Definition

caller ID spoofing

Caller ID spoofing is a service that allows a caller to masquerade as someone else by falsifying the number that appears on the recipient's caller ID display. Just as e-mail spoofing can make it appear that a message came from any e-mail address the sender chooses, caller ID spoofing can make a call appear to come from any phone number the caller wishes.

Caller ID spoofing is provided as a service by a number of vendors. Here's one example of how it works: A customer pays in advance for a certain number of calling minutes. To set up a call, the customer opens a Web form and enters their phone number, the recipient's phone number, and the number chosen to appear on the recipient's caller display. The service then patches the call through between the caller and recipient phones as stipulated. Some other services involve having the caller dial a number to access the service and then dial the phone numbers.

Caller ID spoofing has been available for years to people with a specialized digital connection to the telephone company. Collection agencies, law enforcement officials, and private investigators have used the practice, with varying degrees of legality. However, the advent of VoIP (voice over Internet Protocol) service makes it simple for the average person to falsify a calling number, and as Internet telephony has become more common, so has caller ID spoofing.

Frequently, caller ID spoofing is used for prank calls. For example, someone might call a friend and arrange for "The White House" to appear on the recipient's caller display. However, according to Lance James, chief technology officer (CTO) of Secure Science Corp., criminal uses of caller ID spoofing, such as identity theft and vishing (VoIP or voice phishing), have also increased significantly.

This was last updated in February 2008
Posted by: Margaret Rouse

Email Alerts

Register now to receive SearchTelecom.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More News and Tutorials

  • Deep Packet Inspection primer

    This deep packet inspection primer looks at how network operators use DPI for traffic management and analysis, and how net neutrality principles have made its use controversial.

  • ISP simplifies acquisition consolidation with network discovery tool

    A wholesale ISP that has grown by acquisition has deployed a network discovery tool to simplify network mapping for its hodgepodge of inherited network devices.

  • Telecom tutorials

    SearchTelecom.com's tutorials offer expert insight, technical tips and best practices on core and access networks, IPTV, fixed mobile convergence, VoIP, WiFi/WiMax, wireless and mobile devices, MPLS, service areas, network operations and more.

Do you have something to add to this definition? Let us know.

Send your comments to techterms@whatis.com

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: