Caller ID spoofing

Last updated

Example of caller ID spoofed via orange boxing; both the name and number are faked to reference leetspeak Caller id spoof.PNG
Example of caller ID spoofed via orange boxing; both the name and number are faked to reference leetspeak

Caller ID spoofing is a spoofing attack which causes the telephone network's Caller ID to indicate to the receiver of a call that the originator of the call is a station other than the true originating station. This can lead to a display showing a phone number different from that of the telephone from which the call was placed. [1]

Contents

The term is commonly used to describe situations in which the motivation is considered malicious by the originator.

One effect of the widespread availability of Caller ID spoofing is that, as AARP published in 2019, "you can no longer trust call ID." [2] [3]

History

Caller ID spoofing has been available for years to people with a specialized digital connection to the telephone company, called an ISDN PRI circuit. Collection agencies, law-enforcement officials, and private investigators have used the practice, with varying degrees of legality. The first mainstream caller ID spoofing service was launched U.S.-wide on September 1, 2004 by California-based Star38.com. [4] Founded by Jason Jepson, [5] it was the first service to allow spoofed calls to be placed from a web interface. It stopped offering service in 2005, as a handful of similar sites were launched. [1] [6]

In August 2006, Paris Hilton was accused of using caller ID spoofing to break into a voicemail system that used caller ID for authentication. [7] Caller ID spoofing also has been used in purchase scams on web sites such as Craigslist and eBay. The scamming caller claims to be calling from Canada into the U.S. with a legitimate interest in purchasing advertised items. Often the sellers are asked for personal information such as a copy of a registration title, etc., before the (scammer) purchaser invests the time and effort to come see the for-sale items. In the 2010 election, fake caller IDs of ambulance companies and hospitals were used in Missouri to get potential voters to answer the phone. [8] In 2009, a vindictive Brooklyn wife spoofed the doctor's office of her husband's lover in an attempt to trick the other woman into taking medication which would make her miscarry. [9]

Caller ID spoofing has been used for prank calls, sometimes with devastating consequences. In December 2007, a teenager in Washington used a caller ID spoofing service to send a SWAT team to an unsuspecting victim's house. [10] In February 2008, a man from Collegeville, Pennsylvania was arrested for making threatening phone calls to women and having their home numbers appear "on their caller ID to make it look like the call was coming from inside the house." [11]

In March 2008, several residents in Wilmington, Delaware, reported receiving telemarketing calls during the early morning hours, when the caller had apparently spoofed the caller ID to evoke Tommy Tutone's 1981 hit "867-5309/Jenny". By 2014, an increase in illegal telemarketers displaying the victim's own number, either verbatim or with a few digits randomized, was observed as an attempt to evade caller ID-based blacklists. [12]

In the Canadian federal election of May 2, 2011, both live calls and robocalls are alleged to have been placed with false caller ID, either to replace the caller's identity with that of a fictitious person (Pierre Poutine of Joliette, Quebec) [13] or to disguise calls from an Ohio call centre as Peterborough, Ontario, domestic calls. See Robocall scandal.

In June 2012, a search on Google returned nearly 50,000 consumer complaints by individuals receiving multiple continuing spoofed voice over IP (VoIP) calls on lines leased / originating from "Pacific Telecom Communications Group" located in Los Angeles, CA (in a mailbox store), in apparent violation of FCC rules. Companies such as these lease out thousands of phone numbers to anonymous voice-mail providers who, in combination with dubious companies like "Phone Broadcast Club" (who do the actual spoofing), allow phone spam to become an increasingly widespread and pervasive problem. In 2013, the misleading caller name "Teachers Phone" was reported on a large quantity of robocalls advertising credit card services as a ruse to trick students' families into answering the unwanted calls in the mistaken belief they were from local schools. [14]

On January 7, 2013, the Internet Crime Complaint Center issued a scam alert for various telephony denial-of-service attacks by which fraudsters were using spoofed caller ID to impersonate police in an attempt to collect bogus payday loans, then placing repeated harassing calls to police with the victim's number displayed. [15] While impersonation of police is common, [16] [17] other scams involved impersonating utility companies to threaten businesses or householders with disconnection [18] as a means to extort money, [19] impersonating immigration officials [20] or impersonating medical insurers to obtain personal data for use in theft of identity. [21] Bogus caller ID has also been used in grandparent scams, which target the elderly by impersonating family members and requesting wire transfer of money. [22]

In 2018, one method of caller ID spoofing was called "neighbor spoofing", using either the same area code and telephone prefix of the person being called, or the name of a person or business in the area. [23]

Technology and methods

Caller ID is spoofed through a variety of methods and different technology. The most popular ways of spoofing caller ID are through the use of VoIP or PRI lines.

Voice over IP

In the past, caller ID spoofing required an advanced knowledge of telephony equipment that could be quite expensive. However, with open source software (such as Asterisk or FreeSWITCH, and almost any VoIP company), one can spoof calls with minimal costs and effort.

Some VoIP providers allow the user to configure their displayed number as part of the configuration page on the provider's web interface. No additional software is required. If the caller name is sent with the call (instead of being generated from the number by a database lookup at destination) it may be configured as part of the settings on a client-owned analog telephone adapter or SIP phone. The level of flexibility is provider-dependent. A provider which allows users to bring their own device and unbundles service so that direct inward dial numbers may be purchased separately from outbound calling minutes will be more flexible. A carrier which doesn't follow established hardware standards (such as Skype) or locks subscribers out of configuration settings on hardware which the subscriber owns outright (such as Vonage) is more restrictive. Providers which market "wholesale VoIP" are typically intended to allow any displayed number to be sent, as resellers will want their end user's numbers to appear.

In rare cases, a destination number served by voice-over-IP is reachable directly at a known SIP address (which may be published through ENUM telephone number mapping, a .tel DNS record or located using an intermediary such as SIP Broker). Some Google Voice users are directly reachable by SIP, as are all iNum Initiative numbers in country codes +883 5100 and +888. As a federated VoIP scheme providing a direct Internet connection which does not pass through a signaling gateway to the public switched telephone network, it shares the advantages (nearly free unlimited access worldwide) and disadvantages (ernet applications).

Service providers

Some spoofing services work similarly to a prepaid calling card. Customers pay in advance for a personal identification number (PIN). Customers dial the number given to them by the company, their PIN, the destination number and the number they wish to appear as the caller ID. The call is bridged or transferred and arrives with the spoofed number chosen by the caller—thus tricking the called party.

Many providers also provide a Web-based interface or a mobile application where a user creates an account, logs in and supplies a source number, destination number, and the bogus caller ID information to be displayed. The server then places a call to each of the two endpoint numbers and bridges the calls together.

Some providers offer the ability to record calls, change the voice and send text messages. [24]

Orange box

Another method of spoofing is that of emulating the Bell 202 FSK signal. This method, informally called orange boxing, uses software that generates the audio signal which is then coupled to the telephone line during the call. The object is to deceive the called party into thinking that there is an incoming call waiting call from the spoofed number, when in fact there is no new incoming call. This technique often also involves an accomplice who may provide a secondary voice to complete the illusion of a call-waiting call. Because the orange box cannot truly spoof an incoming caller ID prior to answering and relies to a certain extent on the guile of the caller, it is considered as much a social engineering technique as a technical hack.

Other methods include switch access to the Signaling System 7 network and social engineering telephone company operators, who place calls for you from the desired phone number.

Caller name display

Telephone exchange equipment manufacturers vary in their handling of caller name display. Much of the equipment manufactured for Bell System companies in the United States sends only the caller's number to the distant exchange; that switch must then use a database lookup to find the name to display with the calling number. Canadian landline exchanges often run Nortel equipment which sends the name along with the number. Mobile, CLEC, Internet or independent exchanges also vary in their handling of caller name, depending on the switching equipment manufacturer. Calls between numbers in differing country codes represent a further complication, as caller ID often displays the local portion of the calling number without indicating a country of origin or in a format that can be mistaken for a domestic or invalid number.

This results in multiple possible outcomes:

Canada

Caller ID spoofing remains legal in Canada, and has recently become so prevalent that the Canadian Anti-Fraud Centre has "add[ed] an automated message about [the practice] to their fraud-reporting hotline". [26] The CRTC estimates that 40% of the complaints they receive regarding unsolicited calls involve spoofing. [27] The agency advises Canadians to file complaints regarding such calls, [28] provides a list of protection options for dealing with them on its website, [29] and, from July through December 2015, held a public consultation to identify "technical solutions" to address the issue. [27] [29] [30]

On January 25, 2018, the CRTC set a target date of March 31, 2019 for the implementation of a CID authentication system. [31] [32] On December 9, 2019, the CRTC extended this date, announcing that they expect STIR/SHAKEN, a CID authentication system, to be implemented by September 30, 2020. [33] [34] On September 15, 2020, the CRTC extended the target date one more time, changing it to June 30, 2021. [35] The CRTC is formally considering making its target date for STIR/SHAKEN mandatory. [36] [35]

On December 19, 2018, the CRTC announced that beginning in a year from that date, phone providers must block all calls with caller IDs that do not conform to established numbering plans. [37]

India

According to a report from the India Department of Telecommunications, the government of India has taken the following steps against the CLI spoofing service providers:

As per DOT, using spoofed call service is illegal as per the Indian Telegraph Act, Sec 25(c). Using such service may lead to a fine, three years' imprisonment or both.

United Kingdom

In the UK, the spoofed number is called the "presentation number". This must be either allocated to the caller, or if allocated to a third party, it is only to be used with the third party's explicit permission. [39]

Starting 2016, direct marketing companies are obliged to display their phone numbers. Any offending companies can be fined up to £2 million by Ofcom. [40]

In 2021, Huw Saunders, a director at Ofcom, the UK regulator, said the current UK phone network (Public Switched Telephone Network) is being updated to a new system (Voice Over Internet Protocol), which should be in place by 2025. Saunders said, "It's only when the vast majority of people are on the new technology (VOIP) that we can implement a new patch to address this problem [of Caller ID spoofing]." [41]

In November 2022, Lindsey Fussell, Group Director for Networks and Communications at Ofcom, commented on the ongoing efforts to combat call spoofing in the UK. Fussell emphasized the inherent challenges in implementing new measures to block spoofed calls, noting the importance of not impacting legitimate communications. Her remarks highlight the need for a balanced approach and continuous collaboration among stakeholders to adapt to the evolving tactics of scammers. [42]

United States

Caller ID spoofing is generally legal in the United States unless done "with the intent to defraud, cause harm, or wrongfully obtain anything of value". The relevant federal statute, the Truth in Caller ID Act of 2009, does make exceptions for certain law-enforcement purposes. Callers are also still allowed to preserve their anonymity by choosing to block all outgoing caller ID information on their phone lines.

Under the act, which also targets VoIP services, it is illegal "to cause any caller identification service to knowingly transmit misleading or inaccurate caller identification information with the intent to defraud, cause harm, or wrongfully obtain anything of value...." Forfeiture penalties or criminal fines of up to $10,000 per violation (not to exceed $1,000,000) could be imposed. [24] The law maintains an exemption for blocking one's own outgoing caller ID information, and law enforcement isn't affected. [43] [44]

The New York Times sent the number 111-111-1111 for all calls made from its offices until August 15, 2011. The fake number was intended to prevent the extensions of its reporters appearing in call logs, and thus protect reporters from having to divulge calls made to anonymous sources. The Times abandoned this practice because of the proposed changes to the caller ID law, and because many companies were blocking calls from the well-known number. [45]

Starting in mid-2017, the FCC pushed forward Caller ID certification implemented using a framework known as STIR/SHAKEN. [46] [47] SHAKEN/STIR are acronyms for Signature-based Handling of Asserted Information Using toKENs (SHAKEN) and the Secure Telephone Identity Revisited (STIR) standards. The FCC has mandated that telecom providers implement STIR/SHAKEN-based caller ID attestation in the IP portions of their networks beginning no later than June 30, 2021. [46]

On August 1, 2019, the FCC voted to extend the Truth in Caller ID Act to international calls and text messaging. [48] Congress passed the TRACED Act in 2019 which makes Caller ID authentication mandatory. [49]

See also

Related Research Articles

<span class="mw-page-title-main">Telephone company</span> Organization that provides telephone and/or other telecommunications service

A telephone company is a kind of electronic communications service provider, more precisely a telecommunications service provider (TSP), that provides telecommunications services such as telephony and data communications access. Many traditional solely telephone companies now function as internet service providers (ISPs), and the distinction between a telephone company and ISP has tended to disappear completely over time, as the current trend for supplier convergence in the industry developes. Additionally, with advances in technology development, other traditional separate industries such as cable television, Voice-over IP (VoIP), and satellite providers offer similar competing features as the telephone companies to both residential and businesses leading to further evolution of corporate identity have taken shape.

Voice over Internet Protocol (VoIP), also called IP telephony, is a method and group of technologies for voice calls for the delivery of voice communication sessions over Internet Protocol (IP) networks, such as the Internet.

<span class="mw-page-title-main">911 (emergency telephone number)</span> Emergency telephone number

911, sometimes written 9-1-1, is an emergency telephone number for Argentina, Canada, Dominican Republic, Jordan, Mexico, Pakistan, Palau, Panama, the Philippines, Sint Maarten, the United States, and Uruguay, as well as the North American Numbering Plan (NANP), one of eight N11 codes. Like other emergency numbers around the world, this number is only intended for use in emergency circumstances. Using it for any other purpose is a crime in most jurisdictions. Penalties for abuse or misuse of 911 can range from probation or community service to fines and jail time. Offenders can also be ordered to undergo counseling and have their use of telephones restricted or suspended for a period time as a condition of probation.

Enhanced 911 is a system used in North America to automatically provide the caller's location to 911 dispatchers. 911 is the universal emergency telephone number in the region. In the European Union, a similar system exists known as E112 and known as eCall when called by a vehicle.

Caller identification is a telephone service, available in analog and digital telephone systems, including voice over IP (VoIP), that transmits a caller's telephone number to the called party's telephone equipment when the call is being set up. The caller ID service may include the transmission of a name associated with the calling telephone number, in a service called Calling Name Presentation (CNAM). The service was first defined in 1993 in International Telecommunication Union – Telecommunication Standardization Sector (ITU-T) Recommendation Q.731.3.

<span class="mw-page-title-main">Telecommunications relay service</span>

A telecommunications relay service, also known as TRS, relay service, or IP-relay, or Web-based relay service, is an operator service that allows people who are deaf, hard of hearing, deafblind, or have a speech disorder to place calls to standard telephone users via a keyboard or assistive device. Originally, relay services were designed to be connected through a TDD, teletypewriter (TTY) or other assistive telephone device. Services gradually have expanded to include almost any real-time text capable technology such as a personal computer, laptop, mobile phone, PDA, and many other devices. The first TTY was invented by deaf scientist Robert Weitbrecht in 1964. The first relay service was established in 1974 by Converse Communications of Connecticut.

Phone fraud, or more generally communications fraud, is the use of telecommunications products or services with the intention of illegally acquiring money from, or failing to pay, a telecommunication company or its customers.

VoIP spam or SPIT is unsolicited, automatically dialed telephone calls, typically using voice over Internet Protocol (VoIP) technology.

A naked DSL, also known as standalone or dry loop DSL, is a digital subscriber line (DSL) without a PSTN service — or the associated dial tone. In other words, only a standalone DSL Internet service is provided on the local loop.

In voice telecommunications, least-cost routing (LCR) is the process of selecting the path of outbound communications traffic based on cost. Within a telecoms carrier, an LCR team might periodically choose between routes from several or even hundreds of carriers. This function might also be automated by a device or software program known as a least-cost router.

<span class="mw-page-title-main">Video relay service</span> Video telecommunication service

A video relay service (VRS), also sometimes known as a video interpreting service (VIS), is a video telecommunication service that allows deaf, hard-of-hearing, and speech-impaired (D-HOH-SI) individuals to communicate over video telephones and similar technologies with hearing people in real-time, via a sign language interpreter.

Voice phishing, or vishing, is the use of telephony to conduct phishing attacks.

A robocall is a phone call that uses a computerized autodialer to deliver a pre-recorded message, as if from a robot. Robocalls are often associated with political and telemarketing phone campaigns, but can also be used for public service, emergency announcements, or scammers. Multiple businesses and telemarketing companies use auto-dialing software to deliver prerecorded messages to millions of users. Some robocalls use personalized audio messages to simulate an actual personal phone call. The service is also viewed as prone to association with scams.

Telemarketing fraud is fraudulent selling conducted over the telephone. The term is also used for telephone fraud not involving selling.

A nuisance call is an unwanted and unsolicited telephone call. Common types of nuisance calls include prank calls, telemarketing calls, and silent calls. Obscene phone calls and other threatening calls are criminal acts in most jurisdictions, particularly when hate crime is involved.

G3 Telecom is a telecommunications company based in Toronto. Established in 1999, it is a facilities-based telecommunications reseller registered with the Canadian Radio-television and Telecommunications Commission and U.S. Federal Communications Commission and serves customers in both countries with over 3 million calls processed monthly. It offers long distance, Voice over IP (VoIP) home phone, and an alternative international roaming service which is being offered under the sub-brand G3 Wireless. G3 Telecom is registered with the Better Business Bureau where it currently maintains an A+ rating.

The Truth in Caller ID Act of 2009 is an Act of the United States Congress that generally makes it illegal to use false Caller ID information for a call with the intent to defraud or scam a called party. The Act makes exceptions for certain law-enforcement purposes. Callers are also still allowed to preserve their anonymity by choosing to block all outgoing caller ID information on their phone lines. Caller ID spoofing is generally illegal in the United States if done "with the intent to defraud, cause harm, or wrongfully obtain anything of value"

STIR/SHAKEN, or SHAKEN/STIR, is a suite of protocols and procedures intended to combat caller ID spoofing on public telephone networks. Caller ID spoofing is used by robocallers to mask their identity or to make it appear the call is from a legitimate source, often a nearby phone number with the same area code and exchange, or from well-known agencies like the Internal Revenue Service or Ontario Provincial Police. This sort of spoofing is common for calls originating from voice-over-IP (VoIP) systems, which can be located anywhere in the world.

An SSA impersonation scam, or SSA scam, is a class of telecommunications fraud and scam which targets citizens of the United States by impersonating personnel of the Social Security Administration. SSA scams are typically initiated by pre-recorded messages, or robocalls, which are designed to panic the victim so that they follow the scammer's instructions. In 2018, over 35,000 incidences of SSA scam robocalls were reported to the Better Business Bureau, and the total losses of victims added up to over $10 million. It is believed that approximately 47% of Americans were subject to an SSA impersonation scam robocall during a three-month period in mid- to late 2020, and that 21% of seniors were targeted by at least three SSA scam robocalls in the same time period.

Avid Telecom is an American telecommunications company providing VoIP services. The company was established in 2000 and is based in Arizona.

References

  1. 1 2 Song, Jaeseung; Kim, Hyoungshick; Gkelias, Athanasios (October 1, 2014). "iVisher: Real-Time Detection of Caller ID Spoofing". ETRI Journal. 36 (5): 865–875. doi:10.4218/etrij.14.0113.0798. ISSN   1225-6463. S2CID   16686917.
  2. Doug Shadel. "Who's Calling". AARP Bulletin. p. 36.
  3. Herb Weisbaum. "Here are the best ways to block robocalls right now". You can't trust caller ID ... so how to do you stop the incessant ringing?
  4. Ken Belson (September 2, 2004). "A Commercial Software Service Aims to Outfox Caller ID". The New York Times .
  5. "Citing threats, entrepreneur to quit caller ID venture". September 11, 2004.
  6. Company, Tampa Publishing. "Caller ID spoofing service hangs it up". Tampa Bay Times. Retrieved September 4, 2021.
  7. Robert McMillan (August 25, 2006). "Paris Hilton accused of voice-mail hacking". InfoWorld . Retrieved June 14, 2015.
  8. Kansas City Star, "Fake called IDs used in Missouri elections" David A. Lieb, Associated Press. Sun. November 14, 2010.
  9. "Enraged Brooklyn wife Kisha Jones stole doc's Rx pad to prescribe drug to abort baby of hubby's lover". New York Daily News . Archived from the original on December 8, 2009. Retrieved April 24, 2011.
  10. "Hacking caller id systems on the rise". Fox16.com. Archived from the original on October 23, 2008. Retrieved December 14, 2007.
  11. KYW Newsradio 1060 Philadelphia – Man Pleads Guilty to Making Scary Phone Calls Archived March 16, 2008, at the Wayback Machine (link rot)
  12. "The Caller ID Scam You Must Know About". The Fiscal Times. Retrieved June 14, 2015.
  13. Payton, Laura (February 28, 2012). "Robocalls phone number registered to 'Pierre Poutine'". CBC News. Retrieved March 11, 2012.
  14. "Robocallers Impersonate Teachers On Caller ID, Scare Parents". Consumerist. October 4, 2013. Retrieved June 14, 2015.
  15. "IC3 Scam Alerts (January 7, 2013)" (PDF). ic3.gov.
  16. Carmen Duarte Arizona Daily Star. "Pima County Sheriff's detectives alert public about scam". Arizona Daily Star. Retrieved June 14, 2015.
  17. "Authorities Warn About Scam Artists Posing As Law Enforcement Officers In Camden County". October 9, 2013. Retrieved June 14, 2015.
  18. "FTC asked to probe fraudulent calls to restaurants".
  19. Nick Sloan. "Kansas City Kansan: BPU warns customers of phone-scam" . Retrieved June 14, 2015.
  20. "Beware: widespread immigration-related fraud schemes currently on the rise!". October 9, 2013. Retrieved June 14, 2015.
  21. "Scammers busy under guise of Obamacare". CBS News.
  22. "Fort Stockton resident latest victim of Grandparent Scam". The Fort Stockton Pioneer. Archived from the original on February 23, 2014. Retrieved June 14, 2015.
  23. "A New Kind of Phone Scam: Neighbor Spoofing". Better Business Bureau. May 11, 2018. Retrieved November 21, 2019.
  24. 1 2 "Don't Believe Your Eyes: Spoofing".
  25. "Phone book – VoIP.ms Wiki". wiki.voip.ms.
  26. Cummings, Madeleine. (August 12, 2015). "The call is coming from inside your house: Caller ID spoofing becoming more frequent for frustrated Canadians". National Post . Retrieved January 25, 2016.
  27. 1 2 "CRTC seeks solutions to help Canadians protect themselves from unsolicited and illegitimate calls". July 23, 2015. Retrieved January 22, 2016.
  28. "What You Should Know About Telemarketing in Canada". CRTC. November 26, 2014. Retrieved January 22, 2016.
  29. 1 2 "CRTC publishes a summary of protection options currently offered for spoofed and unsolicited calls". CRTC. November 20, 2015. Retrieved January 22, 2016.
  30. Bradshaw, James (July 24, 2015). "CRTC aims to combat 'spoofing' by telemarketers". The Globe and Mail . Retrieved January 22, 2016.
  31. "Canadian Regulator Mandates Caller ID Authentication". January 28, 2018.
  32. "Compliance and Enforcement and Telecom Decision CRTC 2018-32". Canadian Radio-television and Telecommunications Commission (CRTC). January 25, 2018. Retrieved September 24, 2020.
  33. "CRTC calls on telecoms to adopt new tool to tackle 'spoofed' phone scams". The Globe and Mail. Retrieved December 10, 2019.
  34. "Compliance and Enforcement and Telecom Decision CRTC 2019-402". Canadian Radio-television and Telecommunications Commission (CRTC). December 9, 2019. Retrieved September 24, 2020.
  35. 1 2 "Compliance and Enforcement and Telecom Decision CRTC 2019-402-2". Canadian Radio-television and Telecommunications Commission (CRTC). September 15, 2020. Retrieved September 24, 2020.
  36. "Compliance and Enforcement and Telecom Notice of Consultation CRTC 2019-404". Canadian Radio-television and Telecommunications Commission (CRTC). December 9, 2019. Retrieved September 24, 2020.
  37. "Implementation of universal network-level blocking of calls with blatantly illegitimate caller identification". crtc.gc.ca. CRTC. December 19, 2018. Retrieved December 19, 2018.
  38. Harish Kumar, ITS. "Call (Calling Line Identification) spoofing services Offered through websites – Study of Modus Operandi, Impact and Regulatory Framework in India".
  39. Director General of Telecommunications (December 11, 2003). "Guidelines for the provision of Calling Line Identification Facilities and other related services over Electronic Communications Networks Version 2 (amended 26 April 2007)". ofcom. Retrieved January 9, 2012.
  40. Finnigan, Lexi (April 24, 2016). "Cold callers forced to display numbers following change in law". The Telegraph. ISSN   0307-1235 . Retrieved August 24, 2018.
  41. Whitworth, Dan (May 2, 2021). "Don't trust caller ID on phones, says Ofcom". BBC News. Retrieved May 2, 2021.
  42. "Combating Call Spoofing: The UK's Strategy and Timeline for a Safer Telecom Future". UnknownPhone. December 13, 2023. Retrieved December 13, 2023.
  43. "Congress outlaws all Caller ID spoofing (VoIP too)". Ars Technica. April 15, 2010. Retrieved June 14, 2015.
  44. "Caller ID and Spoofing" . Retrieved June 14, 2015.
  45. Peters, Jeremy W. (August 12, 2011). "At The Times, Era of '111-111-1111' Nears Its End". The New York Times (Media Decoder blog). Retrieved August 12, 2011.
  46. 1 2 Pai, Ajit (2017). "Combating Spoofed Robocalls with Caller ID Authentication". FCC.
  47. Brodkin, Jon (February 14, 2019). "Ajit Pai orders phone companies to adopt new anti-robocall tech in 2019". Arstechnica.
  48. Reardon, Marguerite. "FCC gets authority to go after international illegal robocallers". CNET. Retrieved August 7, 2019.
  49. Trump signs the TRACED Act, the first federal anti-robocall law