HOME

TheInfoList



OR:

Caller ID spoofing is a
spoofing attack In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage. Internet Spoofing an ...
which causes the telephone network's
Caller ID Caller identification (Caller ID) is a telephone service, available in analog and digital telephone systems, including voice over IP (VoIP), that transmits a caller's telephone number to the called party's telephone equipment when the call is ...
to indicate to the receiver of a call that the originator of the call is a station other than the true originating station. This can lead to a display showing a phone number different from that of the telephone from which the call was placed. The term is commonly used to describe situations in which the motivation is considered malicious by the originator. One effect of the widespread availability of Caller ID spoofing is that, as
AARP AARP, formerly the American Association of Retired Persons, is an interest group in the United States focusing on issues affecting those 50 and older. The organization, which is headquartered in Washington, D.C., said it had more than 38  ...
published in 2019, "you can no longer trust call ID."


History

Caller ID spoofing has been available for years to people with a specialized digital connection to the telephone company, called an
ISDN Integrated Services Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the digitalised circuits of the public switched telephone network. ...
PRI circuit. Collection agencies, law-enforcement officials, and private investigators have used the practice, with varying degrees of legality. The first mainstream caller ID spoofing service was launched U.S.-wide on September 1, 2004 by California-based Star38.com. Founded by Jason Jepson, it was the first service to allow spoofed calls to be placed from a web interface. It stopped offering service in 2005, as a handful of similar sites were launched. Caller ID spoofing also has been used in purchase scams on web sites such as Craigslist and eBay. The scamming caller claims to be calling from Canada into the U.S. with a legitimate interest in purchasing advertised items. Often the sellers are asked for personal information such as a copy of a registration title, etc., before the (scammer) purchaser invests the time and effort to come and see the items for sale. In the 2010 election, fake caller IDs of ambulance companies and hospitals were used in Missouri to get potential voters to answer the phone. In 2009, a vindictive Brooklyn wife spoofed the doctor's office of her husband's lover in an attempt to trick the other woman into taking medication which would make her miscarry. Caller ID spoofing has been used for
prank call A prank call (also known as a crank call, a hoax call, or a goof call) is a telephone call intended by the caller as a practical joke played on the person answering. It is often a type of nuisance call and can be illegal under certain circumsta ...
s, sometimes with devastating consequences. In December 2007, a teenager in Washington used a caller ID spoofing service to send a SWAT team to an unsuspecting victim's house. In February 2008, a man from
Collegeville, Pennsylvania Collegeville is a borough in Montgomery County, Pennsylvania, a suburb outside of Philadelphia on Perkiomen Creek. Collegeville was incorporated in 1896. It is the location of Ursinus College, which opened in 1869. The population was 5,089 ...
was arrested for making threatening phone calls to women and having their home numbers appear "on their caller ID to make it look like the call was coming from inside the house." In March 2008, several residents in
Wilmington, Delaware Wilmington is the List of municipalities in Delaware, most populous city in the U.S. state of Delaware. The city was built on the site of Fort Christina, the first Swedish colonization of the Americas, Swedish settlement in North America. It lie ...
, reported receiving telemarketing calls during the early morning hours, when the caller had apparently spoofed the caller ID to evoke Tommy Tutone's 1981 hit " 867-5309/Jenny". By 2014, an increase in illegal telemarketers displaying the victim's own number, either verbatim or with a few digits randomized, was observed as an attempt to evade caller ID-based blacklists. In the Canadian federal election of May 2, 2011, both live calls and robocalls are alleged to have been placed with false caller ID, either to replace the caller's identity with that of a fictitious person ( Pierre Poutine of
Joliette, Quebec Joliette () is a city in southwest Quebec, Canada. It is approximately northeast of Montreal, on the L'Assomption River and is the seat of the Regional County Municipality of Joliette. It is considered to be a part of the North Shore of G ...
) or to disguise calls from an
Ohio Ohio ( ) is a U.S. state, state in the Midwestern United States, Midwestern region of the United States. It borders Lake Erie to the north, Pennsylvania to the east, West Virginia to the southeast, Kentucky to the southwest, Indiana to the ...
call centre as
Peterborough, Ontario Peterborough ( ) is a city on the Otonabee River in Ontario, Canada, about 125 kilometres (78 miles) northeast of Toronto. According to the 2021 Census, the population of the City of Peterborough was 83,651. The population of the Peterborough ...
, domestic calls. See Robocall scandal. In June 2012, a search on Google returned nearly 50,000 consumer complaints by individuals receiving multiple continuing spoofed
voice over IP Voice over Internet Protocol (VoIP), also known as IP telephony, is a set of technologies used primarily for voice communication sessions over Internet Protocol (IP) networks, such as the Internet. VoIP enables voice calls to be transmitted as ...
(VoIP) calls on lines leased / originating from "Pacific Telecom Communications Group" located in Los Angeles, CA (in a mailbox store), in apparent violation of FCC rules. Companies such as these lease out thousands of phone numbers to anonymous voice-mail providers who, in combination with dubious companies like "Phone Broadcast Club" (who do the actual spoofing), allow phone spam to become an increasingly widespread and pervasive problem. In 2013, the misleading caller name "Teachers Phone" was reported on a large quantity of robocalls advertising credit card services as a ruse to trick students' families into answering the unwanted calls in the mistaken belief they were from local schools. On January 7, 2013, the
Internet Crime Complaint Center The Internet Crime Complaint Center (IC3) is a division of the Federal Bureau of Investigation (FBI) concerning suspected Internet-facilitated criminal activity. The IC3 gives victims a convenient and easy-to-use reporting mechanism that alerts ...
issued a scam alert for various telephony denial-of-service attacks by which fraudsters were using spoofed caller ID to impersonate police in an attempt to collect bogus payday loans, then placing repeated harassing calls to police with the victim's number displayed. While impersonation of police is common, other scams involved impersonating utility companies to threaten businesses or householders with disconnection as a means to extort money, impersonating
immigration Immigration is the international movement of people to a destination country of which they are not usual residents or where they do not possess nationality in order to settle as Permanent residency, permanent residents. Commuting, Commuter ...
officials or impersonating medical insurers to obtain personal data for use in theft of identity. Bogus caller ID has also been used in grandparent scams, which target the elderly by impersonating family members and requesting
wire transfer Wire transfer, bank transfer, or credit transfer, is a method of electronic funds transfer from one person or entity to another. A wire transfer can be made from one bank account to another bank account, or through a transfer of cash at a cash ...
of money. In 2018, one method of caller ID spoofing was called "neighbor spoofing", using either the same
area code A telephone numbering plan is a type of numbering scheme used in telecommunication to assign telephone numbers to subscriber telephones or other telephony endpoints. Telephone numbers are the addresses of participants in a telephone network, rea ...
and telephone prefix of the person being called, or the name of a person or business in the area.


Technology and methods

Caller ID is spoofed through a variety of methods and different technology. The most popular ways of spoofing caller ID are through the use of
VoIP Voice over Internet Protocol (VoIP), also known as IP telephony, is a set of technologies used primarily for voice communication sessions over Internet Protocol (IP) networks, such as the Internet. VoIP enables voice calls to be transmitted as ...
or PRI lines.


Voice over IP

In the past, caller ID spoofing required an advanced knowledge of telephony equipment that could be quite expensive. However, with open source software (such as
Asterisk The asterisk ( ), from Late Latin , from Ancient Greek , , "little star", is a Typography, typographical symbol. It is so called because it resembles a conventional image of a star (heraldry), heraldic star. Computer scientists and Mathematici ...
or FreeSWITCH, and almost any
VoIP Voice over Internet Protocol (VoIP), also known as IP telephony, is a set of technologies used primarily for voice communication sessions over Internet Protocol (IP) networks, such as the Internet. VoIP enables voice calls to be transmitted as ...
company), one can spoof calls with minimal costs and effort. Some VoIP providers allow the user to configure their displayed number as part of the configuration page on the provider's web interface. No additional software is required. If the caller name is sent with the call (instead of being generated from the number by a database lookup at destination) it may be configured as part of the settings on a client-owned analog telephone adapter or SIP phone. The level of flexibility is provider-dependent. A provider which allows users to bring their own device and unbundles service so that direct inward dial numbers may be purchased separately from outbound calling minutes will be more flexible. A carrier which doesn't follow established hardware standards (such as
Skype Skype () was a proprietary telecommunications application operated by Skype Technologies, a division of Microsoft, best known for IP-based videotelephony, videoconferencing and voice calls. It also had instant messaging, file transfer, ...
) or locks subscribers out of configuration settings on hardware which the subscriber owns outright (such as Vonage) is more restrictive. Providers which market "wholesale VoIP" are typically intended to allow any displayed number to be sent, as resellers will want their end user's numbers to appear. In rare cases, a destination number served by voice-over-IP is reachable directly at a known SIP address (which may be published through ENUM telephone number mapping, a .tel DNS record or located using an intermediary such as SIP Broker). Some Google Voice users are directly reachable by SIP, as are all iNum Initiative numbers in country codes +883 5100 and +888. As a federated VoIP scheme providing a direct Internet connection which does not pass through a
signaling gateway A signaling gateway is a network component responsible for transferring signaling messages (i.e. information related to call establishment, billing, location, short messages, address conversion, and other services) between Common Channel Signal ...
to the
public switched telephone network The public switched telephone network (PSTN) is the aggregate of the world's telephone networks that are operated by national, regional, or local telephony operators. It provides infrastructure and services for public telephony. The PSTN consists o ...
, it shares the advantages (nearly free unlimited access worldwide) and disadvantages (Internet applications).


Service providers

Some spoofing services work similarly to a prepaid calling card. Customers pay in advance for a
personal identification number A personal identification number (PIN; sometimes RAS syndrome, redundantly a PIN code or PIN number) is a numeric (sometimes alpha-numeric) passcode used in the process of authenticating a user accessing a system. The PIN has been the key to faci ...
(PIN). Customers dial the number given to them by the company, their PIN, the destination number and the number they wish to appear as the caller ID. The call is bridged or transferred and arrives with the spoofed number chosen by the caller—thus tricking the called party. Many providers also provide a Web-based interface or a mobile application where a user creates an account, logs in and supplies a source number, destination number, and the bogus caller ID information to be displayed. The server then places a call to each of the two endpoint numbers and bridges the calls together. Some providers offer the ability to record calls, change the voice and send text messages.


Orange box

Another method of spoofing is that of emulating the Bell 202 FSK signal. This method, informally called orange boxing, uses software that generates the audio signal which is then coupled to the telephone line during the call. The object is to deceive the called party into thinking that there is an incoming call waiting call from the spoofed number, when in fact there is no new incoming call. This technique often also involves an accomplice who may provide a secondary voice to complete the illusion of a call-waiting call. Because the orange box cannot truly spoof an incoming caller ID prior to answering and relies to a certain extent on the guile of the caller, it is considered as much a social engineering technique as a technical hack. Other methods include switch access to the
Signaling System 7 Signalling System No. 7 (SS7) is a set of telephony signaling protocols developed in the 1970s that is used to setup and teardown telephone calls on most parts of the global public switched telephone network (PSTN). The protocol also performs ...
network and social engineering telephone company operators, who place calls for you from the desired phone number.


Caller name display

Telephone exchange A telephone exchange, telephone switch, or central office is a central component of a telecommunications system in the public switched telephone network (PSTN) or in large enterprises. It facilitates the establishment of communication circuits ...
equipment manufacturers vary in their handling of caller name display. Much of the equipment manufactured for
Bell System The Bell System was a system of telecommunication companies, led by the Bell Telephone Company and later by the AT&T Corporation, American Telephone and Telegraph Company (AT&T), that dominated the telephone services industry in North America fo ...
companies in the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
sends only the caller's number to the distant exchange; that switch must then use a database lookup to find the name to display with the calling number.
Canadian Canadians () are people identified with the country of Canada. This connection may be residential, legal, historical or cultural. For most Canadians, many (or all) of these connections exist and are collectively the source of their being ''C ...
landline exchanges often run
Nortel Nortel Networks Corporation (Nortel), formerly Northern Telecom Limited, was a Canadian Multinational corporation, multinational telecommunications and data networking equipment manufacturer headquartered in Ottawa, Ontario. It was founded in ...
equipment which sends the name along with the number. Mobile, CLEC,
Internet The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
or
independent Independent or Independents may refer to: Arts, entertainment, and media Artist groups * Independents (artist group), a group of modernist painters based in Pennsylvania, United States * Independentes (English: Independents), a Portuguese artist ...
exchanges also vary in their handling of caller name, depending on the switching equipment manufacturer. Calls between numbers in differing
country code A country code is a short alphanumeric identification code for countries and dependent areas. Its primary use is in data processing and communications. Several identification systems have been developed. The term ''country code'' frequently re ...
s represent a further complication, as caller ID often displays the local portion of the calling number without indicating a country of origin or in a format that can be mistaken for a domestic or invalid number. This results in multiple possible outcomes: * The name provided by the caller (in the analog telephone adapter configuration screen for voice-over-IP users or on the web interface on a spoofing provider) is blindly passed verbatim to the called party and may be spoofed at will * The name is generated from a telephone company database using the spoofed caller ID number. * A destination provider may display no name or just the geographic location of the provided
telephone area code A telephone numbering plan is a type of numbering scheme used in telecommunication to assign telephone numbers to subscriber telephones or other telephony endpoints. Telephone numbers are the addresses of participants in a telephone network, reach ...
on caller ID (''e.g.'', "ARIZONA", "CALIFORNIA", "OREGON", or "ONTARIO"). This often occurs where the destination carrier is a low-cost service (such as a VoIP provider) running no database or outdated data in which the number is not found. * If the displayed number is in the recipient's address book, some handsets will display the name from the local address book in place of the transmitted name. Some VoIP providers use Asterisk (PBX) to provide similar functionality at the server; this may lead to multiple substitutions with priority going to the destination user's own handset as the last link in the CNAM chain.


Legal considerations


Canada

Caller ID spoofing remains legal in Canada, and has recently become so prevalent that the
Canadian Anti-Fraud Centre The Canadian Anti-Fraud Centre (CAFC; formerly known as PhoneBusters National Call Centre) is Canada's national anti-fraud call centre and central fraud data repository. It was established in January 1993 in North Bay, Ontario, and is jointly ...
has "add dan automated message about he practiceto their fraud-reporting hotline". The CRTC estimates that 40% of the complaints they receive regarding unsolicited calls involve spoofing. The agency advises Canadians to file complaints regarding such calls, provides a list of protection options for dealing with them on its website, and, from July through December 2015, held a public consultation to identify "technical solutions" to address the issue. On January 25, 2018, the CRTC set a target date of March 31, 2019 for the implementation of a CID authentication system. On December 9, 2019, the CRTC extended this date, announcing that they expect STIR/SHAKEN, a CID authentication system, to be implemented by September 30, 2020. On September 15, 2020, the CRTC extended the target date one more time, changing it to June 30, 2021. The CRTC is formally considering making its target date for STIR/SHAKEN mandatory. On December 19, 2018, the CRTC announced that beginning in a year from that date, phone providers must block all calls with caller IDs that do not conform to established numbering plans.


India

According to a report from the India Department of Telecommunications, the government of India has taken the following steps against the CLI spoofing service providers: * Websites offering caller ID spoofing services are blocked in India as an immediate measure. * International long-distance operators (ILDOs), national long-distance operators (NLDOs) and access service providers have been alerted to the existence of such spoofing services, and shall collectively be prepared to take action to investigate cases of caller ID spoofing as they are reported. As per DOT, using spoofed call service is illegal as per the Indian Telegraph Act, Sec 25(c). Using such service may lead to a fine, three years' imprisonment or both.


United Kingdom

In the UK, the spoofed number is called the "presentation number". This must be either allocated to the caller, or if allocated to a third party, it is only to be used with the third party's explicit permission. Since 2016, direct marketing companies have been obliged to display their phone numbers. Any offending companies can be fined up to £2 million by
Ofcom The Office of Communications, commonly known as Ofcom, is the government-approved regulatory and competition authority for the broadcasting, internet, telecommunications and mail, postal industries of the United Kingdom. Ofcom has wide-rang ...
. In 2021, Huw Saunders, a director at Ofcom, the UK regulator, said the current UK phone network (Public Switched Telephone Network) is being updated to a new system (Voice Over Internet Protocol), which should be in place by 2025. Saunders said, "It's only when the vast majority of people are on the new technology (VOIP) that we can implement a new patch to address this problem f Caller ID spoofing" In November 2022, Lindsey Fussell, Group Director for Networks and Communications at Ofcom, commented on the ongoing efforts to combat call spoofing in the UK. Fussell emphasized the inherent challenges in implementing new measures to block spoofed calls, noting the importance of not impacting legitimate communications. Her remarks highlight the need for a balanced approach and continuous collaboration among stakeholders to adapt to the evolving tactics of scammers.


United States

Caller ID spoofing is generally illegal in the United States if done "with the intent to defraud, cause harm, or wrongfully obtain anything of value". The relevant federal statute, the Truth in Caller ID Act of 2009, does make exceptions for certain law-enforcement purposes. Callers are also still allowed to preserve their anonymity by choosing to block all outgoing caller ID information on their phone lines. Under the act, which also targets VoIP services, it is illegal "to cause any caller identification service to knowingly transmit misleading or inaccurate caller identification information with the intent to defraud, cause harm, or wrongfully obtain anything of value...." Forfeiture penalties or criminal fines of up to $10,000 per violation (not to exceed $1,000,000) could be imposed. The law maintains an exemption for blocking one's own outgoing caller ID information, and law enforcement isn't affected. ''
The New York Times ''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
'' sent the number 111-111-1111 for all calls made from its offices until August 15, 2011. The fake number was intended to prevent the extensions of its reporters appearing in call logs, and thus protect reporters from having to divulge calls made to anonymous sources. The ''Times'' abandoned this practice because of the proposed changes to the caller ID law, and because many companies were blocking calls from the well-known number. Starting in mid-2017, the FCC pushed forward Caller ID certification implemented using a framework known as STIR/SHAKEN. SHAKEN/STIR are acronyms for Signature-based Handling of Asserted Information Using toKENs (SHAKEN) and the Secure Telephone Identity Revisited (STIR) standards. The FCC has mandated that telecom providers implement STIR/SHAKEN-based caller ID attestation in the IP portions of their networks beginning no later than June 30, 2021. On August 1, 2019, the FCC voted to extend the Truth in Caller ID Act to international calls and text messaging. Congress passed the TRACED Act in 2019 which makes Caller ID authentication mandatory.Trump signs the TRACED Act, the first federal anti-robocall law
/ref>


See also

*
Caller ID Caller identification (Caller ID) is a telephone service, available in analog and digital telephone systems, including voice over IP (VoIP), that transmits a caller's telephone number to the called party's telephone equipment when the call is ...
* Truth in Caller ID Act of 2009 *


References


External links

* * * * * * {{cite magazine , author=''WIRED'' Staff , title=FCC Probes Caller-ID Fakers , url=https://www.wired.com/news/technology/0,70320-0.html , magazine=
Wired Wired may refer to: Arts, entertainment, and media Music * ''Wired'' (Jeff Beck album), 1976 * ''Wired'' (Hugh Cornwell album), 1993 * ''Wired'' (Mallory Knox album), 2017 * "Wired", a song by Prism from their album '' Beat Street'' * "Wired ...
, department=Science , date=March 2, 2006 Spoofing Confidence tricks Deception Telemarketing