On 9/9/2013 9:50 AM, Mike Noyes wrote: > On 09/09/2013 08:29 AM, Thomas Nail wrote: > -snip- >> I totally believe that the NSA has and will continue to have significant >> eavesdropping and signals counter-intelligence capacity, including systems >> cracking and other nefarious measures. Intercepts have happened and will >> continue to happen. However, I think that the capabilities of this >> organization are being overblown in order to prop up it's own reputation >> and to spread FUD amongst it's enemies (a very good strategy for a spying >> agency, IMHO). Just looking at the logistical problems of routing and >> storing that much data - never mind doing any sort of real-time processing >> on it - makes me think that the grey hats might be exaggerating a bit for >> their target audience. That, and to sell more news stories... > > Tom, > See: > > The Utah Data Center, also known as the Intelligence Community > Comprehensive National Cybersecurity Initiative Data Center, is a data > storage facility for the United States Intelligence Community that is > designed to store extremely large amounts of data, estimated to be on > the order of exabytes or higher. > https://en.wikipedia.org/wiki/Utah_Data_Center > >
How does NSA do it? Read about the special room (641A) discovered in an AT&T building in San Francisco. Please notice they were using fiber splitting and probably routing the signals using their own equipment. http://en.wikipedia.org/wiki/Room_641A They also have the capability of splitting fiber as it passes between routers through oceans. Read 2005 article on USS Jimmy Carter. http://www.nytimes.com/2005/02/20/politics/20submarine.html?_r=0 If they can split fiber under the ocean, it would be trivial to do it to signals passing through a forest, renting fiber in the same cable to return the signals to their own routers and data centers. After all, they can command silence to those who might notice the evidence of fiber taping. How do they handle all this data? Well they store it in a buffer "bigger than google." Eventually data that is not useful surely gets overwritten. Even NSA has limits. My Senator (Dianne Finstein) is the chairwoman of the Intelligence Committee. I wrote her on a number of occasions about the danger to constitutional government by NSA's total surveillance. Her answer is they are not touching the data without a court order. This is nonsense. They simply run everything through huge filters and a human only touches what the filter pulls out as interesting. The parameters of the filters are surely changed daily to fit what they are currently looking for. They can claim no one looked at the data even as the fastest parallel computers in the world are filtering it for them. LEAF can't help you when it comes to fiber taping on the internet backbones but it could help with this problem. http://www.internetnews.com/security/article.php/3895916/Millions+of+Home+Routers+Insecure+Black+Hat.htm Victor ------------------------------------------------------------------------------ Learn the latest--Visual Studio 2012, SharePoint 2013, SQL 2012, more! Discover the easy way to master current and previous Microsoft technologies and advance your career. Get an incredible 1,500+ hours of step-by-step tutorial videos with LearnDevNow. Subscribe today and save! http://pubads.g.doubleclick.net/gampad/clk?id=58041391&iu=/4140/ostg.clktrk ------------------------------------------------------------------------ leaf-user mailing list: leaf-user@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/leaf-user Support Request -- http://leaf-project.org/