From “reclaimthenet.org”
The FCC just proposed fixing your robocall problem by building the kind of phone-user registry that privacy advocates have spent decades trying to prevent.
The era of the anonymous phone number could be ending. On April 30, the Federal Communications Commission unanimously approved a proposal requiring telecom providers to verify customers’ identities before activating service.
Government-issued ID, physical address, legal name, and existing phone numbers would all be included. The stated goal is stopping robocalls. The result would be an identity-verification regime covering one of the last semi-anonymous communication tools available to ordinary Americans.
The proposal applies to nearly every voice provider in the country, from traditional carriers and mobile operators to VoIP services. The FCC is seeking public comment on specifics, but the direction is clear.
FCC Chairman Brendan Carr framed it around negligent carriers. “As we have continued to investigate the problem of illegal robocalls over the last year, it has become clear that some originating providers are not doing enough to vet their customers, allowing bad actors to infiltrate our U.S. phone networks,” he said. Some providers, he added, “do the bare minimum (or worse) and have become complicit in illegal robocalling schemes.”
That language targets telecom companies and the surveillance targets everyone else.
The framework borrows from banking’s anti-money-laundering rules. The FCC is also asking whether carriers should retain identity documentation for at least four years after a customer leaves and whether they should check customers against law enforcement watchlists. Penalties would shift to a per-call basis, meaning fines of $1,000 to $15,000 for every illegal call a poorly verified customer places.
The real privacy stakes sit in the proposal’s section on prepaid service. Right now, you can pay cash for a prepaid phone and SIM card without showing identification. Journalists use prepaid phones to protect sources, domestic violence survivors use them to avoid being traced, and whistleblowers, activists, or anyone with a reason to separate phone activity from legal identity relies on this.
