The DU Lounge
Related: Culture Forums, Support ForumsSerious question for whoever has an answer
We all know about email addresses and social media accounts being compromised...but how does a telephone number get compromised? Context: I received a phone call today from "Microsoft" saying they had detected some sort of a problem with my computer and that I needed to follow their directions to "fix" the "problem." I know this is a scam and I've gotten several similar telephone calls over time. I always enjoy messing with the people on the other end of these calls until they eventually hang up in frustration over my refusal to give them the right answers.
After the guy who called today hung up on me, I called the number and asked to be put on their Do Not Call list. The lady on the other end told me they didn't have a Do Not Call list because they don't make outgoing calls. She asked me the reason for my request and I explained to her what had happened. She said that someone had apparently compromised their telephone number. So, back to my original question--how does a telephone number get compromised?
TreasonousBastard
(43,049 posts)I don't remember how they do it, but they just spoof the number on your caller ID.
It may not even have to be a real number-- just look like one to you. If it turns out to be a real number, they don't care.
Different Drummer
(7,603 posts)sharp_stick
(14,400 posts)Somehow, not sure exactly how, they fake the number they're calling from. Most of the scam calls I'm getting are local cell phone numbers.
htuttle
(23,738 posts)Just like there's no automatic validation of either of those two pieces of data built into either (email or phone) protocols, a disreputable, or lazy, phone network exchange, won't ensure that the number you are calling from is the same number you set as the outgoing caller ID.
In fact, sometimes it should be different, like when a customer service rep calls you from a large business, or a nurse from a hospital, they usually set the outgoing caller ID to that of the business's or hospital's main phone number, not the exchange that the person called from (even if it has it's own externally allocated phone number). Calling out from a Centrex group would be another example of when this is needed.
Most phone network providers require that you own the phone number you set as caller ID, just as most email servers require some sort of authentication now, but it's not a built-in thing.
unc70
(6,109 posts)When telephones were hard wired to the telephone companies and national PTT facilities, the caller ID was generated by the local telephone exchange based on the physical line initiating the call. This ID was then propagated through the tone based long distance network which had by then replaced the human operators.
When cell phones entered the scene, their phone numbers were mostly controlled by the equipment suppliers. All of this broke down with the arrival of things like PBX (private branch exchange) and VOIP (voice over Internet). I can set most of my phones to any caller ID I want. It is now just a trust-me system.