A few times a week, most of us still get that call from an unknown number, making us wonder whether we should answer or not. It is most likely spam, yet there is always a small chance it could be important. For businesses, ignoring such calls is not an option.
Some calls are flagged as “possible spam,” which makes them easy to ignore. Others slip through unnoticed, blending in with legitimate traffic.
So why, after years of regulatory efforts, new technologies, and stronger network security, do spam calls continue to be such a persistent problem?
Let’s take a closer look at how spam actually happens and the tools that service providers are using to keep it under control.
How Voice Fraud Scaled with IP Networks
Fraud in telecom used to be a more hands-on operation. In the past, every call originated from a physical line tied to a physical location. Gaining access took effort, and scaling any kind of fraudulent activity was difficult.
That changed with the arrival of IP-based voice. Today, large volumes of calls can be generated automatically, routed globally, and disguised through caller ID spoofing or the misuse of unallocated and recycled numbers. Fraud no longer depends on physical access to the network, but rather on automation and weaknesses in verification.
The problem is not the phone number itself but how easily it can be impersonated. Fraudsters exploit the fact that the global numbering system was designed for connectivity, not identity verification. As a result, calls can appear legitimate at first glance, even when they are being injected into the network by untrusted or unknown sources.
Why Phone Numbers Still Matter
Despite the rise of IP messaging, video calls, and app-to-app communication, phone numbers remain the foundation of global voice networks.
When you call a restaurant, a courier, or a bank, you are using that universal addressing system. Businesses depend on it because it works across every device, carrier, and country. That is why over-the-top options like WhatsApp or FaceTime, while useful, still rely on the telephone number or operate within closed ecosystems that cannot replace the universal reach of the public voice network.
The problem is that not every number in the network is in use. Some are unassigned, some are inactive, and some exist in grey zones between carriers. These conditions create a perfect opportunity for spoofing.
Understanding Spoofing and the Challenge of Trust
When a spammer “spoofs” a number, they are effectively pretending to be someone they are not. The call might appear to come from a familiar area code, a local business, or even a valid toll-free number.
Because voice networks were designed to prioritize connectivity rather than caller verification, a spoofed number can travel across carriers and borders without immediate detection. The result is spam calls that look completely legitimate—at least until you answer.
And, as mentioned earlier, while individual users can ignore a suspicious call, businesses cannot. A customer support team cannot afford to let calls go unanswered, even if some turn out to be fraudulent or part of a scam attempt. That is one of the reasons the problem remains so persistent.
The Tools Fighting Back
The good news is that the telecom industry is far from idle. There is a growing ecosystem of solutions designed to verify, validate, and, when necessary, block suspicious calls before they reach the end user.
- Do-Not-Originate (DNO) Lists
DNO databases catalog numbers that should never originate calls, such as toll-free numbers that are meant only to receive inbound calls or unallocated number ranges. If a call shows up from one of those numbers, the network can simply prevent it from going through. - STIR/SHAKEN
STIR/SHAKEN allows originating carriers to digitally sign calls, certifying that the calling party is authorized to use the number. The signature travels with the call, giving downstream networks a way to assess trust before connecting it. Coverage is not yet universal, and not every call path supports it, but it is a big step forward in verifying caller identity. - Blacklists
Blacklists have been around for years, cataloging known spam or fraud numbers. But maintaining them is resource-intensive, and stale entries can lead to false positives, where legitimate calls end up being blocked. That is why many service providers now use curated, vendor-maintained databases or dynamic systems that flag patterns rather than just individual numbers. - Analytics and AI
Pattern recognition and analytics tools are beginning to supplement the older, static approaches. By monitoring calling behavior—things like volume, frequency, location, and duration—networks can detect anomalies in real time. However, these systems are difficult to implement at scale. Large call centers, for example, can resemble spam in traffic patterns even when perfectly legitimate, such as calling people during an election cycle. It is a powerful tool, but one that requires careful calibration.
The Role of Service Providers
Fraud prevention starts at the network edge. Service providers have the first opportunity to evaluate whether a call looks legitimate. By combining number validation, attestation, and policy enforcement, they can dramatically reduce the flow of fraudulent traffic.
Session Border Controllers (SBCs) play an important role here. SBCs serve as the gatekeepers for traffic entering and leaving the network. They can perform checks against DNO databases, verify signatures, apply routing policies, and log the results for auditing.
It is about making fraud prevention an integrated function of call handling.
The Path Forward
Spam calls are not going away overnight, but the tools to fight them are improving. The key is a layered approach that combines foundational measures like DNO and STIR/SHAKEN with smart policy enforcement and data-driven analytics.
The real progress happens when service providers work together, sharing information, aligning on standards, and ensuring that every step in the call path takes responsibility for trust.
Want the Full Conversation?
For a deeper dive into how spam calls persist, why phone numbers remain central to fraud prevention, and how tools like STIR/SHAKEN and DNO are changing the game, check out our latest TelcoBridges Podcast episode with Luc Morissette. We unpack the patterns behind spam calls and explore what service providers can do right now to keep them off the network. Listen to the episode.
