Skip to content

Federal Communication Commission Regulations on Secure Telephony Identity Revisited / SHAKEN

Illegal Robocalling

Illegal robocalling refers to automated or bulk outbound calling activity that employs techniques to obscure or falsify caller identity, evade call‑filtering and Do‑Not‑Call (DNC) protections, or otherwise deliver unsolicited or fraudulent communications at scale.

Common methods observed in illegal robocalling

  • Caller ID spoofing: Forging the originating number to impersonate legitimate entities.
  • Automated dialing platforms: Predictive or auto‑dialers that generate high call volumes.
  • Transit or intermediary chaining: Routing calls through multiple carriers to obscure source.
  • Reused or repurposed numbers and SIM farms to maintain volume and persistence.

Operational impacts for providers

  • Increased signaling and media load on routing and switching infrastructure.
  • Elevated fraud and social‑engineering risks for subscribers.
  • Additional operational overhead for customer support, investigations, and remediation.
  • Regulatory and financial exposure where DNC obligations or mitigation requirements are not met.

Regulatory Position (U.S. FCC)

The FCC mandates that service providers:

  • Block traffic that originates from unregistered, unverifiable, or non-authenticated sources.

  • Verify caller identity using registered calling numbers and approved frameworks (e.g., STIR/SHAKEN).

  • Maintain compliance with federal consumer protection rules, including Do Not Call (DNC) regulations.

  • These requirements are designed to reduce illegal spoofing, fraud, and non-compliant robocall traffic.

Scale and measurement

Industry reports (e.g., FCC analyses) indicate robocall volumes in the billions per month in the U.S.; providers should assume high prevalence and provision mitigation accordingly.

Legitimate vs. Illegal Robocalls

Not all automated calls are illegal. Examples of legitimate automated calls include emergency notifications, transactional alerts, and other messages delivered with customer consent or a prior relationship. Illegal robocalls use spoofing, deception, or non‑consensual dialing to evade protections and enact fraud.

TRACED Act

In December 2019, the U.S. Congress passed the TRACED Act. The act provided the FCC with "new tools to fight unwanted and illegal, robocalls. The top consumer complaint reported to the FCC annually" (from TRACED Act Implementation).

This allowed the FCC to place requirements on Voice Providers to apply call authentication technology. It also gave the FCC authority to follow up with enforcement.

In March 2020, the FCC mandated to use of STIR/SHAKEN for this purpose.

Several details related to TRACED Act are important to understand:

  • Consider anyone providing voice service to an end user as a Service Provider, and requires to following all rules of the Act.

  • Service Providers must register with the new FCC database for robocall mitigation.

    Also, certify that they have executed either Robocall Mitigation or SHAKEN.

  • Smaller operators (<100,000 lines) can choose either Robocall Mitigation or SHAKEN option.

  • Everyone holds responsibility for helping to end robocalls. "Service Providers must police their networks." They can't just execute SHAKEN alone, they must be responsible for calls originating on their network.

The FCC has already begun sending cease and desist orders, and fines to operators.

Providers can submit certification to the FCC Robocall Mitigation Database 90 days after the deadline for robocall mitigation program certifications (June 2021).

Service Providers MUST BLOCK all calls from Service Providers that aren't in the FCC database.

Providers can submit certification to the FCC Robocall Mitigation Database 90 days after the deadline for robocall mitigation program certifications (June 2021).

Service Providers MUST BLOCK all calls from Service Providers that aren't in the FCC database.

Secure Telephony Identity Revisited

STIR: Secure Telephone Identity Revisited: The VoIP service provider adds an encrypted certificate to the SIP header of a call. It does so after checking the number against known numbers for that customer.

Attestation Values* (as defined in ATIS-1000074 section 5.2.3) define the level of trust that's associated with a call. Providers set the Attestation Values and then the call gets an Secure Telephone Identity (STI) Authentication Token assigned. Call analytics engines use the data in this token to assess the validity of a call. The 3 Attestation Values are:

  • A: Shows a trusted relationship between the Service Provider. The calling number and its user. This is the service provider level of trust that customers will expect.
  • B: Shows a trusted relationship with the customer. The Service Provider knows the customer at the other end of the trunk, but not specific numbers.
  • C: Shows no trust. Intermediate or wholesale traffic with no real knowledge of where calls are originating.

Service Provider Accountability

Service providers must precisely specify their Attestation Values. Certifying a call with trust means you take on some responsibility for that traffic.

SHAKEN

SHAKEN: Signature-based Handling of Asserted Information Using toKENs- This basically instructs provider how to execute STIR to provide consumer protection.

SHAKEN Policy Administrator

The Secure Telephone Identity Governance Authority (STI-GA), launched by ATIS (Alliance for Telecommunications Industry Solutions) in 2018, defines SHAKEN policies. The SHAKEN Policy Administrator (STI-PA), which is in charge of enforcing policy, is also responsible for managing these rules.

alt text (Image Credit:TransNexus)

The STI-PA (iconnectiv is in the U.S.) confirms which telephone Service Providers to trust and only certified carriers can sign calls.

SHAKEN then uses PKI (Public Key Infrastructure) for authentication of calls. Only certified Certificate Authorities (CAs) can provide SHAKEN certs..

Service Provider must have Service Provider Code (SPC) token from the STI-PA to get a certificate, and a CA can only provide certificates to a Service Provider that has a valid SPC.

Warning

Once you receive the certs, you can still revoke if Service Providers misbehave.

TRACED Act

In December 2019, the U.S. Congress passed the TRACED Act. It provides the FCC "new tools to fight unwanted and often illegal robocalls. The top consumer complaint reported to the FCC annually" (from TRACED Act Implementation).

This allowed the FCC to place requirements on Voice Providers to execute call authentication technology. It also gave the FCC authority to follow up with enforcement.

In March 2020, the FCC mandated the use of STIR/SHAKEN for this purpose.

Several details related to TRACED Act are important to understand:

  • Consider anyone providing voice service to an end user as a Service Provider which requires following all rules of the Act.
  • Service Providers must register with the new FCC database for robocall mitigation. It certifies that they have implemented either Robocall Mitigation or SHAKEN.
  • Smaller operators (<100,000 lines) can choose either the Robocall Mitigation or SHAKEN option.
  • Everyone holds the responsibility to help end robocalls.

    "Service Providers must police their networks."

    They can't execute SHAKEN alone and take responsibility for calls originating on their network.

The FCC has already begun sending cease and desist orders, and fines to operators.

Providers can submit the certification to the FCC Robocall Mitigation Database within 90 days. It's after the deadline for robocall mitigation program certifications (June 2021).

Service Providers MUST BLOCK all calls from Service Providers that aren't in the FCC database.

Secure Telephone Identity Revisited

STIR: Secure Telephone Identity Revisited: The VoIP service provider adds an encrypted certificate to the SIP header of a call. It does so after checking the number against known numbers for that customer.

Attestation Values (as defined in ATIS-1000074 section 5.2.3) define the level of trust that's associated with a call.

Providers set the Attestation Values and then the call gets a Secure Telephone Identity (STI) Authentication Token assigned.

Call analytics engines use the data in this token to assess the legitimacy of a call.

The 3 Attestation Values are:

  • A: Shows a trusted relationship between the Service Provider. The calling number and its user. This is the service provider level of trust that customers will expect)
  • B: Shows a trusted relationship with the customer. The Service Provider knows the customer at the other end of the trunk, but not specific numbers.
  • C: Show no trust. Intermediate or wholesale traffic with no real knowledge of where calls are originating.

Service Provider Accountability

Service Providers should accurately define their Attestation Values. Certifying a call with trust means you take on some responsibility for that traffic.

SHAKEN (Signature-based Handling of Asserted Information)

SHAKEN using toKENs: This instructs providers on how to execute STIR to provide consumer protection.

SHAKEN Policy Administrator

The Secure Telephone Identity Governance Authority (STI-GA), launched by ATIS (Alliance for Telecommunications Industry Solutions) in 2018, defines SHAKEN policies.

The SHAKEN Policy Administrator (STI-PA) manages policy enforcement and such regulations.

alt text (Image Credit:TransNexus)

The STI-PA (iconnectiv is in the U.S.) inspects which telephone Service Providers you can trust, as only certified carriers can sign calls.

SHAKEN then uses PKI (Public Key Infrastructure) for the authentication of calls. Only certified Certificate Authorities (CAs) can provide SHAKEN certs.

Service Provider must have Service Provider Code (SPC) token from the STI-PA to get a certificate.

CA can only provide certificates to a Service Provider that has a valid SPC.

Warning

Once you receive the certs, you can still revoke them if Service Providers misbehave.

Voice Service Providers implementation

From the iconnectiv Secure Telephone Identity (STI) Service Provider Methods and Procedures, before registering, make sure you have:

  1. Your Operating Company Number (OCN). VoIP providers can register with NECA for an OCN, even as an IP Enabled Service Provider (don't need to be a LEC). Use this to verify if the SP has access to numbers from NANPA and NPA pools.
  2. Current 499-A form on file with the FCC (filed with the Universal Service Administrative Company (USAC). You need to provide a copy of this form during the registration process. Use the Annual Revenues listed here to assess fees.
  3. A certification filed in the FCC Robocall Mitigation Database.

After you complete the above 3 procedures, complete Service Provider SHAKEN STI-PA Registration.

Robocall Mitigation program

For Small / TDM operators that can't execute SHAKEN, Robocall Mitigation is the alternative.

FCC doesn't have any specific instructions or recommendations, but they have provided some guidelines:

  • "A robocall mitigation program is enough if it includes detailed practices. You can use these practices and expect reductions in illegal robocalls."
  • You must actually execute it on your network.
  • It must be public and transparent.
  • Providers must cooperate with the US Telecom Traceback Group to produce requested Call Detail Records on time.

SHAKEN for Time Division Multiplexing

TDM (Time Division Multiplexing) is no longer commonly found at the edge of telephony networks, but is still in use in the core of telephony networks. If not accounted for, then all the meticulously gather and certified SIP SHAKEN info gets lost when it hits TDM segments.

The TRACED Act specified that Service Providers must "no later than June 30 2021, take "reasonable measures" to execute an effective Caller-ID authentication framework in the non-IP portions of the their networks." In response to this, the Out-of-Band PASSporT Transmission Involving TDM Networks was developed as the industry standard "reasonable measure." Defined by the ATIS non-IP Call Authentication Task Force, the PASSport uses out-of-band signaling to extend SHAKEN through TDM networks.

  1. Your Operating Company Number (OCN). VoIP providers can register with NECA for an OCN, even as an IP Enabled Service Provider (don't need to be a LEC).

    Use this to verify if the SP has access to numbers from NANPA and NPA pools.

  2. Current 499-A form on file with the FCC (filed with the Universal Service Administrative Company (USAC).

    You need to provide a copy of this form during the registration process. Use the Annual Revenues listed here to assess fees.

  3. A certification filed in the FCC Robocall Mitigation Database.

Complete the Service Provider SHAKEN STI-PA Registration after you have completed the preceding three procedures.

Note

Click here to test your Stir-Shaken.

FAQ

Question: What are my options if I am a smaller provider?

For providers with more than 100k lines, you must execute SHAKEN:

  • SHAKEN for SIP
  • Robocall mitigation for TDM interconnects

For providers with less than 100k lines, you have options:

  • SHAKEN or Robocall Mitigation for SIP
  • Robocall mitigation for TDM interconnects

Question: How does this impact calls originating from outside the US?

This only applies to US calling numbers, even if the carrier is outside of the US. If calls are originating outside the US with non-US numbers, none of this applies. Its required that US carriers drop calls received from US numbers that aren't verified for SHAKEN.

Question: Does ConnexCS provide SHAKEN?

ConnexCS will perform:

  • Certificate Signing of calls (you still need to get the certificate and install it in our Control Panel; instructions found here).
  • Attestation checks for inbound calls to Direct Inward Dial.
  • Attestation values will soon be available in the Control Panel for our customers. You can configure it per route.

Question: Does ConnexCS provide Robocall Mitigation?

Presently, we're researching an effective solution.