
Gil Levi wrote:
While it is impossible to stop someone (a terrorist) from cutting fiber, it is possible to limit his ability to do damage. It is possible to create alternative routes to be used in such cases. Then while the primary route may be down, the alternate route will be used and no terrorist should be able to locate the alternative route since this is something known only to the telecom carrier and is definitely not public knowledge. While this is not new to anyone, what is new is
I am sure you have direct experience of networks that work like this. I have direct experience of the opposite. I am sure there is a whole bell curve distribution from bad to good - and sadly the point the bell curve tries to make it that most occurances are in the middle... Peter