To my understanding you must call from within the network in order for the caller-id authentication to work, making things like Asterisk useless, wich can manipulates caller id through voip vulnerabilities. Phone modification could be another story.
_________________________
"Even the on highest throne, one still sits on their ass"