CHAPTER 7HARASSING CALLS AND TELEPHONY DENIAL OF SERVICE (TDOS)

We are under attack. We are a target. This is serious s***. I am one attack away from being on the cover of Newsweek!

—Top-five U.S. bank executive on the topic of TDoS

A phone or a UC network can be used for nefarious purposes in various ways, especially when directed against an individual or an organization. These ways include harassing, threatening, and disruptive inbound types of calls, which can be manually generated or automated “robocalls.” Here are descriptions of some of the most common call types:

Harassing calls Prank calls or just annoying calls intended to irritate the victim. This could be from any person, such as an ex-spouse or competitor. These calls are normally ...

Get Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.