Brooklyn, NY – Controversial Caller ID Spoofing Company

    12

    Originally Posted 6/20/07 @ 9:45 AM

    Join our WhatsApp group

    Subscribe to our Daily Roundup Email


    Brooklyn, NY – Caller ID Spoofing, an innovative new system that allows one to call anonymously from any phone, is a local Brooklyn company making big waves with its explosive technology. SpoofCard directs the users to dial in any number from any phone and choose any number to appear on the Caller ID screen of whomever they are calling. Previously available only to law enforcement or savvy hackers, it can now be obtained by anyone with a credit card.

    Posing on the phone as a customer, employee, etc., scammers can easily obtain personal information from companies and individuals. Even police have been fooled by this technology, when SWAT teams surrounded an apartment complex after receiving spoofed calls about a hostage situation.

    The limits of Caller ID spoofing are not bound to the general public, as even the government is trying to get involved. After spoofing was used to deceive Pennsylvania voters with calls supposedly coming from a U.S Representative’s office, a bill was introduced in the Senate to make it some of its uses illegal such as posing as someone else to gain any sort of information. Several states have also taken the initiative to make spoofing for the use of fraud or intent to harm into a misdemeanor.

    Joel Schwartz, Chief Operating Officer of Spoofcard, released to VIN the following statement: “SpoofCard is a product based on a technology that is 100% legal. Similar to selling guns in WalMart it is not what you are selling but rather the intended use of the product. We work very close with Law Enforcement to make sure that this technology is NOT used as an aid to any sorts of fraud or harm. The SpoofCard is widely being used amongst doctors, lawyers and other professionals to maintain their services without jeopardizing their privacy or personal information. SpoofCard’s parent company Tel Tech Systems (www.teltechcorp.com) has a slew of other products, i.e lie detectors, etc. The accuracy is an amazing 94%. The need for these technologies are also questioned by some but we believe everyone should have the right to be able to maintain your privacy and discern who is telling the truth.”

    U/D 6/21/07 @ 11 AM
    The Senate is conducting a hearing on the legality behind Spoofing, in Capitol Hill today.


    Listen to the VINnews podcast on:

    iTunes | Spotify | Google Podcasts | Stitcher | Podbean | Amazon

    Follow VINnews for Breaking News Updates


    Connect with VINnews

    Join our WhatsApp group


    12 Comments
    Most Voted
    Newest Oldest
    Inline Feedbacks
    View all comments
    Anonymous
    Anonymous
    16 years ago

    Fact: The spoof card lets you get into someones voicemail if they dont have a password set for access when calling from their own number. I have done it a few times!!!

    Mark Levin is The Great One
    Mark Levin is The Great One
    16 years ago

    I have one of these on me for OVER A YEAR so it NOT new. I have used it to spoof friends but no one else. It would not have dawned on me to use it for illegal things.

    Anonymous
    Anonymous
    16 years ago

    does anyone know how to do email spoofing or phishing i think they call it

    Anonymous
    Anonymous
    16 years ago

    I use spoofcard.com services all the time for non -paying customers and proves very effectove ..i is totally legal

    Anonymous
    Anonymous
    16 years ago

    How is this new? Collection companies and banks have done it for years (CLID spoofing). These online services have been available for years as well. Heck even corporate phone systems and remote access modem banks that use PRI circuits have the exact same functionality….no hacking, just go to the GUI and change the caller id. These abilities and services have been out since the 90s…

    Oh and to the person who said about spoofing a cell number and getting voicemail.. no, that does not work…there’s more information transmitted to cell carriers than just CLID and up/down data semt from your cell… I’ve tested that with my own cell phone… and fortunately, no it did not allow login without passcode even when set to do so ….

    Anonymous
    Anonymous
    16 years ago

    hey people relax you could have so legitamate fun with this, i once called my brother-in-law on his cell phone and i had his home number displayed i told him i was hiding in his house somewhere it was a great 5 minutes of fun

    Anonymous
    Anonymous
    16 years ago

    Also, for example, someone could use your cellphone number and call your voicemail without a passcode.

    Anonymous
    Anonymous
    16 years ago

    How about the person who called me at 12:03 AM last week with some incoherent pre-recorded message- from a bogus number! How disgusting is that!

    Anonymous
    Anonymous
    16 years ago

    I, like many people, feel victimized by telephone calls claiming to raise money for Tzedaka. (More on the topic later).

    After one very rude call I checked the caller ID and found it was a fake number, 555-1212.
    The decision whether to give to a particular tzedaka is a personal one but no organization should colect funds behind a fake number.

    The business of fund raising is this.
    You get a call from someone seeming to be a volunteer that is involved with the organization. When you ask questions it becomes clear that the person does not know where the organization is or even the telephone number. I agree that the Org may still be legit but I hate those calls. The other variation is a frum mother making extra money calling from home at night. While they call me they claim they need to hide their caller ID for privacy, but they are provided with my name, address, tel. Number and donating history.
    The real problem may be that I can not afford to support all these organizations but the caller ID and fund raising topics merit discussion.

    Anonymous
    Anonymous
    16 years ago

    it’s about time people are realizing & taking action. I had the ability to do this with my company’s telephone system for over 3 years. While I took advantage of it, I never used it to pose as another individual or company. But it struck me then how dangerous the system was, & am I surprised it took so long for for action taken. I have a friend who was the victim of this fraud on 3 occassions. Basically the same person called posing from the offices of 3 different high-profile people. B’H he caught on eventually, however most people don’t understand the technology.