Points of Failure (was Re: National infrastructure asset)
Vivien M.
vivienm at dyndns.org
Tue Sep 25 00:38:49 UTC 2001
> -----Original Message-----
> From: owner-nanog at merit.edu [mailto:owner-nanog at merit.edu]On Behalf Of
> Timothy R. McKee
> Sent: September 24, 2001 8:29 PM
> To: nanog at merit.edu
> Subject: RE: Points of Failure (was Re: National infrastructure asset)
> Importance: High
>
>
> I know it's difficult to refrain from comment, but let's try to remember
> that the bad guys read this list too. While they may not have
> the knowledge
> of critical communication infrastructure points, they can
> certainly find and
> target them if we point them in the right direction.
> This pertains not only to our side of the ponds, but to overseas as well.
> We all know where the 'soft targets' of our infrastructures are located -
> let's keep it to ourselves or, at the very least, within small private
> discussion groups where everyone knows everyone and not on the
> public list.
Why would security by obscurity work in this case?
Any terrorist with a quarter of a clue can find out the addresses of enough critical buildings to cause a huge disaster in about 30 minutes (*hint* Find sites for providers that have hardware coloed in major buildings and that list the addresses of these POPs. No names will be provided, but I have at least one in my mind. Repeat this process with some major peering points, a listing of which is quite easy to find).
I might add that it's much easier to find this out than it is to crash some airplanes into prominent US buildings; I doubt a 30 minute Google search would tell you how to pilot airplanes, but perhaps I'm just a little naive.
Vivien
--
Vivien M.
vivienm at dyndns.org
Assistant System Administrator
Dynamic DNS Network Services
http://www.dyndns.org/
More information about the NANOG
mailing list