Cabling blunder fouls up DoD network

analysis
Jan 9, 20073 mins

Something strange was going on in the ceiling, but armed guards wouldn't let us look

Back in the days of RG-58 Ethernet co-ax and Novell NetWare servers, I worked for a small networking firm. One of the VPs had friends at the Pentagon, and one day — to everyone’s amazement — we landed a lucrative contract to install a network for a military pay-and-benefits facility at the Department of Defense (DoD). This was supposed to be a ground-up installation, everything from pulling cable to configuring the server, setting up all the stations, and training the user community.

When the time came to install the co-ax, we tried to hire our regular cabling contractor, a company with whom we’d done several successful cable installation jobs. But when we called the DoD to arrange for passes, we discovered that its security people would not authorize our guys to do the cabling. Apparently, due to some long-standing security regulation, all cabling had to be done by the DoD’s own electrical department.

We had no choice, so we said OK. The DoD laid the cable, we installed the server, updated the stations with network cards, and configured the NetWare software. Everything was working like gangbusters.

At least we thought so. Several days after the DoD signed off, we got phone calls from a couple of data-entry clerks who couldn’t see the server. We checked their systems, and everything looked cool. The only unusual thing was that they were both at the end of the network bus. Peculiar. We knew the hardware and software was working properly, and the distance from the server (on one end of the bus) to the technicians (on the other end) was well within Ethernet coaxial limits for distance and signal strength. We had to assume something had gone haywire in the actual physical installation. But what could it be?

Only one way to find out. “Charlie,” our project manager, borrowed a tall stepladder and was halfway up to the drop-down ceiling when two armed security guards appeared and politely but firmly explained that any further attempt to access the overhead would be met with lethal force. Apparently there were concerns about bugs being planted in the overheads. Charlie climbed down in a hurry, but it was nearly half an hour before I could convince the security guards to put away the handcuffs.

Back at the home office, I called my boss, who placed several high-level phone calls to the DoD honchos. Two days later, a special security document was issued permitting our team to access the co-ax cabling, as long as those security guys kept their eyes on us.

It was a bit like a Laurel and Hardy comedy. Charlie got back on the ladder and poked his head into the overhead. Ten feet away the security guys were on their own ladders, watching Charlie to make sure he didn’t implant some devilish James Bond device. But once we got up there … surprise! Laying up in the ceiling was a neat coil of about 100 feet of “extra” co-ax cable — more than enough to put the techs at the end of the bus over the limit for proper distance/signal functionality. Obviously the DoD’s electrical team had never been trained in laying network coaxial cable and was unaware of the issues involved. After we removed the extra cable (and rerouted the co-ax away from an elevator power line) everything worked fine.

If you think that the government knows best, you are living in a fool’s paradise.

infoworld_anonymous

Since 2005, IT pros have shared anonymous tech stories of blunders, blowhard bosses, users, tech challenges, and other memorable experiences. Send your story to offtherecord@infoworld.com, and if we publish it in the Off the Record blog we'll send you a $50 American Express gift card -- and, of course, keep you anonymous. (Note that by submitting a story to InfoWorld, you give InfoWorld Media Group, its affiliates, and licensees the right to republish this material in any medium in any language. You retain the copyright to your work and may also publish it without restriction.)

More from this author