Slash Boxes
NOTE: use Perl; is on undef hiatus. You can read content, but you can't post it. More info will be forthcoming forthcomingly.

All the Perl that's Practical to Extract and Report

The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
More | Login | Reply
Loading... please wait.
  • To fiddle with your CLID you need to be able to speak SS7. Even so, you *can* still be traced.

    As an example, Alice PBX fiddles with her CLID, places a call which transit's Bob Telecom's network, and is terminated by Clare Telecom. Clare Telecom uses CLID to make some charge against Dave. Dave disputes the bill, Clare looks in her records to see where (which physical connection) the call came from, and sees that it came in from Bob Telecom. Bob can trace the call back from where it left his network to where it entered, and so pin the blame fairly and squarely on Alice.

    Unlike ISPs, telcos have the advantage of keeping records of all connections on their network for billing purposes (yay circuit switching!), are aware of the dangers posed to their businesses by fraudulent use of the network so have people in place to deal with it, plus they operate in a regulatory and legal framework which can cope with just this sort of problem.