Feeds

Ireland: auto-diallers under control

Exceptional steps may now be lifted

  • alert
  • submit to reddit

High performance access to file storage

Ireland's communications regulator has lifted restrictions in place on ISPs and telecom operators, introduces to combat rogue auto-diallers.

ComReg noted that while there are still instances of such fraud being reported, consumer awareness has resulted in fewer incidents. As a result, 'exceptional steps' imposed at the time could now be lifted.

ComReg introduced the measures in September 2004 to raise consumer awareness of the auto-dialler scam and to ensure that operators were implementing protective measures to reduce the effect these scams were having on consumers.

Under the measures, telecom operators were required to suspend direct dial access to a number of destinations in the South-Pacific region including French Polynesia, as well as Mauretania. This guideline caused consternation among representatives of these companies in these regions. However ComReg did compile a list of legitimate phone numbers to the region that were not blocked once guidelines came into effect.

In addition to the restrictions imposed on telecom operators, ISPs were obliged to keep customers informed about suitable solutions that would eliminate the dialler programme from PCs and stop it from re-installing itself later.

Auto-dialler programmes and modem hijacking became a serious problem for many Irish consumers in the first half of 2004. ComReg received over 300 phones calls from consumers concerning excessive charges arising from rogue diallers, with costs incurred reaching €2,000 in some cases. Such incidents led the regulator to take action in a bid to stop the scams occurring.

The problem arises when internet users' dial-up settings are changed, without their knowledge or permission, to an international number. Users only become aware of the problem when they receive a copy of their phone bill which will feature charges for calls to international destinations at premium rates.

Copyright © 2004, ENN

Related stories

ComReg keeps tabs on NTL's 'overheating' phones
Ireland soothes South Pacific over rogue dialler crackdown
Ireland bars South Pacific in rogue dialler crackdown

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.