Can multicast be used as a tool to break down security. Although it is not part of the secure multicast, it is worth mentioning in here. - what happens if a person spam the network with lots of nasty packets - very little packet can result in large flow of packets