On 9/9/2013 9:50 AM, Mike Noyes wrote:
> On 09/09/2013 08:29 AM, Thomas Nail wrote:
> -snip-
>> I totally believe that the NSA has and will continue to have significant
>> eavesdropping and signals counter-intelligence capacity, including systems
>> cracking and other nefarious measures. Intercepts have happened and will
>> continue to happen. However, I think that the capabilities of this
>> organization are being overblown in order to prop up it's own reputation
>> and to spread FUD amongst it's enemies (a very good strategy for a spying
>> agency, IMHO). Just looking at the logistical problems of routing and
>> storing that much data - never mind doing any sort of real-time processing
>> on it - makes me think that the grey hats might be exaggerating a bit for
>> their target audience. That, and to sell more news stories...
>
> Tom,
> See:
>
> The Utah Data Center, also known as the Intelligence Community
> Comprehensive National Cybersecurity Initiative Data Center, is a data
> storage facility for the United States Intelligence Community that is
> designed to store extremely large amounts of data, estimated to be on
> the order of exabytes or higher.
> https://en.wikipedia.org/wiki/Utah_Data_Center
>
>

How does NSA do it?

Read about the special room (641A) discovered in an AT&T building in San 
Francisco. Please notice they were using fiber splitting and probably 
routing the signals using their own equipment.

http://en.wikipedia.org/wiki/Room_641A

They also have the capability of splitting fiber as it passes between 
routers through oceans. Read 2005 article on USS Jimmy Carter.

http://www.nytimes.com/2005/02/20/politics/20submarine.html?_r=0

If they can split fiber under the ocean, it would be trivial to do it to 
signals passing through a forest, renting fiber in the same cable to 
return the signals to their own routers and data centers. After all, 
they can command silence to those who might notice the evidence of fiber 
taping.

How do they handle all this data? Well they store it in a buffer "bigger 
than google." Eventually data that is not useful surely gets 
overwritten. Even NSA has limits. My Senator (Dianne Finstein) is the 
chairwoman of the Intelligence Committee. I wrote her on a number of 
occasions about the danger to constitutional government by NSA's total 
surveillance. Her answer is they are not touching the data without a 
court order. This is nonsense. They simply run everything through huge 
filters and a human only touches what the filter pulls out as 
interesting. The parameters of the filters are surely changed daily to 
fit what they are currently looking for. They can claim no one looked at 
the data even as the fastest parallel computers in the world are 
filtering it for them.

LEAF can't help you when it comes to fiber taping on the internet 
backbones but it could help with this problem.

http://www.internetnews.com/security/article.php/3895916/Millions+of+Home+Routers+Insecure+Black+Hat.htm

Victor


------------------------------------------------------------------------------
Learn the latest--Visual Studio 2012, SharePoint 2013, SQL 2012, more!
Discover the easy way to master current and previous Microsoft technologies
and advance your career. Get an incredible 1,500+ hours of step-by-step
tutorial videos with LearnDevNow. Subscribe today and save!
http://pubads.g.doubleclick.net/gampad/clk?id=58041391&iu=/4140/ostg.clktrk
------------------------------------------------------------------------
leaf-user mailing list: leaf-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/leaf-user
Support Request -- http://leaf-project.org/

Reply via email to