-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Not intentionally trying to be retarded, but I've received an enormous number of private responses. Many thanks. It is odd, however, why folks felt the need to reply privately, and although I'm glad you did reply, it is somewhat of a statement, in and of itself, on the issues involved that things happen the way they do. Maybe. In any event, I did want to mention that some people involved in the aforementioned "activities" may be getting their feelings hurt real soon now due to "looking the other way" and pretending they didn't know what was going on. Or maybe not. It should be pretty fun to to see what happens. Thanks for everyone who responded. Cheers! - - ferg - -- "Paul Ferguson" <fergdawg@netzero.net> wrote: This question is part reality, part surreality. Let me ask you this: What would you do when you have alerted (via abuse@ contacts) a notable ISP in the U.S. (not a tier one, and not just one of them) about KNOWN, VERIFIABLE, and RECURRING criminal activity in their customer downstreams? And the downstream(s) do not respond? And the criminal activity continues? The most obvious answer is: Gather evidence, contact law enforcement. Right? I just wanted to reach out the NANOG on this and see what you thought... How would you handle it? - - ferg -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.6.3 (Build 3017) wj8DBQFHDymoq1pz9mNUZTMRAi9JAKChOP+omJT+B08zY6/apubGPIV9ZQCgsr3F 1BcKzW2DrEte2Q/KS4I5de4= =RxGD -----END PGP SIGNATURE----- -- "Fergie", a.k.a. Paul Ferguson Engineering Architecture for the Internet fergdawg(at)netzero.net ferg's tech blog: http://fergdawg.blogspot.com/