[167804] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: NSA able to compromise Cisco, Juniper, Huawei switches

daemon@ATHENA.MIT.EDU (Jeremy Bresley)
Mon Dec 30 11:32:51 2013

Date: Mon, 30 Dec 2013 10:32:39 -0600
From: Jeremy Bresley <brez@brezworks.com>
To: nanog@nanog.org
In-Reply-To: <8exw39ba1q1f7vb3v45u09g3.1388415934179@email.android.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 12/30/2013 9:05 AM, Warren Bailey wrote:
> I'd love to know how they were getting in flight wifi.
>
>
> Sent from my Mobile Device.
>
>
> -------- Original message --------
> From: sten rulz <stenrulz@gmail.com>
> Date: 12/30/2013 12:32 AM (GMT-09:00)
> To: nanog@nanog.org
> Subject: NSA able to compromise Cisco, Juniper, Huawei switches
>
>
> Found some interesting news on one of the Australia news websites.
>
> http://www.scmagazine.com.au/News/368527,nsa-able-to-compromise-cisco-juniper-huawei-switches.aspx
>
> Regards,
> Steven.
Simple.  Grab it from where it hits the base stations.  One of the two 
big in-flight Wifi carriers in the US uses Sprint towers, I believe the 
other used satellite.

They have to get back to a ground station somewhere in order to get 
network access.  Easy to tap it there and send it wherever you want.

Grabbing an ad-hoc signal between two endpoints in the air is probably 
significantly more involved.  Implementation of this is left as an 
exercise for the VERY well-funded reader.  ;-)

Jeremy "TheBrez" Bresley
brez@brezworks.com


home help back first fref pref prev next nref lref last post