Re: JETPLOW

From: Carl Gosselin <carl.gosselin_at_altizone.com>
Date: Mon, 30 Dec 2013 16:54:21 -0500

Just love the code name...
Cottonmouth... Means everything!!

> On Dec 30, 2013, at 16:50, Matthew George <mgeorge_at_geores.net> wrote:
>
> Just for the record I'm not saying that these documents are factually
> correct.
>
> However with all the things that have come to light this past year, if and
> that is a BIG IF, these documents were to be accurate than such a
> vulnerability is scary.
>
> At the end of the day, Edward Snowden wouldn't be the number one fugitive of
> the united states government if he was releasing bullshit right?
>
> Personally I think this one is pretty cool;
>
> http://leaksource.files.wordpress.com/2013/12/nsa-ant-cottonmouth-i.jpg
>
> Anywho...
>
> -----Original Message-----
> From: Carl Gosselin [mailto:carl.gosselin_at_altizone.com]
> Sent: Monday, December 30, 2013 4:40 PM
> To: Matthew George
> Cc: groupstudy
> Subject: Re: JETPLOW
>
> That is sure to reopen the debate about open source software vs
> proprietary...
>
> I'm not even touching the question about if Ed Snowden is a traitor or a
> patriot...
>
> Happy new year!!
>
> -Carl
>
>> On Dec 30, 2013, at 16:00, Matthew George <mgeorge_at_geores.net> wrote:
>>
>> While chatting in #cisco on irc.freenode.net some interesting links
>> started getting posted to several NSA leaked documents that got
>> released last night at 3:17am
>>
>>
>>
>> One of them that particularly caught my eye was JETPLOW.
>>
>>
>>
>> http://leaksource.files.wordpress.com/2013/12/nsa-ant-jetplow.jpg
>>
>>
>>
>> Wanted to open the door to discussion, opinions, comments.
>>
>>
>>
>> There is also another leak related to Juniper called FEEDTHROUGH
>>
>>
>>
>> http://leaksource.files.wordpress.com/2013/12/nsa-ant-feedthrough.jpg
>>
>>
>>
>> Apparently these leaks are just now hitting main stream and there are
>> dozens more just like them for every major vendor.
>>
>>
>>
>> The question that keeps repeating in my head is, If the NSA can
>> compromise corporate firewalls through the use of these backdoor
>> technologies, than what is to prevent other countries from doing the
>> same with malicious intent? After all these are the very types of
>> hardware that typically protect the power grid infrastructure, financial
> systems, hospitals, etc.
>>
>>
>>
>> -Matt
>>
>>
>> Blogs and organic groups at http://www.ccie.net
>>
>> ______________________________________________________________________
>> _ Subscription information may be found at:
>> http://www.groupstudy.com/list/CCIELab.html

Blogs and organic groups at http://www.ccie.net
Received on Mon Dec 30 2013 - 16:54:21 ART

This archive was generated by hypermail 2.2.0 : Wed Jan 01 2014 - 20:26:19 ART