Apologies for replying out of thread and the wide CC list. On Fri, Jun 07, 2013 at 06:41:32PM +0200, Eugen Leitl wrote: > ----- Forwarded message from Matthew Petach <mpet...@netflight.com> ----- > > Date: Fri, 7 Jun 2013 09:32:53 -0700 > From: Matthew Petach <mpet...@netflight.com> > Cc: NANOG <na...@nanog.org> > Subject: Re: PRISM: NSA/FBI Internet data mining project > > Speaking just for myself, and if you quote me on this > as speaking on anyone else's behalf, you're a complete > fool, if the government was able to build infrastructure > that could listen to all the traffic from a major provider > for a fraction of what it costs them to handle that traffic > in the first place, I'd be truly amazed--and I'd probably > wonder why the company didn't outsource their infrastruture > to the government, if they can build and run it so much > more cheaply than the commercial providers. ;P > 7 companies were listed; if we assume the > burden was split roughly evenly between them, that's > 20M/7, about $2.85M per company per year to tap in, > or about $238,000/month per company listed, to > supposedly snoop on hundreds of gigs per second > of data. Two ways to handle it: tap in, and funnel > copies of all traffic back to distant monitoring posts, > or have local servers digesting and filtering, just > extracting the few nuggets they want, and sending > just those back.
That's not what PRISM is claimed to do, in the WaPo/Gu slide deck. The deck claims that PRISM provides a way for an analyst at NSA to request access to a specific target (gmail account, Skype account, Y! messenger, etc) and get a dump of data in that account, plus realtime access to the activity on the account. The volume is quoted to be on the order of 10k-100k of requests annually. The implication is that data production is nearly immediate (measured in minutes or hours at most), not enough time for a rubber-stamp FISA warrant, implying a fully automated system. At these volumes we're talking one, or a few, boxes at each provider; plus the necessary backdoors in the provider's storage systems (easy, since the provider already has those backdoors in place for their own maintenance/legal/abuse systems); and trusted personnel on staff at the providers to build and maintain the systems. Add a VPN link back to Fort Meade and you're done. That's obviously a much easier system (compared to your 200 GBps sniffer) to build at the $2M/yr budget, and given that $2M is just the government's part -- the company engineering time to do it is accounted separately -- it seems like a reasonable ballpark for an efficient government project. (There are plenty such, and the existence of inefficient government projects doesn't change that fact.) It's even possible that executive/legal at the providers actually aren't aware that their systems are compromised in this manner. NatSec claims will open many doors, especially with alumni of the DoD who have reentered the civilian workforce: https://financialcryptography.com/mt/archives/001431.html -andy -- Too many emails? Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu or changing your settings at https://mailman.stanford.edu/mailman/listinfo/liberationtech