Twitter Facebook-f Linkedin-in Instagram
  • +1-817-776-6384
  • info@1routegroup.com
1Route
  • Solutions
    • On-SIM
    • STIR SHAKEN
    • Clearinghouse
    • Fraud Prevention
  • Resources
    • Blogs
    • Events
    • Resources
    • Frequently Asked Questions
  • About Us
  • Contact Us
  • Client Portal
    • SP Registration
    • Registered User Login
1Route
  • Solutions
    • On-SIM
    • STIR SHAKEN
    • Clearinghouse
    • Fraud Prevention
  • Resources
    • Blogs
    • Events
    • Resources
    • Frequently Asked Questions
  • About Us
  • Contact Us
  • Client Portal
    • SP Registration
    • Registered User Login

Frequently Asked Questions

Company
Industry and Technology
Products
Company

What is 1Route Group’s mission?
We are paving the way for new technology in the telecom and fintech industries. Through unmatched anti-fraud, Digital identity, and mobile money protection services, our goal is to restore security and trust for customers.

What does 1Route Group do?
1Route Group is a telecommunications technology company focused on bringing trust back to voice for subscribers. We provide communication service providers (CSPs) and mobile network operators (MNOs) with an “all-in-one” solution for revenue assurance, fraud management, Digital ID, and mobile money protection, featuring real-time detection, blocking, analytics, and reporting.

How long has 1Route Group been in business?
1Route Group was founded in 2021. Our sister company, GBSD Technologies, from which 1Route derives its technological expertise, has been validating telecommunications traffic worldwide and blocking fraudulent transactions since 2003, long before the FCC’s STIR/SHAKEN initiative was implemented.

What are the industries that 1Route Group serves?
1Route Group serves the Telecommunications and Financial Services industries.

Where does 1Route Group operate from?
1Route Group is headquartered in Dallas-Fort Worth, Texas, with regional offices in the EU (Amsterdam), Africa (Johannesburg), and SEA (Kuala Lumpur).

What are the key focus areas for 1Route Group?
Telco and financial anti-fraud, Digital identity, STIR/SHAKEN, and compliant routing solutions for international voice.

How do I contact 1Route Group?
Call +1.817.776.6384, Email info@1routegroup.com, or Fill out the contact form on 1routegroup.com

Industry and Technology

TELECOM ANTI-FRAUD:

What are the main types of telecom fraud?
Unfortunately, the list of potential telecom fraud types is long, and it constantly grows. Among the common and most often seen categories we can list the following: CLI spoofing (caller ID manipulation), SIM box and bypass fraud (sending international calls over local routes to avoid proper charges), Wangiri (generation of call attempts to trigger call-back to premium rate numbers), SPAM and Robocalls, SIM swap fraud, PBX hacking, International Revenue Share Fraud (IRSF), Call stretching, various SMS-related fraud.

What is the difference between fraud detection and fraud prevention?
Fraud detection identifies fraudulent activity after or as it occurs—it spots anomalies, flags suspicious patterns, and generates alerts so teams can investigate and respond. Fraud prevention goes a step further: it proactively blocks fraudulent activity in real time before damage is done, stopping bad calls and traffic before they reach end users or generate revenue for attackers.

How does the 1Route Group solution stop fraud in real-time?
1Route Group’s FINIS platform deploys real-time fraud detection and blocking directly on live traffic, acting as a soft switch and SS7 firewall to intercept and terminate fraudulent calls in milliseconds as they enter the network. It analyzes incoming SS7 signaling for anomalies like SIM box bypasses, IRSF attacks, Wangiri schemes, and robocalls, using active on-network processing or passive mirroring without disrupting legitimate calls. Additional features, such as location-based services and OTT filtering, ensure comprehensive prevention across international routes.

STIR/SHAKEN AND COMPLIANT ROUTING:

What is a SPAM call?
A spam call is an unwanted, unsolicited phone call – usually from a number you do not recognize – often delivering a prerecorded or scripted message rather than a genuine, person‑to‑person conversation. Spam calls are annoying, persistent, and in many cases a security risk, because they can be used to phish for personal or financial information under false pretenses.

What is robocall fraud?
A robocall is a call placed by an automated dialing system that plays a prerecorded or automated voice message instead of connecting you to a live agent. Robocall fraud occurs when these automated calls are used to deceive people – for example, impersonating a bank, government agency, or delivery service – to trick targets into sharing sensitive data, paying fake fees, or clicking malicious links.

Why do phone calls need to be verified?
The need for the call verification comes from the fact that spam, robocalls, CLI spoofing, and other fraud types are growing globally, so many countries now require some form of call validation or verification – especially for international traffic – to protect consumers and the telecom ecosystem. Proper verification helps confirm the originating number, reduce fraudulent transactions, prevent financial losses, protect customer accounts, and keep legitimate calls from being wrongly tagged as “Spam Likely” or blocked by filters.

What is Call Authentication and validation?
Call authentication and validation are the processes networks use to check that a call really comes from who it claims to come from, and decide whether it should be trusted, flagged, or blocked. Call validation helps networks understand who a call is from, verify the originating number, apply appropriate attestation levels, and ensure the call complies with originating and terminating country rules before allowing it through as trusted traffic.

Why have SPAM and robocalls become a global threat to the telecom industry?
Spam and robocalls have scaled into a global problem, driving tens of billions of dollars in annual losses and eroding trust in voice communications. They damage every layer of the ecosystem: operators lose revenue and brand reputation, enterprises see wasted marketing spend and distorted data, and consumers face scams and identity theft – ultimately making people less willing to answer calls at all. Aggressive but blunt fraud filters also create collateral damage by mislabeling or blocking legitimate business calls, causing missed opportunities and lost revenue for operators and enterprises.

How can telecom carriers prevent robocall fraud while maintaining legitimate traffic?
Modern prevention relies on real-time call validation at network edges rather than just static tagging, checking routing paths, signaling consistency, and identity across all carriers in the chain. Advanced systems use AI, behavioral analysis, and anomaly detection on top of attestation to catch fraud patterns while letting genuine, expected traffic flow. Carriers also need strong fraud management tools, verified and branded business calling, careful call practices to protect number reputation, and continuous auditing and compliance with evolving regulations (such as stricter enforcement and shared responsibility models in the US and Europe).

What is STIR/SHAKEN Call Authentication, and why do telecom providers need it?
STIR/SHAKEN is an industry framework that uses digital certificates to verify that a call really comes from the phone number shown on the caller ID screen, making call spoofing much harder. The provider that serves the originating call “signs” each SIP call with a cryptographic token and an attestation level (A/B/C), and the provider that terminates the call verifies that token before deciding whether to trust, label, or block the call. Telecom providers need STIR/SHAKEN to comply with FCC robocall rules, reduce illegal spoofed and scam calls, and restore customer trust in answering incoming phone calls.

What’s required for FCC STIR/SHAKEN compliance in 2026?
In 2026, U.S. voice service, intermediate, and gateway providers that handle IP voice traffic must have STIR/SHAKEN deployed on their IP networks or maintain an approved robocall mitigation program in the networks where it cannot be used. Providers must obtain their own STIR/SHAKEN SPC token and certificate, make their own attestation decisions, sign calls with their own certificate (not just rely on a third party), and keep an up‑to‑date certification and mitigation plan in the FCC’s Robocall Mitigation Database. Non‑compliant providers risk enforcement actions, removal from the database, and facing situations where other carriers are required to stop exchanging traffic with them.

How does the international telecom industry adopt and develop regulatory requirements for call authentication to prevent SPAM and Robocalls?
The United States and Canada have adopted the STIR/SHAKEN framework as the primary tool for authenticating calls to prevent spam and robocalls. Other countries have closely monitored STIR/SHAKEN’s implementation, including its challenges, and subsequently developed their own distinct frameworks for mitigating spam and robocalls. Here are several examples:
China introduced CHAKEN (based on national standard GB/T 43779-2024), a rival to STIR/SHAKEN that supports enhanced features like personal avatars, video caller IDs, and five security tiers for call validation.
France implemented the Mécanisme d’Authentification des Numéros (MAN), mandating number authentication for all operators to combat spoofing and fraudulent calls, with automatic disconnection of unauthenticated calls.
Australia established the Scams Prevention Framework (SPF) and industry code C661:2022 for reducing scam calls and SMS through detection, blocking, tracing, and a forthcoming Sender ID registry.
In summary, a large number of countries are actively developing their own frameworks to mitigate spam and robocalls, and we should expect more standards and frameworks to be published and enforced by country regulators soon.

What industry players need solutions for regulatory compliance?
Regulatory compliance solutions are needed by virtually every player that touches voice traffic: originating voice service providers, small and mid‑tier carriers, intermediate and gateway providers, VoIP wholesalers/aggregators, and international carriers routing calls into regulated markets like the US and others. High‑volume calling enterprises and contact centers also rely on compliant providers (and often branded calling) to ensure their outbound calls aren’t mislabeled or blocked under STIR/SHAKEN and other SPAM call-prevention rules.

Why does international traffic complaint routing become more important in 2026?
As more countries adopt and enforce anti-spam regulatory requirements and make them mandatory for industry players, both local and international carriers will require a comprehensive yet manageable solution that provides traffic IWF (Interworking Function) between different country standards.
Diverse standards, like the US/Canada STIR/SHAKEN, China’s CHAKEN (GB/T 43779-2024), France’s MAN, and Australia’s Scams Prevention Framework, demand interworking functions (IWF) to translate signaling and authentication across various standards in IP and TDM networks for seamless international call handling. In 2026, ramped-up regulatory enforcement activities heighten the need for IWF to prevent call failures, undue blocking of legitimate traffic, and facilitate complaint routing back to origins. This interoperability mitigates risks from grey routes and spoofing, ensuring compliance while maintaining voice service reliability.

Is it possible to consolidate all regulatory requirements and standards for SPAM and robocall prevention on a single platform?
Yes, it is possible. 1Route Group, besides STIR/SHAKEN, also supports other published and upcoming standards and frameworks with its compliant routing solution, providing a one-stop shop solution: the interworking function that translates international voice signaling and call attestation information across various regulatory standards.

MOBILE MONEY ANTI-FRAUD:

Why does mobile money fraud become a global threat, requiring active countermeasures from the industry players?
Fraud undermines the financial inclusion and trust that mobile money was built to provide, affecting individuals who depend on it for daily payments and damaging businesses through financial losses and eroded customer confidence. Because mobile money now bridges telecom and traditional finance, fraud ripples across both industries, requiring coordinated countermeasures from operators, financial institutions, and regulators. 

What are the main types of Mobile Money (MoMo) fraud?
Fraudulent activities affecting Digital Wallet and Mobile Money usually fall into two main groups: external and internal.
External fraud types:  Account takeover • Phishing •  Social engineering  •  Sim swap • Unauthorized transaction Monitoring  • Synthetic identity and document forgery • Mule account detection • Fraudulent disbursement of micro-loans • Fraudulent cash-ins/cash-outs • Merchant fraud • Wallet-to-bank and cross-platform laundering/fraud • Subscription and device financing fraud • In-app purchase manipulation
Internal fraud types: Unauthorized transaction execution • Privilege abuse (use of elevated privileges to override controls) • Fake account creation • Transaction reversal abuse • Audit Logs Evaluation 

What is customer digital identity, and why is it important for mobile financial transactions? Customer digital identity is the verified set of electronic attributes—name, phone number, SIM credentials, biometrics, transaction history—that confirms someone is who they claim to be in mobile financial transactions. Strong digital identity is essential because fraudsters build synthetic identities (fake personas from mixed real and fake data) that now cause credit losses and slip through traditional checks until serious damage is done. Without robust identity verification, mobile money providers cannot distinguish real users from fabricated ones, exposing themselves to fraud, penalties, and lost customer trust.

Why does a SIM-based digital identity solution have more potential in mobile combating financial fraud than existing methods (2FA and others)?
SMS-based 2FA is vulnerable to SIM swap fraud, where attackers hijack a victim’s phone number to intercept OTPs and codes. SIM-based digital identity ties authentication to the physical SIM/device, not just a telephone number, making hijacking far harder. It enables continuous, real-time validation of SIM, device, location, and behavior throughout a session – not just a one-time code check – and can detect synthetic identities, recycled numbers, and suspicious patterns that 2FA completely misses. 1Route’s on-SIM protection works across both legacy TDM and modern SIP networks, making the device itself a trust anchor that’s continuously verified against live network signals.

Products

Coming soon.

Solutions
  • STIR SHAKEN
  • International SHAKEN
  • Fraud Prevention
Learn More
  • Blogs
  • Events
  • Resources
Subscribe

Sign up for our newsletter to get industry updates, company news, and more!

Copyright © 2025 1Route Group. All Rights Reserved.