Countdown Timer showing days, hours, minutes, and seconds remaining
Get Your Lowest Price on Number Rep Management!
Take advantage of our end of year promos today!
← all FCC FILINGS

Ex Parte Filing by Numeracle, Inc. in the matter of Advanced Methods to Target and Eliminate Unlawful Robocalls, CG Docket No. 17-59; Call Authentication Trust Anchor, WC Docket No. 17-97; Rules and Regulations Implementing the Telephone Consumer Protection Act of 1991, CG Docket No. 02-278; Dismissal of Outdated or Otherwise Moot Robocalls Petitions, CG Docket No. 25-307 for CG Docket No. 17-59, WC Docket No. 17-97, CG Docket No. 02-278, CG Docket No. 25-307 on Mar 25, 2026

Via ECFS

Marlene Dortch, Secretary

Federal Communications Commission

Advanced Methods to Target and Eliminate Unlawful Robocalls, CG Docket No. 17-59; Call Authentication Trust Anchor, WC Docket No. 17-97; Rules and Regulations Implementing the Telephone Consumer Protection Act of 1991, CG Docket No. 02-278; Dismissal of Outdated or Otherwise Moot Robocalls Petitions, CG Docket No. 25-307
CG Docket No. 17-59, WC Docket No. 17-97, CG Docket No. 02-278, CG Docket No. 25-307
Date posted:
March 25, 2026

Dear Ms. Dortch:

Rebekah Johnson, Founder & CEO of Numeracle, Inc., (“Numeracle”) met with FCC Chairman Brendan Carr on March 23, 2026, to urge the Commission to take decisive regulatory action to require verified identity delivery in voice communications as the essential, missing element in the Commission’s anti-robocall strategy as a matter of fraud prevention and bolstering national security. Accurate delivery of verified caller identity should be a baseline function of America’s telecommunications networks and not an add-on premium service intended for telemarketers.Also present at the meeting were Allison Howell, Legal Advisor to Chairman Carr, and Keith Buell, Numeracle’s General Counsel and Head of Global Public Policy.

An international consensus is rapidly emerging among regulators, standards bodies, carriers, and technology providers that verified caller identity delivery is essential to preserving trust in voice networks and preventing their continued exploitation as a primary conduit for fraud. Across global forums and industry initiatives, stakeholders increasingly agree that without a reliable mechanism to authenticate and convey the true identity of the calling party to end users, voice communications will continue to degrade in utility and credibility. Yet despite this alignment on the problem and the solution, progress has been slow—hampered by disagreement over governance models, standards, and the allocation of costs and revenues across the ecosystem.Absent decisive regulatory leadership, these disagreements risk delaying implementation until consumer trust has eroded beyond repair. The Commission’s action is therefore urgently needed to establish a clear framework, align incentives, and accelerate deployment of verified identity delivery before it is too late to restore the integrity of the voice network.

I. What the Commission Should Do

Numeracle urges the Commission to adopt the roadmap in Exhibit A. In summary, the roadmap establishes a comprehensive, phased framework for verified identity delivery built on three core requirements:

  1. Independently verified caller identity conducted by accredited third-party identity verifiers combined with robust Know Your Customer (KYC) processes
  2. Secure, end-to-end transmission of that identity, cryptographically bound to the call and preserved across networks
  3. Standardized, spoof-resistant display of verified identity at the device level.

The framework further provides FCC oversight of governance and accreditation, mandatory flow-down of identity and KYC requirements across all upstream providers, safe harbor protections for compliant carriers, prohibition of charging for delivery of verified identity to consumers by terminating providers, and a phased implementation timeline to enable industry adoption while eliminating insecure legacy identity mechanisms.

II. Identity is the Missing Layer in the FCC's Anti-Robocall Strategy

Numeracle opened the meeting by noting that 2026 marks the ten-year anniversary of the FCC Robocall Strike Force and that robocalls remain the number one consumer complaint in telecommunications. Despite years of regulatory effort and marginal progress through industry led efforts, consumers have lost trust in the voice network. Fraud thrives in anonymity, and verified identity delivery is the single most effective step the Commission can take to protect consumers and restore that trust.

No single tool will eliminate robocalls and fraud entirely, but verified identity is the foundation without which none of the Commission's other tools can succeed. The Commission has already taken many of the hardest foundational steps, and the technical tools have been developed. What is needed now is the Commission's regulatory mandate to implement verified identity delivery.Numeracle has advocated for verified identity delivery consistently for seven years, including in ex parte filings dating back to 2019.

Numeracle emphasized that while the Commission’s work on STIR/SHAKEN was an important and necessary foundation, STIR/SHAKEN only verifies the carrier that signed a call—not the identity of the caller. A call can receive an “A” attestation even when the actual caller’s identity is unknown to the signing carrier. Abuse of A-level attestation standards is rampant, showing that carriers should not be inherently trusted to perform their own KYC without independent oversight. STIR/SHAKEN enables traceback to a voice provider; it does not prevent impersonation or provide call recipients with meaningful information about who is actually calling them. These are exactly the gaps that verified identity delivery is designed to fill.

III. Requirements for Verified Identity Delivery

Numeracle presented a framework for verified identity delivery built on three foundational pillars:

Verification

  1. Require independent verification requirements to create a verified identity through collecting, verifying, and screening customer information during the onboarding process
  2. Establish robust KYC standards to verify the businesses and the people behind those businesses in order to protect the integrity of the network.

Secure Transmission: Require secure, end-to-end delivery of verified caller identity, including optional logo and call reason, transmitted through approved, secure frameworks.

Must be Displayed in a Way That Cannot Be Spoofed: Display the verified caller information to the call recipient. Additionally, the Commission must prevent the display of unverified caller identity to call recipients, including prohibiting insecure legacy systems such as CNAM from coexisting with secure verified identity systems.

IV. Governance Framework, Safe Harbor, & KYC Standards

A verified identity framework requires not only technical standards but also a durable governance structure. Numeracle presented four elements of a governance framework necessary to support verified identity delivery at scale:

Neutral Governance: The Commission should establish KYC standards directly, and should either retain authority over or designate an industry standards body to establish and oversee transmission and display standards. Accreditation criteria must ensure sufficient independence, and approved independent identity verification credentials should be usable across carriers to prevent redundant identity verification processes and to close potential weak-entry-point vulnerabilities.

Safe Harbor for Verified Identity Display: Carriers should have liability protection when displaying verified identity that was delivered through a Commission-approved framework when in compliance with all applicable transmission and display standards.This safe harbor would not extend to cases where a carrier altered identity data or failed to comply with KYC or display requirements.

Shared Benefit Across the Ecosystem: Reliable verified identity improves consumer trust, reduces fraud losses, and benefits all participants in the communications ecosystem—carriers, enterprises, and consumers alike. Governance structures should reflect this shared stake and ensure that costs and obligations are distributed equitably across the ecosystem.

Robust Enforcement: The Commission should require certification of compliance by providers, establish forfeiture and suspension-of-origination mechanisms for violations, and enable rapid cross-carrier revocation of identity credentials for bad actors. Clear and enforceable standards are a prerequisite to effective enforcement.

V. U.S. Leadership in Global Verified Identity Standards

Numeracle noted that verified identity delivery in voice communications is an emerging global priority. Numeracle recently participated in a GSMA proof of concept for Open Verifiable Calling (OVC) demonstrated at Mobile World Congress (MWC), showing demand from carriers, enterprises, device manufacturers, and consumers worldwide. If the United States does not act promptly, standards for verified identity display will be developed by other jurisdictions. Consistent with Chairman Carr’s emphasis on U.S. leadership in communications infrastructure and national strategic competition, Numeracle urged the Commission to act now to define the global standard for trusted communications.

VI. Voice & Messaging Fraud: A National Security & Consumer Protection Issue

Robocalls and robotexts are not merely a nuisance—they are a major fraud ecosystem with serious national security implications. The Global Anti-Scam Alliance has reported that the annual, global volume of fraud exceeds $1 trillion, much of which was committed using telecommunications channels.1 The FTC reported $12.3 billion in fraud losses in just the first nine months of 2025, with calls and texts remaining key entry points for scammers. These fraud proceeds frequently fund organized criminal enterprises, including human trafficking networks and international fraud rings.

The proliferation of AI-powered fraud tools has made the problem significantly worse even if the volume of calls has not continued to increase. Voice cloning, deepfake technology, and AI generated scripts make it trivially easy to convincingly mimic trusted brands, company representatives, or even family members. As businesses deploy AI-powered communications assistants, consumers need assurance that they are interacting with a verified, trusted source—nota convincing AI impersonation of their bank or government agency. Fraudsters are also leveraging breached personal data to create highly personalized scams that defeat legacy pattern based defenses, making cryptographically verifiable caller identity essential rather than optional.

The President has expressly recognized impersonation-driven fraud as a central threat toAmerican citizens and to the integrity of U.S. communications. In Executive Order 14390, released earlier this month on March 6, 2026, the President identified “impersonation” schemes, phishing, and the misuse of stolen identities as core components of modern cybercrime, describing a global “shadow economy fueled by stolen identities” and directed federal agencies to prevent and disrupt these activities.2 Active FCC involvement is essential to fulfill the President’s objectives.

The cumulative effect of this fraud ecosystem is that consumers are losing trust in the voice network itself. Most Americans now ignore unknown calls, which means that even critical and legitimate calls go unanswered. This erosion of trust in the PSTN has broad public safety implications—it impairs emergency communications, public health outreach, and legitimate business communications alike. As Chairman Carr has emphasized, U.S. telecommunications infrastructure is a matter of national strategic competition, and the integrity of that infrastructure depends on restoring consumer trust through verified identity.

VII. A Regulatory Mandate is Necessary: Light-Touch Regulation Has Not Worked

A decade of regulatory flexibility has not solved the robocall problem. Since the FCC RobocallStrike Force was convened in 2016, carriers have consistently argued that a light-touch approach would allow industry to self-determine the most effective solutions. That approach has failed.Robocalls remain the number one consumer complaint in telecommunications, countless billions of dollars are lost to voice and messaging scams each year, and consumer trust in the voice network has continued to decline as users migrate to conference platforms like Microsoft Teams and Zoom, or to over-the-top applications like WhatsApp and FaceTime for personal calls.

Numeracle noted that industry stakeholders have been slow to implement verified identity delivery absent a regulatory mandate, and the disjointed and overpriced marketplace disincentivizes call originators to participate. Terminating carriers in particular benefit from the current system and are currently treating identity delivery—both secured and unsecured—as a high-margin revenue opportunity by charging rates that far exceed the cost of implementation and that disincentivize widespread adoption of verified identity frameworks. As the Commission moves to bill-and-keep for inter carrier compensation, the Commission should not allow charges for verified identity delivery to replace legacy inter carrier compensation cash flows.

VIII. Conclusion

Numeracle’s mission is that every entity on Earth and every person on the planet should know with certainty who is calling. That principle should guide the Commission’s policy framework for voice communications and trusted network integrity in the United States.

Numeracle appreciates the Commission’s leadership and the opportunity to collaborate on these issues. Verified caller identity must rest on a foundation of trust, robust KYC standards, and a governance framework. This Commission, under Chairman Carr’s leadership, has the opportunity to finish what previous Commissions started by solving the robocall problem that has plagued Americans for more than a decade. Numeracle stands ready to support the Commission in this effort and urges prompt action consistent with the framework set forth in Exhibit A.

Exhibit A: Roadmap for FCC Implementation of Verified Identity Delivery with Rigorous KYC

I. Merge & Frame the Multiple Proceedings

The Commission should:

  • Merge the upcoming Know Your Customer1 NPRM with the existing Ninth FNPRM on Caller Identity2 and then issue a unified order with rules. These two concepts are inextricably intertwined.
  • Adopt a two-part KYC framework comparable to the processes used in the financial industry. In that context, the first step is a mandatory customer identification program to verify the identity of individuals or entities attempting to open accounts with financial institutions. The second step is a deeper KYC review of the risk profile of the identified entity. A similar two-step process should be required for verified identity delivery in telecommunications.
  • Establish rules for verified identity delivery3 to the call recipient based on these three fundamental pillars:
    • Pillar 1: Network integrity preservation through identity verification and KYC
    • Pillar 2: Verified identity is cryptographically bound to the call, whether in band or out-of-band, and transmitted end-to-end
    • Pillar 3: Verified identity is securely displayed to call recipient

II. Pillar 1: Network Integrity Preservation Through Identity Verification & KYC

A. Establish Identity Verification & KYC Requirements
  • To maintain the integrity of telecommunications networks, voice service providers (hereinafter “providers”) must collect information sufficient to establish the identity of the customer. This information must be verified by an independent identity verifier to know with certainty that the entity is who it claims to be. This process applies whether the customer is an entity originating telephone calls or is another provider in the call chain.
  • Building on that verified identity, the provider must perform additional KYC checks on (1) the entity itself, (2) the individuals controlling the entity, and (3) the ongoing actions of the entity to ensure that the integrity of the network is protected
  • Require identity verification and KYC prior to access to numbering or call origination services.4 Entities whose identity is verified receive a cryptographic token from an independent identity verifier.
  • Require annual periodic monitoring/reverification
  • Apply requirements to:
    • Direct customers of providers
    • All upstream providers/resellers (mandatory flow-down), a.k.a. Know Your Upstream Provider
  • Require:
    • Record keeping by independent identity verifiers consistent with Paperwork Reduction Act
    • Revocation mechanisms for bad actors
    • Penalties for non-compliance

B. Designate or Approve Independent Identity Verifiers
  • Establish a framework for approved independent identity verifiers:
    • FCC-certified or
    • Industry-governed under FCC oversight
  • Define accreditation criteria with suitable independence
  • Ensure identity verification is usable across providers (no redundant identity verification) to ensure a streamlined process for onboarding and to prevent bad actors from searching for weak network entry points.

III. Pillar 2: Identity Binding & Transmission

A. Require Cryptographic Binding of Identity
  • Require that verified identity be digitally signed and bound to call signaling
  • Extend STIR/SHAKEN (or successor framework) to include:
    • Verified identity information via Rich Call Data or other secure means
    • Reference to independent identity verifier for traceback and compliance
  • Ensure identity survives transit (including TDM gaps as necessary) and permit out-of-band delivery as necessary
B. Require End-to-End Delivery of Verified Identity
  • Require transmission of identity from originating provider → terminating provider → device
  • Specify acceptable mechanisms, which may include:
    • STIR/SHAKEN with Rich Call Data (Rich Call Data/Branded Calling ID)
    • Out-of-band identity frameworks
    • Additional secure delivery methodologies
  • Require:
    • No stripping or alteration of verified identity
    • Standardized data formats

IV: Pillar 3: Verified Identity Display

A. Require Trusted Display at the Device Level
  • Require terminating providers to display verified identity clearly and consistently
  • Define display elements:
    • Verified name
    • Standardized verification identity indicator (e.g., “Verified Caller” or green checkmark)
    • Optional logo/call reason
B. Eliminate or Restrict Insecure Identity Mechanisms
  • Phase out or restrict CNAM and other non-verified identity displays


V. Other Considerations

A. Create a Safe Harbor for Terminating Providers
  • Establish liability protection for providers that display verified identity from an approved framework
  • Condition safe harbor on:
    • Compliance with KYC requirements
    • Proper transmission and display
    • No alteration of identity data
B. Align Economic Incentives
  • Require originating providers to recover costs from their customers
  • Prohibit terminating providers from charging for delivery of verified identity to consumers

C. Enforcement & Compliance
  • Require certification of compliance by providers
  • Establish enforcement mechanisms (forfeitures, suspension of origination rights)
  • Enable rapid, cross-provider revocation of identity credentials for bad actors

VI. Implementation Timeline

A. Phase 1 (0–18 months)
  • Standards finalized
  • Independent identity verifiers approved
  • Initial KYC requirements in place
B. Phase 2 (18–30 months)
  • Identity transmission required
  • Display requirements implemented
C. Phase 3 (30+ months)
  • Full enforcement
  • Sunset of insecure identity systems

VII. Future Considerations

  • Enable Verified Identity Display on terminating devices other than mobile handsets
  • Establish interoperability with non-U.S. verified identity delivery processes
  • Apply framework to:
    • SMS/MMS (10DLC, short codes, toll-free)
    • RCS/ over-the-top messaging

Keith Buell, General Counsel and Head of Global Public Policy

Ex Parte Footnotes

  1. https://gasa.org/knowledge-base/blog/global-state-of-scams-report-2024-1-trillion-stolen-in-12-months-gasafeedzai (last visited March 25, 2026).
  2. 2 “Cybercrime, fraud, and predatory schemes are draining American families of their life savings, stealing the benefits of years of work, and destroying the lives of our youth. These activities — which include deploying ransomware and malware, phishing, financial fraud, “sextortion” and other extortion schemes, impersonation, and more — are often coordinated campaigns carried out by Transnational Criminal Organizations (TCOs) aimed at the most vulnerable among us.” https://www.whitehouse.gov/presidential-actions/2026/03/combating-cybercrime-fraudand-predatory-schemes-against-american-citizens/ (last visited March 25, 2026).

Exhibit A Footnotes

  1. References to KYC include Know Your Business (KYB) or Corporate KYC for business customers.
  2. See Advanced Methods to Target and Eliminate Unlawful Robocalls, CG Docket 17-59; Call Authentication TrustAnchor, WC Docket No. 17-97; Telephone Consumer Protection Act, CG Docket No. 02-278; Dismissal of Outdated or Otherwise Moot Robocalls Petitions, CG Docket No. 25-307, Ninth Further Notice of Proposed Rulemaking inCG Docket No. 17-59; Seventh Further Notice of Proposed Rulemaking in WC Docket No. 17-97; Further Notice ofProposed Rulemaking in CG Docket No. 02-278; and Public Notice in CG Docket No. 25-307, FCC 25-76 (rel. Oct.29, 2025).
  3. Verified Identity: The confirmed legal identity of a calling party, established through collection and independent validation of business information that is not merely self-reported, but verified with certainty.
    Verified Identity Delivery: The end-to-end transmission, cryptographic binding, and secure display of a Verified Identity.
  4. The Commission should seek comment on the specific KYC requirements and what level of diligence is 1) mandatory for all callers; and 2) required to obtain verified identity delivery. Regardless, the FCC should prohibit unverified identity displays other than an individual call recipient’s action to associate a caller name with a telephone number, i.e., through assigning a name to a phone number in contacts on a mobile device.
Full Filing Details
Ready to take control of how your identity is presented to consumers? 
The full details of this filing are also posted on the FCC's Filings and Proceedings Portal. To view this content there, use the button below.
View Full FCC Filing Details