Regulators to freeze nuisance Triple Zero callers

 

Around five million "non-genuine calls" a year.

The Australian Mobile Telecommunications Association (AMTA) has begun blocking the mobile services of nuisance callers responsible for making non-genuine calls to the emergency hotline, Triple Zero.

AMTA plans to freeze the mobile services of nuisance callers - who when blocked will ironically discover that Triple Zero is the only service remaining available to them.

AMTA spokesman, Randall Markey, said that blocking every service but Triple Zero would hopefully change the way a caller behaved.

Markey said AMTA would consider also blocking Triple Zero for nuisance callers if abuse continued.

"It's like the little boy who cried wolf," he told iTnews.

The move was endorsed by communications watchdog, ACMA, together with emergency hotline operator Telstra.

ACMA said that the "handling of genuine calls is being increasingly compromised by the need to deal with non-genuine calls or calls that do not relate to time critical or life threatening emergencies.

"This is another good example of the mobile telecommunications industry working with Telstra, as the Emergency Call Person for Triple Zero, to develop industry-wide solutions to tackle the problem of non-genuine calls to Triple Zero," said Chris Chapman, chairman of the ACMA.

ACMA said Triple Zero should only be dialled in emergencies that are life-threatening or in time-critical situations requiring a rapid response from police, fire or ambulance services.

Telstra reported that it received 10.3 million calls to Triple Zero in 2008-09 and that around half the calls made did not relate to a genuine emergency situation and were not transferred to an emergency service organisation.


Regulators to freeze nuisance Triple Zero callers
 
 
 
Top Stories
Time management tips for CIOs
[Blog post] How to get to the genba.
 
Making a case for collaboration
[Blog post] Tap into your company’s people power.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1096

Vote