
From terry.davis@ijetonboard.com  Sun Jun 10 19:16:48 2012
Return-Path: <terry.davis@ijetonboard.com>
X-Original-To: cin@ietfa.amsl.com
Delivered-To: cin@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 296C521F84BF for <cin@ietfa.amsl.com>; Sun, 10 Jun 2012 19:16:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level: 
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3I68CNyyIr4L for <cin@ietfa.amsl.com>; Sun, 10 Jun 2012 19:16:47 -0700 (PDT)
Received: from db3outboundpool.messaging.microsoft.com (db3ehsobe001.messaging.microsoft.com [213.199.154.139]) by ietfa.amsl.com (Postfix) with ESMTP id CE5B721F8467 for <cin@ietf.org>; Sun, 10 Jun 2012 19:16:46 -0700 (PDT)
Received: from mail23-db3-R.bigfish.com (10.3.81.242) by DB3EHSOBE005.bigfish.com (10.3.84.25) with Microsoft SMTP Server id 14.1.225.23; Mon, 11 Jun 2012 02:15:48 +0000
Received: from mail23-db3 (localhost [127.0.0.1])	by mail23-db3-R.bigfish.com (Postfix) with ESMTP id 0F4583205DF	for <cin@ietf.org>; Mon, 11 Jun 2012 02:15:48 +0000 (UTC)
X-Forefront-Antispam-Report: CIP:157.56.241.101; KIP:(null); UIP:(null); IPV:NLI; H:BL2PRD0810HT001.namprd08.prod.outlook.com; RD:none; EFVD:NLI
X-SpamScore: -1
X-BigFish: VPS-1(zzc85fh1102Izz1202hzz8275bh8275dhz2fh2a8h668h839hd25hf0ah)
Received-SPF: pass (mail23-db3: domain of ijetonboard.com designates 157.56.241.101 as permitted sender) client-ip=157.56.241.101; envelope-from=terry.davis@ijetonboard.com; helo=BL2PRD0810HT001.namprd08.prod.outlook.com ; .outlook.com ; 
Received: from mail23-db3 (localhost.localdomain [127.0.0.1]) by mail23-db3 (MessageSwitch) id 1339380945810166_7743; Mon, 11 Jun 2012 02:15:45 +0000 (UTC)
Received: from DB3EHSMHS008.bigfish.com (unknown [10.3.81.235])	by mail23-db3.bigfish.com (Postfix) with ESMTP id C4052160049	for <cin@ietf.org>; Mon, 11 Jun 2012 02:15:45 +0000 (UTC)
Received: from BL2PRD0810HT001.namprd08.prod.outlook.com (157.56.241.101) by DB3EHSMHS008.bigfish.com (10.3.87.108) with Microsoft SMTP Server (TLS) id 14.1.225.23; Mon, 11 Jun 2012 02:15:45 +0000
Received: from BL2PRD0810MB349.namprd08.prod.outlook.com ([169.254.1.137]) by BL2PRD0810HT001.namprd08.prod.outlook.com ([10.255.110.36]) with mapi id 14.16.0164.004; Mon, 11 Jun 2012 02:16:41 +0000
From: Terry Davis <terry.davis@ijetonboard.com>
To: "cin@ietf.org" <cin@ietf.org>
Thread-Topic: Critical Infrastructure Networking
Thread-Index: Ac1HeDrbck45V2BwRr6F5i7KYZWKKg==
Date: Mon, 11 Jun 2012 02:16:40 +0000
Message-ID: <C8092F050778464AB435B2AB453E73FF41E7BBE3@BL2PRD0810MB349.namprd08.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [174.61.156.159]
Content-Type: multipart/alternative; boundary="_000_C8092F050778464AB435B2AB453E73FF41E7BBE3BL2PRD0810MB349_"
MIME-Version: 1.0
X-OriginatorOrg: ijetonboard.com
Subject: [cin] Critical Infrastructure Networking
X-BeenThere: cin@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <cin.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cin>, <mailto:cin-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cin>
List-Post: <mailto:cin@ietf.org>
List-Help: <mailto:cin-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cin>, <mailto:cin-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Jun 2012 02:16:48 -0000

--_000_C8092F050778464AB435B2AB453E73FF41E7BBE3BL2PRD0810MB349_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

List Members

All of us working in Critical Infrastructure and High Security Networking h=
ave many times wished we had better tools to create secure zones/networks a=
nd still be able to fully utilize the power and availability of products bu=
ilt on the Internet standards.

Hopefully this list will let us discuss ways to create highly secure zones =
or networks that can minimize these evolving threats.

Take care

Terry L Davis, P.E.  |  Chief Scientist |  iJet Onboard
Terry.Davis@ijetonboard.com<mailto:Terry.Davis@ijetonboard.com>
o. 206.805.6263  c. 425-503-5511
www.ijetonboard.com<http://www.ijetonboard.com/>

PS: At the bottom is a clip of an email I sent to some of my associates.  T=
hese are the types of threats that our critical infrastructure and high sec=
urity network must be able to resist.





Subject: Unleashing the Dogs of Cyberwar? Interesting article on US use of =
cyber weapons

All

This is link to the IEEE Spectrum journal.
http://spectrum.ieee.org/riskfactor/telecom/security/gone-missing-the-publi=
c-policy-debate-on-unleashing-the-dogs-of-cyberwar/?utm_source=3Dtechalert&=
utm_medium=3Demail&utm_campaign=3D060712

Also ear the bottom is a reference to Shodan.  It has been under discussion=
 in critical infrastructure for some time and given its capabilities we cou=
ld have some real problems with it.

Take care
Terry

This message and its attachments are the property of iJet Technologies, Inc=
. and are intended solely for the use of the designated recipient(s) and th=
eir appointed delegates. This email may contain information that is confide=
ntial. If you are not the intended recipient, you are prohibited from print=
ing, copying, forwarding or saving any portion of the message or attachment=
s. Please delete the message and attachments and notify the sender immediat=
ely. Thank you for your cooperation.

--_000_C8092F050778464AB435B2AB453E73FF41E7BBE3BL2PRD0810MB349_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<style>
<!--
@font-face
	{font-family:Calibri}
@font-face
	{font-family:Tahoma}
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif"}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline}
span.EmailStyle17
	{font-family:"Calibri","sans-serif";
	color:windowtext}
span.EmailStyle18
	{font-family:"Calibri","sans-serif";
	color:#1F497D}
.MsoChpDefault
	{font-size:10.0pt}
@page WordSection1
	{margin:1.0in 1.0in 1.0in 1.0in}
div.WordSection1
	{}
-->
</style>
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">List Members</span></p=
>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">All of us working in C=
ritical Infrastructure and High Security Networking have many times wished =
we had better tools to create secure zones/networks and still be able to fu=
lly utilize the power and availability
 of products built on the Internet standards.</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Hopefully this list wi=
ll let us discuss ways to create highly secure zones or networks that can m=
inimize these evolving threats.</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span></p>
<p class=3D"MsoNormal"><i><span style=3D"color:#1F497D">Take care</span></i=
></p>
<p class=3D"MsoNormal" style=3D"margin-right:0in; margin-bottom:12.0pt; mar=
gin-left:0in">
<b><span style=3D"color:#0072CF"><br>
Terry L Davis, P.E.</span></b><span style=3D"color:#0072CF"> &nbsp;<b>| &nb=
sp;Chief Scientist</b><i>&nbsp;</i><b>|
</b>&nbsp;<b><i>iJet</i> Onboard</b></span><span style=3D"color:#1F497D"></=
span></p>
<p class=3D"MsoNormal" style=3D"margin-top:6.0pt"><b><span style=3D"color:#=
1F497D"><a href=3D"mailto:Terry.Davis@ijetonboard.com">Terry.Davis@ijetonbo=
ard.com</a>
</span></b></p>
<p class=3D"MsoNormal" style=3D"margin-right:0in; margin-bottom:12.0pt; mar=
gin-left:0in">
<b><span style=3D"color:#548DD4">o. 206.805.6263&nbsp; c. 425-503-5511</spa=
n><span style=3D"color:#1F497D"> &nbsp;
<br>
<a href=3D"http://www.ijetonboard.com/">www.ijetonboard.com</a></span></b><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">PS: At the bottom is a=
 clip of an email I sent to some of my associates.&nbsp; These are the type=
s of threats that our critical infrastructure and high security network mus=
t be able to resist.</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span></p>
<div>
<div style=3D"border:none; border-top:solid #B5C4DF 1.0pt; padding:3.0pt 0i=
n 0in 0in">
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt; font-family:&quot;T=
ahoma&quot;,&quot;sans-serif&quot;"><br>
<b>Subject:</b> Unleashing the Dogs of Cyberwar? Interesting article on US =
use of cyber weapons</span></p>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;</p>
<p class=3D"MsoNormal">All</p>
<p class=3D"MsoNormal">&nbsp;</p>
<p class=3D"MsoNormal">This is link to the IEEE Spectrum journal.&nbsp;</p>
<p class=3D"MsoNormal"><a href=3D"http://spectrum.ieee.org/riskfactor/telec=
om/security/gone-missing-the-public-policy-debate-on-unleashing-the-dogs-of=
-cyberwar/?utm_source=3Dtechalert&amp;utm_medium=3Demail&amp;utm_campaign=
=3D060712">http://spectrum.ieee.org/riskfactor/telecom/security/gone-missin=
g-the-public-policy-debate-on-unleashing-the-dogs-of-cyberwar/?utm_source=
=3Dtechalert&amp;utm_medium=3Demail&amp;utm_campaign=3D060712</a>
<span style=3D"color:#1F497D"></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;</span></p>
<p class=3D"MsoNormal">Also ear the bottom is a reference to Shodan.&nbsp; =
It has been under discussion in critical infrastructure for some time and g=
iven its capabilities we could have some real problems with it.</p>
<p class=3D"MsoNormal">&nbsp;</p>
<p class=3D"MsoNormal">Take care</p>
<p class=3D"MsoNormal">Terry</p>
</div>
<p><small>This message and its attachments are the property of iJet Technol=
ogies, Inc. and are intended solely for the use of the designated recipient=
(s) and their appointed delegates. This email may contain information that =
is confidential. If you are not
 the intended recipient, you are prohibited from printing, copying, forward=
ing or saving any portion of the message or attachments. Please delete the =
message and attachments and notify the sender immediately. Thank you for yo=
ur cooperation.
</small></p>
</body>
</html>

--_000_C8092F050778464AB435B2AB453E73FF41E7BBE3BL2PRD0810MB349_--
