Preview

How to Use *57 to Trace a Phone Call

Good Essays
Open Document
Open Document
333 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
How to Use *57 to Trace a Phone Call
How to Use *57 to Trace a Phone Call
Call trace is a premium service option provided by AT&T that is available to corporate bodies and individuals who receive threatening, harassing and obscene calls that warranty legal action. It is either available at a fee or at an upfront payment with the company. This service allows you to initiate an automatic trace for the last call that you’ve received. To achieve this, you either activate the option by dialing the designated code *57 or by dialing 1157 if are you are using a rotary dial phone. The information received is recorded by the company but is kept private and confidential. To successfully trace a call, the following step by step procedure should be followed; immediately after receiving the call, hang up the phone or receiver and wait for a dial tone. Press or dial the activation code *57 or dial 1157 if you have a rotary press or dial phone. Wait for a confirmation message that will notify you if the call has been successfully traced. You will then receive instructions and a number to call in case you want to take a legal action. However, if the trace will be unsuccessful, you will receive an error message that will notify you that the given call is untraceable. AT&T usually records and saves the information i.e. date, time and phone number until you call them at 800.288.2020 if you want to pursue criminal investigations. You will then receive an authorization form to sign before the phone number is disclosed and given to the law enforcers for investigation. Ultimately, you will be required to work with the team of investigators to provide any moral support where necessary. For future reference, follow up on the case and obtain any crucial information for documentation purposes. This would include such details as; the police case number, the law enforcement person handling the case and the telephone number of the law

You May Also Find These Documents Helpful

  • Powerful Essays

    Informant Movie Quiz

    • 1163 Words
    • 3 Pages

    12. Mark states that he was coached to tell the FBI to tell that the caller called on the business line and not on his personal line. Mark goes on to state that the information he has is based on
-price fixing in the Lysine business…

    • 1163 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    FBLA

    • 666 Words
    • 3 Pages

    Last week, an unidentified, well spoken, educated, and knowledgeable caller provided me with the following detailed information:…

    • 666 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The Telephone Consumer Protection Act (TCPA) was passed in 1991 was implemented because of the increasing amount of commercial solicitation calls consumers were receiving. The act laid out rules that companies must abide by when marketing through the telephone. Some of these rules consisted of providing the solicitor’s name, the name of the entity whose behalf the call is being made, and a telephone number or address where they can be contacted. Another is that solicitation calls can only be made between the hours of 8 am and 9 pm. Finally telemarketers must abide by any do not call requests from consumers. According to "Unwanted Telephone Marketing Calls" (2013), “ In June 2003, the FCC supplemented its original rules implementing the TCPA and established, together with the Federal Trade Commission (FTC), the national Do-Not-Call list.” George W. Bush signed the Do-Not-Call Implementation Act into law on June 11th, 2003. This Act in conjunction with the TCPA, the Do-Not-Call Implementation Act is also here to protect the consumer from unwanted phone calls. There is a grace period of 31 days that the consumer has to put their phone number on this list from the day the number is registered.…

    • 453 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Which of the following can be used to keep a record of incoming telephone calls so that no message is overlooked? Telephone log…

    • 750 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Bis 220 Week 1

    • 470 Words
    • 2 Pages

    EPIC - Telemarketing and the Telephone Consumer Protection Act (TCPA). (n.d.). EPIC - Electronic Privacy Information Center. Retrieved February 12, 2013, from http://epic.org/privacy/telemarketing/#law…

    • 470 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Human Resources 590

    • 533 Words
    • 2 Pages

    Screens calls Forwards all calls where she could have provided information Please make sure to screen all calls properly with who, what and when questions 2…

    • 533 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Dipatch Interview

    • 851 Words
    • 4 Pages

    While reading the article Consolidated 911 Center (2012) it mentioned that cell phones and landlines route calls differently. While using a landline, the call is able to be routed to the dispatch by the telephone cables all…

    • 851 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    How to Tell if a Cell Phone Is Being MonitoredHow to Tell if a Cell Phone Is Being Monitored…

    • 464 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The scene is set, the information at this time is incomplete. However, with the little information that has been received we can identify that this situation at the present time is a hostage situation. A hostage situation defined as “involves the taking of a person captive for instrumental or tangible reasons; the suspect needs the police or other authorities to meet specific demands (e.g., ransom, transportation, money). In these events, the captive is used as leverage to obtain other substantive goals” (p. 535 Elsevier). With the subject refusing to take phone calls it can be identified that the situation is already in the crisis stage. It is during this stage in which multiple things need to happen. While in…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cell Phone Privacy

    • 655 Words
    • 3 Pages

    A. Whenever you use your cell phone, you are being tracked. Whether you are using an app or connecting to Wi-Fi, your phone company knows where you are and what you are doing.…

    • 655 Words
    • 3 Pages
    Good Essays
  • Good Essays

    government tracking

    • 1009 Words
    • 5 Pages

    Terry Allen’s article gives us a much stronger sense that cell phone tracking technology is…

    • 1009 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    The organisational procedures when making and receiving telephone calls can vary from business to business, but there are some similarities. There is usually a general guidance and training for staff and especially for the reception staff.…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The topic that I’m going to discuss is Government Tracking Our Cell Phones and Devices. This essay is going to be about why I disagree with it and why they shouldn’t be allowed to do it. I’m going to be stating facts and expressing my own opinions on it throughout the essay.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    “Carpenter’s defense attorney Harold Gurewitz tried to get the lower courts to exclude information obtained from MetroPCS, arguing that the cell phone records could be seized only with a warrant supported by probable cause” (Greenemeir 1) This is an example of how a carrier will not give out your information without a proper cause. You can try and try all you want, but without a proper reason to search, you are wasting your time. Another thing is, your carrier gets your location because your device is constantly searching for the nearest cell phone tower to get the strongest connection possible. “To get a signal so it can make or receive a call, a cell phone establishes a radio connection with a nearby tower called a cell site. As the user moves, the device constantly scans for nearby towers for the strongest connection” (Greenemeir 1) This sends your location to your carrier constantly, so they know your location all the time. Without the warrant, police cannot get the access they need because they do not have the proper reason to track you. Your information is safe with your carrier until they have a reason to search your…

    • 1039 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Cyber Crime Awareness

    • 1690 Words
    • 7 Pages

    The "phone phreakers" of three decades ago set a precedent for what has become a major criminal industry. By gaining access to an organisation's telephone switchboard (PBX) individuals or criminal organisations can obtain access to dial-in/dial-out circuits and then make their own calls or sell call time to third parties. Offenders may gain access to the switchboard by impersonating a technician, by fraudulently obtaining an employee's access code, or by using software available on the internet. Some sophisticated offenders loop between PBX systems to evade detection. Additional forms of service theft include capturing "calling card" details and on-selling calls charged to the calling card account, and counterfeiting or illicit reprogramming of stored value telephone cards. It has been suggested that as long ago as 1990, security failures at one major telecommunications carrier cost approximately £290 million, and that more recently, up to 5% of total industry turnover has been lost to fraud.…

    • 1690 Words
    • 7 Pages
    Powerful Essays