Another Caller ID Spoofing Operation Opens Its Doors

from the not-just-for-annoying-pranks dept

Remember a couple months back when someone tried to set up a business for collections agencies letting them spoof their caller ID? This was the same business that quickly shut down when the owner claimed he received death threats concerning the business. Well, now, with a bit more anonymity, another company is offering a similar service -- but this one (for a price) is open to anyone, not just collections agencies and private investigators. While this is mostly just used for pranks, it could have more serious consequences. As the article notes, some cell phones from T-Mobile use the caller ID to let you into your voicemail without a password -- a setting that many people leave on by default. Another potential misuse of such a system could be to jump on VoIP systems. A few companies are now coming out with bridge devices that let mobile phone subscribers call into their home VoIP system. The system recognizes the caller ID and gives the caller an outgoing dialtone, so they can make international calls on their mobile phones at VoIP prices. If you know the VoIP number and the mobile phone number of someone who has such a system, you could spoof their VoIP system into letting you make all the calls you wanted... on their bill.

Reader Comments

Subscribe: RSS

View by: Time | Thread

  • identicon
    Gary Potter, 28 Oct 2004 @ 7:02am

    Spoof Caller ID is alive and operating. Just not for the general public.

    reply to this | link to this | view in chronology ]

  • identicon
    Anonymous Coward, 31 Oct 2004 @ 7:55pm

    Not sure about that

    It seems to me your other misuse wouldn't quite work properly (with the current spoofing technology). It would seem to me that the bridging device would look for incoming wireless calls and the caller ID info there. That would mean a hacked cell phone (not such an improbable thing).

    However the current systems use a fixed line to call you and the intended phone number, but the spoofing occurs in the middle, not on your phone.

    Anyway, its a good point from a cell phone hacking point of view.

    reply to this | link to this | view in chronology ]

Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here
Get Techdirt’s Daily Email
Use markdown for basic formatting. HTML is no longer supported.
  Save me a cookie
Follow Techdirt
Techdirt Gear
Show Now: Takedown
Report this ad  |  Hide Techdirt ads
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Chat
Report this ad  |  Hide Techdirt ads
Recent Stories
Report this ad  |  Hide Techdirt ads


Email This

This feature is only available to registered users. Register or sign in to use it.