Caller ID provides some protection against unwanted calls, but can still be turned off by the calling party. Even where end-user caller ID is not available, calls are still logged, both in billing records at the originating telco and via automatic number identification, so the perpetrator's phone number can still be discovered in many cases. However, these do not provide complete protection: harassers can use payphones and, in some cases, caller ID (but not necessarily automatic number identification itself) can be spoofed or blocked. Mobile telephone abusers can (at some cost) use "throwaway" mobile phones or SIMs. Voice over IP users may send bogus caller ID or route calls through servers in multiple countries.
Even in these cases, with sufficient law enforcement and telco effort, persistent abusers can often be tracked down by technical means.
Call screening is another countermeasure against unsolicited calls.[3]
Most telephone companies have a department devoted to handling complaints regarding unsolicited phone calls. In criminal cases such as obscene or threatening phone calls, many police departments have dedicated resources devoted to dealing with such cases. In the United Kingdom, the communication regulator Ofcom offers a service to report on silent calls while the Telephone Preference Service (TPS) allows consumer to register on a do-not-call-list for marketing calls.[4]
On December 19, 2018, the Canadian Radio-television and Telecommunications Commission (CRTC) announced that beginning December 19, 2019, phone providers will be required to impose universal, network-level filtering of all calls that "[purport] to originate from telephone numbers that do not conform to established numbering plans".[5]
See also
Look up nuisance call in Wiktionary, the free dictionary.
^CAIN, RITA MARIE (February 1994). "Call up Someone and Just Say ?Buy??Telemarketing and the Regulatory Environment". American Business Law Journal. 31 (4): 641–665. doi:10.1111/j.1744-1714.1994.tb00845.x.
^Cox, K.C., Eick, S.G., Wills, G.J. and Brachman, R.J., 1997. Brief application description; visual data mining: Recognizing telephone calling fraud. Data Mining and Knowledge Discovery, 1(2), pp.225-231.