-
July 3rd, 2007, 08:12 AM
#21
Hmmmmm,
Strange as it may seem, but I believe that we actually agree?
1. Your "multilateration" is what I would describe as multiple or cross triangulation? Please be aware that I do not use your terminology........... I date back to chucking 105mm pills 11,000 yards or so........
2.
there absolutely is a circular area of probability the location systems determine someone to be within. However, you are inferring the concept of it only measuring an area around a single BTS
Bad expression on my part old chap!.............. my point was that you needed the initial point of contact as a reference? That will be the tower that the cell is using.
3.
are you suggesting that these phones are constantly calculating and uploading their current location to a system within the carrier?
Absolutely not! this is a service that you have to request or initiate. Your emergency call example is a case where this happens automatically? You need the capability, then you need to start it off?
4.
this is completely false. location services work just as well for prepaid phones as they do post paid. statements to the contrary are simply ridiculous and would suggest that E911 services would not work for people using prepaid phones (which hopefully everyone here knows isn't true)
Of course they do. I am going back to the fact that the original poster is a Bounty Hunter. You can tell me that a cellphone has dialled 911, and you can tell me approximately where it is located. YOU CANNOT TELL ME WHO DIALLED 911
Our Bounty Hunter is very interested in the "who" bit?
-
July 3rd, 2007, 08:32 AM
#22
Junior Member
You are correct. I lost reference as to the original posters intent. As you have suggested it is entirely possible to purchase a prepaid SIM without honestly representing your real identity (here in the states they actually ask your name and address sometimes but they don't verify it is real. if you pay with cash or a prepaid card then there's no problem) and have it's location be discoverable without directly correlating back to your real identity. However, how many of the people the bounty hunter is looking for have actually bothered with this? Probably only a fraction.
Note that more and more carriers are starting to build services for customers on top of the LBS (boost mobile is an example of one mvno doing this). As access to this data and these services gets pushed out closer to the general public, so does potential surface area for attack. Additionally, popular social networking services like http://www.dodgeball.com have people willingly sharing their whereabouts. Dodgeball even bothers to tell you their favorite hangout spots. For a bounty hunter it certainly couldn't hurt to at least look in places like this for info the "target?" is willingly distributing.
-p
-
July 3rd, 2007, 09:03 AM
#23
-
July 8th, 2007, 10:07 PM
#24
\"Greatness only comes at great risk.\" ~ Personal/Generic
-
July 10th, 2007, 12:54 AM
#25
Junior Member
Originally Posted by Acepi
As for illegal, so far as I know it is not illegal to do, they just won't put the software out for sale.
Too put this politely, YOUR COMPLETELY WRONG. This is completely illegal, without the authority of the company that provides the service to the cell phones. Such as if you tried to track your Gf's Cellphone that would be considered stalking, and you can get major jail time for it. so don't be stupid and try this you'll only end up going to jail.
-
April 18th, 2018, 01:38 PM
#26
Junior Member
I was under the impression that employers could install tracking software on a company cell phone as long as they knew it was installed on the device. (Reference: www.hillstone-software.com.) I know this is a grey area especially with the all the data breaches going on as well!
-
July 17th, 2018, 10:05 PM
#27
Junior Member
Thank you for all this information . This is a new way to breach information even though the information is usually on DMZs. Very inerested to see of mobile OS hacking proceeds
Similar Threads
-
By tataa9981 in forum Operating Systems
Replies: 1
Last Post: October 17th, 2006, 03:30 PM
-
By ric-o in forum AntiVirus Discussions
Replies: 5
Last Post: March 13th, 2005, 10:06 PM
-
By therenegade in forum Wireless Security
Replies: 33
Last Post: August 2nd, 2004, 11:34 PM
-
Replies: 1
Last Post: July 15th, 2002, 03:46 AM
-
By hot_ice in forum Other Tutorials Forum
Replies: 4
Last Post: March 15th, 2002, 08:14 PM
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|