[69595] in North American Network Operators' Group
Re: TTY phone fraud and abuse
daemon@ATHENA.MIT.EDU (Patrick W.Gilmore)
Wed Apr 14 20:54:18 2004
In-Reply-To: <Pine.GSO.4.58.0404111748140.19031@clifden.donelan.com>
Cc: Patrick W.Gilmore <patrick@ianai.net>
From: Patrick W.Gilmore <patrick@ianai.net>
Date: Sun, 11 Apr 2004 20:11:03 -0400
To: nanog@merit.edu
Errors-To: owner-nanog-outgoing@merit.edu
On Apr 11, 2004, at 6:55 PM, Sean Donelan wrote:
>> Can people abuse the phone system? yes, of course it can, but the
>> criteria for response are much higher, and in general the nature of
>> the
>> network (low concurrent session limit, point to point, voice only) as
>> it
>> is exposed to most people limits the damage that can be casually
>> incurred.
>
> There is a difference between crimes against the telephone system
> and crimes using telephones. The Department of Justice estimates
> Telemarketing fraud is a $40 Billion a year problem. But telemarketing
> fraud doesn't necessarily reflect a security vulnerability in the
> telephone system per se. Or at least not a security vulnerability
> that can be solved solely by the telephone system.
I'm not certain why telemarketing fraud is that much different than a
DDoS by zombies. The underlying network does not really have much to
do with either other than supplying transport. And tightening security
on the network layer wouldn't stop either from happening.
Since the major threat to networks these days is zombies, and there is
very little you can do to IP to stop this from happening, why people
keep commenting that IP is insecure....
--
TTFN,
patrick