North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: backbone transparent proxy / connection hijacking

  • From: Tom Perrine
  • Date: Fri Jun 26 11:05:45 1998

>>>>> The moving finger of Karl Denninger, having written:

    Karl> Well, I'd love to know where they think they get the authority to do this
    Karl> from in the first place.... that is, absent active consent.

    Karl> I'd be looking over contracts and talking to counsel if someone tried this
    Karl> with transit connections that I was involved in.  Hijacking a connection
    Karl> without knowledge and consent might even run afoul of some kind of tampering
    Karl> or wiretapping statute (read: big trouble).....

Hmmm,

Title 18, Chapter 119 - Wire and Electronic Communications Interception...
      Sec 2511

Title 18, Chapter 1030 does not appear to apply.

Standard disclaimers *do*, however apply :-)  See .sig for details.

-- 
Tom E. Perrine ([email protected]) | San Diego Supercomputer Center 
http://www.sdsc.edu/~tep/     | Voice: +1.619.534.5000
Been there, done that, erased the evidence, blackmailed the witnesses...