unauthorized access to fiber optic communication systems

8 views
Skip to first unread message

Dipodidae

unread,
May 18, 2009, 2:06:03 AM5/18/09
to Fiber Optics
What information do you have about unauthorized access to fiber optic
communication systems? Maybe I can read about examples of unauthorized
access to fiber optic communication systems. I mean that is it real?

What standarts talk about unauthorized access to fiber optic
communication systems?

And what I have google to find information about it?

P.s. It's need me to make excellent report in uni.

Thanks a lot to all who help me!

Tim Glass

unread,
May 18, 2009, 7:18:49 AM5/18/09
to fiber-...@googlegroups.com
Dipodidae,
The question you have is possible to an extent if your into cuting dark
fiber between 2 known points.
The issue remains when the owner of the dark fiber goes to use the fiber and
it does not function they will find the intrusion sooner or later.
The actual standards you ask about basically come out to theft! Thou Shalt
not Steal!  Punishable by fines and imprisionment.
Beyond that cutting into fiber optic lines in use will generate alarms as
equipment will loose their links and someone will be out to check whats
going on!
When you Google authorized fiber access the articles I've seen basically are
refined to Security intrusion systems using Fiber Optic cabling for cameras.
Tim

has notified the sender that this message has been received.

Chris Jacobs

unread,
May 18, 2009, 11:20:37 PM5/18/09
to fiber-...@googlegroups.com
You cannot just 'tap into' a fiber optic line like you could to a copper line.   the information travels via a beam (or beams) of light that, while traveling, bounce off the inner surface of the fiber cable; that informatin does not 'bleed' out past the inner surface.    with that said, in order to 'read' the information traveling via that (those) beam(s) of light, one first needs equipment that converts that transmission back to 'readable' format.  i may be too brief here, but the signal needs to terminate to 'read' it, so it would not be a matter of tapping into it and also having it to continue-on to its intended destination. 
 
Good luck.
 

Chris Jacobs, CEO
Counsel Technology, Inc.
RESPONSIBLE IT LEADERSHIP
E-Discovery Litigation Cost Reduction

sekhar varma

unread,
May 19, 2009, 12:24:12 AM5/19/09
to fiber-...@googlegroups.com
hi,
 
This is varma.wht is the power levels for long haul& short haul cards (STM-I,STM-4&STM16)

--
          Thanks&Regards

          Sekhar varma.v.n
          O&M Engg,NLD,
          TATA Communications.
          Visakhapatnam.
          Cont.9246627768

Tim Glass

unread,
May 19, 2009, 7:41:43 AM5/19/09
to fiber-...@googlegroups.com
Varma,
Refer to your equipment supplier.
You would first need to figure fiber loss budget for your fiber determining distance alllowable of units required.
Link loss= fiber length (km) X (fiber attentuation per km) + splice loss X number of splices + connector loss X # of connectors + (Safety margin)
Tim

From: fiber-...@googlegroups.com [mailto:fiber-...@googlegroups.com] On Behalf Of sekhar varma
Sent: Tuesday, May 19, 2009 12:24 AM
To: fiber-...@googlegroups.com
Subject: Re: unauthorized access to fiber optic communication systems

Dipodidae

unread,
May 25, 2009, 12:17:29 AM5/25/09
to Fiber Optics

Sorry my poor english. Now I see what I wrote) I'm interested in
finding all information
about defence information that flow in optical fiber cable. So I have
to know about ways to get
unauthorized access.
I haven't much expirience in optical fiber, only theory, but when I
hear something like this http://news.zdnet.com/2100-9595_22-115877.html
I think that idea about get information from otical fiber is not
useless.
In my first post I mean standarts to defence an optical fiber cable.
Now I consider two ways:
- make break-down and install equipments for selection of information
- to get a fiber and bend it, so we'll have a beam on surface.
What do you can suggest else?

I'm depend on quantum cryptography in ways to protect information, but
there are such ways like monitoring.. What else?

Do you know about incidents with unauthorized access to information?
I heard something about when Israel make two breaks and install own
equipment in the middle when othe side were rebuilding.

I have speech in two days) and I hope to tell something interesting.
Reply all
Reply to author
Forward
0 new messages