Events & Resources

Learning Center
Read through guides, explore resource hubs, and sample our coverage.
Learn More
Events
Register for an upcoming webinar and track which industry events our analysts attend.
Learn More
Podcasts
Listen to our podcast, Behind the Numbers for the latest news and insights.
Learn More

About

Our Story
Learn more about our mission and how EMARKETER came to be.
Learn More
Our Clients
Key decision-makers share why they find EMARKETER so critical.
Learn More
Our People
Take a look into our corporate culture and view our open roles.
Join the Team
Our Methodology
Rigorous proprietary data vetting strips biases and produces superior insights.
Learn More
Newsroom
See our latest press releases, news articles or download our press kit.
Learn More
Contact Us
Speak to a member of our team to learn more about EMARKETER.
Contact Us

Under FCC rules, phone companies must now block carriers that fail to meet the body’s anti-robocall initiative

The news: Phone companies are now prohibited from accepting calls from providers that did not comply with the FCC’s deadline to register in the Robocall Mitigation Database, per Ars Technica. 

Here’s how it works: The FCC’s solution, known as the STIR/SHAKEN protocol, is a first step to stopping spam callers from pretending to be someone else. 

It works at the network level to automatically show a caller’s true phone number.

  • To date, 4,798 companies, including AT&T, T-Mobile, and Verizon, have filed in the Robocall Mitigation Database. 
  • US residents were pestered by an estimated 45.9 billion robocalls in 2020, per a YouMail report. 

What’s the catch: STIR/SHAKEN isn't a cure-all. The technology’s limitations, particularly with older copper landlines or TDM-based networks, make it difficult to implement. 

  • The FCC has effectively put the onus on smaller carriers to ensure implementation, saying that “providers using older forms of network technology should either upgrade their networks to IP or actively work to develop a caller ID authentication solution that is operational on non-IP networks.”

You've read 0 of 2 free articles this month.

Get more articles - create your free account today!