You are reading a single comment by @Dammit and its replies. Click here to read the full conversation.
  • Secondly, what you describe would require the most insane amount of inter system data sharing, the likes of which only exist in bullshit spy movies.

    There are probably simpler connections that can be made for that kind of stuff:-

    Twitter account -> mobile phone : from data records from the mobile phone company
    credit/debit card (from van hire) -> mobile phone : via bank accounts
    mobile phone -> location : even on coarse granularity of cell tower

    But still...

  • There are probably simpler connections that can be made for that kind of stuff:-

    Twitter account -> mobile phone : from data records from the mobile phone company
    credit/debit card (from van hire) -> mobile phone : via bank accounts
    mobile phone -> location : even on coarse granularity of cell tower

    But still...

    After the fact, yes - but ahead of/in real time? No, which is why all this stuff is useless from a prevention perspective, but can be handy in nicking the accomplice afterward, if they survive.

About

Avatar for Dammit @Dammit started