[160949] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

About private networks (Was Re: NYT covers China cyberthreat)

daemon@ATHENA.MIT.EDU (Alain Hebert)
Wed Feb 20 13:14:46 2013

Date: Wed, 20 Feb 2013 13:14:27 -0500
From: Alain Hebert <ahebert@pubnix.net>
To: nanog@nanog.org
In-Reply-To: <15838105.6656.1361380521041.JavaMail.root@benjamin.baylink.com>
Reply-To: ahebert@pubnix.net
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

    ( Well I'm sure that there is a few hundrends of paper on this subject )

    I have a few ideas but it involve:

         .Dark Fiber;
        . All devices at FIPS 140 level;
        . Tonnes of resin;
        . Wire mesh;
        . Fiber DB monitoring;
        . Cable Shield monitoring;
        . Single Encryption Key injection for the FIPS 140 devices;
        . Central Provisioning;
        . Kill switch for suspected segments;
        <add your own crazy ideas>
        <etc>
        <add more of your own crazy ideas>

    And a private fab because it would not be a good idea to
sub-contract that to lets says... some Chinese outfit =D

    TLDR: Feasable, hella costly.

    PS:

http://spybusters.blogspot.ca/2010/11/fiber-optics-easier-to-wiretap-than.html

    Enjoy this week end of the world news.

-----
Alain Hebert                                ahebert@pubnix.net   
PubNIX Inc.        
50 boul. St-Charles
P.O. Box 26770     Beaconsfield, Quebec     H9W 6G7
Tel: 514-990-5911  http://www.pubnix.net    Fax: 514-990-9443



home help back first fref pref prev next nref lref last post