[139239] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: HIJACKED: 148.163.0.0/16 -- WTF? Level3 is now doing IP

daemon@ATHENA.MIT.EDU (Suresh Ramasubramanian)
Thu Mar 31 01:27:16 2011

In-Reply-To: <8C81E7C3-14A4-49C8-9678-BBB5096FD015@delong.com>
Date: Thu, 31 Mar 2011 10:56:34 +0530
From: Suresh Ramasubramanian <ops.lists@gmail.com>
To: Owen DeLong <owen@delong.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>, Brandon Ross <bross@pobox.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

It also needs

1. Someone to complain to law enforcement

2. Law enforcement to decide this is something worth following up on
re prosecution - especially if the crook is not within their
jurisdiction, it'd be FBI, and they have a minimum threshold for
damage caused (higher than the few thousand dollars a /16's
registration fees cost?)

[not counting 7.5 million bucks paid in aftermarket deals like
microsoft from nortel]

--srs

On Thu, Mar 31, 2011 at 10:45 AM, Owen DeLong <owen@delong.com> wrote:
> If they put it on letterhead and signed their own name in such a way that it purports
> to be an agent of the organization for which they were not an authorized agent, that
> is usually enough to become a criminal act, whether it is considered forgery, fraud,
> or something else, I'm not sure about the exact technicalities and they may vary
> by jurisdiction.



-- 
Suresh Ramasubramanian (ops.lists@gmail.com)


home help back first fref pref prev next nref lref last post