[52115] in North American Network Operators' Group
Re: Inter-ISP/Telco/X.25 security procedures?
daemon@ATHENA.MIT.EDU (Mark Kent)
Mon Sep 16 11:46:01 2002
Date: Mon, 16 Sep 2002 08:41:37 -0700 (PDT)
From: Mark Kent <mark@noc.mainstreet.net>
To: sean@donelan.com
Cc: nanog@merit.edu
In-reply-to: <Pine.GSO.4.40.0209161118410.7705-100000@clifden.donelan.com>
(message from Sean Donelan on Mon, 16 Sep 2002 11:24:35 -0400 (EDT))
Errors-To: owner-nanog-outgoing@merit.edu
>> Please see Clifford Stoll's book The Cuckoo's Egg for a description
>> of tracking an intruder across various PSTN, PSDN and Internet providers.
>> I haven't seen a better description of the process.
And there were, what?, three US ISPs back then?
And when Stanford was getting hacked, where was BBN...
Answer: right on the Stanford campus, in Stanford buildings!
We don't have the same Internet architecture as we had
during The Cuckoo's Egg era.
-mark