home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky comp.dcom.modems:19933 alt.security:5359
- Path: sparky!uunet!ukma!bogus.sura.net!howland.reston.ans.net!zaphod.mps.ohio-state.edu!moe.ksu.ksu.edu!matt.ksu.ksu.edu!news
- From: holland@matt.ksu.ksu.edu (Rich Holland)
- Newsgroups: comp.dcom.modems,alt.security
- Subject: Re: Caller ID products?
- Date: 24 Jan 1993 13:49:59 -0600
- Organization: Kansas State University
- Lines: 17
- Message-ID: <1jurt7INNk3m@matt.ksu.ksu.edu>
- References: <C0wu1q.GK0@wsrcc.com> <1993Jan18.172024.20690@ssc.com> <1993Jan19.160818.8276@crd.ge.com> <1993Jan20.172626.11028@bernina.ethz.ch> <1993Jan21.173344.4911@crd.ge.com> <C18s8F.1qI@wsrcc.com> <1993Jan22.163947.18768@crd.ge.com>
- NNTP-Posting-Host: matt.ksu.ksu.edu
-
- davidsen@ariel.crd.GE.COM (william E Davidsen) writes:
-
- > And of course hunting for a random dialback time is likely to result
- >in a nice trace of calls from a single number, which the telco probably
- >could produce if motivated by a court order...
-
- But "they" can't start tracing until they know they're being hacked. And,
- unless the law has changed, traces require court orders to begin with. The
- business being cracked doesn't have the power to trace the phone calls,
- and the phone company won't (or shouldn't) do it and hand the offender
- over to them...
-
- --
- Rich Holland | INTERNET: holland@matt.ksu.ksu.edu
- 100 Jardine Terr., Apt A7 | BITNET : holland@ksuvm
- Manhattan, KS 66502-3357 | UUCP : ...!rutgers!matt.ksu.ksu.edu!holland
- char*p="char*p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);}
-