In 2004, on September 13, 2004, John Ashcroft, State Prosecutor, said in his speech at the International Criminal Investigative Training Training Conference, "We have seen worms and viruses attacking … obstructing basic services … and with the increased use of the Internet, and especially peer-to-peer networking, we've seen that malware spreads faster and infects more computers than ever before.
In an article written by Daniel A. Morris, US Attorney-at-Law, computer and telecommunications coordinator in Nebraska, said in "Tracking a computer hacker" that "modern thieves can steal more computers than a gun," he may be able to make more damage with the keyboard than with a bomb. "
Ralph Echemendia, head of the Intense School, who trains managers on network security risks, said that "Telekom providers are one of the main targets for malicious attackers because they control communication for everyone."
Sophisticated hackers have learned how to use sensitive information that travels over the Internet, and their focal point is communication.
How is that possible?
It's pretty simple. First, you need to be aware that e-mail services work from the e-mail server, and web services work from the web server. Both email servers and web servers are built for data, not for voice.
Since VoIP has a voice, it requires a system that will convert voice into data packets to travel over the Internet, and then return to voice at the destination. However, VoIP should not be considered as yet another application that is in the data network, because it needs real-time service due to performance expectations (for example, Sound Quality).
Most VoIP computing phones require at least 20 kips (kilobytes per second) of bandwidth (data transfer capacity) for packets of data traveling over the Internet, which is why most require a minimum high-speed internet connection to function without damaging the voice quality.
Although in the minority, several VoIP servers, some of which are prominent, require at least less than 10 kips (kilobytes per second) of the bandwidth (capacity of information transmission), which makes their services can be used by dialing a connection or high speed (e.g. cable), satellite and wireless connections.
Over 90% of VoIP services use industry standard codecs (code codes) and industry standard protocols.
Computers are assigned a different number of Internet Protocol (IP) while on line, which is analogous to the mail in which you would have an identity location with your street number, city, state, and postal code.
In relation to the protocol, IP (Internet Protocol) address is a number that identifies the user and his computer. The industry standard codec and industry standard protocols are open and interpreted to the public. Unscrupulous hackers often trigger their attacks on VoIP over Internet Protocol services that work on these publicly open and interpretive standards.
Peer-to-peer services, as well as more than 90% of all VoIP telephone services, work on an industry standard and industry standard protocols. In other words, their lines are not safe.
IM services also create a target vulnerability to malicious hacker attacks by a simple monitoring program that allows the availability of electronic eavesdropping.