North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: potential hazards of Protect-America act

  • From: Henry Linneweh
  • Date: Thu Jan 31 23:29:37 2008
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=sbcglobal.net; h=X-YMail-OSG:Received:X-Mailer:Date:From:Subject:To:MIME-Version:Content-Type:Message-ID; b=4g3iEfzG78kJf5TnvnUg/VqGZOOH+2VFgSKrsMtByywXOd5hKsnaWFfve66LKSfny/uvwBcDuBQjhYyqcvGGUHbUdKXWktL0d9/4iK0WSmiEcn2mhK7O+aBCsRzmP+5TPbyJWz3LRRl5CTHCQiMbGCCZySxy7ZDAeBP585hWT/o=;

The government buys from the cheapest bidder, the most vulnerable systems and networks belong to them
because of their bidding and purchase policies that do not reflect the problems of the time.

I am loath to believe much of anything they say or have to offer since it is usually to little and to late
for their solutions. Draconian policy and creating jobs for themselves is their best product.

-Henry

----- Original Message ----
From: Sean Donelan <sean@xxxxxxxxxxx>
To: nanog@xxxxxxxxx
Sent: Wednesday, January 30, 2008 5:31:24 PM
Subject: Re: potential hazards of Protect-America act


Although I agree with almost every part of the paper, I disagree
with the paper.

I think the threats, risks and recommendations in the paper apply 
regardless of the country or local ordinances. If you eliminate all
the parts of the paper discussing the Protect America Act, it doesn't
change the technical parts of the paper very much.

<http://www.washingtonpost.com/wp-dyn/content/story/2008/01/27/ST2008012702568.html>

Keeping public networks secure is an interesting problem for every network
operator world-wide.  By its nature, no public network can really be 
highly secure.  If your vendor claims it is, grab your wallet and run. 
Its probably a waste of resources to attempt to build the network to 
protect the user against everything or even a lot of threats.  Yet the 
public network relies on user trust in its operation.

I think it would be interesting to watch a debate between a intelligence 
tech and a repair tech about whose tools need to be more robust and 
reliable.  I suspect they would both be very vocal about their needs.
The public network handled the Y2K rollover, you can't say the same thing 
about some of the intelligence systems :-)

So if you are a network operator, what can you do technically (since this 
is not a law list)?

I think the paper suffers a bit from "CSI" or "24" dazzle, everyone 
expects a DNA printout in the last 2 minutes of the show will find the bad 
guy, Intelligence Support tradeshows are filled with overpriced pieces of 
gear.  Its usually the simple stuff that gets you.  Most networks are 
filled with so many diagnostic features, buying a second set of gear is 
usually for administrative not functional reasons.