The Threat of Robocall Fraud
The art of robocalling has become far more sophisticated and prevalent in the last 30 years, as technological advances and device ownership have grown at an alarming rate. Indeed, there are several ways in which fraud is accomplished via robocalling.
Caller ID spoofing involves the falsifying of the information displayed on a device, in effect leading the recipient to believe the caller is one of their contacts or a trusted organisation. In instances where the caller identification is unknown to the end user, the area code might be the same as their own, in theory lending credibility to the call. The onus is then thrust upon the fraudster to back up this initial plausibility with being able to convince the end user that the call is genuine, but receiving a call from a trusted-looking number is a very compelling reason for recipients to ‘go along’ with the nature of the call.
SIM swapping is a process where a fraudster convinces a mobile network operator to transfer an individual telephone number to a SIM card in their possession. This is achieved through a process of digging personal details from social media sites and robocalling to build up a picture of the victim, aiming to extract the relevant data needed to authenticate their identity by the mobile provider. In this example, robocalling is not an end in itself, but is used as part of the process to gain the trust of the network operator and ultimately, have access to one-time security codes allied to a two-step verification which potentially opens up complete access to an individual’s life.
In a similar vein, unauthorised number reassignment or mobile phone number porting involves fake number porting requests to mobile providers once the criminal has built up a comprehensive picture of their victim, including sufficient layers of data with which to approach the network operator with confidence. Once this hurdle has been overcome, it becomes easy to intercept one-time passwords sent via SMS as part of a two-step verification process.
Unauthorised call forwarding is from the same methodology as SIM swapping and unauthorised number reassignment so that when calls that include one-time passwords are not received or triggered by the intended recipient, they are likely being intercepted and used by a fraudster.
Any form of robocalling is only as good as its lead lists, and the lengths to which a criminal will go to source them. Tranches of data, often sizeable in the amount of mobile numbers contained within it, can be legally obtained by telemarketers who may use robocalling as a legitimate, if somewhat annoying, form of cold calling. It is unclear as to whether these otherwise lawfully procured lead lists make their way into the hands of those with less honourable intentions, but many end users will be unaware of the option to opt out of their data being mined by third parties.
Offering a range of solutions to the scourge of robocalling and associated fraudulent practices, third-party platforms are now an integral part of the landscape. Platforms are focused on designing systems to disrupt unsolicited and potentially criminal calls, third-party organisations can in theory do the legwork for network operators. Issues of whether one-size-fits-all developments are sufficient to be effective across the spectrum need to be addressed, and whether for example a single network operator working unilaterally with a third-party platform could compromise desired or mandatory industry-wide standards.
Latest research, whitepapers & press releases
-
ReportJanuary 2026IoT & Emerging TechnologyPost-quantum Cryptography Market: 2026-2035
Juniper Research’s Post-quantum Cryptography (PQC) research suite provides a comprehensive and insightful analysis of this market; enabling stakeholders, including PQC-enabled platform providers, specialists, cybersecurity consultancies, and many others, to understand future growth, key trends, and the competitive environment.
VIEW -
ReportJanuary 2026Telecoms & ConnectivityMVNO in a Box Market: 2026-2030
Juniper Research’s MVNO in a Box research suite provides Mobile Virtual Network Enablers, Mobile Virtual Network Aggregators, and other players with detailed analysis and strategic recommendations for monetising demand for MVNO in a Box services.
VIEW -
ReportDecember 2025AI Agents for Customer Experience Platforms Market: 2025-2030
Our comprehensive AI Agents for Customer Experience Platforms research suite comprises detailed assessment of a market that is set to disrupt mobile communications. It provides stakeholders with insight into the key opportunities within the AI agents for customer experience platforms market over the next two years.
VIEW -
ReportDecember 2025Fintech & PaymentseCommerce Fraud Prevention Market: 2025-2030
Our eCommerce Fraud Prevention research suite provides a detailed and insightful analysis of this evolving market; enabling stakeholders from financial institutions, law enforcement agencies, regulatory bodies and technology vendors to understand future growth, key trends, and the competitive environment.
VIEW -
ReportNovember 2025Telecoms & ConnectivityeSIMs & iSIMs Market: 2025-2030
Juniper Research’s eSIMs and iSIMs research suite offers insightful analysis of a market set to experience significant growth in the next five years. The research suite provides mobile network operators (MNOs), original equipment manufacturers (OEMs), and eSIM management and platforms vendors with intelligence on how to capitalise on the market growth, and guidance on how eSIM-only devices and sensors, SGP.42, in-factory provisioning, and iSIMs will change the competitive landscape.
VIEW -
ReportNovember 2025Fintech & PaymentsModern Card Issuing Platforms Market: 2025-2030
Our Modern Card Issuing Platforms Market research suite provides a detailed and insightful analysis of this evolving market; enabling stakeholders from banks, financial institutions, fintech companies, and technology vendors to understand future growth, key trends, and the competitive environment.
VIEW
-
WhitepaperJanuary 2026IoT & Emerging TechnologyPreparing for Q-Day: Post-quantum Security Shift
Our complimentary whitepaper, Preparing for Q-Day: Post-quantum Security Shift, assesses the factors which are increasing interest in adopting PQC, and challenges to PQC adoption. Additionally, it includes a forecast summary of the global spend on PQC by 2035.
VIEW -
WhitepaperJanuary 2026Telecoms & ConnectivityHow Fintechs and Retail Companies Are Changing Mobile Services
Our complimentary whitepaper, How Fintechs and Retail Companies Are Changing Mobile Services, explores the key enterprises entering the MVNO market and launching mobile services via MVNO in a Box partners. It also provides forecasts for total MVNO revenue from mobile subscribers in 2030.
VIEW -
WhitepaperJanuary 2026IoT & Emerging TechnologyTop 10 Emerging Tech Trends 2026
See which emerging technologies will shape enterprise strategy and investment in 2026; from post-quantum cryptography to neuromorphic computing and next-generation infrastructure.
VIEW -
WhitepaperDecember 2025Telecoms & ConnectivityHuman + AI: Drivers of Customer Experience AI Agents in 2026
Our complimentary whitepaper, Human + AI: Drivers of Customer Experience AI Agents in 2026, examines the key drivers of the AI agents for customer experience platforms market in 2025.
VIEW -
WhitepaperDecember 2025Fintech & PaymentsBeyond Chargebacks: The True Cost of Fraud for Digital Commerce
Our complimentary whitepaper, Beyond Chargebacks: The True Cost of Fraud for Digital Commerce, examines the state of the eCommerce fraud prevention market; considering the impact of evolving digital fraud strategies, including key trends such as identity theft, account takeovers, chargebacks, policy abuse and friendly fraud.
VIEW -
WhitepaperNovember 2025Telecoms & ConnectivityeSIM-only Devices: The Impact on Operators, Consumers, and IoT
Our complimentary whitepaper, eSIM-only Devices: The Impact on Operators, Consumers, and IoT, explores the challenges and opportunities for the three segments, with a particular focus on eSIM-only smartphones and SGP.42.
VIEW
-
Fintech & Payments
Modern Card Issuing Platforms to Issue 1.6 Billion Payment Cards in 2030, as Banks Shift Focus From UX to Cost Efficiency
January 2026 -
IoT & Emerging Technology
Post-quantum Cryptography Market to Exceed $13 Billion by 2035 as Q-Day Awareness Accelerates
January 2026 -
Fintech & Payments
Digital Wallets: QR Codes to Constitute Half of All Wallet Transactions Globally Over Next Five Years
January 2026 -
Telecoms & Connectivity
MVNO in a Box Platforms to Drive MVNO Market to 438 Million Subscribers Globally by 2030
January 2026 -
IoT & Emerging Technology
Juniper Research Unveils Top 10 Emerging Tech Trends to Watch in 2026
January 2026 -
Fintech & Payments
Digital Identity App Usage to Hit 6.2 Billion by 2030, Driven by Shift to Decentralised Models
December 2025