MTA clones might lead to service theft, breach of privacy, and denial of service. This paper proposes techniques that may be utilized by an IP Telephony service provider to detect and disable cloned MTAs and investigates what MTA configurations make sense for tamper proof hardware. It also considers techniques involving CMTS and DHCP server configuration and filtering options for limiting the geographic distribution of MTA clones.