[160949] in North American Network Operators' Group
About private networks (Was Re: NYT covers China cyberthreat)
daemon@ATHENA.MIT.EDU (Alain Hebert)
Wed Feb 20 13:14:46 2013
Date: Wed, 20 Feb 2013 13:14:27 -0500
From: Alain Hebert <ahebert@pubnix.net>
To: nanog@nanog.org
In-Reply-To: <15838105.6656.1361380521041.JavaMail.root@benjamin.baylink.com>
Reply-To: ahebert@pubnix.net
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
( Well I'm sure that there is a few hundrends of paper on this subject )
I have a few ideas but it involve:
.Dark Fiber;
. All devices at FIPS 140 level;
. Tonnes of resin;
. Wire mesh;
. Fiber DB monitoring;
. Cable Shield monitoring;
. Single Encryption Key injection for the FIPS 140 devices;
. Central Provisioning;
. Kill switch for suspected segments;
<add your own crazy ideas>
<etc>
<add more of your own crazy ideas>
And a private fab because it would not be a good idea to
sub-contract that to lets says... some Chinese outfit =D
TLDR: Feasable, hella costly.
PS:
http://spybusters.blogspot.ca/2010/11/fiber-optics-easier-to-wiretap-than.html
Enjoy this week end of the world news.
-----
Alain Hebert ahebert@pubnix.net
PubNIX Inc.
50 boul. St-Charles
P.O. Box 26770 Beaconsfield, Quebec H9W 6G7
Tel: 514-990-5911 http://www.pubnix.net Fax: 514-990-9443