TIP: Click on subject to list as thread! ANSI
echo: aust_modem
to: Meng-Shi Lim
from: Dave Hatch
date: 1996-04-20 19:36:16
subject: Attack dial

On Apr 17 04:12 96, Meng-Shi Lim of 3:635/503 wrote:

ML>> Can Telecom trace an attack dial. ie dial-> 1 ring ->hang-up and
ML>> repeat.

AA>> If they really wanted to, yes.  While it is illegal to attack dial, I
AA>> doubt they would bother scanning from them unless there was some
AA>> complaint or some other network problems pointed to it.

ML> I thought it would be extremely difficult because no connection is made
ML> long enough for the trace to occur. It would take a powerful computer to
ML> scan a very busy exchane and even more so if the attack was made from
ML> several exchanges away.

The "scan" is much more likely to involve a harrassed technician
tracing back the cause of a consistent overload caused fault in the
originating line rack, at the access line of the attack dialer.

No exchange is designed to accept attack dialing - problems are a matter of
when, not if.  The line capacity doesn't exist, and shouldn't, by design.

Investigated and logged it will be, to a near certainty.  By the local tech
- and identified all the way down to the originating line in the process of
filling out his fault report sheet.  Whatever happens afterward is up to
his superiors.

Regards,
Dave Hatch.

--- Msgedsq 3.20
* Origin: DealBlue Support BBS (3:711/808)
SEEN-BY: 50/99 78/0 620/243 623/630 624/300 711/401 409 410 413 430 808 809
SEEN-BY: 711/899 932 934 712/515 713/888 714/906 800/1 7877/2809
@PATH: 711/808 809 934

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.