Who was this creep, [email protected]?

Same gut reaction I’d had to the phone call.

Cheech?

Same line of questions.

Alpha male courtship? Threat? Why?

And then I was angry.

Pulling air into my lungs, I punched Fernand Colbert’s number. He answered.

“Working on Saturday?” I asked.

“Got a wiretap in place.”

I knew not to ask details. “Hope my request isn’t jamming you up.”

Mais non. And I need the barbecue sauce.”

“Any luck with the trace?”

“Yes and no.”

“Well, then.”

“Let me explain. Phone companies track everything going in or out of a landline, with the possible exception of local calls that are handled within the same switcher. This is also true of cell phones.”

“This is the yes part.”

“Yes. Here’s how a cell call to a landline works. You dial a number on your mobile. It calls the closest tower. Using the same technology as your caller ID, it says, ‘I’m Tempe’s phone and I want to call 1-2-3-4-5.’ The tower sends your call to the MTSO, the central Mobile Telephone Switching Office, which connects to the land-based phone system. You with me?”

“So far. I have a feeling you’re getting to the no part.”

“The MTSO connects with the landline’s main exchange, which sends the call to the main exchange serving your destination. From there your call goes to the destination’s local exchange and then to the destination phone.

“At every stop your phone’s identification is logged because everybody who touches the call wants to get paid. Your number is not only associated with you but also with your carrier. The kicker is, all your information isn’t kept in one place, and companies won’t release it without a subpoena and reimbursement of the cost of looking it all up.

“The other kicker is that with some wireless services, you don’t need to provide any ID, much less valid ID, to start the service.”

“And any mope can buy a convenience store throwaway mobile.”

“Exactly. Having the phone number doesn’t help if you don’t know who owns the phone.”

“My mope called from a cell phone bought at a Wal-Mart,” I guessed.

“Or Costco or Kmart or Pop’s Dollarama. If it’s really important, we could find out where the phone was purchased, then check the store’s surveillance cameras, maybe nail the guy that way.”

“No. That’s a bit extreme at this point. But I have another request.”

“It’ll cost you a case.”

“You’ve got it, barbecue boy.”

I described the e-mail, but not the contents.

“Same jerk?”

“I’m not sure. Probably.”

“He threatening you?”

“Not overtly.”

“If the guy’s that canny with the phone, it’s probably pointless to try to track him through e-mail.”

“I thought you might say that.”

“Scenario. Guy drives around with a laptop equipped with a wireless card, lets it detect networks. When he finds one that’s unsecured, he sets up a Hotmail account using false information. Sends e-mail. Shuts down his laptop and drives away.”

“You can just sit in a car using another person’s network?”

Oui. The originating IP address belongs to someone who probably doesn’t even have logging to show there was another user on his network. Some geeks do it for sport. Call it wardriving, even if they’re on foot. They wander around looking for vulnerable wifi networks, sometimes make directional antennas out of Pringles cans. You can buy pens that flash green when you’re within thirty feet of a signal.”

Great. Something else to worry about.

“Here’s another trick,” Colbert said. “Many hotels have wireless networks they leave open so they don’t have to train the guests how to log in with a Service Set Identifier, or SSID, which can be up to thirty-two characters long. With a closed system the user has to key in, but with an open system the SSID is broadcast to all wireless devices within range. So if you pull into a parking lot between a couple of airport hotels, you can probably log into

Вы читаете Bones to Ashes
Добавить отзыв
ВСЕ ОТЗЫВЫ О КНИГЕ В ИЗБРАННОЕ

0

Вы можете отметить интересные вам фрагменты текста, которые будут доступны по уникальной ссылке в адресной строке браузера.

Отметить Добавить цитату