Championing STIR/SHAKEN
For IP-based networks, the STIR/SHAKEN framework is the gold standard for call authentication. NGN ICS is at the forefront of implementing this framework, which allows us to cryptographically sign calls originating from trusted sources and validate the signatures of incoming calls. This process verifies that the calling number is accurate and has not been illegally manipulated, providing a critical layer of defense against spoofing.

Rigorous CLI Consistency Checks
Every call on our network is subjected to rigorous consistency checks based on the highest international carrier standards. Our platform validates that a CLI is a valid, active telephone number that uniquely identifies the caller.
This includes verifying:
Trusted Network Interconnects
We utilize secure, logically separated “Trusted Trunks” for traffic exchange with our core partners7. Traffic arriving on these dedicated interconnects has already passed a series of mandated checks (such as CLI consistency and KYC/KYT) by the originating carrier, allowing it to be treated as trusted and secure from the moment it enters our network.
Intelligent Handling of Complex Use Cases
We recognize that legitimate use cases exist where a domestic CLI may originate from an international location, such as in cloud contact centers, corporate telephony, and number anonymization services9. Our intelligent platform is designed to differentiate these legitimate, compliant scenarios from fraudulent activity, ensuring that valid enterprise traffic is not blocked while malicious spoofing is stopped.
Interconnect with the NGN ICS global network — the privately operated infrastructure trusted by Tier-1 carriers, platforms, and enterprises worldwide.