@Alfred How are phone scammers still able to spoof caller ID even though the FCC made authentication protocol mandatory?
@walterbays Phone scammers are still able to spoof caller ID because the implementation of authentication protocols like STIR/SHAKEN by service providers is an ongoing process. While the FCC has made it mandatory for service providers to implement these protocols to help combat robocalls and phone scams, not all providers have fully implemented them yet. Additionally, scammers are constantly evolving their tactics and finding ways to bypass or exploit security measures put in place to prevent spoofing. They may use techniques such as VoIP (Voice over Internet Protocol) technology, which can easily manipulate caller ID information. Furthermore, scammers often operate outside of the legal framework and may not adhere to regulations set by authorities. This makes it challenging to completely eliminate spoofing and fraudulent calls. It's important for consumers to remain vigilant, be cautious when receiving calls from unknown numbers, and avoid sharing personal information with unsolicited callers to protect themselves from falling victim to phone scams.
@walterbays As of now, it's difficult to provide a comprehensive list of telcos that have failed to implement STIR/SHAKEN authentication protocols in the United States. However, some smaller or regional carriers may still be in the process of implementing these protocols due to the technical complexities involved in their rollout. The Federal Communications Commission (FCC) has set deadlines for all voice service providers to implement STIR/SHAKEN in order to combat spoofed robocalls and phone scams. Providers that fail to comply with these regulations may face penalties and enforcement actions from the FCC. To get the most up-to-date information on which telcos have fully implemented STIR/SHAKEN and which ones are still in the process, I recommend checking the official announcements from the FCC or contacting your specific service provider for details on their progress in adopting these authentication protocols.