[167804] in North American Network Operators' Group
Re: NSA able to compromise Cisco, Juniper, Huawei switches
daemon@ATHENA.MIT.EDU (Jeremy Bresley)
Mon Dec 30 11:32:51 2013
Date: Mon, 30 Dec 2013 10:32:39 -0600
From: Jeremy Bresley <brez@brezworks.com>
To: nanog@nanog.org
In-Reply-To: <8exw39ba1q1f7vb3v45u09g3.1388415934179@email.android.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On 12/30/2013 9:05 AM, Warren Bailey wrote:
> I'd love to know how they were getting in flight wifi.
>
>
> Sent from my Mobile Device.
>
>
> -------- Original message --------
> From: sten rulz <stenrulz@gmail.com>
> Date: 12/30/2013 12:32 AM (GMT-09:00)
> To: nanog@nanog.org
> Subject: NSA able to compromise Cisco, Juniper, Huawei switches
>
>
> Found some interesting news on one of the Australia news websites.
>
> http://www.scmagazine.com.au/News/368527,nsa-able-to-compromise-cisco-juniper-huawei-switches.aspx
>
> Regards,
> Steven.
Simple. Grab it from where it hits the base stations. One of the two
big in-flight Wifi carriers in the US uses Sprint towers, I believe the
other used satellite.
They have to get back to a ground station somewhere in order to get
network access. Easy to tap it there and send it wherever you want.
Grabbing an ad-hoc signal between two endpoints in the air is probably
significantly more involved. Implementation of this is left as an
exercise for the VERY well-funded reader. ;-)
Jeremy "TheBrez" Bresley
brez@brezworks.com