Advanced Methods To Target and Eliminate Unlawful Robocalls, 1566-1577 [2018-00457]

Download as PDF 1566 Federal Register / Vol. 83, No. 9 / Friday, January 12, 2018 / Rules and Regulations sradovich on DSK3GMQ082PROD with RULES 13, 2017, for the information collection requirements contained in the modifications to 47 CFR 10.320(g). Under 5 CFR part 1320, an agency may not conduct or sponsor a collection of information unless it displays a current, valid OMB Control Number. No person shall be subject to any penalty for failing to comply with a collection of information subject to the Paperwork Reduction Act that does not display a current, valid OMB Control Number. The OMB Control Number is 3060–1126. The foregoing notice is required by the Paperwork Reduction Act of 1995, Public Law 104–13, October 1, 1995, and 44 U.S.C. 3507. The total annual reporting burdens and costs for the respondents are as follows: OMB Control Number: 3060–1126. OMB Approval Date: March 13, 2017. OMB Expiration Date: March 31, 2020. Title: Testing and Logging Requirements for Wireless Emergency Alerts (WEA). Form Number: N/A. Respondents: Business or other forprofit entities, and state, local, or tribal government. Number of Respondents and Responses: 80 respondents; 451,600 responses. Estimated Time per Response: 0.0000694 hours (2.5 seconds)–2 hours. Frequency of Response: Monthly and on occasion reporting requirements and recordkeeping requirement. Obligation To Respond: Statutory authority for these collection is contained in sections 1, 2, 4(i), 4(o), 301, 303(r), 303(v), 307, 309, 335, 403, 624(g), 706, and 715 of the Communications Act of 1934, as amended, 47 U.S.C. 151, 152, 154(i), 154(o), 301, 301(r), 303(v), 307, 309, 335, 403, 544(g), 606, and 615, as well as by sections 602(a), (b), (c), (f), 603, 604 and 606 of the WARN Act, 47 U.S.C. 1202(a), (b), (c), (f), 1203, 1204 and 1206, unless otherwise noted. Total Annual Burden: 125,390 hours. Total Annual Cost: No Cost. Nature and Extent of Confidentiality: Confidentiality protection at least equal to that provided by the federal Freedom of Information Act upon request, but only insofar as those logs pertain to Alert Messages initiated by that emergency management agency. Privacy Act: No impact(s). Needs and Uses: Section 10.320 describes the provider alert gateway requirements, specifically with respect to logging. The CMS provider must log the CMAC attributes of all Alert VerDate Sep<11>2014 15:52 Jan 11, 2018 Jkt 244001 Messages received at the CMS Provider Alert Gateway, including time stamps that verify when the message is received, and when it is retransmitted or rejected by the Participating CMS Provider Alert Gateway. If an Alert Message is rejected, a Participating CMS Provider is required to log the specific error code generated by the rejection. The CMS provider must also maintain a log of all active and cancelled Alert Messages for at least 12 months after receipt of such alert or cancellation and make their alert logs available to the Commission and FEMA upon request. Participating CMS Providers are also required to make alert logs available to emergency management agencies that offer confidentiality protection at least equal to that provided by the federal Freedom of Information Act upon request, but only insofar as those logs pertain to Alert Messages initiated by that emergency management agency. This information will inform emergency managers whether their alerts are delivered, and if not, why not. We anticipate that the alert log maintenance requirements will serve to ensure that alert logs are available when needed, both to the Commission and to emergency management agencies. These logs have potential to increase their confidence that WEA will work as intended when needed. Alert logs are also necessary to establish a baseline for system integrity against which future iterations of WEA can be evaluated. Without records that can be used to describe the quality of system integrity, and the most common causes of message transmission failure, it will be difficult to evaluate how any changes to WEA could affect system integrity. Federal Communications Commission. Katura Jackson, Federal Register Liaison Officer, Office of the Secretary. [FR Doc. 2018–00463 Filed 1–11–18; 8:45 am] BILLING CODE 6712–01–P FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 64 [CG Docket No. 17–59; FCC 17–151] Advanced Methods To Target and Eliminate Unlawful Robocalls Federal Communications Commission. ACTION: Final rule. AGENCY: In this document, Commission issues new rules that protect consumers from unwanted robocalls by permitting voice service SUMMARY: PO 00000 Frm 00052 Fmt 4700 Sfmt 4700 providers to proactively block telephone calls when the subscriber of a phone number requests that calls purporting to originate from that number be blocked, and when calls purport to originate from three categories of unassigned phone numbers: Invalid numbers, valid numbers that are not allocated to a voice service provider, and valid numbers that are allocated but not assigned to a subscriber. While such calls may appear to be legitimate to those who receive them, they can result in fraud or identity theft. To combat these scams, the new rules expressly authorize voice service providers to block these robocalls without running afoul of the FCC’s call completion rules. To minimize blocking of lawful calls, the Commission encourages voice service providers that elect to block calls to establish a simple way to identify and fix blocking errors. The rules also prohibit providers from blocking 911 emergency calls. DATES: Effective February 12, 2018. FOR FURTHER INFORMATION CONTACT: Karen A Schroeder, Consumer Policy Division, Consumer and Governmental Affairs Bureau (CGB), at (202) 418–0654, email: Karen.Schroeder@fcc.gov. This is a summary of the Commission’s Report and Order, in CG Docket No. 17–59; FCC 17–151, adopted on November 16, 2017 and released on November 17, 2017. The full text of this document will be available for public inspection and copying via ECFS, and during regular business hours at the FCC Reference Information Center, Portals II, 445 12th Street SW, Room CY–A257, Washington, DC 20554. The full text of this document and any subsequently filed documents in this matter may also be found by searching ECFS at: https:// apps.fcc.gov/ecfs/ (insert CG Docket No. 17–59 into the Proceeding block). The Further Notice of Proposed Rulemaking (FNPRM) that was adopted concurrently with the Report and Order is published elsewhere in the Federal Register. SUPPLEMENTARY INFORMATION: Final Paperwork Reduction Act of 1995 Analysis The Report and Order does not contain any new or modified information collection requirements subject to the Paperwork Reduction Act of 1995, Public Law 104–13. In addition, therefore, it does not contain any new or modified information collection burden for small business concerns with fewer than 25 employees, pursuant to the Small Business Paperwork Relief Act of 2002, Public Law 107–198, see 44 U.S.C. 3506(c)(4). E:\FR\FM\12JAR1.SGM 12JAR1 Federal Register / Vol. 83, No. 9 / Friday, January 12, 2018 / Rules and Regulations Congressional Review Act The Commission sent a copy of the Report and Order to Congress and the Government Accountability Office pursuant to the Congressional Review Act, see 5 U.S.C. 801(a)(1)(A). sradovich on DSK3GMQ082PROD with RULES Synopsis 1. In the Report and Order, the Commission takes another important step in combatting illegal robocalls by enabling voice service providers to block certain calls before they reach consumers’ phones. Specifically, the Commission adopts rules allowing providers to block calls from phone numbers on a Do-Not-Originate (DNO) list and those that purport to be from invalid, unallocated, or unused numbers. Providers have been active in identifying these calls and there is broad support for these rules. At the same time, the Commission establishes safeguards to mitigate the possibility of blocking desired calls. 2. Caller ID spoofing is often the key to making robocall scams work. Generally, Caller ID services permit the recipient of an incoming call to know the telephone number of the calling party, and in some cases a name associated with the number, before the recipient answers the call. But Caller ID information can be altered or manipulated, i.e., spoofed, so that the name or number displayed to the called party does not match that of the actual subscriber or the actual originating number. Though callers can use spoofing to mislead or even defraud the called party, there are legitimate uses for spoofing. 3. Congress passed the 2009 Truth in Caller ID Act to ‘‘address the growing problem of Caller ID spoofing done for fraudulent or harmful purposes.’’ Congress limited the spoofing prohibition to the knowing transmission of misleading or inaccurate Caller ID information ‘‘with the intent to defraud, cause harm, or wrongfully obtain anything of value,’’ except where such transmission is determined to be exempt by the Commission. 4. Despite these protections, consumers still receive an unacceptably high volume of illegal robocalls. To combat the robocall problem in a coordinated way, industry established the Robocall Strike Force (Strike Force) in 2016. The Strike Force includes representatives from providers of traditional landline, mobile, and Voice over internet Protocol (VoIP) services, handset manufacturers, operating system developers, and VoIP gateway providers. The Strike Force has said that ‘‘robocalls are best addressed in a VerDate Sep<11>2014 15:52 Jan 11, 2018 Jkt 244001 holistic manner through deployment of a wide variety of tools by a broad range of stakeholders’’ that includes industry blocking of calls. On October 26, 2016, it published the Robocall Strike Force Report (Strike Force Report). The Strike Force specifically asked the Commission to provide guidance on when providers may block a call that the provider believes is illegal. 5. The Consumer and Governmental Affairs Bureau (Bureau) addressed one of the Strike Force’s requests in 2016 by clarifying that voice service providers may block calls using a spoofed Caller ID number if the number’s subscriber requests that they do so. Following that initial guidance, the Strike Force Report sought additional clarification regarding the legality of certain provider-initiated call blocking. Specifically, it sought clarification that: (1) Providers may block calls where the Caller ID shows an unassigned number; and (2) providers may block calls that the provider has determined to be illegal robocalls, so long as the provider takes reasonable steps to confirm that the calls are illegal. 6. In the March 2017 Advanced Methods NPRM and NOI, document FCC 17–24, published at 82 FR 22625, May 17, 2017, the Commission sought comment on whether to take certain steps to facilitate voice service providers’ blocking of illegal robocalls. In the Advanced Methods NPRM and NOI, the Commission proposed rules to allow voice service providers to block telephone calls when the subscriber of a phone number requests that calls purporting to originate from that number be blocked, and when calls purport to originate from three categories of phone numbers: Invalid numbers, valid numbers that are not allocated to a voice service provider, and valid numbers that are allocated but not assigned to a subscriber. 7. Call Completion Considerations. The Commission has generally found call blocking by voice service providers to be unlawful. The Commission also made clear that it is unlawful for providers to block VoIP-Public Switched Telephone Network (PSTN) traffic, and for interconnected and oneway VoIP providers to block voice traffic to or from the PSTN. The Commission has allowed call blocking only in ‘‘rare and limited circumstances.’’ Discussion 8. In the Report and Order, the Commission adopts rules to give voice service providers the option of blocking illegal robocalls in certain, well-defined circumstances. By doing so, the Commission furthers its goal of PO 00000 Frm 00053 Fmt 4700 Sfmt 4700 1567 removing regulatory roadblocks and gives industry the flexibility to block illegal calls. At the same time, the Commission affirms its commitment to protect the reliability of the nation’s communications network and ensure that provider-initiated blocking helps, rather than harms, consumers. These rules outline specific, well-defined circumstances in which voice service providers may block calls that are highly likely to be illegitimate because there is no lawful reason to spoof certain kinds of numbers. Thus, a provider who blocks calls in accordance with these rules will not violate the call completion rules. Conversely, a provider that blocks calls that do not fall within the scope of these rules may be liable for violating the Commission’s call completion rules. Blocking at the Request of the Subscriber to the Originating Number 9. First, the Commission codifies the Bureau’s earlier clarification that providers may block calls when they receive a request from the subscriber to which the originating number is assigned, i.e., a DNO request. The 2016 Guidance Public Notice, document DA 16–1121, made clear that voice service providers—whether providing such service through TDM, VoIP, or CMRS— may block calls purporting to be from a telephone number if the subscriber to that number requests such blocking in order to prevent its number from being spoofed. The Bureau concluded that where the subscriber did not consent to the number being used, the call was very likely made to annoy and defraud, and therefore, no reasonable consumer would wish to receive such a call. The Commission agrees and finds such DNO calls highly likely to be illegal and to violate the Commission’s anti-spoofing rule, with the potential to cause harm, defraud, or wrongfully obtain something of value. 10. The record shows broad support among consumer groups, providers, government, and callers for blocking DNO calls. Consumers Union et. al. emphasizes the urgent need for providers to take action against spoofed calls, stating, ‘‘DNO is one of several promising tools that they should implement to help address the problem.’’ Several commenters note the positive results of DNO trials conducted by members of the Strike Force. 11. ZipDX and others claim that gains from blocking DNO numbers will be temporary, because those making illegal robocalls will simply choose other numbers to spoof when their calls are blocked. The Commission disagrees that this possibility negates the E:\FR\FM\12JAR1.SGM 12JAR1 1568 Federal Register / Vol. 83, No. 9 / Friday, January 12, 2018 / Rules and Regulations demonstrated benefits of such blocking. Allowing providers to block spoofed calls from high-profile numbers, such as IRS phone numbers, that are among those most likely to lure consumers into scams will substantially benefit consumers and help entities that make DNO requests control the integrity of their phone numbers. The Commission believes that codifying the Bureau’s 2016 guidance in the form of a rule gives providers greater certainty that blocking calls at the request of the subscriber is lawful and provides an incentive to engage in this kind of beneficial blocking. 12. Criteria for Blocking DNO Numbers. In its comments, USTelecom suggests five criteria used by the Industry Traceback Group (ITB) to evaluate numbers to determine whether they should be blocked, namely: sradovich on DSK3GMQ082PROD with RULES a candidate number must: (1) Be inboundonly; (2) be currently spoofed by a robocaller in order to perpetrate impersonation-focused fraud; (3) be the source of a substantial volume of calls; (4) have authorization for participation in the DNO effort from the party to which the telephone number is assigned; and/or (5) be recognized by consumers as belonging to a legitimate entity, lending credence to the impersonators and influencing successful execution of the scam. The Commission finds that for purposes of the rule, only two of these criteria are necessary. The number must be used for inbound calls only, and the subscriber to the number must authorize it to be blocked. The Commission agrees with the ITB recommendation that both the subscriber making the request and the provider receiving the request validate that the number is used for inbound calls only. The Commission will not require the subscriber or the provider to determine whether the number is currently being spoofed, is the source of a substantial volume of calls, or is recognized by consumers. While the Commission believes the additional criteria may be helpful in some circumstances, they would impose too high a barrier for inclusion in the DNO list. In addition, the Commission does not want to impose a potentially burdensome analysis requirement on providers that might discourage them from blocking inbound-only numbers at the request of the subscriber. 13. Coordination of Effort. The Commission agrees with Consumers Union et. al. that ‘‘[m]uch responsibility rests with the providers to ensure that DNO works as well as possible’’ through broad industry participation. While full industry participation is not required to achieve positive results, having more providers block a number will allow fewer calls purporting to be from that VerDate Sep<11>2014 15:52 Jan 11, 2018 Jkt 244001 number to go through. Commenters note that providers must coordinate their efforts for this type of call blocking to be used effectively. For example, Sprint comments that, while it supports this type of blocking and participated in the collaborative effort to block spoofed IRS numbers, ‘‘there are currently no automated systems in place to expand the scale of such projects industry-wide or to accommodate much larger numbers of customers requesting blocking.’’ USTelecom points out the inefficiency of requiring subscribers ‘‘requesting DNOs to be forced to make individual requests to multiple providers.’’ ZipDX suggests that the originating provider is in the best position to block these kinds of calls. 14. Other commenters, however, suggest that providers expand their existing ways of sharing information from the test cases and other initiatives to support this effort. As Comcast comments, ‘‘[p]articipants in the Strike Force have set up an ad hoc shared list of numbers that should not be originated and can add more for review.’’ USTelecom comments that its ‘‘Industry Traceback Group has been facilitating a targeted, centralized, and coordinated DNO trial and stands ready to continue to evolve industry efforts on this front going forward.’’ 15. The Commission strongly encourages providers to continue to work cooperatively to share information about any inbound-only numbers for which the subscriber has requested that the number be blocked. At this time, the Commission declines to prescribe a sharing mechanism, especially in light of industry’s existing efforts at coordination. The Commission emphasizes that safeguards must be put in place to prevent numbers used for outbound calls from being wrongly added to the DNO list, whether from hacking, honest mistakes, or some other cause, especially for calls made to emergency services. The Commission encourages industry to continue developing its methods for implementing DNO and encourages providers that choose to do such blocking to establish a mechanism for timely removal of erroneous blocks. 16. Resellers. Finally, the Commission agree with TracFone that wireless resellers may pass along subscriber requests to the underlying carrier that the subscriber’s inbound-only number be blocked. The Commission sees no reason on this record to not allow wireless reseller subscribers to participate in the DNO effort. PO 00000 Frm 00054 Fmt 4700 Sfmt 4700 Calls Purporting To Originate From Unassigned Numbers 17. The Commission next finds that providers may initiate blocking where the call purports to originate from a number that is unassigned. Use of an unassigned number provides a strong indication that the calling party is spoofing the Caller ID to potentially defraud and harm a voice service subscriber. Such calls are therefore highly likely to be illegal. The Commission identifies three categories of unassigned numbers that it determines can be reasonably subject to blocking: (1) Numbers that are invalid under the North American Numbering Plan (NANP); (2) numbers that have not been allocated by the North American Numbering Plan Administrator (NANPA) or the Pooling Administrator (PA) to any provider; and (3) numbers that the NANPA or PA has allocated to a provider, but are not currently used. Providers may block calls purporting to be from numbers that fall into any one of these three categories. Calls Purporting To Originate From Invalid Numbers 18. Providers may block calls purportedly originating from numbers that are not valid NANP numbers. Examples of such numbers include those that use an unassigned area code; that use an abbreviated dialing code, such as 911 or 411, in place of an area code; that do not contain the requisite number of digits; and that are a single digit repeated, such as 000–000–0000, with the exception of 888–888–8888, which is an assignable number. With a few important exceptions detailed below, the record generally supports the assumption that, because these numbers are not valid, a subscriber could not lawfully originate calls from such numbers and these calls should be blocked. Providers, however, must take care that they do not block calls that purportedly originate from valid numbers, especially emergency calls. 19. The record supports the proposal that no caller would spoof an invalid number for any lawful purpose; for example, unlike a business spoofing Caller ID on outgoing calls to show its main call-back number, invalid numbers cannot be called back. Thus, the Commission does not see a significant risk to network reliability in allowing providers to block this category of calls. ATIS suggests that benefits will be temporary because ‘‘widespread blocking of invalid and unallocated numbers could have an unintended negative consequence by driving bad actors to focus their efforts on spoofing E:\FR\FM\12JAR1.SGM 12JAR1 sradovich on DSK3GMQ082PROD with RULES Federal Register / Vol. 83, No. 9 / Friday, January 12, 2018 / Rules and Regulations assigned/valid numbers.’’ Consumers Union et. al., however, comment that blocking such calls is imperative, because ‘‘[c]onsumers do not expect that their phone service would be the means through which illegal and fraudulent scams enter their homes, and providers should not be obligated to deliver illegal messages that could cause consumers harm.’’ In addition, blocking calls purporting to be from invalid numbers ‘‘holds the greatest potential for success in the short term and likely would be the easiest to implement.’’ 20. The Commission rejects suggestions that blocking calls purporting to originate from invalid numbers creates ‘‘significant possibilities of false positives.’’ Although ZipDX claims that ‘‘a significant number’’ of private branch exchanges (PBXs) ‘‘are not properly configured’’ to display an accurate Caller ID and that Caller ID information could theoretically be ‘‘unintentionally altered’’ during a call’s transmission, the record belies such claims. Instead, the record demonstrates that the risk of erroneously blocking such calls is very low and should not be a barrier to allowing providers to block calls purporting to be from invalid numbers. Indeed, the Commission agrees with USTelecom that this small risk simply requires providers to exercise ‘‘caution when instituting blocking in the network.’’ And the Commission reiterates that caution to businesses with PBXs: The responsibility to properly configure PBX equipment lies with the owner, and those spoofing invalid numbers (whether intentionally or not) have the ability to ensure that their calls go through by properly reconfiguring that equipment. 21. Identifying Invalid Numbers. Neustar, which currently is the NANPA and PA, comments that ‘‘information for invalid numbers [is maintained] within the [NANP], and the industry has other sources to identify invalid numbers such as ATIS’s Industry Numbering Committee. . . . Thus, service providers already have access to the information they need’’ for this kind of blocking. Comcast similarly states that ‘‘[v]oice providers generally have ‘intimate knowledge of the [NANP]’ and can ‘easily identify numbers that fall into this category,’ including numbers that use an N11 code in place of an area code or that repeat a single digit.’’ In light of the industry’s assurance that it can confidently identify invalid numbers, the Commission sees no need to further define or limit what is meant by ‘‘a number that is not a valid [NANP] number.’’ The Commission encourages providers to conduct tests or VerDate Sep<11>2014 15:52 Jan 11, 2018 Jkt 244001 simulations before blocking calls purporting to originate from invalid numbers to verify their methods. Calls Purporting To Originate From Numbers Not Allocated to Any Provider 22. The Commission finds that providers may block calls purportedly originating from numbers that are valid but have not yet been allocated by the NANPA or the PA to any provider. Though these numbers are valid under the NANP, the Commission finds that calls purporting to use unallocated numbers are similar to calls purporting to use invalid numbers in that no subscriber can actually originate a call from any of these numbers, and the Commission sees no lawful reason to spoof such numbers because they cannot be called back. Calls purporting to originate from such numbers therefore are highly likely to be illegal. 23. Here, the provider must have knowledge that a certain block of numbers has not been allocated to any provider and therefore that the number being blocked could not have been assigned to a subscriber. The record generally supports allowing permissive blocking of calls purporting to be from unallocated numbers. For example, ATIS points out that ‘‘no subscriber can actually originate a call from these unallocated central office codes and it is unlikely that there is any legitimate, lawful reason to.’’ 24. Parties opposing this type of call blocking generally do so based on implementation difficulties and the risk of blocking legal calls. For example, NCTA warns that the proposal ‘‘could unintentionally result in harm to consumers and should not be adopted at this time,’’ and ZipDX cautions that ‘‘[t]he unintended consequences of these blocks (false positives) are potentially quite troublesome and far outweigh any good that would result from successful robocall blocks.’’ Several commenters also note that, if providers block unallocated numbers, then ‘‘illegal robocallers could simply shift to spoofing assigned numbers.’’ 25. Commenters do not agree on the potential volume of calls that might be blocked under this rule. While ZipDX says the ‘‘fraction of complaints’’ from unassigned numbers is ‘‘miniscule,’’ USTelecom states that ‘‘the scale of numbers at issue in the Commission’s latter two proposals [blocking calls from unallocated and unassigned numbers] are potentially enormous— encompassing 3 billion telephone numbers.’’ Transaction Network Services (TNS) attempts to strike a middle ground, suggesting that ‘‘[w]hile there is a large number of unallocated PO 00000 Frm 00055 Fmt 4700 Sfmt 4700 1569 telephone numbers (over 33 million) that have been flagged as making calls, the volume of call activity from these numbers relative to all negative robocalling is very small.’’ TNS concludes that blocking ‘‘this subset of numbers has significant, but limited value.’’ In contrast, a recent Commission enforcement action found that one robocaller made a staggering 21,582,771 spoofed robocalls in a three-month period; the caller ID for each of the robocalls examined by the FCC falsely identified a phone number that was not assigned to any carrier or subscriber at the time the calls were made. Although the number of complaints about calls from unassigned numbers may be small, the Commission agrees with USTelecom that the potential value of blocking such calls is enormous. Consumers will benefit from this type of blocking because the calls are highly likely to annoy or defraud. 26. Defining Unallocated Numbers Subject to Blocking. Some commenters emphasize that a permissive rule does not require providers to identify and block every unallocated number, but rather simply allows a provider to block calls purporting to be from those numbers it can verify are unallocated. The Commission agrees. Providers may block calls purporting to be from unallocated numbers and should limit themselves to blocking only those numbers that they can verify are unallocated. Providers may not be able to identify the complete set of all unallocated numbers for purposes of call blocking. Accordingly, voice service providers might be unable to block calls purporting to originate from every unallocated number, but this shortcoming would not result in the blocking of legal calls. 27. Obtaining Unallocated Number Information. The Commission does not prescribe a technical solution for identifying and communicating information about unallocated numbers at this time. The record shows consensus that, while information on unallocated numbers is available to providers, no currently available source identifies all unallocated numbers in real time and that ‘‘the NANPA does not administer codes outside the United States, specifically in Canada and Caribbean countries, or toll-free numbers.’’ Many commenters suggest that providers should use a new, centralized database as a resource for identification of unallocated numbers. 28. Neustar lists categories of unallocated numbers that should not initiate calls, including ‘‘telephone numbers in: (1) Unallocated area codes in the NANP; (2) unallocated geographic E:\FR\FM\12JAR1.SGM 12JAR1 1570 Federal Register / Vol. 83, No. 9 / Friday, January 12, 2018 / Rules and Regulations sradovich on DSK3GMQ082PROD with RULES Central Office (‘‘CO’’) codes (NPA–NXX) in the United States; and (3) unallocated non-contaminated thousands-blocks (NPA–NXX–X) in the United States.’’ ATIS elaborates on the issue of contaminated thousands-blocks, stating that available thousands-blocks ‘‘publicly posted on the PA website . . . could contain up to 100 assigned numbers within those blocks.’’ Therefore, providers blocking calls from contaminated blocks could erroneously block calls purporting to originate from assigned numbers. Providers that block calls purporting to originate from assigned numbers may be liable for violating the call completion rules. 29. Several commenters propose enhancements to the information provided by the NANPA and the PA. Neustar suggests that the NANPA and the PA ‘‘provide on their websites: (1) ‘Blacklists’ of unallocated numbers that should not be making calls; and (2) ‘Whitelists’ of allocated area codes in the NANP, allocated geographic CO codes in the United States, and allocated thousands-blocks in the United States.’’ Comcast takes a similar approach, suggesting that the databases ‘‘(1) more clearly identify which numbers have not yet been allocated and (2) are updated immediately to reflect any new allocations as they occur.’’ 30. The Commission believes that providers, the NANPA, and the PA are in the best position to determine how to share information about unallocated numbers. The Commission encourages these parties to work together on whether and how to improve the availability of this information for blocking purposes. At the same time, the Commission cautions against blocking calls purporting to originate from allocated numbers and encourages providers to examine their practices carefully to verify that they are not inadvertently doing so. A provider that erroneously blocks calls purporting to originate from allocated numbers may be liable for violating the call completion rules. Calls Purporting To Originate From Numbers That Are Allocated but Unused 31. The Commission finds that providers may block calls purportedly originating from numbers that are allocated to a provider by the NANPA or PA, but are unused, so long as the provider blocking the calls is the allocatee of the number or has obtained verification from the allocatee that the number is unused at the time of the blocking. For these purposes, an ‘‘unused’’ number is a number that is VerDate Sep<11>2014 15:52 Jan 11, 2018 Jkt 244001 not assigned to a subscriber or otherwise set aside for outbound call use. As with invalid numbers and unallocated numbers, calls cannot originate from such a number, and the Commission foresees no lawful purpose for intentionally spoofing a number that is unused and thus cannot be called back. 32. The record shows mixed support for allowing providers to block these kinds of calls. For example, EPIC points out that ‘‘because they are not assigned anyone using them without the provider’s knowledge is almost certainly engaging in unlawful activity.’’ Many commenters, however, express concerns about legal calls being blocked, similar to the concerns about unallocated number call blocking, because ‘‘the status of numbers is always changing.’’ The record also shows ‘‘potentially thorny implementation issues’’ for blocking calls from unused numbers, similar to but greater in scale than those identified for unallocated numbers. In addition, the argument concerning the likely reaction of robocallers to the blocking of unallocated numbers detailed above applies here as well. 33. Obtaining Unused Number Information. The record clearly shows ‘‘an industry-wide recognition that there is currently no technical solution that allows providers to accurately and promptly identify numbers that have been allocated to a carrier but not yet assigned to a subscriber.’’ Commenters assert that without such a database, providers cannot be certain of the status of numbers not assigned to them. The Number Portability Administration Center (NPAC) and other existing databases do not show the details of provider assignment of numbers and are not capable of identifying reassigned numbers. Microsoft claims that such blocking, ‘‘if not supported by use of a 100 percent reliable real-time database (which does not exist), could prevent outgoing domestic call completion for consumers who are assigned newlyactivated telephone numbers.’’ 34. The record reveals that creating such a database would be difficult. Neustar comments that providers ‘‘often consider such information to be competitively sensitive.’’ In addition, the information changes very quickly, ‘‘as providers are constantly assigning new numbers to subscribers or are deassigning numbers when a subscriber leaves and decides not to take advantage of number portability.’’ While the FTC encourages providers to share this information, providers oppose mandatory information sharing. CTIA cautions that creating a centralized database ‘‘is technically challenging and PO 00000 Frm 00056 Fmt 4700 Sfmt 4700 would divert resources away from innovative solutions.’’ 35. The Commission concludes, however, that a narrowly tailored rule could be implemented without a database. Noble Systems makes a distinction between allowing providers to block calls purported to originate from numbers allocated to that provider, which the provider knows to be unused, and requiring providers to share information to block all unused numbers. Regarding their own numbers, ‘‘each individual service provider certainly knows which telephone numbers it has been allocated but not yet assigned to subscribers.’’ As such, the rule permits providers to block on this basis. Should the industry develop more comprehensive information sources that would facilitate broader blocking of calls purported to originate from unused numbers, the rule would also permit that kind of blocking. 36. Scope of Rule. The record shows significant obstacles to implementing a rule requiring all providers to pool their information, yet where the allocatee of the number in question is the only provider able to block calls purporting to originate from that number, ‘‘the value of the initiative would be significantly diminished and would create a disadvantage for smaller providers.’’ With fewer providers blocking each number, fewer illegal calls will be blocked overall. 37. The Commission will not require providers to share competitively sensitive information on an industrywide basis, nor will it limit providers to blocking only unused numbers they have been allocated. The Commission therefore defines the scope of this rule to allow providers to block calls purporting to originate from an unused number, so long as the provider blocking the call either (1) is the allocatee of the number and has confirmed the number is unused, or (2) has verified the unused status of the number with the allocatee at the time of the blocking. This gives providers the flexibility to share information if they wish to, and the Commission encourages providers to do so. 38. In addition, this is a permissive rule. CTIA points out that such ‘‘[a] voluntary regime will allow carriers that develop the ability to identify these numbers to block calls originating from them without forcing carriers to develop capabilities they do not currently possess.’’ 39. Types of Used Numbers. Many commenters indicate that legal calls may be made from what appear to be unassigned numbers. For example, INCOMPAS points out that ‘‘many E:\FR\FM\12JAR1.SGM 12JAR1 Federal Register / Vol. 83, No. 9 / Friday, January 12, 2018 / Rules and Regulations legitimate callers do not originate calls on the [PSTN] and, therefore, do not have telephone numbers.’’ Commenters identify three specific kinds of unassigned numbers that should not be blocked because they are being used to make legal outbound calls: Intermediate numbers, administrative numbers, and proxy numbers. The Commission acknowledges this concern and the rule is clear that providers should not block any type of number that, although it is not assigned to a subscriber, is used for these lawful purposes. The Commission encourages providers to examine the status of their numbers before blocking calls that purport to originate from unused numbers to verify that they are not inadvertently blocking calls that fall outside the scope of this rule, which would risk liability for violating the call completion rules. sradovich on DSK3GMQ082PROD with RULES Other Issues 40. Emergency Calls. The Commission makes clear that the rules do not authorize the blocking of calls to 911 under any circumstance. The Commission notes that the NANP itself contemplates certain non-standard numbers to facilitate emergency calling; the NANP, for example, ‘‘permits the use of ‘911’ as the [Numbering Plan Area code] for emergency calls from non-initialized mobile devices.’’ To make it abundantly clear, nonetheless, that voice providers should not block such calls, the Commission makes clear these rules do not permit the blocking of emergency calls except as otherwise expressly permitted by the Commission’s rules. 41. International Calls. In the Advanced Methods NPRM and NOI, the Commission sought comment ‘‘on whether an internationally originated call purportedly originated from a NANP number should be subject to these rules, whereas an internationally originated call showing an international number would be beyond the scope of this rule.’’ The Commission adopts this proposal. The Commission agrees with Neustar that it should apply to international calls purporting to use NANP numbers ‘‘the same blocking rules applicable to domestic originated calls.’’ Many illegal robocalls originate from overseas call centers, and excluding such calls that purport to use NANP numbers from the ambit of the rule would create an exception that threatens to swallow the rule. In contrast, international calls from purported non-NANP numbers would not, by definition, follow the NANP numbering scheme and thus are beyond the scope of this proceeding. VerDate Sep<11>2014 15:52 Jan 11, 2018 Jkt 244001 42. The Commission agrees with commenters that internationally originated calls may have lawful reasons to use a NANP number. VON, for example, suggests ‘‘a US-based user of a service may be traveling in Europe but uses their service to make Wi-Fi-based calls (and have their US caller ID shown).’’ And the Commission agrees with Microsoft that it must ‘‘avoid inadvertently authorizing international call blocking.’’ But the Commission disagrees with ZipDX’s apparent suggestion that some possibility of international call blocking means the Commission must abandon its efforts. Because the Commission authorizes blocking only for purported NANP numbers, it sees no reason why the actual origination point of the call would bear on whether it is blocked. In other words, the Commission finds the likelihood of blocking a legitimate call is minimal—no matter its origin. And the Commission reiterates that the rules do not authorize the blocking of any international call purporting to use a valid NANP number assigned to that user. 43. Subscriber Consent. The Commission does not require consumer opt-in for providers to block the specific types of calls addressed herein. The Commission believes that no reasonable consumer would want to receive the calls the Commission has determined may be subject to blocking. For call blocking to be most effective, it must be applied throughout the calling network. An opt-in requirement would thwart providers’ efforts. 44. The record shows support for allowing providers to block these specific types of spoofed calls without requiring consent from the subscriber. Some commenters emphasize the limited scope of calls that do not require consent. ITTA agrees with the Commission’s reasoning that ‘‘obtaining opt-in consent from subscribers would add unnecessary burdens and complexity, . . . may not be technically feasible for some providers’’ and ‘‘would also add unnecessary delays.’’ EPIC comments that ‘‘proactive blocking’’ would benefit consumers, ‘‘especially those that rely on landlines, [who] may not have or use caller ID.’’ 45. Consumers Union et. al. propose that providers should obtain consent from all consumers before blocking calls other than those purporting to originate from DNO numbers, but, as stated above, the Commission does not believe any reasonable consumer would want to receive these calls. The administrative burden of tracking individual opt-in responses would likely be a disincentive to blocking. PO 00000 Frm 00057 Fmt 4700 Sfmt 4700 1571 46. While providers are not required to obtain subscriber consent before blocking these calls, the Commission emphasizes that the types of calls that can be blocked are very limited. The Commission agrees with the recommendation from the Consumer Advisory Committee (CAC) and encourages providers to inform their customers about the features and risks of their own call blocking programs. 47. Call Completion Rates. The Strike Force requested that the Commission amend its call completion rules to ensure that providers can block illegal calls without those blocked calls being held against them in calculating call completion rates. The Commission agrees that providers do not need to count these blocked calls for purposes of calculating their call completion rates on FCC Form 480 and therefore the Commission interprets the rules and the form to not require inclusion of calls blocked in accordance with the rules adopted here. Reporting carriers may exclude these calls to the extent that they are able to identify them. 48. The record shows significant support for excluding these calls from the call completion calculations to ‘‘incentivize carriers to participate in voluntary blocking when appropriate and consistent with the rules.’’ CenturyLink comments that ‘‘[w]ithout this protection, carriers may be unwilling to use any of the tools that may be adopted in the proceeding and the consumer benefits the Commission hopes to achieve may not be realized.’’ Consumers Union et. al. agrees that ‘‘the calls that are blocked according to these guidelines should be exempt from call completion rates.’’ 49. Notwithstanding this support for the concept of excluding blocked calls from call completion rate calculations, it might not currently be possible for all providers to identify blocked calls. Originating providers required to file call completion reports have no standard mechanism to identify calls that are blocked intentionally under these rules by downstream providers and distinguish them from calls that are not completed for other reasons. Further, NTCA suggests that excluding such calls from call completion would be premature ‘‘until the definitions and practical considerations noted above are addressed and standardized by industry and the Commission.’’ 50. Given the inability of all providers who must file call completion reports to identify blocked calls in every instance and the Commission’s revisiting of the rural call completion requirements in a separate rulemaking proceeding, the Commission does not believe that E:\FR\FM\12JAR1.SGM 12JAR1 sradovich on DSK3GMQ082PROD with RULES 1572 Federal Register / Vol. 83, No. 9 / Friday, January 12, 2018 / Rules and Regulations requiring exclusion of these calls is appropriate at this time. The Commission instead simply notes that providers subject to the call-completion reporting rules may, but are not required to, exclude blocked calls from the recordkeeping and reporting requirements to the extent they can identify such calls. 51. CPNI Rules. In the Advanced Methods NPRM and NOI, the Commission sought comment on whether there are concerns about sharing DNO request information and whether any clarifications or rule changes could be helpful. Some commenters asked the Commission to clarify the applicability of section 222 of the Act, and the implementing rules, in order to allow sharing of robocall information for traceback purposes or sharing of a subscriber’s request to block an inbound-only number. 52. USTelecom notes that ‘‘the sharing of CPNI by telecommunications providers is essential to ensuring accurate and thorough call traceback efforts in multiple providers’ networks related to suspicious calling events.’’ The Commission notes that traceback efforts are aimed at identifying persons who make illegal robocalls, including calls that involve fraud in violation of the Truth in Caller ID Act. The FTC comments that ‘‘information sharing by providers at the subscriber’s request appears to be consistent’’ with the CPNI rules. The Commission agrees. Section 222 of the Act and the implementing rules explicitly allow telecommunications carriers to use, disclose, or permit access to CPNI obtained from its customers, either directly or indirectly through its agents, ‘‘to protect the rights or property of the carrier, or to protect users of those services and other carriers from fraudulent, abusive, or unlawful use of, or subscription to, such services.’’ Furthermore, the Commission agrees with the FTC that when a subscriber requests that the carrier block calls purporting to be from the subscriber’s inbound-only number, ‘‘the subscriber is almost certainly seeking to have the number blocked by as many providers as possible.’’ Therefore, such a request should be understood as authorizing the carrier to share that request with other carriers as permitted by section 222(c)(1) of the Act. Thus, voice service providers are free to share DNO requests as necessary to block calls in the limited circumstances identified in the Report and Order. 53. Removing Blocks on Valid Numbers. A challenge mechanism may be needed for voice service providers that block calls given the small VerDate Sep<11>2014 15:52 Jan 11, 2018 Jkt 244001 possibility of blocking legitimate calls. AARP suggested ‘‘[i]t would seem to be prudent to have the needed procedures to allow consumers to quickly counteract inadvertent blocking in place prior to the commencement of the general robocall blocking program.’’ The Commission’s Consumer Advisory Committee similarly states that providers and consumers should ‘‘work collaboratively to develop processes and solutions whereby unintended blocking of legitimate callers can be remedied in a timely and efficient manner.’’ The Commission encourages providers that block calls to establish a means for a caller whose number is blocked to contact the provider and remedy the problem. Specifically, the Commission encourages providers that block calls in accordance with these rules to provide a way for subscribers to challenge a blocked number using a simple method that is easy for the average subscriber to understand. The Commission also encourages providers to quickly resolve the matter so subscribers making legitimate calls may resume doing so speedily. 54. As a reminder, the call completion rules require voice service providers to complete calls and they should therefore not block legitimate calls. The Commission also reminds callers that the Commission’s complaint process is available when calls that fall outside the scope of these rules are improperly blocked. 55. Definition of ‘‘Illegal Robocall.’’ Although the Advanced Methods NPRM and NOI sought comment on the definition of ‘‘illegal robocall’’ for the purposes of this proceeding, the Commission declines to adopt a definition here given that none of the rules adopted here rely on such a definition. Indeed, the record shows confusion regarding how the proposed definition of ‘‘illegal robocall’’ should apply to the call blocking rules. Sprint comments that providers cannot determine whether a call meets the definition of an illegal robocall before blocking it, because ‘‘[u]nlike spam prevention in email, the content of a call cannot be determined before the call rings through to the customer’s phone.’’ First Orion states ‘‘the Commission clearly intends to give carriers the flexibility to prevent all illegal calls, regardless of the technology used.’’ Similarly, the FTC suggests that the Commission use the term ‘‘illegal call’’ rather than ‘‘illegal robocall,’’ because ‘‘the problematic calls here are not limited to just robocalls, but also abusive, fraudulent, or unlawful calls that are ‘live.’ ’’ Because the Commission makes clear that providers PO 00000 Frm 00058 Fmt 4700 Sfmt 4700 need not listen to the content of calls or otherwise to determine whether a particular call is expressly illegal before blocking it, the Commission sees no reason to define the term at the present moment. Report on Robocalling 56. To shed additional light on the issue of robocalling and inform the Commission’s actions going forward, the Commission directs the Consumer and Governmental Affairs Bureau, in consultation with the Federal Trade Commission’s Bureau of Consumer Protection, to prepare a report on the state of robocalling in the United States and to submit it to the Commission within one year from publication of the Report and Order in the Federal Register. This report should encompass both the progress made by industry, government, and consumers in combatting illegal robocalls, as well as the remaining challenges to continuing these important efforts. A focus on quantitative data, including, but not limited to, calling trends and consumer complaints, will provide particular insight into the current state of the robocalling problem and how to target additional measures to help consumers avoid the fraud and annoyance that they experience. Final Regulatory Flexibility Analysis 57. As required by the Regulatory Flexibility Act of 1980 (RFA), as amended, an Initial Regulatory Flexibility Analysis (IRFA) was incorporated into the Advanced Methods NPRM and NOI. The Commission sought written public comment on the proposals in the Advanced Methods NPRM and NOI, including comment on the IRFA. The comments received are discussed below. This Final Regulatory Flexibility Analysis (FRFA) conforms to the RFA. Need for, and Objectives of, the Order 58. The Report and Order takes another important step in combatting illegal robocalls by enabling voice service providers to block certain calls before they reach consumers’ phones. In the year since August 1, 2016, the Commission has received nearly 185,000 complaints about calls that consumers did not want. Stopping illegal robocalls and the problems they cause has united industry, government, and consumer groups. Caller ID spoofing is often the key to making robocall scams work. Therefore, the rules outline specific, well-defined circumstances in which voice service providers may block calls that are highly likely to be illegitimate because E:\FR\FM\12JAR1.SGM 12JAR1 sradovich on DSK3GMQ082PROD with RULES Federal Register / Vol. 83, No. 9 / Friday, January 12, 2018 / Rules and Regulations there is no lawful reason to spoof certain kinds of numbers. Specifically, the Report and Order adopts rules allowing providers to block calls from phone numbers on a DNO list and those that purport to be from invalid, unallocated, or unused numbers. By doing so, the Commission furthers its goal of removing regulatory roadblocks and gives industry the flexibility to block illegal calls. At the same time, the Commission affirms its commitment to protect the reliability of the nation’s communications network and ensure that provider-initiated blocking helps, rather than harms, consumers. A provider that blocks calls that do not fall within the scope of these rules may be liable for violating the Commission’s call completion rules. 59. Blocking at the Request of the Subscriber to the Originating Number. In the Report and Order, the Commission codifies the Bureau’s earlier clarification that voice service providers may block calls purporting to be from a telephone number if the subscriber to that number requests such blocking in order to prevent its number from being spoofed. Where the subscriber did not consent to the number being used, the call was very likely made with the intent to defraud, and therefore no reasonable consumer would wish to receive such a call. 60. Calls Supposedly Originating From Invalid Numbers. Similarly, the Report and Order allows providers to block calls purportedly originating from numbers that are not valid under the NANP. Examples of such numbers include those that use an unassigned area code; that use an abbreviated dialing code, such as 411, in place of an area code; that do not contain the requisite number of digits; and that are a single digit repeated, such as 000– 000–0000, with the exception of 888– 888–8888, which is an assignable number. No caller would spoof an invalid number for any lawful purpose; for example, unlike a business spoofing Caller ID on outgoing calls to show its main call-back number, invalid numbers cannot be called back. Providers, however, must take care that they do not block calls that purportedly originate from valid numbers, especially emergency calls. 61. Calls Supposedly Originating From Numbers Not Allocated to Any Provider. The Report and Order also allows providers to block calls purportedly originating from numbers that are valid but have not yet been allocated by the NANPA or the PA to any provider. Though these numbers are valid under the North American Numbering Plan, the Commission finds VerDate Sep<11>2014 15:52 Jan 11, 2018 Jkt 244001 that calls purporting to use unallocated numbers are similar to calls purporting to use invalid numbers in that no subscriber can actually originate a call from any of these numbers, and the Commission sees no lawful reason to spoof such numbers because they cannot be called back. 62. Calls Supposedly Originating From Numbers That are Allocated but Unused. Document FCC 17–151 allows providers to block calls purportedly originating from numbers that are allocated to a provider by the North American Numbering Plan Administrator or Pooling Administrator, but are unused, so long as the provider blocking the calls is the allocatee of the number or has obtained verification from the allocatee that the number is unused at the time of the blocking. For these purposes, an ‘‘unused’’ number is a number that is not assigned to a subscriber or otherwise set aside for legitimate outbound call use. As with invalid numbers and unallocated numbers, a subscriber cannot originate a call from such a number, and the Commission foresees no lawful purpose for intentionally spoofing a number that is unused and thus cannot be called back. 63. Other Issues. The Report and Order also clarifies that these rules do not permit the blocking of emergency calls except as otherwise expressly permitted by the Commission’s rules, that all calls purporting to originate from a NANP number, including international calls, are subject to these rules, and that international calls from purported non-NANP numbers would not, by definition, follow the NANP numbering scheme and thus are beyond the scope of this proceeding. It confirms that the Commission does not require consumer opt-in for providers to block these specific types of calls, clarifies that providers do not need to count these blocked calls for purposes of calculating their call completion rates, clarifies that voice service providers are free to share the CPNI necessary to block calls in the limited circumstances identified in the Report and Order, encourages providers to establish a means for a caller whose number is blocked to contact the provider and remedy the problem, and declines to adopt a definition of the term ‘‘illegal robocall’’ at the present moment. Summary of Significant Issues Raised by Public Comments in Response to the IRFA 64. In the Advanced Methods NPRM and NOI, the Commission solicited comments on how to minimize the economic impact of the new rules on PO 00000 Frm 00059 Fmt 4700 Sfmt 4700 1573 small businesses. The Commission received one comment directly addressing the IRFA and several comments addressing small business concerns. Two of the comments requested that the call blocking rules be permissive, rather than mandatory, three pertained to the administration of a database for unassigned numbers, and two addressed other issues. In addition, the Commission received two consumer comments documenting the negative impact of unwanted calls on small businesses. None of the other comments pointed out any areas where small businesses would incur a particular hardship in complying with the rules. 65. Permissive Rules. Both CTIA and ITTA support permissive rules. CTIA suggests that ‘‘blocking of numbers . . . should be authorized, but not required.’’ ITTA claims that permissive rules give providers ‘‘flexibility in how aggressively they choose to block calls.’’ The rules the Commission adopts here are permissive and not mandatory. 66. Database Administration. INCOMPAS, ITTA, and PACE suggest that a centralized database of unused numbers be created, and then suggest ways to minimize disproportionate costs to small businesses in using such a database. The Commission considered both the technical and cost issues inherent in the creations of a database and determined not to require one. Without a database, concerns about its administration are rendered moot. 67. INCOMPAS requests a mechanism that will ‘‘spare smaller providers from using additional resources to prove the legitimacy of its call traffic to other providers.’’ In the Report and Order, the Commission allows a provider to block unused numbers only if the provider blocking the calls is the allocatee of the number or has obtained verification from the allocatee that the number is unused at the time of the blocking. Therefore, if a smaller provider does not give information to other providers, its call traffic will not be blocked. 68. Other Issues. Commenters raise three other issues. First, INCOMPAS requests that the Commission require providers to put a mechanism in place to remove blocks on valid numbers, and that in doing so, ‘‘providers should be given discretion to adjust their policies according to their size and services.’’ In the Report and Order, the Commission urges, but does not require providers to implement such a mechanism, nor does the Commission provide specific requirements for how providers might remove blocks on valid numbers, allowing smaller providers the flexibility they request. Second, NTCA suggests that the North American E:\FR\FM\12JAR1.SGM 12JAR1 1574 Federal Register / Vol. 83, No. 9 / Friday, January 12, 2018 / Rules and Regulations Numbering Council (NANC) ‘‘may be best positioned to help clarify practical requirements’’ to ‘‘to assess and mitigate the costs of compliance for smaller firms.’’ However, industry has already established the Robocall Strike Force (Strike Force), which has produced significant documentation clarifying the practical requirements for the limited and specific types of call blocking authorized in the Report and Order. Blocking these calls presents a very low risk, and NANC participation is not required to move forward at this time. Third, TNS suggests that providers be permitted to block unused numbers allocated to other providers to avoid creating ‘‘a disadvantage for smaller providers.’’ The record also shows that many providers view their unused number data as competitively sensitive information. In the Report and Order, the Commission balances these concerns by allowing, but not requiring, providers to block unused numbers allocated to other providers if they have verified the unused status of the number. Response to Comments by the Chief Counsel for Advocacy of the Small Business Administration 69. Pursuant to the Small Business Jobs Act of 2010, which amended the RFA, the Commission is required to respond to any comments filed by the Chief Counsel for Advocacy of the Small Business Administration (SBA), and to provide a detailed statement of any change made to the proposed rules as a result of those comments. The Chief Counsel did not file any comments in response to the proposed rules in this proceeding. sradovich on DSK3GMQ082PROD with RULES Description and Estimate of the Number of Small Entities to Which Rules Will Apply 70. The RFA directs agencies to provide a description of, and where feasible, an estimate of the number of small entities that may be affected by the rules adopted herein. The RFA generally defines the term ‘‘small entity’’ as having the same meaning as the terms ‘‘small business,’’ ‘‘small organization,’’ and ‘‘small governmental jurisdiction.’’ In addition, the term ‘‘small business’’ has the same meaning as the term ‘‘small-business concern’’ under the Small Business Act. A ‘‘smallbusiness concern’’ is one which: (1) Is independently owned and operated; (2) is not dominant in its field of operation; and (3) satisfies any additional criteria established by the SBA. VerDate Sep<11>2014 15:52 Jan 11, 2018 Jkt 244001 Wireline Carriers 71. Wired Telecommunications Carriers. The U.S. Census Bureau defines this industry as ‘‘establishments primarily engaged in operating and/or providing access to transmission facilities and infrastructure that they own and/or lease for the transmission of voice, data, text, sound, and video using wired communications networks. Transmission facilities may be based on a single technology or a combination of technologies. Establishments in this industry use the wired telecommunications network facilities that they operate to provide a variety of services, such as wired telephony services, including VoIP services, wired (cable) audio and video programming distribution, and wired broadband internet services. By exception, establishments providing satellite television distribution services using facilities and infrastructure that they operate are included in this industry.’’ The SBA has developed a small business size standard for Wired Telecommunications Carriers, which consists of all such companies having 1,500 or fewer employees. Census data for 2012 shows that there were 3,117 firms that operated that year. Of this total, 3,083 operated with fewer than 1,000 employees. Thus, under this size standard, the majority of firms in this industry can be considered small. 72. Local Exchange Carriers (LECs). Neither the Commission nor the SBA has developed a small business size standard specifically for local exchange services. The closest applicable size standard under SBA rules is for the category Wired Telecommunications Carriers. The U.S. Census Bureau defines this industry as ‘‘establishments primarily engaged in operating and/or providing access to transmission facilities and infrastructure that they own and/or lease for the transmission of voice, data, text, sound, and video using wired communications networks. Transmission facilities may be based on a single technology or a combination of technologies. Establishments in this industry use the wired telecommunications network facilities that they operate to provide a variety of services, such as wired telephony services, including VoIP services, wired (cable) audio and video programming distribution, and wired broadband internet services. By exception, establishments providing satellite television distribution services using facilities and infrastructure that they operate are included in this industry.’’ Under that size standard, such a business is small if it has 1,500 or fewer PO 00000 Frm 00060 Fmt 4700 Sfmt 4700 employees. Census data for 2012 show that there were 3,117 firms that operated that year. Of this total, 3,083 operated with fewer than 1,000 employees. Consequently, the Commission estimates that most providers of local exchange service are small businesses. 73. Incumbent Local Exchange Carriers (Incumbent LECs). Neither the Commission nor the SBA has developed a small business size standard specifically for incumbent local exchange services. The closest applicable size standard under SBA rules is for the category Wired Telecommunications Carriers. The U.S. Census Bureau defines this industry as ‘‘establishments primarily engaged in operating and/or providing access to transmission facilities and infrastructure that they own and/or lease for the transmission of voice, data, text, sound, and video using wired communications networks. Transmission facilities may be based on a single technology or a combination of technologies. Establishments in this industry use the wired telecommunications network facilities that they operate to provide a variety of services, such as wired telephony services, including VoIP services, wired (cable) audio and video programming distribution, and wired broadband internet services. By exception, establishments providing satellite television distribution services using facilities and infrastructure that they operate are included in this industry.’’ Under that size standard, such a business is small if it has 1,500 or fewer employees. Census data for 2012 show that there were 3,117 firms that operated that year. Of this total, 3,083 operated with fewer than 1,000 employees. Consequently, the Commission estimates that most providers of incumbent local exchange service are small businesses. 74. Competitive Local Exchange Carriers (Competitive LECs), Competitive Access Providers (CAPs), Shared-Tenant Service Providers, and Other Local Service Providers. Neither the Commission nor the SBA has developed a small business size standard specifically for these service providers. The appropriate size standard under SBA rules is for the category Wired Telecommunications Carriers. The U.S. Census Bureau defines this industry as ‘‘establishments primarily engaged in operating and/or providing access to transmission facilities and infrastructure that they own and/or lease for the transmission of voice, data, text, sound, and video using wired communications networks. Transmission facilities may be based on a single technology or a combination of E:\FR\FM\12JAR1.SGM 12JAR1 sradovich on DSK3GMQ082PROD with RULES Federal Register / Vol. 83, No. 9 / Friday, January 12, 2018 / Rules and Regulations technologies. Establishments in this industry use the wired telecommunications network facilities that they operate to provide a variety of services, such as wired telephony services, including VoIP services, wired (cable) audio and video programming distribution, and wired broadband internet services. By exception, establishments providing satellite television distribution services using facilities and infrastructure that they operate are included in this industry.’’ Under that size standard, such a business is small if it has 1,500 or fewer employees. Census data for 2012 show that there were 3,117 firms that operated that year. Of this total, 3,083 operated with fewer than 1,000 employees. Consequently, the Commission estimates that most providers of competitive local exchange service, competitive access providers, sharedtenant service providers, and other local service providers are small entities. 75. The Commission has included small incumbent LECs in this present RFA analysis. As noted above, a ‘‘small business’’ under the RFA is one that, inter alia, meets the pertinent small business size standard (e.g., a telephone communications business having 1,500 or fewer employees), and ‘‘is not dominant in its field of operation.’’ The SBA’s Office of Advocacy contends that, for RFA purposes, small incumbent LECs are not dominant in their field of operation because any such dominance is not ‘‘national’’ in scope. The Commission has therefore included small incumbent LECs in this RFA analysis, although it emphasizes that this RFA action has no effect on Commission analyses and determinations in other, non-RFA contexts. 76. Interexchange Carriers. Neither the Commission nor the SBA has developed a small business size standard specifically for providers of interexchange services. The appropriate size standard under SBA rules is for the category Wired Telecommunications Carriers. The U.S. Census Bureau defines this industry as ‘‘establishments primarily engaged in operating and/or providing access to transmission facilities and infrastructure that they own and/or lease for the transmission of voice, data, text, sound, and video using wired communications networks. Transmission facilities may be based on a single technology or a combination of technologies. Establishments in this industry use the wired telecommunications network facilities that they operate to provide a variety of services, such as wired telephony services, including VoIP services, wired VerDate Sep<11>2014 15:52 Jan 11, 2018 Jkt 244001 (cable) audio and video programming distribution, and wired broadband internet services. By exception, establishments providing satellite television distribution services using facilities and infrastructure that they operate are included in this industry.’’ Under that size standard, such a business is small if it has 1,500 or fewer employees. Census data for 2012 show that there were 3,117 firms that operated that year. Of this total, 3,083 operated with fewer than 1,000 employees. Consequently, the Commission estimates that the majority of interexchange carriers are small entities. 77. Cable System Operators (Telecom Act Standard). The Communications Act also contains a size standard for small cable system operators, which is ‘‘a cable operator that, directly or through an affiliate, serves in the aggregate fewer than 1 percent of all subscribers in the United States and is not affiliated with any entity or entities whose gross annual revenues in the aggregate exceed $250,000,000.’’ There are approximately 52,403,705 cable video subscribers in the United States today. Accordingly, an operator serving fewer than 524,037 subscribers shall be deemed a small operator if its annual revenues, when combined with the total annual revenues of all its affiliates, do not exceed $250 million in the aggregate. Based on available data, the Commission finds that all but nine incumbent cable operators are small entities under this size standard. Note that the Commission neither requests nor collects information on whether cable system operators are affiliated with entities whose gross annual revenues exceed $250 million. Although it seems certain that some of these cable system operators are affiliated with entities whose gross annual revenues exceed $250 million, the Commission is unable at this time to estimate with greater precision the number of cable system operators that would qualify as small cable operators under the definition in the Communications Act. 78. Other Toll Carriers. Neither the Commission nor the SBA has developed a size standard for small businesses specifically applicable to other toll carriers. This category includes toll carriers that do not fall within the categories of interexchange carriers, operator service providers, prepaid calling card providers, satellite service carriers, or toll resellers. The closest applicable size standard under SBA rules is for Wired Telecommunications Carriers. The U.S. Census Bureau defines this industry as ‘‘establishments primarily engaged in operating and/or providing access to transmission PO 00000 Frm 00061 Fmt 4700 Sfmt 4700 1575 facilities and infrastructure that they own and/or lease for the transmission of voice, data, text, sound, and video using wired communications networks. Transmission facilities may be based on a single technology or a combination of technologies. Establishments in this industry use the wired telecommunications network facilities that they operate to provide a variety of services, such as wired telephony services, including VoIP services, wired (cable) audio and video programming distribution, and wired broadband internet services. By exception, establishments providing satellite television distribution services using facilities and infrastructure that they operate are included in this industry.’’ Under that size standard, such a business is small if it has 1,500 or fewer employees. Census data for 2012 show that there were 3,117 firms that operated that year. Of this total, 3,083 operated with fewer than 1,000 employees. Thus, under this category and the associated small business size standard, the majority of other toll carriers can be considered small. Wireless Carriers 79. Wireless Telecommunications Carriers (except Satellite). Since 2007, the Census Bureau has placed wireless firms within this new, broad, economic census category. Under the present and prior categories, the SBA has deemed a wireless business to be small if it has 1,500 or fewer employees. For the category of Wireless Telecommunications Carriers (except Satellite), Census data for 2012 show that there were 967 firms that operated for the entire year. Of this total, 955 firms had fewer than 1,000 employees. Thus, under this category and the associated size standard, the Commission estimates that the majority of wireless telecommunications carriers (except satellite) are small entities. Similarly, according to internally developed Commission data, 413 carriers reported that they were engaged in the provision of wireless telephony, including cellular service, Personal Communications Service (PCS), and Specialized Mobile Radio (SMR) services. Of this total, an estimated 261 have 1,500 or fewer employees. Thus, using available data, the Commission estimates that the majority of wireless firms can be considered small. 80. Satellite Telecommunications Providers. The category of Satellite Telecommunications ‘‘comprises establishments primarily engaged in providing telecommunications services to other establishments in the telecommunications and broadcasting E:\FR\FM\12JAR1.SGM 12JAR1 1576 Federal Register / Vol. 83, No. 9 / Friday, January 12, 2018 / Rules and Regulations sradovich on DSK3GMQ082PROD with RULES industries by forwarding and receiving communications signals via a system of satellites or reselling satellite telecommunications.’’ This category has a small business size standard of $32.5 million or less in average annual receipts, under SBA rules. For this category, Census Bureau data for 2012 show that there were a total of 333 firms that operated for the entire year. Of this total, 299 firms had annual receipts of under $25 million. Consequently, the Commission estimates that the majority of satellite telecommunications firms are small entities. 81. All Other Telecommunications. All other telecommunications comprise, inter alia, ‘‘establishments primarily engaged in providing specialized telecommunications services, such as satellite tracking, communications telemetry, and radar station operation. This industry also includes establishments primarily engaged in providing satellite terminal stations and associated facilities connected with one or more terrestrial systems and capable of transmitting telecommunications to, and receiving telecommunications from, satellite systems. Establishments providing internet services or voice over internet protocol (VoIP) services via client-supplied telecommunications connections are also included in this industry.’’ The SBA has developed a small business size standard for the category of All Other Telecommunications. Under that size standard, such a business is small if it has $32.5 million in annual receipts. For this category, Census Bureau data for 2012 show that there were a total of 1,442 firms that operated for the entire year. Of this total, 1,400 had annual receipts below $25 million per year. Consequently, the Commission estimates that the majority of all other telecommunications firms are small entities. Resellers 82. Toll Resellers. The Commission has not developed a definition for toll resellers. The closest NAICS Code Category is Telecommunications Resellers. The Telecommunications Resellers industry comprises establishments engaged in purchasing access and network capacity from owners and operators of telecommunications networks and reselling wired and wireless telecommunications services (except satellite) to businesses and households. Establishments in this industry resell telecommunications; they do not operate transmission facilities and infrastructure. Mobile virtual network operators (MVNOs) are included in this VerDate Sep<11>2014 15:52 Jan 11, 2018 Jkt 244001 industry. The SBA has developed a small business size standard for the category of Telecommunications Resellers. Under that size standard, such a business is small if it has 1,500 or fewer employees. Census data for 2012 show that 1,341 firms provided resale services during that year. Of that number, 1,341 operated with fewer than 1,000 employees. Thus, under this category and the associated small business size standard, the majority of these resellers can be considered small entities. According to Commission data, 881 carriers have reported that they are engaged in the provision of toll resale services. Of this total, an estimated 857 have 1,500 or fewer employees. Consequently, the Commission estimates that the majority of toll resellers are small entities. 83. Local Resellers. The SBA has developed a small business size standard for the category of Telecommunications Resellers. The Telecommunications Resellers industry comprises establishments engaged in purchasing access and network capacity from owners and operators of telecommunications networks and reselling wired and wireless telecommunications services (except satellite) to businesses and households. Establishments in this industry resell telecommunications; they do not operate transmission facilities and infrastructure. Mobile virtual network operators (MVNOs) are included in this industry. Under that size standard, such a business is small if it has 1,500 or fewer employees. Census data for 2012 show that 1,341 firms provided resale services during that year. Of that number, all operated with fewer than 1,000 employees. Thus, under this category and the associated small business size standard, the majority of these local resellers can be considered small entities. 84. Prepaid Calling Card Providers. The SBA has developed a small business size standard for the category of Telecommunications Resellers. The Telecommunications Resellers industry comprises establishments engaged in purchasing access and network capacity from owners and operators of telecommunications networks and reselling wired and wireless telecommunications services (except satellite) to businesses and households. Establishments in this industry resell telecommunications; they do not operate transmission facilities and infrastructure. Mobile virtual network operators (MVNOs) are included in this industry. Under that size standard, such a business is small if it has 1,500 or fewer employees. Census data for 2012 PO 00000 Frm 00062 Fmt 4700 Sfmt 4700 show that 1,341 firms provided resale services during that year. Of that number, all operated with fewer than 1,000 employees. Thus, under this category and the associated small business size standard, the majority of these prepaid calling card providers can be considered small entities. Description of Projected Reporting, Recordkeeping, and Other Compliance Requirements for Small Entities 85. The Report and Order gives voice service providers the option of blocking illegal robocalls in certain, well-defined circumstances. These changes affect small and large companies equally, and apply equally to all of the classes of regulated entities identified above. 86. Reporting and Recordkeeping Requirements. The Report and Order clarifies the call completion rules by allowing, but not requiring, voice service providers to exclude calls blocked under these new rules from their call completion calculations, to the extent that they are aware of which calls are blocked. To do so, voice service providers that choose to exclude such calls may modify their current reporting and recordkeeping procedures already in place for performing their call completion calculations on existing FCC Form 480. This is a minor modification to an existing process, so the Commission anticipates that the impact will be minimal. 87. Other Compliance Requirements. Voice service providers will be permitted, but not required, to block calls purportedly originating from (1) a telephone number if the subscriber to that number requests such blocking in order to prevent its number from being spoofed; (2) numbers that purport to be NANP numbers but are not valid under the NANP; (3) numbers that are valid but have not yet been allocated by the NANPA or the PA to any provider; (4) numbers that are allocated to a provider by the NANPA or PA, but are unused, so long as the provider blocking the calls is the allocatee of the number and or has obtained verification from the allocatee that the number is unused at the time of the blocking. Steps Taken To Minimize the Significant Economic Impact on Small Entities, and Significant Alternatives Considered 88. The RFA requires an agency to describe any significant alternatives that it has considered in reaching its approach, which may include the following four alternatives, among others: (1) The establishment of differing compliance or reporting requirements or timetables that take into E:\FR\FM\12JAR1.SGM 12JAR1 sradovich on DSK3GMQ082PROD with RULES Federal Register / Vol. 83, No. 9 / Friday, January 12, 2018 / Rules and Regulations account the resources available to small entities; (2) the clarification, consolidation, or simplification of compliance or reporting requirements under the rule for small entities; (3) the use of performance, rather than design, standards; and (4) an exemption from coverage of the rule, or any part thereof, for small entities. 89. The Commission considered feedback from the Advanced Methods NPRM and NOI in crafting the final order. The Commission evaluated the comments in light of balancing the goal of removing regulatory roadblocks and giving industry the flexibility to block illegal calls with its commitment to protect the reliability of the nation’s communications network. Small businesses supported the proposal to make the call blocking rules permissive rather than mandatory. While the Commission considered mandatory rules, it both proposed and implemented permissive rules to address the concerns of voice service providers, including small businesses, that the cost and burden of complying with mandatory rules could be significant and might require implementation of new technology. The Commission also took small business concerns into consideration in its determination to not require a database of unused numbers. While the Commission considered mandating the use of a database for providers that choose to block unused numbers, such a database could impose disproportionate costs on small businesses and would be challenging to create and maintain. Similarly, the Commission considered the needs of small businesses in its guidance regarding removing blocks from valid numbers. While the Commission considered requiring specific processes or dedicated resources, it does not mandate them at this time to allow small providers to scale their efforts in accordance with their businesses and to develop a more robust record on the issue before the Commission addresses this in a future proceeding. 90. The Commission does not see a need to establish a special timetable for small entities to reach compliance with the modification to the rules. No small business has asked for a delay in implementing the rules. Small businesses may avoid compliance costs entirely by declining to block robocalls, or may delay implementation of call blocking indefinitely to allow for more time to come into compliance with the rules. Similarly, there are no design standards or performance standards to consider in this rulemaking. VerDate Sep<11>2014 15:52 Jan 11, 2018 Jkt 244001 Report to Congress 91. The Commission sent a copy of the Report and Order, including the FRFA, in a report to be sent to Congress and the Government Accountability Office pursuant to the Congressional Review Act. Ordering Clauses 92. Pursuant to sections 201, 202, 222, 251(e), and 403 of the Communications Act of 1934, as amended, 47 U.S.C. 201, 202, 222, 251(e), 403, the Report and Order is adopted and that part 64 of the Commission’s rules, 47 CFR 64.1200, is amended. 93. The Commission’s Consumer and Governmental Affairs Bureau, Reference Information Center, shall send a copy of the Report and Order to Congress and the Government Accountability Office pursuant to the Congressional Review Act, see 5 U.S.C. 801(a)(1)(A). 94. The Commission’s Consumer and Governmental Affairs Bureau, Reference Information Center, shall send a copy of the Report and Order, including the Regulatory Flexibility Analysis, to the Chief Counsel for Advocacy of the Small Business Administration. List of Subjects in 47 CFR Part 64 Telecommunications, Telephone. Federal Communications Commission. Katura Jackson, Federal Register Liaison Officer, Office of the Secretary. Final Rules For the reasons discussed in the preamble, the Federal Communications Commission amends part 64 as follows: PART 64—MISCELLANEOUS RULES RELATING TO COMMON CARRIERS 1. The authority citation for part 64 is amended to read as follows: ■ Authority: 47 U.S.C. 154, 202, 225, 251(e), 254(k), 403(b)(2)(B), (c), 616, 620, Pub. L. 104–104, 110 Stat. 56. Interpret or apply 47 U.S.C. 201, 202, 218, 222, 225, 226, 227, 228, 251(e), 254(k), 616, 620, and the Middle Class Tax Relief and Job Creation Act of 2012, Pub. L. 112–96, unless otherwise noted. 2. In § 64.1200, add reserved paragraphs (i) and (j) and paragraph (k) to read as follows: ■ § 64.1200 Delivery restrictions. * * * * * (i) [Reserved] (j) [Reserved] (k) Voice service providers may block calls so that they do not reach a called party as follows: (1) A provider may block a voice call when the subscriber to which the originating number is assigned has PO 00000 Frm 00063 Fmt 4700 Sfmt 4700 1577 requested that calls purporting to originate from that number be blocked because the number is used for inbound calls only. (2) A provider may block a voice call purporting to originate from any of the following: (i) A North American Numbering Plan number that is not valid; (ii) A valid North American Numbering Plan number that is not allocated to a provider by the North American Numbering Plan Administrator or the Pooling Administrator; and (iii) A valid North American Numbering Plan number that is allocated to a provider by the North American Numbering Plan Administrator or Pooling Administrator, but is unused, so long as the provider blocking the calls is the allocatee of the number and confirms that the number is unused or has obtained verification from the allocatee that the number is unused at the time of the blocking. (3) A provider may not block a voice call under paragraph (k)(1) or (2) of this section if the call is an emergency call placed to 911. (4) For purposes of this subsection, a provider may rely on Caller ID information to determine the purported originating number without regard to whether the call in fact originated from that number. [FR Doc. 2018–00457 Filed 1–11–18; 8:45 am] BILLING CODE 6712–01–P FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 90 [PS Docket No. 13–87; PS Docket No. 06– 229, WT Docket No. 96–86, RM–11433 and RM–11577, FCC 14–172] Service Rules Governing Narrowband Operations in the 769–775/799–805 MHz Bands Federal Communications Commission. ACTION: Final rule; announcement of effective date. AGENCY: In this document, the Commission announces that the Office of Management and Budget (OMB) has approved, for a period of three years, the information collection associated with the Service Rules Governing Narrowband Operations in the 769–775/ 799–805 MHz Bands, FCC 14–172. This document is consistent with the Report and Order, which stated that the Commission would publish a document in the Federal Register announcing the effective date of the rules. SUMMARY: E:\FR\FM\12JAR1.SGM 12JAR1

Agencies

[Federal Register Volume 83, Number 9 (Friday, January 12, 2018)]
[Rules and Regulations]
[Pages 1566-1577]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2018-00457]


-----------------------------------------------------------------------

FEDERAL COMMUNICATIONS COMMISSION

47 CFR Part 64

[CG Docket No. 17-59; FCC 17-151]


Advanced Methods To Target and Eliminate Unlawful Robocalls

AGENCY: Federal Communications Commission.

ACTION: Final rule.

-----------------------------------------------------------------------

SUMMARY: In this document, Commission issues new rules that protect 
consumers from unwanted robocalls by permitting voice service providers 
to proactively block telephone calls when the subscriber of a phone 
number requests that calls purporting to originate from that number be 
blocked, and when calls purport to originate from three categories of 
unassigned phone numbers: Invalid numbers, valid numbers that are not 
allocated to a voice service provider, and valid numbers that are 
allocated but not assigned to a subscriber. While such calls may appear 
to be legitimate to those who receive them, they can result in fraud or 
identity theft. To combat these scams, the new rules expressly 
authorize voice service providers to block these robocalls without 
running afoul of the FCC's call completion rules. To minimize blocking 
of lawful calls, the Commission encourages voice service providers that 
elect to block calls to establish a simple way to identify and fix 
blocking errors. The rules also prohibit providers from blocking 911 
emergency calls.

DATES: Effective February 12, 2018.

FOR FURTHER INFORMATION CONTACT: Karen A Schroeder, Consumer Policy 
Division, Consumer and Governmental Affairs Bureau (CGB), at (202) 418-
0654, email: [email protected].

SUPPLEMENTARY INFORMATION: This is a summary of the Commission's Report 
and Order, in CG Docket No. 17-59; FCC 17-151, adopted on November 16, 
2017 and released on November 17, 2017. The full text of this document 
will be available for public inspection and copying via ECFS, and 
during regular business hours at the FCC Reference Information Center, 
Portals II, 445 12th Street SW, Room CY-A257, Washington, DC 20554. The 
full text of this document and any subsequently filed documents in this 
matter may also be found by searching ECFS at: https://apps.fcc.gov/ecfs/ (insert CG Docket No. 17-59 into the Proceeding block). The 
Further Notice of Proposed Rulemaking (FNPRM) that was adopted 
concurrently with the Report and Order is published elsewhere in the 
Federal Register.

Final Paperwork Reduction Act of 1995 Analysis

    The Report and Order does not contain any new or modified 
information collection requirements subject to the Paperwork Reduction 
Act of 1995, Public Law 104-13. In addition, therefore, it does not 
contain any new or modified information collection burden for small 
business concerns with fewer than 25 employees, pursuant to the Small 
Business Paperwork Relief Act of 2002, Public Law 107-198, see 44 
U.S.C. 3506(c)(4).

[[Page 1567]]

Congressional Review Act

    The Commission sent a copy of the Report and Order to Congress and 
the Government Accountability Office pursuant to the Congressional 
Review Act, see 5 U.S.C. 801(a)(1)(A).

Synopsis

    1. In the Report and Order, the Commission takes another important 
step in combatting illegal robocalls by enabling voice service 
providers to block certain calls before they reach consumers' phones. 
Specifically, the Commission adopts rules allowing providers to block 
calls from phone numbers on a Do-Not-Originate (DNO) list and those 
that purport to be from invalid, unallocated, or unused numbers. 
Providers have been active in identifying these calls and there is 
broad support for these rules. At the same time, the Commission 
establishes safeguards to mitigate the possibility of blocking desired 
calls.
    2. Caller ID spoofing is often the key to making robocall scams 
work. Generally, Caller ID services permit the recipient of an incoming 
call to know the telephone number of the calling party, and in some 
cases a name associated with the number, before the recipient answers 
the call. But Caller ID information can be altered or manipulated, 
i.e., spoofed, so that the name or number displayed to the called party 
does not match that of the actual subscriber or the actual originating 
number. Though callers can use spoofing to mislead or even defraud the 
called party, there are legitimate uses for spoofing.
    3. Congress passed the 2009 Truth in Caller ID Act to ``address the 
growing problem of Caller ID spoofing done for fraudulent or harmful 
purposes.'' Congress limited the spoofing prohibition to the knowing 
transmission of misleading or inaccurate Caller ID information ``with 
the intent to defraud, cause harm, or wrongfully obtain anything of 
value,'' except where such transmission is determined to be exempt by 
the Commission.
    4. Despite these protections, consumers still receive an 
unacceptably high volume of illegal robocalls. To combat the robocall 
problem in a coordinated way, industry established the Robocall Strike 
Force (Strike Force) in 2016. The Strike Force includes representatives 
from providers of traditional landline, mobile, and Voice over internet 
Protocol (VoIP) services, handset manufacturers, operating system 
developers, and VoIP gateway providers. The Strike Force has said that 
``robocalls are best addressed in a holistic manner through deployment 
of a wide variety of tools by a broad range of stakeholders'' that 
includes industry blocking of calls. On October 26, 2016, it published 
the Robocall Strike Force Report (Strike Force Report). The Strike 
Force specifically asked the Commission to provide guidance on when 
providers may block a call that the provider believes is illegal.
    5. The Consumer and Governmental Affairs Bureau (Bureau) addressed 
one of the Strike Force's requests in 2016 by clarifying that voice 
service providers may block calls using a spoofed Caller ID number if 
the number's subscriber requests that they do so. Following that 
initial guidance, the Strike Force Report sought additional 
clarification regarding the legality of certain provider-initiated call 
blocking. Specifically, it sought clarification that: (1) Providers may 
block calls where the Caller ID shows an unassigned number; and (2) 
providers may block calls that the provider has determined to be 
illegal robocalls, so long as the provider takes reasonable steps to 
confirm that the calls are illegal.
    6. In the March 2017 Advanced Methods NPRM and NOI, document FCC 
17-24, published at 82 FR 22625, May 17, 2017, the Commission sought 
comment on whether to take certain steps to facilitate voice service 
providers' blocking of illegal robocalls. In the Advanced Methods NPRM 
and NOI, the Commission proposed rules to allow voice service providers 
to block telephone calls when the subscriber of a phone number requests 
that calls purporting to originate from that number be blocked, and 
when calls purport to originate from three categories of phone numbers: 
Invalid numbers, valid numbers that are not allocated to a voice 
service provider, and valid numbers that are allocated but not assigned 
to a subscriber.
    7. Call Completion Considerations. The Commission has generally 
found call blocking by voice service providers to be unlawful. The 
Commission also made clear that it is unlawful for providers to block 
VoIP-Public Switched Telephone Network (PSTN) traffic, and for 
interconnected and one-way VoIP providers to block voice traffic to or 
from the PSTN. The Commission has allowed call blocking only in ``rare 
and limited circumstances.''

Discussion

    8. In the Report and Order, the Commission adopts rules to give 
voice service providers the option of blocking illegal robocalls in 
certain, well-defined circumstances. By doing so, the Commission 
furthers its goal of removing regulatory roadblocks and gives industry 
the flexibility to block illegal calls. At the same time, the 
Commission affirms its commitment to protect the reliability of the 
nation's communications network and ensure that provider-initiated 
blocking helps, rather than harms, consumers. These rules outline 
specific, well-defined circumstances in which voice service providers 
may block calls that are highly likely to be illegitimate because there 
is no lawful reason to spoof certain kinds of numbers. Thus, a provider 
who blocks calls in accordance with these rules will not violate the 
call completion rules. Conversely, a provider that blocks calls that do 
not fall within the scope of these rules may be liable for violating 
the Commission's call completion rules.

Blocking at the Request of the Subscriber to the Originating Number

    9. First, the Commission codifies the Bureau's earlier 
clarification that providers may block calls when they receive a 
request from the subscriber to which the originating number is 
assigned, i.e., a DNO request. The 2016 Guidance Public Notice, 
document DA 16-1121, made clear that voice service providers--whether 
providing such service through TDM, VoIP, or CMRS--may block calls 
purporting to be from a telephone number if the subscriber to that 
number requests such blocking in order to prevent its number from being 
spoofed. The Bureau concluded that where the subscriber did not consent 
to the number being used, the call was very likely made to annoy and 
defraud, and therefore, no reasonable consumer would wish to receive 
such a call. The Commission agrees and finds such DNO calls highly 
likely to be illegal and to violate the Commission's anti-spoofing 
rule, with the potential to cause harm, defraud, or wrongfully obtain 
something of value.
    10. The record shows broad support among consumer groups, 
providers, government, and callers for blocking DNO calls. Consumers 
Union et. al. emphasizes the urgent need for providers to take action 
against spoofed calls, stating, ``DNO is one of several promising tools 
that they should implement to help address the problem.'' Several 
commenters note the positive results of DNO trials conducted by members 
of the Strike Force.
    11. ZipDX and others claim that gains from blocking DNO numbers 
will be temporary, because those making illegal robocalls will simply 
choose other numbers to spoof when their calls are blocked. The 
Commission disagrees that this possibility negates the

[[Page 1568]]

demonstrated benefits of such blocking. Allowing providers to block 
spoofed calls from high-profile numbers, such as IRS phone numbers, 
that are among those most likely to lure consumers into scams will 
substantially benefit consumers and help entities that make DNO 
requests control the integrity of their phone numbers. The Commission 
believes that codifying the Bureau's 2016 guidance in the form of a 
rule gives providers greater certainty that blocking calls at the 
request of the subscriber is lawful and provides an incentive to engage 
in this kind of beneficial blocking.
    12. Criteria for Blocking DNO Numbers. In its comments, USTelecom 
suggests five criteria used by the Industry Traceback Group (ITB) to 
evaluate numbers to determine whether they should be blocked, namely:

a candidate number must: (1) Be inbound-only; (2) be currently 
spoofed by a robocaller in order to perpetrate impersonation-focused 
fraud; (3) be the source of a substantial volume of calls; (4) have 
authorization for participation in the DNO effort from the party to 
which the telephone number is assigned; and/or (5) be recognized by 
consumers as belonging to a legitimate entity, lending credence to 
the impersonators and influencing successful execution of the scam.

The Commission finds that for purposes of the rule, only two of these 
criteria are necessary. The number must be used for inbound calls only, 
and the subscriber to the number must authorize it to be blocked. The 
Commission agrees with the ITB recommendation that both the subscriber 
making the request and the provider receiving the request validate that 
the number is used for inbound calls only. The Commission will not 
require the subscriber or the provider to determine whether the number 
is currently being spoofed, is the source of a substantial volume of 
calls, or is recognized by consumers. While the Commission believes the 
additional criteria may be helpful in some circumstances, they would 
impose too high a barrier for inclusion in the DNO list. In addition, 
the Commission does not want to impose a potentially burdensome 
analysis requirement on providers that might discourage them from 
blocking inbound-only numbers at the request of the subscriber.
    13. Coordination of Effort. The Commission agrees with Consumers 
Union et. al. that ``[m]uch responsibility rests with the providers to 
ensure that DNO works as well as possible'' through broad industry 
participation. While full industry participation is not required to 
achieve positive results, having more providers block a number will 
allow fewer calls purporting to be from that number to go through. 
Commenters note that providers must coordinate their efforts for this 
type of call blocking to be used effectively. For example, Sprint 
comments that, while it supports this type of blocking and participated 
in the collaborative effort to block spoofed IRS numbers, ``there are 
currently no automated systems in place to expand the scale of such 
projects industry-wide or to accommodate much larger numbers of 
customers requesting blocking.'' USTelecom points out the inefficiency 
of requiring subscribers ``requesting DNOs to be forced to make 
individual requests to multiple providers.'' ZipDX suggests that the 
originating provider is in the best position to block these kinds of 
calls.
    14. Other commenters, however, suggest that providers expand their 
existing ways of sharing information from the test cases and other 
initiatives to support this effort. As Comcast comments, 
``[p]articipants in the Strike Force have set up an ad hoc shared list 
of numbers that should not be originated and can add more for review.'' 
USTelecom comments that its ``Industry Traceback Group has been 
facilitating a targeted, centralized, and coordinated DNO trial and 
stands ready to continue to evolve industry efforts on this front going 
forward.''
    15. The Commission strongly encourages providers to continue to 
work cooperatively to share information about any inbound-only numbers 
for which the subscriber has requested that the number be blocked. At 
this time, the Commission declines to prescribe a sharing mechanism, 
especially in light of industry's existing efforts at coordination. The 
Commission emphasizes that safeguards must be put in place to prevent 
numbers used for outbound calls from being wrongly added to the DNO 
list, whether from hacking, honest mistakes, or some other cause, 
especially for calls made to emergency services. The Commission 
encourages industry to continue developing its methods for implementing 
DNO and encourages providers that choose to do such blocking to 
establish a mechanism for timely removal of erroneous blocks.
    16. Resellers. Finally, the Commission agree with TracFone that 
wireless resellers may pass along subscriber requests to the underlying 
carrier that the subscriber's inbound-only number be blocked. The 
Commission sees no reason on this record to not allow wireless reseller 
subscribers to participate in the DNO effort.

Calls Purporting To Originate From Unassigned Numbers

    17. The Commission next finds that providers may initiate blocking 
where the call purports to originate from a number that is unassigned. 
Use of an unassigned number provides a strong indication that the 
calling party is spoofing the Caller ID to potentially defraud and harm 
a voice service subscriber. Such calls are therefore highly likely to 
be illegal. The Commission identifies three categories of unassigned 
numbers that it determines can be reasonably subject to blocking: (1) 
Numbers that are invalid under the North American Numbering Plan 
(NANP); (2) numbers that have not been allocated by the North American 
Numbering Plan Administrator (NANPA) or the Pooling Administrator (PA) 
to any provider; and (3) numbers that the NANPA or PA has allocated to 
a provider, but are not currently used. Providers may block calls 
purporting to be from numbers that fall into any one of these three 
categories.

Calls Purporting To Originate From Invalid Numbers

    18. Providers may block calls purportedly originating from numbers 
that are not valid NANP numbers. Examples of such numbers include those 
that use an unassigned area code; that use an abbreviated dialing code, 
such as 911 or 411, in place of an area code; that do not contain the 
requisite number of digits; and that are a single digit repeated, such 
as 000-000-0000, with the exception of 888-888-8888, which is an 
assignable number. With a few important exceptions detailed below, the 
record generally supports the assumption that, because these numbers 
are not valid, a subscriber could not lawfully originate calls from 
such numbers and these calls should be blocked. Providers, however, 
must take care that they do not block calls that purportedly originate 
from valid numbers, especially emergency calls.
    19. The record supports the proposal that no caller would spoof an 
invalid number for any lawful purpose; for example, unlike a business 
spoofing Caller ID on outgoing calls to show its main call-back number, 
invalid numbers cannot be called back. Thus, the Commission does not 
see a significant risk to network reliability in allowing providers to 
block this category of calls. ATIS suggests that benefits will be 
temporary because ``widespread blocking of invalid and unallocated 
numbers could have an unintended negative consequence by driving bad 
actors to focus their efforts on spoofing

[[Page 1569]]

assigned/valid numbers.'' Consumers Union et. al., however, comment 
that blocking such calls is imperative, because ``[c]onsumers do not 
expect that their phone service would be the means through which 
illegal and fraudulent scams enter their homes, and providers should 
not be obligated to deliver illegal messages that could cause consumers 
harm.'' In addition, blocking calls purporting to be from invalid 
numbers ``holds the greatest potential for success in the short term 
and likely would be the easiest to implement.''
    20. The Commission rejects suggestions that blocking calls 
purporting to originate from invalid numbers creates ``significant 
possibilities of false positives.'' Although ZipDX claims that ``a 
significant number'' of private branch exchanges (PBXs) ``are not 
properly configured'' to display an accurate Caller ID and that Caller 
ID information could theoretically be ``unintentionally altered'' 
during a call's transmission, the record belies such claims. Instead, 
the record demonstrates that the risk of erroneously blocking such 
calls is very low and should not be a barrier to allowing providers to 
block calls purporting to be from invalid numbers. Indeed, the 
Commission agrees with USTelecom that this small risk simply requires 
providers to exercise ``caution when instituting blocking in the 
network.'' And the Commission reiterates that caution to businesses 
with PBXs: The responsibility to properly configure PBX equipment lies 
with the owner, and those spoofing invalid numbers (whether 
intentionally or not) have the ability to ensure that their calls go 
through by properly reconfiguring that equipment.
    21. Identifying Invalid Numbers. Neustar, which currently is the 
NANPA and PA, comments that ``information for invalid numbers [is 
maintained] within the [NANP], and the industry has other sources to 
identify invalid numbers such as ATIS's Industry Numbering Committee. . 
. . Thus, service providers already have access to the information they 
need'' for this kind of blocking. Comcast similarly states that 
``[v]oice providers generally have `intimate knowledge of the [NANP]' 
and can `easily identify numbers that fall into this category,' 
including numbers that use an N11 code in place of an area code or that 
repeat a single digit.'' In light of the industry's assurance that it 
can confidently identify invalid numbers, the Commission sees no need 
to further define or limit what is meant by ``a number that is not a 
valid [NANP] number.'' The Commission encourages providers to conduct 
tests or simulations before blocking calls purporting to originate from 
invalid numbers to verify their methods.

Calls Purporting To Originate From Numbers Not Allocated to Any 
Provider

    22. The Commission finds that providers may block calls purportedly 
originating from numbers that are valid but have not yet been allocated 
by the NANPA or the PA to any provider. Though these numbers are valid 
under the NANP, the Commission finds that calls purporting to use 
unallocated numbers are similar to calls purporting to use invalid 
numbers in that no subscriber can actually originate a call from any of 
these numbers, and the Commission sees no lawful reason to spoof such 
numbers because they cannot be called back. Calls purporting to 
originate from such numbers therefore are highly likely to be illegal.
    23. Here, the provider must have knowledge that a certain block of 
numbers has not been allocated to any provider and therefore that the 
number being blocked could not have been assigned to a subscriber. The 
record generally supports allowing permissive blocking of calls 
purporting to be from unallocated numbers. For example, ATIS points out 
that ``no subscriber can actually originate a call from these 
unallocated central office codes and it is unlikely that there is any 
legitimate, lawful reason to.''
    24. Parties opposing this type of call blocking generally do so 
based on implementation difficulties and the risk of blocking legal 
calls. For example, NCTA warns that the proposal ``could 
unintentionally result in harm to consumers and should not be adopted 
at this time,'' and ZipDX cautions that ``[t]he unintended consequences 
of these blocks (false positives) are potentially quite troublesome and 
far outweigh any good that would result from successful robocall 
blocks.'' Several commenters also note that, if providers block 
unallocated numbers, then ``illegal robocallers could simply shift to 
spoofing assigned numbers.''
    25. Commenters do not agree on the potential volume of calls that 
might be blocked under this rule. While ZipDX says the ``fraction of 
complaints'' from unassigned numbers is ``miniscule,'' USTelecom states 
that ``the scale of numbers at issue in the Commission's latter two 
proposals [blocking calls from unallocated and unassigned numbers] are 
potentially enormous--encompassing 3 billion telephone numbers.'' 
Transaction Network Services (TNS) attempts to strike a middle ground, 
suggesting that ``[w]hile there is a large number of unallocated 
telephone numbers (over 33 million) that have been flagged as making 
calls, the volume of call activity from these numbers relative to all 
negative robocalling is very small.'' TNS concludes that blocking 
``this subset of numbers has significant, but limited value.'' In 
contrast, a recent Commission enforcement action found that one 
robocaller made a staggering 21,582,771 spoofed robocalls in a three-
month period; the caller ID for each of the robocalls examined by the 
FCC falsely identified a phone number that was not assigned to any 
carrier or subscriber at the time the calls were made. Although the 
number of complaints about calls from unassigned numbers may be small, 
the Commission agrees with USTelecom that the potential value of 
blocking such calls is enormous. Consumers will benefit from this type 
of blocking because the calls are highly likely to annoy or defraud.
    26. Defining Unallocated Numbers Subject to Blocking. Some 
commenters emphasize that a permissive rule does not require providers 
to identify and block every unallocated number, but rather simply 
allows a provider to block calls purporting to be from those numbers it 
can verify are unallocated. The Commission agrees. Providers may block 
calls purporting to be from unallocated numbers and should limit 
themselves to blocking only those numbers that they can verify are 
unallocated. Providers may not be able to identify the complete set of 
all unallocated numbers for purposes of call blocking. Accordingly, 
voice service providers might be unable to block calls purporting to 
originate from every unallocated number, but this shortcoming would not 
result in the blocking of legal calls.
    27. Obtaining Unallocated Number Information. The Commission does 
not prescribe a technical solution for identifying and communicating 
information about unallocated numbers at this time. The record shows 
consensus that, while information on unallocated numbers is available 
to providers, no currently available source identifies all unallocated 
numbers in real time and that ``the NANPA does not administer codes 
outside the United States, specifically in Canada and Caribbean 
countries, or toll-free numbers.'' Many commenters suggest that 
providers should use a new, centralized database as a resource for 
identification of unallocated numbers.
    28. Neustar lists categories of unallocated numbers that should not 
initiate calls, including ``telephone numbers in: (1) Unallocated area 
codes in the NANP; (2) unallocated geographic

[[Page 1570]]

Central Office (``CO'') codes (NPA-NXX) in the United States; and (3) 
unallocated non-contaminated thousands-blocks (NPA-NXX-X) in the United 
States.'' ATIS elaborates on the issue of contaminated thousands-
blocks, stating that available thousands-blocks ``publicly posted on 
the PA website . . . could contain up to 100 assigned numbers within 
those blocks.'' Therefore, providers blocking calls from contaminated 
blocks could erroneously block calls purporting to originate from 
assigned numbers. Providers that block calls purporting to originate 
from assigned numbers may be liable for violating the call completion 
rules.
    29. Several commenters propose enhancements to the information 
provided by the NANPA and the PA. Neustar suggests that the NANPA and 
the PA ``provide on their websites: (1) `Blacklists' of unallocated 
numbers that should not be making calls; and (2) `Whitelists' of 
allocated area codes in the NANP, allocated geographic CO codes in the 
United States, and allocated thousands-blocks in the United States.'' 
Comcast takes a similar approach, suggesting that the databases ``(1) 
more clearly identify which numbers have not yet been allocated and (2) 
are updated immediately to reflect any new allocations as they occur.''
    30. The Commission believes that providers, the NANPA, and the PA 
are in the best position to determine how to share information about 
unallocated numbers. The Commission encourages these parties to work 
together on whether and how to improve the availability of this 
information for blocking purposes. At the same time, the Commission 
cautions against blocking calls purporting to originate from allocated 
numbers and encourages providers to examine their practices carefully 
to verify that they are not inadvertently doing so. A provider that 
erroneously blocks calls purporting to originate from allocated numbers 
may be liable for violating the call completion rules.

Calls Purporting To Originate From Numbers That Are Allocated but 
Unused

    31. The Commission finds that providers may block calls purportedly 
originating from numbers that are allocated to a provider by the NANPA 
or PA, but are unused, so long as the provider blocking the calls is 
the allocatee of the number or has obtained verification from the 
allocatee that the number is unused at the time of the blocking. For 
these purposes, an ``unused'' number is a number that is not assigned 
to a subscriber or otherwise set aside for outbound call use. As with 
invalid numbers and unallocated numbers, calls cannot originate from 
such a number, and the Commission foresees no lawful purpose for 
intentionally spoofing a number that is unused and thus cannot be 
called back.
    32. The record shows mixed support for allowing providers to block 
these kinds of calls. For example, EPIC points out that ``because they 
are not assigned anyone using them without the provider's knowledge is 
almost certainly engaging in unlawful activity.'' Many commenters, 
however, express concerns about legal calls being blocked, similar to 
the concerns about unallocated number call blocking, because ``the 
status of numbers is always changing.'' The record also shows 
``potentially thorny implementation issues'' for blocking calls from 
unused numbers, similar to but greater in scale than those identified 
for unallocated numbers. In addition, the argument concerning the 
likely reaction of robocallers to the blocking of unallocated numbers 
detailed above applies here as well.
    33. Obtaining Unused Number Information. The record clearly shows 
``an industry-wide recognition that there is currently no technical 
solution that allows providers to accurately and promptly identify 
numbers that have been allocated to a carrier but not yet assigned to a 
subscriber.'' Commenters assert that without such a database, providers 
cannot be certain of the status of numbers not assigned to them. The 
Number Portability Administration Center (NPAC) and other existing 
databases do not show the details of provider assignment of numbers and 
are not capable of identifying reassigned numbers. Microsoft claims 
that such blocking, ``if not supported by use of a 100 percent reliable 
real-time database (which does not exist), could prevent outgoing 
domestic call completion for consumers who are assigned newly-activated 
telephone numbers.''
    34. The record reveals that creating such a database would be 
difficult. Neustar comments that providers ``often consider such 
information to be competitively sensitive.'' In addition, the 
information changes very quickly, ``as providers are constantly 
assigning new numbers to subscribers or are de-assigning numbers when a 
subscriber leaves and decides not to take advantage of number 
portability.'' While the FTC encourages providers to share this 
information, providers oppose mandatory information sharing. CTIA 
cautions that creating a centralized database ``is technically 
challenging and would divert resources away from innovative 
solutions.''
    35. The Commission concludes, however, that a narrowly tailored 
rule could be implemented without a database. Noble Systems makes a 
distinction between allowing providers to block calls purported to 
originate from numbers allocated to that provider, which the provider 
knows to be unused, and requiring providers to share information to 
block all unused numbers. Regarding their own numbers, ``each 
individual service provider certainly knows which telephone numbers it 
has been allocated but not yet assigned to subscribers.'' As such, the 
rule permits providers to block on this basis. Should the industry 
develop more comprehensive information sources that would facilitate 
broader blocking of calls purported to originate from unused numbers, 
the rule would also permit that kind of blocking.
    36. Scope of Rule. The record shows significant obstacles to 
implementing a rule requiring all providers to pool their information, 
yet where the allocatee of the number in question is the only provider 
able to block calls purporting to originate from that number, ``the 
value of the initiative would be significantly diminished and would 
create a disadvantage for smaller providers.'' With fewer providers 
blocking each number, fewer illegal calls will be blocked overall.
    37. The Commission will not require providers to share 
competitively sensitive information on an industry-wide basis, nor will 
it limit providers to blocking only unused numbers they have been 
allocated. The Commission therefore defines the scope of this rule to 
allow providers to block calls purporting to originate from an unused 
number, so long as the provider blocking the call either (1) is the 
allocatee of the number and has confirmed the number is unused, or (2) 
has verified the unused status of the number with the allocatee at the 
time of the blocking. This gives providers the flexibility to share 
information if they wish to, and the Commission encourages providers to 
do so.
    38. In addition, this is a permissive rule. CTIA points out that 
such ``[a] voluntary regime will allow carriers that develop the 
ability to identify these numbers to block calls originating from them 
without forcing carriers to develop capabilities they do not currently 
possess.''
    39. Types of Used Numbers. Many commenters indicate that legal 
calls may be made from what appear to be unassigned numbers. For 
example, INCOMPAS points out that ``many

[[Page 1571]]

legitimate callers do not originate calls on the [PSTN] and, therefore, 
do not have telephone numbers.'' Commenters identify three specific 
kinds of unassigned numbers that should not be blocked because they are 
being used to make legal outbound calls: Intermediate numbers, 
administrative numbers, and proxy numbers. The Commission acknowledges 
this concern and the rule is clear that providers should not block any 
type of number that, although it is not assigned to a subscriber, is 
used for these lawful purposes. The Commission encourages providers to 
examine the status of their numbers before blocking calls that purport 
to originate from unused numbers to verify that they are not 
inadvertently blocking calls that fall outside the scope of this rule, 
which would risk liability for violating the call completion rules.

Other Issues

    40. Emergency Calls. The Commission makes clear that the rules do 
not authorize the blocking of calls to 911 under any circumstance. The 
Commission notes that the NANP itself contemplates certain non-standard 
numbers to facilitate emergency calling; the NANP, for example, 
``permits the use of `911' as the [Numbering Plan Area code] for 
emergency calls from non-initialized mobile devices.'' To make it 
abundantly clear, nonetheless, that voice providers should not block 
such calls, the Commission makes clear these rules do not permit the 
blocking of emergency calls except as otherwise expressly permitted by 
the Commission's rules.
    41. International Calls. In the Advanced Methods NPRM and NOI, the 
Commission sought comment ``on whether an internationally originated 
call purportedly originated from a NANP number should be subject to 
these rules, whereas an internationally originated call showing an 
international number would be beyond the scope of this rule.'' The 
Commission adopts this proposal. The Commission agrees with Neustar 
that it should apply to international calls purporting to use NANP 
numbers ``the same blocking rules applicable to domestic originated 
calls.'' Many illegal robocalls originate from overseas call centers, 
and excluding such calls that purport to use NANP numbers from the 
ambit of the rule would create an exception that threatens to swallow 
the rule. In contrast, international calls from purported non-NANP 
numbers would not, by definition, follow the NANP numbering scheme and 
thus are beyond the scope of this proceeding.
    42. The Commission agrees with commenters that internationally 
originated calls may have lawful reasons to use a NANP number. VON, for 
example, suggests ``a US-based user of a service may be traveling in 
Europe but uses their service to make Wi-Fi-based calls (and have their 
US caller ID shown).'' And the Commission agrees with Microsoft that it 
must ``avoid inadvertently authorizing international call blocking.'' 
But the Commission disagrees with ZipDX's apparent suggestion that some 
possibility of international call blocking means the Commission must 
abandon its efforts. Because the Commission authorizes blocking only 
for purported NANP numbers, it sees no reason why the actual 
origination point of the call would bear on whether it is blocked. In 
other words, the Commission finds the likelihood of blocking a 
legitimate call is minimal--no matter its origin. And the Commission 
reiterates that the rules do not authorize the blocking of any 
international call purporting to use a valid NANP number assigned to 
that user.
    43. Subscriber Consent. The Commission does not require consumer 
opt-in for providers to block the specific types of calls addressed 
herein. The Commission believes that no reasonable consumer would want 
to receive the calls the Commission has determined may be subject to 
blocking. For call blocking to be most effective, it must be applied 
throughout the calling network. An opt-in requirement would thwart 
providers' efforts.
    44. The record shows support for allowing providers to block these 
specific types of spoofed calls without requiring consent from the 
subscriber. Some commenters emphasize the limited scope of calls that 
do not require consent. ITTA agrees with the Commission's reasoning 
that ``obtaining opt-in consent from subscribers would add unnecessary 
burdens and complexity, . . . may not be technically feasible for some 
providers'' and ``would also add unnecessary delays.'' EPIC comments 
that ``proactive blocking'' would benefit consumers, ``especially those 
that rely on landlines, [who] may not have or use caller ID.''
    45. Consumers Union et. al. propose that providers should obtain 
consent from all consumers before blocking calls other than those 
purporting to originate from DNO numbers, but, as stated above, the 
Commission does not believe any reasonable consumer would want to 
receive these calls. The administrative burden of tracking individual 
opt-in responses would likely be a disincentive to blocking.
    46. While providers are not required to obtain subscriber consent 
before blocking these calls, the Commission emphasizes that the types 
of calls that can be blocked are very limited. The Commission agrees 
with the recommendation from the Consumer Advisory Committee (CAC) and 
encourages providers to inform their customers about the features and 
risks of their own call blocking programs.
    47. Call Completion Rates. The Strike Force requested that the 
Commission amend its call completion rules to ensure that providers can 
block illegal calls without those blocked calls being held against them 
in calculating call completion rates. The Commission agrees that 
providers do not need to count these blocked calls for purposes of 
calculating their call completion rates on FCC Form 480 and therefore 
the Commission interprets the rules and the form to not require 
inclusion of calls blocked in accordance with the rules adopted here. 
Reporting carriers may exclude these calls to the extent that they are 
able to identify them.
    48. The record shows significant support for excluding these calls 
from the call completion calculations to ``incentivize carriers to 
participate in voluntary blocking when appropriate and consistent with 
the rules.'' CenturyLink comments that ``[w]ithout this protection, 
carriers may be unwilling to use any of the tools that may be adopted 
in the proceeding and the consumer benefits the Commission hopes to 
achieve may not be realized.'' Consumers Union et. al. agrees that 
``the calls that are blocked according to these guidelines should be 
exempt from call completion rates.''
    49. Notwithstanding this support for the concept of excluding 
blocked calls from call completion rate calculations, it might not 
currently be possible for all providers to identify blocked calls. 
Originating providers required to file call completion reports have no 
standard mechanism to identify calls that are blocked intentionally 
under these rules by downstream providers and distinguish them from 
calls that are not completed for other reasons. Further, NTCA suggests 
that excluding such calls from call completion would be premature 
``until the definitions and practical considerations noted above are 
addressed and standardized by industry and the Commission.''
    50. Given the inability of all providers who must file call 
completion reports to identify blocked calls in every instance and the 
Commission's revisiting of the rural call completion requirements in a 
separate rulemaking proceeding, the Commission does not believe that

[[Page 1572]]

requiring exclusion of these calls is appropriate at this time. The 
Commission instead simply notes that providers subject to the call-
completion reporting rules may, but are not required to, exclude 
blocked calls from the recordkeeping and reporting requirements to the 
extent they can identify such calls.
    51. CPNI Rules. In the Advanced Methods NPRM and NOI, the 
Commission sought comment on whether there are concerns about sharing 
DNO request information and whether any clarifications or rule changes 
could be helpful. Some commenters asked the Commission to clarify the 
applicability of section 222 of the Act, and the implementing rules, in 
order to allow sharing of robocall information for traceback purposes 
or sharing of a subscriber's request to block an inbound-only number.
    52. USTelecom notes that ``the sharing of CPNI by 
telecommunications providers is essential to ensuring accurate and 
thorough call traceback efforts in multiple providers' networks related 
to suspicious calling events.'' The Commission notes that traceback 
efforts are aimed at identifying persons who make illegal robocalls, 
including calls that involve fraud in violation of the Truth in Caller 
ID Act. The FTC comments that ``information sharing by providers at the 
subscriber's request appears to be consistent'' with the CPNI rules. 
The Commission agrees. Section 222 of the Act and the implementing 
rules explicitly allow telecommunications carriers to use, disclose, or 
permit access to CPNI obtained from its customers, either directly or 
indirectly through its agents, ``to protect the rights or property of 
the carrier, or to protect users of those services and other carriers 
from fraudulent, abusive, or unlawful use of, or subscription to, such 
services.'' Furthermore, the Commission agrees with the FTC that when a 
subscriber requests that the carrier block calls purporting to be from 
the subscriber's inbound-only number, ``the subscriber is almost 
certainly seeking to have the number blocked by as many providers as 
possible.'' Therefore, such a request should be understood as 
authorizing the carrier to share that request with other carriers as 
permitted by section 222(c)(1) of the Act. Thus, voice service 
providers are free to share DNO requests as necessary to block calls in 
the limited circumstances identified in the Report and Order.
    53. Removing Blocks on Valid Numbers. A challenge mechanism may be 
needed for voice service providers that block calls given the small 
possibility of blocking legitimate calls. AARP suggested ``[i]t would 
seem to be prudent to have the needed procedures to allow consumers to 
quickly counteract inadvertent blocking in place prior to the 
commencement of the general robocall blocking program.'' The 
Commission's Consumer Advisory Committee similarly states that 
providers and consumers should ``work collaboratively to develop 
processes and solutions whereby unintended blocking of legitimate 
callers can be remedied in a timely and efficient manner.'' The 
Commission encourages providers that block calls to establish a means 
for a caller whose number is blocked to contact the provider and remedy 
the problem. Specifically, the Commission encourages providers that 
block calls in accordance with these rules to provide a way for 
subscribers to challenge a blocked number using a simple method that is 
easy for the average subscriber to understand. The Commission also 
encourages providers to quickly resolve the matter so subscribers 
making legitimate calls may resume doing so speedily.
    54. As a reminder, the call completion rules require voice service 
providers to complete calls and they should therefore not block 
legitimate calls. The Commission also reminds callers that the 
Commission's complaint process is available when calls that fall 
outside the scope of these rules are improperly blocked.
    55. Definition of ``Illegal Robocall.'' Although the Advanced 
Methods NPRM and NOI sought comment on the definition of ``illegal 
robocall'' for the purposes of this proceeding, the Commission declines 
to adopt a definition here given that none of the rules adopted here 
rely on such a definition. Indeed, the record shows confusion regarding 
how the proposed definition of ``illegal robocall'' should apply to the 
call blocking rules. Sprint comments that providers cannot determine 
whether a call meets the definition of an illegal robocall before 
blocking it, because ``[u]nlike spam prevention in email, the content 
of a call cannot be determined before the call rings through to the 
customer's phone.'' First Orion states ``the Commission clearly intends 
to give carriers the flexibility to prevent all illegal calls, 
regardless of the technology used.'' Similarly, the FTC suggests that 
the Commission use the term ``illegal call'' rather than ``illegal 
robocall,'' because ``the problematic calls here are not limited to 
just robocalls, but also abusive, fraudulent, or unlawful calls that 
are `live.' '' Because the Commission makes clear that providers need 
not listen to the content of calls or otherwise to determine whether a 
particular call is expressly illegal before blocking it, the Commission 
sees no reason to define the term at the present moment.

Report on Robocalling

    56. To shed additional light on the issue of robocalling and inform 
the Commission's actions going forward, the Commission directs the 
Consumer and Governmental Affairs Bureau, in consultation with the 
Federal Trade Commission's Bureau of Consumer Protection, to prepare a 
report on the state of robocalling in the United States and to submit 
it to the Commission within one year from publication of the Report and 
Order in the Federal Register. This report should encompass both the 
progress made by industry, government, and consumers in combatting 
illegal robocalls, as well as the remaining challenges to continuing 
these important efforts. A focus on quantitative data, including, but 
not limited to, calling trends and consumer complaints, will provide 
particular insight into the current state of the robocalling problem 
and how to target additional measures to help consumers avoid the fraud 
and annoyance that they experience.

Final Regulatory Flexibility Analysis

    57. As required by the Regulatory Flexibility Act of 1980 (RFA), as 
amended, an Initial Regulatory Flexibility Analysis (IRFA) was 
incorporated into the Advanced Methods NPRM and NOI. The Commission 
sought written public comment on the proposals in the Advanced Methods 
NPRM and NOI, including comment on the IRFA. The comments received are 
discussed below. This Final Regulatory Flexibility Analysis (FRFA) 
conforms to the RFA.

Need for, and Objectives of, the Order

    58. The Report and Order takes another important step in combatting 
illegal robocalls by enabling voice service providers to block certain 
calls before they reach consumers' phones. In the year since August 1, 
2016, the Commission has received nearly 185,000 complaints about calls 
that consumers did not want. Stopping illegal robocalls and the 
problems they cause has united industry, government, and consumer 
groups. Caller ID spoofing is often the key to making robocall scams 
work. Therefore, the rules outline specific, well-defined circumstances 
in which voice service providers may block calls that are highly likely 
to be illegitimate because

[[Page 1573]]

there is no lawful reason to spoof certain kinds of numbers. 
Specifically, the Report and Order adopts rules allowing providers to 
block calls from phone numbers on a DNO list and those that purport to 
be from invalid, unallocated, or unused numbers. By doing so, the 
Commission furthers its goal of removing regulatory roadblocks and 
gives industry the flexibility to block illegal calls. At the same 
time, the Commission affirms its commitment to protect the reliability 
of the nation's communications network and ensure that provider-
initiated blocking helps, rather than harms, consumers. A provider that 
blocks calls that do not fall within the scope of these rules may be 
liable for violating the Commission's call completion rules.
    59. Blocking at the Request of the Subscriber to the Originating 
Number. In the Report and Order, the Commission codifies the Bureau's 
earlier clarification that voice service providers may block calls 
purporting to be from a telephone number if the subscriber to that 
number requests such blocking in order to prevent its number from being 
spoofed. Where the subscriber did not consent to the number being used, 
the call was very likely made with the intent to defraud, and therefore 
no reasonable consumer would wish to receive such a call.
    60. Calls Supposedly Originating From Invalid Numbers. Similarly, 
the Report and Order allows providers to block calls purportedly 
originating from numbers that are not valid under the NANP. Examples of 
such numbers include those that use an unassigned area code; that use 
an abbreviated dialing code, such as 411, in place of an area code; 
that do not contain the requisite number of digits; and that are a 
single digit repeated, such as 000-000-0000, with the exception of 888-
888-8888, which is an assignable number. No caller would spoof an 
invalid number for any lawful purpose; for example, unlike a business 
spoofing Caller ID on outgoing calls to show its main call-back number, 
invalid numbers cannot be called back. Providers, however, must take 
care that they do not block calls that purportedly originate from valid 
numbers, especially emergency calls.
    61. Calls Supposedly Originating From Numbers Not Allocated to Any 
Provider. The Report and Order also allows providers to block calls 
purportedly originating from numbers that are valid but have not yet 
been allocated by the NANPA or the PA to any provider. Though these 
numbers are valid under the North American Numbering Plan, the 
Commission finds that calls purporting to use unallocated numbers are 
similar to calls purporting to use invalid numbers in that no 
subscriber can actually originate a call from any of these numbers, and 
the Commission sees no lawful reason to spoof such numbers because they 
cannot be called back.
    62. Calls Supposedly Originating From Numbers That are Allocated 
but Unused. Document FCC 17-151 allows providers to block calls 
purportedly originating from numbers that are allocated to a provider 
by the North American Numbering Plan Administrator or Pooling 
Administrator, but are unused, so long as the provider blocking the 
calls is the allocatee of the number or has obtained verification from 
the allocatee that the number is unused at the time of the blocking. 
For these purposes, an ``unused'' number is a number that is not 
assigned to a subscriber or otherwise set aside for legitimate outbound 
call use. As with invalid numbers and unallocated numbers, a subscriber 
cannot originate a call from such a number, and the Commission foresees 
no lawful purpose for intentionally spoofing a number that is unused 
and thus cannot be called back.
    63. Other Issues. The Report and Order also clarifies that these 
rules do not permit the blocking of emergency calls except as otherwise 
expressly permitted by the Commission's rules, that all calls 
purporting to originate from a NANP number, including international 
calls, are subject to these rules, and that international calls from 
purported non-NANP numbers would not, by definition, follow the NANP 
numbering scheme and thus are beyond the scope of this proceeding. It 
confirms that the Commission does not require consumer opt-in for 
providers to block these specific types of calls, clarifies that 
providers do not need to count these blocked calls for purposes of 
calculating their call completion rates, clarifies that voice service 
providers are free to share the CPNI necessary to block calls in the 
limited circumstances identified in the Report and Order, encourages 
providers to establish a means for a caller whose number is blocked to 
contact the provider and remedy the problem, and declines to adopt a 
definition of the term ``illegal robocall'' at the present moment.

Summary of Significant Issues Raised by Public Comments in Response to 
the IRFA

    64. In the Advanced Methods NPRM and NOI, the Commission solicited 
comments on how to minimize the economic impact of the new rules on 
small businesses. The Commission received one comment directly 
addressing the IRFA and several comments addressing small business 
concerns. Two of the comments requested that the call blocking rules be 
permissive, rather than mandatory, three pertained to the 
administration of a database for unassigned numbers, and two addressed 
other issues. In addition, the Commission received two consumer 
comments documenting the negative impact of unwanted calls on small 
businesses. None of the other comments pointed out any areas where 
small businesses would incur a particular hardship in complying with 
the rules.
    65. Permissive Rules. Both CTIA and ITTA support permissive rules. 
CTIA suggests that ``blocking of numbers . . . should be authorized, 
but not required.'' ITTA claims that permissive rules give providers 
``flexibility in how aggressively they choose to block calls.'' The 
rules the Commission adopts here are permissive and not mandatory.
    66. Database Administration. INCOMPAS, ITTA, and PACE suggest that 
a centralized database of unused numbers be created, and then suggest 
ways to minimize disproportionate costs to small businesses in using 
such a database. The Commission considered both the technical and cost 
issues inherent in the creations of a database and determined not to 
require one. Without a database, concerns about its administration are 
rendered moot.
    67. INCOMPAS requests a mechanism that will ``spare smaller 
providers from using additional resources to prove the legitimacy of 
its call traffic to other providers.'' In the Report and Order, the 
Commission allows a provider to block unused numbers only if the 
provider blocking the calls is the allocatee of the number or has 
obtained verification from the allocatee that the number is unused at 
the time of the blocking. Therefore, if a smaller provider does not 
give information to other providers, its call traffic will not be 
blocked.
    68. Other Issues. Commenters raise three other issues. First, 
INCOMPAS requests that the Commission require providers to put a 
mechanism in place to remove blocks on valid numbers, and that in doing 
so, ``providers should be given discretion to adjust their policies 
according to their size and services.'' In the Report and Order, the 
Commission urges, but does not require providers to implement such a 
mechanism, nor does the Commission provide specific requirements for 
how providers might remove blocks on valid numbers, allowing smaller 
providers the flexibility they request. Second, NTCA suggests that the 
North American

[[Page 1574]]

Numbering Council (NANC) ``may be best positioned to help clarify 
practical requirements'' to ``to assess and mitigate the costs of 
compliance for smaller firms.'' However, industry has already 
established the Robocall Strike Force (Strike Force), which has 
produced significant documentation clarifying the practical 
requirements for the limited and specific types of call blocking 
authorized in the Report and Order. Blocking these calls presents a 
very low risk, and NANC participation is not required to move forward 
at this time. Third, TNS suggests that providers be permitted to block 
unused numbers allocated to other providers to avoid creating ``a 
disadvantage for smaller providers.'' The record also shows that many 
providers view their unused number data as competitively sensitive 
information. In the Report and Order, the Commission balances these 
concerns by allowing, but not requiring, providers to block unused 
numbers allocated to other providers if they have verified the unused 
status of the number.

Response to Comments by the Chief Counsel for Advocacy of the Small 
Business Administration

    69. Pursuant to the Small Business Jobs Act of 2010, which amended 
the RFA, the Commission is required to respond to any comments filed by 
the Chief Counsel for Advocacy of the Small Business Administration 
(SBA), and to provide a detailed statement of any change made to the 
proposed rules as a result of those comments. The Chief Counsel did not 
file any comments in response to the proposed rules in this proceeding.

Description and Estimate of the Number of Small Entities to Which Rules 
Will Apply

    70. The RFA directs agencies to provide a description of, and where 
feasible, an estimate of the number of small entities that may be 
affected by the rules adopted herein. The RFA generally defines the 
term ``small entity'' as having the same meaning as the terms ``small 
business,'' ``small organization,'' and ``small governmental 
jurisdiction.'' In addition, the term ``small business'' has the same 
meaning as the term ``small-business concern'' under the Small Business 
Act. A ``small-business concern'' is one which: (1) Is independently 
owned and operated; (2) is not dominant in its field of operation; and 
(3) satisfies any additional criteria established by the SBA.

Wireline Carriers

    71. Wired Telecommunications Carriers. The U.S. Census Bureau 
defines this industry as ``establishments primarily engaged in 
operating and/or providing access to transmission facilities and 
infrastructure that they own and/or lease for the transmission of 
voice, data, text, sound, and video using wired communications 
networks. Transmission facilities may be based on a single technology 
or a combination of technologies. Establishments in this industry use 
the wired telecommunications network facilities that they operate to 
provide a variety of services, such as wired telephony services, 
including VoIP services, wired (cable) audio and video programming 
distribution, and wired broadband internet services. By exception, 
establishments providing satellite television distribution services 
using facilities and infrastructure that they operate are included in 
this industry.'' The SBA has developed a small business size standard 
for Wired Telecommunications Carriers, which consists of all such 
companies having 1,500 or fewer employees. Census data for 2012 shows 
that there were 3,117 firms that operated that year. Of this total, 
3,083 operated with fewer than 1,000 employees. Thus, under this size 
standard, the majority of firms in this industry can be considered 
small.
    72. Local Exchange Carriers (LECs). Neither the Commission nor the 
SBA has developed a small business size standard specifically for local 
exchange services. The closest applicable size standard under SBA rules 
is for the category Wired Telecommunications Carriers. The U.S. Census 
Bureau defines this industry as ``establishments primarily engaged in 
operating and/or providing access to transmission facilities and 
infrastructure that they own and/or lease for the transmission of 
voice, data, text, sound, and video using wired communications 
networks. Transmission facilities may be based on a single technology 
or a combination of technologies. Establishments in this industry use 
the wired telecommunications network facilities that they operate to 
provide a variety of services, such as wired telephony services, 
including VoIP services, wired (cable) audio and video programming 
distribution, and wired broadband internet services. By exception, 
establishments providing satellite television distribution services 
using facilities and infrastructure that they operate are included in 
this industry.'' Under that size standard, such a business is small if 
it has 1,500 or fewer employees. Census data for 2012 show that there 
were 3,117 firms that operated that year. Of this total, 3,083 operated 
with fewer than 1,000 employees. Consequently, the Commission estimates 
that most providers of local exchange service are small businesses.
    73. Incumbent Local Exchange Carriers (Incumbent LECs). Neither the 
Commission nor the SBA has developed a small business size standard 
specifically for incumbent local exchange services. The closest 
applicable size standard under SBA rules is for the category Wired 
Telecommunications Carriers. The U.S. Census Bureau defines this 
industry as ``establishments primarily engaged in operating and/or 
providing access to transmission facilities and infrastructure that 
they own and/or lease for the transmission of voice, data, text, sound, 
and video using wired communications networks. Transmission facilities 
may be based on a single technology or a combination of technologies. 
Establishments in this industry use the wired telecommunications 
network facilities that they operate to provide a variety of services, 
such as wired telephony services, including VoIP services, wired 
(cable) audio and video programming distribution, and wired broadband 
internet services. By exception, establishments providing satellite 
television distribution services using facilities and infrastructure 
that they operate are included in this industry.'' Under that size 
standard, such a business is small if it has 1,500 or fewer employees. 
Census data for 2012 show that there were 3,117 firms that operated 
that year. Of this total, 3,083 operated with fewer than 1,000 
employees. Consequently, the Commission estimates that most providers 
of incumbent local exchange service are small businesses.
    74. Competitive Local Exchange Carriers (Competitive LECs), 
Competitive Access Providers (CAPs), Shared-Tenant Service Providers, 
and Other Local Service Providers. Neither the Commission nor the SBA 
has developed a small business size standard specifically for these 
service providers. The appropriate size standard under SBA rules is for 
the category Wired Telecommunications Carriers. The U.S. Census Bureau 
defines this industry as ``establishments primarily engaged in 
operating and/or providing access to transmission facilities and 
infrastructure that they own and/or lease for the transmission of 
voice, data, text, sound, and video using wired communications 
networks. Transmission facilities may be based on a single technology 
or a combination of

[[Page 1575]]

technologies. Establishments in this industry use the wired 
telecommunications network facilities that they operate to provide a 
variety of services, such as wired telephony services, including VoIP 
services, wired (cable) audio and video programming distribution, and 
wired broadband internet services. By exception, establishments 
providing satellite television distribution services using facilities 
and infrastructure that they operate are included in this industry.'' 
Under that size standard, such a business is small if it has 1,500 or 
fewer employees. Census data for 2012 show that there were 3,117 firms 
that operated that year. Of this total, 3,083 operated with fewer than 
1,000 employees. Consequently, the Commission estimates that most 
providers of competitive local exchange service, competitive access 
providers, shared-tenant service providers, and other local service 
providers are small entities.
    75. The Commission has included small incumbent LECs in this 
present RFA analysis. As noted above, a ``small business'' under the 
RFA is one that, inter alia, meets the pertinent small business size 
standard (e.g., a telephone communications business having 1,500 or 
fewer employees), and ``is not dominant in its field of operation.'' 
The SBA's Office of Advocacy contends that, for RFA purposes, small 
incumbent LECs are not dominant in their field of operation because any 
such dominance is not ``national'' in scope. The Commission has 
therefore included small incumbent LECs in this RFA analysis, although 
it emphasizes that this RFA action has no effect on Commission analyses 
and determinations in other, non-RFA contexts.
    76. Interexchange Carriers. Neither the Commission nor the SBA has 
developed a small business size standard specifically for providers of 
interexchange services. The appropriate size standard under SBA rules 
is for the category Wired Telecommunications Carriers. The U.S. Census 
Bureau defines this industry as ``establishments primarily engaged in 
operating and/or providing access to transmission facilities and 
infrastructure that they own and/or lease for the transmission of 
voice, data, text, sound, and video using wired communications 
networks. Transmission facilities may be based on a single technology 
or a combination of technologies. Establishments in this industry use 
the wired telecommunications network facilities that they operate to 
provide a variety of services, such as wired telephony services, 
including VoIP services, wired (cable) audio and video programming 
distribution, and wired broadband internet services. By exception, 
establishments providing satellite television distribution services 
using facilities and infrastructure that they operate are included in 
this industry.'' Under that size standard, such a business is small if 
it has 1,500 or fewer employees. Census data for 2012 show that there 
were 3,117 firms that operated that year. Of this total, 3,083 operated 
with fewer than 1,000 employees. Consequently, the Commission estimates 
that the majority of interexchange carriers are small entities.
    77. Cable System Operators (Telecom Act Standard). The 
Communications Act also contains a size standard for small cable system 
operators, which is ``a cable operator that, directly or through an 
affiliate, serves in the aggregate fewer than 1 percent of all 
subscribers in the United States and is not affiliated with any entity 
or entities whose gross annual revenues in the aggregate exceed 
$250,000,000.'' There are approximately 52,403,705 cable video 
subscribers in the United States today. Accordingly, an operator 
serving fewer than 524,037 subscribers shall be deemed a small operator 
if its annual revenues, when combined with the total annual revenues of 
all its affiliates, do not exceed $250 million in the aggregate. Based 
on available data, the Commission finds that all but nine incumbent 
cable operators are small entities under this size standard. Note that 
the Commission neither requests nor collects information on whether 
cable system operators are affiliated with entities whose gross annual 
revenues exceed $250 million. Although it seems certain that some of 
these cable system operators are affiliated with entities whose gross 
annual revenues exceed $250 million, the Commission is unable at this 
time to estimate with greater precision the number of cable system 
operators that would qualify as small cable operators under the 
definition in the Communications Act.
    78. Other Toll Carriers. Neither the Commission nor the SBA has 
developed a size standard for small businesses specifically applicable 
to other toll carriers. This category includes toll carriers that do 
not fall within the categories of interexchange carriers, operator 
service providers, prepaid calling card providers, satellite service 
carriers, or toll resellers. The closest applicable size standard under 
SBA rules is for Wired Telecommunications Carriers. The U.S. Census 
Bureau defines this industry as ``establishments primarily engaged in 
operating and/or providing access to transmission facilities and 
infrastructure that they own and/or lease for the transmission of 
voice, data, text, sound, and video using wired communications 
networks. Transmission facilities may be based on a single technology 
or a combination of technologies. Establishments in this industry use 
the wired telecommunications network facilities that they operate to 
provide a variety of services, such as wired telephony services, 
including VoIP services, wired (cable) audio and video programming 
distribution, and wired broadband internet services. By exception, 
establishments providing satellite television distribution services 
using facilities and infrastructure that they operate are included in 
this industry.'' Under that size standard, such a business is small if 
it has 1,500 or fewer employees. Census data for 2012 show that there 
were 3,117 firms that operated that year. Of this total, 3,083 operated 
with fewer than 1,000 employees. Thus, under this category and the 
associated small business size standard, the majority of other toll 
carriers can be considered small.

Wireless Carriers

    79. Wireless Telecommunications Carriers (except Satellite). Since 
2007, the Census Bureau has placed wireless firms within this new, 
broad, economic census category. Under the present and prior 
categories, the SBA has deemed a wireless business to be small if it 
has 1,500 or fewer employees. For the category of Wireless 
Telecommunications Carriers (except Satellite), Census data for 2012 
show that there were 967 firms that operated for the entire year. Of 
this total, 955 firms had fewer than 1,000 employees. Thus, under this 
category and the associated size standard, the Commission estimates 
that the majority of wireless telecommunications carriers (except 
satellite) are small entities. Similarly, according to internally 
developed Commission data, 413 carriers reported that they were engaged 
in the provision of wireless telephony, including cellular service, 
Personal Communications Service (PCS), and Specialized Mobile Radio 
(SMR) services. Of this total, an estimated 261 have 1,500 or fewer 
employees. Thus, using available data, the Commission estimates that 
the majority of wireless firms can be considered small.
    80. Satellite Telecommunications Providers. The category of 
Satellite Telecommunications ``comprises establishments primarily 
engaged in providing telecommunications services to other 
establishments in the telecommunications and broadcasting

[[Page 1576]]

industries by forwarding and receiving communications signals via a 
system of satellites or reselling satellite telecommunications.'' This 
category has a small business size standard of $32.5 million or less in 
average annual receipts, under SBA rules. For this category, Census 
Bureau data for 2012 show that there were a total of 333 firms that 
operated for the entire year. Of this total, 299 firms had annual 
receipts of under $25 million. Consequently, the Commission estimates 
that the majority of satellite telecommunications firms are small 
entities.
    81. All Other Telecommunications. All other telecommunications 
comprise, inter alia, ``establishments primarily engaged in providing 
specialized telecommunications services, such as satellite tracking, 
communications telemetry, and radar station operation. This industry 
also includes establishments primarily engaged in providing satellite 
terminal stations and associated facilities connected with one or more 
terrestrial systems and capable of transmitting telecommunications to, 
and receiving telecommunications from, satellite systems. 
Establishments providing internet services or voice over internet 
protocol (VoIP) services via client-supplied telecommunications 
connections are also included in this industry.'' The SBA has developed 
a small business size standard for the category of All Other 
Telecommunications. Under that size standard, such a business is small 
if it has $32.5 million in annual receipts. For this category, Census 
Bureau data for 2012 show that there were a total of 1,442 firms that 
operated for the entire year. Of this total, 1,400 had annual receipts 
below $25 million per year. Consequently, the Commission estimates that 
the majority of all other telecommunications firms are small entities.

Resellers

    82. Toll Resellers. The Commission has not developed a definition 
for toll resellers. The closest NAICS Code Category is 
Telecommunications Resellers. The Telecommunications Resellers industry 
comprises establishments engaged in purchasing access and network 
capacity from owners and operators of telecommunications networks and 
reselling wired and wireless telecommunications services (except 
satellite) to businesses and households. Establishments in this 
industry resell telecommunications; they do not operate transmission 
facilities and infrastructure. Mobile virtual network operators (MVNOs) 
are included in this industry. The SBA has developed a small business 
size standard for the category of Telecommunications Resellers. Under 
that size standard, such a business is small if it has 1,500 or fewer 
employees. Census data for 2012 show that 1,341 firms provided resale 
services during that year. Of that number, 1,341 operated with fewer 
than 1,000 employees. Thus, under this category and the associated 
small business size standard, the majority of these resellers can be 
considered small entities. According to Commission data, 881 carriers 
have reported that they are engaged in the provision of toll resale 
services. Of this total, an estimated 857 have 1,500 or fewer 
employees. Consequently, the Commission estimates that the majority of 
toll resellers are small entities.
    83. Local Resellers. The SBA has developed a small business size 
standard for the category of Telecommunications Resellers. The 
Telecommunications Resellers industry comprises establishments engaged 
in purchasing access and network capacity from owners and operators of 
telecommunications networks and reselling wired and wireless 
telecommunications services (except satellite) to businesses and 
households. Establishments in this industry resell telecommunications; 
they do not operate transmission facilities and infrastructure. Mobile 
virtual network operators (MVNOs) are included in this industry. Under 
that size standard, such a business is small if it has 1,500 or fewer 
employees. Census data for 2012 show that 1,341 firms provided resale 
services during that year. Of that number, all operated with fewer than 
1,000 employees. Thus, under this category and the associated small 
business size standard, the majority of these local resellers can be 
considered small entities.
    84. Prepaid Calling Card Providers. The SBA has developed a small 
business size standard for the category of Telecommunications 
Resellers. The Telecommunications Resellers industry comprises 
establishments engaged in purchasing access and network capacity from 
owners and operators of telecommunications networks and reselling wired 
and wireless telecommunications services (except satellite) to 
businesses and households. Establishments in this industry resell 
telecommunications; they do not operate transmission facilities and 
infrastructure. Mobile virtual network operators (MVNOs) are included 
in this industry. Under that size standard, such a business is small if 
it has 1,500 or fewer employees. Census data for 2012 show that 1,341 
firms provided resale services during that year. Of that number, all 
operated with fewer than 1,000 employees. Thus, under this category and 
the associated small business size standard, the majority of these 
prepaid calling card providers can be considered small entities.

Description of Projected Reporting, Recordkeeping, and Other Compliance 
Requirements for Small Entities

    85. The Report and Order gives voice service providers the option 
of blocking illegal robocalls in certain, well-defined circumstances. 
These changes affect small and large companies equally, and apply 
equally to all of the classes of regulated entities identified above.
    86. Reporting and Recordkeeping Requirements. The Report and Order 
clarifies the call completion rules by allowing, but not requiring, 
voice service providers to exclude calls blocked under these new rules 
from their call completion calculations, to the extent that they are 
aware of which calls are blocked. To do so, voice service providers 
that choose to exclude such calls may modify their current reporting 
and recordkeeping procedures already in place for performing their call 
completion calculations on existing FCC Form 480. This is a minor 
modification to an existing process, so the Commission anticipates that 
the impact will be minimal.
    87. Other Compliance Requirements. Voice service providers will be 
permitted, but not required, to block calls purportedly originating 
from (1) a telephone number if the subscriber to that number requests 
such blocking in order to prevent its number from being spoofed; (2) 
numbers that purport to be NANP numbers but are not valid under the 
NANP; (3) numbers that are valid but have not yet been allocated by the 
NANPA or the PA to any provider; (4) numbers that are allocated to a 
provider by the NANPA or PA, but are unused, so long as the provider 
blocking the calls is the allocatee of the number and or has obtained 
verification from the allocatee that the number is unused at the time 
of the blocking.

Steps Taken To Minimize the Significant Economic Impact on Small 
Entities, and Significant Alternatives Considered

    88. The RFA requires an agency to describe any significant 
alternatives that it has considered in reaching its approach, which may 
include the following four alternatives, among others: (1) The 
establishment of differing compliance or reporting requirements or 
timetables that take into

[[Page 1577]]

account the resources available to small entities; (2) the 
clarification, consolidation, or simplification of compliance or 
reporting requirements under the rule for small entities; (3) the use 
of performance, rather than design, standards; and (4) an exemption 
from coverage of the rule, or any part thereof, for small entities.
    89. The Commission considered feedback from the Advanced Methods 
NPRM and NOI in crafting the final order. The Commission evaluated the 
comments in light of balancing the goal of removing regulatory 
roadblocks and giving industry the flexibility to block illegal calls 
with its commitment to protect the reliability of the nation's 
communications network. Small businesses supported the proposal to make 
the call blocking rules permissive rather than mandatory. While the 
Commission considered mandatory rules, it both proposed and implemented 
permissive rules to address the concerns of voice service providers, 
including small businesses, that the cost and burden of complying with 
mandatory rules could be significant and might require implementation 
of new technology. The Commission also took small business concerns 
into consideration in its determination to not require a database of 
unused numbers. While the Commission considered mandating the use of a 
database for providers that choose to block unused numbers, such a 
database could impose disproportionate costs on small businesses and 
would be challenging to create and maintain. Similarly, the Commission 
considered the needs of small businesses in its guidance regarding 
removing blocks from valid numbers. While the Commission considered 
requiring specific processes or dedicated resources, it does not 
mandate them at this time to allow small providers to scale their 
efforts in accordance with their businesses and to develop a more 
robust record on the issue before the Commission addresses this in a 
future proceeding.
    90. The Commission does not see a need to establish a special 
timetable for small entities to reach compliance with the modification 
to the rules. No small business has asked for a delay in implementing 
the rules. Small businesses may avoid compliance costs entirely by 
declining to block robocalls, or may delay implementation of call 
blocking indefinitely to allow for more time to come into compliance 
with the rules. Similarly, there are no design standards or performance 
standards to consider in this rulemaking.

Report to Congress

    91. The Commission sent a copy of the Report and Order, including 
the FRFA, in a report to be sent to Congress and the Government 
Accountability Office pursuant to the Congressional Review Act.

Ordering Clauses

    92. Pursuant to sections 201, 202, 222, 251(e), and 403 of the 
Communications Act of 1934, as amended, 47 U.S.C. 201, 202, 222, 
251(e), 403, the Report and Order is adopted and that part 64 of the 
Commission's rules, 47 CFR 64.1200, is amended.
    93. The Commission's Consumer and Governmental Affairs Bureau, 
Reference Information Center, shall send a copy of the Report and Order 
to Congress and the Government Accountability Office pursuant to the 
Congressional Review Act, see 5 U.S.C. 801(a)(1)(A).
    94. The Commission's Consumer and Governmental Affairs Bureau, 
Reference Information Center, shall send a copy of the Report and 
Order, including the Regulatory Flexibility Analysis, to the Chief 
Counsel for Advocacy of the Small Business Administration.

List of Subjects in 47 CFR Part 64

    Telecommunications, Telephone.

Federal Communications Commission.
Katura Jackson,
Federal Register Liaison Officer, Office of the Secretary.

Final Rules

    For the reasons discussed in the preamble, the Federal 
Communications Commission amends part 64 as follows:

PART 64--MISCELLANEOUS RULES RELATING TO COMMON CARRIERS

0
1. The authority citation for part 64 is amended to read as follows:

    Authority: 47 U.S.C. 154, 202, 225, 251(e), 254(k), 
403(b)(2)(B), (c), 616, 620, Pub. L. 104-104, 110 Stat. 56. 
Interpret or apply 47 U.S.C. 201, 202, 218, 222, 225, 226, 227, 228, 
251(e), 254(k), 616, 620, and the Middle Class Tax Relief and Job 
Creation Act of 2012, Pub. L. 112-96, unless otherwise noted.


0
2. In Sec.  64.1200, add reserved paragraphs (i) and (j) and paragraph 
(k) to read as follows:


Sec.  64.1200  Delivery restrictions.

* * * * *
    (i) [Reserved]
    (j) [Reserved]
    (k) Voice service providers may block calls so that they do not 
reach a called party as follows:
    (1) A provider may block a voice call when the subscriber to which 
the originating number is assigned has requested that calls purporting 
to originate from that number be blocked because the number is used for 
inbound calls only.
    (2) A provider may block a voice call purporting to originate from 
any of the following:
    (i) A North American Numbering Plan number that is not valid;
    (ii) A valid North American Numbering Plan number that is not 
allocated to a provider by the North American Numbering Plan 
Administrator or the Pooling Administrator; and
    (iii) A valid North American Numbering Plan number that is 
allocated to a provider by the North American Numbering Plan 
Administrator or Pooling Administrator, but is unused, so long as the 
provider blocking the calls is the allocatee of the number and confirms 
that the number is unused or has obtained verification from the 
allocatee that the number is unused at the time of the blocking.
    (3) A provider may not block a voice call under paragraph (k)(1) or 
(2) of this section if the call is an emergency call placed to 911.
    (4) For purposes of this subsection, a provider may rely on Caller 
ID information to determine the purported originating number without 
regard to whether the call in fact originated from that number.

[FR Doc. 2018-00457 Filed 1-11-18; 8:45 am]
 BILLING CODE 6712-01-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.