Chapter 1. AN INTRODUCTION TO VOIP SECURITY

From the Democratic Party's headquarters in the Watergate complex in 1972 to Hewlett-Packard (HP) in 2006, attacks on telephone infrastructure have been around for some time. While those who attacked the Democratic Party and those who attacked HP had different motives, their intentions were very similar: the recording of telephone conversations containing sensitive information. The advent of phone calls over the Internet, by way of Voice over IP (VoIP), does not change the motives or the types of people involved (professional attackers, members of organized crime, and your friendly neighborhood teenager). However, it does make such attacks easier.

Imagine how happy President Richard Nixon's campaign committee ...

Get Hacking VoIP now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.