[52115] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Inter-ISP/Telco/X.25 security procedures?

daemon@ATHENA.MIT.EDU (Mark Kent)
Mon Sep 16 11:46:01 2002

Date: Mon, 16 Sep 2002 08:41:37 -0700 (PDT)
From: Mark Kent <mark@noc.mainstreet.net>
To: sean@donelan.com
Cc: nanog@merit.edu
In-reply-to: <Pine.GSO.4.40.0209161118410.7705-100000@clifden.donelan.com>
	(message from Sean Donelan on Mon, 16 Sep 2002 11:24:35 -0400 (EDT))
Errors-To: owner-nanog-outgoing@merit.edu


>> Please see Clifford Stoll's book The Cuckoo's Egg for a description
>> of tracking an intruder across various PSTN, PSDN and Internet providers.
>> I haven't seen a better description of the process.

And there were, what?, three US ISPs back then?

And when Stanford was getting hacked, where was BBN...
Answer: right on the Stanford campus, in Stanford buildings!

We don't have the same Internet architecture as we had
during The Cuckoo's Egg era.

-mark


home help back first fref pref prev next nref lref last post