STIR SHAKEN Adoption Curtails Caller ID Spoofing Across U.S. Networks

As U.S. carriers roll out STIR/SHAKEN across IP-based voice networks, more calls arrive with cryptographic verification that the caller ID has not been spoofed. This shift is curbing a common tactic used in scams and improving traceback for enforcement, with ripple effects for finance, insurance, and other sectors that rely on phone outreach to customers.

U.S. voice networks are increasingly authenticating caller ID using the STIR/SHAKEN framework, making it harder for scammers to impersonate trusted numbers. While illegal robocalls have not vanished, authenticated signaling now helps carriers and analytics platforms detect spoofed traffic, block high-risk calls, and display verification indicators on many devices.

Online financial services

For online financial services, fewer spoofed calls reduce the risk that consumers will share sensitive data with impostors claiming to be from a bank or lender. STIR/SHAKEN improves confidence that the number shown on a customer’s screen matches the originating service. Combined with existing account alerts, one-time passcodes, and app-based confirmations, verified calling helps align voice interactions with other secure digital touchpoints. Providers still need layered defenses, because some calls traverse non-IP segments or originate from abroad where authentication may be weaker.

Tech in finance

Tech in finance benefits from the data signals that come with authenticated calls. STIR/SHAKEN uses public key infrastructure to sign calls at origination and verify them at termination, with attestation levels that indicate the caller’s relationship to the number. Financial platforms can use these signals—alongside device reputation, call frequency, and behavioral analytics—to weight risk more precisely. When a call presents strong attestation, institutions may route it with fewer manual checks; when attestation is weak or missing, secondary validation (callbacks, in-app chat, or secure web messaging) can take priority.

Telecom solutions

Telecom solutions blend authentication with analytics to curtail spoofing. STIR/SHAKEN works best on SIP-based IP traffic, so providers also apply robocall mitigation on legacy or mixed networks. Gateway screening for international traffic, reputation scoring, and enterprise registration programs further reduce abuse. Enterprises can improve answer rates by ensuring outbound calls receive the highest feasible attestation, maintaining accurate caller ID, and coordinating with carriers to register numbers used for customer support, collections, and notifications.

Digital banking

Digital banking teams can adapt contact strategies to leverage verification. Displaying a verified call indicator can lift answer rates for time-sensitive outreach such as fraud alerts or card declines. Institutions should document when and how they place authenticated calls, publish those practices in help centers, and align scripts with secure verification steps so customers know what information will never be requested over the phone. If a call lacks verification or shows unexpected caller ID, directing users to confirm within the bank’s app or website preserves trust without breaking the service experience.

Internet insurance

Insurers that engage policyholders online also benefit. Claims adjusters, roadside assistance, and policy service teams often call from multiple lines; consolidating outbound numbers, registering them, and seeking strong attestation helps customers recognize legitimate calls. For sensitive conversations—identity verification, payment setup, or claim approvals—carriers’ verification indicators, paired with insurer-branded caller information where available, can reduce abandonment and the likelihood that consumers pick up spoofed imitations.

Major U.S. providers adopting STIR/SHAKEN

Carriers and voice platforms continue to expand authenticated calling across IP networks and implement mitigation on non-IP paths. The examples below illustrate how providers position these capabilities for enterprises and consumers.


Provider Name Services Offered Key Features/Benefits
AT&T Wireless and wireline voice with STIR/SHAKEN Caller ID authentication on IP calls; analytics to identify suspected spam; enterprise number registration programs
Verizon Wireless and Fios voice with verification Verified Call indicators on supported devices; robocall filtering; enterprise outreach support
T-Mobile Wireless voice with authentication and analytics Scam identification and blocking; display of verified caller indicators; enterprise registration options
Comcast (Xfinity Voice) Residential and business voice over IP STIR/SHAKEN on IP traffic; integration with spam detection; support for verified caller display
Bandwidth VoIP carrier services for businesses and platforms STIR/SHAKEN attestation for enterprise outbound traffic; tools for number management and registration

How STIR/SHAKEN changes risk

Authentication does not eliminate unwanted calls, but it narrows the attack surface. Spoofing a local number—once a common tactic to trick people into answering—becomes easier to flag when the attestation does not match the displayed caller ID. Terminating carriers can down-rank or block high-risk calls and present clearer labels to users. For enterprises, strong attestation helps separate legitimate outreach from fraudulent lookalikes, improving contact rates and customer confidence.

Practical steps for organizations

Organizations that rely on outbound calling can strengthen results by auditing all numbers in circulation, retiring stale lines, and aligning outbound traffic with a single, trustworthy caller identity per use case. Work with providers to maximize attestation for each call path, especially for calls that start in contact centers or unified communications platforms. Publish a simple verification checklist so customers know how to confirm a call—via official apps, secure websites, or known support numbers—when anything seems off.

Remaining gaps and what’s next

Not every call can be verified end-to-end yet. Some legacy segments still require mitigation rather than full authentication, and international call flows may lack equivalent frameworks. U.S. rules have been phased in since 2021, with additional requirements for gateway providers and continued enforcement actions. As more networks migrate to IP and as analytics incorporate authentication signals more deeply, the value of verified calling should continue to compound alongside existing anti-robocall measures.

Conclusion

The broad adoption of STIR/SHAKEN across U.S. networks is reducing caller ID spoofing and improving the integrity of voice communications. When paired with registration, reputation, and clear customer guidance, authenticated calling helps finance, insurance, and other digital services connect with people more securely and with fewer disruptions from impostors.