Since it's obviously impractical, the procedure will be worked around or ignored 99% of the time. The phone logs will however allow for the picking of a convenient scapegoat in the wake of a future attack.
dylan604
Man, if something ever needed group participation in malicious compliance, this would something I would nominate