home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!news.miami.edu!ncar!elroy.jpl.nasa.gov!ames!saimiri.primate.wisc.edu!zaphod.mps.ohio-state.edu!news.acns.nwu.edu!telecom-request
- Date: Tue, 26 Jan 93 12:29:21 GMT
- From: Graham Toal <gtoal@pizzabox.demon.co.uk>
- Newsgroups: comp.dcom.telecom
- Subject: Re: Do Telcos Record the Numbers of Local Calls?
- Message-ID: <telecom13.45.7@eecs.nwu.edu>
- Organization: TELECOM Digest
- Sender: Telecom@eecs.nwu.edu
- Approved: Telecom@eecs.nwu.edu
- X-Submissions-To: telecom@eecs.nwu.edu
- X-Administrivia-To: telecom-request@eecs.nwu.edu
- X-Telecom-Digest: Volume 13, Issue 45, Message 7 of 7
- Lines: 32
-
- Not exactly. Think about this -- the call was placed from a payphone,
- and they didn't know which one -- they just knew the called number.
- Unless the logs for the called number now include the calling number
- of incoming calls, we can conclude that the telco has structured its
- data so that you can do a fast search on the called number, ie the
- data is indexed by both callers number (for billing) and called number
- (for security services purposes).
-
- This is exactly what I said some years ago that the UK System X
- service does. I can even make an educated guess that the data
- structure used to index the phone numbers is a linked dag, and that
- the lookup is almost instantaneous. (Heck, even with an ISAM it would
- be pretty fast ...)
-
- Over here, the over-the-shelf phone cards have serial numbers, so even
- though they're anonymous, the security services can still find out who
- all the other people you called are even if they found your call to a
- single target. Anonymity of payphones is an illusion.
-
- Also, in London, a great many public phones are in areas covered by
- security cameras. This is how they caught an hoax bomb caller last
- year -- they picked him up in the area minutes after making a call on
- a payphone.
-
- BTW, there's some commercial neural net software out now for detecting
- cliques in graphs. Want to bet its first application was studying
- phone network logs?
-
-
- G
-
-