Search Mailing List Archives



Limit search to: Subject & Body Subject Author

Sort by: Date Rank Author Subject Reverse Sort

Limit to: All This Week Last Week This Month Last Month

Select Date Range Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 2014 2013 2012 2011 2010 2009 2008 2007 2006 through Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 2014 2013 2012 2011 2010 2009 2008 2007 2006

[liberationtech] PRISM: NSA/FBI Internet data mining project

FWIW, Google has issued a similar blanket (and kinda funny) denial. http://googleblog.blogspot.com/2013/06/what.html On Fri, Jun 7, 2013 at 2:20 PM, Andy Isaacson <adi at hexapodia.org> wrote: > Apologies for replying out of thread and the wide CC list. > > On Fri, Jun 07, 2013 at 06:41:32PM +0200, Eugen Leitl wrote: >> ----- Forwarded message from Matthew Petach <mpetach at netflight.com> ----- >> >> Date: Fri, 7 Jun 2013 09:32:53 -0700 >> From: Matthew Petach <mpetach at netflight.com> >> Cc: NANOG <nanog at nanog.org> >> Subject: Re: PRISM: NSA/FBI Internet data mining project >> >> Speaking just for myself, and if you quote me on this >> as speaking on anyone else's behalf, you're a complete >> fool, if the government was able to build infrastructure >> that could listen to all the traffic from a major provider >> for a fraction of what it costs them to handle that traffic >> in the first place, I'd be truly amazed--and I'd probably >> wonder why the company didn't outsource their infrastruture >> to the government, if they can build and run it so much >> more cheaply than the commercial providers. ;P >> 7 companies were listed; if we assume the >> burden was split roughly evenly between them, that's >> 20M/7, about $2.85M per company per year to tap in, >> or about $238,000/month per company listed, to >> supposedly snoop on hundreds of gigs per second >> of data. Two ways to handle it: tap in, and funnel >> copies of all traffic back to distant monitoring posts, >> or have local servers digesting and filtering, just >> extracting the few nuggets they want, and sending >> just those back. > > That's not what PRISM is claimed to do, in the WaPo/Gu slide deck. The > deck claims that PRISM provides a way for an analyst at NSA to request > access to a specific target (gmail account, Skype account, Y! messenger, > etc) and get a dump of data in that account, plus realtime access to the > activity on the account. The volume is quoted to be on the order of > 10k-100k of requests annually. The implication is that data production > is nearly immediate (measured in minutes or hours at most), not enough > time for a rubber-stamp FISA warrant, implying a fully automated system. > > At these volumes we're talking one, or a few, boxes at each provider; > plus the necessary backdoors in the provider's storage systems (easy, > since the provider already has those backdoors in place for their own > maintenance/legal/abuse systems); and trusted personnel on staff at the > providers to build and maintain the systems. Add a VPN link back to > Fort Meade and you're done. > > That's obviously a much easier system (compared to your 200 GBps > sniffer) to build at the $2M/yr budget, and given that $2M is just the > government's part -- the company engineering time to do it is accounted > separately -- it seems like a reasonable ballpark for an efficient > government project. (There are plenty such, and the existence of > inefficient government projects doesn't change that fact.) > > It's even possible that executive/legal at the providers actually aren't > aware that their systems are compromised in this manner. NatSec claims > will open many doors, especially with alumni of the DoD who have > reentered the civilian workforce: > https://financialcryptography.com/mt/archives/001431.html > > -andy > -- > Too many emails? Unsubscribe, change to digest, or change password by emailing moderator at companys at stanford.edu or changing your settings at https://mailman.stanford.edu/mailman/listinfo/liberationtech