Back to the main page

Mailing List Logs for ShadowRN

From: Quid Non <jdfalk@****.COM>
Subject: Re: Dangers Of Portable Phones: Pt II
Date: Tue, 22 Mar 1994 00:12:08 -0500
As for now, whether or not the FBI can _legally_ trace cellular
phones will only make a difference on whether or not they mention it when
in court. They'll do it. They probably already are.
Now, as to 2054, it should _not_ be easy for a decker to get into
the phone companies' records and find out somebody's unlisted number. On
the other hand (and this is pure conjecture), it would probably be easier
to get into the cellular systems and locate somebody whose number you
already know.
So, here's a thought, based on current technology. A cellular
phone users' phone number is one of _thousands_ of numbers that connects
directly to the cellular phone company's systems. The company probably
has a completely different identification "number" which its system uses
to locate and talk to specific phone units.
This makes it harder on the decker.
My thought is that if you already know where somebody is and find
out what pulse their phone is sending out, you can find them again,
provided that pulse doesn't change. But it would take a _lot_ of
extremely dangerous 'netrunning to find somebody's cellular phone pulse
when all you have to start with is their name.
Also, you would _have_ to triangulate the signal in order to find
out where it is. Technologically speaking, there is no other way to do
it, because the phone broadcasts in all directions at once. And, _all_
the cel "antennas" send out the signal for _every_ call, so that a phone
user can move from cel to cel while driving, or whatever.

It can be done. But it sure as Hell can't be done but a single
decker, or even a small team of deckers. This would take a lot of work,
as you can imagine.

/-----------------\
| J.D. Falk | "You are watching Cable 10,
| jdfalk@****.com | Aurora, Illinois community access programming."
\-----------------/ -Saturday Night Live

(Geek Code 1.0.1) GAT -d+(?) -p+(--) c++ l u+ e* m+(*)
s+ n@ h* f+(++) !g w+ t+ r+(++) y+

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.