Fiber cut - response in seconds?
Michael Holstein
michael.holstein at csuohio.edu
Tue Jun 2 19:53:07 UTC 2009
> Granted the US govt has there own (classified) encryption algorithms
> and as such that can't be replicated in a lab environment and requires
> access to the physical medium carrying traffic encrypted by said
> algorithms.
Which is why they do things like this :
http://en.wikipedia.org/wiki/Operation_Ivy_Bells
Of course these days, it doesn't require nearly as much effort .. just a
friendly phone call to AT&T (who, ironically, also built the devices
used in the above).
Cheers,
Michael Holstein
Cleveland State University
More information about the NANOG
mailing list