If he did call home what would be the issue? I would call that
circumstantial evidence. Plus do you really think that the "good" (in the
skills sense) criminal would fall into that trap? Some might, but they are
the ones that get caught and you don't need to worry about them.
Yes you can trace mobiles, but if it's not registered correctly you are
relegated to checking phone records and believe me they'll have another
phone. They can trace the phone if it is switched on to a particular cell
only. However if you get a good reception area and replace the SIM regularly
then the chances of them getting picked up are very very slim and the phone
conversation will be like all the others you get from call centres.... Trust
me Roland, this happens all the time.
When I worked for Orange they had over 50,000 phones registered to "Mickey
Mouse" - Now that might have DPA implications. PAYG phones are not
untraceable but there has to be certain types of use and registration
information that is not junk for a trace to be likely.
Simon Howarth.
-----Original Message-----
From: This list is for those interested in Data Protection issues
[mailto:[log in to unmask]] On Behalf Of Roland Perry
Sent: 09 November 2004 18:11
To: [log in to unmask]
Subject: Re: [data-protection] Yet another.............
In message <[log in to unmask]>, at
16:25:33 on Tue, 9 Nov 2004, "Simon Howarth (WSL)"
<[log in to unmask]> writes
>The usual thing is to buy a pay-as-you go SIM card and use this for
>making several calls. The SIM is then discarded and another one purchased.
>Virtually untraceable if used for a short period. That's why the trade
>calls them "MAFIA phones".
>
>The SIMs are cheap enough, but cost the perps nothing as they use
>stolen cards to buy the next SIM.
Yes, but would you accept a dodgy call like from a mobile? We don't yet know
where they called from. And PAYG phones aren't always as untraceable as you
think - has this chap never "called home" with it, for example.
--
Roland Perry
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at : -
http://www.jiscmail.ac.uk/help/commandref.htm
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|