[1] Its use requires a physical connection to the circuit somewhere between the target premises and the exchange (in either the local loop or the access network), but when properly applied, results in a stealth-intensive incoming call that appears completely genuine but which cannot be electronically traced.
Typically, the user physically disconnects the target line from the network or causes an outage in the system, connects the vermilion box, and then initiates the illicit call.
The device incorporates the functions of three more basic phreaking boxes: In addition, a direct current (DC) source is required to supply power to the telephones on the target's line in the absence of the network.
[2] The use of a vermilion box has sometimes been posited as an element in socially-engineered spoofing attacks where the caller ID of an incoming call serves to implicitly identify an attacker as someone who is authorized to receive the desired information or system access.
However even if proven its efficacy in such operations was short-lived, as at approximately the same time telemarketers began using the ability of Primary Rate Interface (ISDN-PRI) connections to transmit caller ID information of their choosing as a means of increasing their contact rate, which quickly lead to widespread mistrust of caller ID among the public.