In a world where communication is paramount, the telecom industry faces the perennial challenge of mitigating unwanted robocalls, which have plagued consumers and businesses alike. In 2019 alone, Americans received a staggering 106.9 billion robocalls, a nuisance that continued unabated until the implementation of the STIR/SHAKEN protocols. Thanks largely to this robust call authentication technology, the number of unwanted calls dipped significantly to 68 billion by 2024. Spearheaded by the TRACED Act and enforced by the Federal Communications Commission (FCC), STIR/SHAKEN requires carriers to authenticate and sign their call traffic. This enables the trace-back functionality essential for identifying the origins of these disruptive calls.
The Divide Between Top and Non-Top Carriers
Despite substantial progress, the journey towards a fully realized STIR/SHAKEN ecosystem is marred by the stark divide between top-tier and non-top-tier carriers. Giants such as AT&T, Verizon, and T-Mobile have seamlessly transitioned to STIR/SHAKEN-compliant networks, thereby achieving high interconnectivity performance. Astonishingly, 86% of traffic between these leading providers is signed, with over 90% of these calls authenticated at the highest “A” attestation level. However, the scenario is rather bleak for non-top carriers, which face a plethora of operational and financial challenges that impede their ability to adopt this crucial technology.
For non-top carriers, the lack of resources to transition from legacy Time Division Multiplexing (TDM) equipment to Internet Protocol (IP) networks poses significant hurdles. Consequently, fewer than 30% of their call traffic is signed in compliance with STIR/SHAKEN protocols, creating a chasm that robocallers can easily exploit. Without universal adoption, the vulnerabilities in the telecommunications landscape persist, weakening industry-wide efforts to curb fraud and protect consumers effectively. In an ideal STIR/SHAKEN ecosystem, every call would be authenticated at its origin, verified by terminating carriers, and thereby facilitating robust trace-back and mitigation initiatives.
The Crucial Role of Traceback Functionality
Traceback functionality stands as the cornerstone of STIR/SHAKEN’s success. Its significance cannot be overstated, as it enables providers to trace the origins of suspicious calls, thus impeding bad actors from obscuring their tracks through smaller Internet Service Providers (ISPs) and Voice over Internet Protocols (VoIP) providers. Without effective traceback, the task of detecting and shutting down unlawful robocall activities becomes an arduous endeavor. Furthermore, traceback in the absence of STIR/SHAKEN becomes a laborious manual process, reliant on outdated methodologies to follow the call’s journey through various networks.
Jessica Rosenworcel, former FCC Chair, underscored the imperative of provider dedication to combating illegal robocalls. She affirmed that providers failing to comply with mandated protocols should not have permission to partake in phone networks. The FCC has taken stringent measures by identifying and flagging a staggering 2,400 Voice Service Providers (VSPs) for their non-compliance with the Robocall Mitigation Database (RMD) filing requirements. Such regulatory actions highlight the serious commitment towards eradicating robocalls and reinforcing the imperative of adherence to STIR/SHAKEN frameworks across the board.
Transition from TDM to IP Networks
For non-top carriers, a pivotal step towards achieving STIR/SHAKEN compliance lies in the migration from TDM networks to IP networks. This transition is not only essential to meet mounting regulatory pressures but also to mitigate the rising costs associated with maintaining legacy TDM systems. Embracing IP networks opens avenues for new revenue opportunities, enhancing connectivity, and ensuring compatibility with STIR/SHAKEN protocols. The journey towards seamless SIP interconnectivity presents several challenges, yet it remains a vital transition for smaller carriers aiming to plug the gaps in the current telecommunications infrastructure.
The telecom industry’s aspiration to shield consumers from the scourge of unwanted robocalls rests heavily on the broader implementation of STIR/SHAKEN. By cultivating an environment where every call is authenticated and verified, the industry can leverage the full potential of traceback capabilities. A concerted effort to assist non-top carriers in their transition to IP networks will not only protect consumers but also pave the way for a more secure and efficient telecom ecosystem. The endgame of a unified STIR/SHAKEN framework lies within reach, demanding a collective push towards overcoming existing operational constraints and ensuring comprehensive adoption across all tiers of the industry.
Future Considerations and Next Steps
In today’s world, where communication is crucial, the telecom industry faces the ongoing challenge of reducing unwanted robocalls that have long bothered both consumers and businesses. In 2019, Americans were bombarded with an astounding 106.9 billion robocalls. This annoyance persisted until the introduction of the STIR/SHAKEN protocols. Thanks to this advanced call authentication technology, the number of unwanted calls dropped significantly to 68 billion by 2024. The initiative was led by the TRACED Act and enforced by the Federal Communications Commission (FCC). STIR/SHAKEN mandates that carriers authenticate and sign their call traffic, which enables trace-back capability. This function is essential for pinpointing the origins of these disruptive calls, providing a significant tool in the fight against robocalls.