Call forwarding capabilities are abused. Examples include the
use of computer controlled call forwarding to forward calls from call-back
modems to that attackers get the call-backs, forwarding calls to
illegitimate locations so as to intercept communications and provide false
or misleading information, and the use of programmable call forwarding to
cause long distance calls to be billed to the forwarding party's account.
Complexity: This class of attacks are relatively simple to carry out but
often require a precondition of breaking into a system involved in the
forwarding operation.
fc@red.a.net