DEFINITY ECS Release 8.2
Administrator’s Guide
555-233-506 Issue 1
April 2000
Features and technical reference
1424Malicious Call Trace
20
— You may lose continuity on the trace because the person activating
MCT on the second switch may not be the MCT controller.
■If a malicious call comes in on a non-ISDN trunk, the controller needs the
telephone number for the connecting switch and a cross-reference of
system-trunk port numbers (including DS1 channel number, if appropriate)
not the trunk equipment locations at the connecting switch. Be sure that
they have this information.
■The following are the system initiated operation s for MCT:
— Conversation Recording — After the user acti vates MCT , the system
attaches a MCT Voice Recorder, if available, to record the
conversation, if available.
— Historical Recording — After the user activates MCT, the system
records the MCT-information that you can subse quen tl y r etr ieve via
the MCT History report.
Interactions
■Bridged Call Appearance
If a user at a primary extension receives an indic ation call , th en a te lephon e
with a bridged call appearance of this extension can bridge on to the call.
For an MCT-Activate button push, if the currently active extension is a
bridged appearance, the system records the primary extension as the MCT
recipient.
For an MCT-Activate FAC, the user dials the number of the telephone wit h
the bridged call appearance that is actually on the call, instead of the
bridged number. However, the system logs the primary extension as the
recipient. Likewise, for self-originated MCT activations via FAC, the
system logs the primary extension as the MCT recipient provided that the
recently held appearance is a bridged call appearance. When you activate
MCT for yourself, dial # or wait for interdigit time-out.
■Conference
A user can use conferencing to place a malicious caller on hold. The user
can initiate conferencing and enter the MCT-Activate FAC, then stop
conferencing and return to the malicious caller’s appearance.
MCT-Activate can be generated for a member of a conference and is not
affected by the number of parties on the conference.
■Centralized Attendant Service
MCT-Activate, MCT-Control, and MCT-Deactivate must be performed by
telephones within the same PBX.