| ▲ | boringg 6 hours ago | ||||||||||||||||
What no log files of who's accessing records? That seems super sketch. | |||||||||||||||||
| ▲ | aetherspawn 6 hours ago | parent | next [-] | ||||||||||||||||
I’m spitballing here but it seemed like his job was a kind of ITS/technician job in the core infrastructure, and it seemed like he didn’t need to go through normal channels to get the information he wanted, ie he could just like pcap a tower with a filter or whatever in a routine kind of way that I guess didn’t create any specific logs. If there were any relevant logs they would have had to give them to the police. And I know that at a high level Telcos are heavily regulated, so there should have been logs. | |||||||||||||||||
| ▲ | mr_toad 6 hours ago | parent | prev | next [-] | ||||||||||||||||
Doesn’t surprise me at all. I signed up for an internet plan with a provider once, but they never let me login to pay the bills. After they started threatening me with collections and several phone calls layer it turned out they were billing someone in a completely different city. Complete shambles. | |||||||||||||||||
| |||||||||||||||||
| ▲ | wil421 5 hours ago | parent | prev | next [-] | ||||||||||||||||
Bad actors will buy data from people and places where they don’t care. https://www.lighthousereports.com/methodology/surveillance-s... | |||||||||||||||||
| ▲ | woadwarrior01 6 hours ago | parent | prev | next [-] | ||||||||||||||||
I've seen people getting fired in BigTech for using the platform to stalk their ex-es. It's usually an alert that goes off when employees access internal dashboards for a certain profile, too many times. | |||||||||||||||||
| |||||||||||||||||
| ▲ | Zigurd 6 hours ago | parent | prev | next [-] | ||||||||||||||||
Some systems, like lawful intercept, are designed to be hidden even from telco network management systems. The LI console that set up a wire tap might log activity at that particular console at that particular law-enforcement agency. But if you don't know where to look exactly, good luck. This is why the Chinese picked lawful intercept as a hacking target for the salt typhoon exploit. It's almost impossible to know whether that exploit is continuing or when exactly it began. | |||||||||||||||||
| |||||||||||||||||
| ▲ | 5 hours ago | parent | prev [-] | ||||||||||||||||
| [deleted] | |||||||||||||||||