[liberationtech] PRISM: NSA/FBI Internet data mining project

Nadim Kobeissi nadim at nadim.cc
Sun Jun 9 10:20:42 PDT 2013


A new slide has just been leaked from the PRISM powerpoint. It's very interesting, check it out:
http://www.theverge.com/2013/6/8/4410358/leaked-slide-from-prism-presentation-supports-directly-collecting-data

NK

On 2013-06-07, at 4:01 PM, Kyle Maxwell <kylem at xwell.org> wrote:

> FWIW, Google has issued a similar blanket (and kinda funny) denial.
> 
> http://googleblog.blogspot.com/2013/06/what.html
> 
> On Fri, Jun 7, 2013 at 2:20 PM, Andy Isaacson <adi at hexapodia.org> wrote:
>> Apologies for replying out of thread and the wide CC list.
>> 
>> On Fri, Jun 07, 2013 at 06:41:32PM +0200, Eugen Leitl wrote:
>>> ----- Forwarded message from Matthew Petach <mpetach at netflight.com> -----
>>> 
>>> Date: Fri, 7 Jun 2013 09:32:53 -0700
>>> From: Matthew Petach <mpetach at netflight.com>
>>> Cc: NANOG <nanog at nanog.org>
>>> Subject: Re: PRISM: NSA/FBI Internet data mining project
>>> 
>>> Speaking just for myself, and if you quote me on this
>>> as speaking on anyone else's behalf, you're a complete
>>> fool, if the government was able to build infrastructure
>>> that could listen to all the traffic from a major provider
>>> for a fraction of what it costs them to handle that traffic
>>> in the first place, I'd be truly amazed--and I'd probably
>>> wonder why the company didn't outsource their infrastruture
>>> to the government, if they can build and run it so much
>>> more cheaply than the commercial providers.  ;P
>>> 7 companies were listed; if we assume the
>>> burden was split roughly evenly between them, that's
>>> 20M/7, about $2.85M per company per year to tap in,
>>> or about $238,000/month per company listed, to
>>> supposedly snoop on hundreds of gigs per second
>>> of data.  Two ways to handle it: tap in, and funnel
>>> copies of all traffic back to distant monitoring posts,
>>> or have local servers digesting and filtering, just
>>> extracting the few nuggets they want, and sending
>>> just those back.
>> 
>> That's not what PRISM is claimed to do, in the WaPo/Gu slide deck.  The
>> deck claims that PRISM provides a way for an analyst at NSA to request
>> access to a specific target (gmail account, Skype account, Y! messenger,
>> etc) and get a dump of data in that account, plus realtime access to the
>> activity on the account.  The volume is quoted to be on the order of
>> 10k-100k of requests annually.  The implication is that data production
>> is nearly immediate (measured in minutes or hours at most), not enough
>> time for a rubber-stamp FISA warrant, implying a fully automated system.
>> 
>> At these volumes we're talking one, or a few, boxes at each provider;
>> plus the necessary backdoors in the provider's storage systems (easy,
>> since the provider already has those backdoors in place for their own
>> maintenance/legal/abuse systems); and trusted personnel on staff at the
>> providers to build and maintain the systems.  Add a VPN link back to
>> Fort Meade and you're done.
>> 
>> That's obviously a much easier system (compared to your 200 GBps
>> sniffer) to build at the $2M/yr budget, and given that $2M is just the
>> government's part -- the company engineering time to do it is accounted
>> separately -- it seems like a reasonable ballpark for an efficient
>> government project.  (There are plenty such, and the existence of
>> inefficient government projects doesn't change that fact.)
>> 
>> It's even possible that executive/legal at the providers actually aren't
>> aware that their systems are compromised in this manner.  NatSec claims
>> will open many doors, especially with alumni of the DoD who have
>> reentered the civilian workforce:
>> https://financialcryptography.com/mt/archives/001431.html
>> 
>> -andy
>> --
>> Too many emails? Unsubscribe, change to digest, or change password by emailing moderator at companys at stanford.edu or changing your settings at https://mailman.stanford.edu/mailman/listinfo/liberationtech
> --
> Too many emails? Unsubscribe, change to digest, or change password by emailing moderator at companys at stanford.edu or changing your settings at https://mailman.stanford.edu/mailman/listinfo/liberationtech




More information about the liberationtech mailing list