This paper details the fraudulent robocalling problem, focusing on CLI Spoofing, which enables the majority of these calls to reach their intended victims. The FCC-mandated STIR/SHAKEN solution is described and then a typical call is followed in detail as it makes away across the network, encountering STIR/SHAKEN processing as it goes.