Attempt to ban voicemail spamming


Helen Martin

Virus Bulletin, UK
Editor: Helen Martin


Rogers Wireless Inc. appeals to Canadian Radio-television and Telemarketing Commission for a ban on voicemail spamming.

Canadian wireless operator Rogers Wireless Inc. is appealing to the Canadian Radio-television and Telecommunications Commission (CRTC) to ban the marketing practice of voicemail spamming.

The process the company objects to is known as 'voicecasting' and involves the use of an automated dialling device to transmit marketing messages directly into the voicemail accounts of mobile telephones. Because the messages are transmitted directly to the voicemail accounts, the telephone does not ring, so consumers don't realise they've received the advertising messages until they retrieve their voicemail.

In a complaint filed with the CRTC, Rogers Wireless argued that mobile phone customers should not have to pay airtime charges to access marketing messages that have been disguised as legitimate voicemail. The company also pointed out that the costs are even higher for customers who retrieve messages while abroad, when roaming or long-distance charges also come into play.

Somewhat surprisingly, the man credited with inventing voicemail spamming says he agrees with Rogers Wireless. Cesar Correia, founder of Infolink Technologies Inc., the largest provider of voicecasting services in Canada, said: 'Customers should not be incurring charges when somebody is sending a voicecast to a cellphone. It's unfair to the public'.

Telephone companies and consumer groups will be hoping that Rogers Wireless has put together a strong case - in 2001 Bell made a similar complaint to the CRTC about voicecasting, but the regulator ruled that there was insufficient evidence to suggest that the practice was a nuisance to consumers. This time the CRTC is expected to issue a public notice and seek comment on the issue.



Latest articles:

VB2018 paper: Analysing compiled binaries using Logic

In this paper Thaís Moreira Hamasaki provides an introduction to some practical applications of SMT solvers in IT security, investigating the theoretical limitations and practical solutions, focusing on their use as a tool for binary static analysis.

VB2018 paper: Internet balkanization: why are we raising borders online?

Nowadays, walls are not just being raised in the real world, but on the Internet as well. Countries want to isolate themselves and shut down the information they are not comfortable with, or the companies they don’t want to do business with. Freedom…

VB2018 paper: Where have all the good hires gone?

Much ink has been spilled on the subject of the information security skills gap, and how difficult it is to hire and retain people for these positions. And yet, we all know someone who has had a hard time finding a suitable position despite having…

VB2018 paper: Little Brother is watching – we know all your secrets!

In their research, Siegfried Rasthofer, Stephan Huber & Steven Arzt evaluated the security level of the most popular family-tracking apps on Android. They assessed the security of the respective apps and conducted assessments of the corresponding…

VB2018 paper: Inside Formbook infostealer

Formbook is an infostealer that has been advertised for sale in public hacking forums since February 2016 by a user with the handle ‘ng-Coder' but only came to public attention after it was extensively used in spam campaigns in late 2017. This paper…

Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.