[Req] Free caller ID spoofing?
Does anyone know if there is an app or a way to get some type of free caller ID spoofing besides spoofapp where you have to pay for minutes? Like some type of app that takes care of everything from the phone instead of having to go through a middleman like spoofcard.
I also noticed that there free 2 min call website tester doesn't work anymore, at lease for me.
The Real History of Caller ID Spoofing
The Early Days
Many people do not realize that Caller ID spoofing has been around since Caller ID was created. For over a decade Caller ID spoofing was used mainly by businesses with access to expensive PRI (Primary Rate Interface) telephone lines provided by local telephone carriers. A single PRI line can provided businesses with up to 23 telephone lines and all of these lines are capable of having unique telephone numbers. Caller ID spoofing, in it’s most basic form, was typically used by businesses to display one main telephone number on all outgoing calls, even though those calls were not really originating from those numbers.
Around the late 90’s and early 2000’s Private Investigators took notice of Caller ID spoofing in it’s most basic form and began purchasing these expensive PRI lines with the intent of selling access to other Private Investigators for a fee. These services were typically referred to as “blind lines” at that time. Private Investigators, concerned with their anonymity, would regularly use these blind line services to guarantee that their real telephone number would not be shown to the called party. Private Investigators knew first hand that Caller ID was not 100% blockable, and that toll free 800 numbers would typically be able to see their real Caller ID number, even if *67 (Caller ID Blocking) was used. Some of the providers that offered a blind line service were: US Tracers, Skip Tracey, Universal Communications, and IISNet. The services provided by these companies were marketed very discretely and only people with the P.I. industry typically knew about these services.
In the early 2000’s phone hackers, also known as “phone phreaks” or “phreaks”, began using Orange boxing to attempt to spoof Caller ID. Orange boxing is done by using a device, usually special computer software, to send a series of tones down the line during the first few seconds of a phone call, attempting to emulate the Caller ID signal sent from the telephone office. Orange boxing is very crude and unreliable, as it has to be done within a short timeframe at the beginning of a call. Phone phreaks, without access to PRI lines or blind line services at the time, thought the technique was clever.
In late 2003 and early 2004 the same phone phreaks began to explore a relatively new platform for developing voice applications, known as VoiceXML or VXML, which was offered by companies such as Voxeo. VoiceXML offers interactive voice applications, which are programmed in a similar fashion to HTML web sites. VoiceXML applications can easily be created to mimic functions of a normal PBX and typically these VXML providers are connected to PRI lines. Word began to spread around the phreaking underground that someone had created a VoiceXML application using Voxeo that let you change your Caller ID number. The Caller ID spoofing application worked, however it was somewhat crude, as the spoofed number had to be entered into the applications code and then re-uploaded to the VXML server before each use. Within a few days, phone phreaks figured out how to program these applications to allow you to enter the numbers you wanted to spoof over the phone, allowing you to fake your Caller ID on the fly, and began sharing the code on the Internet for others to use. To this day it’s still possible to spoof Caller ID with various VXML services, however people seemed to have found it easier to use other services and methods.
At the same time that people were discovering VoiceXML, VoIP (Voice Over IP) telephony started to become popular with savvy phone and Internet users and phone phreaks took notice very quickly. In 2003, phone phreak Lucky225 discovered a flaw with the VoIP provider Vonage that allowed users to send a fake Caller ID number by initiating a request to port your existing number to Vonage, but giving them any valid telephone number that you wanted to show as your Caller ID. At the same time, other phone phreaks began to use a new open source PBX software application, named Asterisk, to manipulate their Caller ID number. Phone phreaks and software developers figured out that Asterisk allowed users to set their Caller ID within the application and then pass the spoofed Caller ID number to their outbound VoIP provider or telco, in the same fashion that businesses had been setting their Caller ID with PRI lines for over a decade.
In August 2004 an entrepreneur named Jason Jepson announced that he would be launching and actively marketing a new Caller ID spoofing service for Private Investigators and Law Enforcement, using VoIP and Asterisk, named Star38. On September 1st, 2004 Star38.com officially launched and gained attention from mainstream media around the world after USA Today published a front-page article in its paper about the service. For the next few days Star38 was featured in newspapers and web sites around the world.
A week later, Jason Jepson announced that he would be selling Star38, as he claims to have been receiving death threats by hackers and phone phreaks. Many who have met Mr. Jepson since then claim that he made this story up to get even more attention and never really ended up selling Star38.
On October 27, 2004 Kevin Poulsen of SecurityFocus.com reported on Camophone launching the first public Caller ID spoofing site. While Star38 gained mass mainstream attention, it still only catered to Private Investigators and Law Enforcement officials. Camophone.com stepped in and was the first service to offer its service to anyone who was willing to purchase a prepaid calling card from its site. That same day, Telespoof launched its Caller ID spoofing service to compete with Star38. At the times of launch, Camophone.com only offered Caller ID spoofing by utilizing a web site callback interface, which Star38 also offered, however Telespoof.com offered service by using a toll free 800 number. Before the end of 2004, another Caller ID spoofing site named CovertCall would launch at CovertCall.com with both a web interface and toll free access. Both Camophone and CovertCall’s websites were very basic, with nothing more than a few lines of text and a login section.
In 2005 a handful of new sites allowing you to spoof your Caller ID were quietly launched. Some of the sites were PiPhone.com, CallNotes.net, SecretCalls.net, StayUnknown.com, SpoofTech.com, SpoofTel.com, and SpoofCard.com. During the same time Covertcall and then Camophone shut down, after they were hacked and their users information was traded around the Internet. Camophone even posted a note on their site that they were for sale, however no one seemed interested in buying the company. By the end of 2005, PiPhone closed down and even Star38, the company that started the mass marketing of Caller ID spoofing, closed down. During this time SpoofCard emerged as the dominant Caller ID spoofing provider with the most mass appeal. SpoofCard also was the first service to offer free call recording and a voice changer that allowed users to sound like a man or a woman, making it even more appealing to the public.