<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content=text/html;charset=iso-8859-1>
<STYLE></STYLE>
<META content="MSHTML 6.00.2900.3314" name=GENERATOR></HEAD>
<BODY id=MailContainerBody
style="PADDING-LEFT: 10px; FONT-WEIGHT: normal; FONT-SIZE: 10pt; COLOR: #000000; BORDER-TOP-STYLE: none; PADDING-TOP: 15px; FONT-STYLE: normal; FONT-FAMILY: Verdana; BORDER-RIGHT-STYLE: none; BORDER-LEFT-STYLE: none; TEXT-DECORATION: none; BORDER-BOTTOM-STYLE: none"
leftMargin=0 topMargin=0 acc_role="text" CanvasTabStop="true"
name="Compose message area"><!--[gte IE 5]><?xml:namespace prefix="v" /><?xml:namespace prefix="o" /><![endif]-->
<DIV>
<DIV>each of those scenario's involve either fraud or intent to do harm and are
already prohibited</DIV>
<DIV>in FCC regs even absent the "Truth in Caller ID Act"</DIV>
<BLOCKQUOTE
style="PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV style="FONT: 10pt arial">----- Original Message ----- </DIV>
<DIV style="FONT: 10pt arial"><B>From:</B> <A
title=mailto:stotaro@totarotechnologies.com
href="mailto:stotaro@totarotechnologies.com">Steve Totaro</A> </DIV>
<DIV style="FONT: 10pt arial"><B>To:</B> <A
title=mailto:trixter@0xdecafbad.com
href="mailto:trixter@0xdecafbad.com">trixter@0xdecafbad.com</A> ; <A
title=mailto:asterisk-biz@lists.digium.com
href="mailto:asterisk-biz@lists.digium.com">Commercial and Business-Oriented
Asterisk Discussion</A> </DIV>
<DIV style="FONT: 10pt arial"><B>Sent:</B> Monday, May 12, 2008 18:22</DIV>
<DIV style="FONT: 10pt arial"><B>Subject:</B> Re: [asterisk-biz] ANI</DIV>
<DIV><BR></DIV>Setting up a drone Asterisk box to take hundreds of thousands
of FTP<BR>.call files at 3AM (by each time zone) and play pro Hillary
Clinton<BR>campaign messages (or whoever you don't like), obviously
spoofing<BR>her/his campaign headquarters caller ID and ANI.<BR><BR>Obtaining
a new credit card from someone's mailbox with the sticker to<BR>call from your
home phone to activate the card. Spoof their Caller ID<BR>and ANI,
activate, and buy some cool gadgets or whatever people do<BR>with cards that
don't belong to them.<BR><BR>Setting CallerID/ANI to clients', girlfriends',
bosses' cell phone and<BR>call until voicemail picks up, if no PIN is set, I
have full control<BR>of their voicemail (and could possibly call out, I will
have to test<BR>that with the call back option. Then someone could
really have some<BR>fun depending on what messages they have saved)<BR><BR>So
many exploits.....<BR><BR>Thanks,<BR>Steve
Totaro<BR><BR>_______________________________________________<BR>--Bandwidth
and Colocation Provided by <A title=http://www.api-digital.com/
href="http://www.api-digital.com">http://www.api-digital.com</A>--<BR><BR>asterisk-biz
mailing list<BR>To UNSUBSCRIBE or update options visit:<BR> <A
title=http://lists.digium.com/mailman/listinfo/asterisk-biz
href="http://lists.digium.com/mailman/listinfo/asterisk-biz">http://lists.digium.com/mailman/listinfo/asterisk-biz</A><BR></BLOCKQUOTE></DIV></BODY></HTML>