![]() ![]() Being hosted on GCP, a major cloud provider, would be of no use, since there wouldn't be a network path to them in the first place. Imagine if your ISP decided to stop routing traffic to Google. What happened here is that due to some administrative lapses, the victims (Sourcehut) of the attack got disabled by the network provider. Typically what you want to do though is stop the traffic from reaching you at all, so ideally your network provider, who is upstream from you, blocks the illegitimate traffic so your servers never see it and don't get overwhelmed. > We spoke to CloudFlare and were quoted a number we cannot reasonably achieve within our financial means Major cloud providers tend to have that, as do DDoS mitigation services (Cloudflare amongst others). It's also worth remembering that cloud providers are also servers in racks, but they own the building around it to.įor DDoS attacks, you need to have enough capacity to absorb the attack. ![]() It's a good overview on the economics of scam calls in India. On top of that, the scamming call centers are closely tied to the ruling party machinery in that state, as you need to get a license from the state government to operate a call center, and these kinds of call centers will often be donating to local political parties to look the other way. This ended up in the Supreme Court for a couple years. ![]() West Bengal removed it's consent for Federal Police in India to raid without the consent of West Bengal Police. West Bengal is ruled by a regional opposition party called the TMC. The scamming call centers are located in a state called West Bengal. Raids that are not National Security related need coordination between the Federal Government and State Government in India. > Americans like Scammer Payback report giant scam callcenters with credible evidence, they take well over a year to raid it > Indian police is actually able to do quite the lot of pressure when terrorism is involvedīecause terrorism related stuff falls under the Indian equivalent of Homeland Security, even if it's local PD triaging. If it was some local PD asking the platform, they probably wouldn't have the capabilities to DDOS If it was actually National Security related, it would have went through a couple fusion centers that the Indian government formed. Beat cops definitely aren't, but most police forces in India are state level and a couple are federal, and will usually have a Task Force devoted to offensive and defensive security, and if not, will contract out to companies like Appin Security Group (who were able to force Reuters and SentinelOne to remove their report into how the private-public cyber model in India operated )Īlso, after the 2008 Mumbai Attacks, the Indian Ministry of Home Affairs began working on coordinating and centralizing Metadata Analysis and Monitoring, because they unable to trace the VoIP calls used by LeT. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |