In today’s hyperconnected world, cyberattacks are no longer rare events - they represent a constant, invisible war undermining economies, trust, and personal security. Every fraudulent call, spoofed message, or fake website erodes confidence in the digital fabric that binds modern life.

Imagine a paradigm shift where every telco service consumer can instantly verify the legitimacy of a call or message. In this new digital era, cybercrime and fraud are not just reduced - they are rendered obsolete.

This future is a world where every online interaction is transparent, verifiable, and secure. The Internet evolves into a trusted, accountable, and resilient global network - one where authenticity is the default, not the exception.

From everyday threats to a cryptographic solution

Today, cyberthreats are tough to avoid. Many of us, whether we're on the Internet or using our phones, are constantly targeted by malicious links in emails and on websites (phishing), tricky text messages (smishing), and fake phone calls (vishing). These scams often succeed because it's hard for people to know if a message or call is genuinely from a trusted source.

The ideal fix is to create a system where every user, device, and online service is cryptographically verified. This would guarantee that all digital communication is authenticated, trusted, and secure, without needing a central organization to confirm who's who.

2026 and beyond: telco as the digital notary public

There is a huge opportunity for telcos to take the bold move and become a digital notary, in addition to being a data carrier. The new mission is to be the trusted authority that verifies authenticity for every single text, call, and message you send or receive.

Telcos can achieve this by upgrading their network protocols to use a decentralized digital "fingerprint" platform. This would allow telcos to block fake calls (spoofing) and fraudulent messages directly at the source - the network level - before they ever reach a user’s device.

This is all about embedding trust and security deep into the architecture of communication itself, instead of relying on spam filters and antivirus software after the threats are already out there. In the end, the telcos become the key foundation for a safer online world, which strengthens your confidence and opens the door to new, truly secure services.

The three-part authentication framework

The future communication networks would implement a rigorous validation process for every piece of digital traffic. The goal is to create an authentication framework that secures data at three key points:

  • At source / ingress: The originating network attaches a digital signature to the message or call. This signature is linked to a unique service ID and the sender's advertised ID (like a phone number or IP address). When traffic originates outside the network, intelligent carrier routers attach an external service ID certification.
  • In transit: Intermediate networks stamp the data packets with a cryptographic proof of transit. This confirms the data followed a legitimate path, which prevents criminals from secretly redirecting traffic (route hijacking).
  • At destination / egress: The receiving network fully validates the traffic by checking the original digital signature, verifying the path stamps, and confirming the sender's phone number is authorized to use the unique service ID before accepting the data.

A trusted Internet is already here

To establish a trustworthy, transparent secure Internet, the telco industry needs to:

  • Create a trusted network consortium: Form a shared “Trust Fabric” that manages digital identities, credentials, and revocations for all network operators.
  • Upgrade communication protocols across the board: Update telecom systems (for calls, texts, and other messaging) so they can include and transmit digital verification signatures.
  • Use fast verification hardware: Deploy high-speed devices capable of verifying digital signatures instantly, without slowing down communication.
  • Improve user visibility: Show a clear “Verified” badge for trusted calls or messages, and display strong warnings for any unverified communication.

Our take

A trustworthy telco or Internet service has the opportunity to differentiate their network as the most reliable and secure network by baking identity verification directly into the network itself - so every call, message, or online connection can be proven authentic.

Instead of just defending against scams after they happen, the network can verify who’s really sending or receiving data in real time. This approach turns the telecom infrastructure into a foundation of digital trust, helping protect users, reduce fraud, and build confidence in every interaction online.

CGI's communications and media expertise

CGI brings deep telco, security and systems-integration expertise to help service providers and large enterprises deploy practical, scalable solutions that reduce fraud and increase user trust across digital channels.

About this author

Dave Richards

Yajnavalkya Bhattacharya (external author): Yaj Bhattacharya is an Enterprise Solutions Architect and Cybersecurity Strategist with 30+ years of experience. He helps organizations modernize enterprise architecture by aligning integration, managing risk, and ensuring compliance to build secure, resilient digital ecosystems.