Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It goes in a contact log. If we assume that the contact log is in a database, then it goes on the pile with the rest of the stuff. Pen-testers and social engineering hackers' calls may also appear to be ridiculous calls.

edit: In addition to tracking incoming calls in a call log for NSA reasons. An NSA employee needs to keep that log to be able to explain their activities if they are ever audited.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: