
FCC Call Blocking Rules 2026: How SIP 603+ Changes Telecom Fraud Prevention
Expert Opinion
Share
Starting from March 2026, the US Federal Communications Commission (FCC) now requires operators to explicitly justify why a call is blocked as fraudulent. Under the new rules, silent blocking is no longer acceptable. When analytics-based blocking occurs, providers must return a standardized SIP 603+ response code and propagate blocking notifications end-to-end, including the reason and the identity of the blocking network.
In this article, we’ll look into what is changing, why most existing fraud-blocking systems struggle to provide clear call-level justification, and why real-time, call-level validation has become essential for operators.
Key takeaways: SIP 603+ and the FCC’s new call blocking rules
What is SIP 603+ in telecom?
SIP 603+ is a standardized response code that telecom operators must use to indicate that a call has been blocked due to suspected fraud, along with a clear reason and identification of the blocking network. Under the FCC’s 2026 rules, this information must be propagated end-to-end across networks.
What changed in the FCC’s 2026 call blocking rules?
Starting in March 2026, telecom operators:
- Can no longer block calls silently
- Must provide a clear reason for blocking
- Must use SIP 603+ response codes
- Must ensure blocking information is shared across networks
What is changing: Operators must now be able to explain blocking decisions (the shift to call-level validation)
The FCC’s new requirements represent a major shift in how voice fraud blocking must be handled by operators. Under the new rules (coming into force in March 2026), silent blocking is no longer acceptable. When a call is blocked based on fraud analytics, carriers must explicitly indicate the reason using the standardized SIP 603+ response code and ensure that this information is communicated end-to-end through the network. In other words, SIP error codes’ explanation becomes mandatory.
Blocking decisions have a larger impact than simply preventing fraudulent calls. Excessive blocking can prevent businesses from reaching customers, disrupt critical services, and create disputes between originating and terminating operators.
Consequently, the FCC now expects operators not only to stop fraudulent calls but also to demonstrate why a specific call was blocked.
At first glance, the FCC’s robocall blocking requirements may sound simple and reasonable. Blocking fraudulent calls and requiring call validation from telecom operators protects subscribers, prevents scams, and preserves trust in voice networks. However, this exposes a deeper issue: most modern fraud management systems were designed to detect suspicious traffic patterns at scale, rather than to provide verifiable, call-level justification.
In practice, operators must now be able to answer a much more demanding question than before: not just whether traffic looks fraudulent (in practice, this is often based on analytics or AI-powered detection tools), but why a specific call was blocked.
Fraud management is therefore changing: from a best-effort detection function, it now needs to become an evidence-based process, ensuring that blocking decisions are traceable and can withstand scrutiny.
The problem: Most fraud-blocking systems for voice network security may not be able to justify individual blocking decisions
Most fraud detection systems operate on aggregated traffic patterns rather than validating individual calls, making it difficult to provide verifiable, call-level evidence required under FCC rules.
Therefore, the new requirement raises a key question for operators:
Can existing fraud detection systems justify blocking decisions on a call-by-call basis?
Most current systems rely on statistical thresholds, industry number databases, STIR/SHAKEN protocols, or AI-based pattern recognition. Let’s look at each one.
Fraud detection based on statistical thresholds
Threshold-based fraud detection works by defining limits for traffic parameters such as call volume, answer ratios, call duration, or destination patterns. When those thresholds are exceeded, traffic is automatically blocked. However, the only explanation such systems can provide is that a predefined threshold was breached. This does not prove that a particular call was fraudulent but simply reflects a configuration decision made in advance.
Industry databases provided by third parties
Another widely used approach relies on industry number databases, such as IRSF or spam-number lists provided by third-party vendors.
In these cases, blocking decisions can be justified by stating that a calling or called number matched an entry in a specific database. However, such databases usually update periodically rather than in real time, which means they provide limited protection against newly emerging fraud patterns or rapidly changing attack strategies – and they might even contain incorrect entries.
STIR/SHAKEN: an important step towards call authentication, but limited in scope
STIR/SHAKEN is a major step forward in addressing one of the most common fraud techniques: caller ID spoofing. By using cryptographic certificates, STIR/SHAKEN allows operators to verify whether the calling number (A-number) has been authenticated by the originating network. Failed authentication enables operators to identify some spoofed calls.
In short, this means that blocking decisions can be tied directly to identity authentication results rather than inferred traffic patterns, making them easier to explain and defend.
However, STIR/SHAKEN addresses only a narrow section of all fraud. Many types of fraud do not rely on caller ID spoofing at all, including SIM-box bypass, PBX compromise, artificially generated traffic, such as IRSF, and false answer supervision. These attacks can use valid numbers and authenticated identities, making them invisible to identity-based authentication mechanisms.
At the same time, other detection approaches (such as AI-based fraud analytics, which we’ll look into next) can still identify suspicious traffic patterns in scenarios where STIR/SHAKEN authentication alone does not provide sufficient evidence to justify blocking.
Additionally, STIR/SHAKEN deployment remains geographically limited to the US and Canada. International calls may traverse multiple networks and legacy infrastructure, where authentication information may not be available or preserved. So, while STIR/SHAKEN provides valuable protection for certain spoofing scenarios, it cannot provide complete, end-to-end justification for most fraud blocking decisions.
AI-powered fraud detection
AI-based fraud detection systems classify traffic based on learned patterns and probability models trained on historical data. These systems analyze hundreds of parameters and their interactions over time, allowing them to detect complex fraud scenarios and emerging attack patterns.
While effective at detecting large-scale fraud trends, the justification they provide is typically limited to identifying the primary signal or pattern that triggered the detection. It’s important to keep in mind that model behavior can vary depending on training data, configuration, and operator-specific policies.
In practice, this means the system may indicate that traffic matched a known spam or scam pattern, or that a specific traffic profile between certain A-number and B-number ranges triggered the blocking decision. Usually, AI-based models take into account hundreds of parameters and their evolution within a specific time frame. This adds reliability to AI decisions but, at the same time, adds complexity to explanations.
Because these detection system types analyze traffic in aggregate rather than validating each call individually, they may create false positives and false negatives:
- Legitimate calls may be blocked when traffic patterns resemble known fraud signatures.
- At the same time, fraudulent calls may continue to pass through networks until statistical thresholds are reached.
Additionally, fraudsters may actively exploit this behavior by distributing traffic across numbers, networks, or time periods to remain below detection thresholds.
As SIP 603+ becomes mandatory in 2026, this limitation is becoming a major operational challenge for operators, making telecom fraud prevention compliance increasingly complex. Providing explanations based on thresholds, database matches, or aggregate traffic patterns may no longer be sufficient and will need to be completed by call-level validation.
What telecom operators need next: Real-time, call-level validation to ensure SIP 603+ compliance
The FCC’s new requirements make one thing clear: operators must be able not only to block fraudulent calls but to justify each blocking decision with verifiable technical evidence.
Existing detection methods all play an important role in identifying suspicious traffic, but they do not always provide complete, call-level justification across the full range of fraud scenarios.
To meet this standard, fraud management must move from aggregated traffic analysis to real-time, call-level validation. This means validating each call individually and verifying what actually happened throughout its lifecycle, not just how it compares statistically to other traffic.
In this context, call-level validation complements existing fraud detection systems rather than replacing them: Analytics and AI detect suspicious traffic patterns at scale, while validation provides direct evidence of what happened during a specific call.
One emerging approach to meeting these requirements is out-of-band, real-time call validation, where each call is independently verified across its lifecycle. AB Handshake has pioneered an approach with an end-to-end call validation framework built specifically to provide this level of transparency, enabling operators to generate clear, call-level evidence required for SIP 603+ compliance.
Our system validates each call in real time by independently verifying key call events, including call setup, connection, and termination. Call validation covers the same wide scope of fraud as AI-based systems but with the added key benefit of providing simple call-level explanations.
For operators, this type of call validation delivers exactly what the new regulatory standard requires, enabling them to:
- Provide clear justification for every blocked call, in line with the new SIP 603+ requirements
- Identify and prevent fraud types beyond caller ID spoofing, including bypass fraud, PBX compromise, call stretching, false answer supervision and others
- Provide a complete real-time diagnosis and identification of what happened with each call, with call parameters on its path to the terminating party
- Protect legitimate traffic, revenue, and enterprise communications
By validating calls individually rather than relying solely on statistical inference, operators can now ensure that blocking decisions are accurate and fully defensible. AB Handshake's framework was designed specifically for compliant, evidence-based call blocking, ensuring operators are able to:
- Deploy call-level validation
- Combine AI and validation techniques
- Ensure SIP signaling transparency
- Maintain audit trails
Stop fraud and ensure regulatory compliance with an instant virtual ‘handshake’ that provides fully transparent end-to-end call validation.
Frequently asked questions on the FCC’s new requirements for call blocking
- Do telecom operators have to explain why a call is blocked?
Yes. Under the FCC 2026 rules, operators must provide a clear justification using SIP 603+ codes and cannot silently block calls.
- Is STIR/SHAKEN enough to comply with the FCC rules?
No. STIR/SHAKEN only verifies caller identity and does not provide full call-level validation across all telecom fraud types.
- What is call-level validation in telecom?
Call-level validation verifies each call individually by analyzing real-time call events such as setup, connection, and termination, providing direct evidence of what occurred during the call.
- Why is call-level validation important for SIP 603+?
Because SIP 603+ requires a clear reason for blocking a specific call, operators need verifiable evidence rather than statistical or pattern-based assumptions.
Ensure SIP 603+ compliance with real-time call validation