I am surprised at how good this post is, given the topic. Something corporate security consultants become painfully aware of very quickly: it is startlingly easy to compromise the physical network of a huge company, and, having done so, an attacker has essentially limitless access to the victim's business processes.<p>The notion that a network team would actually use a TDR to find passive spliced taps on their network --- or, for that matter, even take the time to spot unexpected 802.11 wireless activity --- is laughable. Pick any company in the Fortune 100. Put on a dress shirt and a tie. Follow someone with a proxcard in through the side door after their smoke break. You will have their mainframe batch apps for months or years afterwards.