The Real Reason Telecom Scams are Exploding and How Carriers Profit From the Chaos

The Real Reason Telecom Scams are Exploding and How Carriers Profit From the Chaos

When the U.S. Congress Joint Economic Committee issued an urgent plea to major telecommunications carriers demanding tougher anti-scam measures, it treated the global fraud epidemic as a technical and cooperative hurdle. This consensus view is wrong. Telecommunications companies fail to stop the multi-billion-dollar surge in scam calls and text messages because an intricate web of wholesale routing revenue, systemic regulatory blind spots, and foreign Voice over Internet Protocol originators makes the transmission of fraudulent traffic highly profitable. For decades, carriers have operated under a defensive posture, treating network security as a public relations problem rather than a structural failure. Until the underlying financial incentives of call termination change, congressional letters will remain toothless theater.

Americans received nearly 52.5 billion robocalls last year, translating to roughly 4.3 billion unwanted contacts every month. The human toll is measurable in cold, economic devastation. Federal Trade Commission data reveals that phone-initiated scams commanded a staggering median loss of $1,835 per victim, while text-based fraud yielded a median loss of $1,000. These are not merely annoying solicitations; they are targeted financial extractions. Yet, the public debate remains stuck on the concept of voluntary corporate responsibility, ignoring the structural architecture that allows these operations to thrive.

The Margin in the Middle

To understand why your phone rings twenty times a week with fraudulent bank alerts, you must look at how voice traffic moves across international borders. The global telecom market relies on a complex chain of intermediate providers that buy and sell network capacity. A call originating from a boiler room in Southeast Asia does not connect directly to a domestic mobile network. It passes through multiple wholesale intermediate carriers, each taking a fraction of a cent to pass the data packet down the line.

For a Tier 1 domestic carrier, terminating a call represents revenue. While a single call yields a microscopic fraction of a dollar, billions of calls generate substantial, passive cash flow. The industry has long hidden behind the legal shield of common carriage laws, which historically obligated telecom utilities to connect calls without policing the content.

This legal architecture has created a moral hazard. If a domestic provider aggressively blocks every suspicious wholesale trunk line entering its gateway, it instantly slashes its own termination volume. It also invites potential litigation from legitimate businesses caught in the automated crossfire. The financial penalty for letting a scam call pass is zero; the financial penalty for accidentally blocking a valid corporate client is measurable in lost enterprise contracts.

The Failure of Technical Defenses

The telecommunications sector frequently touts its implementation of STIR/SHAKEN, a cryptographic framework designed to authenticate caller ID data and eliminate number spoofing. Congress believed this framework would be a definitive solution when it passed the TRACED Act. It was not.

STIR/SHAKEN operates on a system of digital tokens. An originating carrier signs a call with an "A" level attestation if it can verify the identity of the caller and their right to use the phone number. An intermediate provider signs with a "B" or "C" attestation if it merely passes the call along without verifying the source.

[Overseas VoIP Originator] (Fakes Caller ID)
          │
          ▼
[Gateway Provider] (Signs with "C" Attestation / Low Verification)
          │
          ▼
[Intermediate Transit Carriers] (Pass Traffic for Fraction-Cent Profits)
          │
          ▼
[Domestic Tier 1 Carrier] (Terminates Call to Handset / Collects Fee)

Savvy criminal networks adapted with striking speed. Instead of spoofing random numbers that trigger a system failure, syndicates now buy valid, unallocated U.S. phone numbers in bulk from complicit or negligent domestic Voice over Internet Protocol providers. They register these numbers legally, obtain a clean STIR/SHAKEN certification, and unleash automated text and voice campaigns. The system functions precisely as designed, cryptographically verifying that the scammer is indeed the owner of the number being used to clean out a retirement account.

The Inbound Foreign Gateway Loophole

Federal regulators have begun cracking down on the outermost rim of this network. The Federal Communications Commission recently advanced stricter "Know Your Customer" guidelines aimed at originating providers. These rules demand that companies verify the physical address, tax identification, and corporate registry of any entity renting high-volume lines.

The real breakdown occurs at the inbound international gateway. Foreign syndicates do not register directly with American providers. They route their traffic through shell companies registered in regulatory havens across Eastern Europe, Central America, and South Asia. By the time the traffic hits an American gateway carrier, the true origin is obscured behind five layers of automated wholesale routing agreements.

Under current rules, an American carrier that uncovers an illegal stream of traffic is expected to report it to the Industry Traceback Group. The group then traces the path backward, hop by hop, to find the source. This process takes days, sometimes weeks. For a criminal enterprise running an automated campaign, a single phone number is spent and abandoned within six hours. The regulatory framework brings a knife to a high-frequency algorithmic dogfight.

The Threat of Generative Impersonation

The financial damage is poised to scale exponentially due to the democratization of voice-cloning software. Scammers no longer rely on rigid scripts or broken English. A three-second audio clip harvested from a social media post is now sufficient to generate a real-time, bidirectional voice clone of a family member, corporate executive, or bank representative.

When these artificial voices are paired with automated lead-generation software, the success rate of phone fraud climbs dramatically. Legitimate businesses have responded by pushing for branded caller ID systems, which display corporate logos and verification badges on a consumer's smartphone screen. Major wireless trade groups claim this represents the next generation of call security.

This approach introduces an inherent flaw. It shifts the burden of verification entirely back to the consumer, requiring individuals to distinguish between a genuine corporate badge and a sophisticated digital counterfeit. If a criminal network compromises or rents a legitimate corporate line, the branded system will dutifully display the trusted logo while the victim is defrauded.

Realigning Market Incentives

The solution to the scam epidemic will not be found in polite congressional requests or voluntary corporate pledges. It requires shifting the financial liability of network abuse directly onto the companies that profit from its transmission.

Regulatory bodies must transition from an enforcement model based on retrospective investigations to a system of strict liability for gateway carriers. If an intermediate or Tier 1 provider allows an unverified foreign voice stream to enter the domestic public switched telephone network, that carrier must face automatic, per-call civil penalties that outweigh the wholesale routing fees collected.

Furthermore, small businesses and individual consumers require a direct path to legal recourse. Pending legislative efforts, such as the proposed updates to the Telephone Consumer Protection Act, aim to expand the Do-Not-Call Registry and grant small enterprises a private right of action to sue telemarketers after a single unconsented call. Giving individuals the statutory power to strip profits away from predatory dialers addresses the root cause. When hosting illicit traffic becomes an existential threat to a carrier's bottom line, the network will be cleaned up within a matter of weeks.

PR

Penelope Russell

An enthusiastic storyteller, Penelope Russell captures the human element behind every headline, giving voice to perspectives often overlooked by mainstream media.