[94450] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Anyone from BT...

daemon@ATHENA.MIT.EDU (michael.dillon@bt.com)
Tue Jan 23 06:42:44 2007

Date: Tue, 23 Jan 2007 11:41:49 -0000
From: <michael.dillon@bt.com>
To: <nanog@merit.edu>
Errors-To: owner-nanog@merit.edu


> ...on the list who might be able to comment on how they/you/BT is=20
> detecting downstream clients that are bot-infected, and how exactly=20
> you are dealing with them?

Unfortunately, the way you phrased that question is=20
rather "journalistic" and in BT, as in most large companies,=20
employees are forbidden from answering such questions without=20
having the answers vetted by various Public Relations=20
and Legal departments.

Fortunately, published material is exempt from this rule=20
so Googling for an article I found this:
http://www.theregister.co.uk/2006/10/12/bt_spam_buster/
which contains the following:

    Using data from the system, BT's abuse team can cancel=20
    rogue accounts linked to spammers or add offending=20
    IP addresses to blacklists.

    The system also allows BT's admins to contact consumers=20
    whose compromised (zombie) PCs have unwittingly been=20
    made the part of the junk mail problem and provide advice
    on cleaning up their systems.=20

Seems pretty clear to me. We take the issue of botnets very
seriously and we have invested money into tools which automate
some part of the process of identifying and removing bots.
Just what was the point of your query? Do you have some issue with=20
traffic emanating from BT's network?=20

I admit that we are a rather large company with several
rather widespread IP networks, nevertheless, a simple
RIPE database query of "BT" does lead to more than one=20
abuse contact and also lists several real people who=20
you could contact directly if you need to coordinate activity.=20

--Michael Dillon


home help back first fref pref prev next nref lref last post