Placed on: 08 - 07 - 2025
Why Serious Carriers Vet Traffic, Not Just Partners
A sharp rate deck tells you what a partner promises. But it doesn’t tell you what’s behind the traffic they -or you– deliver.
In wholesale voice, call quality isn’t just about who you buy from. It’s also about who sends you traffic, and whether you’re able to screen calls on your network before passing them through.
What It Looks Like in Practice
Take the IRS. Their outbound calls always come from one designated number. But scammers often spoof internal sub-numbers—numbers that should never appear in caller ID.
If your network passes these through, you’re not just risking spam flags, you’re likely violating Do Not Originate (DNO) rules. These numbers are explicitly listed by US authorities as invalid for outbound use.
Can You See and Screen Your Traffic?
In our experience, many telcos struggle with US-specific telecom KYC practices, such as:
- Checking whether calls are using proper STIR/SHAKEN attestation
- Identifying when a number appears on the Do Not Originate (DNO) list (which is required) or Do Not Call (DNC) list (your customer’s responsibility but useful to gage traffic quality.
- Flagging suspicious patterns, like government sub-numbers being used as outbound CLIs
The result? These carriers -and their clients- could be exposed to compliance risks. Not only with regulators, but also with downstream carriers who may limit or block your traffic if patterns raise concerns.

How RGTN Solves It: Compliance-as-a-Service and Modern Telecom KYC
We offer screening services for carriers that don’t have deep compliance infrastructure in-house.
There are two ways to use it:
- Dip before you send
You send us your outbound call data (CLI, destination, etc.). We run it against DNO/DNC lists, STIR/SHAKEN logic, and traceback patterns. You get a clear yes/no decision—with reasons and can then route the call as you see fit. - Let us filter for you
You hand off the traffic to RGTN. We screen and block non-compliant calls before they hit the network. You stay compliant, without needing to build or maintain the infrastructure yourself.
This level of screening isn’t just a nice-to-have—it’s becoming the standard for telecom KYC. Knowing your customer now includes knowing what kind of traffic they’re putting on your network.
Be in Control: Vet What You Let Through
A compliant network isn’t one that just buys from the right upstreams. It’s one that actively screens what it originates.
That’s what we offer: Clarity, protection, and the infrastructure to keep your business on the right side of regulation.
Want to See If we’re a fit?
If you’re running traffic into the US and want to simplify compliance, start here. We’ll tell you if we can help—and how.
Related Reading:
- How to Know If You’re Working with the Right US Voice Partner
- The Hidden Costs of Cheap US Voice Termination
- 5 Red Flags When Choosing a US Voice Carrier
Related posts
Enforcement just showed its teeth Last week the FCC removed 185 voice providers from the Robocall Mitigation Database (RMD) and told all U.S. [...]
Your calls deserve better than “Scam Likely” Picking a voice carrier sounds simple—until angry customers report dropped calls, or worse, see your caller-ID [...]
Cutting a fraction of a cent off your per‑minute rate feels like a win—until the invoices stop matching reality. A Tale of Two Carriers [...]
If you buy US voice at scale, you already know this industry isn't short on promises. "Lowest rates guaranteed." "Tier 1 routes only." [...]





