answersLogoWhite

0


Best Answer

No. It would take 'spoofing' the information provided to the phone company.

This would normally require rerouting a call through a controlled PBX (private branch exchange) to provide the incorrect outbound caller id.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Can software be used to make a phone call appear to come from another phone number A bomb threat was made using a phone number that was not able to make out going calls?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What branch of law enforcement deals with the use of software such as Spoof card to make bomb threat calls using someone else's phone number as caller ID?

It should be handled by the agency investigating the bomb threat.


Is software piracy a real threat to software industry?

if you are Virtual university student then make the assignment your self Cs001


What services does FortiCare offer?

FortiCare is a online service that offers protection from malicious software. They sell firewalls, web filtering, threat protection, and threat management.


What happens if you appear in White House unexpectedly?

If you appear to be harmless and not a threat, expect to be arrested, charged with criminal trespass and related violations, and serve some jail time. If you appear to be a threat, there are plenty of people with guns (Uzi, M16, sniper rifles, and more) who would have something loud to say about the visitor.


What is the greatest threat to the data stored on a personal computer?

Viruses, probably (if you're talking about software)


What is another word for ultimatum?

final demand (with a threat)


Is threat fire antivirus compatible with AVG antivirus?

Yes it is compatible with all anti virus software.


What is the number one threat to lab workers?

no.one threat is to work without wearing gloves in hands.


Which tool can be used to remove these unwanted files?

Ccleaner is one of the good software program to remove unwanted and temp files. Another anti-virus program software like MacAfee and trend micro are good at keeping your system safe from Trojan horse or virus threat.


What are the threat of buying another company in the same industry?

m&a


An unlawful threat or attempt to do bodily injury to another is?

Assault. It involves the intentional creation of a reasonable apprehension of harm or offensive contact in another person. It does not require physical contact, only the threatened action.


What type of software does Syncopation make?

Syncopation is a leading designer of software to enable and facilitate the decision making process in the business world. It designs and produces software to help Risk analysis, decision analysis and threat assessment.