Scam calls and spam calls are unwanted voice communications that use automated, deceptive, or high-volume techniques to reach subscribers. Global telecom fraud losses reached $41.82 billion in 2025 according to the Communications Fraud Control Association (CFCA), with unwanted call volumes increasing 15.6% year-over-year to an estimated 29.6 billion calls in the United States alone.
These unwanted calls have become one of the persistent threats to telecom networks and subscriber trust. As communication channels evolve, fraudsters adapt their methods to exploit weaknesses across voice networks, signaling layers, and interconnect ecosystems.
Telecom operators can block these calls at the network level by applying AI-driven detection, real-time analytics, and policy-based enforcement to identify and mitigate fraudulent traffic before it reaches end users.
This guide covers how scam and spam calls operate, the challenges operators face in detecting them, and how AI-powered, network-level solutions provide scalable protection across mobile, wholesale, and enterprise voice ecosystems. For information on specific fraud types, see our guides to telecom fraud management and real-time fraud detection with machine learning.
Scam and spam calls are often high-volume and automated, and they are designed to mislead users into sharing sensitive information or engaging with fraudulent prompts. Their increasing sophistication creates challenges for traditional filtering approaches. The scale of the problem continues to accelerate as fraudsters adopt more advanced techniques, including the use of generative AI for social engineering and voice manipulation.
Key challenges include:
Traditional rule-based filtering methods struggle to keep pace with these evolving behaviors, which creates the need for more advanced, network-level defenses that leverage machine learning and real-time behavioral analytics.
Scam calls and spam calls refer to unwanted voice communications that are typically automated or semi-automated, generated at scale, and intended to mislead, defraud, or disrupt recipients.
Spam calls are typically high-volume, unsolicited communications, often commercial in nature, that can degrade network efficiency and subscriber experience.
Scam calls, by contrast, are designed to deceive recipients into disclosing sensitive information, making payments, or taking actions that result in financial or data loss. These calls rely heavily on social engineering and increasingly sophisticated impersonation techniques.
In telecom networks, these calls are not isolated incidents - they are systematic, large-scale traffic patterns that exploit weaknesses in signaling, routing, and identity validation mechanisms.
These call types exploit weaknesses in signaling, routing, and identity validation mechanisms within telecom networks. They often overlap in execution. For example, a robocall campaign may use spoofed caller IDs, or a vishing attack may be preceded by automated dialing. This convergence makes detection more complex and requires analysis beyond simple rule-based filtering.
Scam and spam calls are part of a broader fraud ecosystem that extends beyond traditional voice channels. Fraudsters operate across multiple communication channels, combining them to create more convincing and effective attack strategies.
For telecom operators, this means voice-based fraud cannot be addressed in isolation—it needs to be understood as part of a multi-channel threat landscape.
SMS-based fraud uses bulk messaging techniques, spoofed sender identities, and malicious links to deceive recipients. These messages often impersonate trusted organizations and are designed to trigger immediate user action, such as clicking a link or entering credentials.
Modern fraud schemes frequently combine channels to increase success rates. A typical attack may begin with an SMS message, followed by a voice call that reinforces the message’s legitimacy. These coordinated campaigns exploit the fact that users tend to trust communications that appear consistent across channels.
Fraud is expanding into over-the-top (OTT) messaging and app-based communication platforms, where identity controls may be less stringent. Attackers leverage these platforms to bypass traditional telecom safeguards and reach users through alternative channels.
Fraudsters use multiple techniques to generate and distribute scam and spam calls at scale:
These methods allow malicious actors to blend fraudulent traffic with legitimate communications, making detection more complex without advanced analytics and streaming data intelligence.
Telecom operators face several operational and technical constraints when addressing scam and spam calls at the network scale:
Rule-based systems often struggle to adapt to dynamic fraud patterns, which can lead to gaps in detection and delayed response. This is why operators are increasingly adopting AI and machine learning-driven approaches that continuously learn from network behavior.
Telecommunications regulators worldwide are implementing frameworks that require operators to take proactive measures against scam and spam calls. Compliance with these frameworks is increasingly a prerequisite for operating in key markets.
United States: The Federal Communications Commission (FCC) mandates the STIR/SHAKEN caller authentication framework, which verifies caller identity on IP-based voice networks. The FCC also maintains the Robocall Mitigation Database, requiring carriers to file their compliance status. Recent updates (2024–2025) expand enforcement toward gateway providers and international call authentication, with stricter penalties for non-compliance and increased focus on illegal robocall tracebacks.
United Kingdom: Ofcom enforces anti-scam measures including the requirement for providers to identify and block calls from numbers that are clearly being used for fraud. Ofcom also works with industry partners on caller verification initiatives.
Australia: The Australian Communications and Media Authority (ACMA) administers the Do Not Call Register and has implemented rules requiring telcos to detect, trace, and block scam calls. ACMA has taken enforcement action against carriers that fail to meet obligations.
India: The Telecom Regulatory Authority of India (TRAI) regulates unsolicited commercial communications through the Do Not Disturb (DND) registry and blockchain-based solutions for tracing message and call origins. New measures in 2024–2025 include stricter header registration, AI-driven spam detection, and tighter enforcement on telemarketers and aggregators.
UAE: The Telecommunications and Digital Government Regulatory Authority (TDRA) enforces strict anti-spam rules, including registration requirements for telemarketing activities and sender ID controls. In 2024–2025, TDRA expanded penalties for unauthorized marketing calls and introduced tighter controls on VoIP-based scam traffic and cross-border fraud.
Taiwan: The National Communications Commission (NCC) requires operators to implement caller ID verification and block spoofed international calls. Enhanced regulations focus on financial scam prevention, including mandatory cooperation between telcos and law enforcement, and real-time warning systems for suspected fraud calls.
South Korea: The Korea Communications Commission (KCC) mandates robust anti-spam filtering, caller ID authentication, and AI-based scam detection systems. Recent initiatives include stronger obligations on telecom providers to block international spoofing and protect users from voice phishing (vishing), a major national concern.
Singapore: The Infocomm Media Development Authority (IMDA) enforces the SMS Sender ID Registry (SSIR) and requires telcos to block spoofed calls using the “+65” prefix from overseas sources. Updated measures (2024–2025) include mandatory scam filtering systems, real-time blocking, and coordination with the Monetary Authority of Singapore (MAS) on financial scam prevention.
Malaysia: The Malaysian Communications and Multimedia Commission (MCMC) has strengthened anti-scam frameworks through mandatory SMS registration systems, blocking of suspicious numbers, and collaboration with the National Scam Response Centre (NSRC). Recent initiatives (2024–2026) include enhanced real-time scam call detection, tighter SIM card registration rules, and cross-agency enforcement with banks and law enforcement to combat financial fraud.
Despite regional differences, several global trends are reshaping how telecom operators need to approach scam and spam call prevention:
Operators serving global markets need solutions that can adapt to varying regulatory requirements while providing consistent protection standards.
These regulatory developments fundamentally change the role of telecom operators in fraud prevention. This creates several operational requirements:
Traditional approaches based on static rules, blacklists, or post-event analysis are no longer sufficient to meet these expectations. As fraud tactics evolve and regulatory pressure increases, operators need solutions that can adapt to varying regulatory requirements while protecting subscribers at scale.
Modern fraud prevention approaches rely on AI and machine learning to analyze call behavior, network signaling patterns, and historical data in real time. Unlike static rules, machine learning models continuously adapt to new fraud patterns without requiring manual rule updates.
AI-driven call detection can:
By leveraging real-time analytics and predictive models, telecom operators can move from reactive filtering toward more proactive detection strategies, identifying threats before they generate revenue impact or subscriber complaints.
Network-level protection enables operators to evaluate and act on calls before they reach subscribers, providing centralized enforcement that device-level solutions cannot achieve. This approach intercepts fraudulent traffic at the infrastructure layer, ensuring consistent protection across all subscribers without requiring end-user action.
Key capabilities include:
This approach addresses fraud closer to its origin rather than relying solely on device-level controls. Network-level enforcement is particularly important because it protects all subscribers equally — including those who have not installed call-blocking apps or enabled device settings.
Implementing network-level defenses provides measurable benefits across operations, subscriber experience, and revenue protection:
By addressing fraud at the infrastructure level, operators can provide consistent protection across their entire subscriber base. To see how operators have implemented these protections successfully, review our real-time scam call alerts and blocking case study.
SCAMblock enables telecom operators to implement real-time, AI-driven scam and spam call detection directly within the network infrastructure. Unlike device-level solutions, SCAMblock operates at the signaling layer, providing protection before calls reach subscribers.
Key capabilities include:
SCAMblock's signaling-layer integration enables it to analyze network signaling and real-time behavioral patterns before call initiation, providing proactive pre-call fraud prevention rather than post-call filtering. Explore SCAMblock's latest capabilities or download the SCAMblock brochure.
Fraud prevention in telecom networks depends on timely decision-making. Real-time intelligence enables:
Streaming architectures and complex event processing help ensure decisions are made with minimal delay. These capabilities are particularly important during high-traffic events when fraud volumes typically spike — see managing network surges during peak usage.
Network-level scam and spam call protection applies across multiple segments of the telecom ecosystem:
Centralized intelligence can adapt to varying traffic patterns and fraud risks across these environments. Neural Technologies supports operators across these segments through flexible deployment models — contact us to discuss your specific requirements.
Scam and spam call patterns continue to evolve alongside communication technologies. Emerging threats include AI-generated voice deepfakes that replicate trusted voices for vishing attacks, generative AI tools that automate social engineering at scale, and sophisticated SIM farm operations that route fraud traffic through multiple virtual networks.
AI-powered detection combined with centralized enforcement provides a scalable approach to adapting to these new fraud behaviors. This supports more adaptive protection that helps safeguard subscribers, maintain network integrity, and reduce exposure across the ecosystem. As operators expand into 5G, IoT, and digital services, the attack surface grows — making continuous investment in intelligent call protection essential. See how AI and machine learning are modernizing the telecom outlook.
Take the next step with network-level scam and spam call protection. Request a demo to see how SCAMblock can support your scam and spam call protection strategy, or explore the SCAMblock product page for technical details.