Scammers employ caller ID spoofing to disguise their true identities during fraudulent calls. This technique involves deliberately falsifying the information transmitted to your caller ID display, making it appear as though the call originates from a trusted source, such as a local number, government agency, or reputable company.
To achieve this, many scammers utilize Voice over Internet Protocol (VoIP) services, which allow them to manipulate the caller ID information displayed to the recipient. By exploiting VoIP technology, they can make it seem as though their calls are coming from legitimate or familiar numbers, thereby increasing the likelihood that the recipient will answer and trust the call.
This method not only conceals the scammer's actual phone number but also makes it challenging for authorities to trace the call back to its true origin, thereby protecting the scammer's identity. The Federal Communications Commission (FCC) has acknowledged the prevalence of such tactics, noting that scammers often use neighbor spoofing to make it appear that an incoming call is coming from a local number, or spoof a number from a company or government agency that you may already know and trust.
To mitigate these fraudulent activities, regulatory bodies have introduced frameworks like STIR/SHAKEN, which are protocols and procedures intended to combat caller ID spoofing on public telephone networks. These frameworks aim to authenticate caller identities and reduce the effectiveness of spoofing.
For a visual explanation of how scammers spoof phone numbers, you might find this video informative: