[148618] in North American Network Operators' Group
Re: US DOJ victim letter
daemon@ATHENA.MIT.EDU (Alan Clegg)
Thu Jan 19 16:09:23 2012
Date: Thu, 19 Jan 2012 16:08:23 -0500
From: Alan Clegg <alan@clegg.com>
To: nanog@nanog.org
In-Reply-To: <4F188578.6000100@west.net>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig4EC111126DB296C6D14FA90F
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
On 1/19/2012 4:04 PM, Jay Hennigan wrote:
> The body of the email indeed reads like a poorly-executed phish
> including elements such as "null" and "<personalized code here>" but
> headers seem legit.
I asked a local contact if it was legit and he confirmed that it is.
Wait for the paper mail.
I was amused to discover that to proceed on the web, I had to enter my
last name as "Representative" -- as in "Dear Business Representative".
Yep, really.
AlanC
--=20
alan@clegg.com | aclegg@infoblox.com
1.919.355.8851
--------------enig4EC111126DB296C6D14FA90F
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.17 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iEYEARECAAYFAk8YhkgACgkQcKpYUrUDCYe/9ACfW/Q7HuUXzvDp2MyUUl87esTB
9DkAni/TEsSFZ6xmQ057K4QDKXsVfeFZ
=Aywv
-----END PGP SIGNATURE-----
--------------enig4EC111126DB296C6D14FA90F--