Files are standard DB Table dumps (packed) loading from a cluster of VPNs from torrent and NAS protocols through central europe (entry providers are all in privacy-sensitive countries) and intended to be a distributed database service; there is simply nothing big enough to handle this onload directly. (at 120+gbps bursts) Some of the services are posting public torrent data and open sql database access. Table files are set up as redundant master with cross-population and standard distribution techniques. Some of the tracking data appears to have 1 inch resolution target vectors.
On Wed, Jun 10, 2015 at 8:52 AM, Griffin Boyce <[email protected]> wrote: > Wilfred Guerin wrote: >> >> Some huge *meaning close to exobyte size* data sets are circulating in >> storage clouds this last week, appear to be snapshots of signals >> intelligence metadata including vector tracking of signals targets >> (possibly cell phones based on movement vectors) and cross-associated >> metadata for their communications. Indications are that these are >> recon signal dumps of the american sigint system loaded by a major >> organized crime syndicate and cover most of last year. There is also a >> set of organic tracking signals, assumably covert agent >> communications, and another set that appears to be all American and >> European cash money transactions(???). > > > Links to more info? Are these intended to be public, or some kind of > config failure? >
