He opened his laptop and pulled up a public SS7 monitoring tool—a hobbyist’s window into the phone network’s skeleton. He filtered by Clara’s prefix.
Clara didn’t press 1. She’d read the news. Instead, she called her neighbor, Leo, a retired network engineer who still kept a vintage UNIX terminal in his garage for fun. comcast block calls
She scrolled. Her stomach dropped. Her sister’s number. Twice. Her boss. Her dentist’s office. All from the past hour. None had rung. He opened his laptop and pulled up a
It was 3:47 PM on a Tuesday when Clara’s phone buzzed with the automated voice she’d come to dread. She’d read the news
That night, Leo sat on his porch with a glass of bourbon. Clara joined him.
The scam was elegant: Block the real calls. Spoof the carrier’s number. Call the victim, claim a security breach, and ask them to “verify” their account by reading back the two-factor code sent via SMS. That code wasn’t for Comcast—it was for their bank. By 4:00 PM, Clara had driven to Leo’s house. He had a landline—an actual copper wire landline, untouched by Comcast’s VoIP infrastructure. He picked up the receiver and dialed Clara’s cell.
But one missed call stood out. It was from her bank’s fraud department, timestamped 2:15 PM that same day. Urgent: Suspicious login from unknown device. Please call us.