home *** CD-ROM | disk | FTP | other *** search
- Received: from delta.eecs.nwu.edu by MINTAKA.LCS.MIT.EDU id aa15379;
- 26 Jan 94 18:44 EST
- Received: by delta.eecs.nwu.edu (4.1/SMI-4.0-proxy)
- id AA02727; Wed, 26 Jan 94 12:56:05 CST
- Return-Path: <telecom>
- Received: by delta.eecs.nwu.edu (4.1/SMI-4.0-proxy)
- id AA02717; Wed, 26 Jan 94 12:56:02 CST
- Date: Wed, 26 Jan 94 12:56:02 CST
- From: TELECOM Moderator <telecom@delta.eecs.nwu.edu>
- Message-Id: <9401261856.AA02717@delta.eecs.nwu.edu>
- To: telecom@delta.eecs.nwu.edu
- Subject: Telecom Fraud - FCC Notice of Proposed Rulemaking
-
-
- Passed along FYI to the Digest readership. PAT
-
- Date: Wed, 19 Jan 1994 00:24:18 -0500 (EST)
- From: ssatchell@BIX.com
- Subject: Telecommunications Fraud FCC NPRM
-
- Here is the text of the Notice of Proposed Rulemaking, CC Docket
- 93-292. I have made some effort to verify that my transcription is
- reasonably accurate. PEOPLE WANTING TO COMMENT FORMALLY ON THIS
- PROCEEDING SHOULD GET AN ORIGINAL COPY.
-
- The original comment period closed January 14, 1994. [For what it's
- worth, I didn't get a paper copy of this until January 11, and the
- preparation of my comment took two full days -- FedEx barely got the
- thing to the FCC before the comment period closed.] The reply
- comments (translation: comments to the comments) are due no later than
- February 10th.
-
- Event though the formal comment period has closed, you can make an
- informal comment ("ex parte") before the February 10th deadline.
-
- Some of the abbreviations are defined in footnotes (which have been
- moved to the end of the file) and some are defined in the Appendixes
- which I didn't transcribe. [You get what you pay for.]
-
- The numbers between double-dashes are the "paragraph numbers" for this
- Notice. You should in any letter reference the specific paragraphs to
- avoid having to make long quotes.
-
- Enjoy.
-
- I. INTRODUCTION
-
- --1-- This Notice of Proposal of Rulemaking (NPRM) seeks comment on
- proposals to:
-
- (1) achieve closer coordination between the industry, consumers,
- vendors, law enforcement agencies, Congress, and the Commission to aid
- in the detection and prevention of toll fraud;
-
- (2) improve consumer education initiatives by the Commission, consumer
- groups, and the telecommunications industry;
-
- (3) determine that tariff liability provisions that fail to recognize
- an obligation by the carrier to warn customers of toll fraud risks of
- using carrier services are unreasonable;
-
- (4) establish a federal policy assigning liability for payphone fraud;
-
- (5) codify a requirement for written warnings for all
- telecommunications equipment registered under Part 68; and
-
- (6) determine measures to prevent cellular and Line Information
- Database (LIDB) fraud.
-
- II. BACKGROUND
-
- --2-- Until the mid 1980s, carrier networks were the main targets of
- telecommunications fraud. Fraud perpetrators might use electronic
- devices or even a child's whistle to simulate carrier switching tones
- that would allow them to place calls and avoid paying for them. As
- carriers developed new methods to prevent these primitive forms of
- toll fraud, however, perpetrators began to use computers to access the
- carriers' networks.
-
- --3-- Control over the use of telecommunications services has
- increasingly shifted from carriers to individual consumers.
- Technology is providing more flexible options for use of those
- services. With this shift in control, however, has come a shift in
- the toll fraud targets. Customers, as well as carriers, are now the
- victims. Fraud involving customer-owned private branch exchanges
- (PBXs) provides an example. Customers can now use a feature in their
- on-premises PBX equipment to route incoming remote access calls to an
- outgoing line. With this capability, a company's sales
- representatives in the field can, for example, have the convenience of
- placing calls that would be billed to the employer's outgoing PBX
- line. Fraud perpetrators have discovered that they can call into a
- PBX and then use computers or "finger hacking" to identify the
- authorization code for the remote access feature connected to the
- outgoing line. Once the authorization code is found or "hacked," the
- perpetrator can obtain a dial tone and make outgoing calls that are
- billed to the PBX owner. In some cases, the PBX owner may also be
- billed for incoming 800 calls made by the perpetrator.
-
- --4-- Both customers and carriers suffer the effects of fraud; industry
- and Secret Service estimates of annual losses range from one to five
- billion dollars, in an industry in which annual billings are
- approximately $175 billion. Several different types of fraud are
- creating these losses:
-
- (1) the unauthorized remote access through PBXs already described;
-
- (2) cellular "cloning," in which billing codes for legitimate
- cellular subscribers are installed in a perpetrator's cellular phones;
-
- (3) the billing of operator-assisted calls to line with billing
- restrictions, such as payphone lines; and
-
- (4) "clip-on" fraud, in which the perpetrator physically attaches a
- calling device directly to a phone line.
-
- Fraud perpetrators may watch customers using calling cards at
- payphones and sell the calling card numbers to others, or directly
- approach consumers and ask them to accept billing to their phones as
- part of a spurious "official" investigation. Industry and law
- enforcement sources expect that new types of fraud will develop even
- as these existing types of fraud are being combatted.
-
- --5-- Experience has shown that those new telecommunications
- technologies offering the most convenience and flexibility for users,
- are often also most likely to present new toll fraud opportunities.
- The Commission's goal has been, and will continue to be, to work with
- consumers and the industry to find solutions to each fraud problem
- without hindering the development or use of these new technologies.
- In devising these solutions, we must ensure that telecommunications
- equipment and services remain accessible.
-
- --6-- The Commission is not charged with enforcing criminal statutes
- or prosecuting toll fraud perpetrators. [1] The Department of
- Justice, local law enforcement agencies, and the U. S. Secret Service
- are among the agencies charged with the enforcement of criminal
- statutes. Nevertheless, the Commission has taken several steps toward
- developing solutions to toll fraud. First, the Commission issued a
- series of "Consumer Alerts" describing the dangers posed by
- telecommunications fraud and steps that can be taken to detect and
- prevent it. [2] Second, on October 9, 1992, we convened an _en banc_
- hearing on Toll Fraud. [3] Panelists representing telecommunications
- consumers, carriers, equipment vendors, insurance providers, and law
- enforcement agencies presented diverse perspectives and detailed
- proposals for detection, prevention, and responsibility. (See
- Appendix B) Following the hearing, the Commission encouraged further
- comment by holding the record on toll fraud open until November 16,
- 1992. [5] Third, the Commission has taken action in related
- proceedings to address toll fraud concerns. In July 1992, in the
- operator service rulemaking proceedings, the Commission required local
- exchange carriers to offer services, to reduce payphone providers' and
- other aggregators' exposure to toll fraud. [6] Earlier, in 1990, the
- Commission adopted standards for direct inward dial (DID) calls which
- required answer supervision on DID calls routed back to the public
- switched network by a PBX. This amendment of Part 68 of the
- Commission's rules was initiated because carriers were losing tens of
- millions of dollars of revenue in cases where PBXs failed to return an
- answer supervision signal to the central office, notifying it of a
- billable call. The Commission continues to resolve formal and
- informal complaints that raise toll fraud issues.
-
- --7-- The Commission also coordinates with industry, consumers,
- vendors, and law enforcement agencies. Commission staff attends
- meeting with industry groups working to formulate prospective
- solutions to toll fraud problems. [7] Some fraud issues appear to
- have been resolved by the industry, including, for example, dial tone
- reorigination, which permits the calling party to receive a second
- dial tone after the original call is terminated. The industry also
- has implemented intercompany cooperation on live call tracing. Many
- carriers have recently responded to the widespread concerns about toll
- fraud by offering services designed to provide early detection and
- prevention of the problems.
-
- --8-- It does not appear, however, that private action can resolve all
- toll fraud problems or that incentives to control fraud are structured
- in the best possible way. For example, the recent "Chartways" formal
- complaint proceeding [8] presented the issue of liability for charges
- associated with unauthorized calls. Chartways, the complainant, was a
- private branch exchange (PBX) owner. It learned from AT&T that an
- unusual volume of calls to Pakistan was originating at its PBX. A
- subsequent investigation revealed that the calls were apparently being
- routed through the remote access feature of the PBX. Although
- Chartways informed AT&T that the calls were unauthorized, AT&T
- maintained that Chartways was liable for the related charges under the
- general payment obligation of AT&T's tariffs. Chartways responded by
- filing a formal complaint against AT&T with the Commission. The
- complaint alleged that AT&T's attempt to collect the charges was
- unreasonable and discriminatory, thus violating sections 201(b) and
- 202(a) of the Communications Act. [9] The Common Carrier Bureau
- denied the complaint [10] based on a largely stipulated record, and
- following the same analysis we denied Chartways' application for
- review of the Bureau decision. [11] First, we found that the Bureau
- was correct in determining that the tariff provisions at issue were
- clear and definite in requiring payment for the calls, in that the
- tariff provisions recognized no exception to the general payment
- obligation for unauthorized usage. [12] Next we affirmed the fining
- that Chartways had control over the disputed calls. [13] We noted
- that Chartways had stipulated that it had "the capability to restrict
- access to and egress from its PBX" at all times. Moreover, while the
- record contained no evidence that AT&T was negligent in any way with
- regard to the unauthorized calls, it also showed that Chartways had
- taken no steps available to it to detect or prevent unauthorized
- calling through its PBX. Finally, we agreed that AT&T's practices in
- this case were not discriminatory when compared to its liability
- limits on unauthorized calling card using because calling card
- liability is controlled explicitly by a specific federal statute and
- related regulations. [14]
-
- --9-- In _United Artists_, we examined the question of liability for
- charges associated with unauthorized calls that were either originated
- or accepted at the complainant's payphones. [15] The threshold issue
- in the case was whether United Artists was AT&T's "customer," because
- only a "customer" who "orders" service could be held liable for
- charges under the terms of AT&T's tariff. [16] We determined that the
- customer for the operator-assisted calls at issue was the caller or
- billed party, not United Artists, the owner of the payphones [17] We
- also found that United Artists did not presubscribe its payphone lines
- to AT&T for direct-dialed service. [18] We then looked at whether
- United Artists had otherwise ordered service from AT&T, stating that
- if United Artists "had failed to take steps to control unauthorized
- operator-assisted and direct-dialed calling and had, instead,
- installed its phones in such a way as to allow callers to charge such
- calls to [its] payphone lines, [United Artists] could reasonably be
- held to have constructively 'ordered' service from AT&T, thus
- establishing an inadvertent carrier- customer relationship." [19] The
- record showed that United Artists had adopted a number of measures
- designed to control potentially fraudulent calling. [20] For example,
- it told the local exchange carrier, New York Telephone (NYT), that its
- lines were to have no primary interexchange carrier at all. It also
- ordered originating line and billed number screening services from
- NYT, which were intended to inform operator service providers such as
- AT&T of any billing restrictions on those lines. [21] In addition to
- such preventative steps, United Artists also monitored calling from
- its phones and regularly reported any apparently fraudulent calling to
- NYT and AT&T. Based on the record, we concluded that United Artists
- did not intentionally or constructively order service from AT&T and
- therefore could not be held liable as a customer for the disputed
- charges. [22]
-
- --10-- Our decision to begin this rulemaking is based upon our
- experience with complaints and the LIDB investigation; [23] the _en
- banc_ hearing testimony; public comment solicited pursuant to a
- petition filed by the Pacific Mutual Life Insurance Company, which,
- among other things, asked the Commission to establish policies and
- rules to allocate the cost of unauthorized calls associated with PBX
- fraud among carriers, customers, and equipment suppliers; [24] and
- public comment solicited pursuant to a petition filed by the Florida
- Public Service Commission that asked the Commission to review tariffs
- relating to toll fraud. [25] The purpose of this rulemaking is to
- identify additional policies we should establish or steps we should
- take to avoid, or reduce the risks of, toll fraud.
-
-
- III. DISCUSSION
-
- A. The _En Banc_ Hearing
-
- --11-- Comments: During the _En Banc_ Hearing on Toll Fraud, we heard
- testimony from eighteen panelists representing communications
- customers, common carriers, equipment manufacturers, law enforcement
- agencies, and others. A common theme by the panelists at the session
- was that effective approaches now exist to battle toll fraud if
- customers, carriers, equipment vendors, and law enforcement agencies
- cooperate to detect and prevent fraud. Included among these potential
- solutions are equipment-based measures that end-users may take
- themselves, carrier- based monitoring services, insurance products,
- law enforcement efforts, and proactive educational programs. The
- hearing was divided into three panels. [26] The first panel focused
- on PBX and other customer premises equipment (CPE) -based fraud.
- Participants included a PBX and CPE owner, a PBX trade association
- representative, a law enforcement expert, and equipment manufacturer,
- and a long distance company offering anti-fraud services. The second
- panel focused on network-based fraud and liability issues.
- Participants included a hacker expert, a representative of the Toll
- Fraud Prevention Committee of the Alliance for Telecommunications
- Industry Solutions (nee Exchange Carriers Standards Association), a
- payphone equipment manufacturer, and a panelist discussing
- network-based validation services. The third panel focused on
- emerging technical law enforcement, and business solutions to domestic
- and international toll fraud. Panelists included a manufacturer of
- new anti-fraud products, a law enforcement expert on detection and
- prevention of fraud, a toll fraud expert from a Canadian
- telecommunications corporation, a panelist discussing negotiation of
- international fraud disputes, representatives of interexchange
- carriers, and an insurance company discussing contractual and
- insurance protection for toll fraud.
-
- --12-- The record compiled as a result of the _en banc_ hearing
- emphasized that toll fraud is a crime, that it is difficult to
- prosecute, that it migrates from one area of telecommunications to
- other areas as detection and prevention methods become effective, and
- that additional consumer education is necessary to detect and prevent
- toll fraud. Witnesses pointed out that because there is no specific
- federal legislation regarding toll fraud, prosecutors must deal with
- the limited effectiveness of the existing criminal statutes. [28] The
- record also indicates that the criminal prosecution of toll fraud
- perpetrators is infrequent. Law enforcement representatives on the
- panels asserted that this may be partially due to the lack of training
- or familiarity with toll fraud cases on the part of law enforcement
- agents or U. S. Attorneys. It also may be due to the high dollar
- thresholds (victims must allege large monetary damages) set by the U.
- S. Attorneys because toll fraud cases generally are manpower intensive
- but often result in either suspended sentences or short
- incarcerations. Further, to establish access device fraud under 18
- USC 1029 the prosecution must show that a person's account has been
- accessed. In many toll fraud cases, particularly cellular tumbling
- [29] no account is accessed. Rather, the fraud perpetrator changes
- both the identification number and the telephone number in order to
- confuse the cellular switch. Our day- long _en banc_ hearing
- demonstrated that a plan to combat toll fraud must include an
- integrated program of detection, prevention, and prosecution. The
- record in the toll fraud _en banc_ hearing also brought out comments
- about PBX fraud, payphone fraud, cellular fraud, and other types of
- fraud which we describe below at paragraphs 14 through 40, infra.
-
- --13-- Comment Requested: In light of the persuasive testimony
- presented at the hearing, we request comment on specific ways to
- achieve closer and continuing coordination among the institutions
- fighting toll fraud. We seek comment on whether the Commission can
- add value to existing inter-institutional efforts, and, if so, how.
- We ask whether the Commission should establish a new Federal Advisory
- Committee representing all affected interests, to recommend specific
- solutions. Further, we request comment on whether to join with law
- enforcement authorities in encouraging Congress to enact legislation
- that clearly defines and penalizes this criminal activity and gives
- law enforcement the tools it needs to track and prosecute perpetrators
- of toll fraud. We invite proposals of specific statutory language
- that would achieve these objectives. Additionally, we request comment
- on ways to broaden established Commission and industry consumer
- education initiatives in order to better educate consumers about toll
- fraud risks and remedial steps that can be taken.
-
-
- B. PBX FRAUD
-
- The Pacific Mutual Proceeding
-
- --14-- Petition and Comments: Pacific Mutual Life Insurance Company
- (Pacific Mutual) filed a petition requesting the Commission to declare
- ambiguous and unlawful tariff provisions under which AT&T has held
- petitioner liable for payment of toll fraud charges incurred because
- of interstate, interexchange telephone calls made through remote
- access to petitioner's on-premises PBX. In addition, Pacific Mutual
- requests the Commission to establish policies and rules to allocate
- the costs of remote-access toll fraud among users, carriers, and
- suppliers, and to promote effective anti-fraud measures. [30] AT&T
- filed in opposition to the petition, 19 parties filed comments and 16
- parties, including AT&T, filed reply comments. [See Appendix C for a
- list of commenters and abbreviations used throughout this NPRM to
- refer to these commenters.]
-
- --15-- All commenters who support the petition state that they have
- been victims of toll fraud. Two commenters state that they relied on
- AT&T to supply the CPE and establish protocols for that equipment.
- [See comments of AVNET and Mitsubishi] Perkin-Elmer Corporation (PE)
- states that it relied on AT&T alleged misrepresentations or failure to
- warn of toll fraud risks associated with use of the equipment.
- Several commenters, including Chartways, state that fraudulent usage
- had originate from company-owned, on-premises CPE. [33] Credit Card
- Calling Systems, Inc. stipulated that the fraud of which it was a
- victim involved unique features of overseas resale of AT&T 800
- services connected to a PBX, enabling customers to call inward to the
- U. S. from overseas. In contrast, AVNET stated that it was a victim
- of fraud involving the use of its software defined network (SDN).
-
- --16-- Those commenters supporting the petition propose that the
- Commission prescribe guidelines that provide incentives for the
- development and proper use of safeguards to prevent non-card toll
- fraud. Most commenters who support the petition concur that the
- carriers are in the best position to monitor traffic patterns and call
- volume. [34] Many commenters concur with the comments of Securities
- Industries Association et al. (SIA), which proposes that the
- Commission require interexchange carriers (IXCs) to offer, at
- cost-based rates, services designed to help users prevent, and react
- quickly to, fraud. Most commenters agree that new technologies will
- increase opportunities such as multiple node virtual networks using
- many PBXs and other sophisticated network terminating equipment will
- make the impact of fraud more serious.
-
- --17-- Specifically, in its comments supporting the petition,
- Aeronautical Radio, Inc. (ARINC), asserts that the airlines are
- substantial users of telephone carriers' switched voice services and
- many have been victimized by remote access-based toll fraud like the
- fraud described by the petitioner. ARINC requests that the Commission
- prescribe network-based preventive measures and require carriers to
- inform their customers about the potential for toll fraud. ARINC
- asserts that policies and guidelines should accomplish the following
- four objectives: (1) toll fraud prevention (carriers' detection and
- prevention plans); (2) prompt remedial action (detection and remedy in
- timely manner); (3) limited customer liability (forgive charges
- incurred in at least the first two billing cycles in which fraud is
- detected); and (4) notification and disclosure (carriers warn
- customers of vulnerabilities). [35] PE alleges that unauthorized
- calls totaling $250,000 occurred despite the steps PE took to prevent
- fraud, including installation of additional access codes and reports
- of anomalous billings to AT&T. Although AT&T assured PE that PE would
- be credited as a billing error, AT&T took two years to complete the
- investigation. PE contends that a carrier should not be permitted to
- limit liability unless the carrier has installed the best available
- techniques to detect and prevent remote access toll fraud; has advised
- customers, both in its tariffs and through marketing, of the
- vulnerability of its service offerings; and has responding promptly to
- customer billing inquiries.
-
- --18-- Similarly, SIA proposed that the Commission adopt specific
- guidelines in order to provide incentives for the development and
- proper use of safeguards by all affected parties to reduce toll fraud,
- and to spread losses equitably. SIA also proposes that the Commission
- require interexchange carriers (IXCs) to offer, at cost-based rates,
- services designed to help large users react quickly to toll fraud
- because the carriers are in the best position to monitor traffic
- patterns and call volume. SIA asserts that these services should
- include trunk-based monitoring against preset parameters and
- customized call blocking. Losses from fraud, SIA avers, could then be
- allocated between IXCs and customers based on their respective
- responsibility. Carriers would be responsible if they fail to inform
- customers quickly of suspicious traffic (within 30 minutes if the
- parameters are exceeded) or to restrict service when asked to do so.
- On the other hand, customers would be responsible if they fail to
- obtain monitoring services of obtain them and fail to act upon carrier
- warnings. SIA asserts that because carriers have cracked down
- aggressively on card fraud, hackers have turned to CPE and non-card
- based fraud, and, under the present rules, IXCs have no incentive to
- help prevent or curtail non-card fraud.
-
- --19-- In its comments, Western contends that carriers and vendors
- should be required to issue warnings and precautions to users and
- revise their tariffs to reflect their responsibility for toll fraud
- when customers have no direct control of detection or prevention of
- fraud and act responsibly with regard to their equipment. Further,
- Western proposes that the Commission amend Part 68 to require
- equipment vendors (1) to implement specific hardware and software
- functions to help prevent toll fraud and (2) to provide specific
- warnings and instructions to PBX purchasers regarding the toll fraud
- hazards and vulnerabilities inherent in their products. NATA argues
- that Section 68.110(b) of the Commission's rules requires disclosure
- when carriers take actions that affect the network. NATA argues that
- customers are entitled to adequate notice of technological changes in
- carrier networks because carriers have made it more likely that
- customers will experience fraud through their facilities and
- equipment. NATA submits that the carriers failed to provide adequate
- notice and should not now be permitted to reap the benefits of the
- violation and hold customers liable.
-
- --20-- Many customers oppose the petition and contend that the
- responsibility for unauthorized use of a PBX should be placed on the
- PBX owner. These parties argue the PBX owner is in the best position
- to prevent fraud by programming, configuring, disabling the remote
- access features, or installing adequate security or monitoring
- procedures. [36] Specifically, AT&T contends that the petition should
- be denied because the tariffs adequately establish customer
- responsibility and are enforced in a nondiscriminatory manner. AT&T
- contends that the rules petitioner proposes would eliminate the
- incentive for customers to secure their telephone systems and would
- encourage higher PBX fraud costs. AT&T asserts that the existing
- tariffs clearly require payment for Long Distance Service from all
- customers, whether usage was authorized or unauthorized, if the
- service originated from the customer's number. AT&T further asserts
- that it enforces its tariff in a uniform manner, and only in cases
- where the fraud resulted because of AT&T's own fault as a carrier, or
- where a compromise would maximize AT&T's recovery does AT&T forgive
- any part of the disputed amount. AT&T argues that Pacific Mutual
- chose to use the remote access feature of its PBX, did not restrict
- the locations to which the PBX will permit remotely placed calls to be
- completed and therefore assumed the risk arising from interaction
- between its chosen systems and the network. In its reply comments,
- AT&T reiterates that it screens calling card calls because the
- individual database validation that is performed before each calling
- card call is completed enables AT&T to engage in screen and blocking
- functions which cannot readily be duplicated on non-card calls, where
- no such database validation occurs.
-
- --21--LiTel Communications, Inc. (LiTel) urges the Commission to deny
- petitioner's request regarding tariff issues because long-distance
- companies cannot distinguish legitimate PBX calls from fraudulent ones
- and would face enormous financial exposure if the tariff language is
- adjudged unlawful. MidAmerican concurs with AT&T in opposing the
- petition and contends that it is not in the public interest to make
- all consumers indirectly liable for PBX fraud. Southwestern Bell
- (SWB) contends that a cap on end user liability reduces the incentive
- for end users to prevent fraud. SWB submits that proposed
- restrictions on vendors through modification of Part 68 are vague.
- SWB also argues the proposed rules are unsupported because petitioner
- has not shown that end users lack either information or options
- necessary to guard against toll fraud.
-
- --22-- Allnet submits that the comments in the proceeding have not
- adequately supported the granting of the petition because it is not
- the role of carriers to insure end users against theft of services.
- The theft of services, Allnet contends, was made possible by the end
- user's choice of equipment, its configuration, and its operation and
- only the PBX owner is able to know whether an outgoing call originated
- over an incoming line. Allnet asserts, however, that if IXCs are
- required to insure end users against theft, then IXCs should be
- permitted to refuse to serve high risk end users. Allnet proposed
- that minimum conditions should be set out in Part 68, including
- anti-theft features on all PBXs, real time on-line printing and
- monitoring of CDRs (call detail records), limiting direct inward
- systems access (DISA) trunks to 7 digit outpulse, purchasing account
- codes from IXCs, purchasing 800 call detail from IXCs, and a mandatory
- in-house attendant at each PBX control console or an automatic alarm
- algorithm that would page a PBX attendant who could shut down the PBX
- from a remote location. Further, Allnet contends that if IXCs are
- required to waive toll charges, local exchange carriers (LECs) should
- be required to waive corresponding access charges because it's unfair
- for IXCs to carry the burden of toll fraud, while LECs collect the
- underlying access charges.
-
- --23-- In its reply comments, Bell Atlantic urges the Commission to
- deny the petition because when the Commission deregulated CPE 13 years
- ago [37] it severed responsibility for CPE. Under this policy, the
- customer selects the CPE and its features, and in concert with the
- vendor, bears the risk if the CPE selected fails to meet expectations.
- Bell Atlantic, however, proposes that the Commission should encourage
- CPE manufacturers and vendors to work with carriers to develop
- solutions to prevent toll fraud and would cooperate fully in any such
- Commission-inspired efforts.
-
- --24-- Comment Requested: Although we reached different results in
- _Chartways_, a PBX fraud case, and _United Artists_, a payphone fraud
- case, the dispositive element for each of these cases was where
- responsibility for the detection and prevention of fraudulent calling
- lay. In _Chartways_ the complainant had taken no discernible action
- to detect or prevent the fraudulent calling and the carrier had not
- acted negligently with regard to the calls. We therefore determined
- that the carrier could hold Chartways liable for the disputed charges.
- In _United Artists_ by contrast, the victim of the toll fraud had
- taken several reasonable steps to detect and prevent unauthorized
- calling , which nonetheless occurred. There, we concluded that the
- carrier had acted unlawfully in attempting to hold United Artists
- liable. If customers are unaware of potential liability, they are
- unlikely to take steps to limit their exposure. And, if carriers have
- no economic incentive to help customers limit their exposure, they are
- unlikely to invest in developing proactive solutions to PBX, or other,
- kinds of fraud. In light of the liability finding that resulted from
- the record in proceedings such as _Chartways_ and _United Artists_, we
- tentatively conclude that tariff liability provisions that fail to
- recognize an obligation by the carrier to warn customers of risks of
- using carrier services are unreasonable. Moreover, we tentatively
- conclude that carriers have an affirmative duty to ensure that these
- warnings are communicated to customers through, for example, billing
- inserts, annual notices, or other information distribution methods.
-
- --25-- We request comment on what other factors could or should be
- considered when liability determinations must be made. [38]
- Specifically, we seek comment on whether to apportion the cost of CPE-
- based fraud based on whether carriers, CPE owners, equipment
- manufacturers, or possibly others were in the best position to avoid,
- detect, warn of, or control the fraud. Further, we request comment on
- whether this apportionment should be based on a comparative negligence
- theory as proposed by Pacific Mutual and many commenters supporting
- its petition. We note that potential shared liability would require
- definition of the specific responsibilities of the CPE-owner to secure
- the equipment or communications system, of the manufacturer to warn of
- toll fraud risks associated with features of the CPE, and of the
- carrier to offer detection and prevention programs and educational
- services. We seek comment on what constitutes a failure to meet these
- responsibilities, on the nature of damages to be awarded to aggrieved
- parties, and on the appropriate forum to resolve these issues. For
- example, we request comment on whether arbitration or mediation should
- precede Commission involvement, and whether Commission involvement, if
- necessary, should begin with alternative dispute resolution or formal
- complaint proceedings. Further, we request comment on which party in
- a billing dispute involving allegations of toll fraud should bear the
- expense of arbitration. We also seek comment on whether residential
- ratepayers would bear the burden of business fraud by paying higher
- rates. Commenters should also discuss how carriers may recover
- charges for calling card fraud, where cardholder liability is limited
- to $50. [See paragraph 38, infra.]
-
- --26-- Commenters are asked to address fraud prevention measures
- various parties might take. The record shows that carriers have
- increased fraud detection service offerings during the last 18 months.
- In light of our tentative finding that tariff liability provisions
- that fail to recognize a duty by the carrier to warn customers of
- risks of using carrier service are unreasonable, we ask whether a
- failure to offer services to limit customers' exposure should be
- considered an unreasonable practice. Consequently, we seek comment on
- whether to require IXCs and LECs to offer customers protection through
- monitoring services, on what basis those services should be offered,
- and whether such services should be part of the basic interexchange
- service offering. We also seek comment on whether there is software
- or equipment that customers should install in their CPE to prevent
- fraud. Further, we request comment on whether the programs offered by
- carriers such as MCI Detect, AT&T NetProtect, and SprintGuard,
- designed to help businesses protect their CPE from toll fraud, include
- sufficient features as customer education, fraud detection equipment,
- traffic analysis, third-party insurance, and real-time monitoring and
- detection. We seek comment on the availability of these programs to
- both large and small CPE owners, and their efficacy. In addition, we
- invite commenters to discuss in detail any other proposals or
- considerations relevant to liability determinations. We invite
- specific rule proposals for consideration.
-
- C. PAYPHONE FRAUD
-
- The Florida Petition
-
- --27-- In its petition, the Florida Public Service Commission (Florida
- PSC) requests that the Commission review tariff provisions governing
- liability for toll charges resulting from fraudulent third party calls
- where payphone providers have purchased originating line screening
- (OLS) and billed number services (BNS) services from carriers. [39]
- The Florida PSC proposes that the Commission adopt regulations
- mirroring recently adopted Florida regulations. [40] The Florida
- regulations, which became effective February 3, 1993, releases a pay
- telephone provider from liability for charges resulting from certain
- types of fraudulent calls if the provider purchases call screening for
- the line (OLS and BNS). [41] In addition to relieving payphone
- providers from liability, the Florida PSC rules require that the
- losses from fraud be allocated between the LECs and IXCs based on
- fault. [42] Further, the Florida PSC proposes that where a carrier
- does not accept or observe LEC OLS and BNS codes or fails to validate
- its calls via the appropriate LEC database, the carrier, not the
- payphone provider, should bear the costs of the resulting toll fraud
- under a uniform national policy. The Florida PSC argues that foreign
- carriers, through whom inbound international calls are initiated, have
- little or no incentive to validate calls because AT&T will bill the
- calls to payphone providers even though BNS could have been used to
- prevent the call from being completed. [43] The Florida PSC asserts
- that if AT&T were required to refuse payment to the foreign carrier
- for such calls, an incentive to validate will be created. The Florida
- PSC further contends that AT&T has insulated itself from this type of
- fraud at its own pay telephones. [44]
-
- --28-- Comments: Many commenters favor a multi-jurisdictional or
- national application of the recently adopted Florida PSC rule limiting
- liability and apportioning liability based on fault. [45] Several
- commenters also propose that a federal rule should provide that if a
- payphone provider subscribes to international call blocking, the
- payphone provider would not be liable for international direct dial
- calls. Most commenters who support the petition contend that because
- LECs and IXCs are able to ensure the integrity of OLS and BNS they
- should be liable for fraudulent calls complete despite the use of the
- screening mechanisms. In its comments, Minnesota Independent Payphone
- Association asserts that requiring payphone providers to unblock
- phones to provide the public with their choice of carriers increases
- the risk of fraud. [46] Many of the commenters supporting the
- petition contend that it was implicit in the equal access decision
- that payphone providers could rely on screening devices.
-
- --29-- NARUC and the California Payphone Association contend that
- liability should attach to the entities that control the blocking and
- screening services and receive revenue from those services. Many
- commenters concur that the LECs and IXCs are much better able to
- absorb the costs of fraud than payphone providers because their cost
- is marginal cost plus mark-up, plus the cost of the ineffective
- screening services, plus the cost to contest the charges. Commenters
- representing payphone providers contend that the charges are both
- unfair and discriminatory because LEC and IXC payphones are not
- charged for fraudulent calls. Further, these commenters contend that
- classifying payphone providers as "customers" is illogical because
- payphone providers do not want or order the service that the fraud
- occurs on, and they take affirmative steps to prevent its delivery.
-
- --30-- In opposition to the petition, many commenters contend that the
- emphasis of any fraud proposal should be on fraud prevention, not on
- the apportioning or assignment of liability. These commenters assert
- that apportioning liability after the fraud will not prevent fraud
- from occurring. [47] They claim that adoption of the Florida PSC
- proposal would precipitate higher rates, and increase litigation
- before the Commission. Some argue that LECs do have incentives to
- fight fraud, as evidenced by their efforts to detect fraud and by
- increased competition in the local loop. Many commenters argue that
- equal access rules never were intended to make carriers insurers and
- guarantors because, if this were required, blocking and screening
- service fees would increase dramatically. These commenters further
- argue that increases in service fees would cause usage of the services
- to decline, with a net result that losses from fraud would increase.
- Moreover, these commenters argue, the payphone providers are not
- taking available fraud prevention precautions. They state that in
- some service areas, only a minority of payphone providers subscribe to
- blocking and screening services, and there is little demand from other
- aggregators. [48] These commenters further argue that Commission
- requirements for equal access did not project that screening services
- would be fool-proof protection against fraud and that before liability
- attaches, payphone providers should be required to do much more than
- merely subscribe to blocking and screen services. Many commenters
- propose that payphone providers should be required to purchase adjunct
- services, programmable phones, and special dial tones, and to locate
- their payphones where they can be observed. With regard to arguments
- by payphone providers that IXCs do not charge LEC or IXC phones for
- fraudulent calls, commenters argue that LECs and IXCs are not
- "customers."
-
- --31-- Comment requested: We agree with the Florida PSC that carriers
- should, as a general matter, be held accountable for the services they
- provide. The Florida PSC rule which apportions liability based on
- fault accomplishes this general goal. We also find merit in the
- proposal by the Florida PSC that we review those portions of tariffs
- filed with the Commission that limit carrier liability associated with
- payphone fraud. Our decision in _United Artists_ limited the payphone
- provider's liability where it took reasonable steps to limit its
- exposure to toll fraud because it was not a customer of the billing
- interexchange carrier. We tentatively conclude that payphone
- providers that take reasonable steps to limit their exposure to toll
- fraud and are not customers should not be required to pay bills
- generated as a result of toll fraud perpetrated through their
- equipment. We consider adopting the Florida approach but before
- adopting it as a national model, we are anxious to learn how it has
- worked in practice. We ask commenters to tell us whether the Florida
- approach has been an effective, efficient way of dealing with payphone
- fraud. We seek comment on whether carriers should be required to
- modify tariff language limiting carrier liability for payphone fraud
- and how this modification would affect carriers and payphone
- providers. We also see comment on the general availability of
- blocking and screening services, whether they are priced reasonably,
- what percentage of payphone providers are using these services where
- they are available, and whether they are effective in reducing the
- risk of fraud. [49] Further, we seek comment on whether there are
- other services available to payphone providers that reduce the risk of
- fraud, or whether payphone providers can prevent the fraud. We
- request comment on whether a federal fraud policy based on the Florida
- model is necessary to apportion the costs of payphone fraud, or
- whether tariffs filed by carriers for blocking and screening services
- should be required to clearly articulate the responsibilities of the
- parties and apportion the costs of fraud incurred in the use of these
- services.
-
-
- D. Cellular Fraud
-
- --32-- The fraudulent use of cellular telephones has become a serious
- industry problem that results in financial losses to consumers, and
- increases the cost of doing business for the cellular industry. While
- there is no official reporting system, the industry estimates that
- cellular carriers lose between $100 million and $300 million per year
- because of cellular fraud.
-
- --33-- The three major types of cellular fraud are: subscription
- fraud; stolen phone fraud; and access fraud. Subscription fraud
- occurs when someone subscribes to cellular service with fraudulent
- information or false identification and with no intention to pay for
- service. Stolen phone fraud involves the unauthorized use of a phone
- stolen from a legitimate customer before that customer can report the
- theft. Access fraud involved the unauthorized use of cellular service
- through the tampering, manipulation, or programming of a cellular
- phone's Electronic Serial Number (ESN, a 32-bit binary number that
- uniquely identifies a mobile station to any cellular system for
- billing and other purposes) or Mobile Identification Number (a 24-bit
- number that corresponds to the seven-digit directory telephone number
- assigned to the mobile station). Access fraud represents the most
- sophisticated of the three types of fraud and the most serious in
- terms of dollars lost. There are two major types of access fraud:
- tumbling, and counterfeiting or cloning. In tumbling, an unauthorized
- user either randomly or sequentially changes the ESN or MIN after
- every call, thereby confusing a cellular system switch long enough to
- complete a call. Counterfeiting or cloning fraud occurs when an
- unauthorized user programs a valid subscriber MIN/ESN match into a
- phone. The unauthorized user then uses the cloned phone until
- detected. While recent developments involving pre-call validation
- [52] greatly reduce the amount of fraud due to tumbling, cloning fraud
- continues to grow at a rapid pace. The Secret Service estimates that
- altered or cloned cellular phones are becoming as common as fake
- identification cards, and are the instruments of major crimes such as
- drug-trafficking.
-
- --34-- Comment Requested: In _Revision of Part 22 of the Commission's
- rule governing the Public Mobile Service (Notice of Proposed
- Rulemaking)_, 7 FCC Rcd 3658, 3741 (1992), we proposed a rule to help
- reduce cellular fraud caused by tampering with the ESN. [53] The
- proposed rule establishes additional technical specifications for
- mobile equipment to prevent tampering with the ESN. We now seek
- comment on what further efforts on the part of the cellular industry,
- manufacturers, vendors, law enforcement agencies, and the Commission
- would aid in combatting cellular fraud. We seek comment on whether
- the Commission should consider stricter measures where cellular fraud
- occurs, and if so, what measure the Commission should consider. [54]
- We recognize that certain types of cellular fraud could be included in
- the CPE-Based Fraud category. We, therefore, request comment on how
- the issues raised above in our discussion of CPE-based fraud should be
- resolved in the context of cellular fraud. Specifically, are adequate
- incentives in place for industry to develop anti-fraud solutions, or
- should new initiatives be chartered by the Commission? Is a shared
- liability theory for cellular fraud appropriate? Is unique criminal
- legislation necessary? Should labeling requirements be adopted?
- Comments should also present detailed proposals or alternatives to
- address cellular fraud.
-
-
- E. Line Information Database (LIDB) Fraud
-
- --35-- A LIDB is a line information database created by an individual
- local exchange carrier. [55] LIDB service enables customers such as
- interexchange carriers to query the database to determine whether a
- LEC joint use calling card [56] is valid for use, or whether a
- particular telephone number can accept collect or third-party billed
- calls, before transmitting any call using that card or line number.
- Each database can be accessed by other LECs, IXCs, and other customers
- to obtain data on the account status of LEC joint use calling cards,
- as well as information on line number, such as third party billing or
- collect call restrictions. This information is stored in the LIDB and
- updated by the LEC on a regular basis. [57]
-
- --36-- Comment requested: As the owners of the database, it might be
- assumed that the LECs are able to detect fraudulent use, such as
- billing to restricted numbers or unauthorized credit card use.
- However, LIDB customers have an obligation as well; if a LEC card is
- offered for billing, the IXC or operator service provider (OSP) should
- query the LIDB to determine whether the card is valid for use. If the
- customer queried the LIDB each time the card is offered for payment,
- the LEC is able to detect high spikes of usage; i.e. multiple
- validation queries to the LIDB in a short time period, prompting the
- LEC to investigate and then to determine whether it should deactivate
- the card. However, the fraud does not always consist of multiple
- calls within a short period of time and, therefore, may not be
- detectable by the LEC. For example, the fraud might consist of one
- call of long duration. In addition, the fraud perpetrator might
- discover the usage spike set by the LEC and place calls in such a
- manner that the LEC would not immediately detect the fraud. The LECs
- assert that detection of usage spikes is the only mechanism available
- for detecting fraud associated with the LIDB.
-
- --37-- It has been alleged that losses from calling card fraud would
- be substantially reduced if the LEC had access to the calling number
- and the called number from the IXCs, as those numbers provide
- information on the origination and termination points of the call.
- This would allow the LEC to identify a call originating from or going
- to an area associated with fraud problems. This information would
- assist the LECs in developing a customer calling pattern profile that
- could be accessed in a case of suspected fraud. We seek comment on
- whether the carriers querying LIDB should provide the LECs with the
- originating calling party number and the called numbers. Commenters
- are also requested to explain how the presence or absence of this
- information should affect any decision concerning the allocation of
- liability for toll losses, and whether carriers should be permitted to
- charge for the provision of this information.
-
- --38-- Under the Truth in Lending Act and Federal Reserve Board
- regulations, cardholder liability for unauthorized use of calling
- credit cards is limited to $50. [58] Therefore, when a card number is
- stolen or used without the cardholder's knowledge or permission, the
- LECs and their LIDB customers (IXCs and OSPs) must decide between
- themselves who will bear the cost of the uncollectable toll revenues.
- Of course, cardholders are under an affirmative obligation to report
- lost or stolen credit cards immediately, and to protect against theft
- of their card numbers. In the _LIDB Investigation Order_ the
- Commission required the LIDB providers subject to that investigation
- to include in their tariffs certain minimum procedures to help reduce
- the number of fraudulent calls. However, the Commission left open the
- issue of liability for toll fraud losses that results from LEC
- provision of erroneous LIDB information. [60]
-
- --39-- Assignment of liability for toll losses among LIDB providers
- and LIDB customers raises two concerns that should be addressed.
- First, there may be many different fact patterns each time a loss is
- generated, making the development of a general rule difficult. In
- addition, limitation of liability provisions have long been accepted
- by the courts in the absence of willful misconduct or gross
- negligence. [61] Consequently, clauses limiting a carrier's financial
- liability to the cost of the service are found in virtually all common
- carrier tariffs. While a carrier's customers in this case are likely
- to have a sophisticated understanding of the risks of credit card
- fraud, LIDB providers should have incentives to make LIDB as effective
- as it can be. We seek comment on whether these limitations of
- liability should be permitted to shield the LECs from responsibility
- for toll losses incurred when a joint use calling card is used to bill
- fraudulent calls or whether the Commission should establish a rule for
- allocating liability for toll losses. Commenters are also requested
- to comment on whether such liability should be described in the LECs'
- tariffs.
-
- F. Other Proposals and Request for Comment
-
- --40-- In addition to the proposals already made herein, we propose to
- amend Part 68 of the Commission's rules to require equipment
- manufacturers to provide warnings regarding the potential risk of toll
- fraud associated with use of the equipment. [See Appendix E] We
- further propose that the warnings be prominent and conspicuous and
- included in any instruction manual or other literature accompanying
- the equipment, and on the exterior packaging of the equipment.
- Further, we propose that the warning in the instructional manual or
- literature discuss the customer's financial exposure and measures
- available to limit that exposure. We also propose in the case of PBX
- and similar equipment, if default codes are set by the manufacturer,
- vendor, or carrier, those codes must be fully explained in the
- instructional manual or literature and must explain the risks of using
- the equipment without modifying these default codes. We seek comment
- on specific language of warnings, whether warnings should be required
- for only newly registered equipment or whether they should be required
- for all telephone equipment already registered pursuant to Part 68.
- We also seek comment on whether the Commission should adopt standards
- for determining whether FCC registrations for any classes of
- particularly risk-prone equipment should be revoked, or whether
- warnings should be required as updates to manuals currently in use.
- Further, we seek comment on how others in the manufacturing and
- distribution chain of telephone equipment could warn consumers of the
- risks of fraud.
-
- --41-- Many comments filed in response to the _en banc_ hearing, the
- _Pacific Mutual_ proceeding, and the petition of the Florida PSC
- conclude that carriers need to incorporate more safeguards into their
- network operations to protect against and detect instances of toll
- fraud and abuse. For example, in its comments, Science Dynamics
- Corporation (SDC) [63] explains that it develops products for carriers
- that can curb or eliminate some sources of toll fraud. SDC
- manufactures a device that controls inmate access to the
- telecommunications network, and a system that monitors toll usage by
- predetermined customers and places a cap on long distance usage over a
- monthly billing cycle. Many commenters contend that such solutions
- that would minimize the fraud problem are available; however, they
- argue that as long as the regulated carriers do not have to absorb
- directly the losses attributable to fraud, carriers have little
- incentive to invest in preventative systems. The issue has been
- raised regarding LEC and IXC incentives to prevent fraud in light of
- their billing and collection arrangements. We request comment on
- whether incentives that the telecommunications industry has to
- initiate anti-fraud solutions can be strengthened, and what other
- actions the Commission should take to further fraud prevention. We
- also seek comment regarding network changes which could influence toll
- fraud detection or prevention. Specifically, we request comment on
- how, when, and where a carrier should release such information when it
- makes a network change.
-
- IV. CONCLUSION
-
- --42-- The Commission's obligation to regulate interstate
- telecommunications services so that the public has rapid and efficient
- service at reasonable rates requires that our policies keep pace with
- rapidly changing technology and industry structure. In this _Notice
- of Proposed Rulemaking_, we request comment on the questions and
- proposals set forth above, the proposed rule set forth in Appendix E,
- and encourage participation by interested parties. The purpose of
- this rulemaking is to develop effective and efficient measures to
- address both existing and developing toll fraud problems, without
- hindering the development of new technologies that provide benefits to
- the public.
-
- IV. PROCEDURAL MATTERS
-
- --43--Initial Regulatory Flexibility Act Analysis on the Notice of
- Proposed Rulemaking and Ex Parte Rules
-
- Ex Parte Rules -- Nonrestricted Proceeding
-
- This is a nonrestricted notice and comment rulemaking proceeding. _Ex
- Parte_ presentations are permitted, except during the Sunshine Agenda
- period, provided they are disclosed as provided in Commission rules.
- See generally 47 CFR 1.1202, 1.1203, and 1.1206(a)
-
- Objectives
-
- This rulemaking proceeding is initiated to develop effective and
- efficient measures to address toll fraud problems. The Commission
- requests comment on proposal to achieve closer coordination between
- the industry, consumers, vendors, law enforcement agencies, Congress
- and the Commission to aid in the detection and prevention of toll
- fraud; improve consumer education initiatives by the Commission,
- consumer groups, and the telecommunications industry; determine that
- tariff liability provisions that fail to recognize an obligation by
- the carrier to warn customers of risks of using carrier services are
- unreasonable; establish a federal policy assigning liability for
- payphone fraud; and codify a requirement for written warnings for all
- telecommunications equipment registered under Part 68.
-
- Reporting, Recordkeeping and Other Compliance Requirements
-
- The actions proposed in this Notice of Proposed Rulemaking may affect
- large and small common carriers, manufacturers of equipment registered
- under Part 68, and CPE owners. It is not estimated that the burden of
- including warnings with the filing of Part 68 registration
- applications will be a significant economic burden on manufacturers.
- It is not estimated that the burden of including warnings in tariff
- filings or in billing inserts will be a significant economic burden on
- subject common carriers.
-
- Description, Potential Impact, and Number of Small Entities Involved
-
- The proposals discussed in this Notice of Proposed Rulemaking primary
- could affect the degree to which small businesses are responsible for
- charges associated with fraudulent calls made over their equipment.
- The Secretary shall send a copy of this Notice of Proposed Rulemaking
- including the certification to the Chief Counsel for Advocacy of the
- Small Business Administration in accordance with paragraph 603(A) of
- the Regulatory Flexibility Act. Pub. L. No. 96-354, 94 Stat. 1164, 5
- USC 6021 et seq.
-
- Any Significant Alternatives Minimizing the Impact of Small Entities
- Consistent with the Stated Objectives
-
- The Notice of Proposed Rulemaking solicits comments on a variety of
- alternatives to achieve Commission objectives.
-
- Paperwork Reduction
-
- The proposals suggested impose filing requirements on entities already
- required to file Part 68 and tariff filings.
-
- Comment Dates
-
- Pursuant to applicable procedures set forth in Sections 1.415 and
- 1.419 of the Commission's rules, 47 CFR 1.415 and 47 CFR 1.419,
- interested parties may file comments on or before January 14, 1994 and
- reply comments on or before February 10, 1994. To file formally in
- this proceeding, interested parties must file an original and four
- copies of all comments, reply comments, and supporting documents with
- the reference number "CC Docket 93-292" on each document. If
- interested parties want each Commissioner to receive a personal copy
- of comments, interested parties must file an original plus nine
- copies. Interested parties should send comments and reply comments to
- the Office of the Secretary, Federal Communications Commission,
- Washington DC 20554. Comments and reply comments will be available
- for public inspection during regular business hours in the FCC
- Reference Center, Room 239, Federal Communications Commission, 1919 M
- Street, N.W., Washington DC. Copies of comments and reply comments
- are available through the Commission's duplicating contractor:
- International Transcription Service, Inc. (ITS, Inc), 2100 M Street,
- N.W., Suite 140, Washington DC 20037, (202) 857-3800.
-
-
- V. ORDERING CLAUSES
-
- --44-- Accordingly, IT IS ORDERED, pursuant to 47 USC 154(i) of the
- Communications Act of 1934, as amended, 47 USC 154(i), that NOTICE IS
- HEREBY GIVEN, of the proposed regulatory action described above and in
- Appendix E and that COMMENT IS SOUGHT on these proposals.
-
- --45-- The Secretary shall serve a copy of this Notice of Proposed
- Rulemaking on the Small Business Administration.
-
- FEDERAL COMMUNICATIONS COMMISSION
- William F. Caton
- Acting Secretary.
-
- [Appendix A through Appendix D are lists of commenters and panelists
- for prior proceedings, and have been left out of this electronic
- version.]
-
- APPENDIX E, Proposed Rules
-
- Part 68 of the Commission's Rules and Regulations (chapter 1 of Title
- 47 of the Code of Federal Regulations, part 68) is proposed to be
- amended as follows:
-
- PART 68 -- CONNECTION OF TERMINAL EQUIPMENT TO THE TELEPHONE NETWORK
-
- 1. The authority citation for Part 68 continues to read as follows:
-
- Authority: Section 4, 5, 303, 48 Stat. 1066, 1068, 1082 as amended; 47
- USC 154,155,303.
-
- 2. Section 68.200 "Application for equipment registration" is proposed
- to be amended by adding a new subsection (l) [lower-case L]:
-
- (l) A prominent and conspicuous warning accompanying the equipment and
- included in any instruction manual or other literature accompanying
- the equipment and on the exterior packaging of the equipment which
- warns equipment users of the risk of toll fraud associated with the
- equipment and its specific features. The warning in the instructional
- manual or literature should discuss the customer's financial exposure
- and measures available to limit that exposure. In the case of PBX and
- similar equipment, if default codes are set by the manufacturer,
- vendor, or carrier, those codes must be fully explained in the
- instructional manual or literature and the warning required by this
- section must explain the risks of using the equipment without
- modifying those default codes.
-
-
- FOOTNOTES
-
- [1] The Commission's jurisdiction relates to interstate and foreign
- communications by wire or radio. See 47 USC 152
-
- [2] The following were released as Public Notices: "Consumer Alert --
- Toll Fraud" released 4/19/91; "Consumer Alert, Telecommunications Toll
- Fraud, Second in a Series" released 6/9/93; "Consumer Alert, Toll
- Fraud Risks During the Year-End Holiday Season, Third in a Series"
- #31003 released 12/17/92; "Consumer Alert -- Toll Fraud, Fourth in a
- Series" released 6/15/93; "Consumer Alert -- Toll Fraud --
- Impersonators of Investigative Officers, Fifth in a Series" released
- 8/3/93. Consumer Alerts have been distributed to the industry, trade
- associations, and the press.
-
- [3] See Public Notice #23921, 7/9/92
-
- [5] See Public Notice DA 92-1464 released 10/22/92; file no. 93-Toll
- Fraud-01, Appendix A.
-
- [6] See Order on Reconsideration, CC Docket 91-35, 7 FCC Rcd 4355 (1992)
-
- [7] E.G., the Toll Fraud Prevention Committee, a committee formed
- under the auspices of the Alliance for Telecommunications Industry
- Solutions (ATIS) in order to identify issues involving toll fraud and
- develop resolutions for voluntary implementation by the industry; the
- Communications Fraud Control Association, a non-profit national
- clearinghouse for toll fraud information and prevention; the United
- States Secret Service, Electronic Crimes Branch of the Financial
- Crimes Division.
-
- [8] Chartways Technologies, Inc. v. AT&T Communications, Memorandum
- Opinion and Order, FCC 93-394 released 8/19/93
-
- [9] See 47 USC 201(b), 202(a)
-
- [10] Chartways Technologies, Inc. v. AT&T Communications, 6 FCC Rcd
- 2942 (Common Carrier Bureau, 1991).
-
- [11] We note that on November 5, 1992, Judge Irving Hill, United
- Stated District Court, Central Division of California, granted summary
- judgment to the plaintiff, AT&T, in AT&T v. Pacific Mutual.
- Specifically, Judge Hill was persuaded by the logic of the Bureau's
- Chartways decision and found the tariff unambiguous. File no. CV
- 91-6793-IH (filed 11-5-92); see also AT&T v. Jiffy Lube, United Stated
- District Court, File no. K-9- 2400 (concurring with Judge Hill and
- finding AT&T tariff unambiguous).
-
- [12] Chartways, FCC 93-394, paragraphs 11-13
-
- [13] Id. at paragraph 16
-
- [14] Id. at paragraphs 19-20
-
- [15] United Artists Payphone Corp. v. New York Telephone Co. and
- American Telephone and Telegraph Co., Memorandum Opinion and Order,
- FCC 93-387 released 8/18/93 (_United Artists_)
-
- [16] Id. at paragraph 5
-
- [17] Id. at paragraph 10-11
-
- [18] Id. at paragraph 12
-
- [19] Id. at paragraph 13
-
- [20] Id. at paragraph 14
-
- [21] See paragraph 21, infra.
-
- [22] _United Artists_, paragraph 15
-
- [23] See paragraph 35, infra.
-
- [24] See Public Notice released 3/14/91
-
- [25] See Public Notice released 4/5/93
-
- [28] According to the U. S. Secret Service, most federal criminal
- investigations of toll fraud are undertaken pursuant to the Access
- Device Fraud statute, 18 USC 1029, which was enacted to stop credit
- card fraud. The Secret Service estimates that as few as thirteen
- states have enacted statutes specifically dealing with telephone fraud
- crimes.
-
- [29] See paragraph 33, infra.
-
- [30] See Public Notice DA 91-284 released 3/14/19
-
- [31] See Appendix C
-
- [32] See Comments of AVNET and Mitsubishi
-
- [33] See e.g. Comments of Directel, Inc.
-
- [34] See e.g. Comments of Broyhill, FMC, and Panel Concepts.
-
- [35] See also Comments of CCCS, Inc.
-
- [36] See e.g. Comments of MCI, LiTel, MidAmerican, SWB, and Ameritech
-
- [37] In its comments, Bell Atlantic refer to Amendment of Section
- 64.702 of the Rules, 77 FCC 2ed 384 (1980)
-
- [38] With regard to the reply comments of Bell Atlantic, we are not
- proposing to regulate carriers' provision of CPE, but rather carriers'
- imposition of charges for fraudulent interstate service
-
- [39] Originating line and billed number screening services inform
- operator service providers of any billing restrictions on its lines.
-
- [40] Florida Administrative Code, rules 25-4.076, 25-24.475, and 25-
- 24.515. Order number PSC-93-0108-FOF-TP
-
- [41] The Florida approach was raised by a commenter in the OSP
- rulemaking proceeding, but was not examined substantively by the
- Commission because it was beyond the scope of that proceeding. See
- Report and Order, CC Docket 91-35, 6 FCC Rcd 4736, 4744-45 (1991)
-
- [42] The Florida rule prohibits a company providing interexchange
- service or local exchange service from collecting from a pay telephone
- provider for charges billed to a line for calls that originated from
- that line through the use of 10xxx+0, 10xxx+1, 950-1/0xxx+0, or 1-800
- access code, or when the call originated from that line otherwise
- reached an operator position, if the originating line is covered by
- outgoing call screening and the call was placed after the effective
- date of the outgoing call screening order. The rule also prohibits a
- company providing interexchange service or local exchange service from
- collecting from a pay telephone provider for charges for collect or
- third party billed calls, if the line to which the call was billed was
- covered by incoming call screening and the call was placed after the
- effective date of the incoming call screening order. The rule further
- provides that any calls billed through the LEC or directly by the IXC,
- or through a billing agent, that have been identified as not
- collectable must be removed from any pay telephone provider's bill
- after the pay telephone provider gives notice of the fraudulent
- charges to the billing party and such notice must be provided to the
- LEC and IXC in writing no later than the due date of the bill. The
- LEC is responsible for charges that are associated with the failure of
- the LEC's screening services, and the IXC is responsible for charges
- that are associated with its failure to properly validate calls via
- the appropriate LEC data base.
-
- [43] Florida PSC petition at 3.
-
- [44] See attachment at 27, Question No. 5, Florida PSC petition. The
- Florida PSC asks what disposition would be made of toll fraud charges
- if they had originated or terminated at an AT&T payphone. AT&T
- responds that "because of the differing status of AT&T payphones which
- are part of AT&T's network, the calls could not have occurred under
- the same circumstances."
-
- [45] see e.g. Comments of IMR Capital Corp., Indiana Payphone
- Association, Intellical, Inc., Louisiana Payphone Association, Midwest
- Independent Coin Payphone Association, Mississippi Public
- Communication Association, Minnesota Independent Payphone Association,
- New Jersey Payphone Association,, Inc., North Carolina Payphone
- Association, South Carolina Division of Information Resource
- Management, Utah Payphone Association, Arizona Payphone Association,
- California Payphone Association, Florida Payphone Association, Georgia
- Public Communications Association, GET Service Corp., and Independent
- Payphone Association of New York.
-
- [46] Our operator service rules require only the unblocking of
- operator-assisted access, not direct-dialed (1+) access. See 47 CFR
- 64.704
-
- [47] See e.g. Comments of Sprint, Interexchange Carrier Industry
- Committee Toll Fraud Subcommittee, MCI, SWB, Ameritech, Bell Atlantic,
- BellSouth, and AT&T.
-
- [48] See Comments of Bell Atlantic at 2.
-
- [49] In our Order on Further Reconsideration and Further Notice of
- Proposed Rulemaking, Policies and Rules Concerning Operator Service
- Access and Pay Telephone Compensation, 8 FCC rcd 2863 (1993), we
- requested comment on whether to require BNS and OLS services to be
- tariffed at the federal level, whether these services should be
- available unbundled, to all customers, and at reasonable rates, and
- whether to require LECs to extend their international blocking
- services to non-aggregator business and residential subscribers. With
- regard to the issue of BNS and OLS, the record in this proceeding
- reflects that the LECs generally oppose federal tariffing of these
- services because these services are traditionally provided through
- state tariffs. The record in this proceeding also indicates, however,
- that existing state tariffed screening services are not uniform and
- are frequently not available to all classes or aggregators.
-
- [52] Pre-call validation occurs when the cellular switch compares an
- incoming caller's ESN/MIN number against a subscriber database before
- the call is completed.
-
- [53] See Proposed Section 22.929 which provides that each mobile
- transmitter must have a unique ESN that must be factory set, and must
- not be alterable, removable, or otherwise able to be manipulated in
- the field. This proposed rule requires that the ESN host component
- must be permanently attached to the main circuit board of the mobile
- transmitter and the integrity of the unit's operating software must
- not be alterable. Finally, the cellular equipment must be designed so
- that any attempt to remove, tamper with, or change the ESN chip will
- render the mobile transmitter inoperative.
-
- [54] See Section 503(b)(5) of the Commission's rules that provides for
- forfeiture proceedings against non-licensees or non-applicants who
- willfully or repeatedly violate the Commission's rules.
-
- [55] See Local Exchange Carrier Line Information Database, CC Docket no
- 92-24 (1993) (LIDB Investigation Order)
-
- [56] LEC joint use calling cards bear account numbers supplied by a
- LEC, are used for the services of the LEC and an IXC, and are
- validated by access to data maintained by the LEC. See Second Report
- and Order, Policies and Rules concerning Local Exchange Carrier
- Validation and Billing Information for Joint Use Calling Cards, CC
- Docket No. 91-115, 8 FCC Rcd 4478, 4478 fn.5 (1993)
-
- [57] In the recent _LIDB Investigation Order_, the Commission
- investigated 10 LIDB databases offering validation services. The
- record indicates that these databases are updated 24 hours a day,
- seven days a week, and that each LEC offering LIDB validation services
- also had a fraud control program.
-
- [58] 15 USC 1643; 12 CFR 226.12(b)(1)
-
- [59] _LIDB Investigation Order_, at paragraph 19 and 27-34
-
- [60] Id. at paragraphs 29-30
-
- [61] See e.g. Western Union Telegraph Company v. Esteve Brothers &
- Co., 256 US 556, 571 (1921); Primrose v. Western Union Telegraph Co.,
- 154 US 1 (1894); Robert Gibb & Sons, Inc. v. Western Union Telegraph
- Co., 428 F.Supp. 140 (DND 1977)
-
- [63] See Comments of Science Dynamics Corporation (SDC), Pacific Mutual
- proceeding.
-
-