Organized crime

Date: 2008-08-29 12:47 pm (UTC)
So the real question then would be whether the various organized-crime groups are well-enough connected to make this work.

Shouldn't be too hard—all kinds of options open up when you're not bound by law or morality.

Do a traceroute to find out your target's upstream providers; say it's Level3. Do a little social engineering on Level3 to find out who maintains the route filters; say it's Fred. Get one of your people hired by Level3's cleaning service. Find enough information on Fred's desk to track down his wife and kids, take a few pictures through a rifle sight, and you're in.

Of course, this kind of thing works even without a BGP vulnerability; but the vulnerability makes it easier to get away with it, since it may not be noticed for a long time.

(will be screened)
(will be screened if not validated)
If you don't have an account you can create one now.
HTML doesn't work in the subject.
More info about formatting

Profile

jducoeur: (Default)
jducoeur

July 2025

S M T W T F S
  12345
6789101112
13141516171819
20212223242526
27 28293031  

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags