Lucent Technologies Definity Enterprise Communication Server 8.2 User Manual

Page of 1707
DEFINITY ECS Release 8.2
Administrator’s Guide  
555-233-506  
Issue 1
April 2000
Features and technical reference 
1424
Malicious Call Trace 
20
— You may lose continuity on the trace because the person activating 
MCT on the second switch may not be the MCT controller.
If a malicious call comes in on a non-ISDN trunk, the controller needs the 
telephone number for the connecting switch and a cross-reference of 
system-trunk port numbers (including DS1 channel number, if appropriate) 
not the trunk equipment locations at the connecting switch. Be sure that 
they have this information.
The following are the system initiated operations for MCT:
— Conversation Recording — After the user activates MCT, the system 
attaches a MCT Voice Recorder, if available, to record the 
conversation, if available.
— Historical Recording — After the user activates MCT, the system 
records the MCT-information that you can subsequently retrieve via 
the MCT History report.
Interactions
Bridged Call Appearance
If a user at a primary extension receives an indication call, then a telephone 
with a bridged call appearance of this extension can bridge on to the call. 
For an MCT-Activate button push, if the currently active extension is a 
bridged appearance, the system records the primary extension as the MCT 
recipient.
For an MCT-Activate FAC, the user dials the number of the telephone with 
the bridged call appearance that is actually on the call, instead of the 
bridged number. However, the system logs the primary extension as the 
recipient. Likewise, for self-originated MCT activations via FAC, the 
system logs the primary extension as the MCT recipient provided that the 
recently held appearance is a bridged call appearance. When you activate 
MCT for yourself, dial # or wait for interdigit time-out.
Conference
A user can use conferencing to place a malicious caller on hold. The user 
can initiate conferencing and enter the MCT-Activate FAC, then stop 
conferencing and return to the malicious caller’s appearance.
MCT-Activate can be generated for a member of a conference and is not 
affected by the number of parties on the conference.
Centralized Attendant Service
MCT-Activate, MCT-Control, and MCT-Deactivate must be performed by 
telephones within the same PBX.