The truth about tracing spoofed calls. What technology exists, what the FCC can do, and what you can realistically expect.
Number spoofing is the practice of falsifying the caller ID information transmitted during a phone call, making it appear as if the call is coming from a different number than the one actually originating the call. Scammers use this to display trusted numbers — your bank's real number, a government agency, or even your own number — to trick you into answering.
Technically, spoofing exploits the SS7 (Signaling System 7) protocol, the backbone of telephone networks designed in the 1970s with no authentication mechanism. The caller ID information is simply a data field that the caller sets — there's no built-in verification that the claimed number actually belongs to them.
Spoofing isn't inherently illegal. Legitimate uses include doctors calling from an office number instead of a personal cell, businesses displaying a toll-free callback number, and law enforcement during investigations. What's illegal is spoofing with intent to defraud, cause harm, or wrongfully obtain anything of value under the Truth in Caller ID Act of 2009.
When you receive a spoofed call, the number on your caller ID is fake — so a reverse phone lookup will either return the real owner of that number (who has nothing to do with the scam) or return no results at all. The actual originating number is hidden in network routing data that consumers can't access.
International call routing adds another layer of complexity. Many scam operations route calls through multiple countries using VoIP services, making it difficult even for law enforcement to trace the true origin. A call might originate in one country, route through SIP trunks in two others, and emerge as a local US number.
Additionally, scammers frequently use disposable VoIP numbers that are active for hours or days before being abandoned. Even if the network trace succeeds, the number may no longer be connected to any identifiable person or organization.
The FCC has ramped up enforcement significantly. In 2024, the agency issued over $300 million in fines against illegal robocall operations and spoofing violations. The TRACED Act (2019) gave the FCC expanded authority to impose penalties and required carriers to implement call authentication.
The FCC's Robocall Mitigation Database requires all voice service providers to either implement STIR/SHAKEN or file a detailed robocall mitigation plan. Providers that fail to comply can have their traffic blocked by other carriers. As of 2026, the FCC has ordered the blocking of traffic from over 40 non-compliant providers.
The agency has also partnered with international telecom regulators to address cross-border spoofing. The US-India Joint Working Group and similar bilateral agreements aim to shut down call centers that target American consumers.
STIR/SHAKEN (Secure Telephony Identity Revisited / Signature-based Handling of Asserted information using toKENs) is the industry framework for call authentication. It works by digitally signing calls at their origin and verifying the signature at the receiving end.
Each call receives an attestation level: A (Full) means the carrier verified the caller is authorized to use the number, B (Partial) means the carrier verified the customer but not the specific number, and C (Gateway) means the call entered from another network and couldn't be fully verified. Spoofed calls typically receive C attestation or fail verification entirely.
Impact so far: carriers report a 30-40% reduction in spoofed calls since full STIR/SHAKEN implementation. However, scammers are adapting — using legitimate VoIP accounts to place calls (earning A or B attestation) and abandoning simple number spoofing in favor of using real numbers from compromised VoIP accounts.
Don't trust caller ID alone. Even if your phone shows "Bank of America" or a family member's name, verify independently. Hang up and call the number you have on file (from your contacts, not the number that called you).
Enable your carrier's spam protection: T-Mobile Scam Shield, AT&T ActiveArmor, or Verizon Call Filter. These use STIR/SHAKEN data to flag or block calls that fail authentication. iPhone users should enable "Silence Unknown Callers" in Settings > Phone. Android users should enable Google's call screening.
If you're being targeted by spoofed calls, file complaints with the FCC (fcc.gov/consumers/guides/spoofing-and-caller-id), the FTC (reportfraud.ftc.gov), and your phone carrier. While individual complaints may not lead to immediate action, aggregate complaint data is how the FCC identifies and shuts down major operations.
PROTECTION TOOLS
These devices block robocalls and telemarketers automatically, providing an extra layer of protection.
Blocks 100,000+ known scam numbers automatically. One-touch blocking for new nuisance calls.
Bilingual talking caller ID with one-touch call block. Blocks up to 250 numbers.
As an Amazon Associate, SearchPhoneNumber.com earns from qualifying purchases. Product prices and availability are subject to change.
RELATED GUIDES
LOOKUP BY AREA CODE