UN Sustainable Development Networking Programme (SDNP) without any remuneration. This document is an industrial compilation designed and created exclusively for educational use and is distributed under the Softpanorama Content License. Original materials copyright belong to respective owners. Quotes are made for educational purposes only in compliance with the fair use doctrine.

FAIR USE NOTICE This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to advance understanding of computer science, IT technology, economic, scientific, and social issues. We believe this constitutes a 'fair use' of any such copyrighted material as provided by section 107 of the US Copyright Law according to which such material can be distributed without profit exclusively for research and educational purposes.

This is a Spartan WHYFF (We Help You For Free) site written by people for whom English is not a native language. Grammar and spelling errors should be expected. The site contain some broken links as it develops like a living tree...

You can use PayPal to to buy a cup of coffee for authors of this site

Disclaimer:

The statements, views and opinions presented on this web page are those of the author (or referenced source) and are not endorsed by, nor do they necessarily reflect, the opinions of the Softpanorama society. We do not warrant the correctness of the information provided or its fitness for any purpose. The site uses AdSense so you need to be aware of Google privacy policy. You you do not want to be tracked by Google please disable Javascript for this site. This site is perfectly usable without Javascript.

Last modified: March, 12, 2019